e811eff5a9
(backport from HEAD)
536 lines
20 KiB
C
536 lines
20 KiB
C
/* crypto/dh/dhtest.c */
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
* All rights reserved.
|
|
*
|
|
* This package is an SSL implementation written
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
*
|
|
* This library is free for commercial and non-commercial use as long as
|
|
* the following conditions are aheared to. The following conditions
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
* included with this distribution is covered by the same copyright terms
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
*
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
* the code are not to be removed.
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
* as the author of the parts of the library used.
|
|
* This can be in the form of a textual message at program startup or
|
|
* in documentation (online or textual) provided with the package.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* "This product includes cryptographic software written by
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
* being used are not cryptographic related :-).
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* The licence and distribution terms for any publically available version or
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
* copied and put under another distribution licence
|
|
* [including the GNU Public Licence.]
|
|
*/
|
|
|
|
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
|
* deprecated functions for openssl-internal code */
|
|
#ifdef OPENSSL_NO_DEPRECATED
|
|
#undef OPENSSL_NO_DEPRECATED
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "../e_os.h"
|
|
|
|
#include <openssl/crypto.h>
|
|
#include <openssl/bio.h>
|
|
#include <openssl/bn.h>
|
|
#include <openssl/rand.h>
|
|
#include <openssl/err.h>
|
|
|
|
#ifdef OPENSSL_NO_DH
|
|
int main(int argc, char *argv[])
|
|
{
|
|
printf("No DH support\n");
|
|
return(0);
|
|
}
|
|
#else
|
|
#include <openssl/dh.h>
|
|
|
|
#ifdef OPENSSL_SYS_WIN16
|
|
#define MS_CALLBACK _far _loadds
|
|
#else
|
|
#define MS_CALLBACK
|
|
#endif
|
|
|
|
static int MS_CALLBACK cb(int p, int n, BN_GENCB *arg);
|
|
|
|
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
|
|
|
|
static int run_rfc5114_tests(void);
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
BN_GENCB _cb;
|
|
DH *a;
|
|
DH *b=NULL;
|
|
char buf[12];
|
|
unsigned char *abuf=NULL,*bbuf=NULL;
|
|
int i,alen,blen,aout,bout,ret=1;
|
|
BIO *out;
|
|
|
|
CRYPTO_malloc_debug_init();
|
|
