]>
git.ipfire.org Git - thirdparty/openssl.git/blob - fips/sha/fips_shatest.c
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
5 /* ====================================================================
6 * Copyright (c) 2005 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
59 #define OPENSSL_FIPSAPI
64 #include <openssl/bio.h>
65 #include <openssl/evp.h>
66 #include <openssl/err.h>
67 #include <openssl/bn.h>
71 int main(int argc
, char *argv
[])
73 printf("No FIPS SHAXXX support\n");
79 #include <openssl/fips.h>
83 static int dgst_test(FILE *out
, FILE *in
);
84 static int print_dgst(const EVP_MD
*md
, FILE *out
,
85 unsigned char *Msg
, int Msglen
);
86 static int print_monte(const EVP_MD
*md
, FILE *out
,
87 unsigned char *Seed
, int SeedLen
);
90 int fips_shatest_main(int argc
, char **argv
)
92 int main(int argc
, char **argv
)
95 FILE *in
= NULL
, *out
= NULL
;
103 in
= fopen(argv
[1], "r");
108 out
= fopen(argv
[2], "w");
112 fprintf(stderr
, "FATAL input initialization error\n");
118 fprintf(stderr
, "FATAL output initialization error\n");
122 if (!dgst_test(out
, in
))
124 fprintf(stderr
, "FATAL digest file processing error\n");
132 if (in
&& (in
!= stdin
))
134 if (out
&& (out
!= stdout
))
141 #define SHA_TEST_MAX_BITS 102400
142 #define SHA_TEST_MAXLINELEN (((SHA_TEST_MAX_BITS >> 3) * 2) + 100)
144 int dgst_test(FILE *out
, FILE *in
)
146 const EVP_MD
*md
= NULL
;
147 char *linebuf
, *olinebuf
, *p
, *q
;
148 char *keyword
, *value
;
149 unsigned char *Msg
= NULL
, *Seed
= NULL
;
150 long MsgLen
= -1, Len
= -1, SeedLen
= -1;
154 olinebuf
= OPENSSL_malloc(SHA_TEST_MAXLINELEN
);
155 linebuf
= OPENSSL_malloc(SHA_TEST_MAXLINELEN
);
157 if (!linebuf
|| !olinebuf
)
161 while (fgets(olinebuf
, SHA_TEST_MAXLINELEN
, in
))
164 strcpy(linebuf
, olinebuf
);
166 /* Skip leading space */
167 while (isspace((unsigned char)*keyword
))
170 /* Look for = sign */
171 p
= strchr(linebuf
, '=');
173 /* If no = or starts with [ (for [L=20] line) just copy */
176 fputs(olinebuf
, out
);
182 /* Remove trailing space */
183 while (isspace((unsigned char)*q
))
189 /* Remove leading space from value */
190 while (isspace((unsigned char)*value
))
193 /* Remove trailing space from value */
194 p
= value
+ strlen(value
) - 1;
195 while (*p
== '\n' || isspace((unsigned char)*p
))
198 if (!strcmp(keyword
,"[L") && *p
==']')
202 case 20: md
=EVP_sha1(); break;
203 case 28: md
=EVP_sha224(); break;
204 case 32: md
=EVP_sha256(); break;
205 case 48: md
=EVP_sha384(); break;
206 case 64: md
=EVP_sha512(); break;
207 default: goto parse_error
;
210 else if (!strcmp(keyword
, "Len"))
217 /* Only handle multiples of 8 bits */
220 if (Len
> SHA_TEST_MAX_BITS
)
225 else if (!strcmp(keyword
, "Msg"))
228 if (strlen(value
) & 1)
232 Msg
= hex2bin_m(value
, &tmplen
);
236 else if (!strcmp(keyword
, "Seed"))
238 if (strlen(value
) & 1)
242 Seed
= hex2bin_m(value
, &SeedLen
);
246 else if (!strcmp(keyword
, "MD"))
251 fputs(olinebuf
, out
);
253 if (md
&& Msg
&& (MsgLen
>= 0))
255 if (!print_dgst(md
, out
, Msg
, MsgLen
))
262 else if (md
&& Seed
&& (SeedLen
> 0))
264 if (!print_monte(md
, out
, Seed
, SeedLen
))
281 OPENSSL_free(olinebuf
);
283 OPENSSL_free(linebuf
);
293 fprintf(stderr
, "FATAL parse error processing line %d\n", lnum
);
299 static int print_dgst(const EVP_MD
*emd
, FILE *out
,
300 unsigned char *Msg
, int Msglen
)
303 unsigned char md
[EVP_MAX_MD_SIZE
];
304 if (!FIPS_digest(Msg
, Msglen
, md
, (unsigned int *)&mdlen
, emd
))
306 fputs("Error calculating HASH\n", stderr
);
310 for (i
= 0; i
< mdlen
; i
++)
311 fprintf(out
, "%02x", md
[i
]);
312 fputs(RESP_EOL
, out
);
316 static int print_monte(const EVP_MD
*md
, FILE *out
,
317 unsigned char *Seed
, int SeedLen
)
319 unsigned int i
, j
, k
;
322 unsigned char *m1
, *m2
, *m3
, *p
;
323 unsigned int mlen
, m1len
, m2len
, m3len
;
325 FIPS_md_ctx_init(&ctx
);
327 if (SeedLen
> EVP_MAX_MD_SIZE
)
330 mlen
= EVP_MAX_MD_SIZE
;
332 m1
= OPENSSL_malloc(mlen
);
333 m2
= OPENSSL_malloc(mlen
);
334 m3
= OPENSSL_malloc(mlen
);
336 if (!m1
|| !m2
|| !m3
)
339 m1len
= m2len
= m3len
= SeedLen
;
340 memcpy(m1
, Seed
, SeedLen
);
341 memcpy(m2
, Seed
, SeedLen
);
342 memcpy(m3
, Seed
, SeedLen
);
344 fputs(RESP_EOL
, out
);
346 for (j
= 0; j
< 100; j
++)
348 for (i
= 0; i
< 1000; i
++)
350 FIPS_digestinit(&ctx
, md
);
351 FIPS_digestupdate(&ctx
, m1
, m1len
);
352 FIPS_digestupdate(&ctx
, m2
, m2len
);
353 FIPS_digestupdate(&ctx
, m3
, m3len
);
360 FIPS_digestfinal(&ctx
, m3
, &m3len
);
362 fprintf(out
, "COUNT = %d" RESP_EOL
, j
);
364 for (k
= 0; k
< m3len
; k
++)
365 fprintf(out
, "%02x", m3
[k
]);
366 fputs(RESP_EOL RESP_EOL
, out
);
367 memcpy(m1
, m3
, m3len
);
368 memcpy(m2
, m3
, m3len
);
369 m1len
= m2len
= m3len
;
382 FIPS_md_ctx_cleanup(&ctx
);