mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
cd22dfbf01
this will perform all standalone operations such as setting error callbacks, entering FIPS mode etc.
255 lines
4.6 KiB
C
255 lines
4.6 KiB
C
/*
|
|
* Crude test driver for processing the VST and MCT testvector files
|
|
* generated by the CMVP RNGVS product.
|
|
*
|
|
* Note the input files are assumed to have a _very_ specific format
|
|
* as described in the NIST document "The Random Number Generator
|
|
* Validation System (RNGVS)", May 25, 2004.
|
|
*
|
|
*/
|
|
|
|
#define OPENSSL_FIPSAPI
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#ifndef OPENSSL_FIPS
|
|
#include <stdio.h>
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
printf("No FIPS RNG support\n");
|
|
return 0;
|
|
}
|
|
#else
|
|
|
|
#include <openssl/bn.h>
|
|
#include <openssl/dsa.h>
|
|
#include <openssl/fips.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/rand.h>
|
|
#include <openssl/fips_rand.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
|
|
#include "fips_utl.h"
|
|
|
|
static void vst(FILE *in, FILE *out)
|
|
{
|
|
unsigned char *key = NULL;
|
|
unsigned char *v = NULL;
|
|
unsigned char *dt = NULL;
|
|
unsigned char ret[16];
|
|
char buf[1024];
|
|
char lbuf[1024];
|
|
char *keyword, *value;
|
|
long i, keylen;
|
|
|
|
keylen = 0;
|
|
|
|
while(fgets(buf,sizeof buf,in) != NULL)
|
|
{
|
|
fputs(buf,out);
|
|
if(!strncmp(buf,"[AES 128-Key]", 13))
|
|
keylen = 16;
|
|
else if(!strncmp(buf,"[AES 192-Key]", 13))
|
|
keylen = 24;
|
|
else if(!strncmp(buf,"[AES 256-Key]", 13))
|
|
keylen = 32;
|
|
if (!parse_line(&keyword, &value, lbuf, buf))
|
|
continue;
|
|
if(!strcmp(keyword,"Key"))
|
|
{
|
|
key=hex2bin_m(value,&i);
|
|
if (i != keylen)
|
|
{
|
|
fprintf(stderr, "Invalid key length, expecting %ld\n", keylen);
|
|
return;
|
|
}
|
|
}
|
|
else if(!strcmp(keyword,"DT"))
|
|
{
|
|
dt=hex2bin_m(value,&i);
|
|
if (i != 16)
|
|
{
|
|
fprintf(stderr, "Invalid DT length\n");
|
|
return;
|
|
}
|
|
}
|
|
else if(!strcmp(keyword,"V"))
|
|
{
|
|
v=hex2bin_m(value,&i);
|
|
if (i != 16)
|
|
{
|
|
fprintf(stderr, "Invalid V length\n");
|
|
return;
|
|
}
|
|
|
|
if (!key || !dt)
|
|
{
|
|
fprintf(stderr, "Missing key or DT\n");
|
|
return;
|
|
}
|
|
|
|
FIPS_rand_set_key(key, keylen);
|
|
FIPS_rand_seed(v,16);
|
|
FIPS_rand_set_dt(dt);
|
|
if (FIPS_rand_bytes(ret,16) <= 0)
|
|
{
|
|
fprintf(stderr, "Error getting PRNG value\n");
|
|
return;
|
|
}
|
|
|
|
OutputValue("R", ret, 16, out, 0);
|
|
OPENSSL_free(key);
|
|
key = NULL;
|
|
OPENSSL_free(dt);
|
|
dt = NULL;
|
|
OPENSSL_free(v);
|
|
v = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
static void mct(FILE *in, FILE *out)
