Imported Upstream version 3.3.5
[platform/upstream/gnutls.git] / lib / crypto-selftests.c
1 /*
2  * Copyright (C) 2013 Red Hat
3  *
4  * Author: Nikos Mavrogiannopoulos
5  *
6  * This file is part of GnuTLS.
7  *
8  * The GnuTLS is free software; you can redistribute it and/or
9  * modify it under the terms of the GNU Lesser General Public License
10  * as published by the Free Software Foundation; either version 2.1 of
11  * the License, or (at your option) any later version.
12  *
13  * This library is distributed in the hope that it will be useful, but
14  * WITHOUT ANY WARRANTY; without even the implied warranty of
15  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
16  * Lesser General Public License for more details.
17  *
18  * You should have received a copy of the GNU Lesser General Public License
19  * along with this program.  If not, see <http://www.gnu.org/licenses/>
20  *
21  */
22
23 #include <gnutls_int.h>
24 #include <gnutls_errors.h>
25 #include <gnutls_cipher_int.h>
26 #include <gnutls_datum.h>
27 #include <gnutls/crypto.h>
28 #include <gnutls/self-test.h>
29 #include <gnutls_errors.h>
30 #include <random.h>
31 #include <crypto.h>
32
33 #define STR(tag, tag_size, val) \
34         .tag = (uint8_t*)val, \
35         .tag_size = (sizeof(val)-1)
36
37 #define V(x) (x), (sizeof(x)/sizeof(x[0]))
38
39
40 /* This does check the AES and SHA implementation against test vectors.
41  * This should not run under valgrind in order to use the native
42  * cpu instructions (AES-NI or padlock).
43  */
44
45 struct cipher_vectors_st {
46         const uint8_t *key;
47         unsigned int key_size;
48
49         const uint8_t *plaintext;
50         unsigned int plaintext_size;
51         const uint8_t *ciphertext;      /* also of plaintext_size */
52
53         const uint8_t *iv;
54         unsigned int iv_size;
55 };
56
57 struct cipher_aead_vectors_st {
58         const uint8_t *key;
59         unsigned int key_size;
60
61         const uint8_t *auth;
62         unsigned int auth_size;
63
64         const uint8_t *plaintext;
65         unsigned int plaintext_size;
66         const uint8_t *ciphertext;      /* also of plaintext_size */
67
68         unsigned int iv_size;
69         const uint8_t *iv;
70         const uint8_t *tag;
71 };
72
73 const struct cipher_aead_vectors_st aes128_gcm_vectors[] = {
74         {
75          STR(key, key_size,
76              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
77          .auth = NULL,
78          .auth_size = 0,
79          .plaintext = NULL,
80          .plaintext_size = 0,
81          .ciphertext = NULL,
82          STR(iv, iv_size,
83              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
84          .tag = (void *)
85          "\x58\xe2\xfc\xce\xfa\x7e\x30\x61\x36\x7f\x1d\x57\xa4\xe7\x45\x5a"},
86         {
87          STR(key, key_size,
88              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
89          .auth = NULL,
90          .auth_size = 0,
91          STR(plaintext, plaintext_size,
92              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
93          .ciphertext = (void *)
94          "\x03\x88\xda\xce\x60\xb6\xa3\x92\xf3\x28\xc2\xb9\x71\xb2\xfe\x78",
95          STR(iv, iv_size,
96              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
97          .tag = (void *)
98          "\xab\x6e\x47\xd4\x2c\xec\x13\xbd\xf5\x3a\x67\xb2\x12\x57\xbd\xdf"},
99         {
100          STR(key, key_size,
101              "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
102          .auth = (void *)
103          "\xfe\xed\xfa\xce\xde\xad\xbe\xef\xfe\xed\xfa\xce\xde\xad\xbe\xef\xab\xad\xda\xd2",
104          .auth_size = 20,
105          STR(plaintext, plaintext_size,
106              "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39"),
107          .ciphertext = (void *)
108          "\x42\x83\x1e\xc2\x21\x77\x74\x24\x4b\x72\x21\xb7\x84\xd0\xd4\x9c\xe3\xaa\x21\x2f\x2c\x02\xa4\xe0\x35\xc1\x7e\x23\x29\xac\xa1\x2e\x21\xd5\x14\xb2\x54\x66\x93\x1c\x7d\x8f\x6a\x5a\xac\x84\xaa\x05\x1b\xa3\x0b\x39\x6a\x0a\xac\x97\x3d\x58\xe0\x91",
