// test.cpp - originally written and placed in the public domain by Wei Dai // CryptoPP::Test namespace added by JW in February 2017 #define CRYPTOPP_DEFAULT_NO_DLL #define CRYPTOPP_ENABLE_NAMESPACE_WEAK 1 #include "dll.h" #include "aes.h" #include "cryptlib.h" #include "filters.h" #include "md5.h" #include "ripemd.h" #include "rng.h" #include "gzip.h" #include "default.h" #include "randpool.h" #include "ida.h" #include "base64.h" #include "socketft.h" #include "wait.h" #include "factory.h" #include "whrlpool.h" #include "tiger.h" #include "smartptr.h" #include "stdcpp.h" #include "ossig.h" #include "trap.h" #include "validate.h" #include "bench.h" #include #include #include #include #ifdef CRYPTOPP_WIN32_AVAILABLE #define WIN32_LEAN_AND_MEAN #include #endif #if defined(USE_BERKELEY_STYLE_SOCKETS) && !defined(macintosh) #include #include #endif #if (_MSC_VER >= 1000) #include // for the debug heap #endif #if defined(__MWERKS__) && defined(macintosh) #include #endif #ifdef _OPENMP # include #endif #ifdef __BORLANDC__ #pragma comment(lib, "cryptlib_bds.lib") #pragma comment(lib, "ws2_32.lib") #endif // Aggressive stack checking with VS2005 SP1 and above. #if (CRYPTOPP_MSC_VERSION >= 1410) # pragma strict_gs_check (on) #endif USING_NAMESPACE(CryptoPP) const int MAX_PHRASE_LENGTH=250; void RegisterFactories(); void PrintSeedAndThreads(const std::string& seed); void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed); std::string RSAEncryptString(const char *pubFilename, const char *seed, const char *message); std::string RSADecryptString(const char *privFilename, const char *ciphertext); void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename); bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename); void DigestFile(const char *file); void HmacFile(const char *hexKey, const char *file); void AES_CTR_Encrypt(const char *hexKey, const char *hexIV, const char *infile, const char *outfile); std::string EncryptString(const char *plaintext, const char *passPhrase); std::string DecryptString(const char *ciphertext, const char *passPhrase); void EncryptFile(const char *in, const char *out, const char *passPhrase); void DecryptFile(const char *in, const char *out, const char *passPhrase); void SecretShareFile(int threshold, int nShares, const char *filename, const char *seed); void SecretRecoverFile(int threshold, const char *outFilename, char *const *inFilenames); void InformationDisperseFile(int threshold, int nShares, const char *filename); void InformationRecoverFile(int threshold, const char *outFilename, char *const *inFilenames); void GzipFile(const char *in, const char *out, int deflate_level); void GunzipFile(const char *in, const char *out); void Base64Encode(const char *infile, const char *outfile); void Base64Decode(const char *infile, const char *outfile); void HexEncode(const char *infile, const char *outfile); void HexDecode(const char *infile, const char *outfile); void ForwardTcpPort(const char *sourcePort, const char *destinationHost, const char *destinationPort); void FIPS140_SampleApplication(); void FIPS140_GenerateRandomFiles(); bool Validate(int, bool, const char *); void PrintSeedAndThreads(const std::string& seed); int (*AdhocTest)(int argc, char *argv[]) = NULLPTR; NAMESPACE_BEGIN(CryptoPP) NAMESPACE_BEGIN(Test) // Coverity finding template T StringToValue(const std::string& str) { std::istringstream iss(str); // Arbitrary, but we need to clear a Coverity finding TAINTED_SCALAR if (iss.str().length() > 25) throw InvalidArgument(str + "' is too long"); T value; iss >> std::noskipws >> value; // Use fail(), not bad() if (iss.fail() || !iss.eof()) throw InvalidArgument(str + "' is not a value"); if (NON_NEGATIVE && value < 0) throw