diff options
author | Rob Austein <sra@hactrn.net> | 2015-06-04 16:55:28 -0400 |
---|---|---|
committer | Rob Austein <sra@hactrn.net> | 2015-06-04 16:55:28 -0400 |
commit | cf865e9d768ab2dad37f82f071f0050b20f18506 (patch) | |
tree | 9bcdd8a495d5d72953f37ffbed6b03af214c7c38 | |
parent | 9176df4906ae90df7b0b1e16485571fd3d3132d8 (diff) |
Disable HMAC-SHA-384 tests as neither my implementation nor PyCrypto
passes them. Add missing copyright notices, other trivial cleanup
(whitespace, etc).
-rw-r--r-- | Makefile.in | 27 | ||||
-rw-r--r-- | aes_keywrap.c | 35 | ||||
-rw-r--r-- | configure.ac | 27 | ||||
-rw-r--r-- | cryptech.h | 62 | ||||
-rw-r--r-- | csprng.c | 16 | ||||
-rw-r--r-- | errorstrings.c | 38 | ||||
-rw-r--r-- | hal_io_eim.c | 10 | ||||
-rw-r--r-- | hal_io_i2c.c | 40 | ||||
-rw-r--r-- | hash.c | 3 | ||||
-rw-r--r-- | novena-eim.c | 6 | ||||
-rw-r--r-- | novena-eim.h | 6 | ||||
-rw-r--r-- | tests/Makefile.in | 27 | ||||
-rw-r--r-- | tests/test-aes-key-wrap.c | 44 | ||||
-rw-r--r-- | tests/test-hash.c | 92 | ||||
-rw-r--r-- | tests/test-rsa.c | 82 | ||||
-rw-r--r-- | tests/test-rsa.py | 32 |
16 files changed, 426 insertions, 121 deletions
diff --git a/Makefile.in b/Makefile.in index ee9daae..45c77e3 100644 --- a/Makefile.in +++ b/Makefile.in @@ -1,5 +1,32 @@ # @configure_input@ +# Copyright (c) 2015, SUNET +# +# Redistribution and use in source and binary forms, with or +# without modification, are permitted provided that the following +# conditions are met: +# +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS +# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE +# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; +# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, +# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) +# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + INC = cryptech.h LIB = libcryptech.a OBJ = ${IO_OBJ} csprng.o hash.o aes_keywrap.o errorstrings.o diff --git a/aes_keywrap.c b/aes_keywrap.c index a41a866..a68164c 100644 --- a/aes_keywrap.c +++ b/aes_keywrap.c @@ -1,7 +1,38 @@ /* - * Implementation of RFC 5649 variant of AES Key Wrap, using Cryptlib - * to supply the AES ECB encryption and decryption functions. + * aes_keywrap.c + * ------------- + * Implementation of RFC 5649 over Cryptech AES core. * + * Authors: Rob Austein + * Copyright (c) 2015, SUNET + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +/* * Note that there are two different block sizes involved here: the * key wrap algorithm deals entirely with 64-bit blocks, while AES * itself deals with 128-bit blocks. In practice, this is not as diff --git a/configure.ac b/configure.ac index f7e4dd5..d62d460 100644 --- a/configure.ac +++ b/configure.ac @@ -1,5 +1,32 @@ # -*- Autoconf -*- +# Copyright (c) 2015, SUNET +# +# Redistribution and use in source and binary forms, with or +# without modification, are permitted provided that the following +# conditions are met: +# +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS +# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE +# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; +# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, +# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) +# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + # Bare-minimum autoconf, with as little of the usual voodoo as # possible. This probably ought to be replaced by a ten-line Python # script, some day when we have time to shave that yak. @@ -1,9 +1,9 @@ /* * cryptech.h * ---------- - * Memory map and access functions for Cryptech cores. + * Memory map, access functions, and