1 /* Copyright (c) 2015, Google Inc.
2 *
3 * Permission to use, copy, modify, and/or distribute this software for any
4 * purpose with or without fee is hereby granted, provided that the above
5 * copyright notice and this permission notice appear in all copies.
6 *
7 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
15 #include <stdio.h>
16
17 #include <algorithm>
18
19 #include <openssl/cipher.h>
20 #include <openssl/cmac.h>
21 #include <openssl/mem.h>
22
23 #include "../test/test_util.h"
24
25
dump(const uint8_t * got,const uint8_t * want,size_t len)26 static void dump(const uint8_t *got, const uint8_t *want, size_t len) {
27 hexdump(stderr, "got :", got, len);
28 hexdump(stderr, "want:", want, len);
29 fflush(stderr);
30 }
31
test(const char * name,const uint8_t * key,size_t key_len,const uint8_t * msg,size_t msg_len,const uint8_t * expected)32 static int test(const char *name, const uint8_t *key, size_t key_len,
33 const uint8_t *msg, size_t msg_len, const uint8_t *expected) {
34 uint8_t out[16];
35
36 if (!AES_CMAC(out, key, key_len, msg, msg_len)) {
37 fprintf(stderr, "%s: AES_CMAC failed\n", name);
38 return 0;
39 }
40
41 if (CRYPTO_memcmp(out, expected, sizeof(out)) != 0) {
42 fprintf(stderr, "%s: CMAC result differs:\n", name);
43 dump(out, expected, sizeof(out));
44 return 0;
45 }
46
47 bssl::UniquePtr<CMAC_CTX> ctx(CMAC_CTX_new());
48 if (!ctx || !CMAC_Init(ctx.get(), key, key_len, EVP_aes_128_cbc(), NULL)) {
49 fprintf(stderr, "%s: CMAC_Init failed.\n", name);
50 return 0;
51 }
52
53 for (unsigned chunk_size = 1; chunk_size <= msg_len; chunk_size++) {
54 if (!CMAC_Reset(ctx.get())) {
55 fprintf(stderr, "%s/%u: CMAC_Reset failed.\n", name, chunk_size);
56 return 0;
57 }
58
59 size_t done = 0;
60 while (done < msg_len) {
61 size_t todo = std::min(msg_len - done, static_cast<size_t>(chunk_size));
62 if (!CMAC_Update(ctx.get(), msg + done, todo)) {
63 fprintf(stderr, "%s/%u: CMAC_Update failed.\n", name, chunk_size);
64 return 0;
65 }
66
67 done += todo;
68 }
69
70 size_t out_len;
71 if (!CMAC_Final(ctx.get(), out, &out_len)) {
72 fprintf(stderr, "%s/%u: CMAC_Final failed.\n", name, chunk_size);
73 return 0;
74 }
75
76 if (out_len != sizeof(out)) {
77 fprintf(stderr, "%s/%u: incorrect out_len: %u.\n", name, chunk_size,
78 static_cast<unsigned>(out_len));
79 return 0;
80 }
81
82 if (CRYPTO_memcmp(out, expected, sizeof(out)) != 0) {
83 fprintf(stderr, "%s/%u: CMAC result differs:\n", name, chunk_size);
84 dump(out, expected, sizeof(out));
85 return 0;
86 }
87 }
88
89 return 1;
90 }
91
rfc_4493_test_vectors(void)92 static int rfc_4493_test_vectors(void) {
93 static const uint8_t kKey[16] = {
94 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
95 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c,
96 };
97 static const uint8_t kOut1[16] = {
98 0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28,
99 0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46,
100 };
101 static const uint8_t kMsg2[] = {
102 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
103 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
104 };
105 static const uint8_t kOut2[16] = {
106 0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44,
107 0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c,
108 };
109 static const uint8_t kMsg3[] = {
110 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
111 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
112 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
113 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
114 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,
115 };
116 static const uint8_t kOut3[16] = {
117 0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30,
118 0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27,
119 };
120 static const uint8_t kMsg4[] = {
121 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
122 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
123 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
124 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
125 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,
126 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
127 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,
128 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10,
129 };
130 static const uint8_t kOut4[16] = {
131 0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92,
132 0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe,
133 };
134
135 if (!test("RFC 4493 #1", kKey, sizeof(kKey), NULL, 0, kOut1) ||
136 !test("RFC 4493 #2", kKey, sizeof(kKey), kMsg2, sizeof(kMsg2), kOut2) ||
137 !test("RFC 4493 #3", kKey, sizeof(kKey), kMsg3, sizeof(kMsg3), kOut3) ||
138 !test("RFC 4493 #4", kKey, sizeof(kKey), kMsg4, sizeof(kMsg4), kOut4)) {
139 return 0;
140 }
141
142 return 1;
143 }
144
main(int argc,char ** argv)145 int main(int argc, char **argv) {
146 if (!rfc_4493_test_vectors()) {
147 return 1;
148 }
149
150 printf("PASS\n");
151 return 0;
152 }
153