File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / src / charon-tkm / tests / keymat_tests.c
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 09:46:45 2020 UTC (4 years, 2 months ago) by misho
Branches: strongswan, MAIN
CVS tags: v5_9_2p0, v5_8_4p7, HEAD
Strongswan

    1: /*
    2:  * Copyright (C) 2012 Reto Buerki
    3:  * Copyright (C) 2012 Adrian-Ken Rueegsegger
    4:  * HSR Hochschule fuer Technik Rapperswil
    5:  *
    6:  * This program is free software; you can redistribute it and/or modify it
    7:  * under the terms of the GNU General Public License as published by the
    8:  * Free Software Foundation; either version 2 of the License, or (at your
    9:  * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>.
   10:  *
   11:  * This program is distributed in the hope that it will be useful, but
   12:  * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
   13:  * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
   14:  * for more details.
   15:  */
   16: 
   17: #include <tests/test_suite.h>
   18: 
   19: #include <daemon.h>
   20: #include <crypto/proposal/proposal.h>
   21: #include <encoding/payloads/ike_header.h>
   22: #include <tkm/client.h>
   23: 
   24: #include "tkm.h"
   25: #include "tkm_nonceg.h"
   26: #include "tkm_diffie_hellman.h"
   27: #include "tkm_keymat.h"
   28: #include "tkm_types.h"
   29: 
   30: START_TEST(test_derive_ike_keys)
   31: {
   32: 	proposal_t *proposal = proposal_create_from_string(PROTO_IKE,
   33: 			"aes256-sha512-modp4096");
   34: 	fail_if(!proposal, "Unable to create proposal");
   35: 	ike_sa_id_t *ike_sa_id = ike_sa_id_create(IKEV2_MAJOR_VERSION,
   36: 			123912312312, 32312313122, TRUE);
   37: 	fail_if(!ike_sa_id, "Unable to create IKE SA ID");
   38: 
   39: 	tkm_keymat_t *keymat = tkm_keymat_create(TRUE);
   40: 	fail_if(!keymat, "Unable to create keymat");
   41: 	fail_if(!keymat->get_isa_id(keymat), "Invalid ISA context id (0)");
   42: 
   43: 	chunk_t nonce;
   44: 	tkm_nonceg_t *ng = tkm_nonceg_create();
   45: 	fail_if(!ng, "Unable to create nonce generator");
   46: 	fail_unless(ng->nonce_gen.allocate_nonce(&ng->nonce_gen, 32, &nonce),
   47: 			"Unable to allocate nonce");
   48: 
   49: 	tkm_diffie_hellman_t *dh = tkm_diffie_hellman_create(MODP_4096_BIT);
   50: 	fail_if(!dh, "Unable to create DH");
   51: 
   52: 	/* Use the same pubvalue for both sides */
   53: 	chunk_t pubvalue;
   54: 	ck_assert(dh->dh.get_my_public_value(&dh->dh, &pubvalue));
   55: 	ck_assert(dh->dh.set_other_public_value(&dh->dh, pubvalue));
   56: 
   57: 	fail_unless(keymat->keymat_v2.derive_ike_keys(&keymat->keymat_v2, proposal,
   58: 				&dh->dh, nonce, nonce, ike_sa_id, PRF_UNDEFINED, chunk_empty),
   59: 				"Key derivation failed");
   60: 	chunk_free(&nonce);
   61: 
   62: 	aead_t * const aead = keymat->keymat_v2.keymat.get_aead(&keymat->keymat_v2.keymat, TRUE);
   63: 	fail_if(!aead, "AEAD is NULL");
   64: 
   65: 	fail_if(aead->get_key_size(aead) != 96, "Key size mismatch %d",
   66: 			aead->get_key_size(aead));
   67: 	fail_if(aead->get_block_size(aead) != 16, "Block size mismatch %d",
   68: 			aead->get_block_size(aead));
   69: 
   70: 	ng->nonce_gen.destroy(&ng->nonce_gen);
   71: 	proposal->destroy(proposal);
