package org.bouncycastle.crypto.test; import java.security.SecureRandom; import org.bouncycastle.crypto.CipherKeyGenerator; import org.bouncycastle.crypto.KeyGenerationParameters; import org.bouncycastle.crypto.Mac; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.generators.Poly1305KeyGenerator; import org.bouncycastle.crypto.macs.Poly1305; import org.bouncycastle.crypto.params.KeyParameter; import org.bouncycastle.crypto.params.ParametersWithIV; import org.bouncycastle.util.Arrays; import org.bouncycastle.util.encoders.Hex; import org.bouncycastle.util.test.SimpleTest; /* */ public class Poly1305Test extends SimpleTest { private static final int MAXLEN = 1000; private static class TestCase { private final byte[] key; private final byte[] nonce; private final byte[] message; private final byte[] expectedMac; public TestCase(String key, String nonce, String message, String expectedMac) { this.key = Hex.decode(key); // nacl test case keys are not pre-clamped Poly1305KeyGenerator.clamp(this.key); this.nonce = (nonce == null) ? null : Hex.decode(nonce); this.message = Hex.decode(message); this.expectedMac = Hex.decode(expectedMac); } } private static TestCase[] CASES = { // Raw Poly1305 // onetimeauth.c from nacl-20110221 new TestCase("eea6a7251c1e72916d11c2cb214d3c25" + "2539121d8e234e652d651fa4c8cff880", null, "8e993b9f48681273c29650ba32fc76ce48332ea7164d96a4476fb8c531a1186a" + "c0dfc17c98dce87b4da7f011ec48c97271d2c20f9b928fe2270d6fb863d51738" + "b48eeee314a7cc8ab932164548e526ae90224368517acfeabd6bb3732bc0e9da" + "99832b61ca01b6de56244a9e88d5f9b37973f622a43d14a6599b1f654cb45a74e355a5", "f3ffc7703f9400e52a7dfb4b3d3305d9"), // Poly1305-AES // Loop 1 of test-poly1305aes from poly1305aes-20050218 new TestCase("0000000000000000000000000000000000000000000000000000000000000000", "00000000000000000000000000000000", "", "66e94bd4ef8a2c3b884cfa59ca342b2e"), new TestCase("f795bd0a50e29e0710d3130a20e98d0c" + "f795bd4a52e29ed713d313fa20e98dbc", "917cf69ebd68b2ec9b9fe9a3eadda692", "66f7", "5ca585c75e8f8f025e710cabc9a1508b"), new TestCase("3ef49901c8e11c000430d90ad45e7603" + "e69dae0aab9f91c03a325dcc9436fa90", "166450152e2394835606a9d1dd2cdc8b", "66f75c0e0c7a406586", "2924f51b9c2eff5df09db61dd03a9ca1"), new TestCase("da4afc035087d90e503f8f0ea08c3e0d" + "85a4ea91a7de0b0d96eed0d4bf6ecf1c", "0b6ef7a0b8f8c738b0f8d5995415271f", "66f75c0e0c7a40658629e3392f7f8e3349a02191ffd49f39879a8d9d1d0e23ea", "3c5a13adb18d31c64cc29972030c917d"), new TestCase( "ca3c6a0da0a864024ca3090628c28e0d" + "25eb69bac5cdf7d6bfcee4d9d5507b82", "046772a4f0a8de92e4f0d628cdb04484", "66f75c0e0c7a40658629e3392f7f8e3349a02191ffd49f39879a8d9d1d0e23ea3caa4d240bd2ab8a8c4a6bb8d3288d9de4b793f05e97646dd4d98055de", "fc5fb58dc65daf19b14d1d05da1064e8"), // Specific test cases generated from test-poly1305aes from poly1305aes-20050218 that // expose Java unsigned integer problems new