os/ossrv/ssl/tsrc/crypto_test/src/rc4test.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* crypto/rc4/rc4test.c */
sl@0
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
     3
 * All rights reserved.
sl@0
     4
 *
sl@0
     5
 * This package is an SSL implementation written
sl@0
     6
 * by Eric Young (eay@cryptsoft.com).
sl@0
     7
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
     8
 * 
sl@0
     9
 * This library is free for commercial and non-commercial use as long as
sl@0
    10
 * the following conditions are aheared to.  The following conditions
sl@0
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    13
 * included with this distribution is covered by the same copyright terms
sl@0
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    15
 * 
sl@0
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    17
 * the code are not to be removed.
sl@0
    18
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    19
 * as the author of the parts of the library used.
sl@0
    20
 * This can be in the form of a textual message at program startup or
sl@0
    21
 * in documentation (online or textual) provided with the package.
sl@0
    22
 * 
sl@0
    23
 * Redistribution and use in source and binary forms, with or without
sl@0
    24
 * modification, are permitted provided that the following conditions
sl@0
    25
 * are met:
sl@0
    26
 * 1. Redistributions of source code must retain the copyright
sl@0
    27
 *    notice, this list of conditions and the following disclaimer.
sl@0
    28
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    29
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    30
 *    documentation and/or other materials provided with the distribution.
sl@0
    31
 * 3. All advertising materials mentioning features or use of this software
sl@0
    32
 *    must display the following acknowledgement:
sl@0
    33
 *    "This product includes cryptographic software written by
sl@0
    34
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    36
 *    being used are not cryptographic related :-).
sl@0
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    38
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    40
 * 
sl@0
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    51
 * SUCH DAMAGE.
sl@0
    52
 * 
sl@0
    53
 * The licence and distribution terms for any publically available version or
sl@0
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    55
 * copied and put under another distribution licence
sl@0
    56
 * [including the GNU Public Licence.]
sl@0
    57
 */
sl@0
    58
/*
sl@0
    59
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
sl@0
    60
 */
sl@0
    61
#include <stdio.h>
sl@0
    62
#include <stdlib.h>
sl@0
    63
#include <string.h>
sl@0
    64
#include <errno.h>
sl@0
    65
#ifndef SYMBIAN
sl@0
    66
#include "../e_os.h"
sl@0
    67
#else
sl@0
    68
#include "e_os.h"
sl@0
    69
#endif
sl@0
    70
#include <openssl/rc2.h>
sl@0
    71
#ifdef SYMBIAN
sl@0
    72
#ifdef stdin
sl@0
    73
#undef stdin
sl@0
    74
#endif
sl@0
    75
#ifdef stdout
sl@0
    76
#undef stdout
sl@0
    77
#endif
sl@0
    78
#ifdef stderr
sl@0
    79
#undef stderr
sl@0
    80
#endif
sl@0
    81
sl@0
    82
#define stdin fp_stdin
sl@0
    83
#define stdout fp_stdout
sl@0
    84
#define stderr fp_stderr
sl@0
    85
sl@0
    86
extern FILE *fp_stdout;
sl@0
    87
extern FILE *fp_stderr;
sl@0
    88
#endif
sl@0
    89
sl@0
    90
#ifdef OPENSSL_NO_RC4
sl@0
    91
int main(int argc, char *argv[])
sl@0
    92
{
sl@0
    93
    fprintf(stdout,"No RC4 support\n");
sl@0
    94
    return(0);
sl@0
    95
}
sl@0
    96
#else
sl@0
    97
#include <openssl/rc4.h>
sl@0
    98
#include <openssl/sha.h>
sl@0
    99
sl@0
   100
static unsigned char keys[7][30]={
sl@0
   101
	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
sl@0
   102
	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
sl@0
   103
	{8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
sl@0
   104
	{4,0xef,0x01,0x23,0x45},
sl@0
   105
	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
sl@0
   106
	{4,0xef,0x01,0x23,0x45},
sl@0
   107
	};
sl@0
   108
sl@0
   109
static unsigned char data_len[7]={8,8,8,20,28,10};
sl@0
   110
static unsigned char data[7][30]={
sl@0
   111
	{0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,0xff},
sl@0
   112
	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
sl@0
   113
	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
sl@0
   114
	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
sl@0
   115
	   0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
sl@0
   116
	   0x00,0x00,0x00,0x00,0xff},
sl@0
   117
	{0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
sl@0
   118
	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
sl@0
   119
	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
sl@0
   120
	   0x12,0x34,0x56,0x78,0xff},
sl@0
   121
	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
sl@0
   122
	{0},
sl@0
   123
	};
sl@0
   124
sl@0
   125
static unsigned char output[7][30]={
sl@0
   126
	{0x75,0xb7,0x87,0x80,0x99,0xe0,0xc5,0x96,0x00},
sl@0
   127
	{0x74,0x94,0xc2,0xe7,0x10,0x4b,0x08,0x79,0x00},
sl@0
   128
	{0xde,0x18,0x89,0x41,0xa3,0x37,0x5d,0x3a,0x00},
sl@0
   129
	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,
sl@0
   130
	 0xbd,0x61,0x5a,0x11,0x62,0xe1,0xc7,0xba,
sl@0
   131
	 0x36,0xb6,0x78,0x58,0x00},
sl@0
   132
	{0x66,0xa0,0x94,0x9f,0x8a,0xf7,0xd6,0x89,
sl@0
   133
	 0x1f,0x7f,0x83,0x2b,0xa8,0x33,0xc0,0x0c,
sl@0
   134
	 0x89,0x2e,0xbe,0x30,0x14,0x3c,0xe2,0x87,
sl@0
   135
	 0x40,0x01,0x1e,0xcf,0x00},
sl@0
   136
	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,0xbd,0x61,0x00},
sl@0
   137
	{0},
sl@0
   138
	};
sl@0
   139
#ifndef SYMBIAN
sl@0
   140
int main(int argc, char *argv[])
sl@0
   141
#else
sl@0
   142
int rc4_main(int argc, char *argv[])
sl@0
   143
#endif
sl@0
   144
	{
sl@0
   145
	int err=0;
sl@0
   146
	unsigned int i, j;
sl@0
   147
	unsigned char *p;
sl@0
   148
	RC4_KEY key;
sl@0
   149
	unsigned char obuf[512];
sl@0
   150
    
