/* $OpenBSD: markus $ */ /* * Copyright (c) 2005 Markus Friedl * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include int debug = 0; enum { TST_KEY, TST_IV, TST_PLAIN, TST_CIPHER, TST_NUM }; /* Test vectors from RFC 3686 */ struct { char *data[TST_NUM]; } tests[] = { /* 128 bit key */ { "AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E " "00 00 00 30", "00 00 00 00 00 00 00 00", "53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67", "E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" }, { "7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63 " "00 6C B6 DB", "C0 54 3B 59 DA 48 D9 0B", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F", "51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88 " "EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" }, { "76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC " "00 E0 01 7B", "27 77 7F 3F 4A 17 86 F0", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" /*"20 21 22 23"*/, "C1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D7 " "45 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 53" /*"25 B2 07 2F"*/ }, /* 192 bit key */ { "16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED " "86 3D 06 CC FD B7 85 15 " "00 00 00 48", "36 73 3C 14 7D 6D 93 CB", "53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67", "4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28", }, { "7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C " "67 8C 3D B8 E6 F6 A9 1A " "00 96 B0 3B", "02 0C 6E AD C2 CB 50 0D", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F", "45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F " "84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00", }, { "02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9B " "F5 9B 60 A7 86 D3 E0 FE " "00 07 BD FD", "5C BD 60 27 8D CC 09 12", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" /*"20 21 22 23"*/, "96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58 " "D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88" /*"AB EE 09 35"*/, }, /* 256 bit key */ { "77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C " "6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04 " "00 00 00 60", "DB 56 72 C9 7A A8 F0 B2", "53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67", "14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" }, { "F6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86 " "C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84 " "00 FA AC 24", "C1 58 5E F1 5A 43 D8 75", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F", "F0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9 " "B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C", }, { "FF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2 " "AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D " "00 1C C5 B7", "51 A5 1D 70 A1 C1 11 48", "00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F " "10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" /*"20 21 22 23"*/, "EB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AA " "B4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F" /*"1E C0 E6 B8"*/, }, }; static int syscrypt(const unsigned char *key, size_t klen, const unsigned char *iv, const unsigned char *in, unsigned char *out, size_t len, int encrypt) { struct session_op session; struct crypt_op cryp; int cryptodev_fd = -1, fd = -1; if ((cryptodev_fd = open("/dev/crypto", O_RDWR, 0)) < 0) { warn("/dev/crypto"); goto err; } if (ioctl(cryptodev_fd, CRIOGET, &fd) == -1) { warn("CRIOGET failed"); goto err; } memset(&session, 0, sizeof(session)); session.cipher = CRYPTO_AES_CTR; session.key = (caddr_t) key; session.keylen = klen; if (ioctl(fd, CIOCGSESSION, &session) == -1) { warn("CIOCGSESSION"); goto err; } memset(&cryp, 0, sizeof(cryp)); cryp.ses = session.ses; cryp.op = encrypt ? COP_ENCRYPT : COP_DECRYPT; cryp.flags = 0; cryp.len = len; cryp.src = (caddr_t) in; cryp.dst = (caddr_t) out; cryp.iv = (caddr_t) iv; cryp.mac = 0; if (ioctl(fd, CIOCCRYPT, &cryp) == -1) { warn("CIOCCRYPT"); goto err; } if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { warn("CIOCFSESSION"); goto err; } close(fd); close(cryptodev_fd); return (0); err: if (fd != -1) close(fd); if (cryptodev_fd != -1) close(cryptodev_fd); return (-1); } static int getallowsoft(void) { int mib[2], old; size_t olen; olen = sizeof(old); if (sysctlbyname("kern.cryptodevallowsoft", &old, &olen, NULL, 0) < 0) err(1, "sysctl failed"); return old; } static void setallowsoft(int new) { int mib[2], old; size_t olen, nlen; olen = nlen = sizeof(new); if (sysctlbyname("kern.cryptodevallowsoft", &old, &olen, &new, nlen) < 0) err(1, "sysctl failed"); } static int match(unsigned char *a, unsigned char *b, size_t len) { int i; if (memcmp(a, b, len) == 0) return (1); warnx("ciphertext mismatch"); for (i = 0; i < len; i++) printf("%2.2x", a[i]); printf("\n"); for (i = 0; i < len; i++) printf("%2.2x", b[i]); printf("\n"); return (0); } static int run(int num) { int i, fail = 1, len, j, length[TST_NUM]; u_long val; char *ep, *from; u_char *p, *data[TST_NUM]; for (i = 0; i < TST_NUM; i++) data[i] = NULL; for (i = 0; i < TST_NUM; i++) { from = tests[num].data[i]; if (debug) printf("%s\n", from); len = strlen(from); if ((p = malloc(len)) == NULL) { warn("malloc"); goto done; } errno = 0; for (j = 0; j < len; j++) { val = strtoul(&from[j*3], &ep, 16); p[j] = (u_char)val; if (*ep == '\0' || errno) break; } length[i] = j+1; data[i] = p; } len = length[TST_PLAIN]; if ((p = malloc(len)) == NULL) { warn("malloc"); return (1); } if (syscrypt(data[TST_KEY], length[TST_KEY], data[TST_IV], data[TST_PLAIN], p, length[TST_PLAIN], 0) < 0) { warnx("crypt with /dev/crypto failed"); goto done; } fail = !match(data[TST_CIPHER], p, len); printf("%s test vector %d\n", fail ? "FAILED" : "OK", num); done: for (i = 0; i < TST_NUM; i++) free(data[i]); return (fail); } int main(int argc, char **argv) { int allowed = 0, fail = 0, i; if (geteuid() == 0) { allowed = getallowsoft(); if (allowed == 0) setallowsoft(1); } for (i = 0; i < NELEM(tests); i++) fail += run(i); if (geteuid() == 0 && allowed == 0) setallowsoft(0); exit((fail > 0) ? 1 : 0); }