crypto_module_tests.c 46 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684
  1. /*
  2. * crypto module tests
  3. * Copyright (c) 2014-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "crypto/aes_siv.h"
  11. #include "crypto/aes_wrap.h"
  12. #include "crypto/aes.h"
  13. #include "crypto/ms_funcs.h"
  14. #include "crypto/crypto.h"
  15. #include "crypto/sha1.h"
  16. #include "crypto/sha256.h"
  17. static int test_siv(void)
  18. {
  19. #ifdef CONFIG_MESH
  20. /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */
  21. u8 key[] = {
  22. 0xff, 0xfe, 0xfd, 0xfc, 0xfb, 0xfa, 0xf9, 0xf8,
  23. 0xf7, 0xf6, 0xf5, 0xf4, 0xf3, 0xf2, 0xf1, 0xf0,
  24. 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7,
  25. 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff
  26. };
  27. u8 ad[] = {
  28. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  29. 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
  30. 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27
  31. };
  32. u8 plaintext[] = {
  33. 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
  34. 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee
  35. };
  36. u8 iv_c[] = {
  37. 0x85, 0x63, 0x2d, 0x07, 0xc6, 0xe8, 0xf3, 0x7f,
  38. 0x95, 0x0a, 0xcd, 0x32, 0x0a, 0x2e, 0xcc, 0x93,
  39. 0x40, 0xc0, 0x2b, 0x96, 0x90, 0xc4, 0xdc, 0x04,
  40. 0xda, 0xef, 0x7f, 0x6a, 0xfe, 0x5c
  41. };
  42. /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */
  43. u8 key_2[] = {
  44. 0x7f, 0x7e, 0x7d, 0x7c, 0x7b, 0x7a, 0x79, 0x78,
  45. 0x77, 0x76, 0x75, 0x74, 0x73, 0x72, 0x71, 0x70,
  46. 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
  47. 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f
  48. };
  49. u8 ad1_2[] = {
  50. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  51. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  52. 0xde, 0xad, 0xda, 0xda, 0xde, 0xad, 0xda, 0xda,
  53. 0xff, 0xee, 0xdd, 0xcc, 0xbb, 0xaa, 0x99, 0x88,
  54. 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00
  55. };
  56. u8 ad2_2[] = {
  57. 0x10, 0x20, 0x30, 0x40, 0x50, 0x60, 0x70, 0x80,
  58. 0x90, 0xa0
  59. };
  60. u8 nonce_2[] = {
  61. 0x09, 0xf9, 0x11, 0x02, 0x9d, 0x74, 0xe3, 0x5b,
  62. 0xd8, 0x41, 0x56, 0xc5, 0x63, 0x56, 0x88, 0xc0
  63. };
  64. u8 plaintext_2[] = {
  65. 0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20,
  66. 0x73, 0x6f, 0x6d, 0x65, 0x20, 0x70, 0x6c, 0x61,
  67. 0x69, 0x6e, 0x74, 0x65, 0x78, 0x74, 0x20, 0x74,
  68. 0x6f, 0x20, 0x65, 0x6e, 0x63, 0x72, 0x79, 0x70,
  69. 0x74, 0x20, 0x75, 0x73, 0x69, 0x6e, 0x67, 0x20,
  70. 0x53, 0x49, 0x56, 0x2d, 0x41, 0x45, 0x53
  71. };
  72. u8 iv_c_2[] = {
  73. 0x7b, 0xdb, 0x6e, 0x3b, 0x43, 0x26, 0x67, 0xeb,
  74. 0x06, 0xf4, 0xd1, 0x4b, 0xff, 0x2f, 0xbd, 0x0f,
  75. 0xcb, 0x90, 0x0f, 0x2f, 0xdd, 0xbe, 0x40, 0x43,
  76. 0x26, 0x60, 0x19, 0x65, 0xc8, 0x89, 0xbf, 0x17,
  77. 0xdb, 0xa7, 0x7c, 0xeb, 0x09, 0x4f, 0xa6, 0x63,
  78. 0xb7, 0xa3, 0xf7, 0x48, 0xba, 0x8a, 0xf8, 0x29,
  79. 0xea, 0x64, 0xad, 0x54, 0x4a, 0x27, 0x2e, 0x9c,
  80. 0x48, 0x5b, 0x62, 0xa3, 0xfd, 0x5c, 0x0d
  81. };
  82. u8 out[2 * AES_BLOCK_SIZE + sizeof(plaintext_2)];
  83. const u8 *addr[3];
  84. size_t len[3];
  85. /* RFC 5297, A.1. Deterministic Authenticated Encryption Example */
  86. addr[0] = ad;
  87. len[0] = sizeof(ad);
  88. if (aes_siv_encrypt(key, plaintext, sizeof(plaintext),
  89. 1, addr, len, out)) {
  90. wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed");
  91. return 1;
  92. }
  93. if (os_memcmp(out, iv_c, sizeof(iv_c)) != 0) {
  94. wpa_printf(MSG_ERROR,
  95. "AES-SIV mode encryption returned invalid cipher text");
  96. return 1;
  97. }
  98. if (aes_siv_decrypt(key, iv_c, sizeof(iv_c), 1, addr, len, out)) {
  99. wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed");
  100. return 1;
  101. }
  102. if (os_memcmp(out, plaintext, sizeof(plaintext)) != 0) {
  103. wpa_printf(MSG_ERROR,
  104. "AES-SIV mode decryption returned invalid plain text");
  105. return 1;
  106. }
  107. /* RFC 5297, A.2. Nonce-Based Authenticated Encryption Example */
  108. addr[0] = ad1_2;
  109. len[0] = sizeof(ad1_2);
  110. addr[1] = ad2_2;
  111. len[1] = sizeof(ad2_2);
  112. addr[2] = nonce_2;
  113. len[2] = sizeof(nonce_2);
  114. if (aes_siv_encrypt(key_2, plaintext_2, sizeof(plaintext_2),
  115. 3, addr, len, out)) {
  116. wpa_printf(MSG_ERROR, "AES-SIV mode encryption failed");
  117. return 1;
  118. }
  119. if (os_memcmp(out, iv_c_2, sizeof(iv_c_2)) != 0) {
  120. wpa_printf(MSG_ERROR,
  121. "AES-SIV mode encryption returned invalid cipher text");
  122. return 1;
  123. }
  124. if (aes_siv_decrypt(key_2, iv_c_2, sizeof(iv_c_2), 3, addr, len, out)) {
  125. wpa_printf(MSG_ERROR, "AES-SIV mode decryption failed");
  126. return 1;
  127. }
  128. if (os_memcmp(out, plaintext_2, sizeof(plaintext_2)) != 0) {
  129. wpa_printf(MSG_ERROR,
  130. "AES-SIV mode decryption returned invalid plain text");
  131. return 1;
  132. }
  133. wpa_printf(MSG_INFO, "AES-SIV test cases passed");
  134. #endif /* CONFIG_MESH */
  135. return 0;
  136. }
  137. /* OMAC1 AES-128 test vectors from
  138. * http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/omac/omac-ad.pdf
  139. * which are same as the examples from NIST SP800-38B
  140. * http://csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38B.pdf
  141. */
  142. struct omac1_test_vector {
  143. u8 k[16];
  144. u8 msg[64];
  145. int msg_len;
  146. u8 tag[16];
  147. };
  148. static const struct omac1_test_vector omac1_test_vectors[] =
  149. {
  150. {
  151. { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
  152. 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
  153. { },
  154. 0,
  155. { 0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28,
  156. 0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46 }
  157. },
  158. {
  159. { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
  160. 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
  161. { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
  162. 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a},
  163. 16,
  164. { 0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44,
  165. 0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c }
  166. },
  167. {
  168. { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
  169. 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
  170. { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
  171. 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
  172. 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
  173. 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
  174. 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11 },
  175. 40,
  176. { 0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30,
  177. 0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27 }
  178. },
  179. {
  180. { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
  181. 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c },
  182. { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
