1510 lines
40 KiB
C
1510 lines
40 KiB
C
/* mcapi_test.c
|
|
*
|
|
* Copyright (C) 2006-2020 wolfSSL Inc.
|
|
*
|
|
* This file is part of wolfSSL.
|
|
*
|
|
* wolfSSL is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* wolfSSL is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
|
*/
|
|
|
|
|
|
|
|
/* Tests Microchip CRYPTO API layer */
|
|
|
|
|
|
|
|
/* mc api header */
|
|
#include "crypto.h"
|
|
|
|
#include <wolfssl/wolfcrypt/settings.h>
|
|
|
|
/* sanity test against our default implementation, wolfssl headers */
|
|
#include <wolfssl/wolfcrypt/md5.h>
|
|
#include <wolfssl/wolfcrypt/sha.h>
|
|
#include <wolfssl/wolfcrypt/sha256.h>
|
|
#include <wolfssl/wolfcrypt/sha512.h>
|
|
#include <wolfssl/wolfcrypt/hmac.h>
|
|
#include <wolfssl/wolfcrypt/compress.h>
|
|
#include <wolfssl/wolfcrypt/random.h>
|
|
#include <wolfssl/wolfcrypt/des3.h>
|
|
#include <wolfssl/wolfcrypt/aes.h>
|
|
#include <wolfssl/wolfcrypt/ecc.h>
|
|
#include <wolfssl/wolfcrypt/rsa.h>
|
|
#define USE_CERT_BUFFERS_1024
|
|
#include <wolfssl/certs_test.h>
|
|
|
|
#if defined(WOLFSSL_MICROCHIP_PIC32MZ)
|
|
#define MICROCHIP_PIC32
|
|
#include <xc.h>
|
|
#pragma config ICESEL = ICS_PGx2
|
|
/* ICE/ICD Comm Channel Select (Communicate on PGEC2/PGED2) */
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include "PIC32MZ-serial.h"
|
|
#define SYSTEMConfigPerformance(n) /* void out SYSTEMConfigPerformance(); */
|
|
#elif defined(MICROCHIP_PIC32)
|
|
#define PIC32_STARTER_KIT
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <p32xxxx.h>
|
|
#define _SUPPRESS_PLIB_WARNING
|
|
#define _DISABLE_OPENADC10_CONFIGPORT_WARNING
|
|
#include <plib.h>
|
|
#include <sys/appio.h>
|
|
#define init_serial() /* void out init_serial() */
|
|
#else
|
|
#include <stdio.h> /* order matters above ? */
|
|
#endif
|
|
#define OUR_DATA_SIZE 1024
|
|
static byte ourData[OUR_DATA_SIZE];
|
|
static byte* key = NULL;
|
|
static byte* iv = NULL;
|
|
static CRYPT_RNG_CTX mcRng;
|
|
static WC_RNG defRng;
|
|
|
|
static int check_md5(void);
|
|
static int check_sha(void);
|
|
static int check_sha256(void);
|
|
static int check_sha384(void);
|
|
static int check_sha512(void);
|
|
static int check_hmac(void);
|
|
static int check_compress(void);
|
|
static int check_rng(void);
|
|
static int check_des3(void);
|
|
static int check_aescbc(void);
|
|
static int check_aesctr(void);
|
|
static int check_aesdirect(void);
|
|
static int check_rsa(void);
|
|
static int check_ecc(void);
|
|
|
|
|
|
int main(int argc, char** argv)
|
|
{
|
|
int ret;
|
|
int i;
|
|
|
|
(void)argc;
|
|
(void)argv;
|
|
|
|
#if defined(MICROCHIP_PIC32)
|
|
init_serial() ; /* initialize PIC32MZ serial I/O */
|
|
SYSTEMConfigPerformance(80000000);
|
|
DBINIT();
|
|
#endif
|
|
|
|
/* align key, iv pointers */
|
|
key = (byte*)XMALLOC(32, NULL, DYNAMIC_TYPE_KEY);
|
|
if (key == NULL) {
|
|
printf("mcapi key alloc failed\n");
|
|
return -1;
|
|
}
|
|
|
|
iv = (byte*)XMALLOC(16, NULL, DYNAMIC_TYPE_KEY);
|
|
if (iv == NULL) {
|
|
printf("mcapi iv alloc failed\n");
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < OUR_DATA_SIZE; i++)
|
|
ourData[i] = (byte)i;
|
|
|
|
ret = check_md5();
|
|
if (ret != 0) {
|
|
printf("mcapi check_md5 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_sha();
|
|
if (ret != 0) {
|
|
printf("mcapi check_sha failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_sha256();
|
|
if (ret != 0) {
|
|
printf("mcapi check_sha256 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_sha384();
|
|
if (ret != 0) {
|
|
printf("mcapi check_sha384 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_sha512();
|
|
if (ret != 0) {
|
|
printf("mcapi check_sha512 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_hmac();
|
|
if (ret != 0) {
|
|
printf("mcapi check_hmac failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_compress();
|
|
if (ret != 0) {
|
|
printf("mcapi check_compress failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_rng();
|
|
if (ret != 0) {
|
|
printf("mcapi check_rng failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_des3();
|
|
if (ret != 0) {
|
|
printf("mcapi check_des3 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_aescbc();
|
|
if (ret != 0) {
|
|
printf("mcapi check_aes cbc failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_aesctr();
|
|
if (ret != 0) {
|
|
