katja_test.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231
  1. #include <tomcrypt_test.h>
  2. #ifdef MKAT
  3. int katja_test(void)
  4. {
  5. unsigned char in[1024], out[1024], tmp[1024];
  6. katja_key key, privKey, pubKey;
  7. int hash_idx, prng_idx, stat, stat2, size;
  8. unsigned long kat_msgsize, len, len2, cnt;
  9. static unsigned char lparam[] = { 0x01, 0x02, 0x03, 0x04 };
  10. hash_idx = find_hash("sha1");
  11. prng_idx = find_prng("yarrow");
  12. if (hash_idx == -1 || prng_idx == -1) {
  13. fprintf(stderr, "katja_test requires LTC_SHA1 and yarrow");
  14. return 1;
  15. }
  16. for (size = 1024; size <= 2048; size += 256) {
  17. /* make 10 random key */
  18. for (cnt = 0; cnt < 10; cnt++) {
  19. DO(katja_make_key(&yarrow_prng, prng_idx, size/8, &key));
  20. if (mp_count_bits(key.N) < size - 7) {
  21. fprintf(stderr, "katja_%d key modulus has %d bits\n", size, mp_count_bits(key.N));
  22. len = mp_unsigned_bin_size(key.N);
  23. mp_to_unsigned_bin(key.N, tmp);
  24. fprintf(stderr, "N == \n");
  25. for (cnt = 0; cnt < len; ) {
  26. fprintf(stderr, "%02x ", tmp[cnt]);
  27. if (!(++cnt & 15)) fprintf(stderr, "\n");
  28. }
  29. len = mp_unsigned_bin_size(key.p);
  30. mp_to_unsigned_bin(key.p, tmp);
  31. fprintf(stderr, "p == \n");
  32. for (cnt = 0; cnt < len; ) {
  33. fprintf(stderr, "%02x ", tmp[cnt]);
  34. if (!(++cnt & 15)) fprintf(stderr, "\n");
  35. }
  36. len = mp_unsigned_bin_size(key.q);
  37. mp_to_unsigned_bin(key.q, tmp);
  38. fprintf(stderr, "\nq == \n");
  39. for (cnt = 0; cnt < len; ) {
  40. fprintf(stderr, "%02x ", tmp[cnt]);
  41. if (!(++cnt & 15)) fprintf(stderr, "\n");
  42. }
  43. fprintf(stderr, "\n");
  44. return 1;
  45. }
  46. if (cnt != 9) {
  47. katja_free(&key);
  48. }
  49. }
  50. /* encrypt the key (without lparam) */
  51. for (cnt = 0; cnt < 4; cnt++) {
  52. for (kat_msgsize = 1; kat_msgsize <= 42; kat_msgsize++) {
  53. /* make a random key/msg */
  54. yarrow_read(in, kat_msgsize, &yarrow_prng);
  55. len = sizeof(out);
  56. len2 = kat_msgsize;
  57. DO(katja_encrypt_key(in, kat_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
  58. /* change a byte */
  59. out[8] ^= 1;
  60. DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
  61. /* change a byte back */
  62. out[8] ^= 1;
  63. if (len2 != kat_msgsize) {
  64. fprintf(stderr, "\nkatja_decrypt_key mismatch len %lu (first decrypt)", len2);
  65. return 1;
  66. }
  67. len2 = kat_msgsize;
  68. DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key));
  69. if (!(stat == 1 && stat2 == 0)) {
  70. fprintf(stderr, "katja_decrypt_key failed");
  71. return 1;
  72. }
  73. if (len2 != kat_msgsize || memcmp(tmp, in, kat_msgsize)) {
  74. unsigned long x;
  75. fprintf(stderr, "\nkatja_decrypt_key mismatch, len %lu (second decrypt)\n", len2);
  76. fprintf(stderr, "Original contents: \n");
  77. for (x = 0; x < kat_msgsize; ) {
  78. fprintf(stderr, "%02x ", in[x]);
  79. if (!(++x % 16)) {
  80. fprintf(stderr, "\n");
  81. }
  82. }
  83. fprintf(stderr, "\n");
  84. fprintf(stderr, "Output contents: \n");
  85. for (x = 0; x < kat_msgsize; ) {
  86. fprintf(stderr, "%02x ", out[x]);
  87. if (!(++x % 16)) {
  88. fprintf(stderr, "\n");
  89. }
  90. }
  91. fprintf(stderr, "\n");
  92. return 1;
  93. }
  94. }
  95. }
  96. /* encrypt the key (with lparam) */
  97. for (kat_msgsize = 1; kat_msgsize <= 42; kat_msgsize++) {
  98. len = sizeof(out);
  99. len2 = kat_msgsize;
  100. DO(katja_encrypt_key(in, kat_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
