2013-11-19 23:14:07 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2013 Andreas Steffen
|
|
|
|
* HSR Hochschule fuer Technik Rapperswil
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
|
|
* under the terms of the GNU General Public License as published by the
|
|
|
|
* Free Software Foundation; either version 2 of the License, or (at your
|
|
|
|
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
|
|
* for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "test_suite.h"
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
#include <plugins/ntru/ntru_plugin.h>
|
|
|
|
|
2013-11-19 23:14:07 +00:00
|
|
|
/**
|
|
|
|
* NTRU parameter sets to test
|
|
|
|
*/
|
|
|
|
static struct {
|
|
|
|
diffie_hellman_group_t group;
|
|
|
|
char *group_name;
|
|
|
|
} params[] = {
|
|
|
|
{ NTRU_112_BIT, "NTRU_112" },
|
|
|
|
{ NTRU_128_BIT, "NTRU_128" },
|
|
|
|
{ NTRU_192_BIT, "NTRU_192" },
|
|
|
|
{ NTRU_256_BIT, "NTRU_256" }
|
|
|
|
};
|
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
/**
|
|
|
|
* NTRU parameter set selection
|
|
|
|
*/
|
2013-11-21 21:08:16 +00:00
|
|
|
char *parameter_sets[] = {
|
2013-11-20 23:15:59 +00:00
|
|
|
"x9_98_speed", "x9_98_bandwidth", "x9_98_balance", "optimum"
|
|
|
|
};
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
START_TEST(test_ntru_entropy)
|
|
|
|
{
|
|
|
|
ck_assert(!ntru_plugin_get_entropy(GET_NUM_BYTES_PER_BYTE_OF_ENTROPY, NULL));
|
|
|
|
ck_assert(!ntru_plugin_get_entropy(GET_BYTE_OF_ENTROPY, NULL));
|
|
|
|
ck_assert(!ntru_plugin_get_entropy(10, NULL));
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
START_TEST(test_ntru_ke)
|
2013-11-19 23:14:07 +00:00
|
|
|
{
|
|
|
|
chunk_t pub_key, cipher_text, i_shared_secret, r_shared_secret;
|
|
|
|
diffie_hellman_t *i_ntru, *r_ntru;
|
|
|
|
char buf[10];
|
2013-11-20 23:15:59 +00:00
|
|
|
int n, len;
|
2013-11-19 23:14:07 +00:00
|
|
|
status_t status;
|
|
|
|
|
|
|
|
len = snprintf(buf, sizeof(buf), "%N", diffie_hellman_group_names,
|
|
|
|
params[_i].group);
|
|
|
|
ck_assert(len == 8);
|
|
|
|
ck_assert(streq(buf, params[_i].group_name));
|
|
|
|
|
2013-11-21 21:08:16 +00:00
|
|
|
for (n = 0; n < countof(parameter_sets); n++)
|
2013-11-20 23:15:59 +00:00
|
|
|
{
|
|
|
|
lib->settings->set_str(lib->settings,
|
2013-11-21 21:08:16 +00:00
|
|
|
"libstrongswan.plugins.ntru.parameter_set",
|
|
|
|
parameter_sets[n]);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
i_ntru = lib->crypto->create_dh(lib->crypto, params[_i].group);
|
|
|
|
ck_assert(i_ntru != NULL);
|
|
|
|
ck_assert(i_ntru->get_dh_group(i_ntru) == params[_i].group);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key);
|
|
|
|
ck_assert(pub_key.len > 0);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
r_ntru = lib->crypto->create_dh(lib->crypto, params[_i].group);
|
|
|
|
ck_assert(r_ntru != NULL);
|
|
|
|
|
|
|
|
r_ntru->set_other_public_value(r_ntru, pub_key);
|
|
|
|
r_ntru->get_my_public_value(r_ntru, &cipher_text);
|
|
|
|
ck_assert(cipher_text.len > 0);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
status = r_ntru->get_shared_secret(r_ntru, &r_shared_secret);
|
|
|
|
ck_assert(status == SUCCESS);
|
|
|
|
ck_assert(r_shared_secret.len > 0);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
i_ntru->set_other_public_value(i_ntru, cipher_text);
|
|
|
|
status = i_ntru->get_shared_secret(i_ntru, &i_shared_secret);
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