printf("mcapi check_aes ctr failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_aesdirect();
|
|
if (ret != 0) {
|
|
printf("mcapi check_aes direct failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_rsa();
|
|
if (ret != 0) {
|
|
printf("mcapi check_rsa failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = check_ecc();
|
|
if (ret != 0) {
|
|
printf("mcapi check_ecc failed\n");
|
|
return -1;
|
|
}
|
|
|
|
XFREE(iv, NULL, DYNAMIC_TYPE_KEY);
|
|
XFREE(key, NULL, DYNAMIC_TYPE_KEY);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi md5 against internal */
|
|
static int check_md5(void)
|
|
{
|
|
CRYPT_MD5_CTX mcMd5;
|
|
Md5 defMd5;
|
|
int ret;
|
|
byte mcDigest[CRYPT_MD5_DIGEST_SIZE];
|
|
byte defDigest[MD5_DIGEST_SIZE];
|
|
|
|
CRYPT_MD5_Initialize(&mcMd5);
|
|
ret = wc_InitMd5(&defMd5);
|
|
|
|
if (ret == 0) {
|
|
CRYPT_MD5_DataAdd(&mcMd5, ourData, OUR_DATA_SIZE);
|
|
ret = wc_Md5Update(&defMd5, ourData, OUR_DATA_SIZE);
|
|
}
|
|
|
|
if (ret == 0) {
|
|
CRYPT_MD5_Finalize(&mcMd5, mcDigest);
|
|
ret = wc_Md5Final(&defMd5, defDigest);
|
|
}
|
|
|
|
if (ret != 0) {
|
|
printf("md5 failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (ret == 0 && memcmp(mcDigest, defDigest, CRYPT_MD5_DIGEST_SIZE) != 0) {
|
|
printf("md5 final memcmp failed\n");
|
|
return -1;
|
|
}
|
|
printf("md5 mcapi test passed\n");
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
/* check mcapi sha against internal */
|
|
static int check_sha(void)
|
|
{
|
|
CRYPT_SHA_CTX mcSha;
|
|
Sha defSha;
|
|
int ret = 0;
|
|
byte mcDigest[CRYPT_SHA_DIGEST_SIZE];
|
|
byte defDigest[SHA_DIGEST_SIZE];
|
|
|
|
CRYPT_SHA_Initialize(&mcSha);
|
|
ret = wc_InitSha(&defSha);
|
|
if (ret != 0) {
|
|
printf("sha init default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA_DataAdd(&mcSha, ourData, OUR_DATA_SIZE);
|
|
wc_ShaUpdate(&defSha, ourData, OUR_DATA_SIZE);
|
|
|
|
CRYPT_SHA_Finalize(&mcSha, mcDigest);
|
|
wc_ShaFinal(&defSha, defDigest);
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
|
|
printf("sha final memcmp failed\n");
|
|
return -1;
|
|
}
|
|
printf("sha mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi sha256 against internal */
|
|
static int check_sha256(void)
|
|
{
|
|
CRYPT_SHA256_CTX mcSha256;
|
|
wc_Sha256 defSha256;
|
|
int ret;
|
|
byte mcDigest[CRYPT_SHA256_DIGEST_SIZE];
|
|
byte defDigest[WC_SHA256_DIGEST_SIZE];
|
|
|
|
CRYPT_SHA256_Initialize(&mcSha256);
|
|
ret = wc_InitSha256(&defSha256);
|
|
if (ret != 0) {
|
|
printf("sha256 init default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA256_DataAdd(&mcSha256, ourData, OUR_DATA_SIZE);
|
|
ret = wc_Sha256Update(&defSha256, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("sha256 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA256_Finalize(&mcSha256, mcDigest);
|
|
ret = wc_Sha256Final(&defSha256, defDigest);
|
|
if (ret != 0) {
|
|
printf("sha256 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
|
printf("sha256 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("sha256 mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi sha384 against internal */
|
|
static int check_sha384(void)
|
|
{
|
|
CRYPT_SHA384_CTX mcSha384;
|
|
wc_Sha384 defSha384;
|
|
int ret;
|
|
byte mcDigest[CRYPT_SHA384_DIGEST_SIZE];
|
|
byte defDigest[WC_SHA384_DIGEST_SIZE];
|
|
|
|
CRYPT_SHA384_Initialize(&mcSha384);
|
|
ret = wc_InitSha384(&defSha384);
|
|
if (ret != 0) {
|
|
printf("sha384 init default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA384_DataAdd(&mcSha384, ourData, OUR_DATA_SIZE);
|
|
ret = wc_Sha384Update(&defSha384, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("sha384 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA384_Finalize(&mcSha384, mcDigest);
|
|
ret = wc_Sha384Final(&defSha384, defDigest);
|
|
if (ret != 0) {
|
|
printf("sha384 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
|
printf("sha384 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("sha384 mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi sha512 against internal */
|
|
static int check_sha512(void)
|
|
{
|
|
CRYPT_SHA512_CTX mcSha512;
|
|
wc_Sha512 defSha512;
|
|
int ret;
|
|
byte mcDigest[CRYPT_SHA512_DIGEST_SIZE];
|
|
byte defDigest[WC_SHA512_DIGEST_SIZE];
|
|
|
|
CRYPT_SHA512_Initialize(&mcSha512);
|
|
ret = wc_InitSha512(&defSha512);
|
|
if (ret != 0) {
|
|
