diff --git a/aes.c b/aes.c index 6f265a8..f8f34c9 100644 --- a/aes.c +++ b/aes.c @@ -317,73 +317,54 @@ void rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_ int rijndael_test(void) { int errno; - - static const unsigned char pt128[16] = { - 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, - 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }; - static const unsigned char key128[16] = { - 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }; - static const unsigned char ct128[16] = { - 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, - 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a }; - - static const unsigned char key192[24] = { - 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, - 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }; - static const unsigned char ct192[16] = { - 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, - 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 }; - - static const unsigned char key256[32] = { - 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, - 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, - 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; - static const unsigned char ct256[16] = { - 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, - 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 }; + static const struct { + int keylen; + unsigned char key[32], pt[16], ct[16]; + } tests[] = { + { 16, + { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }, + { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, + 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + { 0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x04, 0x30, + 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a } + }, { + 24, + { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, + 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, + { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, + 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + { 0xdd, 0xa9, 0x7c, 0xa4, 0x86, 0x4c, 0xdf, 0xe0, + 0x6e, 0xaf, 0x70, 0xa0, 0xec, 0x0d, 0x71, 0x91 } + }, { + 32, + { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, + 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, + 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }, + { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, + 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff }, + { 0x8e, 0xa2, 0xb7, 0xca, 0x51, 0x67, 0x45, 0xbf, + 0xea, 0xfc, 0x49, 0x90, 0x4b, 0x49, 0x60, 0x89 } + } + }; + symmetric_key key; unsigned char tmp[2][16]; + int i; + + for (i = 0; i < (int)(sizeof(tests)/sizeof(tests[0])); i++) { + if ((errno = rijndael_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { + return errno; + } - if ((errno = rijndael_setup(key128, 16, 0, &key)) != CRYPT_OK) { - return errno; - } - - rijndael_ecb_encrypt(pt128, tmp[0], &key); - rijndael_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - if (memcmp(tmp[1], pt128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - - if ((errno = rijndael_setup(key192, 24, 0, &key)) != CRYPT_OK) { - return errno; - } - - rijndael_ecb_encrypt(pt128, tmp[0], &key); - rijndael_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct192, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - if (memcmp(tmp[1], pt128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - - if ((errno = rijndael_setup(key256, 32, 0, &key)) != CRYPT_OK) { - return errno; - } - rijndael_ecb_encrypt(pt128, tmp[0], &key); - rijndael_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct256, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - if (memcmp(tmp[1], pt128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } + rijndael_ecb_encrypt(tests[i].pt, tmp[0], &key); + rijndael_ecb_decrypt(tmp[0], tmp[1], &key); + if (memcmp(tmp[0], tests[i].ct, 16) || memcmp(tmp[1], tests[i].pt, 16)) { + return CRYPT_FAIL_TESTVECTOR; + } + } return CRYPT_OK; } diff --git a/blowfish.c b/blowfish.c index e00cec7..431ec7c 100644 --- a/blowfish.c +++ b/blowfish.c @@ -634,9 +634,9 @@ int blowfish_test(void) } }; unsigned char buf[2][8]; - int x, failed; + int x; - for (x = failed = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { + for (x = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { /* setup key */ if ((errno = blowfish_setup(tests[x].key, 8, 16, &key)) != CRYPT_OK) { return errno; @@ -647,32 +647,11 @@ int blowfish_test(void) blowfish_ecb_decrypt(buf[0], buf[1], &key); /* compare */ - if (memcmp(buf[0], tests[x].ct, 8)) { -#if 0 - int y; - printf("\nEncrypt test %d failed\n", x); - for (y = 0; y < 8; y++) printf("%02x ", buf[0][y]); - printf("\n"); -#endif - failed = 1; - } - - if (memcmp(buf[1], tests[x].pt, 8)) { -#if 0 - int y; - printf("\nDecrypt test %d failed\n", x); - for (y = 0; y < 8; y++) printf("%02x ", buf[1][y]); - printf("\n"); -#endif - failed = 1; + if (memcmp(buf[0], tests[x].ct, 8) || memcmp(buf[1], tests[x].pt, 8)) { + return CRYPT_FAIL_TESTVECTOR; } } - - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } int blowfish_keysize(int *desired_keysize) diff --git a/cast5.c b/cast5.c index 62431d7..336e921 100644 --- a/cast5.c +++ b/cast5.c @@ -583,23 +583,8 @@ int cast5_test(void) return errno; } cast5_ecb_encrypt(tests[i].pt, buf, &key); - if (memcmp(buf, tests[i].ct, 8)) { -#if 0 - int j; - printf("\n\n\nFailed encrypt test: %d\n", i); - for (j = 0; j < 8; j++) printf("%02x ", buf[j]); - printf("\n"); -#endif - return CRYPT_FAIL_TESTVECTOR; - } cast5_ecb_decrypt(buf, buf2, &key); - if (memcmp(buf2, tests[i].pt, 8)) { -#if 0 - int j; - printf("\n\n\nFailed decrypt test: %d\n", i); - for (j = 0; j < 8; j++) printf("%02x ", buf2[j]); - printf("\n"); -#endif + if (memcmp(buf, tests[i].ct, 8) || memcmp(buf2, tests[i].pt, 8)) { return CRYPT_FAIL_TESTVECTOR; } diff --git a/changes b/changes index 5988099..cd8c1f2 100644 --- a/changes +++ b/changes @@ -1,3 +1,13 @@ +Nov 25th, 2002 +v0.76 -- Updated makefiles a bit more, use "-Os" instead of "-O2" to optimize for size. Got the lib + downto 265KB using GCC 3.2 on my x86 box. + -- Updated the SAFER+, Twofish and Rijndael test vector routine to use the table driven design. + -- Updated all other test vector routines to return as soon as an error is found + -- fixed a bug in the test program where errors in the hash test routines would not be reported + correctly. I found this by temporarily changing one of the bytes of the test vectors. All the + hashes check out [the demos/test.c would still have reported an error, just the wrong one]. + + Nov 24th, 2002 v0.75 -- Fixed a flaw in hash_filehandle, it should ARGCHK that the filehandle is not NULL -- Fixed a bug where in hash_file if the call to hash_filehandle failed the open file would diff --git a/crypt.pdf b/crypt.pdf index b26f720..d76ccc4 100644 Binary files a/crypt.pdf and b/crypt.pdf differ diff --git a/crypt.tex b/crypt.tex index eb7df20..fc68be9 100644 --- a/crypt.tex +++ b/crypt.tex @@ -44,7 +44,7 @@ \def\gap{\vspace{0.5ex}} \makeindex \begin{document} -\title{A Tiny Crypto Library, \\ LibTomCrypt \\ Version 0.75} +\title{A Tiny Crypto Library, \\ LibTomCrypt \\ Version 0.76} \author{Tom St Denis \\ Algonquin College \\ \\ diff --git a/demos/test.c b/demos/test.c index 39d966e..ca05e31 100644 --- a/demos/test.c +++ b/demos/test.c @@ -307,7 +307,7 @@ void hash_tests(void) printf("Hash tests\n"); for (x = 0; hash_descriptor[x].name != NULL; x++) { printf(" %10s (%2d) ", hash_descriptor[x].name, hash_descriptor[x].ID); - if (hash_descriptor[x].test() != CRYPT_OK) + if ((errno = hash_descriptor[x].test()) != CRYPT_OK) printf("**failed** Reason: %s\n", error_to_string(errno)); else printf("passed\n"); diff --git a/des.c b/des.c index 6edda71..ae35bdf 100644 --- a/des.c +++ b/des.c @@ -630,7 +630,7 @@ int des_test(void) http://www.ecs.soton.ac.uk/~prw99r/ez438/vectors.txt ***/ }; - int i, failed=0; + int i; unsigned char out[8]; symmetric_key des; @@ -646,29 +646,10 @@ int des_test(void) } if (memcmp(cases[i].out, out, sizeof out) != 0) { -#if 0 - int j; - printf("DES test #%d failed!