os/ossrv/ssl/tsrc/crypto_test/src/rc4test.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 /* crypto/rc4/rc4test.c */
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     3  * All rights reserved.
     4  *
     5  * This package is an SSL implementation written
     6  * by Eric Young (eay@cryptsoft.com).
     7  * The implementation was written so as to conform with Netscapes SSL.
     8  * 
     9  * This library is free for commercial and non-commercial use as long as
    10  * the following conditions are aheared to.  The following conditions
    11  * apply to all code found in this distribution, be it the RC4, RSA,
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    13  * included with this distribution is covered by the same copyright terms
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    15  * 
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
    17  * the code are not to be removed.
    18  * If this package is used in a product, Eric Young should be given attribution
    19  * as the author of the parts of the library used.
    20  * This can be in the form of a textual message at program startup or
    21  * in documentation (online or textual) provided with the package.
    22  * 
    23  * Redistribution and use in source and binary forms, with or without
    24  * modification, are permitted provided that the following conditions
    25  * are met:
    26  * 1. Redistributions of source code must retain the copyright
    27  *    notice, this list of conditions and the following disclaimer.
    28  * 2. Redistributions in binary form must reproduce the above copyright
    29  *    notice, this list of conditions and the following disclaimer in the
    30  *    documentation and/or other materials provided with the distribution.
    31  * 3. All advertising materials mentioning features or use of this software
    32  *    must display the following acknowledgement:
    33  *    "This product includes cryptographic software written by
    34  *     Eric Young (eay@cryptsoft.com)"
    35  *    The word 'cryptographic' can be left out if the rouines from the library
    36  *    being used are not cryptographic related :-).
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
    38  *    the apps directory (application code) you must include an acknowledgement:
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    40  * 
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    51  * SUCH DAMAGE.
    52  * 
    53  * The licence and distribution terms for any publically available version or
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    55  * copied and put under another distribution licence
    56  * [including the GNU Public Licence.]
    57  */
    58 /*
    59  © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
    60  */
    61 #include <stdio.h>
    62 #include <stdlib.h>
    63 #include <string.h>
    64 #include <errno.h>
    65 #ifndef SYMBIAN
    66 #include "../e_os.h"
    67 #else
    68 #include "e_os.h"
    69 #endif
    70 #include <openssl/rc2.h>
    71 #ifdef SYMBIAN
    72 #ifdef stdin
    73 #undef stdin
    74 #endif
    75 #ifdef stdout
    76 #undef stdout
    77 #endif
    78 #ifdef stderr
    79 #undef stderr
    80 #endif
    81 
    82 #define stdin fp_stdin
    83 #define stdout fp_stdout
    84 #define stderr fp_stderr
    85 
    86 extern FILE *fp_stdout;
    87 extern FILE *fp_stderr;
    88 #endif
    89 
    90 #ifdef OPENSSL_NO_RC4
    91 int main(int argc, char *argv[])
    92 {
    93     fprintf(stdout,"No RC4 support\n");
