File: | s/cmd/bltest/blapitest.c |
Warning: | line 316, column 5 Assigned value is garbage or undefined |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* This Source Code Form is subject to the terms of the Mozilla Public | |||
2 | * License, v. 2.0. If a copy of the MPL was not distributed with this | |||
3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |||
4 | ||||
5 | #include <stdio.h> | |||
6 | #include <stdlib.h> | |||
7 | ||||
8 | #include "blapi.h" | |||
9 | #include "secrng.h" | |||
10 | #include "prmem.h" | |||
11 | #include "prprf.h" | |||
12 | #include "prtime.h" | |||
13 | #include "prsystem.h" | |||
14 | #include "plstr.h" | |||
15 | #include "nssb64.h" | |||
16 | #include "basicutil.h" | |||
17 | #include "plgetopt.h" | |||
18 | #include "softoken.h" | |||
19 | #include "nspr.h" | |||
20 | #include "secport.h" | |||
21 | #include "secoid.h" | |||
22 | #include "nssutil.h" | |||
23 | #include "ecl-curve.h" | |||
24 | #include "chacha20poly1305.h" | |||
25 | ||||
26 | #include "pkcs1_vectors.h" | |||
27 | ||||
28 | SECStatus EC_DecodeParams(const SECItem *encodedParams, | |||
29 | ECParams **ecparams); | |||
30 | SECStatus EC_CopyParams(PLArenaPool *arena, ECParams *dstParams, | |||
31 | const ECParams *srcParams); | |||
32 | ||||
33 | char *progName; | |||
34 | char *testdir = NULL((void*)0); | |||
35 | ||||
36 | #define BLTEST_DEFAULT_CHUNKSIZE4096 4096 | |||
37 | ||||
38 | #define WORDSIZEsizeof(unsigned long) sizeof(unsigned long) | |||
39 | ||||
40 | #define CHECKERROR(rv, ln)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), ln); exit(-1); } \ | |||
41 | if (rv) { \ | |||
42 | PRErrorCode prerror = PR_GetError(); \ | |||
43 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName, \ | |||
44 | prerror, PORT_ErrorToString(prerror)PR_ErrorToString((prerror), 0), ln); \ | |||
45 | exit(-1); \ | |||
46 | } | |||
47 | ||||
48 | /* Macros for performance timing. */ | |||
49 | #define TIMESTART()time1 = PR_IntervalNow(); \ | |||
50 | time1 = PR_IntervalNow(); | |||
51 | ||||
52 | #define TIMEFINISH(time, reps)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); time = ((double)(time1)) / reps; \ | |||
53 | time2 = (PRIntervalTime)(PR_IntervalNow() - time1); \ | |||
54 | time1 = PR_IntervalToMilliseconds(time2); \ | |||
55 | time = ((double)(time1)) / reps; | |||
56 | ||||
57 | #define TIMEMARK(seconds)time1 = PR_SecondsToInterval(seconds); { PRInt64 tmp; if (time2 == 0) { time2 = 1; } ((tmp) = (time1) / (time2)); if (tmp < 10) { if (tmp == 0) { opsBetweenChecks = 1; } else { ((opsBetweenChecks ) = (PRInt32)(tmp)); } } else { opsBetweenChecks = 10; } } time2 = time1; time1 = PR_IntervalNow(); \ | |||
58 | time1 = PR_SecondsToInterval(seconds); \ | |||
59 | { \ | |||
60 | PRInt64 tmp; \ | |||
61 | if (time2 == 0) { \ | |||
62 | time2 = 1; \ | |||
63 | } \ | |||
64 | LL_DIV(tmp, time1, time2)((tmp) = (time1) / (time2)); \ | |||
65 | if (tmp < 10) { \ | |||
66 | if (tmp == 0) { \ | |||
67 | opsBetweenChecks = 1; \ | |||
68 | } else { \ | |||
69 | LL_L2I(opsBetweenChecks, tmp)((opsBetweenChecks) = (PRInt32)(tmp)); \ | |||
70 | } \ | |||
71 | } else { \ | |||
72 | opsBetweenChecks = 10; \ | |||
73 | } \ | |||
74 | } \ | |||
75 | time2 = time1; \ | |||
76 | time1 = PR_IntervalNow(); | |||
77 | ||||
78 | #define TIMETOFINISH()PR_IntervalNow() - time1 >= time2 \ | |||
79 | PR_IntervalNow() - time1 >= time2 | |||
80 | ||||
81 | static void | |||
82 | Usage() | |||
83 | { | |||
84 | #define PRINTUSAGE(subject, option, predicate)fprintf(stderr, "%10s %s\t%s\n", subject, option, predicate); \ | |||
85 | fprintf(stderrstderr, "%10s %s\t%s\n", subject, option, predicate); | |||
86 | fprintf(stderrstderr, "\n"); | |||
87 | PRINTUSAGE(progName, "[-DEHSVR]", "List available cipher modes")fprintf(stderr, "%10s %s\t%s\n", progName, "[-DEHSVR]", "List available cipher modes" );; /* XXX */ | |||
88 | fprintf(stderrstderr, "\n"); | |||
89 | PRINTUSAGE(progName, "-E -m mode ", "Encrypt a buffer")fprintf(stderr, "%10s %s\t%s\n", progName, "-E -m mode ", "Encrypt a buffer" );; | |||
90 | PRINTUSAGE("", "", "[-i plaintext] [-o ciphertext] [-k key] [-v iv]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-i plaintext] [-o ciphertext] [-k key] [-v iv]" );; | |||
91 | PRINTUSAGE("", "", "[-b bufsize] [-g keysize] [-e exp] [-r rounds]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-b bufsize] [-g keysize] [-e exp] [-r rounds]" );; | |||
92 | PRINTUSAGE("", "", "[-w wordsize] [-p repetitions | -5 time_interval]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-w wordsize] [-p repetitions | -5 time_interval]" );; | |||
93 | PRINTUSAGE("", "", "[-4 th_num]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-4 th_num]");; | |||
94 | PRINTUSAGE("", "-m", "cipher mode to use")fprintf(stderr, "%10s %s\t%s\n", "", "-m", "cipher mode to use" );; | |||
95 | PRINTUSAGE("", "-i", "file which contains input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-i", "file which contains input buffer" );; | |||
96 | PRINTUSAGE("", "-o", "file for output buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-o", "file for output buffer" );; | |||
97 | PRINTUSAGE("", "-k", "file which contains key")fprintf(stderr, "%10s %s\t%s\n", "", "-k", "file which contains key" );; | |||
98 | PRINTUSAGE("", "-v", "file which contains initialization vector")fprintf(stderr, "%10s %s\t%s\n", "", "-v", "file which contains initialization vector" );; | |||
99 | PRINTUSAGE("", "-b", "size of input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-b", "size of input buffer" );; | |||
100 | PRINTUSAGE("", "-g", "key size (in bytes)")fprintf(stderr, "%10s %s\t%s\n", "", "-g", "key size (in bytes)" );; | |||
101 | PRINTUSAGE("", "-p", "do performance test")fprintf(stderr, "%10s %s\t%s\n", "", "-p", "do performance test" );; | |||
102 | PRINTUSAGE("", "-4", "run test in multithread mode. th_num number of parallel threads")fprintf(stderr, "%10s %s\t%s\n", "", "-4", "run test in multithread mode. th_num number of parallel threads" );; | |||
103 | PRINTUSAGE("", "-5", "run test for specified time interval(in seconds)")fprintf(stderr, "%10s %s\t%s\n", "", "-5", "run test for specified time interval(in seconds)" );; | |||
104 | PRINTUSAGE("", "--aad", "File with contains additional auth data")fprintf(stderr, "%10s %s\t%s\n", "", "--aad", "File with contains additional auth data" );; | |||
105 | PRINTUSAGE("(rsa)", "-e", "rsa public exponent")fprintf(stderr, "%10s %s\t%s\n", "(rsa)", "-e", "rsa public exponent" );; | |||
106 | PRINTUSAGE("(rc5)", "-r", "number of rounds")fprintf(stderr, "%10s %s\t%s\n", "(rc5)", "-r", "number of rounds" );; | |||
107 | PRINTUSAGE("(rc5)", "-w", "wordsize (32 or 64)")fprintf(stderr, "%10s %s\t%s\n", "(rc5)", "-w", "wordsize (32 or 64)" );; | |||
108 | fprintf(stderrstderr, "\n"); | |||
109 | PRINTUSAGE(progName, "-D -m mode", "Decrypt a buffer")fprintf(stderr, "%10s %s\t%s\n", progName, "-D -m mode", "Decrypt a buffer" );; | |||
110 | PRINTUSAGE("", "", "[-i plaintext] [-o ciphertext] [-k key] [-v iv]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-i plaintext] [-o ciphertext] [-k key] [-v iv]" );; | |||
111 | PRINTUSAGE("", "", "[-p repetitions | -5 time_interval] [-4 th_num]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-p repetitions | -5 time_interval] [-4 th_num]" );; | |||
112 | PRINTUSAGE("", "-m", "cipher mode to use")fprintf(stderr, "%10s %s\t%s\n", "", "-m", "cipher mode to use" );; | |||
113 | PRINTUSAGE("", "-i", "file which contains input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-i", "file which contains input buffer" );; | |||
114 | PRINTUSAGE("", "-o", "file for output buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-o", "file for output buffer" );; | |||
115 | PRINTUSAGE("", "-k", "file which contains key")fprintf(stderr, "%10s %s\t%s\n", "", "-k", "file which contains key" );; | |||
116 | PRINTUSAGE("", "-v", "file which contains initialization vector")fprintf(stderr, "%10s %s\t%s\n", "", "-v", "file which contains initialization vector" );; | |||
117 | PRINTUSAGE("", "-p", "do performance test")fprintf(stderr, "%10s %s\t%s\n", "", "-p", "do performance test" );; | |||
118 | PRINTUSAGE("", "-4", "run test in multithread mode. th_num number of parallel threads")fprintf(stderr, "%10s %s\t%s\n", "", "-4", "run test in multithread mode. th_num number of parallel threads" );; | |||
119 | PRINTUSAGE("", "-5", "run test for specified time interval(in seconds)")fprintf(stderr, "%10s %s\t%s\n", "", "-5", "run test for specified time interval(in seconds)" );; | |||
120 | PRINTUSAGE("", "--aad", "File with contains additional auth data")fprintf(stderr, "%10s %s\t%s\n", "", "--aad", "File with contains additional auth data" );; | |||
121 | fprintf(stderrstderr, "\n"); | |||
122 | PRINTUSAGE(progName, "-H -m mode", "Hash a buffer")fprintf(stderr, "%10s %s\t%s\n", progName, "-H -m mode", "Hash a buffer" );; | |||
123 | PRINTUSAGE("", "", "[-i plaintext] [-o hash]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-i plaintext] [-o hash]" );; | |||
124 | PRINTUSAGE("", "", "[-b bufsize]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-b bufsize]");; | |||
125 | PRINTUSAGE("", "", "[-p repetitions | -5 time_interval] [-4 th_num]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-p repetitions | -5 time_interval] [-4 th_num]" );; | |||
126 | PRINTUSAGE("", "-m", "cipher mode to use")fprintf(stderr, "%10s %s\t%s\n", "", "-m", "cipher mode to use" );; | |||
127 | PRINTUSAGE("", "-i", "file which contains input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-i", "file which contains input buffer" );; | |||
128 | PRINTUSAGE("", "-o", "file for hash")fprintf(stderr, "%10s %s\t%s\n", "", "-o", "file for hash");; | |||
129 | PRINTUSAGE("", "-b", "size of input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-b", "size of input buffer" );; | |||
130 | PRINTUSAGE("", "-p", "do performance test")fprintf(stderr, "%10s %s\t%s\n", "", "-p", "do performance test" );; | |||
131 | PRINTUSAGE("", "-4", "run test in multithread mode. th_num number of parallel threads")fprintf(stderr, "%10s %s\t%s\n", "", "-4", "run test in multithread mode. th_num number of parallel threads" );; | |||
132 | PRINTUSAGE("", "-5", "run test for specified time interval(in seconds)")fprintf(stderr, "%10s %s\t%s\n", "", "-5", "run test for specified time interval(in seconds)" );; | |||
133 | fprintf(stderrstderr, "\n"); | |||
134 | PRINTUSAGE(progName, "-S -m mode", "Sign a buffer")fprintf(stderr, "%10s %s\t%s\n", progName, "-S -m mode", "Sign a buffer" );; | |||
135 | PRINTUSAGE("", "", "[-i plaintext] [-o signature] [-k key]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-i plaintext] [-o signature] [-k key]" );; | |||
136 | PRINTUSAGE("", "", "[-b bufsize]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-b bufsize]");; | |||
137 | PRINTUSAGE("", "", "[-n curvename]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-n curvename]");; | |||
138 | PRINTUSAGE("", "", "[-p repetitions | -5 time_interval] [-4 th_num]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-p repetitions | -5 time_interval] [-4 th_num]" );; | |||
139 | PRINTUSAGE("", "-m", "cipher mode to use")fprintf(stderr, "%10s %s\t%s\n", "", "-m", "cipher mode to use" );; | |||
140 | PRINTUSAGE("", "-i", "file which contains input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-i", "file which contains input buffer" );; | |||
141 | PRINTUSAGE("", "-o", "file for signature")fprintf(stderr, "%10s %s\t%s\n", "", "-o", "file for signature" );; | |||
142 | PRINTUSAGE("", "-k", "file which contains key")fprintf(stderr, "%10s %s\t%s\n", "", "-k", "file which contains key" );; | |||
143 | PRINTUSAGE("", "-n", "name of curve for EC key generation; one of:")fprintf(stderr, "%10s %s\t%s\n", "", "-n", "name of curve for EC key generation; one of:" );; | |||
144 | PRINTUSAGE("", "", " nistp256, nistp384, nistp521")fprintf(stderr, "%10s %s\t%s\n", "", "", " nistp256, nistp384, nistp521" );; | |||
145 | PRINTUSAGE("", "-p", "do performance test")fprintf(stderr, "%10s %s\t%s\n", "", "-p", "do performance test" );; | |||
146 | PRINTUSAGE("", "-4", "run test in multithread mode. th_num number of parallel threads")fprintf(stderr, "%10s %s\t%s\n", "", "-4", "run test in multithread mode. th_num number of parallel threads" );; | |||
147 | PRINTUSAGE("", "-5", "run test for specified time interval(in seconds)")fprintf(stderr, "%10s %s\t%s\n", "", "-5", "run test for specified time interval(in seconds)" );; | |||
148 | fprintf(stderrstderr, "\n"); | |||
149 | PRINTUSAGE(progName, "-V -m mode", "Verify a signed buffer")fprintf(stderr, "%10s %s\t%s\n", progName, "-V -m mode", "Verify a signed buffer" );; | |||
150 | PRINTUSAGE("", "", "[-i plaintext] [-s signature] [-k key]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-i plaintext] [-s signature] [-k key]" );; | |||
151 | PRINTUSAGE("", "", "[-p repetitions | -5 time_interval] [-4 th_num]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-p repetitions | -5 time_interval] [-4 th_num]" );; | |||
152 | PRINTUSAGE("", "-m", "cipher mode to use")fprintf(stderr, "%10s %s\t%s\n", "", "-m", "cipher mode to use" );; | |||
153 | PRINTUSAGE("", "-i", "file which contains input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-i", "file which contains input buffer" );; | |||
154 | PRINTUSAGE("", "-s", "file which contains signature of input buffer")fprintf(stderr, "%10s %s\t%s\n", "", "-s", "file which contains signature of input buffer" );; | |||
155 | PRINTUSAGE("", "-k", "file which contains key")fprintf(stderr, "%10s %s\t%s\n", "", "-k", "file which contains key" );; | |||
156 | PRINTUSAGE("", "-p", "do performance test")fprintf(stderr, "%10s %s\t%s\n", "", "-p", "do performance test" );; | |||
157 | PRINTUSAGE("", "-4", "run test in multithread mode. th_num number of parallel threads")fprintf(stderr, "%10s %s\t%s\n", "", "-4", "run test in multithread mode. th_num number of parallel threads" );; | |||
158 | PRINTUSAGE("", "-5", "run test for specified time interval(in seconds)")fprintf(stderr, "%10s %s\t%s\n", "", "-5", "run test for specified time interval(in seconds)" );; | |||
159 | fprintf(stderrstderr, "\n"); | |||
160 | PRINTUSAGE(progName, "-N -m mode -b bufsize",fprintf(stderr, "%10s %s\t%s\n", progName, "-N -m mode -b bufsize" , "Create a nonce plaintext and key"); | |||
161 | "Create a nonce plaintext and key")fprintf(stderr, "%10s %s\t%s\n", progName, "-N -m mode -b bufsize" , "Create a nonce plaintext and key");; | |||
162 | PRINTUSAGE("", "", "[-g keysize] [-u cxreps]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-g keysize] [-u cxreps]" );; | |||
163 | PRINTUSAGE("", "-g", "key size (in bytes)")fprintf(stderr, "%10s %s\t%s\n", "", "-g", "key size (in bytes)" );; | |||
164 | PRINTUSAGE("", "-u", "number of repetitions of context creation")fprintf(stderr, "%10s %s\t%s\n", "", "-u", "number of repetitions of context creation" );; | |||
165 | fprintf(stderrstderr, "\n"); | |||
166 | PRINTUSAGE(progName, "-R [-g keysize] [-e exp]",fprintf(stderr, "%10s %s\t%s\n", progName, "-R [-g keysize] [-e exp]" , "Test the RSA populate key function"); | |||
167 | "Test the RSA populate key function")fprintf(stderr, "%10s %s\t%s\n", progName, "-R [-g keysize] [-e exp]" , "Test the RSA populate key function");; | |||
168 | PRINTUSAGE("", "", "[-r repetitions]")fprintf(stderr, "%10s %s\t%s\n", "", "", "[-r repetitions]");; | |||
169 | PRINTUSAGE("", "-g", "key size (in bytes)")fprintf(stderr, "%10s %s\t%s\n", "", "-g", "key size (in bytes)" );; | |||
170 | PRINTUSAGE("", "-e", "rsa public exponent")fprintf(stderr, "%10s %s\t%s\n", "", "-e", "rsa public exponent" );; | |||
171 | PRINTUSAGE("", "-r", "repetitions of the test")fprintf(stderr, "%10s %s\t%s\n", "", "-r", "repetitions of the test" );; | |||
172 | fprintf(stderrstderr, "\n"); | |||
173 | PRINTUSAGE(progName, "-F", "Run the FIPS self-test")fprintf(stderr, "%10s %s\t%s\n", progName, "-F", "Run the FIPS self-test" );; | |||
174 | fprintf(stderrstderr, "\n"); | |||
175 | PRINTUSAGE(progName, "-T [-m mode1,mode2...]", "Run the BLAPI self-test")fprintf(stderr, "%10s %s\t%s\n", progName, "-T [-m mode1,mode2...]" , "Run the BLAPI self-test");; | |||
176 | fprintf(stderrstderr, "\n"); | |||
177 | exit(1); | |||
178 | } | |||
179 | ||||
180 | /* Helper functions for ascii<-->binary conversion/reading/writing */ | |||
181 | ||||
182 | /* XXX argh */ | |||
183 | struct item_with_arena { | |||
184 | SECItem *item; | |||
185 | PLArenaPool *arena; | |||
186 | }; | |||
187 | ||||
188 | static PRInt32 | |||
189 | get_binary(void *arg, const unsigned char *ibuf, PRInt32 size) | |||
190 | { | |||
191 | struct item_with_arena *it = arg; | |||
192 | SECItem *binary = it->item; | |||
193 | SECItem *tmp; | |||
194 | int index; | |||
195 | if (binary->data == NULL((void*)0)) { | |||
196 | tmp = SECITEM_AllocItemSECITEM_AllocItem_Util(it->arena, NULL((void*)0), size); | |||
197 | binary->data = tmp->data; | |||
198 | binary->len = tmp->len; | |||
199 | index = 0; | |||
200 | } else { | |||
201 | SECITEM_ReallocItem(NULL((void*)0), binary, binary->len, binary->len + size); | |||
202 | index = binary->len; | |||
203 | } | |||
204 | PORT_Memcpymemcpy(&binary->data[index], ibuf, size); | |||
205 | return binary->len; | |||
206 | } | |||
207 | ||||
208 | static SECStatus | |||
209 | atob(SECItem *ascii, SECItem *binary, PLArenaPool *arena) | |||
210 | { | |||
211 | SECStatus status; | |||
212 | NSSBase64Decoder *cx; | |||
213 | struct item_with_arena it; | |||
214 | int len; | |||
215 | binary->data = NULL((void*)0); | |||
216 | binary->len = 0; | |||
217 | it.item = binary; | |||
218 | it.arena = arena; | |||
219 | len = (strncmp((const char *)&ascii->data[ascii->len - 2], "\r\n", 2)) ? ascii->len | |||
220 | : ascii->len - 2; | |||
221 | cx = NSSBase64Decoder_CreateNSSBase64Decoder_Create_Util(get_binary, &it); | |||
222 | status = NSSBase64Decoder_UpdateNSSBase64Decoder_Update_Util(cx, (const char *)ascii->data, len); | |||
223 | status = NSSBase64Decoder_DestroyNSSBase64Decoder_Destroy_Util(cx, PR_FALSE0); | |||
224 | return status; | |||
225 | } | |||
226 | ||||
227 | static PRInt32 | |||
228 | output_ascii(void *arg, const char *obuf, PRInt32 size) | |||
229 | { | |||
230 | PRFileDesc *outfile = arg; | |||
231 | PRInt32 nb = PR_Write(outfile, obuf, size); | |||
232 | if (nb != size) { | |||
233 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_IO); | |||
234 | return -1; | |||
235 | } | |||
236 | return nb; | |||
237 | } | |||
238 | ||||
239 | static SECStatus | |||
240 | btoa_file(SECItem *binary, PRFileDesc *outfile) | |||
241 | { | |||
242 | SECStatus status; | |||
243 | NSSBase64Encoder *cx; | |||
244 | if (binary->len == 0) | |||
245 | return SECSuccess; | |||
246 | cx = NSSBase64Encoder_CreateNSSBase64Encoder_Create_Util(output_ascii, outfile); | |||
247 | status = NSSBase64Encoder_UpdateNSSBase64Encoder_Update_Util(cx, binary->data, binary->len); | |||
248 | status = NSSBase64Encoder_DestroyNSSBase64Encoder_Destroy_Util(cx, PR_FALSE0); | |||
249 | status = PR_Write(outfile, "\r\n", 2); | |||
250 | return status; | |||
251 | } | |||
252 | ||||
253 | SECStatus | |||
254 | hex_from_2char(unsigned char *c2, unsigned char *byteval) | |||
255 | { | |||
256 | int i; | |||
257 | unsigned char offset; | |||
258 | *byteval = 0; | |||
259 | for (i = 0; i < 2; i++) { | |||
260 | if (c2[i] >= '0' && c2[i] <= '9') { | |||
261 | offset = c2[i] - '0'; | |||
262 | *byteval |= offset << 4 * (1 - i); | |||
263 | } else if (c2[i] >= 'a' && c2[i] <= 'f') { | |||
264 | offset = c2[i] - 'a'; | |||
265 | *byteval |= (offset + 10) << 4 * (1 - i); | |||
266 | } else if (c2[i] >= 'A' && c2[i] <= 'F') { | |||
267 | offset = c2[i] - 'A'; | |||
268 | *byteval |= (offset + 10) << 4 * (1 - i); | |||
269 | } else { | |||
270 | return SECFailure; | |||
271 | } | |||
272 | } | |||
273 | return SECSuccess; | |||
274 | } | |||
275 | ||||
276 | SECStatus | |||
277 | char2_from_hex(unsigned char byteval, char *c2) | |||
278 | { | |||
279 | int i; | |||
280 | unsigned char offset; | |||
281 | for (i = 0; i < 2; i++) { | |||
282 | offset = (byteval >> 4 * (1 - i)) & 0x0f; | |||
283 | if (offset < 10) { | |||
284 | c2[i] = '0' + offset; | |||
285 | } else { | |||
286 | c2[i] = 'A' + offset - 10; | |||
287 | } | |||
288 | } | |||
289 | return SECSuccess; | |||
290 | } | |||
291 | ||||
292 | void | |||
293 | serialize_key(SECItem *it, int ni, PRFileDesc *file) | |||
294 | { | |||
295 | unsigned char len[4]; | |||
296 | int i; | |||
297 | NSSBase64Encoder *cx; | |||
298 | cx = NSSBase64Encoder_CreateNSSBase64Encoder_Create_Util(output_ascii, file); | |||
299 | for (i = 0; i < ni; i++, it++) { | |||
300 | len[0] = (it->len >> 24) & 0xff; | |||
301 | len[1] = (it->len >> 16) & 0xff; | |||
302 | len[2] = (it->len >> 8) & 0xff; | |||
303 | len[3] = (it->len & 0xff); | |||
304 | NSSBase64Encoder_UpdateNSSBase64Encoder_Update_Util(cx, len, 4); | |||
305 | NSSBase64Encoder_UpdateNSSBase64Encoder_Update_Util(cx, it->data, it->len); | |||
306 | } | |||
307 | NSSBase64Encoder_DestroyNSSBase64Encoder_Destroy_Util(cx, PR_FALSE0); | |||
308 | PR_Write(file, "\r\n", 2); | |||
309 | } | |||
310 | ||||
311 | void | |||
312 | key_from_filedata(PLArenaPool *arena, SECItem *it, int ns, int ni, SECItem *filedata) | |||
313 | { | |||
314 | int fpos = 0; | |||
315 | int i, len; | |||
316 | unsigned char *buf = filedata->data; | |||
| ||||
317 | for (i = 0; i < ni; i++) { | |||
318 | len = (buf[fpos++] & 0xff) << 24; | |||
319 | len |= (buf[fpos++] & 0xff) << 16; | |||
320 | len |= (buf[fpos++] & 0xff) << 8; | |||
321 | len |= (buf[fpos++] & 0xff); | |||
322 | if (ns <= i) { | |||
323 | if (len > 0) { | |||
324 | it->len = len; | |||
325 | it->data = PORT_ArenaAllocPORT_ArenaAlloc_Util(arena, it->len); | |||
326 | PORT_Memcpymemcpy(it->data, &buf[fpos], it->len); | |||
327 | } else { | |||
328 | it->len = 0; | |||
329 | it->data = NULL((void*)0); | |||
330 | } | |||
331 | it++; | |||
332 | } | |||
333 | fpos += len; | |||
334 | } | |||
335 | } | |||
336 | ||||
337 | static RSAPrivateKey * | |||
338 | rsakey_from_filedata(PLArenaPool *arena, SECItem *filedata) | |||
339 | { | |||
340 | RSAPrivateKey *key; | |||
341 | key = (RSAPrivateKey *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(arena, sizeof(RSAPrivateKey)); | |||
342 | key->arena = arena; | |||
343 | key_from_filedata(arena, &key->version, 0, 9, filedata); | |||
344 | return key; | |||
345 | } | |||
346 | ||||
347 | static PQGParams * | |||
348 | pqg_from_filedata(PLArenaPool *arena, SECItem *filedata) | |||
349 | { | |||
350 | PQGParams *pqg; | |||
351 | pqg = (PQGParams *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(arena, sizeof(PQGParams)); | |||
352 | pqg->arena = arena; | |||
353 | key_from_filedata(arena, &pqg->prime, 0, 3, filedata); | |||
354 | return pqg; | |||
355 | } | |||
356 | ||||
357 | static DSAPrivateKey * | |||
358 | dsakey_from_filedata(PLArenaPool *arena, SECItem *filedata) | |||
359 | { | |||
360 | DSAPrivateKey *key; | |||
361 | key = (DSAPrivateKey *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(arena, sizeof(DSAPrivateKey)); | |||
362 | key->params.arena = arena; | |||
363 | key_from_filedata(arena, &key->params.prime, 0, 5, filedata); | |||
364 | return key; | |||
365 | } | |||
366 | ||||
367 | static ECPrivateKey * | |||
368 | eckey_from_filedata(PLArenaPool *arena, SECItem *filedata) | |||
369 | { | |||
370 | ECPrivateKey *key; | |||
371 | SECStatus rv; | |||
372 | ECParams *tmpECParams = NULL((void*)0); | |||
373 | key = (ECPrivateKey *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(arena, sizeof(ECPrivateKey)); | |||
374 | /* read and convert params */ | |||