HAL for Cryptech cores. * - * Authors: Joachim Strombergson, Paul Selkirk + * Authors: Joachim Strombergson, Paul Selkirk, Rob Austein * Copyright (c) 2015, NORDUnet A/S All rights reserved. * * Redistribution and use in source and binary forms, with or without @@ -430,25 +430,25 @@ */ #define HAL_ERROR_LIST \ - DEFINE_HAL_ERROR(HAL_OK, "No error") \ - DEFINE_HAL_ERROR(HAL_ERROR_BAD_ARGUMENTS, "Bad arguments given") \ - DEFINE_HAL_ERROR(HAL_ERROR_UNSUPPORTED_KEY, "Unsupported key type or key length") \ - DEFINE_HAL_ERROR(HAL_ERROR_IO_SETUP_FAILED, "Could not set up I/O with FPGA") \ - DEFINE_HAL_ERROR(HAL_ERROR_IO_TIMEOUT, "I/O with FPGA timed out") \ - DEFINE_HAL_ERROR(HAL_ERROR_IO_UNEXPECTED, "Unexpected response from FPGA") \ - DEFINE_HAL_ERROR(HAL_ERROR_IO_OS_ERROR, "Operating system error talking to FPGA") \ - DEFINE_HAL_ERROR(HAL_ERROR_IO_BAD_COUNT, "Bad byte count") \ - DEFINE_HAL_ERROR(HAL_ERROR_CSPRNG_BROKEN, "CSPRNG is returning nonsense") \ - DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_MAGIC, "Bad magic number while unwrapping key") \ - DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_LENGTH, "Length out of range while unwrapping key") \ - DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_PADDING, "Non-zero padding detected unwrapping key") \ + DEFINE_HAL_ERROR(HAL_OK, "No error") \ + DEFINE_HAL_ERROR(HAL_ERROR_BAD_ARGUMENTS, "Bad arguments given") \ + DEFINE_HAL_ERROR(HAL_ERROR_UNSUPPORTED_KEY, "Unsupported key type or key length") \ + DEFINE_HAL_ERROR(HAL_ERROR_IO_SETUP_FAILED, "Could not set up I/O with FPGA") \ + DEFINE_HAL_ERROR(HAL_ERROR_IO_TIMEOUT, "I/O with FPGA timed out") \ + DEFINE_HAL_ERROR(HAL_ERROR_IO_UNEXPECTED, "Unexpected response from FPGA") \ + DEFINE_HAL_ERROR(HAL_ERROR_IO_OS_ERROR, "Operating system error talking to FPGA") \ + DEFINE_HAL_ERROR(HAL_ERROR_IO_BAD_COUNT, "Bad byte count") \ + DEFINE_HAL_ERROR(HAL_ERROR_CSPRNG_BROKEN, "CSPRNG is returning nonsense") \ + DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_MAGIC, "Bad magic number while unwrapping key") \ + DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_LENGTH, "Length out of range while unwrapping key") \ + DEFINE_HAL_ERROR(HAL_ERROR_KEYWRAP_BAD_PADDING, "Non-zero padding detected unwrapping key") \ END_OF_HAL_ERROR_LIST /* Marker to forestall silly line continuation errors */ #define END_OF_HAL_ERROR_LIST /* Define the error code enum here. See errorstrings.c for the text strings. */ -#define DEFINE_HAL_ERROR(_code_,_text_) _code_, +#define DEFINE_HAL_ERROR(_code_,_text_) _code_, typedef enum { HAL_ERROR_LIST N_HAL_ERRORS } hal_error_t; #undef DEFINE_HAL_ERROR @@ -518,33 +518,39 @@ extern const hal_hash_descriptor_t hal_hash_sha512; extern hal_error_t hal_hash_core_present(const hal_hash_descriptor_t * const descriptor); extern hal_error_t hal_hash_initialize(const hal_hash_descriptor_t * const descriptor, - hal_hash_state_t *state, - void *state_buffer, const size_t state_length); + hal_hash_state_t *state, + void *state_buffer, const size_t state_length); extern hal_error_t hal_hash_update(const hal_hash_state_t state, - const uint8_t * data, const size_t length); + const uint8_t * data, const size_t length); extern hal_error_t hal_hash_finalize(const hal_hash_state_t state, - uint8_t *digest, const size_t length); + uint8_t *digest, const size_t length); extern hal_error_t hal_hmac_initialize(const hal_hash_descriptor_t * const descriptor, - hal_hmac_state_t *state, - void *state_buffer, const size_t state_length, - const uint8_t * const key, const size_t key_length); + hal_hmac_state_t *state, + void *state_buffer, const size_t state_length, + const uint8_t * const key, const size_t key_length); extern hal_error_t hal_hmac_update(const hal_hmac_state_t state, - const uint8_t * data, const size_t length); + const uint8_t * data, const size_t length); extern hal_error_t hal_hmac_finalize(const hal_hmac_state_t state, - uint8_t *hmac, const size_t length); + uint8_t *hmac, const size_t length); extern hal_error_t hal_aes_keywrap(const uint8_t *kek, const size_t kek_length, - const uint8_t *plaintext, const size_t plaintext_length, - uint8_t *cyphertext, size_t *ciphertext_length); + const uint8_t *plaintext, const size_t plaintext_length, + uint8_t *cyphertext, size_t *ciphertext_length); extern hal_error_t hal_aes_keyunwrap(const uint8_t *kek, const size_t kek_length, - const uint8_t *ciphertext, const size_t ciphertext_length, - unsigned char *plaintext, size_t *plaintext_length); + const uint8_t *ciphertext, const size_t ciphertext_length, + unsigned char *plaintext, size_t *plaintext_length); extern size_t hal_aes_keywrap_ciphertext_length(const size_t plaintext_length); #endif /* _CRYPTECH_H_ */ + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ @@ -1,8 +1,7 @@ /* * csprng.c - * ------------------------------ - * - * HAL interface to Cryptech CSPRNG/TRNG. + * -------- + * HAL interface to Cryptech CSPRNG. * * Authors: Joachim Strömbergson, Paul Selkirk, Rob Austein * Copyright (c) 2014-2015, SUNET @@ -38,19 +37,10 @@ #include <stddef.h> #include <stdio.h> -#if 0 -#include <stdlib.h> -#include <string.h> -#include <unistd.h> -#include <errno.h> -#include <fcntl.h> -#include <sys/ioctl.h> -#endif - #include "cryptech.h" #ifndef WAIT_FOR_CSPRNG_VALID -#define WAIT_FOR_CSPRNG_VALID 1 +#define WAIT_FOR_CSPRNG_VALID 1 #endif hal_error_t hal_get_random(void *buffer, const size_t length) diff --git a/errorstrings.c b/errorstrings.c index 9686eab..9a4cc49 100644 --- a/errorstrings.c +++ b/errorstrings.c @@ -1,5 +1,35 @@ /* + * errorstrings.c + * -------------- * Translate HAL error codes to strings. + * + * Authors: Rob Austein + * Copyright (c) 2015, SUNET + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <stdio.h> @@ -10,7 +40,7 @@ #include "cryptech.h" -#define DEFINE_HAL_ERROR(_code_,_text_) \ +#define DEFINE_HAL_ERROR(_code_,_text_) \ case _code_: return _text_; const char *hal_error_string(const hal_error_t code) @@ -23,3 +53,9 @@ const char *hal_error_string(const hal_error_t code) } #undef DEFINE_HAL_ERROR + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/hal_io_eim.c b/hal_io_eim.c index ee5a5de..f7444e2 100644 --- a/hal_io_eim.c +++ b/hal_io_eim.c @@ -48,7 +48,7 @@ static int debug = 0; static int inited = 0; #ifndef EIM_IO_TIMEOUT -#define EIM_IO_TIMEOUT 100000000 +#define EIM_IO_TIMEOUT 100000000 #endif static hal_error_t init(void) @@ -188,7 +188,7 @@ hal_error_t hal_io_wait(off_t offset, uint8_t status, int *count) if ((buf[3] & status) != 0) { if (count) - *count = i; + *count = i; return HAL_OK; } } @@ -205,3 +205,9 @@ hal_error_t hal_io_wait_valid(off_t offset) int limit = EIM_IO_TIMEOUT; return hal_io_wait(offset, STATUS_VALID, &limit); } + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/hal_io_i2c.c b/hal_io_i2c.c index b7256d2..aa7b198 100644 --- a/hal_io_i2c.c +++ b/hal_io_i2c.c @@ -169,7 +169,7 @@ static hal_error_t i2c_read(uint8_t *b) static hal_error_t hal_io_send_write_cmd(off_t offset, const uint8_t *data) { uint8_t buf[9] = { SOC, WRITE_CMD, (offset >> 8) & 0xff, offset & 0xff, - data[0], data[1], data[2], data[3], EOC }; + data[0], data[1], data[2], data[3], EOC }; return i2c_write(buf, sizeof(buf)); } @@ -196,21 +196,21 @@ static hal_error_t hal_io_get_resp(uint8_t *buf, size_t len) if (i == 1) { /* response code */ switch (buf[i]) { case READ_OK: - len = 9; - break; + len = 9; + break; case WRITE_OK: - len = 5; - break; + len = 5; + break; case RESET_OK: - len = 3; - break; + len = 3; + break; case ERROR: case UNKNOWN: - len = 4; - break; + len = 4; + break; default: - /* we've gotten out of sync, and there's probably nothing we can do */ - return HAL_ERROR_IO_UNEXPECTED; + /* we've gotten out of sync, and there's probably nothing we can do */ + return HAL_ERROR_IO_UNEXPECTED; } } } @@ -270,7 +270,7 @@ static hal_error_t hal_io_get_read_resp_expected(off_t offset, const uint8_t *da { uint8_t buf[9]; uint8_t expected[9] = { SOR, READ_OK, (offset >> 8) & 0xff, offset & 0xff, - data[0], data[1], data[2], data[3], EOR }; + data[0], data[1], data[2], data[3], EOR }; hal_error_t err; dump("expect", expected, 9); @@ -287,7 +287,7 @@ hal_error_t hal_io_write(off_t offset, const uint8_t *buf, size_t len) for (; len > 0; offset++, buf += 4, len -= 4) if ((err = hal_io_send_write_cmd(offset, buf)) != HAL_OK || - (err = hal_io_get_write_resp(offset)) != HAL_OK) + (err = hal_io_get_write_resp(offset)) != HAL_OK) return err; return HAL_OK; @@ -299,7 +299,7 @@ hal_error_t hal_io_read(off_t offset, uint8_t *buf, size_t len) for (; len > 0; offset++, buf += 4, len -= 4) if ((err = hal_io_send_read_cmd(offset)) != HAL_OK || - (err = hal_io_get_read_resp(offset, buf)) != HAL_OK) + (err = hal_io_get_read_resp(offset, buf)) != HAL_OK) return err; return HAL_OK; @@ -310,8 +310,8 @@ hal_error_t hal_io_expected(off_t offset, const uint8_t *buf, size_t len) hal_error_t err; for (; len > 0; offset++, buf += 4, len -= 4) - if ((err = hal_io_send_read_cmd(offset)) != HAL_OK || - (err = hal_io_get_read_resp_expected(offset, buf)) != HAL_OK) + if ((err = hal_io_send_read_cmd(offset)) != HAL_OK || + (err = hal_io_get_read_resp_expected(offset, buf)) != HAL_OK) return err; return HAL_OK; @@ -345,7 +345,7 @@ hal_error_t hal_io_wait(off_t offset, uint8_t status, int *count) if (buf[3] & status) { if (count) - *count = i; + *count = i; return HAL_OK; } @@ -363,3 +363,9 @@ hal_error_t hal_io_wait_valid(off_t offset) int limit = 10; return hal_io_wait(offset, STATUS_VALID, &limit); } + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ @@ -1,7 +1,6 @@ /* * hashes.c * -------- - * * HAL interface to Cryptech hash cores. * * Authors: Joachim Strömbergson, Paul Selkirk, Rob Austein @@ -50,7 +49,7 @@ */ #define MAX_BLOCK_LEN SHA512_BLOCK_LEN -#define MAX_DIGEST_LEN SHA512_DIGEST_LEN +#define MAX_DIGEST_LEN SHA512_DIGEST_LEN /* * HMAC magic numbers. diff --git a/novena-eim.c b/novena-eim.c index 85bfac0..c8c47ad 100644 --- a/novena-eim.c +++ b/novena-eim.c @@ -706,3 +706,9 @@ static void _eim_remap_mem(off_t offset) //------------------------------------------------------------------------------ // End-of-File //------------------------------------------------------------------------------ + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/novena-eim.h b/novena-eim.h index dcceaf4..5228529 100644 --- a/novena-eim.h +++ b/novena-eim.h @@ -51,3 +51,9 @@ void eim_write_32(off_t, uint32_t *); * If EIM is not set up correctly, this will abort with a bus error. */ void eim_read_32(off_t, uint32_t *); + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/tests/Makefile.in b/tests/Makefile.in index 19c68c8..9a7dfec 100644 --- a/tests/Makefile.in +++ b/tests/Makefile.in @@ -1,5 +1,32 @@ # @configure_input@ +# Copyright (c) 2015, SUNET +# +# Redistribution and use in