summaryrefslogtreecommitdiff
path: root/release/src/router/cyassl/ctaocrypt/test/test.c
diff options
context:
space:
mode:
Diffstat (limited to 'release/src/router/cyassl/ctaocrypt/test/test.c')
-rw-r--r--release/src/router/cyassl/ctaocrypt/test/test.c1783
1 files changed, 1783 insertions, 0 deletions
diff --git a/release/src/router/cyassl/ctaocrypt/test/test.c b/release/src/router/cyassl/ctaocrypt/test/test.c
new file mode 100644
index 00000000..50fecd38
--- /dev/null
+++ b/release/src/router/cyassl/ctaocrypt/test/test.c
@@ -0,0 +1,1783 @@
+/* test.c */
+
+
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+
+#include "ctc_md5.h"
+#include "ctc_md4.h"
+#include "ctc_sha.h"
+#include "sha256.h"
+#include "sha512.h"
+#include "arc4.h"
+#include "random.h"
+#include "coding.h"
+#include "asn.h"
+#include "des3.h"
+#include "ctc_aes.h"
+#include "ctc_hmac.h"
+#include "ctc_dh.h"
+#include "ctc_dsa.h"
+#include "hc128.h"
+#include "rabbit.h"
+#include "pwdbased.h"
+#include "ctc_ripemd.h"
+#ifdef HAVE_ECC
+ #include "ctc_ecc.h"
+#endif
+
+#ifdef _MSC_VER
+ /* 4996 warning to use MS extensions e.g., strcpy_s instead of strncpy */
+ #pragma warning(disable: 4996)
+#endif
+
+#ifdef OPENSSL_EXTRA
+ #include "evp.h"
+ #include "rand.h"
+ #include "hmac.h"
+ #include "des.h"
+#endif
+
+#ifdef HAVE_NTRU
+ #include "crypto_ntru.h"
+#endif
+
+
+#ifdef THREADX
+ /* since just testing, use THREADX log printf instead */
+ int dc_log_printf(char*, ...);
+ #undef printf
+ #define printf dc_log_printf
+#endif
+
+
+typedef struct testVector {
+ char* input;
+ char* output;
+ size_t inLen;
+ size_t outLen;
+} testVector;
+
+int md5_test();
+int md4_test();
+int sha_test();
+int sha256_test();
+int sha512_test();
+int hmac_test();
+int arc4_test();
+int hc128_test();
+int rabbit_test();
+int des_test();
+int des3_test();
+int aes_test();
+int rsa_test();
+int dh_test();
+int dsa_test();
+int random_test();
+int pwdbased_test();
+int ripemd_test();
+int openssl_test(); /* test mini api */
+#ifdef HAVE_ECC
+ int ecc_test();
+#endif
+
+int PemToDer(const char* inName, const char* outName);
+
+
+void err_sys(const char* msg, int es)
+{
+ printf("%s error = %d\n", msg, es);
+#ifndef THREADX
+ exit(es);
+#endif
+}
+
+/* func_args from cyassl_test.h, so don't have to pull in other junk */
+typedef struct func_args {
+ int argc;
+ char** argv;
+ int return_code;
+} func_args;
+
+
+void ctaocrypt_test(void* args)
+{
+ int ret = 0;
+
+ ((func_args*)args)->return_code = -1; /* error state */
+
+ if ( (ret = md5_test()) )
+ err_sys("MD5 test failed!\n", ret);
+ else
+ printf( "MD5 test passed!\n");
+
+#ifndef NO_MD4
+ if ( (ret = md4_test()) )
+ err_sys("MD4 test failed!\n", ret);
+ else
+ printf( "MD4 test passed!\n");
+#endif
+
+ if ( (ret = sha_test()) )
+ err_sys("SHA test failed!\n", ret);
+ else
+ printf( "SHA test passed!\n");
+
+#ifndef NO_SHA256
+ if ( (ret = sha256_test()) )
+ err_sys("SHA-256 test failed!\n", ret);
+ else
+ printf( "SHA-256 test passed!\n");
+#endif
+
+#ifdef CYASSL_SHA512
+ if ( (ret = sha512_test()) )
+ err_sys("SHA-512 test failed!\n", ret);
+ else
+ printf( "SHA-512 test passed!\n");
+#endif
+
+#ifdef CYASSL_RIPEMD
+ if ( (ret = ripemd_test()) )
+ err_sys("RIPEMD test failed!\n", ret);
+ else
+ printf( "RIPEMD test passed!\n");
+#endif
+
+#ifndef NO_HMAC
+ if ( (ret = hmac_test()) )
+ err_sys("HMAC test failed!\n", ret);
+ else
+ printf( "HMAC test passed!\n");
+#endif
+
+ if ( (ret = arc4_test()) )
+ err_sys("ARC4 test failed!\n", ret);
+ else
+ printf( "ARC4 test passed!\n");
+
+#ifndef NO_HC128
+ if ( (ret = hc128_test()) )
+ err_sys("HC-128 test failed!\n", ret);
+ else
+ printf( "HC-128 test passed!\n");
+#endif
+
+#ifndef NO_RABBIT
+ if ( (ret = rabbit_test()) )
+ err_sys("Rabbit test failed!\n", ret);
+ else
+ printf( "Rabbit test passed!\n");
+#endif
+
+#ifndef NO_DES3
+ if ( (ret = des_test()) )
+ err_sys("DES test failed!\n", ret);
+ else
+ printf( "DES test passed!\n");
+#endif
+
+#ifndef NO_DES3
+ if ( (ret = des3_test()) )
+ err_sys("DES3 test failed!\n", ret);
+ else
+ printf( "DES3 test passed!\n");
+#endif
+
+#ifndef NO_AES
+ if ( (ret = aes_test()) )
+ err_sys("AES test failed!\n", ret);
+ else
+ printf( "AES test passed!\n");
+#endif
+
+ if ( (ret = random_test()) )
+ err_sys("RANDOM test failed!\n", ret);
+ else
+ printf( "RANDOM test passed!\n");
+
+ if ( (ret = rsa_test()) )
+ err_sys("RSA test failed!\n", ret);
+ else
+ printf( "RSA test passed!\n");
+
+#ifndef NO_DH
+ if ( (ret = dh_test()) )
+ err_sys("DH test failed!\n", ret);
+ else
+ printf( "DH test passed!\n");
+#endif
+
+#ifndef NO_DSA
+ if ( (ret = dsa_test()) )
+ err_sys("DSA test failed!\n", ret);
+ else
+ printf( "DSA test passed!\n");
+#endif
+
+#ifndef NO_PWDBASED
+ if ( (ret = pwdbased_test()) )
+ err_sys("PWDBASED test failed!\n", ret);
+ else
+ printf( "PWDBASED test passed!\n");
+#endif
+
+#ifdef OPENSSL_EXTRA
+ if ( (ret = openssl_test()) )
+ err_sys("OPENSSL test failed!\n", ret);
