sl@0: /* crypto/dh/dhtest.c */ sl@0: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) sl@0: * All rights reserved. sl@0: * sl@0: * This package is an SSL implementation written sl@0: * by Eric Young (eay@cryptsoft.com). sl@0: * The implementation was written so as to conform with Netscapes SSL. sl@0: * sl@0: * This library is free for commercial and non-commercial use as long as sl@0: * the following conditions are aheared to. The following conditions sl@0: * apply to all code found in this distribution, be it the RC4, RSA, sl@0: * lhash, DES, etc., code; not just the SSL code. The SSL documentation sl@0: * included with this distribution is covered by the same copyright terms sl@0: * except that the holder is Tim Hudson (tjh@cryptsoft.com). sl@0: * sl@0: * Copyright remains Eric Young's, and as such any Copyright notices in sl@0: * the code are not to be removed. sl@0: * If this package is used in a product, Eric Young should be given attribution sl@0: * as the author of the parts of the library used. sl@0: * This can be in the form of a textual message at program startup or sl@0: * in documentation (online or textual) provided with the package. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * 1. Redistributions of source code must retain the copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in the sl@0: * documentation and/or other materials provided with the distribution. sl@0: * 3. All advertising materials mentioning features or use of this software sl@0: * must display the following acknowledgement: sl@0: * "This product includes cryptographic software written by sl@0: * Eric Young (eay@cryptsoft.com)" sl@0: * The word 'cryptographic' can be left out if the rouines from the library sl@0: * being used are not cryptographic related :-). sl@0: * 4. If you include any Windows specific code (or a derivative thereof) from sl@0: * the apps directory (application code) you must include an acknowledgement: sl@0: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND sl@0: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE sl@0: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE sl@0: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL sl@0: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS sl@0: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT sl@0: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY sl@0: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF sl@0: * SUCH DAMAGE. sl@0: * sl@0: * The licence and distribution terms for any publically available version or sl@0: * derivative of this code cannot be changed. i.e. this code cannot simply be sl@0: * copied and put under another distribution licence sl@0: * [including the GNU Public Licence.] sl@0: */ sl@0: /* sl@0: © Portions copyright (c) 2006 Nokia Corporation. All rights reserved. sl@0: */ sl@0: /* Until the key-gen callbacks are modified to use newer prototypes, we allow sl@0: * deprecated functions for openssl-internal code */ sl@0: #ifndef SYMBIAN sl@0: #ifdef OPENSSL_NO_DEPRECATED sl@0: #undef OPENSSL_NO_DEPRECATED sl@0: #endif sl@0: #endif sl@0: #include sl@0: #include sl@0: #include sl@0: #ifndef SYMBIAN sl@0: #include "../e_os.h" sl@0: #else sl@0: #include "e_os.h" sl@0: #endif sl@0: sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: #ifdef SYMBIAN sl@0: #ifdef stdin sl@0: #undef stdin sl@0: #endif sl@0: #ifdef stdout sl@0: #undef stdout sl@0: #endif sl@0: #ifdef stderr sl@0: #undef stderr sl@0: #endif sl@0: sl@0: #define stdin fp_stdin sl@0: #define stdout fp_stdout sl@0: #define stderr fp_stderr sl@0: sl@0: extern FILE *fp_stdout; sl@0: extern FILE *fp_stderr; sl@0: #endif sl@0: #ifdef OPENSSL_NO_DH sl@0: int main(int argc, char *argv[]) sl@0: { sl@0: fprintf(stdout,"No DH support\n"); sl@0: return(0); sl@0: } sl@0: #else sl@0: #include sl@0: sl@0: #ifdef OPENSSL_SYS_WIN16 sl@0: #define MS_CALLBACK _far _loadds sl@0: #else sl@0: #define MS_CALLBACK sl@0: #endif sl@0: sl@0: static int MS_CALLBACK cb(int p, int n, BN_GENCB *arg); sl@0: sl@0: static const char rnd_seed[] = "string to make the random number generator think it has entropy"; sl@0: sl@0: #ifndef SYMBIAN sl@0: int main(int argc, char *argv[]) sl@0: #else sl@0: int dh_main(int argc, char *argv[]) sl@0: #endif sl@0: { sl@0: BN_GENCB _cb; sl@0: DH *a; sl@0: DH *b=NULL; sl@0: char buf[12]; sl@0: unsigned char *abuf=NULL,*bbuf=NULL; sl@0: int i,alen,blen,aout,bout,ret=1; sl@0: BIO *out; sl@0: sl@0: //CRYPTO_malloc_debug_init(); sl@0: //CRYPTO_dbg_set_options(V_CRYPTO_MDEBUG_ALL); sl@0: //CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); sl@0: sl@0: #ifdef OPENSSL_SYS_WIN32 sl@0: CRYPTO_malloc_init(); sl@0: #endif sl@0: sl@0: RAND_seed(rnd_seed, sizeof rnd_seed); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: out=BIO_new(BIO_s_file()); sl@0: if( out == NULL&& errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: if (out == NULL) sl@0: return 1; sl@0: //EXIT(1); sl@0: BIO_set_fp(out,stdout,BIO_NOCLOSE); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BN_GENCB_set(&_cb, &cb, out); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: if(((a = DH_new()) == NULL)) sl@0: { sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: goto err; sl@0: } sl@0: if( !DH_generate_parameters_ex(a, 64, sl@0: DH_GENERATOR_5, &_cb)) sl@0: { sl@0: if(a != NULL) DH_free(a); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: } sl@0: if (!DH_check(a, &i)) sl@0: { sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: goto err; sl@0: } sl@0: if (i & DH_CHECK_P_NOT_PRIME) sl@0: BIO_puts(out, "p value is not prime\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: if (i & DH_CHECK_P_NOT_SAFE_PRIME) sl@0: BIO_puts(out, "p value is not a safe prime\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: if (i & DH_UNABLE_TO_CHECK_GENERATOR) sl@0: BIO_puts(out, "unable to check the generator value\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: if (i & DH_NOT_SUITABLE_GENERATOR) sl@0: BIO_puts(out, "the g value is not a generator\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BIO_puts(out,"\np ="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BN_print(out,a->p); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BIO_puts(out,"\ng ="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BN_print(out,a->g); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BIO_puts(out,"\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: b=DH_new(); sl@0: if( b == NULL&& errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: if (b == NULL) goto err; sl@0: sl@0: b->p=BN_dup(a->p); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: b->g=BN_dup(a->g); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: if ((b->p == NULL) || (b->g == NULL)) sl@0: { sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: goto err; sl@0: } sl@0: sl@0: /* Set a to run with normal modexp and b to use constant time */ sl@0: a->flags &= ~DH_FLAG_NO_EXP_CONSTTIME; sl@0: b->flags |= DH_FLAG_NO_EXP_CONSTTIME; sl@0: sl@0: if (!DH_generate_key(a)) sl@0: { sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: goto err; sl@0: } sl@0: BIO_puts(out,"pri 1="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BN_print(out,a->priv_key); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BIO_puts(out,"\npub 1="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BN_print(out,a->pub_key); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BIO_puts(out,"\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: if (!DH_generate_key(b)) sl@0: { sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: goto err; sl@0: } sl@0: BIO_puts(out,"pri 2="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BN_print(out,b->priv_key); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BIO_puts(out,"\npub 2="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BN_print(out,b->pub_key); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BIO_puts(out,"\n"); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: alen=DH_size(a); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: abuf=(unsigned char *)OPENSSL_malloc(alen); sl@0: if(abuf== NULL&& errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: aout=DH_compute_key(abuf,b->pub_key,a); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: BIO_puts(out,"key1 ="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: for (i=0; ipub_key,b); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: BIO_puts(out,"key2 ="); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: for (i=0; iarg,&c,1); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: (void)BIO_flush(arg->arg); sl@0: if(errno==ENOMEM) sl@0: { sl@0: return 1; sl@0: } sl@0: sl@0: #ifdef LINT sl@0: p=n; sl@0: #endif sl@0: return 1; sl@0: } sl@0: #endif