summaryrefslogtreecommitdiff
path: root/src/libsodium/crypto_box/try.c
blob: 5f4b7cb937039df7de5f2b4abdef9598ce461116 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
/*
 * crypto_box/try.c version 20090118
 * D. J. Bernstein
 * Public domain.
 */

#include <stdlib.h>
#include "crypto_box.h"
#include "utils.h"
#include "windows/windows-quirks.h"

extern unsigned char *alignedcalloc(unsigned long long);

const char *primitiveimplementation = crypto_box_IMPLEMENTATION;

#define MAXTEST_BYTES 10000
#define CHECKSUM_BYTES 4096
#define TUNE_BYTES 1536

static unsigned char *ska;
static unsigned char *pka;
static unsigned char *skb;
static unsigned char *pkb;
static unsigned char *s;
static unsigned char *n;
static unsigned char *m;
static unsigned char *c;
static unsigned char *t;
static unsigned char *ska2;
static unsigned char *pka2;
static unsigned char *skb2;
static unsigned char *pkb2;
static unsigned char *s2;
static unsigned char *n2;
static unsigned char *m2;
static unsigned char *c2;
static unsigned char *t2;

#define sklen crypto_box_SECRETKEYBYTES
#define pklen crypto_box_PUBLICKEYBYTES
#define nlen crypto_box_NONCEBYTES
#define slen crypto_box_BEFORENMBYTES

void preallocate(void)
{
}

void allocate(void)
{
  ska = alignedcalloc(sklen);
  pka = alignedcalloc(pklen);
  skb = alignedcalloc(sklen);
  pkb = alignedcalloc(pklen);
  n = alignedcalloc(nlen);
  m = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  c = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  t = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  s = alignedcalloc(slen);
  ska2 = alignedcalloc(sklen);
  pka2 = alignedcalloc(pklen);
  skb2 = alignedcalloc(sklen);
  pkb2 = alignedcalloc(pklen);
  n2 = alignedcalloc(nlen);
  m2 = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  c2 = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  t2 = alignedcalloc(MAXTEST_BYTES + crypto_box_ZEROBYTES);
  s2 = alignedcalloc(slen);
}

void predoit(void)
{
}

void doit(void)
{
  crypto_box(c,m,TUNE_BYTES + crypto_box_ZEROBYTES,n,pka,skb);
  crypto_box_open(t,c,TUNE_BYTES + crypto_box_ZEROBYTES,n,pkb,ska);
}

char checksum[nlen * 2 + 1];

const char *checksum_compute(void)
{
  long long i;
  long long j;

  if (crypto_box_keypair(pka,ska) != 0) return "crypto_box_keypair returns nonzero";
  if (crypto_box_keypair(pkb,skb) != 0) return "crypto_box_keypair returns nonzero";

  for (j = 0;j < crypto_box_ZEROBYTES;++j) m[j] = 0;

  for (i = 0;i < CHECKSUM_BYTES;++i) {
    long long mlen = i + crypto_box_ZEROBYTES;
    long long tlen = i + crypto_box_ZEROBYTES;
    long long clen = i + crypto_box_ZEROBYTES;

    for (j = -16;j < 0;++j) ska[j] = rand();
    for (j = -16;j < 0;++j) skb[j] = rand();
    for (j = -16;j < 0;++j) pka[j] = rand();
    for (j = -16;j < 0;++j) pkb[j] = rand();
    for (j = -16;j < 0;++j) m[j] = rand();
    for (j = -16;j < 0;++j) n[j] = rand();

    for (j = sklen;j < sklen + 16;++j) ska[j] = rand();
    for (j = sklen;j < sklen + 16;++j) skb[j] = rand();
    for (j = pklen;j < pklen + 16;++j) pka[j] = rand();
    for (j = pklen;j < pklen + 16;++j) pkb[j] = rand();
    for (j = mlen;j < mlen + 16;++j) m[j] = rand();
    for (j = nlen;j < nlen + 16;++j) n[j] = rand();

    for (j = -16;j < sklen + 16;++j) ska2[j] = ska[j];
    for (j = -16;j < sklen + 16;++j) skb2[j] = skb[j];
    for (j = -16;j < pklen + 16;++j) pka2[j] = pka[j];
    for (j = -16;j < pklen + 16;++j) pkb2[j] = pkb[j];
    for (j = -16;j < mlen + 16;++j) m2[j] = m[j];
    for (j = -16;j < nlen + 16;++j) n2[j] = n[j];
    for (j = -16;j < clen + 16;++j) c2[j] = c[j] = rand();

    if (crypto_box(c,m,mlen,n,pkb,ska) != 0) return "crypto_box returns nonzero";

    for (j = -16;j < mlen + 16;++j) if (m2[j] != m[j]) return "crypto_box overwrites m";
    for (j = -16;j < nlen + 16;++j) if (n2[j] != n[j]) return "crypto_box overwrites n";
    for (j = -16;j < 0;++j) if (c2[j] != c[j]) return "crypto_box writes before output";
    for (j = clen;j < clen + 16;++j) if (c2[j] != c[j]) return "crypto_box writes after output";
    for (j = 0;j < crypto_box_BOXZEROBYTES;++j)
      if (c[j] != 0) return "crypto_box does not clear extra bytes";

    for (j = -16;j < sklen + 16;++j) if (ska2[j] != ska[j]) return "crypto_box overwrites ska";
    for (j = -16;j < sklen + 16;++j) if (skb2[j] != skb[j]) return "crypto_box overwrites skb";
    for (j = -16;j < pklen + 16;++j) if (pka2[j] != pka[j]) return "crypto_box overwrites pka";
    for (j = -16;j < pklen + 16;++j) if (pkb2[j] != pkb[j]) return "crypto_box overwrites pkb";

