1 /* $NetBSD: test_crypto_wrapping.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */ 2 3 /* 4 * Copyright (c) 2005 Kungliga Tekniska Högskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of KTH nor the names of its contributors may be 20 * used to endorse or promote products derived from this software without 21 * specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY 24 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 26 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE 27 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 31 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 32 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 33 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ 34 35 #include "krb5_locl.h" 36 #include <err.h> 37 #include <krb5/getarg.h> 38 39 static void 40 test_wrapping(krb5_context context, 41 size_t min_size, 42 size_t max_size, 43 size_t step, 44 krb5_enctype etype) 45 { 46 krb5_error_code ret; 47 krb5_keyblock key; 48 krb5_crypto crypto; 49 krb5_data data; 50 char *etype_name; 51 void *buf; 52 size_t size; 53 54 ret = krb5_generate_random_keyblock(context, etype, &key); 55 if (ret) 56 krb5_err(context, 1, ret, "krb5_generate_random_keyblock"); 57 58 ret = krb5_enctype_to_string(context, etype, &etype_name); 59 if (ret) 60 krb5_err(context, 1, ret, "krb5_enctype_to_string"); 61 62 buf = malloc(max_size); 63 if (buf == NULL) 64 krb5_errx(context, 1, "out of memory"); 65 memset(buf, 0, max_size); 66 67 ret = krb5_crypto_init(context, &key, 0, &crypto); 68 if (ret) 69 krb5_err(context, 1, ret, "krb5_crypto_init"); 70 71 for (size = min_size; size < max_size; size += step) { 72 size_t wrapped_size; 73 74 ret = krb5_encrypt(context, crypto, 0, buf, size, &data); 75 if (ret) 76 krb5_err(context, 1, ret, "encrypt size %lu using %s", 77 (unsigned long)size, etype_name); 78 79 wrapped_size = krb5_get_wrapped_length(context, crypto, size); 80 81 if (wrapped_size != data.length) 82 krb5_errx(context, 1, "calculated wrapped length %lu != " 83 "real wrapped length %lu for data length %lu using " 84 "enctype %s", 85 (unsigned long)wrapped_size, 86 (unsigned long)data.length, 87 (unsigned long)size, 88 etype_name); 89 krb5_data_free(&data); 90 } 91 92 free(etype_name); 93 free(buf); 94 krb5_crypto_destroy(context, crypto); 95 krb5_free_keyblock_contents(context, &key); 96 } 97 98 99 100 static int version_flag = 0; 101 static int help_flag = 0; 102 103 static struct getargs args[] = { 104 {"version", 0, arg_flag, &version_flag, 105 "print version", NULL }, 106 {"help", 0, arg_flag, &help_flag, 107 NULL, NULL } 108 }; 109 110 static void 111 usage (int ret) 112 { 113 arg_printusage (args, 114 sizeof(args)/sizeof(*args), 115 NULL, 116 ""); 117 exit (ret); 118 } 119 120 int 121 main(int argc, char **argv) 122 { 123 krb5_context context; 124 krb5_error_code ret; 125 int i, optidx = 0; 126 127 krb5_enctype enctypes[] = { 128 #ifdef HEIM_WEAK_CRYPTO 129 ETYPE_DES_CBC_CRC, 130 ETYPE_DES_CBC_MD4, 131 ETYPE_DES_CBC_MD5, 132 #endif 133 ETYPE_DES3_CBC_SHA1, 134 ETYPE_ARCFOUR_HMAC_MD5, 135 ETYPE_AES128_CTS_HMAC_SHA1_96, 136 ETYPE_AES256_CTS_HMAC_SHA1_96, 137 KRB5_ENCTYPE_AES128_CTS_HMAC_SHA256_128, 138 KRB5_ENCTYPE_AES256_CTS_HMAC_SHA384_192 139 }; 140 141 setprogname(argv[0]); 142 143 if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx)) 144 usage(1); 145 146 if (help_flag) 147 usage (0); 148 149 if(version_flag){ 150 print_version(NULL); 151 exit(0); 152 } 153 154 argc -= optidx; 155 argv += optidx; 156 157 ret = krb5_init_context(&context); 158 if (ret) 159 errx (1, "krb5_init_context failed: %d", ret); 160 161 for (i = 0; i < sizeof(enctypes)/sizeof(enctypes[0]); i++) { 162 krb5_enctype_enable(context, enctypes[i]); 163 164 test_wrapping(context, 0, 1024, 1, enctypes[i]); 165 test_wrapping(context, 1024, 1024 * 100, 1024, enctypes[i]); 166 } 167 krb5_free_context(context); 168 169 return 0; 170 } 171