/cyassl-1.2.0/ctaocrypt/test/test.c
C | 1166 lines | 888 code | 273 blank | 5 comment | 95 complexity | fffed5f62fcf801b691cbfa4b6e49af9 MD5 | raw file
Possible License(s): GPL-2.0
- /* test.c */
-
-
- #include <string.h>
- #include <stdio.h>
- #include <stdlib.h>
-
- #include "md5.h"
- #include "md4.h"
- #include "sha.h"
- #include "sha256.h"
- #include "arc4.h"
- #include "random.h"
- #include "coding.h"
- #include "asn.h"
- #include "des3.h"
- #include "aes.h"
- #include "hmac.h"
- #include "dh.h"
- #include "dsa.h"
- #include "hc128.h"
- #include "rabbit.h"
-
- #ifdef _MSC_VER
- /* 4996 warning to use MS extensions e.g., strcpy_s instead of strncpy */
- #pragma warning(disable: 4996)
- #endif
-
- #ifdef OPENSSL_EXTRA
- #include "../../include/openssl/evp.h"
- #include "../../include/openssl/rand.h"
- #include "../../include/openssl/hmac.h"
- #include "../../include/openssl/des.h"
- #endif
-
-
-
-
- typedef struct testVector {
- char* input;
- char* output;
- size_t inLen;
- size_t outLen;
- } testVector;
-
- int md5_test();
- int md4_test();
- int sha_test();
- int sha256_test();
- int hmac_test();
- int arc4_test();
- int hc128_test();
- int rabbit_test();
- int des_test();
- int des3_test();
- int aes_test();
- int rsa_test();
- int dh_test();
- int dsa_test();
- int random_test();
- int openssl_test(); /* test mini api */
-
- int PemToDer(const char* inName, const char* outName);
-
-
- void err_sys(const char* msg, int es)
- {
- printf("%s error = %d\n", msg, es);
- exit(es);
- }
-
- /* func_args from test.h, so don't have to pull in other junk */
- typedef struct func_args {
- int argc;
- char** argv;
- int return_code;
- } func_args;
-
-
- void ctaocrypt_test(void* args)
- {
- int ret = 0;
-
- ((func_args*)args)->return_code = -1; /* error state */
-
- if ( (ret = md5_test()) )
- err_sys("MD5 test failed!\n", ret);
- else
- printf( "MD5 test passed!\n");
-
- #ifndef NO_MD4
- if ( (ret = md4_test()) )
- err_sys("MD4 test failed!\n", ret);
- else
- printf( "MD4 test passed!\n");
- #endif
-
- if ( (ret = sha_test()) )
- err_sys("SHA test failed!\n", ret);
- else
- printf( "SHA test passed!\n");
-
- #ifndef NO_SHA256
- if ( (ret = sha256_test()) )
- err_sys("SHA-256 test failed!\n", ret);
- else
- printf( "SHA-256 test passed!\n");
- #endif
-
- #ifndef NO_HMAC
- if ( (ret = hmac_test()) )
- err_sys("HMAC test failed!\n", ret);
- else
- printf( "HMAC test passed!\n");
- #endif
-
- if ( (ret = arc4_test()) )
- err_sys("ARC4 test failed!\n", ret);
- else
- printf( "ARC4 test passed!\n");
-
- #ifndef NO_HC128
- if ( (ret = hc128_test()) )
- err_sys("HC-128 test failed!\n", ret);
- else
- printf( "HC-128 test passed!\n");
- #endif
-
- #ifndef NO_RABBIT
- if ( (ret = rabbit_test()) )
- err_sys("Rabbit test failed!\n", ret);
- else
- printf( "Rabbit test passed!\n");
- #endif
-
- #ifndef NO_DES3
- if ( (ret = des_test()) )
- err_sys("DES test failed!\n", ret);
- else
- printf( "DES test passed!\n");
- #endif
-
- #ifndef NO_DES3
- if ( (ret = des3_test()) )
- err_sys("DES3 test failed!\n", ret);
- else
- printf( "DES3 test passed!\n");
- #endif
-
- #ifndef NO_AES
- if ( (ret = aes_test()) )
- err_sys("AES test failed!\n", ret);
- else
- printf( "AES test passed!\n");
- #endif
-
