mailiverse/cpp/Lib/xcode-botan/Botan-1.10.3-clean/checks/validate.cpp
2013-07-25 22:51:23 -04:00

574 lines
15 KiB
C++

/*
* (C) 2009 Jack Lloyd
*
* Distributed under the terms of the Botan license
*/
/*
Validation routines
*/
#include <iostream>
#include <fstream>
#include <string>
#include <vector>
#include <cstdlib>
#include <botan/filters.h>
#include <botan/exceptn.h>
#include <botan/selftest.h>
#include <botan/libstate.h>
#if defined(BOTAN_HAS_PASSHASH9)
#include <botan/passhash9.h>
#endif
#if defined(BOTAN_HAS_BCRYPT)
#include <botan/bcrypt.h>
#endif
#if defined(BOTAN_HAS_CRYPTO_BOX)
#include <botan/cryptobox.h>
#endif
#if defined(BOTAN_HAS_RFC3394_KEYWRAP)
#include <botan/rfc3394.h>
#endif
using namespace Botan;
#include "validate.h"
#include "common.h"
#define EXTRA_TESTS 0
#define DEBUG 0
namespace {
u32bit random_word(Botan::RandomNumberGenerator& rng,
u32bit max)
{
#if DEBUG
/* deterministic version for tracking down buffering bugs */
static bool first = true;
if(first) { srand(5); first = false; }
u32bit r = 0;
for(u32bit j = 0; j != 4; j++)
r = (r << 8) | std::rand();
return ((r % max) + 1); // return between 1 and max inclusive
#else
/* normal version */
u32bit r = 0;
for(u32bit j = 0; j != 4; j++)
r = (r << 8) | rng.next_byte();
return ((r % max) + 1); // return between 1 and max inclusive
#endif
}
bool test_cryptobox(RandomNumberGenerator& rng)
{
#if defined(BOTAN_HAS_CRYPTO_BOX)
std::cout << "Testing CryptoBox: " << std::flush;
const byte msg[] = { 0xAA, 0xBB, 0xCC };
std::string ciphertext = CryptoBox::encrypt(msg, sizeof(msg),
"secret password",
rng);
std::cout << "." << std::flush;
try
{
std::string plaintext = CryptoBox::decrypt(ciphertext,
"secret password");
std::cout << "." << std::flush;
if(plaintext.size() != sizeof(msg) ||
!same_mem(reinterpret_cast<const byte*>(&plaintext[0]), msg, sizeof(msg)))
return false;
std::cout << std::endl;
}
catch(std::exception& e)
{
std::cout << "Error during Cryptobox test " << e.what() << "\n";
return false;
}
#endif
return true;
}
bool keywrap_test(const char* key_str,
const char* expected_str,
const char* kek_str)
{
std::cout << '.' << std::flush;
bool ok = true;
#if defined(BOTAN_HAS_RFC3394_KEYWRAP)
try
{
SymmetricKey key(key_str);
SymmetricKey expected(expected_str);
SymmetricKey kek(kek_str);
Algorithm_Factory& af = global_state().algorithm_factory();
SecureVector<byte> enc = rfc3394_keywrap(key.bits_of(), kek, af);
if(enc != expected.bits_of())
{
std::cout << "NIST key wrap encryption failure: "
<< hex_encode(enc) << " != " << hex_encode(expected.bits_of()) << "\n";
ok = false;
}
SecureVector<byte> dec = rfc3394_keyunwrap(expected.bits_of(), kek, af);
if(dec != key.bits_of())
{
std::cout << "NIST key wrap decryption failure: "
<< hex_encode(dec) << " != " << hex_encode(key.bits_of()) << "\n";
ok = false;
}
}
catch(std::exception& e)
{
std::cout << e.what() << "\n";
}
#endif
return ok;
}
bool test_keywrap()
{
std::cout << "Testing NIST keywrap: " << std::flush;
bool ok = true;
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF",
"1FA68B0A8112B447AEF34BD8FB5A7B829D3E862371D2CFE5",
"000102030405060708090A0B0C0D0E0F");
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF",
"96778B25AE6CA435F92B5B97C050AED2468AB8A17AD84E5D",
"000102030405060708090A0B0C0D0E0F1011121314151617");
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF",
"64E8C3F9CE0F5BA263E9777905818A2A93C8191E7D6E8AE7",
"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF0001020304050607",
"031D33264E15D33268F24EC260743EDCE1C6C7DDEE725A936BA814915C6762D2",
"000102030405060708090A0B0C0D0E0F1011121314151617");
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF0001020304050607",
"A8F9BC1612C68B3FF6E6F4FBE30E71E4769C8B80A32CB8958CD5D17D6B254DA1",
"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
ok &= keywrap_test("00112233445566778899AABBCCDDEEFF000102030405060708090A0B0C0D0E0F",
"28C9F404C4B810F4CBCCB35CFB87F8263F5786E2D80ED326CBC7F0E71A99F43BFB988B9B7A02DD21",
