Annotation of embedaddon/strongswan/src/charon-tkm/tests/keymat_tests.c, revision 1.1.1.1

1.1       misho       1: /*
                      2:  * Copyright (C) 2012 Reto Buerki
                      3:  * Copyright (C) 2012 Adrian-Ken Rueegsegger
                      4:  * HSR Hochschule fuer Technik Rapperswil
                      5:  *
                      6:  * This program is free software; you can redistribute it and/or modify it
                      7:  * under the terms of the GNU General Public License as published by the
                      8:  * Free Software Foundation; either version 2 of the License, or (at your
                      9:  * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
                     10:  *
                     11:  * This program is distributed in the hope that it will be useful, but
                     12:  * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
                     13:  * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
                     14:  * for more details.
                     15:  */
                     16: 
                     17: #include <tests/test_suite.h>
                     18: 
                     19: #include <daemon.h>
                     20: #include <crypto/proposal/proposal.h>
                     21: #include <encoding/payloads/ike_header.h>
                     22: #include <tkm/client.h>
                     23: 
                     24: #include "tkm.h"
                     25: #include "tkm_nonceg.h"
                     26: #include "tkm_diffie_hellman.h"
                     27: #include "tkm_keymat.h"
                     28: #include "tkm_types.h"
                     29: 
                     30: START_TEST(test_derive_ike_keys)
                     31: {
                     32:        proposal_t *proposal = proposal_create_from_string(PROTO_IKE,
                     33:                        "aes256-sha512-modp4096");
                     34:        fail_if(!proposal, "Unable to create proposal");
                     35:        ike_sa_id_t *ike_sa_id = ike_sa_id_create(IKEV2_MAJOR_VERSION,
                     36:                        123912312312, 32312313122, TRUE);
                     37:        fail_if(!ike_sa_id, "Unable to create IKE SA ID");
                     38: 
                     39:        tkm_keymat_t *keymat = tkm_keymat_create(TRUE);
                     40:        fail_if(!keymat, "Unable to create keymat");
                     41:        fail_if(!keymat->get_isa_id(keymat), "Invalid ISA context id (0)");
                     42: 
                     43:        chunk_t nonce;
                     44:        tkm_nonceg_t *ng = tkm_nonceg_create();
                     45:        fail_if(!ng, "Unable to create nonce generator");
                     46:        fail_unless(ng->nonce_gen.allocate_nonce(&ng->nonce_gen, 32, &nonce),
                     47:                        "Unable to allocate nonce");
                     48: 
                     49:        tkm_diffie_hellman_t *dh = tkm_diffie_hellman_create(MODP_4096_BIT);
                     50:        fail_if(!dh, "Unable to create DH");
                     51: 
                     52:        /* Use the same pubvalue for both sides */
                     53:        chunk_t pubvalue;
                     54:        ck_assert(dh->dh.get_my_public_value(&dh->dh, &pubvalue));
                     55:        ck_assert(dh->dh.set_other_public_value(&dh->dh, pubvalue));
                     56: 
                     57:        fail_unless(keymat->keymat_v2.derive_ike_keys(&keymat->keymat_v2, proposal,
                     58:                                &dh->dh, nonce, nonce, ike_sa_id, PRF_UNDEFINED, chunk_empty),
                     59:                                "Key derivation failed");
                     60:        chunk_free(&nonce);
                     61: 
                     62:        aead_t * const aead = keymat->keymat_v2.keymat.get_aead(&keymat->keymat_v2.keymat, TRUE);
                     63:        fail_if(!aead, "AEAD is NULL");
                     64: 
                     65:        fail_if(aead->get_key_size(aead) != 96, "Key size mismatch %d",
                     66:                        aead->get_key_size(aead));
                     67:        fail_if(aead->get_block_size(aead) != 16, "Block size mismatch %d",
                     68:                        aead->get_block_size(aead));
                     69: 
                     70:        ng->nonce_gen.destroy(&ng->nonce_gen);
                     71:        proposal->destroy(proposal);
                     72:        dh->dh.destroy(&dh->dh);
                     73:        ike_sa_id->destroy(ike_sa_id);
                     74:        keymat->keymat_v2.keymat.destroy(&keymat->keymat_v2.keymat);
                     75:        chunk_free(&pubvalue);
                     76: }
                     77: END_TEST
                     78: 
                     79: START_TEST(test_derive_child_keys)
                     80: {
                     81:        tkm_diffie_hellman_t *dh = tkm_diffie_hellman_create(MODP_4096_BIT);