CRYPTO_dbg_set_options(V_CRYPTO_MDEBUG_ALL);
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
|
|
|
#ifdef OPENSSL_SYS_WIN32
|
|
CRYPTO_malloc_init();
|
|
#endif
|
|
|
|
RAND_seed(rnd_seed, sizeof rnd_seed);
|
|
|
|
out=BIO_new(BIO_s_file());
|
|
if (out == NULL) EXIT(1);
|
|
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
|
|
BN_GENCB_set(&_cb, &cb, out);
|
|
if(((a = DH_new()) == NULL) || !DH_generate_parameters_ex(a, 64,
|
|
DH_GENERATOR_5, &_cb))
|
|
goto err;
|
|
|
|
if (!DH_check(a, &i)) goto err;
|
|
if (i & DH_CHECK_P_NOT_PRIME)
|
|
BIO_puts(out, "p value is not prime\n");
|
|
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
|
BIO_puts(out, "p value is not a safe prime\n");
|
|
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
|
BIO_puts(out, "unable to check the generator value\n");
|
|
if (i & DH_NOT_SUITABLE_GENERATOR)
|
|
BIO_puts(out, "the g value is not a generator\n");
|
|
|
|
BIO_puts(out,"\np =");
|
|
BN_print(out,a->p);
|
|
BIO_puts(out,"\ng =");
|
|
BN_print(out,a->g);
|
|
BIO_puts(out,"\n");
|
|
|
|
b=DH_new();
|
|
if (b == NULL) goto err;
|
|
|
|
b->p=BN_dup(a->p);
|
|
b->g=BN_dup(a->g);
|
|
if ((b->p == NULL) || (b->g == NULL)) goto err;
|
|
|
|
/* Set a to run with normal modexp and b to use constant time */
|
|
a->flags &= ~DH_FLAG_NO_EXP_CONSTTIME;
|
|
b->flags |= DH_FLAG_NO_EXP_CONSTTIME;
|
|
|
|
if (!DH_generate_key(a)) goto err;
|
|
BIO_puts(out,"pri 1=");
|
|
BN_print(out,a->priv_key);
|
|
BIO_puts(out,"\npub 1=");
|
|
BN_print(out,a->pub_key);
|
|
BIO_puts(out,"\n");
|
|
|
|
if (!DH_generate_key(b)) goto err;
|
|
BIO_puts(out,"pri 2=");
|
|
BN_print(out,b->priv_key);
|
|
BIO_puts(out,"\npub 2=");
|
|
BN_print(out,b->pub_key);
|
|
BIO_puts(out,"\n");
|
|
|
|
alen=DH_size(a);
|
|
abuf=(unsigned char *)OPENSSL_malloc(alen);
|
|
aout=DH_compute_key(abuf,b->pub_key,a);
|
|
|
|
BIO_puts(out,"key1 =");
|
|
for (i=0; i<aout; i++)
|
|
{
|
|
sprintf(buf,"%02X",abuf[i]);
|
|
BIO_puts(out,buf);
|
|
}
|
|
BIO_puts(out,"\n");
|
|
|
|
blen=DH_size(b);
|
|
bbuf=(unsigned char *)OPENSSL_malloc(blen);
|
|
bout=DH_compute_key(bbuf,a->pub_key,b);
|
|
|
|
BIO_puts(out,"key2 =");
|
|
for (i=0; i<bout; i++)
|
|
{
|
|
sprintf(buf,"%02X",bbuf[i]);
|
|
BIO_puts(out,buf);
|
|
}
|
|
BIO_puts(out,"\n");
|
|
if ((aout < 4) || (bout != aout) || (memcmp(abuf,bbuf,aout) != 0))
|
|
{
|
|
fprintf(stderr,"Error in DH routines\n");
|
|
ret=1;
|
|
}
|
|
else
|
|
ret=0;
|
|
if (!run_rfc5114_tests())
|
|
ret = 1;
|
|
err:
|
|
ERR_print_errors_fp(stderr);
|
|
|
|
if (abuf != NULL) OPENSSL_free(abuf);