"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F");
std::cout << "\n";
return ok;
}
bool test_bcrypt(RandomNumberGenerator& rng)
{
#if defined(BOTAN_HAS_BCRYPT)
std::cout << "Testing Bcrypt: " << std::flush;
bool ok = true;
// Generated by jBCrypt 0.3
if(!check_bcrypt("abc",
"$2a$05$DfPyLs.G6.To9fXEFgUL1O6HpYw3jIXgPcl/L3Qt3jESuWmhxtmpS"))
{
std::cout << "Fixed bcrypt test failed\n";
ok = false;
}
std::cout << "." << std::flush;
// http://www.openwall.com/lists/john-dev/2011/06/19/2
if(!check_bcrypt("\xA3",
"$2a$05$/OK.fbVrR/bpIqNJ5ianF.Sa7shbm4.OzKpvFnX1pQLmQW96oUlCq"))
{
std::cout << "Fixed bcrypt test 2 failed\n";
ok = false;
}
std::cout << "." << std::flush;
for(u16bit level = 1; level != 5; ++level)
{
const std::string input = "some test passphrase 123";
const std::string gen_hash = generate_bcrypt(input, rng, level);
if(!check_bcrypt(input, gen_hash))
{
std::cout << "Gen and check for bcrypt failed: "
<< gen_hash << " not valid\n";
ok = false;
}
std::cout << "." << std::flush;
}
std::cout << std::endl;
return ok;
#endif
}
bool test_passhash(RandomNumberGenerator& rng)
{
#if defined(BOTAN_HAS_PASSHASH9)
std::cout << "Testing Password Hashing: " << std::flush;
const std::string input = "secret";
const std::string fixed_hash =
"$9$AAAKhiHXTIUhNhbegwBXJvk03XXJdzFMy+i3GFMIBYKtthTTmXZA";
std::cout << "." << std::flush;
if(!check_passhash9(input, fixed_hash))
return false;
std::cout << "." << std::flush;
for(byte alg_id = 0; alg_id <= 2; ++alg_id)
{
std::string gen_hash = generate_passhash9(input, rng, 2, alg_id);
if(!check_passhash9(input, gen_hash))
return false;
std::cout << "." << std::flush;
}
std::cout << std::endl;
#endif
return true;
}
}
bool failed_test(const std::string&, std::vector<std::string>, bool, bool,
std::string&,
Botan::RandomNumberGenerator& rng);
std::vector<std::string> parse(const std::string&);
void strip(std::string&);
u32bit do_validation_tests(const std::string& filename,
RandomNumberGenerator& rng,
bool should_pass)
{
std::ifstream test_data(filename.c_str());
bool first_mark = true;
if(!test_data)
throw Botan::Stream_IO_Error("Couldn't open test file " + filename);
u32bit errors = 0, alg_count = 0;
std::string algorithm;
std::string section;
std::string last_missing;
bool is_extension = false;
u32bit counter = 0;
while(!test_data.eof())
{
if(test_data.bad() || test_data.fail())
throw Botan::Stream_IO_Error("File I/O error reading from " +
filename);
std::string line;
std::getline(test_data, line);
const std::string MARK = "# MARKER: ";
if(line.find(MARK) != std::string::npos)
{
if(first_mark)
first_mark = false;
else if(should_pass)
std::cout << std::endl;
counter = 0;
section = line;
section.replace(section.find(MARK), MARK.size(), "");
if(should_pass)
std::cout << "Testing " << section << ": ";
}
strip(line);
if(line.size() == 0) continue;
// Do line continuation
while(line[line.size()-1] == '\\' && !test_data.eof())
{
line.replace(line.size()-1, 1, "");
std::string nextline;
std::getline(test_data, nextline);
strip(nextline);
if(nextline.size() == 0) continue;
line += nextline;
}
if(line[0] == '[' && line[line.size() - 1] == ']')
{
const std::string ext_mark = " <EXTENSION>";
algorithm = line.substr(1, line.size() - 2);
is_extension = false;
if(algorithm.find(ext_mark) != std::string::npos)
{
is_extension = true;
algorithm.replace(algorithm.find(ext_mark),
ext_mark.length(), "");
}
#if DEBUG
if(should_pass)
std::cout << "Testing " << algorithm << "..." << std::endl;
else
std::cout << "Testing (expecting failure) "
<< algorithm << "..." << std::endl;
#endif
alg_count = 0;
continue;
}
std::vector<std::string> substr = parse(line);
alg_count++;
if(should_pass &&
(counter % 100 == 0 || (counter < 100 && counter % 10 == 0)))
{
std::cout << '.';
std::cout.flush();
}
counter++;
bool failed = true; // until proven otherwise
try
{
failed = failed_test(algorithm, substr,
is_extension, should_pass,
