You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
253 lines
8.7 KiB
253 lines
8.7 KiB
4 months ago
|
/*
|
||
|
* stat-driver.c
|
||
|
*
|
||
|
* test driver for the stat_test functions
|
||
|
*
|
||
|
* David A. McGrew
|
||
|
* Cisco Systems, Inc.
|
||
|
*/
|
||
|
|
||
|
/*
|
||
|
*
|
||
|
* Copyright (c) 2001-2017, Cisco Systems, Inc.
|
||
|
* All rights reserved.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
*
|
||
|
* Redistributions of source code must retain the above copyright
|
||
|
* notice, this list of conditions and the following disclaimer.
|
||
|
*
|
||
|
* Redistributions in binary form must reproduce the above
|
||
|
* copyright notice, this list of conditions and the following
|
||
|
* disclaimer in the documentation and/or other materials provided
|
||
|
* with the distribution.
|
||
|
*
|
||
|
* Neither the name of the Cisco Systems, Inc. nor the names of its
|
||
|
* contributors may be used to endorse or promote products derived
|
||
|
* from this software without specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
||
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
||
|
* COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
||
|
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
||
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
||
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*
|
||
|
*/
|
||
|
|
||
|
#ifdef HAVE_CONFIG_H
|
||
|
#include <config.h>
|
||
|
#endif
|
||
|
|
||
|
#include <stdio.h> /* for printf() */
|
||
|
|
||
|
#include "err.h"
|
||
|
#include "stat.h"
|
||
|
#include "srtp.h"
|
||
|
|
||
|
#include "cipher.h"
|
||
|
#include "cipher_priv.h"
|
||
|
|
||
|
void err_check(srtp_err_status_t s)
|
||
|
{
|
||
|
if (s) {
|
||
|
printf("error (code %d)\n", s);
|
||
|
exit(1);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
int main(int argc, char *argv[])
|
||
|
{
|
||
|
uint8_t buffer[2532];
|
||
|
unsigned int buf_len = 2500;
|
||
|
int i, j;
|
||
|
extern srtp_cipher_type_t srtp_aes_icm_128;
|
||
|
extern srtp_cipher_type_t srtp_aes_icm_256;
|
||
|
#ifdef GCM
|
||
|
extern srtp_cipher_type_t srtp_aes_gcm_128;
|
||
|
extern srtp_cipher_type_t srtp_aes_gcm_256;
|
||
|
#endif
|
||
|
srtp_cipher_t *c;
|
||
|
/* clang-format off */
|
||
|
uint8_t key[46] = {
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05
|
||
|
};
|
||
|
/* clang-format on */
|
||
|
v128_t nonce;
|
||
|
int num_trials = 500;
|
||
|
int num_fail;
|
||
|
|
||
|
printf("statistical tests driver\n");
|
||
|
|
||
|
v128_set_to_zero(&nonce);
|
||
|
for (i = 0; i < 2500; i++)
|
||
|
buffer[i] = 0;
|
||
|
|
||
|
/* run tests */
|
||
|
printf("running stat_tests on all-null buffer, expecting failure\n");
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
|
||
|
srtp_cipher_rand_for_tests(buffer, 2500);
|
||
|
printf("running stat_tests on rand(), expecting success\n");
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
|
||
|
printf("running stat_tests on AES-128-ICM, expecting success\n");
|
||
|
/* set buffer to cipher output */
|
||
|
for (i = 0; i < 2500; i++)
|
||
|
buffer[i] = 0;
|
||
|
err_check(srtp_cipher_type_alloc(&srtp_aes_icm_128, &c,
|
||
|
SRTP_AES_ICM_128_KEY_LEN_WSALT, 0));
|
||
|
err_check(srtp_cipher_init(c, key));
|
||
|
err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
/* run tests on cipher outout */
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
|
||
|
printf("runs test (please be patient): ");
|
||
|
fflush(stdout);
|
||
|
num_fail = 0;
|
||
|
v128_set_to_zero(&nonce);
|
||
|
for (j = 0; j < num_trials; j++) {
|
||
|
for (i = 0; i < 2500; i++)
|
||
|
buffer[i] = 0;
|
||
|
nonce.v32[3] = i;
|
||
|
err_check(
|
||
|
srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