  183. 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
  184. 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
  185. 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
  186. 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,
  187. 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
  188. 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,
  189. 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 },
  190. 64,
  191. { 0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92,
  192. 0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe }
  193. },
  194. };
  195. static int test_omac1_vector(const struct omac1_test_vector *tv,
  196. unsigned int i)
  197. {
  198. u8 key[] = {
  199. 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
  200. 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c
  201. };
  202. u8 msg[] = { 0x12, 0x34, 0x56 };
  203. u8 result[24], result2[24];
  204. const u8 *addr[3];
  205. size_t len[3];
  206. if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) ||
  207. os_memcmp(result, tv->tag, 16) != 0) {
  208. wpa_printf(MSG_ERROR, "OMAC1-AES-128 test vector %u failed", i);
  209. return 1;
  210. }
  211. if (tv->msg_len > 1) {
  212. addr[0] = tv->msg;
  213. len[0] = 1;
  214. addr[1] = tv->msg + 1;
  215. len[1] = tv->msg_len - 1;
  216. if (omac1_aes_128_vector(tv->k, 2, addr, len, result) ||
  217. os_memcmp(result, tv->tag, 16) != 0) {
  218. wpa_printf(MSG_ERROR,
  219. "OMAC1-AES-128(vector) test vector %u failed",
  220. i);
  221. return 1;
  222. }
  223. addr[0] = tv->msg;
  224. len[0] = tv->msg_len - 2;
  225. addr[1] = tv->msg + tv->msg_len - 2;
  226. len[1] = 1;
  227. addr[2] = tv->msg + tv->msg_len - 1;
  228. len[2] = 1;
  229. if (omac1_aes_128_vector(tv->k, 3, addr, len, result) ||
  230. os_memcmp(result, tv->tag, 16) != 0) {
  231. wpa_printf(MSG_ERROR,
  232. "OMAC1-AES-128(vector2) test vector %u failed",
  233. i);
  234. return 1;
  235. }
  236. }
  237. addr[0] = &msg[0];
  238. len[0] = 1;
  239. addr[1] = &msg[1];
  240. len[1] = 1;
  241. addr[2] = &msg[2];
  242. len[2] = 1;
  243. if (omac1_aes_128(key, msg, sizeof(msg), result) ||
  244. omac1_aes_128_vector(key, 3, addr, len, result2) ||
  245. os_memcmp(result, result2, 16) != 0) {
  246. wpa_printf(MSG_ERROR, "OMAC1-AES-128 short test mismatch");
  247. return 1;
  248. }
  249. return 0;
  250. }
  251. static int test_omac1(void)
  252. {
  253. unsigned int i;
  254. for (i = 0; i < ARRAY_SIZE(omac1_test_vectors); i++) {
  255. if (test_omac1_vector(&omac1_test_vectors[i], i))
  256. return 1;
  257. }
  258. wpa_printf(MSG_INFO, "OMAC1-AES-128 test cases passed");
  259. return 0;
  260. }
  261. static int test_eax(void)
  262. {
  263. #ifdef EAP_PSK
  264. u8 msg[] = { 0xF7, 0xFB };
  265. u8 key[] = { 0x91, 0x94, 0x5D, 0x3F, 0x4D, 0xCB, 0xEE, 0x0B,
  266. 0xF4, 0x5E, 0xF5, 0x22, 0x55, 0xF0, 0x95, 0xA4 };
  267. u8 nonce[] = { 0xBE, 0xCA, 0xF0, 0x43, 0xB0, 0xA2, 0x3D, 0x84,
  268. 0x31, 0x94, 0xBA, 0x97, 0x2C, 0x66, 0xDE, 0xBD };
  269. u8 hdr[] = { 0xFA, 0x3B, 0xFD, 0x48, 0x06, 0xEB, 0x53, 0xFA };
  270. u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D,
  271. 0x0B, 0xDA, 0xB0, 0x27, 0x74, 0x08, 0xF6, 0x79,
  272. 0x67, 0xE5 };
  273. u8 data[sizeof(msg)], tag[AES_BLOCK_SIZE];
  274. os_memcpy(data, msg, sizeof(msg));
  275. if (aes_128_eax_encrypt(key, nonce, sizeof(nonce), hdr, sizeof(hdr),
  276. data, sizeof(data), tag)) {
  277. wpa_printf(MSG_ERROR, "AES-128 EAX mode encryption failed");
  278. return 1;
  279. }
  280. if (os_memcmp(data, cipher, sizeof(data)) != 0) {
  281. wpa_printf(MSG_ERROR,
  282. "AES-128 EAX mode encryption returned invalid cipher text");
  283. return 1;
  284. }
  285. if (os_memcmp(tag, cipher + sizeof(data), AES_BLOCK_SIZE) != 0) {
  286. wpa_printf(MSG_ERROR,
  287. "AES-128 EAX mode encryption returned invalid tag");
  288. return 1;
  289. }
  290. if (aes_128_eax_decrypt(key, nonce, sizeof(nonce), hdr, sizeof(hdr),
  291. data, sizeof(data), tag)) {
  292. wpa_printf(MSG_ERROR, "AES-128 EAX mode decryption failed");
  293. return 1;
  294. }
  295. if (os_memcmp(data, msg, sizeof(data)) != 0) {
  296. wpa_printf(MSG_ERROR,
  297. "AES-128 EAX mode decryption returned invalid plain text");
  298. return 1;
  299. }
  300. wpa_printf(MSG_INFO, "AES-128 EAX mode test cases passed");
  301. #endif /* EAP_PSK */
  302. return 0;
  303. }
  304. static int test_cbc(void)
  305. {
  306. struct cbc_test_vector {
  307. u8 key[16];
  308. u8 iv[16];
  309. u8 plain[32];
  310. u8 cipher[32];
  311. size_t len;
  312. } vectors[] = {
  313. {
  314. { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b,
  315. 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 },
  316. { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30,
  317. 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 },
  318. "Single block msg",
  319. { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8,
  320. 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a },
  321. 16
  322. },
  323. {
  324. { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
  325. 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a },
  326. { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28,
  327. 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 },
  328. { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  329. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  330. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  331. 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f },
  332. { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a,
  333. 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a,
  334. 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9,
  335. 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1 },
  336. 32
  337. }
  338. };
  339. int ret = 0;
  340. u8 *buf;
  341. unsigned int i;
  342. for (i = 0; i < ARRAY_SIZE(vectors); i++) {
  343. struct cbc_test_vector *tv = &vectors[i];
  344. buf = os_malloc(tv->len);
  345. if (buf == NULL) {
  346. ret++;
  347. break;
  348. }
  349. os_memcpy(buf, tv->plain, tv->len);
  350. if (aes_128_cbc_encrypt(tv->key, tv->iv, buf, tv->len) ||
  351. os_memcmp(buf, tv->cipher, tv->len) != 0) {
  352. wpa_printf(MSG_ERROR, "AES-CBC encrypt %d failed", i);
  353. ret++;
  354. }
  355. os_memcpy(buf, tv->cipher, tv->len);
  356. if (aes_128_cbc_decrypt(tv->key, tv->iv, buf, tv->len) ||
  357. os_memcmp(buf, tv->plain, tv->len) != 0) {
  358. wpa_printf(MSG_ERROR, "AES-CBC decrypt %d failed", i);
  359. ret++;
  360. }
  361. os_free(buf);
  362. }
  363. return ret;
  364. }
  365. static int test_ecb(void)
  366. {
  367. #ifdef EAP_PSK
  368. struct ecb_test_vector {
  369. char *key;
  370. char *plaintext;
  371. char *ciphertext;
  372. } vectors[] = {
  373. /* CAVS 11.1 - ECBGFSbox128.rsp */
  374. {
  375. "00000000000000000000000000000000",
  376. "f34481ec3cc627bacd5dc3fb08f273e6",
  377. "0336763e966d92595a567cc9ce537f5e"
  378. },
