2017-01-27 12:05:45 +00:00
// test.cpp - originally written and placed in the public domain by Wei Dai
2017-02-21 07:03:29 +00:00
// CryptoPP::Test namespace added by JW in February 2017
2017-07-23 20:20:52 +00:00
// scoped_main added to CryptoPP::Test namespace by JW in July 2017
// Also see http://github.com/weidai11/cryptopp/issues/447
2015-11-05 06:59:46 +00:00
# define CRYPTOPP_DEFAULT_NO_DLL
# define CRYPTOPP_ENABLE_NAMESPACE_WEAK 1
# include "dll.h"
# include "aes.h"
# include "cryptlib.h"
# include "filters.h"
# include "md5.h"
# include "ripemd.h"
# include "rng.h"
# include "gzip.h"
# include "default.h"
# include "randpool.h"
# include "ida.h"
# include "base64.h"
# include "socketft.h"
# include "wait.h"
# include "factory.h"
# include "whrlpool.h"
# include "tiger.h"
# include "smartptr.h"
2017-08-16 16:21:07 +00:00
# include "pkcspad.h"
2017-03-08 21:59:24 +00:00
# include "stdcpp.h"
2016-09-17 16:23:02 +00:00
# include "ossig.h"
2016-09-16 15:27:15 +00:00
# include "trap.h"
2015-11-05 06:59:46 +00:00
# include "validate.h"
# include "bench.h"
# include <iostream>
2015-11-18 20:32:28 +00:00
# include <sstream>
# include <locale>
2017-03-08 21:59:24 +00:00
# include <ctime>
2015-11-05 06:59:46 +00:00
# ifdef CRYPTOPP_WIN32_AVAILABLE
2016-04-28 05:05:47 +00:00
# define WIN32_LEAN_AND_MEAN
2015-11-05 06:59:46 +00:00
# include <windows.h>
# endif
# if defined(USE_BERKELEY_STYLE_SOCKETS) && !defined(macintosh)
# include <netinet/in.h>
# include <netinet/tcp.h>
# endif
# if (_MSC_VER >= 1000)
# include <crtdbg.h> // for the debug heap
# endif
# if defined(__MWERKS__) && defined(macintosh)
# include <console.h>
# endif
# ifdef _OPENMP
# include <omp.h>
# endif
# ifdef __BORLANDC__
# pragma comment(lib, "cryptlib_bds.lib")
# pragma comment(lib, "ws2_32.lib")
# endif
// Aggressive stack checking with VS2005 SP1 and above.
2017-05-11 16:05:57 +00:00
# if (_MSC_FULL_VER >= 140050727)
2015-11-05 06:59:46 +00:00
# pragma strict_gs_check (on)
# endif
2017-07-23 20:20:52 +00:00
// Global namespace, provided by other source files
void FIPS140_SampleApplication ( ) ;
void RegisterFactories ( CryptoPP : : Test : : TestClass suites ) ;
int ( * AdhocTest ) ( int argc , char * argv [ ] ) = NULLPTR ;
NAMESPACE_BEGIN ( CryptoPP )
NAMESPACE_BEGIN ( Test )
2015-11-05 06:59:46 +00:00
const int MAX_PHRASE_LENGTH = 250 ;
void PrintSeedAndThreads ( const std : : string & seed ) ;
void GenerateRSAKey ( unsigned int keyLength , const char * privFilename , const char * pubFilename , const char * seed ) ;
2017-02-21 07:03:29 +00:00
std : : string RSAEncryptString ( const char * pubFilename , const char * seed , const char * message ) ;
std : : string RSADecryptString ( const char * privFilename , const char * ciphertext ) ;
2015-11-05 06:59:46 +00:00
void RSASignFile ( const char * privFilename , const char * messageFilename , const char * signatureFilename ) ;
bool RSAVerifyFile ( const char * pubFilename , const char * messageFilename , const char * signatureFilename ) ;
void DigestFile ( const char * file ) ;
void HmacFile ( const char * hexKey , const char * file ) ;
void AES_CTR_Encrypt ( const char * hexKey , const char * hexIV , const char * infile , const char * outfile ) ;
2017-02-21 07:03:29 +00:00
std : : string EncryptString ( const char * plaintext , const char * passPhrase ) ;
std : : string DecryptString ( const char * ciphertext , const char * passPhrase ) ;
2015-11-05 06:59:46 +00:00
void EncryptFile ( const char * in , const char * out , const char * passPhrase ) ;
void DecryptFile ( const char * in , const char * out , const char * passPhrase ) ;
void SecretShareFile ( int threshold , int nShares , const char * filename , const char * seed ) ;
void SecretRecoverFile ( int threshold , const char * outFilename , char * const * inFilenames ) ;
void InformationDisperseFile ( int threshold , int nShares , const char * filename ) ;
void InformationRecoverFile ( int threshold , const char * outFilename , char * const * inFilenames ) ;
void GzipFile ( const char * in , const char * out , int deflate_level ) ;
void GunzipFile ( const char * in , const char * out ) ;
void Base64Encode ( const char * infile , const char * outfile ) ;
void Base64Decode ( const char * infile , const char * outfile ) ;
void HexEncode ( const char * infile , const char * outfile ) ;
void HexDecode ( const char * infile , const char * outfile ) ;
void ForwardTcpPort ( const char * sourcePort , const char * destinationHost , const char * destinationPort ) ;
void FIPS140_GenerateRandomFiles ( ) ;
bool Validate ( int , bool , const char * ) ;
2015-11-18 20:32:28 +00:00
void PrintSeedAndThreads ( const std : : string & seed ) ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
ANONYMOUS_NAMESPACE_BEGIN
OFB_Mode < AES > : : Encryption s_globalRNG ;
NAMESPACE_END
2015-11-05 06:59:46 +00:00
RandomNumberGenerator & GlobalRNG ( )
{
return dynamic_cast < RandomNumberGenerator & > ( s_globalRNG ) ;
}
2016-09-16 15:27:15 +00:00
// See misc.h and trap.h for comments and usage
2016-10-18 02:00:31 +00:00
# if defined(CRYPTOPP_DEBUG) && defined(UNIX_SIGNALS_AVAILABLE)
2016-09-16 15:27:15 +00:00
static const SignalHandler < SIGTRAP , false > s_dummyHandler ;
2016-10-10 22:03:31 +00:00
// static const DebugTrapHandler s_dummyHandler;
2016-09-16 15:27:15 +00:00
# endif
2017-07-23 20:20:52 +00:00
int scoped_main ( int argc , char * argv [ ] )
2015-11-05 06:59:46 +00:00
{
# ifdef _CRTDBG_LEAK_CHECK_DF
// Turn on leak-checking
int tempflag = _CrtSetDbgFlag ( _CRTDBG_REPORT_FLAG ) ;
tempflag | = _CRTDBG_LEAK_CHECK_DF ;
_CrtSetDbgFlag ( tempflag ) ;
# endif
try
2016-04-28 05:05:47 +00:00
{
2017-07-23 20:20:52 +00:00
RegisterFactories ( All ) ;
2015-11-05 06:59:46 +00:00
2015-11-18 20:32:28 +00:00
// Some editors have problems with the '\0' character when redirecting output.
