/* * (C) 2014,2015 Jack Lloyd * (C) 2016 René Korthaus, Rohde & Schwarz Cybersecurity * * Botan is released under the Simplified BSD License (see license.txt) */ #include "tests.h" #include "test_rng.h" #if defined(BOTAN_HAS_HMAC_DRBG) #include #endif #if defined(BOTAN_HAS_ENTROPY_SOURCE) #include #endif #if defined(BOTAN_TARGET_OS_TYPE_IS_UNIX) #include #include #endif #include namespace Botan_Tests { namespace { #if defined(BOTAN_HAS_HMAC_DRBG) class HMAC_DRBG_Tests : public Text_Based_Test { public: HMAC_DRBG_Tests() : Text_Based_Test("hmac_drbg.vec", {"EntropyInput", "EntropyInputReseed", "Out"}, {"AdditionalInput1", "AdditionalInput2"}) {} Test::Result run_one_test(const std::string& algo, const VarMap& vars) override { const std::vector seed_input = get_req_bin(vars, "EntropyInput"); const std::vector reseed_input = get_req_bin(vars, "EntropyInputReseed"); const std::vector expected = get_req_bin(vars, "Out"); const std::vector ad1 = get_opt_bin(vars, "AdditionalInput1"); const std::vector ad2 = get_opt_bin(vars, "AdditionalInput2"); Test::Result result("HMAC_DRBG(" + algo + ")"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(" + algo + ")"); if(!mac) { result.note_missing("HMAC(" + algo + ")"); return result; } std::unique_ptr rng(new Botan::HMAC_DRBG(std::move(mac))); rng->initialize_with(seed_input.data(), seed_input.size()); // now reseed rng->add_entropy(reseed_input.data(), reseed_input.size()); std::vector out(expected.size()); // first block is discarded rng->randomize_with_input(out.data(), out.size(), ad1.data(), ad1.size()); rng->randomize_with_input(out.data(), out.size(), ad2.data(), ad2.size()); result.test_eq("rng", out, expected); return result; } }; BOTAN_REGISTER_TEST("hmac_drbg", HMAC_DRBG_Tests); class HMAC_DRBG_Unit_Tests : public Test { private: class Broken_Entropy_Source : public Botan::Entropy_Source { public: std::string name() const override { return "Broken Entropy Source"; } size_t poll(Botan::RandomNumberGenerator&) override { throw Botan::Exception("polling not available"); } }; class Insufficient_Entropy_Source : public Botan::Entropy_Source { public: std::string name() const override { return "Insufficient Entropy Source"; } size_t poll(Botan::RandomNumberGenerator&) override { return 0; } }; class Request_Counting_RNG : public Botan::RandomNumberGenerator { public: Request_Counting_RNG() : m_randomize_count(0) {}; bool is_seeded() const override { return true; } void clear() override { m_randomize_count = 0; } void randomize(byte[], size_t) override { m_randomize_count++; } void add_entropy(const byte[], size_t) override {} std::string name() const override { return "Request_Counting_RNG"; } size_t randomize_count() { return m_randomize_count; } private: size_t m_randomize_count; }; public: Test::Result test_reseed_kat() { Test::Result result("HMAC_DRBG Reseed KAT"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } Request_Counting_RNG counting_rng; Botan::HMAC_DRBG rng(std::move(mac), counting_rng, Botan::Entropy_Sources::global_sources(), 2); Botan::secure_vector seed_input( {0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x99,0xAA,0xBB,0xCC,0xDD,0xEE,0xFF}); Botan::secure_vector output_after_initialization( {0x26,0x06,0x95,0xF4,0xB8,0x96,0x0D,0x0B,0x27,0x4E,0xA2,0x9E,0x8D,0x2B,0x5A,0x35}); Botan::secure_vector output_without_reseed( {0xC4,0x90,0x04,0x5B,0x35,0x4F,0x50,0x09,0x68,0x45,0xF0,0x4B,0x11,0x03,0x58,0xF0}); result.test_eq("is_seeded",rng.is_seeded(),false); rng.initialize_with(seed_input.data(), seed_input.size()); Botan::secure_vector out(16); rng.randomize(out.data(), out.size()); result.test_eq("underlying RNG calls", counting_rng.randomize_count(), size_t(0)); result.test_eq("out before