1 /*	$NetBSD: validate.c,v 1.1.1.2 2014/04/24 12:45:30 pettai Exp $	*/
2 
3 /*
4  * Copyright (c) 2010 Kungliga Tekniska Högskolan
5  * (Royal Institute of Technology, Stockholm, Sweden).
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <config.h>
37 
38 #include <sys/types.h>
39 #include <limits.h>
40 #include <stdio.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <krb5/roken.h>
44 
45 #include <evp.h>
46 #include <hmac.h>
47 #include <err.h>
48 
49 struct tests {
50     const EVP_CIPHER *(*cipher)(void);
51     const char *name;
52     void *key;
53     size_t keysize;
54     void *iv;
55     size_t datasize;
56     void *indata;
57     void *outdata;
58     void *outiv;
59 };
60 
61 static struct tests hc_tests[] = {
62     {
63 	EVP_aes_256_cbc,
64 	"aes-256",
65 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
66 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
67 	32,
68 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
69 	16,
70 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
71 	"\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87"
72     },
73 #if 0
74     {
75 	EVP_aes_128_cfb8,
76 	"aes-cfb8-128",
77 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
78 	16,
79 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
80 	16,
81 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
82 	"\x66\xe9\x4b\xd4\xef\x8a\x2c\x3b\x88\x4c\xfa\x59\xca\x34\x2b\x2e"
83     },
84 #endif
85     {
86 	EVP_des_ede3_cbc,
87 	"des-ede3",
88 	"\x19\x17\xff\xe6\xbb\x77\x2e\xfc"
89 	"\x29\x76\x43\xbc\x63\x56\x7e\x9a"
90 	"\x00\x2e\x4d\x43\x1d\x5f\xfd\x58",
91 	24,
92 	"\xbf\x9a\x12\xb7\x26\x69\xfd\x05",
93 	16,
94 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
95 	"\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b"
96     },
97 #if 0
98     {
99 	EVP_camellia_128_cbc,
100 	"camellia128",
101 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
102 	16,
103 	"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
104 	16,
105 	"\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
106 	"\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C",
107 	NULL
108     },
109 #endif
110     {
111 	EVP_rc4,
112 	"rc4 8",
113 	"\x01\x23\x45\x67\x89\xAB\xCD\xEF",
114 	8,
115 	NULL,
116 	8,
117 	"\x00\x00\x00\x00\x00\x00\x00\x00",
118 	"\x74\x94\xC2\xE7\x10\x4B\x08\x79",
119 	NULL
120     },
121     {
122 	EVP_rc4,
123 	"rc4 5",
124 	"\x61\x8a\x63\xd2\xfb",
125 	5,
126 	NULL,
127 	5,
128 	"\xdc\xee\x4c\xf9\x2c",
129 	"\xf1\x38\x29\xc9\xde",
130 	NULL
131     },
132     {
133 	EVP_rc4,
134 	"rc4 309",
135 	"\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9",
136 	16,
137 	NULL,
138 	309,
139 	"\x52\x75\x69\x73\x6c\x69\x6e\x6e"
140 	"\x75\x6e\x20\x6c\x61\x75\x6c\x75"
141 	"\x20\x6b\x6f\x72\x76\x69\x73\x73"
142 	"\x73\x61\x6e\x69\x2c\x20\x74\xe4"
143 	"\x68\x6b\xe4\x70\xe4\x69\x64\x65"