109          STR(iv, iv_size,
110              "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
111          .tag = (void *)
112          "\x5b\xc9\x4f\xbc\x32\x21\xa5\xdb\x94\xfa\xe9\x5a\xe7\x12\x1a\x47"}
113 };
114
115 const struct cipher_aead_vectors_st aes256_gcm_vectors[] = {
116         {
117          STR(key, key_size,
118              "\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08\xfe\xff\xe9\x92\x86\x65\x73\x1c\x6d\x6a\x8f\x94\x67\x30\x83\x08"),
119          .auth = NULL,
120          .auth_size = 0,
121          STR(plaintext, plaintext_size,
122              "\xd9\x31\x32\x25\xf8\x84\x06\xe5\xa5\x59\x09\xc5\xaf\xf5\x26\x9a\x86\xa7\xa9\x53\x15\x34\xf7\xda\x2e\x4c\x30\x3d\x8a\x31\x8a\x72\x1c\x3c\x0c\x95\x95\x68\x09\x53\x2f\xcf\x0e\x24\x49\xa6\xb5\x25\xb1\x6a\xed\xf5\xaa\x0d\xe6\x57\xba\x63\x7b\x39\x1a\xaf\xd2\x55"),
123          .ciphertext =
124          (uint8_t *)
125          "\x52\x2d\xc1\xf0\x99\x56\x7d\x07\xf4\x7f\x37\xa3\x2a\x84\x42\x7d\x64\x3a\x8c\xdc\xbf\xe5\xc0\xc9\x75\x98\xa2\xbd\x25\x55\xd1\xaa\x8c\xb0\x8e\x48\x59\x0d\xbb\x3d\xa7\xb0\x8b\x10\x56\x82\x88\x38\xc5\xf6\x1e\x63\x93\xba\x7a\x0a\xbc\xc9\xf6\x62\x89\x80\x15\xad",
126          STR(iv, iv_size,
127              "\xca\xfe\xba\xbe\xfa\xce\xdb\xad\xde\xca\xf8\x88"),
128          .tag =
129          (void *)
130          "\xb0\x94\xda\xc5\xd9\x34\x71\xbd\xec\x1a\x50\x22\x70\xe3\xcc\x6c"},
131
132 };
133
134 const struct cipher_vectors_st aes128_cbc_vectors[] = {
135         {
136          STR(key, key_size,
137              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
138          STR(plaintext, plaintext_size,
139              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
140          .ciphertext = (uint8_t *)
141          "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d",
142          STR(iv, iv_size,
143              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
144          },
145         {
146          STR(key, key_size,
147              "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c"),
148          STR(plaintext, plaintext_size,
149              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
150          .ciphertext =
151          (uint8_t *)
152          "\x50\x86\xcb\x9b\x50\x72\x19\xee\x95\xdb\x11\x3a\x91\x76\x78\xb2",
153          STR(iv, iv_size,
154              "\x76\x49\xab\xac\x81\x19\xb2\x46\xce\xe9\x8e\x9b\x12\xe9\x19\x7d"),
155          },
156 };
157
158 const struct cipher_vectors_st aes192_cbc_vectors[] = {
159         {
160          STR(key, key_size,
161              "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
162          STR(plaintext, plaintext_size,
163              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
164          .ciphertext = (uint8_t *)
165          "\x4f\x02\x1d\xb2\x43\xbc\x63\x3d\x71\x78\x18\x3a\x9f\xa0\x71\xe8",
166          STR(iv, iv_size,
167              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
168          },
169         {
170          STR(key, key_size,
171              "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b"),
172          STR(plaintext, plaintext_size,
173              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
174          .ciphertext = (uint8_t *)
175          "\xb4\xd9\xad\xa9\xad\x7d\xed\xf4\xe5\xe7\x38\x76\x3f\x69\x14\x5a",
176          STR(iv, iv_size,
177              "\x4F\x02\x1D\xB2\x43\xBC\x63\x3D\x71\x78\x18\x3A\x9F\xA0\x71\xE8"),
178          },
179 };
180
181 const struct cipher_vectors_st aes256_cbc_vectors[] = {
182         {
183          STR(key, key_size,
184              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
185          STR(plaintext, plaintext_size,
186              "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a"),
187          .ciphertext = (uint8_t *)
188          "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6",
189          STR(iv, iv_size,
190              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F"),
191          },
192         {
193          STR(key, key_size,