375 | key->ecParams.arena = arena; | |||
376 | key_from_filedata(arena, &key->ecParams.DEREncoding, 0, 1, filedata); | |||
377 | rv = SECOID_Init(); | |||
378 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 378); exit(-1); }; | |||
379 | rv = EC_DecodeParams(&key->ecParams.DEREncoding, &tmpECParams); | |||
380 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 380); exit(-1); }; | |||
381 | rv = EC_CopyParams(key->ecParams.arena, &key->ecParams, tmpECParams); | |||
382 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 382); exit(-1); }; | |||
383 | rv = SECOID_Shutdown(); | |||
384 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 384); exit(-1); }; | |||
385 | PORT_FreeArenaPORT_FreeArena_Util(tmpECParams->arena, PR_TRUE1); | |||
386 | /* read key */ | |||
387 | key_from_filedata(arena, &key->publicValue, 1, 3, filedata); | |||
388 | return key; | |||
389 | } | |||
390 | ||||
391 | typedef struct curveNameTagPairStr { | |||
392 | char *curveName; | |||
393 | SECOidTag curveOidTag; | |||
394 | } CurveNameTagPair; | |||
395 | ||||
396 | static CurveNameTagPair nameTagPair[] = { | |||
397 | { "sect163k1", SEC_OID_SECG_EC_SECT163K1 }, | |||
398 | { "nistk163", SEC_OID_SECG_EC_SECT163K1 }, | |||
399 | { "sect163r1", SEC_OID_SECG_EC_SECT163R1 }, | |||
400 | { "sect163r2", SEC_OID_SECG_EC_SECT163R2 }, | |||
401 | { "nistb163", SEC_OID_SECG_EC_SECT163R2 }, | |||
402 | { "sect193r1", SEC_OID_SECG_EC_SECT193R1 }, | |||
403 | { "sect193r2", SEC_OID_SECG_EC_SECT193R2 }, | |||
404 | { "sect233k1", SEC_OID_SECG_EC_SECT233K1 }, | |||
405 | { "nistk233", SEC_OID_SECG_EC_SECT233K1 }, | |||
406 | { "sect233r1", SEC_OID_SECG_EC_SECT233R1 }, | |||
407 | { "nistb233", SEC_OID_SECG_EC_SECT233R1 }, | |||
408 | { "sect239k1", SEC_OID_SECG_EC_SECT239K1 }, | |||
409 | { "sect283k1", SEC_OID_SECG_EC_SECT283K1 }, | |||
410 | { "nistk283", SEC_OID_SECG_EC_SECT283K1 }, | |||
411 | { "sect283r1", SEC_OID_SECG_EC_SECT283R1 }, | |||
412 | { "nistb283", SEC_OID_SECG_EC_SECT283R1 }, | |||
413 | { "sect409k1", SEC_OID_SECG_EC_SECT409K1 }, | |||
414 | { "nistk409", SEC_OID_SECG_EC_SECT409K1 }, | |||
415 | { "sect409r1", SEC_OID_SECG_EC_SECT409R1 }, | |||
416 | { "nistb409", SEC_OID_SECG_EC_SECT409R1 }, | |||
417 | { "sect571k1", SEC_OID_SECG_EC_SECT571K1 }, | |||
418 | { "nistk571", SEC_OID_SECG_EC_SECT571K1 }, | |||
419 | { "sect571r1", SEC_OID_SECG_EC_SECT571R1 }, | |||
420 | { "nistb571", SEC_OID_SECG_EC_SECT571R1 }, | |||
421 | { "secp160k1", SEC_OID_SECG_EC_SECP160K1 }, | |||
422 | { "secp160r1", SEC_OID_SECG_EC_SECP160R1 }, | |||
423 | { "secp160r2", SEC_OID_SECG_EC_SECP160R2 }, | |||
424 | { "secp192k1", SEC_OID_SECG_EC_SECP192K1 }, | |||
425 | { "secp192r1", SEC_OID_SECG_EC_SECP192R1SEC_OID_ANSIX962_EC_PRIME192V1 }, | |||
426 | { "nistp192", SEC_OID_SECG_EC_SECP192R1SEC_OID_ANSIX962_EC_PRIME192V1 }, | |||
427 | { "secp224k1", SEC_OID_SECG_EC_SECP224K1 }, | |||
428 | { "secp224r1", SEC_OID_SECG_EC_SECP224R1 }, | |||
429 | { "nistp224", SEC_OID_SECG_EC_SECP224R1 }, | |||
430 | { "secp256k1", SEC_OID_SECG_EC_SECP256K1 }, | |||
431 | { "secp256r1", SEC_OID_SECG_EC_SECP256R1SEC_OID_ANSIX962_EC_PRIME256V1 }, | |||
432 | { "nistp256", SEC_OID_SECG_EC_SECP256R1SEC_OID_ANSIX962_EC_PRIME256V1 }, | |||
433 | { "secp384r1", SEC_OID_SECG_EC_SECP384R1 }, | |||
434 | { "nistp384", SEC_OID_SECG_EC_SECP384R1 }, | |||
435 | { "secp521r1", SEC_OID_SECG_EC_SECP521R1 }, | |||
436 | { "nistp521", SEC_OID_SECG_EC_SECP521R1 }, | |||
437 | ||||
438 | { "prime192v1", SEC_OID_ANSIX962_EC_PRIME192V1 }, | |||
439 | { "prime192v2", SEC_OID_ANSIX962_EC_PRIME192V2 }, | |||
440 | { "prime192v3", SEC_OID_ANSIX962_EC_PRIME192V3 }, | |||
441 | { "prime239v1", SEC_OID_ANSIX962_EC_PRIME239V1 }, | |||
442 | { "prime239v2", SEC_OID_ANSIX962_EC_PRIME239V2 }, | |||
443 | { "prime239v3", SEC_OID_ANSIX962_EC_PRIME239V3 }, | |||
444 | ||||
445 | { "c2pnb163v1", SEC_OID_ANSIX962_EC_C2PNB163V1 }, | |||
446 | { "c2pnb163v2", SEC_OID_ANSIX962_EC_C2PNB163V2 }, | |||
447 | { "c2pnb163v3", SEC_OID_ANSIX962_EC_C2PNB163V3 }, | |||
448 | { "c2pnb176v1", SEC_OID_ANSIX962_EC_C2PNB176V1 }, | |||
449 | { "c2tnb191v1", SEC_OID_ANSIX962_EC_C2TNB191V1 }, | |||
450 | { "c2tnb191v2", SEC_OID_ANSIX962_EC_C2TNB191V2 }, | |||
451 | { "c2tnb191v3", SEC_OID_ANSIX962_EC_C2TNB191V3 }, | |||
452 | { "c2onb191v4", SEC_OID_ANSIX962_EC_C2ONB191V4 }, | |||
453 | { "c2onb191v5", SEC_OID_ANSIX962_EC_C2ONB191V5 }, | |||
454 | { "c2pnb208w1", SEC_OID_ANSIX962_EC_C2PNB208W1 }, | |||
455 | { "c2tnb239v1", SEC_OID_ANSIX962_EC_C2TNB239V1 }, | |||
456 | { "c2tnb239v2", SEC_OID_ANSIX962_EC_C2TNB239V2 }, | |||
457 | { "c2tnb239v3", SEC_OID_ANSIX962_EC_C2TNB239V3 }, | |||
458 | { "c2onb239v4", SEC_OID_ANSIX962_EC_C2ONB239V4 }, | |||
459 | { "c2onb239v5", SEC_OID_ANSIX962_EC_C2ONB239V5 }, | |||
460 | { "c2pnb272w1", SEC_OID_ANSIX962_EC_C2PNB272W1 }, | |||
461 | { "c2pnb304w1", SEC_OID_ANSIX962_EC_C2PNB304W1 }, | |||
462 | { "c2tnb359v1", SEC_OID_ANSIX962_EC_C2TNB359V1 }, | |||
463 | { "c2pnb368w1", SEC_OID_ANSIX962_EC_C2PNB368W1 }, | |||
464 | { "c2tnb431r1", SEC_OID_ANSIX962_EC_C2TNB431R1 }, | |||
465 | ||||
466 | { "secp112r1", SEC_OID_SECG_EC_SECP112R1 }, | |||
467 | { "secp112r2", SEC_OID_SECG_EC_SECP112R2 }, | |||
468 | { "secp128r1", SEC_OID_SECG_EC_SECP128R1 }, | |||
469 | { "secp128r2", SEC_OID_SECG_EC_SECP128R2 }, | |||
470 | ||||
471 | { "sect113r1", SEC_OID_SECG_EC_SECT113R1 }, | |||
472 | { "sect113r2", SEC_OID_SECG_EC_SECT113R2 }, | |||
473 | { "sect131r1", SEC_OID_SECG_EC_SECT131R1 }, | |||
474 | { "sect131r2", SEC_OID_SECG_EC_SECT131R2 }, | |||
475 | { "curve25519", SEC_OID_CURVE25519 }, | |||
476 | }; | |||
477 | ||||
478 | static SECItem * | |||
479 | getECParams(const char *curve) | |||
480 | { | |||
481 | SECItem *ecparams; | |||
482 | SECOidData *oidData = NULL((void*)0); | |||
483 | SECOidTag curveOidTag = SEC_OID_UNKNOWN; /* default */ | |||
484 | int i, numCurves; | |||
485 | ||||
486 | if (curve != NULL((void*)0)) { | |||
487 | numCurves = sizeof(nameTagPair) / sizeof(CurveNameTagPair); | |||
488 | for (i = 0; ((i < numCurves) && (curveOidTag == SEC_OID_UNKNOWN)); | |||
489 | i++) { | |||
490 | if (PL_strcmp(curve, nameTagPair[i].curveName) == 0) | |||
491 | curveOidTag = nameTagPair[i].curveOidTag; | |||
492 | } | |||
493 | } | |||
494 | ||||
495 | /* Return NULL if curve name is not recognized */ | |||
496 | if ((curveOidTag == SEC_OID_UNKNOWN) || | |||
497 | (oidData = SECOID_FindOIDByTagSECOID_FindOIDByTag_Util(curveOidTag)) == NULL((void*)0)) { | |||
498 | fprintf(stderrstderr, "Unrecognized elliptic curve %s\n", curve); | |||
499 | return NULL((void*)0); | |||
500 | } | |||
501 | ||||
502 | ecparams = SECITEM_AllocItemSECITEM_AllocItem_Util(NULL((void*)0), NULL((void*)0), (2 + oidData->oid.len)); | |||
503 | ||||
504 | /* | |||
505 | * ecparams->data needs to contain the ASN encoding of an object ID (OID) | |||
506 | * representing the named curve. The actual OID is in | |||
507 | * oidData->oid.data so we simply prepend 0x06 and OID length | |||
508 | */ | |||
509 | ecparams->data[0] = SEC_ASN1_OBJECT_ID0x06; | |||
510 | ecparams->data[1] = oidData->oid.len; | |||
511 | memcpy(ecparams->data + 2, oidData->oid.data, oidData->oid.len); | |||
512 | ||||
513 | return ecparams; | |||
514 | } | |||
515 | ||||
516 | static void | |||
517 | dump_pqg(PQGParams *pqg) | |||
518 | { | |||
519 | SECU_PrintInteger(stdoutstdout, &pqg->prime, "PRIME:", 0); | |||
520 | SECU_PrintInteger(stdoutstdout, &pqg->subPrime, "SUBPRIME:", 0); | |||
521 | SECU_PrintInteger(stdoutstdout, &pqg->base, "BASE:", 0); | |||
522 | } | |||
523 | ||||
524 | static void | |||
525 | dump_dsakey(DSAPrivateKey *key) | |||
526 | { | |||
527 | dump_pqg(&key->params); | |||
528 | SECU_PrintInteger(stdoutstdout, &key->publicValue, "PUBLIC VALUE:", 0); | |||
529 | SECU_PrintInteger(stdoutstdout, &key->privateValue, "PRIVATE VALUE:", 0); | |||
530 | } | |||
531 | ||||
532 | static void | |||
533 | dump_ecp(ECParams *ecp) | |||
534 | { | |||
535 | /* TODO other fields */ | |||
536 | SECU_PrintInteger(stdoutstdout, &ecp->base, "BASE POINT:", 0); | |||
537 | } | |||
538 | ||||
539 | static void | |||
540 | dump_eckey(ECPrivateKey *key) | |||
541 | { | |||
542 | dump_ecp(&key->ecParams); | |||
543 | SECU_PrintInteger(stdoutstdout, &key->publicValue, "PUBLIC VALUE:", 0); | |||
544 | SECU_PrintInteger(stdoutstdout, &key->privateValue, "PRIVATE VALUE:", 0); | |||
545 | } | |||
546 | ||||
547 | static void | |||
548 | dump_rsakey(RSAPrivateKey *key) | |||
549 | { | |||
550 | SECU_PrintInteger(stdoutstdout, &key->version, "VERSION:", 0); | |||
551 | SECU_PrintInteger(stdoutstdout, &key->modulus, "MODULUS:", 0); | |||
552 | SECU_PrintInteger(stdoutstdout, &key->publicExponent, "PUBLIC EXP:", 0); | |||
553 | SECU_PrintInteger(stdoutstdout, &key->privateExponent, "PRIVATE EXP:", 0); | |||
554 | SECU_PrintInteger(stdoutstdout, &key->prime1, "CRT PRIME 1:", 0); | |||
555 | SECU_PrintInteger(stdoutstdout, &key->prime2, "CRT PRIME 2:", 0); | |||
556 | SECU_PrintInteger(stdoutstdout, &key->exponent1, "CRT EXP 1:", 0); | |||
557 | SECU_PrintInteger(stdoutstdout, &key->exponent2, "CRT EXP 2:", 0); | |||
558 | SECU_PrintInteger(stdoutstdout, &key->coefficient, "CRT COEFFICIENT:", 0); | |||
559 | } | |||
560 | ||||
561 | typedef enum { | |||
562 | bltestBase64Encoded, /* Base64 encoded ASCII */ | |||
563 | bltestBinary, /* straight binary */ | |||
564 | bltestHexSpaceDelim, /* 0x12 0x34 0xab 0xCD ... */ | |||
565 | bltestHexStream /* 1234abCD ... */ | |||
566 | } bltestIOMode; | |||
567 | ||||
568 | typedef struct | |||
569 | { | |||
570 | SECItem buf; | |||
571 | SECItem pBuf; | |||
572 | bltestIOMode mode; | |||
573 | PRFileDesc *file; | |||
574 | } bltestIO; | |||
575 | ||||
576 | typedef SECStatus (*bltestSymmCipherFn)(void *cx, | |||
577 | unsigned char *output, | |||
578 | unsigned int *outputLen, | |||
579 | unsigned int maxOutputLen, | |||
580 | const unsigned char *input, | |||
581 | unsigned int inputLen); | |||
582 | ||||
583 | typedef SECStatus (*bltestAEADFn)(void *cx, | |||
584 | unsigned char *output, | |||
585 | unsigned int *outputLen, | |||
586 | unsigned int maxOutputLen, | |||
587 | const unsigned char *input, | |||
588 | unsigned int inputLen, | |||
589 | const unsigned char *nonce, | |||
590 | unsigned int nonceLen, | |||
591 | const unsigned char *ad, | |||
592 | unsigned int adLen); | |||
593 | ||||
594 | typedef SECStatus (*bltestPubKeyCipherFn)(void *key, | |||
595 | SECItem *output, | |||
596 | const SECItem *input); | |||
597 | ||||
598 | typedef SECStatus (*bltestHashCipherFn)(unsigned char *dest, | |||
599 | const unsigned char *src, | |||
600 | PRUint32 src_length); | |||
601 | ||||
602 | /* Note: Algorithms are grouped in order to support is_symmkeyCipher / | |||
603 | * is_pubkeyCipher / is_hashCipher / is_sigCipher | |||
604 | */ | |||
605 | typedef enum { | |||
606 | bltestINVALID = -1, | |||
607 | bltestDES_ECB, /* Symmetric Key Ciphers */ | |||
608 | bltestDES_CBC, /* . */ | |||
609 | bltestDES_EDE_ECB, /* . */ | |||
610 | bltestDES_EDE_CBC, /* . */ | |||
611 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
612 | bltestRC2_ECB, /* . */ | |||
613 | bltestRC2_CBC, /* . */ | |||
614 | #endif | |||
615 | bltestRC4, /* . */ | |||
616 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
617 | bltestRC5_ECB, /* . */ | |||
618 | bltestRC5_CBC, /* . */ | |||
619 | #endif | |||
620 | bltestAES_ECB, /* . */ | |||
621 | bltestAES_CBC, /* . */ | |||
622 | bltestAES_CTS, /* . */ | |||
623 | bltestAES_CTR, /* . */ | |||
624 | bltestAES_GCM, /* . */ | |||
625 | bltestCAMELLIA_ECB, /* . */ | |||
626 | bltestCAMELLIA_CBC, /* . */ | |||
627 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
628 | bltestSEED_ECB, /* SEED algorithm */ | |||
629 | bltestSEED_CBC, /* SEED algorithm */ | |||
630 | #endif | |||
631 | bltestCHACHA20_CTR, /* ChaCha20 block cipher */ | |||
632 | bltestCHACHA20, /* ChaCha20 + Poly1305 */ | |||
633 | bltestRSA, /* Public Key Ciphers */ | |||
634 | bltestRSA_OAEP, /* . (Public Key Enc.) */ | |||
635 | bltestRSA_PSS, /* . (Public Key Sig.) */ | |||
636 | bltestECDSA, /* . (Public Key Sig.) */ | |||
637 | bltestDSA, /* . (Public Key Sig.) */ | |||
638 | bltestMD2, /* Hash algorithms */ | |||
639 | bltestMD5, /* . */ | |||
640 | bltestSHA1, /* . */ | |||
641 | bltestSHA224, /* . */ | |||
642 | bltestSHA256, /* . */ | |||
643 | bltestSHA384, /* . */ | |||
644 | bltestSHA512, /* . */ | |||
645 | bltestSHA3_224, /* . */ | |||
646 | bltestSHA3_256, /* . */ | |||
647 | bltestSHA3_384, /* . */ | |||
648 | bltestSHA3_512, /* . */ | |||
649 | NUMMODES | |||
650 | } bltestCipherMode; | |||
651 | ||||
652 | static char *mode_strings[] = { | |||
653 | "des_ecb", | |||
654 | "des_cbc", | |||
655 | "des3_ecb", | |||
656 | "des3_cbc", | |||
657 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
658 | "rc2_ecb", | |||
659 | "rc2_cbc", | |||
660 | #endif | |||
661 | "rc4", | |||
662 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
663 | "rc5_ecb", | |||
664 | "rc5_cbc", | |||
665 | #endif | |||
666 | "aes_ecb", | |||
667 | "aes_cbc", | |||
668 | "aes_cts", | |||
669 | "aes_ctr", | |||
670 | "aes_gcm", | |||
671 | "camellia_ecb", | |||
672 | "camellia_cbc", | |||
673 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
674 | "seed_ecb", | |||
675 | "seed_cbc", | |||
676 | #endif | |||
677 | "chacha20_ctr", | |||
678 | "chacha20_poly1305", | |||
679 | "rsa", | |||
680 | "rsa_oaep", | |||
681 | "rsa_pss", | |||
682 | "ecdsa", | |||
683 | /*"pqg",*/ | |||
684 | "dsa", | |||
685 | "md2", | |||
686 | "md5", | |||
687 | "sha1", | |||
688 | "sha224", | |||
689 | "sha256", | |||
690 | "sha384", | |||
691 | "sha512", | |||
692 | "sha3_224", | |||
693 | "sha3_256", | |||
694 | "sha3_384", | |||
695 | "sha3_512", | |||
696 | }; | |||
697 | ||||
698 | typedef struct | |||
699 | { | |||
700 | bltestIO key; | |||
701 | bltestIO iv; | |||
702 | } bltestSymmKeyParams; | |||
703 | ||||
704 | typedef struct | |||
705 | { | |||
706 | bltestSymmKeyParams sk; /* must be first */ | |||
707 | bltestIO aad; | |||
708 | } bltestAuthSymmKeyParams; | |||
709 | ||||
710 | typedef struct | |||
711 | { | |||
712 | bltestIO key; | |||
713 | bltestIO iv; | |||
714 | int rounds; | |||
715 | int wordsize; | |||
716 | } bltestRC5Params; | |||
717 | ||||
718 | typedef struct | |||
719 | { | |||
720 | bltestIO key; | |||
721 | int keysizeInBits; | |||
722 | ||||
723 | /* OAEP & PSS */ | |||
724 | HASH_HashType hashAlg; | |||
725 | HASH_HashType maskHashAlg; | |||
726 | bltestIO seed; /* salt if PSS */ | |||
727 | } bltestRSAParams; | |||
728 | ||||
729 | typedef struct | |||
730 | { | |||
731 | bltestIO pqgdata; | |||
732 | unsigned int keysize; | |||
733 | bltestIO keyseed; | |||
734 | bltestIO sigseed; | |||
735 | PQGParams *pqg; | |||
736 | } bltestDSAParams; | |||
737 | ||||
738 | typedef struct | |||
739 | { | |||
740 | char *curveName; | |||
741 | bltestIO sigseed; | |||
742 | } bltestECDSAParams; | |||
743 | ||||
744 | typedef struct | |||
745 | { | |||
746 | bltestIO key; | |||
747 | void *privKey; | |||
748 | void *pubKey; | |||
749 | bltestIO sig; /* if doing verify, the signature (which may come | |||
750 | * from sigfile. */ | |||
751 | ||||
752 | union { | |||
753 | bltestRSAParams rsa; | |||
754 | bltestDSAParams dsa; | |||
755 | bltestECDSAParams ecdsa; | |||
756 | } cipherParams; | |||
757 | } bltestAsymKeyParams; | |||
758 | ||||
759 | typedef struct | |||
760 | { | |||
761 | bltestIO key; /* unused */ | |||
762 | PRBool restart; | |||
763 | } bltestHashParams; | |||
764 | ||||
765 | typedef union { | |||
766 | bltestIO key; | |||
767 | bltestSymmKeyParams sk; | |||
768 | bltestAuthSymmKeyParams ask; | |||
769 | bltestRC5Params rc5; | |||
770 | bltestAsymKeyParams asymk; | |||
771 | bltestHashParams hash; | |||
772 | } bltestParams; | |||
773 | ||||
774 | typedef struct bltestCipherInfoStr bltestCipherInfo; | |||
775 | ||||
776 | struct bltestCipherInfoStr { | |||
777 | PLArenaPool *arena; | |||
778 | /* link to next in multithreaded test */ | |||
779 | bltestCipherInfo *next; | |||
780 | PRThread *cipherThread; | |||
781 | ||||
782 | /* MonteCarlo test flag*/ | |||
783 | PRBool mCarlo; | |||
784 | /* cipher context */ | |||
785 | void *cx; | |||
786 | /* I/O streams */ | |||
787 | bltestIO input; | |||
788 | bltestIO output; | |||
789 | /* Cipher-specific parameters */ | |||
790 | bltestParams params; | |||
791 | /* Cipher mode */ | |||
792 | bltestCipherMode mode; | |||
793 | /* Cipher function (encrypt/decrypt/sign/verify/hash) */ | |||
794 | union { | |||
795 | bltestSymmCipherFn symmkeyCipher; | |||
796 | bltestAEADFn aeadCipher; | |||
797 | bltestPubKeyCipherFn pubkeyCipher; | |||
798 | bltestHashCipherFn hashCipher; | |||
799 | } cipher; | |||
800 | /* performance testing */ | |||
801 | int repetitionsToPerfom; | |||
802 | int seconds; | |||
803 | int repetitions; | |||
804 | int cxreps; | |||
805 | double cxtime; | |||
806 | double optime; | |||
807 | }; | |||
808 | ||||
809 | PRBool | |||
810 | is_symmkeyCipher(bltestCipherMode mode) | |||
811 | { | |||
812 | /* change as needed! */ | |||
813 | if (mode >= bltestDES_ECB && mode <= bltestCHACHA20_CTR) | |||
814 | return PR_TRUE1; | |||
815 | return PR_FALSE0; | |||
816 | } | |||
817 | ||||
818 | PRBool | |||
819 | is_aeadCipher(bltestCipherMode mode) | |||
820 | { | |||
821 | /* change as needed! */ | |||
822 | switch (mode) { | |||
823 | case bltestCHACHA20: | |||
824 | return PR_TRUE1; | |||
825 | default: | |||
826 | return PR_FALSE0; | |||
827 | } | |||
828 | } | |||
829 | ||||
830 | PRBool | |||
831 | is_authCipher(bltestCipherMode mode) | |||
832 | { | |||
833 | /* change as needed! */ | |||
834 | switch (mode) { | |||
835 | case bltestAES_GCM: | |||
836 | case bltestCHACHA20: | |||
837 | return PR_TRUE1; | |||
838 | default: | |||
839 | return PR_FALSE0; | |||
840 | } | |||
841 | } | |||
842 | ||||
843 | PRBool | |||
844 | is_singleShotCipher(bltestCipherMode mode) | |||
845 | { | |||
846 | /* change as needed! */ | |||
847 | switch (mode) { | |||
848 | case bltestAES_GCM: | |||
849 | case bltestAES_CTS: | |||
850 | case bltestCHACHA20_CTR: | |||
851 | case bltestCHACHA20: | |||
852 | return PR_TRUE1; | |||
853 | default: | |||
854 | return PR_FALSE0; | |||
855 | } | |||
856 | } | |||
857 | ||||
858 | PRBool | |||
859 | is_pubkeyCipher(bltestCipherMode mode) | |||
860 | { | |||
861 | /* change as needed! */ | |||
862 | if (mode >= bltestRSA && mode <= bltestDSA) | |||
863 | return PR_TRUE1; | |||
864 | return PR_FALSE0; | |||
865 | } | |||
866 | ||||
867 | PRBool | |||
868 | is_hashCipher(bltestCipherMode mode) | |||
869 | { | |||
870 | /* change as needed! */ | |||
871 | if (mode >= bltestMD2 && mode <= bltestSHA3_512) | |||
872 | return PR_TRUE1; | |||
873 | return PR_FALSE0; | |||
874 | } | |||
875 | ||||
876 | PRBool | |||
877 | is_sigCipher(bltestCipherMode mode) | |||
878 | { | |||
879 | /* change as needed! */ | |||
880 | if (mode >= bltestRSA_PSS && mode <= bltestDSA) | |||
881 | return PR_TRUE1; | |||
882 | return PR_FALSE0; | |||
883 | } | |||
884 | ||||
885 | PRBool | |||
886 | cipher_requires_IV(bltestCipherMode mode) | |||
887 | { | |||
888 | /* change as needed! */ | |||
889 | switch (mode) { | |||
890 | case bltestDES_CBC: | |||
891 | case bltestDES_EDE_CBC: | |||
892 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
893 | case bltestRC2_CBC: | |||
894 | #endif | |||
895 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
896 | case bltestRC5_CBC: | |||
897 | #endif | |||
898 | case bltestAES_CBC: | |||
899 | case bltestAES_CTS: | |||
900 | case bltestAES_CTR: | |||
901 | case bltestAES_GCM: | |||
902 | case bltestCAMELLIA_CBC: | |||
903 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
904 | case bltestSEED_CBC: | |||
905 | #endif | |||
906 | case bltestCHACHA20_CTR: | |||
907 | case bltestCHACHA20: | |||
908 | return PR_TRUE1; | |||
909 | default: | |||
910 | return PR_FALSE0; | |||
911 | } | |||
912 | } | |||
913 | ||||
914 | SECStatus finishIO(bltestIO *output, PRFileDesc *file); | |||
915 | ||||
916 | SECStatus | |||
917 | setupIO(PLArenaPool *arena, bltestIO *input, PRFileDesc *file, | |||
918 | char *str, int numBytes) | |||
919 | { | |||
920 | SECStatus rv = SECSuccess; | |||
921 | SECItem fileData; | |||
922 | SECItem *in; | |||
923 | unsigned char *tok; | |||
924 | unsigned int i, j; | |||
925 | PRBool needToFreeFile = PR_FALSE0; | |||
926 | ||||
927 | if (file && (numBytes == 0 || file == PR_STDINPR_GetSpecialFD(PR_StandardInput))) { | |||
928 | /* grabbing data from a file */ | |||
929 | rv = SECU_FileToItem(&fileData, file); | |||
930 | if (rv != SECSuccess) | |||
931 | return SECFailure; | |||
932 | in = &fileData; | |||
933 | needToFreeFile = PR_TRUE1; | |||
934 | } else if (str) { | |||
935 | /* grabbing data from command line */ | |||
936 | fileData.data = (unsigned char *)str; | |||
937 | fileData.len = PL_strlen(str); | |||
938 | in = &fileData; | |||
939 | } else if (file) { | |||
940 | /* create nonce */ | |||
941 | SECITEM_AllocItemSECITEM_AllocItem_Util(arena, &input->buf, numBytes); | |||
942 | RNG_GenerateGlobalRandomBytes(input->buf.data, numBytes); | |||
943 | return finishIO(input, file); | |||
944 | } else { | |||
945 | return SECFailure; | |||
946 | } | |||
947 | ||||
948 | switch (input->mode) { | |||
949 | case bltestBase64Encoded: | |||
950 | if (in->len == 0) { | |||
951 | input->buf.data = NULL((void*)0); | |||
952 | input->buf.len = 0; | |||
953 | break; | |||
954 | } | |||
955 | rv = atob(in, &input->buf, arena); | |||
956 | break; | |||
957 | case bltestBinary: | |||
958 | if (in->len == 0) { | |||
959 | input->buf.data = NULL((void*)0); | |||
960 | input->buf.len = 0; | |||
961 | break; | |||
962 | } | |||
963 | if (in->data[in->len - 1] == '\n') | |||
964 | --in->len; | |||
965 | if (in->data[in->len - 1] == '\r') | |||
966 | --in->len; | |||
967 | rv = SECITEM_CopyItemSECITEM_CopyItem_Util(arena, &input->buf, in); | |||
968 | break; | |||
969 | case bltestHexSpaceDelim: | |||
970 | SECITEM_AllocItemSECITEM_AllocItem_Util(arena, &input->buf, in->len / 5); | |||
971 | for (i = 0, j = 0; i < in->len; i += 5, j++) { | |||
972 | tok = &in->data[i]; | |||
973 | if (tok[0] != '0' || tok[1] != 'x' || tok[4] != ' ') | |||
974 | /* bad hex token */ | |||
975 | break; | |||
976 | ||||
977 | rv = hex_from_2char(&tok[2], input->buf.data + j); | |||
978 | if (rv) | |||
979 | break; | |||
980 | } | |||
981 | break; | |||
982 | case bltestHexStream: | |||
983 | SECITEM_AllocItemSECITEM_AllocItem_Util(arena, &input->buf, in->len / 2); | |||
984 | for (i = 0, j = 0; i < in->len; i += 2, j++) { | |||
985 | tok = &in->data[i]; | |||
986 | rv = hex_from_2char(tok, input->buf.data + j); | |||
987 | if (rv) | |||
988 | break; | |||
989 | } | |||
990 | break; | |||
991 | } | |||
992 | ||||
993 | if (needToFreeFile) | |||
994 | SECITEM_FreeItemSECITEM_FreeItem_Util(&fileData, PR_FALSE0); | |||
995 | return rv; | |||
996 | } | |||
997 | ||||
998 | SECStatus | |||
999 | finishIO(bltestIO *output, PRFileDesc *file) | |||
1000 | { | |||
1001 | SECStatus rv = SECSuccess; | |||
1002 | PRInt32 nb; | |||
1003 | unsigned char byteval; | |||
1004 | SECItem *it; | |||
1005 | char hexstr[5]; | |||
1006 | unsigned int i; | |||
1007 | if (output->pBuf.len > 0) { | |||
1008 | it = &output->pBuf; | |||
1009 | } else { | |||
1010 | it = &output->buf; | |||
1011 | } | |||
1012 | switch (output->mode) { | |||
1013 | case bltestBase64Encoded: | |||
1014 | rv = btoa_file(it, file); | |||
1015 | break; | |||
1016 | case bltestBinary: | |||
1017 | nb = PR_Write(file, it->data, it->len); | |||
1018 | rv = (nb == (PRInt32)it->len) ? SECSuccess : SECFailure; | |||