2017-03-01 11:10:06 +00:00
std : : string seed = IntToString ( time ( NULLPTR ) ) ;
2015-11-18 20:32:28 +00:00
seed . resize ( 16 , ' ' ) ;
2015-11-05 06:59:46 +00:00
2016-12-04 18:04:12 +00:00
// Fetch the SymmetricCipher interface, not the RandomNumberGenerator interface, to key the underlying cipher
2017-07-23 20:20:52 +00:00
OFB_Mode < AES > : : Encryption & aesg = dynamic_cast < OFB_Mode < AES > : : Encryption & > ( GlobalRNG ( ) ) ;
2016-12-04 18:04:12 +00:00
aesg . SetKeyWithIV ( ( byte * ) seed . data ( ) , 16 , ( byte * ) seed . data ( ) ) ;
2015-11-05 06:59:46 +00:00
std : : string command , executableName , macFilename ;
if ( argc < 2 )
command = ' h ' ;
else
command = argv [ 1 ] ;
if ( command = = " g " )
{
char thisSeed [ 1024 ] , privFilename [ 128 ] , pubFilename [ 128 ] ;
unsigned int keyLength ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Key length in bits: " ;
std : : cin > > keyLength ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Save private key to file: " ;
std : : cin > > privFilename ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Save public key to file: " ;
std : : cin > > pubFilename ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Random Seed: " ;
std : : ws ( std : : cin ) ;
std : : cin . getline ( thisSeed , 1024 ) ;
2015-11-05 06:59:46 +00:00
GenerateRSAKey ( keyLength , privFilename , pubFilename , thisSeed ) ;
}
else if ( command = = " rs " )
RSASignFile ( argv [ 2 ] , argv [ 3 ] , argv [ 4 ] ) ;
else if ( command = = " rv " )
{
bool verified = RSAVerifyFile ( argv [ 2 ] , argv [ 3 ] , argv [ 4 ] ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < ( verified ? " valid signature " : " invalid signature " ) < < std : : endl ;
2015-11-05 06:59:46 +00:00
}
else if ( command = = " r " )
{
char privFilename [ 128 ] , pubFilename [ 128 ] ;
char thisSeed [ 1024 ] , message [ 1024 ] ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Private key file: " ;
std : : cin > > privFilename ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Public key file: " ;
std : : cin > > pubFilename ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Random Seed: " ;
std : : ws ( std : : cin ) ;
std : : cin . getline ( thisSeed , 1024 ) ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Message: " ;
std : : cin . getline ( message , 1024 ) ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : string ciphertext = RSAEncryptString ( pubFilename , thisSeed , message ) ;
std : : cout < < " \n Ciphertext: " < < ciphertext < < std : : endl ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : string decrypted = RSADecryptString ( privFilename , ciphertext . c_str ( ) ) ;
std : : cout < < " \n Decrypted: " < < decrypted < < std : : endl ;
2015-11-05 06:59:46 +00:00
}
else if ( command = = " mt " )
{
MaurerRandomnessTest mt ;
FileStore fs ( argv [ 2 ] ) ;
fs . TransferAllTo ( mt ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Maurer Test Value: " < < mt . GetTestValue ( ) < < std : : endl ;
2015-11-05 06:59:46 +00:00
}
else if ( command = = " mac_dll " )
{
std : : string fname ( argv [ 2 ] ? argv [ 2 ] : " " ) ;
// sanity check on file size
2017-02-21 07:03:29 +00:00
std : : fstream dllFile ( fname . c_str ( ) , std : : ios : : in | std : : ios : : out | std : : ios : : binary ) ;
2015-11-05 06:59:46 +00:00
if ( ! dllFile . good ( ) )
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " Failed to open file \" " < < fname < < " \" \n " ;
2015-11-05 06:59:46 +00:00
return 1 ;
}
std : : ifstream : : pos_type fileEnd = dllFile . seekg ( 0 , std : : ios_base : : end ) . tellg ( ) ;
if ( fileEnd > 20 * 1000 * 1000 )
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " Input file " < < fname < < " is too large " ;
std : : cerr < < " (size is " < < fileEnd < < " ). \n " ;
2015-11-05 06:59:46 +00:00
return 1 ;
}
// read file into memory
unsigned int fileSize = ( unsigned int ) fileEnd ;
SecByteBlock buf ( fileSize ) ;
dllFile . seekg ( 0 , std : : ios_base : : beg ) ;
dllFile . read ( ( char * ) buf . begin ( ) , fileSize ) ;
// find positions of relevant sections in the file, based on version 8 of documentation from http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx
2016-01-25 16:39:47 +00:00
word32 coffPos = * ( word16 * ) ( void * ) ( buf + 0x3c ) ;
2015-11-05 06:59:46 +00:00
word32 optionalHeaderPos = coffPos + 24 ;
2016-01-25 16:39:47 +00:00
word16 optionalHeaderMagic = * ( word16 * ) ( void * ) ( buf + optionalHeaderPos ) ;
2015-11-05 06:59:46 +00:00
if ( optionalHeaderMagic ! = 0x10b & & optionalHeaderMagic ! = 0x20b )
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " Target file is not a PE32 or PE32+ image. \n " ;
2015-11-05 06:59:46 +00:00
return 3 ;
}
word32 checksumPos = optionalHeaderPos + 64 ;
word32 certificateTableDirectoryPos = optionalHeaderPos + ( optionalHeaderMagic = = 0x10b ? 128 : 144 ) ;
2016-01-25 16:39:47 +00:00
word32 certificateTablePos = * ( word32 * ) ( void * ) ( buf + certificateTableDirectoryPos ) ;
word32 certificateTableSize = * ( word32 * ) ( void * ) ( buf + certificateTableDirectoryPos + 4 ) ;
2015-11-05 06:59:46 +00:00
if ( certificateTableSize ! = 0 )
2017-02-21 07:03:29 +00:00