InvalidArgument(str + "' is negative"); return value; } // Coverity finding template<> int StringToValue(const std::string& str) { Integer n(str.c_str()); long l = n.ConvertToLong(); int r; if (!SafeConvert(l, r)) throw InvalidArgument(str + "' is not an integer value"); return r; } ANONYMOUS_NAMESPACE_BEGIN OFB_Mode::Encryption s_globalRNG; NAMESPACE_END RandomNumberGenerator & GlobalRNG() { return dynamic_cast(s_globalRNG); } NAMESPACE_END // Test NAMESPACE_END // CryptoPP // See misc.h and trap.h for comments and usage #if defined(CRYPTOPP_DEBUG) && defined(UNIX_SIGNALS_AVAILABLE) static const SignalHandler s_dummyHandler; // static const DebugTrapHandler s_dummyHandler; #endif int CRYPTOPP_API main(int argc, char *argv[]) { #ifdef _CRTDBG_LEAK_CHECK_DF // Turn on leak-checking int tempflag = _CrtSetDbgFlag( _CRTDBG_REPORT_FLAG ); tempflag |= _CRTDBG_LEAK_CHECK_DF; _CrtSetDbgFlag( tempflag ); #endif #if defined(__MWERKS__) && defined(macintosh) argc = ccommand(&argv); #endif try { RegisterFactories(); // Some editors have problems with the '\0' character when redirecting output. std::string seed = IntToString(time(NULLPTR)); seed.resize(16, ' '); // Fetch the SymmetricCipher interface, not the RandomNumberGenerator interface, to key the underlying cipher OFB_Mode::Encryption& aesg = dynamic_cast::Encryption&>(Test::GlobalRNG()); aesg.SetKeyWithIV((byte *)seed.data(), 16, (byte *)seed.data()); std::string command, executableName, macFilename; if (argc < 2) command = 'h'; else command = argv[1]; if (command == "g") { char thisSeed[1024], privFilename[128], pubFilename[128]; unsigned int keyLength; std::cout << "Key length in bits: "; std::cin >> keyLength; std::cout << "\nSave private key to file: "; std::cin >> privFilename; std::cout << "\nSave public key to file: "; std::cin >> pubFilename; std::cout << "\nRandom Seed: "; std::ws(std::cin); std::cin.getline(thisSeed, 1024); GenerateRSAKey(keyLength, privFilename, pubFilename, thisSeed); } else if (command == "rs") RSASignFile(argv[2], argv[3], argv[4]); else if (command == "rv") { bool verified = RSAVerifyFile(argv[2], argv[3], argv[4]); std::cout << (verified ? "valid signature" : "invalid signature") << std::endl; } else if (command == "r") { char privFilename[128], pubFilename[128]; char thisSeed[1024], message[1024]; std::cout << "Private key file: "; std::cin >> privFilename; std::cout << "\nPublic key file: "; std::cin >> pubFilename; std::cout << "\nRandom Seed: "; std::ws(std::cin); std::cin.getline(thisSeed, 1024); std::cout << "\nMessage: "; std::cin.getline(message, 1024); std::string ciphertext = RSAEncryptString(pubFilename, thisSeed, message); std::cout << "\nCiphertext: " << ciphertext << std::endl; std::string decrypted = RSADecryptString(privFilename, ciphertext.c_str()); std::cout << "\nDecrypted: " << decrypted << std::endl; } else if (command == "mt") { MaurerRandomnessTest mt; FileStore fs(argv[2]); fs.TransferAllTo(mt); std::cout << "Maurer Test Value: " << mt.GetTestValue() << std::endl; } else if (command == "mac_dll") { std::string fname(argv[2] ? argv[2] : ""); // sanity check on file size std::fstream dllFile(fname.c_str(), std::ios::in | std::ios::out | std::ios::binary); if (!dllFile.good()) { std::cerr << "Failed to open file \"" << fname << "\"\n"; return 1; } std::ifstream::pos_type fileEnd = dllFile.seekg(0, std::ios_base::end).tellg(); if (fileEnd > 20*1000*1000) { std::cerr << "Input file " << fname << " is too large"; std::cerr << "(size is " << fileEnd << ").