printf("sha512 init default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA512_DataAdd(&mcSha512, ourData, OUR_DATA_SIZE);
|
|
ret = wc_Sha512Update(&defSha512, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("sha512 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_SHA512_Finalize(&mcSha512, mcDigest);
|
|
ret = wc_Sha512Final(&defSha512, defDigest);
|
|
if (ret != 0) {
|
|
printf("sha512 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
|
printf("sha512 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("sha512 mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi hmac against internal */
|
|
static int check_hmac(void)
|
|
{
|
|
CRYPT_HMAC_CTX mcHmac;
|
|
Hmac defHmac;
|
|
int ret;
|
|
byte mcDigest[CRYPT_SHA512_DIGEST_SIZE];
|
|
byte defDigest[WC_SHA512_DIGEST_SIZE];
|
|
|
|
memcpy((char*)key, "Jefe", 4);
|
|
|
|
/* SHA1 */
|
|
CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA, key, 4);
|
|
ret = wc_HmacSetKey(&defHmac, WC_SHA, key, 4);
|
|
if (ret != 0) {
|
|
printf("hmac sha setkey default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
|
|
ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("hmac sha update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
|
|
ret = wc_HmacFinal(&defHmac, defDigest);
|
|
if (ret != 0) {
|
|
printf("hmac sha final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
|
|
printf("hmac sha final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("hmac sha mcapi test passed\n");
|
|
|
|
/* SHA-256 */
|
|
CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA256, key, 4);
|
|
ret = wc_HmacSetKey(&defHmac, WC_SHA256, key, 4);
|
|
if (ret != 0) {
|
|
printf("hmac sha256 setkey default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
|
|
ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("hmac sha256 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
|
|
ret = wc_HmacFinal(&defHmac, defDigest);
|
|
if (ret != 0) {
|
|
printf("hmac sha256 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
|
|
printf("hmac sha256 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("hmac sha256 mcapi test passed\n");
|
|
|
|
/* SHA-384 */
|
|
CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA384, key, 4);
|
|
ret = wc_HmacSetKey(&defHmac, WC_SHA384, key, 4);
|
|
if (ret != 0) {
|
|
printf("hmac sha384 setkey default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
|
|
ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("hmac sha384 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
|
|
ret = wc_HmacFinal(&defHmac, defDigest);
|
|
if (ret != 0) {
|
|
printf("hmac sha384 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
|
|
printf("hmac sha384 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("hmac sha384 mcapi test passed\n");
|
|
|
|
/* SHA-512 */
|
|
CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA512, key, 4);
|
|
ret = wc_HmacSetKey(&defHmac, WC_SHA512, key, 4);
|
|
if (ret != 0) {
|
|
printf("hmac sha512 setkey default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
|
|
ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
|
|
if (ret != 0) {
|
|
printf("hmac sha512 update default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
|
|
ret = wc_HmacFinal(&defHmac, defDigest);
|
|
if (ret != 0) {
|
|
printf("hmac sha512 final default failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
|
|
printf("hmac sha512 final memcmp fialed\n");
|
|
return -1;
|
|
}
|
|
printf("hmac sha512 mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi compress against internal */
|
|
static int check_compress(void)
|
|
{
|
|
const unsigned char text[] =
|
|
"Biodiesel cupidatat marfa, cliche aute put a bird on it incididunt elit\n"
|
|
"polaroid. Sunt tattooed bespoke reprehenderit. Sint twee organic id\n"
|
|
"marfa. Commodo veniam ad esse gastropub. 3 wolf moon sartorial vero,\n"
|
|
"plaid delectus biodiesel squid +1 vice. Post-ironic keffiyeh leggings\n"
|
|
"selfies cray fap hoodie, forage anim. Carles cupidatat shoreditch, VHS\n"
|
|
"small batch meggings kogi dolore food truck bespoke gastropub.\n"
|
|
"\n"
|
|
"Terry richardson adipisicing actually typewriter tumblr, twee whatever\n"
|
|
"four loko you probably haven't heard of them high life. Messenger bag\n"
|
|
"whatever tattooed deep v mlkshk. Brooklyn pinterest assumenda chillwave\n"
|
|
"et, banksy ullamco messenger bag umami pariatur direct trade forage.\n"