  379. {
  380. "00000000000000000000000000000000",
  381. "9798c4640bad75c7c3227db910174e72",
  382. "a9a1631bf4996954ebc093957b234589"
  383. },
  384. {
  385. "00000000000000000000000000000000",
  386. "96ab5c2ff612d9dfaae8c31f30c42168",
  387. "ff4f8391a6a40ca5b25d23bedd44a597"
  388. },
  389. {
  390. "00000000000000000000000000000000",
  391. "6a118a874519e64e9963798a503f1d35",
  392. "dc43be40be0e53712f7e2bf5ca707209"
  393. },
  394. {
  395. "00000000000000000000000000000000",
  396. "cb9fceec81286ca3e989bd979b0cb284",
  397. "92beedab1895a94faa69b632e5cc47ce"
  398. },
  399. {
  400. "00000000000000000000000000000000",
  401. "b26aeb1874e47ca8358ff22378f09144",
  402. "459264f4798f6a78bacb89c15ed3d601"
  403. },
  404. {
  405. "00000000000000000000000000000000",
  406. "58c8e00b2631686d54eab84b91f0aca1",
  407. "08a4e2efec8a8e3312ca7460b9040bbf"
  408. },
  409. /* CAVS 11.1 - ECBKeySbox128.rsp */
  410. {
  411. "10a58869d74be5a374cf867cfb473859",
  412. "00000000000000000000000000000000",
  413. "6d251e6944b051e04eaa6fb4dbf78465"
  414. },
  415. {
  416. "caea65cdbb75e9169ecd22ebe6e54675",
  417. "00000000000000000000000000000000",
  418. "6e29201190152df4ee058139def610bb",
  419. }
  420. };
  421. int ret = 0;
  422. unsigned int i;
  423. u8 key[16], plain[16], cipher[16], out[16];
  424. for (i = 0; i < ARRAY_SIZE(vectors); i++) {
  425. struct ecb_test_vector *tv = &vectors[i];
  426. if (hexstr2bin(tv->key, key, sizeof(key)) ||
  427. hexstr2bin(tv->plaintext, plain, sizeof(plain)) ||
  428. hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
  429. wpa_printf(MSG_ERROR, "Invalid AES-ECB test vector %u",
  430. i);
  431. ret++;
  432. continue;
  433. }
  434. if (aes_128_encrypt_block(key, plain, out) < 0 ||
  435. os_memcmp(out, cipher, 16) != 0) {
  436. wpa_printf(MSG_ERROR, "AES-ECB encrypt %u failed", i);
  437. ret++;
  438. }
  439. }
  440. if (!ret)
  441. wpa_printf(MSG_INFO, "AES ECB mode test cases passed");
  442. return ret;
  443. #endif /* EAP_PSK */
  444. return 0;
  445. }
  446. static int test_key_wrap(void)
  447. {
  448. int ret = 0;
  449. /* RFC 3394 - Test vector 4.1 */
  450. u8 kek41[] = {
  451. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  452. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
  453. };
  454. u8 plain41[] = {
  455. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  456. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  457. };
  458. u8 crypt41[] = {
  459. 0x1F, 0xA6, 0x8B, 0x0A, 0x81, 0x12, 0xB4, 0x47,
  460. 0xAE, 0xF3, 0x4B, 0xD8, 0xFB, 0x5A, 0x7B, 0x82,
  461. 0x9D, 0x3E, 0x86, 0x23, 0x71, 0xD2, 0xCF, 0xE5
  462. };
  463. /* RFC 3394 - Test vector 4.2 */
  464. u8 kek42[] = {
  465. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  466. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  467. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17
  468. };
  469. u8 plain42[] = {
  470. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  471. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  472. };
  473. u8 crypt42[] = {
  474. 0x96, 0x77, 0x8B, 0x25, 0xAE, 0x6C, 0xA4, 0x35,
  475. 0xF9, 0x2B, 0x5B, 0x97, 0xC0, 0x50, 0xAE, 0xD2,
  476. 0x46, 0x8A, 0xB8, 0xA1, 0x7A, 0xD8, 0x4E, 0x5D
  477. };
  478. /* RFC 3394 - Test vector 4.3 */
  479. u8 kek43[] = {
  480. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  481. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  482. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  483. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  484. };
  485. u8 plain43[] = {
  486. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  487. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  488. };
  489. u8 crypt43[] = {
  490. 0x64, 0xE8, 0xC3, 0xF9, 0xCE, 0x0F, 0x5B, 0xA2,
  491. 0x63, 0xE9, 0x77, 0x79, 0x05, 0x81, 0x8A, 0x2A,
  492. 0x93, 0xC8, 0x19, 0x1E, 0x7D, 0x6E, 0x8A, 0xE7,
  493. };
  494. /* RFC 3394 - Test vector 4.4 */
  495. u8 kek44[] = {
  496. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  497. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  498. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17
  499. };
  500. u8 plain44[] = {
  501. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  502. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  503. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07
  504. };
  505. u8 crypt44[] = {
  506. 0x03, 0x1D, 0x33, 0x26, 0x4E, 0x15, 0xD3, 0x32,
  507. 0x68, 0xF2, 0x4E, 0xC2, 0x60, 0x74, 0x3E, 0xDC,
  508. 0xE1, 0xC6, 0xC7, 0xDD, 0xEE, 0x72, 0x5A, 0x93,
  509. 0x6B, 0xA8, 0x14, 0x91, 0x5C, 0x67, 0x62, 0xD2
  510. };
  511. /* RFC 3394 - Test vector 4.5 */
  512. u8 kek45[] = {
  513. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  514. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  515. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  516. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  517. };
  518. u8 plain45[] = {
  519. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  520. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  521. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07
  522. };
  523. u8 crypt45[] = {
  524. 0xA8, 0xF9, 0xBC, 0x16, 0x12, 0xC6, 0x8B, 0x3F,
  525. 0xF6, 0xE6, 0xF4, 0xFB, 0xE3, 0x0E, 0x71, 0xE4,
  526. 0x76, 0x9C, 0x8B, 0x80, 0xA3, 0x2C, 0xB8, 0x95,
  527. 0x8C, 0xD5, 0xD1, 0x7D, 0x6B, 0x25, 0x4D, 0xA1,
  528. };
  529. /* RFC 3394 - Test vector 4.6 */
  530. u8 kek46[] = {
  531. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  532. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  533. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  534. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  535. };
  536. u8 plain46[] = {
  537. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  538. 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF,
  539. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  540. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
  541. };
  542. u8 crypt46[] = {
  543. 0x28, 0xC9, 0xF4, 0x04, 0xC4, 0xB8, 0x10, 0xF4,
  544. 0xCB, 0xCC, 0xB3, 0x5C, 0xFB, 0x87, 0xF8, 0x26,
  545. 0x3F, 0x57, 0x86, 0xE2, 0xD8, 0x0E, 0xD3, 0x26,
  546. 0xCB, 0xC7, 0xF0, 0xE7, 0x1A, 0x99, 0xF4, 0x3B,
  547. 0xFB, 0x98, 0x8B, 0x9B, 0x7A, 0x02, 0xDD, 0x21
  548. };
  549. u8 result[40];
  550. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.1");
  551. if (aes_wrap(kek41, sizeof(kek41), sizeof(plain41) / 8, plain41,
  552. result)) {
  553. wpa_printf(MSG_ERROR, "AES-WRAP-128 reported failure");
  554. ret++;
  555. }
  556. if (os_memcmp(result, crypt41, sizeof(crypt41)) != 0) {
  557. wpa_printf(MSG_ERROR, "AES-WRAP-128 failed");
  558. ret++;
  559. }
  560. if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41,
  561. result)) {
  562. wpa_printf(MSG_ERROR, "AES-UNWRAP-128 reported failure");
  563. ret++;
  564. }
  565. if (os_memcmp(result, plain41, sizeof(plain41)) != 0) {
  566. wpa_printf(MSG_ERROR, "AES-UNWRAP-128 failed");
  567. ret++;
  568. }