TestCase( "01bcb20bfc8b6e03609ddd09f44b060f" + "95cc0e44d0b79a8856afcae1bec4fe3c", null, "66f75c0e0c7a40658629e3392f7f8e3349a02191ffd49f39879a8d9d1d0e23ea3caa4d240bd2ab8a8c4a6bb8d3288d9de4b793f05e97646dd4d98055de" + "fc3e0677d956b4c62664bac15962ab15d93ccbbc03aafdbde779162ed93b55361f0f8acaa41d50ef5175927fe79ea316186516eef15001cd04d3524a55" + "e4fa3c5ca479d3aaa8a897c21807f721b6270ffc68b6889d81a116799f6aaa35d8e04c7a7dd5e6da2519e8759f54e906696f5772fee093283bcef7b930" + "aed50323bcbc8c820c67422c1e16bdc022a9c0277c9d95fef0ea4ee11e2b27276da811523c5acb80154989f8a67ee9e3fa30b73b0c1c34bf46e3464d97" + "7cd7fcd0ac3b82721080bb0d9b982ee2c77feee983d7ba35da88ce86955002940652ab63bc56fb16f994da2b01d74356509d7d1b6d7956b0e5a557757b" + "d1ced2eef8650bc5b6d426108c1518abcbd0befb6a0d5fd57a3e2dbf31458eab63df66613653d4beae73f5c40eb438fbcfdcf4a4ba46320184b9ca0da4" + "dfae77de7ccc910356caea3243f33a3c81b064b3b7cedc7435c223f664227215715980e6e0bb570d459ba80d7512dbe458c8f0f3f52d659b6e8eef19ee" + "71aea2ced85c7a42ffca6522a62db49a2a46eff72bd7f7e0883acd087183f0627f3537a4d558754ed63358e8182bee196735b361dc9bd64d5e34e1074a" + "855655d2974cc6fa1653754cf40f561d8c7dc526aab2908ec2d2b977cde1a1fb1071e32f40e049ea20f30368ba1592b4fe57fb51595d23acbdace324cd" + "d78060a17187c662368854e915402d9b52fb21e984663e41c26a109437e162cfaf071b53f77e50000a5388ff183b82ce7a1af476c416d7d204157b3633" + "b2f4ec077b699b032816997e37bceded8d4a04976fd7d0c0b029f290794c3be504c5242287ea2f831f11ed5690d92775cd6e863d7731fd4da687ebfb13" + "df4c41dc0fb8", "ae345d555eb04d6947bb95c0965237e2"), new TestCase( "cd07fd0ef8c0be0afcbdb30af4af0009" + "76fb3635a2dc92a1f768163ab12f2187", null, "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", "045be28cc52009f506bdbfabedacf0b4"), // Test case from JIRA issue BJA-620 new TestCase( "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff", null, "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffffff" + "ffffffffffffffffffffffffffffff", "c80cb43844f387946e5aa6085bdf67da") }; public String getName() { return "Poly1305"; } public void performTest() throws Exception { testKeyGenerator(); testInit(); for (int i = 0; i < CASES.length; i++) { testCase(i); } testSequential(); testReset(); rfc7539Test(); } private void testCase(int i) { byte[] out = new byte[16]; TestCase tc = CASES[i]; final Mac mac; if (tc.nonce == null) { // Raw Poly1305 test - don't do any transform on AES key part mac = new Poly1305(); mac.init(new KeyParameter(tc.key)); } else { mac = new Poly1305(new AESEngine()); mac.init(new ParametersWithIV(new KeyParameter(tc.key), tc.nonce)); } mac.update(tc.message, 0, tc.message.length); mac.doFinal(out, 0); if (!Arrays.areEqual(out, tc.expectedMac)) { fail("Mismatched output " + i, new String(Hex.encode(tc.expectedMac)), new String(Hex.encode(out))); } } private void testSequential() { // Sequential test, adapted from test-poly1305aes int len; byte[] kr = new byte[32]; byte[] m = new byte[MAXLEN]; byte[] n = new byte[16]; byte[] out = new byte[16]; int c = 0; final Mac mac = new Poly1305(new AESEngine()); for (int loop = 0; loop < 13; loop++) { len = 0; for (; ; ) { c++; mac.init(new ParametersWithIV(new KeyParameter(kr), n)); mac.update(m, 0, len); mac.doFinal(out, 0); // if (c == 678) // { // TestCase tc = CASES[0]; // // if (!Arrays.areEqual(tc.key, kr)) // { // System.err.println("Key bad"); // System.err.println(new String(Hex.encode(tc.key))); // System.err.println(new