sl@0
   151
	for (i=0; i<6; i++)
sl@0
   152
		{
sl@0
   153
		RC4_set_key(&key,keys[i][0],&(keys[i][1]));
sl@0
   154
    if(errno==ENOMEM)
sl@0
   155
    {
sl@0
   156
	    return 1;
sl@0
   157
	  }  
sl@0
   158
		memset(obuf,0x00,sizeof(obuf));
sl@0
   159
   if(errno==ENOMEM)
sl@0
   160
    {
sl@0
   161
	    return 1;
sl@0
   162
	  }  
sl@0
   163
sl@0
   164
		RC4(&key,data_len[i],&(data[i][0]),obuf);
sl@0
   165
   if(errno==ENOMEM)
sl@0
   166
    {
sl@0
   167
	    return 1;
sl@0
   168
	  }  
sl@0
   169
		
sl@0
   170
		if (memcmp(obuf,output[i],data_len[i]+1) != 0)
sl@0
   171
			{
sl@0
   172
			fprintf(stdout,"error calculating RC4\n");
sl@0
   173
			fprintf(stdout,"output:");
sl@0
   174
			for (j=0; j<data_len[i]+1U; j++)
sl@0
   175
				fprintf(stdout," %02x",obuf[j]);
sl@0
   176
			fprintf(stdout,"\n");
sl@0
   177
			fprintf(stdout,"expect:");
sl@0
   178
			p= &(output[i][0]);
sl@0
   179
			for (j=0; j<data_len[i]+1U; j++)
sl@0
   180
				fprintf(stdout," %02x",*(p++));
sl@0
   181
			fprintf(stdout,"\n");
sl@0
   182
			err++;
sl@0
   183
			}
sl@0
   184
		else
sl@0
   185
			fprintf(stdout,"test %d ok\n",i);
sl@0
   186
		}
sl@0
   187
	fprintf(stdout,"test end processing ");
sl@0
   188
	for (i=0; i<data_len[3]; i++)
sl@0
   189
		{
sl@0
   190
		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
sl@0
   191
		if(errno==ENOMEM)
sl@0
   192
    {
sl@0
   193
	    return 1;
sl@0
   194
	  }  
sl@0
   195
		memset(obuf,0x00,sizeof(obuf));
sl@0
   196
		RC4(&key,i,&(data[3][0]),obuf);
sl@0
   197
	   if(errno==ENOMEM)
sl@0
   198
    {
sl@0
   199
	    return 1;
sl@0
   200
	  }  
sl@0
   201
		if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0))
sl@0
   202
			{
sl@0
   203
			fprintf(stdout,"error in RC4 length processing\n");
sl@0
   204
			fprintf(stdout,"output:");
sl@0
   205
			for (j=0; j<i+1; j++)
sl@0
   206
				printf(" %02x",obuf[j]);
sl@0
   207
			fprintf(stdout,"\n");
sl@0
   208
			fprintf(stdout,"expect:");
sl@0
   209
			p= &(output[3][0]);
sl@0
   210
			for (j=0; j<i; j++)
sl@0
   211
				fprintf(stdout," %02x",*(p++));
sl@0
   212
			fprintf(stdout," 00\n");
sl@0
   213
			err++;
sl@0
   214
			}
sl@0
   215
		else
sl@0
   216
			{
sl@0
   217
			fprintf(stdout,".");
sl@0
   218
			fflush(stdout);
sl@0
   219
			}
sl@0
   220
		}
sl@0
   221
	fprintf(stdout,"done\n");
sl@0
   222
	fprintf(stdout,"test multi-call ");
sl@0
   223
	for (i=0; i<data_len[3]; i++)
sl@0
   224
		{
sl@0
   225
		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
sl@0
   226
	   if(errno==ENOMEM)
sl@0
   227
    {
sl@0
   228
	    return 1;
sl@0
   229
	  }  
sl@0
   230
		