+ else
+ printf( "OPENSSL test passed!\n");
+#endif
+
+#ifdef HAVE_ECC
+ if ( (ret = ecc_test()) )
+ err_sys("ECC test failed!\n", ret);
+ else
+ printf( "ECC test passed!\n");
+#endif
+
+ ((func_args*)args)->return_code = ret;
+}
+
+
+/* so overall tests can pull in test function */
+#ifndef NO_MAIN_DRIVER
+
+ int main(int argc, char** argv)
+ {
+ func_args args;
+
+ args.argc = argc;
+ args.argv = argv;
+
+ ctaocrypt_test(&args);
+ return args.return_code;
+ }
+
+#endif /* NO_MAIN_DRIVER */
+
+
+int md5_test()
+{
+ Md5 md5;
+ byte hash[MD5_DIGEST_SIZE];
+
+ testVector a, b, c, d, e;
+ testVector test_md5[5];
+ int times = sizeof(test_md5) / sizeof(testVector), i;
+
+ a.input = "abc";
+ a.output = "\x90\x01\x50\x98\x3c\xd2\x4f\xb0\xd6\x96\x3f\x7d\x28\xe1\x7f"
+ "\x72";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "message digest";
+ b.output = "\xf9\x6b\x69\x7d\x7c\xb7\x93\x8d\x52\x5a\x2f\x31\xaa\xf1\x61"
+ "\xd0";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "abcdefghijklmnopqrstuvwxyz";
+ c.output = "\xc3\xfc\xd3\xd7\x61\x92\xe4\x00\x7d\xfb\x49\x6c\xca\x67\xe1"
+ "\x3b";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345"
+ "6789";
+ d.output = "\xd1\x74\xab\x98\xd2\x77\xd9\xf5\xa5\x61\x1c\x2c\x9f\x41\x9d"
+ "\x9f";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ e.input = "1234567890123456789012345678901234567890123456789012345678"
+ "9012345678901234567890";
+ e.output = "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55\xac\x49\xda\x2e\x21\x07\xb6"
+ "\x7a";
+ e.inLen = strlen(e.input);
+ e.outLen = strlen(e.output);
+
+ test_md5[0] = a;
+ test_md5[1] = b;
+ test_md5[2] = c;
+ test_md5[3] = d;
+ test_md5[4] = e;
+
+ InitMd5(&md5);
+
+ for (i = 0; i < times; ++i) {
+ Md5Update(&md5, (byte*)test_md5[i].input, (word32)test_md5[i].inLen);
+ Md5Final(&md5, hash);
+
+ if (memcmp(hash, test_md5[i].output, MD5_DIGEST_SIZE) != 0)
+ return -5 - i;
+ }
+
+ return 0;
+}
+
+
+#ifndef NO_MD4
+
+int md4_test()
+{
+ Md4 md4;
+ byte hash[MD4_DIGEST_SIZE];
+
+ testVector a, b, c, d, e, f, g;
+ testVector test_md4[7];
+ int times = sizeof(test_md4) / sizeof(testVector), i;
+
+ a.input = "";
+ a.output = "\x31\xd6\xcf\xe0\xd1\x6a\xe9\x31\xb7\x3c\x59\xd7\xe0\xc0\x89"
+ "\xc0";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "a";
+ b.output = "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46\x24\x5e\x05\xfb\xdb\xd6\xfb"
+ "\x24";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "abc";
+ c.output = "\xa4\x48\x01\x7a\xaf\x21\xd8\x52\x5f\xc1\x0a\xe8\x7a\xa6\x72"
+ "\x9d";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "message digest";
+ d.output = "\xd9\x13\x0a\x81\x64\x54\x9f\xe8\x18\x87\x48\x06\xe1\xc7\x01"
+ "\x4b";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ e.input = "abcdefghijklmnopqrstuvwxyz";
+ e.output = "\xd7\x9e\x1c\x30\x8a\xa5\xbb\xcd\xee\xa8\xed\x63\xdf\x41\x2d"
+ "\xa9";
+ e.inLen = strlen(e.input);
+ e.outLen = strlen(e.output);
+
+ f.input = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345"
+ "6789";
+ f.output = "\x04\x3f\x85\x82\xf2\x41\xdb\x35\x1c\xe6\x27\xe1\x53\xe7\xf0"
+ "\xe4";
+ f.inLen = strlen(f.input);
+ f.outLen = strlen(f.output);
+
+ g.input = "1234567890123456789012345678901234567890123456789012345678"
+ "9012345678901234567890";
+ g.output = "\xe3\x3b\x4d\xdc\x9c\x38\xf2\x19\x9c\x3e\x7b\x16\x4f\xcc\x05"
+ "\x36";
+ g.inLen = strlen(g.input);
+ g.outLen = strlen(g.output);
+
+ test_md4[0] = a;
+ test_md4[1] = b;
+ test_md4[2] = c;
+ test_md4[3] = d;
+ test_md4[4] = e;
+ test_md4[5] = f;
+ test_md4[6] = g;
+
+ InitMd4(&md4);
+
+ for (i = 0; i < times; ++i) {
+ Md4Update(&md4, (byte*)test_md4[i].input, (word32)test_md4[i].inLen);
+ Md4Final(&md4, hash);
+
+ if (memcmp(hash, test_md4[i].output, MD4_DIGEST_SIZE) != 0)
+ return -205 - i;
+ }
+
+ return 0;
+}
+
+#endif /* NO_MD4 */
+
+int sha_test()
+{
+ Sha sha;
+ byte hash[SHA_DIGEST_SIZE];
+
+ testVector a, b, c, d;
+ testVector test_sha[4];
+ int times = sizeof(test_sha) / sizeof(struct testVector), i;
+
+ a.input = "abc";
+ a.output = "\xA9\x99\x3E\x36\x47\x06\x81\x6A\xBA\x3E\x25\x71\x78\x50\xC2"
+ "\x6C\x9C\xD0\xD8\x9D";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ b.output = "\x84\x98\x3E\x44\x1C\x3B\xD2\x6E\xBA\xAE\x4A\xA1\xF9\x51\x29"
+ "\xE5\xE5\x46\x70\xF1";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaa";
+ c.output = "\x00\x98\xBA\x82\x4B\x5C\x16\x42\x7B\xD7\xA1\x12\x2A\x5A\x44"
+ "\x2A\x25\xEC\x64\x4D";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaa";
+ d.output = "\xAD\x5B\x3F\xDB\xCB\x52\x67\x78\xC2\x83\x9D\x2F\x15\x1E\xA7"
+ "\x53\x99\x5E\x26\xA0";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ test_sha[0] = a;
+ test_sha[1] = b;
+ test_sha[2] = c;
+ test_sha[3] = d;
+
+ InitSha(&sha);
+
+ for (i = 0; i < times; ++i) {
+ ShaUpdate(&sha, (byte*)test_sha[i].input, (word32)test_sha[i].inLen);
+ ShaFinal(&sha, hash);
+
+ if (memcmp(hash, test_sha[i].output, SHA_DIGEST_SIZE) != 0)
+ return -10 - i;
+ }
+
+ return 0;