String(Hex.encode(kr))); // System.exit(1); // } // if (!Arrays.areEqual(tc.nonce, n)) // { // System.err.println("Nonce bad"); // System.exit(1); // } // System.out.printf("[%d] m: %s\n", c, new String(Hex.encode(m, 0, len))); // System.out.printf("[%d] K: %s\n", c, new String(Hex.encodje(kr))); // System.out.printf("[%d] N: %s\n", c, new String(Hex.encode(n))); // System.out.printf("[%d] M: ", c); // } // System.out.printf("%d/%s\n", c, new String(Hex.encode(out))); if (len >= MAXLEN) { break; } n[0] ^= loop; for (int i = 0; i < 16; ++i) { n[i] ^= out[i]; } if (len % 2 != 0) { for (int i = 0; i < 16; ++i) { kr[i] ^= out[i]; } } if (len % 3 != 0) { for (int i = 0; i < 16; ++i) { kr[i + 16] ^= out[i]; } } Poly1305KeyGenerator.clamp(kr); m[len++] ^= out[0]; } } // Output after 13 loops as generated by poly1305 ref if (c != 13013 || !Arrays.areEqual(out, Hex.decode("89824ddf0816481051f4a82731cd56d5"))) { fail("Sequential Poly1305 " + c, "89824ddf0816481051f4a82731cd56d5", new String(Hex.encode(out))); } } private void testReset() { CipherKeyGenerator gen = new Poly1305KeyGenerator(); gen.init(new KeyGenerationParameters(new SecureRandom(), 256)); byte[] k = gen.generateKey(); byte[] m = new byte[10000]; byte[] check = new byte[16]; byte[] out = new byte[16]; // Generate baseline Mac poly = new Poly1305(new AESEngine()); poly.init(new ParametersWithIV(new KeyParameter(k), new byte[16])); poly.update(m, 0, m.length); poly.doFinal(check, 0); // Check reset after doFinal poly.update(m, 0, m.length); poly.doFinal(out, 0); if (!Arrays.areEqual(check, out)) { fail("Mac not reset after doFinal"); } // Check reset poly.update((byte)1); poly.update((byte)2); poly.reset(); poly.update(m, 0, m.length); poly.doFinal(out, 0); if (!Arrays.areEqual(check, out)) { fail("Mac not reset after doFinal"); } // Check init resets poly.update((byte)1); poly.update((byte)2); poly.init(new ParametersWithIV(new KeyParameter(k), new byte[16])); poly.update(m, 0, m.length); poly.doFinal(out, 0); if (!Arrays.areEqual(check, out)) { fail("Mac not reset after doFinal"); } } private void testInit() { CipherKeyGenerator gen = new Poly1305KeyGenerator(); gen.init(new KeyGenerationParameters(new SecureRandom(), 256)); byte[] k = gen.generateKey(); Mac poly = new Poly1305(new AESEngine()); poly.init(new ParametersWithIV(new KeyParameter(k), new byte[16])); try { poly.init(new ParametersWithIV(new KeyParameter(k), new byte[15])); fail("16 byte nonce required"); } catch (IllegalArgumentException e) { // Expected } try { byte[] k2 = new byte[k.length - 1]; System.arraycopy(k, 0, k2, 0, k2.length); poly.init(new ParametersWithIV(new KeyParameter(k2), new byte[16])); fail("32 byte key required"); } catch (IllegalArgumentException e) { // Expected } /* try { k[19] = (byte)0xFF; poly.init(new ParametersWithIV(new KeyParameter(k), new byte[16])); fail("Unclamped key should not be accepted."); } catch (IllegalArgumentException e) { // Expected } */ } private void testKeyGenerator() { CipherKeyGenerator gen = new Poly1305KeyGenerator(); gen.init(new KeyGenerationParameters(new SecureRandom(), 256)); byte[] k = gen.generateKey(); if (k.length != 32) { fail("Poly1305 key should be 256 bits."); } try { Poly1305KeyGenerator.checkKey(k); } catch (IllegalArgumentException e) { fail("Poly1305 key should be clamped on generation."); } byte[] k2 = new byte[k.length]; System.arraycopy(k, 0, k2, 0, k2.length); Poly1305KeyGenerator.clamp(k); if (!Arrays.areEqual(k, k2)) { fail("Poly1305 key should be clamped on generation."); } /* try { k2[19] = (byte)0xff; Poly1305KeyGenerator.checkKey(k2); fail("Unclamped key should fail check."); } catch (IllegalArgumentException e) { // Expected } */ } public void rfc7539Test() { // From RFC 7539 byte[] keyMaterial = Hex.decode("85d6be7857556d337f4452fe42d506a80103808afb0db2fd4abff6af4149f51b"); byte[] data = Hex.decode("43727970746f677261706869 63 20 46 6f 72 75 6d 20 52 65 73 65 61 72 63 68 20 47 72 6f7570"); byte[] expected = Hex.decode("a8061dc1305136c6c22b8baf0c0127a9"); checkVector(keyMaterial, data, expected); data = Hex.decode("48656c6c6f20776f726c6421"); keyMaterial = Hex.decode( "746869732069732033322d6279746520" + "6b657920666f7220506f6c7931333035"); checkVector(keyMaterial, data, Hex.decode("a6f745008f81c916a20dcc74eef2b2f0")); // A.3 #1 keyMaterial = Hex.decode("00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode( "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" + "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" + "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" + "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); // A.3 #2 keyMaterial = Hex.decode("00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0036 e5 f6 b5 c5 e0 60 70 f0 ef ca 96 22 7a 86 3e"); data = Hex.decode( "41 6e 79 20 73 75 62 6d 69 73 73 69 6f 6e 20 74" + "6f 20 74 68 65 20 49 45 54 46 20 69 6e 74 65 6e" + "64 65 64 20 62 79 20 74 68 65 20 43 6f 6e 74 72" + "69 62 75 74 6f 72 20 66 6f 72 20 70 75 62 6c 69" + "63 61 74 69 6f 6e 20 61 73 20 61 6c 6c 20 6f 72" + "20 70 61 72 74 20 6f 66 20 61 6e 20 49 45 54 46" + "20 49 6e 74 65 72 6e 65 74 2d 44 72 61 66 74 20" + "6f 72 20 52 46 43 20 61 6e 64 20 61 6e 79 20 73" + "74 61 74 65 6d 65 6e 74 20 6d 61 64 65 20 77 69" + "74 68 69 6e 20 74 68 65 20 63 6f 6e 74 65 78 74" + "20 6f 66 20 61 6e 20 49 45 54 46 20 61 63 74 69" + "76 69 74 79 20 69 73 20 63 6f 6e 73 69 64 65 72" + "65 64 20 61 6e 20 22 49 45 54 46 20 43 6f 6e 74" + "72 69 62 75 74 69 6f 6e 22 2e 20 53 75 63 68 20" + "73 74 61 74 65 6d 65 6e 74 73 20 69 6e 63 6c 75" + "64 65 20 6f 72 61 6c 20 73 74 61 74 65 6d 65 6e" + "74 73 20 69 6e 20 49 45 54 46 20 73 65 73 73 69" + "6f 6e 73 2c 20 61 73 20 77 65 6c 6c 20 61 73 20" + "77 72 69 74 74 65 6e 20 61 6e 64 20 65 6c 65 63" + "74 72 6f 6e 69 63 20 63 6f 6d 6d 75 6e 69 63 61" + "74 69 6f 6e 73 20 6d 61 64 65 20 61 74 20 61 6e" + "79 20 74 69 6d 65 20 6f 72 20 70 6c 61 63 65 2c" + "20 77 68 69 63 68 20 61 72 65 20 61 64 64 72 65" + "73 73 65 64 20 74 6f"); checkVector(keyMaterial, data, Hex.decode("36 e5 f6 b5 c5 e0 60 70 f0 ef ca 96 22 7a 86 3e")); // A.3 #3 keyMaterial = Hex.decode("36 e5 f6 b5 c5 e0 60 70 f0 ef ca 96 22 7a 86 3e00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("f3 47 7e 7c d9 54 17 af 89 a6 b8 79 4c 31 0c