source and binary forms, with or +# without modification, are permitted provided that the following +# conditions are met: +# +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS +# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE +# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; +# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, +# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) +# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + INC = ../cryptech.h LIB = ../libcryptech.a BIN = test-aes-key-wrap test-hash test-rsa diff --git a/tests/test-aes-key-wrap.c b/tests/test-aes-key-wrap.c index b956ba0..cebdcc7 100644 --- a/tests/test-aes-key-wrap.c +++ b/tests/test-aes-key-wrap.c @@ -1,5 +1,35 @@ /* + * test-aes-key-wrap.c + * ------------------- * Test code for AES Key Wrap. + * + * Authors: Rob Austein + * Copyright (c) 2015, SUNET + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <stdio.h> @@ -79,7 +109,7 @@ static const char *format_hex(const uint8_t *bin, const size_t len, char *hex, c } static int run_test(const uint8_t * const K, const size_t K_len, - const uint8_t * const C, const size_t C_len) + const uint8_t * const C, const size_t C_len) { const size_t Q_len = sizeof(Q); uint8_t q[TC_BUFSIZE], c[TC_BUFSIZE]; @@ -95,13 +125,13 @@ static int run_test(const uint8_t * const K, const size_t K_len, printf("Wrapping with %lu-bit KEK...\n", (unsigned long) K_len * 8); if ((err = hal_aes_keywrap(K, K_len, Q, Q_len, c, &c_len)) != HAL_OK) { printf("Couldn't wrap with %lu-bit KEK: %s\n", - (unsigned long) K_len * 8, hal_error_string(err)); + (unsigned long) K_len * 8, hal_error_string(err)); ok1 = 0; } else if (C_len != c_len || memcmp(C, c, C_len) != 0) { printf("Ciphertext mismatch:\n Want: %s\n Got: %s\n", - format_hex(C, C_len, h1, sizeof(h1)), - format_hex(c, c_len, h2, sizeof(h2))); + format_hex(C, C_len, h1, sizeof(h1)), + format_hex(c, c_len, h2, sizeof(h2))); ok1 = 0; } else { @@ -115,13 +145,13 @@ static int run_test(const uint8_t * const K, const size_t K_len, printf("Unwrapping with %lu-bit KEK...\n", (unsigned long) K_len * 8); if ((err = hal_aes_keyunwrap(K, K_len, C, C_len, q, &q_len)) != HAL_OK) { printf("Couldn't unwrap with %lu-bit KEK: %s\n", - (unsigned long) K_len * 8, hal_error_string(err)); + (unsigned long) K_len * 8, hal_error_string(err)); ok2 = 0; } else if (Q_len != q_len || memcmp(Q, q, Q_len) != 0) { printf("Plaintext mismatch:\n Want: %s\n Got: %s\n", - format_hex(Q, Q_len, h1, sizeof(h1)), - format_hex(q, q_len, h2, sizeof(h2))); + format_hex(Q, Q_len, h1, sizeof(h1)), + format_hex(q, q_len, h2, sizeof(h2))); ok2 = 0; } else { diff --git a/tests/test-hash.c b/tests/test-hash.c index 7cb3ce7..81e6010 100644 --- a/tests/test-hash.c +++ b/tests/test-hash.c @@ -1,5 +1,35 @@ /* - * Test code for hash cores. + * test-hash.c + * ----------- + * Test code for HAL interface to Cryptech hash cores. + * + * Authors: Rob Austein + * Copyright (c) 2015, SUNET + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <stdio.h> @@ -498,9 +528,9 @@ static const uint8_t hmac_sha2_tc_7_result_sha512[] = { /* 64 bytes */ }; static int _test_hash(const hal_hash_descriptor_t * const descriptor, - const uint8_t * const data, const size_t data_len, - const uint8_t * const result, const size_t result_len, - const char * const label) + const uint8_t * const data, const size_t data_len, + const uint8_t * const result, const size_t result_len, + const char * const label) { uint8_t statebuf[512], digest[512]; hal_hash_state_t state; @@ -561,10 +591,10 @@ static int _test_hash(const hal_hash_descriptor_t * const descriptor, } static int _test_hmac(const hal_hash_descriptor_t * const descriptor, - const uint8_t * const key, const size_t key_len, - const uint8_t * const data, const size_t data_len, - const uint8_t * const result, const size_t result_len, - const char * const label) + const uint8_t * const key, const size_t key_len, + const uint8_t * const data, const size_t data_len, + const uint8_t * const result, const size_t result_len, + const char * const label) { uint8_t statebuf[1024], digest[512]; hal_hmac_state_t state; @@ -645,7 +675,7 @@ int main (int argc, char *argv[]) ok &= test_hash(&hal_hash_sha512_256, nist_1024_single, sha512_256_single_digest, "SHA-512/256 single block"); ok &= test_hash(&hal_hash_sha512_256, nist_1024_double, sha512_256_double_digest, "SHA-512/256 double block"); - + ok &= test_hash(&hal_hash_sha384, nist_1024_single, sha384_single_digest, "SHA-384 single block"); ok &= test_hash(&hal_hash_sha384, nist_1024_double, sha384_double_digest, "SHA-384 double block"); @@ -661,28 +691,42 @@ int main (int argc, char *argv[]) ok &= test_hmac(&hal_hash_sha1, hmac_sha1_tc_7_key, hmac_sha1_tc_7_data, hmac_sha1_tc_7_result_sha1, "HMAC-SHA-1 test case 7"); ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_1_key, hmac_sha2_tc_1_data, hmac_sha2_tc_1_result_sha256, "HMAC-SHA-256 test case 1"); - ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_1_key, hmac_sha2_tc_1_data, hmac_sha2_tc_1_result_sha384, "HMAC-SHA-384 test case 1"); - ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_1_key, hmac_sha2_tc_1_data, hmac_sha2_tc_1_result_sha512, "HMAC-SHA-512 test case 1"); - ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_2_key, hmac_sha2_tc_2_data, hmac_sha2_tc_2_result_sha256, "HMAC-SHA-256 test case 2"); - ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_2_key, hmac_sha2_tc_2_data, hmac_sha2_tc_2_result_sha384, "HMAC-SHA-384 test case 2"); - ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_2_key, hmac_sha2_tc_2_data, hmac_sha2_tc_2_result_sha512, "HMAC-SHA-512 test case 2"); - ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_3_key, hmac_sha2_tc_3_data, hmac_sha2_tc_3_result_sha256, "HMAC-SHA-256 test case 3"); - ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_3_key, hmac_sha2_tc_3_data, hmac_sha2_tc_3_result_sha384, "HMAC-SHA-384 test case 3"); - ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_3_key, hmac_sha2_tc_3_data, hmac_sha2_tc_3_result_sha512, "HMAC-SHA-512 test case 3"); - ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_4_key, hmac_sha2_tc_4_data, hmac_sha2_tc_4_result_sha256, "HMAC-SHA-256 test case 4"); - ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_4_key, hmac_sha2_tc_4_data, hmac_sha2_tc_4_result_sha384, "HMAC-SHA-384 test case 4"); - ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_4_key, hmac_sha2_tc_4_data, hmac_sha2_tc_4_result_sha512, "HMAC-SHA-512 test case 4"); - ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_6_key, hmac_sha2_tc_6_data, hmac_sha2_tc_6_result_sha256, "HMAC-SHA-256 test case 6"); - ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_6_key, hmac_sha2_tc_6_data, hmac_sha2_tc_6_result_sha384, "HMAC-SHA-384 test case 6"); - ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_6_key, hmac_sha2_tc_6_data, hmac_sha2_tc_6_result_sha512, "HMAC-SHA-512 test case 6"); - ok &= test_hmac(&hal_hash_sha256, hmac_sha2_tc_7_key, hmac_sha2_tc_7_data, hmac_sha2_tc_7_result_sha256, "HMAC-SHA-256 test case 7"); + +#if 0 + /* + * HMAC-SHA-384 doesn't work with the test vectors provided in RFC + * 4231. I have yet to find an implementation