|
|
"Typewriter culpa try-hard, pariatur sint brooklyn meggings. Gentrify\n"
|
|
"food truck next level, tousled irony non semiotics PBR ethical anim cred\n"
|
|
"readymade. Mumblecore brunch lomo odd future, portland organic terry\n"
|
|
"four loko whatever street art yr farm-to-table.\n";
|
|
|
|
unsigned int inSz = sizeof(text);
|
|
unsigned int outSz;
|
|
unsigned char cBuffer[1024];
|
|
unsigned char dBuffer[1024];
|
|
|
|
int ret1, ret2;
|
|
|
|
/* dynamic */
|
|
ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 0);
|
|
ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 0);
|
|
|
|
if (ret1 != ret2 || ret1 < 0) {
|
|
printf("compress dynamic ret failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(cBuffer, dBuffer, ret1) != 0) {
|
|
printf("compress dynamic cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
outSz = ret1;
|
|
|
|
ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
|
|
|
|
if (memcmp(dBuffer, text, inSz) != 0) {
|
|
printf("mcapi decompress dynamic cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
memset(dBuffer, 0, sizeof(dBuffer));
|
|
|
|
ret1 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
|
|
|
|
if (memcmp(dBuffer, text, inSz) != 0) {
|
|
printf("decompress dynamic cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
memset(cBuffer, 0, sizeof(cBuffer));
|
|
memset(dBuffer, 0, sizeof(dBuffer));
|
|
|
|
/* static */
|
|
ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 1);
|
|
ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 1);
|
|
|
|
if (ret1 != ret2 || ret1 < 0) {
|
|
printf("compress static ret failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(cBuffer, dBuffer, ret1) != 0) {
|
|
printf("compress static cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
outSz = ret1;
|
|
|
|
ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
|
|
|
|
if (memcmp(dBuffer, text, inSz) != 0) {
|
|
printf("mcapi decompress static cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
memset(dBuffer, 0, sizeof(dBuffer));
|
|
|
|
ret1 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
|
|
|
|
if (memcmp(dBuffer, text, inSz) != 0) {
|
|
printf("decompress static cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("huffman mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define RANDOM_BYTE_SZ 32
|
|
|
|
/* check mcapi rng */
|
|
static int check_rng(void)
|
|
{
|
|
int ret;
|
|
int i;
|
|
byte in[RANDOM_BYTE_SZ];
|
|
byte out[RANDOM_BYTE_SZ];
|
|
|
|
for (i = 0; i < RANDOM_BYTE_SZ; i++)
|
|
in[i] = (byte)i;
|
|
|
|
for (i = 0; i < RANDOM_BYTE_SZ; i++)
|
|
out[i] = (byte)i;
|
|
|
|
ret = wc_InitRng(&defRng);
|
|
if (ret != 0) {
|
|
printf("default rng init failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RNG_Initialize(&mcRng);
|
|
if (ret != 0) {
|
|
printf("mcapi rng init failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RNG_Get(&mcRng, &out[0]);
|
|
if (ret != 0) {
|
|
printf("mcapi rng get failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RNG_BlockGenerate(&mcRng, out, RANDOM_BYTE_SZ);
|
|
if (ret != 0) {
|
|
printf("mcapi rng block gen failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(in, out, RANDOM_BYTE_SZ) == 0) {
|
|
printf("mcapi rng block gen output failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("rng mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define TDES_TEST_SIZE 32
|
|
|
|
/* check mcapi des3 */
|
|
static int check_des3(void)
|
|
{
|
|
CRYPT_TDES_CTX mcDes3;
|
|
Des3 defDes3;
|
|
int ret;
|
|
byte out1[TDES_TEST_SIZE];
|
|
byte out2[TDES_TEST_SIZE];
|
|
|
|
memcpy((char*)key, "1234567890abcdefghijklmn", 24);
|
|
memcpy((char*)iv, "12345678", 8);
|
|
|
|
/* cbc encrypt */
|
|
ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi tdes key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_Des3_SetKey(&defDes3, key, iv, DES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default des3 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_TDES_CBC_Encrypt(&mcDes3, out1, ourData, TDES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi tdes cbc encrypt failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_Des3_CbcEncrypt(&defDes3, out2, ourData, TDES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi default tdes cbc encrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
|
|