194              "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4"),
195          STR(plaintext, plaintext_size,
196              "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51"),
197          .ciphertext = (uint8_t *)
198          "\x9c\xfc\x4e\x96\x7e\xdb\x80\x8d\x67\x9f\x77\x7b\xc6\x70\x2c\x7d",
199          STR(iv, iv_size,
200              "\xF5\x8C\x4C\x04\xD6\xE5\xF1\xBA\x77\x9E\xAB\xFB\x5F\x7B\xFB\xD6"),
201          },
202 };
203
204 const struct cipher_vectors_st tdes_cbc_vectors[] = {
205 /* First 2 from https://www.cosic.esat.kuleuven.be/nessie/testvectors/bc/des/Triple-Des-3-Key-192-64.unverified.test-vectors */
206         {
207          STR(key, key_size,
208              "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17"),
209          STR(plaintext, plaintext_size,
210              "\x98\x26\x62\x60\x55\x53\x24\x4D"),
211          .ciphertext = (uint8_t *)
212          "\x00\x11\x22\x33\x44\x55\x66\x77",
213          STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
214          },
215         {
216          STR(key, key_size,
217              "\x2B\xD6\x45\x9F\x82\xC5\xB3\x00\x95\x2C\x49\x10\x48\x81\xFF\x48\x2B\xD6\x45\x9F\x82\xC5\xB3\x00"),
218          STR(plaintext, plaintext_size,
219              "\x85\x98\x53\x8A\x8E\xCF\x11\x7D"),
220          .ciphertext = (uint8_t *)
221          "\xEA\x02\x47\x14\xAD\x5C\x4D\x84",
222          STR(iv, iv_size, "\x00\x00\x00\x00\x00\x00\x00\x00"),
223          },
224 };
225
226 const struct cipher_vectors_st arcfour_vectors[] = { /* RFC6229 */
227         {
228          STR(key, key_size,
229              "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10"),
230          STR(plaintext, plaintext_size,
231              "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"),
232          .ciphertext = (uint8_t *)
233          "\x9a\xc7\xcc\x9a\x60\x9d\x1e\xf7\xb2\x93\x28\x99\xcd\xe4\x1b\x97",
234          .iv = NULL,
235          .iv_size = 0
236         },
237 };
238
239 static int test_cipher(gnutls_cipher_algorithm_t cipher,
240                        const struct cipher_vectors_st *vectors,
241                        size_t vectors_size)
242 {
243         gnutls_cipher_hd_t hd;
244         int ret;
245         unsigned int i;
246         uint8_t tmp[128];
247         gnutls_datum_t key, iv = {NULL, 0};
248
249         for (i = 0; i < vectors_size; i++) {
250                 key.data = (void *) vectors[i].key;
251                 key.size = vectors[i].key_size;
252
253                 if (vectors[i].iv != NULL) {
254                         iv.data = (void *) vectors[i].iv;
255                         iv.size = gnutls_cipher_get_iv_size(cipher);
256                 }
257
258                 if (iv.size != vectors[i].iv_size)
259                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
260
261                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
262                 if (ret < 0) {
263                         _gnutls_debug_log("error initializing: %s\n",
264                                           gnutls_cipher_get_name(cipher));
265                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
266                 }
267
268                 ret =
269                     gnutls_cipher_encrypt2(hd,
270                                            vectors[i].plaintext,
271                                            vectors[i].plaintext_size,
272                                            tmp, sizeof(tmp));
273                 if (ret < 0)
274                         return 0;
275
276                 gnutls_cipher_deinit(hd);
277
278                 if (memcmp
279                     (tmp, vectors[i].ciphertext,
280                      vectors[i].plaintext_size) != 0) {
281                         _gnutls_debug_log("%s test vector %d failed!\n",
282                                           gnutls_cipher_get_name(cipher),
283                                           i);
284                 }
285         }
286
287         iv.size = gnutls_cipher_get_iv_size(cipher);
288
289         for (i = 0; i < vectors_size; i++) {
