h_sha1hmac.c revision 1.2.4.2 1 1.2.4.2 yamt /* $NetBSD: h_sha1hmac.c,v 1.2.4.2 2014/05/22 11:42:17 yamt Exp $ */
2 1.2.4.2 yamt
3 1.2.4.2 yamt /*-
4 1.2.4.2 yamt * Copyright (c) 2014 The NetBSD Foundation, Inc.
5 1.2.4.2 yamt * All rights reserved.
6 1.2.4.2 yamt *
7 1.2.4.2 yamt * Redistribution and use in source and binary forms, with or without
8 1.2.4.2 yamt * modification, are permitted provided that the following conditions
9 1.2.4.2 yamt * are met:
10 1.2.4.2 yamt * 1. Redistributions of source code must retain the above copyright
11 1.2.4.2 yamt * notice, this list of conditions and the following disclaimer.
12 1.2.4.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
13 1.2.4.2 yamt * notice, this list of conditions and the following disclaimer in the
14 1.2.4.2 yamt * documentation and/or other materials provided with the distribution.
15 1.2.4.2 yamt *
16 1.2.4.2 yamt * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.2.4.2 yamt * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.2.4.2 yamt * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.2.4.2 yamt * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.2.4.2 yamt * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.2.4.2 yamt * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.2.4.2 yamt * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.2.4.2 yamt * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.2.4.2 yamt * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.2.4.2 yamt * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.2.4.2 yamt * POSSIBILITY OF SUCH DAMAGE.
27 1.2.4.2 yamt */
28 1.2.4.2 yamt
29 1.2.4.2 yamt #include <err.h>
30 1.2.4.2 yamt #include <fcntl.h>
31 1.2.4.2 yamt #include <stdio.h>
32 1.2.4.2 yamt #include <string.h>
33 1.2.4.2 yamt
34 1.2.4.2 yamt #include <sys/ioctl.h>
35 1.2.4.2 yamt #include <sys/time.h>
36 1.2.4.2 yamt
37 1.2.4.2 yamt #include <crypto/cryptodev.h>
38 1.2.4.2 yamt
39 1.2.4.2 yamt #define SHA1_HMAC_KEYLEN 20 /* Only key-length we support */
40 1.2.4.2 yamt
41 1.2.4.2 yamt /* Test data from RFC2202 */
42 1.2.4.2 yamt const struct {
43 1.2.4.2 yamt int num;
44 1.2.4.2 yamt size_t key_len;
45 1.2.4.2 yamt size_t len;
46 1.2.4.2 yamt unsigned char key[80];
47 1.2.4.2 yamt unsigned char data[80];
48 1.2.4.2 yamt unsigned char mac[20];
49 1.2.4.2 yamt } tests[] = {
50 1.2.4.2 yamt /* Test #1 */
51 1.2.4.2 yamt { 1, 20, 8,
52 1.2.4.2 yamt { 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
53 1.2.4.2 yamt 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
54 1.2.4.2 yamt 0x0b, 0x0b, 0x0b, 0x0b },
55 1.2.4.2 yamt "Hi There",
56 1.2.4.2 yamt { 0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64,
57 1.2.4.2 yamt 0xe2, 0x8b, 0xc0, 0xb6, 0xfb, 0x37, 0x8c, 0x8e,
58 1.2.4.2 yamt 0xf1, 0x46, 0xbe, 0x00 }
59 1.2.4.2 yamt },
60 1.2.4.2 yamt /* Test #2 */
61 1.2.4.2 yamt { 2, 4, 28,
62 1.2.4.2 yamt "Jefe",
63 1.2.4.2 yamt "what do ya want for nothing?",
64 1.2.4.2 yamt { 0xef, 0xfc, 0xdf, 0x6a, 0xe5, 0xeb, 0x2f, 0xa2,
65 1.2.4.2 yamt 0xd2, 0x74, 0x16, 0xd5, 0xf1, 0x84, 0xdf, 0x9c,
66 1.2.4.2 yamt 0x25, 0x9a, 0x7c, 0x79 }
67 1.2.4.2 yamt },
68 1.2.4.2 yamt /* Test #3 */
69 1.2.4.2 yamt { 3, 20, 50,
70 1.2.4.2 yamt { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
71 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
72 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa },
73 1.2.4.2 yamt { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
74 1.2.4.2 yamt 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
75 1.2.4.2 yamt 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
76 1.2.4.2 yamt 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
77 1.2.4.2 yamt 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
78 1.2.4.2 yamt 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
79 1.2.4.2 yamt 0xdd, 0xdd },
80 1.2.4.2 yamt { 0x12, 0x5d, 0x73, 0x42, 0xb9, 0xac, 0x11, 0xcd,
81 1.2.4.2 yamt 0x91, 0xa3, 0x9a, 0xf4, 0x8a, 0xa1, 0x7b, 0x4f,
82 1.2.4.2 yamt 0x63, 0xf1, 0x75, 0xd3 }
83 1.2.4.2 yamt },
84 1.2.4.2 yamt /* Test #4 */
85 1.2.4.2 yamt { 4, 25, 50,
86 1.2.4.2 yamt { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
87 1.2.4.2 yamt 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10,
88 1.2.4.2 yamt 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18,
89 1.2.4.2 yamt 0x19 },
90 1.2.4.2 yamt { 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
91 1.2.4.2 yamt 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
92 1.2.4.2 yamt 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