144 	"\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4"
145 	"\x20\x74\xe4\x79\x73\x69\x6b\x75"
146 	"\x75\x2e\x20\x4b\x65\x73\xe4\x79"
147 	"\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e"
148 	"\x6e\x69\x20\x6f\x6d\x61\x6e\x61"
149 	"\x6e\x69\x2c\x20\x6b\x61\x73\x6b"
150 	"\x69\x73\x61\x76\x75\x75\x6e\x20"
151 	"\x6c\x61\x61\x6b\x73\x6f\x74\x20"
152 	"\x76\x65\x72\x68\x6f\x75\x75\x2e"
153 	"\x20\x45\x6e\x20\x6d\x61\x20\x69"
154 	"\x6c\x6f\x69\x74\x73\x65\x2c\x20"
155 	"\x73\x75\x72\x65\x20\x68\x75\x6f"
156 	"\x6b\x61\x61\x2c\x20\x6d\x75\x74"
157 	"\x74\x61\x20\x6d\x65\x74\x73\xe4"
158 	"\x6e\x20\x74\x75\x6d\x6d\x75\x75"
159 	"\x73\x20\x6d\x75\x6c\x6c\x65\x20"
160 	"\x74\x75\x6f\x6b\x61\x61\x2e\x20"
161 	"\x50\x75\x75\x6e\x74\x6f\x20\x70"
162 	"\x69\x6c\x76\x65\x6e\x2c\x20\x6d"
163 	"\x69\x20\x68\x75\x6b\x6b\x75\x75"
164 	"\x2c\x20\x73\x69\x69\x6e\x74\x6f"
165 	"\x20\x76\x61\x72\x61\x6e\x20\x74"
166 	"\x75\x75\x6c\x69\x73\x65\x6e\x2c"
167 	"\x20\x6d\x69\x20\x6e\x75\x6b\x6b"
168 	"\x75\x75\x2e\x20\x54\x75\x6f\x6b"
169 	"\x73\x75\x74\x20\x76\x61\x6e\x61"
170 	"\x6d\x6f\x6e\x20\x6a\x61\x20\x76"
171 	"\x61\x72\x6a\x6f\x74\x20\x76\x65"
172 	"\x65\x6e\x2c\x20\x6e\x69\x69\x73"
173 	"\x74\xe4\x20\x73\x79\x64\xe4\x6d"
174 	"\x65\x6e\x69\x20\x6c\x61\x75\x6c"
175 	"\x75\x6e\x20\x74\x65\x65\x6e\x2e"
176 	"\x20\x2d\x20\x45\x69\x6e\x6f\x20"
177 	"\x4c\x65\x69\x6e\x6f",
178 	"\x35\x81\x86\x99\x90\x01\xe6\xb5"
179 	"\xda\xf0\x5e\xce\xeb\x7e\xee\x21"
180 	"\xe0\x68\x9c\x1f\x00\xee\xa8\x1f"
181 	"\x7d\xd2\xca\xae\xe1\xd2\x76\x3e"
182 	"\x68\xaf\x0e\xad\x33\xd6\x6c\x26"
183 	"\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c"
184 	"\x5f\x5e\x0b\x86\xa5\x92\x79\xe4"
185 	"\xf8\x24\xe7\xa6\x40\xbd\x22\x32"
186 	"\x10\xb0\xa6\x11\x60\xb7\xbc\xe9"
187 	"\x86\xea\x65\x68\x80\x03\x59\x6b"
188 	"\x63\x0a\x6b\x90\xf8\xe0\xca\xf6"
189 	"\x91\x2a\x98\xeb\x87\x21\x76\xe8"
190 	"\x3c\x20\x2c\xaa\x64\x16\x6d\x2c"
191 	"\xce\x57\xff\x1b\xca\x57\xb2\x13"
192 	"\xf0\xed\x1a\xa7\x2f\xb8\xea\x52"
193 	"\xb0\xbe\x01\xcd\x1e\x41\x28\x67"
194 	"\x72\x0b\x32\x6e\xb3\x89\xd0\x11"
195 	"\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8"
196 	"\x58\x9d\xbc\xe3\xc6\x66\xf5\xea"
197 	"\x8d\x4c\x79\x54\xc5\x0c\x3f\x34"
198 	"\x0b\x04\x67\xf8\x1b\x42\x59\x61"
199 	"\xc1\x18\x43\x07\x4d\xf6\x20\xf2"
200 	"\x08\x40\x4b\x39\x4c\xf9\xd3\x7f"
201 	"\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d"
202 	"\xa3\xc5\x61\xdf\xa7\x28\x1f\x96"
203 	"\x44\x63\xd2\xcc\x35\xa4\xd1\xb0"
204 	"\x34\x90\xde\xc5\x1b\x07\x11\xfb"
205 	"\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c"
206 	"\x76\x66\x22\xa6\x6d\xe9\x2b\xe9"
207 	"\x96\x46\x1d\x5e\x4d\xc8\x78\xef"
208 	"\x9b\xca\x03\x05\x21\xe8\x35\x1e"
209 	"\x4b\xae\xd2\xfd\x04\xf9\x46\x73"
210 	"\x68\xc4\xad\x6a\xc1\x86\xd0\x82"
211 	"\x45\xb2\x63\xa2\x66\x6d\x1f\x6c"
212 	"\x54\x20\xf1\x59\x9d\xfd\x9f\x43"
213 	"\x89\x21\xc2\xf5\xa4\x63\x93\x8c"
