aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_aes_weak.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/util/test_crypto_aes_weak.c')
-rw-r--r--src/util/test_crypto_aes_weak.c202
1 files changed, 202 insertions, 0 deletions
diff --git a/src/util/test_crypto_aes_weak.c b/src/util/test_crypto_aes_weak.c
new file mode 100644
index 0000000..0b7ba5c
--- /dev/null
+++ b/src/util/test_crypto_aes_weak.c
@@ -0,0 +1,202 @@
+/*
+ This file is part of GNUnet.
+ (C) 2003, 2004, 2005, 2006 Christian Grothoff (and other contributing authors)
+
+ GNUnet is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published
+ by the Free Software Foundation; either version 3, or (at your
+ option) any later version.
+
+ GNUnet is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with GNUnet; see the file COPYING. If not, write to the
+ Free Software Foundation, Inc., 59 Temple Place - Suite 330,
+ Boston, MA 02111-1307, USA.
+
+*/
+
+/**
+ * @author Krista Bennett
+ * @author Christian Grothoff
+ * @file util/test_crypto_aes_weak.c
+ * @brief AES weak key test.
+ */
+#include "platform.h"
+#include "gnunet_common.h"
+#include "gnunet_crypto_lib.h"
+#include <gcrypt.h>
+
+#define MAX_WEAK_KEY_TRIALS 100000
+#define GENERATE_WEAK_KEYS GNUNET_NO
+#define WEAK_KEY_TESTSTRING "I hate weak keys."
+
+static void
+printWeakKey (struct GNUNET_CRYPTO_AesSessionKey *key)
+{
+ int i;
+
+ for (i = 0; i < GNUNET_CRYPTO_AES_KEY_LENGTH; i++)
+ {
+ printf ("%x ", (int) (key->key[i]));
+ }
+}
+
+static int
+testWeakKey ()
+{
+ char result[100];
+ char res[100];
+ int size;
+ struct GNUNET_CRYPTO_AesSessionKey weak_key;
+ struct GNUNET_CRYPTO_AesInitializationVector INITVALUE;
+
+ memset (&INITVALUE, 42,
+ sizeof (struct GNUNET_CRYPTO_AesInitializationVector));
+ /* sorry, this is not a weak key -- I don't have
+ * any at the moment! */
+ weak_key.key[0] = (char) (0x4c);
+ weak_key.key[1] = (char) (0x31);
+ weak_key.key[2] = (char) (0xc6);
+ weak_key.key[3] = (char) (0x2b);
+ weak_key.key[4] = (char) (0xc1);
+ weak_key.key[5] = (char) (0x5f);
+ weak_key.key[6] = (char) (0x4d);
+ weak_key.key[7] = (char) (0x1f);
+ weak_key.key[8] = (char) (0x31);
+ weak_key.key[9] = (char) (0xaa);
+ weak_key.key[10] = (char) (0x12);
+ weak_key.key[11] = (char) (0x2e);
+ weak_key.key[12] = (char) (0xb7);
+ weak_key.key[13] = (char) (0x82);
+ weak_key.key[14] = (char) (0xc0);
+ weak_key.key[15] = (char) (0xb6);
+ weak_key.key[16] = (char) (0x4d);
+ weak_key.key[17] = (char) (0x1f);
+ weak_key.key[18] = (char) (0x31);
+ weak_key.key[19] = (char) (0xaa);
+ weak_key.key[20] = (char) (0x4c);
+ weak_key.key[21] = (char) (0x31);
+ weak_key.key[22] = (char) (0xc6);
+ weak_key.key[23] = (char) (0x2b);
+ weak_key.key[24] = (char) (0xc1);
+ weak_key.key[25] = (char) (0x5f);
+ weak_key.key[26] = (char) (0x4d);
+ weak_key.key[27] = (char) (0x1f);
+ weak_key.key[28] = (char) (0x31);
+ weak_key.key[29] = (char) (0xaa);
+ weak_key.key[30] = (char) (0xaa);
+ weak_key.key[31] = (char) (0xaa);
+ /* memset(&weak_key, 0, 32); */
+ weak_key.crc32 =
+ htonl (GNUNET_CRYPTO_crc32_n (&weak_key, GNUNET_CRYPTO_AES_KEY_LENGTH));
+
+ size =
+ GNUNET_CRYPTO_aes_encrypt (WEAK_KEY_TESTSTRING,
+ strlen (WEAK_KEY_TESTSTRING) + 1, &weak_key,
+ &INITVALUE, result);
+
+ if (size == -1)
+ {
+ GNUNET_break (0);
+ return 1;
+ }
+
+ size = GNUNET_CRYPTO_aes_decrypt (result, size, &weak_key, &INITVALUE, res);
+
+ if ((strlen (WEAK_KEY_TESTSTRING) + 1) != size)
+ {
+ GNUNET_break (0);
+ return 1;
+ }
+ if (0 != strcmp (res, WEAK_KEY_TESTSTRING))
+ {
+ GNUNET_break (0);
+ return 1;
+ }
+ else
+ return 0;
+}
+
+static int
+getWeakKeys ()
+{
+ struct GNUNET_CRYPTO_AesSessionKey sessionkey;
+ int number_of_weak_keys = 0;
+ int number_of_runs;
+
+ gcry_cipher_hd_t handle;
+ int rc;
+
+ for (number_of_runs = 0; number_of_runs < MAX_WEAK_KEY_TRIALS;
+ number_of_runs++)
+ {
+
+ if (number_of_runs % 1000 == 0)
+ FPRINTF (stderr, "%s", ".");
+ /*printf("Got to run number %d.\n", number_of_runs); */
+ GNUNET_CRYPTO_aes_create_session_key (&sessionkey);
+
+ rc = gcry_cipher_open (&handle, GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_CFB,
+ 0);
+
+ if (rc)
+ {
+ printf ("testweakkey: gcry_cipher_open failed on trial %d. %s\n",
+ number_of_runs, gcry_strerror (rc));
+ continue;
+ }
+
+ rc = gcry_cipher_setkey (handle, &sessionkey, GNUNET_CRYPTO_AES_KEY_LENGTH);
+
+ if ((char) rc == GPG_ERR_WEAK_KEY)
+ {
+ printf ("\nWeak key (in hex): ");
+ printWeakKey (&sessionkey);
+ printf ("\n");
+ number_of_weak_keys++;
+ }
+ else if (rc)
+ {
+ printf ("\nUnexpected error generating keys. Error is %s\n",
+ gcry_strerror (rc));
+ }
+
+ gcry_cipher_close (handle);
+
+ }
+
+ return number_of_weak_keys;
+}
+
+int
+main (int argc, char *argv[])
+{
+ int weak_keys;
+
+ GNUNET_log_setup ("test-crypto-aes-weak", "WARNING", NULL);
+ GNUNET_CRYPTO_random_disable_entropy_gathering ();
+ if (GENERATE_WEAK_KEYS)
+ {
+ weak_keys = getWeakKeys ();
+
+ if (weak_keys == 0)
+ {
+ printf ("\nNo weak keys found in %d runs.\n", MAX_WEAK_KEY_TRIALS);
+ }
+ else
+ {
+ printf ("\n%d weak keys found in %d runs.\n", weak_keys,
+ MAX_WEAK_KEY_TRIALS);
+ }
+ }
+
+ if (testWeakKey () != 0)
+ return -1;
+ return 0;
+}
+
+/* end of weakkeytest.c */