- if ( (ret = random_test()) )
- err_sys("RANDOM test failed!\n", ret);
- else
- printf( "RANDOM test passed!\n");
-
- if ( (ret = rsa_test()) )
- err_sys("RSA test failed!\n", ret);
- else
- printf( "RSA test passed!\n");
-
- #ifndef NO_DH
- if ( (ret = dh_test()) )
- err_sys("DH test failed!\n", ret);
- else
- printf( "DH test passed!\n");
- #endif
-
- #ifndef NO_DSA
- if ( (ret = dsa_test()) )
- err_sys("DSA test failed!\n", ret);
- else
- printf( "DSA test passed!\n");
- #endif
-
- #ifdef OPENSSL_EXTRA
- if ( (ret = openssl_test()) )
- err_sys("OPENSSL test failed!\n", ret);
- else
- printf( "OPENSSL test passed!\n");
- #endif
-
- ((func_args*)args)->return_code = ret;
- }
-
-
- /* so overall tests can pull in test function */
- #ifndef NO_MAIN_DRIVER
-
- int main(int argc, char** argv)
- {
- func_args args;
-
- args.argc = argc;
- args.argv = argv;
-
- ctaocrypt_test(&args);
- return args.return_code;
- }
-
- #endif /* NO_MAIN_DRIVER */
-
-
- int md5_test()
- {
- Md5 md5;
- byte hash[MD5_DIGEST_SIZE];
-
- testVector a, b, c, d, e;
- testVector test_md5[5];
- int times = sizeof(test_md5) / sizeof(testVector), i;
-
- a.input = "abc";
- a.output = "\x90\x01\x50\x98\x3c\xd2\x4f\xb0\xd6\x96\x3f\x7d\x28\xe1\x7f"
- "\x72";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "message digest";
- b.output = "\xf9\x6b\x69\x7d\x7c\xb7\x93\x8d\x52\x5a\x2f\x31\xaa\xf1\x61"
- "\xd0";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "abcdefghijklmnopqrstuvwxyz";
- c.output = "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00\x7d\xfb\x49\x6c\xca\x67\xe1"
- "\x3b";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- d.input = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345"
- "6789";
- d.output = "\xd1\x74\xab\x98\xd2\x77\xd9\xf5\xa5\x61\x1c\x2c\x9f\x41\x9d"
- "\x9f";
- d.inLen = strlen(d.input);
- d.outLen = strlen(d.output);
-
- e.input = "1234567890123456789012345678901234567890123456789012345678"
- "9012345678901234567890";
- e.output = "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55\xac\x49\xda\x2e\x21\x07\xb6"
- "\x7a";
- e.inLen = strlen(e.input);
- e.outLen = strlen(e.output);
-
- test_md5[0] = a;
- test_md5[1] = b;
- test_md5[2] = c;
- test_md5[3] = d;
- test_md5[4] = e;
-
- InitMd5(&md5);
-
- for (i = 0; i < times; ++i) {
- Md5Update(&md5, (byte*)test_md5[i].input, (word32)test_md5[i].inLen);
- Md5Final(&md5, hash);
-
- if (memcmp(hash, test_md5[i].output, MD5_DIGEST_SIZE) != 0)
- return -5 - i;
- }
-
- return 0;
- }
-
-
- #ifndef NO_MD4
-
- int md4_test()
- {
- Md4 md4;
- byte hash[MD4_DIGEST_SIZE];
-
- testVector a, b, c, d, e, f, g;
- testVector test_md4[7];
- int times = sizeof(test_md4) / sizeof(testVector), i;
-
- a.input = "";
- a.output = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31\xb7\x3c\x59\xd7\xe0\xc0\x89"
- "\xc0";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "a";
- b.output = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46\x24\x5e\x05\xfb\xdb\xd6\xfb"
- "\x24";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "abc";
- c.output = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52\x5f\xc1\x0a\xe8\x7a\xa6\x72"
- "\x9d";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- d.input = "message digest";
