12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514 |
- /* mcapi_test.c
- *
- * Copyright (C) 2006-2024 wolfSSL Inc.
- *
- * This file is part of wolfSSL.
- *
- * wolfSSL is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * wolfSSL is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
- */
- /* Tests Microchip CRYPTO API layer */
- #ifdef HAVE_CONFIG_H
- #include <config.h>
- #endif
- /* mc api header */
- #include <wolfssl/wolfcrypt/settings.h>
- #include "crypto.h"
- /* sanity test against our default implementation, wolfssl headers */
- #include <wolfssl/wolfcrypt/md5.h>
- #include <wolfssl/wolfcrypt/sha.h>
- #include <wolfssl/wolfcrypt/sha256.h>
- #include <wolfssl/wolfcrypt/sha512.h>
- #include <wolfssl/wolfcrypt/hmac.h>
- #include <wolfssl/wolfcrypt/compress.h>
- #include <wolfssl/wolfcrypt/random.h>
- #include <wolfssl/wolfcrypt/des3.h>
- #include <wolfssl/wolfcrypt/aes.h>
- #include <wolfssl/wolfcrypt/ecc.h>
- #include <wolfssl/wolfcrypt/rsa.h>
- #define USE_CERT_BUFFERS_1024
- #include <wolfssl/certs_test.h>
- #if defined(WOLFSSL_MICROCHIP_PIC32MZ)
- #define MICROCHIP_PIC32
- #include <xc.h>
- #pragma config ICESEL = ICS_PGx2
- /* ICE/ICD Comm Channel Select (Communicate on PGEC2/PGED2) */
- #include <stdio.h>
- #include <stdlib.h>
- #include "PIC32MZ-serial.h"
- #define SYSTEMConfigPerformance(n) /* void out SYSTEMConfigPerformance(); */
- #elif defined(MICROCHIP_PIC32)
- #define PIC32_STARTER_KIT
- #include <stdio.h>
- #include <stdlib.h>
- #include <p32xxxx.h>
- #define _SUPPRESS_PLIB_WARNING
- #define _DISABLE_OPENADC10_CONFIGPORT_WARNING
- #include <plib.h>
- #include <sys/appio.h>
- #define init_serial() /* void out init_serial() */
- #else
- #include <stdio.h> /* order matters above ? */
- #endif
- #define OUR_DATA_SIZE 1024
- static byte ourData[OUR_DATA_SIZE];
- static byte* key = NULL;
- static byte* iv = NULL;
- static CRYPT_RNG_CTX mcRng;
- static WC_RNG defRng;
- static int check_md5(void);
- static int check_sha(void);
- static int check_sha256(void);
- static int check_sha384(void);
- static int check_sha512(void);
- static int check_hmac(void);
- static int check_compress(void);
- static int check_rng(void);
- static int check_des3(void);
- static int check_aescbc(void);
- static int check_aesctr(void);
- static int check_aesdirect(void);
- static int check_rsa(void);
- static int check_ecc(void);
- int main(int argc, char** argv)
- {
- int ret;
- int i;
- (void)argc;
- (void)argv;
- #if defined(MICROCHIP_PIC32)
- init_serial() ; /* initialize PIC32MZ serial I/O */
- SYSTEMConfigPerformance(80000000);
- DBINIT();
- #endif
- /* align key, iv pointers */
- key = (byte*)XMALLOC(32, NULL, DYNAMIC_TYPE_KEY);
- if (key == NULL) {
- printf("mcapi key alloc failed\n");
- return -1;
- }
- iv = (byte*)XMALLOC(16, NULL, DYNAMIC_TYPE_KEY);
- if (iv == NULL) {
- printf("mcapi iv alloc failed\n");
- return -1;
- }
- for (i = 0; i < OUR_DATA_SIZE; i++)
- ourData[i] = (byte)i;
- ret = check_md5();
- if (ret != 0) {
- printf("mcapi check_md5 failed\n");
- return -1;
- }
- ret = check_sha();
- if (ret != 0) {
- printf("mcapi check_sha failed\n");
- return -1;
- }
- ret = check_sha256();
- if (ret != 0) {
- printf("mcapi check_sha256 failed\n");
- return -1;
- }
- ret = check_sha384();
- if (ret != 0) {
- printf("mcapi check_sha384 failed\n");
- return -1;
- }
- ret = check_sha512();
- if (ret != 0) {
- printf("mcapi check_sha512 failed\n");
- return -1;
- }
- ret = check_hmac();
- if (ret != 0) {
- printf("mcapi check_hmac failed\n");
- return -1;
- }
- ret = check_compress();
- if (ret != 0) {
- printf("mcapi check_compress failed\n");
- return -1;
- }
- ret = check_rng();
