123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356 |
- /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
- /* SPDX-License-Identifier: Unlicense */
- #include "tomcrypt_test.h"
- /**
- @file ssh_test.c
- Support for SSH data formats (RFC4251), Russ Williams
- */
- #ifdef LTC_SSH
- #define BUFSIZE 64
- /**
- Test vectors from from RFC4251, section 5
- uint32: "the value 699921578 (0x29b7f4aa) is stored as 29 b7 f4 aa"
- string: "the US-ASCII string "testing" is represented as 00 00 00 07 t e s t i n g"
- mpint:
- value (hex) representation (hex)
- ----------- --------------------
- 0 00 00 00 00
- 9a378f9b2e332a7 00 00 00 08 09 a3 78 f9 b2 e3 32 a7
- 80 00 00 00 02 00 80
- -1234 00 00 00 02 ed cc
- -deadbeef 00 00 00 05 ff 21 52 41 11
- name-list:
- value representation (hex)
- ----- --------------------
- (), the empty name-list 00 00 00 00
- ("zlib") 00 00 00 04 7a 6c 69 62
- ("zlib,none") 00 00 00 09 7a 6c 69 62 2c 6e 6f 6e 65
- */
- static const unsigned char byte1[] = {0x01};
- static const unsigned char byte2[] = {0x71};
- static const unsigned char uint32[] = {0x29, 0xb7, 0xf4, 0xaa};
- static const unsigned char uint64[] = {0x09, 0xa3, 0x78, 0xf9, 0xb2, 0xe3, 0x32, 0xa7};
- static const unsigned char string[] = {0x00, 0x00, 0x00, 0x07, 0x74, 0x65, 0x73, 0x74, 0x69, 0x6e, 0x67};
- static const unsigned char mpint1[] = {0x00, 0x00, 0x00, 0x00};
- static const unsigned char mpint2[] = {0x00, 0x00, 0x00, 0x08, 0x09, 0xa3, 0x78, 0xf9, 0xb2, 0xe3, 0x32, 0xa7};
- static const unsigned char mpint3[] = {0x00, 0x00, 0x00, 0x02, 0x00, 0x80};
- static const unsigned char nlist1[] = {0x00, 0x00, 0x00, 0x00};
- static const unsigned char nlist2[] = {0x00, 0x00, 0x00, 0x04, 0x7a, 0x6c, 0x69, 0x62};
- static const unsigned char nlist3[] = {0x00, 0x00, 0x00, 0x09, 0x7a, 0x6c, 0x69, 0x62, 0x2c, 0x6e, 0x6f, 0x6e, 0x65};
- /**
- LTC_SSH encoding test
- @return CRYPT_OK if successful
- */
- static int s_ssh_encoding_test(void)
- {
- unsigned char buffer[BUFSIZE];
- unsigned long buflen;
- unsigned long len;
- void *v, *zero;
- int err;
- /* Buffer too short */
- buflen = 3;
- zeromem(buffer, BUFSIZE);
- SHOULD_FAIL(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_UINT32, 0x29b7f4aa,
- LTC_SSHDATA_EOL, NULL));
- /* byte */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_BYTE, 0x01,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, byte1, sizeof(byte1), "enc-byte", 1);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_BYTE, 0x71,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, byte2, sizeof(byte2), "enc-byte", 2);
- if (XMEMCMP(buffer, byte2, buflen) != 0) return CRYPT_FAIL_TESTVECTOR;
- /* boolean */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_BOOLEAN, 0x01,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, byte1, sizeof(byte1), "enc-boolean", 1);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_BOOLEAN, 0x71,
- LTC_SSHDATA_EOL, NULL));
- /* Should be written out as 0x01 */
- COMPARE_TESTVECTOR(buffer, buflen, byte1, sizeof(byte1), "enc-boolean", 2);
- /* uint32 */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_UINT32, 0x29b7f4aa,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, uint32, sizeof(uint32), "enc-uint32", 1);
- /* uint64 */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_UINT64, CONST64(0x09a378f9b2e332a7),
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, uint64, sizeof(uint64), "enc-uint64", 1);
- /* string */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- len = strlen("testing");
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_STRING, "testing", len,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, string, sizeof(string), "enc-string", 1);
- /* mpint */
- if ((err = ltc_mp_init_multi(&zero, &v, LTC_NULL)) != CRYPT_OK) {
- return err;
- }
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ltc_mp_set(zero, 0));
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_MPINT, zero,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, mpint1, sizeof(mpint1), "enc-mpint", 1);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ltc_mp_read_radix(v, "9a378f9b2e332a7", 16));
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_MPINT, v,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, mpint2, sizeof(mpint2), "enc-mpint", 2);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- DO(ltc_mp_set(v, 0x80));
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_MPINT, v,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, mpint3, sizeof(mpint3), "enc-mpint", 3);
- ltc_mp_deinit_multi(v, zero, LTC_NULL);
- /* name-list */
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- len = strlen("");