                     82:        fail_if(!dh, "Unable to create DH object");
                     83:        proposal_t *proposal = proposal_create_from_string(PROTO_ESP,
                     84:                        "aes256-sha512-modp4096");
                     85:        fail_if(!proposal, "Unable to create proposal");
                     86:        proposal->set_spi(proposal, 42);
                     87: 
                     88:        tkm_keymat_t *keymat = tkm_keymat_create(TRUE);
                     89:        fail_if(!keymat, "Unable to create keymat");
                     90: 
                     91:        chunk_t encr_i, encr_r, integ_i, integ_r;
                     92:        chunk_t nonce = chunk_from_chars("test chunk");
                     93: 
                     94:        fail_unless(keymat->keymat_v2.derive_child_keys(&keymat->keymat_v2, proposal,
                     95:                                                                                                        (diffie_hellman_t *)dh,
                     96:                                                                                                        nonce, nonce, &encr_i,
                     97:                                                                                                        &integ_i, &encr_r, &integ_r),
                     98:                                "Child key derivation failed");
                     99: 
                    100:        esa_info_t *info = (esa_info_t *)encr_i.ptr;
                    101:        fail_if(!info, "encr_i does not contain esa information");
                    102:        fail_if(info->isa_id != keymat->get_isa_id(keymat),
                    103:                        "Isa context id mismatch (encr_i)");
                    104:        fail_if(info->spi_r != 42,
                    105:                        "SPI mismatch (encr_i)");
                    106:        fail_unless(chunk_equals(info->nonce_i, nonce),
                    107:                                "nonce_i mismatch (encr_i)");
                    108:        fail_unless(chunk_equals(info->nonce_r, nonce),
                    109:                                "nonce_r mismatch (encr_i)");
                    110:        fail_if(info->is_encr_r,
                    111:                        "Flag is_encr_r set for encr_i");
                    112:        fail_if(info->dh_id != dh->get_id(dh),
                    113:                        "DH context id mismatch (encr_i)");
                    114:        chunk_free(&info->nonce_i);
                    115:        chunk_free(&info->nonce_r);
                    116: 
                    117:        info = (esa_info_t *)encr_r.ptr;
                    118:        fail_if(!info, "encr_r does not contain esa information");
                    119:        fail_if(info->isa_id != keymat->get_isa_id(keymat),
                    120:                        "Isa context id mismatch (encr_r)");
                    121:        fail_if(info->spi_r != 42,
                    122:                        "SPI mismatch (encr_r)");
                    123:        fail_unless(chunk_equals(info->nonce_i, nonce),
                    124:                                "nonce_i mismatch (encr_r)");
                    125:        fail_unless(chunk_equals(info->nonce_r, nonce),
                    126:                                "nonce_r mismatch (encr_r)");
                    127:        fail_unless(info->is_encr_r,
                    128:                                "Flag is_encr_r set for encr_r");
                    129:        fail_if(info->dh_id != dh->get_id(dh),
                    130:                        "DH context id mismatch (encr_i)");
                    131:        chunk_free(&info->nonce_i);
                    132:        chunk_free(&info->nonce_r);
                    133: 
                    134:        proposal->destroy(proposal);
                    135:        dh->dh.destroy(&dh->dh);
                    136:        keymat->keymat_v2.keymat.destroy(&keymat->keymat_v2.keymat);
                    137:        chunk_free(&encr_i);
                    138:        chunk_free(&encr_r);
                    139: }
                    140: END_TEST
                    141: 
                    142: Suite *make_keymat_tests()
                    143: {
                    144:        Suite *s;
                    145:        TCase *tc;
                    146: 
                    147:        s = suite_create("keymat");
                    148: 
                    149:        tc = tcase_create("derive IKE keys");
                    150:        tcase_add_test(tc, test_derive_ike_keys);
                    151:        suite_add_tcase(s, tc);
                    152: 
                    153:        tc = tcase_create("derive CHILD keys");
                    154:        tcase_add_test(tc, test_derive_child_keys);
                    155:        suite_add_tcase(s, tc);
                    156: 
                    157:        return s;
                    158: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>