|
|
if (bbuf != NULL) OPENSSL_free(bbuf);
|
|
if(b != NULL) DH_free(b);
|
|
if(a != NULL) DH_free(a);
|
|
BIO_free(out);
|
|
#ifdef OPENSSL_SYS_NETWARE
|
|
if (ret) printf("ERROR: %d\n", ret);
|
|
#endif
|
|
EXIT(ret);
|
|
return(ret);
|
|
}
|
|
|
|
static int MS_CALLBACK cb(int p, int n, BN_GENCB *arg)
|
|
{
|
|
char c='*';
|
|
|
|
if (p == 0) c='.';
|
|
if (p == 1) c='+';
|
|
if (p == 2) c='*';
|
|
if (p == 3) c='\n';
|
|
BIO_write(arg->arg,&c,1);
|
|
(void)BIO_flush(arg->arg);
|
|
#ifdef LINT
|
|
p=n;
|
|
#endif
|
|
return 1;
|
|
}
|
|
|
|
/* Test data from RFC 5114 */
|
|
|
|
static const unsigned char dhtest_1024_160_xA[] = {
|
|
0xB9,0xA3,0xB3,0xAE,0x8F,0xEF,0xC1,0xA2,0x93,0x04,0x96,0x50,
|
|
0x70,0x86,0xF8,0x45,0x5D,0x48,0x94,0x3E
|
|
};
|
|
static const unsigned char dhtest_1024_160_yA[] = {
|
|
0x2A,0x85,0x3B,0x3D,0x92,0x19,0x75,0x01,0xB9,0x01,0x5B,0x2D,
|
|
0xEB,0x3E,0xD8,0x4F,0x5E,0x02,0x1D,0xCC,0x3E,0x52,0xF1,0x09,
|
|
0xD3,0x27,0x3D,0x2B,0x75,0x21,0x28,0x1C,0xBA,0xBE,0x0E,0x76,
|
|
0xFF,0x57,0x27,0xFA,0x8A,0xCC,0xE2,0x69,0x56,0xBA,0x9A,0x1F,
|
|
0xCA,0x26,0xF2,0x02,0x28,0xD8,0x69,0x3F,0xEB,0x10,0x84,0x1D,
|
|
0x84,0xA7,0x36,0x00,0x54,0xEC,0xE5,0xA7,0xF5,0xB7,0xA6,0x1A,
|
|
0xD3,0xDF,0xB3,0xC6,0x0D,0x2E,0x43,0x10,0x6D,0x87,0x27,0xDA,
|
|
0x37,0xDF,0x9C,0xCE,0x95,0xB4,0x78,0x75,0x5D,0x06,0xBC,0xEA,
|
|
0x8F,0x9D,0x45,0x96,0x5F,0x75,0xA5,0xF3,0xD1,0xDF,0x37,0x01,
|
|
0x16,0x5F,0xC9,0xE5,0x0C,0x42,0x79,0xCE,0xB0,0x7F,0x98,0x95,
|
|
0x40,0xAE,0x96,0xD5,0xD8,0x8E,0xD7,0x76
|
|
};
|
|
static const unsigned char dhtest_1024_160_xB[] = {
|
|
0x93,0x92,0xC9,0xF9,0xEB,0x6A,0x7A,0x6A,0x90,0x22,0xF7,0xD8,
|
|
0x3E,0x72,0x23,0xC6,0x83,0x5B,0xBD,0xDA
|
|
};
|
|
static const unsigned char dhtest_1024_160_yB[] = {
|
|
0x71,0x7A,0x6C,0xB0,0x53,0x37,0x1F,0xF4,0xA3,0xB9,0x32,0x94,
|
|
0x1C,0x1E,0x56,0x63,0xF8,0x61,0xA1,0xD6,0xAD,0x34,0xAE,0x66,
|
|
0x57,0x6D,0xFB,0x98,0xF6,0xC6,0xCB,0xF9,0xDD,0xD5,0xA5,0x6C,
|
|
0x78,0x33,0xF6,0xBC,0xFD,0xFF,0x09,0x55,0x82,0xAD,0x86,0x8E,
|
|
0x44,0x0E,0x8D,0x09,0xFD,0x76,0x9E,0x3C,0xEC,0xCD,0xC3,0xD3,
|
|
0xB1,0xE4,0xCF,0xA0,0x57,0x77,0x6C,0xAA,0xF9,0x73,0x9B,0x6A,
|
|
0x9F,0xEE,0x8E,0x74,0x11,0xF8,0xD6,0xDA,0xC0,0x9D,0x6A,0x4E,
|
|
0xDB,0x46,0xCC,0x2B,0x5D,0x52,0x03,0x09,0x0E,0xAE,0x61,0x26,
|
|
0x31,0x1E,0x53,0xFD,0x2C,0x14,0xB5,0x74,0xE6,0xA3,0x10,0x9A,
|
|
0x3D,0xA1,0xBE,0x41,0xBD,0xCE,0xAA,0x18,0x6F,0x5C,0xE0,0x67,
|
|
0x16,0xA2,0xB6,0xA0,0x7B,0x3C,0x33,0xFE
|
|
};
|
|
static const unsigned char dhtest_1024_160_Z[] = {
|
|
