1 /* 2 * crypto module tests 3 * Copyright (c) 2014-2015, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #include "utils/includes.h" 10 11 #include "utils/common.h" 12 #include "crypto/aes_siv.h" 13 #include "crypto/aes_wrap.h" 14 #include "crypto/aes.h" 15 #include "crypto/ms_funcs.h" 16 #include "crypto/crypto.h" 17 #include "crypto/sha1.h" 18 #include "crypto/sha256.h" 19 20 21 static int test_siv(void) 22 { 23 #ifdef CONFIG_MESH 24 /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */ 25 u8 key[] = { 26 0xff, 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8, 27 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf2, 0xf1, 0xf0, 28 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 29 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff 30 }; 31 u8 ad[] = { 32 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 33 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 34 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27 35 }; 36 u8 plaintext[] = { 37 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 38 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee 39 }; 40 u8 iv_c[] = { 41 0x85, 0x63, 0x2d, 0x07, 0xc6, 0xe8, 0xf3, 0x7f, 42 0x95, 0x0a, 0xcd, 0x32, 0x0a, 0x2e, 0xcc, 0x93, 43 0x40, 0xc0, 0x2b, 0x96, 0x90, 0xc4, 0xdc, 0x04, 44 0xda, 0xef, 0x7f, 0x6a, 0xfe, 0x5c 45 }; 46 /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */ 47 u8 key_2[] = { 48 0x7f, 0x7e, 0x7d, 0x7c, 0x7b, 0x7a, 0x79, 0x78, 49 0x77, 0x76, 0x75, 0x74, 0x73, 0x72, 0x71, 0x70, 50 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 51 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f 52 }; 53 u8 ad1_2[] = { 54 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 55 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 56 0xde, 0xad, 0xda, 0xda, 0xde, 0xad, 0xda, 0xda, 57 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88, 58 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00 59 }; 60 u8 ad2_2[] = { 61 0x10, 0x20, 0x30, 0x40, 0x50, 0x60, 0x70, 0x80, 62 0x90, 0xa0 63 }; 64 u8 nonce_2[] = { 65 0x09, 0xf9, 0x11, 0x02, 0x9d, 0x74, 0xe3, 0x5b, 66 0xd8, 0x41, 0x56, 0xc5, 0x63, 0x56, 0x88, 0xc0 67 }; 68 u8 plaintext_2[] = { 69 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 70 0x73, 0x6f, 0x6d, 0x65, 0x20, 0x70, 0x6c, 0x61, 71 0x69, 0x6e, 0x74, 0x65, 0x78, 0x74, 0x20, 0x74, 72 0x6f, 0x20, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70, 73 0x74, 0x20, 0x75, 0x73, 0x69, 0x6e, 0x67, 0x20, 74 0x53, 0x49, 0x56, 0x2d, 0x41, 0x45, 0x53 75 }; 76 u8 iv_c_2[] = { 77 0x7b, 0xdb, 0x6e, 0x3b, 0x43, 0x26, 0x67, 0xeb, 78 0x06, 0xf4, 0xd1, 0x4b, 0xff, 0x2f, 0xbd, 0x0f, 79 0xcb, 0x90, 0x0f, 0x2f, 0xdd, 0xbe, 0x40, 0x43, 80 0x26, 0x60, 0x19, 0x65, 0xc8, 0x89, 0xbf, 0x17, 81 0xdb, 0xa7, 0x7c, 0xeb, 0x09, 0x4f, 0xa6, 0x63, 82 0xb7, 0xa3, 0xf7, 0x48, 0xba, 0x8a, 0xf8, 0x29, 83 0xea, 0x64, 0xad, 0x54, 0x4a, 0x27, 0x2e, 0x9c, 84 0x48, 0x5b, 0x62, 0xa3, 0xfd, 0x5c, 0x0d 85 }; 86 u8 out[2 * AES_BLOCK_SIZE + sizeof(plaintext_2)]; 87 const u8 *addr[3]; 88 size_t len[3]; 89 90 /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */ 91 addr[0] = ad; 92 len[0] = sizeof(ad); 93 94 if (aes_siv_encrypt(key, plaintext, sizeof(plaintext), 95 1, addr, len, out)) { 96 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); 97 return 1; 98 } 99 if (os_memcmp(out, iv_c, sizeof(iv_c)) != 0) { 100 wpa_printf(MSG_ERROR, 101 "AES-SIV mode encryption returned invalid cipher text"); 102 return 1; 103 } 104 105 if (aes_siv_decrypt(key, iv_c, sizeof(iv_c), 1, addr, len, out)) { 106 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); 107 return 1; 108 } 109 if (os_memcmp(out, plaintext, sizeof(plaintext)) != 0) { 110 wpa_printf(MSG_ERROR, 111 "AES-SIV mode decryption returned invalid plain text"); 112 return 1; 113 } 114 115 /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */ 116 addr[0] = ad1_2; 117 len[0] = sizeof(ad1_2); 118 addr[1] = ad2_2; 119 len[1] = sizeof(ad2_2); 120 addr[2] = nonce_2; 121 len[2] = sizeof(nonce_2); 122 123 if (aes_siv_encrypt(key_2, plaintext_2, sizeof(plaintext_2), 124 3, addr, len, out)) { 125 wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed"); 126 return 1; 127 } 128 if (os_memcmp(out, iv_c_2, sizeof(iv_c_2)) != 0) { 129 wpa_printf(MSG_ERROR, 130 "AES-SIV mode encryption returned invalid cipher text"); 131 return 1; 132 } 133 134 if (aes_siv_decrypt(key_2, iv_c_2, sizeof(iv_c_2), 3, addr, len, out)) { 135 wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed"); 136 return 1; 137 } 138 if (os_memcmp(out, plaintext_2, sizeof(plaintext_2)) != 0) { 139 wpa_printf(MSG_ERROR, 140 "AES-SIV mode decryption returned invalid plain text"); 141 return 1; 142 } 143 144 wpa_printf(MSG_INFO, "AES-SIV test cases passed"); 145 #endif /* CONFIG_MESH */ 146 147 return 0; 148 } 149 150 151 /* OMAC1 AES-128 test vectors from 152 * http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/omac/omac-ad.pdf 153 * which are same as the examples from NIST SP800-38B 154 * http://csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38B.pdf 155 */ 156 157 struct omac1_test_vector { 158 u8 k[16]; 159 u8 msg[64]; 160 int msg_len; 161 u8 tag[16]; 162 }; 163 164 static const struct omac1_test_vector omac1_test_vectors[] = 165 { 166 { 167 { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 168 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }, 169 { }, 170 0, 171 { 0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28, 172 0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46 } 173 }, 174 { 175 { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 176 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }, 177 { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 178 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a}, 179 16, 180 { 0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44, 181 0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c } 182 }, 183 { 184 { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 185 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }, 186 { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 187 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 188 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 189 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 190 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11 }, 191 40, 192 { 0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30, 193 0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27 } 194 }, 195 { 196 { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 197 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }, 198 { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 199 