ssl/tsrc/crypto_test/src/rc4test.c
changeset 31 ce057bb09d0b
parent 0 e4d67989cc36
equal deleted inserted replaced
30:e20de85af2ee 31:ce057bb09d0b
       
     1 /* crypto/rc4/rc4test.c */
       
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
       
     3  * All rights reserved.
       
     4  *
       
     5  * This package is an SSL implementation written
       
     6  * by Eric Young (eay@cryptsoft.com).
       
     7  * The implementation was written so as to conform with Netscapes SSL.
       
     8  * 
       
     9  * This library is free for commercial and non-commercial use as long as
       
    10  * the following conditions are aheared to.  The following conditions
       
    11  * apply to all code found in this distribution, be it the RC4, RSA,
       
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
       
    13  * included with this distribution is covered by the same copyright terms
       
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
       
    15  * 
       
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
       
    17  * the code are not to be removed.
       
    18  * If this package is used in a product, Eric Young should be given attribution
       
    19  * as the author of the parts of the library used.
       
    20  * This can be in the form of a textual message at program startup or
       
    21  * in documentation (online or textual) provided with the package.
       
    22  * 
       
    23  * Redistribution and use in source and binary forms, with or without
       
    24  * modification, are permitted provided that the following conditions
       
    25  * are met:
       
    26  * 1. Redistributions of source code must retain the copyright
       
    27  *    notice, this list of conditions and the following disclaimer.
       
    28  * 2. Redistributions in binary form must reproduce the above copyright
       
    29  *    notice, this list of conditions and the following disclaimer in the
       
    30  *    documentation and/or other materials provided with the distribution.
       
    31  * 3. All advertising materials mentioning features or use of this software
       
    32  *    must display the following acknowledgement:
       
    33  *    "This product includes cryptographic software written by
       
    34  *     Eric Young (eay@cryptsoft.com)"
       
    35  *    The word 'cryptographic' can be left out if the rouines from the library
       
    36  *    being used are not cryptographic related :-).
       
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
       
    38  *    the apps directory (application code) you must include an acknowledgement:
       
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
       
    40  * 
       
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
       
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
       
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
       
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
       
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
       
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
       
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
       
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
       
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
       
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
       
    51  * SUCH DAMAGE.
       
    52  * 
       
    53  * The licence and distribution terms for any publically available version or
       
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
       
    55  * copied and put under another distribution licence
       
    56  * [including the GNU Public Licence.]
       
    57  */
       
    58 /*
       
    59  © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
       
    60  */
       
    61 #include <stdio.h>
       
    62 #include <stdlib.h>
       
    63 #include <string.h>
       
    64 #include <errno.h>
       
    65 #ifndef SYMBIAN
       
    66 #include "../e_os.h"
       
    67 #else
       
    68 #include "e_os.h"
       
    69 #endif
       
    70 #include <openssl/rc2.h>
       
    71 #ifdef SYMBIAN
       
    72 #ifdef stdin
       
    73 #undef stdin
       
    74 #endif
       
    75 #ifdef stdout
       
    76 #undef stdout
       
    77 #endif
       
    78 #ifdef stderr
       
    79 #undef stderr
       
    80 #endif
       
    81 
       
    82 #define stdin fp_stdin
       
    83 #define stdout fp_stdout
       
    84 #define stderr fp_stderr
       
    85 
       
    86 extern FILE *fp_stdout;
       
    87 extern FILE *fp_stderr;
       
    88 #endif
       
    89 
       
    90 #ifdef OPENSSL_NO_RC4
       
    91 int main(int argc, char *argv[])
       
    92 {
       
    93     fprintf(stdout,"No RC4 support\n");
       
    94     return(0);
       
    95 }
       
    96 #else
       
    97 #include <openssl/rc4.h>
       
    98 #include <openssl/sha.h>
       
    99 
       
   100 static unsigned char keys[7][30]={
       
   101 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
       
   102 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
       
   103 	{8,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00},
       
   104 	{4,0xef,0x01,0x23,0x45},
       
   105 	{8,0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef},
       
   106 	{4,0xef,0x01,0x23,0x45},
       
   107 	};
       
   108 
       
   109 static unsigned char data_len[7]={8,8,8,20,28,10};
       
   110 static unsigned char data[7][30]={
       
   111 	{0x01,0x23,0x45,0x67,0x89,0xab,0xcd,0xef,0xff},
       
   112 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
       
   113 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
       
   114 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
       
   115 	   0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,
       
   116 	   0x00,0x00,0x00,0x00,0xff},
       
   117 	{0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
       
   118 	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
       
   119 	   0x12,0x34,0x56,0x78,0x9A,0xBC,0xDE,0xF0,
       
   120 	   0x12,0x34,0x56,0x78,0xff},
       
   121 	{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0xff},
       
   122 	{0},
       
   123 	};
       
