diff options
author | Florian Dold <florian.dold@gmail.com> | 2020-01-15 13:29:47 +0100 |
---|---|---|
committer | Florian Dold <florian.dold@gmail.com> | 2020-01-15 13:29:47 +0100 |
commit | 9f36b6e9ef86d595b229c1c8f0671b63a18bdc03 (patch) | |
tree | 6156412b84f8fb864effbc7ff806610d7e9afe00 /src/util | |
parent | 9f3f1753e8bd2b43a611e8f465dee2c770c998f5 (diff) | |
download | gnunet-9f36b6e9ef86d595b229c1c8f0671b63a18bdc03.tar.gz gnunet-9f36b6e9ef86d595b229c1c8f0671b63a18bdc03.zip |
add test vector generation for crypto ops
Diffstat (limited to 'src/util')
-rw-r--r-- | src/util/.gitignore | 1 | ||||
-rw-r--r-- | src/util/Makefile.am | 6 | ||||
-rw-r--r-- | src/util/gnunet-crypto-tvg.c | 278 |
3 files changed, 285 insertions, 0 deletions
diff --git a/src/util/.gitignore b/src/util/.gitignore index 0495dcf8f..84c13708e 100644 --- a/src/util/.gitignore +++ b/src/util/.gitignore | |||
@@ -1,6 +1,7 @@ | |||
1 | test_common_logging_dummy | 1 | test_common_logging_dummy |
2 | gnunet-config | 2 | gnunet-config |
3 | gnunet-config-diff | 3 | gnunet-config-diff |
4 | gnunet-crypto-tvg | ||
4 | gnunet-ecc | 5 | gnunet-ecc |
5 | gnunet-qr | 6 | gnunet-qr |
6 | gnunet-resolver | 7 | gnunet-resolver |
diff --git a/src/util/Makefile.am b/src/util/Makefile.am index 369fcc6c1..7d347424b 100644 --- a/src/util/Makefile.am +++ b/src/util/Makefile.am | |||
@@ -183,6 +183,7 @@ libexec_PROGRAMS = \ | |||
183 | bin_PROGRAMS = \ | 183 | bin_PROGRAMS = \ |
184 | gnunet-resolver \ | 184 | gnunet-resolver \ |
185 | gnunet-config \ | 185 | gnunet-config \ |
186 | gnunet-crypto-tvg \ | ||
186 | $(GNUNET_ECC) \ | 187 | $(GNUNET_ECC) \ |
187 | $(GNUNET_SCRYPT) \ | 188 | $(GNUNET_SCRYPT) \ |
188 | gnunet-uri | 189 | gnunet-uri |
@@ -221,6 +222,11 @@ gnunet_resolver_LDADD = \ | |||
221 | libgnunetutil.la \ | 222 | libgnunetutil.la \ |
222 | $(GN_LIBINTL) | 223 | $(GN_LIBINTL) |
223 | 224 | ||
225 | gnunet_crypto_tvg_SOURCES = \ | ||
226 | gnunet-crypto-tvg.c | ||
227 | gnunet_crypto_tvg_LDADD = \ | ||
228 | libgnunetutil.la \ | ||
229 | $(GN_LIBINTL) -lgcrypt | ||
224 | 230 | ||
225 | gnunet_ecc_SOURCES = \ | 231 | gnunet_ecc_SOURCES = \ |
226 | gnunet-ecc.c | 232 | gnunet-ecc.c |
diff --git a/src/util/gnunet-crypto-tvg.c b/src/util/gnunet-crypto-tvg.c new file mode 100644 index 000000000..7d151c10b --- /dev/null +++ b/src/util/gnunet-crypto-tvg.c | |||
@@ -0,0 +1,278 @@ | |||
1 | /* | ||
2 | This file is part of GNUnet. | ||
3 | Copyright (C) 2020 GNUnet e.V. | ||
4 | |||
5 | GNUnet is free software: you can redistribute it and/or modify it | ||
6 | under the terms of the GNU Affero General Public License as published | ||
7 | by the Free Software Foundation, either version 3 of the License, | ||
8 | or (at your option) any later version. | ||
9 | |||
10 | GNUnet is distributed in the hope that it will be useful, but | ||
11 | WITHOUT ANY WARRANTY; without even the implied warranty of | ||
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
13 | Affero General Public License for more details. | ||
14 | |||
15 | You should have received a copy of the GNU Affero General Public License | ||
16 | along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
17 | |||
18 | SPDX-License-Identifier: AGPL3.0-or-later | ||
19 | */ | ||
20 | |||
21 | /** | ||
22 | * @file util/gnunet-crypto-tgv.c | ||
23 | * @brief Generate test vectors for cryptographic operations. | ||