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 200 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 201 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 202 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 203 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 204 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 205 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }, 206 64, 207 { 0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92, 208 0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe } 209 }, 210 }; 211 212 213 static int test_omac1_vector(const struct omac1_test_vector *tv, 214 unsigned int i) 215 { 216 u8 key[] = { 217 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 218 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c 219 }; 220 u8 msg[] = { 0x12, 0x34, 0x56 }; 221 u8 result[24], result2[24]; 222 const u8 *addr[3]; 223 size_t len[3]; 224 225 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || 226 os_memcmp(result, tv->tag, 16) != 0) { 227 wpa_printf(MSG_ERROR, "OMAC1-AES-128 test vector %u failed", i); 228 return 1; 229 } 230 231 if (tv->msg_len > 1) { 232 233 addr[0] = tv->msg; 234 len[0] = 1; 235 addr[1] = tv->msg + 1; 236 len[1] = tv->msg_len - 1; 237 238 if (omac1_aes_128_vector(tv->k, 2, addr, len, result) || 239 os_memcmp(result, tv->tag, 16) != 0) { 240 wpa_printf(MSG_ERROR, 241 "OMAC1-AES-128(vector) test vector %u failed", 242 i); 243 return 1; 244 } 245 246 addr[0] = tv->msg; 247 len[0] = tv->msg_len - 2; 248 addr[1] = tv->msg + tv->msg_len - 2; 249 len[1] = 1; 250 addr[2] = tv->msg + tv->msg_len - 1; 251 len[2] = 1; 252 253 if (omac1_aes_128_vector(tv->k, 3, addr, len, result) || 254 os_memcmp(result, tv->tag, 16) != 0) { 255 wpa_printf(MSG_ERROR, 256 "OMAC1-AES-128(vector2) test vector %u failed", 257 i); 258 return 1; 259 } 260 } 261 262 addr[0] = &msg[0]; 263 len[0] = 1; 264 addr[1] = &msg[1]; 265 len[1] = 1; 266 addr[2] = &msg[2]; 267 len[2] = 1; 268 if (omac1_aes_128(key, msg, sizeof(msg), result) || 269 omac1_aes_128_vector(key, 3, addr, len, result2) || 270 os_memcmp(result, result2, 16) != 0) { 271 wpa_printf(MSG_ERROR, "OMAC1-AES-128 short test mismatch"); 272 return 1; 273 } 274 275 return 0; 276 } 277 278 279 static int test_omac1(void) 280 { 281 unsigned int i; 282 283 for (i = 0; i < ARRAY_SIZE(omac1_test_vectors); i++) { 284 if (test_omac1_vector(&omac1_test_vectors[i], i)) 285 return 1; 286 } 287 288 wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed"); 289 290 return 0; 291 } 292 293 294 static int test_eax(void) 295 { 296 #ifdef EAP_PSK 297 u8 msg[] = { 0xF7, 0xFB }; 298 u8 key[] = { 0x91, 0x94, 0x5D, 0x3F, 0x4D, 0xCB, 0xEE, 0x0B, 299 0xF4, 0x5E, 0xF5, 0x22, 0x55, 0xF0, 0x95, 0xA4 }; 300 u8 nonce[] = { 0xBE, 0xCA, 0xF0, 0x43, 0xB0, 0xA2, 0x3D, 0x84, 301 0x31, 0x94, 0xBA, 0x97, 0x2C, 0x66, 0xDE, 0xBD }; 302 u8 hdr[] = { 0xFA, 0x3B, 0xFD, 0x48, 0x06, 0xEB, 0x53, 0xFA }; 303 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, 304 0x0B, 0xDA, 0xB0, 0x27, 0x74, 0x08, 0xF6, 0x79, 305 0x67, 0xE5 }; 306 u8 data[sizeof(msg)], tag[AES_BLOCK_SIZE]; 307 308 os_memcpy(data, msg, sizeof(msg)); 309 if (aes_128_eax_encrypt(key, nonce, sizeof(nonce), hdr, sizeof(hdr), 310 data, sizeof(data), tag)) { 311 wpa_printf(MSG_ERROR, "AES-128 EAX mode encryption failed"); 312 return 1; 313 } 314 if (os_memcmp(data, cipher, sizeof(data)) != 0) { 315 wpa_printf(MSG_ERROR, 316 "AES-128 EAX mode encryption returned invalid cipher text"); 317 return 1; 318 } 319 if (os_memcmp(tag, cipher + sizeof(data), AES_BLOCK_SIZE) != 0) { 320 wpa_printf(MSG_ERROR, 321 "AES-128 EAX mode encryption returned invalid tag"); 322 return 1; 323 } 324 325 if (aes_128_eax_decrypt(key, nonce, sizeof(nonce), hdr, sizeof(hdr), 326 data, sizeof(data), tag)) { 327 wpa_printf(MSG_ERROR, "AES-128 EAX mode decryption failed"); 328 return 1; 329 } 330 if (os_memcmp(data, msg, sizeof(data)) != 0) { 331 wpa_printf(MSG_ERROR, 332 "AES-128 EAX mode decryption returned invalid plain text"); 333 return 1; 334 } 335 336 wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed"); 337 #endif /* EAP_PSK */ 338 339 return 0; 340 } 341 342 343 static int test_cbc(void) 344 { 345 struct cbc_test_vector { 346 u8 key[16]; 347 u8 iv[16]; 348 u8 plain[32]; 349 u8 cipher[32]; 350 size_t len; 351 } vectors[] = { 352 { 353 { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b, 354 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 }, 355 { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30, 356 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 }, 357 "Single block msg", 358 { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8, 359 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a }, 360 16 361 }, 362 { 363 { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0, 364 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a }, 365 { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28, 366 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 }, 367 { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 368 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 369 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 370 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, 371 { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a, 372 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a, 373 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9, 374 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1 }, 375 32 376 } 377 }; 378 int ret = 0; 379 u8 *buf; 380 unsigned int i; 381 382 for (i = 0; i < ARRAY_SIZE(vectors); i++) { 383 struct cbc_test_vector *tv = &vectors[i]; 384 385 buf = os_malloc(tv->len); 386 if (buf == NULL) { 387 ret++; 388 break; 389 } 390 391 os_memcpy(buf, tv->plain, tv->len); 392 if (aes_128_cbc_encrypt(tv->key, tv->iv, buf, tv->len) || 393 os_memcmp(buf, tv->cipher, tv->len) != 0) { 394 wpa_printf(MSG_ERROR, "AES-CBC encrypt %d failed", i); 395 ret++; 396 } 397 398 os_memcpy(buf, tv->cipher, tv->len); 399 if (aes_128_cbc_decrypt(tv->key, tv->iv, buf, tv->len) || 400 os_memcmp(buf, tv->plain, tv->len) != 0) { 401 wpa_printf(MSG_ERROR, "AES-CBC decrypt %d failed", i); 402 ret++; 403 } 404 405 os_free(buf); 406 } 407 408 return ret; 409 } 410 411 412 static int test_ecb(void) 413 { 414 #ifdef EAP_PSK 415 struct ecb_test_vector { 416 char *key; 417 char *plaintext; 418 char *ciphertext; 419 } vectors[] = { 420 /* CAVS 11.1 - ECBGFSbox128.rsp */ 421 { 422 "00000000000000000000000000000000", 423 "f34481ec3cc627bacd5dc3fb08f273e6", 424 "0336763e966d92595a567cc9ce537f5e" 425 }, 426 { 427 "00000000000000000000000000000000", 428 "9798c4640bad75c7c3227db910174e72", 429 "a9a1631bf4996954ebc093957b234589" 