printf("mcapi tdes cbc encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* cbc decrypt */
|
|
ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi tdes key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_Des3_SetKey(&defDes3, key, iv, DES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default des3 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_TDES_CBC_Decrypt(&mcDes3, out2, out1, TDES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi tdes cbc decrypt failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_Des3_CbcDecrypt(&defDes3, out1, out1, TDES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi default tdes cbc decrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
|
|
printf("mcapi tdes cbc decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, TDES_TEST_SIZE) != 0) {
|
|
printf("mcapi tdes cbc decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("tdes mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define AES_TEST_SIZE 32
|
|
|
|
/* check mcapi aes cbc */
|
|
static int check_aescbc(void)
|
|
{
|
|
CRYPT_AES_CTX mcAes;
|
|
Aes defAes;
|
|
int ret;
|
|
byte out1[AES_TEST_SIZE];
|
|
byte out2[AES_TEST_SIZE];
|
|
|
|
memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
|
|
memcpy((char*)iv, "1234567890abcdef", 16);
|
|
|
|
/* 128 cbc encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 cbc encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-128 cbc encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 128 cbc decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, DES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 cbc decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-128 cbc decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-128 cbc decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 cbc encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 cbc encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-192 cbc encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 cbc decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 cbc decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-192 cbc decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-192 cbc decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 cbc encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 cbc encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-256 cbc encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 cbc decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 cbc decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
|
|
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-256 cbc decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-256 cbc decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("aes-cbc mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi aes ctr */
|
|
static int check_aesctr(void)
|
|
{
|
|
CRYPT_AES_CTX mcAes;
|
|
Aes defAes;
|
|
int ret;
|
|
byte out1[AES_TEST_SIZE];
|
|
byte out2[AES_TEST_SIZE];
|
|
|
|
memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
|
|
memcpy((char*)iv, "1234567890abcdef", 16);
|
|
|
|
/* 128 ctr encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 ctr encrypt failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 ctr encrypt set failed\n");
|
|
return -1;
|
|
}
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-128 ctr encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 128 ctr decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 ctr decrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-128 ctr decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 ctr encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 ctr encrypt failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 ctr encrypt set failed\n");
|
|
return -1;
|
|
}
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-192 ctr encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 ctr decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 ctr decrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-192 ctr decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 ctr encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 ctr encrypt failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 ctr encrypt set failed\n");
|
|
return -1;
|
|
}
|
|