- if (ret != 0) {
- printf("mcapi check_rng failed\n");
- return -1;
- }
- ret = check_des3();
- if (ret != 0) {
- printf("mcapi check_des3 failed\n");
- return -1;
- }
- ret = check_aescbc();
- if (ret != 0) {
- printf("mcapi check_aes cbc failed\n");
- return -1;
- }
- ret = check_aesctr();
- if (ret != 0) {
- printf("mcapi check_aes ctr failed\n");
- return -1;
- }
- ret = check_aesdirect();
- if (ret != 0) {
- printf("mcapi check_aes direct failed\n");
- return -1;
- }
- ret = check_rsa();
- if (ret != 0) {
- printf("mcapi check_rsa failed\n");
- return -1;
- }
- ret = check_ecc();
- if (ret != 0) {
- printf("mcapi check_ecc failed\n");
- return -1;
- }
- XFREE(iv, NULL, DYNAMIC_TYPE_KEY);
- XFREE(key, NULL, DYNAMIC_TYPE_KEY);
- return 0;
- }
- /* check mcapi md5 against internal */
- static int check_md5(void)
- {
- CRYPT_MD5_CTX mcMd5;
- Md5 defMd5;
- int ret;
- byte mcDigest[CRYPT_MD5_DIGEST_SIZE];
- byte defDigest[MD5_DIGEST_SIZE];
- CRYPT_MD5_Initialize(&mcMd5);
- ret = wc_InitMd5(&defMd5);
- if (ret == 0) {
- CRYPT_MD5_DataAdd(&mcMd5, ourData, OUR_DATA_SIZE);
- ret = wc_Md5Update(&defMd5, ourData, OUR_DATA_SIZE);
- }
- if (ret == 0) {
- CRYPT_MD5_Finalize(&mcMd5, mcDigest);
- ret = wc_Md5Final(&defMd5, defDigest);
- }
- if (ret != 0) {
- printf("md5 failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_MD5_DIGEST_SIZE) != 0) {
- printf("md5 final memcmp failed\n");
- return -1;
- }
- printf("md5 mcapi test passed\n");
- return ret;
- }
- /* check mcapi sha against internal */
- static int check_sha(void)
- {
- CRYPT_SHA_CTX mcSha;
- Sha defSha;
- int ret = 0;
- byte mcDigest[CRYPT_SHA_DIGEST_SIZE];
- byte defDigest[SHA_DIGEST_SIZE];
- CRYPT_SHA_Initialize(&mcSha);
- ret = wc_InitSha(&defSha);
- if (ret != 0) {
- printf("sha init default failed\n");
- return -1;
- }
- CRYPT_SHA_DataAdd(&mcSha, ourData, OUR_DATA_SIZE);
- wc_ShaUpdate(&defSha, ourData, OUR_DATA_SIZE);
- CRYPT_SHA_Finalize(&mcSha, mcDigest);
- wc_ShaFinal(&defSha, defDigest);
- if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
- printf("sha final memcmp failed\n");
- return -1;
- }
- printf("sha mcapi test passed\n");
- return 0;
- }
- /* check mcapi sha256 against internal */
- static int check_sha256(void)
- {
- CRYPT_SHA256_CTX mcSha256;
- wc_Sha256 defSha256;
- int ret;
- byte mcDigest[CRYPT_SHA256_DIGEST_SIZE];
- byte defDigest[WC_SHA256_DIGEST_SIZE];
- CRYPT_SHA256_Initialize(&mcSha256);
- ret = wc_InitSha256(&defSha256);
- if (ret != 0) {
- printf("sha256 init default failed\n");
- return -1;
- }
- CRYPT_SHA256_DataAdd(&mcSha256, ourData, OUR_DATA_SIZE);
- ret = wc_Sha256Update(&defSha256, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("sha256 update default failed\n");
- return -1;
- }
- CRYPT_SHA256_Finalize(&mcSha256, mcDigest);
- ret = wc_Sha256Final(&defSha256, defDigest);
- if (ret != 0) {
- printf("sha256 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
- printf("sha256 final memcmp failed\n");
- return -1;
- }
- printf("sha256 mcapi test passed\n");
- return 0;
- }
- /* check mcapi sha384 against internal */
- static int check_sha384(void)
- {
- CRYPT_SHA384_CTX mcSha384;
- wc_Sha384 defSha384;
- int ret;
- byte mcDigest[CRYPT_SHA384_DIGEST_SIZE];
- byte defDigest[WC_SHA384_DIGEST_SIZE];
- CRYPT_SHA384_Initialize(&mcSha384);
- ret = wc_InitSha384(&defSha384);
- if (ret != 0) {
- printf("sha384 init default failed\n");
- return -1;
- }
- CRYPT_SHA384_DataAdd(&mcSha384, ourData, OUR_DATA_SIZE);
- ret = wc_Sha384Update(&defSha384, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("sha384 update default failed\n");
- return -1;
- }
- CRYPT_SHA384_Finalize(&mcSha384, mcDigest);