if (status == SUCCESS)
|
|
|
|
{
|
|
|
|
ck_assert(chunk_equals(i_shared_secret, r_shared_secret));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ck_assert(i_shared_secret.len == 0);
|
|
|
|
}
|
2013-11-19 23:14:07 +00:00
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
chunk_clear(&i_shared_secret);
|
|
|
|
chunk_clear(&r_shared_secret);
|
|
|
|
chunk_free(&pub_key);
|
|
|
|
chunk_free(&cipher_text);
|
|
|
|
i_ntru->destroy(i_ntru);
|
|
|
|
r_ntru->destroy(r_ntru);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
START_TEST(test_ntru_retransmission)
|
|
|
|
{
|
|
|
|
diffie_hellman_t *i_ntru;
|
|
|
|
chunk_t pub_key1, pub_key2;
|
|
|
|
|
|
|
|
i_ntru = lib->crypto->create_dh(lib->crypto, NTRU_256_BIT);
|
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key1);
|
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key2);
|
|
|
|
ck_assert(chunk_equals(pub_key1, pub_key2));
|
|
|
|
|
|
|
|
chunk_free(&pub_key1);
|
|
|
|
chunk_free(&pub_key2);
|
|
|
|
i_ntru->destroy(i_ntru);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-21 21:08:16 +00:00
|
|
|
START_TEST(test_ntru_pubkey_oid)
|
2013-11-20 23:15:59 +00:00
|
|
|
{
|
2013-11-21 21:08:16 +00:00
|
|
|
chunk_t test[] = {
|
|
|
|
chunk_empty,
|
|
|
|
chunk_from_chars(0x00),
|
|
|
|
chunk_from_chars(0x01),
|
|
|
|
chunk_from_chars(0x02),
|
|
|
|
chunk_from_chars(0x02, 0x03, 0x00, 0x03, 0x10),
|
|
|
|
chunk_from_chars(0x01, 0x04, 0x00, 0x03, 0x10),
|
|
|
|
chunk_from_chars(0x01, 0x03, 0x00, 0x03, 0x10),
|
|
|
|
chunk_from_chars(0x01, 0x03, 0xff, 0x03, 0x10),
|
|
|
|
};
|
|
|
|
|
2013-11-20 23:15:59 +00:00
|
|
|
diffie_hellman_t *r_ntru;
|
|
|
|
chunk_t cipher_text;
|
2013-11-21 21:08:16 +00:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < countof(test); i++)
|
|
|
|
{
|
|
|
|
r_ntru = lib->crypto->create_dh(lib->crypto, NTRU_128_BIT);
|
|
|
|
r_ntru->set_other_public_value(r_ntru, test[i]);
|
|
|
|
r_ntru->get_my_public_value(r_ntru, &cipher_text);
|
|
|
|
ck_assert(cipher_text.len == 0);
|
|
|
|
r_ntru->destroy(r_ntru);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
END_TEST
|
2013-11-20 23:15:59 +00:00
|
|
|
|
2013-11-21 21:08:16 +00:00
|
|
|
START_TEST(test_ntru_wrong_set)
|
|
|
|
{
|
|
|
|
diffie_hellman_t *i_ntru, *r_ntru;
|
|
|
|
chunk_t pub_key, cipher_text;
|
|
|
|
|
|
|
|
lib->settings->set_str(lib->settings,
|
|
|
|
"libstrongswan.plugins.ntru.parameter_set",
|
|
|
|
"x9_98_bandwidth");
|
|
|
|
i_ntru = lib->crypto->create_dh(lib->crypto, NTRU_112_BIT);
|
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key);
|
|
|
|
|
|
|
|
lib->settings->set_str(lib->settings,
|
|
|
|
"libstrongswan.plugins.ntru.parameter_set",
|
|
|
|
"optimum");
|
|
|
|
r_ntru = lib->crypto->create_dh(lib->crypto, NTRU_112_BIT);
|
|
|
|
r_ntru->set_other_public_value(r_ntru, pub_key);
|
2013-11-20 23:15:59 +00:00
|
|
|
r_ntru->get_my_public_value(r_ntru, &cipher_text);
|
|
|
|
ck_assert(cipher_text.len == 0);
|
|
|
|
|
2013-11-21 21:08:16 +00:00
|
|
|
chunk_free(&pub_key);
|
|
|
|
chunk_free(&cipher_text);
|
|
|
|
i_ntru->destroy(i_ntru);
|
|
|
|
r_ntru->destroy(r_ntru);
|
2013-11-19 23:14:07 +00:00
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
START_TEST(test_ntru_ciphertext)
|
|
|
|
{
|
2013-11-22 19:38:05 +00:00
|
|
|
char buf_00[604], buf_ff[604];
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
chunk_t test[] = {
|
|
|
|
chunk_empty,
|
|
|
|
chunk_from_chars(0x00),