- d.output = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8\x18\x87\x48\x06\xe1\xc7\x01"
- "\x4b";
- d.inLen = strlen(d.input);
- d.outLen = strlen(d.output);
-
- e.input = "abcdefghijklmnopqrstuvwxyz";
- e.output = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd\xee\xa8\xed\x63\xdf\x41\x2d"
- "\xa9";
- e.inLen = strlen(e.input);
- e.outLen = strlen(e.output);
-
- f.input = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345"
- "6789";
- f.output = "\x04\x3f\x85\x82\xf2\x41\xdb\x35\x1c\xe6\x27\xe1\x53\xe7\xf0"
- "\xe4";
- f.inLen = strlen(f.input);
- f.outLen = strlen(f.output);
-
- g.input = "1234567890123456789012345678901234567890123456789012345678"
- "9012345678901234567890";
- g.output = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19\x9c\x3e\x7b\x16\x4f\xcc\x05"
- "\x36";
- g.inLen = strlen(g.input);
- g.outLen = strlen(g.output);
-
- test_md4[0] = a;
- test_md4[1] = b;
- test_md4[2] = c;
- test_md4[3] = d;
- test_md4[4] = e;
- test_md4[5] = f;
- test_md4[6] = g;
-
- InitMd4(&md4);
-
- for (i = 0; i < times; ++i) {
- Md4Update(&md4, (byte*)test_md4[i].input, (word32)test_md4[i].inLen);
- Md4Final(&md4, hash);
-
- if (memcmp(hash, test_md4[i].output, MD4_DIGEST_SIZE) != 0)
- return -205 - i;
- }
-
- return 0;
- }
-
- #endif /* NO_MD4 */
-
- int sha_test()
- {
- Sha sha;
- byte hash[SHA_DIGEST_SIZE];
-
- testVector a, b, c, d;
- testVector test_sha[4];
- int times = sizeof(test_sha) / sizeof(struct testVector), i;
-
- a.input = "abc";
- a.output = "\xA9\x99\x3E\x36\x47\x06\x81\x6A\xBA\x3E\x25\x71\x78\x50\xC2"
- "\x6C\x9C\xD0\xD8\x9D";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
- b.output = "\x84\x98\x3E\x44\x1C\x3B\xD2\x6E\xBA\xAE\x4A\xA1\xF9\x51\x29"
- "\xE5\xE5\x46\x70\xF1";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaa";
- c.output = "\x00\x98\xBA\x82\x4B\x5C\x16\x42\x7B\xD7\xA1\x12\x2A\x5A\x44"
- "\x2A\x25\xEC\x64\x4D";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- d.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaa";
- d.output = "\xAD\x5B\x3F\xDB\xCB\x52\x67\x78\xC2\x83\x9D\x2F\x15\x1E\xA7"
- "\x53\x99\x5E\x26\xA0";
- d.inLen = strlen(d.input);
- d.outLen = strlen(d.output);
-
- test_sha[0] = a;
- test_sha[1] = b;
- test_sha[2] = c;
- test_sha[3] = d;
-
- InitSha(&sha);
-
- for (i = 0; i < times; ++i) {
- ShaUpdate(&sha, (byte*)test_sha[i].input, (word32)test_sha[i].inLen);
- ShaFinal(&sha, hash);
-
- if (memcmp(hash, test_sha[i].output, SHA_DIGEST_SIZE) != 0)
- return -10 - i;
- }
-
- return 0;
- }
-
-
- #ifndef NO_SHA256
- int sha256_test()
- {
- Sha256 sha;
- byte hash[SHA256_DIGEST_SIZE];
-
- testVector a, b;
- testVector test_sha[2];
- int times = sizeof(test_sha) / sizeof(struct testVector), i;
-
- a.input = "abc";
- a.output = "\xBA\x78\x16\xBF\x8F\x01\xCF\xEA\x41\x41\x40\xDE\x5D\xAE\x22"
- "\x23\xB0\x03\x61\xA3\x96\x17\x7A\x9C\xB4\x10\xFF\x61\xF2\x00"
- "\x15\xAD";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
- b.output = "\x24\x8D\x6A\x61\xD2\x06\x38\xB8\xE5\xC0\x26\x93\x0C\x3E\x60"
- "\x39\xA3\x3C\xE4\x59\x64\xFF\x21\x67\xF6\xEC\xED\xD4\x19\xDB"
- "\x06\xC1";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- test_sha[0] = a;
- test_sha[1] = b;
-
- InitSha256(&sha);
-
- for (i = 0; i < times; ++i) {