1019 | break; | |||
1020 | case bltestHexSpaceDelim: | |||
1021 | hexstr[0] = '0'; | |||
1022 | hexstr[1] = 'x'; | |||
1023 | hexstr[4] = ' '; | |||
1024 | for (i = 0; i < it->len; i++) { | |||
1025 | byteval = it->data[i]; | |||
1026 | rv = char2_from_hex(byteval, hexstr + 2); | |||
1027 | nb = PR_Write(file, hexstr, 5); | |||
1028 | if (rv) | |||
1029 | break; | |||
1030 | } | |||
1031 | PR_Write(file, "\n", 1); | |||
1032 | break; | |||
1033 | case bltestHexStream: | |||
1034 | for (i = 0; i < it->len; i++) { | |||
1035 | byteval = it->data[i]; | |||
1036 | rv = char2_from_hex(byteval, hexstr); | |||
1037 | if (rv) | |||
1038 | break; | |||
1039 | nb = PR_Write(file, hexstr, 2); | |||
1040 | } | |||
1041 | PR_Write(file, "\n", 1); | |||
1042 | break; | |||
1043 | } | |||
1044 | return rv; | |||
1045 | } | |||
1046 | ||||
1047 | SECStatus | |||
1048 | bltestCopyIO(PLArenaPool *arena, bltestIO *dest, bltestIO *src) | |||
1049 | { | |||
1050 | if (SECITEM_CopyItemSECITEM_CopyItem_Util(arena, &dest->buf, &src->buf) != SECSuccess) { | |||
1051 | return SECFailure; | |||
1052 | } | |||
1053 | if (src->pBuf.len > 0) { | |||
1054 | dest->pBuf.len = src->pBuf.len; | |||
1055 | dest->pBuf.data = dest->buf.data + (src->pBuf.data - src->buf.data); | |||
1056 | } | |||
1057 | dest->mode = src->mode; | |||
1058 | dest->file = src->file; | |||
1059 | ||||
1060 | return SECSuccess; | |||
1061 | } | |||
1062 | ||||
1063 | void | |||
1064 | misalignBuffer(PLArenaPool *arena, bltestIO *io, int off) | |||
1065 | { | |||
1066 | ptrdiff_t offset = (ptrdiff_t)io->buf.data % WORDSIZEsizeof(unsigned long); | |||
1067 | int length = io->buf.len; | |||
1068 | if (offset != off) { | |||
1069 | SECITEM_ReallocItemV2(arena, &io->buf, length + 2 * WORDSIZEsizeof(unsigned long)); | |||
1070 | /* offset may have changed? */ | |||
1071 | offset = (ptrdiff_t)io->buf.data % WORDSIZEsizeof(unsigned long); | |||
1072 | if (offset != off) { | |||
1073 | memmove(io->buf.data + off, io->buf.data, length); | |||
1074 | io->pBuf.data = io->buf.data + off; | |||
1075 | io->pBuf.len = length; | |||
1076 | } else { | |||
1077 | io->pBuf.data = io->buf.data; | |||
1078 | io->pBuf.len = length; | |||
1079 | } | |||
1080 | } else { | |||
1081 | io->pBuf.data = io->buf.data; | |||
1082 | io->pBuf.len = length; | |||
1083 | } | |||
1084 | } | |||
1085 | ||||
1086 | SECStatus | |||
1087 | des_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1088 | unsigned int maxOutputLen, const unsigned char *input, | |||
1089 | unsigned int inputLen) | |||
1090 | { | |||
1091 | return DES_Encrypt((DESContext *)cx, output, outputLen, maxOutputLen, | |||
1092 | input, inputLen); | |||
1093 | } | |||
1094 | ||||
1095 | SECStatus | |||
1096 | des_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1097 | unsigned int maxOutputLen, const unsigned char *input, | |||
1098 | unsigned int inputLen) | |||
1099 | { | |||
1100 | return DES_Decrypt((DESContext *)cx, output, outputLen, maxOutputLen, | |||
1101 | input, inputLen); | |||
1102 | } | |||
1103 | ||||
1104 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
1105 | SECStatus | |||
1106 | rc2_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1107 | unsigned int maxOutputLen, const unsigned char *input, | |||
1108 | unsigned int inputLen) | |||
1109 | { | |||
1110 | return RC2_Encrypt((RC2Context *)cx, output, outputLen, maxOutputLen, | |||
1111 | input, inputLen); | |||
1112 | } | |||
1113 | ||||
1114 | SECStatus | |||
1115 | rc2_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1116 | unsigned int maxOutputLen, const unsigned char *input, | |||
1117 | unsigned int inputLen) | |||
1118 | { | |||
1119 | return RC2_Decrypt((RC2Context *)cx, output, outputLen, maxOutputLen, | |||
1120 | input, inputLen); | |||
1121 | } | |||
1122 | #endif /* NSS_DISABLE_DEPRECATED_RC2 */ | |||
1123 | ||||
1124 | SECStatus | |||
1125 | rc4_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1126 | unsigned int maxOutputLen, const unsigned char *input, | |||
1127 | unsigned int inputLen) | |||
1128 | { | |||
1129 | return RC4_Encrypt((RC4Context *)cx, output, outputLen, maxOutputLen, | |||
1130 | input, inputLen); | |||
1131 | } | |||
1132 | ||||
1133 | SECStatus | |||
1134 | rc4_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1135 | unsigned int maxOutputLen, const unsigned char *input, | |||
1136 | unsigned int inputLen) | |||
1137 | { | |||
1138 | return RC4_Decrypt((RC4Context *)cx, output, outputLen, maxOutputLen, | |||
1139 | input, inputLen); | |||
1140 | } | |||
1141 | ||||
1142 | SECStatus | |||
1143 | aes_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1144 | unsigned int maxOutputLen, const unsigned char *input, | |||
1145 | unsigned int inputLen) | |||
1146 | { | |||
1147 | return AES_Encrypt((AESContext *)cx, output, outputLen, maxOutputLen, | |||
1148 | input, inputLen); | |||
1149 | } | |||
1150 | ||||
1151 | SECStatus | |||
1152 | aes_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1153 | unsigned int maxOutputLen, const unsigned char *input, | |||
1154 | unsigned int inputLen) | |||
1155 | { | |||
1156 | return AES_Decrypt((AESContext *)cx, output, outputLen, maxOutputLen, | |||
1157 | input, inputLen); | |||
1158 | } | |||
1159 | ||||
1160 | SECStatus | |||
1161 | chacha20_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1162 | unsigned int maxOutputLen, const unsigned char *input, | |||
1163 | unsigned int inputLen) | |||
1164 | { | |||
1165 | if (maxOutputLen < inputLen) { | |||
1166 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_OUTPUT_LEN); | |||
1167 | return SECFailure; | |||
1168 | } | |||
1169 | ChaCha20Context *ctx = cx; | |||
1170 | *outputLen = inputLen; | |||
1171 | return ChaCha20_Xor(output, input, inputLen, ctx->key, ctx->nonce, | |||
1172 | ctx->counter); | |||
1173 | } | |||
1174 | ||||
1175 | SECStatus | |||
1176 | chacha20_poly1305_Encrypt(void *cx, unsigned char *output, | |||
1177 | unsigned int *outputLen, unsigned int maxOutputLen, | |||
1178 | const unsigned char *input, unsigned int inputLen, | |||
1179 | const unsigned char *nonce, unsigned int nonceLen, | |||
1180 | const unsigned char *ad, unsigned int adLen) | |||
1181 | { | |||
1182 | return ChaCha20Poly1305_Seal((ChaCha20Poly1305Context *)cx, output, | |||
1183 | outputLen, maxOutputLen, input, inputLen, | |||
1184 | nonce, nonceLen, ad, adLen); | |||
1185 | } | |||
1186 | ||||
1187 | SECStatus | |||
1188 | chacha20_poly1305_Decrypt(void *cx, unsigned char *output, | |||
1189 | unsigned int *outputLen, unsigned int maxOutputLen, | |||
1190 | const unsigned char *input, unsigned int inputLen, | |||
1191 | const unsigned char *nonce, unsigned int nonceLen, | |||
1192 | const unsigned char *ad, unsigned int adLen) | |||
1193 | { | |||
1194 | return ChaCha20Poly1305_Open((ChaCha20Poly1305Context *)cx, output, | |||
1195 | outputLen, maxOutputLen, input, inputLen, | |||
1196 | nonce, nonceLen, ad, adLen); | |||
1197 | } | |||
1198 | ||||
1199 | SECStatus | |||
1200 | camellia_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1201 | unsigned int maxOutputLen, const unsigned char *input, | |||
1202 | unsigned int inputLen) | |||
1203 | { | |||
1204 | return Camellia_Encrypt((CamelliaContext *)cx, output, outputLen, | |||
1205 | maxOutputLen, | |||
1206 | input, inputLen); | |||
1207 | } | |||
1208 | ||||
1209 | SECStatus | |||
1210 | camellia_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1211 | unsigned int maxOutputLen, const unsigned char *input, | |||
1212 | unsigned int inputLen) | |||
1213 | { | |||
1214 | return Camellia_Decrypt((CamelliaContext *)cx, output, outputLen, | |||
1215 | maxOutputLen, | |||
1216 | input, inputLen); | |||
1217 | } | |||
1218 | ||||
1219 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
1220 | SECStatus | |||
1221 | seed_Encrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1222 | unsigned int maxOutputLen, const unsigned char *input, | |||
1223 | unsigned int inputLen) | |||
1224 | { | |||
1225 | return SEED_Encrypt((SEEDContext *)cx, output, outputLen, maxOutputLen, | |||
1226 | input, inputLen); | |||
1227 | } | |||
1228 | ||||
1229 | SECStatus | |||
1230 | seed_Decrypt(void *cx, unsigned char *output, unsigned int *outputLen, | |||
1231 | unsigned int maxOutputLen, const unsigned char *input, | |||
1232 | unsigned int inputLen) | |||
1233 | { | |||
1234 | return SEED_Decrypt((SEEDContext *)cx, output, outputLen, maxOutputLen, | |||
1235 | input, inputLen); | |||
1236 | } | |||
1237 | #endif /* NSS_DISABLE_DEPRECATED_SEED */ | |||
1238 | ||||
1239 | SECStatus | |||
1240 | rsa_PublicKeyOp(void *cx, SECItem *output, const SECItem *input) | |||
1241 | { | |||
1242 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1243 | RSAPublicKey *pubKey = (RSAPublicKey *)params->pubKey; | |||
1244 | SECStatus rv = RSA_PublicKeyOp(pubKey, output->data, input->data); | |||
1245 | if (rv == SECSuccess) { | |||
1246 | output->len = pubKey->modulus.data[0] ? pubKey->modulus.len : pubKey->modulus.len - 1; | |||
1247 | } | |||
1248 | return rv; | |||
1249 | } | |||
1250 | ||||
1251 | SECStatus | |||
1252 | rsa_PrivateKeyOp(void *cx, SECItem *output, const SECItem *input) | |||
1253 | { | |||
1254 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1255 | RSAPrivateKey *privKey = (RSAPrivateKey *)params->privKey; | |||
1256 | SECStatus rv = RSA_PrivateKeyOp(privKey, output->data, input->data); | |||
1257 | if (rv == SECSuccess) { | |||
1258 | output->len = privKey->modulus.data[0] ? privKey->modulus.len : privKey->modulus.len - 1; | |||
1259 | } | |||
1260 | return rv; | |||
1261 | } | |||
1262 | ||||
1263 | SECStatus | |||
1264 | rsa_signDigestPSS(void *cx, SECItem *output, const SECItem *input) | |||
1265 | { | |||
1266 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1267 | bltestRSAParams *rsaParams = ¶ms->cipherParams.rsa; | |||
1268 | return RSA_SignPSS((RSAPrivateKey *)params->privKey, | |||
1269 | rsaParams->hashAlg, | |||
1270 | rsaParams->maskHashAlg, | |||
1271 | rsaParams->seed.buf.data, | |||
1272 | rsaParams->seed.buf.len, | |||
1273 | output->data, &output->len, output->len, | |||
1274 | input->data, input->len); | |||
1275 | } | |||
1276 | ||||
1277 | SECStatus | |||
1278 | rsa_verifyDigestPSS(void *cx, SECItem *output, const SECItem *input) | |||
1279 | { | |||
1280 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1281 | bltestRSAParams *rsaParams = ¶ms->cipherParams.rsa; | |||
1282 | return RSA_CheckSignPSS((RSAPublicKey *)params->pubKey, | |||
1283 | rsaParams->hashAlg, | |||
1284 | rsaParams->maskHashAlg, | |||
1285 | rsaParams->seed.buf.len, | |||
1286 | output->data, output->len, | |||
1287 | input->data, input->len); | |||
1288 | } | |||
1289 | ||||
1290 | SECStatus | |||
1291 | rsa_encryptOAEP(void *cx, SECItem *output, const SECItem *input) | |||
1292 | { | |||
1293 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1294 | bltestRSAParams *rsaParams = ¶ms->cipherParams.rsa; | |||
1295 | return RSA_EncryptOAEP((RSAPublicKey *)params->pubKey, | |||
1296 | rsaParams->hashAlg, | |||
1297 | rsaParams->maskHashAlg, | |||
1298 | NULL((void*)0), 0, | |||
1299 | rsaParams->seed.buf.data, | |||
1300 | rsaParams->seed.buf.len, | |||
1301 | output->data, &output->len, output->len, | |||
1302 | input->data, input->len); | |||
1303 | } | |||
1304 | ||||
1305 | SECStatus | |||
1306 | rsa_decryptOAEP(void *cx, SECItem *output, const SECItem *input) | |||
1307 | { | |||
1308 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1309 | bltestRSAParams *rsaParams = ¶ms->cipherParams.rsa; | |||
1310 | return RSA_DecryptOAEP((RSAPrivateKey *)params->privKey, | |||
1311 | rsaParams->hashAlg, | |||
1312 | rsaParams->maskHashAlg, | |||
1313 | NULL((void*)0), 0, | |||
1314 | output->data, &output->len, output->len, | |||
1315 | input->data, input->len); | |||
1316 | } | |||
1317 | ||||
1318 | SECStatus | |||
1319 | dsa_signDigest(void *cx, SECItem *output, const SECItem *input) | |||
1320 | { | |||
1321 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1322 | if (params->cipherParams.dsa.sigseed.buf.len > 0) { | |||
1323 | return DSA_SignDigestWithSeed((DSAPrivateKey *)params->privKey, | |||
1324 | output, input, | |||
1325 | params->cipherParams.dsa.sigseed.buf.data); | |||
1326 | } | |||
1327 | return DSA_SignDigest((DSAPrivateKey *)params->privKey, output, input); | |||
1328 | } | |||
1329 | ||||
1330 | SECStatus | |||
1331 | dsa_verifyDigest(void *cx, SECItem *output, const SECItem *input) | |||
1332 | { | |||
1333 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1334 | return DSA_VerifyDigest((DSAPublicKey *)params->pubKey, output, input); | |||
1335 | } | |||
1336 | ||||
1337 | SECStatus | |||
1338 | ecdsa_signDigest(void *cx, SECItem *output, const SECItem *input) | |||
1339 | { | |||
1340 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1341 | if (params->cipherParams.ecdsa.sigseed.buf.len > 0) { | |||
1342 | return ECDSA_SignDigestWithSeed( | |||
1343 | (ECPrivateKey *)params->privKey, | |||
1344 | output, input, | |||
1345 | params->cipherParams.ecdsa.sigseed.buf.data, | |||
1346 | params->cipherParams.ecdsa.sigseed.buf.len); | |||
1347 | } | |||
1348 | return ECDSA_SignDigest((ECPrivateKey *)params->privKey, output, input); | |||
1349 | } | |||
1350 | ||||
1351 | SECStatus | |||
1352 | ecdsa_verifyDigest(void *cx, SECItem *output, const SECItem *input) | |||
1353 | { | |||
1354 | bltestAsymKeyParams *params = (bltestAsymKeyParams *)cx; | |||
1355 | return ECDSA_VerifyDigest((ECPublicKey *)params->pubKey, output, input); | |||
1356 | } | |||
1357 | ||||
1358 | SECStatus | |||
1359 | bltest_des_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1360 | { | |||
1361 | PRIntervalTime time1, time2; | |||
1362 | bltestSymmKeyParams *desp = &cipherInfo->params.sk; | |||
1363 | int minorMode; | |||
1364 | int i; | |||
1365 | switch (cipherInfo->mode) { | |||
1366 | case bltestDES_ECB: | |||
1367 | minorMode = NSS_DES0; | |||
1368 | break; | |||
1369 | case bltestDES_CBC: | |||
1370 | minorMode = NSS_DES_CBC1; | |||
1371 | break; | |||
1372 | case bltestDES_EDE_ECB: | |||
1373 | minorMode = NSS_DES_EDE32; | |||
1374 | break; | |||
1375 | case bltestDES_EDE_CBC: | |||
1376 | minorMode = NSS_DES_EDE3_CBC3; | |||
1377 | break; | |||
1378 | default: | |||
1379 | return SECFailure; | |||
1380 | } | |||
1381 | cipherInfo->cx = (void *)DES_CreateContext(desp->key.buf.data, | |||
1382 | desp->iv.buf.data, | |||
1383 | minorMode, encrypt); | |||
1384 | if (cipherInfo->cxreps > 0) { | |||
1385 | DESContext **dummycx; | |||
1386 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(DESContext *)); | |||
1387 | TIMESTART()time1 = PR_IntervalNow();; | |||
1388 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1389 | dummycx[i] = (void *)DES_CreateContext(desp->key.buf.data, | |||
1390 | desp->iv.buf.data, | |||
1391 | minorMode, encrypt); | |||
1392 | } | |||
1393 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1394 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1395 | DES_DestroyContext(dummycx[i], PR_TRUE1); | |||
1396 | } | |||
1397 | PORT_FreePORT_Free_Util(dummycx); | |||
1398 | } | |||
1399 | if (encrypt) | |||
1400 | cipherInfo->cipher.symmkeyCipher = des_Encrypt; | |||
1401 | else | |||
1402 | cipherInfo->cipher.symmkeyCipher = des_Decrypt; | |||
1403 | return SECSuccess; | |||
1404 | } | |||
1405 | ||||
1406 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
1407 | SECStatus | |||
1408 | bltest_rc2_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1409 | { | |||
1410 | PRIntervalTime time1, time2; | |||
1411 | bltestSymmKeyParams *rc2p = &cipherInfo->params.sk; | |||
1412 | int minorMode; | |||
1413 | int i; | |||
1414 | switch (cipherInfo->mode) { | |||
1415 | case bltestRC2_ECB: | |||
1416 | minorMode = NSS_RC20; | |||
1417 | break; | |||
1418 | case bltestRC2_CBC: | |||
1419 | minorMode = NSS_RC2_CBC1; | |||
1420 | break; | |||
1421 | default: | |||
1422 | return SECFailure; | |||
1423 | } | |||
1424 | cipherInfo->cx = (void *)RC2_CreateContext(rc2p->key.buf.data, | |||
1425 | rc2p->key.buf.len, | |||
1426 | rc2p->iv.buf.data, | |||
1427 | minorMode, | |||
1428 | rc2p->key.buf.len); | |||
1429 | if (cipherInfo->cxreps > 0) { | |||
1430 | RC2Context **dummycx; | |||
1431 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(RC2Context *)); | |||
1432 | TIMESTART()time1 = PR_IntervalNow();; | |||
1433 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1434 | dummycx[i] = (void *)RC2_CreateContext(rc2p->key.buf.data, | |||
1435 | rc2p->key.buf.len, | |||
1436 | rc2p->iv.buf.data, | |||
1437 | minorMode, | |||
1438 | rc2p->key.buf.len); | |||
1439 | } | |||
1440 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1441 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1442 | RC2_DestroyContext(dummycx[i], PR_TRUE1); | |||
1443 | } | |||
1444 | PORT_FreePORT_Free_Util(dummycx); | |||
1445 | } | |||
1446 | if (encrypt) | |||
1447 | cipherInfo->cipher.symmkeyCipher = rc2_Encrypt; | |||
1448 | else | |||
1449 | cipherInfo->cipher.symmkeyCipher = rc2_Decrypt; | |||
1450 | return SECSuccess; | |||
1451 | } | |||
1452 | #endif /* NSS_DISABLE_DEPRECATED_RC2 */ | |||
1453 | ||||
1454 | SECStatus | |||
1455 | bltest_rc4_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1456 | { | |||
1457 | PRIntervalTime time1, time2; | |||
1458 | int i; | |||
1459 | bltestSymmKeyParams *rc4p = &cipherInfo->params.sk; | |||
1460 | cipherInfo->cx = (void *)RC4_CreateContext(rc4p->key.buf.data, | |||
1461 | rc4p->key.buf.len); | |||
1462 | if (cipherInfo->cxreps > 0) { | |||
1463 | RC4Context **dummycx; | |||
1464 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(RC4Context *)); | |||
1465 | TIMESTART()time1 = PR_IntervalNow();; | |||
1466 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1467 | dummycx[i] = (void *)RC4_CreateContext(rc4p->key.buf.data, | |||
1468 | rc4p->key.buf.len); | |||
1469 | } | |||
1470 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1471 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1472 | RC4_DestroyContext(dummycx[i], PR_TRUE1); | |||
1473 | } | |||
1474 | PORT_FreePORT_Free_Util(dummycx); | |||
1475 | } | |||
1476 | if (encrypt) | |||
1477 | cipherInfo->cipher.symmkeyCipher = rc4_Encrypt; | |||
1478 | else | |||
1479 | cipherInfo->cipher.symmkeyCipher = rc4_Decrypt; | |||
1480 | return SECSuccess; | |||
1481 | } | |||
1482 | ||||
1483 | SECStatus | |||
1484 | bltest_rc5_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1485 | { | |||
1486 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
1487 | PRIntervalTime time1, time2; | |||
1488 | bltestRC5Params *rc5p = &cipherInfo->params.rc5; | |||
1489 | int minorMode; | |||
1490 | switch (cipherInfo->mode) { | |||
1491 | case bltestRC5_ECB: | |||
1492 | minorMode = NSS_RC50; | |||
1493 | break; | |||
1494 | case bltestRC5_CBC: | |||
1495 | minorMode = NSS_RC5_CBC1; | |||
1496 | break; | |||
1497 | default: | |||
1498 | return SECFailure; | |||
1499 | } | |||
1500 | TIMESTART()time1 = PR_IntervalNow();; | |||
1501 | cipherInfo->cx = (void *)RC5_CreateContext(&rc5p->key.buf, | |||
1502 | rc5p->rounds, rc5p->wordsize, | |||
1503 | rc5p->iv.buf.data, minorMode); | |||
1504 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1505 | if (encrypt) | |||
1506 | cipherInfo->cipher.symmkeyCipher = RC5_Encrypt; | |||
1507 | else | |||
1508 | cipherInfo->cipher.symmkeyCipher = RC5_Decrypt; | |||
1509 | return SECSuccess; | |||
1510 | #else | |||
1511 | return SECFailure; | |||
1512 | #endif | |||
1513 | } | |||
1514 | ||||
1515 | SECStatus | |||
1516 | bltest_aes_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1517 | { | |||
1518 | bltestSymmKeyParams *aesp = &cipherInfo->params.sk; | |||
1519 | bltestAuthSymmKeyParams *gcmp = &cipherInfo->params.ask; | |||
1520 | int minorMode; | |||
1521 | int i; | |||
1522 | int keylen = aesp->key.buf.len; | |||
1523 | unsigned int blocklen = AES_BLOCK_SIZE16; | |||
1524 | PRIntervalTime time1, time2; | |||
1525 | unsigned char *params; | |||
1526 | int len; | |||
1527 | CK_AES_CTR_PARAMS ctrParams; | |||
1528 | CK_NSS_GCM_PARAMS gcmParams; | |||
1529 | ||||
1530 | params = aesp->iv.buf.data; | |||
1531 | switch (cipherInfo->mode) { | |||
1532 | case bltestAES_ECB: | |||
1533 | minorMode = NSS_AES0; | |||
1534 | break; | |||
1535 | case bltestAES_CBC: | |||
1536 | minorMode = NSS_AES_CBC1; | |||
1537 | break; | |||
1538 | case bltestAES_CTS: | |||
1539 | minorMode = NSS_AES_CTS2; | |||
1540 | break; | |||
1541 | case bltestAES_CTR: | |||
1542 | minorMode = NSS_AES_CTR3; | |||
1543 | ctrParams.ulCounterBits = 32; | |||
1544 | len = PR_MIN(aesp->iv.buf.len, blocklen)((aesp->iv.buf.len)<(blocklen)?(aesp->iv.buf.len):(blocklen )); | |||
1545 | PORT_Memsetmemset(ctrParams.cb, 0, blocklen); | |||
1546 | PORT_Memcpymemcpy(ctrParams.cb, aesp->iv.buf.data, len); | |||
1547 | params = (unsigned char *)&ctrParams; | |||
1548 | break; | |||
1549 | case bltestAES_GCM: | |||
1550 | minorMode = NSS_AES_GCM4; | |||
1551 | gcmParams.pIv = gcmp->sk.iv.buf.data; | |||
1552 | gcmParams.ulIvLen = gcmp->sk.iv.buf.len; | |||
1553 | gcmParams.pAAD = gcmp->aad.buf.data; | |||
1554 | gcmParams.ulAADLen = gcmp->aad.buf.len; | |||
1555 | gcmParams.ulTagBits = blocklen * 8; | |||
1556 | params = (unsigned char *)&gcmParams; | |||
1557 | break; | |||
1558 | default: | |||
1559 | return SECFailure; | |||
1560 | } | |||
1561 | cipherInfo->cx = (void *)AES_CreateContext(aesp->key.buf.data, | |||
1562 | params, | |||
1563 | minorMode, encrypt, | |||
1564 | keylen, blocklen); | |||
1565 | if (cipherInfo->cxreps > 0) { | |||
1566 | AESContext **dummycx; | |||
1567 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(AESContext *)); | |||
1568 | TIMESTART()time1 = PR_IntervalNow();; | |||
1569 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1570 | dummycx[i] = (void *)AES_CreateContext(aesp->key.buf.data, | |||
1571 | params, | |||
1572 | minorMode, encrypt, | |||
1573 | keylen, blocklen); | |||
1574 | } | |||
1575 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1576 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1577 | AES_DestroyContext(dummycx[i], PR_TRUE1); | |||
1578 | } | |||
1579 | PORT_FreePORT_Free_Util(dummycx); | |||
1580 | } | |||
1581 | if (encrypt) | |||
1582 | cipherInfo->cipher.symmkeyCipher = aes_Encrypt; | |||
1583 | else | |||
1584 | cipherInfo->cipher.symmkeyCipher = aes_Decrypt; | |||
1585 | return SECSuccess; | |||
1586 | } | |||
1587 | ||||
1588 | SECStatus | |||
1589 | bltest_camellia_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1590 | { | |||
1591 | bltestSymmKeyParams *camelliap = &cipherInfo->params.sk; | |||
1592 | int minorMode; | |||
1593 | int i; | |||
1594 | int keylen = camelliap->key.buf.len; | |||
1595 | PRIntervalTime time1, time2; | |||
1596 | ||||
1597 | switch (cipherInfo->mode) { | |||
1598 | case bltestCAMELLIA_ECB: | |||
1599 | minorMode = NSS_CAMELLIA0; | |||
1600 | break; | |||
1601 | case bltestCAMELLIA_CBC: | |||
1602 | minorMode = NSS_CAMELLIA_CBC1; | |||
1603 | break; | |||
1604 | default: | |||
1605 | return SECFailure; | |||
1606 | } | |||
1607 | cipherInfo->cx = (void *)Camellia_CreateContext(camelliap->key.buf.data, | |||
1608 | camelliap->iv.buf.data, | |||
1609 | minorMode, encrypt, | |||
1610 | keylen); | |||
1611 | if (cipherInfo->cxreps > 0) { | |||
1612 | CamelliaContext **dummycx; | |||
1613 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(CamelliaContext *)); | |||
1614 | TIMESTART()time1 = PR_IntervalNow();; | |||
1615 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1616 | dummycx[i] = (void *)Camellia_CreateContext(camelliap->key.buf.data, | |||
1617 | camelliap->iv.buf.data, | |||
1618 | minorMode, encrypt, | |||
1619 | keylen); | |||