\n"; return 1; } // read file into memory unsigned int fileSize = (unsigned int)fileEnd; SecByteBlock buf(fileSize); dllFile.seekg(0, std::ios_base::beg); dllFile.read((char *)buf.begin(), fileSize); // find positions of relevant sections in the file, based on version 8 of documentation from http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx word32 coffPos = *(word16 *)(void *)(buf+0x3c); word32 optionalHeaderPos = coffPos + 24; word16 optionalHeaderMagic = *(word16 *)(void *)(buf+optionalHeaderPos); if (optionalHeaderMagic != 0x10b && optionalHeaderMagic != 0x20b) { std::cerr << "Target file is not a PE32 or PE32+ image.\n"; return 3; } word32 checksumPos = optionalHeaderPos + 64; word32 certificateTableDirectoryPos = optionalHeaderPos + (optionalHeaderMagic == 0x10b ? 128 : 144); word32 certificateTablePos = *(word32 *)(void *)(buf+certificateTableDirectoryPos); word32 certificateTableSize = *(word32 *)(void *)(buf+certificateTableDirectoryPos+4); if (certificateTableSize != 0) std::cerr << "Warning: certificate table (IMAGE_DIRECTORY_ENTRY_SECURITY) of target image is not empty.\n"; // find where to place computed MAC byte mac[] = CRYPTOPP_DUMMY_DLL_MAC; byte *found = std::search(buf.begin(), buf.end(), mac+0, mac+sizeof(mac)); if (found == buf.end()) { std::cerr << "MAC placeholder not found. The MAC may already be placed.\n"; return 2; } word32 macPos = (unsigned int)(found-buf.begin()); // compute MAC member_ptr pMac(NewIntegrityCheckingMAC()); CRYPTOPP_ASSERT(pMac->DigestSize() == sizeof(mac)); MeterFilter f(new HashFilter(*pMac, new ArraySink(mac, sizeof(mac)))); f.AddRangeToSkip(0, checksumPos, 4); f.AddRangeToSkip(0, certificateTableDirectoryPos, 8); f.AddRangeToSkip(0, macPos, sizeof(mac)); f.AddRangeToSkip(0, certificateTablePos, certificateTableSize); f.PutMessageEnd(buf.begin(), buf.size()); // Encode MAC std::string hexMac; HexEncoder encoder; encoder.Put(mac, sizeof(mac)), encoder.MessageEnd(); hexMac.resize(static_cast(encoder.MaxRetrievable())); encoder.Get(reinterpret_cast(&hexMac[0]), hexMac.size()); // Report MAC and location std::cout << "Placing MAC " << hexMac << " in " << fname << " at file offset " << macPos; std::cout << " (0x" << std::hex << macPos << std::dec << ").\n"; // place MAC dllFile.seekg(macPos, std::ios_base::beg); dllFile.write((char *)mac, sizeof(mac)); } else if (command == "m") DigestFile(argv[2]); else if (command == "tv") { // TestDataFile() adds CRYPTOPP_DATA_DIR as required std::string fname = (argv[2] ? argv[2] : "all"); if (fname.find(".txt") == std::string::npos) fname = "TestVectors/" + fname + ".txt"; PrintSeedAndThreads(seed); return !Test::RunTestDataFile(fname.c_str()); } else if (command == "t") { // VC60 workaround: use char array instead of std::string to workaround MSVC's getline bug char passPhrase[MAX_PHRASE_LENGTH], plaintext[1024]; std::cout << "Passphrase: "; std::cin.getline(passPhrase, MAX_PHRASE_LENGTH); std::cout << "\nPlaintext: "; std::cin.getline(plaintext, 1024); std::string ciphertext = EncryptString(plaintext, passPhrase); std::cout << "\nCiphertext: " << ciphertext << std::endl; std::string decrypted = DecryptString(ciphertext.c_str(), passPhrase); std::cout << "\nDecrypted: " << decrypted << std::endl; return 0; } else if (command == "e64") Base64Encode(argv[2], argv[3]); else if (command == "d64") Base64Decode(argv[2], argv[3]); else if (command == "e16") HexEncode(argv[2], argv[3]); else if (command == "d16") HexDecode(argv[2], argv[3]); else if (command == "e" || command == "d") { char passPhrase[MAX_PHRASE_LENGTH]; std::cout << "Passphrase: "; std::cin.getline(passPhrase, MAX_PHRASE_LENGTH); if (command == "e") EncryptFile(argv[2], argv[3], passPhrase); else DecryptFile(argv[2], argv[3], passPhrase); } else if (command == "ss") { char thisSeed[1024]; std::cout << "\nRandom Seed: "; std::ws(std::cin); std::cin.getline(thisSeed, 1024); SecretShareFile(Test::StringToValue(argv[2]), Test::StringToValue(argv[3]), argv[4], thisSeed); } else if (command == "sr") SecretRecoverFile(argc-3, argv[2], argv+3); else if (command == "id") InformationDisperseFile(Test::StringToValue(argv[2]), Test::StringToValue(argv[3]), argv[4]); else if (command == "ir") InformationRecoverFile(argc-3, argv[2], argv+3); else if (command == "v" || command == "vv") return !Validate(argc>2 ? Test::StringToValue(argv[2]) : 0, argv[1][1] == 'v', argc>3 ? argv[3] : NULLPTR); else if (command == "b") // All benchmarks Test::Benchmark(7, argc<3 ? 