430 }, 431 { 432 "00000000000000000000000000000000", 433 "96ab5c2ff612d9dfaae8c31f30c42168", 434 "ff4f8391a6a40ca5b25d23bedd44a597" 435 }, 436 { 437 "00000000000000000000000000000000", 438 "6a118a874519e64e9963798a503f1d35", 439 "dc43be40be0e53712f7e2bf5ca707209" 440 }, 441 { 442 "00000000000000000000000000000000", 443 "cb9fceec81286ca3e989bd979b0cb284", 444 "92beedab1895a94faa69b632e5cc47ce" 445 }, 446 { 447 "00000000000000000000000000000000", 448 "b26aeb1874e47ca8358ff22378f09144", 449 "459264f4798f6a78bacb89c15ed3d601" 450 }, 451 { 452 "00000000000000000000000000000000", 453 "58c8e00b2631686d54eab84b91f0aca1", 454 "08a4e2efec8a8e3312ca7460b9040bbf" 455 }, 456 /* CAVS 11.1 - ECBKeySbox128.rsp */ 457 { 458 "10a58869d74be5a374cf867cfb473859", 459 "00000000000000000000000000000000", 460 "6d251e6944b051e04eaa6fb4dbf78465" 461 }, 462 { 463 "caea65cdbb75e9169ecd22ebe6e54675", 464 "00000000000000000000000000000000", 465 "6e29201190152df4ee058139def610bb", 466 } 467 }; 468 int ret = 0; 469 unsigned int i; 470 u8 key[16], plain[16], cipher[16], out[16]; 471 472 for (i = 0; i < ARRAY_SIZE(vectors); i++) { 473 struct ecb_test_vector *tv = &vectors[i]; 474 475 if (hexstr2bin(tv->key, key, sizeof(key)) || 476 hexstr2bin(tv->plaintext, plain, sizeof(plain)) || 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) { 478 wpa_printf(MSG_ERROR, "Invalid AES-ECB test vector %u", 479 i); 480 ret++; 481 continue; 482 } 483 484 if (aes_128_encrypt_block(key, plain, out) < 0 || 485 os_memcmp(out, cipher, 16) != 0) { 486 wpa_printf(MSG_ERROR, "AES-ECB encrypt %u failed", i); 487 ret++; 488 } 489 } 490 491 if (!ret) 492 wpa_printf(MSG_INFO, "AES ECB mode test cases passed"); 493 494 return ret; 495 #endif /* EAP_PSK */ 496 497 return 0; 498 } 499 500 501 static int test_key_wrap(void) 502 { 503 int ret = 0; 504 505 /* RFC 3394 - Test vector 4.1 */ 506 u8 kek41[] = { 507 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 508 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f 509 }; 510 u8 plain41[] = { 511 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 512 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff 513 }; 514 u8 crypt41[] = { 515 0x1F, 0xA6, 0x8B, 0x0A, 0x81, 0x12, 0xB4, 0x47, 516 0xAE, 0xF3, 0x4B, 0xD8, 0xFB, 0x5A, 0x7B, 0x82, 517 0x9D, 0x3E, 0x86, 0x23, 0x71, 0xD2, 0xCF, 0xE5 518 }; 519 #ifndef CONFIG_BORINGSSL 520 /* RFC 3394 - Test vector 4.2 */ 521 u8 kek42[] = { 522 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 523 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 524 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 525 }; 526 u8 plain42[] = { 527 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 528 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff 529 }; 530 u8 crypt42[] = { 531 0x96, 0x77, 0x8B, 0x25, 0xAE, 0x6C, 0xA4, 0x35, 532 0xF9, 0x2B, 0x5B, 0x97, 0xC0, 0x50, 0xAE, 0xD2, 533 0x46, 0x8A, 0xB8, 0xA1, 0x7A, 0xD8, 0x4E, 0x5D 534 }; 535 #endif /* CONFIG_BORINGSSL */ 536 /* RFC 3394 - Test vector 4.3 */ 537 u8 kek43[] = { 538 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 539 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 540 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 541 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 542 }; 543 u8 plain43[] = { 544 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 545 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff 546 }; 547 u8 crypt43[] = { 548 0x64, 0xE8, 0xC3, 0xF9, 0xCE, 0x0F, 0x5B, 0xA2, 549 0x63, 0xE9, 0x77, 0x79, 0x05, 0x81, 0x8A, 0x2A, 550 0x93, 0xC8, 0x19, 0x1E, 0x7D, 0x6E, 0x8A, 0xE7, 551 }; 552 #ifndef CONFIG_BORINGSSL 553 /* RFC 3394 - Test vector 4.4 */ 554 u8 kek44[] = { 555 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 556 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 557 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 558 }; 559 u8 plain44[] = { 560 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 561 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 562 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 563 }; 564 u8 crypt44[] = { 565 0x03, 0x1D, 0x33, 0x26, 0x4E, 0x15, 0xD3, 0x32, 566 0x68, 0xF2, 0x4E, 0xC2, 0x60, 0x74, 0x3E, 0xDC, 567 0xE1, 0xC6, 0xC7, 0xDD, 0xEE, 0x72, 0x5A, 0x93, 568 0x6B, 0xA8, 0x14, 0x91, 0x5C, 0x67, 0x62, 0xD2 569 }; 570 #endif /* CONFIG_BORINGSSL */ 571 /* RFC 3394 - Test vector 4.5 */ 572 u8 kek45[] = { 573 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 574 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 575 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 576 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 577 }; 578 u8 plain45[] = { 579 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 580 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 581 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 582 }; 583 u8 crypt45[] = { 584 0xA8, 0xF9, 0xBC, 0x16, 0x12, 0xC6, 0x8B, 0x3F, 585 0xF6, 0xE6, 0xF4, 0xFB, 0xE3, 0x0E, 0x71, 0xE4, 586 0x76, 0x9C, 0x8B, 0x80, 0xA3, 0x2C, 0xB8, 0x95, 587 0x8C, 0xD5, 0xD1, 0x7D, 0x6B, 0x25, 0x4D, 0xA1, 588 }; 589 /* RFC 3394 - Test vector 4.6 */ 590 u8 kek46[] = { 591 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 592 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, 593 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 594 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F 595 }; 596 u8 plain46[] = { 597 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 598 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF, 599 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 600 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F 601 }; 602 u8 crypt46[] = { 603 0x28, 0xC9, 0xF4, 0x04, 0xC4, 0xB8, 0x10, 0xF4, 604 0xCB, 0xCC, 0xB3, 0x5C, 0xFB, 0x87, 0xF8, 0x26, 605 0x3F, 0x57, 0x86, 0xE2, 0xD8, 0x0E, 0xD3, 0x26, 606 0xCB, 0xC7, 0xF0, 0xE7, 0x1A, 0x99, 0xF4, 0x3B, 607 0xFB, 0x98, 0x8B, 0x9B, 0x7A, 0x02, 0xDD, 0x21 608 }; 609 u8 result[40]; 610 611 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1"); 612 if (aes_wrap(kek41, sizeof(kek41), sizeof(plain41) / 8, plain41, 613 result)) { 614 wpa_printf(MSG_ERROR, "AES-WRAP-128 reported failure"); 615 ret++; 616 } 617 if (os_memcmp(result, crypt41, sizeof(crypt41)) != 0) { 618 wpa_printf(MSG_ERROR, "AES-WRAP-128 failed"); 619 ret++; 620 } 621 if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41, 622 result)) { 623 wpa_printf(MSG_ERROR, "AES-UNWRAP-128 reported failure"); 624 ret++; 625 } 626 if (os_memcmp(result, plain41, sizeof(plain41)) != 0) { 627 wpa_printf(MSG_ERROR, "AES-UNWRAP-128 failed"); 628 ret++; 629 } 630 631 #ifndef CONFIG_BORINGSSL 632 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2"); 