xref: /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/t_derive.c (revision 7f2fe78b9dd5f51c821d771b63d2e096f6fd49e9)
1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2 /* lib/crypto/crypto_tests/t_derive.c - Test harness for key derivation */
3 /*
4  * Copyright (C) 2010 by the Massachusetts Institute of Technology.
5  * All rights reserved.
6  *
7  * Export of this software from the United States of America may
8  *   require a specific license from the United States Government.
9  *   It is the responsibility of any person or organization contemplating
10  *   export to obtain such a license before exporting.
11  *
12  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
13  * distribute this software and its documentation for any purpose and
14  * without fee is hereby granted, provided that the above copyright
15  * notice appear in all copies and that both that copyright notice and
16  * this permission notice appear in supporting documentation, and that
17  * the name of M.I.T. not be used in advertising or publicity pertaining
18  * to distribution of the software without specific, written prior
19  * permission.  Furthermore if you modify this software you must label
20  * your software as modified software and not distribute it in such a
21  * fashion that it might be confused with the original M.I.T. software.
22  * M.I.T. makes no representations about the suitability of
23  * this software for any purpose.  It is provided "as is" without express
24  * or implied warranty.
25  */
26 
27 /*
28  * This harness detects changes in key derivation results using known values.
29  * With the -v flag, results for all tests are displayed.
30  */
31 
32 #include "crypto_int.h"
33 
34 struct test {
35     krb5_enctype enctype;
36     krb5_data inkey;
37     krb5_data constant;
38     enum deriv_alg alg;
39     krb5_data expected_key;
40 } test_cases[] = {
41     /* Kc, Ke, Kei for a DES3 key */
42     {
43         ENCTYPE_DES3_CBC_SHA1,
44         { KV5M_DATA, 24,
45           "\x85\x0B\xB5\x13\x58\x54\x8C\xD0\x5E\x86\x76\x8C\x31\x3E\x3B\xFE"
46           "\xF7\x51\x19\x37\xDC\xF7\x2C\x3E" },
47         { KV5M_DATA, 5, "\0\0\0\2\x99" },
48         DERIVE_RFC3961,
49         { KV5M_DATA, 24,
50           "\xF7\x8C\x49\x6D\x16\xE6\xC2\xDA\xE0\xE0\xB6\xC2\x40\x57\xA8\x4C"
51           "\x04\x26\xAE\xEF\x26\xFD\x6D\xCE" }
52     },
53     {
54         ENCTYPE_DES3_CBC_SHA1,
55         { KV5M_DATA, 24,
56           "\x85\x0B\xB5\x13\x58\x54\x8C\xD0\x5E\x86\x76\x8C\x31\x3E\x3B\xFE"
57           "\xF7\x51\x19\x37\xDC\xF7\x2C\x3E" },
58         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
59         DERIVE_RFC3961,
60         { KV5M_DATA, 24,
61           "\x5B\x57\x23\xD0\xB6\x34\xCB\x68\x4C\x3E\xBA\x52\x64\xE9\xA7\x0D"
62           "\x52\xE6\x83\x23\x1A\xD3\xC4\xCE" }
63     },
64     {
65         ENCTYPE_DES3_CBC_SHA1,
66         { KV5M_DATA, 24,
67           "\x85\x0B\xB5\x13\x58\x54\x8C\xD0\x5E\x86\x76\x8C\x31\x3E\x3B\xFE"
68           "\xF7\x51\x19\x37\xDC\xF7\x2C\x3E" },
69         { KV5M_DATA, 5, "\0\0\0\2\x55" },
70         DERIVE_RFC3961,
71         { KV5M_DATA, 24,
72           "\xA7\x7C\x94\x98\x0E\x9B\x73\x45\xA8\x15\x25\xC4\x23\xA7\x37\xCE"