- Sha256Update(&sha, (byte*)test_sha[i].input,(word32)test_sha[i].inLen);
- Sha256Final(&sha, hash);
-
- if (memcmp(hash, test_sha[i].output, SHA256_DIGEST_SIZE) != 0)
- return -10 - i;
- }
-
- return 0;
- }
- #endif
-
-
- #ifndef NO_HMAC
- int hmac_test()
- {
- Hmac hmac;
- byte hash[MD5_DIGEST_SIZE];
-
- const char* keys[]=
- {
- "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b",
- "Jefe",
- "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
- };
-
- testVector a, b, c;
- testVector test_hmac[3];
-
- int times = sizeof(test_hmac) / sizeof(testVector), i;
-
- a.input = "Hi There";
- a.output = "\x92\x94\x72\x7a\x36\x38\xbb\x1c\x13\xf4\x8e\xf8\x15\x8b\xfc"
- "\x9d";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "what do ya want for nothing?";
- b.output = "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7"
- "\x38";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
- "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
- "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
- "\xDD\xDD\xDD\xDD\xDD\xDD";
- c.output = "\x56\xbe\x34\x52\x1d\x14\x4c\x88\xdb\xb8\xc7\x33\xf0\xe8\xb3"
- "\xf6";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- test_hmac[0] = a;
- test_hmac[1] = b;
- test_hmac[2] = c;
-
- for (i = 0; i < times; ++i) {
- HmacSetKey(&hmac, MD5, (byte*)keys[i], (word32)strlen(keys[i]));
- HmacUpdate(&hmac, (byte*)test_hmac[i].input,
- (word32)test_hmac[i].inLen);
- HmacFinal(&hmac, hash);
-
- if (memcmp(hash, test_hmac[i].output, MD5_DIGEST_SIZE) != 0)
- return -20 - i;
- }
-
- return 0;
- }
- #endif
-
-
- int arc4_test()
- {
- byte cipher[16];
- byte plain[16];
-
- const char* keys[] =
- {
- "\x01\x23\x45\x67\x89\xab\xcd\xef",
- "\x01\x23\x45\x67\x89\xab\xcd\xef",
- "\x00\x00\x00\x00\x00\x00\x00\x00",
- "\xef\x01\x23\x45"
- };
-
- testVector a, b, c, d;
- testVector test_arc4[4];
-
- int times = sizeof(test_arc4) / sizeof(testVector), i;
-
- a.input = "\x01\x23\x45\x67\x89\xab\xcd\xef";
- a.output = "\x75\xb7\x87\x80\x99\xe0\xc5\x96";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- b.output = "\x74\x94\xc2\xe7\x10\x4b\x08\x79";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- c.output = "\xde\x18\x89\x41\xa3\x37\x5d\x3a";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- d.input = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
- d.output = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf\xbd\x61";
- d.inLen = strlen(d.input);
- d.outLen = strlen(d.output);
-
- test_arc4[0] = a;
- test_arc4[1] = b;
- test_arc4[2] = c;
- test_arc4[3] = d;
-
- for (i = 0; i < times; ++i) {
- Arc4 enc;
- Arc4 dec;
-
- Arc4SetKey(&enc, (byte*)keys[i], (word32)strlen(keys[i]));
- Arc4SetKey(&dec, (byte*)keys[i], (word32)strlen(keys[i]));
-
- Arc4Process(&enc, cipher, (byte*)test_arc4[i].input,
- (word32)test_arc4[i].outLen);
- Arc4Process(&dec, plain, cipher, (word32)test_arc4[i].outLen);
-
- if (memcmp(plain, test_arc4[i].input, test_arc4[i].outLen))
- return -20 - i;
-
- if (memcmp(cipher, test_arc4[i].output, test_arc4[i].outLen))
- return -20 - 5 - i;
- }
-
- return 0;
- }
-
-
- #ifndef NO_HC128
- int hc128_test()
- {
- byte cipher[16];
- byte plain[16];
-
- const char* keys[] =
- {
- "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x00\x53\xA6\xF9\x4C\x9F\xF2\x45\x98\xEB\x3E\x91\xE4\x37\x8A\xDD",