+}
+
+
+#ifdef CYASSL_RIPEMD
+int ripemd_test()
+{
+ RipeMd ripemd;
+ byte hash[RIPEMD_DIGEST_SIZE];
+
+ testVector a, b, c, d;
+ testVector test_ripemd[4];
+ int times = sizeof(test_ripemd) / sizeof(struct testVector), i;
+
+ a.input = "abc";
+ a.output = "\x8e\xb2\x08\xf7\xe0\x5d\x98\x7a\x9b\x04\x4a\x8e\x98\xc6"
+ "\xb0\x87\xf1\x5a\x0b\xfc";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "message digest";
+ b.output = "\x5d\x06\x89\xef\x49\xd2\xfa\xe5\x72\xb8\x81\xb1\x23\xa8"
+ "\x5f\xfa\x21\x59\x5f\x36";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ c.output = "\x12\xa0\x53\x38\x4a\x9c\x0c\x88\xe4\x05\xa0\x6c\x27\xdc"
+ "\xf4\x9a\xda\x62\xeb\x2b";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "12345678901234567890123456789012345678901234567890123456"
+ "789012345678901234567890";
+ d.output = "\x9b\x75\x2e\x45\x57\x3d\x4b\x39\xf4\xdb\xd3\x32\x3c\xab"
+ "\x82\xbf\x63\x32\x6b\xfb";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ test_ripemd[0] = a;
+ test_ripemd[1] = b;
+ test_ripemd[2] = c;
+ test_ripemd[3] = d;
+
+ InitRipeMd(&ripemd);
+
+ for (i = 0; i < times; ++i) {
+ RipeMdUpdate(&ripemd, (byte*)test_ripemd[i].input,
+ (word32)test_ripemd[i].inLen);
+ RipeMdFinal(&ripemd, hash);
+
+ if (memcmp(hash, test_ripemd[i].output, RIPEMD_DIGEST_SIZE) != 0)
+ return -10 - i;
+ }
+
+ return 0;
+}
+#endif /* CYASSL_RIPEMD */
+
+
+#ifndef NO_SHA256
+int sha256_test()
+{
+ Sha256 sha;
+ byte hash[SHA256_DIGEST_SIZE];
+
+ testVector a, b;
+ testVector test_sha[2];
+ int times = sizeof(test_sha) / sizeof(struct testVector), i;
+
+ a.input = "abc";
+ a.output = "\xBA\x78\x16\xBF\x8F\x01\xCF\xEA\x41\x41\x40\xDE\x5D\xAE\x22"
+ "\x23\xB0\x03\x61\xA3\x96\x17\x7A\x9C\xB4\x10\xFF\x61\xF2\x00"
+ "\x15\xAD";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
+ b.output = "\x24\x8D\x6A\x61\xD2\x06\x38\xB8\xE5\xC0\x26\x93\x0C\x3E\x60"
+ "\x39\xA3\x3C\xE4\x59\x64\xFF\x21\x67\xF6\xEC\xED\xD4\x19\xDB"
+ "\x06\xC1";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ test_sha[0] = a;
+ test_sha[1] = b;
+
+ InitSha256(&sha);
+
+ for (i = 0; i < times; ++i) {
+ Sha256Update(&sha, (byte*)test_sha[i].input,(word32)test_sha[i].inLen);
+ Sha256Final(&sha, hash);
+
+ if (memcmp(hash, test_sha[i].output, SHA256_DIGEST_SIZE) != 0)
+ return -10 - i;
+ }
+
+ return 0;
+}
+#endif
+
+
+#ifdef CYASSL_SHA512
+int sha512_test()
+{
+ Sha512 sha;
+ byte hash[SHA512_DIGEST_SIZE];
+
+ testVector a, b;
+ testVector test_sha[2];
+ int times = sizeof(test_sha) / sizeof(struct testVector), i;
+
+ a.input = "abc";
+ a.output = "\xdd\xaf\x35\xa1\x93\x61\x7a\xba\xcc\x41\x73\x49\xae\x20\x41"
+ "\x31\x12\xe6\xfa\x4e\x89\xa9\x7e\xa2\x0a\x9e\xee\xe6\x4b\x55"
+ "\xd3\x9a\x21\x92\x99\x2a\x27\x4f\xc1\xa8\x36\xba\x3c\x23\xa3"
+ "\xfe\xeb\xbd\x45\x4d\x44\x23\x64\x3c\xe8\x0e\x2a\x9a\xc9\x4f"
+ "\xa5\x4c\xa4\x9f";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhi"
+ "jklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu";
+ b.output = "\x8e\x95\x9b\x75\xda\xe3\x13\xda\x8c\xf4\xf7\x28\x14\xfc\x14"
+ "\x3f\x8f\x77\x79\xc6\xeb\x9f\x7f\xa1\x72\x99\xae\xad\xb6\x88"
+ "\x90\x18\x50\x1d\x28\x9e\x49\x00\xf7\xe4\x33\x1b\x99\xde\xc4"
+ "\xb5\x43\x3a\xc7\xd3\x29\xee\xb6\xdd\x26\x54\x5e\x96\xe5\x5b"
+ "\x87\x4b\xe9\x09";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ test_sha[0] = a;
+ test_sha[1] = b;
+
+ InitSha512(&sha);
+
+ for (i = 0; i < times; ++i) {
+ Sha512Update(&sha, (byte*)test_sha[i].input,(word32)test_sha[i].inLen);
+ Sha512Final(&sha, hash);
+
+ if (memcmp(hash, test_sha[i].output, SHA512_DIGEST_SIZE) != 0)
+ return -10 - i;
+ }
+
+ return 0;
+}
+#endif
+
+
+#ifndef NO_HMAC
+int hmac_test()
+{
+ Hmac hmac;
+ byte hash[MD5_DIGEST_SIZE];
+
+ const char* keys[]=
+ {
+ "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b",
+ "Jefe",
+ "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
+ };
+
+ testVector a, b, c;
+ testVector test_hmac[3];
+
+ int times = sizeof(test_hmac) / sizeof(testVector), i;
+
+ a.input = "Hi There";
+ a.output = "\x92\x94\x72\x7a\x36\x38\xbb\x1c\x13\xf4\x8e\xf8\x15\x8b\xfc"
+ "\x9d";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "what do ya want for nothing?";
+ b.output = "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7"
+ "\x38";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
+ "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
+ "\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD\xDD"
+ "\xDD\xDD\xDD\xDD\xDD\xDD";
+ c.output = "\x56\xbe\x34\x52\x1d\x14\x4c\x88\xdb\xb8\xc7\x33\xf0\xe8\xb3"
+ "\xf6";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ test_hmac[0] = a;
+ test_hmac[1] = b;
+ test_hmac[2] = c;
+
+ for (i = 0; i < times; ++i) {
+ HmacSetKey(&hmac, MD5, (byte*)keys[i], (word32)strlen(keys[i]));
+ HmacUpdate(&hmac, (byte*)test_hmac[i].input,
+ (word32)test_hmac[i].inLen);
+ HmacFinal(&hmac, hash);
+
+ if (memcmp(hash, test_hmac[i].output, MD5_DIGEST_SIZE) != 0)
+ return -20 - i;
+ }
+
+ return 0;
+}
+#endif
+
+
+int arc4_test()