24 | * @author Florian Dold | ||
25 | */ | ||
26 | #include "platform.h" | ||
27 | #include "gnunet_util_lib.h" | ||
28 | #include "gnunet_signatures.h" | ||
29 | #include "gnunet_testing_lib.h" | ||
30 | #include <gcrypt.h> | ||
31 | |||
32 | GNUNET_NETWORK_STRUCT_BEGIN | ||
33 | |||
34 | /** | ||
35 | * Sample signature struct. | ||
36 | * | ||
37 | * Purpose is #GNUNET_SIGNATURE_PURPOSE_TEST | ||
38 | */ | ||
39 | struct TestSignatureDataPS | ||
40 | { | ||
41 | struct GNUNET_CRYPTO_EccSignaturePurpose purpose; | ||
42 | uint32_t testval; | ||
43 | }; | ||
44 | |||
45 | GNUNET_NETWORK_STRUCT_END | ||
46 | |||
47 | |||
48 | /** | ||
49 | * Print data base32-crockford with a preceding label. | ||
50 | * | ||
51 | * @param label label to print | ||
52 | * @param data data to print | ||
53 | * @param size size of data | ||
54 | */ | ||
55 | static void | ||
56 | display_data (char *label, void *data, size_t size) | ||
57 | { | ||
58 | char *enc = GNUNET_STRINGS_data_to_string_alloc (data, size); | ||
59 | printf ("%s %s\n", label, enc); | ||
60 | GNUNET_free (enc); | ||
61 | } | ||
62 | |||
63 | |||
64 | /** | ||
65 | * Main function that will be run. | ||
66 | * | ||
67 | * @param cls closure | ||
68 | * @param args remaining command-line arguments | ||
69 | * @param cfgfile name of the configuration file used (for saving, can be NULL!) | ||
70 | * @param cfg configuration | ||
71 | */ | ||
72 | static void | ||
73 | run (void *cls, | ||
74 | char *const *args, | ||
75 | const char *cfgfile, | ||
76 | const struct GNUNET_CONFIGURATION_Handle *cfg) | ||
77 | { | ||
78 | { | ||
79 | struct GNUNET_HashCode hc; | ||
80 | char *str = "Hello, GNUnet"; | ||
81 | |||
82 | GNUNET_CRYPTO_hash (str, strlen (str), &hc); | ||
83 | |||
84 | printf ("hash code:\n"); | ||
85 | display_data (" input", str, strlen (str)); | ||
86 | display_data (" output", &hc, sizeof (struct GNUNET_HashCode)); | ||
87 | } | ||
88 | { | ||
89 | struct GNUNET_CRYPTO_EcdhePrivateKey *priv1; | ||
90 | struct GNUNET_CRYPTO_EcdhePublicKey pub1; | ||
91 | struct GNUNET_CRYPTO_EcdhePrivateKey *priv2; | ||
92 | struct GNUNET_HashCode skm; | ||
93 | priv1 = GNUNET_CRYPTO_ecdhe_key_create (); | ||
94 | priv2 = GNUNET_CRYPTO_ecdhe_key_create (); | ||
95 | GNUNET_CRYPTO_ecdhe_key_get_public (priv1, &pub1); | ||
96 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_ecc_ecdh (priv2, &pub1, &skm)); | ||
97 | |||
98 | printf ("ecdhe key:\n"); | ||
99 | display_data (" priv1", priv1, sizeof (struct | ||
100 | GNUNET_CRYPTO_EcdhePrivateKey)); | ||
101 | display_data (" pub1", &pub1, sizeof (struct | ||
102 | GNUNET_CRYPTO_EcdhePublicKey)); | ||
103 | display_data (" priv2", priv2, sizeof (struct | ||
104 | GNUNET_CRYPTO_EcdhePrivateKey)); | ||
105 | display_data (" skm", &skm, sizeof (struct GNUNET_HashCode)); | ||
106 | GNUNET_free (priv1); | ||
107 | GNUNET_free (priv2); | ||
108 | } | ||
109 | |||
110 | { | ||
111 | struct GNUNET_CRYPTO_EddsaPrivateKey *priv; | ||
112 | struct GNUNET_CRYPTO_EddsaPublicKey pub; | ||
113 | priv = GNUNET_CRYPTO_eddsa_key_create (); | ||
114 | GNUNET_CRYPTO_eddsa_key_get_public (priv, &pub); | ||
115 | |||
116 | printf ("eddsa key:\n"); | ||
117 | display_data (" priv", priv, sizeof (struct | ||
118 | GNUNET_CRYPTO_EddsaPrivateKey)); | ||
119 | display_data (" pub", &pub, sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)); | ||
120 | GNUNET_free (priv); | ||