\n", cases[i].num); - - printf( "got: "); - for (j=0; j < (int)sizeof out; j++) { - printf("%02x ", out[j] & 0xff); - } - printf("\nwanted: "); - for(j=0; j < (int)sizeof out; j++) { - printf("%02x ", cases[i].out[j] & 0xff); - } - printf("\n"); -#endif - - failed++; + return CRYPT_FAIL_TESTVECTOR; } } - if(failed > 0) { - return CRYPT_FAIL_TESTVECTOR; - } - return CRYPT_OK; } diff --git a/ecc.c b/ecc.c index e2cae85..e7ebe7d 100644 --- a/ecc.c +++ b/ecc.c @@ -251,8 +251,8 @@ static int dbl_point(ecc_point *P, ecc_point *R, mp_int *modulus) if (mp_mul_2(&P->y, &tmp) != MP_OKAY) { goto error; } /* tmp = 2*y */ if (mp_invmod(&tmp, modulus, &tmp) != MP_OKAY) { goto error; } /* tmp = 1/tmp mod modulus */ if (mp_sqr(&P->x, &s) != MP_OKAY) { goto error; } /* s = x^2 */ - if (mp_mul_d(&s, 3, &s) != MP_OKAY) { goto error; } /* s = 3*(x^2) */ - if (mp_sub_d(&s, 3, &s) != MP_OKAY) { goto error; } /* s = 3*(x^2) - 3 */ + if (mp_mul_d(&s,(mp_digit)3, &s) != MP_OKAY) { goto error; } /* s = 3*(x^2) */ + if (mp_sub_d(&s,(mp_digit)3, &s) != MP_OKAY) { goto error; } /* s = 3*(x^2) - 3 */ if (mp_mulmod(&s, &tmp, modulus, &s) != MP_OKAY) { goto error; } /* s = tmp * s mod modulus */ /* Xr = s^2 - 2Xp */ @@ -565,10 +565,11 @@ static int compress_y_point(ecc_point *pt, int idx, int *result) if (mp_exptmod(&tmp, &tmp2, &p, &tmp) != MP_OKAY) { goto error; } /* tmp = (x^3 - 3x + b)^((p+1)/4) mod p */ /* if tmp equals the y point give a 0, otherwise 1 */ - if (mp_cmp(&tmp, &pt->y) == 0) + if (mp_cmp(&tmp, &pt->y) == 0) { *result = 0; - else + } else { *result = 1; + } res = CRYPT_OK; goto done; diff --git a/makefile b/makefile index 53de606..48afa64 100644 --- a/makefile +++ b/makefile @@ -9,7 +9,7 @@ # a build. This is easy to remedy though, for those that have problems. # The version -VERSION=0.75 +VERSION=0.76 #Compiler and Linker Names CC=gcc @@ -34,10 +34,10 @@ CFLAGS += -c -I./ -Wall -Wsign-compare -W -Wno-unused -Werror \ -DXCLOCKS_PER_SEC=$(XCLOCKS_PER_SEC) #optimize for SPEED (comment out SIZE/DEBUG line as well) -#CFLAGS += -O3 -fomit-frame-pointer -funroll-loops +#CFLAGS += -O3 -funroll-loops #optimize for SIZE (comment out SPEED/DEBUG line as well) -CFLAGS += -O2 +CFLAGS += -Os #compile for DEBUGGING #CFLAGS += -g3 diff --git a/makefile.ps2 b/makefile.ps2 index 932a17e..a7cc405 100644 --- a/makefile.ps2 +++ b/makefile.ps2 @@ -51,7 +51,7 @@ CFLAGS += -DNO_FILE #CFLAGS += -O3 -fomit-frame-pointer -funroll-loops #optimize for SIZE (comment out SPEED line as well) -CFLAGS += -O2 +CFLAGS += -Os #These flags control how the library gets built. diff --git a/md2.c b/md2.c index e29db7a..c26fb12 100644 --- a/md2.c +++ b/md2.c @@ -180,19 +180,6 @@ int md2_test(void) md2_process(&md, tests[i].msg, strlen(tests[i].msg)); md2_done(&md, buf); if (memcmp(buf, tests[i].md, 16)) { -#if 0 - int j; - printf("\n\nFailed test %d\n\n", i); - for (j = 0; j < 16; j++) { - printf("%02x ", buf[j]); - } - printf("\n"); - printf("Should have been\n"); - for (j = 0; j < 16; j++) { - printf("%02x ", tests[i].md[j]); - } - printf("\n"); -#endif return CRYPT_FAIL_TESTVECTOR; } } diff --git a/md4.c b/md4.c index bbf2700..6cfaeba 100644 --- a/md4.c +++ b/md4.c @@ -249,39 +249,19 @@ int md4_test(void) {0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36} }, }; - int i, failed; + int i; hash_state md; unsigned char digest[16]; - failed = 0; for(i = 0; i < (int)(sizeof(cases) / sizeof(cases[0])); i++) { md4_init(&md); md4_process(&md, cases[i].input, cases[i].inputlen); md4_done(&md, digest); - if(memcmp(digest, cases[i].digest, 16) != 0) { -#if 0 - int j; - printf("\nMD4 test #%d failed\n", cases[i].num); - printf( "Result: 0x"); - for(j=0; j < 16; j++) { - printf("%2x", digest[j]); - } - printf("\nCorrect: 0x"); - for(j=0; j < 16; j++) { - printf("%2x", cases[i].digest[j]); - } - printf("\n"); -#endif - failed++; - } else { -/* printf("MD4 test #%d succeeded.