+{
+ byte cipher[16];
+ byte plain[16];
+
+ const char* keys[] =
+ {
+ "\x01\x23\x45\x67\x89\xab\xcd\xef",
+ "\x01\x23\x45\x67\x89\xab\xcd\xef",
+ "\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\xef\x01\x23\x45"
+ };
+
+ testVector a, b, c, d;
+ testVector test_arc4[4];
+
+ int times = sizeof(test_arc4) / sizeof(testVector), i;
+
+ a.input = "\x01\x23\x45\x67\x89\xab\xcd\xef";
+ a.output = "\x75\xb7\x87\x80\x99\xe0\xc5\x96";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ b.output = "\x74\x94\xc2\xe7\x10\x4b\x08\x79";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ c.output = "\xde\x18\x89\x41\xa3\x37\x5d\x3a";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
+ d.output = "\xd6\xa1\x41\xa7\xec\x3c\x38\xdf\xbd\x61";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ test_arc4[0] = a;
+ test_arc4[1] = b;
+ test_arc4[2] = c;
+ test_arc4[3] = d;
+
+ for (i = 0; i < times; ++i) {
+ Arc4 enc;
+ Arc4 dec;
+
+ Arc4SetKey(&enc, (byte*)keys[i], (word32)strlen(keys[i]));
+ Arc4SetKey(&dec, (byte*)keys[i], (word32)strlen(keys[i]));
+
+ Arc4Process(&enc, cipher, (byte*)test_arc4[i].input,
+ (word32)test_arc4[i].outLen);
+ Arc4Process(&dec, plain, cipher, (word32)test_arc4[i].outLen);
+
+ if (memcmp(plain, test_arc4[i].input, test_arc4[i].outLen))
+ return -20 - i;
+
+ if (memcmp(cipher, test_arc4[i].output, test_arc4[i].outLen))
+ return -20 - 5 - i;
+ }
+
+ return 0;
+}
+
+
+#ifndef NO_HC128
+int hc128_test()
+{
+ byte cipher[16];
+ byte plain[16];
+
+ const char* keys[] =
+ {
+ "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x00\x53\xA6\xF9\x4C\x9F\xF2\x45\x98\xEB\x3E\x91\xE4\x37\x8A\xDD",
+ "\x0F\x62\xB5\x08\x5B\xAE\x01\x54\xA7\xFA\x4D\xA0\xF3\x46\x99\xEC"
+ };
+
+ const char* ivs[] =
+ {
+ "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x0D\x74\xDB\x42\xA9\x10\x77\xDE\x45\xAC\x13\x7A\xE1\x48\xAF\x16",
+ "\x28\x8F\xF6\x5D\xC4\x2B\x92\xF9\x60\xC7\x2E\x95\xFC\x63\xCA\x31"
+ };
+
+
+ testVector a, b, c, d;
+ testVector test_hc128[4];
+
+ int times = sizeof(test_hc128) / sizeof(testVector), i;
+
+ a.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ a.output = "\x37\x86\x02\xB9\x8F\x32\xA7\x48";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ b.output = "\x33\x7F\x86\x11\xC6\xED\x61\x5F";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ c.output = "\x2E\x1E\xD1\x2A\x85\x51\xC0\x5A";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ d.input = "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00";
+ d.output = "\x1C\xD8\xAE\xDD\xFE\x52\xE2\x17\xE8\x35\xD0\xB7\xE8\x4E\x29";
+ d.inLen = strlen(d.input);
+ d.outLen = strlen(d.output);
+
+ test_hc128[0] = a;
+ test_hc128[1] = b;
+ test_hc128[2] = c;
+ test_hc128[3] = d;
+
+ for (i = 0; i < times; ++i) {
+ HC128 enc;
+ HC128 dec;
+
+ Hc128_SetKey(&enc, (byte*)keys[i], (byte*)ivs[i]);
+ Hc128_SetKey(&dec, (byte*)keys[i], (byte*)ivs[i]);
+
+ Hc128_Process(&enc, cipher, (byte*)test_hc128[i].input,
+ (word32)test_hc128[i].outLen);
+ Hc128_Process(&dec, plain, cipher, (word32)test_hc128[i].outLen);
+
+ if (memcmp(plain, test_hc128[i].input, test_hc128[i].outLen))
+ return -120 - i;
+
+ if (memcmp(cipher, test_hc128[i].output, test_hc128[i].outLen))
+ return -120 - 5 - i;
+ }
+
+ return 0;
+}
+#endif /* NO_HC128 */
+
+
+#ifndef NO_RABBIT
+int rabbit_test()
+{
+ byte cipher[16];
+ byte plain[16];
+
+ const char* keys[] =
+ {
+ "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\xAC\xC3\x51\xDC\xF1\x62\xFC\x3B\xFE\x36\x3D\x2E\x29\x13\x28\x91"
+ };
+
+ const char* ivs[] =
+ {
+ "\x00\x00\x00\x00\x00\x00\x00\x00",
+ "\x59\x7E\x26\xC1\x75\xF5\x73\xC3",
+ 0
+ };
+
+
+ testVector a, b, c;
+ testVector test_rabbit[3];
+
+ int times = sizeof(test_rabbit) / sizeof(testVector), i;
+
+ a.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ a.output = "\xED\xB7\x05\x67\x37\x5D\xCD\x7C";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ b.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ b.output = "\x6D\x7D\x01\x22\x92\xCC\xDC\xE0";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ c.input = "\x00\x00\x00\x00\x00\x00\x00\x00";
+ c.output = "\x9C\x51\xE2\x87\x84\xC3\x7F\xE9";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ test_rabbit[0] = a;
+ test_rabbit[1] = b;
+ test_rabbit[2] = c;
+
+ for (i = 0; i < times; ++i) {
+ Rabbit enc;
+ Rabbit dec;
+
+ RabbitSetKey(&enc, (byte*)keys[i], (byte*)ivs[i]);
+ RabbitSetKey(&dec, (byte*)keys[i], (byte*)ivs[i]);
+
+ RabbitProcess(&enc, cipher, (byte*)test_rabbit[i].input,
+ (word32)test_rabbit[i].outLen);
+ RabbitProcess(&dec, plain, cipher, (word32)test_rabbit[i].outLen);
+
+ if (memcmp(plain, test_rabbit[i].input, test_rabbit[i].outLen))
+ return -130 - i;
+
+ if (memcmp(cipher, test_rabbit[i].output, test_rabbit[i].outLen))
+ return -130 - 5 - i;
+ }
+
+ return 0;
+}
+#endif /* NO_RABBIT */
+
+
+#ifndef NO_DES3
+int des_test()
+{
+ const byte vector[] = { /* "now is the time for all " w/o trailing 0 */
+ 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
