summaryrefslogtreecommitdiff
path: root/src/regress
diff options
context:
space:
mode:
Diffstat (limited to 'src/regress')
-rw-r--r--src/regress/lib/libcrypto/Makefile3
-rw-r--r--src/regress/lib/libcrypto/poly1305/Makefile7
-rw-r--r--src/regress/lib/libcrypto/poly1305/poly1305test.c166
3 files changed, 175 insertions, 1 deletions
diff --git a/src/regress/lib/libcrypto/Makefile b/src/regress/lib/libcrypto/Makefile
index 22737367a3..6cf7191cd7 100644
--- a/src/regress/lib/libcrypto/Makefile
+++ b/src/regress/lib/libcrypto/Makefile
@@ -1,4 +1,4 @@
1# $OpenBSD: Makefile,v 1.8 2014/05/06 20:27:17 miod Exp $ 1# $OpenBSD: Makefile,v 1.9 2014/05/14 14:46:35 jsing Exp $
2 2
3SUBDIR= \ 3SUBDIR= \
4 aeswrap \ 4 aeswrap \
@@ -23,6 +23,7 @@ SUBDIR= \
23 md4 \ 23 md4 \
24 md5 \ 24 md5 \
25 mdc2 \ 25 mdc2 \
26 poly1305 \
26 pqueue \ 27 pqueue \
27 rand \ 28 rand \
28 rc2 \ 29 rc2 \
diff --git a/src/regress/lib/libcrypto/poly1305/Makefile b/src/regress/lib/libcrypto/poly1305/Makefile
new file mode 100644
index 0000000000..956b46973a
--- /dev/null
+++ b/src/regress/lib/libcrypto/poly1305/Makefile
@@ -0,0 +1,7 @@
1# $OpenBSD: Makefile,v 1.1 2014/05/14 14:46:35 jsing Exp $
2
3PROG= poly1305test
4LDADD= -lcrypto
5DPADD= ${LIBCRYPTO}
6
7.include <bsd.regress.mk>
diff --git a/src/regress/lib/libcrypto/poly1305/poly1305test.c b/src/regress/lib/libcrypto/poly1305/poly1305test.c
new file mode 100644
index 0000000000..96b34c0218
--- /dev/null
+++ b/src/regress/lib/libcrypto/poly1305/poly1305test.c
@@ -0,0 +1,166 @@
1/*
2 * Public Domain poly1305 from Andrew Moon
3 * Based on poly1305-donna.c from:
4 * https://github.com/floodyberry/poly1305-donna
5 */
6
7#include <stdio.h>
8
9#include <openssl/poly1305.h>
10
11void poly1305_auth(unsigned char mac[16], const unsigned char *m, size_t bytes,
12 const unsigned char key[32]);
13
14int poly1305_verify(const unsigned char mac1[16], const unsigned char mac2[16]);
15int poly1305_power_on_self_test(void);
16
17void
18poly1305_auth(unsigned char mac[16], const unsigned char *m, size_t bytes,
19 const unsigned char key[32]) {
20 poly1305_context ctx;
21 CRYPTO_poly1305_init(&ctx, key);
22 CRYPTO_poly1305_update(&ctx, m, bytes);
23 CRYPTO_poly1305_finish(&ctx, mac);
24}
25
26int
27poly1305_verify(const unsigned char mac1[16], const unsigned char mac2[16]) {
28 size_t i;
29 unsigned int dif = 0;
30 for (i = 0; i < 16; i++)
31 dif |= (mac1[i] ^ mac2[i]);
32 dif = (dif - 1) >> ((sizeof(unsigned int) * 8) - 1);
33 return (dif & 1);
34}
35
36/* test a few basic operations */
37int
38poly1305_power_on_self_test(void) {
39 /* example from nacl */
40 static const unsigned char nacl_key[32] = {
41 0xee,0xa6,0xa7,0x25,0x1c,0x1e,0x72,0x91,
42 0x6d,0x11,0xc2,0xcb,0x21,0x4d,0x3c,0x25,
43 0x25,0x39,0x12,0x1d,0x8e,0x23,0x4e,0x65,
44 0x2d,0x65,0x1f,0xa4,0xc8,0xcf,0xf8,0x80,
45 };
46
47 static const unsigned char nacl_msg[131] = {
48 0x8e,0x99,0x3b,0x9f,0x48,0x68,0x12,0x73,
49 0xc2,0x96,0x50,0xba,0x32,0xfc,0x76,0xce,
50 0x48,0x33,0x2e,0xa7,0x16,0x4d,0x96,0xa4,
51 0x47,0x6f,0xb8,0xc5,0x31,0xa1,0x18,0x6a,
52 0xc0,0xdf,0xc1,0x7c,0x98,0xdc,0xe8,0x7b,
53 0x4d,0xa7,0xf0,0x11,0xec,0x48,0xc9,0x72,
54 0x71,0xd2,0xc2,0x0f,0x9b,0x92,0x8f,0xe2,
55 0x27,0x0d,0x6f,0xb8,0x63,0xd5,0x17,0x38,
56 0xb4,0x8e,0xee,0xe3,0x14,0xa7,0xcc,0x8a,
57 0xb9,0x32,0x16,0x45,0x48,0xe5,0x26,0xae,
58 0x90,0x22,0x43,0x68,0x51,0x7a,0xcf,0xea,
59 0xbd,0x6b,0xb3,0x73,0x2b,0xc0,0xe9,0xda,
60 0x99,0x83,0x2b,0x61,0xca,0x01,0xb6,0xde,
