bcrypt_test.c 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. /* LibTomCrypt, modular cryptographic library -- Tom St Denis
  2. *
  3. * LibTomCrypt is a library that provides various cryptographic
  4. * algorithms in a highly modular and flexible manner.
  5. *
  6. * The library is free for all purposes without any express
  7. * guarantee it works.
  8. */
  9. #include <tomcrypt_test.h>
  10. #ifdef LTC_BCRYPT
  11. /** These tests were shamelessly c&p'ed from the OpenBSD sources
  12. * https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/regress/lib/libutil/bcrypt_pbkdf/bcrypt_pbkdf_test.c */
  13. struct test {
  14. unsigned int rounds;
  15. unsigned long passlen;
  16. const char *password;
  17. unsigned long saltlen;
  18. const char *salt;
  19. unsigned long keylen;
  20. const char *key;
  21. };
  22. struct test tests[] = {
  23. /* basic */
  24. { 4, 8, "password", 4, "salt", 32,
  25. "\x5b\xbf\x0c\xc2\x93\x58\x7f\x1c\x36\x35\x55\x5c\x27\x79\x65\x98"
  26. "\xd4\x7e\x57\x90\x71\xbf\x42\x7e\x9d\x8f\xbe\x84\x2a\xba\x34\xd9"
  27. },
  28. { 4, 8, "password", 1, "", 16,
  29. "\xc1\x2b\x56\x62\x35\xee\xe0\x4c\x21\x25\x98\x97\x0a\x57\x9a\x67"
  30. },
  31. { 4, 1, "", 4, "salt", 16,
  32. "\x60\x51\xbe\x18\xc2\xf4\xf8\x2c\xbf\x0e\xfe\xe5\x47\x1b\x4b\xb9"
  33. },
  34. /* nul bytes in password and string */
  35. { 4, 9, "password", 5, "salt", 32,
  36. "\x74\x10\xe4\x4c\xf4\xfa\x07\xbf\xaa\xc8\xa9\x28\xb1\x72\x7f\xac"
  37. "\x00\x13\x75\xe7\xbf\x73\x84\x37\x0f\x48\xef\xd1\x21\x74\x30\x50"
  38. },
  39. { 4, 8, "pass\0word", 4, "sa\0lt", 16,
  40. "\xc2\xbf\xfd\x9d\xb3\x8f\x65\x69\xef\xef\x43\x72\xf4\xde\x83\xc0"
  41. },
  42. { 4, 9, "pass\0word", 5, "sa\0lt", 16,
  43. "\x4b\xa4\xac\x39\x25\xc0\xe8\xd7\xf0\xcd\xb6\xbb\x16\x84\xa5\x6f"
  44. },
  45. /* bigger key */
  46. { 8, 8, "password", 4, "salt", 64,
  47. "\xe1\x36\x7e\xc5\x15\x1a\x33\xfa\xac\x4c\xc1\xc1\x44\xcd\x23\xfa"
  48. "\x15\xd5\x54\x84\x93\xec\xc9\x9b\x9b\x5d\x9c\x0d\x3b\x27\xbe\xc7"
  49. "\x62\x27\xea\x66\x08\x8b\x84\x9b\x20\xab\x7a\xa4\x78\x01\x02\x46"
  50. "\xe7\x4b\xba\x51\x72\x3f\xef\xa9\xf9\x47\x4d\x65\x08\x84\x5e\x8d"
  51. },
  52. /* more rounds */
  53. { 42, 8, "password", 4, "salt", 16,
  54. "\x83\x3c\xf0\xdc\xf5\x6d\xb6\x56\x08\xe8\xf0\xdc\x0c\xe8\x82\xbd"
  55. },
  56. /* longer password */
  57. { 8, 446,
  58. "Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do "
  59. "eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut "
  60. "enim ad minim veniam, quis nostrud exercitation ullamco laboris "
  61. "nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor "
  62. "in reprehenderit in voluptate velit esse cillum dolore eu fugiat "
  63. "nulla pariatur. Excepteur sint occaecat cupidatat non proident, "
  64. "sunt in culpa qui officia deserunt mollit anim id est laborum.",
  65. 6, "salis", 16,
  66. "\x10\x97\x8b\x07\x25\x3d\xf5\x7f\x71\xa1\x62\xeb\x0e\x8a\xd3\x0a"
  67. },
  68. /* "unicode" */
  69. { 8,