- "\x0F\x62\xB5\x08\x5B\xAE\x01\x54\xA7\xFA\x4D\xA0\xF3\x46\x99\xEC"
- };
-
- const char* ivs[] =
- {
- "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x0D\x74\xDB\x42\xA9\x10\x77\xDE\x45\xAC\x13\x7A\xE1\x48\xAF\x16",
- "\x28\x8F\xF6\x5D\xC4\x2B\x92\xF9\x60\xC7\x2E\x95\xFC\x63\xCA\x31"
- };
-
-
- testVector a, b, c, d;
- testVector test_hc128[4];
-
- int times = sizeof(test_hc128) / sizeof(testVector), i;
-
- a.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- a.output = "\x37\x86\x02\xB9\x8F\x32\xA7\x48";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- b.output = "\x33\x7F\x86\x11\xC6\xED\x61\x5F";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- c.output = "\x2E\x1E\xD1\x2A\x85\x51\xC0\x5A";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- d.input = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
- d.output = "\x1C\xD8\xAE\xDD\xFE\x52\xE2\x17\xE8\x35\xD0\xB7\xE8\x4E\x29";
- d.inLen = strlen(d.input);
- d.outLen = strlen(d.output);
-
- test_hc128[0] = a;
- test_hc128[1] = b;
- test_hc128[2] = c;
- test_hc128[3] = d;
-
- for (i = 0; i < times; ++i) {
- HC128 enc;
- HC128 dec;
-
- Hc128_SetKey(&enc, (byte*)keys[i], (byte*)ivs[i]);
- Hc128_SetKey(&dec, (byte*)keys[i], (byte*)ivs[i]);
-
- Hc128_Process(&enc, cipher, (byte*)test_hc128[i].input,
- (word32)test_hc128[i].outLen);
- Hc128_Process(&dec, plain, cipher, (word32)test_hc128[i].outLen);
-
- if (memcmp(plain, test_hc128[i].input, test_hc128[i].outLen))
- return -120 - i;
-
- if (memcmp(cipher, test_hc128[i].output, test_hc128[i].outLen))
- return -120 - 5 - i;
- }
-
- return 0;
- }
- #endif /* NO_HC128 */
-
-
- #ifndef NO_RABBIT
- int rabbit_test()
- {
- byte cipher[16];
- byte plain[16];
-
- const char* keys[] =
- {
- "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
- "\xAC\xC3\x51\xDC\xF1\x62\xFC\x3B\xFE\x36\x3D\x2E\x29\x13\x28\x91"
- };
-
- const char* ivs[] =
- {
- "\x00\x00\x00\x00\x00\x00\x00\x00",
- "\x59\x7E\x26\xC1\x75\xF5\x73\xC3",
- 0
- };
-
-
- testVector a, b, c;
- testVector test_rabbit[3];
-
- int times = sizeof(test_rabbit) / sizeof(testVector), i;
-
- a.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- a.output = "\xED\xB7\x05\x67\x37\x5D\xCD\x7C";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- b.output = "\x6D\x7D\x01\x22\x92\xCC\xDC\xE0";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
- c.output = "\x9C\x51\xE2\x87\x84\xC3\x7F\xE9";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- test_rabbit[0] = a;
- test_rabbit[1] = b;
- test_rabbit[2] = c;
-
- for (i = 0; i < times; ++i) {
- Rabbit enc;
- Rabbit dec;
-
- RabbitSetKey(&enc, (byte*)keys[i], (byte*)ivs[i]);
- RabbitSetKey(&dec, (byte*)keys[i], (byte*)ivs[i]);
-
- RabbitProcess(&enc, cipher, (byte*)test_rabbit[i].input,
- (word32)test_rabbit[i].outLen);
- RabbitProcess(&dec, plain, cipher, (word32)test_rabbit[i].outLen);
-
- if (memcmp(plain, test_rabbit[i].input, test_rabbit[i].outLen))
- return -130 - i;
-
- if (memcmp(cipher, test_rabbit[i].output, test_rabbit[i].outLen))
- return -130 - 5 - i;
- }
-
- return 0;
- }
- #endif /* NO_RABBIT */
-
-
- #ifndef NO_DES3
- int des_test()
- {
- const byte vector[] = { /* "now is the time for all " w/o trailing 0 */