std : : cerr < < " Warning: certificate table (IMAGE_DIRECTORY_ENTRY_SECURITY) of target image is not empty. \n " ;
2015-11-05 06:59:46 +00:00
// find where to place computed MAC
byte mac [ ] = CRYPTOPP_DUMMY_DLL_MAC ;
byte * found = std : : search ( buf . begin ( ) , buf . end ( ) , mac + 0 , mac + sizeof ( mac ) ) ;
if ( found = = buf . end ( ) )
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " MAC placeholder not found. The MAC may already be placed. \n " ;
2015-11-05 06:59:46 +00:00
return 2 ;
}
word32 macPos = ( unsigned int ) ( found - buf . begin ( ) ) ;
// compute MAC
member_ptr < MessageAuthenticationCode > pMac ( NewIntegrityCheckingMAC ( ) ) ;
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( pMac - > DigestSize ( ) = = sizeof ( mac ) ) ;
2015-11-05 06:59:46 +00:00
MeterFilter f ( new HashFilter ( * pMac , new ArraySink ( mac , sizeof ( mac ) ) ) ) ;
f . AddRangeToSkip ( 0 , checksumPos , 4 ) ;
f . AddRangeToSkip ( 0 , certificateTableDirectoryPos , 8 ) ;
f . AddRangeToSkip ( 0 , macPos , sizeof ( mac ) ) ;
f . AddRangeToSkip ( 0 , certificateTablePos , certificateTableSize ) ;
f . PutMessageEnd ( buf . begin ( ) , buf . size ( ) ) ;
2016-10-02 20:20:25 +00:00
// Encode MAC
2017-02-21 07:03:29 +00:00
std : : string hexMac ;
2016-10-02 20:20:25 +00:00
HexEncoder encoder ;
encoder . Put ( mac , sizeof ( mac ) ) , encoder . MessageEnd ( ) ;
2016-10-02 22:40:28 +00:00
hexMac . resize ( static_cast < size_t > ( encoder . MaxRetrievable ( ) ) ) ;
encoder . Get ( reinterpret_cast < byte * > ( & hexMac [ 0 ] ) , hexMac . size ( ) ) ;
2016-10-02 20:20:25 +00:00
// Report MAC and location
2016-10-02 22:40:28 +00:00
std : : cout < < " Placing MAC " < < hexMac < < " in " < < fname < < " at file offset " < < macPos ;
2016-10-02 20:20:25 +00:00
std : : cout < < " (0x " < < std : : hex < < macPos < < std : : dec < < " ). \n " ;
2015-11-05 06:59:46 +00:00
// place MAC
dllFile . seekg ( macPos , std : : ios_base : : beg ) ;
dllFile . write ( ( char * ) mac , sizeof ( mac ) ) ;
}
else if ( command = = " m " )
DigestFile ( argv [ 2 ] ) ;
else if ( command = = " tv " )
{
2015-12-26 04:50:28 +00:00
// TestDataFile() adds CRYPTOPP_DATA_DIR as required
2015-11-05 06:59:46 +00:00
std : : string fname = ( argv [ 2 ] ? argv [ 2 ] : " all " ) ;
if ( fname . find ( " .txt " ) = = std : : string : : npos )
fname = " TestVectors/ " + fname + " .txt " ;
2016-07-24 23:28:01 +00:00
2015-11-05 06:59:46 +00:00
PrintSeedAndThreads ( seed ) ;
2017-07-23 20:20:52 +00:00
return ! RunTestDataFile ( fname . c_str ( ) ) ;
2015-11-05 06:59:46 +00:00
}
else if ( command = = " t " )
{
// VC60 workaround: use char array instead of std::string to workaround MSVC's getline bug
char passPhrase [ MAX_PHRASE_LENGTH ] , plaintext [ 1024 ] ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Passphrase: " ;
std : : cin . getline ( passPhrase , MAX_PHRASE_LENGTH ) ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Plaintext: " ;
std : : cin . getline ( plaintext , 1024 ) ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : string ciphertext = EncryptString ( plaintext , passPhrase ) ;
std : : cout < < " \n Ciphertext: " < < ciphertext < < std : : endl ;
2015-11-05 06:59:46 +00:00
2017-02-21 07:03:29 +00:00
std : : string decrypted = DecryptString ( ciphertext . c_str ( ) , passPhrase ) ;
std : : cout < < " \n Decrypted: " < < decrypted < < std : : endl ;
2015-11-05 06:59:46 +00:00
return 0 ;
}
else if ( command = = " e64 " )
Base64Encode ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " d64 " )
Base64Decode ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " e16 " )
HexEncode ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " d16 " )
HexDecode ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " e " | | command = = " d " )
{
char passPhrase [ MAX_PHRASE_LENGTH ] ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Passphrase: " ;
std : : cin . getline ( passPhrase , MAX_PHRASE_LENGTH ) ;
2015-11-05 06:59:46 +00:00
if ( command = = " e " )
EncryptFile ( argv [ 2 ] , argv [ 3 ] , passPhrase ) ;
else
DecryptFile ( argv [ 2 ] , argv [ 3 ] , passPhrase ) ;
}
else if ( command = = " ss " )
{
char thisSeed [ 1024 ] ;
2017-02-21 07:03:29 +00:00
std : : cout < < " \n Random Seed: " ;
std : : ws ( std : : cin ) ;
std : : cin . getline ( thisSeed , 1024 ) ;
2017-07-23 20:20:52 +00:00
SecretShareFile ( StringToValue < int , true > ( argv [ 2 ] ) , StringToValue < int , true > ( argv [ 3 ] ) , argv [ 4 ] , thisSeed ) ;
2015-11-05 06:59:46 +00:00
}
else if ( command = = " sr " )
SecretRecoverFile ( argc - 3 , argv [ 2 ] , argv + 3 ) ;
else if ( command = = " id " )
2017-07-23 20:20:52 +00:00
InformationDisperseFile ( StringToValue < int , true > ( argv [ 2 ] ) , StringToValue < int , true > ( argv [ 3 ] ) , argv [ 4 ] ) ;
2015-11-05 06:59:46 +00:00
else if ( command = = " ir " )
InformationRecoverFile ( argc - 3 , argv [ 2 ] , argv + 3 ) ;
else if ( command = = " v " | | command = = " vv " )
2017-07-23 20:20:52 +00:00
return ! Validate ( argc > 2 ? StringToValue < int , true > ( argv [ 2 ] ) : 0 , argv [ 1 ] [ 1 ] = = ' v ' , argc > 3 ? argv [ 3 ] : NULLPTR ) ;
2017-05-20 03:29:59 +00:00
else if ( command . substr ( 0 , 1 ) = = " b " ) // "b", "b1", "b2", ...
