test_suite_dhm.function 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269
  1. /* BEGIN_HEADER */
  2. #include "mbedtls/dhm.h"
  3. /* END_HEADER */
  4. /* BEGIN_DEPENDENCIES
  5. * depends_on:MBEDTLS_DHM_C:MBEDTLS_BIGNUM_C
  6. * END_DEPENDENCIES
  7. */
  8. /* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */
  9. void dhm_invalid_params( )
  10. {
  11. mbedtls_dhm_context ctx;
  12. unsigned char buf[42] = { 0 };
  13. unsigned char *buf_null = NULL;
  14. mbedtls_mpi X;
  15. size_t const buflen = sizeof( buf );
  16. size_t len;
  17. TEST_INVALID_PARAM( mbedtls_dhm_init( NULL ) );
  18. TEST_VALID_PARAM( mbedtls_dhm_free( NULL ) );
  19. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  20. mbedtls_dhm_read_params( NULL,
  21. (unsigned char**) &buf,
  22. buf ) );
  23. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  24. mbedtls_dhm_read_params( &ctx, &buf_null, buf ) );
  25. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  26. mbedtls_dhm_read_params( &ctx, NULL, buf ) );
  27. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  28. mbedtls_dhm_read_params( &ctx,
  29. (unsigned char**) &buf,
  30. NULL ) );
  31. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  32. mbedtls_dhm_make_params( NULL, buflen,
  33. buf, &len,
  34. rnd_std_rand,
  35. NULL ) );
  36. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  37. mbedtls_dhm_make_params( &ctx, buflen,
  38. NULL, &len,
  39. rnd_std_rand,
  40. NULL ) );
  41. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  42. mbedtls_dhm_make_params( &ctx, buflen,
  43. buf, NULL,
  44. rnd_std_rand,
  45. NULL ) );
  46. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  47. mbedtls_dhm_make_params( &ctx, buflen,
  48. buf, &len,
  49. NULL,
  50. NULL ) );
  51. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  52. mbedtls_dhm_set_group( NULL, &X, &X ) );
  53. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  54. mbedtls_dhm_set_group( &ctx, NULL, &X ) );
  55. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  56. mbedtls_dhm_set_group( &ctx, &X, NULL ) );
  57. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  58. mbedtls_dhm_read_public( NULL, buf, buflen ) );
  59. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  60. mbedtls_dhm_read_public( &ctx, NULL, buflen ) );
  61. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  62. mbedtls_dhm_make_public( NULL, buflen,
  63. buf, buflen,
  64. rnd_std_rand,
  65. NULL ) );
  66. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  67. mbedtls_dhm_make_public( &ctx, buflen,
  68. NULL, buflen,
  69. rnd_std_rand,
  70. NULL ) );
  71. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  72. mbedtls_dhm_make_public( &ctx, buflen,
  73. buf, buflen,
  74. NULL,
  75. NULL ) );
  76. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  77. mbedtls_dhm_calc_secret( NULL, buf, buflen,
  78. &len, rnd_std_rand,
  79. NULL ) );
  80. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  81. mbedtls_dhm_calc_secret( &ctx, NULL, buflen,
  82. &len, rnd_std_rand,
  83. NULL ) );
  84. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  85. mbedtls_dhm_calc_secret( &ctx, buf, buflen,
  86. NULL, rnd_std_rand,
  87. NULL ) );
  88. #if defined(MBEDTLS_ASN1_PARSE_C)
  89. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  90. mbedtls_dhm_parse_dhm( NULL, buf, buflen ) );
  91. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  92. mbedtls_dhm_parse_dhm( &ctx, NULL, buflen ) );
  93. #if defined(MBEDTLS_FS_IO)
  94. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  95. mbedtls_dhm_parse_dhmfile( NULL, "" ) );
  96. TEST_INVALID_PARAM_RET( MBEDTLS_ERR_DHM_BAD_INPUT_DATA,
  97. mbedtls_dhm_parse_dhmfile( &ctx, NULL ) );
  98. #endif /* MBEDTLS_FS_IO */
  99. #endif /* MBEDTLS_ASN1_PARSE_C */
  100. exit:
  101. return;
  102. }
  103. /* END_CASE */
  104. /* BEGIN_CASE */
  105. void dhm_do_dhm( int radix_P, char *input_P,
  106. int radix_G, char *input_G, int result )
  107. {
  108. mbedtls_dhm_context ctx_srv;
  109. mbedtls_dhm_context ctx_cli;
  110. unsigned char ske[1000];
  111. unsigned char *p = ske;
  112. unsigned char pub_cli[1000];
  113. unsigned char sec_srv[1000];
  114. unsigned char sec_cli[1000];
  115. size_t ske_len = 0;
  116. size_t pub_cli_len = 0;
  117. size_t sec_srv_len;
  118. size_t sec_cli_len;
  119. int x_size, i;
  120. rnd_pseudo_info rnd_info;
  121. mbedtls_dhm_init( &ctx_srv );
  122. mbedtls_dhm_init( &ctx_cli );
  123. memset( ske, 0x00, 1000 );
  124. memset( pub_cli, 0x00, 1000 );
  125. memset( sec_srv, 0x00, 1000 );
  126. memset( sec_cli, 0x00, 1000 );
  127. memset( &rnd_info, 0x00, sizeof( rnd_pseudo_info ) );
  128. /*