  569. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.2");
  570. if (aes_wrap(kek42, sizeof(kek42), sizeof(plain42) / 8, plain42,
  571. result)) {
  572. wpa_printf(MSG_ERROR, "AES-WRAP-192 reported failure");
  573. ret++;
  574. }
  575. if (os_memcmp(result, crypt42, sizeof(crypt42)) != 0) {
  576. wpa_printf(MSG_ERROR, "AES-WRAP-192 failed");
  577. ret++;
  578. }
  579. if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42,
  580. result)) {
  581. wpa_printf(MSG_ERROR, "AES-UNWRAP-192 reported failure");
  582. ret++;
  583. }
  584. if (os_memcmp(result, plain42, sizeof(plain42)) != 0) {
  585. wpa_printf(MSG_ERROR, "AES-UNWRAP-192 failed");
  586. ret++;
  587. }
  588. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.3");
  589. if (aes_wrap(kek43, sizeof(kek43), sizeof(plain43) / 8, plain43,
  590. result)) {
  591. wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure");
  592. ret++;
  593. }
  594. if (os_memcmp(result, crypt43, sizeof(crypt43)) != 0) {
  595. wpa_printf(MSG_ERROR, "AES-WRAP-256 failed");
  596. ret++;
  597. }
  598. if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43,
  599. result)) {
  600. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure");
  601. ret++;
  602. }
  603. if (os_memcmp(result, plain43, sizeof(plain43)) != 0) {
  604. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed");
  605. ret++;
  606. }
  607. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.4");
  608. if (aes_wrap(kek44, sizeof(kek44), sizeof(plain44) / 8, plain44,
  609. result)) {
  610. wpa_printf(MSG_ERROR, "AES-WRAP-192 reported failure");
  611. ret++;
  612. }
  613. if (os_memcmp(result, crypt44, sizeof(crypt44)) != 0) {
  614. wpa_printf(MSG_ERROR, "AES-WRAP-192 failed");
  615. ret++;
  616. }
  617. if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44,
  618. result)) {
  619. wpa_printf(MSG_ERROR, "AES-UNWRAP-192 reported failure");
  620. ret++;
  621. }
  622. if (os_memcmp(result, plain44, sizeof(plain44)) != 0) {
  623. wpa_printf(MSG_ERROR, "AES-UNWRAP-192 failed");
  624. ret++;
  625. }
  626. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.5");
  627. if (aes_wrap(kek45, sizeof(kek45), sizeof(plain45) / 8, plain45,
  628. result)) {
  629. wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure");
  630. ret++;
  631. }
  632. if (os_memcmp(result, crypt45, sizeof(crypt45)) != 0) {
  633. wpa_printf(MSG_ERROR, "AES-WRAP-256 failed");
  634. ret++;
  635. }
  636. if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45,
  637. result)) {
  638. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure");
  639. ret++;
  640. }
  641. if (os_memcmp(result, plain45, sizeof(plain45)) != 0) {
  642. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed");
  643. ret++;
  644. }
  645. wpa_printf(MSG_INFO, "RFC 3394 - Test vector 4.6");
  646. if (aes_wrap(kek46, sizeof(kek46), sizeof(plain46) / 8, plain46,
  647. result)) {
  648. wpa_printf(MSG_ERROR, "AES-WRAP-256 reported failure");
  649. ret++;
  650. }
  651. if (os_memcmp(result, crypt46, sizeof(crypt46)) != 0) {
  652. wpa_printf(MSG_ERROR, "AES-WRAP-256 failed");
  653. ret++;
  654. }
  655. if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46,
  656. result)) {
  657. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 reported failure");
  658. ret++;
  659. }
  660. if (os_memcmp(result, plain46, sizeof(plain46)) != 0) {
  661. wpa_printf(MSG_ERROR, "AES-UNWRAP-256 failed");
  662. ret++;
  663. }
  664. if (!ret)
  665. wpa_printf(MSG_INFO, "AES key wrap/unwrap test cases passed");
  666. return ret;
  667. }
  668. static int test_md5(void)
  669. {
  670. struct {
  671. char *data;
  672. char *hash;
  673. } tests[] = {
  674. {
  675. "",
  676. "\xd4\x1d\x8c\xd9\x8f\x00\xb2\x04"
  677. "\xe9\x80\x09\x98\xec\xf8\x42\x7e"
  678. },
  679. {
  680. "a",
  681. "\x0c\xc1\x75\xb9\xc0\xf1\xb6\xa8"
  682. "\x31\xc3\x99\xe2\x69\x77\x26\x61"
  683. },
  684. {
  685. "abc",
  686. "\x90\x01\x50\x98\x3c\xd2\x4f\xb0"
  687. "\xd6\x96\x3f\x7d\x28\xe1\x7f\x72"
  688. },
  689. {
  690. "message digest",
  691. "\xf9\x6b\x69\x7d\x7c\xb7\x93\x8d"
  692. "\x52\x5a\x2f\x31\xaa\xf1\x61\xd0"
  693. },
  694. {
  695. "abcdefghijklmnopqrstuvwxyz",
  696. "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00"
  697. "\x7d\xfb\x49\x6c\xca\x67\xe1\x3b"
  698. },
  699. {
  700. "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
  701. "0123456789",
  702. "\xd1\x74\xab\x98\xd2\x77\xd9\xf5"
  703. "\xa5\x61\x1c\x2c\x9f\x41\x9d\x9f"
  704. },
  705. {
  706. "12345678901234567890123456789012345678901234567890"
  707. "123456789012345678901234567890",
  708. "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55"
  709. "\xac\x49\xda\x2e\x21\x07\xb6\x7a"
  710. }
  711. };
  712. unsigned int i;
  713. u8 hash[16];
  714. const u8 *addr[2];
  715. size_t len[2];
  716. int errors = 0;
  717. for (i = 0; i < ARRAY_SIZE(tests); i++) {
  718. wpa_printf(MSG_INFO, "MD5 test case %d", i);
  719. addr[0] = (u8 *) tests[i].data;
  720. len[0] = strlen(tests[i].data);
  721. if (md5_vector(1, addr, len, hash) < 0 ||
  722. os_memcmp(hash, tests[i].hash, 16) != 0) {
  723. wpa_printf(MSG_INFO, " FAIL");
  724. errors++;
  725. } else
  726. wpa_printf(MSG_INFO, " OK");
  727. if (len[0]) {
  728. addr[0] = (u8 *) tests[i].data;
  729. len[0] = strlen(tests[i].data);
  730. addr[1] = (u8 *) tests[i].data + 1;
  731. len[1] = strlen(tests[i].data) - 1;
  732. if (md5_vector(1, addr, len, hash) < 0 ||
  733. os_memcmp(hash, tests[i].hash, 16) != 0) {
  734. wpa_printf(MSG_INFO, " FAIL");
  735. errors++;
  736. } else
  737. wpa_printf(MSG_INFO, " OK");
  738. }
  739. }
  740. if (!errors)
  741. wpa_printf(MSG_INFO, "MD5 test cases passed");
  742. return errors;
  743. }
  744. static int test_eap_fast(void)
  745. {
  746. #ifdef EAP_FAST
  747. /* RFC 4851, Appendix B.1 */
  748. const u8 pac_key[] = {
  749. 0x0B, 0x97, 0x39, 0x0F, 0x37, 0x51, 0x78, 0x09,
  750. 0x81, 0x1E, 0xFD, 0x9C, 0x6E, 0x65, 0x94, 0x2B,
  751. 0x63, 0x2C, 0xE9, 0x53, 0x89, 0x38, 0x08, 0xBA,
  752. 0x36, 0x0B, 0x03, 0x7C, 0xD1, 0x85, 0xE4, 0x14
  753. };
  754. const u8 seed[] = {
  755. 0x3F, 0xFB, 0x11, 0xC4, 0x6C, 0xBF, 0xA5, 0x7A,
  756. 0x54, 0x40, 0xDA, 0xE8, 0x22, 0xD3, 0x11, 0xD3,
  757. 0xF7, 0x6D, 0xE4, 0x1D, 0xD9, 0x33, 0xE5, 0x93,
  758. 0x70, 0x97, 0xEB, 0xA9, 0xB3, 0x66, 0xF4, 0x2A,
  759. 0x00, 0x00, 0x00, 0x02, 0x6A, 0x66, 0x43, 0x2A,
  760. 0x8D, 0x14, 0x43, 0x2C, 0xEC, 0x58, 0x2D, 0x2F,
  761. 0xC7, 0x9C, 0x33, 0x64, 0xBA, 0x04, 0xAD, 0x3A,
  762. 0x52, 0x54, 0xD6, 0xA5, 0x79, 0xAD, 0x1E, 0x00
  763. };
  764. const u8 master_secret[] = {
  765. 0x4A, 0x1A, 0x51, 0x2C, 0x01, 0x60, 0xBC, 0x02,
  766. 0x3C, 0xCF, 0xBC, 0x83, 0x3F, 0x03, 0xBC, 0x64,
  767. 0x88, 0xC1, 0x31, 0x2F, 0x0B, 0xA9, 0xA2, 0x77,
  768. 0x16, 0xA8, 0xD8, 0xE8, 0xBD, 0xC9, 0xD2, 0x29,
  769. 0x38, 0x4B, 0x7A, 0x85, 0xBE, 0x16, 0x4D, 0x27,
  770. 0x33, 0xD5, 0x24, 0x79, 0x87, 0xB1, 0xC5, 0xA2
  771. };
  772. #ifndef CONFIG_FIPS
  773. const u8 key_block[] = {