1620 | } | |||
1621 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1622 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1623 | Camellia_DestroyContext(dummycx[i], PR_TRUE1); | |||
1624 | } | |||
1625 | PORT_FreePORT_Free_Util(dummycx); | |||
1626 | } | |||
1627 | if (encrypt) | |||
1628 | cipherInfo->cipher.symmkeyCipher = camellia_Encrypt; | |||
1629 | else | |||
1630 | cipherInfo->cipher.symmkeyCipher = camellia_Decrypt; | |||
1631 | return SECSuccess; | |||
1632 | } | |||
1633 | ||||
1634 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
1635 | SECStatus | |||
1636 | bltest_seed_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1637 | { | |||
1638 | PRIntervalTime time1, time2; | |||
1639 | bltestSymmKeyParams *seedp = &cipherInfo->params.sk; | |||
1640 | int minorMode; | |||
1641 | int i; | |||
1642 | ||||
1643 | switch (cipherInfo->mode) { | |||
1644 | case bltestSEED_ECB: | |||
1645 | minorMode = NSS_SEED0; | |||
1646 | break; | |||
1647 | case bltestSEED_CBC: | |||
1648 | minorMode = NSS_SEED_CBC1; | |||
1649 | break; | |||
1650 | default: | |||
1651 | return SECFailure; | |||
1652 | } | |||
1653 | cipherInfo->cx = (void *)SEED_CreateContext(seedp->key.buf.data, | |||
1654 | seedp->iv.buf.data, | |||
1655 | minorMode, encrypt); | |||
1656 | if (cipherInfo->cxreps > 0) { | |||
1657 | SEEDContext **dummycx; | |||
1658 | dummycx = PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * sizeof(SEEDContext *)); | |||
1659 | TIMESTART()time1 = PR_IntervalNow();; | |||
1660 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1661 | dummycx[i] = (void *)SEED_CreateContext(seedp->key.buf.data, | |||
1662 | seedp->iv.buf.data, | |||
1663 | minorMode, encrypt); | |||
1664 | } | |||
1665 | TIMEFINISH(cipherInfo->cxtime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / 1.0;; | |||
1666 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1667 | SEED_DestroyContext(dummycx[i], PR_TRUE1); | |||
1668 | } | |||
1669 | PORT_FreePORT_Free_Util(dummycx); | |||
1670 | } | |||
1671 | if (encrypt) | |||
1672 | cipherInfo->cipher.symmkeyCipher = seed_Encrypt; | |||
1673 | else | |||
1674 | cipherInfo->cipher.symmkeyCipher = seed_Decrypt; | |||
1675 | ||||
1676 | return SECSuccess; | |||
1677 | } | |||
1678 | #endif /* NSS_DISABLE_DEPRECATED_SEED */ | |||
1679 | ||||
1680 | SECStatus | |||
1681 | bltest_chacha20_ctr_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1682 | { | |||
1683 | const PRUint32 counter = 1; | |||
1684 | bltestSymmKeyParams *sk = &cipherInfo->params.sk; | |||
1685 | cipherInfo->cx = ChaCha20_CreateContext(sk->key.buf.data, sk->key.buf.len, | |||
1686 | sk->iv.buf.data, sk->iv.buf.len, | |||
1687 | counter); | |||
1688 | ||||
1689 | if (cipherInfo->cx == NULL((void*)0)) { | |||
1690 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "ChaCha20_CreateContext() returned NULL\n" | |||
1691 | "key must be 32 bytes, iv must be 12 bytes\n"); | |||
1692 | return SECFailure; | |||
1693 | } | |||
1694 | cipherInfo->cipher.symmkeyCipher = chacha20_Encrypt; | |||
1695 | return SECSuccess; | |||
1696 | } | |||
1697 | ||||
1698 | SECStatus | |||
1699 | bltest_chacha20_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1700 | { | |||
1701 | const unsigned int tagLen = 16; | |||
1702 | const bltestSymmKeyParams *sk = &cipherInfo->params.sk; | |||
1703 | cipherInfo->cx = ChaCha20Poly1305_CreateContext(sk->key.buf.data, | |||
1704 | sk->key.buf.len, tagLen); | |||
1705 | ||||
1706 | if (encrypt) | |||
1707 | cipherInfo->cipher.aeadCipher = chacha20_poly1305_Encrypt; | |||
1708 | else | |||
1709 | cipherInfo->cipher.aeadCipher = chacha20_poly1305_Decrypt; | |||
1710 | return SECSuccess; | |||
1711 | } | |||
1712 | ||||
1713 | SECStatus | |||
1714 | bltest_rsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1715 | { | |||
1716 | int i; | |||
1717 | RSAPrivateKey **dummyKey; | |||
1718 | RSAPrivateKey *privKey; | |||
1719 | RSAPublicKey *pubKey; | |||
1720 | PRIntervalTime time1, time2; | |||
1721 | ||||
1722 | bltestAsymKeyParams *asymk = &cipherInfo->params.asymk; | |||
1723 | bltestRSAParams *rsap = &asymk->cipherParams.rsa; | |||
1724 | ||||
1725 | /* RSA key gen was done during parameter setup */ | |||
1726 | cipherInfo->cx = asymk; | |||
1727 | privKey = (RSAPrivateKey *)asymk->privKey; | |||
1728 | ||||
1729 | /* For performance testing */ | |||
1730 | if (cipherInfo->cxreps > 0) { | |||
1731 | /* Create space for n private key objects */ | |||
1732 | dummyKey = (RSAPrivateKey **)PORT_AllocPORT_Alloc_Util(cipherInfo->cxreps * | |||
1733 | sizeof(RSAPrivateKey *)); | |||
1734 | /* Time n keygens, storing in the array */ | |||
1735 | TIMESTART()time1 = PR_IntervalNow();; | |||
1736 | for (i = 0; i < cipherInfo->cxreps; i++) | |||
1737 | dummyKey[i] = RSA_NewKey(rsap->keysizeInBits, | |||
1738 | &privKey->publicExponent); | |||
1739 | TIMEFINISH(cipherInfo->cxtime, cipherInfo->cxreps)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / cipherInfo ->cxreps;; | |||
1740 | /* Free the n key objects */ | |||
1741 | for (i = 0; i < cipherInfo->cxreps; i++) | |||
1742 | PORT_FreeArenaPORT_FreeArena_Util(dummyKey[i]->arena, PR_TRUE1); | |||
1743 | PORT_FreePORT_Free_Util(dummyKey); | |||
1744 | } | |||
1745 | ||||
1746 | if ((encrypt && !is_sigCipher(cipherInfo->mode)) || | |||
1747 | (!encrypt && is_sigCipher(cipherInfo->mode))) { | |||
1748 | /* Have to convert private key to public key. Memory | |||
1749 | * is freed with private key's arena */ | |||
1750 | pubKey = (RSAPublicKey *)PORT_ArenaAllocPORT_ArenaAlloc_Util(privKey->arena, | |||
1751 | sizeof(RSAPublicKey)); | |||
1752 | pubKey->modulus.len = privKey->modulus.len; | |||
1753 | pubKey->modulus.data = privKey->modulus.data; | |||
1754 | pubKey->publicExponent.len = privKey->publicExponent.len; | |||
1755 | pubKey->publicExponent.data = privKey->publicExponent.data; | |||
1756 | asymk->pubKey = (void *)pubKey; | |||
1757 | } | |||
1758 | switch (cipherInfo->mode) { | |||
1759 | case bltestRSA: | |||
1760 | cipherInfo->cipher.pubkeyCipher = encrypt ? rsa_PublicKeyOp | |||
1761 | : rsa_PrivateKeyOp; | |||
1762 | break; | |||
1763 | case bltestRSA_PSS: | |||
1764 | cipherInfo->cipher.pubkeyCipher = encrypt ? rsa_signDigestPSS | |||
1765 | : rsa_verifyDigestPSS; | |||
1766 | break; | |||
1767 | case bltestRSA_OAEP: | |||
1768 | cipherInfo->cipher.pubkeyCipher = encrypt ? rsa_encryptOAEP | |||
1769 | : rsa_decryptOAEP; | |||
1770 | break; | |||
1771 | default: | |||
1772 | break; | |||
1773 | } | |||
1774 | return SECSuccess; | |||
1775 | } | |||
1776 | ||||
1777 | SECStatus | |||
1778 | blapi_pqg_param_gen(unsigned int keysize, PQGParams **pqg, PQGVerify **vfy) | |||
1779 | { | |||
1780 | if (keysize < 1024) { | |||
1781 | int j = PQG_PBITS_TO_INDEX(keysize)(((keysize) < 512 || (keysize) > 1024 || (keysize) % 64 ) ? -1 : (int)((keysize)-512) / 64); | |||
1782 | return PQG_ParamGen(j, pqg, vfy); | |||
1783 | } | |||
1784 | return PQG_ParamGenV2(keysize, 0, 0, pqg, vfy); | |||
1785 | } | |||
1786 | ||||
1787 | SECStatus | |||
1788 | bltest_pqg_init(bltestDSAParams *dsap) | |||
1789 | { | |||
1790 | SECStatus rv, res; | |||
1791 | PQGVerify *vfy = NULL((void*)0); | |||
1792 | rv = blapi_pqg_param_gen(dsap->keysize, &dsap->pqg, &vfy); | |||
1793 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 1793); exit(-1); }; | |||
1794 | rv = PQG_VerifyParams(dsap->pqg, vfy, &res); | |||
1795 | CHECKERROR(res, __LINE__)if (res) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 1795); exit(-1); }; | |||
1796 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 1796); exit(-1); }; | |||
1797 | return rv; | |||
1798 | } | |||
1799 | ||||
1800 | SECStatus | |||
1801 | bltest_dsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1802 | { | |||
1803 | int i; | |||
1804 | DSAPrivateKey **dummyKey; | |||
1805 | PQGParams *dummypqg; | |||
1806 | PRIntervalTime time1, time2; | |||
1807 | bltestAsymKeyParams *asymk = &cipherInfo->params.asymk; | |||
1808 | bltestDSAParams *dsap = &asymk->cipherParams.dsa; | |||
1809 | PQGVerify *ignore = NULL((void*)0); | |||
1810 | cipherInfo->cx = asymk; | |||
1811 | /* For performance testing */ | |||
1812 | if (cipherInfo->cxreps > 0) { | |||
1813 | /* Create space for n private key objects */ | |||
1814 | dummyKey = (DSAPrivateKey **)PORT_ZAllocPORT_ZAlloc_Util(cipherInfo->cxreps * | |||
1815 | sizeof(DSAPrivateKey *)); | |||
1816 | /* Time n keygens, storing in the array */ | |||
1817 | TIMESTART()time1 = PR_IntervalNow();; | |||
1818 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1819 | dummypqg = NULL((void*)0); | |||
1820 | blapi_pqg_param_gen(dsap->keysize, &dummypqg, &ignore); | |||
1821 | DSA_NewKey(dummypqg, &dummyKey[i]); | |||
1822 | } | |||
1823 | TIMEFINISH(cipherInfo->cxtime, cipherInfo->cxreps)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / cipherInfo ->cxreps;; | |||
1824 | /* Free the n key objects */ | |||
1825 | for (i = 0; i < cipherInfo->cxreps; i++) | |||
1826 | PORT_FreeArenaPORT_FreeArena_Util(dummyKey[i]->params.arena, PR_TRUE1); | |||
1827 | PORT_FreePORT_Free_Util(dummyKey); | |||
1828 | } | |||
1829 | if (!dsap->pqg && dsap->pqgdata.buf.len > 0) { | |||
1830 | dsap->pqg = pqg_from_filedata(cipherInfo->arena, &dsap->pqgdata.buf); | |||
1831 | } | |||
1832 | if (!asymk->privKey && asymk->key.buf.len > 0) { | |||
1833 | asymk->privKey = dsakey_from_filedata(cipherInfo->arena, &asymk->key.buf); | |||
1834 | } | |||
1835 | if (encrypt) { | |||
1836 | cipherInfo->cipher.pubkeyCipher = dsa_signDigest; | |||
1837 | } else { | |||
1838 | /* Have to convert private key to public key. Memory | |||
1839 | * is freed with private key's arena */ | |||
1840 | DSAPublicKey *pubkey; | |||
1841 | DSAPrivateKey *key = (DSAPrivateKey *)asymk->privKey; | |||
1842 | pubkey = (DSAPublicKey *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(key->params.arena, | |||
1843 | sizeof(DSAPublicKey)); | |||
1844 | pubkey->params.prime.len = key->params.prime.len; | |||
1845 | pubkey->params.prime.data = key->params.prime.data; | |||
1846 | pubkey->params.subPrime.len = key->params.subPrime.len; | |||
1847 | pubkey->params.subPrime.data = key->params.subPrime.data; | |||
1848 | pubkey->params.base.len = key->params.base.len; | |||
1849 | pubkey->params.base.data = key->params.base.data; | |||
1850 | pubkey->publicValue.len = key->publicValue.len; | |||
1851 | pubkey->publicValue.data = key->publicValue.data; | |||
1852 | asymk->pubKey = pubkey; | |||
1853 | cipherInfo->cipher.pubkeyCipher = dsa_verifyDigest; | |||
1854 | } | |||
1855 | return SECSuccess; | |||
1856 | } | |||
1857 | ||||
1858 | SECStatus | |||
1859 | bltest_ecdsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
1860 | { | |||
1861 | int i; | |||
1862 | ECPrivateKey **dummyKey; | |||
1863 | PRIntervalTime time1, time2; | |||
1864 | bltestAsymKeyParams *asymk = &cipherInfo->params.asymk; | |||
1865 | cipherInfo->cx = asymk; | |||
1866 | /* For performance testing */ | |||
1867 | if (cipherInfo->cxreps > 0) { | |||
1868 | /* Create space for n private key objects */ | |||
1869 | dummyKey = (ECPrivateKey **)PORT_ZAllocPORT_ZAlloc_Util(cipherInfo->cxreps * | |||
1870 | sizeof(ECPrivateKey *)); | |||
1871 | /* Time n keygens, storing in the array */ | |||
1872 | TIMESTART()time1 = PR_IntervalNow();; | |||
1873 | for (i = 0; i < cipherInfo->cxreps; i++) { | |||
1874 | EC_NewKey(&((ECPrivateKey *)asymk->privKey)->ecParams, &dummyKey[i]); | |||
1875 | } | |||
1876 | TIMEFINISH(cipherInfo->cxtime, cipherInfo->cxreps)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->cxtime = ((double)(time1)) / cipherInfo ->cxreps;; | |||
1877 | /* Free the n key objects */ | |||
1878 | for (i = 0; i < cipherInfo->cxreps; i++) | |||
1879 | PORT_FreeArenaPORT_FreeArena_Util(dummyKey[i]->ecParams.arena, PR_TRUE1); | |||
1880 | PORT_FreePORT_Free_Util(dummyKey); | |||
1881 | } | |||
1882 | if (!asymk->privKey && asymk->key.buf.len > 0) { | |||
1883 | asymk->privKey = eckey_from_filedata(cipherInfo->arena, &asymk->key.buf); | |||
1884 | } | |||
1885 | if (encrypt) { | |||
1886 | cipherInfo->cipher.pubkeyCipher = ecdsa_signDigest; | |||
1887 | } else { | |||
1888 | /* Have to convert private key to public key. Memory | |||
1889 | * is freed with private key's arena */ | |||
1890 | ECPublicKey *pubkey; | |||
1891 | ECPrivateKey *key = (ECPrivateKey *)asymk->privKey; | |||
1892 | pubkey = (ECPublicKey *)PORT_ArenaZAllocPORT_ArenaZAlloc_Util(key->ecParams.arena, | |||
1893 | sizeof(ECPublicKey)); | |||
1894 | pubkey->ecParams.type = key->ecParams.type; | |||
1895 | pubkey->ecParams.fieldID.size = key->ecParams.fieldID.size; | |||
1896 | pubkey->ecParams.fieldID.type = key->ecParams.fieldID.type; | |||
1897 | pubkey->ecParams.fieldID.u.prime.len = key->ecParams.fieldID.u.prime.len; | |||
1898 | pubkey->ecParams.fieldID.u.prime.data = key->ecParams.fieldID.u.prime.data; | |||
1899 | pubkey->ecParams.fieldID.k1 = key->ecParams.fieldID.k1; | |||
1900 | pubkey->ecParams.fieldID.k2 = key->ecParams.fieldID.k2; | |||
1901 | pubkey->ecParams.fieldID.k3 = key->ecParams.fieldID.k3; | |||
1902 | pubkey->ecParams.curve.a.len = key->ecParams.curve.a.len; | |||
1903 | pubkey->ecParams.curve.a.data = key->ecParams.curve.a.data; | |||
1904 | pubkey->ecParams.curve.b.len = key->ecParams.curve.b.len; | |||
1905 | pubkey->ecParams.curve.b.data = key->ecParams.curve.b.data; | |||
1906 | pubkey->ecParams.curve.seed.len = key->ecParams.curve.seed.len; | |||
1907 | pubkey->ecParams.curve.seed.data = key->ecParams.curve.seed.data; | |||
1908 | pubkey->ecParams.base.len = key->ecParams.base.len; | |||
1909 | pubkey->ecParams.base.data = key->ecParams.base.data; | |||
1910 | pubkey->ecParams.order.len = key->ecParams.order.len; | |||
1911 | pubkey->ecParams.order.data = key->ecParams.order.data; | |||
1912 | pubkey->ecParams.cofactor = key->ecParams.cofactor; | |||
1913 | pubkey->ecParams.DEREncoding.len = key->ecParams.DEREncoding.len; | |||
1914 | pubkey->ecParams.DEREncoding.data = key->ecParams.DEREncoding.data; | |||
1915 | pubkey->ecParams.name = key->ecParams.name; | |||
1916 | pubkey->publicValue.len = key->publicValue.len; | |||
1917 | pubkey->publicValue.data = key->publicValue.data; | |||
1918 | asymk->pubKey = pubkey; | |||
1919 | cipherInfo->cipher.pubkeyCipher = ecdsa_verifyDigest; | |||
1920 | } | |||
1921 | return SECSuccess; | |||
1922 | } | |||
1923 | ||||
1924 | /* XXX unfortunately, this is not defined in blapi.h */ | |||
1925 | SECStatus | |||
1926 | md2_HashBuf(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
1927 | { | |||
1928 | unsigned int len; | |||
1929 | MD2Context *cx = MD2_NewContext(); | |||
1930 | if (cx == NULL((void*)0)) | |||
1931 | return SECFailure; | |||
1932 | MD2_Begin(cx); | |||
1933 | MD2_Update(cx, src, src_length); | |||
1934 | MD2_End(cx, dest, &len, MD2_LENGTH16); | |||
1935 | MD2_DestroyContext(cx, PR_TRUE1); | |||
1936 | return SECSuccess; | |||
1937 | } | |||
1938 | ||||
1939 | SECStatus | |||
1940 | md2_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
1941 | { | |||
1942 | MD2Context *cx, *cx_cpy; | |||
1943 | unsigned char *cxbytes; | |||
1944 | unsigned int len; | |||
1945 | unsigned int i, quarter; | |||
1946 | SECStatus rv = SECSuccess; | |||
1947 | cx = MD2_NewContext(); | |||
1948 | MD2_Begin(cx); | |||
1949 | /* divide message by 4, restarting 3 times */ | |||
1950 | quarter = (src_length + 3) / 4; | |||
1951 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
1952 | MD2_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
1953 | len = MD2_FlattenSize(cx); | |||
1954 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
1955 | MD2_Flatten(cx, cxbytes); | |||
1956 | cx_cpy = MD2_Resurrect(cxbytes, NULL((void*)0)); | |||
1957 | if (!cx_cpy) { | |||
1958 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: MD2_Resurrect failed!\n", progName); | |||
1959 | goto finish; | |||
1960 | } | |||
1961 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
1962 | if (rv) { | |||
1963 | MD2_DestroyContext(cx_cpy, PR_TRUE1); | |||
1964 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: MD2_restart failed!\n", progName); | |||
1965 | goto finish; | |||
1966 | } | |||
1967 | MD2_DestroyContext(cx_cpy, PR_TRUE1); | |||
1968 | PORT_FreePORT_Free_Util(cxbytes); | |||
1969 | src_length -= quarter; | |||
1970 | } | |||
1971 | MD2_End(cx, dest, &len, MD2_LENGTH16); | |||
1972 | finish: | |||
1973 | MD2_DestroyContext(cx, PR_TRUE1); | |||
1974 | return rv; | |||
1975 | } | |||
1976 | ||||
1977 | SECStatus | |||
1978 | md5_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
1979 | { | |||
1980 | SECStatus rv = SECSuccess; | |||
1981 | MD5Context *cx, *cx_cpy; | |||
1982 | unsigned char *cxbytes; | |||
1983 | unsigned int len; | |||
1984 | unsigned int i, quarter; | |||
1985 | cx = MD5_NewContext(); | |||
1986 | MD5_Begin(cx); | |||
1987 | /* divide message by 4, restarting 3 times */ | |||
1988 | quarter = (src_length + 3) / 4; | |||
1989 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
1990 | MD5_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
1991 | len = MD5_FlattenSize(cx); | |||
1992 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
1993 | MD5_Flatten(cx, cxbytes); | |||
1994 | cx_cpy = MD5_Resurrect(cxbytes, NULL((void*)0)); | |||
1995 | if (!cx_cpy) { | |||
1996 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: MD5_Resurrect failed!\n", progName); | |||
1997 | rv = SECFailure; | |||
1998 | goto finish; | |||
1999 | } | |||
2000 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2001 | if (rv) { | |||
2002 | MD5_DestroyContext(cx_cpy, PR_TRUE1); | |||
2003 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: MD5_restart failed!\n", progName); | |||
2004 | goto finish; | |||
2005 | } | |||
2006 | MD5_DestroyContext(cx_cpy, PR_TRUE1); | |||
2007 | PORT_FreePORT_Free_Util(cxbytes); | |||
2008 | src_length -= quarter; | |||
2009 | } | |||
2010 | MD5_End(cx, dest, &len, MD5_LENGTH16); | |||
2011 | finish: | |||
2012 | MD5_DestroyContext(cx, PR_TRUE1); | |||
2013 | return rv; | |||
2014 | } | |||
2015 | ||||
2016 | SECStatus | |||
2017 | sha1_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
2018 | { | |||
2019 | SECStatus rv = SECSuccess; | |||
2020 | SHA1Context *cx, *cx_cpy; | |||
2021 | unsigned char *cxbytes; | |||
2022 | unsigned int len; | |||
2023 | unsigned int i, quarter; | |||
2024 | cx = SHA1_NewContext(); | |||
2025 | SHA1_Begin(cx); | |||
2026 | /* divide message by 4, restarting 3 times */ | |||
2027 | quarter = (src_length + 3) / 4; | |||
2028 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
2029 | SHA1_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
2030 | len = SHA1_FlattenSize(cx); | |||
2031 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
2032 | SHA1_Flatten(cx, cxbytes); | |||
2033 | cx_cpy = SHA1_Resurrect(cxbytes, NULL((void*)0)); | |||
2034 | if (!cx_cpy) { | |||
2035 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA1_Resurrect failed!\n", progName); | |||
2036 | rv = SECFailure; | |||
2037 | goto finish; | |||
2038 | } | |||
2039 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2040 | if (rv) { | |||
2041 | SHA1_DestroyContext(cx_cpy, PR_TRUE1); | |||
2042 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA1_restart failed!\n", progName); | |||
2043 | goto finish; | |||
2044 | } | |||
2045 | SHA1_DestroyContext(cx_cpy, PR_TRUE1); | |||
2046 | PORT_FreePORT_Free_Util(cxbytes); | |||
2047 | src_length -= quarter; | |||
2048 | } | |||
2049 | SHA1_End(cx, dest, &len, MD5_LENGTH16); | |||
2050 | finish: | |||
2051 | SHA1_DestroyContext(cx, PR_TRUE1); | |||
2052 | return rv; | |||
2053 | } | |||
2054 | ||||
2055 | SECStatus | |||
2056 | SHA224_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
2057 | { | |||
2058 | SECStatus rv = SECSuccess; | |||
2059 | SHA224Context *cx, *cx_cpy; | |||
2060 | unsigned char *cxbytes; | |||
2061 | unsigned int len; | |||
2062 | unsigned int i, quarter; | |||
2063 | cx = SHA224_NewContext(); | |||
2064 | SHA224_Begin(cx); | |||
2065 | /* divide message by 4, restarting 3 times */ | |||
2066 | quarter = (src_length + 3) / 4; | |||
2067 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
2068 | SHA224_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
2069 | len = SHA224_FlattenSize(cx); | |||
2070 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
2071 | SHA224_Flatten(cx, cxbytes); | |||
2072 | cx_cpy = SHA224_Resurrect(cxbytes, NULL((void*)0)); | |||
2073 | if (!cx_cpy) { | |||
2074 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA224_Resurrect failed!\n", progName); | |||
2075 | rv = SECFailure; | |||
2076 | goto finish; | |||
2077 | } | |||
2078 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2079 | if (rv) { | |||
2080 | SHA224_DestroyContext(cx_cpy, PR_TRUE1); | |||
2081 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA224_restart failed!\n", progName); | |||
2082 | goto finish; | |||
2083 | } | |||
2084 | ||||
2085 | SHA224_DestroyContext(cx_cpy, PR_TRUE1); | |||
2086 | PORT_FreePORT_Free_Util(cxbytes); | |||
2087 | src_length -= quarter; | |||
2088 | } | |||
2089 | SHA224_End(cx, dest, &len, MD5_LENGTH16); | |||
2090 | finish: | |||
2091 | SHA224_DestroyContext(cx, PR_TRUE1); | |||
2092 | return rv; | |||
2093 | } | |||
2094 | ||||
2095 | SECStatus | |||
2096 | SHA256_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
2097 | { | |||
2098 | SECStatus rv = SECSuccess; | |||
2099 | SHA256Context *cx, *cx_cpy; | |||
2100 | unsigned char *cxbytes; | |||
2101 | unsigned int len; | |||
2102 | unsigned int i, quarter; | |||
2103 | cx = SHA256_NewContext(); | |||
2104 | SHA256_Begin(cx); | |||
2105 | /* divide message by 4, restarting 3 times */ | |||
2106 | quarter = (src_length + 3) / 4; | |||
2107 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
2108 | SHA256_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
2109 | len = SHA256_FlattenSize(cx); | |||
2110 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
2111 | SHA256_Flatten(cx, cxbytes); | |||
2112 | cx_cpy = SHA256_Resurrect(cxbytes, NULL((void*)0)); | |||
2113 | if (!cx_cpy) { | |||
2114 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA256_Resurrect failed!\n", progName); | |||
2115 | rv = SECFailure; | |||
2116 | goto finish; | |||
2117 | } | |||
2118 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2119 | if (rv) { | |||
2120 | SHA256_DestroyContext(cx_cpy, PR_TRUE1); | |||
2121 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA256_restart failed!\n", progName); | |||
2122 | goto finish; | |||
2123 | } | |||
2124 | SHA256_DestroyContext(cx_cpy, PR_TRUE1); | |||
2125 | PORT_FreePORT_Free_Util(cxbytes); | |||
2126 | src_length -= quarter; | |||
2127 | } | |||
2128 | SHA256_End(cx, dest, &len, MD5_LENGTH16); | |||
2129 | finish: | |||
2130 | SHA256_DestroyContext(cx, PR_TRUE1); | |||
2131 | return rv; | |||
2132 | } | |||
2133 | ||||
2134 | SECStatus | |||
2135 | SHA384_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
2136 | { | |||
2137 | SECStatus rv = SECSuccess; | |||
2138 | SHA384Context *cx, *cx_cpy; | |||
2139 | unsigned char *cxbytes; | |||
2140 | unsigned int len; | |||
2141 | unsigned int i, quarter; | |||
2142 | cx = SHA384_NewContext(); | |||
2143 | SHA384_Begin(cx); | |||
2144 | /* divide message by 4, restarting 3 times */ | |||
2145 | quarter = (src_length + 3) / 4; | |||
2146 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
2147 | SHA384_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
2148 | len = SHA384_FlattenSize(cx); | |||
2149 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
2150 | SHA384_Flatten(cx, cxbytes); | |||
2151 | cx_cpy = SHA384_Resurrect(cxbytes, NULL((void*)0)); | |||
2152 | if (!cx_cpy) { | |||
