Team Fortress 2 Source Code as on 22/4/2020
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

615 lines
23 KiB

  1. // fipstest.cpp - written and placed in the public domain by Wei Dai
  2. #include "pch.h"
  3. #ifndef CRYPTOPP_IMPORTS
  4. #define CRYPTOPP_DEFAULT_NO_DLL
  5. #include "dll.h"
  6. #include "cryptlib.h"
  7. #include "filters.h"
  8. #include "smartptr.h"
  9. #include "misc.h"
  10. #ifdef CRYPTOPP_WIN32_AVAILABLE
  11. #define _WIN32_WINNT 0x0400
  12. #include <windows.h>
  13. #if defined(_MSC_VER) && _MSC_VER >= 1400
  14. #ifdef _M_IX86
  15. #define _CRT_DEBUGGER_HOOK _crt_debugger_hook
  16. #else
  17. #define _CRT_DEBUGGER_HOOK __crt_debugger_hook
  18. #endif
  19. extern "C" {_CRTIMP void __cdecl _CRT_DEBUGGER_HOOK(int);}
  20. #endif
  21. #endif
  22. #include <iostream>
  23. #if CRYPTOPP_MSC_VERSION
  24. # pragma warning(disable: 4100)
  25. #endif
  26. NAMESPACE_BEGIN(CryptoPP)
  27. extern PowerUpSelfTestStatus g_powerUpSelfTestStatus;
  28. SecByteBlock g_actualMac;
  29. unsigned long g_macFileLocation = 0;
  30. // use a random dummy string here, to be searched/replaced later with the real MAC
  31. static const byte s_moduleMac[CryptoPP::HMAC<CryptoPP::SHA1>::DIGESTSIZE] = CRYPTOPP_DUMMY_DLL_MAC;
  32. CRYPTOPP_COMPILE_ASSERT(sizeof(s_moduleMac) == CryptoPP::SHA1::DIGESTSIZE);
  33. #ifdef CRYPTOPP_WIN32_AVAILABLE
  34. static HMODULE s_hModule = NULL;
  35. #endif
  36. const byte * CRYPTOPP_API GetActualMacAndLocation(unsigned int &macSize, unsigned int &fileLocation)
  37. {
  38. macSize = (unsigned int)g_actualMac.size();
  39. fileLocation = g_macFileLocation;
  40. return g_actualMac;
  41. }
  42. void KnownAnswerTest(RandomNumberGenerator &rng, const char *output)
  43. {
  44. EqualityComparisonFilter comparison;
  45. RandomNumberStore(rng, strlen(output)/2).TransferAllTo(comparison, "0");
  46. StringSource(output, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
  47. comparison.ChannelMessageSeriesEnd("0");
  48. comparison.ChannelMessageSeriesEnd("1");
  49. }
  50. template <class CIPHER>
  51. void X917RNG_KnownAnswerTest(
  52. const char *key,
  53. const char *seed,
  54. const char *deterministicTimeVector,
  55. const char *output,
  56. CIPHER *dummy = NULL)
  57. {
  58. CRYPTOPP_UNUSED(dummy);
  59. #ifdef OS_RNG_AVAILABLE
  60. std::string decodedKey, decodedSeed, decodedDeterministicTimeVector;
  61. StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
  62. StringSource(seed, true, new HexDecoder(new StringSink(decodedSeed)));
  63. StringSource(deterministicTimeVector, true, new HexDecoder(new StringSink(decodedDeterministicTimeVector)));
  64. AutoSeededX917RNG<CIPHER> rng(false, false);
  65. rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (const byte *)decodedDeterministicTimeVector.data());
  66. KnownAnswerTest(rng, output);
  67. #else
  68. throw 0;
  69. #endif
  70. }
  71. void KnownAnswerTest(StreamTransformation &encryption, StreamTransformation &decryption, const char *plaintext, const char *ciphertext)
  72. {
  73. EqualityComparisonFilter comparison;
  74. StringSource(plaintext, true, new HexDecoder(new StreamTransformationFilter(encryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING)));
  75. StringSource(ciphertext, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
  76. StringSource(ciphertext, true, new HexDecoder(new StreamTransformationFilter(decryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING)));
  77. StringSource(plaintext, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
  78. comparison.ChannelMessageSeriesEnd("0");
  79. comparison.ChannelMessageSeriesEnd("1");
  80. }
  81. template <class CIPHER>
  82. void SymmetricEncryptionKnownAnswerTest(
  83. const char *key,
  84. const char *hexIV,
  85. const char *plaintext,
  86. const char *ecb,
  87. const char *cbc,
  88. const char *cfb,
  89. const char *ofb,