- ret = wc_Sha384Final(&defSha384, defDigest);
- if (ret != 0) {
- printf("sha384 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
- printf("sha384 final memcmp failed\n");
- return -1;
- }
- printf("sha384 mcapi test passed\n");
- return 0;
- }
- /* check mcapi sha512 against internal */
- static int check_sha512(void)
- {
- CRYPT_SHA512_CTX mcSha512;
- wc_Sha512 defSha512;
- int ret;
- byte mcDigest[CRYPT_SHA512_DIGEST_SIZE];
- byte defDigest[WC_SHA512_DIGEST_SIZE];
- CRYPT_SHA512_Initialize(&mcSha512);
- ret = wc_InitSha512(&defSha512);
- if (ret != 0) {
- printf("sha512 init default failed\n");
- return -1;
- }
- CRYPT_SHA512_DataAdd(&mcSha512, ourData, OUR_DATA_SIZE);
- ret = wc_Sha512Update(&defSha512, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("sha512 update default failed\n");
- return -1;
- }
- CRYPT_SHA512_Finalize(&mcSha512, mcDigest);
- ret = wc_Sha512Final(&defSha512, defDigest);
- if (ret != 0) {
- printf("sha512 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
- printf("sha512 final memcmp failed\n");
- return -1;
- }
- printf("sha512 mcapi test passed\n");
- return 0;
- }
- /* check mcapi hmac against internal */
- static int check_hmac(void)
- {
- CRYPT_HMAC_CTX mcHmac;
- Hmac defHmac;
- int ret;
- byte mcDigest[CRYPT_SHA512_DIGEST_SIZE];
- byte defDigest[WC_SHA512_DIGEST_SIZE];
- memcpy((char*)key, "Jefe", 4);
- /* SHA1 */
- CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA, key, 4);
- ret = wc_HmacSetKey(&defHmac, WC_SHA, key, 4);
- if (ret != 0) {
- printf("hmac sha setkey default failed\n");
- return -1;
- }
- CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
- ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("hmac sha update default failed\n");
- return -1;
- }
- CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
- ret = wc_HmacFinal(&defHmac, defDigest);
- if (ret != 0) {
- printf("hmac sha final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
- printf("hmac sha final memcmp failed\n");
- return -1;
- }
- printf("hmac sha mcapi test passed\n");
- /* SHA-256 */
- CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA256, key, 4);
- ret = wc_HmacSetKey(&defHmac, WC_SHA256, key, 4);
- if (ret != 0) {
- printf("hmac sha256 setkey default failed\n");
- return -1;
- }
- CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
- ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("hmac sha256 update default failed\n");
- return -1;
- }
- CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
- ret = wc_HmacFinal(&defHmac, defDigest);
- if (ret != 0) {
- printf("hmac sha256 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
- printf("hmac sha256 final memcmp failed\n");
- return -1;
- }
- printf("hmac sha256 mcapi test passed\n");
- /* SHA-384 */
- CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA384, key, 4);
- ret = wc_HmacSetKey(&defHmac, WC_SHA384, key, 4);
- if (ret != 0) {
- printf("hmac sha384 setkey default failed\n");
- return -1;
- }
- CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
- ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("hmac sha384 update default failed\n");
- return -1;
- }
- CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
- ret = wc_HmacFinal(&defHmac, defDigest);
- if (ret != 0) {
- printf("hmac sha384 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
- printf("hmac sha384 final memcmp failed\n");
- return -1;
- }
- printf("hmac sha384 mcapi test passed\n");
- /* SHA-512 */
- CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA512, key, 4);
- ret = wc_HmacSetKey(&defHmac, WC_SHA512, key, 4);
- if (ret != 0) {
- printf("hmac sha512 setkey default failed\n");