\n", cases[i].num); */ + if (memcmp(digest, cases[i].digest, 16) != 0) { + return CRYPT_FAIL_TESTVECTOR; } - } - if (failed) { - return CRYPT_FAIL_TESTVECTOR; } - return CRYPT_OK; } diff --git a/md5.c b/md5.c index 2baf1b6..a489f62 100644 --- a/md5.c +++ b/md5.c @@ -236,31 +236,19 @@ int md5_test(void) { NULL, { 0 } } }; - int failed, i; + int i; unsigned char tmp[16]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; tests[i].msg != NULL; i++) { md5_init(&md); md5_process(&md, tests[i].msg, strlen(tests[i].msg)); md5_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 16)) { -#if 0 - int j; - printf("MD5 Test %d (len == %d) failed\nGot (as a result): ", i, strlen(tests[i].msg)); - for (j = 0; j < 16; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } #endif diff --git a/mycrypt.h b/mycrypt.h index 1604854..fc8eeaf 100644 --- a/mycrypt.h +++ b/mycrypt.h @@ -13,8 +13,8 @@ extern "C" { #endif /* version */ -#define CRYPT 0x0075 -#define SCRYPT "0.75" +#define CRYPT 0x0076 +#define SCRYPT "0.76" /* max size of either a cipher/hash block or symmetric key [largest of the two] */ #define MAXBLOCKSIZE 128 diff --git a/notes/tech0002.txt b/notes/tech0002.txt new file mode 100644 index 0000000..b9990e0 --- /dev/null +++ b/notes/tech0002.txt @@ -0,0 +1,52 @@ +Tech Note 0002 +How to avoid non-intrusive timing attacks with online computations +Tom St Denis + +Introduction +------------ + +A timing attack is when an attacker can observe a side channel of the device (in this case time). In this tech note +we consider only non-intrusive timing attacks with respect to online computations. That is an attacker can +determine when a computation (such as a public key encryption) begins and ends but cannot observe the device +directly. This is specifically important for applications which transmit data via a public network. + +Consider a Diffie-Hellman encryption which requires the sender to make up a public key "y = g^x mod p". Libtomcrypt +uses the MPI bignum library to perform the operation. The time it takes to compute y is controlled by the number +of 1 bits in the exponent 'x'. To a large extent there will be the same number of squaring operations. "1" bits in +the exponent require the sender to perform a multiplication. This means to a certain extent an attacker can +determine not only the magnitude of 'x' but the number of one bits. With this information the attacker cannot directly +learn the key used. However, good cryptography mandates the close scrutiny of any practical side channel. + +Similar logic applies to the other various routines. Fortunately for this case there is a simple solution. First, +determine the maximum time the particular operation can require. For instance, on an Athlon 1.53Ghz XP processor a +DH-768 encryption requires roughly 50 milliseconds. Take that time and round it up. Now place a delay after the call. + +For example, + +void demo(void) { + clock_t t1; + + // get initial clock + t1 = clock(); + + // some PK function + + // now delay + while (clock() < (t1 + 100)); + + // transmit data... + +} + +This code has the effect of taking at least 100 ms always. In effect someone analyzing the traffic will see that the +operations always take a fixed amount of time. Since no two platforms are the same this type of fix has not been +incorporated into libtomcrypt (nor is it desired for many platforms). This requires on the developers part to profile +the code to determine the delays required. + +Note that this "quick" fix has no effect against an intrusive attacker. For example, power consumption will drop +significantly in the loop after the operation. However, this type of fix is more important to secure the user of the +application/device. For example, a user placing an order online won't try to cheat themselves by cracking open their +device and performing side-channel cryptanalysis. An attacker over a network might try to use the timing information +against the user. + + diff --git a/rc2.c b/rc2.c index c4a8b81..70494b2 100644 --- a/rc2.c +++ b/rc2.c @@ -258,11 +258,10 @@ int rc2_test(void) { 0x22, 0x69, 0x55, 0x2a, 0xb0, 0xf8, 0x5c, 0xa6 } } }; - int x, failed, errno; + int x, errno; symmetric_key skey; unsigned char buf[2][8]; - failed = 0; for (x = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { zeromem(buf, sizeof(buf)); if ((errno = rc2_setup(tests[x].key, tests[x].keylen, 0, &skey)) != CRYPT_OK) { @@ -272,36 +271,11 @@ int rc2_test(void) rc2_ecb_encrypt(tests[x].pt, buf[0], &skey); rc2_ecb_decrypt(buf[0], buf[1], &skey); - if (memcmp(buf[0], tests[x].ct, 8)) { -#if 0 - int y; - printf("\nTest %d failed to encrypt\n", x); - for (y = 0; y < 8; y++) { - printf("%02x ", buf[0][y]); - } - printf("\n"); -#endif - failed = 1; - } - - if (memcmp(buf[1], tests[x].pt, 8)) { -#if 0 - int y; - printf("\nTest %d failed to decrypt\n", x); - for (y = 0; y < 8; y++) { - printf("%02x ", buf[1][y]); - } - printf("\n"); -#endif - failed = 1; + if (memcmp(buf[0], tests[x].ct, 8) || memcmp(buf[1], tests[x].pt, 8)) { + return CRYPT_FAIL_TESTVECTOR; } } - - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } int rc2_keysize(int *keysize) diff --git a/rc5.c b/rc5.c index d699ba6..82866d3 100644 --- a/rc5.c +++ b/rc5.c @@ -175,10 +175,10 @@ int rc5_test(void) } }; unsigned char buf[2][8]; - int x, failed, errno; + int x, errno; symmetric_key key; - for (x = failed = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { + for (x = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { /* setup key */ if ((errno = rc5_setup(tests[x].key, 16, 12, &key)) != CRYPT_OK) { return errno; @@ -189,32 +189,11 @@ int rc5_test(void) rc5_ecb_decrypt(buf[0], buf[1], &key); /* compare */ - if (memcmp(buf[0], tests[x].ct, 8)) { -#if 0 - int y; - printf("\nEncrypt test %d failed\n", x); - for (y = 0; y < 8; y++) printf("%02x ", buf[0][y]); - printf("\n"); -#endif - failed = 1; - } - - if (memcmp(buf[1], tests[x].pt, 8)) { -#if 0 - int y; - printf("\nDecrypt test %d failed\n", x); - for (y = 0; y < 8; y++) printf("%02x ", buf[1][y]); - printf("\n"); -#endif - failed = 1; + if (memcmp(buf[0], tests[x].ct, 8) || memcmp(buf[1], tests[x].pt, 8)) { + return CRYPT_FAIL_TESTVECTOR; } } - - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } int rc5_keysize(int *desired_keysize) diff --git a/rc6.c b/rc6.c index fc7aacd..14fb74b 100644 --- a/rc6.c +++ b/rc6.c @@ -195,10 +195,10 @@ int rc6_test(void) } }; unsigned char buf[2][16]; - int x, failed, errno; + int x, errno; symmetric_key key; - for (x = failed = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { + for (x = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { /* setup key */ if ((errno = rc6_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) { return errno; @@ -209,32 +209,11 @@ int rc6_test(void) rc6_ecb_decrypt(buf[0], buf[1], &key); /* compare */ - if (memcmp(buf[0], tests[x].ct, 16)) { -#if 0 - int y; - printf("\nEncrypt test %d failed\n", x); - for (y = 0; y < 16; y++) printf("%02x ", buf[0][y]); - printf("\n"); -#endif - failed = 1; - } - - if (memcmp(buf[1], tests[x].pt, 16)) { -#if 0 - int y; - printf("\nDecrypt test %d failed\n", x); - for (y = 0; y < 16; y++) printf("%02x ", buf[1][y]); - printf("\n"); -#endif - failed = 1; + if (memcmp(buf[0], tests[x].ct, 16) || memcmp(buf[1], tests[x].pt, 16)) { + return CRYPT_FAIL_TESTVECTOR; } } - - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } int rc6_keysize(int *desired_keysize) diff --git a/safer+.c b/safer+.c index 13254b7..6c1086a 100644 --- a/safer+.c +++ b/safer+.c @@ -407,77 +407,55 @@ void saferp_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_ke int saferp_test(void) { - static const unsigned char key128[16] = - { 41, 35, 190, 132, 225, 108, 214, 174, - 82, 144, 73, 241, 241, 187, 233, 235 }; - static const unsigned char pt128[16] = - { 179, 166, 219, 60, 135, 12, 62, 153, - 36, 94, 13, 28, 6, 183, 71, 222 }; - static const unsigned char ct128[16] = - { 224, 31, 182, 10, 12, 255, 84, 70, - 127, 13, 89, 249, 9, 57, 165, 220 }; - - static const unsigned char key192[24] = - { 72, 211, 143, 117, 230, 217, 29, 42, - 229, 192, 247, 43, 120, 129, 135, 68, - 14, 95, 80, 0, 212, 97, 141, 190 }; - static const unsigned char pt192[16] = - { 123, 5, 21, 7, 59, 51, 130, 31, - 24, 112, 146, 218, 100, 84, 206, 177 }; - static const unsigned char ct192[16] = - { 92, 136, 4, 63, 57, 95, 100, 0, - 150, 130, 130, 16, 193, 111, 219, 133 }; - - static const unsigned char key256[32] = - { 243, 168, 141, 254, 190, 242, 235, 113, - 255, 160, 208, 59, 117, 6, 140, 126, - 135, 120, 115, 77, 208, 190, 130, 190, - 219, 194, 70, 65, 43, 140, 250, 48 }; - static const unsigned char pt256[16] = - { 127, 112, 240, 167, 84, 134, 50, 149, - 170, 91, 104, 19, 11, 230, 252, 245 }; - static const unsigned char