- 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
- };
-
- byte plain[24];
- byte cipher[24];
-
- Des enc;
- Des dec;
-
- const byte key[] =
- {
- 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef
- };
-
- const byte iv[] =
- {
- 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef
- };
-
- const byte verify[] =
- {
- 0x8b,0x7c,0x52,0xb0,0x01,0x2b,0x6c,0xb8,
- 0x4f,0x0f,0xeb,0xf3,0xfb,0x5f,0x86,0x73,
- 0x15,0x85,0xb3,0x22,0x4b,0x86,0x2b,0x4b
- };
-
-
- Des_SetKey(&enc, key, iv, DES_ENCRYPTION);
- Des_CbcEncrypt(&enc, cipher, vector, sizeof(vector));
- Des_SetKey(&dec, key, iv, DES_DECRYPTION);
- Des_CbcDecrypt(&dec, plain, cipher, sizeof(cipher));
-
- if (memcmp(plain, vector, sizeof(plain)))
- return -31;
-
- if (memcmp(cipher, verify, sizeof(cipher)))
- return -32;
-
- return 0;
- }
- #endif /* NO_DES3 */
-
-
- #ifndef NO_DES3
- int des3_test()
- {
- const byte vector[] = { /* "Now is the time for all " w/o trailing 0 */
- 0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
- };
-
- byte plain[24];
- byte cipher[24];
-
- Des3 enc;
- Des3 dec;
-
- const byte key3[] =
- {
- 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,
- 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10,
- 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67
- };
- const byte iv3[] =
- {
- 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef,
- 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,
- 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81
-
- };
-
- const byte verify3[] =
- {
- 0x43,0xa0,0x29,0x7e,0xd1,0x84,0xf8,0x0e,
- 0x89,0x64,0x84,0x32,0x12,0xd5,0x08,0x98,
- 0x18,0x94,0x15,0x74,0x87,0x12,0x7d,0xb0
- };
-
-
- Des3_SetKey(&enc, key3, iv3, DES_ENCRYPTION);
- Des3_CbcEncrypt(&enc, cipher, vector, sizeof(vector));
- Des3_SetKey(&dec, key3, iv3, DES_DECRYPTION);
- Des3_CbcDecrypt(&dec, plain, cipher, sizeof(cipher));
-
- if (memcmp(plain, vector, sizeof(plain)))
- return -33;
-
- if (memcmp(cipher, verify3, sizeof(cipher)))
- return -34;
-
- return 0;
- }
- #endif /* NO_DES */
-
-
- #ifndef NO_AES
- int aes_test()
- {
- Aes enc;
- Aes dec;
-
- const byte msg[] = { /* "Now is the time for all " w/o trailing 0 */
- 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
- };
-
- const byte verify[] =
- {
- 0x95,0x94,0x92,0x57,0x5f,0x42,0x81,0x53,
- 0x2c,0xcc,0x9d,0x46,0x77,0xa2,0x33,0xcb
- };
-
- byte key[] = "0123456789abcdef "; /* align */
- byte iv[] = "1234567890abcdef "; /* align */
-
- byte cipher[AES_BLOCK_SIZE];
- byte plain [AES_BLOCK_SIZE];
-
- AesSetKey(&enc, key, AES_BLOCK_SIZE, iv, AES_ENCRYPTION);
- AesSetKey(&dec, key, AES_BLOCK_SIZE, iv, AES_DECRYPTION);
-
- AesCbcEncrypt(&enc, cipher, msg, AES_BLOCK_SIZE);
- AesCbcDecrypt(&dec, plain, cipher, AES_BLOCK_SIZE);
-
- if (memcmp(plain, msg, AES_BLOCK_SIZE))
- return -60;
-
- if (memcmp(cipher, verify, AES_BLOCK_SIZE))
- return -61;
-
- return 0;
- }
- #endif /* NO_AES */
-
-
- int random_test()
- {
- RNG rng;
- byte block[32];
- int ret = InitRng(&rng);
- if (ret != 0) return -39;
-
- RNG_GenerateBlock(&rng, block, sizeof(block));
-
- return 0;
- }
-
-
- #ifndef NO_MAIN_DRIVER
- static const char* clientKey = "../../certs/client-key.der";
- static const char* clientCert = "../../certs/client-cert.der";
- #else