reseed", out, output_after_initialization); // reseed must happen here rng.randomize(out.data(), out.size()); result.test_eq("underlying RNG calls", counting_rng.randomize_count(), size_t(1)); result.test_ne("out after reseed", out, output_without_reseed); return result; } Test::Result test_reseed() { Test::Result result("HMAC_DRBG Reseed"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } // test reseed_interval is enforced Request_Counting_RNG counting_rng; Botan::HMAC_DRBG rng(std::move(mac), counting_rng, 2); rng.random_vec(7); result.test_eq("initial seeding", counting_rng.randomize_count(), 1); rng.random_vec(9); result.test_eq("still initial seed", counting_rng.randomize_count(), 1); rng.random_vec(1); result.test_eq("first reseed", counting_rng.randomize_count(), 2); rng.random_vec(15); result.test_eq("still first reseed", counting_rng.randomize_count(), 2); rng.random_vec(15); result.test_eq("second reseed", counting_rng.randomize_count(), 3); rng.random_vec(1); result.test_eq("still second reseed", counting_rng.randomize_count(), 3); // request > max_number_of_bits_per_request, do reseeds occur? rng.random_vec(64*1024 + 1); result.test_eq("request exceeds output limit", counting_rng.randomize_count(), 4); rng.random_vec(9*64*1024 + 1); result.test_eq("request exceeds output limit", counting_rng.randomize_count(), 9); return result; } Test::Result test_max_number_of_bytes_per_request() { Test::Result result("HMAC_DRBG max_number_of_bytes_per_request"); std::string mac_string = "HMAC(SHA-256)"; auto mac = Botan::MessageAuthenticationCode::create(mac_string); if(!mac) { result.note_missing(mac_string); return result; } Request_Counting_RNG counting_rng; result.test_throws("HMAC_DRBG does not accept 0 for max_number_of_bytes_per_request", [&mac_string, &counting_rng ]() { Botan::HMAC_DRBG rng(Botan::MessageAuthenticationCode::create(mac_string), counting_rng, 2, 0); }); result.test_throws("HMAC_DRBG does not accept values higher than 64KB for max_number_of_bytes_per_request", [ &mac_string, &counting_rng ]() { Botan::HMAC_DRBG rng(Botan::MessageAuthenticationCode::create(mac_string), counting_rng, 2, 64 * 1024 + 1); }); // set reseed_interval to 1 so we can test that a long request is split // into multiple, max_number_of_bytes_per_request long requests // for each smaller request, reseed_check() calls counting_rng::randomize(), // which we can compare with Botan::HMAC_DRBG rng(std::move(mac), counting_rng, 1, 64); rng.random_vec(63); result.test_eq("one request", counting_rng.randomize_count(), 1); rng.clear(); counting_rng.clear(); rng.random_vec(64); result.test_eq("one request", counting_rng.randomize_count(), 1); rng.clear(); counting_rng.clear(); rng.random_vec(65); result.test_eq("two requests", counting_rng.randomize_count(), 2); rng.clear(); counting_rng.clear(); rng.random_vec(1025); result.test_eq("17 requests", counting_rng.randomize_count(), 17); return result; } Test::Result test_broken_entropy_input() { Test::Result result("HMAC_DRBG Broken Entropy Input"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } // make sure no output is generated when the entropy input source is broken const size_t reseed_interval = 1024; // underlying_rng throws exception Botan::Null_RNG broken_entropy_input_rng; Botan::HMAC_DRBG rng_with_broken_rng(std::move(mac), broken_entropy_input_rng, reseed_interval); result.test_throws("broken underlying rng", [&rng_with_broken_rng] () { rng_with_broken_rng.random_vec(16); }); // entropy_sources throw exception std::unique_ptr broken_entropy_source_1(new Broken_Entropy_Source()); std::unique_ptr broken_entropy_source_2(new Broken_Entropy_Source()); Botan::Entropy_Sources