633 if (aes_wrap(kek42, sizeof(kek42), sizeof(plain42) / 8, plain42, 634 result)) { 635 wpa_printf(MSG_ERROR, "AES-WRAP-192 reported failure"); 636 ret++; 637 } 638 if (os_memcmp(result, crypt42, sizeof(crypt42)) != 0) { 639 wpa_printf(MSG_ERROR, "AES-WRAP-192 failed"); 640 ret++; 641 } 642 if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42, 643 result)) { 644 wpa_printf(MSG_ERROR, "AES-UNWRAP-192 reported failure"); 645 ret++; 646 } 647 if (os_memcmp(result, plain42, sizeof(plain42)) != 0) { 648 wpa_printf(MSG_ERROR, "AES-UNWRAP-192 failed"); 649 ret++; 650 } 651 #endif /* CONFIG_BORINGSSL */ 652 653 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3"); 654 if (aes_wrap(kek43, sizeof(kek43), sizeof(plain43) / 8, plain43, 655 result)) { 656 wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure"); 657 ret++; 658 } 659 if (os_memcmp(result, crypt43, sizeof(crypt43)) != 0) { 660 wpa_printf(MSG_ERROR, "AES-WRAP-256 failed"); 661 ret++; 662 } 663 if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43, 664 result)) { 665 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure"); 666 ret++; 667 } 668 if (os_memcmp(result, plain43, sizeof(plain43)) != 0) { 669 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed"); 670 ret++; 671 } 672 673 #ifndef CONFIG_BORINGSSL 674 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4"); 675 if (aes_wrap(kek44, sizeof(kek44), sizeof(plain44) / 8, plain44, 676 result)) { 677 wpa_printf(MSG_ERROR, "AES-WRAP-192 reported failure"); 678 ret++; 679 } 680 if (os_memcmp(result, crypt44, sizeof(crypt44)) != 0) { 681 wpa_printf(MSG_ERROR, "AES-WRAP-192 failed"); 682 ret++; 683 } 684 if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44, 685 result)) { 686 wpa_printf(MSG_ERROR, "AES-UNWRAP-192 reported failure"); 687 ret++; 688 } 689 if (os_memcmp(result, plain44, sizeof(plain44)) != 0) { 690 wpa_printf(MSG_ERROR, "AES-UNWRAP-192 failed"); 691 ret++; 692 } 693 #endif /* CONFIG_BORINGSSL */ 694 695 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5"); 696 if (aes_wrap(kek45, sizeof(kek45), sizeof(plain45) / 8, plain45, 697 result)) { 698 wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure"); 699 ret++; 700 } 701 if (os_memcmp(result, crypt45, sizeof(crypt45)) != 0) { 702 wpa_printf(MSG_ERROR, "AES-WRAP-256 failed"); 703 ret++; 704 } 705 if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45, 706 result)) { 707 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure"); 708 ret++; 709 } 710 if (os_memcmp(result, plain45, sizeof(plain45)) != 0) { 711 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed"); 712 ret++; 713 } 714 715 wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6"); 716 if (aes_wrap(kek46, sizeof(kek46), sizeof(plain46) / 8, plain46, 717 result)) { 718 wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure"); 719 ret++; 720 } 721 if (os_memcmp(result, crypt46, sizeof(crypt46)) != 0) { 722 wpa_printf(MSG_ERROR, "AES-WRAP-256 failed"); 723 ret++; 724 } 725 if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46, 726 result)) { 727 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure"); 728 ret++; 729 } 730 if (os_memcmp(result, plain46, sizeof(plain46)) != 0) { 731 wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed"); 732 ret++; 733 } 734 735 if (!ret) 736 wpa_printf(MSG_INFO, "AES key wrap/unwrap test cases passed"); 737 738 return ret; 739 } 740 741 742 static int test_md5(void) 743 { 744 #ifndef CONFIG_FIPS 745 struct { 746 char *data; 747 char *hash; 748 } tests[] = { 749 { 750 "", 751 "\xd4\x1d\x8c\xd9\x8f\x00\xb2\x04" 752 "\xe9\x80\x09\x98\xec\xf8\x42\x7e" 753 }, 754 { 755 "a", 756 "\x0c\xc1\x75\xb9\xc0\xf1\xb6\xa8" 757 "\x31\xc3\x99\xe2\x69\x77\x26\x61" 758 }, 759 { 760 "abc", 761 "\x90\x01\x50\x98\x3c\xd2\x4f\xb0" 762 "\xd6\x96\x3f\x7d\x28\xe1\x7f\x72" 763 }, 764 { 765 "message digest", 766 "\xf9\x6b\x69\x7d\x7c\xb7\x93\x8d" 767 "\x52\x5a\x2f\x31\xaa\xf1\x61\xd0" 768 }, 769 { 770 "abcdefghijklmnopqrstuvwxyz", 771 "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00" 772 "\x7d\xfb\x49\x6c\xca\x67\xe1\x3b" 773 }, 774 { 775 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" 776 "0123456789", 777 "\xd1\x74\xab\x98\xd2\x77\xd9\xf5" 778 "\xa5\x61\x1c\x2c\x9f\x41\x9d\x9f" 779 }, 780 { 781 "12345678901234567890123456789012345678901234567890" 782 "123456789012345678901234567890", 783 "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55" 784 "\xac\x49\xda\x2e\x21\x07\xb6\x7a" 785 } 786 }; 787 unsigned int i; 788 u8 hash[16]; 789 const u8 *addr[2]; 790 size_t len[2]; 791 int errors = 0; 792 793 for (i = 0; i < ARRAY_SIZE(tests); i++) { 794 wpa_printf(MSG_INFO, "MD5 test case %d", i); 795 796 addr[0] = (u8 *) tests[i].data; 797 len[0] = strlen(tests[i].data); 798 if (md5_vector(1, addr, len, hash) < 0 || 799 os_memcmp(hash, tests[i].hash, 16) != 0) { 800 wpa_printf(MSG_INFO, " FAIL"); 801 errors++; 802 } else 803 wpa_printf(MSG_INFO, " OK"); 804 805 if (len[0]) { 806 addr[0] = (u8 *) tests[i].data; 807 len[0] = strlen(tests[i].data); 808 addr[1] = (u8 *) tests[i].data + 1; 809 len[1] = strlen(tests[i].data) - 1; 810 if (md5_vector(1, addr, len, hash) < 0 || 811 os_memcmp(hash, tests[i].hash, 16) != 0) { 812 wpa_printf(MSG_INFO, " FAIL"); 813 errors++; 814 } else 815 wpa_printf(MSG_INFO, " OK"); 816 } 817 } 818 819 if (!errors) 820 wpa_printf(MSG_INFO, "MD5 test cases passed"); 821 822 return errors; 823 #else /* CONFIG_FIPS */ 824 wpa_printf(MSG_INFO, "MD5 test cases skipped due to CONFIG_FIPS"); 825 return 0; 826 #endif /* CONFIG_FIPS */ 827 } 828 829 830 static int test_eap_fast(void) 831 { 832 #ifdef EAP_FAST 833 /* RFC 4851, Appendix B.1 */ 834 const u8 pac_key[] = { 835 0x0B, 0x97, 0x39, 0x0F, 0x37, 0x51, 0x78, 0x09, 836 0x81, 0x1E, 0xFD, 0x9C, 0x6E, 0x65, 0x94, 0x2B, 837 0x63, 0x2C, 0xE9, 0x53, 0x89, 0x38, 0x08, 0xBA, 838 0x36, 0x0B, 0x03, 0x7C, 0xD1, 0x85, 0xE4, 0x14 839 }; 840 const u8 seed[] = { 841 0x3F, 0xFB, 0x11, 0xC4, 0x6C, 0xBF, 0xA5, 0x7A, 842 0x54, 0x40, 0xDA, 0xE8, 0x22, 0xD3, 0x11, 0xD3, 843 0xF7, 0x6D, 0xE4, 0x1D, 0xD9, 0x33, 0xE5, 0x93, 844 0x70, 0x97, 0xEB, 0xA9, 0xB3, 0x66, 0xF4, 0x2A, 845 0x00, 0x00, 0x00, 0x02, 0x6A, 0x66, 0x43, 0x2A, 846 0x8D, 0x14, 0x43, 0x2C, 0xEC, 0x58, 0x2D, 0x2F, 847 0xC7, 0x9C, 0x33, 0x64, 0xBA, 0x04, 0xAD, 0x3A, 848 0x52, 0x54, 0xD6, 0xA5, 0x79, 0xAD, 0x1E, 0x00 849 }; 850 const u8 master_secret[] = { 851 0x4A, 0x1A, 0x51, 0x2C, 0x01, 0x60, 0xBC, 0x02, 852 0x3C, 0xCF, 0xBC, 0x83, 0x3F, 0x03, 0xBC, 0x64, 853 0x88, 0xC1, 0x31, 0x2F, 0x0B, 0xA9, 0xA2, 0x77, 854 0x16, 0xA8, 0xD8, 0xE8, 0xBD, 0xC9, 0xD2, 0x29, 855 0x38, 0x4B, 0x7A, 0x85, 0xBE, 0x16, 0x4D, 0x27, 856 0x33, 0xD5, 0x24, 