+ 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
+ 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
+ };
+
+ byte plain[24];
+ byte cipher[24];
+
+ Des enc;
+ Des dec;
+
+ const byte key[] =
+ {
+ 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef
+ };
+
+ const byte iv[] =
+ {
+ 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef
+ };
+
+ const byte verify[] =
+ {
+ 0x8b,0x7c,0x52,0xb0,0x01,0x2b,0x6c,0xb8,
+ 0x4f,0x0f,0xeb,0xf3,0xfb,0x5f,0x86,0x73,
+ 0x15,0x85,0xb3,0x22,0x4b,0x86,0x2b,0x4b
+ };
+
+
+ Des_SetKey(&enc, key, iv, DES_ENCRYPTION);
+ Des_CbcEncrypt(&enc, cipher, vector, sizeof(vector));
+ Des_SetKey(&dec, key, iv, DES_DECRYPTION);
+ Des_CbcDecrypt(&dec, plain, cipher, sizeof(cipher));
+
+ if (memcmp(plain, vector, sizeof(plain)))
+ return -31;
+
+ if (memcmp(cipher, verify, sizeof(cipher)))
+ return -32;
+
+ return 0;
+}
+#endif /* NO_DES3 */
+
+
+#ifndef NO_DES3
+int des3_test()
+{
+ const byte vector[] = { /* "Now is the time for all " w/o trailing 0 */
+ 0x4e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
+ 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
+ 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
+ };
+
+ byte plain[24];
+ byte cipher[24];
+
+ Des3 enc;
+ Des3 dec;
+
+ const byte key3[] =
+ {
+ 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,
+ 0xfe,0xde,0xba,0x98,0x76,0x54,0x32,0x10,
+ 0x89,0xab,0xcd,0xef,0x01,0x23,0x45,0x67
+ };
+ const byte iv3[] =
+ {
+ 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef,
+ 0x01,0x01,0x01,0x01,0x01,0x01,0x01,0x01,
+ 0x11,0x21,0x31,0x41,0x51,0x61,0x71,0x81
+
+ };
+
+ const byte verify3[] =
+ {
+ 0x43,0xa0,0x29,0x7e,0xd1,0x84,0xf8,0x0e,
+ 0x89,0x64,0x84,0x32,0x12,0xd5,0x08,0x98,
+ 0x18,0x94,0x15,0x74,0x87,0x12,0x7d,0xb0
+ };
+
+
+ Des3_SetKey(&enc, key3, iv3, DES_ENCRYPTION);
+ Des3_CbcEncrypt(&enc, cipher, vector, sizeof(vector));
+ Des3_SetKey(&dec, key3, iv3, DES_DECRYPTION);
+ Des3_CbcDecrypt(&dec, plain, cipher, sizeof(cipher));
+
+ if (memcmp(plain, vector, sizeof(plain)))
+ return -33;
+
+ if (memcmp(cipher, verify3, sizeof(cipher)))
+ return -34;
+
+ return 0;
+}
+#endif /* NO_DES */
+
+
+#ifndef NO_AES
+int aes_test()
+{
+ Aes enc;
+ Aes dec;
+
+ const byte msg[] = { /* "Now is the time for all " w/o trailing 0 */
+ 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
+ 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
+ 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
+ };
+
+ const byte verify[] =
+ {
+ 0x95,0x94,0x92,0x57,0x5f,0x42,0x81,0x53,
+ 0x2c,0xcc,0x9d,0x46,0x77,0xa2,0x33,0xcb
+ };
+
+ byte key[] = "0123456789abcdef "; /* align */
+ byte iv[] = "1234567890abcdef "; /* align */
+
+ byte cipher[AES_BLOCK_SIZE];
+ byte plain [AES_BLOCK_SIZE];
+
+ AesSetKey(&enc, key, AES_BLOCK_SIZE, iv, AES_ENCRYPTION);
+ AesSetKey(&dec, key, AES_BLOCK_SIZE, iv, AES_DECRYPTION);
+
+ AesCbcEncrypt(&enc, cipher, msg, AES_BLOCK_SIZE);
+ AesCbcDecrypt(&dec, plain, cipher, AES_BLOCK_SIZE);
+
+ if (memcmp(plain, msg, AES_BLOCK_SIZE))
+ return -60;
+
+ if (memcmp(cipher, verify, AES_BLOCK_SIZE))
+ return -61;
+
+ return 0;
+}
+#endif /* NO_AES */
+
+
+int random_test()
+{
+ RNG rng;
+ byte block[32];
+ int ret = InitRng(&rng);
+ if (ret != 0) return -39;
+
+ RNG_GenerateBlock(&rng, block, sizeof(block));
+
+ return 0;
+}
+
+
+#ifndef NO_MAIN_DRIVER
+ static const char* clientKey = "../../certs/client-key.der";
+ static const char* clientCert = "../../certs/client-cert.der";
+ #ifdef CYASSL_CERT_GEN
+ static const char* caKeyFile = "../../certs/ca-key.der";
+ static const char* caCertFile = "../../certs/ca-cert.pem";
+ #endif
+#else
+ static const char* clientKey = "../certs/client-key.der";
+ static const char* clientCert = "../certs/client-cert.der";
+ #ifdef CYASSL_CERT_GEN
+ static const char* caKeyFile = "../certs/ca-key.der";
+ static const char* caCertFile = "../certs/ca-cert.pem";
+ #endif
+#endif
+
+
+#ifdef HAVE_NTRU
+
+static byte GetEntropy(ENTROPY_CMD cmd, byte* out)
+{
+ static RNG rng;
+
+ if (cmd == INIT) {
+ int ret = InitRng(&rng);
+ if (ret == 0)
+ return 1;
+ else
+ return 0;
+ }
+
+ if (out == NULL)
+ return 0;
+
+ if (cmd == GET_BYTE_OF_ENTROPY) {
+ RNG_GenerateBlock(&rng, out, 1);
+ return 1;
+ }
+
+ if (cmd == GET_NUM_BYTES_PER_BYTE_OF_ENTROPY) {
+ *out = 1;
+ return 1;
+ }
+
+ return 0;
+}
+
+#endif /* HAVE_NTRU */
+
+int rsa_test()
+{
+ byte tmp[2048], tmp2[2048];
+ size_t bytes, bytes2;
+ RsaKey key;
+ RNG rng;
+ word32 idx = 0;
+ int ret;
+ byte in[] = "Everyone gets Friday off.";
+ word32 inLen = (word32)strlen((char*)in);
+ byte out[256];
+ byte plain[256];
+ DecodedCert cert;
+
+ FILE* file = fopen(clientKey, "rb"), * file2;
+
+ if (!file)
+ return -40;
+
+ bytes = fread(tmp, 1, sizeof(tmp), file);
+
+ InitRsaKey(&key, 0);
+ ret = RsaPrivateKeyDecode(tmp, &idx, &key, (word32)bytes);
+ if (ret != 0) return -41;
+
+ ret = InitRng(&rng);
+ if (ret != 0) return -42;
+
+ ret = RsaPublicEncrypt(in, inLen, out, sizeof(out), &key, &rng);
