1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/crypto/weakcryptospi/test/tasymmetric/script_gen/keys.c Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,174 @@
1.4 +/*
1.5 +* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of the License "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +* Some RSA key pairs.
1.19 +*
1.20 +*/
1.21 +
1.22 +
1.23 +
1.24 +
1.25 +/**
1.26 + @file
1.27 +*/
1.28 +
1.29 +#include "keys.h"
1.30 +
1.31 +RSA* key1; /* modulus is 64 bytes */
1.32 +RSA* key2; /* modulus is 50 bytes */
1.33 +RSA* key3; /* modulus is 128 bytes */
1.34 +
1.35 +#define SetKey \
1.36 + key->n = BN_bin2bn(n, sizeof(n)-1, key->n); \
1.37 + key->e = BN_bin2bn(e, sizeof(e)-1, key->e); \
1.38 + key->d = BN_bin2bn(d, sizeof(d)-1, key->d); \
1.39 + key->p = BN_bin2bn(p, sizeof(p)-1, key->p); \
1.40 + key->q = BN_bin2bn(q, sizeof(q)-1, key->q); \
1.41 + key->dmp1 = BN_bin2bn(dmp1, sizeof(dmp1)-1, key->dmp1); \
1.42 + key->dmq1 = BN_bin2bn(dmq1, sizeof(dmq1)-1, key->dmq1); \
1.43 + key->iqmp = BN_bin2bn(iqmp, sizeof(iqmp)-1, key->iqmp);
1.44 +
1.45 +static void setKey1(RSA *key)
1.46 + {
1.47 + static unsigned char n[] =
1.48 +"\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F"
1.49 +"\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5"
1.50 +"\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93"
1.51 +"\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1"
1.52 +"\xF5";
1.53 +
1.54 + static unsigned char e[] = "\x11";
1.55 +
1.56 + static unsigned char d[] =
1.57 +"\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44"
1.58 +"\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64"
1.59 +"\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9"
1.60 +"\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51";
1.61 +
1.62 + static unsigned char p[] =
1.63 +"\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5"
1.64 +"\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12"
1.65 +"\x0D";
1.66 +
1.67 + static unsigned char q[] =
1.68 +"\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
1.69 +"\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D"
1.70 +"\x89";
1.71 +
1.72 + static unsigned char dmp1[] =
1.73 +"\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF"
1.74 +"\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05";
1.75 +
1.76 + static unsigned char dmq1[] =
1.77 +"\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99"
1.78 +"\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D"
1.79 +"\x51";
1.80 +
1.81 + static unsigned char iqmp[] =
1.82 +"\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8"
1.83 +"\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26";
1.84 +
1.85 + SetKey;
1.86 + }
1.87 +
1.88 +static void setKey2(RSA *key)
1.89 + {
1.90 + static unsigned char n[] =
1.91 +"\x00\xA3\x07\x9A\x90\xDF\x0D\xFD\x72\xAC\x09\x0C\xCC\x2A\x78\xB8"
1.92 +"\x74\x13\x13\x3E\x40\x75\x9C\x98\xFA\xF8\x20\x4F\x35\x8A\x0B\x26"
1.93 +"\x3C\x67\x70\xE7\x83\xA9\x3B\x69\x71\xB7\x37\x79\xD2\x71\x7B\xE8"
1.94 +"\x34\x77\xCF";
1.95 +
1.96 + static unsigned char e[] = "\x3";
1.97 +
1.98 + static unsigned char d[] =