  774. 0x59, 0x59, 0xBE, 0x8E, 0x41, 0x3A, 0x77, 0x74,
  775. 0x8B, 0xB2, 0xE5, 0xD3, 0x60, 0xAC, 0x4D, 0x35,
  776. 0xDF, 0xFB, 0xC8, 0x1E, 0x9C, 0x24, 0x9C, 0x8B,
  777. 0x0E, 0xC3, 0x1D, 0x72, 0xC8, 0x84, 0x9D, 0x57,
  778. 0x48, 0x51, 0x2E, 0x45, 0x97, 0x6C, 0x88, 0x70,
  779. 0xBE, 0x5F, 0x01, 0xD3, 0x64, 0xE7, 0x4C, 0xBB,
  780. 0x11, 0x24, 0xE3, 0x49, 0xE2, 0x3B, 0xCD, 0xEF,
  781. 0x7A, 0xB3, 0x05, 0x39, 0x5D, 0x64, 0x8A, 0x44,
  782. 0x11, 0xB6, 0x69, 0x88, 0x34, 0x2E, 0x8E, 0x29,
  783. 0xD6, 0x4B, 0x7D, 0x72, 0x17, 0x59, 0x28, 0x05,
  784. 0xAF, 0xF9, 0xB7, 0xFF, 0x66, 0x6D, 0xA1, 0x96,
  785. 0x8F, 0x0B, 0x5E, 0x06, 0x46, 0x7A, 0x44, 0x84,
  786. 0x64, 0xC1, 0xC8, 0x0C, 0x96, 0x44, 0x09, 0x98,
  787. 0xFF, 0x92, 0xA8, 0xB4, 0xC6, 0x42, 0x28, 0x71
  788. };
  789. #endif /* CONFIG_FIPS */
  790. const u8 sks[] = {
  791. 0xD6, 0x4B, 0x7D, 0x72, 0x17, 0x59, 0x28, 0x05,
  792. 0xAF, 0xF9, 0xB7, 0xFF, 0x66, 0x6D, 0xA1, 0x96,
  793. 0x8F, 0x0B, 0x5E, 0x06, 0x46, 0x7A, 0x44, 0x84,
  794. 0x64, 0xC1, 0xC8, 0x0C, 0x96, 0x44, 0x09, 0x98,
  795. 0xFF, 0x92, 0xA8, 0xB4, 0xC6, 0x42, 0x28, 0x71
  796. };
  797. const u8 isk[] = {
  798. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  799. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  800. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  801. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
  802. };
  803. const u8 imck[] = {
  804. 0x16, 0x15, 0x3C, 0x3F, 0x21, 0x55, 0xEF, 0xD9,
  805. 0x7F, 0x34, 0xAE, 0xC8, 0x1A, 0x4E, 0x66, 0x80,
  806. 0x4C, 0xC3, 0x76, 0xF2, 0x8A, 0xA9, 0x6F, 0x96,
  807. 0xC2, 0x54, 0x5F, 0x8C, 0xAB, 0x65, 0x02, 0xE1,
  808. 0x18, 0x40, 0x7B, 0x56, 0xBE, 0xEA, 0xA7, 0xC5,
  809. 0x76, 0x5D, 0x8F, 0x0B, 0xC5, 0x07, 0xC6, 0xB9,
  810. 0x04, 0xD0, 0x69, 0x56, 0x72, 0x8B, 0x6B, 0xB8,
  811. 0x15, 0xEC, 0x57, 0x7B
  812. };
  813. const u8 msk[] = {
  814. 0x4D, 0x83, 0xA9, 0xBE, 0x6F, 0x8A, 0x74, 0xED,
  815. 0x6A, 0x02, 0x66, 0x0A, 0x63, 0x4D, 0x2C, 0x33,
  816. 0xC2, 0xDA, 0x60, 0x15, 0xC6, 0x37, 0x04, 0x51,
  817. 0x90, 0x38, 0x63, 0xDA, 0x54, 0x3E, 0x14, 0xB9,
  818. 0x27, 0x99, 0x18, 0x1E, 0x07, 0xBF, 0x0F, 0x5A,
  819. 0x5E, 0x3C, 0x32, 0x93, 0x80, 0x8C, 0x6C, 0x49,
  820. 0x67, 0xED, 0x24, 0xFE, 0x45, 0x40, 0xA0, 0x59,
  821. 0x5E, 0x37, 0xC2, 0xE9, 0xD0, 0x5D, 0x0A, 0xE3
  822. };
  823. const u8 emsk[] = {
  824. 0x3A, 0xD4, 0xAB, 0xDB, 0x76, 0xB2, 0x7F, 0x3B,
  825. 0xEA, 0x32, 0x2C, 0x2B, 0x74, 0xF4, 0x28, 0x55,
  826. 0xEF, 0x2D, 0xBA, 0x78, 0xC9, 0x57, 0x2F, 0x0D,
  827. 0x06, 0xCD, 0x51, 0x7C, 0x20, 0x93, 0x98, 0xA9,
  828. 0x76, 0xEA, 0x70, 0x21, 0xD7, 0x0E, 0x25, 0x54,
  829. 0x97, 0xED, 0xB2, 0x8A, 0xF6, 0xED, 0xFD, 0x0A,
  830. 0x2A, 0xE7, 0xA1, 0x58, 0x90, 0x10, 0x50, 0x44,
  831. 0xB3, 0x82, 0x85, 0xDB, 0x06, 0x14, 0xD2, 0xF9
  832. };
  833. /* RFC 4851, Appendix B.2 */
  834. u8 tlv[] = {
  835. 0x80, 0x0C, 0x00, 0x38, 0x00, 0x01, 0x01, 0x00,
  836. 0xD8, 0x6A, 0x8C, 0x68, 0x3C, 0x32, 0x31, 0xA8,
  837. 0x56, 0x63, 0xB6, 0x40, 0x21, 0xFE, 0x21, 0x14,
  838. 0x4E, 0xE7, 0x54, 0x20, 0x79, 0x2D, 0x42, 0x62,
  839. 0xC9, 0xBF, 0x53, 0x7F, 0x54, 0xFD, 0xAC, 0x58,
  840. 0x43, 0x24, 0x6E, 0x30, 0x92, 0x17, 0x6D, 0xCF,
  841. 0xE6, 0xE0, 0x69, 0xEB, 0x33, 0x61, 0x6A, 0xCC,
  842. 0x05, 0xC5, 0x5B, 0xB7
  843. };
  844. const u8 compound_mac[] = {
  845. 0x43, 0x24, 0x6E, 0x30, 0x92, 0x17, 0x6D, 0xCF,
  846. 0xE6, 0xE0, 0x69, 0xEB, 0x33, 0x61, 0x6A, 0xCC,
  847. 0x05, 0xC5, 0x5B, 0xB7
  848. };
  849. u8 buf[512];
  850. const u8 *simck, *cmk;
  851. int errors = 0;
  852. wpa_printf(MSG_INFO, "EAP-FAST test cases");
  853. wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / master_secret");
  854. if (sha1_t_prf(pac_key, sizeof(pac_key),
  855. "PAC to master secret label hash",
  856. seed, sizeof(seed), buf, sizeof(master_secret)) < 0 ||
  857. os_memcmp(master_secret, buf, sizeof(master_secret)) != 0) {
  858. wpa_printf(MSG_INFO, "T-PRF test - FAILED!");
  859. errors++;
  860. }
  861. #ifndef CONFIG_FIPS
  862. wpa_printf(MSG_INFO, "- PRF (TLS, SHA1/MD5) test case / key_block");
  863. if (tls_prf_sha1_md5(master_secret, sizeof(master_secret),
  864. "key expansion", seed, sizeof(seed),
  865. buf, sizeof(key_block)) ||
  866. os_memcmp(key_block, buf, sizeof(key_block)) != 0) {
  867. wpa_printf(MSG_INFO, "PRF test - FAILED!");
  868. errors++;
  869. }
  870. #endif /* CONFIG_FIPS */
  871. wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / IMCK");
  872. if (sha1_t_prf(sks, sizeof(sks), "Inner Methods Compound Keys",
  873. isk, sizeof(isk), buf, sizeof(imck)) < 0 ||
  874. os_memcmp(imck, buf, sizeof(imck)) != 0) {
  875. wpa_printf(MSG_INFO, "T-PRF test - FAILED!");
  876. errors++;
  877. }
  878. simck = imck;
  879. cmk = imck + 40;
  880. wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / MSK");
  881. if (sha1_t_prf(simck, 40, "Session Key Generating Function",
  882. (u8 *) "", 0, buf, sizeof(msk)) < 0 ||
  883. os_memcmp(msk, buf, sizeof(msk)) != 0) {
  884. wpa_printf(MSG_INFO, "T-PRF test - FAILED!");
  885. errors++;
  886. }
  887. wpa_printf(MSG_INFO, "- T-PRF (SHA1) test case / EMSK");
  888. if (sha1_t_prf(simck, 40, "Extended Session Key Generating Function",
  889. (u8 *) "", 0, buf, sizeof(msk)) < 0 ||
  890. os_memcmp(emsk, buf, sizeof(emsk)) != 0) {
  891. wpa_printf(MSG_INFO, "T-PRF test - FAILED!");
  892. errors++;
  893. }
  894. wpa_printf(MSG_INFO, "- Compound MAC test case");
  895. os_memset(tlv + sizeof(tlv) - 20, 0, 20);
  896. if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 ||
  897. os_memcmp(tlv + sizeof(tlv) - 20, compound_mac,
  898. sizeof(compound_mac)) != 0) {
  899. wpa_printf(MSG_INFO, "Compound MAC test - FAILED!");
  900. errors++;
  901. }
  902. return errors;
  903. #else /* EAP_FAST */
  904. return 0;
  905. #endif /* EAP_FAST */
  906. }
  907. static const u8 key0[] =
  908. {
  909. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  910. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  911. 0x0b, 0x0b, 0x0b, 0x0b
  912. };
  913. static const u8 data0[] = "Hi There";
  914. static const u8 prf0[] =
  915. {
  916. 0xbc, 0xd4, 0xc6, 0x50, 0xb3, 0x0b, 0x96, 0x84,
  917. 0x95, 0x18, 0x29, 0xe0, 0xd7, 0x5f, 0x9d, 0x54,
  918. 0xb8, 0x62, 0x17, 0x5e, 0xd9, 0xf0, 0x06, 0x06,
  919. 0xe1, 0x7d, 0x8d, 0xa3, 0x54, 0x02, 0xff, 0xee,
  920. 0x75, 0xdf, 0x78, 0xc3, 0xd3, 0x1e, 0x0f, 0x88,
  921. 0x9f, 0x01, 0x21, 0x20, 0xc0, 0x86, 0x2b, 0xeb,
  922. 0x67, 0x75, 0x3e, 0x74, 0x39, 0xae, 0x24, 0x2e,
  923. 0xdb, 0x83, 0x73, 0x69, 0x83, 0x56, 0xcf, 0x5a
  924. };
  925. static const u8 key1[] = "Jefe";
  926. static const u8 data1[] = "what do ya want for nothing?";
  927. static const u8 prf1[] =
  928. {
  929. 0x51, 0xf4, 0xde, 0x5b, 0x33, 0xf2, 0x49, 0xad,
  930. 0xf8, 0x1a, 0xeb, 0x71, 0x3a, 0x3c, 0x20, 0xf4,
  931. 0xfe, 0x63, 0x14, 0x46, 0xfa, 0xbd, 0xfa, 0x58,
  932. 0x24, 0x47, 0x59, 0xae, 0x58, 0xef, 0x90, 0x09,
  933. 0xa9, 0x9a, 0xbf, 0x4e, 0xac, 0x2c, 0xa5, 0xfa,
  934. 0x87, 0xe6, 0x92, 0xc4, 0x40, 0xeb, 0x40, 0x02,