2017-07-23 20:20:52 +00:00
BenchmarkWithCommand ( argc , argv ) ;
2015-11-05 06:59:46 +00:00
else if ( command = = " z " )
GzipFile ( argv [ 3 ] , argv [ 4 ] , argv [ 2 ] [ 0 ] - ' 0 ' ) ;
else if ( command = = " u " )
GunzipFile ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " fips " )
FIPS140_SampleApplication ( ) ;
else if ( command = = " fips-rand " )
FIPS140_GenerateRandomFiles ( ) ;
else if ( command = = " ft " )
ForwardTcpPort ( argv [ 2 ] , argv [ 3 ] , argv [ 4 ] ) ;
else if ( command = = " a " )
{
if ( AdhocTest )
return ( * AdhocTest ) ( argc , argv ) ;
else
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " AdhocTest not defined. \n " ;
2015-11-05 06:59:46 +00:00
return 1 ;
}
}
else if ( command = = " hmac " )
HmacFile ( argv [ 2 ] , argv [ 3 ] ) ;
else if ( command = = " ae " )
AES_CTR_Encrypt ( argv [ 2 ] , argv [ 3 ] , argv [ 4 ] , argv [ 5 ] ) ;
else if ( command = = " h " )
{
2017-02-21 07:03:29 +00:00
FileSource usage ( CRYPTOPP_DATA_DIR " TestData/usage.dat " , true , new FileSink ( std : : cout ) ) ;
2015-11-05 06:59:46 +00:00
return 1 ;
}
else if ( command = = " V " )
{
2017-02-21 07:03:29 +00:00
std : : cout < < CRYPTOPP_VERSION / 100 < < ' . ' < < ( CRYPTOPP_VERSION % 100 ) / 10 < < ' . ' < < CRYPTOPP_VERSION % 10 < < std : : endl ;
2015-11-05 06:59:46 +00:00
}
else
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " Unrecognized command. Run \" cryptest h \" to obtain usage information. \n " ;
2015-11-05 06:59:46 +00:00
return 1 ;
}
return 0 ;
}
2017-07-23 20:20:52 +00:00
catch ( const Exception & e )
2015-11-05 06:59:46 +00:00
{
2017-07-23 20:20:52 +00:00
std : : cout < < " \n Exception caught: " < < e . what ( ) < < std : : endl ;
2015-11-05 06:59:46 +00:00
return - 1 ;
}
catch ( const std : : exception & e )
{
2017-02-21 07:03:29 +00:00
std : : cout < < " \n std::exception caught: " < < e . what ( ) < < std : : endl ;
2015-11-05 06:59:46 +00:00
return - 2 ;
}
2017-05-04 23:11:24 +00:00
} // main()
2015-11-05 06:59:46 +00:00
void FIPS140_GenerateRandomFiles ( )
{
# ifdef OS_RNG_AVAILABLE
DefaultAutoSeededRNG rng ;
RandomNumberStore store ( rng , ULONG_MAX ) ;
for ( unsigned int i = 0 ; i < 100000 ; i + + )
store . TransferTo ( FileSink ( ( IntToString ( i ) + " .rnd " ) . c_str ( ) ) . Ref ( ) , 20000 ) ;
# else
2017-02-21 07:03:29 +00:00
std : : cout < < " OS provided RNG not available. \n " ;
2015-11-05 06:59:46 +00:00
exit ( - 1 ) ;
# endif
}
2015-11-18 20:32:28 +00:00
void PrintSeedAndThreads ( const std : : string & seed )
{
2017-02-21 07:03:29 +00:00
std : : cout < < " Using seed: " < < seed < < std : : endl ;
2015-11-18 20:32:28 +00:00
# ifdef _OPENMP
int tc = 0 ;
# pragma omp parallel
{
tc = omp_get_num_threads ( ) ;
}
std : : cout < < " Using " < < tc < < " OMP " < < ( tc = = 1 ? " thread " : " threads " ) < < std : : endl ;
# endif
}
2015-11-05 06:59:46 +00:00
SecByteBlock HexDecodeString ( const char * hex )
{
StringSource ss ( hex , true , new HexDecoder ) ;
SecByteBlock result ( ( size_t ) ss . MaxRetrievable ( ) ) ;
ss . Get ( result , result . size ( ) ) ;
return result ;
}
void GenerateRSAKey ( unsigned int keyLength , const char * privFilename , const char * pubFilename , const char * seed )
{
2018-01-21 13:45:02 +00:00
// DEREncode() changed to Save() at Issue 569.
2015-11-05 06:59:46 +00:00
RandomPool randPool ;
randPool . IncorporateEntropy ( ( byte * ) seed , strlen ( seed ) ) ;
RSAES_OAEP_SHA_Decryptor priv ( randPool , keyLength ) ;
HexEncoder privFile ( new FileSink ( privFilename ) ) ;
2018-01-21 13:45:02 +00:00
priv . AccessMaterial ( ) . Save ( privFile ) ;
2015-11-05 06:59:46 +00:00
privFile . MessageEnd ( ) ;
RSAES_OAEP_SHA_Encryptor pub ( priv ) ;
HexEncoder pubFile ( new FileSink ( pubFilename ) ) ;
2018-01-21 13:45:02 +00:00
pub . AccessMaterial ( ) . Save ( pubFile ) ;
2015-11-05 06:59:46 +00:00
pubFile . MessageEnd ( ) ;
}
2017-02-21 07:03:29 +00:00
std : : string RSAEncryptString ( const char * pubFilename , const char * seed , const char * message )
2015-11-05 06:59:46 +00:00
{
FileSource pubFile ( pubFilename , true , new HexDecoder ) ;
RSAES_OAEP_SHA_Encryptor pub ( pubFile ) ;
RandomPool randPool ;
randPool . IncorporateEntropy ( ( byte * ) seed , strlen ( seed ) ) ;
2017-02-21 07:03:29 +00:00
std : : string result ;
2015-11-05 06:59:46 +00:00
StringSource ( message , true , new PK_EncryptorFilter ( randPool , pub , new HexEncoder ( new StringSink ( result ) ) ) ) ;
return result ;
}
2017-02-21 07:03:29 +00:00
std : : string RSADecryptString ( const char * privFilename , const char * ciphertext )
2015-11-05 06:59:46 +00:00
{
FileSource privFile ( privFilename , true , new HexDecoder ) ;
RSAES_OAEP_SHA_Decryptor priv ( privFile ) ;
2017-02-21 07:03:29 +00:00
std : : string result ;
2017-07-23 20:20:52 +00:00
StringSource ( ciphertext , true , new HexDecoder ( new PK_DecryptorFilter ( GlobalRNG ( ) , priv , new StringSink ( result ) ) ) ) ;
2015-11-05 06:59:46 +00:00
return result ;
}
void RSASignFile ( const char * privFilename , const char * messageFilename , const char * signatureFilename )
{
FileSource privFile ( privFilename , true , new HexDecoder ) ;
2017-04-24 09:05:14 +00:00
RSASS < PKCS1v15 , SHA1 > : : Signer priv ( privFile ) ;
2017-07-23 20:20:52 +00:00
FileSource f ( messageFilename , true , new SignerFilter ( GlobalRNG ( ) , priv , new HexEncoder ( new FileSink ( signatureFilename ) ) ) ) ;