- return -1;
- }
- CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
- ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
- if (ret != 0) {
- printf("hmac sha512 update default failed\n");
- return -1;
- }
- CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
- ret = wc_HmacFinal(&defHmac, defDigest);
- if (ret != 0) {
- printf("hmac sha512 final default failed\n");
- return -1;
- }
- if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
- printf("hmac sha512 final memcmp failed\n");
- return -1;
- }
- printf("hmac sha512 mcapi test passed\n");
- return 0;
- }
- /* check mcapi compress against internal */
- static int check_compress(void)
- {
- const unsigned char text[] =
- "Biodiesel cupidatat marfa, cliche aute put a bird on it incididunt elit\n"
- "polaroid. Sunt tattooed bespoke reprehenderit. Sint twee organic id\n"
- "marfa. Commodo veniam ad esse gastropub. 3 wolf moon sartorial vero,\n"
- "plaid delectus biodiesel squid +1 vice. Post-ironic keffiyeh leggings\n"
- "selfies cray fap hoodie, forage anim. Carles cupidatat shoreditch, VHS\n"
- "small batch meggings kogi dolore food truck bespoke gastropub.\n"
- "\n"
- "Terry richardson adipisicing actually typewriter tumblr, twee whatever\n"
- "four loko you probably haven't heard of them high life. Messenger bag\n"
- "whatever tattooed deep v mlkshk. Brooklyn pinterest assumenda chillwave\n"
- "et, banksy ullamco messenger bag umami pariatur direct trade forage.\n"
- "Typewriter culpa try-hard, pariatur sint brooklyn meggings. Gentrify\n"
- "food truck next level, tousled irony non semiotics PBR ethical anim cred\n"
- "readymade. Mumblecore brunch lomo odd future, portland organic terry\n"
- "four loko whatever street art yr farm-to-table.\n";
- unsigned int inSz = sizeof(text);
- unsigned int outSz;
- unsigned char cBuffer[1024];
- unsigned char dBuffer[1024];
- int ret1, ret2;
- /* dynamic */
- ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 0);
- ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 0);
- if (ret1 != ret2 || ret1 < 0) {
- printf("compress dynamic ret failed\n");
- return -1;
- }
- outSz = ret1;
- if (memcmp(cBuffer, dBuffer, outSz) != 0) {
- printf("compress dynamic cmp failed\n");
- return -1;
- }
- ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
- if (memcmp(dBuffer, text, inSz) != 0) {
- printf("mcapi decompress dynamic cmp failed\n");
- return -1;
- }
- memset(dBuffer, 0, sizeof(dBuffer));
- ret2 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
- if (ret1 != ret2 || ret2 < 0) {
- printf("decompress dynamic ret failed\n");
- }
- if (memcmp(dBuffer, text, inSz) != 0) {
- printf("decompress dynamic cmp failed\n");
- return -1;
- }
- memset(cBuffer, 0, sizeof(cBuffer));
- memset(dBuffer, 0, sizeof(dBuffer));
- /* static */
- ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 1);
- ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 1);
- if (ret1 != ret2 || ret1 < 0) {
- printf("compress static ret failed\n");
- return -1;
- }
- outSz = ret1;
- if (memcmp(cBuffer, dBuffer, outSz) != 0) {
- printf("compress static cmp failed\n");
- return -1;
- }
- ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
- if (memcmp(dBuffer, text, inSz) != 0) {
- printf("mcapi decompress static cmp failed\n");
- return -1;
- }
- memset(dBuffer, 0, sizeof(dBuffer));
- ret2 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
- if (ret1 != ret2 || ret2 < 0) {
- printf("decompress static ret failed\n");
- }
- if (memcmp(dBuffer, text, inSz) != 0) {
- printf("decompress static cmp failed\n");
- return -1;
- }
- printf("huffman mcapi test passed\n");
- return 0;
- }
- #define RANDOM_BYTE_SZ 32
- /* check mcapi rng */