  935. 0x3e, 0x7b, 0xab, 0xb2, 0x06, 0xd6, 0x1d, 0xe7,
  936. 0xb9, 0x2f, 0x41, 0x52, 0x90, 0x92, 0xb8, 0xfc
  937. };
  938. static const u8 key2[] =
  939. {
  940. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  941. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  942. 0xaa, 0xaa, 0xaa, 0xaa
  943. };
  944. static const u8 data2[] =
  945. {
  946. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  947. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  948. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  949. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  950. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  951. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  952. 0xdd, 0xdd
  953. };
  954. static const u8 prf2[] =
  955. {
  956. 0xe1, 0xac, 0x54, 0x6e, 0xc4, 0xcb, 0x63, 0x6f,
  957. 0x99, 0x76, 0x48, 0x7b, 0xe5, 0xc8, 0x6b, 0xe1,
  958. 0x7a, 0x02, 0x52, 0xca, 0x5d, 0x8d, 0x8d, 0xf1,
  959. 0x2c, 0xfb, 0x04, 0x73, 0x52, 0x52, 0x49, 0xce,
  960. 0x9d, 0xd8, 0xd1, 0x77, 0xea, 0xd7, 0x10, 0xbc,
  961. 0x9b, 0x59, 0x05, 0x47, 0x23, 0x91, 0x07, 0xae,
  962. 0xf7, 0xb4, 0xab, 0xd4, 0x3d, 0x87, 0xf0, 0xa6,
  963. 0x8f, 0x1c, 0xbd, 0x9e, 0x2b, 0x6f, 0x76, 0x07
  964. };
  965. struct passphrase_test {
  966. char *passphrase;
  967. char *ssid;
  968. char psk[32];
  969. };
  970. static const struct passphrase_test passphrase_tests[] =
  971. {
  972. {
  973. "password",
  974. "IEEE",
  975. {
  976. 0xf4, 0x2c, 0x6f, 0xc5, 0x2d, 0xf0, 0xeb, 0xef,
  977. 0x9e, 0xbb, 0x4b, 0x90, 0xb3, 0x8a, 0x5f, 0x90,
  978. 0x2e, 0x83, 0xfe, 0x1b, 0x13, 0x5a, 0x70, 0xe2,
  979. 0x3a, 0xed, 0x76, 0x2e, 0x97, 0x10, 0xa1, 0x2e
  980. }
  981. },
  982. {
  983. "ThisIsAPassword",
  984. "ThisIsASSID",
  985. {
  986. 0x0d, 0xc0, 0xd6, 0xeb, 0x90, 0x55, 0x5e, 0xd6,
  987. 0x41, 0x97, 0x56, 0xb9, 0xa1, 0x5e, 0xc3, 0xe3,
  988. 0x20, 0x9b, 0x63, 0xdf, 0x70, 0x7d, 0xd5, 0x08,
  989. 0xd1, 0x45, 0x81, 0xf8, 0x98, 0x27, 0x21, 0xaf
  990. }
  991. },
  992. {
  993. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  994. "ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ",
  995. {
  996. 0xbe, 0xcb, 0x93, 0x86, 0x6b, 0xb8, 0xc3, 0x83,
  997. 0x2c, 0xb7, 0x77, 0xc2, 0xf5, 0x59, 0x80, 0x7c,
  998. 0x8c, 0x59, 0xaf, 0xcb, 0x6e, 0xae, 0x73, 0x48,
  999. 0x85, 0x00, 0x13, 0x00, 0xa9, 0x81, 0xcc, 0x62
  1000. }
  1001. },
  1002. };
  1003. #define NUM_PASSPHRASE_TESTS ARRAY_SIZE(passphrase_tests)
  1004. struct rfc6070_test {
  1005. char *p;
  1006. char *s;
  1007. int c;
  1008. char dk[32];
  1009. size_t dk_len;
  1010. };
  1011. static const struct rfc6070_test rfc6070_tests[] =
  1012. {
  1013. {
  1014. "password",
  1015. "salt",
  1016. 1,
  1017. {
  1018. 0x0c, 0x60, 0xc8, 0x0f, 0x96, 0x1f, 0x0e, 0x71,
  1019. 0xf3, 0xa9, 0xb5, 0x24, 0xaf, 0x60, 0x12, 0x06,
  1020. 0x2f, 0xe0, 0x37, 0xa6
  1021. },
  1022. 20
  1023. },
  1024. {
  1025. "password",
  1026. "salt",
  1027. 2,
  1028. {
  1029. 0xea, 0x6c, 0x01, 0x4d, 0xc7, 0x2d, 0x6f, 0x8c,
  1030. 0xcd, 0x1e, 0xd9, 0x2a, 0xce, 0x1d, 0x41, 0xf0,
  1031. 0xd8, 0xde, 0x89, 0x57
  1032. },
  1033. 20
  1034. },
  1035. {
  1036. "password",
  1037. "salt",
  1038. 4096,
  1039. {
  1040. 0x4b, 0x00, 0x79, 0x01, 0xb7, 0x65, 0x48, 0x9a,
  1041. 0xbe, 0xad, 0x49, 0xd9, 0x26, 0xf7, 0x21, 0xd0,
  1042. 0x65, 0xa4, 0x29, 0xc1
  1043. },
  1044. 20
  1045. },
  1046. #if 0 /* This takes quite long to derive.. */
  1047. {
  1048. "password",
  1049. "salt",
  1050. 16777216,
  1051. {
  1052. 0xee, 0xfe, 0x3d, 0x61, 0xcd, 0x4d, 0xa4, 0xe4,
  1053. 0xe9, 0x94, 0x5b, 0x3d, 0x6b, 0xa2, 0x15, 0x8c,
  1054. 0x26, 0x34, 0xe9, 0x84
  1055. },
  1056. 20
  1057. },
  1058. #endif
  1059. {
  1060. "passwordPASSWORDpassword",
  1061. "saltSALTsaltSALTsaltSALTsaltSALTsalt",
  1062. 4096,
  1063. {
  1064. 0x3d, 0x2e, 0xec, 0x4f, 0xe4, 0x1c, 0x84, 0x9b,
  1065. 0x80, 0xc8, 0xd8, 0x36, 0x62, 0xc0, 0xe4, 0x4a,
  1066. 0x8b, 0x29, 0x1a, 0x96, 0x4c, 0xf2, 0xf0, 0x70,
  1067. 0x38
  1068. },
  1069. 25
  1070. },
  1071. #if 0 /* \0 not currently supported in passphrase parameters.. */
  1072. {
  1073. "pass\0word",
  1074. "sa\0lt",
  1075. 4096,
  1076. {
  1077. 0x56, 0xfa, 0x6a, 0xa7, 0x55, 0x48, 0x09, 0x9d,
  1078. 0xcc, 0x37, 0xd7, 0xf0, 0x34, 0x25, 0xe0, 0xc3
  1079. },
  1080. 16
  1081. },
  1082. #endif
  1083. };
  1084. #define NUM_RFC6070_TESTS ARRAY_SIZE(rfc6070_tests)
  1085. static int test_sha1(void)
  1086. {
  1087. u8 res[512];
  1088. int ret = 0;
  1089. unsigned int i;
  1090. wpa_printf(MSG_INFO, "PRF-SHA1 test cases:");
  1091. if (sha1_prf(key0, sizeof(key0), "prefix", data0, sizeof(data0) - 1,
  1092. res, sizeof(prf0)) == 0 &&
  1093. os_memcmp(res, prf0, sizeof(prf0)) == 0)
  1094. wpa_printf(MSG_INFO, "Test case 0 - OK");
  1095. else {
  1096. wpa_printf(MSG_INFO, "Test case 0 - FAILED!");
  1097. ret++;
  1098. }
  1099. if (sha1_prf(key1, sizeof(key1) - 1, "prefix", data1, sizeof(data1) - 1,
  1100. res, sizeof(prf1)) == 0 &&
  1101. os_memcmp(res, prf1, sizeof(prf1)) == 0)
  1102. wpa_printf(MSG_INFO, "Test case 1 - OK");
  1103. else {
  1104. wpa_printf(MSG_INFO, "Test case 1 - FAILED!");
  1105. ret++;
  1106. }
  1107. if (sha1_prf(key2, sizeof(key2), "prefix", data2, sizeof(data2),
  1108. res, sizeof(prf2)) == 0 &&
  1109. os_memcmp(res, prf2, sizeof(prf2)) == 0)
  1110. wpa_printf(MSG_INFO, "Test case 2 - OK");
  1111. else {
  1112. wpa_printf(MSG_INFO, "Test case 2 - FAILED!");
  1113. ret++;
  1114. }
  1115. ret += test_eap_fast();
  1116. wpa_printf(MSG_INFO, "PBKDF2-SHA1 Passphrase test cases:");
  1117. for (i = 0; i < NUM_PASSPHRASE_TESTS; i++) {
  1118. u8 psk[32];
  1119. const struct passphrase_test *test = &passphrase_tests[i];
  1120. if (pbkdf2_sha1(test->passphrase,
  1121. (const u8 *) test->ssid, strlen(test->ssid),
  1122. 4096, psk, 32) == 0 &&
  1123. os_memcmp(psk, test->psk, 32) == 0)
  1124. wpa_printf(MSG_INFO, "Test case %d - OK", i);
  1125. else {
  1126. wpa_printf(MSG_INFO, "Test case %d - FAILED!", i);
  1127. ret++;
  1128. }
  1129. }
  1130. wpa_printf(MSG_INFO, "PBKDF2-SHA1 test cases (RFC 6070):");
  1131. for (i = 0; i < NUM_RFC6070_TESTS; i++) {
  1132. u8 dk[25];
  1133. const struct rfc6070_test *test = &rfc6070_tests[i];
  1134. if (pbkdf2_sha1(test->p, (const u8 *) test->s, strlen(test->s),
  1135. test->c, dk, test->dk_len) == 0 &&
  1136. os_memcmp(dk, test->dk, test->dk_len) == 0)
  1137. wpa_printf(MSG_INFO, "Test case %d - OK", i);
  1138. else {
  1139. wpa_printf(MSG_INFO, "Test case %d - FAILED!", i);
  1140. ret++;
  1141. }
  1142. }
  1143. if (!ret)
  1144. wpa_printf(MSG_INFO, "SHA1 test cases passed");
  1145. return ret;
  1146. }
  1147. const struct {
  1148. char *data;
  1149. u8 hash[32];
  1150. } tests[] = {
  1151. {
  1152. "abc",
  1153. {
  1154. 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea,
  1155. 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23,
  1156. 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