if (stat_test_runs(buffer)) {
|
||
|
num_fail++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
printf("%d failures in %d tests\n", num_fail, num_trials);
|
||
|
printf("(nota bene: a small fraction of stat_test failures does not \n"
|
||
|
"indicate that the random source is invalid)\n");
|
||
|
|
||
|
err_check(srtp_cipher_dealloc(c));
|
||
|
|
||
|
printf("running stat_tests on AES-256-ICM, expecting success\n");
|
||
|
/* set buffer to cipher output */
|
||
|
for (i = 0; i < 2500; i++)
|
||
|
buffer[i] = 0;
|
||
|
err_check(srtp_cipher_type_alloc(&srtp_aes_icm_256, &c,
|
||
|
SRTP_AES_ICM_256_KEY_LEN_WSALT, 0));
|
||
|
err_check(srtp_cipher_init(c, key));
|
||
|
err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
/* run tests on cipher outout */
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
|
||
|
printf("runs test (please be patient): ");
|
||
|
fflush(stdout);
|
||
|
num_fail = 0;
|
||
|
v128_set_to_zero(&nonce);
|
||
|
for (j = 0; j < num_trials; j++) {
|
||
|
for (i = 0; i < 2500; i++)
|
||
|
buffer[i] = 0;
|
||
|
nonce.v32[3] = i;
|
||
|
err_check(
|
||
|
srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
if (stat_test_runs(buffer)) {
|
||
|
num_fail++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
#ifdef GCM
|
||
|
{
|
||
|
printf("running stat_tests on AES-128-GCM, expecting success\n");
|
||
|
/* set buffer to cipher output */
|
||
|
for (i = 0; i < 2500; i++) {
|
||
|
buffer[i] = 0;
|
||
|
}
|
||
|
err_check(srtp_cipher_type_alloc(&srtp_aes_gcm_128, &c,
|
||
|
SRTP_AES_GCM_128_KEY_LEN_WSALT, 8));
|
||
|
err_check(srtp_cipher_init(c, key));
|
||
|
err_check(
|
||
|
srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
/* run tests on cipher outout */
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
fflush(stdout);
|
||
|
num_fail = 0;
|
||
|
v128_set_to_zero(&nonce);
|
||
|
for (j = 0; j < num_trials; j++) {
|
||
|
for (i = 0; i < 2500; i++) {
|
||
|
buffer[i] = 0;
|
||
|
}
|
||
|
nonce.v32[3] = i;
|
||
|
err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce,
|
||
|
srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
buf_len = 2500;
|
||
|
if (stat_test_runs(buffer)) {
|
||
|
num_fail++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
printf("running stat_tests on AES-256-GCM, expecting success\n");
|
||
|
/* set buffer to cipher output */
|
||
|
for (i = 0; i < 2500; i++) {
|
||
|
buffer[i] = 0;
|
||
|
}
|
||
|
err_check(srtp_cipher_type_alloc(&srtp_aes_gcm_256, &c,
|
||
|
SRTP_AES_GCM_256_KEY_LEN_WSALT, 16));
|
||
|
err_check(srtp_cipher_init(c, key));
|
||
|
err_check(
|
||
|
srtp_cipher_set_iv(c, (uint8_t *)&nonce, srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
/* run tests on cipher outout */
|
||
|
printf("monobit %d\n", stat_test_monobit(buffer));
|
||
|
printf("poker %d\n", stat_test_poker(buffer));
|
||
|
printf("runs %d\n", stat_test_runs(buffer));
|
||
|
fflush(stdout);
|
||
|
num_fail = 0;
|
||
|
v128_set_to_zero(&nonce);
|
||
|
for (j = 0; j < num_trials; j++) {
|
||
|
for (i = 0; i < 2500; i++) {
|
||
|
buffer[i] = 0;
|
||
|
}
|
||
|
nonce.v32[3] = i;
|
||
|
err_check(srtp_cipher_set_iv(c, (uint8_t *)&nonce,
|
||
|
srtp_direction_encrypt));
|
||
|
err_check(srtp_cipher_encrypt(c, buffer, &buf_len));
|
||
|
buf_len = 2500;
|
||
|
if (stat_test_runs(buffer)) {
|
||
|
num_fail++;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
#endif
|
||
|
|
||
|
printf("%d failures in %d tests\n", num_fail, num_trials);
|
||
|
printf("(nota bene: a small fraction of stat_test failures does not \n"
|
||
|
"indicate that the random source is invalid)\n");
|
||
|
|
||
|
err_check(srtp_cipher_dealloc(c));
|
||
|
|
||
|
return 0;
|
||
|
}
|