  129. * Set params
  130. */
  131. TEST_ASSERT( mbedtls_mpi_read_string( &ctx_srv.P, radix_P, input_P ) == 0 );
  132. TEST_ASSERT( mbedtls_mpi_read_string( &ctx_srv.G, radix_G, input_G ) == 0 );
  133. x_size = mbedtls_mpi_size( &ctx_srv.P );
  134. pub_cli_len = x_size;
  135. /*
  136. * First key exchange
  137. */
  138. TEST_ASSERT( mbedtls_dhm_make_params( &ctx_srv, x_size, ske, &ske_len, &rnd_pseudo_rand, &rnd_info ) == result );
  139. if ( result != 0 )
  140. goto exit;
  141. ske[ske_len++] = 0;
  142. ske[ske_len++] = 0;
  143. TEST_ASSERT( mbedtls_dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
  144. TEST_ASSERT( mbedtls_dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  145. TEST_ASSERT( mbedtls_dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
  146. TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv, sizeof( sec_srv ), &sec_srv_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  147. TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_cli, sec_cli, sizeof( sec_cli ), &sec_cli_len, NULL, NULL ) == 0 );
  148. TEST_ASSERT( sec_srv_len == sec_cli_len );
  149. TEST_ASSERT( sec_srv_len != 0 );
  150. TEST_ASSERT( memcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
  151. /* Re-do calc_secret on server a few times to test update of blinding values */
  152. for( i = 0; i < 3; i++ )
  153. {
  154. sec_srv_len = 1000;
  155. TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv, sizeof( sec_srv ), &sec_srv_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  156. TEST_ASSERT( sec_srv_len == sec_cli_len );
  157. TEST_ASSERT( sec_srv_len != 0 );
  158. TEST_ASSERT( memcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
  159. }
  160. /*
  161. * Second key exchange to test change of blinding values on server
  162. */
  163. p = ske;
  164. TEST_ASSERT( mbedtls_dhm_make_params( &ctx_srv, x_size, ske, &ske_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  165. ske[ske_len++] = 0;
  166. ske[ske_len++] = 0;
  167. TEST_ASSERT( mbedtls_dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
  168. TEST_ASSERT( mbedtls_dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  169. TEST_ASSERT( mbedtls_dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
  170. TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_srv, sec_srv, sizeof( sec_srv ), &sec_srv_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
  171. TEST_ASSERT( mbedtls_dhm_calc_secret( &ctx_cli, sec_cli, sizeof( sec_cli ), &sec_cli_len, NULL, NULL ) == 0 );
  172. TEST_ASSERT( sec_srv_len == sec_cli_len );
  173. TEST_ASSERT( sec_srv_len != 0 );
  174. TEST_ASSERT( memcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
  175. exit:
  176. mbedtls_dhm_free( &ctx_srv );
  177. mbedtls_dhm_free( &ctx_cli );
  178. }
  179. /* END_CASE */
  180. /* BEGIN_CASE */
  181. void dhm_make_public( int P_bytes, int radix_G, char *input_G, int result )
  182. {
  183. mbedtls_mpi P, G;
  184. mbedtls_dhm_context ctx;
  185. unsigned char output[MBEDTLS_MPI_MAX_SIZE];
  186. mbedtls_mpi_init( &P );
  187. mbedtls_mpi_init( &G );
  188. mbedtls_dhm_init( &ctx );
  189. TEST_ASSERT( mbedtls_mpi_lset( &P, 1 ) == 0 );
  190. TEST_ASSERT( mbedtls_mpi_shift_l( &P, ( P_bytes * 8 ) - 1 ) == 0 );
  191. TEST_ASSERT( mbedtls_mpi_set_bit( &P, 0, 1 ) == 0 );
  192. TEST_ASSERT( mbedtls_mpi_read_string( &G, radix_G, input_G ) == 0 );
  193. TEST_ASSERT( mbedtls_dhm_set_group( &ctx, &P, &G ) == 0 );
  194. TEST_ASSERT( mbedtls_dhm_make_public( &ctx, (int) mbedtls_mpi_size( &P ),
  195. output, sizeof(output),
  196. &rnd_pseudo_rand,
  197. NULL ) == result );
  198. exit:
  199. mbedtls_mpi_free( &P );
  200. mbedtls_mpi_free( &G );
  201. mbedtls_dhm_free( &ctx );
  202. }
  203. /* END_CASE */
  204. /* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
  205. void dhm_file( char * filename, char * p, char * g, int len )
  206. {
  207. mbedtls_dhm_context ctx;
  208. mbedtls_mpi P, G;
  209. mbedtls_dhm_init( &ctx );
  210. mbedtls_mpi_init( &P ); mbedtls_mpi_init( &G );
  211. TEST_ASSERT( mbedtls_mpi_read_string( &P, 16, p ) == 0 );
  212. TEST_ASSERT( mbedtls_mpi_read_string( &G, 16, g ) == 0 );
  213. TEST_ASSERT( mbedtls_dhm_parse_dhmfile( &ctx, filename ) == 0 );
  214. TEST_ASSERT( ctx.len == (size_t) len );
  215. TEST_ASSERT( mbedtls_mpi_cmp_mpi( &ctx.P, &P ) == 0 );
  216. TEST_ASSERT( mbedtls_mpi_cmp_mpi( &ctx.G, &G ) == 0 );
  217. exit:
  218. mbedtls_mpi_free( &P ); mbedtls_mpi_free( &G );
  219. mbedtls_dhm_free( &ctx );
  220. }
  221. /* END_CASE */
  222. /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
  223. void dhm_selftest( )
  224. {
  225. TEST_ASSERT( mbedtls_dhm_self_test( 1 ) == 0 );
  226. }
  227. /* END_CASE */