2153 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA384_Resurrect failed!\n", progName); | |||
2154 | rv = SECFailure; | |||
2155 | goto finish; | |||
2156 | } | |||
2157 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2158 | if (rv) { | |||
2159 | SHA384_DestroyContext(cx_cpy, PR_TRUE1); | |||
2160 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA384_restart failed!\n", progName); | |||
2161 | goto finish; | |||
2162 | } | |||
2163 | SHA384_DestroyContext(cx_cpy, PR_TRUE1); | |||
2164 | PORT_FreePORT_Free_Util(cxbytes); | |||
2165 | src_length -= quarter; | |||
2166 | } | |||
2167 | SHA384_End(cx, dest, &len, MD5_LENGTH16); | |||
2168 | finish: | |||
2169 | SHA384_DestroyContext(cx, PR_TRUE1); | |||
2170 | return rv; | |||
2171 | } | |||
2172 | ||||
2173 | SECStatus | |||
2174 | SHA512_restart(unsigned char *dest, const unsigned char *src, PRUint32 src_length) | |||
2175 | { | |||
2176 | SECStatus rv = SECSuccess; | |||
2177 | SHA512Context *cx, *cx_cpy; | |||
2178 | unsigned char *cxbytes; | |||
2179 | unsigned int len; | |||
2180 | unsigned int i, quarter; | |||
2181 | cx = SHA512_NewContext(); | |||
2182 | SHA512_Begin(cx); | |||
2183 | /* divide message by 4, restarting 3 times */ | |||
2184 | quarter = (src_length + 3) / 4; | |||
2185 | for (i = 0; i < 4 && src_length > 0; i++) { | |||
2186 | SHA512_Update(cx, src + i * quarter, PR_MIN(quarter, src_length)((quarter)<(src_length)?(quarter):(src_length))); | |||
2187 | len = SHA512_FlattenSize(cx); | |||
2188 | cxbytes = PORT_AllocPORT_Alloc_Util(len); | |||
2189 | SHA512_Flatten(cx, cxbytes); | |||
2190 | cx_cpy = SHA512_Resurrect(cxbytes, NULL((void*)0)); | |||
2191 | if (!cx_cpy) { | |||
2192 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA512_Resurrect failed!\n", progName); | |||
2193 | rv = SECFailure; | |||
2194 | goto finish; | |||
2195 | } | |||
2196 | rv = PORT_Memcmpmemcmp(cx, cx_cpy, len); | |||
2197 | if (rv) { | |||
2198 | SHA512_DestroyContext(cx_cpy, PR_TRUE1); | |||
2199 | PR_fprintf(PR_STDERRPR_GetSpecialFD(PR_StandardError), "%s: SHA512_restart failed!\n", progName); | |||
2200 | goto finish; | |||
2201 | } | |||
2202 | SHA512_DestroyContext(cx_cpy, PR_TRUE1); | |||
2203 | PORT_FreePORT_Free_Util(cxbytes); | |||
2204 | src_length -= quarter; | |||
2205 | } | |||
2206 | SHA512_End(cx, dest, &len, MD5_LENGTH16); | |||
2207 | finish: | |||
2208 | SHA512_DestroyContext(cx, PR_TRUE1); | |||
2209 | return rv; | |||
2210 | } | |||
2211 | ||||
2212 | SECStatus | |||
2213 | pubkeyInitKey(bltestCipherInfo *cipherInfo, PRFileDesc *file, | |||
2214 | int keysize, int exponent, char *curveName) | |||
2215 | { | |||
2216 | int i; | |||
2217 | SECStatus rv = SECSuccess; | |||
2218 | bltestAsymKeyParams *asymk = &cipherInfo->params.asymk; | |||
2219 | bltestRSAParams *rsap; | |||
2220 | RSAPrivateKey **rsaKey = NULL((void*)0); | |||
2221 | bltestDSAParams *dsap; | |||
2222 | DSAPrivateKey **dsaKey = NULL((void*)0); | |||
2223 | SECItem *tmpECParamsDER; | |||
2224 | ECParams *tmpECParams = NULL((void*)0); | |||
2225 | SECItem ecSerialize[3]; | |||
2226 | ECPrivateKey **ecKey = NULL((void*)0); | |||
2227 | switch (cipherInfo->mode) { | |||
2228 | case bltestRSA: | |||
2229 | case bltestRSA_PSS: | |||
2230 | case bltestRSA_OAEP: | |||
2231 | rsap = &asymk->cipherParams.rsa; | |||
2232 | rsaKey = (RSAPrivateKey **)&asymk->privKey; | |||
2233 | if (keysize > 0) { | |||
2234 | SECItem expitem = { 0, 0, 0 }; | |||
2235 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &expitem, sizeof(int)); | |||
2236 | for (i = 1; i <= sizeof(int); i++) | |||
2237 | expitem.data[i - 1] = exponent >> (8 * (sizeof(int) - i)); | |||
2238 | *rsaKey = RSA_NewKey(keysize * 8, &expitem); | |||
2239 | serialize_key(&(*rsaKey)->version, 9, file); | |||
2240 | rsap->keysizeInBits = keysize * 8; | |||
2241 | } else { | |||
2242 | setupIO(cipherInfo->arena, &asymk->key, file, NULL((void*)0), 0); | |||
2243 | *rsaKey = rsakey_from_filedata(cipherInfo->arena, &asymk->key.buf); | |||
2244 | rsap->keysizeInBits = (*rsaKey)->modulus.len * 8; | |||
2245 | } | |||
2246 | break; | |||
2247 | case bltestDSA: | |||
2248 | dsap = &asymk->cipherParams.dsa; | |||
2249 | dsaKey = (DSAPrivateKey **)&asymk->privKey; | |||
2250 | if (keysize > 0) { | |||
2251 | dsap->keysize = keysize * 8; | |||
2252 | if (!dsap->pqg) | |||
2253 | bltest_pqg_init(dsap); | |||
2254 | rv = DSA_NewKey(dsap->pqg, dsaKey); | |||
2255 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2255); exit(-1); }; | |||
2256 | serialize_key(&(*dsaKey)->params.prime, 5, file); | |||
2257 | } else { | |||
2258 | setupIO(cipherInfo->arena, &asymk->key, file, NULL((void*)0), 0); | |||
2259 | *dsaKey = dsakey_from_filedata(cipherInfo->arena, &asymk->key.buf); | |||
2260 | dsap->keysize = (*dsaKey)->params.prime.len * 8; | |||
2261 | } | |||
2262 | break; | |||
2263 | case bltestECDSA: | |||
2264 | ecKey = (ECPrivateKey **)&asymk->privKey; | |||
2265 | if (curveName != NULL((void*)0)) { | |||
2266 | tmpECParamsDER = getECParams(curveName); | |||
2267 | rv = SECOID_Init(); | |||
2268 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2268); exit(-1); }; | |||
2269 | rv = EC_DecodeParams(tmpECParamsDER, &tmpECParams) == SECFailure; | |||
2270 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2270); exit(-1); }; | |||
2271 | rv = EC_NewKey(tmpECParams, ecKey); | |||
2272 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2272); exit(-1); }; | |||
2273 | ecSerialize[0].type = tmpECParamsDER->type; | |||
2274 | ecSerialize[0].data = tmpECParamsDER->data; | |||
2275 | ecSerialize[0].len = tmpECParamsDER->len; | |||
2276 | ecSerialize[1].type = (*ecKey)->publicValue.type; | |||
2277 | ecSerialize[1].data = (*ecKey)->publicValue.data; | |||
2278 | ecSerialize[1].len = (*ecKey)->publicValue.len; | |||
2279 | ecSerialize[2].type = (*ecKey)->privateValue.type; | |||
2280 | ecSerialize[2].data = (*ecKey)->privateValue.data; | |||
2281 | ecSerialize[2].len = (*ecKey)->privateValue.len; | |||
2282 | serialize_key(&(ecSerialize[0]), 3, file); | |||
2283 | SECITEM_FreeItemSECITEM_FreeItem_Util(tmpECParamsDER, PR_TRUE1); | |||
2284 | PORT_FreeArenaPORT_FreeArena_Util(tmpECParams->arena, PR_TRUE1); | |||
2285 | rv = SECOID_Shutdown(); | |||
2286 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2286); exit(-1); }; | |||
2287 | } else { | |||
2288 | setupIO(cipherInfo->arena, &asymk->key, file, NULL((void*)0), 0); | |||
2289 | *ecKey = eckey_from_filedata(cipherInfo->arena, &asymk->key.buf); | |||
2290 | } | |||
2291 | break; | |||
2292 | default: | |||
2293 | return SECFailure; | |||
2294 | } | |||
2295 | return SECSuccess; | |||
2296 | } | |||
2297 | ||||
2298 | SECStatus | |||
2299 | cipherInit(bltestCipherInfo *cipherInfo, PRBool encrypt) | |||
2300 | { | |||
2301 | PRBool restart; | |||
2302 | int outlen; | |||
2303 | switch (cipherInfo->mode) { | |||
2304 | case bltestDES_ECB: | |||
2305 | case bltestDES_CBC: | |||
2306 | case bltestDES_EDE_ECB: | |||
2307 | case bltestDES_EDE_CBC: | |||
2308 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2309 | cipherInfo->input.pBuf.len); | |||
2310 | return bltest_des_init(cipherInfo, encrypt); | |||
2311 | break; | |||
2312 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
2313 | case bltestRC2_ECB: | |||
2314 | case bltestRC2_CBC: | |||
2315 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2316 | cipherInfo->input.pBuf.len); | |||
2317 | return bltest_rc2_init(cipherInfo, encrypt); | |||
2318 | break; | |||
2319 | #endif /* NSS_DISABLE_DEPRECATED_RC2 */ | |||
2320 | case bltestRC4: | |||
2321 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2322 | cipherInfo->input.pBuf.len); | |||
2323 | return bltest_rc4_init(cipherInfo, encrypt); | |||
2324 | break; | |||
2325 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
2326 | case bltestRC5_ECB: | |||
2327 | case bltestRC5_CBC: | |||
2328 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2329 | cipherInfo->input.pBuf.len); | |||
2330 | return bltest_rc5_init(cipherInfo, encrypt); | |||
2331 | break; | |||
2332 | #endif | |||
2333 | case bltestAES_ECB: | |||
2334 | case bltestAES_CBC: | |||
2335 | case bltestAES_CTS: | |||
2336 | case bltestAES_CTR: | |||
2337 | case bltestAES_GCM: | |||
2338 | outlen = cipherInfo->input.pBuf.len; | |||
2339 | if (cipherInfo->mode == bltestAES_GCM && encrypt) { | |||
2340 | outlen += 16; | |||
2341 | } | |||
2342 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, outlen); | |||
2343 | return bltest_aes_init(cipherInfo, encrypt); | |||
2344 | break; | |||
2345 | case bltestCAMELLIA_ECB: | |||
2346 | case bltestCAMELLIA_CBC: | |||
2347 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2348 | cipherInfo->input.pBuf.len); | |||
2349 | return bltest_camellia_init(cipherInfo, encrypt); | |||
2350 | break; | |||
2351 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
2352 | case bltestSEED_ECB: | |||
2353 | case bltestSEED_CBC: | |||
2354 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2355 | cipherInfo->input.pBuf.len); | |||
2356 | return bltest_seed_init(cipherInfo, encrypt); | |||
2357 | break; | |||
2358 | #endif /* NSS_DISABLE_DEPRECATED_SEED */ | |||
2359 | case bltestCHACHA20_CTR: | |||
2360 | outlen = cipherInfo->input.pBuf.len; | |||
2361 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, outlen); | |||
2362 | return bltest_chacha20_ctr_init(cipherInfo, encrypt); | |||
2363 | break; | |||
2364 | case bltestCHACHA20: | |||
2365 | outlen = cipherInfo->input.pBuf.len + (encrypt ? 16 : 0); | |||
2366 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, outlen); | |||
2367 | return bltest_chacha20_init(cipherInfo, encrypt); | |||
2368 | break; | |||
2369 | case bltestRSA: | |||
2370 | case bltestRSA_OAEP: | |||
2371 | case bltestRSA_PSS: | |||
2372 | if (encrypt || cipherInfo->mode != bltestRSA_PSS) { | |||
2373 | /* Don't allocate a buffer for PSS in verify mode, as no actual | |||
2374 | * output is produced. */ | |||
2375 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2376 | RSA_MAX_MODULUS_BITS16384 / 8); | |||
2377 | } | |||
2378 | return bltest_rsa_init(cipherInfo, encrypt); | |||
2379 | break; | |||
2380 | case bltestDSA: | |||
2381 | if (encrypt) { | |||
2382 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2383 | DSA_MAX_SIGNATURE_LEN(32 * 2)); | |||
2384 | } | |||
2385 | return bltest_dsa_init(cipherInfo, encrypt); | |||
2386 | break; | |||
2387 | case bltestECDSA: | |||
2388 | if (encrypt) { | |||
2389 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2390 | 2 * MAX_ECKEY_LEN72); | |||
2391 | } | |||
2392 | return bltest_ecdsa_init(cipherInfo, encrypt); | |||
2393 | break; | |||
2394 | case bltestMD2: | |||
2395 | restart = cipherInfo->params.hash.restart; | |||
2396 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2397 | MD2_LENGTH16); | |||
2398 | cipherInfo->cipher.hashCipher = (restart) ? md2_restart : md2_HashBuf; | |||
2399 | return SECSuccess; | |||
2400 | break; | |||
2401 | case bltestMD5: | |||
2402 | restart = cipherInfo->params.hash.restart; | |||
2403 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2404 | MD5_LENGTH16); | |||
2405 | cipherInfo->cipher.hashCipher = (restart) ? md5_restart : MD5_HashBuf; | |||
2406 | return SECSuccess; | |||
2407 | break; | |||
2408 | case bltestSHA1: | |||
2409 | restart = cipherInfo->params.hash.restart; | |||
2410 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2411 | SHA1_LENGTH20); | |||
2412 | cipherInfo->cipher.hashCipher = (restart) ? sha1_restart : SHA1_HashBuf; | |||
2413 | return SECSuccess; | |||
2414 | break; | |||
2415 | case bltestSHA224: | |||
2416 | restart = cipherInfo->params.hash.restart; | |||
2417 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2418 | SHA224_LENGTH28); | |||
2419 | cipherInfo->cipher.hashCipher = (restart) ? SHA224_restart | |||
2420 | : SHA224_HashBuf; | |||
2421 | return SECSuccess; | |||
2422 | break; | |||
2423 | case bltestSHA256: | |||
2424 | restart = cipherInfo->params.hash.restart; | |||
2425 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2426 | SHA256_LENGTH32); | |||
2427 | cipherInfo->cipher.hashCipher = (restart) ? SHA256_restart | |||
2428 | : SHA256_HashBuf; | |||
2429 | return SECSuccess; | |||
2430 | break; | |||
2431 | case bltestSHA384: | |||
2432 | restart = cipherInfo->params.hash.restart; | |||
2433 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2434 | SHA384_LENGTH48); | |||
2435 | cipherInfo->cipher.hashCipher = (restart) ? SHA384_restart | |||
2436 | : SHA384_HashBuf; | |||
2437 | return SECSuccess; | |||
2438 | break; | |||
2439 | case bltestSHA512: | |||
2440 | restart = cipherInfo->params.hash.restart; | |||
2441 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2442 | SHA512_LENGTH64); | |||
2443 | cipherInfo->cipher.hashCipher = (restart) ? SHA512_restart | |||
2444 | : SHA512_HashBuf; | |||
2445 | return SECSuccess; | |||
2446 | break; | |||
2447 | case bltestSHA3_224: | |||
2448 | restart = cipherInfo->params.hash.restart; | |||
2449 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2450 | SHA3_224_LENGTH28); | |||
2451 | cipherInfo->cipher.hashCipher = SHA3_224_HashBuf; | |||
2452 | return SECSuccess; | |||
2453 | break; | |||
2454 | case bltestSHA3_256: | |||
2455 | restart = cipherInfo->params.hash.restart; | |||
2456 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2457 | SHA3_256_LENGTH32); | |||
2458 | cipherInfo->cipher.hashCipher = SHA3_256_HashBuf; | |||
2459 | return SECSuccess; | |||
2460 | break; | |||
2461 | case bltestSHA3_384: | |||
2462 | restart = cipherInfo->params.hash.restart; | |||
2463 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2464 | SHA3_384_LENGTH48); | |||
2465 | cipherInfo->cipher.hashCipher = SHA3_384_HashBuf; | |||
2466 | return SECSuccess; | |||
2467 | break; | |||
2468 | case bltestSHA3_512: | |||
2469 | restart = cipherInfo->params.hash.restart; | |||
2470 | SECITEM_AllocItemSECITEM_AllocItem_Util(cipherInfo->arena, &cipherInfo->output.buf, | |||
2471 | SHA3_512_LENGTH64); | |||
2472 | cipherInfo->cipher.hashCipher = SHA3_512_HashBuf; | |||
2473 | return SECSuccess; | |||
2474 | break; | |||
2475 | default: | |||
2476 | return SECFailure; | |||
2477 | } | |||
2478 | return SECSuccess; | |||
2479 | } | |||
2480 | ||||
2481 | SECStatus | |||
2482 | cipherDoOp(bltestCipherInfo *cipherInfo) | |||
2483 | { | |||
2484 | PRIntervalTime time1, time2; | |||
2485 | SECStatus rv = SECSuccess; | |||
2486 | int i; | |||
2487 | unsigned int len; | |||
2488 | unsigned int maxLen = cipherInfo->output.pBuf.len; | |||
2489 | unsigned char *dummyOut; | |||
2490 | dummyOut = PORT_AllocPORT_Alloc_Util(maxLen); | |||
2491 | if (is_symmkeyCipher(cipherInfo->mode)) { | |||
2492 | const unsigned char *input = cipherInfo->input.pBuf.data; | |||
2493 | unsigned int inputLen = is_singleShotCipher(cipherInfo->mode) ? cipherInfo->input.pBuf.len | |||
2494 | : PR_MIN(cipherInfo->input.pBuf.len, 16)((cipherInfo->input.pBuf.len)<(16)?(cipherInfo->input .pBuf.len):(16)); | |||
2495 | unsigned char *output = cipherInfo->output.pBuf.data; | |||
2496 | unsigned int outputLen = maxLen; | |||
2497 | unsigned int totalOutputLen = 0; | |||
2498 | TIMESTART()time1 = PR_IntervalNow();; | |||
2499 | rv = (*cipherInfo->cipher.symmkeyCipher)(cipherInfo->cx, | |||
2500 | output, &len, outputLen, | |||
2501 | input, inputLen); | |||
2502 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2502); exit(-1); }; | |||
2503 | totalOutputLen += len; | |||
2504 | if (cipherInfo->input.pBuf.len > inputLen) { | |||
2505 | input += inputLen; | |||
2506 | inputLen = cipherInfo->input.pBuf.len - inputLen; | |||
2507 | output += len; | |||
2508 | outputLen -= len; | |||
2509 | rv = (*cipherInfo->cipher.symmkeyCipher)(cipherInfo->cx, | |||
2510 | output, &len, outputLen, | |||
2511 | input, inputLen); | |||
2512 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2512); exit(-1); }; | |||
2513 | totalOutputLen += len; | |||
2514 | } | |||
2515 | cipherInfo->output.pBuf.len = totalOutputLen; | |||
2516 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2517 | cipherInfo->repetitions = 0; | |||
2518 | if (cipherInfo->repetitionsToPerfom != 0) { | |||
2519 | TIMESTART()time1 = PR_IntervalNow();; | |||
2520 | for (i = 0; i < cipherInfo->repetitionsToPerfom; i++, | |||
2521 | cipherInfo->repetitions++) { | |||
2522 | (*cipherInfo->cipher.symmkeyCipher)(cipherInfo->cx, dummyOut, | |||
2523 | &len, maxLen, | |||
2524 | cipherInfo->input.pBuf.data, | |||
2525 | cipherInfo->input.pBuf.len); | |||
2526 | ||||
2527 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2527); exit(-1); }; | |||
2528 | } | |||
2529 | } else { | |||
2530 | int opsBetweenChecks = 0; | |||
2531 | TIMEMARK(cipherInfo->seconds)time1 = PR_SecondsToInterval(cipherInfo->seconds); { PRInt64 tmp; if (time2 == 0) { time2 = 1; } ((tmp) = (time1) / (time2 )); if (tmp < 10) { if (tmp == 0) { opsBetweenChecks = 1; } else { ((opsBetweenChecks) = (PRInt32)(tmp)); } } else { opsBetweenChecks = 10; } } time2 = time1; time1 = PR_IntervalNow();; | |||
2532 | while (!(TIMETOFINISH()PR_IntervalNow() - time1 >= time2)) { | |||
2533 | int j = 0; | |||
2534 | for (; j < opsBetweenChecks; j++) { | |||
2535 | (*cipherInfo->cipher.symmkeyCipher)( | |||
2536 | cipherInfo->cx, dummyOut, &len, maxLen, | |||
2537 | cipherInfo->input.pBuf.data, | |||
2538 | cipherInfo->input.pBuf.len); | |||
2539 | } | |||
2540 | cipherInfo->repetitions += j; | |||
2541 | } | |||
2542 | } | |||
2543 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2544 | } else if (is_aeadCipher(cipherInfo->mode)) { | |||
2545 | const unsigned char *input = cipherInfo->input.pBuf.data; | |||
2546 | unsigned int inputLen = cipherInfo->input.pBuf.len; | |||
2547 | unsigned char *output = cipherInfo->output.pBuf.data; | |||
2548 | unsigned int outputLen; | |||
2549 | bltestSymmKeyParams *sk = &cipherInfo->params.sk; | |||
2550 | bltestAuthSymmKeyParams *ask = &cipherInfo->params.ask; | |||
2551 | ||||
2552 | TIMESTART()time1 = PR_IntervalNow();; | |||
2553 | rv = (*cipherInfo->cipher.aeadCipher)( | |||
2554 | cipherInfo->cx, | |||
2555 | output, &outputLen, maxLen, | |||
2556 | input, inputLen, | |||
2557 | sk->iv.buf.data, sk->iv.buf.len, | |||
2558 | ask->aad.buf.data, ask->aad.buf.len); | |||
2559 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2559); exit(-1); }; | |||
2560 | cipherInfo->output.pBuf.len = outputLen; | |||
2561 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2562 | ||||
2563 | cipherInfo->repetitions = 0; | |||
2564 | if (cipherInfo->repetitionsToPerfom != 0) { | |||
2565 | TIMESTART()time1 = PR_IntervalNow();; | |||
2566 | for (i = 0; i < cipherInfo->repetitionsToPerfom; i++, | |||
2567 | cipherInfo->repetitions++) { | |||
2568 | rv = (*cipherInfo->cipher.aeadCipher)( | |||
2569 | cipherInfo->cx, | |||
2570 | output, &outputLen, maxLen, | |||
2571 | input, inputLen, | |||
2572 | sk->iv.buf.data, sk->iv.buf.len, | |||
2573 | ask->aad.buf.data, ask->aad.buf.len); | |||
2574 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2574); exit(-1); }; | |||
2575 | } | |||
2576 | } else { | |||
2577 | int opsBetweenChecks = 0; | |||
2578 | TIMEMARK(cipherInfo->seconds)time1 = PR_SecondsToInterval(cipherInfo->seconds); { PRInt64 tmp; if (time2 == 0) { time2 = 1; } ((tmp) = (time1) / (time2 )); if (tmp < 10) { if (tmp == 0) { opsBetweenChecks = 1; } else { ((opsBetweenChecks) = (PRInt32)(tmp)); } } else { opsBetweenChecks = 10; } } time2 = time1; time1 = PR_IntervalNow();; | |||
2579 | while (!(TIMETOFINISH()PR_IntervalNow() - time1 >= time2)) { | |||
2580 | int j = 0; | |||
2581 | for (; j < opsBetweenChecks; j++) { | |||
2582 | (*cipherInfo->cipher.aeadCipher)( | |||
2583 | cipherInfo->cx, | |||
2584 | output, &outputLen, maxLen, | |||
2585 | input, inputLen, | |||
2586 | sk->iv.buf.data, sk->iv.buf.len, | |||
2587 | ask->aad.buf.data, ask->aad.buf.len); | |||
2588 | } | |||
2589 | cipherInfo->repetitions += j; | |||
2590 | } | |||
2591 | } | |||
2592 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2593 | } else if (is_pubkeyCipher(cipherInfo->mode)) { | |||
2594 | TIMESTART()time1 = PR_IntervalNow();; | |||
2595 | rv = (*cipherInfo->cipher.pubkeyCipher)(cipherInfo->cx, | |||
2596 | &cipherInfo->output.pBuf, | |||
2597 | &cipherInfo->input.pBuf); | |||
2598 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2599 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2599); exit(-1); }; | |||
2600 | cipherInfo->repetitions = 0; | |||
2601 | if (cipherInfo->repetitionsToPerfom != 0) { | |||
2602 | TIMESTART()time1 = PR_IntervalNow();; | |||
2603 | for (i = 0; i < cipherInfo->repetitionsToPerfom; | |||
2604 | i++, cipherInfo->repetitions++) { | |||
2605 | SECItem dummy; | |||
2606 | dummy.data = dummyOut; | |||
2607 | dummy.len = maxLen; | |||
2608 | (*cipherInfo->cipher.pubkeyCipher)(cipherInfo->cx, &dummy, | |||
2609 | &cipherInfo->input.pBuf); | |||
2610 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2610); exit(-1); }; | |||
2611 | } | |||
2612 | } else { | |||
2613 | int opsBetweenChecks = 0; | |||
2614 | TIMEMARK(cipherInfo->seconds)time1 = PR_SecondsToInterval(cipherInfo->seconds); { PRInt64 tmp; if (time2 == 0) { time2 = 1; } ((tmp) = (time1) / (time2 )); if (tmp < 10) { if (tmp == 0) { opsBetweenChecks = 1; } else { ((opsBetweenChecks) = (PRInt32)(tmp)); } } else { opsBetweenChecks = 10; } } time2 = time1; time1 = PR_IntervalNow();; | |||
2615 | while (!(TIMETOFINISH()PR_IntervalNow() - time1 >= time2)) { | |||
2616 | int j = 0; | |||
2617 | for (; j < opsBetweenChecks; j++) { | |||
2618 | SECItem dummy; | |||
2619 | dummy.data = dummyOut; | |||
2620 | dummy.len = maxLen; | |||
2621 | (*cipherInfo->cipher.pubkeyCipher)(cipherInfo->cx, &dummy, | |||
2622 | &cipherInfo->input.pBuf); | |||
2623 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2623); exit(-1); }; | |||
2624 | } | |||
2625 | cipherInfo->repetitions += j; | |||
2626 | } | |||
2627 | } | |||
2628 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2629 | } else if (is_hashCipher(cipherInfo->mode)) { | |||
2630 | TIMESTART()time1 = PR_IntervalNow();; | |||
2631 | rv = (*cipherInfo->cipher.hashCipher)(cipherInfo->output.pBuf.data, | |||
2632 | cipherInfo->input.pBuf.data, | |||
2633 | cipherInfo->input.pBuf.len); | |||
2634 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2635 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2635); exit(-1); }; | |||
2636 | cipherInfo->repetitions = 0; | |||
2637 | if (cipherInfo->repetitionsToPerfom != 0) { | |||
2638 | TIMESTART()time1 = PR_IntervalNow();; | |||
2639 | for (i = 0; i < cipherInfo->repetitionsToPerfom; | |||
2640 | i++, cipherInfo->repetitions++) { | |||
2641 | (*cipherInfo->cipher.hashCipher)(dummyOut, | |||
2642 | cipherInfo->input.pBuf.data, | |||
2643 | cipherInfo->input.pBuf.len); | |||
2644 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2644); exit(-1); }; | |||
2645 | } | |||
2646 | } else { | |||
2647 | int opsBetweenChecks = 0; | |||
2648 | TIMEMARK(cipherInfo->seconds)time1 = PR_SecondsToInterval(cipherInfo->seconds); { PRInt64 tmp; if (time2 == 0) { time2 = 1; } ((tmp) = (time1) / (time2 )); if (tmp < 10) { if (tmp == 0) { opsBetweenChecks = 1; } else { ((opsBetweenChecks) = (PRInt32)(tmp)); } } else { opsBetweenChecks = 10; } } time2 = time1; time1 = PR_IntervalNow();; | |||
2649 | while (!(TIMETOFINISH()PR_IntervalNow() - time1 >= time2)) { | |||
2650 | int j = 0; | |||
2651 | for (; j < opsBetweenChecks; j++) { | |||
2652 | bltestIO *input = &cipherInfo->input; | |||
2653 | (*cipherInfo->cipher.hashCipher)(dummyOut, | |||
2654 | input->pBuf.data, | |||
2655 | input->pBuf.len); | |||