  90. const char *ctr,
  91. CIPHER *dummy = NULL)
  92. {
  93. CRYPTOPP_UNUSED(dummy);
  94. std::string decodedKey;
  95. StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
  96. typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size());
  97. typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size());
  98. SecByteBlock iv(encryption.BlockSize());
  99. StringSource(hexIV, true, new HexDecoder(new ArraySink(iv, iv.size())));
  100. if (ecb)
  101. KnownAnswerTest(ECB_Mode_ExternalCipher::Encryption(encryption).Ref(), ECB_Mode_ExternalCipher::Decryption(decryption).Ref(), plaintext, ecb);
  102. if (cbc)
  103. KnownAnswerTest(CBC_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CBC_Mode_ExternalCipher::Decryption(decryption, iv).Ref(), plaintext, cbc);
  104. if (cfb)
  105. KnownAnswerTest(CFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, cfb);
  106. if (ofb)
  107. KnownAnswerTest(OFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), OFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ofb);
  108. if (ctr)
  109. KnownAnswerTest(CTR_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CTR_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ctr);
  110. }
  111. void KnownAnswerTest(HashTransformation &hash, const char *message, const char *digest)
  112. {
  113. EqualityComparisonFilter comparison;
  114. StringSource(digest, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
  115. StringSource(message, true, new HashFilter(hash, new ChannelSwitch(comparison, "0")));
  116. comparison.ChannelMessageSeriesEnd("0");
  117. comparison.ChannelMessageSeriesEnd("1");
  118. }
  119. template <class HASH>
  120. void SecureHashKnownAnswerTest(const char *message, const char *digest, HASH *dummy = NULL)
  121. {
  122. CRYPTOPP_UNUSED(dummy);
  123. HASH hash;
  124. KnownAnswerTest(hash, message, digest);
  125. }
  126. template <class MAC>
  127. void MAC_KnownAnswerTest(const char *key, const char *message, const char *digest, MAC *dummy = NULL)
  128. {
  129. CRYPTOPP_UNUSED(dummy);
  130. std::string decodedKey;
  131. StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
  132. MAC mac((const byte *)decodedKey.data(), decodedKey.size());
  133. KnownAnswerTest(mac, message, digest);
  134. }
  135. template <class SCHEME>
  136. void SignatureKnownAnswerTest(const char *key, const char *message, const char *signature, SCHEME *dummy = NULL)
  137. {
  138. typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
  139. typename SCHEME::Verifier verifier(signer);
  140. CRYPTOPP_UNUSED(dummy);
  141. RandomPool rng;
  142. EqualityComparisonFilter comparison;
  143. StringSource(message, true, new SignerFilter(rng, signer, new ChannelSwitch(comparison, "0")));
  144. StringSource(signature, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
  145. comparison.ChannelMessageSeriesEnd("0");
  146. comparison.ChannelMessageSeriesEnd("1");
  147. VerifierFilter verifierFilter(verifier, NULL, VerifierFilter::SIGNATURE_AT_BEGIN | VerifierFilter::THROW_EXCEPTION);
  148. StringSource(signature, true, new HexDecoder(new Redirector(verifierFilter, Redirector::DATA_ONLY)));
  149. StringSource(message, true, new Redirector(verifierFilter));
  150. }
  151. void EncryptionPairwiseConsistencyTest(const PK_Encryptor &encryptor, const PK_Decryptor &decryptor)
  152. {
  153. try
  154. {
  155. RandomPool rng;
  156. const char *testMessage ="test message";
  157. std::string ciphertext, decrypted;
  158. StringSource(
  159. testMessage,
  160. true,
  161. new PK_EncryptorFilter(
  162. rng,
  163. encryptor,
  164. new StringSink(ciphertext)));
  165. if (ciphertext == testMessage)
  166. throw 0;
  167. StringSource(
  168. ciphertext,
  169. true,
  170. new PK_DecryptorFilter(
  171. rng,
  172. decryptor,
  173. new StringSink(decrypted)));
  174. if (decrypted != testMessage)
  175. throw 0;
  176. }
  177. catch (...)