- static int check_rng(void)
- {
- int ret;
- int i;
- byte in[RANDOM_BYTE_SZ];
- byte out[RANDOM_BYTE_SZ];
- for (i = 0; i < RANDOM_BYTE_SZ; i++)
- in[i] = (byte)i;
- for (i = 0; i < RANDOM_BYTE_SZ; i++)
- out[i] = (byte)i;
- ret = wc_InitRng(&defRng);
- if (ret != 0) {
- printf("default rng init failed\n");
- return -1;
- }
- ret = CRYPT_RNG_Initialize(&mcRng);
- if (ret != 0) {
- printf("mcapi rng init failed\n");
- return -1;
- }
- ret = CRYPT_RNG_Get(&mcRng, &out[0]);
- if (ret != 0) {
- printf("mcapi rng get failed\n");
- return -1;
- }
- ret = CRYPT_RNG_BlockGenerate(&mcRng, out, RANDOM_BYTE_SZ);
- if (ret != 0) {
- printf("mcapi rng block gen failed\n");
- return -1;
- }
- if (memcmp(in, out, RANDOM_BYTE_SZ) == 0) {
- printf("mcapi rng block gen output failed\n");
- return -1;
- }
- printf("rng mcapi test passed\n");
- return 0;
- }
- #define TDES_TEST_SIZE 32
- /* check mcapi des3 */
- static int check_des3(void)
- {
- CRYPT_TDES_CTX mcDes3;
- Des3 defDes3;
- int ret;
- byte out1[TDES_TEST_SIZE];
- byte out2[TDES_TEST_SIZE];
- memcpy((char*)key, "1234567890abcdefghijklmn", 24);
- memcpy((char*)iv, "12345678", 8);
- /* cbc encrypt */
- ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi tdes key set failed\n");
- return -1;
- }
- ret = wc_Des3_SetKey(&defDes3, key, iv, DES_ENCRYPTION);
- if (ret != 0) {
- printf("default des3 key set failed\n");
- return -1;
- }
- ret = CRYPT_TDES_CBC_Encrypt(&mcDes3, out1, ourData, TDES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi tdes cbc encrypt failed\n");
- return -1;
- }
- ret = wc_Des3_CbcEncrypt(&defDes3, out2, ourData, TDES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi default tdes cbc encrypt failed\n");
- return -1;
- }
- if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
- printf("mcapi tdes cbc encrypt cmp failed\n");
- return -1;
- }
- /* cbc decrypt */
- ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi tdes key set failed\n");
- return -1;
- }
- ret = wc_Des3_SetKey(&defDes3, key, iv, DES_DECRYPTION);
- if (ret != 0) {
- printf("default des3 key set failed\n");
- return -1;
- }
- ret = CRYPT_TDES_CBC_Decrypt(&mcDes3, out2, out1, TDES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi tdes cbc decrypt failed\n");
- return -1;
- }
- ret = wc_Des3_CbcDecrypt(&defDes3, out1, out1, TDES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi default tdes cbc decrypt failed\n");
- return -1;
- }
- if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
- printf("mcapi tdes cbc decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, TDES_TEST_SIZE) != 0) {
- printf("mcapi tdes cbc decrypt orig cmp failed\n");
- return -1;
- }
- printf("tdes mcapi test passed\n");
- return 0;
- }
- #define AES_TEST_SIZE 32
- /* check mcapi aes cbc */
- static int check_aescbc(void)
- {
- CRYPT_AES_CTX mcAes;
- Aes defAes;
- int ret;
- byte out1[AES_TEST_SIZE];
- byte out2[AES_TEST_SIZE];
- memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
- memcpy((char*)iv, "1234567890abcdef", 16);
- /* 128 cbc encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-128 cbc encrypt failed\n");
- return -1;
- }
- wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-128 cbc encrypt cmp failed\n");
- return -1;
- }
- /* 128 cbc decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-128 cbc decrypt failed\n");
- return -1;
- }
- wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-128 cbc decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-128 cbc decrypt orig cmp failed\n");
- return -1;
- }
- /* 192 cbc encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-192 cbc encrypt failed\n");
- return -1;
- }
- wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-192 cbc encrypt cmp failed\n");
- return -1;
- }
- /* 192 cbc decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-192 cbc decrypt failed\n");
- return -1;
- }
- wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-192 cbc decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-192 cbc decrypt orig cmp failed\n");
- return -1;
- }
- /* 256 cbc encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-256 cbc encrypt failed\n");
- return -1;
- }
- wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-256 cbc encrypt cmp failed\n");
- return -1;
- }
- /* 256 cbc decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-256 cbc decrypt failed\n");
- return -1;
- }
- wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-256 cbc decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-256 cbc decrypt orig cmp failed\n");
- return -1;
- }
- printf("aes-cbc mcapi test passed\n");
- return 0;
- }
- /* check mcapi aes ctr */
- static int check_aesctr(void)
- {
- CRYPT_AES_CTX mcAes;
- Aes defAes;
- int ret;
- byte out1[AES_TEST_SIZE];
- byte out2[AES_TEST_SIZE];
- memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
- memcpy((char*)iv, "1234567890abcdef", 16);
- /* 128 ctr encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-128 ctr encrypt failed\n");
- return -1;
- }
- ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-128 ctr encrypt set failed\n");
- return -1;
- }
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-128 ctr encrypt cmp failed\n");
- return -1;
- }
- /* 128 ctr decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-128 ctr decrypt failed\n");
- return -1;
- }
- if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-128 ctr decrypt orig cmp failed\n");
- return -1;
- }
- /* 192 ctr encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-192 ctr encrypt failed\n");
- return -1;
- }
- ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-192 ctr encrypt set failed\n");
- return -1;
- }
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-192 ctr encrypt cmp failed\n");
- return -1;
- }
- /* 192 ctr decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-192 ctr decrypt failed\n");
- return -1;
- }
- if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-192 ctr decrypt orig cmp failed\n");
- return -1;
- }
- /* 256 ctr encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-256 ctr encrypt failed\n");
- return -1;
- }
- ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-256 ctr encrypt set failed\n");
- return -1;
- }
- if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-256 ctr encrypt cmp failed\n");
- return -1;
- }
- /* 256 ctr decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
- if (ret != 0) {
- printf("mcapi aes-256 ctr decrypt failed\n");
- return -1;
- }
- if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
- printf("mcapi aes-256 ctr decrypt orig cmp failed\n");
- return -1;
- }
- printf("aes-ctr mcapi test passed\n");
- return 0;
- }
- /* check mcapi aes direct */
- static int check_aesdirect(void)
- {
- CRYPT_AES_CTX mcAes;
- Aes defAes;
- int ret;
- byte out1[CRYPT_AES_BLOCK_SIZE];
- byte out2[16]; /* one block at a time */
- memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
- memcpy((char*)iv, "1234567890abcdef", 16);
- /* 128 direct encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
- if (ret != 0) {
- printf("mcapi aes-128 direct encrypt failed\n");
- return -1;
- }
- wc_AesEncryptDirect(&defAes, out2, ourData);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-128 direct encrypt cmp failed\n");
- return -1;
- }