2015-11-05 06:59:46 +00:00
}
bool RSAVerifyFile ( const char * pubFilename , const char * messageFilename , const char * signatureFilename )
{
FileSource pubFile ( pubFilename , true , new HexDecoder ) ;
2017-04-24 09:05:14 +00:00
RSASS < PKCS1v15 , SHA1 > : : Verifier pub ( pubFile ) ;
2015-11-05 06:59:46 +00:00
FileSource signatureFile ( signatureFilename , true , new HexDecoder ) ;
if ( signatureFile . MaxRetrievable ( ) ! = pub . SignatureLength ( ) )
return false ;
SecByteBlock signature ( pub . SignatureLength ( ) ) ;
signatureFile . Get ( signature , signature . size ( ) ) ;
2017-02-07 23:51:44 +00:00
SignatureVerificationFilter * verifierFilter = new SignatureVerificationFilter ( pub ) ;
2015-11-05 06:59:46 +00:00
verifierFilter - > Put ( signature , pub . SignatureLength ( ) ) ;
FileSource f ( messageFilename , true , verifierFilter ) ;
return verifierFilter - > GetLastResult ( ) ;
}
void DigestFile ( const char * filename )
{
SHA1 sha ;
RIPEMD160 ripemd ;
SHA256 sha256 ;
Tiger tiger ;
SHA512 sha512 ;
Whirlpool whirlpool ;
2017-02-21 07:03:29 +00:00
2015-11-05 06:59:46 +00:00
vector_member_ptrs < HashFilter > filters ( 6 ) ;
filters [ 0 ] . reset ( new HashFilter ( sha ) ) ;
filters [ 1 ] . reset ( new HashFilter ( ripemd ) ) ;
filters [ 2 ] . reset ( new HashFilter ( tiger ) ) ;
filters [ 3 ] . reset ( new HashFilter ( sha256 ) ) ;
filters [ 4 ] . reset ( new HashFilter ( sha512 ) ) ;
filters [ 5 ] . reset ( new HashFilter ( whirlpool ) ) ;
member_ptr < ChannelSwitch > channelSwitch ( new ChannelSwitch ) ;
size_t i ;
for ( i = 0 ; i < filters . size ( ) ; i + + )
channelSwitch - > AddDefaultRoute ( * filters [ i ] ) ;
FileSource ( filename , true , channelSwitch . release ( ) ) ;
2017-02-21 07:03:29 +00:00
HexEncoder encoder ( new FileSink ( std : : cout ) , false ) ;
2015-11-05 06:59:46 +00:00
for ( i = 0 ; i < filters . size ( ) ; i + + )
{
2017-02-21 07:03:29 +00:00
std : : cout < < filters [ i ] - > AlgorithmName ( ) < < " : " ;
2015-11-05 06:59:46 +00:00
filters [ i ] - > TransferTo ( encoder ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < " \n " ;
2015-11-05 06:59:46 +00:00
}
}
void HmacFile ( const char * hexKey , const char * file )
{
member_ptr < MessageAuthenticationCode > mac ;
if ( strcmp ( hexKey , " selftest " ) = = 0 )
{
2017-02-21 07:03:29 +00:00
std : : cerr < < " Computing HMAC/SHA1 value for self test. \n " ;
2015-11-05 06:59:46 +00:00
mac . reset ( NewIntegrityCheckingMAC ( ) ) ;
}
else
{
std : : string decodedKey ;
StringSource ( hexKey , true , new HexDecoder ( new StringSink ( decodedKey ) ) ) ;
mac . reset ( new HMAC < SHA1 > ( ( const byte * ) decodedKey . data ( ) , decodedKey . size ( ) ) ) ;
}
2017-02-21 07:03:29 +00:00
FileSource ( file , true , new HashFilter ( * mac , new HexEncoder ( new FileSink ( std : : cout ) ) ) ) ;
2015-11-05 06:59:46 +00:00
}
void AES_CTR_Encrypt ( const char * hexKey , const char * hexIV , const char * infile , const char * outfile )
{
SecByteBlock key = HexDecodeString ( hexKey ) ;
SecByteBlock iv = HexDecodeString ( hexIV ) ;
CTR_Mode < AES > : : Encryption aes ( key , key . size ( ) , iv ) ;
FileSource ( infile , true , new StreamTransformationFilter ( aes , new FileSink ( outfile ) ) ) ;
}
2017-02-21 07:03:29 +00:00
std : : string EncryptString ( const char * instr , const char * passPhrase )
2015-11-05 06:59:46 +00:00
{
2017-02-21 07:03:29 +00:00
std : : string outstr ;
2015-11-05 06:59:46 +00:00
DefaultEncryptorWithMAC encryptor ( passPhrase , new HexEncoder ( new StringSink ( outstr ) ) ) ;
encryptor . Put ( ( byte * ) instr , strlen ( instr ) ) ;
encryptor . MessageEnd ( ) ;
return outstr ;
}
2017-02-21 07:03:29 +00:00
std : : string DecryptString ( const char * instr , const char * passPhrase )
2015-11-05 06:59:46 +00:00
{
2017-02-21 07:03:29 +00:00
std : : string outstr ;
2015-11-05 06:59:46 +00:00
HexDecoder decryptor ( new DefaultDecryptorWithMAC ( passPhrase , new StringSink ( outstr ) ) ) ;
decryptor . Put ( ( byte * ) instr , strlen ( instr ) ) ;
decryptor . MessageEnd ( ) ;
return outstr ;
}
void EncryptFile ( const char * in , const char * out , const char * passPhrase )
{
FileSource f ( in , true , new DefaultEncryptorWithMAC ( passPhrase , new FileSink ( out ) ) ) ;
}
void DecryptFile ( const char * in , const char * out , const char * passPhrase )
{
FileSource f ( in , true , new DefaultDecryptorWithMAC ( passPhrase , new FileSink ( out ) ) ) ;
}
void SecretShareFile ( int threshold , int nShares , const char * filename , const char * seed )
{
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( nShares > = 1 & & nShares < = 1000 ) ;
2015-11-18 20:32:28 +00:00
if ( nShares < 1 | | nShares > 1000 )
throw InvalidArgument ( " SecretShareFile: " + IntToString ( nShares ) + " is not in range [1, 1000] " ) ;
2015-11-05 06:59:46 +00:00
RandomPool rng ;
rng . IncorporateEntropy ( ( byte * ) seed , strlen ( seed ) ) ;
2017-03-01 11:10:06 +00:00
ChannelSwitch * channelSwitch = NULLPTR ;
2015-11-05 06:59:46 +00:00
FileSource source ( filename , false , new SecretSharing ( rng , threshold , nShares , channelSwitch = new ChannelSwitch ) ) ;
2017-04-14 03:13:07 +00:00
// Be careful of the type of Sink used. An ArraySink will stop writing data once the array
// is full. Also see http://groups.google.com/forum/#!topic/cryptopp-users/XEKKLCEFH3Y.