   124 
       
   125 static unsigned char output[7][30]={
       
   126 	{0x75,0xb7,0x87,0x80,0x99,0xe0,0xc5,0x96,0x00},
       
   127 	{0x74,0x94,0xc2,0xe7,0x10,0x4b,0x08,0x79,0x00},
       
   128 	{0xde,0x18,0x89,0x41,0xa3,0x37,0x5d,0x3a,0x00},
       
   129 	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,
       
   130 	 0xbd,0x61,0x5a,0x11,0x62,0xe1,0xc7,0xba,
       
   131 	 0x36,0xb6,0x78,0x58,0x00},
       
   132 	{0x66,0xa0,0x94,0x9f,0x8a,0xf7,0xd6,0x89,
       
   133 	 0x1f,0x7f,0x83,0x2b,0xa8,0x33,0xc0,0x0c,
       
   134 	 0x89,0x2e,0xbe,0x30,0x14,0x3c,0xe2,0x87,
       
   135 	 0x40,0x01,0x1e,0xcf,0x00},
       
   136 	{0xd6,0xa1,0x41,0xa7,0xec,0x3c,0x38,0xdf,0xbd,0x61,0x00},
       
   137 	{0},
       
   138 	};
       
   139 #ifndef SYMBIAN
       
   140 int main(int argc, char *argv[])
       
   141 #else
       
   142 int rc4_main(int argc, char *argv[])
       
   143 #endif
       
   144 	{
       
   145 	int err=0;
       
   146 	unsigned int i, j;
       
   147 	unsigned char *p;
       
   148 	RC4_KEY key;
       
   149 	unsigned char obuf[512];
       
   150     
       
   151 	for (i=0; i<6; i++)
       
   152 		{
       
   153 		RC4_set_key(&key,keys[i][0],&(keys[i][1]));
       
   154     if(errno==ENOMEM)
       
   155     {
       
   156 	    return 1;
       
   157 	  }  
       
   158 		memset(obuf,0x00,sizeof(obuf));
       
   159    if(errno==ENOMEM)
       
   160     {
       
   161 	    return 1;
       
   162 	  }  
       
   163 
       
   164 		RC4(&key,data_len[i],&(data[i][0]),obuf);
       
   165    if(errno==ENOMEM)
       
   166     {
       
   167 	    return 1;
       
   168 	  }  
       
   169 		
       
   170 		if (memcmp(obuf,output[i],data_len[i]+1) != 0)
       
   171 			{
       
   172 			fprintf(stdout,"error calculating RC4\n");
       
   173 			fprintf(stdout,"output:");
       
   174 			for (j=0; j<data_len[i]+1U; j++)
       
   175 				fprintf(stdout," %02x",obuf[j]);
       
   176 			fprintf(stdout,"\n");
       
   177 			fprintf(stdout,"expect:");
       
   178 			p= &(output[i][0]);
       
   179 			for (j=0; j<data_len[i]+1U; j++)
       
   180 				fprintf(stdout," %02x",*(p++));
       
   181 			fprintf(stdout,"\n");
       
   182 			err++;
       
   183 			}
       
   184 		else
       
   185 			fprintf(stdout,"test %d ok\n",i);
       
   186 		}
       
   187 	fprintf(stdout,"test end processing ");
       
   188 	for (i=0; i<data_len[3]; i++)
       
   189 		{
       
   190 		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
       
   191 		if(errno==ENOMEM)
       
   192     {
       
   193 	    return 1;
       
   194 	  }  
       
   195 		memset(obuf,0x00,sizeof(obuf));
       
   196 		RC4(&key,i,&(data[3][0]),obuf);
       
   197 	   if(errno==ENOMEM)
       
   198     {
       
   199 	    return 1;
       
   200 	  }  
       
   201 		if ((memcmp(obuf,output[3],i) != 0) || (obuf[i] != 0))
       
   202 			{
       
   203 			fprintf(stdout,"error in RC4 length processing\n");
       
   204 			fprintf(stdout,"output:");
       
   205 			for (j=0; j<i+1; j++)
       
   206 				printf(" %02x",obuf[j]);
       
   207 			fprintf(stdout,"\n");
       
   208 			fprintf(stdout,"expect:");
       
   209 			p= &(output[3][0]);
       
   210 			for (j=0; j<i; j++)
       
   211 				fprintf(stdout," %02x",*(p++));
       
   212 			fprintf(stdout," 00\n");
       
   213 			err++;
       
   214 			}
       
   215 		else
       
   216 			{
       
   217 			fprintf(stdout,".");
       