broken_entropy_sources; broken_entropy_sources.add_source(std::move(broken_entropy_source_1)); broken_entropy_sources.add_source(std::move(broken_entropy_source_2)); mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Botan::HMAC_DRBG rng_with_broken_es(std::move(mac), broken_entropy_sources, reseed_interval); result.test_throws("broken entropy sources", [&rng_with_broken_es] () { rng_with_broken_es.random_vec(16); }); // entropy source returns insufficient entropy Botan::Entropy_Sources insufficient_entropy_sources; std::unique_ptr insufficient_entropy_source(new Insufficient_Entropy_Source()); insufficient_entropy_sources.add_source(std::move(insufficient_entropy_source)); mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Botan::HMAC_DRBG rng_with_insufficient_es(std::move(mac), insufficient_entropy_sources, reseed_interval); result.test_throws("insufficient entropy source", [&rng_with_insufficient_es] () { rng_with_insufficient_es.random_vec(16); }); // one of or both underlying_rng and entropy_sources throw exception mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Botan::HMAC_DRBG rng_with_broken_rng_and_es(std::move(mac), broken_entropy_input_rng, Botan::Entropy_Sources::global_sources(), reseed_interval); result.test_throws("broken underlying rng but good entropy sources", [&rng_with_broken_rng_and_es] () { rng_with_broken_rng_and_es.random_vec(16); }); mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Botan::HMAC_DRBG rng_with_rng_and_broken_es(std::move(mac), Test::rng(), broken_entropy_sources, reseed_interval); result.test_throws("good underlying rng but broken entropy sources", [&rng_with_rng_and_broken_es] () { rng_with_rng_and_broken_es.random_vec(16); }); mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Botan::HMAC_DRBG rng_with_broken_rng_and_broken_es(std::move(mac), broken_entropy_input_rng, broken_entropy_sources, reseed_interval); result.test_throws("underlying rng and entropy sources broken", [&rng_with_broken_rng_and_broken_es] () { rng_with_broken_rng_and_broken_es.random_vec(16); }); return result; } Test::Result test_check_nonce() { Test::Result result("HMAC_DRBG Nonce Check"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } // make sure the nonce has at least 1/2*security_strength bits // SHA-256 -> 128 bits security strength for( auto nonce_size : { 0, 4, 15, 16, 17, 32 } ) { if(!mac) { mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); } Botan::HMAC_DRBG rng(std::move(mac)); result.test_eq("not seeded", rng.is_seeded(), false); std::vector nonce(nonce_size); rng.initialize_with(nonce.data(), nonce.size()); if(nonce_size < 16) { result.test_eq("not seeded", rng.is_seeded(), false); result.test_throws("invalid nonce size", [&rng, &nonce] () { rng.random_vec(16); }); } else { result.test_eq("is seeded", rng.is_seeded(), true); rng.random_vec(16); } } return result; } Test::Result test_prediction_resistance() { Test::Result result("HMAC_DRBG Prediction Resistance"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } // set reseed_interval = 1, forcing a reseed for every RNG request Request_Counting_RNG counting_rng; Botan::HMAC_DRBG rng(std::move(mac), counting_rng, 1); rng.random_vec(16); result.test_eq("first request", counting_rng.randomize_count(), size_t(1)); rng.random_vec(16); result.test_eq("second request", counting_rng.randomize_count(), size_t(2)); rng.random_vec(16); result.test_eq("third request", counting_rng.randomize_count(), size_t(3)); return result; } Test::Result test_fork_safety() { Test::Result result("HMAC_DRBG Fork Safety"); #if defined(BOTAN_TARGET_OS_TYPE_IS_UNIX) auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } const size_t reseed_interval = 1024; // make sure rng is reseeded after every fork Request_Counting_RNG counting_rng; Botan::HMAC_DRBG