+
+ ret = RsaPrivateDecrypt(out, ret, plain, sizeof(plain), &key);
+
+ if (memcmp(plain, in, inLen)) return -45;
+
+ ret = RsaSSL_Sign(in, inLen, out, sizeof(out), &key, &rng);
+ memset(plain, 0, sizeof(plain));
+ ret = RsaSSL_Verify(out, ret, plain, sizeof(plain), &key);
+
+ if (memcmp(plain, in, ret)) return -46;
+
+ file2 = fopen(clientCert, "rb");
+ if (!file2)
+ return -47;
+
+ bytes2 = fread(tmp2, 1, sizeof(tmp2), file2);
+
+ InitDecodedCert(&cert, (byte*)&tmp2, 0);
+
+ ret = ParseCert(&cert, (word32)bytes2, CERT_TYPE, NO_VERIFY, 0);
+ if (ret != 0) return -48;
+
+ FreeDecodedCert(&cert);
+
+ fclose(file2);
+ fclose(file);
+
+#ifdef CYASSL_KEY_GEN
+ {
+ byte der[4096];
+ byte pem[4096];
+ word32 derSz = 0;
+ word32 pemSz = 0;
+ RsaKey derIn;
+ RsaKey genKey;
+ FILE* keyFile;
+ FILE* pemFile;
+
+ InitRsaKey(&genKey, 0);
+ ret = MakeRsaKey(&genKey, 1024, 65537, &rng);
+ if (ret != 0)
+ return -301;
+
+ derSz = RsaKeyToDer(&genKey, der, sizeof(der));
+ if (derSz < 0)
+ return -302;
+
+ keyFile = fopen("./ker.der", "wb");
+ if (!keyFile)
+ return -303;
+ ret = fwrite(der, derSz, 1, keyFile);
+ fclose(keyFile);
+
+ pemSz = DerToPem(der, derSz, pem, sizeof(pem), PRIVATEKEY_TYPE);
+ if (pemSz < 0)
+ return -304;
+
+ pemFile = fopen("./key.pem", "wb");
+ if (!pemFile)
+ return -305;
+ ret = fwrite(pem, pemSz, 1, pemFile);
+ fclose(pemFile);
+
+ InitRsaKey(&derIn, 0);
+ idx = 0;
+ ret = RsaPrivateKeyDecode(der, &idx, &derIn, derSz);
+ if (ret != 0)
+ return -306;
+
+ FreeRsaKey(&derIn);
+ FreeRsaKey(&genKey);
+ }
+#endif /* CYASSL_KEY_GEN */
+
+
+#ifdef CYASSL_CERT_GEN
+ /* self signed */
+ {
+ Cert myCert;
+ byte derCert[4096];
+ byte pem[4096];
+ DecodedCert decode;
+ FILE* derFile;
+ FILE* pemFile;
+ int certSz;
+ int pemSz;
+
+ InitCert(&myCert);
+
+ strncpy(myCert.subject.country, "US", NAME_SIZE);
+ strncpy(myCert.subject.state, "OR", NAME_SIZE);
+ strncpy(myCert.subject.locality, "Portland", NAME_SIZE);
+ strncpy(myCert.subject.org, "yaSSL", NAME_SIZE);
+ strncpy(myCert.subject.unit, "Development", NAME_SIZE);
+ strncpy(myCert.subject.commonName, "www.yassl.com", NAME_SIZE);
+ strncpy(myCert.subject.email, "info@yassl.com", NAME_SIZE);
+
+ certSz = MakeSelfCert(&myCert, derCert, sizeof(derCert), &key, &rng);
+ if (certSz < 0)
+ return -401;
+
+ InitDecodedCert(&decode, derCert, 0);
+ ret = ParseCert(&decode, certSz, CERT_TYPE, NO_VERIFY, 0);
+ if (ret != 0)
+ return -402;
+
+ derFile = fopen("./cert.der", "wb");
+ if (!derFile)
+ return -403;
+ ret = fwrite(derCert, certSz, 1, derFile);
+ fclose(derFile);
+
+ pemSz = DerToPem(derCert, certSz, pem, sizeof(pem), CERT_TYPE);
+ if (pemSz < 0)
+ return -404;
+
+ pemFile = fopen("./cert.pem", "wb");
+ if (!pemFile)
+ return -405;
+ ret = fwrite(pem, pemSz, 1, pemFile);
+ fclose(pemFile);
+
+ FreeDecodedCert(&decode);
+
+ }
+ /* CA style */
+ {
+ RsaKey caKey;
+ Cert myCert;
+ byte derCert[4096];
+ byte pem[4096];
+ DecodedCert decode;
+ FILE* derFile;
+ FILE* pemFile;
+ int certSz;
+ int pemSz;
+ byte tmp[2048];
+ size_t bytes;
+ word32 idx = 0;
+
+ FILE* file = fopen(caKeyFile, "rb");
+
+ if (!file)
+ return -412;
+
+ bytes = fread(tmp, 1, sizeof(tmp), file);
+
+ InitRsaKey(&caKey, 0);
+ ret = RsaPrivateKeyDecode(tmp, &idx, &caKey, (word32)bytes);
+ if (ret != 0) return -413;
+
+ InitCert(&myCert);
+
+ strncpy(myCert.subject.country, "US", NAME_SIZE);
+ strncpy(myCert.subject.state, "OR", NAME_SIZE);
+ strncpy(myCert.subject.locality, "Portland", NAME_SIZE);
+ strncpy(myCert.subject.org, "yaSSL", NAME_SIZE);
+ strncpy(myCert.subject.unit, "Development", NAME_SIZE);
+ strncpy(myCert.subject.commonName, "www.yassl.com", NAME_SIZE);
+ strncpy(myCert.subject.email, "info@yassl.com", NAME_SIZE);
+
+ ret = SetIssuer(&myCert, caCertFile);
+ if (ret < 0)
+ return -406;
+
+ certSz = MakeCert(&myCert, derCert, sizeof(derCert), &key, &rng);
+ if (certSz < 0)
+ return -407;
+
+ certSz = SignCert(&myCert, derCert, sizeof(derCert), &caKey, &rng);
+ if (certSz < 0)
+ return -408;
+
+
+ InitDecodedCert(&decode, derCert, 0);
+ ret = ParseCert(&decode, certSz, CERT_TYPE, NO_VERIFY, 0);
+ if (ret != 0)
+ return -409;
+
+ derFile = fopen("./othercert.der", "wb");
+ if (!derFile)
+ return -410;
+ ret = fwrite(derCert, certSz, 1, derFile);
+ fclose(derFile);
+
+ pemSz = DerToPem(derCert, certSz, pem, sizeof(pem), CERT_TYPE);
+ if (pemSz < 0)
+ return -411;
+
+ pemFile = fopen("./othercert.pem", "wb");
+ if (!pemFile)
+ return -412;
+ ret = fwrite(pem, pemSz, 1, pemFile);
+ fclose(pemFile);
+
+ FreeDecodedCert(&decode);
+
+ }
+#ifdef HAVE_NTRU
+ {
+ RsaKey caKey;
+ Cert myCert;
+ byte derCert[4096];
+ byte pem[4096];
+ DecodedCert decode;
+ FILE* derFile;
+ FILE* pemFile;
+ FILE* caFile;
+ FILE* ntruPrivFile;
+ int certSz;
+ int pemSz;
+ byte tmp[2048];
+ size_t bytes;
+ word32 idx = 0;
+
+ byte public_key[557]; /* sized for EES401EP2 */
+ word16 public_key_len; /* no. of octets in public key */
+ byte private_key[607]; /* sized for EES401EP2 */