f0")); // A.3 #4 keyMaterial = Hex.decode("1c 92 40 a5 eb 55 d3 8a f3 33 88 86 04 f6 b5 f0 47 39 17 c1 40 2b 80 09 9d ca 5c bc 20 70 75 c0"); data = Hex.decode( "27 54 77 61 73 20 62 72 69 6c 6c 69 67 2c 20 61" + "6e 64 20 74 68 65 20 73 6c 69 74 68 79 20 74 6f" + "76 65 73 0a 44 69 64 20 67 79 72 65 20 61 6e 64" + "20 67 69 6d 62 6c 65 20 69 6e 20 74 68 65 20 77" + "61 62 65 3a 0a 41 6c 6c 20 6d 69 6d 73 79 20 77" + "65 72 65 20 74 68 65 20 62 6f 72 6f 67 6f 76 65" + "73 2c 0a 41 6e 64 20 74 68 65 20 6d 6f 6d 65 20" + "72 61 74 68 73 20 6f 75 74 67 72 61 62 65 2e"); checkVector(keyMaterial, data, Hex.decode("45 41 66 9a 7e aa ee 61 e7 08 dc 7c bc c5 eb 62")); // A.3 #5 keyMaterial = Hex.decode("02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode("FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF"); checkVector(keyMaterial, data, Hex.decode("03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); // A.3 #6 keyMaterial = Hex.decode("02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF"); data = Hex.decode("02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); // A.3 #7 keyMaterial = Hex.decode("01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode("FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FFF0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); // A.3 #8 keyMaterial = Hex.decode("01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode("FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FFFB FE FE FE FE FE FE FE FE FE FE FE FE FE FE FE01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01"); checkVector(keyMaterial, data, Hex.decode("00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); // A.3 #9 keyMaterial = Hex.decode("02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode("FD FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF"); checkVector(keyMaterial, data, Hex.decode("FA FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF")); // A.3 #10 keyMaterial = Hex.decode("01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode( "E3 35 94 D7 50 5E 43 B9 00 00 00 00 00 00 00 00" + "33 94 D7 50 5E 43 79 CD 01 00 00 00 00 00 00 00" + "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" + "01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("14 00 00 00 00 00 00 00 55 00 00 00 00 00 00 00")); // A.3 #11 keyMaterial = Hex.decode("01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); data = Hex.decode( "E3 35 94 D7 50 5E 43 B9 00 00 00 00 00 00 00 00" + "33 94 D7 50 5E 43 79 CD 01 00 00 00 00 00 00 00" + "00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00"); checkVector(keyMaterial, data, Hex.decode("13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00")); } private void checkVector(byte[] keyMaterial, byte[] input, byte[] tag) { Poly1305 poly1305 = new Poly1305(); poly1305.init(new KeyParameter(keyMaterial)); poly1305.update(input, 0, input.length); byte[] mac = new byte[poly1305.getMacSize()]; poly1305.doFinal(mac, 0); if (!Arrays.areEqual(tag, mac)) { fail("rfc7539", Hex.toHexString(tag), Hex.toHexString(mac)); } } public static void main(String[] args) throws Exception { runTest(new Poly1305Test()); } }