2015-11-05 06:59:46 +00:00
vector_member_ptrs < FileSink > fileSinks ( nShares ) ;
2017-02-21 07:03:29 +00:00
std : : string channel ;
2015-11-05 06:59:46 +00:00
for ( int i = 0 ; i < nShares ; i + + )
{
char extension [ 5 ] = " .000 " ;
extension [ 1 ] = ' 0 ' + byte ( i / 100 ) ;
extension [ 2 ] = ' 0 ' + byte ( ( i / 10 ) % 10 ) ;
extension [ 3 ] = ' 0 ' + byte ( i % 10 ) ;
2017-02-21 07:03:29 +00:00
fileSinks [ i ] . reset ( new FileSink ( ( std : : string ( filename ) + extension ) . c_str ( ) ) ) ;
2015-11-05 06:59:46 +00:00
channel = WordToString < word32 > ( i ) ;
2015-11-18 20:32:28 +00:00
fileSinks [ i ] - > Put ( ( const byte * ) channel . data ( ) , 4 ) ;
2015-11-05 06:59:46 +00:00
channelSwitch - > AddRoute ( channel , * fileSinks [ i ] , DEFAULT_CHANNEL ) ;
}
source . PumpAll ( ) ;
}
void SecretRecoverFile ( int threshold , const char * outFilename , char * const * inFilenames )
{
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( threshold > = 1 & & threshold < = 1000 ) ;
2015-11-18 20:32:28 +00:00
if ( threshold < 1 | | threshold > 1000 )
throw InvalidArgument ( " SecretRecoverFile: " + IntToString ( threshold ) + " is not in range [1, 1000] " ) ;
2015-11-05 06:59:46 +00:00
SecretRecovery recovery ( threshold , new FileSink ( outFilename ) ) ;
vector_member_ptrs < FileSource > fileSources ( threshold ) ;
SecByteBlock channel ( 4 ) ;
int i ;
for ( i = 0 ; i < threshold ; i + + )
{
fileSources [ i ] . reset ( new FileSource ( inFilenames [ i ] , false ) ) ;
fileSources [ i ] - > Pump ( 4 ) ;
fileSources [ i ] - > Get ( channel , 4 ) ;
2017-02-21 07:03:29 +00:00
fileSources [ i ] - > Attach ( new ChannelSwitch ( recovery , std : : string ( ( char * ) channel . begin ( ) , 4 ) ) ) ;
2015-11-05 06:59:46 +00:00
}
while ( fileSources [ 0 ] - > Pump ( 256 ) )
for ( i = 1 ; i < threshold ; i + + )
fileSources [ i ] - > Pump ( 256 ) ;
for ( i = 0 ; i < threshold ; i + + )
fileSources [ i ] - > PumpAll ( ) ;
}
void InformationDisperseFile ( int threshold , int nShares , const char * filename )
{
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( threshold > = 1 & & threshold < = 1000 ) ;
2015-11-18 20:32:28 +00:00
if ( threshold < 1 | | threshold > 1000 )
throw InvalidArgument ( " InformationDisperseFile: " + IntToString ( nShares ) + " is not in range [1, 1000] " ) ;
2015-11-05 06:59:46 +00:00
2017-03-01 11:10:06 +00:00
ChannelSwitch * channelSwitch = NULLPTR ;
2015-11-05 06:59:46 +00:00
FileSource source ( filename , false , new InformationDispersal ( threshold , nShares , channelSwitch = new ChannelSwitch ) ) ;
2017-04-14 03:13:07 +00:00
// Be careful of the type of Sink used. An ArraySink will stop writing data once the array
// is full. Also see http://groups.google.com/forum/#!topic/cryptopp-users/XEKKLCEFH3Y.
2015-11-05 06:59:46 +00:00
vector_member_ptrs < FileSink > fileSinks ( nShares ) ;
2017-02-21 07:03:29 +00:00
std : : string channel ;
2015-11-05 06:59:46 +00:00
for ( int i = 0 ; i < nShares ; i + + )
{
char extension [ 5 ] = " .000 " ;
extension [ 1 ] = ' 0 ' + byte ( i / 100 ) ;
extension [ 2 ] = ' 0 ' + byte ( ( i / 10 ) % 10 ) ;
extension [ 3 ] = ' 0 ' + byte ( i % 10 ) ;
2017-02-21 07:03:29 +00:00
fileSinks [ i ] . reset ( new FileSink ( ( std : : string ( filename ) + extension ) . c_str ( ) ) ) ;
2015-11-05 06:59:46 +00:00
channel = WordToString < word32 > ( i ) ;
2015-11-18 20:32:28 +00:00
fileSinks [ i ] - > Put ( ( const byte * ) channel . data ( ) , 4 ) ;
2015-11-05 06:59:46 +00:00
channelSwitch - > AddRoute ( channel , * fileSinks [ i ] , DEFAULT_CHANNEL ) ;
}
source . PumpAll ( ) ;
}
void InformationRecoverFile ( int threshold , const char * outFilename , char * const * inFilenames )
{
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( threshold < = 1000 ) ;
2015-11-18 20:32:28 +00:00
if ( threshold < 1 | | threshold > 1000 )
throw InvalidArgument ( " InformationRecoverFile: " + IntToString ( threshold ) + " is not in range [1, 1000] " ) ;
2015-11-05 06:59:46 +00:00
InformationRecovery recovery ( threshold , new FileSink ( outFilename ) ) ;
vector_member_ptrs < FileSource > fileSources ( threshold ) ;
SecByteBlock channel ( 4 ) ;
int i ;
for ( i = 0 ; i < threshold ; i + + )
{
fileSources [ i ] . reset ( new FileSource ( inFilenames [ i ] , false ) ) ;
fileSources [ i ] - > Pump ( 4 ) ;
fileSources [ i ] - > Get ( channel , 4 ) ;
2017-02-21 07:03:29 +00:00
fileSources [ i ] - > Attach ( new ChannelSwitch ( recovery , std : : string ( ( char * ) channel . begin ( ) , 4 ) ) ) ;
2015-11-05 06:59:46 +00:00
}
while ( fileSources [ 0 ] - > Pump ( 256 ) )
for ( i = 1 ; i < threshold ; i + + )
fileSources [ i ] - > Pump ( 256 ) ;
for ( i = 0 ; i < threshold ; i + + )
fileSources [ i ] - > PumpAll ( ) ;
}
void GzipFile ( const char * in , const char * out , int deflate_level )
{
// FileSource(in, true, new Gzip(new FileSink(out), deflate_level));
// use a filter graph to compare decompressed data with original
//
// Source ----> Gzip ------> Sink
// \ |
// \ Gunzip
// \ |
// \ v
2016-07-24 23:28:01 +00:00
// > ComparisonFilter
2015-11-05 06:59:46 +00:00
EqualityComparisonFilter comparison ;
Gunzip gunzip ( new ChannelSwitch ( comparison , " 0 " ) ) ;
gunzip . SetAutoSignalPropagation ( 0 ) ;
FileSink sink ( out ) ;
ChannelSwitch * cs ;
Gzip gzip ( cs = new ChannelSwitch ( sink ) , deflate_level ) ;
cs - > AddDefaultRoute ( gunzip ) ;
cs = new ChannelSwitch ( gzip ) ;
cs - > AddDefaultRoute ( comparison , " 1 " ) ;
FileSource source ( in , true , cs ) ;