|
2013-11-22 19:38:05 +00:00
|
|
|
chunk_create(buf_00, sizeof(buf_00)),
|
|
|
|
chunk_create(buf_ff, sizeof(buf_ff)),
|
2013-11-21 22:51:02 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
diffie_hellman_t *i_ntru;
|
|
|
|
chunk_t pub_key, shared_secret;
|
|
|
|
int i;
|
|
|
|
|
2013-11-22 19:38:05 +00:00
|
|
|
memset(buf_00, 0x00, sizeof(buf_00));
|
|
|
|
memset(buf_ff, 0xff, sizeof(buf_ff));
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
for (i = 0; i < countof(test); i++)
|
|
|
|
{
|
|
|
|
i_ntru = lib->crypto->create_dh(lib->crypto, NTRU_128_BIT);
|
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key);
|
|
|
|
i_ntru->set_other_public_value(i_ntru, test[i]);
|
|
|
|
ck_assert(i_ntru->get_shared_secret(i_ntru, &shared_secret) != SUCCESS);
|
|
|
|
ck_assert(shared_secret.len == 0);
|
|
|
|
|
|
|
|
chunk_free(&pub_key);
|
|
|
|
i_ntru->destroy(i_ntru);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-22 19:38:05 +00:00
|
|
|
START_TEST(test_ntru_wrong_ciphertext)
|
|
|
|
{
|
|
|
|
diffie_hellman_t *i_ntru, *r_ntru, *m_ntru;
|
|
|
|
chunk_t pub_key_i, pub_key_m, cipher_text, shared_secret;
|
|
|
|
|
|
|
|
i_ntru = lib->crypto->create_dh(lib->crypto, NTRU_128_BIT);
|
|
|
|
r_ntru = lib->crypto->create_dh(lib->crypto, NTRU_128_BIT);
|
|
|
|
m_ntru = lib->crypto->create_dh(lib->crypto, NTRU_128_BIT);
|
|
|
|
|
|
|
|
i_ntru->get_my_public_value(i_ntru, &pub_key_i);
|
|
|
|
m_ntru->get_my_public_value(m_ntru, &pub_key_m);
|
|
|
|
r_ntru->set_other_public_value(r_ntru, pub_key_m);
|
|
|
|
r_ntru->get_my_public_value(r_ntru, &cipher_text);
|
|
|
|
i_ntru->set_other_public_value(i_ntru, cipher_text);
|
|
|
|
ck_assert(i_ntru->get_shared_secret(i_ntru, &shared_secret) != SUCCESS);
|
|
|
|
ck_assert(shared_secret.len == 0);
|
|
|
|
|
|
|
|
chunk_free(&pub_key_i);
|
|
|
|
chunk_free(&pub_key_m);
|
|
|
|
chunk_free(&cipher_text);
|
|
|
|
i_ntru->destroy(i_ntru);
|
|
|
|
m_ntru->destroy(m_ntru);
|
|
|
|
r_ntru->destroy(r_ntru);
|
|
|
|
}
|
|
|
|
END_TEST
|
|
|
|
|
2013-11-19 23:14:07 +00:00
|
|
|
Suite *ntru_suite_create()
|
|
|
|
{
|
|
|
|
Suite *s;
|
|
|
|
TCase *tc;
|
|
|
|
|
|
|
|
s = suite_create("ntru");
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
tc = tcase_create("entropy");
|
|
|
|
tcase_add_test(tc, test_ntru_entropy);
|
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
2013-11-19 23:14:07 +00:00
|
|
|
tc = tcase_create("ke");
|
2013-11-20 23:15:59 +00:00
|
|
|
tcase_add_loop_test(tc, test_ntru_ke, 0, countof(params));
|
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
tc = tcase_create("retransmission");
|
|
|
|
tcase_add_test(tc, test_ntru_retransmission);
|
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
2013-11-21 21:08:16 +00:00
|
|
|
tc = tcase_create("pubkey_oid");
|
|
|
|
tcase_add_test(tc, test_ntru_pubkey_oid);
|
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
|
|
|
tc = tcase_create("wrong_set");
|
|
|
|
tcase_add_test(tc, test_ntru_wrong_set);
|
2013-11-19 23:14:07 +00:00
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
2013-11-21 22:51:02 +00:00
|
|
|
tc = tcase_create("ciphertext");
|
|
|
|
tcase_add_test(tc, test_ntru_ciphertext);
|
|
|
|
suite_add_tcase(s, tc);
|
|
|
|
|
2013-11-22 19:38:05 +00:00
|
|
|
tc = tcase_create("wrong_ciphertext");
|
|
|
|
tcase_add_test(tc, test_ntru_wrong_ciphertext);
|
|
|
|
suite_add_tcase(s, tc);
|
2013-11-19 23:14:07 +00:00
|
|
|
return s;
|
|
|
|
}
|