2656 | CHECKERROR(rv, __LINE__)if (rv) { PRErrorCode prerror = PR_GetError(); PR_fprintf(PR_GetSpecialFD (PR_StandardError), "%s: ERR %d (%s) at line %d.\n", progName , prerror, PR_ErrorToString((prerror), 0), 2656); exit(-1); }; | |||
2657 | } | |||
2658 | cipherInfo->repetitions += j; | |||
2659 | } | |||
2660 | } | |||
2661 | TIMEFINISH(cipherInfo->optime, 1.0)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); cipherInfo->optime = ((double)(time1)) / 1.0;; | |||
2662 | } | |||
2663 | PORT_FreePORT_Free_Util(dummyOut); | |||
2664 | return rv; | |||
2665 | } | |||
2666 | ||||
2667 | SECStatus | |||
2668 | cipherFinish(bltestCipherInfo *cipherInfo) | |||
2669 | { | |||
2670 | SECStatus rv = SECSuccess; | |||
2671 | ||||
2672 | switch (cipherInfo->mode) { | |||
2673 | case bltestDES_ECB: | |||
2674 | case bltestDES_CBC: | |||
2675 | case bltestDES_EDE_ECB: | |||
2676 | case bltestDES_EDE_CBC: | |||
2677 | DES_DestroyContext((DESContext *)cipherInfo->cx, PR_TRUE1); | |||
2678 | break; | |||
2679 | case bltestAES_GCM: | |||
2680 | case bltestAES_ECB: | |||
2681 | case bltestAES_CBC: | |||
2682 | case bltestAES_CTS: | |||
2683 | case bltestAES_CTR: | |||
2684 | AES_DestroyContext((AESContext *)cipherInfo->cx, PR_TRUE1); | |||
2685 | break; | |||
2686 | case bltestCAMELLIA_ECB: | |||
2687 | case bltestCAMELLIA_CBC: | |||
2688 | Camellia_DestroyContext((CamelliaContext *)cipherInfo->cx, PR_TRUE1); | |||
2689 | break; | |||
2690 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
2691 | case bltestSEED_ECB: | |||
2692 | case bltestSEED_CBC: | |||
2693 | SEED_DestroyContext((SEEDContext *)cipherInfo->cx, PR_TRUE1); | |||
2694 | break; | |||
2695 | #endif /* NSS_DISABLE_DEPRECATED_SEED */ | |||
2696 | case bltestCHACHA20_CTR: | |||
2697 | ChaCha20_DestroyContext((ChaCha20Context *)cipherInfo->cx, PR_TRUE1); | |||
2698 | break; | |||
2699 | case bltestCHACHA20: | |||
2700 | ChaCha20Poly1305_DestroyContext((ChaCha20Poly1305Context *) | |||
2701 | cipherInfo->cx, | |||
2702 | PR_TRUE1); | |||
2703 | break; | |||
2704 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
2705 | case bltestRC2_ECB: | |||
2706 | case bltestRC2_CBC: | |||
2707 | RC2_DestroyContext((RC2Context *)cipherInfo->cx, PR_TRUE1); | |||
2708 | break; | |||
2709 | #endif /* NSS_DISABLE_DEPRECATED_RC2 */ | |||
2710 | case bltestRC4: | |||
2711 | RC4_DestroyContext((RC4Context *)cipherInfo->cx, PR_TRUE1); | |||
2712 | break; | |||
2713 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
2714 | case bltestRC5_ECB: | |||
2715 | case bltestRC5_CBC: | |||
2716 | RC5_DestroyContext((RC5Context *)cipherInfo->cx, PR_TRUE1); | |||
2717 | break; | |||
2718 | #endif | |||
2719 | case bltestRSA: /* keys are alloc'ed within cipherInfo's arena, */ | |||
2720 | case bltestRSA_PSS: /* will be freed with it. */ | |||
2721 | case bltestRSA_OAEP: | |||
2722 | case bltestDSA: | |||
2723 | case bltestECDSA: | |||
2724 | case bltestMD2: /* hash contexts are ephemeral */ | |||
2725 | case bltestMD5: | |||
2726 | case bltestSHA1: | |||
2727 | case bltestSHA224: | |||
2728 | case bltestSHA256: | |||
2729 | case bltestSHA384: | |||
2730 | case bltestSHA512: | |||
2731 | case bltestSHA3_224: | |||
2732 | case bltestSHA3_256: | |||
2733 | case bltestSHA3_384: | |||
2734 | case bltestSHA3_512: | |||
2735 | return SECSuccess; | |||
2736 | break; | |||
2737 | default: | |||
2738 | return SECFailure; | |||
2739 | } | |||
2740 | return rv; | |||
2741 | } | |||
2742 | ||||
2743 | void | |||
2744 | print_exponent(SECItem *exp) | |||
2745 | { | |||
2746 | int i; | |||
2747 | int e = 0; | |||
2748 | if (exp->len <= 4) { | |||
2749 | for (i = exp->len; i >= 0; --i) | |||
2750 | e |= exp->data[exp->len - i] << 8 * (i - 1); | |||
2751 | fprintf(stdoutstdout, "%12d", e); | |||
2752 | } else { | |||
2753 | e = 8 * exp->len; | |||
2754 | fprintf(stdoutstdout, "~2**%-8d", e); | |||
2755 | } | |||
2756 | } | |||
2757 | ||||
2758 | static void | |||
2759 | splitToReportUnit(PRInt64 res, int *resArr, int *del, int size) | |||
2760 | { | |||
2761 | PRInt64 remaining = res, tmp = 0; | |||
2762 | PRInt64 Ldel; | |||
2763 | int i = -1; | |||
2764 | ||||
2765 | while (remaining > 0 && ++i < size) { | |||
2766 | LL_I2L(Ldel, del[i])((Ldel) = (PRInt64)(del[i])); | |||
2767 | LL_MOD(tmp, remaining, Ldel)((tmp) = (remaining) % (Ldel)); | |||
2768 | LL_L2I(resArr[i], tmp)((resArr[i]) = (PRInt32)(tmp)); | |||
2769 | LL_DIV(remaining, remaining, Ldel)((remaining) = (remaining) / (Ldel)); | |||
2770 | } | |||
2771 | } | |||
2772 | ||||
2773 | static char * | |||
2774 | getHighUnitBytes(PRInt64 res) | |||
2775 | { | |||
2776 | int spl[] = { 0, 0, 0, 0 }; | |||
2777 | int del[] = { 1024, 1024, 1024, 1024 }; | |||
2778 | char *marks[] = { "b", "Kb", "Mb", "Gb" }; | |||
2779 | int i = 3; | |||
2780 | ||||
2781 | splitToReportUnit(res, spl, del, 4); | |||
2782 | ||||
2783 | for (; i > 0; i--) { | |||
2784 | if (spl[i] != 0) { | |||
2785 | break; | |||
2786 | } | |||
2787 | } | |||
2788 | ||||
2789 | if (i == 0) | |||
2790 | return PR_smprintf("%d%s", spl[i], marks[i]); | |||
2791 | else | |||
2792 | return PR_smprintf("%d%s %d%s", spl[i], marks[i], spl[i - 1], marks[i - 1]); | |||
2793 | } | |||
2794 | ||||
2795 | static void | |||
2796 | printPR_smpString(const char *sformat, char *reportStr, | |||
2797 | const char *nformat, PRInt64 rNum) | |||
2798 | { | |||
2799 | if (reportStr) { | |||
2800 | fprintf(stdoutstdout, sformat, reportStr); | |||
2801 | PR_smprintf_free(reportStr); | |||
2802 | } else { | |||
2803 | fprintf(stdoutstdout, nformat, rNum); | |||
2804 | } | |||
2805 | } | |||
2806 | ||||
2807 | static char * | |||
2808 | getHighUnitOps(PRInt64 res) | |||
2809 | { | |||
2810 | int spl[] = { 0, 0, 0, 0 }; | |||
2811 | int del[] = { 1000, 1000, 1000, 1000 }; | |||
2812 | char *marks[] = { "", "T", "M", "B" }; | |||
2813 | int i = 3; | |||
2814 | ||||
2815 | splitToReportUnit(res, spl, del, 4); | |||
2816 | ||||
2817 | for (; i > 0; i--) { | |||
2818 | if (spl[i] != 0) { | |||
2819 | break; | |||
2820 | } | |||
2821 | } | |||
2822 | ||||
2823 | return PR_smprintf("%d%s", spl[i], marks[i]); | |||
2824 | } | |||
2825 | ||||
2826 | void | |||
2827 | dump_performance_info(bltestCipherInfo *infoList, double totalTimeInt, | |||
2828 | PRBool encrypt, PRBool cxonly) | |||
2829 | { | |||
2830 | bltestCipherInfo *info = infoList; | |||
2831 | ||||
2832 | PRInt64 totalIn = 0; | |||
2833 | PRBool td = PR_TRUE1; | |||
2834 | ||||
2835 | int repetitions = 0; | |||
2836 | int cxreps = 0; | |||
2837 | double cxtime = 0; | |||
2838 | double optime = 0; | |||
2839 | while (info != NULL((void*)0)) { | |||
2840 | repetitions += info->repetitions; | |||
2841 | cxreps += info->cxreps; | |||
2842 | cxtime += info->cxtime; | |||
2843 | optime += info->optime; | |||
2844 | totalIn += (PRInt64)info->input.buf.len * (PRInt64)info->repetitions; | |||
2845 | ||||
2846 | info = info->next; | |||
2847 | } | |||
2848 | info = infoList; | |||
2849 | ||||
2850 | fprintf(stdoutstdout, "#%9s", "mode"); | |||
2851 | fprintf(stdoutstdout, "%12s", "in"); | |||
2852 | print_td: | |||
2853 | switch (info->mode) { | |||
2854 | case bltestDES_ECB: | |||
2855 | case bltestDES_CBC: | |||
2856 | case bltestDES_EDE_ECB: | |||
2857 | case bltestDES_EDE_CBC: | |||
2858 | case bltestAES_ECB: | |||
2859 | case bltestAES_CBC: | |||
2860 | case bltestAES_CTS: | |||
2861 | case bltestAES_CTR: | |||
2862 | case bltestAES_GCM: | |||
2863 | case bltestCAMELLIA_ECB: | |||
2864 | case bltestCAMELLIA_CBC: | |||
2865 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
2866 | case bltestSEED_ECB: | |||
2867 | case bltestSEED_CBC: | |||
2868 | #endif | |||
2869 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
2870 | case bltestRC2_ECB: | |||
2871 | case bltestRC2_CBC: | |||
2872 | #endif | |||
2873 | case bltestRC4: | |||
2874 | if (td) | |||
2875 | fprintf(stdoutstdout, "%8s", "symmkey"); | |||
2876 | else | |||
2877 | fprintf(stdoutstdout, "%8d", 8 * info->params.sk.key.buf.len); | |||
2878 | break; | |||
2879 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
2880 | case bltestRC5_ECB: | |||
2881 | case bltestRC5_CBC: | |||
2882 | if (info->params.sk.key.buf.len > 0) | |||
2883 | printf("symmetric key(bytes)=%d,", info->params.sk.key.buf.len); | |||
2884 | if (info->rounds > 0) | |||
2885 | printf("rounds=%d,", info->params.rc5.rounds); | |||
2886 | if (info->wordsize > 0) | |||
2887 | printf("wordsize(bytes)=%d,", info->params.rc5.wordsize); | |||
2888 | break; | |||
2889 | #endif | |||
2890 | case bltestRSA: | |||
2891 | case bltestRSA_PSS: | |||
2892 | case bltestRSA_OAEP: | |||
2893 | if (td) { | |||
2894 | fprintf(stdoutstdout, "%8s", "rsa_mod"); | |||
2895 | fprintf(stdoutstdout, "%12s", "rsa_pe"); | |||
2896 | } else { | |||
2897 | bltestAsymKeyParams *asymk = &info->params.asymk; | |||
2898 | fprintf(stdoutstdout, "%8d", asymk->cipherParams.rsa.keysizeInBits); | |||
2899 | print_exponent( | |||
2900 | &((RSAPrivateKey *)asymk->privKey)->publicExponent); | |||
2901 | } | |||
2902 | break; | |||
2903 | case bltestDSA: | |||
2904 | if (td) { | |||
2905 | fprintf(stdoutstdout, "%8s", "pqg_mod"); | |||
2906 | } else { | |||
2907 | fprintf(stdoutstdout, "%8d", info->params.asymk.cipherParams.dsa.keysize); | |||
2908 | } | |||
2909 | break; | |||
2910 | case bltestECDSA: | |||
2911 | if (td) { | |||
2912 | fprintf(stdoutstdout, "%12s", "ec_curve"); | |||
2913 | } else { | |||
2914 | ECPrivateKey *key = (ECPrivateKey *)info->params.asymk.privKey; | |||
2915 | ECCurveName curveName = key->ecParams.name; | |||
2916 | fprintf(stdoutstdout, "%12s", | |||
2917 | ecCurve_map[curveName] ? ecCurve_map[curveName]->text : "Unsupported curve"); | |||
2918 | } | |||
2919 | break; | |||
2920 | case bltestMD2: | |||
2921 | case bltestMD5: | |||
2922 | case bltestSHA1: | |||
2923 | case bltestSHA256: | |||
2924 | case bltestSHA384: | |||
2925 | case bltestSHA512: | |||
2926 | default: | |||
2927 | break; | |||
2928 | } | |||
2929 | if (!td) { | |||
2930 | PRInt64 totalThroughPut; | |||
2931 | ||||
2932 | printPR_smpString("%8s", getHighUnitOps(repetitions), | |||
2933 | "%8d", repetitions); | |||
2934 | ||||
2935 | printPR_smpString("%8s", getHighUnitOps(cxreps), "%8d", cxreps); | |||
2936 | ||||
2937 | fprintf(stdoutstdout, "%12.3f", cxtime); | |||
2938 | fprintf(stdoutstdout, "%12.3f", optime); | |||
2939 | fprintf(stdoutstdout, "%12.03f", totalTimeInt / 1000); | |||
2940 | ||||
2941 | totalThroughPut = (PRInt64)(totalIn / totalTimeInt * 1000); | |||
2942 | printPR_smpString("%12s", getHighUnitBytes(totalThroughPut), | |||
2943 | "%12d", totalThroughPut); | |||
2944 | ||||
2945 | fprintf(stdoutstdout, "\n"); | |||
2946 | return; | |||
2947 | } | |||
2948 | ||||
2949 | fprintf(stdoutstdout, "%8s", "opreps"); | |||
2950 | fprintf(stdoutstdout, "%8s", "cxreps"); | |||
2951 | fprintf(stdoutstdout, "%12s", "context"); | |||
2952 | fprintf(stdoutstdout, "%12s", "op"); | |||
2953 | fprintf(stdoutstdout, "%12s", "time(sec)"); | |||
2954 | fprintf(stdoutstdout, "%12s", "thrgput"); | |||
2955 | fprintf(stdoutstdout, "\n"); | |||
2956 | fprintf(stdoutstdout, "%8s", mode_strings[info->mode]); | |||
2957 | fprintf(stdoutstdout, "_%c", (cxonly) ? 'c' : (encrypt) ? 'e' : 'd'); | |||
2958 | printPR_smpString("%12s", getHighUnitBytes(totalIn), "%12d", totalIn); | |||
2959 | ||||
2960 | td = !td; | |||
2961 | goto print_td; | |||
2962 | } | |||
2963 | ||||
2964 | void | |||
2965 | printmodes() | |||
2966 | { | |||
2967 | bltestCipherMode mode; | |||
2968 | int nummodes = sizeof(mode_strings) / sizeof(char *); | |||
2969 | fprintf(stderrstderr, "%s: Available modes (specify with -m):\n", progName); | |||
2970 | for (mode = 0; mode < nummodes; mode++) | |||
2971 | fprintf(stderrstderr, "%s\n", mode_strings[mode]); | |||
2972 | } | |||
2973 | ||||
2974 | bltestCipherMode | |||
2975 | get_mode(const char *modestring) | |||
2976 | { | |||
2977 | bltestCipherMode mode; | |||
2978 | int nummodes = sizeof(mode_strings) / sizeof(char *); | |||
2979 | for (mode = 0; mode < nummodes; mode++) | |||
2980 | if (PL_strcmp(modestring, mode_strings[mode]) == 0) | |||
2981 | return mode; | |||
2982 | fprintf(stderrstderr, "%s: invalid mode: %s\n", progName, modestring); | |||
2983 | return bltestINVALID; | |||
2984 | } | |||
2985 | ||||
2986 | void | |||
2987 | load_file_data(PLArenaPool *arena, bltestIO *data, | |||
2988 | char *fn, bltestIOMode ioMode) | |||
2989 | { | |||
2990 | PRFileDesc *file; | |||
2991 | data->mode = ioMode; | |||
2992 | data->file = NULL((void*)0); /* don't use -- not saving anything */ | |||
2993 | data->pBuf.data = NULL((void*)0); | |||
2994 | data->pBuf.len = 0; | |||
2995 | file = PR_Open(fn, PR_RDONLY0x01, 00660); | |||
2996 | if (file) { | |||
2997 | setupIO(arena, data, file, NULL((void*)0), 0); | |||
2998 | PR_Close(file); | |||
2999 | } | |||
3000 | } | |||
3001 | ||||
3002 | HASH_HashType | |||
3003 | mode_str_to_hash_alg(const SECItem *modeStr) | |||
3004 | { | |||
3005 | bltestCipherMode mode; | |||
3006 | char *tempModeStr = NULL((void*)0); | |||
3007 | if (!modeStr || modeStr->len == 0) | |||
3008 | return HASH_AlgNULL; | |||
3009 | tempModeStr = PORT_AllocPORT_Alloc_Util(modeStr->len + 1); | |||
3010 | if (!tempModeStr) | |||
3011 | return HASH_AlgNULL; | |||
3012 | memcpy(tempModeStr, modeStr->data, modeStr->len); | |||
3013 | tempModeStr[modeStr->len] = '\0'; | |||
3014 | mode = get_mode(tempModeStr); | |||
3015 | PORT_FreePORT_Free_Util(tempModeStr); | |||
3016 | switch (mode) { | |||
3017 | case bltestMD2: | |||
3018 | return HASH_AlgMD2; | |||
3019 | case bltestMD5: | |||
3020 | return HASH_AlgMD5; | |||
3021 | case bltestSHA1: | |||
3022 | return HASH_AlgSHA1; | |||
3023 | case bltestSHA224: | |||
3024 | return HASH_AlgSHA224; | |||
3025 | case bltestSHA256: | |||
3026 | return HASH_AlgSHA256; | |||
3027 | case bltestSHA384: | |||
3028 | return HASH_AlgSHA384; | |||
3029 | case bltestSHA512: | |||
3030 | return HASH_AlgSHA512; | |||
3031 | default: | |||
3032 | return HASH_AlgNULL; | |||
3033 | } | |||
3034 | } | |||
3035 | ||||
3036 | void | |||
3037 | get_params(PLArenaPool *arena, bltestParams *params, | |||
3038 | bltestCipherMode mode, int j) | |||
3039 | { | |||
3040 | char filename[256]; | |||
3041 | char *modestr = mode_strings[mode]; | |||
3042 | bltestIO tempIO; | |||
3043 | ||||
3044 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
3045 | FILE *file; | |||
3046 | char *mark, *param, *val; | |||
3047 | int index = 0; | |||
3048 | #endif | |||
3049 | switch (mode) { | |||
3050 | case bltestAES_GCM: | |||
3051 | case bltestCHACHA20: | |||
3052 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "aad", j); | |||
3053 | load_file_data(arena, ¶ms->ask.aad, filename, bltestBinary); | |||
3054 | case bltestDES_CBC: | |||
3055 | case bltestDES_EDE_CBC: | |||
3056 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
3057 | case bltestRC2_CBC: | |||
3058 | #endif | |||
3059 | case bltestAES_CBC: | |||
3060 | case bltestAES_CTS: | |||
3061 | case bltestAES_CTR: | |||
3062 | case bltestCAMELLIA_CBC: | |||
3063 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
3064 | case bltestSEED_CBC: | |||
3065 | #endif | |||
3066 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "iv", j); | |||
3067 | load_file_data(arena, ¶ms->sk.iv, filename, bltestBinary); | |||
3068 | case bltestDES_ECB: | |||
3069 | case bltestDES_EDE_ECB: | |||
3070 | #ifndef NSS_DISABLE_DEPRECATED_RC2 | |||
3071 | case bltestRC2_ECB: | |||
3072 | #endif | |||
3073 | case bltestRC4: | |||
3074 | case bltestAES_ECB: | |||
3075 | case bltestCAMELLIA_ECB: | |||
3076 | #ifndef NSS_DISABLE_DEPRECATED_SEED | |||
3077 | case bltestSEED_ECB: | |||
3078 | #endif | |||
3079 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "key", j); | |||
3080 | load_file_data(arena, ¶ms->sk.key, filename, bltestBinary); | |||
3081 | break; | |||
3082 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
3083 | case bltestRC5_ECB: | |||
3084 | case bltestRC5_CBC: | |||
3085 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "iv", j); | |||
3086 | load_file_data(arena, ¶ms->sk.iv, filename, bltestBinary); | |||
3087 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "key", j); | |||
3088 | load_file_data(arena, ¶ms->sk.key, filename, bltestBinary); | |||
3089 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, | |||
3090 | "params", j); | |||
3091 | file = fopen(filename, "r"); | |||
3092 | if (!file) | |||
3093 | return; | |||
3094 | param = malloc(100); | |||
3095 | len = fread(param, 1, 100, file); | |||
3096 | while (index < len) { | |||
3097 | mark = PL_strchr(param, '='); | |||
3098 | *mark = '\0'; | |||
3099 | val = mark + 1; | |||
3100 | mark = PL_strchr(val, '\n'); | |||
3101 | *mark = '\0'; | |||
3102 | if (PL_strcmp(param, "rounds") == 0) { | |||
3103 | params->rc5.rounds = atoi(val); | |||
3104 | } else if (PL_strcmp(param, "wordsize") == 0) { | |||
3105 | params->rc5.wordsize = atoi(val); | |||
3106 | } | |||
3107 | index += PL_strlen(param) + PL_strlen(val) + 2; | |||
3108 | param = mark + 1; | |||
3109 | } | |||
3110 | break; | |||
3111 | #endif | |||
3112 | case bltestRSA_PSS: | |||
3113 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "ciphertext", j); | |||
3114 | load_file_data(arena, ¶ms->asymk.sig, filename, bltestBase64Encoded); | |||
3115 | /* fall through */ | |||
3116 | case bltestRSA_OAEP: | |||
3117 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "seed", j); | |||
3118 | load_file_data(arena, ¶ms->asymk.cipherParams.rsa.seed, | |||
3119 | filename, bltestBase64Encoded); | |||
3120 | ||||
3121 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "hash", j); | |||
3122 | load_file_data(arena, &tempIO, filename, bltestBinary); | |||
3123 | params->asymk.cipherParams.rsa.hashAlg = | |||
3124 | mode_str_to_hash_alg(&tempIO.buf); | |||
3125 | ||||
3126 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "maskhash", j); | |||
3127 | load_file_data(arena, &tempIO, filename, bltestBinary); | |||
3128 | params->asymk.cipherParams.rsa.maskHashAlg = | |||
3129 | mode_str_to_hash_alg(&tempIO.buf); | |||
3130 | /* fall through */ | |||
3131 | case bltestRSA: | |||
3132 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "key", j); | |||
3133 | load_file_data(arena, ¶ms->asymk.key, filename, | |||
3134 | bltestBase64Encoded); | |||
3135 | params->asymk.privKey = | |||
3136 | (void *)rsakey_from_filedata(arena, ¶ms->asymk.key.buf); | |||
3137 | break; | |||
3138 | case bltestDSA: | |||
3139 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "key", j); | |||
3140 | load_file_data(arena, ¶ms->asymk.key, filename, bltestBase64Encoded); | |||
3141 | params->asymk.privKey = | |||
3142 | (void *)dsakey_from_filedata(arena, ¶ms->asymk.key.buf); | |||
3143 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "pqg", j); | |||
3144 | load_file_data(arena, ¶ms->asymk.cipherParams.dsa.pqgdata, filename, | |||
3145 | bltestBase64Encoded); | |||
3146 | params->asymk.cipherParams.dsa.pqg = | |||
3147 | pqg_from_filedata(arena, ¶ms->asymk.cipherParams.dsa.pqgdata.buf); | |||
3148 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "keyseed", j); | |||
3149 | load_file_data(arena, ¶ms->asymk.cipherParams.dsa.keyseed, filename, | |||
3150 | bltestBase64Encoded); | |||
3151 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "sigseed", j); | |||
3152 | load_file_data(arena, ¶ms->asymk.cipherParams.dsa.sigseed, filename, | |||
3153 | bltestBase64Encoded); | |||
3154 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "ciphertext", j); | |||
3155 | load_file_data(arena, ¶ms->asymk.sig, filename, bltestBase64Encoded); | |||
3156 | break; | |||
3157 | case bltestECDSA: | |||
3158 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "key", j); | |||
3159 | load_file_data(arena, ¶ms->asymk.key, filename, bltestBase64Encoded); | |||
3160 | params->asymk.privKey = | |||
3161 | (void *)eckey_from_filedata(arena, ¶ms->asymk.key.buf); | |||
3162 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "sigseed", j); | |||
3163 | load_file_data(arena, ¶ms->asymk.cipherParams.ecdsa.sigseed, | |||
3164 | filename, bltestBase64Encoded); | |||
3165 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, "ciphertext", j); | |||
3166 | load_file_data(arena, ¶ms->asymk.sig, filename, bltestBase64Encoded); | |||
3167 | break; | |||
3168 | case bltestMD2: | |||
3169 | case bltestMD5: | |||
3170 | case bltestSHA1: | |||
3171 | case bltestSHA224: | |||
3172 | case bltestSHA256: | |||
3173 | case bltestSHA384: | |||
3174 | case bltestSHA512: | |||
3175 | /*params->hash.restart = PR_TRUE;*/ | |||
3176 | params->hash.restart = PR_FALSE0; | |||
3177 | break; | |||
3178 | default: | |||
3179 | break; | |||
3180 | } | |||
3181 | } | |||
3182 | ||||
3183 | SECStatus | |||
3184 | verify_self_test(bltestIO *result, bltestIO *cmp, bltestCipherMode mode, | |||
3185 | PRBool forward, SECStatus sigstatus) | |||
3186 | { | |||
3187 | PRBool equal; | |||
3188 | char *modestr = mode_strings[mode]; | |||
3189 | equal = SECITEM_ItemsAreEqualSECITEM_ItemsAreEqual_Util(&result->pBuf, &cmp->buf); | |||
3190 | if (is_sigCipher(mode)) { | |||
3191 | if (forward) { | |||
3192 | if (equal) { | |||
3193 | printf("Signature self-test for %s passed.\n", modestr); | |||
3194 | } else { | |||
3195 | printf("Signature self-test for %s failed!\n", modestr); | |||
3196 | } | |||
3197 | return equal ? SECSuccess : SECFailure; | |||
3198 | } else { | |||
3199 | if (sigstatus == SECSuccess) { | |||
3200 | printf("Verification self-test for %s passed.\n", modestr); | |||
3201 | } else { | |||
3202 | printf("Verification self-test for %s failed!\n", modestr); | |||
3203 | } | |||
3204 | return sigstatus; | |||
3205 | } | |||
3206 | } else if (is_hashCipher(mode)) { | |||
3207 | if (equal) { | |||
3208 | printf("Hash self-test for %s passed.\n", modestr); | |||
3209 | } else { | |||
3210 | printf("Hash self-test for %s failed!\n", modestr); | |||
3211 | } | |||
3212 | } else { | |||
3213 | if (forward) { | |||
3214 | if (equal) { | |||
3215 | printf("Encryption self-test for %s passed.\n", modestr); | |||
3216 | } else { | |||
3217 | printf("Encryption self-test for %s failed!\n", modestr); | |||
3218 | } | |||
3219 | } else { | |||
3220 | if (equal) { | |||
3221 | printf("Decryption self-test for %s passed.\n", modestr); | |||
3222 | } else { | |||
3223 | printf("Decryption self-test for %s failed!\n", modestr); | |||
3224 | } | |||
3225 | } | |||
3226 | } | |||
3227 | return equal ? SECSuccess : SECFailure; | |||
3228 | } | |||
3229 | ||||
3230 | static SECStatus | |||
3231 | ReadFileToItem(PLArenaPool *arena, SECItem *dst, const char *filename) | |||
3232 | { | |||
3233 | SECItem tmp = { siBuffer, NULL((void*)0), 0 }; | |||
3234 | PRFileDesc *file; | |||
3235 | SECStatus rv; | |||
3236 | ||||
3237 | file = PR_Open(filename, PR_RDONLY0x01, 00660); | |||
3238 | if (!file) { | |||
3239 | return SECFailure; | |||
3240 | } | |||
3241 | rv = SECU_FileToItem(&tmp, file); | |||
3242 | rv |= SECITEM_CopyItemSECITEM_CopyItem_Util(arena, dst, &tmp); | |||
3243 | SECITEM_FreeItemSECITEM_FreeItem_Util(&tmp, PR_FALSE0); | |||
3244 | PR_Close(file); | |||
3245 | return rv; | |||
3246 | } | |||
3247 | ||||
3248 | static SECStatus | |||
3249 | blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff, | |||
3250 | PRBool encrypt, PRBool decrypt) | |||
3251 | { | |||
3252 | bltestCipherInfo cipherInfo; | |||
3253 | bltestIO pt, ct; | |||
3254 | bltestCipherMode mode; | |||
3255 | bltestParams *params; | |||
3256 | unsigned int i, j, nummodes, numtests; | |||
3257 | char *modestr; | |||
3258 | char filename[256]; | |||
3259 | PLArenaPool *arena; | |||
3260 | SECItem item; | |||
3261 | SECStatus rv = SECSuccess, srv; | |||
3262 | ||||
3263 | PORT_Memsetmemset(&cipherInfo, 0, sizeof(cipherInfo)); | |||