ct256[16] = - { 88, 11, 25, 36, 172, 229, 202, 213, - 170, 65, 105, 153, 220, 104, 153, 138 }; + static const struct { + int keylen; + unsigned char key[32], pt[16], ct[16]; + } tests[] = { + { + 16, + { 41, 35, 190, 132, 225, 108, 214, 174, + 82, 144, 73, 241, 241, 187, 233, 235 }, + { 179, 166, 219, 60, 135, 12, 62, 153, + 36, 94, 13, 28, 6, 183, 71, 222 }, + { 224, 31, 182, 10, 12, 255, 84, 70, + 127, 13, 89, 249, 9, 57, 165, 220 } + }, { + 24, + { 72, 211, 143, 117, 230, 217, 29, 42, + 229, 192, 247, 43, 120, 129, 135, 68, + 14, 95, 80, 0, 212, 97, 141, 190 }, + { 123, 5, 21, 7, 59, 51, 130, 31, + 24, 112, 146, 218, 100, 84, 206, 177 }, + { 92, 136, 4, 63, 57, 95, 100, 0, + 150, 130, 130, 16, 193, 111, 219, 133 } + }, { + 32, + { 243, 168, 141, 254, 190, 242, 235, 113, + 255, 160, 208, 59, 117, 6, 140, 126, + 135, 120, 115, 77, 208, 190, 130, 190, + 219, 194, 70, 65, 43, 140, 250, 48 }, + { 127, 112, 240, 167, 84, 134, 50, 149, + 170, 91, 104, 19, 11, 230, 252, 245 }, + { 88, 11, 25, 36, 172, 229, 202, 213, + 170, 65, 105, 153, 220, 104, 153, 138 } + } + }; unsigned char buf[2][16]; symmetric_key skey; - int errno; + int errno, i; - /* test 128-bit key */ - if ((errno = saferp_setup(key128, 16, 0, &skey)) != CRYPT_OK) { - return errno; - } - saferp_ecb_encrypt(pt128, buf[0], &skey); - saferp_ecb_decrypt(buf[0], buf[1], &skey); + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { + if ((errno = saferp_setup(tests[i].key, tests[i].keylen, 0, &skey)) != CRYPT_OK) { + return errno; + } + saferp_ecb_encrypt(tests[i].pt, buf[0], &skey); + saferp_ecb_decrypt(buf[0], buf[1], &skey); - /* compare */ - if (memcmp(buf[0], &ct128, 16) || memcmp(buf[1], &pt128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - - /* test 192-bit key */ - if ((errno = saferp_setup(key192, 24, 0, &skey)) != CRYPT_OK) { - return errno; - } - saferp_ecb_encrypt(pt192, buf[0], &skey); - saferp_ecb_decrypt(buf[0], buf[1], &skey); - - /* compare */ - if (memcmp(buf[0], &ct192, 16) || memcmp(buf[1], &pt192, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - - /* test 256-bit key */ - if ((errno = saferp_setup(key256, 32, 0, &skey)) != CRYPT_OK) { - return errno; - } - saferp_ecb_encrypt(pt256, buf[0], &skey); - saferp_ecb_decrypt(buf[0], buf[1], &skey); - - /* compare */ - if (memcmp(buf[0], &ct256, 16) || memcmp(buf[1], &pt256, 16)) { - return CRYPT_FAIL_TESTVECTOR; + /* compare */ + if (memcmp(buf[0], tests[i].ct, 16) || memcmp(buf[1], tests[i].pt, 16)) { + return CRYPT_FAIL_TESTVECTOR; + } } return CRYPT_OK; diff --git a/serpent.c b/serpent.c index 05902e5..b3f8ef7 100644 --- a/serpent.c +++ b/serpent.c @@ -661,10 +661,10 @@ int serpent_test(void) }; unsigned char buf[2][16]; - int x, failed, errno; + int x, errno; symmetric_key key; - for (x = failed = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { + for (x = 0; x < (int)(sizeof(tests) / sizeof(tests[0])); x++) { /* setup key */ if ((errno = serpent_setup(tests[x].key, tests[x].keylen, 0, &key))!= CRYPT_OK) { return errno; @@ -675,32 +675,11 @@ int serpent_test(void) serpent_ecb_decrypt(buf[0], buf[1], &key); /* compare */ - if (memcmp(buf[0], tests[x].ct, 16)) { -#if 0 - int y; - printf("\nEncrypt test %d failed\n", x); - for (y = 0; y < 16; y++) printf("%02x ", buf[0][y]); - printf("\n"); -#endif - failed = 1; - } - - if (memcmp(buf[1], tests[x].pt, 16)) { -#if 0 - int y; - printf("\nDecrypt test %d failed\n", x); - for (y = 0; y < 16; y++) printf("%02x ", buf[1][y]); - printf("\n"); -#endif - failed = 1; + if (memcmp(buf[0], tests[x].ct, 16) || memcmp(buf[1], tests[x].pt, 16)) { + return CRYPT_FAIL_TESTVECTOR; } } - - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } int serpent_keysize(int *desired_keysize) diff --git a/sha1.c b/sha1.c index 4e5e07d..f27a536 100644 --- a/sha1.c +++ b/sha1.c @@ -196,35 +196,22 @@ int sha1_test(void) { 0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E, 0xBA, 0xAE, 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5, 0xE5, 0x46, 0x70, 0xF1 } - }, - { NULL, { 0 }} + } }; - int failed, i; + int i; unsigned char tmp[20]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { sha1_init(&md); sha1_process(&md, tests[i].msg, strlen(tests[i].msg)); sha1_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 20)) { -#if 0 - int j; - printf("\nSHA-1 Test %d failed\nGot (as a result): ", i); - for (j = 0; j < 20; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } #endif diff --git a/sha256.c b/sha256.c index b54421d..a38f7e9 100644 --- a/sha256.c +++ b/sha256.c @@ -32,7 +32,7 @@ static const unsigned long K[64] = { }; /* Various logical functions */ -#define Ch(x,y,z) ((x & y) ^ (~x & z)) +#define Ch(x,y,z) ((x & y) | (~x & z)) #define Maj(x,y,z) ((x & y) ^ (x & z) ^ (y & z)) #define S(x, n) ROR((x),(n)) #define R(x, n) (((x)&0xFFFFFFFFUL)>>(n)) @@ -194,34 +194,21 @@ int sha256_test(void) 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 } }, - { NULL, { 0 } } }; - int failed, i; + int i; unsigned char tmp[32]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { sha256_init(&md); sha256_process(&md, tests[i].msg, strlen(tests[i].msg)); sha256_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 32)) { -#if 0 - int j; - printf("\nSHA-256 Test %d failed\nGot (as a result): ", i); - for (j = 0; j < 32; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } #endif diff --git a/sha384.c b/sha384.c index 4c4f492..72835e9 100644 --- a/sha384.c +++ b/sha384.c @@ -71,34 +71,21 @@ int sha384_test(void) 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9, 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 } }, - { NULL, { 0 }} }; - int failed, i; + int i; unsigned char tmp[48]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { sha384_init(&md); sha384_process(&md, tests[i].msg, strlen(tests[i].msg)); sha384_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 48)) { -#if 0 - int j; - printf("\nSHA-384 Test %d failed\nGot (as a result): ", i); - for (j = 0; j < 48; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } diff --git a/sha512.c b/sha512.c index ecb3107..dfeaf54 100644 --- a/sha512.c +++ b/sha512.c @@ -59,7 +59,7 @@ CONST64(0x5fcb6fab3ad6faec), CONST64(0x6c44198c4a475817) }; /* Various logical functions */ -#define Ch(x,y,z) ((x & y) ^ (~x & z)) +#define Ch(x,y,z) ((x & y) | (~x & z)) #define Maj(x,y,z) ((x & y) ^ (x & z) ^ (y & z)) #define S(x, n) ROR64((x),(n)) #define R(x, n) (((x)&CONST64(0xFFFFFFFFFFFFFFFF))>>((ulong64)n)) @@ -232,34 +232,21 @@ int sha512_test(void) 0xc7, 0xd3, 0x29, 0xee, 0xb6, 0xdd, 0x26, 0x54, 0x5e, 0x96, 0xe5, 0x5b, 0x87, 0x4b, 0xe9, 0x09 } }, - { NULL, { 0 }} }; - int failed, i; + int i; unsigned char tmp[64]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { sha512_init(&md); sha512_process(&md, tests[i].msg, strlen(tests[i].msg)); sha512_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 64)) { -#if 0 - int j; - printf("\nSHA-512 Test %d failed\nGot (as a result): ", i); - for (j = 0; j < 64; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } #ifdef SHA384 diff --git a/tiger.c b/tiger.c index 07fb3ce..2b685e2 100644 --- a/tiger.c +++ b/tiger.c @@ -718,34 +718,21 @@ int tiger_test(void) 0x58, 0x48, 0xa7, 0xe0, 0xae, 0x6a, 0xac, 0x76, 0xe4, 0xff, 0x59, 0x0a, 0xe7, 0x15, 0xfd, 0x25 } }, - { NULL, { 0 }} }; - int failed, i; + int i; unsigned char tmp[24]; hash_state md; - for (failed = i = 0; tests[i].msg != NULL; i++) { + for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { tiger_init(&md); tiger_process(&md, tests[i].msg, strlen(tests[i].msg)); tiger_done(&md, tmp); if (memcmp(tmp, tests[i].hash, 24)) { -#if 0 - int j; - printf("\nTIGER-192 Test %d failed\nGot (as a result): ", i); - for (j = 0; j < 24; j++) { - printf("%02x ", tmp[j]); - } - printf("\n"); -#endif - failed = 1; + return CRYPT_FAIL_TESTVECTOR; } } - if (failed == 1) { - return CRYPT_FAIL_TESTVECTOR; - } else { - return CRYPT_OK; - } + return CRYPT_OK; } #endif diff --git a/twofish.c b/twofish.c index b057c6e..eafd458 100644 --- a/twofish.c +++ b/twofish.c @@ -225,9 +225,9 @@ static unsigned long sbox(int i, unsigned long x) burn_stack(sizeof(unsigned char) * 11); return y; } -#endif +#endif /* CLEAN_STACK */ -#endif +#endif /* TWOFISH_TABLES */ /* computes ab mod p */ static unsigned long gf_mult(unsigned long a, unsigned