  101. /* change a byte */
  102. out[8] ^= 1;
  103. DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
  104. if (len2 != kat_msgsize) {
  105. fprintf(stderr, "\nkatja_decrypt_key mismatch len %lu (first decrypt)", len2);
  106. return 1;
  107. }
  108. /* change a byte back */
  109. out[8] ^= 1;
  110. len2 = kat_msgsize;
  111. DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key));
  112. if (!(stat == 1 && stat2 == 0)) {
  113. fprintf(stderr, "katja_decrypt_key failed");
  114. return 1;
  115. }
  116. if (len2 != kat_msgsize || memcmp(tmp, in, kat_msgsize)) {
  117. fprintf(stderr, "katja_decrypt_key mismatch len %lu", len2);
  118. return 1;
  119. }
  120. }
  121. #if 0
  122. /* sign a message (unsalted, lower cholestorol and Atkins approved) now */
  123. len = sizeof(out);
  124. DO(katja_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key));
  125. /* export key and import as both private and public */
  126. len2 = sizeof(tmp);
  127. DO(katja_export(tmp, &len2, PK_PRIVATE, &key));
  128. DO(katja_import(tmp, len2, &privKey));
  129. len2 = sizeof(tmp);
  130. DO(katja_export(tmp, &len2, PK_PUBLIC, &key));
  131. DO(katja_import(tmp, len2, &pubKey));
  132. /* verify with original */
  133. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &key));
  134. /* change a byte */
  135. in[0] ^= 1;
  136. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &key));
  137. if (!(stat == 1 && stat2 == 0)) {
  138. fprintf(stderr, "katja_verify_hash (unsalted, origKey) failed, %d, %d", stat, stat2);
  139. katja_free(&key);
  140. katja_free(&pubKey);
  141. katja_free(&privKey);
  142. return 1;
  143. }
  144. /* verify with privKey */
  145. /* change a byte */
  146. in[0] ^= 1;
  147. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &privKey));
  148. /* change a byte */
  149. in[0] ^= 1;
  150. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &privKey));
  151. if (!(stat == 1 && stat2 == 0)) {
  152. fprintf(stderr, "katja_verify_hash (unsalted, privKey) failed, %d, %d", stat, stat2);
  153. katja_free(&key);
  154. katja_free(&pubKey);
  155. katja_free(&privKey);
  156. return 1;
  157. }
  158. /* verify with pubKey */
  159. /* change a byte */
  160. in[0] ^= 1;
  161. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat, &pubKey));
  162. /* change a byte */
  163. in[0] ^= 1;
  164. DO(katja_verify_hash(out, len, in, 20, hash_idx, 0, &stat2, &pubKey));
  165. if (!(stat == 1 && stat2 == 0)) {
  166. fprintf(stderr, "katja_verify_hash (unsalted, pubkey) failed, %d, %d", stat, stat2);
  167. katja_free(&key);
  168. katja_free(&pubKey);
  169. katja_free(&privKey);
  170. return 1;
  171. }
  172. /* sign a message (salted) now (use privKey to make, pubKey to verify) */
  173. len = sizeof(out);
  174. DO(katja_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 8, &privKey));
  175. DO(katja_verify_hash(out, len, in, 20, hash_idx, 8, &stat, &pubKey));
  176. /* change a byte */
  177. in[0] ^= 1;
  178. DO(katja_verify_hash(out, len, in, 20, hash_idx, 8, &stat2, &pubKey));
  179. if (!(stat == 1 && stat2 == 0)) {
  180. fprintf(stderr, "katja_verify_hash (salted) failed, %d, %d", stat, stat2);
  181. katja_free(&key);
  182. katja_free(&pubKey);
  183. katja_free(&privKey);
  184. return 1;
  185. }
  186. #endif
  187. katja_free(&key);
  188. katja_free(&pubKey);
  189. katja_free(&privKey);
  190. }
  191. /* free the key and return */
  192. return 0;
  193. }
  194. #else
  195. int katja_test(void)
  196. {
  197. fprintf(stderr, "NOP");
  198. return 0;
  199. }
  200. #endif