3264 | arena = PORT_NewArenaPORT_NewArena_Util(BLTEST_DEFAULT_CHUNKSIZE4096); | |||
3265 | cipherInfo.arena = arena; | |||
3266 | ||||
3267 | nummodes = (numModes == 0) ? NUMMODES : numModes; | |||
3268 | for (i = 0; i < nummodes; i++) { | |||
3269 | if (numModes > 0) | |||
3270 | mode = modes[i]; | |||
3271 | else | |||
3272 | mode = i; | |||
3273 | if (mode == bltestINVALID) { | |||
3274 | fprintf(stderrstderr, "%s: Skipping invalid mode.\n", progName); | |||
3275 | continue; | |||
3276 | } | |||
3277 | modestr = mode_strings[mode]; | |||
3278 | cipherInfo.mode = mode; | |||
3279 | params = &cipherInfo.params; | |||
3280 | /* get the number of tests in the directory */ | |||
3281 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s", testdir, modestr, "numtests"); | |||
3282 | if (ReadFileToItem(arena, &item, filename) != SECSuccess) { | |||
3283 | fprintf(stderrstderr, "%s: Cannot read file %s.\n", progName, filename); | |||
3284 | rv = SECFailure; | |||
3285 | continue; | |||
3286 | } | |||
3287 | /* loop over the tests in the directory */ | |||
3288 | numtests = 0; | |||
3289 | for (j = 0; j < item.len; j++) { | |||
3290 | if (!isdigit(item.data[j])((*__ctype_b_loc ())[(int) ((item.data[j]))] & (unsigned short int) _ISdigit)) { | |||
3291 | break; | |||
3292 | } | |||
3293 | numtests *= 10; | |||
3294 | numtests += (int)(item.data[j] - '0'); | |||
3295 | } | |||
3296 | for (j = 0; j < numtests; j++) { | |||
3297 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, | |||
3298 | "plaintext", j); | |||
3299 | load_file_data(arena, &pt, filename, | |||
3300 | is_sigCipher(mode) ? bltestBase64Encoded | |||
3301 | : bltestBinary); | |||
3302 | snprintf(filename, sizeof(filename), "%s/tests/%s/%s%d", testdir, modestr, | |||
3303 | "ciphertext", j); | |||
3304 | load_file_data(arena, &ct, filename, bltestBase64Encoded); | |||
3305 | ||||
3306 | get_params(arena, params, mode, j); | |||
3307 | /* Forward Operation (Encrypt/Sign/Hash) | |||
3308 | ** Align the input buffer (plaintext) according to request | |||
3309 | ** then perform operation and compare to ciphertext | |||
3310 | */ | |||
3311 | if (encrypt) { | |||
3312 | rv |= bltestCopyIO(arena, &cipherInfo.input, &pt); | |||
3313 | misalignBuffer(arena, &cipherInfo.input, inoff); | |||
3314 | memset(&cipherInfo.output.buf, 0, sizeof cipherInfo.output.buf); | |||
3315 | rv |= cipherInit(&cipherInfo, PR_TRUE1); | |||
3316 | misalignBuffer(arena, &cipherInfo.output, outoff); | |||
3317 | rv |= cipherDoOp(&cipherInfo); | |||
3318 | rv |= cipherFinish(&cipherInfo); | |||
3319 | rv |= verify_self_test(&cipherInfo.output, | |||
3320 | &ct, mode, PR_TRUE1, SECSuccess); | |||
3321 | /* If testing hash, only one op to test */ | |||
3322 | if (is_hashCipher(mode)) | |||
3323 | continue; | |||
3324 | if (is_sigCipher(mode)) { | |||
3325 | /* Verify operations support detached signature files. For | |||
3326 | ** consistency between tests that run Sign/Verify back to | |||
3327 | ** back (eg: self-tests) and tests that are only running | |||
3328 | ** verify operations, copy the output into the sig buf, | |||
3329 | ** and then copy the sig buf back out when verifying. For | |||
3330 | ** self-tests, this is unnecessary copying, but for | |||
3331 | ** verify-only operations, this ensures that the output | |||
3332 | ** buffer is properly configured | |||
3333 | */ | |||
3334 | rv |= bltestCopyIO(arena, ¶ms->asymk.sig, &cipherInfo.output); | |||
3335 | } | |||
3336 | } | |||
3337 | if (!decrypt) | |||
3338 | continue; | |||
3339 | /* Reverse Operation (Decrypt/Verify) | |||
3340 | ** Align the input buffer (ciphertext) according to request | |||
3341 | ** then perform operation and compare to plaintext | |||
3342 | */ | |||
3343 | if (is_sigCipher(mode)) { | |||
3344 | rv |= bltestCopyIO(arena, &cipherInfo.input, &pt); | |||
3345 | rv |= bltestCopyIO(arena, &cipherInfo.output, ¶ms->asymk.sig); | |||
3346 | } else { | |||
3347 | rv |= bltestCopyIO(arena, &cipherInfo.input, &ct); | |||
3348 | memset(&cipherInfo.output.buf, 0, sizeof cipherInfo.output.buf); | |||
3349 | } | |||
3350 | misalignBuffer(arena, &cipherInfo.input, inoff); | |||
3351 | rv |= cipherInit(&cipherInfo, PR_FALSE0); | |||
3352 | misalignBuffer(arena, &cipherInfo.output, outoff); | |||
3353 | srv = SECSuccess; | |||
3354 | srv |= cipherDoOp(&cipherInfo); | |||
3355 | rv |= cipherFinish(&cipherInfo); | |||
3356 | rv |= verify_self_test(&cipherInfo.output, | |||
3357 | &pt, mode, PR_FALSE0, srv); | |||
3358 | } | |||
3359 | } | |||
3360 | PORT_FreeArenaPORT_FreeArena_Util(arena, PR_FALSE0); | |||
3361 | return rv; | |||
3362 | } | |||
3363 | ||||
3364 | SECStatus | |||
3365 | dump_file(bltestCipherMode mode, char *filename) | |||
3366 | { | |||
3367 | bltestIO keydata; | |||
3368 | PLArenaPool *arena = NULL((void*)0); | |||
3369 | arena = PORT_NewArenaPORT_NewArena_Util(BLTEST_DEFAULT_CHUNKSIZE4096); | |||
3370 | if (!arena) { | |||
| ||||
3371 | return SECFailure; | |||
3372 | } | |||
3373 | if (mode == bltestRSA || mode == bltestRSA_PSS || mode == bltestRSA_OAEP) { | |||
3374 | RSAPrivateKey *key; | |||
3375 | load_file_data(arena, &keydata, filename, bltestBase64Encoded); | |||
3376 | key = rsakey_from_filedata(arena, &keydata.buf); | |||
3377 | dump_rsakey(key); | |||
3378 | } else if (mode == bltestDSA) { | |||
3379 | #if 0 | |||
3380 | PQGParams *pqg; | |||
3381 | get_file_data(filename, &item, PR_TRUE1); | |||
3382 | pqg = pqg_from_filedata(&item); | |||
3383 | dump_pqg(pqg); | |||
3384 | #endif | |||
3385 | DSAPrivateKey *key; | |||
3386 | load_file_data(arena, &keydata, filename, bltestBase64Encoded); | |||
3387 | key = dsakey_from_filedata(arena, &keydata.buf); | |||
3388 | dump_dsakey(key); | |||
3389 | } else if (mode == bltestECDSA) { | |||
3390 | ECPrivateKey *key; | |||
3391 | load_file_data(arena, &keydata, filename, bltestBase64Encoded); | |||
3392 | key = eckey_from_filedata(arena, &keydata.buf); | |||
3393 | dump_eckey(key); | |||
3394 | } | |||
3395 | PORT_FreeArenaPORT_FreeArena_Util(arena, PR_FALSE0); | |||
3396 | return SECFailure; | |||
3397 | } | |||
3398 | ||||
3399 | void | |||
3400 | ThreadExecTest(void *data) | |||
3401 | { | |||
3402 | bltestCipherInfo *cipherInfo = (bltestCipherInfo *)data; | |||
3403 | ||||
3404 | if (cipherInfo->mCarlo == PR_TRUE1) { | |||
3405 | int mciter; | |||
3406 | for (mciter = 0; mciter < 10000; mciter++) { | |||
3407 | cipherDoOp(cipherInfo); | |||
3408 | memcpy(cipherInfo->input.buf.data, | |||
3409 | cipherInfo->output.buf.data, | |||
3410 | cipherInfo->input.buf.len); | |||
3411 | } | |||
3412 | } else { | |||
3413 | cipherDoOp(cipherInfo); | |||
3414 | } | |||
3415 | cipherFinish(cipherInfo); | |||
3416 | } | |||
3417 | ||||
3418 | static void | |||
3419 | rsaPrivKeyReset(RSAPrivateKey *tstKey) | |||
3420 | { | |||
3421 | PLArenaPool *arena; | |||
3422 | ||||
3423 | tstKey->version.data = NULL((void*)0); | |||
3424 | tstKey->version.len = 0; | |||
3425 | tstKey->modulus.data = NULL((void*)0); | |||
3426 | tstKey->modulus.len = 0; | |||
3427 | tstKey->publicExponent.data = NULL((void*)0); | |||
3428 | tstKey->publicExponent.len = 0; | |||
3429 | tstKey->privateExponent.data = NULL((void*)0); | |||
3430 | tstKey->privateExponent.len = 0; | |||
3431 | tstKey->prime1.data = NULL((void*)0); | |||
3432 | tstKey->prime1.len = 0; | |||
3433 | tstKey->prime2.data = NULL((void*)0); | |||
3434 | tstKey->prime2.len = 0; | |||
3435 | tstKey->exponent1.data = NULL((void*)0); | |||
3436 | tstKey->exponent1.len = 0; | |||
3437 | tstKey->exponent2.data = NULL((void*)0); | |||
3438 | tstKey->exponent2.len = 0; | |||
3439 | tstKey->coefficient.data = NULL((void*)0); | |||
3440 | tstKey->coefficient.len = 0; | |||
3441 | ||||
3442 | arena = tstKey->arena; | |||
3443 | tstKey->arena = NULL((void*)0); | |||
3444 | if (arena) { | |||
3445 | PORT_FreeArenaPORT_FreeArena_Util(arena, PR_TRUE1); | |||
3446 | } | |||
3447 | } | |||
3448 | ||||
3449 | #define RSA_TEST_EQUAL(comp)if (!SECITEM_ItemsAreEqual_Util(&(src->comp), &(dest ->comp))) { fprintf(stderr, "key->" "comp" " not equal" ); if (src->comp.len != dest->comp.len) { fprintf(stderr , "src_len = %d, dest_len = %d", src->comp.len, dest->comp .len); } fprintf(stderr, "\n"); areEqual = 0; } \ | |||
3450 | if (!SECITEM_ItemsAreEqualSECITEM_ItemsAreEqual_Util(&(src->comp), &(dest->comp))) { \ | |||
3451 | fprintf(stderrstderr, "key->" #comp " not equal"); \ | |||
3452 | if (src->comp.len != dest->comp.len) { \ | |||
3453 | fprintf(stderrstderr, "src_len = %d, dest_len = %d", \ | |||
3454 | src->comp.len, dest->comp.len); \ | |||
3455 | } \ | |||
3456 | fprintf(stderrstderr, "\n"); \ | |||
3457 | areEqual = PR_FALSE0; \ | |||
3458 | } | |||
3459 | ||||
3460 | static PRBool | |||
3461 | rsaPrivKeysAreEqual(RSAPrivateKey *src, RSAPrivateKey *dest) | |||
3462 | { | |||
3463 | PRBool areEqual = PR_TRUE1; | |||
3464 | RSA_TEST_EQUAL(modulus)if (!SECITEM_ItemsAreEqual_Util(&(src->modulus), & (dest->modulus))) { fprintf(stderr, "key->" "modulus" " not equal" ); if (src->modulus.len != dest->modulus.len) { fprintf (stderr, "src_len = %d, dest_len = %d", src->modulus.len, dest ->modulus.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3465 | RSA_TEST_EQUAL(publicExponent)if (!SECITEM_ItemsAreEqual_Util(&(src->publicExponent) , &(dest->publicExponent))) { fprintf(stderr, "key->" "publicExponent" " not equal"); if (src->publicExponent.len != dest->publicExponent.len) { fprintf(stderr, "src_len = %d, dest_len = %d" , src->publicExponent.len, dest->publicExponent.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3466 | RSA_TEST_EQUAL(privateExponent)if (!SECITEM_ItemsAreEqual_Util(&(src->privateExponent ), &(dest->privateExponent))) { fprintf(stderr, "key->" "privateExponent" " not equal"); if (src->privateExponent .len != dest->privateExponent.len) { fprintf(stderr, "src_len = %d, dest_len = %d" , src->privateExponent.len, dest->privateExponent.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3467 | RSA_TEST_EQUAL(prime1)if (!SECITEM_ItemsAreEqual_Util(&(src->prime1), &( dest->prime1))) { fprintf(stderr, "key->" "prime1" " not equal" ); if (src->prime1.len != dest->prime1.len) { fprintf(stderr , "src_len = %d, dest_len = %d", src->prime1.len, dest-> prime1.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3468 | RSA_TEST_EQUAL(prime2)if (!SECITEM_ItemsAreEqual_Util(&(src->prime2), &( dest->prime2))) { fprintf(stderr, "key->" "prime2" " not equal" ); if (src->prime2.len != dest->prime2.len) { fprintf(stderr , "src_len = %d, dest_len = %d", src->prime2.len, dest-> prime2.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3469 | RSA_TEST_EQUAL(exponent1)if (!SECITEM_ItemsAreEqual_Util(&(src->exponent1), & (dest->exponent1))) { fprintf(stderr, "key->" "exponent1" " not equal"); if (src->exponent1.len != dest->exponent1 .len) { fprintf(stderr, "src_len = %d, dest_len = %d", src-> exponent1.len, dest->exponent1.len); } fprintf(stderr, "\n" ); areEqual = 0; } | |||
3470 | RSA_TEST_EQUAL(exponent2)if (!SECITEM_ItemsAreEqual_Util(&(src->exponent2), & (dest->exponent2))) { fprintf(stderr, "key->" "exponent2" " not equal"); if (src->exponent2.len != dest->exponent2 .len) { fprintf(stderr, "src_len = %d, dest_len = %d", src-> exponent2.len, dest->exponent2.len); } fprintf(stderr, "\n" ); areEqual = 0; } | |||
3471 | RSA_TEST_EQUAL(coefficient)if (!SECITEM_ItemsAreEqual_Util(&(src->coefficient), & (dest->coefficient))) { fprintf(stderr, "key->" "coefficient" " not equal"); if (src->coefficient.len != dest->coefficient .len) { fprintf(stderr, "src_len = %d, dest_len = %d", src-> coefficient.len, dest->coefficient.len); } fprintf(stderr, "\n"); areEqual = 0; } | |||
3472 | if (!areEqual) { | |||
3473 | fprintf(stderrstderr, "original key:\n"); | |||
3474 | dump_rsakey(src); | |||
3475 | fprintf(stderrstderr, "recreated key:\n"); | |||
3476 | dump_rsakey(dest); | |||
3477 | } | |||
3478 | return areEqual; | |||
3479 | } | |||
3480 | ||||
3481 | static int | |||
3482 | doRSAPopulateTestKV() | |||
3483 | { | |||
3484 | RSAPrivateKey tstKey = { 0 }; | |||
3485 | SECStatus rv; | |||
3486 | int failed = 0; | |||
3487 | int i; | |||
3488 | ||||
3489 | tstKey.arena = NULL((void*)0); | |||
3490 | ||||
3491 | /* Test public exponent, private exponent, modulus cases from | |||
3492 | * pkcs1v15sign-vectors.txt. Some are valid PKCS#1 keys but not valid RSA | |||
3493 | * ones (de = 1 mod lcm(p − 1, q − 1)) | |||
3494 | */ | |||
3495 | for (i = 0; i < PR_ARRAY_SIZE(PKCS1_VECTORS)(sizeof(PKCS1_VECTORS)/sizeof((PKCS1_VECTORS)[0])); ++i) { | |||
3496 | struct pkcs1_test_vector *v = &PKCS1_VECTORS[i]; | |||
3497 | ||||
3498 | rsaPrivKeyReset(&tstKey); | |||
3499 | tstKey.privateExponent.data = v->d; | |||
3500 | tstKey.privateExponent.len = v->d_len; | |||
3501 | tstKey.publicExponent.data = v->e; | |||
3502 | tstKey.publicExponent.len = v->e_len; | |||
3503 | tstKey.modulus.data = v->n; | |||
3504 | tstKey.modulus.len = v->n_len; | |||
3505 | ||||
3506 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3507 | if (rv != SECSuccess) { | |||
3508 | fprintf(stderrstderr, "RSA Populate failed: pkcs1v15sign-vector %d\n", i); | |||
3509 | failed = 1; | |||
3510 | } else if (memcmp(v->q, tstKey.prime1.data, v->q_len) || | |||
3511 | tstKey.prime1.len != v->q_len) { | |||
3512 | fprintf(stderrstderr, "RSA Populate key mismatch: pkcs1v15sign-vector %d q\n", i); | |||
3513 | failed = 1; | |||
3514 | } else if (memcmp(v->p, tstKey.prime2.data, v->p_len) || | |||
3515 | tstKey.prime1.len != v->p_len) { | |||
3516 | fprintf(stderrstderr, "RSA Populate key mismatch: pkcs1v15sign-vector %d p\n", i); | |||
3517 | failed = 1; | |||
3518 | } else { | |||
3519 | fprintf(stderrstderr, "RSA Populate success: pkcs1v15sign-vector %d p\n", i); | |||
3520 | } | |||
3521 | } | |||
3522 | ||||
3523 | PORT_FreeArenaPORT_FreeArena_Util(tstKey.arena, PR_TRUE1); | |||
3524 | return failed; | |||
3525 | } | |||
3526 | ||||
3527 | /* | |||
3528 | * Test the RSA populate command to see that it can really build | |||
3529 | * keys from its components. | |||
3530 | */ | |||
3531 | static int | |||
3532 | doRSAPopulateTest(unsigned int keySize, unsigned long exponent) | |||
3533 | { | |||
3534 | RSAPrivateKey *srcKey; | |||
3535 | RSAPrivateKey tstKey = { 0 }; | |||
3536 | SECItem expitem = { 0, 0, 0 }; | |||
3537 | SECStatus rv; | |||
3538 | unsigned char pubExp[32]; | |||
3539 | int expLen = 0; | |||
3540 | int failed = 0; | |||
3541 | int i; | |||
3542 | ||||
3543 | for (i = 0; i < sizeof(unsigned long); i++) { | |||
3544 | int shift = (sizeof(unsigned long) - i - 1) * 8; | |||
3545 | if (expLen || (exponent && ((unsigned long)0xffL << shift))) { | |||
3546 | pubExp[expLen] = (unsigned char)((exponent >> shift) & 0xff); | |||
3547 | expLen++; | |||
3548 | } | |||
3549 | } | |||
3550 | ||||
3551 | expitem.data = pubExp; | |||
3552 | expitem.len = expLen; | |||
3553 | ||||
3554 | srcKey = RSA_NewKey(keySize, &expitem); | |||
3555 | if (srcKey == NULL((void*)0)) { | |||
3556 | fprintf(stderrstderr, "RSA Key Gen failed"); | |||
3557 | return -1; | |||
3558 | } | |||
3559 | ||||
3560 | /* test the basic case - most common, public exponent, modulus, prime */ | |||
3561 | tstKey.arena = NULL((void*)0); | |||
3562 | rsaPrivKeyReset(&tstKey); | |||
3563 | ||||
3564 | tstKey.publicExponent = srcKey->publicExponent; | |||
3565 | tstKey.modulus = srcKey->modulus; | |||
3566 | tstKey.prime1 = srcKey->prime1; | |||
3567 | ||||
3568 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3569 | if (rv != SECSuccess) { | |||
3570 | fprintf(stderrstderr, "RSA Populate failed: pubExp mod p\n"); | |||
3571 | failed = 1; | |||
3572 | } else if (!rsaPrivKeysAreEqual(&tstKey, srcKey)) { | |||
3573 | fprintf(stderrstderr, "RSA Populate key mismatch: pubExp mod p\n"); | |||
3574 | failed = 1; | |||
3575 | } | |||
3576 | ||||
3577 | /* test the basic2 case, public exponent, modulus, prime2 */ | |||
3578 | rsaPrivKeyReset(&tstKey); | |||
3579 | ||||
3580 | tstKey.publicExponent = srcKey->publicExponent; | |||
3581 | tstKey.modulus = srcKey->modulus; | |||
3582 | tstKey.prime1 = srcKey->prime2; /* test with q in the prime1 position */ | |||
3583 | ||||
3584 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3585 | if (rv != SECSuccess) { | |||
3586 | fprintf(stderrstderr, "RSA Populate failed: pubExp mod q\n"); | |||
3587 | failed = 1; | |||
3588 | } else if (!rsaPrivKeysAreEqual(&tstKey, srcKey)) { | |||
3589 | fprintf(stderrstderr, "RSA Populate key mismatch: pubExp mod q\n"); | |||
3590 | failed = 1; | |||
3591 | } | |||
3592 | ||||
3593 | /* test the medium case, private exponent, prime1, prime2 */ | |||
3594 | rsaPrivKeyReset(&tstKey); | |||
3595 | ||||
3596 | tstKey.privateExponent = srcKey->privateExponent; | |||
3597 | tstKey.prime1 = srcKey->prime2; /* purposefully swap them to make */ | |||
3598 | tstKey.prime2 = srcKey->prime1; /* sure populated swaps them back */ | |||
3599 | ||||
3600 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3601 | if (rv != SECSuccess) { | |||
3602 | fprintf(stderrstderr, "RSA Populate failed: privExp p q\n"); | |||
3603 | failed = 1; | |||
3604 | } else if (!rsaPrivKeysAreEqual(&tstKey, srcKey)) { | |||
3605 | fprintf(stderrstderr, "RSA Populate key mismatch: privExp p q\n"); | |||
3606 | failed = 1; | |||
3607 | } | |||
3608 | ||||
3609 | /* test the advanced case, public exponent, private exponent, prime2 */ | |||
3610 | rsaPrivKeyReset(&tstKey); | |||
3611 | ||||
3612 | tstKey.privateExponent = srcKey->privateExponent; | |||
3613 | tstKey.publicExponent = srcKey->publicExponent; | |||
3614 | tstKey.prime2 = srcKey->prime2; /* use q in the prime2 position */ | |||
3615 | ||||
3616 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3617 | if (rv != SECSuccess) { | |||
3618 | fprintf(stderrstderr, "RSA Populate failed: pubExp privExp q\n"); | |||
3619 | fprintf(stderrstderr, " - not fatal\n"); | |||
3620 | /* it's possible that we can't uniquely determine the original key | |||
3621 | * from just the exponents and prime. Populate returns an error rather | |||
3622 | * than return the wrong key. */ | |||
3623 | } else if (!rsaPrivKeysAreEqual(&tstKey, srcKey)) { | |||
3624 | /* if we returned a key, it *must* be correct */ | |||
3625 | fprintf(stderrstderr, "RSA Populate key mismatch: pubExp privExp q\n"); | |||
3626 | rv = RSA_PrivateKeyCheck(&tstKey); | |||
3627 | failed = 1; | |||
3628 | } | |||
3629 | ||||
3630 | /* test the advanced case2, public exponent, private exponent, modulus */ | |||
3631 | rsaPrivKeyReset(&tstKey); | |||
3632 | ||||
3633 | tstKey.privateExponent = srcKey->privateExponent; | |||
3634 | tstKey.publicExponent = srcKey->publicExponent; | |||
3635 | tstKey.modulus = srcKey->modulus; | |||
3636 | ||||
3637 | rv = RSA_PopulatePrivateKey(&tstKey); | |||
3638 | if (rv != SECSuccess) { | |||
3639 | fprintf(stderrstderr, "RSA Populate failed: pubExp privExp mod\n"); | |||
3640 | failed = 1; | |||
3641 | } else if (!rsaPrivKeysAreEqual(&tstKey, srcKey)) { | |||
3642 | fprintf(stderrstderr, "RSA Populate key mismatch: pubExp privExp mod\n"); | |||
3643 | failed = 1; | |||
3644 | } | |||
3645 | ||||
3646 | PORT_FreeArenaPORT_FreeArena_Util(srcKey->arena, PR_TRUE1); | |||
3647 | return failed ? -1 : 0; | |||
3648 | } | |||
3649 | ||||
3650 | /* bltest commands */ | |||
3651 | enum { | |||
3652 | cmd_Decrypt = 0, | |||
3653 | cmd_Encrypt, | |||
3654 | cmd_FIPS, | |||
3655 | cmd_Hash, | |||
3656 | cmd_Nonce, | |||
3657 | cmd_Dump, | |||
3658 | cmd_RSAPopulate, | |||
3659 | cmd_RSAPopulateKV, | |||
3660 | cmd_Sign, | |||
3661 | cmd_SelfTest, | |||
3662 | cmd_Verify | |||
3663 | }; | |||
3664 | ||||
3665 | /* bltest options */ | |||
3666 | enum { | |||
3667 | opt_B64 = 0, | |||
3668 | opt_BufSize, | |||
3669 | opt_Restart, | |||
3670 | opt_SelfTestDir, | |||
3671 | opt_Exponent, | |||
3672 | opt_SigFile, | |||
3673 | opt_KeySize, | |||
3674 | opt_Hex, | |||
3675 | opt_Input, | |||
3676 | opt_PQGFile, | |||
3677 | opt_Key, | |||
3678 | opt_HexWSpc, | |||
3679 | opt_Mode, | |||
3680 | opt_CurveName, | |||
3681 | opt_Output, | |||
3682 | opt_Repetitions, | |||
3683 | opt_ZeroBuf, | |||
3684 | opt_Rounds, | |||
3685 | opt_Seed, | |||
3686 | opt_SigSeedFile, | |||
3687 | opt_CXReps, | |||
3688 | opt_IV, | |||
3689 | opt_WordSize, | |||
3690 | opt_UseSeed, | |||
3691 | opt_UseSigSeed, | |||
3692 | opt_SeedFile, | |||
3693 | opt_AAD, | |||
3694 | opt_InputOffset, | |||
3695 | opt_OutputOffset, | |||
3696 | opt_MonteCarlo, | |||
3697 | opt_ThreadNum, | |||
3698 | opt_SecondsToRun, | |||
3699 | opt_CmdLine | |||
3700 | }; | |||
3701 | ||||
3702 | static secuCommandFlag bltest_commands[] = { | |||
3703 | { /* cmd_Decrypt */ 'D', PR_FALSE0, 0, PR_FALSE0 }, | |||
3704 | { /* cmd_Encrypt */ 'E', PR_FALSE0, 0, PR_FALSE0 }, | |||
3705 | { /* cmd_FIPS */ 'F', PR_FALSE0, 0, PR_FALSE0 }, | |||
3706 | { /* cmd_Hash */ 'H', PR_FALSE0, 0, PR_FALSE0 }, | |||
3707 | { /* cmd_Nonce */ 'N', PR_FALSE0, 0, PR_FALSE0 }, | |||
3708 | { /* cmd_Dump */ 'P', PR_FALSE0, 0, PR_FALSE0 }, | |||
3709 | { /* cmd_RSAPopulate */ 'R', PR_FALSE0, 0, PR_FALSE0 }, | |||
3710 | { /* cmd_RSAPopulateKV */ 'K', PR_FALSE0, 0, PR_FALSE0 }, | |||
3711 | { /* cmd_Sign */ 'S', PR_FALSE0, 0, PR_FALSE0 }, | |||
3712 | { /* cmd_SelfTest */ 'T', PR_FALSE0, 0, PR_FALSE0 }, | |||
3713 | { /* cmd_Verify */ 'V', PR_FALSE0, 0, PR_FALSE0 } | |||
3714 | }; | |||
3715 | ||||
3716 | static secuCommandFlag bltest_options[] = { | |||
3717 | { /* opt_B64 */ 'a', PR_FALSE0, 0, PR_FALSE0 }, | |||
3718 | { /* opt_BufSize */ 'b', PR_TRUE1, 0, PR_FALSE0 }, | |||
3719 | { /* opt_Restart */ 'c', PR_FALSE0, 0, PR_FALSE0 }, | |||
3720 | { /* opt_SelfTestDir */ 'd', PR_TRUE1, 0, PR_FALSE0 }, | |||
3721 | { /* opt_Exponent */ 'e', PR_TRUE1, 0, PR_FALSE0 }, | |||
3722 | { /* opt_SigFile */ 'f', PR_TRUE1, 0, PR_FALSE0 }, | |||
3723 | { /* opt_KeySize */ 'g', PR_TRUE1, 0, PR_FALSE0 }, | |||
3724 | { /* opt_Hex */ 'h', PR_FALSE0, 0, PR_FALSE0 }, | |||
3725 | { /* opt_Input */ 'i', PR_TRUE1, 0, PR_FALSE0 }, | |||
3726 | { /* opt_PQGFile */ 'j', PR_TRUE1, 0, PR_FALSE0 }, | |||
3727 | { /* opt_Key */ 'k', PR_TRUE1, 0, PR_FALSE0 }, | |||
3728 | { /* opt_HexWSpc */ 'l', PR_FALSE0, 0, PR_FALSE0 }, | |||
3729 | { /* opt_Mode */ 'm', PR_TRUE1, 0, PR_FALSE0 }, | |||
3730 | { /* opt_CurveName */ 'n', PR_TRUE1, 0, PR_FALSE0 }, | |||
3731 | { /* opt_Output */ 'o', PR_TRUE1, 0, PR_FALSE0 }, | |||
3732 | { /* opt_Repetitions */ 'p', PR_TRUE1, 0, PR_FALSE0 }, | |||
3733 | { /* opt_ZeroBuf */ 'q', PR_FALSE0, 0, PR_FALSE0 }, | |||
3734 | { /* opt_Rounds */ 'r', PR_TRUE1, 0, PR_FALSE0 }, | |||
3735 | { /* opt_Seed */ 's', PR_TRUE1, 0, PR_FALSE0 }, | |||
3736 | { /* opt_SigSeedFile */ 't', PR_TRUE1, 0, PR_FALSE0 }, | |||
3737 | { /* opt_CXReps */ 'u', PR_TRUE1, 0, PR_FALSE0 }, | |||
3738 | { /* opt_IV */ 'v', PR_TRUE1, 0, PR_FALSE0 }, | |||
3739 | { /* opt_WordSize */ 'w', PR_TRUE1, 0, PR_FALSE0 }, | |||
3740 | { /* opt_UseSeed */ 'x', PR_FALSE0, 0, PR_FALSE0 }, | |||
3741 | { /* opt_UseSigSeed */ 'y', PR_FALSE0, 0, PR_FALSE0 }, | |||
3742 | { /* opt_SeedFile */ 'z', PR_FALSE0, 0, PR_FALSE0 }, | |||
3743 | { /* opt_AAD */ 0, PR_TRUE1, 0, PR_FALSE0, "aad" }, | |||
3744 | { /* opt_InputOffset */ '1', PR_TRUE1, 0, PR_FALSE0 }, | |||
3745 | { /* opt_OutputOffset */ '2', PR_TRUE1, 0, PR_FALSE0 }, | |||
3746 | { /* opt_MonteCarlo */ '3', PR_FALSE0, 0, PR_FALSE0 }, | |||
3747 | { /* opt_ThreadNum */ '4', PR_TRUE1, 0, PR_FALSE0 }, | |||
3748 | { /* opt_SecondsToRun */ '5', PR_TRUE1, 0, PR_FALSE0 }, | |||
3749 | { /* opt_CmdLine */ '-', PR_FALSE0, 0, PR_FALSE0 } | |||
3750 | }; | |||
3751 | ||||
3752 | int | |||
3753 | main(int argc, char **argv) | |||
3754 | { | |||
3755 | SECStatus rv = SECFailure; | |||