comparison . ChannelMessageSeriesEnd ( " 0 " ) ;
comparison . ChannelMessageSeriesEnd ( " 1 " ) ;
}
void GunzipFile ( const char * in , const char * out )
{
FileSource ( in , true , new Gunzip ( new FileSink ( out ) ) ) ;
}
void Base64Encode ( const char * in , const char * out )
{
FileSource ( in , true , new Base64Encoder ( new FileSink ( out ) ) ) ;
}
void Base64Decode ( const char * in , const char * out )
{
FileSource ( in , true , new Base64Decoder ( new FileSink ( out ) ) ) ;
}
void HexEncode ( const char * in , const char * out )
{
FileSource ( in , true , new HexEncoder ( new FileSink ( out ) ) ) ;
}
void HexDecode ( const char * in , const char * out )
{
FileSource ( in , true , new HexDecoder ( new FileSink ( out ) ) ) ;
}
void ForwardTcpPort ( const char * sourcePortName , const char * destinationHost , const char * destinationPortName )
{
2016-05-03 04:23:05 +00:00
// Quiet warnings for Windows Phone and Windows Store builds
CRYPTOPP_UNUSED ( sourcePortName ) , CRYPTOPP_UNUSED ( destinationHost ) , CRYPTOPP_UNUSED ( destinationPortName ) ;
2015-11-05 06:59:46 +00:00
# ifdef SOCKETS_AVAILABLE
SocketsInitializer sockInit ;
Socket sockListen , sockSource , sockDestination ;
int sourcePort = Socket : : PortNameToNumber ( sourcePortName ) ;
int destinationPort = Socket : : PortNameToNumber ( destinationPortName ) ;
sockListen . Create ( ) ;
sockListen . Bind ( sourcePort ) ;
2016-07-24 23:28:01 +00:00
2016-10-10 23:50:45 +00:00
const int flag = 1 ;
int err = setsockopt ( sockListen , IPPROTO_TCP , TCP_NODELAY , ( char * ) & flag , sizeof ( int ) ) ;
2016-09-16 15:27:15 +00:00
CRYPTOPP_ASSERT ( err = = 0 ) ;
2015-11-18 20:32:28 +00:00
if ( err ! = 0 )
throw Socket : : Err ( sockListen , " setsockopt " , sockListen . GetLastError ( ) ) ;
2016-07-24 23:28:01 +00:00
2017-02-21 07:03:29 +00:00
std : : cout < < " Listing on port " < < sourcePort < < " . \n " ;
2015-11-05 06:59:46 +00:00
sockListen . Listen ( ) ;
sockListen . Accept ( sockSource ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Connection accepted on port " < < sourcePort < < " . \n " ;
2015-11-05 06:59:46 +00:00
sockListen . CloseSocket ( ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Making connection to " < < destinationHost < < " , port " < < destinationPort < < " . \n " ;
2015-11-05 06:59:46 +00:00
sockDestination . Create ( ) ;
sockDestination . Connect ( destinationHost , destinationPort ) ;
2017-02-21 07:03:29 +00:00
std : : cout < < " Connection made to " < < destinationHost < < " , starting to forward. \n " ;
2015-11-05 06:59:46 +00:00
SocketSource out ( sockSource , false , new SocketSink ( sockDestination ) ) ;
SocketSource in ( sockDestination , false , new SocketSink ( sockSource ) ) ;
WaitObjectContainer waitObjects ;
while ( ! ( in . SourceExhausted ( ) & & out . SourceExhausted ( ) ) )
{
waitObjects . Clear ( ) ;
2017-03-01 11:10:06 +00:00
out . GetWaitObjects ( waitObjects , CallStack ( " ForwardTcpPort - out " , NULLPTR ) ) ;
in . GetWaitObjects ( waitObjects , CallStack ( " ForwardTcpPort - in " , NULLPTR ) ) ;
2015-11-05 06:59:46 +00:00
waitObjects . Wait ( INFINITE_TIME ) ;
if ( ! out . SourceExhausted ( ) )
{
2017-02-21 07:03:29 +00:00
std : : cout < < " o " < < std : : flush ;
2015-11-05 06:59:46 +00:00
out . PumpAll2 ( false ) ;
if ( out . SourceExhausted ( ) )
2017-02-21 07:03:29 +00:00
std : : cout < < " EOF received on source socket. \n " ;
2015-11-05 06:59:46 +00:00
}
if ( ! in . SourceExhausted ( ) )
{
2017-02-21 07:03:29 +00:00
std : : cout < < " i " < < std : : flush ;
2015-11-05 06:59:46 +00:00
in . PumpAll2 ( false ) ;
if ( in . SourceExhausted ( ) )
2017-02-21 07:03:29 +00:00
std : : cout < < " EOF received on destination socket. \n " ;
2015-11-05 06:59:46 +00:00
}
}
# else
2017-02-21 07:03:29 +00:00
std : : cout < < " Socket support was not enabled at compile time. \n " ;
2015-11-05 06:59:46 +00:00
exit ( - 1 ) ;
# endif
}
bool Validate ( int alg , bool thorough , const char * seedInput )
{
bool result ;
2015-11-18 20:32:28 +00:00
// Some editors have problems with the '\0' character when redirecting output.
// seedInput is argv[3] when issuing 'cryptest.exe v all <seed>'
2017-09-20 22:43:51 +00:00
std : : string seed = ( seedInput ? seedInput : IntToString ( : : time ( NULLPTR ) ) ) ;
2015-11-18 20:32:28 +00:00
seed . resize ( 16 , ' ' ) ;
2017-07-23 20:20:52 +00:00
OFB_Mode < AES > : : Encryption & prng = dynamic_cast < OFB_Mode < AES > : : Encryption & > ( GlobalRNG ( ) ) ;
2015-11-05 06:59:46 +00:00
prng . SetKeyWithIV ( ( byte * ) seed . data ( ) , 16 , ( byte * ) seed . data ( ) ) ;
2017-09-20 22:43:51 +00:00
g_testBegin = : : time ( NULLPTR ) ;
2015-11-05 06:59:46 +00:00
PrintSeedAndThreads ( seed ) ;
switch ( alg )
{
2017-07-23 20:20:52 +00:00
case 0 : result = ValidateAll ( thorough ) ; break ;
case 1 : result = TestSettings ( ) ; break ;
case 2 : result = TestOS_RNG ( ) ; break ;
// case 3: result = TestSecRandom(); break;
case 4 : result = ValidateMD5 ( ) ; break ;
case 5 : result = ValidateSHA ( ) ; break ;
case 6 : result = ValidateDES ( ) ; break ;
case 7 : result = ValidateIDEA ( ) ; break ;
case 8 : result = ValidateARC4 ( ) ; break ;
case 9 : result = ValidateRC5 ( ) ; break ;
case 10 : result = ValidateBlowfish ( ) ; break ;
// case 11: result = ValidateDiamond2(); break;
case 12 : result = ValidateThreeWay ( ) ; break ;
case 13 : result = ValidateBBS ( ) ; break ;
case 14 : result = ValidateDH ( ) ; break ;
case 15 : result = ValidateRSA ( ) ; break ;
case 16 : result = ValidateElGamal ( ) ; break ;