rng(std::move(mac), counting_rng, reseed_interval); rng.random_vec(16); result.test_eq("first request", counting_rng.randomize_count(), size_t(1)); // fork and request from parent and child, both should output different sequences size_t count = counting_rng.randomize_count(); Botan::secure_vector parent_bytes(16), child_bytes(16); int fd[2]; int rc = ::pipe(fd); if(rc != 0) { result.test_failure("failed to create pipe"); } pid_t pid = ::fork(); if ( pid == -1 ) { result.test_failure("failed to fork process"); return result; } else if ( pid != 0 ) { // parent process, wait for randomize_count from child's rng ::close(fd[1]); // close write end in parent ssize_t got = ::read(fd[0], &count, sizeof(count)); if(got > 0) { result.test_eq("expected bytes from child", got, sizeof(count)); result.test_eq("parent not reseeded", counting_rng.randomize_count(), 1); result.test_eq("child reseed occurred", count, 2); } else { result.test_failure("Failed to read count size from child process"); } parent_bytes = rng.random_vec(16); got = ::read(fd[0], &child_bytes[0], child_bytes.size()); if(got > 0) { result.test_eq("expected bytes from child", got, child_bytes.size()); result.test_ne("parent and child output sequences differ", parent_bytes, child_bytes); } else { result.test_failure("Failed to read RNG bytes from child process"); } ::close(fd[0]); // close read end in parent // wait for the child to exit int status = 0; ::waitpid(pid, &status, 0); } else { // child process, send randomize_count and first output sequence back to parent ::close(fd[0]); // close read end in child rng.randomize(&child_bytes[0], child_bytes.size()); count = counting_rng.randomize_count(); ssize_t written = ::write(fd[1], &count, sizeof(count)); try { rng.randomize(&child_bytes[0], child_bytes.size()); } catch(std::exception& e) { fprintf(stderr, "%s", e.what()); } written = ::write(fd[1], &child_bytes[0], child_bytes.size()); BOTAN_UNUSED(written); ::close(fd[1]); // close write end in child ::_exit(0); } #endif return result; } Test::Result test_randomize_with_ts_input() { Test::Result result("HMAC_DRBG Randomize With Timestamp Input"); auto mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); if(!mac) { result.note_missing("HMAC(SHA-256)"); return result; } const size_t reseed_interval = 1024; const size_t request_bytes = 64; const std::vector seed(128); // check that randomize_with_ts_input() creates different output based on a timestamp // and possibly additional data, such as process id Fixed_Output_RNG fixed_output_rng1(seed); Botan::HMAC_DRBG rng1(std::move(mac), fixed_output_rng1, reseed_interval); Botan::secure_vector output1(request_bytes); rng1.randomize(output1.data(), output1.size()); mac = Botan::MessageAuthenticationCode::create("HMAC(SHA-256)"); Fixed_Output_RNG fixed_output_rng2(seed); Botan::HMAC_DRBG rng2(std::move(mac), fixed_output_rng2, reseed_interval); Botan::secure_vector output2(request_bytes); rng2.randomize(output2.data(), output2.size()); result.test_eq("equal output due to same seed", output1, output2); rng1.randomize_with_ts_input(output1.data(), output1.size()); rng2.randomize_with_ts_input(output2.data(), output2.size()); result.test_ne("output differs due to different timestamp", output1, output2); return result; } std::vector run() override { std::vector results; results.push_back(test_reseed_kat()); results.push_back(test_reseed()); results.push_back(test_max_number_of_bytes_per_request()); results.push_back(test_broken_entropy_input()); results.push_back(test_check_nonce()); results.push_back(test_prediction_resistance()); results.push_back(test_fork_safety()); results.push_back(test_randomize_with_ts_input()); return results; } }; BOTAN_REGISTER_TEST("hmac_drbg_unit", HMAC_DRBG_Unit_Tests); #endif } }