3756 | ||||
3757 | double totalTime = 0.0; | |||
3758 | PRIntervalTime time1, time2; | |||
3759 | PRFileDesc *outfile = NULL((void*)0); | |||
3760 | bltestCipherInfo *cipherInfoListHead, *cipherInfo = NULL((void*)0); | |||
3761 | bltestIOMode ioMode; | |||
3762 | int bufsize, exponent, curThrdNum; | |||
3763 | char *curveName = NULL((void*)0); | |||
3764 | int i, commandsEntered; | |||
3765 | int inoff, outoff; | |||
3766 | int threads = 1; | |||
3767 | ||||
3768 | secuCommand bltest; | |||
3769 | bltest.numCommands = sizeof(bltest_commands) / sizeof(secuCommandFlag); | |||
3770 | bltest.numOptions = sizeof(bltest_options) / sizeof(secuCommandFlag); | |||
3771 | bltest.commands = bltest_commands; | |||
3772 | bltest.options = bltest_options; | |||
3773 | ||||
3774 | progName = strrchr(argv[0], '/'); | |||
3775 | if (!progName) | |||
3776 | progName = strrchr(argv[0], '\\'); | |||
3777 | progName = progName ? progName + 1 : argv[0]; | |||
3778 | ||||
3779 | rv = NSS_InitializePRErrorTable(); | |||
3780 | if (rv != SECSuccess) { | |||
3781 | SECU_PrintPRandOSError(progName); | |||
3782 | return -1; | |||
3783 | } | |||
3784 | rv = RNG_RNGInit(); | |||
3785 | if (rv != SECSuccess) { | |||
3786 | SECU_PrintPRandOSError(progName); | |||
3787 | return -1; | |||
3788 | } | |||
3789 | rv = BL_Init(); | |||
3790 | if (rv != SECSuccess) { | |||
3791 | SECU_PrintPRandOSError(progName); | |||
3792 | return -1; | |||
3793 | } | |||
3794 | RNG_SystemInfoForRNG(); | |||
3795 | ||||
3796 | rv = SECU_ParseCommandLine(argc, argv, progName, &bltest); | |||
3797 | if (rv == SECFailure) { | |||
3798 | fprintf(stderrstderr, "%s: command line parsing error!\n", progName); | |||
3799 | goto print_usage; | |||
3800 | } | |||
3801 | rv = SECFailure; | |||
3802 | ||||
3803 | cipherInfo = PORT_ZNew(bltestCipherInfo)(bltestCipherInfo *)PORT_ZAlloc_Util(sizeof(bltestCipherInfo) ); | |||
3804 | cipherInfoListHead = cipherInfo; | |||
3805 | ||||
3806 | /* Check the number of commands entered on the command line. */ | |||
3807 | commandsEntered = 0; | |||
3808 | for (i = 0; i < bltest.numCommands; i++) | |||
3809 | if (bltest.commands[i].activated) | |||
3810 | commandsEntered++; | |||
3811 | ||||
3812 | if (commandsEntered > 1 && | |||
3813 | !(commandsEntered == 2 && bltest.commands[cmd_SelfTest].activated)) { | |||
3814 | fprintf(stderrstderr, "%s: one command at a time!\n", progName); | |||
3815 | goto print_usage; | |||
3816 | } | |||
3817 | ||||
3818 | if (commandsEntered == 0) { | |||
3819 | fprintf(stderrstderr, "%s: you must enter a command!\n", progName); | |||
3820 | goto print_usage; | |||
3821 | } | |||
3822 | ||||
3823 | if (bltest.commands[cmd_Sign].activated) | |||
3824 | bltest.commands[cmd_Encrypt].activated = PR_TRUE1; | |||
3825 | if (bltest.commands[cmd_Verify].activated) | |||
3826 | bltest.commands[cmd_Decrypt].activated = PR_TRUE1; | |||
3827 | if (bltest.commands[cmd_Hash].activated) | |||
3828 | bltest.commands[cmd_Encrypt].activated = PR_TRUE1; | |||
3829 | ||||
3830 | inoff = outoff = 0; | |||
3831 | if (bltest.options[opt_InputOffset].activated) | |||
3832 | inoff = PORT_Atoi(bltest.options[opt_InputOffset].arg)(int)strtol(bltest.options[opt_InputOffset].arg, ((void*)0), 10 ); | |||
3833 | if (bltest.options[opt_OutputOffset].activated) | |||
3834 | outoff = PORT_Atoi(bltest.options[opt_OutputOffset].arg)(int)strtol(bltest.options[opt_OutputOffset].arg, ((void*)0), 10); | |||
3835 | ||||
3836 | testdir = (bltest.options[opt_SelfTestDir].activated) ? strdup(bltest.options[opt_SelfTestDir].arg) | |||
3837 | : "."; | |||
3838 | ||||
3839 | /* | |||
3840 | * Handle three simple cases first | |||
3841 | */ | |||
3842 | ||||
3843 | /* test the RSA_PopulatePrivateKey function with known vectors */ | |||
3844 | if (bltest.commands[cmd_RSAPopulateKV].activated) { | |||
3845 | PORT_FreePORT_Free_Util(cipherInfo); | |||
3846 | return doRSAPopulateTestKV(); | |||
3847 | } | |||
3848 | ||||
3849 | /* test the RSA_PopulatePrivateKey function */ | |||
3850 | if (bltest.commands[cmd_RSAPopulate].activated) { | |||
3851 | unsigned int keySize = 1024; | |||
3852 | unsigned long keyExponent = 65537; | |||
3853 | int rounds = 1; | |||
3854 | int ret = -1; | |||
3855 | ||||
3856 | if (bltest.options[opt_KeySize].activated) { | |||
3857 | keySize = PORT_Atoi(bltest.options[opt_KeySize].arg)(int)strtol(bltest.options[opt_KeySize].arg, ((void*)0), 10); | |||
3858 | } | |||
3859 | if (bltest.options[opt_Rounds].activated) { | |||
3860 | rounds = PORT_Atoi(bltest.options[opt_Rounds].arg)(int)strtol(bltest.options[opt_Rounds].arg, ((void*)0), 10); | |||
3861 | } | |||
3862 | if (bltest.options[opt_Exponent].activated) { | |||
3863 | keyExponent = PORT_Atoi(bltest.options[opt_Exponent].arg)(int)strtol(bltest.options[opt_Exponent].arg, ((void*)0), 10); | |||
3864 | } | |||
3865 | ||||
3866 | for (i = 0; i < rounds; i++) { | |||
3867 | printf("Running RSA Populate test round %d\n", i); | |||
3868 | ret = doRSAPopulateTest(keySize, keyExponent); | |||
3869 | if (ret != 0) { | |||
3870 | break; | |||
3871 | } | |||
3872 | } | |||
3873 | if (ret != 0) { | |||
3874 | fprintf(stderrstderr, "RSA Populate test round %d: FAILED\n", i); | |||
3875 | } | |||
3876 | PORT_FreePORT_Free_Util(cipherInfo); | |||
3877 | return ret; | |||
3878 | } | |||
3879 | ||||
3880 | /* Do BLAPI self-test */ | |||
3881 | if (bltest.commands[cmd_SelfTest].activated) { | |||
3882 | PRBool encrypt = PR_TRUE1, decrypt = PR_TRUE1; | |||
3883 | /* user may specified a set of ciphers to test. parse them. */ | |||
3884 | bltestCipherMode modesToTest[NUMMODES]; | |||
3885 | int numModesToTest = 0; | |||
3886 | char *tok, *str; | |||
3887 | str = bltest.options[opt_Mode].arg; | |||
3888 | while (str) { | |||
3889 | tok = strchr(str, ','); | |||
3890 | if (tok) | |||
3891 | *tok = '\0'; | |||
3892 | modesToTest[numModesToTest++] = get_mode(str); | |||
3893 | if (tok) { | |||
3894 | *tok = ','; | |||
3895 | str = tok + 1; | |||
3896 | } else { | |||
3897 | break; | |||
3898 | } | |||
3899 | } | |||
3900 | if (bltest.commands[cmd_Decrypt].activated && | |||
3901 | !bltest.commands[cmd_Encrypt].activated) | |||
3902 | encrypt = PR_FALSE0; | |||
3903 | if (bltest.commands[cmd_Encrypt].activated && | |||
3904 | !bltest.commands[cmd_Decrypt].activated) | |||
3905 | decrypt = PR_FALSE0; | |||
3906 | rv = blapi_selftest(modesToTest, numModesToTest, inoff, outoff, | |||
3907 | encrypt, decrypt); | |||
3908 | PORT_FreePORT_Free_Util(cipherInfo); | |||
3909 | return rv == SECSuccess ? 0 : 1; | |||
3910 | } | |||
3911 | ||||
3912 | /* Do FIPS self-test */ | |||
3913 | if (bltest.commands[cmd_FIPS].activated) { | |||
3914 | PORT_FreePORT_Free_Util(cipherInfo); | |||
3915 | #ifdef NSS_FIPS_DISABLED | |||
3916 | fprintf(stdoutstdout, "FIPS self-test failed with: NSS_FIPS_DISABLED\n"); | |||
3917 | return SECFailure; | |||
3918 | #else | |||
3919 | CK_RV ckrv = sftk_FIPSEntryOK(PR_FALSE0); | |||
3920 | if (ckrv == CKR_OK0x00000000UL) { | |||
3921 | fprintf(stdoutstdout, "FIPS self-test was successful.\n"); | |||
3922 | return SECSuccess; | |||
3923 | } | |||
3924 | fprintf(stdoutstdout, "FIPS self-test failed with the CK_RV: %ld.\n", ckrv); | |||
3925 | return SECFailure; | |||
3926 | #endif | |||
3927 | } | |||
3928 | ||||
3929 | /* | |||
3930 | * Check command line arguments for Encrypt/Decrypt/Hash/Sign/Verify | |||
3931 | */ | |||
3932 | ||||
3933 | if ((bltest.commands[cmd_Decrypt].activated || | |||
3934 | bltest.commands[cmd_Verify].activated) && | |||
3935 | bltest.options[opt_BufSize].activated) { | |||
3936 | fprintf(stderrstderr, "%s: Cannot use a nonce as input to decrypt/verify.\n", | |||
3937 | progName); | |||
3938 | goto print_usage; | |||
3939 | } | |||
3940 | ||||
3941 | if (bltest.options[opt_Mode].activated) { | |||
3942 | cipherInfo->mode = get_mode(bltest.options[opt_Mode].arg); | |||
3943 | if (cipherInfo->mode == bltestINVALID) { | |||
3944 | goto print_usage; | |||
3945 | } | |||
3946 | } else { | |||
3947 | fprintf(stderrstderr, "%s: You must specify a cipher mode with -m.\n", | |||
3948 | progName); | |||
3949 | goto print_usage; | |||
3950 | } | |||
3951 | ||||
3952 | if (bltest.options[opt_Repetitions].activated && | |||
3953 | bltest.options[opt_SecondsToRun].activated) { | |||
3954 | fprintf(stderrstderr, "%s: Operation time should be defined in either " | |||
3955 | "repetitions(-p) or seconds(-5) not both", | |||
3956 | progName); | |||
3957 | goto print_usage; | |||
3958 | } | |||
3959 | ||||
3960 | if (bltest.options[opt_Repetitions].activated) { | |||
3961 | cipherInfo->repetitionsToPerfom = | |||
3962 | PORT_Atoi(bltest.options[opt_Repetitions].arg)(int)strtol(bltest.options[opt_Repetitions].arg, ((void*)0), 10 ); | |||
3963 | } else { | |||
3964 | cipherInfo->repetitionsToPerfom = 0; | |||
3965 | } | |||
3966 | ||||
3967 | if (bltest.options[opt_SecondsToRun].activated) { | |||
3968 | cipherInfo->seconds = PORT_Atoi(bltest.options[opt_SecondsToRun].arg)(int)strtol(bltest.options[opt_SecondsToRun].arg, ((void*)0), 10); | |||
3969 | } else { | |||
3970 | cipherInfo->seconds = 0; | |||
3971 | } | |||
3972 | ||||
3973 | if (bltest.options[opt_CXReps].activated) { | |||
3974 | cipherInfo->cxreps = PORT_Atoi(bltest.options[opt_CXReps].arg)(int)strtol(bltest.options[opt_CXReps].arg, ((void*)0), 10); | |||
3975 | } else { | |||
3976 | cipherInfo->cxreps = 0; | |||
3977 | } | |||
3978 | ||||
3979 | if (bltest.options[opt_ThreadNum].activated) { | |||
3980 | threads = PORT_Atoi(bltest.options[opt_ThreadNum].arg)(int)strtol(bltest.options[opt_ThreadNum].arg, ((void*)0), 10 ); | |||
3981 | if (threads <= 0) { | |||
3982 | threads = 1; | |||
3983 | } | |||
3984 | } | |||
3985 | ||||
3986 | /* Dump a file (rsakey, dsakey, etc.) */ | |||
3987 | if (bltest.commands[cmd_Dump].activated) { | |||
3988 | rv = dump_file(cipherInfo->mode, bltest.options[opt_Input].arg); | |||
3989 | PORT_FreePORT_Free_Util(cipherInfo); | |||
3990 | return rv; | |||
3991 | } | |||
3992 | ||||
3993 | /* default input mode is binary */ | |||
3994 | ioMode = (bltest.options[opt_B64].activated) | |||
3995 | ? bltestBase64Encoded | |||
3996 | : (bltest.options[opt_Hex].activated) | |||
3997 | ? bltestHexStream | |||
3998 | : (bltest.options[opt_HexWSpc].activated) ? bltestHexSpaceDelim | |||
3999 | : bltestBinary; | |||
4000 | ||||
4001 | if (bltest.options[opt_Exponent].activated) | |||
4002 | exponent = PORT_Atoi(bltest.options[opt_Exponent].arg)(int)strtol(bltest.options[opt_Exponent].arg, ((void*)0), 10); | |||
4003 | else | |||
4004 | exponent = 65537; | |||
4005 | ||||
4006 | if (bltest.options[opt_CurveName].activated) | |||
4007 | curveName = PORT_StrdupPORT_Strdup_Util(bltest.options[opt_CurveName].arg); | |||
4008 | else | |||
4009 | curveName = NULL((void*)0); | |||
4010 | ||||
4011 | if (bltest.commands[cmd_Verify].activated && | |||
4012 | !bltest.options[opt_SigFile].activated) { | |||
4013 | fprintf(stderrstderr, "%s: You must specify a signature file with -f.\n", | |||
4014 | progName); | |||
4015 | ||||
4016 | print_usage: | |||
4017 | if (cipherInfo) { | |||
4018 | PORT_FreePORT_Free_Util(cipherInfo); | |||
4019 | } | |||
4020 | Usage(); | |||
4021 | } | |||
4022 | ||||
4023 | if (bltest.options[opt_MonteCarlo].activated) { | |||
4024 | cipherInfo->mCarlo = PR_TRUE1; | |||
4025 | } else { | |||
4026 | cipherInfo->mCarlo = PR_FALSE0; | |||
4027 | } | |||
4028 | ||||
4029 | for (curThrdNum = 0; curThrdNum < threads; curThrdNum++) { | |||
4030 | int keysize = 0; | |||
4031 | PRFileDesc *file = NULL((void*)0), *infile; | |||
4032 | bltestParams *params; | |||
4033 | char *instr = NULL((void*)0); | |||
4034 | PLArenaPool *arena; | |||
4035 | ||||
4036 | if (curThrdNum > 0) { | |||
4037 | bltestCipherInfo *newCInfo = PORT_ZNew(bltestCipherInfo)(bltestCipherInfo *)PORT_ZAlloc_Util(sizeof(bltestCipherInfo) ); | |||
4038 | if (!newCInfo) { | |||
4039 | fprintf(stderrstderr, "%s: Can not allocate memory.\n", progName); | |||
4040 | goto exit_point; | |||
4041 | } | |||
4042 | newCInfo->mode = cipherInfo->mode; | |||
4043 | newCInfo->mCarlo = cipherInfo->mCarlo; | |||
4044 | newCInfo->repetitionsToPerfom = | |||
4045 | cipherInfo->repetitionsToPerfom; | |||
4046 | newCInfo->seconds = cipherInfo->seconds; | |||
4047 | newCInfo->cxreps = cipherInfo->cxreps; | |||
4048 | cipherInfo->next = newCInfo; | |||
4049 | cipherInfo = newCInfo; | |||
4050 | } | |||
4051 | arena = PORT_NewArenaPORT_NewArena_Util(BLTEST_DEFAULT_CHUNKSIZE4096); | |||
4052 | if (!arena) { | |||
4053 | fprintf(stderrstderr, "%s: Can not allocate memory.\n", progName); | |||
4054 | goto exit_point; | |||
4055 | } | |||
4056 | cipherInfo->arena = arena; | |||
4057 | params = &cipherInfo->params; | |||
4058 | ||||
4059 | /* Set up an encryption key. */ | |||
4060 | keysize = 0; | |||
4061 | file = NULL((void*)0); | |||
4062 | if (is_symmkeyCipher(cipherInfo->mode) || | |||
4063 | is_aeadCipher(cipherInfo->mode)) { | |||
4064 | char *keystr = NULL((void*)0); /* if key is on command line */ | |||
4065 | if (bltest.options[opt_Key].activated) { | |||
4066 | if (bltest.options[opt_CmdLine].activated) { | |||
4067 | keystr = bltest.options[opt_Key].arg; | |||
4068 | } else { | |||
4069 | file = PR_Open(bltest.options[opt_Key].arg, | |||
4070 | PR_RDONLY0x01, 00660); | |||
4071 | } | |||
4072 | } else { | |||
4073 | if (bltest.options[opt_KeySize].activated) | |||
4074 | keysize = PORT_Atoi(bltest.options[opt_KeySize].arg)(int)strtol(bltest.options[opt_KeySize].arg, ((void*)0), 10); | |||
4075 | else | |||
4076 | keysize = 8; /* use 64-bit default (DES) */ | |||
4077 | /* save the random key for reference */ | |||
4078 | file = PR_Open("tmp.key", PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4079 | } | |||
4080 | params->key.mode = ioMode; | |||
4081 | setupIO(cipherInfo->arena, ¶ms->key, file, keystr, keysize); | |||
4082 | if (file) | |||
4083 | PR_Close(file); | |||
4084 | } else if (is_pubkeyCipher(cipherInfo->mode)) { | |||
4085 | if (bltest.options[opt_Key].activated) { | |||
4086 | file = PR_Open(bltest.options[opt_Key].arg, PR_RDONLY0x01, 00660); | |||
4087 | } else { | |||
4088 | if (bltest.options[opt_KeySize].activated) | |||
4089 | keysize = PORT_Atoi(bltest.options[opt_KeySize].arg)(int)strtol(bltest.options[opt_KeySize].arg, ((void*)0), 10); | |||
4090 | else | |||
4091 | keysize = 64; /* use 512-bit default */ | |||
4092 | file = PR_Open("tmp.key", PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4093 | } | |||
4094 | params->key.mode = bltestBase64Encoded; | |||
4095 | pubkeyInitKey(cipherInfo, file, keysize, exponent, curveName); | |||
4096 | PR_Close(file); | |||
4097 | } | |||
4098 | ||||
4099 | /* set up an initialization vector. */ | |||
4100 | if (cipher_requires_IV(cipherInfo->mode)) { | |||
4101 | char *ivstr = NULL((void*)0); | |||
4102 | bltestSymmKeyParams *skp; | |||
4103 | file = NULL((void*)0); | |||
4104 | #ifdef NSS_SOFTOKEN_DOES_RC5 | |||
4105 | if (cipherInfo->mode == bltestRC5_CBC) | |||
4106 | skp = (bltestSymmKeyParams *)¶ms->rc5; | |||
4107 | else | |||
4108 | #endif | |||
4109 | skp = ¶ms->sk; | |||
4110 | if (bltest.options[opt_IV].activated) { | |||
4111 | if (bltest.options[opt_CmdLine].activated) { | |||
4112 | ivstr = bltest.options[opt_IV].arg; | |||
4113 | } else { | |||
4114 | file = PR_Open(bltest.options[opt_IV].arg, | |||
4115 | PR_RDONLY0x01, 00660); | |||
4116 | } | |||
4117 | } else { | |||
4118 | /* save the random iv for reference */ | |||
4119 | file = PR_Open("tmp.iv", PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4120 | } | |||
4121 | memset(&skp->iv, 0, sizeof skp->iv); | |||
4122 | skp->iv.mode = ioMode; | |||
4123 | setupIO(cipherInfo->arena, &skp->iv, file, ivstr, keysize); | |||
4124 | if (file) { | |||
4125 | PR_Close(file); | |||
4126 | } | |||
4127 | } | |||
4128 | ||||
4129 | /* set up an initialization vector. */ | |||
4130 | if (is_authCipher(cipherInfo->mode)) { | |||
4131 | char *aadstr = NULL((void*)0); | |||
4132 | bltestAuthSymmKeyParams *askp; | |||
4133 | file = NULL((void*)0); | |||
4134 | askp = ¶ms->ask; | |||
4135 | if (bltest.options[opt_AAD].activated) { | |||
4136 | if (bltest.options[opt_CmdLine].activated) { | |||
4137 | aadstr = bltest.options[opt_AAD].arg; | |||
4138 | } else { | |||
4139 | file = PR_Open(bltest.options[opt_AAD].arg, | |||
4140 | PR_RDONLY0x01, 00660); | |||
4141 | } | |||
4142 | } else { | |||
4143 | file = NULL((void*)0); | |||
4144 | } | |||
4145 | memset(&askp->aad, 0, sizeof askp->aad); | |||
4146 | askp->aad.mode = ioMode; | |||
4147 | setupIO(cipherInfo->arena, &askp->aad, file, aadstr, 0); | |||
4148 | if (file) { | |||
4149 | PR_Close(file); | |||
4150 | } | |||
4151 | } | |||
4152 | ||||
4153 | if (bltest.commands[cmd_Verify].activated) { | |||
4154 | file = PR_Open(bltest.options[opt_SigFile].arg, PR_RDONLY0x01, 00660); | |||
4155 | if (is_sigCipher(cipherInfo->mode)) { | |||
4156 | memset(¶ms->asymk.sig, 0, sizeof(bltestIO)); | |||
4157 | params->asymk.sig.mode = ioMode; | |||
4158 | setupIO(cipherInfo->arena, ¶ms->asymk.sig, file, NULL((void*)0), 0); | |||
4159 | } | |||
4160 | if (file) { | |||
4161 | PR_Close(file); | |||
4162 | } | |||
4163 | } | |||
4164 | ||||
4165 | if (bltest.options[opt_PQGFile].activated) { | |||
4166 | file = PR_Open(bltest.options[opt_PQGFile].arg, PR_RDONLY0x01, 00660); | |||
4167 | params->asymk.cipherParams.dsa.pqgdata.mode = bltestBase64Encoded; | |||
4168 | setupIO(cipherInfo->arena, ¶ms->asymk.cipherParams.dsa.pqgdata, | |||
4169 | file, NULL((void*)0), 0); | |||
4170 | if (file) { | |||
4171 | PR_Close(file); | |||
4172 | } | |||
4173 | } | |||
4174 | ||||
4175 | /* Set up the input buffer */ | |||
4176 | if (bltest.options[opt_Input].activated) { | |||
4177 | if (bltest.options[opt_CmdLine].activated) { | |||
4178 | instr = bltest.options[opt_Input].arg; | |||
4179 | infile = NULL((void*)0); | |||
4180 | } else { | |||
4181 | /* form file name from testdir and input arg. */ | |||
4182 | char *filename = bltest.options[opt_Input].arg; | |||
4183 | if (bltest.options[opt_SelfTestDir].activated && | |||
4184 | testdir && filename && filename[0] != '/') { | |||
4185 | filename = PR_smprintf("%s/tests/%s/%s", testdir, | |||
4186 | mode_strings[cipherInfo->mode], | |||
4187 | filename); | |||
4188 | if (!filename) { | |||
4189 | fprintf(stderrstderr, "%s: Can not allocate memory.\n", | |||
4190 | progName); | |||
4191 | goto exit_point; | |||
4192 | } | |||
4193 | infile = PR_Open(filename, PR_RDONLY0x01, 00660); | |||
4194 | PR_smprintf_free(filename); | |||
4195 | } else { | |||
4196 | infile = PR_Open(filename, PR_RDONLY0x01, 00660); | |||
4197 | } | |||
4198 | } | |||
4199 | } else if (bltest.options[opt_BufSize].activated) { | |||
4200 | /* save the random plaintext for reference */ | |||
4201 | char *tmpFName = PR_smprintf("tmp.in.%d", curThrdNum); | |||
4202 | if (!tmpFName) { | |||
4203 | fprintf(stderrstderr, "%s: Can not allocate memory.\n", progName); | |||
4204 | goto exit_point; | |||
4205 | } | |||
4206 | infile = PR_Open(tmpFName, PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4207 | PR_smprintf_free(tmpFName); | |||
4208 | } else { | |||
4209 | infile = PR_STDINPR_GetSpecialFD(PR_StandardInput); | |||
4210 | } | |||
4211 | if (!infile) { | |||
4212 | fprintf(stderrstderr, "%s: Failed to open input file.\n", progName); | |||
4213 | goto exit_point; | |||
4214 | } | |||
4215 | cipherInfo->input.mode = ioMode; | |||
4216 | ||||
4217 | /* Set up the output stream */ | |||
4218 | if (bltest.options[opt_Output].activated) { | |||
4219 | /* form file name from testdir and input arg. */ | |||
4220 | char *filename = bltest.options[opt_Output].arg; | |||
4221 | if (bltest.options[opt_SelfTestDir].activated && | |||
4222 | testdir && filename && filename[0] != '/') { | |||
4223 | filename = PR_smprintf("%s/tests/%s/%s", testdir, | |||
4224 | mode_strings[cipherInfo->mode], | |||
4225 | filename); | |||
4226 | if (!filename) { | |||
4227 | fprintf(stderrstderr, "%s: Can not allocate memory.\n", progName); | |||
4228 | goto exit_point; | |||
4229 | } | |||
4230 | outfile = PR_Open(filename, PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4231 | PR_smprintf_free(filename); | |||
4232 | } else { | |||
4233 | outfile = PR_Open(filename, PR_WRONLY0x02 | PR_CREATE_FILE0x08, 00660); | |||
4234 | } | |||
4235 | } else { | |||
4236 | outfile = PR_STDOUTPR_GetSpecialFD(PR_StandardOutput); | |||
4237 | } | |||
4238 | if (!outfile) { | |||
4239 | fprintf(stderrstderr, "%s: Failed to open output file.\n", progName); | |||
4240 | rv = SECFailure; | |||
4241 | goto exit_point; | |||
4242 | } | |||
4243 | cipherInfo->output.mode = ioMode; | |||
4244 | if (bltest.options[opt_SelfTestDir].activated && ioMode == bltestBinary) | |||
4245 | cipherInfo->output.mode = bltestBase64Encoded; | |||
4246 | ||||
4247 | if (is_hashCipher(cipherInfo->mode)) | |||
4248 | cipherInfo->params.hash.restart = | |||
4249 | bltest.options[opt_Restart].activated; | |||
4250 | ||||
4251 | bufsize = 0; | |||
4252 | if (bltest.options[opt_BufSize].activated) | |||
4253 | bufsize = PORT_Atoi(bltest.options[opt_BufSize].arg)(int)strtol(bltest.options[opt_BufSize].arg, ((void*)0), 10); | |||
4254 | ||||
4255 | /*infile = NULL;*/ | |||
4256 | setupIO(cipherInfo->arena, &cipherInfo->input, infile, instr, bufsize); | |||
4257 | if (infile && infile != PR_STDINPR_GetSpecialFD(PR_StandardInput)) | |||
4258 | PR_Close(infile); | |||
4259 | misalignBuffer(cipherInfo->arena, &cipherInfo->input, inoff); | |||
4260 | ||||
4261 | cipherInit(cipherInfo, bltest.commands[cmd_Encrypt].activated); | |||
4262 | misalignBuffer(cipherInfo->arena, &cipherInfo->output, outoff); | |||
4263 | } | |||
4264 | ||||
4265 | if (!bltest.commands[cmd_Nonce].activated) { | |||
4266 | TIMESTART()time1 = PR_IntervalNow();; | |||
4267 | cipherInfo = cipherInfoListHead; | |||
4268 | while (cipherInfo != NULL((void*)0)) { | |||
4269 | cipherInfo->cipherThread = | |||
4270 | PR_CreateThread(PR_USER_THREAD, | |||
4271 | ThreadExecTest, | |||
4272 | cipherInfo, | |||
4273 | PR_PRIORITY_NORMAL, | |||
4274 | PR_GLOBAL_THREAD, | |||
4275 | PR_JOINABLE_THREAD, | |||
4276 | 0); | |||
4277 | cipherInfo = cipherInfo->next; | |||
4278 | } | |||
4279 | ||||
4280 | cipherInfo = cipherInfoListHead; | |||
4281 | while (cipherInfo != NULL((void*)0)) { | |||
4282 | PR_JoinThread(cipherInfo->cipherThread); | |||
4283 | finishIO(&cipherInfo->output, outfile); | |||
4284 | cipherInfo = cipherInfo->next; | |||
4285 | } | |||
4286 | TIMEFINISH(totalTime, 1)time2 = (PRIntervalTime)(PR_IntervalNow() - time1); time1 = PR_IntervalToMilliseconds (time2); totalTime = ((double)(time1)) / 1;; | |||
4287 | } | |||
4288 | ||||
4289 | cipherInfo = cipherInfoListHead; | |||
4290 | if (cipherInfo->repetitions > 0 || cipherInfo->cxreps > 0 || | |||
4291 | threads > 1) | |||
4292 | dump_performance_info(cipherInfoListHead, totalTime, | |||
4293 | bltest.commands[cmd_Encrypt].activated, | |||
4294 | (cipherInfo->repetitions == 0)); | |||
4295 | ||||
4296 | rv = SECSuccess; | |||
4297 | ||||
4298 | exit_point: | |||
4299 | if (outfile && outfile != PR_STDOUTPR_GetSpecialFD(PR_StandardOutput)) | |||
4300 | PR_Close(outfile); | |||
4301 | cipherInfo = cipherInfoListHead; | |||
4302 | while (cipherInfo != NULL((void*)0)) { | |||
4303 | bltestCipherInfo *tmpInfo = cipherInfo; | |||
4304 | ||||
4305 | if (cipherInfo->arena) | |||
4306 | PORT_FreeArenaPORT_FreeArena_Util(cipherInfo->arena, PR_TRUE1); | |||
4307 | cipherInfo = cipherInfo->next; | |||
4308 | PORT_FreePORT_Free_Util(tmpInfo); | |||
4309 | } | |||
4310 | ||||
4311 | /*NSS_Shutdown();*/ | |||
4312 | ||||
4313 | return SECSuccess; | |||
4314 | } |