case 17 : result = ValidateDSA ( thorough ) ; break ;
// case 18: result = ValidateHAVAL(); break;
case 19 : result = ValidateSAFER ( ) ; break ;
case 20 : result = ValidateLUC ( ) ; break ;
case 21 : result = ValidateRabin ( ) ; break ;
// case 22: result = ValidateBlumGoldwasser(); break;
case 23 : result = ValidateECP ( ) ; break ;
case 24 : result = ValidateEC2N ( ) ; break ;
// case 25: result = ValidateMD5MAC(); break;
case 26 : result = ValidateGOST ( ) ; break ;
case 27 : result = ValidateTiger ( ) ; break ;
case 28 : result = ValidateRIPEMD ( ) ; break ;
case 29 : result = ValidateHMAC ( ) ; break ;
// case 30: result = ValidateXMACC(); break;
case 31 : result = ValidateSHARK ( ) ; break ;
case 32 : result = ValidateLUC_DH ( ) ; break ;
case 33 : result = ValidateLUC_DL ( ) ; break ;
case 34 : result = ValidateSEAL ( ) ; break ;
case 35 : result = ValidateCAST ( ) ; break ;
case 36 : result = ValidateSquare ( ) ; break ;
case 37 : result = ValidateRC2 ( ) ; break ;
case 38 : result = ValidateRC6 ( ) ; break ;
case 39 : result = ValidateMARS ( ) ; break ;
case 40 : result = ValidateRW ( ) ; break ;
case 41 : result = ValidateMD2 ( ) ; break ;
case 42 : result = ValidateNR ( ) ; break ;
case 43 : result = ValidateMQV ( ) ; break ;
case 44 : result = ValidateRijndael ( ) ; break ;
case 45 : result = ValidateTwofish ( ) ; break ;
case 46 : result = ValidateSerpent ( ) ; break ;
case 47 : result = ValidateCipherModes ( ) ; break ;
case 48 : result = ValidateCRC32 ( ) ; break ;
case 49 : result = ValidateCRC32C ( ) ; break ;
case 50 : result = ValidateECDSA ( ) ; break ;
2017-11-25 08:27:07 +00:00
case 51 : result = ValidateECGDSA ( thorough ) ; break ;
2017-07-23 20:20:52 +00:00
case 52 : result = ValidateXTR_DH ( ) ; break ;
case 53 : result = ValidateSKIPJACK ( ) ; break ;
case 54 : result = ValidateSHA2 ( ) ; break ;
case 55 : result = ValidatePanama ( ) ; break ;
case 56 : result = ValidateAdler32 ( ) ; break ;
case 57 : result = ValidateMD4 ( ) ; break ;
case 58 : result = ValidatePBKDF ( ) ; break ;
2018-04-01 00:09:38 +00:00
case 59 : result = ValidateHKDF ( ) ; break ;
case 60 : result = ValidateScrypt ( ) ; break ;
case 61 : result = ValidateESIGN ( ) ; break ;
case 62 : result = ValidateDLIES ( ) ; break ;
case 63 : result = ValidateBaseCode ( ) ; break ;
case 64 : result = ValidateSHACAL2 ( ) ; break ;
case 65 : result = ValidateARIA ( ) ; break ;
case 66 : result = ValidateCamellia ( ) ; break ;
case 67 : result = ValidateWhirlpool ( ) ; break ;
case 68 : result = ValidateTTMAC ( ) ; break ;
case 69 : result = ValidateSalsa ( ) ; break ;
case 70 : result = ValidateSosemanuk ( ) ; break ;
2018-07-04 07:47:28 +00:00
case 71 : result = ValidateRabbit ( ) ; break ;
case 72 : result = ValidateVMAC ( ) ; break ;
case 73 : result = ValidateCCM ( ) ; break ;
case 74 : result = ValidateGCM ( ) ; break ;
case 75 : result = ValidateCMAC ( ) ; break ;
case 76 : result = ValidateSM3 ( ) ; break ;
case 77 : result = ValidateBLAKE2s ( ) ; break ;
case 78 : result = ValidateBLAKE2b ( ) ; break ;
case 79 : result = ValidatePoly1305 ( ) ; break ;
case 80 : result = ValidateSipHash ( ) ; break ;
case 81 : result = ValidateHashDRBG ( ) ; break ;
case 82 : result = ValidateHmacDRBG ( ) ; break ;
case 83 : result = ValidateNaCl ( ) ; break ;
case 84 : result = ValidateSIMECK ( ) ; break ;
case 85 : result = ValidateCHAM ( ) ; break ;
2016-12-24 09:56:34 +00:00
2017-05-06 04:24:35 +00:00
# if defined(CRYPTOPP_EXTENDED_VALIDATION)
2016-12-24 09:56:34 +00:00
// http://github.com/weidai11/cryptopp/issues/92
2017-07-23 20:20:52 +00:00
case 9999 : result = TestSecBlock ( ) ; break ;
2016-12-24 09:56:34 +00:00
// http://github.com/weidai11/cryptopp/issues/64
2017-07-23 20:20:52 +00:00
case 9998 : result = TestPolynomialMod2 ( ) ; break ;
2016-12-24 09:56:34 +00:00
// http://github.com/weidai11/cryptopp/issues/336
2017-07-23 20:20:52 +00:00
case 9997 : result = TestIntegerBitops ( ) ; break ;
2018-03-25 04:43:21 +00:00
// http://github.com/weidai11/cryptopp/issues/602
case 9996 : result = TestIntegerOps ( ) ; break ;
2017-01-11 03:09:38 +00:00
// http://github.com/weidai11/cryptopp/issues/360
2018-03-25 04:43:21 +00:00
case 9995 : result = TestRounding ( ) ; break ;
2016-12-24 09:56:34 +00:00
// http://github.com/weidai11/cryptopp/issues/242
2018-03-25 04:43:21 +00:00
case 9994 : result = TestHuffmanCodes ( ) ; break ;
2016-12-24 09:56:34 +00:00
// http://github.com/weidai11/cryptopp/issues/346
2018-03-25 04:43:21 +00:00
case 9993 : result = TestASN1Parse ( ) ; break ;
2016-12-24 09:56:34 +00:00
# endif
2015-11-05 06:59:46 +00:00
default : return false ;
}
2017-09-20 22:43:51 +00:00
g_testEnd = : : time ( NULLPTR ) ;
2015-11-05 06:59:46 +00:00
2017-03-08 21:59:24 +00:00
std : : cout < < " \n Seed used was " < < seed < < std : : endl ;
2017-07-23 20:20:52 +00:00
std : : cout < < " Test started at " < < TimeToString ( g_testBegin ) < < std : : endl ;
std : : cout < < " Test ended at " < < TimeToString ( g_testEnd ) < < std : : endl ;
2015-11-05 06:59:46 +00:00
return result ;
}
2017-07-23 20:20:52 +00:00
NAMESPACE_END // Test
NAMESPACE_END // CryptoPP
// Microsoft puts a byte in global namespace. Combined with
// a 'using namespace CryptoPP', it causes compile failures.
// Also see http://github.com/weidai11/cryptopp/issues/442
// and http://github.com/weidai11/cryptopp/issues/447.
int CRYPTOPP_API main ( int argc , char * argv [ ] )
{
return CryptoPP : : Test : : scoped_main ( argc , argv ) ;
}