diff options
Diffstat (limited to 'src/regress')
-rw-r--r-- | src/regress/lib/libcrypto/Makefile | 3 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/poly1305/Makefile | 7 | ||||
-rw-r--r-- | src/regress/lib/libcrypto/poly1305/poly1305test.c | 166 |
3 files changed, 175 insertions, 1 deletions
diff --git a/src/regress/lib/libcrypto/Makefile b/src/regress/lib/libcrypto/Makefile index 22737367a3..6cf7191cd7 100644 --- a/src/regress/lib/libcrypto/Makefile +++ b/src/regress/lib/libcrypto/Makefile | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: Makefile,v 1.8 2014/05/06 20:27:17 miod Exp $ | 1 | # $OpenBSD: Makefile,v 1.9 2014/05/14 14:46:35 jsing Exp $ |
2 | 2 | ||
3 | SUBDIR= \ | 3 | SUBDIR= \ |
4 | aeswrap \ | 4 | aeswrap \ |
@@ -23,6 +23,7 @@ SUBDIR= \ | |||
23 | md4 \ | 23 | md4 \ |
24 | md5 \ | 24 | md5 \ |
25 | mdc2 \ | 25 | mdc2 \ |
26 | poly1305 \ | ||
26 | pqueue \ | 27 | pqueue \ |
27 | rand \ | 28 | rand \ |
28 | rc2 \ | 29 | rc2 \ |
diff --git a/src/regress/lib/libcrypto/poly1305/Makefile b/src/regress/lib/libcrypto/poly1305/Makefile new file mode 100644 index 0000000000..956b46973a --- /dev/null +++ b/src/regress/lib/libcrypto/poly1305/Makefile | |||
@@ -0,0 +1,7 @@ | |||
1 | # $OpenBSD: Makefile,v 1.1 2014/05/14 14:46:35 jsing Exp $ | ||
2 | |||
3 | PROG= poly1305test | ||
4 | LDADD= -lcrypto | ||
5 | DPADD= ${LIBCRYPTO} | ||
6 | |||
7 | .include <bsd.regress.mk> | ||
diff --git a/src/regress/lib/libcrypto/poly1305/poly1305test.c b/src/regress/lib/libcrypto/poly1305/poly1305test.c new file mode 100644 index 0000000000..96b34c0218 --- /dev/null +++ b/src/regress/lib/libcrypto/poly1305/poly1305test.c | |||
@@ -0,0 +1,166 @@ | |||
1 | /* | ||
2 | * Public Domain poly1305 from Andrew Moon | ||
3 | * Based on poly1305-donna.c from: | ||
4 | * https://github.com/floodyberry/poly1305-donna | ||
5 | */ | ||
6 | |||
7 | #include <stdio.h> | ||
8 | |||
9 | #include <openssl/poly1305.h> | ||
10 | |||
11 | void poly1305_auth(unsigned char mac[16], const unsigned char *m, size_t bytes, | ||
12 | const unsigned char key[32]); | ||
13 | |||
14 | int poly1305_verify(const unsigned char mac1[16], const unsigned char mac2[16]); | ||
15 | int poly1305_power_on_self_test(void); | ||
16 | |||
17 | void | ||
18 | poly1305_auth(unsigned char mac[16], const unsigned char *m, size_t bytes, | ||
19 | const unsigned char key[32]) { | ||
20 | poly1305_context ctx; | ||
21 | CRYPTO_poly1305_init(&ctx, key); | ||
22 | CRYPTO_poly1305_update(&ctx, m, bytes); | ||
23 | CRYPTO_poly1305_finish(&ctx, mac); | ||
24 | } | ||
25 | |||
26 | int | ||
27 | poly1305_verify(const unsigned char mac1[16], const unsigned char mac2[16]) { | ||
28 | size_t i; | ||
29 | unsigned int dif = 0; | ||