  178. {
  179. throw SelfTestFailure(encryptor.AlgorithmName() + ": pairwise consistency test failed");
  180. }
  181. }
  182. void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier)
  183. {
  184. try
  185. {
  186. RandomPool rng;
  187. StringSource(
  188. "test message",
  189. true,
  190. new SignerFilter(
  191. rng,
  192. signer,
  193. new VerifierFilter(verifier, NULL, VerifierFilter::THROW_EXCEPTION),
  194. true));
  195. }
  196. catch (...)
  197. {
  198. throw SelfTestFailure(signer.AlgorithmName() + ": pairwise consistency test failed");
  199. }
  200. }
  201. template <class SCHEME>
  202. void SignaturePairwiseConsistencyTest(const char *key, SCHEME *dummy = NULL)
  203. {
  204. typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
  205. typename SCHEME::Verifier verifier(signer);
  206. CRYPTOPP_UNUSED(dummy);
  207. SignaturePairwiseConsistencyTest(signer, verifier);
  208. }
  209. MessageAuthenticationCode * NewIntegrityCheckingMAC()
  210. {
  211. byte key[] = {0x47, 0x1E, 0x33, 0x96, 0x65, 0xB1, 0x6A, 0xED, 0x0B, 0xF8, 0x6B, 0xFD, 0x01, 0x65, 0x05, 0xCC};
  212. return new HMAC<SHA1>(key, sizeof(key));
  213. }
  214. bool IntegrityCheckModule(const char *moduleFilename, const byte *expectedModuleMac, SecByteBlock *pActualMac, unsigned long *pMacFileLocation)
  215. {
  216. member_ptr<MessageAuthenticationCode> mac(NewIntegrityCheckingMAC());
  217. unsigned int macSize = mac->DigestSize();
  218. SecByteBlock tempMac;
  219. SecByteBlock &actualMac = pActualMac ? *pActualMac : tempMac;
  220. actualMac.resize(macSize);
  221. unsigned long tempLocation = 0;
  222. unsigned long &macFileLocation = pMacFileLocation ? *pMacFileLocation : tempLocation;
  223. macFileLocation = 0;
  224. MeterFilter verifier(new HashFilter(*mac, new ArraySink(actualMac, actualMac.size())));
  225. // MeterFilter verifier(new FileSink("c:\\dt.tmp"));
  226. std::ifstream moduleStream;
  227. #ifdef CRYPTOPP_WIN32_AVAILABLE
  228. HMODULE h = NULL;
  229. {
  230. char moduleFilenameBuf[MAX_PATH] = "";
  231. if (moduleFilename == NULL)
  232. {
  233. #if (_MSC_VER >= 1400 && !defined(_STLPORT_VERSION)) // ifstream doesn't support wide filename on other compilers
  234. wchar_t wideModuleFilename[MAX_PATH];
  235. if (GetModuleFileNameW(s_hModule, wideModuleFilename, MAX_PATH) > 0)
  236. {
  237. moduleStream.open(wideModuleFilename, std::ios::in | std::ios::binary);
  238. h = GetModuleHandleW(wideModuleFilename);
  239. }
  240. else
  241. #endif
  242. {
  243. GetModuleFileNameA(s_hModule, moduleFilenameBuf, MAX_PATH);
  244. moduleFilename = moduleFilenameBuf;
  245. }
  246. }
  247. #endif
  248. if (moduleFilename != NULL)
  249. {
  250. moduleStream.open(moduleFilename, std::ios::in | std::ios::binary);
  251. #ifdef CRYPTOPP_WIN32_AVAILABLE
  252. h = GetModuleHandleA(moduleFilename);
  253. moduleFilename = NULL;