sl@0
   231
		memset(obuf,0x00,sizeof(obuf));
sl@0
   232
		RC4(&key,i,&(data[3][0]),obuf);
sl@0
   233
	   if(errno==ENOMEM)
sl@0
   234
    {
sl@0
   235
	    return 1;
sl@0
   236
	  }  
sl@0
   237
		
sl@0
   238
		RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]));
sl@0
   239
	   if(errno==ENOMEM)
sl@0
   240
    {
sl@0
   241
	    return 1;
sl@0
   242
	  }  
sl@0
   243
		
sl@0
   244
		if (memcmp(obuf,output[3],data_len[3]+1) != 0)
sl@0
   245
			{
sl@0
   246
			fprintf(stdout,"error in RC4 multi-call processing\n");
sl@0
   247
			fprintf(stdout,"output:");
sl@0
   248
			for (j=0; j<data_len[3]+1U; j++)
sl@0
   249
				fprintf(stdout," %02x",obuf[j]);
sl@0
   250
			fprintf(stdout,"\n");
sl@0
   251
			fprintf(stdout,"expect:");
sl@0
   252
			p= &(output[3][0]);
sl@0
   253
			for (j=0; j<data_len[3]+1U; j++)
sl@0
   254
				fprintf(stdout," %02x",*(p++));
sl@0
   255
			err++;
sl@0
   256
			}
sl@0
   257
		else
sl@0
   258
			{
sl@0
   259
			fprintf(stdout,".");
sl@0
   260
			fflush(stdout);
sl@0
   261
			}
sl@0
   262
		}
sl@0
   263
	fprintf(stdout,"done\n");
sl@0
   264
	fprintf(stdout,"bulk test ");
sl@0
   265
	{   unsigned char buf[513];
sl@0
   266
	    SHA_CTX c;
sl@0
   267
	    unsigned char md[SHA_DIGEST_LENGTH];
sl@0
   268
	    static unsigned char expected[]={
sl@0
   269
		0xa4,0x7b,0xcc,0x00,0x3d,0xd0,0xbd,0xe1,0xac,0x5f,
sl@0
   270
		0x12,0x1e,0x45,0xbc,0xfb,0x1a,0xa1,0xf2,0x7f,0xc5 };
sl@0
   271
sl@0
   272
		RC4_set_key(&key,keys[0][0],&(keys[3][1]));
sl@0
   273
	   if(errno==ENOMEM)
sl@0
   274
    {
sl@0
   275
	    return 1;
sl@0
   276
	  }  
sl@0
   277
		
sl@0
   278
		memset(buf,'\0',sizeof(buf));
sl@0
   279
		SHA1_Init(&c);
sl@0
   280
			   if(errno==ENOMEM)
sl@0
   281
    {
sl@0
   282
	    return 1;
sl@0
   283
	  }  
sl@0
   284
sl@0
   285
		for (i=0;i<2571;i++) {
sl@0
   286
			RC4(&key,sizeof(buf),buf,buf);
sl@0
   287
		   if(errno==ENOMEM)
sl@0
   288
     {
sl@0
   289
	    return 1;
sl@0
   290
	   }  
sl@0
   291
sl@0
   292
			SHA1_Update(&c,buf,sizeof(buf));
sl@0
   293
		  if(errno==ENOMEM)
sl@0
   294
     {
sl@0
   295
	    return 1;
sl@0
   296
	   }  
sl@0
   297
sl@0
   298
		}
sl@0
   299
		SHA1_Final(md,&c);
sl@0
   300
		if(errno==ENOMEM)
sl@0
   301
    {
sl@0
   302
	    return 1;
sl@0
   303
	  }  
sl@0
   304
sl@0
   305
sl@0
   306
		if (memcmp(md,expected,sizeof(md))) {
sl@0
   307
			fprintf(stdout,"error in RC4 bulk test\n");
sl@0
   308
			fprintf(stdout,"output:");
sl@0
   309
			for (j=0; j<sizeof(md); j++)
sl@0
   310
				fprintf(stdout," %02x",md[j]);
sl@0
   311
			fprintf(stdout,"\n");
sl@0
   312
			fprintf(stdout,"expect:");
sl@0
   313
			for (j=0; j<sizeof(md); j++)
sl@0
   314
				fprintf(stdout," %02x",expected[j]);
sl@0
   315
			fprintf(stdout,"\n");
sl@0
   316
			err++;
sl@0
   317
		}
sl@0
   318
		else	fprintf(stdout,"ok\n");
sl@0
   319
	}
sl@0
   320
#ifdef OPENSSL_SYS_NETWARE
sl@0
   321
    if (err) fprintf(stdout,"ERROR: %d\n", err);
sl@0
   322
#endif
sl@0
   323
  fprintf(stdout,"Test case Passed\n");    
sl@0
   324
	//EXIT(err);
sl@0
   325
	return(0);
sl@0
   326
	}
sl@0
   327
#endif