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_NAMELIST, "", len,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, nlist1, sizeof(nlist1), "enc-nlist", 1);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- len = strlen("zlib");
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_NAMELIST, "zlib", len,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, nlist2, sizeof(nlist2), "enc-nlist", 2);
- buflen = BUFSIZE;
- zeromem(buffer, BUFSIZE);
- len = strlen("zlib,none");
- DO(ssh_encode_sequence_multi(buffer, &buflen,
- LTC_SSHDATA_NAMELIST, "zlib,none", len,
- LTC_SSHDATA_EOL, NULL));
- COMPARE_TESTVECTOR(buffer, buflen, nlist3, sizeof(nlist3), "enc-nlist", 3);
- return CRYPT_OK;
- }
- /**
- LTC_SSH decoding test
- @return CRYPT_OK if successful
- */
- static int s_ssh_decoding_test(void)
- {
- char strbuf[BUFSIZE];
- void *u, *v;
- unsigned long size;
- ulong32 tmp32;
- ulong64 tmp64;
- unsigned char tmp8;
- unsigned long len;
- int err;
- /* Buffer longer */
- len = sizeof(strbuf);
- strbuf[0] = 0;
- DO(ssh_decode_sequence_multi((unsigned char*)strbuf, &len,
- LTC_SSHDATA_BYTE, &tmp8,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp8 == 0x00);
- ENSURE(len == 1);
- /* byte */
- len = sizeof(byte1);
- DO(ssh_decode_sequence_multi(byte1, &len,
- LTC_SSHDATA_BYTE, &tmp8,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp8 == 0x01);
- ENSURE(len == 1);
- len = sizeof(byte2);
- DO(ssh_decode_sequence_multi(byte2, &len,
- LTC_SSHDATA_BYTE, &tmp8,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp8 == 0x71);
- ENSURE(len == 1);
- /* boolean */
- len = sizeof(byte1);
- DO(ssh_decode_sequence_multi(byte1, &len,
- LTC_SSHDATA_BOOLEAN, &tmp8,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp8 == 0x01);
- ENSURE(len == 1);
- len = sizeof(byte2);
- DO(ssh_decode_sequence_multi(byte2, &len,
- LTC_SSHDATA_BOOLEAN, &tmp8,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp8 == 0x01);
- ENSURE(len == 1);
- /* uint32 */
- len = sizeof(uint32);
- DO(ssh_decode_sequence_multi(uint32, &len,
- LTC_SSHDATA_UINT32, &tmp32,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(tmp32 == 0x29b7f4aa);
- ENSURE(len == 4);
- /* uint64 */
- len = sizeof(uint64);
- DO(ssh_decode_sequence_multi(uint64, &len,
- LTC_SSHDATA_UINT64, &tmp64,
- LTC_SSHDATA_EOL, NULL));
- if (tmp64 != CONST64(0x09a378f9b2e332a7)) return CRYPT_FAIL_TESTVECTOR;
- ENSURE(len == 8);
- /* string */
- zeromem(strbuf, BUFSIZE);
- size = BUFSIZE;
- len = sizeof(string);
- DO(ssh_decode_sequence_multi(string, &len,
- LTC_SSHDATA_STRING, strbuf, &size,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(strlen("testing") == size);
- ENSURE(XSTRCMP(strbuf, "testing") == 0);
- ENSURE(strlen("testing") + 4 == len);
- /* mpint */
- if ((err = ltc_mp_init_multi(&u, &v, LTC_NULL)) != CRYPT_OK) {
- return err;
- }
- len = sizeof(mpint1);
- DO(ssh_decode_sequence_multi(mpint1, &len,
- LTC_SSHDATA_MPINT, v,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(ltc_mp_cmp_d(v, 0) == LTC_MP_EQ);
- ENSURE(sizeof(mpint1) == len);
- len = sizeof(mpint2);
- DO(ssh_decode_sequence_multi(mpint2, &len,
- LTC_SSHDATA_MPINT, v,
- LTC_SSHDATA_EOL, NULL));
- DO(ltc_mp_read_radix(u, "9a378f9b2e332a7", 16));
- ENSURE(ltc_mp_cmp(u, v) == LTC_MP_EQ);
- ENSURE(sizeof(mpint2) == len);
- len = sizeof(mpint3);
- DO(ssh_decode_sequence_multi(mpint3, &len,
- LTC_SSHDATA_MPINT, v,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(ltc_mp_cmp_d(v, 0x80) == LTC_MP_EQ);
- ENSURE(sizeof(mpint3) == len);
- ltc_mp_deinit_multi(v, u, LTC_NULL);
- /* name-list */
- zeromem(strbuf, BUFSIZE);
- size = BUFSIZE;
- len = sizeof(nlist1);
- DO(ssh_decode_sequence_multi(nlist1, &len,
- LTC_SSHDATA_NAMELIST, strbuf, &size,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(strlen("") == size);
- ENSURE(XSTRCMP(strbuf, "") == 0);
- zeromem(strbuf, BUFSIZE);
- size = BUFSIZE;
- len = sizeof(nlist2);
- DO(ssh_decode_sequence_multi(nlist2, &len,
- LTC_SSHDATA_NAMELIST, strbuf, &size,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(strlen("zlib") == size);
- ENSURE(XSTRCMP(strbuf, "zlib") == 0);
- ENSURE(strlen("zlib") + 4 == len);
- zeromem(strbuf, BUFSIZE);
- size = BUFSIZE;
- len = sizeof(nlist3);
- DO(ssh_decode_sequence_multi(nlist3, &len,
- LTC_SSHDATA_NAMELIST, strbuf, &size,
- LTC_SSHDATA_EOL, NULL));
- ENSURE(strlen("zlib,none") == size);
- ENSURE(XSTRCMP(strbuf, "zlib,none") == 0);
- ENSURE(strlen("zlib,none") + 4 == len);
- return CRYPT_OK;
- }
- /**
- LTC_SSH self-test
- @return CRYPT_OK if successful, CRYPT_NOP if tests have been disabled.
- */
- int ssh_test(void)
- {
- if (ltc_mp.name == NULL) return CRYPT_NOP;
- DO(s_ssh_encoding_test());
- DO(s_ssh_decoding_test());
- return CRYPT_OK;
- }
- #else
- int ssh_test(void)
- {
- return CRYPT_NOP;
- }
- #endif
|