  254. }
  255. #endif
  256. }
  257. if (!moduleStream)
  258. {
  259. #ifdef CRYPTOPP_WIN32_AVAILABLE
  260. OutputDebugString("Crypto++ DLL integrity check failed. Cannot open file for reading.");
  261. #endif
  262. return false;
  263. }
  264. FileStore file(moduleStream);
  265. #ifdef CRYPTOPP_WIN32_AVAILABLE
  266. // try to hash from memory first
  267. const byte *memBase = (const byte *)h;
  268. const IMAGE_DOS_HEADER *ph = (IMAGE_DOS_HEADER *)memBase;
  269. const IMAGE_NT_HEADERS *phnt = (IMAGE_NT_HEADERS *)(memBase + ph->e_lfanew);
  270. const IMAGE_SECTION_HEADER *phs = IMAGE_FIRST_SECTION(phnt);
  271. DWORD nSections = phnt->FileHeader.NumberOfSections;
  272. size_t currentFilePos = 0;
  273. size_t checksumPos = (byte *)&phnt->OptionalHeader.CheckSum - memBase;
  274. size_t checksumSize = sizeof(phnt->OptionalHeader.CheckSum);
  275. size_t certificateTableDirectoryPos = (byte *)&phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY] - memBase;
  276. size_t certificateTableDirectorySize = sizeof(phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY]);
  277. size_t certificateTablePos = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress;
  278. size_t certificateTableSize = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].Size;
  279. verifier.AddRangeToSkip(0, checksumPos, checksumSize);
  280. verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize);
  281. verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize);
  282. while (nSections--)
  283. {
  284. switch (phs->Characteristics)
  285. {
  286. default:
  287. break;
  288. case IMAGE_SCN_CNT_CODE | IMAGE_SCN_MEM_EXECUTE | IMAGE_SCN_MEM_READ:
  289. case IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ:
  290. unsigned int sectionSize = STDMIN(phs->SizeOfRawData, phs->Misc.VirtualSize);
  291. const byte *sectionMemStart = memBase + phs->VirtualAddress;
  292. unsigned int sectionFileStart = phs->PointerToRawData;
  293. size_t subSectionStart = 0, nextSubSectionStart;
  294. do
  295. {
  296. const byte *subSectionMemStart = sectionMemStart + subSectionStart;
  297. size_t subSectionFileStart = sectionFileStart + subSectionStart;
  298. size_t subSectionSize = sectionSize - subSectionStart;
  299. nextSubSectionStart = 0;
  300. unsigned int entriesToReadFromDisk[] = {IMAGE_DIRECTORY_ENTRY_IMPORT, IMAGE_DIRECTORY_ENTRY_IAT};
  301. for (unsigned int i=0; i<sizeof(entriesToReadFromDisk)/sizeof(entriesToReadFromDisk[0]); i++)
  302. {
  303. const IMAGE_DATA_DIRECTORY &entry = phnt->OptionalHeader.DataDirectory[entriesToReadFromDisk[i]];
  304. const byte *entryMemStart = memBase + entry.VirtualAddress;
  305. if (subSectionMemStart <= entryMemStart && entryMemStart < subSectionMemStart + subSectionSize)
  306. {
  307. subSectionSize = entryMemStart - subSectionMemStart;
  308. nextSubSectionStart = entryMemStart - sectionMemStart + entry.Size;