73           "\x67\xF4\xCD\x91\xB6\xB3\xDA\x45" }
74     },
75 
76     /* Kc, Ke, Ki for an AES-128 key */
77     {
78         ENCTYPE_AES128_CTS_HMAC_SHA1_96,
79         { KV5M_DATA, 16,
80           "\x42\x26\x3C\x6E\x89\xF4\xFC\x28\xB8\xDF\x68\xEE\x09\x79\x9F\x15" },
81         { KV5M_DATA, 5, "\0\0\0\2\x99" },
82         DERIVE_RFC3961,
83         { KV5M_DATA, 16,
84           "\x34\x28\x0A\x38\x2B\xC9\x27\x69\xB2\xDA\x2F\x9E\xF0\x66\x85\x4B" }
85     },
86     {
87         ENCTYPE_AES128_CTS_HMAC_SHA1_96,
88         { KV5M_DATA, 16,
89           "\x42\x26\x3C\x6E\x89\xF4\xFC\x28\xB8\xDF\x68\xEE\x09\x79\x9F\x15" },
90         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
91         DERIVE_RFC3961,
92         { KV5M_DATA, 16,
93           "\x5B\x14\xFC\x4E\x25\x0E\x14\xDD\xF9\xDC\xCF\x1A\xF6\x67\x4F\x53" }
94     },
95     {
96         ENCTYPE_AES128_CTS_HMAC_SHA1_96,
97         { KV5M_DATA, 16,
98           "\x42\x26\x3C\x6E\x89\xF4\xFC\x28\xB8\xDF\x68\xEE\x09\x79\x9F\x15" },
99         { KV5M_DATA, 5, "\0\0\0\2\x55" },
100         DERIVE_RFC3961,
101         { KV5M_DATA, 16,
102           "\x4E\xD3\x10\x63\x62\x16\x84\xF0\x9A\xE8\xD8\x99\x91\xAF\x3E\x8F" }
103     },
104 
105     /* Kc, Ke, Ki for an AES-256 key */
106     {
107         ENCTYPE_AES256_CTS_HMAC_SHA1_96,
108         { KV5M_DATA, 32,
109           "\xFE\x69\x7B\x52\xBC\x0D\x3C\xE1\x44\x32\xBA\x03\x6A\x92\xE6\x5B"
110           "\xBB\x52\x28\x09\x90\xA2\xFA\x27\x88\x39\x98\xD7\x2A\xF3\x01\x61" },
111         { KV5M_DATA, 5, "\0\0\0\2\x99" },
112         DERIVE_RFC3961,
113         { KV5M_DATA, 32,
114           "\xBF\xAB\x38\x8B\xDC\xB2\x38\xE9\xF9\xC9\x8D\x6A\x87\x83\x04\xF0"
115           "\x4D\x30\xC8\x25\x56\x37\x5A\xC5\x07\xA7\xA8\x52\x79\x0F\x46\x74" }
116     },
117     {
118         ENCTYPE_AES256_CTS_HMAC_SHA1_96,
119         { KV5M_DATA, 32,
120           "\xFE\x69\x7B\x52\xBC\x0D\x3C\xE1\x44\x32\xBA\x03\x6A\x92\xE6\x5B"
121           "\xBB\x52\x28\x09\x90\xA2\xFA\x27\x88\x39\x98\xD7\x2A\xF3\x01\x61" },
122         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
123         DERIVE_RFC3961,
124         { KV5M_DATA, 32,
125           "\xC7\xCF\xD9\xCD\x75\xFE\x79\x3A\x58\x6A\x54\x2D\x87\xE0\xD1\x39"
126           "\x6F\x11\x34\xA1\x04\xBB\x1A\x91\x90\xB8\xC9\x0A\xDA\x3D\xDF\x37" }
127     },
128     {
129         ENCTYPE_AES256_CTS_HMAC_SHA1_96,
130         { KV5M_DATA, 32,
131           "\xFE\x69\x7B\x52\xBC\x0D\x3C\xE1\x44\x32\xBA\x03\x6A\x92\xE6\x5B"
132           "\xBB\x52\x28\x09\x90\xA2\xFA\x27\x88\x39\x98\xD7\x2A\xF3\x01\x61" },
133         { KV5M_DATA, 5, "\0\0\0\2\x55" },
134         DERIVE_RFC3961,
135         { KV5M_DATA, 32,
136           "\x97\x15\x1B\x4C\x76\x94\x50\x63\xE2\xEB\x05\x29\xDC\x06\x7D\x97"
137           "\xD7\xBB\xA9\x07\x76\xD8\x12\x6D\x91\xF3\x4F\x31\x01\xAE\xA8\xBA" }
138     },
139 
140     /* Kc, Ke, Ki for a Camellia-128 key */
141     {
142         ENCTYPE_CAMELLIA128_CTS_CMAC,
143         { KV5M_DATA, 16,
144           "\x57\xD0\x29\x72\x98\xFF\xD9\xD3\x5D\xE5\xA4\x7F\xB4\xBD\xE2\x4B" },
145         { KV5M_DATA, 5, "\0\0\0\2\x99" },
146         DERIVE_SP800_108_CMAC,
147         { KV5M_DATA, 16,