   218 			fflush(stdout);
       
   219 			}
       
   220 		}
       
   221 	fprintf(stdout,"done\n");
       
   222 	fprintf(stdout,"test multi-call ");
       
   223 	for (i=0; i<data_len[3]; i++)
       
   224 		{
       
   225 		RC4_set_key(&key,keys[3][0],&(keys[3][1]));
       
   226 	   if(errno==ENOMEM)
       
   227     {
       
   228 	    return 1;
       
   229 	  }  
       
   230 		
       
   231 		memset(obuf,0x00,sizeof(obuf));
       
   232 		RC4(&key,i,&(data[3][0]),obuf);
       
   233 	   if(errno==ENOMEM)
       
   234     {
       
   235 	    return 1;
       
   236 	  }  
       
   237 		
       
   238 		RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]));
       
   239 	   if(errno==ENOMEM)
       
   240     {
       
   241 	    return 1;
       
   242 	  }  
       
   243 		
       
   244 		if (memcmp(obuf,output[3],data_len[3]+1) != 0)
       
   245 			{
       
   246 			fprintf(stdout,"error in RC4 multi-call processing\n");
       
   247 			fprintf(stdout,"output:");
       
   248 			for (j=0; j<data_len[3]+1U; j++)
       
   249 				fprintf(stdout," %02x",obuf[j]);
       
   250 			fprintf(stdout,"\n");
       
   251 			fprintf(stdout,"expect:");
       
   252 			p= &(output[3][0]);
       
   253 			for (j=0; j<data_len[3]+1U; j++)
       
   254 				fprintf(stdout," %02x",*(p++));
       
   255 			err++;
       
   256 			}
       
   257 		else
       
   258 			{
       
   259 			fprintf(stdout,".");
       
   260 			fflush(stdout);
       
   261 			}
       
   262 		}
       
   263 	fprintf(stdout,"done\n");
       
   264 	fprintf(stdout,"bulk test ");
       
   265 	{   unsigned char buf[513];
       
   266 	    SHA_CTX c;
       
   267 	    unsigned char md[SHA_DIGEST_LENGTH];
       
   268 	    static unsigned char expected[]={
       
   269 		0xa4,0x7b,0xcc,0x00,0x3d,0xd0,0xbd,0xe1,0xac,0x5f,
       
   270 		0x12,0x1e,0x45,0xbc,0xfb,0x1a,0xa1,0xf2,0x7f,0xc5 };
       
   271 
       
   272 		RC4_set_key(&key,keys[0][0],&(keys[3][1]));
       
   273 	   if(errno==ENOMEM)
       
   274     {
       
   275 	    return 1;
       
   276 	  }  
       
   277 		
       
   278 		memset(buf,'\0',sizeof(buf));
       
   279 		SHA1_Init(&c);
       
   280 			   if(errno==ENOMEM)
       
   281     {
       
   282 	    return 1;
       
   283 	  }  
       
   284 
       
   285 		for (i=0;i<2571;i++) {
       
   286 			RC4(&key,sizeof(buf),buf,buf);
       
   287 		   if(errno==ENOMEM)
       
   288      {
       
   289 	    return 1;
       
   290 	   }  
       
   291 
       
   292 			SHA1_Update(&c,buf,sizeof(buf));
       
   293 		  if(errno==ENOMEM)
       
   294      {
       
   295 	    return 1;
       
   296 	   }  
       
   297 
       
   298 		}
       
   299 		SHA1_Final(md,&c);
       
   300 		if(errno==ENOMEM)
       
   301     {
       
   302 	    return 1;
       
   303 	  }  
       
   304 
       
   305 
       
   306 		if (memcmp(md,expected,sizeof(md))) {
       
   307 			fprintf(stdout,"error in RC4 bulk test\n");
       
   308 			fprintf(stdout,"output:");
       
   309 			for (j=0; j<sizeof(md); j++)
       
   310 				fprintf(stdout," %02x",md[j]);
       
   311 			fprintf(stdout,"\n");
       
   312 			fprintf(stdout,"expect:");
       
   313 			for (j=0; j<sizeof(md); j++)
       
   314 				fprintf(stdout," %02x",expected[j]);
       
   315 			fprintf(stdout,"\n");
       
   316 			err++;
       
   317 		}
       
   318 		else	fprintf(stdout,"ok\n");
       
   319 	}
       
   320 #ifdef OPENSSL_SYS_NETWARE
       
   321     if (err) fprintf(stdout,"ERROR: %d\n", err);
       
   322 #endif
       
   323   fprintf(stdout,"Test case Passed\n");    
       
   324 	//EXIT(err);
       
   325 	return(0);
       
   326 	}
       
   327 #endif