  309. }
  310. }
  311. #if defined(_MSC_VER) && _MSC_VER >= 1400
  312. // first byte of _CRT_DEBUGGER_HOOK gets modified in memory by the debugger invisibly, so read it from file
  313. if (IsDebuggerPresent())
  314. {
  315. if (subSectionMemStart <= (byte *)&_CRT_DEBUGGER_HOOK && (byte *)&_CRT_DEBUGGER_HOOK < subSectionMemStart + subSectionSize)
  316. {
  317. subSectionSize = (byte *)&_CRT_DEBUGGER_HOOK - subSectionMemStart;
  318. nextSubSectionStart = (byte *)&_CRT_DEBUGGER_HOOK - sectionMemStart + 1;
  319. }
  320. }
  321. #endif
  322. if (subSectionMemStart <= expectedModuleMac && expectedModuleMac < subSectionMemStart + subSectionSize)
  323. {
  324. // found stored MAC
  325. macFileLocation = (unsigned long)(subSectionFileStart + (expectedModuleMac - subSectionMemStart));
  326. verifier.AddRangeToSkip(0, macFileLocation, macSize);
  327. }
  328. file.TransferTo(verifier, subSectionFileStart - currentFilePos);
  329. verifier.Put(subSectionMemStart, subSectionSize);
  330. file.Skip(subSectionSize);
  331. currentFilePos = subSectionFileStart + subSectionSize;
  332. subSectionStart = nextSubSectionStart;
  333. } while (nextSubSectionStart != 0);
  334. }
  335. phs++;
  336. }
  337. #endif
  338. file.TransferAllTo(verifier);
  339. #ifdef CRYPTOPP_WIN32_AVAILABLE
  340. // if that fails (could be caused by debug breakpoints or DLL base relocation modifying image in memory),
  341. // hash from disk instead
  342. if (!VerifyBufsEqual(expectedModuleMac, actualMac, macSize))
  343. {
  344. OutputDebugString("In memory integrity check failed. This may be caused by debug breakpoints or DLL relocation.\n");
  345. moduleStream.clear();
  346. moduleStream.seekg(0);
  347. verifier.Initialize(MakeParameters(Name::OutputBuffer(), ByteArrayParameter(actualMac, (unsigned int)actualMac.size())));
  348. // verifier.Initialize(MakeParameters(Name::OutputFileName(), (const char *)"c:\\dt2.tmp"));
  349. verifier.AddRangeToSkip(0, checksumPos, checksumSize);
  350. verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize);
  351. verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize);
  352. verifier.AddRangeToSkip(0, macFileLocation, macSize);
  353. FileStore(moduleStream).TransferAllTo(verifier);
  354. }
  355. #endif
  356. if (VerifyBufsEqual(expectedModuleMac, actualMac, macSize))
  357. return true;
  358. #ifdef CRYPTOPP_WIN32_AVAILABLE
  359. std::string hexMac;
  360. HexEncoder(new StringSink(hexMac)).PutMessageEnd(actualMac, actualMac.size());
  361. OutputDebugString((("Crypto++ DLL integrity check failed. Actual MAC is: " + hexMac) + "\n").c_str());
  362. #endif
  363. return false;
  364. }
  365. void DoPowerUpSelfTest(const char *moduleFilename, const byte *expectedModuleMac)
  366. {
  367. g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_NOT_DONE;