  1157. 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad
  1158. }
  1159. },
  1160. {
  1161. "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
  1162. {
  1163. 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8,
  1164. 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39,
  1165. 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67,
  1166. 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1
  1167. }
  1168. }
  1169. };
  1170. const struct hmac_test {
  1171. u8 key[80];
  1172. size_t key_len;
  1173. u8 data[128];
  1174. size_t data_len;
  1175. u8 hash[32];
  1176. } hmac_tests[] = {
  1177. /* draft-ietf-ipsec-ciph-sha-256-01.txt */
  1178. {
  1179. {
  1180. 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
  1181. 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
  1182. 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
  1183. 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20
  1184. },
  1185. 32,
  1186. "abc", 3,
  1187. {
  1188. 0xa2, 0x1b, 0x1f, 0x5d, 0x4c, 0xf4, 0xf7, 0x3a,
  1189. 0x4d, 0xd9, 0x39, 0x75, 0x0f, 0x7a, 0x06, 0x6a,
  1190. 0x7f, 0x98, 0xcc, 0x13, 0x1c, 0xb1, 0x6a, 0x66,
  1191. 0x92, 0x75, 0x90, 0x21, 0xcf, 0xab, 0x81, 0x81
  1192. }
  1193. },
  1194. {
  1195. {
  1196. 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
  1197. 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
  1198. 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
  1199. 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20
  1200. },
  1201. 32,
  1202. "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
  1203. 56,
  1204. {
  1205. 0x10, 0x4f, 0xdc, 0x12, 0x57, 0x32, 0x8f, 0x08,
  1206. 0x18, 0x4b, 0xa7, 0x31, 0x31, 0xc5, 0x3c, 0xae,
  1207. 0xe6, 0x98, 0xe3, 0x61, 0x19, 0x42, 0x11, 0x49,
  1208. 0xea, 0x8c, 0x71, 0x24, 0x56, 0x69, 0x7d, 0x30
  1209. }
  1210. },
  1211. {
  1212. {
  1213. 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
  1214. 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
  1215. 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
  1216. 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20
  1217. },
  1218. 32,
  1219. "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"
  1220. "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
  1221. 112,
  1222. {
  1223. 0x47, 0x03, 0x05, 0xfc, 0x7e, 0x40, 0xfe, 0x34,
  1224. 0xd3, 0xee, 0xb3, 0xe7, 0x73, 0xd9, 0x5a, 0xab,
  1225. 0x73, 0xac, 0xf0, 0xfd, 0x06, 0x04, 0x47, 0xa5,
  1226. 0xeb, 0x45, 0x95, 0xbf, 0x33, 0xa9, 0xd1, 0xa3
  1227. }
  1228. },
  1229. {
  1230. {
  1231. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  1232. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  1233. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  1234. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b
  1235. },
  1236. 32,
  1237. "Hi There",
  1238. 8,
  1239. {
  1240. 0x19, 0x8a, 0x60, 0x7e, 0xb4, 0x4b, 0xfb, 0xc6,
  1241. 0x99, 0x03, 0xa0, 0xf1, 0xcf, 0x2b, 0xbd, 0xc5,
  1242. 0xba, 0x0a, 0xa3, 0xf3, 0xd9, 0xae, 0x3c, 0x1c,
  1243. 0x7a, 0x3b, 0x16, 0x96, 0xa0, 0xb6, 0x8c, 0xf7
  1244. }
  1245. },
  1246. {
  1247. "Jefe",
  1248. 4,
  1249. "what do ya want for nothing?",
  1250. 28,
  1251. {
  1252. 0x5b, 0xdc, 0xc1, 0x46, 0xbf, 0x60, 0x75, 0x4e,
  1253. 0x6a, 0x04, 0x24, 0x26, 0x08, 0x95, 0x75, 0xc7,
  1254. 0x5a, 0x00, 0x3f, 0x08, 0x9d, 0x27, 0x39, 0x83,
  1255. 0x9d, 0xec, 0x58, 0xb9, 0x64, 0xec, 0x38, 0x43
  1256. }
  1257. },
  1258. {
  1259. {
  1260. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1261. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1262. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1263. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa
  1264. },
  1265. 32,
  1266. {
  1267. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1268. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1269. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1270. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1271. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1272. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  1273. 0xdd, 0xdd
  1274. },
  1275. 50,
  1276. {
  1277. 0xcd, 0xcb, 0x12, 0x20, 0xd1, 0xec, 0xcc, 0xea,
  1278. 0x91, 0xe5, 0x3a, 0xba, 0x30, 0x92, 0xf9, 0x62,
  1279. 0xe5, 0x49, 0xfe, 0x6c, 0xe9, 0xed, 0x7f, 0xdc,
  1280. 0x43, 0x19, 0x1f, 0xbd, 0xe4, 0x5c, 0x30, 0xb0
  1281. }
  1282. },
  1283. {
  1284. {
  1285. 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
  1286. 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
  1287. 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
  1288. 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20,
  1289. 0x21, 0x22, 0x23, 0x24, 0x25
  1290. },
  1291. 37,
  1292. {
  1293. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1294. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1295. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1296. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1297. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1298. 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
  1299. 0xcd, 0xcd
  1300. },
  1301. 50,
  1302. {
  1303. 0xd4, 0x63, 0x3c, 0x17, 0xf6, 0xfb, 0x8d, 0x74,
  1304. 0x4c, 0x66, 0xde, 0xe0, 0xf8, 0xf0, 0x74, 0x55,
  1305. 0x6e, 0xc4, 0xaf, 0x55, 0xef, 0x07, 0x99, 0x85,
  1306. 0x41, 0x46, 0x8e, 0xb4, 0x9b, 0xd2, 0xe9, 0x17
  1307. }
  1308. },
  1309. {
  1310. {
  1311. 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
  1312. 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
  1313. 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
  1314. 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c
  1315. },
  1316. 32,
  1317. "Test With Truncation",
  1318. 20,
  1319. {
  1320. 0x75, 0x46, 0xaf, 0x01, 0x84, 0x1f, 0xc0, 0x9b,
  1321. 0x1a, 0xb9, 0xc3, 0x74, 0x9a, 0x5f, 0x1c, 0x17,
  1322. 0xd4, 0xf5, 0x89, 0x66, 0x8a, 0x58, 0x7b, 0x27,
  1323. 0x00, 0xa9, 0xc9, 0x7c, 0x11, 0x93, 0xcf, 0x42
  1324. }
  1325. },
  1326. {
  1327. {
  1328. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1329. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1330. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1331. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1332. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1333. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1334. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1335. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1336. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1337. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa
  1338. },
  1339. 80,
  1340. "Test Using Larger Than Block-Size Key - Hash Key First",
  1341. 54,
  1342. {
  1343. 0x69, 0x53, 0x02, 0x5e, 0xd9, 0x6f, 0x0c, 0x09,
  1344. 0xf8, 0x0a, 0x96, 0xf7, 0x8e, 0x65, 0x38, 0xdb,
  1345. 0xe2, 0xe7, 0xb8, 0x20, 0xe3, 0xdd, 0x97, 0x0e,
  1346. 0x7d, 0xdd, 0x39, 0x09, 0x1b, 0x32, 0x35, 0x2f
  1347. }
  1348. },
  1349. {
  1350. {