148           "\xD1\x55\x77\x5A\x20\x9D\x05\xF0\x2B\x38\xD4\x2A\x38\x9E\x5A\x56" }
149     },
150     {
151         ENCTYPE_CAMELLIA128_CTS_CMAC,
152         { KV5M_DATA, 16,
153           "\x57\xD0\x29\x72\x98\xFF\xD9\xD3\x5D\xE5\xA4\x7F\xB4\xBD\xE2\x4B" },
154         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
155         DERIVE_SP800_108_CMAC,
156         { KV5M_DATA, 16,
157           "\x64\xDF\x83\xF8\x5A\x53\x2F\x17\x57\x7D\x8C\x37\x03\x57\x96\xAB" }
158     },
159     {
160         ENCTYPE_CAMELLIA128_CTS_CMAC,
161         { KV5M_DATA, 16,
162           "\x57\xD0\x29\x72\x98\xFF\xD9\xD3\x5D\xE5\xA4\x7F\xB4\xBD\xE2\x4B" },
163         { KV5M_DATA, 5, "\0\0\0\2\x55" },
164         DERIVE_SP800_108_CMAC,
165         { KV5M_DATA, 16,
166           "\x3E\x4F\xBD\xF3\x0F\xB8\x25\x9C\x42\x5C\xB6\xC9\x6F\x1F\x46\x35" }
167     },
168 
169     /* Kc, Ke, Ki for a Camellia-256 key */
170     {
171         ENCTYPE_CAMELLIA256_CTS_CMAC,
172         { KV5M_DATA, 32,
173           "\xB9\xD6\x82\x8B\x20\x56\xB7\xBE\x65\x6D\x88\xA1\x23\xB1\xFA\xC6"
174           "\x82\x14\xAC\x2B\x72\x7E\xCF\x5F\x69\xAF\xE0\xC4\xDF\x2A\x6D\x2C" },
175         { KV5M_DATA, 5, "\0\0\0\2\x99" },
176         DERIVE_SP800_108_CMAC,
177         { KV5M_DATA, 32,
178           "\xE4\x67\xF9\xA9\x55\x2B\xC7\xD3\x15\x5A\x62\x20\xAF\x9C\x19\x22"
179           "\x0E\xEE\xD4\xFF\x78\xB0\xD1\xE6\xA1\x54\x49\x91\x46\x1A\x9E\x50" }
180     },
181     {
182         ENCTYPE_CAMELLIA256_CTS_CMAC,
183         { KV5M_DATA, 32,
184           "\xB9\xD6\x82\x8B\x20\x56\xB7\xBE\x65\x6D\x88\xA1\x23\xB1\xFA\xC6"
185           "\x82\x14\xAC\x2B\x72\x7E\xCF\x5F\x69\xAF\xE0\xC4\xDF\x2A\x6D\x2C" },
186         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
187         DERIVE_SP800_108_CMAC,
188         { KV5M_DATA, 32,
189           "\x41\x2A\xEF\xC3\x62\xA7\x28\x5F\xC3\x96\x6C\x6A\x51\x81\xE7\x60"
190           "\x5A\xE6\x75\x23\x5B\x6D\x54\x9F\xBF\xC9\xAB\x66\x30\xA4\xC6\x04" }
191     },
192     {
193         ENCTYPE_CAMELLIA256_CTS_CMAC,
194         { KV5M_DATA, 32,
195           "\xB9\xD6\x82\x8B\x20\x56\xB7\xBE\x65\x6D\x88\xA1\x23\xB1\xFA\xC6"
196           "\x82\x14\xAC\x2B\x72\x7E\xCF\x5F\x69\xAF\xE0\xC4\xDF\x2A\x6D\x2C" },
197         { KV5M_DATA, 5, "\0\0\0\2\x55" },
198         DERIVE_SP800_108_CMAC,
199         { KV5M_DATA, 32,
200           "\xFA\x62\x4F\xA0\xE5\x23\x99\x3F\xA3\x88\xAE\xFD\xC6\x7E\x67\xEB"
201           "\xCD\x8C\x08\xE8\xA0\x24\x6B\x1D\x73\xB0\xD1\xDD\x9F\xC5\x82\xB0" }
202     },
203 
204     /* Kc, Ke, Ki for an aes128-sha2 key. */
205     {
206         ENCTYPE_AES128_CTS_HMAC_SHA256_128,
207         { KV5M_DATA, 16,
208           "\x37\x05\xD9\x60\x80\xC1\x77\x28\xA0\xE8\x00\xEA\xB6\xE0\xD2\x3C" },
209         { KV5M_DATA, 5, "\0\0\0\2\x99" },
210         DERIVE_SP800_108_HMAC,
211         { KV5M_DATA, 16,
212           "\xB3\x1A\x01\x8A\x48\xF5\x47\x76\xF4\x03\xE9\xA3\x96\x32\x5D\xC3" }
213     },
214     {
215         ENCTYPE_AES128_CTS_HMAC_SHA256_128,
216         { KV5M_DATA, 16,
217           "\x37\x05\xD9\x60\x80\xC1\x77\x28\xA0\xE8\x00\xEA\xB6\xE0\xD2\x3C" },
218         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
219         DERIVE_SP800_108_HMAC,