0x79, 0x87, 0xB1, 0xC5, 0xA2 857 }; 858 #ifndef CONFIG_FIPS 859 const u8 key_block[] = { 860 0x59, 0x59, 0xBE, 0x8E, 0x41, 0x3A, 0x77, 0x74, 861 0x8B, 0xB2, 0xE5, 0xD3, 0x60, 0xAC, 0x4D, 0x35, 862 0xDF, 0xFB, 0xC8, 0x1E, 0x9C, 0x24, 0x9C, 0x8B, 863 0x0E, 0xC3, 0x1D, 0x72, 0xC8, 0x84, 0x9D, 0x57, 864 0x48, 0x51, 0x2E, 0x45, 0x97, 0x6C, 0x88, 0x70, 865 0xBE, 0x5F, 0x01, 0xD3, 0x64, 0xE7, 0x4C, 0xBB, 866 0x11, 0x24, 0xE3, 0x49, 0xE2, 0x3B, 0xCD, 0xEF, 867 0x7A, 0xB3, 0x05, 0x39, 0x5D, 0x64, 0x8A, 0x44, 868 0x11, 0xB6, 0x69, 0x88, 0x34, 0x2E, 0x8E, 0x29, 869 0xD6, 0x4B, 0x7D, 0x72, 0x17, 0x59, 0x28, 0x05, 870 0xAF, 0xF9, 0xB7, 0xFF, 0x66, 0x6D, 0xA1, 0x96, 871 0x8F, 0x0B, 0x5E, 0x06, 0x46, 0x7A, 0x44, 0x84, 872 0x64, 0xC1, 0xC8, 0x0C, 0x96, 0x44, 0x09, 0x98, 873 0xFF, 0x92, 0xA8, 0xB4, 0xC6, 0x42, 0x28, 0x71 874 }; 875 #endif /* CONFIG_FIPS */ 876 const u8 sks[] = { 877 0xD6, 0x4B, 0x7D, 0x72, 0x17, 0x59, 0x28, 0x05, 878 0xAF, 0xF9, 0xB7, 0xFF, 0x66, 0x6D, 0xA1, 0x96, 879 0x8F, 0x0B, 0x5E, 0x06, 0x46, 0x7A, 0x44, 0x84, 880 0x64, 0xC1, 0xC8, 0x0C, 0x96, 0x44, 0x09, 0x98, 881 0xFF, 0x92, 0xA8, 0xB4, 0xC6, 0x42, 0x28, 0x71 882 }; 883 const u8 isk[] = { 884 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 885 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 886 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 887 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 888 }; 889 const u8 imck[] = { 890 0x16, 0x15, 0x3C, 0x3F, 0x21, 0x55, 0xEF, 0xD9, 891 0x7F, 0x34, 0xAE, 0xC8, 0x1A, 0x4E, 0x66, 0x80, 892 0x4C, 0xC3, 0x76, 0xF2, 0x8A, 0xA9, 0x6F, 0x96, 893 0xC2, 0x54, 0x5F, 0x8C, 0xAB, 0x65, 0x02, 0xE1, 894 0x18, 0x40, 0x7B, 0x56, 0xBE, 0xEA, 0xA7, 0xC5, 895 0x76, 0x5D, 0x8F, 0x0B, 0xC5, 0x07, 0xC6, 0xB9, 896 0x04, 0xD0, 0x69, 0x56, 0x72, 0x8B, 0x6B, 0xB8, 897 0x15, 0xEC, 0x57, 0x7B 898 }; 899 const u8 msk[] = { 900 0x4D, 0x83, 0xA9, 0xBE, 0x6F, 0x8A, 0x74, 0xED, 901 0x6A, 0x02, 0x66, 0x0A, 0x63, 0x4D, 0x2C, 0x33, 902 0xC2, 0xDA, 0x60, 0x15, 0xC6, 0x37, 0x04, 0x51, 903 0x90, 0x38, 0x63, 0xDA, 0x54, 0x3E, 0x14, 0xB9, 904 0x27, 0x99, 0x18, 0x1E, 0x07, 0xBF, 0x0F, 0x5A, 905 0x5E, 0x3C, 0x32, 0x93, 0x80, 0x8C, 0x6C, 0x49, 906 0x67, 0xED, 0x24, 0xFE, 0x45, 0x40, 0xA0, 0x59, 907 0x5E, 0x37, 0xC2, 0xE9, 0xD0, 0x5D, 0x0A, 0xE3 908 }; 909 const u8 emsk[] = { 910 0x3A, 0xD4, 0xAB, 0xDB, 0x76, 0xB2, 0x7F, 0x3B, 911 0xEA, 0x32, 0x2C, 0x2B, 0x74, 0xF4, 0x28, 0x55, 912 0xEF, 0x2D, 0xBA, 0x78, 0xC9, 0x57, 0x2F, 0x0D, 913 0x06, 0xCD, 0x51, 0x7C, 0x20, 0x93, 0x98, 0xA9, 914 0x76, 0xEA, 0x70, 0x21, 0xD7, 0x0E, 0x25, 0x54, 915 0x97, 0xED, 0xB2, 0x8A, 0xF6, 0xED, 0xFD, 0x0A, 916 0x2A, 0xE7, 0xA1, 0x58, 0x90, 0x10, 0x50, 0x44, 917 0xB3, 0x82, 0x85, 0xDB, 0x06, 0x14, 0xD2, 0xF9 918 }; 919 /* RFC 4851, Appendix B.2 */ 920 u8 tlv[] = { 921 0x80, 0x0C, 0x00, 0x38, 0x00, 0x01, 0x01, 0x00, 922 0xD8, 0x6A, 0x8C, 0x68, 0x3C, 0x32, 0x31, 0xA8, 923 0x56, 0x63, 0xB6, 0x40, 0x21, 0xFE, 0x21, 0x14, 924 0x4E, 0xE7, 0x54, 0x20, 0x79, 0x2D, 0x42, 0x62, 925 0xC9, 0xBF, 0x53, 0x7F, 0x54, 0xFD, 0xAC, 0x58, 926 0x43, 0x24, 0x6E, 0x30, 0x92, 0x17, 0x6D, 0xCF, 927 0xE6, 0xE0, 0x69, 0xEB, 0x33, 0x61, 0x6A, 0xCC, 928 0x05, 0xC5, 0x5B, 0xB7 929 }; 930 const u8 compound_mac[] = { 931 0x43, 0x24, 0x6E, 0x30, 0x92, 0x17, 0x6D, 0xCF, 932 0xE6, 0xE0, 0x69, 0xEB, 0x33, 0x61, 0x6A, 0xCC, 933 0x05, 0xC5, 0x5B, 0xB7 934 }; 935 u8 buf[512]; 936 const u8 *simck, *cmk; 937 int errors = 0; 938 939 wpa_printf(MSG_INFO, "EAP-FAST test cases"); 940 941 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret"); 942 if (sha1_t_prf(pac_key, sizeof(pac_key), 943 "PAC to master secret label hash", 944 seed, sizeof(seed), buf, sizeof(master_secret)) < 0 || 945 os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) { 946 wpa_printf(MSG_INFO, "T-PRF test - FAILED!"); 947 errors++; 948 } 949 950 #ifndef CONFIG_FIPS 951 wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block"); 952 if (tls_prf_sha1_md5(master_secret, sizeof(master_secret), 953 "key expansion", seed, sizeof(seed), 954 buf, sizeof(key_block)) || 955 os_memcmp(key_block, buf, sizeof(key_block)) != 0) { 956 wpa_printf(MSG_INFO, "PRF test - FAILED!"); 957 errors++; 958 } 959 #endif /* CONFIG_FIPS */ 960 961 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / IMCK"); 962 if (sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys", 963 isk, sizeof(isk), buf, sizeof(imck)) < 0 || 964 os_memcmp(imck, buf, sizeof(imck)) != 0) { 965 wpa_printf(MSG_INFO, "T-PRF test - FAILED!"); 966 errors++; 967 } 968 969 simck = imck; 970 cmk = imck + 40; 971 972 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / MSK"); 973 if (sha1_t_prf(simck, 40, "Session Key Generating Function", 974 (u8 *) "", 0, buf, sizeof(msk)) < 0 || 975 os_memcmp(msk, buf, sizeof(msk)) != 0) { 976 wpa_printf(MSG_INFO, "T-PRF test - FAILED!"); 977 errors++; 978 } 979 980 wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK"); 981 if (sha1_t_prf(simck, 40, "Extended Session Key Generating Function", 982 (u8 *) "", 0, buf, sizeof(msk)) < 0 || 983 os_memcmp(emsk, buf, sizeof(emsk)) != 0) { 984 wpa_printf(MSG_INFO, "T-PRF test - FAILED!"); 985 errors++; 986 } 987 988 wpa_printf(MSG_INFO, "- Compound MAC test case"); 989 os_memset(tlv + sizeof(tlv) - 20, 0, 20); 990 if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 || 991 os_memcmp(tlv + sizeof(tlv) - 20, compound_mac, 992 sizeof(compound_mac)) != 0) { 993 wpa_printf(MSG_INFO, "Compound MAC test - FAILED!"); 994 errors++; 995 } 996 997 return errors; 998 #else /* EAP_FAST */ 999 return 0; 1000 #endif /* EAP_FAST */ 1001 } 1002 1003 1004 static const u8 key0[] = 1005 { 1006 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 1007 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 1008 0x0b, 0x0b, 0x0b, 0x0b 1009 }; 1010 static const u8 data0[] = "Hi There"; 1011 static const u8 prf0[] = 1012 { 1013 0xbc, 0xd4, 0xc6, 0x50, 0xb3, 0x0b, 0x96, 0x84, 1014 0x95, 0x18, 0x29, 0xe0, 0xd7, 0x5f, 0x9d, 0x54, 1015 0xb8, 0x62, 0x17, 0x5e, 0xd9, 0xf0, 0x06, 0x06, 1016 0xe1, 0x7d, 0x8d, 0xa3, 0x54, 0x02, 0xff, 0xee, 1017 0x75, 0xdf, 0x78, 0xc3, 0xd3, 0x1e, 0x0f, 0x88, 1018 0x9f, 0x01, 0x21, 0x20, 0xc0, 0x86, 0x2b, 0xeb, 1019 0x67, 0x75, 0x3e, 0x74, 0x39, 0xae, 0x24, 0x2e, 1020 0xdb, 0x83, 0x73, 0x69, 0x83, 0x56, 0xcf, 0x5a 1021 }; 1022 1023 static const u8 key1[] = "Jefe"; 1024 static const u8 data1[] = "what do ya want for nothing?"; 1025 static const u8 prf1[] = 1026 { 1027 0x51, 0xf4, 0xde, 0x5b, 0x33, 0xf2, 0x49, 0xad, 1028 0xf8, 0x1a, 0xeb, 0x71, 0x3a, 0x3c, 0x20, 0xf4, 1029 0xfe, 0x63, 0x14, 0x46, 0xfa, 0xbd, 0xfa, 0x58, 1030 0x24, 0x47, 0x59, 0xae, 0x58, 0xef, 0x90, 0x09, 1031 0xa9, 0x9a, 0xbf, 0x4e, 0xac, 0x2c, 0xa5, 