0x5C,0x80,0x4F,0x45,0x4D,0x30,0xD9,0xC4,0xDF,0x85,0x27,0x1F,
|
|
0x93,0x52,0x8C,0x91,0xDF,0x6B,0x48,0xAB,0x5F,0x80,0xB3,0xB5,
|
|
0x9C,0xAA,0xC1,0xB2,0x8F,0x8A,0xCB,0xA9,0xCD,0x3E,0x39,0xF3,
|
|
0xCB,0x61,0x45,0x25,0xD9,0x52,0x1D,0x2E,0x64,0x4C,0x53,0xB8,
|
|
0x07,0xB8,0x10,0xF3,0x40,0x06,0x2F,0x25,0x7D,0x7D,0x6F,0xBF,
|
|
0xE8,0xD5,0xE8,0xF0,0x72,0xE9,0xB6,0xE9,0xAF,0xDA,0x94,0x13,
|
|
0xEA,0xFB,0x2E,0x8B,0x06,0x99,0xB1,0xFB,0x5A,0x0C,0xAC,0xED,
|
|
0xDE,0xAE,0xAD,0x7E,0x9C,0xFB,0xB3,0x6A,0xE2,0xB4,0x20,0x83,
|
|
0x5B,0xD8,0x3A,0x19,0xFB,0x0B,0x5E,0x96,0xBF,0x8F,0xA4,0xD0,
|
|
0x9E,0x34,0x55,0x25,0x16,0x7E,0xCD,0x91,0x55,0x41,0x6F,0x46,
|
|
0xF4,0x08,0xED,0x31,0xB6,0x3C,0x6E,0x6D
|
|
};
|
|
static const unsigned char dhtest_2048_224_xA[] = {
|
|
0x22,0xE6,0x26,0x01,0xDB,0xFF,0xD0,0x67,0x08,0xA6,0x80,0xF7,
|
|
0x47,0xF3,0x61,0xF7,0x6D,0x8F,0x4F,0x72,0x1A,0x05,0x48,0xE4,
|
|
0x83,0x29,0x4B,0x0C
|
|
};
|
|
static const unsigned char dhtest_2048_224_yA[] = {
|
|
0x1B,0x3A,0x63,0x45,0x1B,0xD8,0x86,0xE6,0x99,0xE6,0x7B,0x49,
|
|
0x4E,0x28,0x8B,0xD7,0xF8,0xE0,0xD3,0x70,0xBA,0xDD,0xA7,0xA0,
|
|
0xEF,0xD2,0xFD,0xE7,0xD8,0xF6,0x61,0x45,0xCC,0x9F,0x28,0x04,
|
|
0x19,0x97,0x5E,0xB8,0x08,0x87,0x7C,0x8A,0x4C,0x0C,0x8E,0x0B,
|
|
0xD4,0x8D,0x4A,0x54,0x01,0xEB,0x1E,0x87,0x76,0xBF,0xEE,0xE1,
|
|
0x34,0xC0,0x38,0x31,0xAC,0x27,0x3C,0xD9,0xD6,0x35,0xAB,0x0C,
|
|
0xE0,0x06,0xA4,0x2A,0x88,0x7E,0x3F,0x52,0xFB,0x87,0x66,0xB6,
|
|
0x50,0xF3,0x80,0x78,0xBC,0x8E,0xE8,0x58,0x0C,0xEF,0xE2,0x43,
|
|
0x96,0x8C,0xFC,0x4F,0x8D,0xC3,0xDB,0x08,0x45,0x54,0x17,0x1D,
|
|
0x41,0xBF,0x2E,0x86,0x1B,0x7B,0xB4,0xD6,0x9D,0xD0,0xE0,0x1E,
|
|
0xA3,0x87,0xCB,0xAA,0x5C,0xA6,0x72,0xAF,0xCB,0xE8,0xBD,0xB9,
|
|
0xD6,0x2D,0x4C,0xE1,0x5F,0x17,0xDD,0x36,0xF9,0x1E,0xD1,0xEE,
|
|
0xDD,0x65,0xCA,0x4A,0x06,0x45,0x5C,0xB9,0x4C,0xD4,0x0A,0x52,
|
|
0xEC,0x36,0x0E,0x84,0xB3,0xC9,0x26,0xE2,0x2C,0x43,0x80,0xA3,
|
|
0xBF,0x30,0x9D,0x56,0x84,0x97,0x68,0xB7,0xF5,0x2C,0xFD,0xF6,
|
|
0x55,0xFD,0x05,0x3A,0x7E,0xF7,0x06,0x97,0x9E,0x7E,0x58,0x06,
|
|
0xB1,0x7D,0xFA,0xE5,0x3A,0xD2,0xA5,0xBC,0x56,0x8E,0xBB,0x52,
|
|
0x9A,0x7A,0x61,0xD6,0x8D,0x25,0x6F,0x8F,0xC9,0x7C,0x07,0x4A,
|
|
0x86,0x1D,0x82,0x7E,0x2E,0xBC,0x8C,0x61,0x34,0x55,0x31,0x15,
|
|
0xB7,0x0E,0x71,0x03,0x92,0x0A,0xA1,0x6D,0x85,0xE5,0x2B,0xCB,
|
|
0xAB,0x8D,0x78,0x6A,0x68,0x17,0x8F,0xA8,0xFF,0x7C,0x2F,0x5C,
|
|
0x71,0x64,0x8D,0x6F
|
|
};
|
|
static const unsigned char dhtest_2048_224_xB[] = {
|
|
0x4F,0xF3,0xBC,0x96,0xC7,0xFC,0x6A,0x6D,0x71,0xD3,0xB3,0x63,
|
|
0x80,0x0A,0x7C,0xDF,0xEF,0x6F,0xC4,0x1B,0x44,0x17,0xEA,0x15,
|
|
0x35,0x3B,0x75,0x90