220         { KV5M_DATA, 16,
221           "\x9B\x19\x7D\xD1\xE8\xC5\x60\x9D\x6E\x67\xC3\xE3\x7C\x62\xC7\x2E" }
222     },
223     {
224         ENCTYPE_AES128_CTS_HMAC_SHA256_128,
225         { KV5M_DATA, 16,
226           "\x37\x05\xD9\x60\x80\xC1\x77\x28\xA0\xE8\x00\xEA\xB6\xE0\xD2\x3C" },
227         { KV5M_DATA, 5, "\0\0\0\2\x55" },
228         DERIVE_SP800_108_HMAC,
229         { KV5M_DATA, 16,
230           "\x9F\xDA\x0E\x56\xAB\x2D\x85\xE1\x56\x9A\x68\x86\x96\xC2\x6A\x6C" }
231     },
232 
233     /* Kc, Ke, Ki for an aes256-sha2 key. */
234     {
235         ENCTYPE_AES256_CTS_HMAC_SHA384_192,
236         { KV5M_DATA, 32,
237           "\x6D\x40\x4D\x37\xFA\xF7\x9F\x9D\xF0\xD3\x35\x68\xD3\x20\x66\x98"
238           "\x00\xEB\x48\x36\x47\x2E\xA8\xA0\x26\xD1\x6B\x71\x82\x46\x0C\x52" },
239         { KV5M_DATA, 5, "\0\0\0\2\x99" },
240         DERIVE_SP800_108_HMAC,
241         { KV5M_DATA, 24,
242           "\xEF\x57\x18\xBE\x86\xCC\x84\x96\x3D\x8B\xBB\x50\x31\xE9\xF5\xC4"
243           "\xBA\x41\xF2\x8F\xAF\x69\xE7\x3D" }
244     },
245     {
246         ENCTYPE_AES256_CTS_HMAC_SHA384_192,
247         { KV5M_DATA, 32,
248           "\x6D\x40\x4D\x37\xFA\xF7\x9F\x9D\xF0\xD3\x35\x68\xD3\x20\x66\x98"
249           "\x00\xEB\x48\x36\x47\x2E\xA8\xA0\x26\xD1\x6B\x71\x82\x46\x0C\x52" },
250         { KV5M_DATA, 5, "\0\0\0\2\xAA" },
251         DERIVE_SP800_108_HMAC,
252         { KV5M_DATA, 32,
253           "\x56\xAB\x22\xBE\xE6\x3D\x82\xD7\xBC\x52\x27\xF6\x77\x3F\x8E\xA7"
254           "\xA5\xEB\x1C\x82\x51\x60\xC3\x83\x12\x98\x0C\x44\x2E\x5C\x7E\x49" }
255     },
256     {
257         ENCTYPE_AES256_CTS_HMAC_SHA384_192,
258         { KV5M_DATA, 32,
259           "\x6D\x40\x4D\x37\xFA\xF7\x9F\x9D\xF0\xD3\x35\x68\xD3\x20\x66\x98"
260           "\x00\xEB\x48\x36\x47\x2E\xA8\xA0\x26\xD1\x6B\x71\x82\x46\x0C\x52" },
261         { KV5M_DATA, 5, "\0\0\0\2\x55" },
262         DERIVE_SP800_108_HMAC,
263         { KV5M_DATA, 24,
264           "\x69\xB1\x65\x14\xE3\xCD\x8E\x56\xB8\x20\x10\xD5\xC7\x30\x12\xB6"
265           "\x22\xC4\xD0\x0F\xFC\x23\xED\x1F" }
266     },
267 };
268 
269 static void
printhex(const char * head,void * data,size_t len)270 printhex(const char *head, void *data, size_t len)
271 {
272     size_t i;
273 
274     printf("%s", head);
275     for (i = 0; i < len; i++) {
276         printf("%02X", ((unsigned char*)data)[i]);
277         if (i % 16 == 15 && i + 1 < len)
278             printf("\n%*s", (int)strlen(head), "");
279         else if (i + 1 < len)
280             printf(" ");
281     }
282     printf("\n");
283 }
284 
285 static const struct krb5_enc_provider *
get_enc_provider(krb5_enctype enctype)286 get_enc_provider(krb5_enctype enctype)
287 {
288     switch (enctype) {
289     case ENCTYPE_DES3_CBC_SHA1:              return &krb5int_enc_des3;
290     case ENCTYPE_AES128_CTS_HMAC_SHA1_96:    return &krb5int_enc_aes128;
291     case ENCTYPE_AES256_CTS_HMAC_SHA1_96:    return &krb5int_enc_aes256;
292     case ENCTYPE_CAMELLIA128_CTS_CMAC:       return &krb5int_enc_camellia128;
293     case ENCTYPE_CAMELLIA256_CTS_CMAC:       return &krb5int_enc_camellia256;
294     case ENCTYPE_AES128_CTS_HMAC_SHA256_128: return &krb5int_enc_aes128;