    94     return(0);
    95 }
    96 #else
    97 #include <openssl/rc4.h>
    98 #include <openssl/sha.h>
    99 
   100 static unsigned char keys[7][30]={
   101 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
   102 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
   103 	{8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
   104 	{4,0xef,0x01,0x23,0x45},
   105 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
   106 	{4,0xef,0x01,0x23,0x45},
   107 	};
   108 
   109 static unsigned char data_len[7]={8,8,8,20,28,10};
   110 static unsigned char data[7][30]={
   111 	{0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,0xff},
   112 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
   113 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
   114 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
   115 	   0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
   116 	   0x00,0x00,0x00,0x00,0xff},
   117 	{0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
   118 	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
   119 	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
   120 	   0x12,0x34,0x56,0x78,0xff},
   121 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
   122 	{0},
   123 	};
   124 
   125 static unsigned char output[7][30]={
   126 	{0x75,0xb7,0x87,0x80,0x99,0xe0,0xc5,0x96,0x00},
   127 	{0x74,0x94,0xc2,0xe7,0x10,0x4b,0x08,0x79,0x00},
   128 	{0xde,0x18,0x89,0x41,0xa3,0x37,0x5d,0x3a,0x00},
   129 	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,
   130 	 0xbd,0x61,0x5a,0x11,0x62,0xe1,0xc7,0xba,
   131 	 0x36,0xb6,0x78,0x58,0x00},
   132 	{0x66,0xa0,0x94,0x9f,0x8a,0xf7,0xd6,0x89,
   133 	 0x1f,0x7f,0x83,0x2b,0xa8,0x33,0xc0,0x0c,
   134 	 0x89,0x2e,0xbe,0x30,0x14,0x3c,0xe2,0x87,
   135 	 0x40,0x01,0x1e,0xcf,0x00},
   136 	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,0xbd,0x61,0x00},
   137 	{0},
   138 	};
   139 #ifndef SYMBIAN
   140 int main(int argc, char *argv[])
   141 #else
   142 int rc4_main(int argc, char *argv[])
   143 #endif
   144 	{
   145 	int err=0;
   146 	unsigned int i, j;
   147 	unsigned char *p;
   148 	RC4_KEY key;
   149 	unsigned char obuf[512];
   150     
   151 	for (i=0; i<6; i++)
   152 		{
   153 		RC4_set_key(&key,keys[i][0],&(keys[i][1]));
   154     if(errno==ENOMEM)
   155     {
   156 	    return 1;
   157 	  }  
   158 		memset(obuf,0x00,sizeof(obuf));
   159    if(errno==ENOMEM)
   160     {
   161 	    return 1;
   162 	  }  
   163 
   164 		RC4(&key,data_len[i],&(data[i][0]),obuf);
   165    if(errno==ENOMEM)
   166     {
   167 	    return 1;
   168 	  }  
   169 		
   170 		if (memcmp(obuf,output[i],data_len[i]+1) != 0)
   171 			{
   172 			fprintf(stdout,"error calculating RC4\n");
   173 			fprintf(stdout,"output:");
   174 			for (j=0; j<data_len[i]+1U; j++)
   175 				fprintf(stdout," %02x",obuf[j]);
   176 			fprintf(stdout,"\n");
   177 			fprintf(stdout,"expect:");
   178 			p= &(output[i][0]);
   179 			for (j=0; j<data_len[i]+1U; j++)
   180 				fprintf(stdout," %02x",*(p++));
   181 			fprintf(stdout,"\n");
   182 			err++;
   183 			}
   184 		else
   185 			fprintf(stdout,"test %d ok\n",i);
   186 		}
   187 	fprintf(stdout,"test end processing ");
   188 	for (i=0; i<data_len[3]; i++)
   189 		{
   190 		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
   191 		if(errno==ENOMEM)
   192     {
   193 	    return 1;
   194 	  }  
   195 		memset(obuf,0x00,sizeof(obuf));
   196 		RC4(&key,i,&(data[3][0]),obuf);
   197 	   if(errno==ENOMEM)
   198     {