- /* 128 direct decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-128 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 16, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-128 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
- if (ret != 0) {
- printf("mcapi aes-128 direct decrypt failed\n");
- return -1;
- }
- wc_AesDecryptDirect(&defAes, out1, out1);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-128 direct decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-128 direct decrypt orig cmp failed\n");
- return -1;
- }
- /* 192 direct encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
- if (ret != 0) {
- printf("mcapi aes-192 direct encrypt failed\n");
- return -1;
- }
- wc_AesEncryptDirect(&defAes, out2, ourData);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-192 direct encrypt cmp failed\n");
- return -1;
- }
- /* 192 direct decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-192 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-192 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
- if (ret != 0) {
- printf("mcapi aes-192 direct decrypt failed\n");
- return -1;
- }
- wc_AesDecryptDirect(&defAes, out1, out1);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-192 direct decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-192 direct decrypt orig cmp failed\n");
- return -1;
- }
- /* 256 direct encrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
- if (ret != 0) {
- printf("mcapi aes-256 direct encrypt failed\n");
- return -1;
- }
- wc_AesEncryptDirect(&defAes, out2, ourData);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-256 direct encrypt cmp failed\n");
- return -1;
- }
- /* 256 direct decrypt */
- ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
- if (ret != 0) {
- printf("mcapi aes-256 key set failed\n");
- return -1;
- }
- ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
- if (ret != 0) {
- printf("default aes-256 key set failed\n");
- return -1;
- }
- ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
- if (ret != 0) {
- printf("mcapi aes-256 direct decrypt failed\n");
- return -1;
- }
- wc_AesDecryptDirect(&defAes, out1, out1);
- if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-256 direct decrypt cmp failed\n");
- return -1;
- }
- if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
- printf("mcapi aes-256 direct decrypt orig cmp failed\n");
- return -1;
- }
- printf("aes-direct mcapi test passed\n");
- return 0;
- }
- #define RSA_TEST_SIZE 64
- /* check mcapi rsa */
- static int check_rsa(void)
- {
- CRYPT_RSA_CTX mcRsa;
- RsaKey defRsa;
- int ret;
- int ret2;
- unsigned int keySz = (unsigned int)sizeof(client_key_der_1024);
- unsigned int idx = 0;
- byte out1[256];
- byte out2[256];
- ret = wc_InitRsaKey(&defRsa, NULL);
- if (ret == 0)
- ret = CRYPT_RSA_Initialize(&mcRsa);
- if (ret != 0) {
- printf("mcapi rsa init failed\n");
- return -1;
- }
- ret = CRYPT_RSA_PrivateKeyDecode(&mcRsa, client_key_der_1024, keySz);
- if (ret != 0) {
- printf("mcapi rsa private key decode failed\n");
- return -1;
- }
- ret = wc_RsaPrivateKeyDecode(client_key_der_1024, &idx, &defRsa, keySz);
- if (ret != 0) {
- printf("default rsa private key decode failed\n");
- return -1;
- }
- ret = CRYPT_RSA_SetRng(&mcRsa, &mcRng);
- if (ret != 0) {
- printf("mcapi rsa set rng failed\n");
- return -1;
- }
- ret = CRYPT_RSA_PublicEncrypt(&mcRsa, out1, sizeof(out1), ourData,
- RSA_TEST_SIZE, &mcRng);
- if (ret < 0) {
- printf("mcapi rsa public encrypt failed\n");
- return -1;
- }
- ret2 = wc_RsaPublicEncrypt(ourData, RSA_TEST_SIZE, out2, sizeof(out2),
- &defRsa, &defRng);
- if (ret2 < 0) {
- printf("default rsa public encrypt failed\n");
- return -1;
- }