  368. SetPowerUpSelfTestInProgressOnThisThread(true);
  369. try
  370. {
  371. if (FIPS_140_2_ComplianceEnabled() || expectedModuleMac != NULL)
  372. {
  373. if (!IntegrityCheckModule(moduleFilename, expectedModuleMac, &g_actualMac, &g_macFileLocation))
  374. throw 0; // throw here so we break in the debugger, this will be caught right away
  375. }
  376. // algorithm tests
  377. X917RNG_KnownAnswerTest<AES>(
  378. "2b7e151628aed2a6abf7158809cf4f3c", // key
  379. "000102030405060708090a0b0c0d0e0f", // seed
  380. "00000000000000000000000000000001", // time vector
  381. "D176EDD27493B0395F4D10546232B0693DC7061C03C3A554F09CECF6F6B46D945A"); // output
  382. SymmetricEncryptionKnownAnswerTest<DES_EDE3>(
  383. "385D7189A5C3D485E1370AA5D408082B5CCCCB5E19F2D90E",
  384. "C141B5FCCD28DC8A",
  385. "6E1BD7C6120947A464A6AAB293A0F89A563D8D40D3461B68",
  386. "64EAAD4ACBB9CEAD6C7615E7C7E4792FE587D91F20C7D2F4",
  387. "6235A461AFD312973E3B4F7AA7D23E34E03371F8E8C376C9",
  388. "E26BA806A59B0330DE40CA38E77A3E494BE2B212F6DD624B",
  389. "E26BA806A59B03307DE2BCC25A08BA40A8BA335F5D604C62",
  390. "E26BA806A59B03303C62C2EFF32D3ACDD5D5F35EBCC53371");
  391. SymmetricEncryptionKnownAnswerTest<SKIPJACK>(
  392. "1555E5531C3A169B2D65",
  393. "6EC9795701F49864",
  394. "00AFA48E9621E52E8CBDA312660184EDDB1F33D9DACDA8DA",
  395. "DBEC73562EFCAEB56204EB8AE9557EBF77473FBB52D17CD1",
  396. "0C7B0B74E21F99B8F2C8DF37879F6C044967F42A796DCA8B",
  397. "79FDDA9724E36CC2E023E9A5C717A8A8A7FDA465CADCBF63",
  398. "79FDDA9724E36CC26CACBD83C1ABC06EAF5B249BE5B1E040",
  399. "79FDDA9724E36CC211B0AEC607B95A96BCDA318440B82F49");
  400. SymmetricEncryptionKnownAnswerTest<AES>(
  401. "2b7e151628aed2a6abf7158809cf4f3c",
  402. "000102030405060708090a0b0c0d0e0f",
  403. "6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710", // plaintext
  404. "3ad77bb40d7a3660a89ecaf32466ef97f5d3d58503b9699de785895a96fdbaaf43b1cd7f598ece23881b00e3ed0306887b0c785e27e8ad3f8223207104725dd4", // ecb
  405. "7649abac8119b246cee98e9b12e9197d5086cb9b507219ee95db113a917678b273bed6b8e3c1743b7116e69e222295163ff1caa1681fac09120eca307586e1a7", // cbc
  406. "3b3fd92eb72dad20333449f8e83cfb4ac8a64537a0b3a93fcde3cdad9f1ce58b26751f67a3cbb140b1808cf187a4f4dfc04b05357c5d1c0eeac4c66f9ff7f2e6", // cfb
  407. "3b3fd92eb72dad20333449f8e83cfb4a7789508d16918f03f53c52dac54ed8259740051e9c5fecf64344f7a82260edcc304c6528f659c77866a510d9c1d6ae5e", // ofb
  408. NULL);
  409. SymmetricEncryptionKnownAnswerTest<AES>(
  410. "2b7e151628aed2a6abf7158809cf4f3c",
  411. "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
  412. "6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710",
  413. NULL,
  414. NULL,
  415. NULL,
  416. NULL,
  417. "874d6191b620e3261bef6864990db6ce9806f66b7970fdff8617187bb9fffdff5ae4df3edbd5d35e5b4f09020db03eab1e031dda2fbe03d1792170a0f3009cee"); // ctr
  418. SecureHashKnownAnswerTest<SHA1>(