30 | for (i = 0; i < 16; i++) | ||
31 | dif |= (mac1[i] ^ mac2[i]); | ||
32 | dif = (dif - 1) >> ((sizeof(unsigned int) * 8) - 1); | ||
33 | return (dif & 1); | ||
34 | } | ||
35 | |||
36 | /* test a few basic operations */ | ||
37 | int | ||
38 | poly1305_power_on_self_test(void) { | ||
39 | /* example from nacl */ | ||
40 | static const unsigned char nacl_key[32] = { | ||
41 | 0xee,0xa6,0xa7,0x25,0x1c,0x1e,0x72,0x91, | ||
42 | 0x6d,0x11,0xc2,0xcb,0x21,0x4d,0x3c,0x25, | ||
43 | 0x25,0x39,0x12,0x1d,0x8e,0x23,0x4e,0x65, | ||
44 | 0x2d,0x65,0x1f,0xa4,0xc8,0xcf,0xf8,0x80, | ||
45 | }; | ||
46 | |||
47 | static const unsigned char nacl_msg[131] = { | ||
48 | 0x8e,0x99,0x3b,0x9f,0x48,0x68,0x12,0x73, | ||
49 | 0xc2,0x96,0x50,0xba,0x32,0xfc,0x76,0xce, | ||
50 | 0x48,0x33,0x2e,0xa7,0x16,0x4d,0x96,0xa4, | ||
51 | 0x47,0x6f,0xb8,0xc5,0x31,0xa1,0x18,0x6a, | ||
52 | 0xc0,0xdf,0xc1,0x7c,0x98,0xdc,0xe8,0x7b, | ||
53 | 0x4d,0xa7,0xf0,0x11,0xec,0x48,0xc9,0x72, | ||
54 | 0x71,0xd2,0xc2,0x0f,0x9b,0x92,0x8f,0xe2, | ||
55 | 0x27,0x0d,0x6f,0xb8,0x63,0xd5,0x17,0x38, | ||
56 | 0xb4,0x8e,0xee,0xe3,0x14,0xa7,0xcc,0x8a, | ||
57 | 0xb9,0x32,0x16,0x45,0x48,0xe5,0x26,0xae, | ||
58 | 0x90,0x22,0x43,0x68,0x51,0x7a,0xcf,0xea, | ||
59 | 0xbd,0x6b,0xb3,0x73,0x2b,0xc0,0xe9,0xda, | ||
60 | 0x99,0x83,0x2b,0x61,0xca,0x01,0xb6,0xde, | ||
61 | 0x56,0x24,0x4a,0x9e,0x88,0xd5,0xf9,0xb3, | ||
62 | 0x79,0x73,0xf6,0x22,0xa4,0x3d,0x14,0xa6, | ||
63 | 0x59,0x9b,0x1f,0x65,0x4c,0xb4,0x5a,0x74, | ||
64 | 0xe3,0x55,0xa5 | ||
65 | }; | ||
66 | |||
67 | static const unsigned char nacl_mac[16] = { | ||
68 | 0xf3,0xff,0xc7,0x70,0x3f,0x94,0x00,0xe5, | ||
69 | 0x2a,0x7d,0xfb,0x4b,0x3d,0x33,0x05,0xd9 | ||
70 | }; | ||
71 | |||
72 | /* generates a final value of (2^130 - 2) == 3 */ | ||
73 | static const unsigned char wrap_key[32] = { | ||
74 | 0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
75 | 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
76 | 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
77 | 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
78 | }; | ||
79 | |||
80 | static const unsigned char wrap_msg[16] = { | ||
81 | 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, | ||
82 | 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff | ||
83 | }; | ||
84 | |||
85 | static const unsigned char wrap_mac[16] = { | ||
86 | 0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
87 | 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, | ||
88 | }; | ||
89 | |||
90 | /* | ||
91 | mac of the macs of messages of length 0 to 256, where the key and messages | ||
92 | have all their values set to the length | ||
93 | */ | ||
94 | static const unsigned char total_key[32] = { | ||
95 | 0x01,0x02,0x03,0x04,0x05,0x06,0x07, | ||