|
|
};
|
|
static const unsigned char dhtest_2048_224_yB[] = {
|
|
0x4D,0xCE,0xE9,0x92,0xA9,0x76,0x2A,0x13,0xF2,0xF8,0x38,0x44,
|
|
0xAD,0x3D,0x77,0xEE,0x0E,0x31,0xC9,0x71,0x8B,0x3D,0xB6,0xC2,
|
|
0x03,0x5D,0x39,0x61,0x18,0x2C,0x3E,0x0B,0xA2,0x47,0xEC,0x41,
|
|
0x82,0xD7,0x60,0xCD,0x48,0xD9,0x95,0x99,0x97,0x06,0x22,0xA1,
|
|
0x88,0x1B,0xBA,0x2D,0xC8,0x22,0x93,0x9C,0x78,0xC3,0x91,0x2C,
|
|
0x66,0x61,0xFA,0x54,0x38,0xB2,0x07,0x66,0x22,0x2B,0x75,0xE2,
|
|
0x4C,0x2E,0x3A,0xD0,0xC7,0x28,0x72,0x36,0x12,0x95,0x25,0xEE,
|
|
0x15,0xB5,0xDD,0x79,0x98,0xAA,0x04,0xC4,0xA9,0x69,0x6C,0xAC,
|
|
0xD7,0x17,0x20,0x83,0xA9,0x7A,0x81,0x66,0x4E,0xAD,0x2C,0x47,
|
|
0x9E,0x44,0x4E,0x4C,0x06,0x54,0xCC,0x19,0xE2,0x8D,0x77,0x03,
|
|
0xCE,0xE8,0xDA,0xCD,0x61,0x26,0xF5,0xD6,0x65,0xEC,0x52,0xC6,
|
|
0x72,0x55,0xDB,0x92,0x01,0x4B,0x03,0x7E,0xB6,0x21,0xA2,0xAC,
|
|
0x8E,0x36,0x5D,0xE0,0x71,0xFF,0xC1,0x40,0x0A,0xCF,0x07,0x7A,
|
|
0x12,0x91,0x3D,0xD8,0xDE,0x89,0x47,0x34,0x37,0xAB,0x7B,0xA3,
|
|
0x46,0x74,0x3C,0x1B,0x21,0x5D,0xD9,0xC1,0x21,0x64,0xA7,0xE4,
|
|
0x05,0x31,0x18,0xD1,0x99,0xBE,0xC8,0xEF,0x6F,0xC5,0x61,0x17,
|
|
0x0C,0x84,0xC8,0x7D,0x10,0xEE,0x9A,0x67,0x4A,0x1F,0xA8,0xFF,
|
|
0xE1,0x3B,0xDF,0xBA,0x1D,0x44,0xDE,0x48,0x94,0x6D,0x68,0xDC,
|
|
0x0C,0xDD,0x77,0x76,0x35,0xA7,0xAB,0x5B,0xFB,0x1E,0x4B,0xB7,
|
|
0xB8,0x56,0xF9,0x68,0x27,0x73,0x4C,0x18,0x41,0x38,0xE9,0x15,
|
|
0xD9,0xC3,0x00,0x2E,0xBC,0xE5,0x31,0x20,0x54,0x6A,0x7E,0x20,
|
|
0x02,0x14,0x2B,0x6C
|
|
};
|
|
static const unsigned char dhtest_2048_224_Z[] = {
|
|
0x34,0xD9,0xBD,0xDC,0x1B,0x42,0x17,0x6C,0x31,0x3F,0xEA,0x03,
|
|
0x4C,0x21,0x03,0x4D,0x07,0x4A,0x63,0x13,0xBB,0x4E,0xCD,0xB3,
|
|
0x70,0x3F,0xFF,0x42,0x45,0x67,0xA4,0x6B,0xDF,0x75,0x53,0x0E,
|
|
0xDE,0x0A,0x9D,0xA5,0x22,0x9D,0xE7,0xD7,0x67,0x32,0x28,0x6C,
|
|
0xBC,0x0F,0x91,0xDA,0x4C,0x3C,0x85,0x2F,0xC0,0x99,0xC6,0x79,
|
|
0x53,0x1D,0x94,0xC7,0x8A,0xB0,0x3D,0x9D,0xEC,0xB0,0xA4,0xE4,
|
|
0xCA,0x8B,0x2B,0xB4,0x59,0x1C,0x40,0x21,0xCF,0x8C,0xE3,0xA2,
|
|
0x0A,0x54,0x1D,0x33,0x99,0x40,0x17,0xD0,0x20,0x0A,0xE2,0xC9,
|
|
0x51,0x6E,0x2F,0xF5,0x14,0x57,0x79,0x26,0x9E,0x86,0x2B,0x0F,
|
|
0xB4,0x74,0xA2,0xD5,0x6D,0xC3,0x1E,0xD5,0x69,0xA7,0x70,0x0B,
|
|
0x4C,0x4A,0xB1,0x6B,0x22,0xA4,0x55,0x13,0x53,0x1E,0xF5,0x23,
|
|
0xD7,0x12,0x12,0x07,0x7B,0x5A,0x16,0x9B,0xDE,0xFF,0xAD,0x7A,
|
|
0xD9,0x60,0x82,0x84,0xC7,0x79,0x5B,0x6D,0x5A,0x51,0x83,0xB8,
|
|
0x70,0x66,0xDE,0x17,0xD8,0xD6,0x71,0xC9,0xEB,0xD8,0xEC,0x89,
|
|
0x54,0x4D,0x45,0xEC,0x06,0x15,0x93,0xD4,0x42,0xC6,0x2A,0xB9,
|
|
0xCE,0x3B,0x1C,0xB9,0x94,0x3A,0x1D,0x23,0xA5,0xEA,0x3B,0xCF,