290                 key.data = (void *) vectors[i].key;
291                 key.size = vectors[i].key_size;
292
293                 iv.data = (void *) vectors[i].iv;
294
295                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
296                 if (ret < 0)
297                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
298
299                 ret =
300                     gnutls_cipher_decrypt2(hd,
301                                            vectors[i].ciphertext, 16, tmp,
302                                            sizeof(tmp));
303                 if (ret < 0) {
304                         _gnutls_debug_log
305                             ("%s decryption of test vector %d failed!\n",
306                              gnutls_cipher_get_name(cipher), i);
307                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
308                 }
309
310                 gnutls_cipher_deinit(hd);
311
312                 if (memcmp
313                     (tmp, vectors[i].plaintext,
314                      vectors[i].plaintext_size) != 0) {
315                         _gnutls_debug_log("%s test vector %d failed!\n",
316                                           gnutls_cipher_get_name(cipher),
317                                           i);
318                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
319                 }
320         }
321
322         _gnutls_debug_log
323             ("%s self check succeeded\n",
324              gnutls_cipher_get_name(cipher));
325
326         return 0;
327
328 }
329
330 /* AEAD modes */
331 static int test_cipher_aead(gnutls_cipher_algorithm_t cipher,
332                             const struct cipher_aead_vectors_st *vectors,
333                             size_t vectors_size)
334 {
335         gnutls_cipher_hd_t hd;
336         int ret;
337         unsigned int i;
338         uint8_t tmp[128];
339         gnutls_datum_t key, iv;
340
341         for (i = 0; i < vectors_size; i++) {
342                 memset(tmp, 0, sizeof(tmp));
343                 key.data = (void *) vectors[i].key;
344                 key.size = vectors[i].key_size;
345
346                 iv.data = (void *) vectors[i].iv;
347                 iv.size = gnutls_cipher_get_iv_size(cipher);
348
349                 if (iv.size != vectors[i].iv_size)
350                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
351
352                 ret = gnutls_cipher_init(&hd, cipher, &key, &iv);
353                 if (ret < 0) {
354                         _gnutls_debug_log("error initializing: %s\n",
355                                           gnutls_cipher_get_name(cipher));
356                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
357                 }
358
359                 if (vectors[i].auth_size > 0) {
360                         ret =
361                             gnutls_cipher_add_auth(hd,
362                                                    vectors[i].auth,
363                                                    vectors[i].auth_size);
364
365                         if (ret < 0)
366                                 return
367                                     gnutls_assert_val
368                                     (GNUTLS_E_SELF_TEST_ERROR);
369                 }
370
371                 if (vectors[i].plaintext_size > 0) {
372                         ret =
373                             gnutls_cipher_encrypt2(hd,
374                                                    vectors[i].plaintext,
375                                                    vectors
376                                                    [i].plaintext_size, tmp,
377                                                    sizeof(tmp));
378                         if (ret < 0)
379                                 return
380                                     gnutls_assert_val
381                                     (GNUTLS_E_SELF_TEST_ERROR);
382                 }
383
384
385                 if (vectors[i].plaintext_size > 0)
386                         if (memcmp