   199 	    return 1;
   200 	  }  
   201 		if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0))
   202 			{
   203 			fprintf(stdout,"error in RC4 length processing\n");
   204 			fprintf(stdout,"output:");
   205 			for (j=0; j<i+1; j++)
   206 				printf(" %02x",obuf[j]);
   207 			fprintf(stdout,"\n");
   208 			fprintf(stdout,"expect:");
   209 			p= &(output[3][0]);
   210 			for (j=0; j<i; j++)
   211 				fprintf(stdout," %02x",*(p++));
   212 			fprintf(stdout," 00\n");
   213 			err++;
   214 			}
   215 		else
   216 			{
   217 			fprintf(stdout,".");
   218 			fflush(stdout);
   219 			}
   220 		}
   221 	fprintf(stdout,"done\n");
   222 	fprintf(stdout,"test multi-call ");
   223 	for (i=0; i<data_len[3]; i++)
   224 		{
   225 		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
   226 	   if(errno==ENOMEM)
   227     {
   228 	    return 1;
   229 	  }  
   230 		
   231 		memset(obuf,0x00,sizeof(obuf));
   232 		RC4(&key,i,&(data[3][0]),obuf);
   233 	   if(errno==ENOMEM)
   234     {
   235 	    return 1;
   236 	  }  
   237 		
   238 		RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]));
   239 	   if(errno==ENOMEM)
   240     {
   241 	    return 1;
   242 	  }  
   243 		
   244 		if (memcmp(obuf,output[3],data_len[3]+1) != 0)
   245 			{
   246 			fprintf(stdout,"error in RC4 multi-call processing\n");
   247 			fprintf(stdout,"output:");
   248 			for (j=0; j<data_len[3]+1U; j++)
   249 				fprintf(stdout," %02x",obuf[j]);
   250 			fprintf(stdout,"\n");
   251 			fprintf(stdout,"expect:");
   252 			p= &(output[3][0]);
   253 			for (j=0; j<data_len[3]+1U; j++)
   254 				fprintf(stdout," %02x",*(p++));
   255 			err++;
   256 			}
   257 		else
   258 			{
   259 			fprintf(stdout,".");
   260 			fflush(stdout);
   261 			}
   262 		}
   263 	fprintf(stdout,"done\n");
   264 	fprintf(stdout,"bulk test ");
   265 	{   unsigned char buf[513];
   266 	    SHA_CTX c;
   267 	    unsigned char md[SHA_DIGEST_LENGTH];
   268 	    static unsigned char expected[]={
   269 		0xa4,0x7b,0xcc,0x00,0x3d,0xd0,0xbd,0xe1,0xac,0x5f,
   270 		0x12,0x1e,0x45,0xbc,0xfb,0x1a,0xa1,0xf2,0x7f,0xc5 };
   271 
   272 		RC4_set_key(&key,keys[0][0],&(keys[3][1]));
   273 	   if(errno==ENOMEM)
   274     {
   275 	    return 1;
   276 	  }  
   277 		
   278 		memset(buf,'\0',sizeof(buf));
   279 		SHA1_Init(&c);
   280 			   if(errno==ENOMEM)
   281     {
   282 	    return 1;
   283 	  }  
   284 
   285 		for (i=0;i<2571;i++) {
   286 			RC4(&key,sizeof(buf),buf,buf);
   287 		   if(errno==ENOMEM)
   288      {
   289 	    return 1;
   290 	   }  
   291 
   292 			SHA1_Update(&c,buf,sizeof(buf));
   293 		  if(errno==ENOMEM)
   294      {
   295 	    return 1;
   296 	   }  
   297 
   298 		}
   299 		SHA1_Final(md,&c);
   300 		if(errno==ENOMEM)
   301     {
   302 	    return 1;
   303 	  }  
   304 
   305 
   306 		if (memcmp(md,expected,sizeof(md))) {
   307 			fprintf(stdout,"error in RC4 bulk test\n");
   308 			fprintf(stdout,"output:");
   309 			for (j=0; j<sizeof(md); j++)
   310 				fprintf(stdout," %02x",md[j]);
   311 			fprintf(stdout,"\n");
   312 			fprintf(stdout,"expect:");
   313 			for (j=0; j<sizeof(md); j++)
   314 				fprintf(stdout," %02x",expected[j]);
   315 			fprintf(stdout,"\n");
   316 			err++;
   317 		}
   318 		else	fprintf(stdout,"ok\n");
   319 	}
   320 #ifdef OPENSSL_SYS_NETWARE
   321     if (err) fprintf(stdout,"ERROR: %d\n", err);
   322 #endif
   323   fprintf(stdout,"Test case Passed\n");    
   324 	//EXIT(err);
   325 	return(0);
   326 	}
   327 #endif