96 | 0xff,0xfe,0xfd,0xfc,0xfb,0xfa,0xf9, | ||
97 | 0xff,0xff,0xff,0xff,0xff,0xff,0xff, | ||
98 | 0xff,0xff,0xff,0xff,0xff,0xff,0xff | ||
99 | }; | ||
100 | |||
101 | static const unsigned char total_mac[16] = { | ||
102 | 0x64,0xaf,0xe2,0xe8,0xd6,0xad,0x7b,0xbd, | ||
103 | 0xd2,0x87,0xf9,0x7c,0x44,0x62,0x3d,0x39 | ||
104 | }; | ||
105 | |||
106 | poly1305_context ctx; | ||
107 | poly1305_context total_ctx; | ||
108 | unsigned char all_key[32]; | ||
109 | unsigned char all_msg[256]; | ||
110 | unsigned char mac[16]; | ||
111 | size_t i, j; | ||
112 | int result = 1; | ||
113 | |||
114 | for (i = 0; i < sizeof(mac); i++) | ||
115 | mac[i] = 0; | ||
116 | poly1305_auth(mac, nacl_msg, sizeof(nacl_msg), nacl_key); | ||
117 | result &= poly1305_verify(nacl_mac, mac); | ||
118 | |||
119 | for (i = 0; i < sizeof(mac); i++) | ||
120 | mac[i] = 0; | ||
121 | CRYPTO_poly1305_init(&ctx, nacl_key); | ||
122 | CRYPTO_poly1305_update(&ctx, nacl_msg + 0, 32); | ||
123 | CRYPTO_poly1305_update(&ctx, nacl_msg + 32, 64); | ||
124 | CRYPTO_poly1305_update(&ctx, nacl_msg + 96, 16); | ||
125 | CRYPTO_poly1305_update(&ctx, nacl_msg + 112, 8); | ||
126 | CRYPTO_poly1305_update(&ctx, nacl_msg + 120, 4); | ||
127 | CRYPTO_poly1305_update(&ctx, nacl_msg + 124, 2); | ||
128 | CRYPTO_poly1305_update(&ctx, nacl_msg + 126, 1); | ||
129 | CRYPTO_poly1305_update(&ctx, nacl_msg + 127, 1); | ||
130 | CRYPTO_poly1305_update(&ctx, nacl_msg + 128, 1); | ||
131 | CRYPTO_poly1305_update(&ctx, nacl_msg + 129, 1); | ||
132 | CRYPTO_poly1305_update(&ctx, nacl_msg + 130, 1); | ||
133 | CRYPTO_poly1305_finish(&ctx, mac); | ||
134 | result &= poly1305_verify(nacl_mac, mac); | ||
135 | |||
136 | for (i = 0; i < sizeof(mac); i++) | ||
137 | mac[i] = 0; | ||
138 | poly1305_auth(mac, wrap_msg, sizeof(wrap_msg), wrap_key); | ||
139 | result &= poly1305_verify(wrap_mac, mac); | ||
140 | |||
141 | CRYPTO_poly1305_init(&total_ctx, total_key); | ||
142 | for (i = 0; i < 256; i++) { | ||
143 | /* set key and message to 'i,i,i..' */ | ||
144 | for (j = 0; j < sizeof(all_key); j++) | ||
145 | all_key[j] = i; | ||
146 | for (j = 0; j < i; j++) | ||
147 | all_msg[j] = i; | ||
148 | poly1305_auth(mac, all_msg, i, all_key); | ||
149 | CRYPTO_poly1305_update(&total_ctx, mac, 16); | ||
150 | } | ||
151 | CRYPTO_poly1305_finish(&total_ctx, mac); | ||
152 | result &= poly1305_verify(total_mac, mac); | ||
153 | |||
154 | return result; | ||
155 | } | ||
156 | |||
157 | int | ||
158 | main(int argc, char **argv) | ||
159 | { | ||
160 | if (!poly1305_power_on_self_test()) { | ||
161 | fprintf(stderr, "One or more self tests failed!\n"); | ||
162 | return 1; | ||
163 | } | ||
164 | |||
165 | return 0; | ||
166 | } | ||