last_missing, rng);
}
catch(std::exception& e)
{
std::cout << "Exception: " << e.what() << "\n";
}
if(failed && should_pass)
{
std::cout << "ERROR: \"" << algorithm << "\" failed test #"
<< alg_count << std::endl;
errors++;
}
if(!failed && !should_pass)
{
std::cout << "ERROR: \"" << algorithm << "\" passed test #"
<< alg_count << " (unexpected pass)" << std::endl;
errors++;
}
}
if(should_pass)
std::cout << std::endl;
if(should_pass && !test_passhash(rng))
{
std::cout << "Passhash9 tests failed" << std::endl;
errors++;
}
if(should_pass && !test_bcrypt(rng))
{
std::cout << "BCrypt tests failed" << std::endl;
errors++;
}
if(should_pass && !test_keywrap())
{
std::cout << "NIST keywrap tests failed" << std::endl;
errors++;
}
if(should_pass && !test_cryptobox(rng))
{
std::cout << "Cryptobox tests failed" << std::endl;
errors++;
}
return errors;
}
bool failed_test(const std::string& algo,
std::vector<std::string> params,
bool is_extension, bool exp_pass,
std::string& last_missing,
Botan::RandomNumberGenerator& rng)
{
#if !EXTRA_TESTS
if(!exp_pass) return true;
#endif
std::map<std::string, std::string> vars;
vars["input"] = params[0];
vars["output"] = params[1];
if(params.size() > 2)
vars["key"] = params[2];
if(params.size() > 3)
vars["iv"] = params[3];
std::map<std::string, bool> results =
algorithm_kat(algo, vars, global_state().algorithm_factory());
if(results.size())
{
for(std::map<std::string, bool>::const_iterator i = results.begin();
i != results.end(); ++i)
{
if(i->second == false)
{
std::cout << algo << " test with provider "
<< i->first << " failed\n";
return true;
}
}
return false; // OK
}
const std::string in = params[0];
const std::string expected = params[1];
params.erase(params.begin());
params.erase(params.begin());
if(in.size() % 2 == 1)
{
std::cout << "Can't have an odd sized hex string!" << std::endl;
return true;
}
Botan::Pipe pipe;
try {
Botan::Filter* test = lookup(algo, params);
if(test == 0 && is_extension) return !exp_pass;
if(test == 0)
{
if(algo != last_missing)
{
std::cout << "WARNING: \"" + algo + "\" is not a known "
<< "algorithm name." << std::endl;
last_missing = algo;
}
return 0;
}
pipe.reset();
pipe.append(test);
pipe.append(new Botan::Hex_Encoder);
Botan::SecureVector<byte> data = Botan::hex_decode(in);
const byte* data_ptr = &data[0];
// this can help catch errors with buffering, etc
size_t len = data.size();
pipe.start_msg();
while(len)
{
u32bit how_much = random_word(rng, len);
pipe.write(data_ptr, how_much);
data_ptr += how_much;
len -= how_much;
}
pipe.end_msg();
}
catch(Botan::Algorithm_Not_Found& e)
{
std::cout << "Algorithm not found: " << e.what() << std::endl;
return false;
}
catch(Botan::Exception& e)
{
if(exp_pass || DEBUG)
std::cout << "Exception caught: " << e.what() << std::endl;
return true;
}
catch(std::exception& e)
{
if(exp_pass || DEBUG)
std::cout << "Standard library exception caught: "
<< e.what() << std::endl;
return true;
}
catch(...)
{
if(exp_pass || DEBUG)
std::cout << "Unknown exception caught." << std::endl;
return true;
}
std::string output;
if(pipe.remaining())
{
/* Test peeking at an offset in Pipe/SecureQueue */
size_t offset = random_word(rng, pipe.remaining() - 1);
size_t length = random_word(rng, pipe.remaining() - offset);
Botan::SecureVector<byte> peekbuf(length);
pipe.peek(&peekbuf[0], peekbuf.size(), offset);
output = pipe.read_all_as_string();
bool OK = true;
for(size_t j = offset; j != offset+length; j++)
if(static_cast<byte>(output[j]) != peekbuf[j-offset])
OK = false;
if(!OK)
throw Botan::Self_Test_Failure("Peek testing failed in validate.cpp");
}
if(output == expected && !exp_pass)
{
std::cout << "FAILED: " << expected << " == " << std::endl
<< " " << output << std::endl;
return false;
}
if(output != expected && exp_pass)
{
std::cout << "\nFAILED: " << expected << " != " << std::endl
<< " " << output << std::endl;
return true;
}
if(output != expected && !exp_pass) return true;
return false;
}