295     case ENCTYPE_AES256_CTS_HMAC_SHA384_192: return &krb5int_enc_aes256;
296     }
297     abort();
298 }
299 
300 static const struct krb5_hash_provider *
get_hash_provider(krb5_enctype enctype)301 get_hash_provider(krb5_enctype enctype)
302 {
303     switch (enctype) {
304     case ENCTYPE_AES128_CTS_HMAC_SHA256_128: return &krb5int_hash_sha256;
305     case ENCTYPE_AES256_CTS_HMAC_SHA384_192: return &krb5int_hash_sha384;
306     }
307     return NULL;
308 }
309 
310 int
main(int argc,char ** argv)311 main(int argc, char **argv)
312 {
313     krb5_error_code ret;
314     krb5_context context = NULL;
315     size_t i;
316     struct test *test;
317     krb5_keyblock kb;
318     krb5_key inkey = NULL, key = NULL;
319     krb5_data rnd = empty_data(), outcmp;
320     const struct krb5_enc_provider *enc;
321     const struct krb5_hash_provider *hash;
322     krb5_boolean verbose = FALSE;
323     int status = 0;
324 
325     if (argc >= 2 && strcmp(argv[1], "-v") == 0)
326         verbose = TRUE;
327     for (i = 0; i < sizeof(test_cases) / sizeof(*test_cases); i++) {
328         test = &test_cases[i];
329         kb.magic = KV5M_KEYBLOCK;
330         kb.enctype = test->enctype;
331         kb.length = test->inkey.length;
332         kb.contents = (unsigned char *)test->inkey.data;
333         ret = krb5_k_create_key(context, &kb, &inkey);
334         assert(!ret);
335         enc = get_enc_provider(test->enctype);
336         hash = get_hash_provider(test->enctype);
337         if (test->expected_key.length == enc->keylength) {
338             ret = krb5int_derive_key(enc, hash, inkey, &key, &test->constant,
339                                      test->alg);
340             assert(!ret);
341             outcmp = make_data(key->keyblock.contents, key->keyblock.length);
342         } else {
343             ret = alloc_data(&rnd, test->expected_key.length);
344             assert(!ret);
345             ret = krb5int_derive_random(enc, hash, inkey, &rnd,
346                                         &test->constant, test->alg);
347             assert(!ret);
348             outcmp = rnd;
349         }
350         if (verbose) {
351             char buf[64];
352             krb5_enctype_to_name(test->enctype, FALSE, buf, sizeof(buf));
353             printf("\nTest %d:\n", (int)i);
354             printf("Enctype: %s\n", buf);
355             printhex("Input key: ", inkey->keyblock.contents,
356                      inkey->keyblock.length);
357             printhex("Constant: ", test->constant.data, test->constant.length);
358             printhex("Output: ", outcmp.data, outcmp.length);
359         }
360         assert(outcmp.length == test->expected_key.length);
361         if (memcmp(outcmp.data, test->expected_key.data, outcmp.length) != 0) {
362             printf("derive test %d failed\n", (int)i);
363             status = 1;
364             if (!verbose)
365                 break;
366         }
367 
368         krb5_k_free_key(context, inkey);
369         krb5_k_free_key(context, key);
370         zapfree(rnd.data, rnd.length);
371         inkey = key = NULL;
372         rnd = empty_data();
373     }
374     return status;
375 }
376