if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-256 ctr encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 ctr decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 ctr decrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
|
|
printf("mcapi aes-256 ctr decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("aes-ctr mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi aes direct */
|
|
static int check_aesdirect(void)
|
|
{
|
|
CRYPT_AES_CTX mcAes;
|
|
Aes defAes;
|
|
int ret;
|
|
byte out1[CRYPT_AES_BLOCK_SIZE];
|
|
byte out2[16]; /* one block at a time */
|
|
|
|
memcpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
|
|
memcpy((char*)iv, "1234567890abcdef", 16);
|
|
|
|
/* 128 direct encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 direct encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesEncryptDirect(&defAes, out2, ourData);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-128 direct encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 128 direct decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 16, iv, DES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-128 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-128 direct decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesDecryptDirect(&defAes, out1, out1);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-128 direct decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-128 direct decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 direct encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 direct encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesEncryptDirect(&defAes, out2, ourData);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-192 direct encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 192 direct decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-192 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-192 direct decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesDecryptDirect(&defAes, out1, out1);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-192 direct decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-192 direct decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 direct encrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 direct encrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesEncryptDirect(&defAes, out2, ourData);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-256 direct encrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* 256 direct decrypt */
|
|
ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
|
|
if (ret != 0) {
|
|
printf("default aes-256 key set failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
|
|
if (ret != 0) {
|
|
printf("mcapi aes-256 direct decrypt failed\n");
|
|
return -1;
|
|
}
|
|
wc_AesDecryptDirect(&defAes, out1, out1);
|
|
|
|
if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-256 direct decrypt cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
|
|
printf("mcapi aes-256 direct decrypt orig cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("aes-direct mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define RSA_TEST_SIZE 64
|
|
|
|
/* check mcapi rsa */
|
|
static int check_rsa(void)
|
|
{
|
|
CRYPT_RSA_CTX mcRsa;
|
|
RsaKey defRsa;
|
|
int ret;
|
|
int ret2;
|
|
unsigned int keySz = (unsigned int)sizeof(client_key_der_1024);
|
|
unsigned int idx = 0;
|
|
byte out1[256];
|
|
byte out2[256];
|
|
|
|
ret = wc_InitRsaKey(&defRsa, NULL);
|
|
if (ret == 0)
|
|
ret = CRYPT_RSA_Initialize(&mcRsa);
|
|
if (ret != 0) {
|
|
printf("mcapi rsa init failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RSA_PrivateKeyDecode(&mcRsa, client_key_der_1024, keySz);
|
|
if (ret != 0) {
|
|
printf("mcapi rsa private key decode failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = wc_RsaPrivateKeyDecode(client_key_der_1024, &idx, &defRsa, keySz);
|
|
if (ret != 0) {
|
|
printf("default rsa private key decode failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RSA_SetRng(&mcRsa, &mcRng);
|
|
if (ret != 0) {
|
|
printf("mcapi rsa set rng failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RSA_PublicEncrypt(&mcRsa, out1, sizeof(out1), ourData,
|
|
RSA_TEST_SIZE, &mcRng);
|
|
if (ret < 0) {
|
|
printf("mcapi rsa public encrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret2 = wc_RsaPublicEncrypt(ourData, RSA_TEST_SIZE, out2, sizeof(out2),
|
|
&defRsa, &defRng);
|
|
if (ret2 < 0) {
|
|
