summaryrefslogtreecommitdiff
path: root/src/libsodium/crypto_auth/try.c
blob: c2f2c80f1143b7e24c2a0cbbb8c5d6e4a1fece1a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
/*
 * crypto_auth/try.c version 20090118
 * D. J. Bernstein
 * Public domain.
 */

#include <stdlib.h>
#include "crypto_hash_sha256.h"
#include "crypto_auth.h"
#include "utils.h"
#include "windows/windows-quirks.h"

extern unsigned char *alignedcalloc(unsigned long long);

const char *primitiveimplementation = crypto_auth_IMPLEMENTATION;

#define MAXTEST_BYTES 10000
#define CHECKSUM_BYTES 4096
#define TUNE_BYTES 1536

static unsigned char *h;
static unsigned char *m;
static unsigned char *k;
static unsigned char *h2;
static unsigned char *m2;
static unsigned char *k2;

void preallocate(void)
{
}

void allocate(void)
{
  h = alignedcalloc(crypto_auth_BYTES);
  m = alignedcalloc(MAXTEST_BYTES);
  k = alignedcalloc(crypto_auth_KEYBYTES);
  h2 = alignedcalloc(crypto_auth_BYTES);
  m2 = alignedcalloc(MAXTEST_BYTES + crypto_auth_BYTES);
  k2 = alignedcalloc(crypto_auth_KEYBYTES + crypto_auth_BYTES);
}

void predoit(void)
{
}

void doit(void)
{
  crypto_auth(h,m,TUNE_BYTES,k);
  crypto_auth_verify(h,m,TUNE_BYTES,k);
}

char checksum[crypto_auth_BYTES * 2 + 1];

const char *checksum_compute(void)
{
  long long i;
  long long j;

  for (i = 0;i < CHECKSUM_BYTES;++i) {
    long long mlen = i;
    long long klen = crypto_auth_KEYBYTES;
    long long hlen = crypto_auth_BYTES;

    for (j = -16;j < 0;++j) h[j] = rand();
    for (j = -16;j < 0;++j) k[j] = rand();
    for (j = -16;j < 0;++j) m[j] = rand();
    for (j = hlen;j < hlen + 16;++j) h[j] = rand();
    for (j = klen;j < klen + 16;++j) k[j] = rand();
    for (j = mlen;j < mlen + 16;++j) m[j] = rand();
    for (j = -16;j < hlen + 16;++j) h2[j] = h[j];
    for (j = -16;j < klen + 16;++j) k2[j] = k[j];
    for (j = -16;j < mlen + 16;++j) m2[j] = m[j];

    if (crypto_auth(h,m,mlen,k) != 0) return "crypto_auth returns nonzero";

    for (j = -16;j < klen + 16;++j) if (k[j] != k2[j]) return "crypto_auth overwrites k";
    for (j = -16;j < mlen + 16;++j) if (m[j] != m2[j]) return "crypto_auth overwrites m";
    for (j = -16;j < 0;++j) if (h[j] != h2[j]) return "crypto_auth writes before output";
    for (j = hlen;j < hlen + 16;++j) if (h[j] != h2[j]) return "crypto_auth writes after output";

    for (j = -16;j < 0;++j) h[j] = rand();
    for (j = -16;j < 0;++j) k[j] = rand();
    for (j = -16;j < 0;++j) m[j] = rand();
    for (j = hlen;j < hlen + 16;++j) h[j] = rand();
    for (j = klen;j < klen + 16;++j) k[j] = rand();
    for (j = mlen;j < mlen + 16;++j) m[j] = rand();
    for (j = -16;j < hlen + 16;++j) h2[j] = h[j];
    for (j = -16;j < klen + 16;++j) k2[j] = k[j];
    for (j = -16;j < mlen + 16;++j) m2[j] = m[j];

    if (crypto_auth(m2,m2,mlen,k) != 0) return "crypto_auth returns nonzero";
    for (j = 0;j < hlen;++j) if (m2[j] != h[j]) return "crypto_auth does not handle m overlap";
    for (j = 0;j < hlen;++j) m2[j] = m[j];
    if (crypto_auth(k2,m2,mlen,k2) != 0) return "crypto_auth returns nonzero";
    for (j = 0;j < hlen;++j) if (k2[j] != h[j]) return "crypto_auth does not handle k overlap";
    for (j = 0;j < hlen;++j) k2[j] = k[j];

    if (crypto_auth_verify(h,m,mlen,k) != 0) return "crypto_auth_verify returns nonzero";

    for (j = -16;j < hlen + 16;++j) if (h[j] != h2[j]) return "crypto_auth overwrites h";
    for (j = -16;j < klen + 16;++j) if (k[j] != k2[j]) return "crypto_auth overwrites k";
    for (j = -16;j < mlen + 16;++j) if (m[j] != m2[j]) return "crypto_auth overwrites m";

    crypto_hash_sha256(h2,h,hlen);
    for (j = 0;j < klen;++j) k[j] ^= h2[j % 32];
    if (crypto_auth(h,m,mlen,k) != 0) return "crypto_auth returns nonzero";
    if (crypto_auth_verify(h,m,mlen,k) != 0) return "crypto_auth_verify returns nonzero";

    crypto_hash_sha256(h2,h,hlen);
    for (j = 0;j < mlen;++j) m[j] ^= h2[j % 32];
    m[mlen] = h2[0];
  }
  if (crypto_auth(h,m,CHECKSUM_BYTES,k) != 0) return "crypto_auth returns nonzero";
  if (crypto_auth_verify(h,m,CHECKSUM_BYTES,k) != 0) return "crypto_auth_verify returns nonzero";

  sodium_bin2hex(checksum, sizeof checksum, h, crypto_auth_BYTES);

  return 0;
}