0xfa, 1032 0x87, 0xe6, 0x92, 0xc4, 0x40, 0xeb, 0x40, 0x02, 1033 0x3e, 0x7b, 0xab, 0xb2, 0x06, 0xd6, 0x1d, 0xe7, 1034 0xb9, 0x2f, 0x41, 0x52, 0x90, 0x92, 0xb8, 0xfc 1035 }; 1036 1037 1038 static const u8 key2[] = 1039 { 1040 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1041 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1042 0xaa, 0xaa, 0xaa, 0xaa 1043 }; 1044 static const u8 data2[] = 1045 { 1046 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1047 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1048 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1049 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1050 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1051 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1052 0xdd, 0xdd 1053 }; 1054 static const u8 prf2[] = 1055 { 1056 0xe1, 0xac, 0x54, 0x6e, 0xc4, 0xcb, 0x63, 0x6f, 1057 0x99, 0x76, 0x48, 0x7b, 0xe5, 0xc8, 0x6b, 0xe1, 1058 0x7a, 0x02, 0x52, 0xca, 0x5d, 0x8d, 0x8d, 0xf1, 1059 0x2c, 0xfb, 0x04, 0x73, 0x52, 0x52, 0x49, 0xce, 1060 0x9d, 0xd8, 0xd1, 0x77, 0xea, 0xd7, 0x10, 0xbc, 1061 0x9b, 0x59, 0x05, 0x47, 0x23, 0x91, 0x07, 0xae, 1062 0xf7, 0xb4, 0xab, 0xd4, 0x3d, 0x87, 0xf0, 0xa6, 1063 0x8f, 0x1c, 0xbd, 0x9e, 0x2b, 0x6f, 0x76, 0x07 1064 }; 1065 1066 1067 struct passphrase_test { 1068 char *passphrase; 1069 char *ssid; 1070 char psk[32]; 1071 }; 1072 1073 static const struct passphrase_test passphrase_tests[] = 1074 { 1075 { 1076 "password", 1077 "IEEE", 1078 { 1079 0xf4, 0x2c, 0x6f, 0xc5, 0x2d, 0xf0, 0xeb, 0xef, 1080 0x9e, 0xbb, 0x4b, 0x90, 0xb3, 0x8a, 0x5f, 0x90, 1081 0x2e, 0x83, 0xfe, 0x1b, 0x13, 0x5a, 0x70, 0xe2, 1082 0x3a, 0xed, 0x76, 0x2e, 0x97, 0x10, 0xa1, 0x2e 1083 } 1084 }, 1085 { 1086 "ThisIsAPassword", 1087 "ThisIsASSID", 1088 { 1089 0x0d, 0xc0, 0xd6, 0xeb, 0x90, 0x55, 0x5e, 0xd6, 1090 0x41, 0x97, 0x56, 0xb9, 0xa1, 0x5e, 0xc3, 0xe3, 1091 0x20, 0x9b, 0x63, 0xdf, 0x70, 0x7d, 0xd5, 0x08, 1092 0xd1, 0x45, 0x81, 0xf8, 0x98, 0x27, 0x21, 0xaf 1093 } 1094 }, 1095 { 1096 "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa", 1097 "ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ", 1098 { 1099 0xbe, 0xcb, 0x93, 0x86, 0x6b, 0xb8, 0xc3, 0x83, 1100 0x2c, 0xb7, 0x77, 0xc2, 0xf5, 0x59, 0x80, 0x7c, 1101 0x8c, 0x59, 0xaf, 0xcb, 0x6e, 0xae, 0x73, 0x48, 1102 0x85, 0x00, 0x13, 0x00, 0xa9, 0x81, 0xcc, 0x62 1103 } 1104 }, 1105 }; 1106 1107 #define NUM_PASSPHRASE_TESTS ARRAY_SIZE(passphrase_tests) 1108 1109 1110 struct rfc6070_test { 1111 char *p; 1112 char *s; 1113 int c; 1114 char dk[32]; 1115 size_t dk_len; 1116 }; 1117 1118 static const struct rfc6070_test rfc6070_tests[] = 1119 { 1120 { 1121 "password", 1122 "salt", 1123 1, 1124 { 1125 0x0c, 0x60, 0xc8, 0x0f, 0x96, 0x1f, 0x0e, 0x71, 1126 0xf3, 0xa9, 0xb5, 0x24, 0xaf, 0x60, 0x12, 0x06, 1127 0x2f, 0xe0, 0x37, 0xa6 1128 }, 1129 20 1130 }, 1131 { 1132 "password", 1133 "salt", 1134 2, 1135 { 1136 0xea, 0x6c, 0x01, 0x4d, 0xc7, 0x2d, 0x6f, 0x8c, 1137 0xcd, 0x1e, 0xd9, 0x2a, 0xce, 0x1d, 0x41, 0xf0, 1138 0xd8, 0xde, 0x89, 0x57 1139 }, 1140 20 1141 }, 1142 { 1143 "password", 1144 "salt", 1145 4096, 1146 { 1147 0x4b, 0x00, 0x79, 0x01, 0xb7, 0x65, 0x48, 0x9a, 1148 0xbe, 0xad, 0x49, 0xd9, 0x26, 0xf7, 0x21, 0xd0, 1149 0x65, 0xa4, 0x29, 0xc1 1150 }, 1151 20 1152 }, 1153 #if 0 /* This takes quite long to derive.. */ 1154 { 1155 "password", 1156 "salt", 1157 16777216, 1158 { 1159 0xee, 0xfe, 0x3d, 0x61, 0xcd, 0x4d, 0xa4, 0xe4, 1160 0xe9, 0x94, 0x5b, 0x3d, 0x6b, 0xa2, 0x15, 0x8c, 1161 0x26, 0x34, 0xe9, 0x84 1162 }, 1163 20 1164 }, 1165 #endif 1166 { 1167 "passwordPASSWORDpassword", 1168 "saltSALTsaltSALTsaltSALTsaltSALTsalt", 1169 4096, 1170 { 1171 0x3d, 0x2e, 0xec, 0x4f, 0xe4, 0x1c, 0x84, 0x9b, 1172 0x80, 0xc8, 0xd8, 0x36, 0x62, 0xc0, 0xe4, 0x4a, 1173 0x8b, 0x29, 0x1a, 0x96, 0x4c, 0xf2, 0xf0, 0x70, 1174 0x38 1175 }, 1176 25 1177 }, 1178 #if 0 /* \0 not currently supported in passphrase parameters.. */ 1179 { 1180 "pass\0word", 1181 "sa\0lt", 1182 4096, 1183 { 1184 0x56, 0xfa, 0x6a, 0xa7, 0x55, 0x48, 0x09, 0x9d, 1185 0xcc, 0x37, 0xd7, 0xf0, 0x34, 0x25, 0xe0, 0xc3 1186 }, 1187 16 1188 }, 1189 #endif 1190 }; 1191 1192 #define NUM_RFC6070_TESTS ARRAY_SIZE(rfc6070_tests) 1193 1194 1195 static int test_sha1(void) 1196 { 1197 u8 res[512]; 1198 int ret = 0; 1199 unsigned int i; 1200 1201 wpa_printf(MSG_INFO, "PRF-SHA1 test cases:"); 1202 1203 if (sha1_prf(key0, sizeof(key0), "prefix", data0, sizeof(data0) - 1, 1204 res, sizeof(prf0)) == 0 && 1205 os_memcmp(res, prf0, sizeof(prf0)) == 0) 1206 wpa_printf(MSG_INFO, "Test case 0 - OK"); 1207 else { 1208 wpa_printf(MSG_INFO, "Test case 0 - FAILED!"); 1209 ret++; 1210 } 1211 1212 if (sha1_prf(key1, sizeof(key1) - 1, "prefix", data1, sizeof(data1) - 1, 1213 res, sizeof(prf1)) == 0 && 1214 os_memcmp(res, prf1, sizeof(prf1)) == 0) 1215 wpa_printf(MSG_INFO, "Test case 1 - OK"); 1216 else { 1217 wpa_printf(MSG_INFO, "Test case 1 - FAILED!"); 1218 ret++; 1219 } 1220 1221 if (sha1_prf(key2, sizeof(key2), "prefix", data2, sizeof(data2), 1222 res, sizeof(prf2)) == 0 && 1223 os_memcmp(res, prf2, sizeof(prf2)) == 0) 1224 wpa_printf(MSG_INFO, "Test case 2 - OK"); 1225 else { 1226 wpa_printf(MSG_INFO, "Test case 2 - FAILED!"); 1227 ret++; 1228 } 1229 1230 ret += test_eap_fast(); 1231 1232 wpa_printf(MSG_INFO, "PBKDF2-SHA1 Passphrase test cases:"); 1233 for (i = 0; i < NUM_PASSPHRASE_TESTS; i++) { 1234 u8 psk[32]; 1235 const struct passphrase_test *test = &passphrase_tests[i]; 1236 1237 if (pbkdf2_sha1(test->passphrase, 1238 (const u8 *) test->ssid, strlen(test->ssid), 1239 4096, psk, 32) == 0 && 1240 os_memcmp(psk, test->psk, 32) == 0) 1241 wpa_printf(MSG_INFO, "Test case %d - OK", i); 1242 else { 1243 wpa_printf(MSG_INFO, "Test case %d - FAILED!", i); 1244 ret++; 1245 } 1246 } 1247 1248 wpa_printf(MSG_INFO, "PBKDF2-SHA1 test cases (RFC 6070):"); 1249 for (i = 0; i < NUM_RFC6070_TESTS; i++) { 1250 u8 dk[25]; 1251 const struct rfc6070_test *test = &rfc6070_tests[i]; 1252 1253 if (pbkdf2_sha1(test->p, (const u8 *) test->s, strlen(test->s), 1254 test->c, dk, test->dk_len) == 0 && 1255 os_memcmp(dk, test->dk, test->dk_len) == 0) 1256 wpa_printf(MSG_INFO, "Test case %d - OK", i); 1257 else { 1258 wpa_printf(MSG_INFO, "Test case %d - FAILED!", i); 1259 ret++; 1260 } 1261 } 1262 1263 if (!ret) 1264 wpa_printf(MSG_INFO, "SHA1 test cases passed"); 1265 return ret; 1266 } 1267 1268 1269 const struct { 1270 char *data; 1271 u8 hash[32]; 1272 } tests[] = { 1273 { 1274 "abc", 1275 { 1276 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, 1277 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, 1278 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, 1279 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad 1280 } 1281 }, 1282 { 1283 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 1284 { 1285 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, 1286 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, 1287 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, 1288 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 1289 } 1290 } 1291 }; 1292 1293 const struct hmac_test { 1294 u8 key[80]; 1295 size_t key_len; 1296 u8 data[128]; 1297 size_t data_len; 1298 u8 hash[32]; 1299 } hmac_tests[] = { 1300 /* draft-ietf-ipsec-ciph-sha-256-01.txt */ 1301 { 1302 { 1303 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 1304 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 1305 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 1306 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 1307 }, 1308 32, 1309 "abc", 3, 1310 { 1311 0xa2, 0x1b, 0x1f, 0x5d, 0x4c, 0xf4, 0xf7, 0x3a, 1312 0x4d, 0xd9, 0x39, 0x75, 0x0f, 0x7a, 0x06, 0x6a, 1313 0x7f, 0x98, 0xcc, 0x13, 0x1c, 0xb1, 0x6a, 0x66, 1314 0x92, 0x75, 0x90, 0x21, 0xcf, 0xab, 0x81, 0x81 1315 } 1316 }, 1317 { 1318 { 1319 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 1320 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 1321 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 1322 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 1323 }, 1324 32, 1325 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 1326 56, 1327 { 1328 0x10, 0x4f, 0xdc, 0x12, 0x57, 0x32, 0x8f, 0x08, 1329 0x18, 0x4b, 0xa7, 0x31, 0x31, 0xc5, 0x3c, 0xae, 1330 0xe6, 0x98, 0xe3, 0x61, 0x19, 0x42, 0x11, 0x49, 1331 0xea, 0x8c, 0x71, 0x24, 0x56, 0x69, 0x7d, 0x30 1332 } 1333 }, 1334 { 1335 { 1336 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 1337 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 1338 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 1339 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 1340 }, 1341 32, 1342 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" 1343 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 1344 112, 1345 { 1346 0x47, 0x03, 0x05, 0xfc, 0x7e, 0x40, 0xfe, 0x34, 1347 0xd3, 0xee, 0xb3, 0xe7, 0x73, 0xd9, 0x5a, 0xab, 1348 0x73, 0xac, 0xf0, 0xfd, 0x06, 0x04, 0x47, 0xa5, 1349 0xeb, 0x45, 0x95, 0xbf, 0x33, 0xa9, 0xd1, 0xa3 1350 } 1351 }, 1352 { 1353 { 1354 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 1355 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 1356 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 1357 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b 1358 }, 1359 32, 1360 "Hi There", 1361 8, 1362 { 1363 0x19, 0x8a, 0x60, 0x7e, 0xb4, 0x4b, 0xfb, 0xc6, 1364 0x99, 0x03, 0xa0, 0xf1, 0xcf, 0x2b, 0xbd, 0xc5, 1365 0xba, 0x0a, 0xa3, 0xf3, 0xd9, 0xae, 0x3c, 0x1c, 1366 0x7a, 0x3b, 0x16, 0x96, 0xa0, 0xb6, 0x8c, 0xf7 1367 } 1368 }, 1369 { 1370 "Jefe", 1371 4, 1372 "what do ya want for nothing?", 1373 28, 1374 { 1375 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e, 1376 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7, 1377 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83, 1378 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43 1379 } 1380 }, 1381 { 1382 { 1383 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1384 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1385 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1386 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa 1387 }, 1388 32, 1389 { 1390 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1391 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1392 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1393 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1394 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1395 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 1396 0xdd, 0xdd 1397 }, 1398 50, 1399 { 1400 0xcd, 0xcb, 0x12, 0x20, 0xd1, 0xec, 0xcc, 0xea, 1401 0x91, 0xe5, 0x3a, 0xba, 0x30, 0x92, 0xf9, 0x62, 1402 0xe5, 0x49, 0xfe, 0x6c, 0xe9, 0xed, 0x7f, 0xdc, 1403 0x43, 0x19, 0x1f, 0xbd, 0xe4, 0x5c, 0x30, 0xb0 1404 } 1405 }, 1406 { 1407 { 1408 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 1409 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 1410 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 1411 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 1412 0x21, 0x22, 0x23, 0x24, 0x25 1413 }, 1414 37, 1415 { 1416 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1417 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1418 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1419 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1420 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1421 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 1422 0xcd, 0xcd 1423 }, 1424 50, 1425 { 1426 0xd4, 0x63, 0x3c, 0x17, 0xf6, 0xfb, 0x8d, 0x74, 1427 0x4c, 0x66, 0xde, 0xe0, 0xf8, 0xf0, 0x74, 0x55, 1428 0x6e, 0xc4, 0xaf, 0x55, 0xef, 0x07, 0x99, 0x85, 1429 0x41, 0x46, 0x8e, 0xb4, 0x9b, 0xd2, 0xe9, 0x17 1430 } 1431 }, 1432 { 1433 { 1434 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 1435 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 1436 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 1437 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c 1438 }, 1439 32, 1440 "Test With Truncation", 1441 20, 1442 { 1443 0x75, 0x46, 0xaf, 0x01, 0x84, 0x1f, 0xc0, 0x9b, 1444 0x1a, 0xb9, 0xc3, 0x74, 0x9a, 0x5f, 0x1c, 0x17, 1445 0xd4, 0xf5, 0x89, 0x66, 0x8a, 0x58, 0x7b, 0x27, 1446 0x00, 0xa9, 0xc9, 0x7c, 0x11, 0x93, 0xcf, 0x42 1447 } 1448 }, 1449 { 1450 { 1451 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1452 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1453 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1454 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1455 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1456 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1457 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1458 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1459 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1460 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa 1461 }, 1462 80, 1463 "Test Using Larger Than Block-Size Key - Hash Key First", 1464 54, 1465 { 1466 0x69, 0x53, 0x02, 0x5e, 0xd9, 0x6f, 0x0c, 0x09, 1467 0xf8, 0x0a, 0x96, 0xf7, 0x8e, 0x65, 0x38, 0xdb, 1468 0xe2, 0xe7, 0xb8, 0x20, 0xe3, 0xdd, 0x97, 0x0e, 1469 0x7d, 0xdd, 0x39, 0x09, 0x1b, 0x32, 0x35, 0x2f 1470 } 1471 }, 1472 { 1473 { 1474 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1475 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1476 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1477 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1478 