- static const char* clientKey = "../certs/client-key.der";
- static const char* clientCert = "../certs/client-cert.der";
- #endif
-
-
- int rsa_test()
- {
- byte tmp[1024], tmp2[2048];
- size_t bytes, bytes2;
- RsaKey key;
- RNG rng;
- word32 idx = 0;
- int ret;
- byte in[] = "Everyone gets Friday off.";
- word32 inLen = (word32)strlen((char*)in);
- byte out[64];
- byte plain[64];
- DecodedCert cert;
-
- FILE* file = fopen(clientKey, "rb"), * file2;
-
- if (!file)
- return -40;
-
- bytes = fread(tmp, 1, 1024, file);
-
- InitRsaKey(&key, 0);
- ret = RsaPrivateKeyDecode(tmp, &idx, &key, (word32)bytes);
- if (ret != 0) return -41;
-
- ret = InitRng(&rng);
- if (ret != 0) return -42;
-
- ret = RsaPublicEncrypt(in, inLen, out, sizeof(out), &key, &rng);
-
- ret = RsaPrivateDecrypt(out, 64, plain, sizeof(plain), &key);
-
- if (memcmp(plain, in, inLen)) return -45;
-
- ret = RsaSSL_Sign(in, inLen, out, sizeof(out), &key, &rng);
- memset(plain, 0, sizeof(plain));
- ret = RsaSSL_Verify(out, 64, plain, sizeof(plain), &key);
-
- if (memcmp(plain, in, ret)) return -46;
-
- file2 = fopen(clientCert, "rb");
- if (!file2)
- return -47;
-
- bytes2 = fread(tmp2, 1, 2048, file2);
-
- InitDecodedCert(&cert, (byte*)&tmp2, 0);
-
- ret = ParseCert(&cert, (word32)bytes2, CERT_TYPE, NO_VERIFY, 0);
- if (ret != 0) return -48;
-
- FreeDecodedCert(&cert);
- FreeRsaKey(&key);
-
- fclose(file2);
- fclose(file);
-
- return 0;
- }
-
-
- #ifndef NO_MAIN_DRIVER
- static const char* dhKey = "../../certs/dh1024.der";
- #else
- static const char* dhKey = "../certs/dh1024.der";
- #endif
-
- #ifndef NO_DH
-
- int dh_test()
- {
- int ret;
- word32 bytes;
- word32 idx = 0, privSz, pubSz, privSz2, pubSz2, agreeSz, agreeSz2;
- byte tmp[1024];
- byte priv[128];
- byte pub[128];
- byte priv2[128];
- byte pub2[128];
- byte agree[128];
- byte agree2[128];
- DhKey key;
- DhKey key2;
- RNG rng;
- FILE* file = fopen(dhKey, "rb");
-
- if (!file)
- return -50;
-
- bytes = (word32) fread(tmp, 1, 1024, file);
-
- InitDhKey(&key);
- InitDhKey(&key2);
- ret = DhKeyDecode(tmp, &idx, &key, bytes);
- if (ret != 0)
- return -51;
-
- idx = 0;
- ret = DhKeyDecode(tmp, &idx, &key2, bytes);
- if (ret != 0)
- return -52;
-
- ret = InitRng(&rng);
- if (ret != 0)
- return -53;
-
- ret = DhGenerateKeyPair(&key, &rng, priv, &privSz, pub, &pubSz);
- ret = DhGenerateKeyPair(&key2, &rng, priv2, &privSz2, pub2, &pubSz2);
- if (ret != 0)
- return -54;
-
- ret = DhAgree(&key, agree, &agreeSz, priv, privSz, pub2, pubSz2);
- ret = DhAgree(&key2, agree2, &agreeSz2, priv2, privSz2, pub, pubSz);
- if (ret != 0)
- return -55;
-
- if (memcmp(agree, agree2, agreeSz))
- return -56;
-
- FreeDhKey(&key);
- FreeDhKey(&key2);
- fclose(file);
-
- return 0;
- }
-
- #endif /* NO_DH */
-
-
- #ifndef NO_MAIN_DRIVER
- static const char* dsaKey = "../../certs/dsa512.der";
- #else
- static const char* dsaKey = "../certs/dsa512.der";
- #endif
-
- #ifndef NO_DSA
-
- int dsa_test()
- {
- int ret, answer;
- word32 bytes;
- word32 idx = 0;
- byte tmp[1024];
- DsaKey key;
- RNG rng;
- FILE* file = fopen(dsaKey, "rb");
- Sha sha;
- byte hash[SHA_DIGEST_SIZE];
- byte signature[40];
-
- if (!file)
- return -60;
-
- bytes = (word32) fread(tmp, 1, sizeof(tmp), file);
-
- InitSha(&sha);