- if (ret != ret2) {
- printf("default rsa public encrypt sz != mcapi sz\n");
- return -1;
- }
- if (ret != CRYPT_RSA_EncryptSizeGet(&mcRsa)) {
- printf("mcapi encrypt sz get != mcapi sz\n");
- return -1;
- }
- ret = CRYPT_RSA_PrivateDecrypt(&mcRsa, out2, sizeof(out2), out1, ret);
- if (ret < 0) {
- printf("mcapi rsa private derypt failed\n");
- return -1;
- }
- if (ret != RSA_TEST_SIZE) {
- printf("mcapi rsa private derypt plain size wrong\n");
- return -1;
- }
- if (memcmp(out2, ourData, ret) != 0) {
- printf("mcapi rsa private derypt plain text bad\n");
- return -1;
- }
- wc_FreeRsaKey(&defRsa);
- ret = CRYPT_RSA_Free(&mcRsa);
- if (ret != 0) {
- printf("mcapi rsa free failed\n");
- return -1;
- }
- printf("rsa mcapi test passed\n");
- return 0;
- }
- /* check mcapi ecc */
- static int check_ecc(void)
- {
- CRYPT_ECC_CTX userA;
- CRYPT_ECC_CTX userB;
- int ret;
- byte sharedA[100];
- byte sharedB[100];
- byte sig[100];
- unsigned int aSz = (unsigned int)sizeof(sharedA);
- unsigned int bSz = (unsigned int)sizeof(sharedB);
- unsigned int sigSz = (unsigned int)sizeof(sig);
- unsigned int usedA = 0;
- unsigned int usedB = 0;
- int verifyStatus = 0;
- /* init */
- ret = CRYPT_ECC_Initialize(&userA);
- if (ret != 0) {
- printf("mcapi ecc init failed\n");
- return -1;
- }
- ret = CRYPT_ECC_Initialize(&userB);
- if (ret != 0) {
- printf("mcapi ecc init b failed\n");
- return -1;
- }
- /* dhe + helpers */
- ret = CRYPT_ECC_DHE_KeyMake(&userA, &mcRng, 32);
- if (ret != 0) {
- printf("mcapi ecc make key failed\n");
- return -1;
- }
- ret = CRYPT_ECC_DHE_KeyMake(&userB, &mcRng, 32);
- if (ret != 0) {
- printf("mcapi ecc make key b failed\n");
- return -1;
- }
- ret = CRYPT_ECC_KeySizeGet(&userA);
- if (ret <= 0) {
- printf("mcapi ecc key size get failed\n");
- return -1;
- }
- ret = CRYPT_ECC_SignatureSizeGet(&userA);
- if (ret <= 0) {
- printf("mcapi ecc signature size get failed\n");
- return -1;
- }
- ret = CRYPT_ECC_DHE_SharedSecretMake(&userA, &userB, sharedA, aSz, &usedA);
- if (ret != 0) {
- printf("mcapi ecc make shared secret failed\n");
- return -1;
- }
- ret = CRYPT_ECC_DHE_SharedSecretMake(&userB, &userA, sharedB, bSz, &usedB);
- if (ret != 0) {
- printf("mcapi ecc make shared secret failed\n");
- return -1;
- }
- if (usedA != usedB || usedA == 0) {
- printf("mcapi ecc make shared secret output size match failed\n");
- return -1;
- }
- if (memcmp(sharedA, sharedB, usedA) != 0) {
- printf("mcapi ecc make shared secret output match cmp failed\n");
- return -1;
- }
- /* dsa */
- ret = CRYPT_ECC_DSA_HashSign(&userA, &mcRng, sig, sigSz, &usedA, ourData,
- CRYPT_SHA_DIGEST_SIZE);
- if (ret != 0) {
- printf("mcapi ecc sign hash failed\n");
- return -1;
- }
- sigSz = usedA;
- if (sigSz == 0) {
- printf("mcapi ecc sign hash bad sig size\n");
- return -1;
- }
- ret = CRYPT_ECC_DSA_HashVerify(&userA, sig, sigSz, ourData,
- CRYPT_SHA_DIGEST_SIZE, &verifyStatus);
- if (ret != 0) {
- printf("mcapi ecc verify hash failed\n");
- return -1;
- }
- if (verifyStatus != 1) {
- printf("mcapi ecc verify hash status failed\n");
- return -1;
- }
- /* import / export */
- usedA = 0;
- ret = CRYPT_ECC_PublicExport(&userA, sharedA, aSz, &usedA);
- if (ret != 0) {
- printf("mcapi ecc public export failed\n");
- return -1;
- }
- ret = CRYPT_ECC_PublicImport(&userB, sharedA, usedA);
- if (ret != 0) {
- printf("mcapi ecc public import failed\n");
- return -1;
- }
- ret = CRYPT_ECC_Free(&userA);
- if (ret != 0) {
- printf("mcapi ecc free failed\n");
- return -1;
- }
- ret = CRYPT_ECC_Free(&userB);
- if (ret != 0) {
- printf("mcapi ecc free b failed\n");
- return -1;
- }
- printf("ecc mcapi test passed\n");
- return 0;
- }
|