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1479 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1480 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1481 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1482 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 1483 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa 1484 }, 1485 80, 1486 "Test Using Larger Than Block-Size Key and Larger Than One " 1487 "Block-Size Data", 1488 73, 1489 { 1490 0x63, 0x55, 0xac, 0x22, 0xe8, 0x90, 0xd0, 0xa3, 1491 0xc8, 0x48, 0x1a, 0x5c, 0xa4, 0x82, 0x5b, 0xc8, 1492 0x84, 0xd3, 0xe7, 0xa1, 0xff, 0x98, 0xa2, 0xfc, 1493 0x2a, 0xc7, 0xd8, 0xe0, 0x64, 0xc3, 0xb2, 0xe6 1494 } 1495 } 1496 }; 1497 1498 1499 static int test_sha256(void) 1500 { 1501 unsigned int i; 1502 u8 hash[32]; 1503 const u8 *addr[2]; 1504 size_t len[2]; 1505 int errors = 0; 1506 1507 for (i = 0; i < ARRAY_SIZE(tests); i++) { 1508 wpa_printf(MSG_INFO, "SHA256 test case %d:", i + 1); 1509 1510 addr[0] = (u8 *) tests[i].data; 1511 len[0] = strlen(tests[i].data); 1512 sha256_vector(1, addr, len, hash); 1513 if (memcmp(hash, tests[i].hash, 32) != 0) { 1514 wpa_printf(MSG_INFO, " FAIL"); 1515 errors++; 1516 } else 1517 wpa_printf(MSG_INFO, " OK"); 1518 1519 if (len[0]) { 1520 addr[0] = (u8 *) tests[i].data; 1521 len[0] = 1; 1522 addr[1] = (u8 *) tests[i].data + 1; 1523 len[1] = strlen(tests[i].data) - 1; 1524 sha256_vector(2, addr, len, hash); 1525 if (memcmp(hash, tests[i].hash, 32) != 0) { 1526 wpa_printf(MSG_INFO, " FAIL"); 1527 errors++; 1528 } else 1529 wpa_printf(MSG_INFO, " OK"); 1530 } 1531 } 1532 1533 for (i = 0; i < ARRAY_SIZE(hmac_tests); i++) { 1534 const struct hmac_test *t = &hmac_tests[i]; 1535 1536 wpa_printf(MSG_INFO, "HMAC-SHA256 test case %d:", i + 1); 1537 1538 if (hmac_sha256(t->key, t->key_len, t->data, t->data_len, 1539 hash) < 0 || 1540 os_memcmp(hash, t->hash, 32) != 0) { 1541 wpa_printf(MSG_INFO, " FAIL"); 1542 errors++; 1543 } else 1544 wpa_printf(MSG_INFO, " OK"); 1545 1546 addr[0] = t->data; 1547 len[0] = t->data_len; 1548 if (hmac_sha256_vector(t->key, t->key_len, 1, addr, len, 1549 hash) < 0 || 1550 os_memcmp(hash, t->hash, 32) != 0) { 1551 wpa_printf(MSG_INFO, " FAIL"); 1552 errors++; 1553 } else 1554 wpa_printf(MSG_INFO, " OK"); 1555 1556 if (len[0]) { 1557 addr[0] = t->data; 1558 len[0] = 1; 1559 addr[1] = t->data + 1; 1560 len[1] = t->data_len - 1; 1561 if (hmac_sha256_vector(t->key, t->key_len, 2, addr, len, 1562 hash) < 0 || 1563 os_memcmp(hash, t->hash, 32) != 0) { 1564 wpa_printf(MSG_INFO, " FAIL"); 1565 errors++; 1566 } else 1567 wpa_printf(MSG_INFO, " OK"); 1568 } 1569 } 1570 1571 wpa_printf(MSG_INFO, "Test IEEE 802.11r KDF"); 1572 sha256_prf((u8 *) "abc", 3, "KDF test", (u8 *) "data", 4, 1573 hash, sizeof(hash)); 1574 /* TODO: add proper test case for this */ 1575 1576 if (!errors) 1577 wpa_printf(MSG_INFO, "SHA256 test cases passed"); 1578 return errors; 1579 } 1580 1581 1582 static int test_ms_funcs(void) 1583 { 1584 #ifndef CONFIG_FIPS 1585 /* Test vector from RFC2759 example */ 1586 char *username = "User"; 1587 char *password = "clientPass"; 1588 u8 auth_challenge[] = { 1589 0x5B, 0x5D, 0x7C, 0x7D, 0x7B, 0x3F, 0x2F, 0x3E, 1590 0x3C, 0x2C, 0x60, 0x21, 0x32, 0x26, 0x26, 0x28 1591 }; 1592 u8 peer_challenge[] = { 1593 0x21, 0x40, 0x23, 0x24, 0x25, 0x5E, 0x26, 0x2A, 1594 0x28, 0x29, 0x5F, 0x2B, 0x3A, 0x33, 0x7C, 0x7E 1595 }; 1596 u8 password_hash[] = { 1597 0x44, 0xEB, 0xBA, 0x8D, 0x53, 0x12, 0xB8, 0xD6, 1598 0x11, 0x47, 0x44, 0x11, 0xF5, 0x69, 0x89, 0xAE 1599 }; 1600 u8 nt_response[] = { 1601 0x82, 0x30, 0x9E, 0xCD, 0x8D, 0x70, 0x8B, 0x5E, 1602 0xA0, 0x8F, 0xAA, 0x39, 0x81, 0xCD, 0x83, 0x54, 1603 0x42, 0x33, 0x11, 0x4A, 0x3D, 0x85, 0xD6, 0xDF 1604 }; 1605 u8 password_hash_hash[] = { 1606 0x41, 0xC0, 0x0C, 0x58, 0x4B, 0xD2, 0xD9, 0x1C, 1607 0x40, 0x17, 0xA2, 0xA1, 0x2F, 0xA5, 0x9F, 0x3F 1608 }; 1609 u8 authenticator_response[] = { 1610 0x40, 0x7A, 0x55, 0x89, 0x11, 0x5F, 0xD0, 0xD6, 1611 0x20, 0x9F, 0x51, 0x0F, 0xE9, 0xC0, 0x45, 0x66, 1612 0x93, 0x2C, 0xDA, 0x56 1613 }; 1614 u8 master_key[] = { 1615 0xFD, 0xEC, 0xE3, 0x71, 0x7A, 0x8C, 0x83, 0x8C, 1616 0xB3, 0x88, 0xE5, 0x27, 0xAE, 0x3C, 0xDD, 0x31 1617 }; 1618 u8 send_start_key[] = { 1619 0x8B, 0x7C, 0xDC, 0x14, 0x9B, 0x99, 0x3A, 0x1B, 1620 0xA1, 0x18, 0xCB, 0x15, 0x3F, 0x56, 0xDC, 0xCB 1621 }; 1622 u8 buf[32]; 1623 int errors = 0; 1624 1625 if (nt_password_hash((u8 *) password, os_strlen(password), buf) || 1626 os_memcmp(password_hash, buf, sizeof(password_hash)) != 0) { 1627 wpa_printf(MSG_ERROR, "nt_password_hash failed"); 1628 errors++; 1629 } 1630 1631 if (generate_nt_response(auth_challenge, peer_challenge, 1632 (u8 *) username, os_strlen(username), 1633 (u8 *) password, os_strlen(password), buf) || 1634 os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) { 1635 wpa_printf(MSG_ERROR, "generate_nt_response failed"); 1636 errors++; 1637 } 1638 1639 if (hash_nt_password_hash(password_hash, buf) || 1640 os_memcmp(password_hash_hash, buf, 1641 sizeof(password_hash_hash)) != 0) { 1642 wpa_printf(MSG_ERROR, "hash_nt_password_hash failed"); 1643 errors++; 1644 } 1645 1646 if (generate_authenticator_response((u8 *) password, 1647 os_strlen(password), 1648 peer_challenge, auth_challenge, 1649 (u8 *) username, 1650 os_strlen(username), 1651 nt_response, buf) || 1652 os_memcmp(authenticator_response, buf, 1653 sizeof(authenticator_response)) != 0) { 1654 wpa_printf(MSG_ERROR, "generate_authenticator_response failed"); 1655 errors++; 1656 } 1657 1658 if (get_master_key(password_hash_hash, nt_response, buf) || 1659 os_memcmp(master_key, buf, sizeof(master_key)) != 0) { 1660 wpa_printf(MSG_ERROR, "get_master_key failed"); 1661 errors++; 1662 } 1663 1664 if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key), 1665 1, 1) || 1666 os_memcmp(send_start_key, buf, sizeof(send_start_key)) != 0) { 1667 wpa_printf(MSG_ERROR, "get_asymetric_start_key failed"); 1668 errors++; 1669 } 1670 1671 if (errors) 1672 wpa_printf(MSG_ERROR, "ms_funcs: %d errors", errors); 1673 else 1674 wpa_printf(MSG_INFO, "ms_funcs test cases passed"); 1675 1676 return errors; 1677 #else /* CONFIG_FIPS */ 1678 wpa_printf(MSG_INFO, "ms_funcs test cases skipped due to CONFIG_FIPS"); 1679 return 0; 1680 #endif /* CONFIG_FIPS */ 1681 } 1682 1683 1684 int crypto_module_tests(void) 1685 { 1686 int ret = 0; 1687 1688 wpa_printf(MSG_INFO, "crypto module tests"); 1689 if (test_siv() || 1690 test_omac1() || 1691 test_eax() || 1692 test_cbc() || 1693 test_ecb() || 1694 test_key_wrap() || 1695 test_md5() || 1696 test_sha1() || 1697 test_sha256() || 1698 test_ms_funcs()) 1699 ret = -1; 1700 1701 return ret; 1702 } 1703