121 | } | ||
122 | { | ||
123 | struct GNUNET_CRYPTO_EddsaPrivateKey *priv; | ||
124 | struct GNUNET_CRYPTO_EddsaPublicKey pub; | ||
125 | struct GNUNET_CRYPTO_EddsaSignature sig; | ||
126 | struct TestSignatureDataPS data = { 0 }; | ||
127 | priv = GNUNET_CRYPTO_eddsa_key_create (); | ||
128 | GNUNET_CRYPTO_eddsa_key_get_public (priv, &pub); | ||
129 | data.purpose.size = htonl (sizeof (struct TestSignatureDataPS)); | ||
130 | data.purpose.size = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); | ||
131 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_sign (priv, &data.purpose, | ||
132 | &sig)); | ||
133 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_eddsa_verify (0, | ||
134 | &data.purpose, | ||
135 | &sig, | ||
136 | &pub)); | ||
137 | |||
138 | printf ("eddsa sig:\n"); | ||
139 | display_data (" priv", priv, sizeof (struct | ||
140 | GNUNET_CRYPTO_EddsaPrivateKey)); | ||
141 | display_data (" pub", &pub, sizeof (struct GNUNET_CRYPTO_EddsaPublicKey)); | ||
142 | display_data (" data", &data, sizeof (struct TestSignatureDataPS)); | ||
143 | display_data (" sig", &sig, sizeof (struct GNUNET_CRYPTO_EddsaSignature)); | ||
144 | GNUNET_free (priv); | ||
145 | } | ||
146 | |||
147 | { | ||
148 | size_t out_len = 64; | ||
149 | char out[out_len]; | ||
150 | char *ikm = "I'm the secret input key material"; | ||
151 | char *salt = "I'm very salty"; | ||
152 | char *ctx = "I'm a context chunk, also known as 'info' in the RFC"; | ||
153 | |||
154 | GNUNET_assert (GNUNET_OK == GNUNET_CRYPTO_kdf (&out, | ||
155 | out_len, | ||
156 | salt, | ||
157 | strlen (salt), | ||
158 | ikm, | ||
159 | strlen (ikm), | ||
160 | ctx, | ||
161 | strlen (ctx), | ||
162 | NULL)); | ||
163 | |||
164 | printf ("kdf:\n"); | ||
165 | display_data (" salt", salt, strlen (salt)); | ||
166 | display_data (" ikm", ikm, strlen (ikm)); | ||
167 | display_data (" ctx", ctx, strlen (ctx)); | ||
168 | printf (" out_len %u\n", (unsigned int) out_len); | ||
169 | display_data (" out", out, out_len); | ||
170 | } | ||
171 | { | ||
172 | struct GNUNET_CRYPTO_EcdhePrivateKey *priv_ecdhe; | ||
173 | struct GNUNET_CRYPTO_EcdhePublicKey pub_ecdhe; | ||
174 | struct GNUNET_CRYPTO_EddsaPrivateKey *priv_eddsa; | ||
175 | struct GNUNET_CRYPTO_EddsaPublicKey pub_eddsa; | ||
176 | struct GNUNET_HashCode key_material; | ||
177 | priv_ecdhe = GNUNET_CRYPTO_ecdhe_key_create (); | ||
178 | GNUNET_CRYPTO_ecdhe_key_get_public (priv_ecdhe, &pub_ecdhe); | ||
179 | priv_eddsa = GNUNET_CRYPTO_eddsa_key_create (); | ||
180 | GNUNET_CRYPTO_eddsa_key_get_public (priv_eddsa, &pub_eddsa); | ||
181 | GNUNET_CRYPTO_ecdh_eddsa (priv_ecdhe, &pub_eddsa, &key_material); | ||
182 | |||
183 | printf ("eddsa_ecdh:\n"); | ||
184 | display_data (" priv_ecdhe", priv_ecdhe, sizeof (struct | ||
185 | GNUNET_CRYPTO_EcdhePrivateKey)); | ||
186 | display_data (" pub_ecdhe", &pub_ecdhe, sizeof (struct | ||
187 | GNUNET_CRYPTO_EcdhePublicKey)); | ||
188 | display_data (" priv_eddsa", priv_eddsa, sizeof (struct | ||
189 | GNUNET_CRYPTO_EddsaPrivateKey)); | ||
190 | display_data (" pub_eddsa", &pub_eddsa, sizeof (struct | ||
191 | GNUNET_CRYPTO_EddsaPublicKey)); | ||
192 | display_data (" key_material", &key_material, sizeof (struct | ||
193 | GNUNET_HashCode)); | ||
194 | } | ||
195 | |||
196 | { | ||
197 | struct GNUNET_CRYPTO_RsaPrivateKey *skey; | ||
198 | struct GNUNET_CRYPTO_RsaPublicKey *pkey; | ||