|
|
0x21,0xA0,0x14,0x71,0xE6,0x7E,0x00,0x3E,0x7F,0x8A,0x69,0xC7,
|
|
0x28,0xBE,0x49,0x0B,0x2F,0xC8,0x8C,0xFE,0xB9,0x2D,0xB6,0xA2,
|
|
0x15,0xE5,0xD0,0x3C,0x17,0xC4,0x64,0xC9,0xAC,0x1A,0x46,0xE2,
|
|
0x03,0xE1,0x3F,0x95,0x29,0x95,0xFB,0x03,0xC6,0x9D,0x3C,0xC4,
|
|
0x7F,0xCB,0x51,0x0B,0x69,0x98,0xFF,0xD3,0xAA,0x6D,0xE7,0x3C,
|
|
0xF9,0xF6,0x38,0x69
|
|
};
|
|
static const unsigned char dhtest_2048_256_xA[] = {
|
|
0x08,0x81,0x38,0x2C,0xDB,0x87,0x66,0x0C,0x6D,0xC1,0x3E,0x61,
|
|
0x49,0x38,0xD5,0xB9,0xC8,0xB2,0xF2,0x48,0x58,0x1C,0xC5,0xE3,
|
|
0x1B,0x35,0x45,0x43,0x97,0xFC,0xE5,0x0E
|
|
};
|
|
static const unsigned char dhtest_2048_256_yA[] = {
|
|
0x2E,0x93,0x80,0xC8,0x32,0x3A,0xF9,0x75,0x45,0xBC,0x49,0x41,
|
|
0xDE,0xB0,0xEC,0x37,0x42,0xC6,0x2F,0xE0,0xEC,0xE8,0x24,0xA6,
|
|
0xAB,0xDB,0xE6,0x6C,0x59,0xBE,0xE0,0x24,0x29,0x11,0xBF,0xB9,
|
|
0x67,0x23,0x5C,0xEB,0xA3,0x5A,0xE1,0x3E,0x4E,0xC7,0x52,0xBE,
|
|
0x63,0x0B,0x92,0xDC,0x4B,0xDE,0x28,0x47,0xA9,0xC6,0x2C,0xB8,
|
|
0x15,0x27,0x45,0x42,0x1F,0xB7,0xEB,0x60,0xA6,0x3C,0x0F,0xE9,
|
|
0x15,0x9F,0xCC,0xE7,0x26,0xCE,0x7C,0xD8,0x52,0x3D,0x74,0x50,
|
|
0x66,0x7E,0xF8,0x40,0xE4,0x91,0x91,0x21,0xEB,0x5F,0x01,0xC8,
|
|
0xC9,0xB0,0xD3,0xD6,0x48,0xA9,0x3B,0xFB,0x75,0x68,0x9E,0x82,
|
|
0x44,0xAC,0x13,0x4A,0xF5,0x44,0x71,0x1C,0xE7,0x9A,0x02,0xDC,
|
|
0xC3,0x42,0x26,0x68,0x47,0x80,0xDD,0xDC,0xB4,0x98,0x59,0x41,
|
|
0x06,0xC3,0x7F,0x5B,0xC7,0x98,0x56,0x48,0x7A,0xF5,0xAB,0x02,
|
|
0x2A,0x2E,0x5E,0x42,0xF0,0x98,0x97,0xC1,0xA8,0x5A,0x11,0xEA,
|
|
0x02,0x12,0xAF,0x04,0xD9,0xB4,0xCE,0xBC,0x93,0x7C,0x3C,0x1A,
|
|
0x3E,0x15,0xA8,0xA0,0x34,0x2E,0x33,0x76,0x15,0xC8,0x4E,0x7F,
|
|
0xE3,0xB8,0xB9,0xB8,0x7F,0xB1,0xE7,0x3A,0x15,0xAF,0x12,0xA3,
|
|
0x0D,0x74,0x6E,0x06,0xDF,0xC3,0x4F,0x29,0x0D,0x79,0x7C,0xE5,
|
|
0x1A,0xA1,0x3A,0xA7,0x85,0xBF,0x66,0x58,0xAF,0xF5,0xE4,0xB0,
|
|
0x93,0x00,0x3C,0xBE,0xAF,0x66,0x5B,0x3C,0x2E,0x11,0x3A,0x3A,
|
|
0x4E,0x90,0x52,0x69,0x34,0x1D,0xC0,0x71,0x14,0x26,0x68,0x5F,
|
|
0x4E,0xF3,0x7E,0x86,0x8A,0x81,0x26,0xFF,0x3F,0x22,0x79,0xB5,
|
|
0x7C,0xA6,0x7E,0x29
|
|
};
|
|
static const unsigned char dhtest_2048_256_xB[] = {
|
|
0x7D,0x62,0xA7,0xE3,0xEF,0x36,0xDE,0x61,0x7B,0x13,0xD1,0xAF,
|
|
0xB8,0x2C,0x78,0x0D,0x83,0xA2,0x3B,0xD4,0xEE,0x67,0x05,0x64,
|
|
0x51,0x21,0xF3,0x71,0xF5,0x46,0xA5,0x3D
|
|
};
|
|
static const unsigned char dhtest_2048_256_yB[] = {
|
|
0x57,0x5F,0x03,0x51,0xBD,0x2B,0x1B,0x81,0x74,0x48,0xBD,0xF8,
|
|
0x7A,0x6C,0x36,0x2C,0x1E,0x28,0x9D,0x39,0x03,0xA3,0x0B,0x98,
|
|
0x32,0xC5,0x74,0x1F,0xA2,0x50,0x36,0x3E,0x7A,0xCB,0xC7,0xF7,