printf("default rsa public encrypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (ret != ret2) {
|
|
printf("default rsa public encrypt sz != mcapi sz\n");
|
|
return -1;
|
|
}
|
|
|
|
if (ret != CRYPT_RSA_EncryptSizeGet(&mcRsa)) {
|
|
printf("mcapi encrypt sz get != mcapi sz\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_RSA_PrivateDecrypt(&mcRsa, out2, sizeof(out2), out1, ret);
|
|
if (ret < 0) {
|
|
printf("mcapi rsa private derypt failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (ret != RSA_TEST_SIZE) {
|
|
printf("mcapi rsa private derypt plain size wrong\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(out2, ourData, ret) != 0) {
|
|
printf("mcapi rsa private derypt plain text bad\n");
|
|
return -1;
|
|
}
|
|
|
|
wc_FreeRsaKey(&defRsa);
|
|
ret = CRYPT_RSA_Free(&mcRsa);
|
|
if (ret != 0) {
|
|
printf("mcapi rsa free failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("rsa mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* check mcapi ecc */
|
|
static int check_ecc(void)
|
|
{
|
|
CRYPT_ECC_CTX userA;
|
|
CRYPT_ECC_CTX userB;
|
|
int ret;
|
|
byte sharedA[100];
|
|
byte sharedB[100];
|
|
byte sig[100];
|
|
unsigned int aSz = (unsigned int)sizeof(sharedA);
|
|
unsigned int bSz = (unsigned int)sizeof(sharedB);
|
|
unsigned int sigSz = (unsigned int)sizeof(sig);
|
|
unsigned int usedA = 0;
|
|
unsigned int usedB = 0;
|
|
int verifyStatus = 0;
|
|
|
|
/* init */
|
|
ret = CRYPT_ECC_Initialize(&userA);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc init failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_Initialize(&userB);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc init b failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* dhe + helpers */
|
|
ret = CRYPT_ECC_DHE_KeyMake(&userA, &mcRng, 32);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc make key failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_DHE_KeyMake(&userB, &mcRng, 32);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc make key b failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_KeySizeGet(&userA);
|
|
if (ret <= 0) {
|
|
printf("mcapi ecc key size get failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_SignatureSizeGet(&userA);
|
|
if (ret <= 0) {
|
|
printf("mcapi ecc signature size get failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_DHE_SharedSecretMake(&userA, &userB, sharedA, aSz, &usedA);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc make shared secret failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_DHE_SharedSecretMake(&userB, &userA, sharedB, bSz, &usedB);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc make shared secret failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (usedA != usedB || usedA == 0) {
|
|
printf("mcapi ecc make shared secret output size match failed\n");
|
|
return -1;
|
|
}
|
|
|
|
if (memcmp(sharedA, sharedB, usedA) != 0) {
|
|
printf("mcapi ecc make shared secret output match cmp failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* dsa */
|
|
ret = CRYPT_ECC_DSA_HashSign(&userA, &mcRng, sig, sigSz, &usedA, ourData,
|
|
CRYPT_SHA_DIGEST_SIZE);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc sign hash failed\n");
|
|
return -1;
|
|
}
|
|
|
|
sigSz = usedA;
|
|
if (sigSz == 0) {
|
|
printf("mcapi ecc sign hash bad sig size\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_DSA_HashVerify(&userA, sig, sigSz, ourData,
|
|
CRYPT_SHA_DIGEST_SIZE, &verifyStatus);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc verify hash failed\n");
|
|
return -1;
|
|
}
|
|
if (verifyStatus != 1) {
|
|
printf("mcapi ecc verify hash status failed\n");
|
|
return -1;
|
|
}
|
|
|
|
/* import / export */
|
|
usedA = 0;
|
|
ret = CRYPT_ECC_PublicExport(&userA, sharedA, aSz, &usedA);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc public export failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_PublicImport(&userB, sharedA, usedA);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc public import failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_Free(&userA);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc free failed\n");
|
|
return -1;
|
|
}
|
|
|
|
ret = CRYPT_ECC_Free(&userB);
|
|
if (ret != 0) {
|
|
printf("mcapi ecc free b failed\n");
|
|
return -1;
|
|
}
|
|
|
|
printf("ecc mcapi test passed\n");
|
|
|
|
return 0;
|
|
}
|
|
|