387                             (tmp, vectors[i].ciphertext,
388                              vectors[i].plaintext_size) != 0) {
389                                 _gnutls_debug_log
390                                     ("%s test vector %d failed!\n",
391                                      gnutls_cipher_get_name(cipher), i);
392                                 return
393                                     gnutls_assert_val
394                                     (GNUTLS_E_SELF_TEST_ERROR);
395                         }
396
397                 gnutls_cipher_tag(hd, tmp, 16);
398                 if (memcmp(tmp, vectors[i].tag, 16) != 0) {
399                         _gnutls_debug_log
400                             ("%s test vector %d failed (tag)!\n",
401                              gnutls_cipher_get_name(cipher), i);
402                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
403                 }
404
405                 gnutls_cipher_deinit(hd);
406         }
407
408         _gnutls_debug_log
409             ("%s self check succeeded\n",
410              gnutls_cipher_get_name(cipher));
411
412         return 0;
413
414 }
415
416 struct hash_vectors_st {
417         const uint8_t *plaintext;
418         unsigned int plaintext_size;
419         const uint8_t *output;
420         unsigned int output_size;
421 };
422
423 const struct hash_vectors_st md5_vectors[] = {
424         {
425          STR(plaintext, plaintext_size, "abcdefghijklmnopqrstuvwxyz"),
426          STR(output, output_size,
427              "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00\x7d\xfb\x49\x6c\xca\x67\xe1\x3b"),
428          },
429 };
430
431 const struct hash_vectors_st sha1_vectors[] = {
432         {
433          STR(plaintext, plaintext_size, "what do ya want for nothing?"),
434          STR(output, output_size,
435              "\x8f\x82\x03\x94\xf9\x53\x35\x18\x20\x45\xda\x24\xf3\x4d\xe5\x2b\xf8\xbc\x34\x32"),
436          },
437         {
438          STR(plaintext, plaintext_size,
439              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
440          STR(output, output_size,
441              "\xbe\xae\xd1\x6d\x65\x8e\xc7\x92\x9e\xdf\xd6\x2b\xfa\xfe\xac\x29\x9f\x0d\x74\x4d"),
442          },
443 };
444
445 const struct hash_vectors_st sha224_vectors[] = {
446         {
447          STR(plaintext, plaintext_size,
448              "The quick brown fox jumps over the lazy dog"),
449          STR(output, output_size,
450              "\x73\x0e\x10\x9b\xd7\xa8\xa3\x2b\x1c\xb9\xd9\xa0\x9a\xa2\x32\x5d\x24\x30\x58\x7d\xdb\xc0\xc3\x8b\xad\x91\x15\x25"),
451          },
452 };
453
454 const struct hash_vectors_st sha256_vectors[] = {
455         {
456          STR(plaintext, plaintext_size,
457              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
458          STR(output, output_size,
459              "\x24\x8d\x6a\x61\xd2\x06\x38\xb8\xe5\xc0\x26\x93\x0c\x3e\x60\x39\xa3\x3c\xe4\x59\x64\xff\x21\x67\xf6\xec\xed\xd4\x19\xdb\x06\xc1"),
460          },
461         {
462          STR(plaintext, plaintext_size,
463              "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"),
464          STR(output, output_size,
465              "\x50\xea\x82\x5d\x96\x84\xf4\x22\x9c\xa2\x9f\x1f\xec\x51\x15\x93\xe2\x81\xe4\x6a\x14\x0d\x81\xe0\x00\x5f\x8f\x68\x86\x69\xa0\x6c"),
466          },
467 };
468
469 const struct hash_vectors_st sha384_vectors[] = {
470         {
471          STR(plaintext, plaintext_size,
472              "The quick brown fox jumps over the lazy dog"),
473          STR(output, output_size,
474              "\xca\x73\x7f\x10\x14\xa4\x8f\x4c\x0b\x6d\xd4\x3c\xb1\x77\xb0\xaf\xd9\xe5\x16\x93\x67\x54\x4c\x49\x40\x11\xe3\x31\x7d\xbf\x9a\x50\x9c\xb1\xe5\xdc\x1e\x85\xa9\x41\xbb\xee\x3d\x7f\x2a\xfb\xc9\xb1"),
475          },
476 };
477
478 const struct hash_vectors_st sha512_vectors[] = {
479         {
480          STR(plaintext, plaintext_size,
481              "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu"),
482          STR(output, output_size,