  70. 16, "\x0d\xb3\xac\x94\xb3\xee\x53\x28\x4f\x4a\x22\x89\x3b\x3c\x24\xae",
  71. 16, "\x3a\x62\xf0\xf0\xdb\xce\xf8\x23\xcf\xcc\x85\x48\x56\xea\x10\x28",
  72. 16, "\x20\x44\x38\x17\x5e\xee\x7c\xe1\x36\xc9\x1b\x49\xa6\x79\x23\xff"
  73. },
  74. /* very large key */
  75. { 8,
  76. 16, "\x0d\xb3\xac\x94\xb3\xee\x53\x28\x4f\x4a\x22\x89\x3b\x3c\x24\xae",
  77. 16, "\x3a\x62\xf0\xf0\xdb\xce\xf8\x23\xcf\xcc\x85\x48\x56\xea\x10\x28",
  78. 256,
  79. "\x20\x54\xb9\xff\xf3\x4e\x37\x21\x44\x03\x34\x74\x68\x28\xe9\xed"
  80. "\x38\xde\x4b\x72\xe0\xa6\x9a\xdc\x17\x0a\x13\xb5\xe8\xd6\x46\x38"
  81. "\x5e\xa4\x03\x4a\xe6\xd2\x66\x00\xee\x23\x32\xc5\xed\x40\xad\x55"
  82. "\x7c\x86\xe3\x40\x3f\xbb\x30\xe4\xe1\xdc\x1a\xe0\x6b\x99\xa0\x71"
  83. "\x36\x8f\x51\x8d\x2c\x42\x66\x51\xc9\xe7\xe4\x37\xfd\x6c\x91\x5b"
  84. "\x1b\xbf\xc3\xa4\xce\xa7\x14\x91\x49\x0e\xa7\xaf\xb7\xdd\x02\x90"
  85. "\xa6\x78\xa4\xf4\x41\x12\x8d\xb1\x79\x2e\xab\x27\x76\xb2\x1e\xb4"
  86. "\x23\x8e\x07\x15\xad\xd4\x12\x7d\xff\x44\xe4\xb3\xe4\xcc\x4c\x4f"
  87. "\x99\x70\x08\x3f\x3f\x74\xbd\x69\x88\x73\xfd\xf6\x48\x84\x4f\x75"
  88. "\xc9\xbf\x7f\x9e\x0c\x4d\x9e\x5d\x89\xa7\x78\x39\x97\x49\x29\x66"
  89. "\x61\x67\x07\x61\x1c\xb9\x01\xde\x31\xa1\x97\x26\xb6\xe0\x8c\x3a"
  90. "\x80\x01\x66\x1f\x2d\x5c\x9d\xcc\x33\xb4\xaa\x07\x2f\x90\xdd\x0b"
  91. "\x3f\x54\x8d\x5e\xeb\xa4\x21\x13\x97\xe2\xfb\x06\x2e\x52\x6e\x1d"
  92. "\x68\xf4\x6a\x4c\xe2\x56\x18\x5b\x4b\xad\xc2\x68\x5f\xbe\x78\xe1"
  93. "\xc7\x65\x7b\x59\xf8\x3a\xb9\xab\x80\xcf\x93\x18\xd6\xad\xd1\xf5"
  94. "\x93\x3f\x12\xd6\xf3\x61\x82\xc8\xe8\x11\x5f\x68\x03\x0a\x12\x44"
  95. },
  96. };
  97. int bcrypt_test(void)
  98. {
  99. unsigned long l;
  100. unsigned char key[1024];
  101. unsigned int i;
  102. int idx;
  103. struct test *t;
  104. idx = find_hash("sha512");
  105. XMEMSET(key, 0, sizeof(key));
  106. l = 88;
  107. DO(bcrypt_pbkdf_openbsd("password", 8, (unsigned char*)"salt", 4, 0, idx, key, &l));
  108. for (i = 1; i < 88; ++i) {
  109. key[0] |= key[i];
  110. }
  111. if (key[0] == 0) {
  112. return CRYPT_FAIL_TESTVECTOR;
  113. }
  114. if (key[88] || key[89] || key[90]) {
  115. return CRYPT_BUFFER_OVERFLOW;
  116. }
  117. #if defined(LTC_TEST_DBG) && LTC_TEST_DBG > 1
  118. printf("BCRYPT overflow-test OK\n");
  119. #endif
  120. for (i = 0; i < sizeof(tests) / sizeof(tests[0]); i++) {
  121. t = &tests[i];
  122. l = t->keylen;
  123. XMEMSET(key, 0, sizeof(key));
  124. DO(bcrypt_pbkdf_openbsd(t->password, t->passlen, (unsigned char*)t->salt, t->saltlen, t->rounds, idx, key, &l));
  125. DO(do_compare_testvector(key, l, (unsigned char*)t->key, t->keylen, "OpenBSD testvectors", i));
  126. #if defined(LTC_TEST_DBG) && LTC_TEST_DBG > 1
  127. printf("BCRYPT test #%d OK\n", i);
  128. #endif
  129. }
  130. return CRYPT_OK;
  131. }
  132. #else
  133. int bcrypt_test(void)
  134. {
  135. return CRYPT_NOP;
  136. }
  137. #endif
  138. /* ref: $Format:%D$ */
  139. /* git commit: $Format:%H$ */
  140. /* commit time: $Format:%ai$ */