- ShaUpdate(&sha, tmp, bytes);
- ShaFinal(&sha, hash);
-
- InitDsaKey(&key);
- ret = DsaPrivateKeyDecode(tmp, &idx, &key, bytes);
- if (ret != 0) return -61;
-
- ret = InitRng(&rng);
- if (ret != 0) return -62;
-
- ret = DsaSign(hash, signature, &key, &rng);
- if (ret != 0) return -63;
-
- ret = DsaVerify(hash, signature, &key, &answer);
- if (ret != 0) return -64;
- if (answer != 1) return -65;
-
- FreeDsaKey(&key);
- fclose(file);
-
- return 0;
- }
-
- #endif /* NO_DSA */
-
-
- #ifdef OPENSSL_EXTRA
-
- int openssl_test()
- {
- EVP_MD_CTX md_ctx;
- testVector a, b, c;
- byte hash[SHA_DIGEST_SIZE];
-
- a.input = "1234567890123456789012345678901234567890123456789012345678"
- "9012345678901234567890";
- a.output = "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55\xac\x49\xda\x2e\x21\x07\xb6"
- "\x7a";
- a.inLen = strlen(a.input);
- a.outLen = strlen(a.output);
-
- EVP_MD_CTX_init(&md_ctx);
- EVP_DigestInit(&md_ctx, EVP_md5());
-
- EVP_DigestUpdate(&md_ctx, a.input, a.inLen);
- EVP_DigestFinal(&md_ctx, hash, 0);
-
- if (memcmp(hash, a.output, MD5_DIGEST_SIZE) != 0)
- return -71;
-
- b.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
- "aaaaaaaaaa";
- b.output = "\xAD\x5B\x3F\xDB\xCB\x52\x67\x78\xC2\x83\x9D\x2F\x15\x1E\xA7"
- "\x53\x99\x5E\x26\xA0";
- b.inLen = strlen(b.input);
- b.outLen = strlen(b.output);
-
- EVP_MD_CTX_init(&md_ctx);
- EVP_DigestInit(&md_ctx, EVP_sha1());
-
- EVP_DigestUpdate(&md_ctx, b.input, b.inLen);
- EVP_DigestFinal(&md_ctx, hash, 0);
-
- if (memcmp(hash, b.output, SHA_DIGEST_SIZE) != 0)
- return -72;
-
- if (RAND_bytes(hash, sizeof(hash)) != 1)
- return -73;
-
- c.input = "what do ya want for nothing?";
- c.output = "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7"
- "\x38";
- c.inLen = strlen(c.input);
- c.outLen = strlen(c.output);
-
- HMAC(EVP_md5(), "Jefe", 4, (byte*)c.input, (int)c.inLen, hash, 0);
-
- if (memcmp(hash, c.output, MD5_DIGEST_SIZE) != 0)
- return -74;
-
- { /* des test */
- const byte vector[] = { /* "now is the time for all " w/o trailing 0 */
- 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
- 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
- 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
- };
-
- byte plain[24];
- byte cipher[24];
-
- const_DES_cblock key =
- {
- 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef
- };
-
- DES_cblock iv =
- {
- 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef
- };
-
- DES_key_schedule sched;
-
- const byte verify[] =
- {
- 0x8b,0x7c,0x52,0xb0,0x01,0x2b,0x6c,0xb8,
- 0x4f,0x0f,0xeb,0xf3,0xfb,0x5f,0x86,0x73,
- 0x15,0x85,0xb3,0x22,0x4b,0x86,0x2b,0x4b
- };
-
- DES_key_sched(&key, &sched);
-
- DES_cbc_encrypt(vector, cipher, sizeof(vector), &sched, &iv, DES_ENCRYPT);
- DES_cbc_encrypt(cipher, plain, sizeof(vector), &sched, &iv, DES_DECRYPT);
-
- if (memcmp(plain, vector, sizeof(vector)) != 0)
- return -75;
-
- if (memcmp(cipher, verify, sizeof(verify)) != 0)
- return -76;
-
- /* test changing iv */
- DES_ncbc_encrypt(vector, cipher, 8, &sched, &iv, DES_ENCRYPT);
- DES_ncbc_encrypt(vector + 8, cipher + 8, 16, &sched, &iv, DES_ENCRYPT);
-
- if (memcmp(cipher, verify, sizeof(verify)) != 0)
- return -77;
-
- } /* end des test */
-
- return 0;
- }
-
- #endif /* OPENSSL_EXTRA */