|
|
0x7F,0x3D,0xAC,0xBC,0x1F,0x13,0x1A,0xDD,0x8E,0x03,0x36,0x7E,
|
|
0xFF,0x8F,0xBB,0xB3,0xE1,0xC5,0x78,0x44,0x24,0x80,0x9B,0x25,
|
|
0xAF,0xE4,0xD2,0x26,0x2A,0x1A,0x6F,0xD2,0xFA,0xB6,0x41,0x05,
|
|
0xCA,0x30,0xA6,0x74,0xE0,0x7F,0x78,0x09,0x85,0x20,0x88,0x63,
|
|
0x2F,0xC0,0x49,0x23,0x37,0x91,0xAD,0x4E,0xDD,0x08,0x3A,0x97,
|
|
0x8B,0x88,0x3E,0xE6,0x18,0xBC,0x5E,0x0D,0xD0,0x47,0x41,0x5F,
|
|
0x2D,0x95,0xE6,0x83,0xCF,0x14,0x82,0x6B,0x5F,0xBE,0x10,0xD3,
|
|
0xCE,0x41,0xC6,0xC1,0x20,0xC7,0x8A,0xB2,0x00,0x08,0xC6,0x98,
|
|
0xBF,0x7F,0x0B,0xCA,0xB9,0xD7,0xF4,0x07,0xBE,0xD0,0xF4,0x3A,
|
|
0xFB,0x29,0x70,0xF5,0x7F,0x8D,0x12,0x04,0x39,0x63,0xE6,0x6D,
|
|
0xDD,0x32,0x0D,0x59,0x9A,0xD9,0x93,0x6C,0x8F,0x44,0x13,0x7C,
|
|
0x08,0xB1,0x80,0xEC,0x5E,0x98,0x5C,0xEB,0xE1,0x86,0xF3,0xD5,
|
|
0x49,0x67,0x7E,0x80,0x60,0x73,0x31,0xEE,0x17,0xAF,0x33,0x80,
|
|
0xA7,0x25,0xB0,0x78,0x23,0x17,0xD7,0xDD,0x43,0xF5,0x9D,0x7A,
|
|
0xF9,0x56,0x8A,0x9B,0xB6,0x3A,0x84,0xD3,0x65,0xF9,0x22,0x44,
|
|
0xED,0x12,0x09,0x88,0x21,0x93,0x02,0xF4,0x29,0x24,0xC7,0xCA,
|
|
0x90,0xB8,0x9D,0x24,0xF7,0x1B,0x0A,0xB6,0x97,0x82,0x3D,0x7D,
|
|
0xEB,0x1A,0xFF,0x5B,0x0E,0x8E,0x4A,0x45,0xD4,0x9F,0x7F,0x53,
|
|
0x75,0x7E,0x19,0x13
|
|
};
|
|
static const unsigned char dhtest_2048_256_Z[] = {
|
|
0x86,0xC7,0x0B,0xF8,0xD0,0xBB,0x81,0xBB,0x01,0x07,0x8A,0x17,
|
|
0x21,0x9C,0xB7,0xD2,0x72,0x03,0xDB,0x2A,0x19,0xC8,0x77,0xF1,
|
|
0xD1,0xF1,0x9F,0xD7,0xD7,0x7E,0xF2,0x25,0x46,0xA6,0x8F,0x00,
|
|
0x5A,0xD5,0x2D,0xC8,0x45,0x53,0xB7,0x8F,0xC6,0x03,0x30,0xBE,
|
|
0x51,0xEA,0x7C,0x06,0x72,0xCA,0xC1,0x51,0x5E,0x4B,0x35,0xC0,
|
|
0x47,0xB9,0xA5,0x51,0xB8,0x8F,0x39,0xDC,0x26,0xDA,0x14,0xA0,
|
|
0x9E,0xF7,0x47,0x74,0xD4,0x7C,0x76,0x2D,0xD1,0x77,0xF9,0xED,
|
|
0x5B,0xC2,0xF1,0x1E,0x52,0xC8,0x79,0xBD,0x95,0x09,0x85,0x04,
|
|
0xCD,0x9E,0xEC,0xD8,0xA8,0xF9,0xB3,0xEF,0xBD,0x1F,0x00,0x8A,
|
|
0xC5,0x85,0x30,0x97,0xD9,0xD1,0x83,0x7F,0x2B,0x18,0xF7,0x7C,
|
|
0xD7,0xBE,0x01,0xAF,0x80,0xA7,0xC7,0xB5,0xEA,0x3C,0xA5,0x4C,
|
|
0xC0,0x2D,0x0C,0x11,0x6F,0xEE,0x3F,0x95,0xBB,0x87,0x39,0x93,
|
|
0x85,0x87,0x5D,0x7E,0x86,0x74,0x7E,0x67,0x6E,0x72,0x89,0x38,
|
|
0xAC,0xBF,0xF7,0x09,0x8E,0x05,0xBE,0x4D,0xCF,0xB2,0x40,0x52,
|
|
0xB8,0x3A,0xEF,0xFB,0x14,0x78,0x3F,0x02,0x9A,0xDB,0xDE,0x7F,
|
|
0x53,0xFA,0xE9,0x20,0x84,0x22,0x40,0x90,0xE0,0x07,0xCE,0xE9,
|
|
0x4D,0x4B,0xF2,0xBA,0xCE,0x9F,0xFD,0x4B,0x57,0xD2,0xAF,0x7C,
|
|
0x72,0x4D,0x0C,0xAA,0x19,0xBF,0x05,0x01,0xF6,0xF1,0x7B,0x4A,
|
|
0xA1,0x0F,0x42,0x5E,0x3E,0xA7,0x60,0x80,0xB4,0xB9,0xD6,0xB3,
|
|
0xCE,0xFE,0xA1,0x15,0xB2,0xCE,0xB8,0x78,0x9B,0xB8,0xA3,0xB0,