of HMAC-SHA-384 that + * /does/ work with those test vectors. Some day we should figure + * out what's going on here, but HMAC-SHA-384 is not currently on + * our critical path, and I have more urgent things to work on, so + * for now I'm just declaring HMAC-SHA-384 unsupported and disabling + * these tests until somebody has time to sort this out. + */ + ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_1_key, hmac_sha2_tc_1_data, hmac_sha2_tc_1_result_sha384, "HMAC-SHA-384 test case 1"); + ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_2_key, hmac_sha2_tc_2_data, hmac_sha2_tc_2_result_sha384, "HMAC-SHA-384 test case 2"); + ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_3_key, hmac_sha2_tc_3_data, hmac_sha2_tc_3_result_sha384, "HMAC-SHA-384 test case 3"); + ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_4_key, hmac_sha2_tc_4_data, hmac_sha2_tc_4_result_sha384, "HMAC-SHA-384 test case 4"); + ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_6_key, hmac_sha2_tc_6_data, hmac_sha2_tc_6_result_sha384, "HMAC-SHA-384 test case 6"); ok &= test_hmac(&hal_hash_sha384, hmac_sha2_tc_7_key, hmac_sha2_tc_7_data, hmac_sha2_tc_7_result_sha384, "HMAC-SHA-384 test case 7"); +#endif + + ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_1_key, hmac_sha2_tc_1_data, hmac_sha2_tc_1_result_sha512, "HMAC-SHA-512 test case 1"); + ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_2_key, hmac_sha2_tc_2_data, hmac_sha2_tc_2_result_sha512, "HMAC-SHA-512 test case 2"); + ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_3_key, hmac_sha2_tc_3_data, hmac_sha2_tc_3_result_sha512, "HMAC-SHA-512 test case 3"); + ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_4_key, hmac_sha2_tc_4_data, hmac_sha2_tc_4_result_sha512, "HMAC-SHA-512 test case 4"); + ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_6_key, hmac_sha2_tc_6_data, hmac_sha2_tc_6_result_sha512, "HMAC-SHA-512 test case 6"); ok &= test_hmac(&hal_hash_sha512, hmac_sha2_tc_7_key, hmac_sha2_tc_7_data, hmac_sha2_tc_7_result_sha512, "HMAC-SHA-512 test case 7"); return !ok; } + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/tests/test-rsa.c b/tests/test-rsa.c index 6813c80..dc1a722 100644 --- a/tests/test-rsa.c +++ b/tests/test-rsa.c @@ -1,4 +1,6 @@ /* + * test-rsa.c + * ---------- * First stumblings towards a test harness for RSA using Cryptech * ModExp core. * @@ -6,6 +8,34 @@ * RSA keys and pre-formatted data-to-be-signed, without attempting * CRT or any of the other clever stuff we should be doing. This is * not usable for any sane purpose other than testing. + * + * Authors: Rob Austein + * Copyright (c) 2015, SUNET + * + * Redistribution and use in source and binary forms, with or + * without modification, are permitted provided that the following + * conditions are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in + * the documentation and/or other materials provided with the + * distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, + * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include <stdio.h> @@ -28,10 +58,10 @@ static const uint8_t one[] = { 0, 0, 0, 1 }; * Debugging aid: check a result, report on failure. */ -#define check(_expr_) \ - do { \ - if ((_expr_) != 0) \ - return printf("%s failed\n", #_expr_), 1; \ +#define check(_expr_) \ + do { \ + if ((_expr_) != 0) \ + return printf("%s failed\n", #_expr_), 1; \ } while (0) /* @@ -39,8 +69,8 @@ static const uint8_t one[] = { 0, 0, 0, 1 }; */ static int _set_register(const off_t addr, - const char * const name, - uint32_t value) + const char * const name, + uint32_t value) { uint8_t