  1351. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1352. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1353. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1354. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1355. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1356. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1357. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1358. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1359. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  1360. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa
  1361. },
  1362. 80,
  1363. "Test Using Larger Than Block-Size Key and Larger Than One "
  1364. "Block-Size Data",
  1365. 73,
  1366. {
  1367. 0x63, 0x55, 0xac, 0x22, 0xe8, 0x90, 0xd0, 0xa3,
  1368. 0xc8, 0x48, 0x1a, 0x5c, 0xa4, 0x82, 0x5b, 0xc8,
  1369. 0x84, 0xd3, 0xe7, 0xa1, 0xff, 0x98, 0xa2, 0xfc,
  1370. 0x2a, 0xc7, 0xd8, 0xe0, 0x64, 0xc3, 0xb2, 0xe6
  1371. }
  1372. }
  1373. };
  1374. static int test_sha256(void)
  1375. {
  1376. unsigned int i;
  1377. u8 hash[32];
  1378. const u8 *addr[2];
  1379. size_t len[2];
  1380. int errors = 0;
  1381. for (i = 0; i < ARRAY_SIZE(tests); i++) {
  1382. wpa_printf(MSG_INFO, "SHA256 test case %d:", i + 1);
  1383. addr[0] = (u8 *) tests[i].data;
  1384. len[0] = strlen(tests[i].data);
  1385. sha256_vector(1, addr, len, hash);
  1386. if (memcmp(hash, tests[i].hash, 32) != 0) {
  1387. wpa_printf(MSG_INFO, " FAIL");
  1388. errors++;
  1389. } else
  1390. wpa_printf(MSG_INFO, " OK");
  1391. if (len[0]) {
  1392. addr[0] = (u8 *) tests[i].data;
  1393. len[0] = 1;
  1394. addr[1] = (u8 *) tests[i].data + 1;
  1395. len[1] = strlen(tests[i].data) - 1;
  1396. sha256_vector(2, addr, len, hash);
  1397. if (memcmp(hash, tests[i].hash, 32) != 0) {
  1398. wpa_printf(MSG_INFO, " FAIL");
  1399. errors++;
  1400. } else
  1401. wpa_printf(MSG_INFO, " OK");
  1402. }
  1403. }
  1404. for (i = 0; i < ARRAY_SIZE(hmac_tests); i++) {
  1405. const struct hmac_test *t = &hmac_tests[i];
  1406. wpa_printf(MSG_INFO, "HMAC-SHA256 test case %d:", i + 1);
  1407. if (hmac_sha256(t->key, t->key_len, t->data, t->data_len,
  1408. hash) < 0 ||
  1409. os_memcmp(hash, t->hash, 32) != 0) {
  1410. wpa_printf(MSG_INFO, " FAIL");
  1411. errors++;
  1412. } else
  1413. wpa_printf(MSG_INFO, " OK");
  1414. addr[0] = t->data;
  1415. len[0] = t->data_len;
  1416. if (hmac_sha256_vector(t->key, t->key_len, 1, addr, len,
  1417. hash) < 0 ||
  1418. os_memcmp(hash, t->hash, 32) != 0) {
  1419. wpa_printf(MSG_INFO, " FAIL");
  1420. errors++;
  1421. } else
  1422. wpa_printf(MSG_INFO, " OK");
  1423. if (len[0]) {
  1424. addr[0] = t->data;
  1425. len[0] = 1;
  1426. addr[1] = t->data + 1;
  1427. len[1] = t->data_len - 1;
  1428. if (hmac_sha256_vector(t->key, t->key_len, 2, addr, len,
  1429. hash) < 0 ||
  1430. os_memcmp(hash, t->hash, 32) != 0) {
  1431. wpa_printf(MSG_INFO, " FAIL");
  1432. errors++;
  1433. } else
  1434. wpa_printf(MSG_INFO, " OK");
  1435. }
  1436. }
  1437. wpa_printf(MSG_INFO, "Test IEEE 802.11r KDF");
  1438. sha256_prf((u8 *) "abc", 3, "KDF test", (u8 *) "data", 4,
  1439. hash, sizeof(hash));
  1440. /* TODO: add proper test case for this */
  1441. if (!errors)
  1442. wpa_printf(MSG_INFO, "SHA256 test cases passed");
  1443. return errors;
  1444. }
  1445. static int test_ms_funcs(void)
  1446. {
  1447. /* Test vector from RFC2759 example */
  1448. char *username = "User";
  1449. char *password = "clientPass";
  1450. u8 auth_challenge[] = {
  1451. 0x5B, 0x5D, 0x7C, 0x7D, 0x7B, 0x3F, 0x2F, 0x3E,
  1452. 0x3C, 0x2C, 0x60, 0x21, 0x32, 0x26, 0x26, 0x28
  1453. };
  1454. u8 peer_challenge[] = {
  1455. 0x21, 0x40, 0x23, 0x24, 0x25, 0x5E, 0x26, 0x2A,
  1456. 0x28, 0x29, 0x5F, 0x2B, 0x3A, 0x33, 0x7C, 0x7E
  1457. };
  1458. u8 password_hash[] = {
  1459. 0x44, 0xEB, 0xBA, 0x8D, 0x53, 0x12, 0xB8, 0xD6,
  1460. 0x11, 0x47, 0x44, 0x11, 0xF5, 0x69, 0x89, 0xAE
  1461. };
  1462. u8 nt_response[] = {
  1463. 0x82, 0x30, 0x9E, 0xCD, 0x8D, 0x70, 0x8B, 0x5E,
  1464. 0xA0, 0x8F, 0xAA, 0x39, 0x81, 0xCD, 0x83, 0x54,
  1465. 0x42, 0x33, 0x11, 0x4A, 0x3D, 0x85, 0xD6, 0xDF
  1466. };
  1467. u8 password_hash_hash[] = {
  1468. 0x41, 0xC0, 0x0C, 0x58, 0x4B, 0xD2, 0xD9, 0x1C,
  1469. 0x40, 0x17, 0xA2, 0xA1, 0x2F, 0xA5, 0x9F, 0x3F
  1470. };
  1471. u8 authenticator_response[] = {
  1472. 0x40, 0x7A, 0x55, 0x89, 0x11, 0x5F, 0xD0, 0xD6,
  1473. 0x20, 0x9F, 0x51, 0x0F, 0xE9, 0xC0, 0x45, 0x66,
  1474. 0x93, 0x2C, 0xDA, 0x56
  1475. };
  1476. u8 master_key[] = {
  1477. 0xFD, 0xEC, 0xE3, 0x71, 0x7A, 0x8C, 0x83, 0x8C,
  1478. 0xB3, 0x88, 0xE5, 0x27, 0xAE, 0x3C, 0xDD, 0x31
  1479. };
  1480. u8 send_start_key[] = {
  1481. 0x8B, 0x7C, 0xDC, 0x14, 0x9B, 0x99, 0x3A, 0x1B,
  1482. 0xA1, 0x18, 0xCB, 0x15, 0x3F, 0x56, 0xDC, 0xCB
  1483. };
  1484. u8 buf[32];
  1485. int errors = 0;
  1486. if (nt_password_hash((u8 *) password, os_strlen(password), buf) ||
  1487. os_memcmp(password_hash, buf, sizeof(password_hash)) != 0) {
  1488. wpa_printf(MSG_ERROR, "nt_password_hash failed");
  1489. errors++;
  1490. }
  1491. if (generate_nt_response(auth_challenge, peer_challenge,
  1492. (u8 *) username, os_strlen(username),
  1493. (u8 *) password, os_strlen(password), buf) ||
  1494. os_memcmp(nt_response, buf, sizeof(nt_response)) != 0) {
  1495. wpa_printf(MSG_ERROR, "generate_nt_response failed");
  1496. errors++;
  1497. }
  1498. if (hash_nt_password_hash(password_hash, buf) ||
  1499. os_memcmp(password_hash_hash, buf,
  1500. sizeof(password_hash_hash)) != 0) {
  1501. wpa_printf(MSG_ERROR, "hash_nt_password_hash failed");
  1502. errors++;
  1503. }
  1504. if (generate_authenticator_response((u8 *) password,
  1505. os_strlen(password),
  1506. peer_challenge, auth_challenge,
  1507. (u8 *) username,
  1508. os_strlen(username),
  1509. nt_response, buf) ||
  1510. os_memcmp(authenticator_response, buf,
  1511. sizeof(authenticator_response)) != 0) {
  1512. wpa_printf(MSG_ERROR, "generate_authenticator_response failed");
  1513. errors++;
  1514. }
  1515. if (get_master_key(password_hash_hash, nt_response, buf) ||
  1516. os_memcmp(master_key, buf, sizeof(master_key)) != 0) {
  1517. wpa_printf(MSG_ERROR, "get_master_key failed");
  1518. errors++;
  1519. }
  1520. if (get_asymetric_start_key(master_key, buf, sizeof(send_start_key),
  1521. 1, 1) ||
  1522. os_memcmp(send_start_key, buf, sizeof(send_start_key)) != 0) {
  1523. wpa_printf(MSG_ERROR, "get_asymetric_start_key failed");
  1524. errors++;
  1525. }
  1526. if (errors)
  1527. wpa_printf(MSG_ERROR, "ms_funcs: %d errors", errors);
  1528. else
  1529. wpa_printf(MSG_INFO, "ms_funcs test cases passed");
  1530. return errors;
  1531. }
  1532. int crypto_module_tests(void)
  1533. {
  1534. int ret = 0;
  1535. wpa_printf(MSG_INFO, "crypto module tests");
  1536. if (test_siv() ||
  1537. test_omac1() ||
  1538. test_eax() ||
  1539. test_cbc() ||
  1540. test_ecb() ||
  1541. test_key_wrap() ||
  1542. test_md5() ||
  1543. test_sha1() ||
  1544. test_sha256() ||
  1545. test_ms_funcs())
  1546. ret = -1;
  1547. return ret;
  1548. }