483              "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14\x3f\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88\x90\x18\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4\xb5\x43\x3a\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b\x87\x4b\xe9\x09"),
484          },
485 };
486
487 #define HASH_DATA_SIZE 64
488
489 /* SHA1 and other hashes */
490 static int test_digest(gnutls_digest_algorithm_t dig,
491                        const struct hash_vectors_st *vectors,
492                        size_t vectors_size)
493 {
494         uint8_t data[HASH_DATA_SIZE];
495         unsigned int i;
496         int ret;
497         size_t data_size;
498         gnutls_hash_hd_t hd;
499
500         for (i = 0; i < vectors_size; i++) {
501                 ret = gnutls_hash_init(&hd, dig);
502                 if (ret < 0) {
503                         _gnutls_debug_log("error initializing: %s\n",
504                                           gnutls_digest_get_name(dig));
505                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
506                 }
507
508                 ret = gnutls_hash(hd, vectors[i].plaintext, 1);
509                 if (ret < 0)
510                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
511
512                 ret = gnutls_hash(hd,
513                                   &vectors[i].plaintext[1],
514                                   vectors[i].plaintext_size - 1);
515                 if (ret < 0)
516                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
517
518                 gnutls_hash_deinit(hd, data);
519
520                 data_size = gnutls_hash_get_len(dig);
521                 if (ret < 0)
522                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
523
524                 if (data_size != vectors[i].output_size ||
525                     memcmp(data, vectors[i].output,
526                            vectors[i].output_size) != 0) {
527
528                         _gnutls_debug_log("%s test vector %d failed!\n",
529                                           gnutls_digest_get_name(dig), i);
530                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
531                 }
532         }
533
534         _gnutls_debug_log("%s self check succeeded\n",
535                           gnutls_digest_get_name(dig));
536
537         return 0;
538 }
539
540
541 struct mac_vectors_st {
542         const uint8_t *key;
543         unsigned int key_size;
544         const uint8_t *plaintext;
545         unsigned int plaintext_size;
546         const uint8_t *output;
547         unsigned int output_size;
548 };
549
550 const struct mac_vectors_st hmac_md5_vectors[] = {
551         {
552          STR(key, key_size, "Jefe"),
553          STR(plaintext, plaintext_size, "what do ya want for nothing?"),
554          STR(output, output_size,
555              "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7\x38"),
556          },
557 };
558
559 const struct mac_vectors_st hmac_sha1_vectors[] = {
560         {
561          STR(key, key_size,
562              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
563          STR(plaintext, plaintext_size, "Hi There"),
564          STR(output, output_size,
565              "\x67\x5b\x0b\x3a\x1b\x4d\xdf\x4e\x12\x48\x72\xda\x6c\x2f\x63\x2b\xfe\xd9\x57\xe9"),
566          },
567 };
568
569             /* from rfc4231 */
570 const struct mac_vectors_st hmac_sha224_vectors[] = {
571         {
572          STR(key, key_size,
573              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
574          STR(plaintext, plaintext_size, "Hi There"),
575          STR(output, output_size,
576              "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19\x68\x32\x10\x7c\xd4\x9d\xf3\x3f\x47\xb4\xb1\x16\x99\x12\xba\x4f\x53\x68\x4b\x22"),
577          },
578 };
579
580 const struct mac_vectors_st hmac_sha256_vectors[] = {
581         {
582          STR(key, key_size,
583              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
584          STR(plaintext, plaintext_size, "Hi There"),