93 1.2.4.2 yamt 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
94 1.2.4.2 yamt 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
95 1.2.4.2 yamt 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
96 1.2.4.2 yamt 0xcd, 0xcd },
97 1.2.4.2 yamt { 0x4c, 0x90, 0x07, 0xf4, 0x02, 0x62, 0x50, 0xc6,
98 1.2.4.2 yamt 0xbc, 0x84, 0x14, 0xf9, 0xbf, 0x50, 0xc8, 0x6c,
99 1.2.4.2 yamt 0x2d, 0x72, 0x35, 0xda }
100 1.2.4.2 yamt },
101 1.2.4.2 yamt /* Test #5 */
102 1.2.4.2 yamt { 5, 20, 20,
103 1.2.4.2 yamt { 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
104 1.2.4.2 yamt 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
105 1.2.4.2 yamt 0x0c, 0x0c, 0x0c, 0x0c },
106 1.2.4.2 yamt "Test With Truncation",
107 1.2.4.2 yamt { 0x4c, 0x1a, 0x03, 0x42, 0x4b, 0x55, 0xe0, 0x7f,
108 1.2.4.2 yamt 0xe7, 0xf2, 0x7b, 0xe1, 0xd5, 0x8b, 0xb9, 0x32,
109 1.2.4.2 yamt 0x4a, 0x9a, 0x5a, 0x04 }
110 1.2.4.2 yamt },
111 1.2.4.2 yamt /* Test #6 */
112 1.2.4.2 yamt { 6, 80, 54,
113 1.2.4.2 yamt { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
114 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
115 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
116 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
117 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
118 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
119 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
120 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
121 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
122 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa },
123 1.2.4.2 yamt "Test Using Larger Than Block-Size Key - Hash Key First",
124 1.2.4.2 yamt { 0xaa, 0x4a, 0xe5, 0xe1, 0x52, 0x72, 0xd0, 0x0e,
125 1.2.4.2 yamt 0x95, 0x70, 0x56, 0x37, 0xce, 0x8a, 0x3b, 0x55,
126 1.2.4.2 yamt 0xed, 0x40, 0x21, 0x12 }
127 1.2.4.2 yamt },
128 1.2.4.2 yamt /* Test #7 */
129 1.2.4.2 yamt { 7, 80, 73,
130 1.2.4.2 yamt { 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
131 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
132 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
133 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
134 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
135 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
136 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
137 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
138 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
139 1.2.4.2 yamt 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa },
140 1.2.4.2 yamt "Test Using Larger Than Block-Size Key and Larger Than "
141 1.2.4.2 yamt "One Block-Size Data",
142 1.2.4.2 yamt { 0xe8, 0xe9, 0x9d, 0x0f, 0x45, 0x23, 0x7d, 0x78,
143 1.2.4.2 yamt 0x6d, 0x6b, 0xba, 0xa7, 0x96, 0x5c, 0x78, 0x08,
144 1.2.4.2 yamt 0xbb, 0xff, 0x1a, 0x91 }
145 1.2.4.2 yamt },
146 1.2.4.2 yamt };
147 1.2.4.2 yamt
148 1.2.4.2 yamt int
149 1.2.4.2 yamt main(void)
150 1.2.4.2 yamt {
151 1.2.4.2 yamt size_t i;
152 1.2.4.2 yamt int fd, res;
153 1.2.4.2 yamt struct session_op cs;
154 1.2.4.2 yamt struct crypt_op co;
155 1.2.4.2 yamt unsigned char buf[20];
156 1.2.4.2 yamt
157 1.2.4.2 yamt fd = open("/dev/crypto", O_RDWR, 0);
158 1.2.4.2 yamt if (fd < 0)
159 1.2.4.2 yamt err(1, "open");
160 1.2.4.2 yamt for (i = 0; i < __arraycount(tests); i++) {
161 1.2.4.2 yamt if (tests[i].key_len != SHA1_HMAC_KEYLEN)
162 1.2.4.2 yamt continue;
163 1.2.4.2 yamt
164 1.2.4.2 yamt memset(&cs, 0, sizeof(cs));
165 1.2.4.2 yamt cs.mac = CRYPTO_SHA1_HMAC;
166 1.2.4.2 yamt cs.mackeylen = tests[i].key_len;
167 1.2.4.2 yamt cs.mackey = __UNCONST(&tests[i].key);
168 1.2.4.2 yamt res = ioctl(fd, CIOCGSESSION, &cs);
169 1.2.4.2 yamt if (res < 0)
170 1.2.4.2 yamt err(1, "CIOCGSESSION test %d", tests[i].num);
171 1.2.4.2 yamt
172 1.2.4.2 yamt memset(&co, 0, sizeof(co));
173 1.2.4.2 yamt memset(buf, 0, sizeof(buf));
174 1.2.4.2 yamt co.ses = cs.ses;
175 1.2.4.2 yamt co.op = COP_ENCRYPT;
176 1.2.4.2 yamt co.len = tests[i].len;
177 1.2.4.2 yamt co.src = __UNCONST(&tests[i].data);
178 1.2.4.2 yamt co.mac = buf;
179 1.2.4.2 yamt res = ioctl(fd, CIOCCRYPT, &co);
180 1.2.4.2 yamt if (res < 0)
181 1.2.4.2 yamt err(1, "CIOCCRYPT test %d", tests[i].num);
182 1.2.4.2 yamt
183 1.2.4.2 yamt if (memcmp(co.mac, &tests[i].mac, sizeof(tests[i].mac)))
184 1.2.4.2 yamt errx(1, "verification failed test %d", tests[i].num);
185 1.2.4.2 yamt
186 1.2.4.2 yamt res = ioctl(fd, CIOCFSESSION, &cs.ses);
187 1.2.4.2 yamt if (res < 0)
188 1.2.4.2 yamt err(1, "CIOCFSESSION test %d", tests[i].num);
189 1.2.4.2 yamt }
190 1.2.4.2 yamt return 0;
191 1.2.4.2 yamt }
192