|
|
0xEA,0x87,0xFE,0xBE,0x63,0xB6,0xC8,0xF8,0x46,0xEC,0x6D,0xB0,
|
|
0xC2,0x6C,0x5D,0x7C
|
|
};
|
|
|
|
typedef struct
|
|
{
|
|
DH * (*get_param)(void);
|
|
const unsigned char *xA;
|
|
size_t xA_len;
|
|
const unsigned char *yA;
|
|
size_t yA_len;
|
|
const unsigned char *xB;
|
|
size_t xB_len;
|
|
const unsigned char *yB;
|
|
size_t yB_len;
|
|
const unsigned char *Z;
|
|
size_t Z_len;
|
|
} rfc5114_td;
|
|
|
|
#define make_rfc5114_td(pre) { \
|
|
DH_get_##pre, \
|
|
dhtest_##pre##_xA, sizeof(dhtest_##pre##_xA), \
|
|
dhtest_##pre##_yA, sizeof(dhtest_##pre##_yA), \
|
|
dhtest_##pre##_xB, sizeof(dhtest_##pre##_xB), \
|
|
dhtest_##pre##_yB, sizeof(dhtest_##pre##_yB), \
|
|
dhtest_##pre##_Z, sizeof(dhtest_##pre##_Z) \
|
|
}
|
|
|
|
static const rfc5114_td rfctd[] = {
|
|
make_rfc5114_td(1024_160),
|
|
make_rfc5114_td(2048_224),
|
|
make_rfc5114_td(2048_256)
|
|
};
|
|
|
|
static int run_rfc5114_tests(void)
|
|
{
|
|
int i;
|
|
for (i = 0; i < (int)(sizeof(rfctd)/sizeof(rfc5114_td)); i++)
|
|
{
|
|
DH *dhA, *dhB;
|
|
unsigned char *Z1 = NULL, *Z2 = NULL;
|
|
const rfc5114_td *td = rfctd + i;
|
|
/* Set up DH structures setting key components */
|
|
dhA = td->get_param();
|
|
dhB = td->get_param();
|
|
if (!dhA || !dhB)
|
|
goto bad_err;
|
|
|
|
dhA->priv_key = BN_bin2bn(td->xA, td->xA_len, NULL);
|
|
dhA->pub_key = BN_bin2bn(td->yA, td->yA_len, NULL);
|
|
|
|
dhB->priv_key = BN_bin2bn(td->xB, td->xB_len, NULL);
|
|
dhB->pub_key = BN_bin2bn(td->yB, td->yB_len, NULL);
|
|
|
|
if (!dhA->priv_key || !dhA->pub_key
|
|
|| !dhB->priv_key || !dhB->pub_key)
|
|
goto bad_err;
|
|
|
|
if ((td->Z_len != (size_t)DH_size(dhA))
|
|
|| (td->Z_len != (size_t)DH_size(dhB)))
|
|
goto err;
|
|
|
|
Z1 = OPENSSL_malloc(DH_size(dhA));
|
|
Z2 = OPENSSL_malloc(DH_size(dhB));
|
|
/* Work out shared secrets using both sides and compare
|
|
* with expected values.
|
|
*/
|
|
if (!DH_compute_key(Z1, dhB->pub_key, dhA))
|
|
goto bad_err;
|
|
if (!DH_compute_key(Z2, dhA->pub_key, dhB))
|
|
goto bad_err;
|
|
|
|
if (memcmp(Z1, td->Z, td->Z_len))
|
|
goto err;
|
|
if (memcmp(Z2, td->Z, td->Z_len))
|
|
goto err;
|
|
|
|
printf("RFC5114 parameter test %d OK\n", i + 1);
|
|
|
|
DH_free(dhA);
|
|
DH_free(dhB);
|
|
OPENSSL_free(Z1);
|
|
OPENSSL_free(Z2);
|
|
|
|
}
|
|
return 1;
|
|
bad_err:
|
|
fprintf(stderr, "Initalisation error RFC5114 set %d\n", i + 1);
|
|
ERR_print_errors_fp(stderr);
|
|
return 0;
|
|
err:
|
|
fprintf(stderr, "Test failed RFC5114 set %d\n", i + 1);
|
|
return 0;
|
|
}
|
|
|
|
#endif
|