585          STR(output, output_size,
586              "\xb0\x34\x4c\x61\xd8\xdb\x38\x53\x5c\xa8\xaf\xce\xaf\x0b\xf1\x2b\x88\x1d\xc2\x00\xc9\x83\x3d\xa7\x26\xe9\x37\x6c\x2e\x32\xcf\xf7"),
587          },
588 };
589
590 const struct mac_vectors_st hmac_sha384_vectors[] = {
591         {
592          STR(key, key_size,
593              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
594          STR(plaintext, plaintext_size, "Hi There"),
595          STR(output, output_size,
596              "\xaf\xd0\x39\x44\xd8\x48\x95\x62\x6b\x08\x25\xf4\xab\x46\x90\x7f\x15\xf9\xda\xdb\xe4\x10\x1e\xc6\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c\xfa\xea\x9e\xa9\x07\x6e\xde\x7f\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6"),
597          },
598 };
599
600 const struct mac_vectors_st hmac_sha512_vectors[] = {
601         {
602          STR(key, key_size,
603              "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"),
604          STR(plaintext, plaintext_size, "Hi There"),
605          STR(output, output_size,
606              "\x87\xaa\x7c\xde\xa5\xef\x61\x9d\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0\x23\x79\xf4\xe2\xce\x4e\xc2\x78\x7a\xd0\xb3\x05\x45\xe1\x7c\xde\xda\xa8\x33\xb7\xd6\xb8\xa7\x02\x03\x8b\x27\x4e\xae\xa3\xf4\xe4\xbe\x9d\x91\x4e\xeb\x61\xf1\x70\x2e\x69\x6c\x20\x3a\x12\x68\x54"),
607          },
608 };
609
610 static int test_mac(gnutls_mac_algorithm_t mac,
611                     const struct mac_vectors_st *vectors,
612                     size_t vectors_size)
613 {
614         uint8_t data[HASH_DATA_SIZE];
615         unsigned int i;
616         int ret;
617         size_t data_size;
618         gnutls_hmac_hd_t hd;
619
620         for (i = 0; i < vectors_size; i++) {
621                 ret = gnutls_hmac_init(&hd,
622                                        mac, vectors[i].key,
623                                        vectors[i].key_size);
624
625                 if (ret < 0) {
626                         _gnutls_debug_log("error initializing: MAC-%s\n",
627                                           gnutls_mac_get_name(mac));
628                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
629                 }
630
631                 ret = gnutls_hmac(hd, vectors[i].plaintext, 1);
632                 if (ret < 0)
633                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
634
635                 ret = gnutls_hmac(hd,
636                                   &vectors[i].plaintext[1],
637                                   vectors[i].plaintext_size - 1);
638                 if (ret < 0)
639                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
640
641                 gnutls_hmac_deinit(hd, data);
642
643                 data_size = gnutls_hmac_get_len(mac);
644                 if (ret < 0)
645                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
646
647                 if (data_size != vectors[i].output_size ||
648                     memcmp(data, vectors[i].output,
649                            vectors[i].output_size) != 0) {
650
651                         _gnutls_debug_log
652                             ("MAC-%s test vector %d failed!\n",
653                              gnutls_mac_get_name(mac), i);
654
655                         return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
656                 }
657         }
658
659         _gnutls_debug_log
660             ("MAC-%s self check succeeded\n",
661              gnutls_mac_get_name(mac));
662
663         return 0;
664 }
665
666 #define CASE(x, func, vectors) case x: \
667                         ret = func(x, V(vectors)); \
668                         if (all == 0 || ret < 0) \
669                                 return ret
670
671 /*-
672  * gnutls_cipher_self_test:
673  * @all: if non-zero then tests to all ciphers are performed.
674  * @cipher: the encryption algorithm to use
675  *
676  * This function will run self tests on the provided cipher or all
677  * available ciphers if @all is non-zero.
678  *
679  * Returns: Zero or a negative error code on error.