  419. "abc",
  420. "A9993E364706816ABA3E25717850C26C9CD0D89D");
  421. SecureHashKnownAnswerTest<SHA224>(
  422. "abc",
  423. "23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7");
  424. SecureHashKnownAnswerTest<SHA256>(
  425. "abc",
  426. "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad");
  427. SecureHashKnownAnswerTest<SHA384>(
  428. "abc",
  429. "cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7");
  430. SecureHashKnownAnswerTest<SHA512>(
  431. "abc",
  432. "ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f");
  433. MAC_KnownAnswerTest<HMAC<SHA1> >(
  434. "303132333435363738393a3b3c3d3e3f40414243",
  435. "Sample #2",
  436. "0922d3405faa3d194f82a45830737d5cc6c75d24");
  437. const char *keyRSA1 =
  438. "30820150020100300d06092a864886f70d01010105000482013a3082013602010002400a66791dc6988168de7ab77419bb7fb0"
  439. "c001c62710270075142942e19a8d8c51d053b3e3782a1de5dc5af4ebe99468170114a1dfe67cdc9a9af55d655620bbab0203010001"
  440. "02400123c5b61ba36edb1d3679904199a89ea80c09b9122e1400c09adcf7784676d01d23356a7d44d6bd8bd50e94bfc723fa"
  441. "87d8862b75177691c11d757692df8881022033d48445c859e52340de704bcdda065fbb4058d740bd1d67d29e9c146c11cf61"
  442. "0220335e8408866b0fd38dc7002d3f972c67389a65d5d8306566d5c4f2a5aa52628b0220045ec90071525325d3d46db79695e9af"
  443. "acc4523964360e02b119baa366316241022015eb327360c7b60d12e5e2d16bdcd97981d17fba6b70db13b20b436e24eada590220"
  444. "2ca6366d72781dfa24d34a9a24cbc2ae927a9958af426563ff63fb11658a461d";
  445. const char *keyRSA2 =
  446. "30820273020100300D06092A864886F70D01010105000482025D3082025902010002818100D40AF9"
  447. "A2B713034249E5780056D70FC7DE75D76E44565AA6A6B8ED9646F3C19F9E254D72D7DE6E49DB2264"
  448. "0C1D05AB9E2A5F901D8F3FE1F7AE02CEE2ECCE54A40ABAE55A004692752E70725AEEE7CDEA67628A"
  449. "82A9239B4AB660C2BC56D9F01E90CBAAB9BF0FC8E17173CEFC5709A29391A7DDF3E0B758691AAF30"
  450. "725B292F4F020111027F18C0BA087D082C45D75D3594E0767E4820818EB35612B80CEAB8C880ACA5"
  451. "44B6876DFFEF85A576C0D45B551AFAA1FD63209CD745DF75C5A0F0B580296EA466CD0338207E4752"
  452. "FF4E7DB724D8AE18CE5CF4153BB94C27869FBB50E64F02546E4B02997A0B8623E64017CC770759C6"
  453. "695DB649EEFD829D688D441BCC4E7348F1024100EF86DD7AF3F32CDE8A9F6564E43A559A0C9F8BAD"
  454. "36CC25330548B347AC158A345631FA90F7B873C36EFFAE2F7823227A3F580B5DD18304D5932751E7"
  455. "43E9234F024100E2A039854B55688740E32A51DF4AF88613D91A371CF8DDD95D780A89D7CF2119A9"
  456. "54F1AC0F3DCDB2F6959926E6D9D37D8BC07A4C634DE6F16315BD5F0DAC340102407ECEEDB9903572"
  457. "1B76909F174BA6698DCA72953D957B22C0A871C8531EDE3A1BB52984A719BC010D1CA57A555DB83F"
  458. "6DE54CBAB932AEC652F38D497A6F3F30CF024100854F30E4FF232E6DADB2CD99926855F484255AB7"
  459. "01FBCDCB27EC426F33A7046972AA700ADBCA008763DF87440F52F4E070531AC385B55AAC1C2AE7DD"
  460. "8F9278F1024100C313F4AF9E4A9DE1253C21080CE524251560C111550772FD08690F13FBE658342E"