214 	"\xe0\x98\x22\x65\xee\xf7\x01\x79"
215 	"\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1"
216 	"\xaf\x5f\x6a\x54\x7f"
217     }
218 };
219 
220 static int
test_cipher(struct tests * t)221 test_cipher(struct tests *t)
222 {
223     const EVP_CIPHER *c = t->cipher();
224     EVP_CIPHER_CTX ectx;
225     EVP_CIPHER_CTX dctx;
226     void *d;
227 
228     EVP_CIPHER_CTX_init(&ectx);
229     EVP_CIPHER_CTX_init(&dctx);
230 
231     if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1)
232 	errx(1, "%s: EVP_CipherInit_ex einit", t->name);
233     if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1)
234 	errx(1, "%s: EVP_CipherInit_ex dinit", t->name);
235 
236     EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize);
237     EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
238 
239     if (EVP_CipherInit_ex(&ectx, NULL, NULL, t->key, t->iv, 1) != 1)
240 	errx(1, "%s: EVP_CipherInit_ex encrypt", t->name);
241     if (EVP_CipherInit_ex(&dctx, NULL, NULL, t->key, t->iv, 0) != 1)
242 	errx(1, "%s: EVP_CipherInit_ex decrypt", t->name);
243 
244     d = emalloc(t->datasize);
245 
246     if (!EVP_Cipher(&ectx, d, t->indata, t->datasize))
247 	return 1;
248 
249     if (memcmp(d, t->outdata, t->datasize) != 0)
250 	errx(1, "%s: encrypt not the same", t->name);
251 
252     if (!EVP_Cipher(&dctx, d, d, t->datasize))
253 	return 1;
254 
255     if (memcmp(d, t->indata, t->datasize) != 0)
256 	errx(1, "%s: decrypt not the same", t->name);
257 
258     if (t->outiv)
259 	/* XXXX check  */;
260 
261     EVP_CIPHER_CTX_cleanup(&ectx);
262     EVP_CIPHER_CTX_cleanup(&dctx);
263     free(d);
264 
265     return 0;
266 }
267 
268 static void
check_hmac(void)269 check_hmac(void)
270 {
271     unsigned char buf[4] = { 0, 0, 0, 0 };
272     char hmackey[] = "hello-world";
273     size_t hmackey_size = sizeof(hmackey);
274     unsigned int hmaclen;
275     unsigned char hmac[EVP_MAX_MD_SIZE];
276     HMAC_CTX c;
277 
278     char answer[20] = "\x2c\xfa\x32\xb7\x2b\x8a\xf6\xdf\xcf\xda"
279 	              "\x6f\xd1\x52\x4d\x54\x58\x73\x0f\xf3\x24";
280 
281     HMAC_CTX_init(&c);
282     HMAC_Init_ex(&c, hmackey, hmackey_size, EVP_sha1(), NULL);
283     HMAC_Update(&c, buf, sizeof(buf));
284     HMAC_Final(&c, hmac, &hmaclen);
285     HMAC_CTX_cleanup(&c);
286 
287     if (hmaclen != 20)
288 	errx(1, "hmaclen = %d\n", (int)hmaclen);
289 
290     if (ct_memcmp(hmac, answer, hmaclen) != 0)
291 	errx(1, "wrong answer\n");
292 }
293 
294 void
hcrypto_validate(void)295 hcrypto_validate(void)
296 {
297     static int validated = 0;
298     unsigned int i;
299 
300     /* its ok to run this twice, do don't check for races */
301     if (validated)
302 	return;
303     validated++;
304 
305     for (i = 0; i < sizeof(hc_tests) / sizeof(hc_tests[0]); i++)
306 	test_cipher(&hc_tests[i]);
307 
308     check_hmac();
309 }
310