+ word16 private_key_len; /* no. of octets in private key */
+ DRBG_HANDLE drbg;
+ static uint8_t const pers_str[] = {
+ 'C', 'y', 'a', 'S', 'S', 'L', ' ', 't', 'e', 's', 't'
+ };
+ word32 rc = crypto_drbg_instantiate(112, pers_str, sizeof(pers_str),
+ GetEntropy, &drbg);
+ if (rc != DRBG_OK)
+ return -450;
+
+ rc = crypto_ntru_encrypt_keygen(drbg, NTRU_EES401EP2, &public_key_len,
+ NULL, &private_key_len, NULL);
+ if (rc != NTRU_OK)
+ return -451;
+
+ rc = crypto_ntru_encrypt_keygen(drbg, NTRU_EES401EP2, &public_key_len,
+ public_key, &private_key_len, private_key);
+ crypto_drbg_uninstantiate(drbg);
+
+ if (rc != NTRU_OK)
+ return -452;
+
+ caFile = fopen(caKeyFile, "rb");
+
+ if (!caFile)
+ return -453;
+
+ bytes = fread(tmp, 1, sizeof(tmp), caFile);
+ fclose(caFile);
+
+ InitRsaKey(&caKey, 0);
+ ret = RsaPrivateKeyDecode(tmp, &idx, &caKey, (word32)bytes);
+ if (ret != 0) return -454;
+
+ InitCert(&myCert);
+
+ strncpy(myCert.subject.country, "US", NAME_SIZE);
+ strncpy(myCert.subject.state, "OR", NAME_SIZE);
+ strncpy(myCert.subject.locality, "Portland", NAME_SIZE);
+ strncpy(myCert.subject.org, "yaSSL", NAME_SIZE);
+ strncpy(myCert.subject.unit, "Development", NAME_SIZE);
+ strncpy(myCert.subject.commonName, "www.yassl.com", NAME_SIZE);
+ strncpy(myCert.subject.email, "info@yassl.com", NAME_SIZE);
+
+ ret = SetIssuer(&myCert, caCertFile);
+ if (ret < 0)
+ return -455;
+
+ certSz = MakeNtruCert(&myCert, derCert, sizeof(derCert), public_key,
+ public_key_len, &rng);
+ if (certSz < 0)
+ return -456;
+
+ certSz = SignCert(&myCert, derCert, sizeof(derCert), &caKey, &rng);
+ if (certSz < 0)
+ return -457;
+
+
+ InitDecodedCert(&decode, derCert, 0);
+ ret = ParseCert(&decode, certSz, CERT_TYPE, NO_VERIFY, 0);
+ if (ret != 0)
+ return -458;
+
+ derFile = fopen("./ntru-cert.der", "wb");
+ if (!derFile)
+ return -459;
+ ret = fwrite(derCert, certSz, 1, derFile);
+ fclose(derFile);
+
+ pemSz = DerToPem(derCert, certSz, pem, sizeof(pem), CERT_TYPE);
+ if (pemSz < 0)
+ return -460;
+
+ pemFile = fopen("./ntru-cert.pem", "wb");
+ if (!pemFile)
+ return -461;
+ ret = fwrite(pem, pemSz, 1, pemFile);
+ fclose(pemFile);
+
+ ntruPrivFile = fopen("./ntru-key.raw", "wb");
+ if (!ntruPrivFile)
+ return -462;
+ ret = fwrite(private_key, private_key_len, 1, ntruPrivFile);
+ fclose(ntruPrivFile);
+
+
+
+ FreeDecodedCert(&decode);
+ }
+#endif /* HAVE_NTRU */
+#endif /* CYASSL_CERT_GEN */
+
+ FreeRsaKey(&key);
+
+ return 0;
+}
+
+
+#ifndef NO_MAIN_DRIVER
+ static const char* dhKey = "../../certs/dh1024.der";
+#else
+ static const char* dhKey = "../certs/dh1024.der";
+#endif
+
+#ifndef NO_DH
+
+int dh_test()
+{
+ int ret;
+ word32 bytes;
+ word32 idx = 0, privSz, pubSz, privSz2, pubSz2, agreeSz, agreeSz2;
+ byte tmp[1024];
+ byte priv[128];
+ byte pub[128];
+ byte priv2[128];
+ byte pub2[128];
+ byte agree[128];
+ byte agree2[128];
+ DhKey key;
+ DhKey key2;
+ RNG rng;
+ FILE* file = fopen(dhKey, "rb");
+
+ if (!file)
+ return -50;
+
+ bytes = (word32) fread(tmp, 1, sizeof(tmp), file);
+
+ InitDhKey(&key);
+ InitDhKey(&key2);
+ ret = DhKeyDecode(tmp, &idx, &key, bytes);
+ if (ret != 0)
+ return -51;
+
+ idx = 0;
+ ret = DhKeyDecode(tmp, &idx, &key2, bytes);
+ if (ret != 0)
+ return -52;
+
+ ret = InitRng(&rng);
+ if (ret != 0)
+ return -53;
+
+ ret = DhGenerateKeyPair(&key, &rng, priv, &privSz, pub, &pubSz);
+ ret = DhGenerateKeyPair(&key2, &rng, priv2, &privSz2, pub2, &pubSz2);
+ if (ret != 0)
+ return -54;
+
+ ret = DhAgree(&key, agree, &agreeSz, priv, privSz, pub2, pubSz2);
+ ret = DhAgree(&key2, agree2, &agreeSz2, priv2, privSz2, pub, pubSz);
+ if (ret != 0)
+ return -55;
+
+ if (memcmp(agree, agree2, agreeSz))
+ return -56;
+
+ FreeDhKey(&key);
+ FreeDhKey(&key2);
+ fclose(file);
+
+ return 0;
+}
+
+#endif /* NO_DH */
+
+
+#ifndef NO_MAIN_DRIVER
+ static const char* dsaKey = "../../certs/dsa512.der";
+#else
+ static const char* dsaKey = "../certs/dsa512.der";
+#endif
+
+#ifndef NO_DSA
+
+int dsa_test()
+{
+ int ret, answer;
+ word32 bytes;
+ word32 idx = 0;
+ byte tmp[1024];
+ DsaKey key;
+ RNG rng;
+ FILE* file = fopen(dsaKey, "rb");
+ Sha sha;
+ byte hash[SHA_DIGEST_SIZE];
+ byte signature[40];
+
+ if (!file)
+ return -60;
+
+ bytes = (word32) fread(tmp, 1, sizeof(tmp), file);
+
+ InitSha(&sha);
+ ShaUpdate(&sha, tmp, bytes);
+ ShaFinal(&sha, hash);
+
+ InitDsaKey(&key);
+ ret = DsaPrivateKeyDecode(tmp, &idx, &key, bytes);
+ if (ret != 0) return -61;
+
+ ret = InitRng(&rng);
+ if (ret != 0) return -62;
+
+ ret = DsaSign(hash, signature, &key, &rng);
+ if (ret != 0) return -63;
+
+ ret = DsaVerify(hash, signature, &key, &answer);
+ if (ret != 0) return -64;
+ if (answer != 1) return -65;
+
+ FreeDsaKey(&key);
+ fclose(file);
+
+ return 0;
+}
+
+#endif /* NO_DSA */
+
+
+#ifdef OPENSSL_EXTRA
+
+int openssl_test()
+{
+ EVP_MD_CTX md_ctx;
+ testVector a, b, c;
+ byte hash[SHA_DIGEST_SIZE];
+
+ a.input = "1234567890123456789012345678901234567890123456789012345678"
+ "9012345678901234567890";