61 0x56,0x24,0x4a,0x9e,0x88,0xd5,0xf9,0xb3,
62 0x79,0x73,0xf6,0x22,0xa4,0x3d,0x14,0xa6,
63 0x59,0x9b,0x1f,0x65,0x4c,0xb4,0x5a,0x74,
64 0xe3,0x55,0xa5
65 };
66
67 static const unsigned char nacl_mac[16] = {
68 0xf3,0xff,0xc7,0x70,0x3f,0x94,0x00,0xe5,
69 0x2a,0x7d,0xfb,0x4b,0x3d,0x33,0x05,0xd9
70 };
71
72 /* generates a final value of (2^130 - 2) == 3 */
73 static const unsigned char wrap_key[32] = {
74 0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
75 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
76 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
77 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
78 };
79
80 static const unsigned char wrap_msg[16] = {
81 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,
82 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff
83 };
84
85 static const unsigned char wrap_mac[16] = {
86 0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
87 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
88 };
89
90 /*
91 mac of the macs of messages of length 0 to 256, where the key and messages
92 have all their values set to the length
93 */
94 static const unsigned char total_key[32] = {
95 0x01,0x02,0x03,0x04,0x05,0x06,0x07,
96 0xff,0xfe,0xfd,0xfc,0xfb,0xfa,0xf9,
97 0xff,0xff,0xff,0xff,0xff,0xff,0xff,
98 0xff,0xff,0xff,0xff,0xff,0xff,0xff
99 };
100
101 static const unsigned char total_mac[16] = {
102 0x64,0xaf,0xe2,0xe8,0xd6,0xad,0x7b,0xbd,
103 0xd2,0x87,0xf9,0x7c,0x44,0x62,0x3d,0x39
104 };
105
106 poly1305_context ctx;
107 poly1305_context total_ctx;
108 unsigned char all_key[32];
109 unsigned char all_msg[256];
110 unsigned char mac[16];
111 size_t i, j;
112 int result = 1;
113
114 for (i = 0; i < sizeof(mac); i++)
115 mac[i] = 0;
116 poly1305_auth(mac, nacl_msg, sizeof(nacl_msg), nacl_key);
117 result &= poly1305_verify(nacl_mac, mac);
118
119 for (i = 0; i < sizeof(mac); i++)
120 mac[i] = 0;
121 CRYPTO_poly1305_init(&ctx, nacl_key);
122 CRYPTO_poly1305_update(&ctx, nacl_msg + 0, 32);
123 CRYPTO_poly1305_update(&ctx, nacl_msg + 32, 64);
124 CRYPTO_poly1305_update(&ctx, nacl_msg + 96, 16);
125 CRYPTO_poly1305_update(&ctx, nacl_msg + 112, 8);
126 CRYPTO_poly1305_update(&ctx, nacl_msg + 120, 4);
127 CRYPTO_poly1305_update(&ctx, nacl_msg + 124, 2);
128 CRYPTO_poly1305_update(&ctx, nacl_msg + 126, 1);
129 CRYPTO_poly1305_update(&ctx, nacl_msg + 127, 1);
130 CRYPTO_poly1305_update(&ctx, nacl_msg + 128, 1);
131 CRYPTO_poly1305_update(&ctx, nacl_msg + 129, 1);
132 CRYPTO_poly1305_update(&ctx, nacl_msg + 130, 1);
133 CRYPTO_poly1305_finish(&ctx, mac);
134 result &= poly1305_verify(nacl_mac, mac);
135
136 for (i = 0; i < sizeof(mac); i++)
137 mac[i] = 0;
138 poly1305_auth(mac, wrap_msg, sizeof(wrap_msg), wrap_key);
139 result &= poly1305_verify(wrap_mac, mac);
140
141 CRYPTO_poly1305_init(&total_ctx, total_key);
142 for (i = 0; i < 256; i++) {
143 /* set key and message to 'i,i,i..' */
144 for (j = 0; j < sizeof(all_key); j++)
145 all_key[j] = i;
146 for (j = 0; j < i; j++)
147 all_msg[j] = i;
148 poly1305_auth(mac, all_msg, i, all_key);
149 CRYPTO_poly1305_update(&total_ctx, mac, 16);
150 }
151 CRYPTO_poly1305_finish(&total_ctx, mac);
152 result &= poly1305_verify(total_mac, mac);
153
154 return result;
155}
156
157int
158main(int argc, char **argv)
159{
160 if (!poly1305_power_on_self_test()) {
161 fprintf(stderr, "One or more self tests failed!\n");
162 return 1;
163 }
164
165 return 0;
166}