long b, unsigned long p) @@ -637,70 +637,54 @@ void twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_k int twofish_test(void) { - static const unsigned char key128[16] = { - 0x9F, 0x58, 0x9F, 0x5C, 0xF6, 0x12, 0x2C, 0x32, - 0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A }; - static const unsigned char pt128[16] = { - 0xD4, 0x91, 0xDB, 0x16, 0xE7, 0xB1, 0xC3, 0x9E, - 0x86, 0xCB, 0x08, 0x6B, 0x78, 0x9F, 0x54, 0x19 }; - static const unsigned char ct128[16] = { - 0x01, 0x9F, 0x98, 0x09, 0xDE, 0x17, 0x11, 0x85, - 0x8F, 0xAA, 0xC3, 0xA3, 0xBA, 0x20, 0xFB, 0xC3 }; + static const struct { + int keylen; + unsigned char key[32], pt[16], ct[16]; + } tests[] = { + { 16, + { 0x9F, 0x58, 0x9F, 0x5C, 0xF6, 0x12, 0x2C, 0x32, + 0xB6, 0xBF, 0xEC, 0x2F, 0x2A, 0xE8, 0xC3, 0x5A }, + { 0xD4, 0x91, 0xDB, 0x16, 0xE7, 0xB1, 0xC3, 0x9E, + 0x86, 0xCB, 0x08, 0x6B, 0x78, 0x9F, 0x54, 0x19 }, + { 0x01, 0x9F, 0x98, 0x09, 0xDE, 0x17, 0x11, 0x85, + 0x8F, 0xAA, 0xC3, 0xA3, 0xBA, 0x20, 0xFB, 0xC3 } + }, { + 24, + { 0x88, 0xB2, 0xB2, 0x70, 0x6B, 0x10, 0x5E, 0x36, + 0xB4, 0x46, 0xBB, 0x6D, 0x73, 0x1A, 0x1E, 0x88, + 0xEF, 0xA7, 0x1F, 0x78, 0x89, 0x65, 0xBD, 0x44 }, + { 0x39, 0xDA, 0x69, 0xD6, 0xBA, 0x49, 0x97, 0xD5, + 0x85, 0xB6, 0xDC, 0x07, 0x3C, 0xA3, 0x41, 0xB2 }, + { 0x18, 0x2B, 0x02, 0xD8, 0x14, 0x97, 0xEA, 0x45, + 0xF9, 0xDA, 0xAC, 0xDC, 0x29, 0x19, 0x3A, 0x65 } + }, { + 32, + { 0xD4, 0x3B, 0xB7, 0x55, 0x6E, 0xA3, 0x2E, 0x46, + 0xF2, 0xA2, 0x82, 0xB7, 0xD4, 0x5B, 0x4E, 0x0D, + 0x57, 0xFF, 0x73, 0x9D, 0x4D, 0xC9, 0x2C, 0x1B, + 0xD7, 0xFC, 0x01, 0x70, 0x0C, 0xC8, 0x21, 0x6F }, + { 0x90, 0xAF, 0xE9, 0x1B, 0xB2, 0x88, 0x54, 0x4F, + 0x2C, 0x32, 0xDC, 0x23, 0x9B, 0x26, 0x35, 0xE6 }, + { 0x6C, 0xB4, 0x56, 0x1C, 0x40, 0xBF, 0x0A, 0x97, + 0x05, 0x93, 0x1C, 0xB6, 0xD4, 0x08, 0xE7, 0xFA } + } +}; - static const unsigned char key192[24] = { - 0x88, 0xB2, 0xB2, 0x70, 0x6B, 0x10, 0x5E, 0x36, - 0xB4, 0x46, 0xBB, 0x6D, 0x73, 0x1A, 0x1E, 0x88, - 0xEF, 0xA7, 0x1F, 0x78, 0x89, 0x65, 0xBD, 0x44 }; - static const unsigned char pt192[16] = { - 0x39, 0xDA, 0x69, 0xD6, 0xBA, 0x49, 0x97, 0xD5, - 0x85, 0xB6, 0xDC, 0x07, 0x3C, 0xA3, 0x41, 0xB2 }; - static const unsigned char ct192[16] = { - 0x18, 0x2B, 0x02, 0xD8, 0x14, 0x97, 0xEA, 0x45, - 0xF9, 0xDA, 0xAC, 0xDC, 0x29, 0x19, 0x3A, 0x65 }; - - static const unsigned char key256[32] = { - 0xD4, 0x3B, 0xB7, 0x55, 0x6E, 0xA3, 0x2E, 0x46, - 0xF2, 0xA2, 0x82, 0xB7, 0xD4, 0x5B, 0x4E, 0x0D, - 0x57, 0xFF, 0x73, 0x9D, 0x4D, 0xC9, 0x2C, 0x1B, - 0xD7, 0xFC, 0x01, 0x70, 0x0C, 0xC8, 0x21, 0x6F }; - static const unsigned char pt256[16] = { - 0x90, 0xAF, 0xE9, 0x1B, 0xB2, 0x88, 0x54, 0x4F, - 0x2C, 0x32, 0xDC, 0x23, 0x9B, 0x26, 0x35, 0xE6 }; - static const unsigned char ct256[16] = { - 0x6C, 0xB4, 0x56, 0x1C, 0x40, 0xBF, 0x0A, 0x97, - 0x05, 0x93, 0x1C, 0xB6, 0xD4, 0x08, 0xE7, 0xFA }; symmetric_key key; unsigned char tmp[2][16]; - int errno; - - if ((errno = twofish_setup(key128, 16, 0, &key)) != CRYPT_OK) { - return errno; - } - twofish_ecb_encrypt(pt128, tmp[0], &key); - twofish_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct128, 16) || memcmp(tmp[1], pt128, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } + int errno, i; - if ((errno = twofish_setup(key192, 24, 0, &key)) != CRYPT_OK) { - return errno; - } - twofish_ecb_encrypt(pt192, tmp[0], &key); - twofish_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct192, 16) || memcmp(tmp[1], pt192, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - - if ((errno = twofish_setup(key256, 32, 0, &key)) != CRYPT_OK) { - return errno; - } - twofish_ecb_encrypt(pt256, tmp[0], &key); - twofish_ecb_decrypt(tmp[0], tmp[1], &key); - if (memcmp(tmp[0], ct256, 16) || memcmp(tmp[1], pt256, 16)) { - return CRYPT_FAIL_TESTVECTOR; - } - + for (i = 0; i < (int)(sizeof(tests)/sizeof(tests[0])); i++) { + if ((errno = twofish_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) { + return errno; + } + twofish_ecb_encrypt(tests[i].pt, tmp[0], &key); + twofish_ecb_decrypt(tmp[0], tmp[1], &key); + if (memcmp(tmp[0], tests[i].ct, 16) || memcmp(tmp[1], tests[i].pt, 16)) { + return CRYPT_FAIL_TESTVECTOR; + } + } return CRYPT_OK; }