680  *
681  * Since: 3.3.0-FIPS140
682  -*/
683 int gnutls_cipher_self_test(unsigned all, gnutls_cipher_algorithm_t cipher)
684 {
685         int ret;
686
687         if (all != 0)
688                 cipher = GNUTLS_CIPHER_UNKNOWN;
689
690         switch (cipher) {
691         case GNUTLS_CIPHER_UNKNOWN:
692                 CASE(GNUTLS_CIPHER_AES_128_CBC, test_cipher,
693                      aes128_cbc_vectors);
694                 CASE(GNUTLS_CIPHER_AES_192_CBC, test_cipher,
695                      aes192_cbc_vectors);
696                 CASE(GNUTLS_CIPHER_AES_256_CBC, test_cipher,
697                      aes256_cbc_vectors);
698                 CASE(GNUTLS_CIPHER_3DES_CBC, test_cipher,
699                      tdes_cbc_vectors);
700                 CASE(GNUTLS_CIPHER_ARCFOUR_128, test_cipher,
701                      arcfour_vectors);
702                 CASE(GNUTLS_CIPHER_AES_128_GCM, test_cipher_aead,
703                      aes128_gcm_vectors);
704                 CASE(GNUTLS_CIPHER_AES_256_GCM, test_cipher_aead,
705                      aes256_gcm_vectors);
706                 break;
707         default:
708                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
709         }
710
711         return 0;
712 }
713
714 /*-
715  * gnutls_mac_self_test:
716  * @all: if non-zero then tests to all ciphers are performed.
717  * @mac: the message authentication algorithm to use
718  *
719  * This function will run self tests on the provided mac.
720  *
721  * Returns: Zero or a negative error code on error.
722  *
723  * Since: 3.3.0-FIPS140
724  -*/
725 int gnutls_mac_self_test(unsigned all, gnutls_mac_algorithm_t mac)
726 {
727         int ret;
728
729         if (all != 0)
730                 mac = GNUTLS_MAC_UNKNOWN;
731
732         switch (mac) {
733         case GNUTLS_MAC_UNKNOWN:
734                 CASE(GNUTLS_MAC_MD5, test_mac, hmac_md5_vectors);
735                 CASE(GNUTLS_MAC_SHA1, test_mac, hmac_sha1_vectors);
736                 CASE(GNUTLS_MAC_SHA224, test_mac, hmac_sha224_vectors);
737                 CASE(GNUTLS_MAC_SHA256, test_mac, hmac_sha256_vectors);
738                 CASE(GNUTLS_MAC_SHA384, test_mac, hmac_sha384_vectors);
739                 CASE(GNUTLS_MAC_SHA512, test_mac, hmac_sha512_vectors);
740
741                 break;
742         default:
743                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
744         }
745
746         return 0;
747 }
748
749 /*-
750  * gnutls_digest_self_test:
751  * @all: if non-zero then tests to all ciphers are performed.
752  * @digest: the digest algorithm to use
753  *
754  * This function will run self tests on the provided digest.
755  *
756  * Returns: Zero or a negative error code on error.
757  *
758  * Since: 3.3.0-FIPS140
759  -*/
760 int gnutls_digest_self_test(unsigned all, gnutls_digest_algorithm_t digest)
761 {
762         int ret;
763
764         if (all != 0)
765                 digest = GNUTLS_DIG_UNKNOWN;
766
767         switch (digest) {
768         case GNUTLS_DIG_UNKNOWN:
769                 CASE(GNUTLS_DIG_MD5, test_digest, md5_vectors);
770                 CASE(GNUTLS_DIG_SHA1, test_digest, sha1_vectors);
771                 CASE(GNUTLS_DIG_SHA224, test_digest, sha224_vectors);
772                 CASE(GNUTLS_DIG_SHA256, test_digest, sha256_vectors);
773                 CASE(GNUTLS_DIG_SHA384, test_digest, sha384_vectors);
774                 CASE(GNUTLS_DIG_SHA512, test_digest, sha512_vectors);
775
776                 break;
777         default:
778                 return gnutls_assert_val(GNUTLS_E_NO_SELF_TEST);
779         }
780
781         return 0;
782 }