   72: 	dh->dh.destroy(&dh->dh);
   73: 	ike_sa_id->destroy(ike_sa_id);
   74: 	keymat->keymat_v2.keymat.destroy(&keymat->keymat_v2.keymat);
   75: 	chunk_free(&pubvalue);
   76: }
   77: END_TEST
   78: 
   79: START_TEST(test_derive_child_keys)
   80: {
   81: 	tkm_diffie_hellman_t *dh = tkm_diffie_hellman_create(MODP_4096_BIT);
   82: 	fail_if(!dh, "Unable to create DH object");
   83: 	proposal_t *proposal = proposal_create_from_string(PROTO_ESP,
   84: 			"aes256-sha512-modp4096");
   85: 	fail_if(!proposal, "Unable to create proposal");
   86: 	proposal->set_spi(proposal, 42);
   87: 
   88: 	tkm_keymat_t *keymat = tkm_keymat_create(TRUE);
   89: 	fail_if(!keymat, "Unable to create keymat");
   90: 
   91: 	chunk_t encr_i, encr_r, integ_i, integ_r;
   92: 	chunk_t nonce = chunk_from_chars("test chunk");
   93: 
   94: 	fail_unless(keymat->keymat_v2.derive_child_keys(&keymat->keymat_v2, proposal,
   95: 													(diffie_hellman_t *)dh,
   96: 													nonce, nonce, &encr_i,
   97: 													&integ_i, &encr_r, &integ_r),
   98: 				"Child key derivation failed");
   99: 
  100: 	esa_info_t *info = (esa_info_t *)encr_i.ptr;
  101: 	fail_if(!info, "encr_i does not contain esa information");
  102: 	fail_if(info->isa_id != keymat->get_isa_id(keymat),
  103: 			"Isa context id mismatch (encr_i)");
  104: 	fail_if(info->spi_r != 42,
  105: 			"SPI mismatch (encr_i)");
  106: 	fail_unless(chunk_equals(info->nonce_i, nonce),
  107: 				"nonce_i mismatch (encr_i)");
  108: 	fail_unless(chunk_equals(info->nonce_r, nonce),
  109: 				"nonce_r mismatch (encr_i)");
  110: 	fail_if(info->is_encr_r,
  111: 			"Flag is_encr_r set for encr_i");
  112: 	fail_if(info->dh_id != dh->get_id(dh),
  113: 			"DH context id mismatch (encr_i)");
  114: 	chunk_free(&info->nonce_i);
  115: 	chunk_free(&info->nonce_r);
  116: 
  117: 	info = (esa_info_t *)encr_r.ptr;
  118: 	fail_if(!info, "encr_r does not contain esa information");
  119: 	fail_if(info->isa_id != keymat->get_isa_id(keymat),
  120: 			"Isa context id mismatch (encr_r)");
  121: 	fail_if(info->spi_r != 42,
  122: 			"SPI mismatch (encr_r)");
  123: 	fail_unless(chunk_equals(info->nonce_i, nonce),
  124: 				"nonce_i mismatch (encr_r)");
  125: 	fail_unless(chunk_equals(info->nonce_r, nonce),
  126: 				"nonce_r mismatch (encr_r)");
  127: 	fail_unless(info->is_encr_r,
  128: 				"Flag is_encr_r set for encr_r");
  129: 	fail_if(info->dh_id != dh->get_id(dh),
  130: 			"DH context id mismatch (encr_i)");
  131: 	chunk_free(&info->nonce_i);
  132: 	chunk_free(&info->nonce_r);
  133: 
  134: 	proposal->destroy(proposal);
  135: 	dh->dh.destroy(&dh->dh);
  136: 	keymat->keymat_v2.keymat.destroy(&keymat->keymat_v2.keymat);
  137: 	chunk_free(&encr_i);
  138: 	chunk_free(&encr_r);
  139: }
  140: END_TEST
  141: 
  142: Suite *make_keymat_tests()
  143: {
  144: 	Suite *s;
  145: 	TCase *tc;
  146: 
  147: 	s = suite_create("keymat");
  148: 
  149: 	tc = tcase_create("derive IKE keys");
  150: 	tcase_add_test(tc, test_derive_ike_keys);
  151: 	suite_add_tcase(s, tc);
  152: 
  153: 	tc = tcase_create("derive CHILD keys");
  154: 	tcase_add_test(tc, test_derive_child_keys);
  155: 	suite_add_tcase(s, tc);
  156: 
  157: 	return s;
  158: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>