|
|
{
|
|
unsigned char *key = NULL;
|
|
unsigned char *v = NULL;
|
|
unsigned char *dt = NULL;
|
|
unsigned char ret[16];
|
|
char buf[1024];
|
|
char lbuf[1024];
|
|
char *keyword, *value;
|
|
long i, keylen;
|
|
int j;
|
|
|
|
keylen = 0;
|
|
|
|
while(fgets(buf,sizeof buf,in) != NULL)
|
|
{
|
|
fputs(buf,out);
|
|
if(!strncmp(buf,"[AES 128-Key]", 13))
|
|
keylen = 16;
|
|
else if(!strncmp(buf,"[AES 192-Key]", 13))
|
|
keylen = 24;
|
|
else if(!strncmp(buf,"[AES 256-Key]", 13))
|
|
keylen = 32;
|
|
if (!parse_line(&keyword, &value, lbuf, buf))
|
|
continue;
|
|
if(!strcmp(keyword,"Key"))
|
|
{
|
|
key=hex2bin_m(value,&i);
|
|
if (i != keylen)
|
|
{
|
|
fprintf(stderr, "Invalid key length, expecting %ld\n", keylen);
|
|
return;
|
|
}
|
|
}
|
|
else if(!strcmp(keyword,"DT"))
|
|
{
|
|
dt=hex2bin_m(value,&i);
|
|
if (i != 16)
|
|
{
|
|
fprintf(stderr, "Invalid DT length\n");
|
|
return;
|
|
}
|
|
}
|
|
else if(!strcmp(keyword,"V"))
|
|
{
|
|
v=hex2bin_m(value,&i);
|
|
if (i != 16)
|
|
{
|
|
fprintf(stderr, "Invalid V length\n");
|
|
return;
|
|
}
|
|
|
|
if (!key || !dt)
|
|
{
|
|
fprintf(stderr, "Missing key or DT\n");
|
|
return;
|
|
}
|
|
|
|
FIPS_rand_set_key(key, keylen);
|
|
FIPS_rand_seed(v,16);
|
|
for (i = 0; i < 10000; i++)
|
|
{
|
|
FIPS_rand_set_dt(dt);
|
|
if (FIPS_rand_bytes(ret,16) <= 0)
|
|
{
|
|
fprintf(stderr, "Error getting PRNG value\n");
|
|
return;
|
|
}
|
|
/* Increment DT */
|
|
for (j = 15; j >= 0; j--)
|
|
{
|
|
dt[j]++;
|
|
if (dt[j])
|
|
break;
|
|
}
|
|
}
|
|
|
|
OutputValue("R", ret, 16, out, 0);
|
|
OPENSSL_free(key);
|
|
key = NULL;
|
|
OPENSSL_free(dt);
|
|
dt = NULL;
|
|
OPENSSL_free(v);
|
|
v = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
int main(int argc,char **argv)
|
|
{
|
|
FILE *in, *out;
|
|
if (argc == 4)
|
|
{
|
|
in = fopen(argv[2], "r");
|
|
if (!in)
|
|
{
|
|
fprintf(stderr, "Error opening input file\n");
|
|
exit(1);
|
|
}
|
|
out = fopen(argv[3], "w");
|
|
if (!out)
|
|
{
|
|
fprintf(stderr, "Error opening output file\n");
|
|
exit(1);
|
|
}
|
|
}
|
|
else if (argc == 2)
|
|
{
|
|
in = stdin;
|
|
out = stdout;
|
|
}
|
|
else
|
|
{
|
|
fprintf(stderr,"%s [mct|vst]\n",argv[0]);
|
|
exit(1);
|
|
}
|
|
fips_algtest_init();
|
|
FIPS_rand_reset();
|
|
if (!FIPS_rand_test_mode())
|
|
{
|
|
fprintf(stderr, "Error setting PRNG test mode\n");
|
|
exit(1);
|
|
}
|
|
if(!strcmp(argv[1],"mct"))
|
|
mct(in, out);
|
|
else if(!strcmp(argv[1],"vst"))
|
|
vst(in, out);
|
|
else
|
|
{
|
|
fprintf(stderr,"Don't know how to %s.\n",argv[1]);
|
|
exit(1);
|
|
}
|
|
|
|
if (argc == 4)
|
|
{
|
|
fclose(in);
|
|
fclose(out);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif
|