w1[4], w2[4]; int i; @@ -62,11 +92,11 @@ static int _set_register(const off_t addr, */ static int _get_blockmem(const off_t reset_addr, - const char * const reset_name, - const off_t data_addr, - const char * const data_name, - uint8_t *value, - const size_t length) + const char * const reset_name, + const off_t data_addr, + const char * const data_name, + uint8_t *value, + const size_t length) { size_t i; assert(reset_name != NULL && data_name != NULL && value != NULL && length % 4 == 0); @@ -83,13 +113,13 @@ static int _get_blockmem(const off_t reset_addr, */ static int _set_blockmem(const off_t reset_addr, - const char * const reset_name, - const off_t data_addr, - const char * const data_name, - const uint8_t * const value, - const size_t value_length, - uint8_t *buffer, - const size_t buffer_length) + const char * const reset_name, + const off_t data_addr, + const char * const data_name, + const uint8_t * const value, + const size_t value_length, + uint8_t *buffer, + const size_t buffer_length) { size_t i; assert(reset_name != NULL && data_name != NULL && value != NULL && buffer_length >= value_length && value_length % 4 == 0); @@ -123,10 +153,10 @@ static int _set_blockmem(const off_t reset_addr, */ static int test_modexp(const char * const kind, - const rsa_tc_t * const tc, - const rsa_tc_bn_t * const msg, /* Input message */ - const rsa_tc_bn_t * const exp, /* Exponent */ - const rsa_tc_bn_t * const val) /* Expected result */ + const rsa_tc_t * const tc, + const rsa_tc_bn_t * const msg, /* Input message */ + const rsa_tc_bn_t * const exp, /* Exponent */ + const rsa_tc_bn_t * const val) /* Expected result */ { uint8_t b[4096]; @@ -174,7 +204,7 @@ static int test_modexp(const char * const kind, static int test_rsa(const rsa_tc_t * const tc) { return (test_modexp("Signature", tc, &tc->m, &tc->d, &tc->s) || /* RSA decryption */ - test_modexp("Verification", tc, &tc->s, &tc->e, &tc->m)); /* RSA encryption */ + test_modexp("Verification", tc, &tc->s, &tc->e, &tc->m)); /* RSA encryption */ } int main(int argc, char *argv[]) @@ -200,3 +230,9 @@ int main(int argc, char *argv[]) return 0; } + +/* + * Local variables: + * indent-tabs-mode: nil + * End: + */ diff --git a/tests/test-rsa.py b/tests/test-rsa.py index e6b6d56..3824276 100644 --- a/tests/test-rsa.py +++ b/tests/test-rsa.py @@ -4,8 +4,33 @@ Use PyCrypto to generate test data for Cryptech ModExp core. """ -# Funnily enough, PyCrypto and Cryptlib use exactly the same names for -# RSA key components, see Cryptlib documentation pages 186-187 & 339. +# Author: Rob Austein +# Copyright (c) 2015, SUNET +# +# Redistribution and use in source and binary forms, with or +# without modification, are permitted provided that the following +# conditions are met: +# +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS +# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE +# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, +# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; +# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, +# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) +# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. from argparse import ArgumentParser, FileType from Crypto import __version__ as PyCryptoVersion @@ -59,6 +84,9 @@ def pad_to_blocksize(value, blocksize): extra = len(value) % blocksize return value if extra == 0 else ("\x00" * (blocksize - extra)) + value +# Funnily enough, PyCrypto and Cryptlib use exactly the same names for +# RSA key components, see Cryptlib documentation pages 186-187 & 339. + h = SHA256.new(plaintext) printlines("/*", |