1.99 +"\x6C\xAF\xBC\x60\x94\xB3\xFE\x4C\x72\xB0\xB3\x32\xC6\xFB\x25\xA2"
1.100 +"\xB7\x62\x29\x80\x4E\x68\x65\xFC\xA4\x5A\x74\xDF\x0F\x8F\xB8\x41"
1.101 +"\x3B\x52\xC0\xD0\xE5\x3D\x9B\x59\x0F\xF1\x9B\xE7\x9F\x49\xDD\x21"
1.102 +"\xE5\xEB";
1.103 +
1.104 + static unsigned char p[] =
1.105 +"\x00\xCF\x20\x35\x02\x8B\x9D\x86\x98\x40\xB4\x16\x66\xB4\x2E\x92"
1.106 +"\xEA\x0D\xA3\xB4\x32\x04\xB5\xCF\xCE\x91";
1.107 +
1.108 + static unsigned char q[] =
1.109 +"\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
1.110 +"\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5F";
1.111 +
1.112 + static unsigned char dmp1[] =
1.113 +"\x00\x8A\x15\x78\xAC\x5D\x13\xAF\x10\x2B\x22\xB9\x99\xCD\x74\x61"
1.114 +"\xF1\x5E\x6D\x22\xCC\x03\x23\xDF\xDF\x0B";
1.115 +
1.116 + static unsigned char dmq1[] =
1.117 +"\x00\x86\x55\x21\x4A\xC5\x4D\x8D\x4E\xCD\x61\x77\xF1\xC7\x36\x90"
1.118 +"\xCE\x2A\x48\x2C\x8B\x05\x99\xCB\xE0\x3F";
1.119 +
1.120 + static unsigned char iqmp[] =
1.121 +"\x00\x83\xEF\xEF\xB8\xA9\xA4\x0D\x1D\xB6\xED\x98\xAD\x84\xED\x13"
1.122 +"\x35\xDC\xC1\x08\xF3\x22\xD0\x57\xCF\x8D";
1.123 +
1.124 + SetKey;
1.125 + }
1.126 +
1.127 +static RSA* createRSAKey3()
1.128 + {
1.129 + unsigned char n_data[] =
1.130 + "\xa3\x50\x45\x34\xc2\x9c\x59\xca\x9a\x34\xcb\xb9\x5a\x18\xd4\x35"
1.131 + "\xfe\x66\xfb\xc7\xde\xcd\x57\x2b\x91\xc8\x0f\x72\xee\x07\x86\xd4"
1.132 + "\xdd\x92\xf8\xb8\x41\x6d\x54\xbd\xe1\x2d\xf2\xe8\x3f\x8d\xc9\xb1"
1.133 + "\x64\x29\x80\xbd\x31\x85\x26\x50\xa5\xa8\xf6\xd6\xd8\xc6\xa9\xbe"
1.134 + "\x96\x5b\x34\xfe\x76\x59\xac\x5d\xd3\x72\xab\x91\x27\x7b\x2c\x9c"
1.135 + "\xeb\x79\x7c\x4b\x4b\x58\x88\xe3\x3c\x0d\x2c\xfb\xe9\xaa\xd5\x3e"
1.136 + "\x15\x84\x75\xed\x88\x88\x4d\x5d\xcc\x66\x3a\xf5\xaa\xa6\x20\x30"
1.137 + "\xe3\x79\x9f\xaa\x1f\xa4\x7a\xb2\x66\x52\x08\x59\x7f\x35\x84\x97";
1.138 +
1.139 + int n_data_len = 128;
1.140 +
1.141 + unsigned char e_data[] =
1.142 + "\x01\x00\x01";
1.143 +
1.144 + int e_data_len = 3;
1.145 +
1.146 + unsigned char d_data[] =
1.147 + "\x85\xb3\xb3\xd4\xeb\xf6\xc0\xf4\x43\xa7\x31\x9a\x7f\x8e\x90\x3d"
1.148 + "\xdc\x17\x47\xce\x6c\x33\xc4\x47\xe1\x43\xde\x92\x03\x19\x9a\x63"
1.149 + "\x2f\x3b\xa1\xf0\x87\x70\x10\xce\x9b\x49\xd8\xf2\x17\x05\xe7\xb8"
1.150 + "\x18\xfe\x79\x6d\x6a\xdb\x4d\x70\xfd\x0f\x05\x77\x03\x66\x31\x94"
1.151 + "\x8d\xd2\x1f\xfe\x77\x15\x7a\xaf\x97\x88\x57\xe4\x35\x8d\xed\x82"
1.152 + "\xb5\x8c\xc8\x5f\x5e\xf7\x04\x80\xff\xd7\xbe\x08\x48\xda\xfb\x98"
1.153 + "\x35\x43\xb2\xe8\x67\xf8\x31\x55\x08\x4d\x85\x41\xa1\x4b\x5e\xa6"
1.154 + "\xcf\x5f\xcb\x65\x11\x27\xb2\xc6\x43\x83\x11\x4f\x02\xa1\x4c\xb1";
1.155 +
1.156 + int d_data_len = 128;
1.157 +
1.158 + RSA* key = RSA_new();
1.159 + key->n = BN_new();
1.160 + key->e = BN_new();
1.161 + key->d = BN_new();
1.162 + BN_bin2bn(n_data, n_data_len, key->n);
1.163 + BN_bin2bn(e_data, e_data_len, key->e);
1.164 + BN_bin2bn(d_data, d_data_len, key->d);
1.165 + return key;
1.166 + }
1.167 +
1.168 +void initKeys()
1.169 + {
1.170 + key1 = RSA_new();
1.171 + key2 = RSA_new();
1.172 +
1.173 + setKey1(key1);
1.174 + setKey2(key2);
1.175 +
1.176 + key3 = createRSAKey3();
1.177 + }