+ a.output = "\x57\xed\xf4\xa2\x2b\xe3\xc9\x55\xac\x49\xda\x2e\x21\x07\xb6"
+ "\x7a";
+ a.inLen = strlen(a.input);
+ a.outLen = strlen(a.output);
+
+ EVP_MD_CTX_init(&md_ctx);
+ EVP_DigestInit(&md_ctx, EVP_md5());
+
+ EVP_DigestUpdate(&md_ctx, a.input, a.inLen);
+ EVP_DigestFinal(&md_ctx, hash, 0);
+
+ if (memcmp(hash, a.output, MD5_DIGEST_SIZE) != 0)
+ return -71;
+
+ b.input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
+ "aaaaaaaaaa";
+ b.output = "\xAD\x5B\x3F\xDB\xCB\x52\x67\x78\xC2\x83\x9D\x2F\x15\x1E\xA7"
+ "\x53\x99\x5E\x26\xA0";
+ b.inLen = strlen(b.input);
+ b.outLen = strlen(b.output);
+
+ EVP_MD_CTX_init(&md_ctx);
+ EVP_DigestInit(&md_ctx, EVP_sha1());
+
+ EVP_DigestUpdate(&md_ctx, b.input, b.inLen);
+ EVP_DigestFinal(&md_ctx, hash, 0);
+
+ if (memcmp(hash, b.output, SHA_DIGEST_SIZE) != 0)
+ return -72;
+
+ if (RAND_bytes(hash, sizeof(hash)) != 1)
+ return -73;
+
+ c.input = "what do ya want for nothing?";
+ c.output = "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7"
+ "\x38";
+ c.inLen = strlen(c.input);
+ c.outLen = strlen(c.output);
+
+ HMAC(EVP_md5(), "Jefe", 4, (byte*)c.input, (int)c.inLen, hash, 0);
+
+ if (memcmp(hash, c.output, MD5_DIGEST_SIZE) != 0)
+ return -74;
+
+ { /* des test */
+ const byte vector[] = { /* "now is the time for all " w/o trailing 0 */
+ 0x6e,0x6f,0x77,0x20,0x69,0x73,0x20,0x74,
+ 0x68,0x65,0x20,0x74,0x69,0x6d,0x65,0x20,
+ 0x66,0x6f,0x72,0x20,0x61,0x6c,0x6c,0x20
+ };
+
+ byte plain[24];
+ byte cipher[24];
+
+ const_DES_cblock key =
+ {
+ 0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef
+ };
+
+ DES_cblock iv =
+ {
+ 0x12,0x34,0x56,0x78,0x90,0xab,0xcd,0xef
+ };
+
+ DES_key_schedule sched;
+
+ const byte verify[] =
+ {
+ 0x8b,0x7c,0x52,0xb0,0x01,0x2b,0x6c,0xb8,
+ 0x4f,0x0f,0xeb,0xf3,0xfb,0x5f,0x86,0x73,
+ 0x15,0x85,0xb3,0x22,0x4b,0x86,0x2b,0x4b
+ };
+
+ DES_key_sched(&key, &sched);
+
+ DES_cbc_encrypt(vector, cipher, sizeof(vector), &sched, &iv, DES_ENCRYPT);
+ DES_cbc_encrypt(cipher, plain, sizeof(vector), &sched, &iv, DES_DECRYPT);
+
+ if (memcmp(plain, vector, sizeof(vector)) != 0)
+ return -75;
+
+ if (memcmp(cipher, verify, sizeof(verify)) != 0)
+ return -76;
+
+ /* test changing iv */
+ DES_ncbc_encrypt(vector, cipher, 8, &sched, &iv, DES_ENCRYPT);
+ DES_ncbc_encrypt(vector + 8, cipher + 8, 16, &sched, &iv, DES_ENCRYPT);
+
+ if (memcmp(cipher, verify, sizeof(verify)) != 0)
+ return -77;
+
+ } /* end des test */
+
+ return 0;
+}
+
+#endif /* OPENSSL_EXTRA */
+
+
+#ifndef NO_PWDBASED
+
+int pbkdf2_test()
+{
+ char passwd[] = "password";
+ const byte salt[] = { 0x78, 0x57, 0x8E, 0x5a, 0x5d, 0x63, 0xcb, 0x06 };
+ int iterations = 2048;
+ int kLen = 24;
+
+ const byte verify[] = {
+ 0xBF, 0xDE, 0x6B, 0xE9, 0x4D, 0xF7, 0xE1, 0x1D, 0xD4, 0x09, 0xBC, 0xE2,
+ 0x0A, 0x02, 0x55, 0xEC, 0x32, 0x7C, 0xB9, 0x36, 0xFF, 0xE9, 0x36, 0x43
+
+ };
+
+ return 0;
+}
+
+
+int pbkdf1_test()
+{
+ char passwd[] = "password";
+ const byte salt[] = { 0x78, 0x57, 0x8E, 0x5a, 0x5d, 0x63, 0xcb, 0x06 };
+ int iterations = 1000;
+ int kLen = 16;
+ byte derived[16];
+
+ const byte verify[] = {
+ 0xDC, 0x19, 0x84, 0x7E, 0x05, 0xC6, 0x4D, 0x2F, 0xAF, 0x10, 0xEB, 0xFB,
+ 0x4A, 0x3D, 0x2A, 0x20
+ };
+
+ PBKDF1(derived, (byte*)passwd, strlen(passwd), salt, 8, iterations, kLen,
+ SHA);
+
+ if (memcmp(derived, verify, sizeof(verify)) != 0)
+ return -101;
+
+ return 0;
+}
+
+
+int pwdbased_test()
+{
+ return pbkdf1_test();
+}
+
+#endif /* NO_PWDBASED */
+
+
+#ifdef HAVE_ECC
+
+int ecc_test()
+{
+ RNG rng;
+ byte sharedA[1024];
+ byte sharedB[1024];
+ byte sig[1024];
+ byte digest[20];
+ byte export[1024];
+ word32 x, y;
+ int i, verify, ret;
+ ecc_key userA, userB, pubKey;
+
+ ret = InitRng(&rng);
+ if (ret != 0)
+ return -1001;
+
+ ecc_init(&userA);
+ ecc_init(&userB);
+ ecc_init(&pubKey);
+
+ ret = ecc_make_key(&rng, 32, &userA);
+ ret = ecc_make_key(&rng, 32, &userB);
+
+ if (ret != 0)
+ return -1002;
+
+ x = sizeof(sharedA);
+ ret = ecc_shared_secret(&userA, &userB, sharedA, &x);
+
+ y = sizeof(sharedB);
+ ret = ecc_shared_secret(&userB, &userA, sharedB, &y);
+
+ if (ret != 0)
+ return -1003;
+
+ if (y != x)
+ return -1004;
+
+ if (memcmp(sharedA, sharedB, x))
+ return -1005;
+
+ x = sizeof(export);
+ ret = ecc_export_x963(&userA, export, &x);
+ if (ret != 0)
+ return -1006;
+
+ ret = ecc_import_x963(export, x, &pubKey);
+
+ if (ret != 0)
+ return -1007;
+
+ y = sizeof(sharedB);
+ ret = ecc_shared_secret(&userB, &pubKey, sharedB, &y);
+
+ if (ret != 0)
+ return -1008;
+
+ if (memcmp(sharedA, sharedB, y))
+ return -1010;
+
+ /* test DSA sign hash */
+ for (i = 0; i < sizeof(digest); i++)
+ digest[i] = i;
+
+ x = sizeof(sig);
+ ret = ecc_sign_hash(digest, sizeof(digest), sig, &x, &rng, &userA);
+
+ verify = 0;
+ ret = ecc_verify_hash(sig, x, digest, sizeof(digest), &verify, &userA);
+
+ if (ret != 0)
+ return -1011;
+
+ if (verify != 1)
+ return -1012;
+
+ ecc_free(&pubKey);
+ ecc_free(&userB);
+ ecc_free(&userA);
+
+ return 0;
+}
+
+#endif /* HAVE_ECC */