199 | struct GNUNET_HashCode message_hash; | ||
200 | struct GNUNET_CRYPTO_RsaBlindingKeySecret bks; | ||
201 | struct GNUNET_CRYPTO_RsaSignature *blinded_sig; | ||
202 | struct GNUNET_CRYPTO_RsaSignature *sig; | ||
203 | char *blinded_data; | ||
204 | size_t blinded_len; | ||
205 | char *public_enc_data; | ||
206 | size_t public_enc_len; | ||
207 | char *blinded_sig_enc_data; | ||
208 | size_t blinded_sig_enc_length; | ||
209 | char *sig_enc_data; | ||
210 | size_t sig_enc_length; | ||
211 | skey = GNUNET_CRYPTO_rsa_private_key_create (2048); | ||
212 | pkey = GNUNET_CRYPTO_rsa_private_key_get_public (skey); | ||
213 | GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &message_hash, | ||
214 | sizeof (struct GNUNET_HashCode)); | ||
215 | GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &bks, sizeof (struct | ||
216 | GNUNET_CRYPTO_RsaBlindingKeySecret)); | ||
217 | GNUNET_assert (GNUNET_YES == GNUNET_CRYPTO_rsa_blind (&message_hash, &bks, | ||
218 | pkey, &blinded_data, | ||
219 | &blinded_len)); | ||
220 | blinded_sig = GNUNET_CRYPTO_rsa_sign_blinded (skey, blinded_data, | ||
221 | blinded_len); | ||
222 | sig = GNUNET_CRYPTO_rsa_unblind (blinded_sig, &bks, pkey); | ||
223 | GNUNET_assert (GNUNET_YES == GNUNET_CRYPTO_rsa_verify (&message_hash, sig, | ||
224 | pkey)); | ||
225 | public_enc_len = GNUNET_CRYPTO_rsa_public_key_encode (pkey, | ||
226 | &public_enc_data); | ||
227 | blinded_sig_enc_length = GNUNET_CRYPTO_rsa_signature_encode (blinded_sig, | ||
228 | & | ||
229 | blinded_sig_enc_data); | ||
230 | sig_enc_length = GNUNET_CRYPTO_rsa_signature_encode (sig, &sig_enc_data); | ||
231 | printf ("blind signing:\n"); | ||
232 | display_data (" message_hash", &message_hash, sizeof (struct | ||
233 | GNUNET_HashCode)); | ||
234 | display_data (" rsa_public_key", public_enc_data, public_enc_len); | ||
235 | display_data (" blinding_key_secret", &bks, sizeof (struct | ||
236 | GNUNET_CRYPTO_RsaBlindingKeySecret)); | ||
237 | display_data (" blinded_message", blinded_data, blinded_len); | ||
238 | display_data (" blinded_sig", blinded_sig_enc_data, | ||
239 | blinded_sig_enc_length); | ||
240 | display_data (" sig", sig_enc_data, sig_enc_length); | ||
241 | GNUNET_CRYPTO_rsa_private_key_free (skey); | ||
242 | GNUNET_CRYPTO_rsa_public_key_free (pkey); | ||
243 | GNUNET_CRYPTO_rsa_signature_free (sig); | ||
244 | GNUNET_CRYPTO_rsa_signature_free (blinded_sig); | ||
245 | } | ||
246 | } | ||
247 | |||
248 | |||
249 | /** | ||
250 | * The main function of the test vector generation tool. | ||
251 | * | ||
252 | * @param argc number of arguments from the command line | ||
253 | * @param argv command line arguments | ||
254 | * @return 0 ok, 1 on error | ||
255 | */ | ||
256 | int | ||
257 | main (int argc, | ||
258 | char *const *argv) | ||
259 | { | ||
260 | const struct GNUNET_GETOPT_CommandLineOption options[] = { | ||
261 | GNUNET_GETOPT_OPTION_END | ||
262 | }; | ||
263 | |||
264 | GNUNET_assert (GNUNET_OK == | ||
265 | GNUNET_log_setup ("gnunet-crypto-tvg", | ||
266 | "INFO", | ||
267 | NULL)); | ||
268 | if (GNUNET_OK != | ||
269 | GNUNET_PROGRAM_run (argc, argv, | ||
270 | "gnunet-crypto-tvg", | ||
271 | "Generate test vectors for cryptographic operations", | ||
272 | options, | ||
273 | &run, NULL)) | ||
274 | return 1; | ||
275 | return 0; | ||
276 | } | ||
277 | |||
278 | /* end of gnunet-crypto-tvg.c */ | ||