  461. "BD2D41C9DCB12374E871B1839E26CAE252E1AE3DAAD5F1EE1F42B4D0EE7581";
  462. SignatureKnownAnswerTest<RSASS<PKCS1v15, SHA1> >(
  463. keyRSA1,
  464. "Everyone gets Friday off.",
  465. "0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81");
  466. SignatureKnownAnswerTest<RSASS_ISO<SHA1> >(
  467. keyRSA2,
  468. "test",
  469. "32F6BA41C8930DE71EE67F2627172CC539EDE04267FDE03AC295E3C50311F26C3B275D3AF513AC96"
  470. "8EE493BAB7DA3A754661D1A7C4A0D1A2B7EE8B313AACD8CB8BFBC5C15EFB0EF15C86A9334A1E87AD"
  471. "291EB961B5CA0E84930429B28780816AA94F96FC2367B71E2D2E4866FA966795B147F00600E5207E"
  472. "2F189C883B37477C");
  473. SignaturePairwiseConsistencyTest<DSA>(
  474. "3082014A0201003082012B06072A8648CE3804013082011E02818100F468699A6F6EBCC0120D3B34C8E007F125EC7D81F763B8D0F33869AE3BD6B9F2ECCC7DF34DF84C0307449E9B85D30D57194BCCEB310F48141914DD13A077AAF9B624A6CBE666BBA1D7EBEA95B5BA6F54417FD5D4E4220C601E071D316A24EA814E8B0122DBF47EE8AEEFD319EBB01DD95683F10DBB4FEB023F8262A07EAEB7FD02150082AD4E034DA6EEACDFDAE68C36F2BAD614F9E53B02818071AAF73361A26081529F7D84078ADAFCA48E031DB54AD57FB1A833ADBD8672328AABAA0C756247998D7A5B10DACA359D231332CE8120B483A784FE07D46EEBFF0D7D374A10691F78653E6DC29E27CCB1B174923960DFE5B959B919B2C3816C19251832AFD8E35D810E598F82877ABF7D40A041565168BD7F0E21E3FE2A8D8C1C0416021426EBA66E846E755169F84A1DA981D86502405DDF");
  475. SignaturePairwiseConsistencyTest<ECDSA<EC2N, SHA1> >(
  476. "302D020100301006072A8648CE3D020106052B8104000404163014020101040F0070337065E1E196980A9D00E37211");
  477. SignaturePairwiseConsistencyTest<ECDSA<ECP, SHA1> >(
  478. "3039020100301306072A8648CE3D020106082A8648CE3D030101041F301D02010104182BB8A13C8B867010BD9471D9E81FDB01ABD0538C64D6249A");
  479. SignaturePairwiseConsistencyTest<RSASS<PSS, SHA1> >(keyRSA1);
  480. }
  481. catch (...)
  482. {
  483. g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_FAILED;
  484. goto done;
  485. }
  486. g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_PASSED;
  487. done:
  488. SetPowerUpSelfTestInProgressOnThisThread(false);
  489. return;
  490. }
  491. #ifdef CRYPTOPP_WIN32_AVAILABLE
  492. void DoDllPowerUpSelfTest()
  493. {
  494. CryptoPP::DoPowerUpSelfTest(NULL, s_moduleMac);
  495. }
  496. #else
  497. void DoDllPowerUpSelfTest()
  498. {
  499. throw NotImplemented("DoDllPowerUpSelfTest() only available on Windows");
  500. }
  501. #endif // #ifdef CRYPTOPP_WIN32_AVAILABLE
  502. NAMESPACE_END
  503. #ifdef CRYPTOPP_WIN32_AVAILABLE
  504. // DllMain needs to be in the global namespace
  505. BOOL APIENTRY DllMain(HANDLE hModule,
  506. DWORD dwReason,
  507. LPVOID /*lpReserved*/)
  508. {
  509. if (dwReason == DLL_PROCESS_ATTACH)
  510. {
  511. CryptoPP::s_hModule = (HMODULE)hModule;
  512. CryptoPP::DoDllPowerUpSelfTest();
  513. }
  514. return TRUE;
  515. }
  516. #endif // #ifdef CRYPTOPP_WIN32_AVAILABLE
  517. #endif // #ifndef CRYPTOPP_IMPORTS