    for (j = -16;j < 0;++j) c[j] = rand();
    for (j = clen;j < clen + 16;++j) c[j] = rand();
    for (j = -16;j < clen + 16;++j) c2[j] = c[j];
    for (j = -16;j < tlen + 16;++j) t2[j] = t[j] = rand();

    if (crypto_box_open(t,c,clen,n,pka,skb) != 0) return "crypto_box_open returns nonzero";

    for (j = -16;j < clen + 16;++j) if (c2[j] != c[j]) return "crypto_box_open overwrites c";
    for (j = -16;j < nlen + 16;++j) if (n2[j] != n[j]) return "crypto_box_open overwrites n";
    for (j = -16;j < 0;++j) if (t2[j] != t[j]) return "crypto_box_open writes before output";
    for (j = tlen;j < tlen + 16;++j) if (t2[j] != t[j]) return "crypto_box_open writes after output";
    for (j = 0;j < crypto_box_ZEROBYTES;++j)
      if (t[j] != 0) return "crypto_box_open does not clear extra bytes";

    for (j = -16;j < sklen + 16;++j) if (ska2[j] != ska[j]) return "crypto_box_open overwrites ska";
    for (j = -16;j < sklen + 16;++j) if (skb2[j] != skb[j]) return "crypto_box_open overwrites skb";
    for (j = -16;j < pklen + 16;++j) if (pka2[j] != pka[j]) return "crypto_box_open overwrites pka";
    for (j = -16;j < pklen + 16;++j) if (pkb2[j] != pkb[j]) return "crypto_box_open overwrites pkb";

    for (j = 0;j < mlen;++j) if (t[j] != m[j]) return "plaintext does not match";

    for (j = -16;j < slen + 16;++j) s2[j] = s[j] = rand();
    if (crypto_box_beforenm(s,pkb,ska) != 0) return "crypto_box_beforenm returns nonzero";
    for (j = -16;j < pklen + 16;++j) if (pka2[j] != pka[j]) return "crypto_box_open overwrites pk";
    for (j = -16;j < sklen + 16;++j) if (skb2[j] != skb[j]) return "crypto_box_open overwrites sk";
    for (j = -16;j < 0;++j) if (s2[j] != s[j]) return "crypto_box_beforenm writes before output";
    for (j = slen;j < slen + 16;++j) if (s2[j] != s[j]) return "crypto_box_beforenm writes after output";

    for (j = -16;j < slen + 16;++j) s2[j] = s[j];
    for (j = -16;j < tlen + 16;++j) t2[j] = t[j] = rand();
    if (crypto_box_afternm(t,m,mlen,n,s) != 0) return "crypto_box_afternm returns nonzero";
    for (j = -16;j < slen + 16;++j) if (s2[j] != s[j]) return "crypto_box_afternm overwrites s";
    for (j = -16;j < mlen + 16;++j) if (m2[j] != m[j]) return "crypto_box_afternm overwrites m";
    for (j = -16;j < nlen + 16;++j) if (n2[j] != n[j]) return "crypto_box_afternm overwrites n";
    for (j = -16;j < 0;++j) if (t2[j] != t[j]) return "crypto_box_afternm writes before output";
    for (j = tlen;j < tlen + 16;++j) if (t2[j] != t[j]) return "crypto_box_afternm writes after output";
    for (j = 0;j < crypto_box_BOXZEROBYTES;++j)
      if (t[j] != 0) return "crypto_box_afternm does not clear extra bytes";
    for (j = 0;j < mlen;++j) if (t[j] != c[j]) return "crypto_box_afternm does not match crypto_box";

    if (crypto_box_beforenm(s,pka,skb) != 0) return "crypto_box_beforenm returns nonzero";

    for (j = -16;j < tlen + 16;++j) t2[j] = t[j] = rand();
    if (crypto_box_open_afternm(t,c,clen,n,s) != 0) return "crypto_box_open_afternm returns nonzero";
    for (j = -16;j < slen + 16;++j) if (s2[j] != s[j]) return "crypto_box_open_afternm overwrites s";
    for (j = -16;j < mlen + 16;++j) if (m2[j] != m[j]) return "crypto_box_open_afternm overwrites m";
    for (j = -16;j < nlen + 16;++j) if (n2[j] != n[j]) return "crypto_box_open_afternm overwrites n";
    for (j = -16;j < 0;++j) if (t2[j] != t[j]) return "crypto_box_open_afternm writes before output";
    for (j = tlen;j < tlen + 16;++j) if (t2[j] != t[j]) return "crypto_box_open_afternm writes after output";
    for (j = 0;j < crypto_box_ZEROBYTES;++j)
      if (t[j] != 0) return "crypto_box_open_afternm does not clear extra bytes";
    for (j = 0;j < mlen;++j) if (t[j] != m[j]) return "crypto_box_open_afternm does not match crypto_box_open";

    for (j = 0;j < i;++j) n[j % nlen] ^= c[j + crypto_box_BOXZEROBYTES];
    if (i == 0) m[crypto_box_ZEROBYTES] = 0;
    m[i + crypto_box_ZEROBYTES] = m[crypto_box_ZEROBYTES];
    for (j = 0;j < i;++j) m[j + crypto_box_ZEROBYTES] ^= c[j + crypto_box_BOXZEROBYTES];
  }

  sodium_bin2hex(checksum, sizeof checksum, n, nlen);

  return 0;
}