1 : Test::StringToValue(argv[2]), argc<4 ? 0.0f : Test::StringToValue(argv[3])*1e9); else if (command == "b3") // Public key algorithms Test::Benchmark(4, argc<3 ? 1 : Test::StringToValue(argv[2]), argc<4 ? 0.0f : Test::StringToValue(argv[3])*1e9); else if (command == "b2") // Shared key algorithms Test::Benchmark(2, argc<3 ? 1 : Test::StringToValue(argv[2]), argc<4 ? 0.0f : Test::StringToValue(argv[3])*1e9); else if (command == "b1") // Unkeyed algorithms Test::Benchmark(1, argc<3 ? 1 : Test::StringToValue(argv[2]), argc<4 ? 0.0f : Test::StringToValue(argv[3])*1e9); else if (command == "z") GzipFile(argv[3], argv[4], argv[2][0]-'0'); else if (command == "u") GunzipFile(argv[2], argv[3]); else if (command == "fips") FIPS140_SampleApplication(); else if (command == "fips-rand") FIPS140_GenerateRandomFiles(); else if (command == "ft") ForwardTcpPort(argv[2], argv[3], argv[4]); else if (command == "a") { if (AdhocTest) return (*AdhocTest)(argc, argv); else { std::cerr << "AdhocTest not defined.\n"; return 1; } } else if (command == "hmac") HmacFile(argv[2], argv[3]); else if (command == "ae") AES_CTR_Encrypt(argv[2], argv[3], argv[4], argv[5]); else if (command == "h") { FileSource usage(CRYPTOPP_DATA_DIR "TestData/usage.dat", true, new FileSink(std::cout)); return 1; } else if (command == "V") { std::cout << CRYPTOPP_VERSION / 100 << '.' << (CRYPTOPP_VERSION % 100) / 10 << '.' << CRYPTOPP_VERSION % 10 << std::endl; } else { std::cerr << "Unrecognized command. Run \"cryptest h\" to obtain usage information.\n"; return 1; } return 0; } catch(const CryptoPP::Exception &e) { std::cout << "\nCryptoPP::Exception caught: " << e.what() << std::endl; return -1; } catch(const std::exception &e) { std::cout << "\nstd::exception caught: " << e.what() << std::endl; return -2; } } // End main() void FIPS140_GenerateRandomFiles() { #ifdef OS_RNG_AVAILABLE DefaultAutoSeededRNG rng; RandomNumberStore store(rng, ULONG_MAX); for (unsigned int i=0; i<100000; i++) store.TransferTo(FileSink((IntToString(i) + ".rnd").c_str()).Ref(), 20000); #else std::cout << "OS provided RNG not available.\n"; exit(-1); #endif } void PrintSeedAndThreads(const std::string& seed) { std::cout << "Using seed: " << seed << std::endl; #ifdef _OPENMP int tc = 0; #pragma omp parallel { tc = omp_get_num_threads(); } std::cout << "Using " << tc << " OMP " << (tc == 1 ? "thread" : "threads") << std::endl; #endif } SecByteBlock HexDecodeString(const char *hex) { StringSource ss(hex, true, new HexDecoder); SecByteBlock result((size_t)ss.MaxRetrievable()); ss.Get(result, result.size()); return result; } void GenerateRSAKey(unsigned int keyLength, const char *privFilename, const char *pubFilename, const char *seed) { RandomPool randPool; randPool.IncorporateEntropy((byte *)seed, strlen(seed)); RSAES_OAEP_SHA_Decryptor priv(randPool, keyLength); HexEncoder privFile(new FileSink(privFilename)); priv.DEREncode(privFile); privFile.MessageEnd(); RSAES_OAEP_SHA_Encryptor pub(priv); HexEncoder pubFile(new FileSink(pubFilename)); pub.DEREncode(pubFile); pubFile.MessageEnd(); } std::string RSAEncryptString(const char *pubFilename, const char *seed, const char *message) { FileSource pubFile(pubFilename, true, new HexDecoder); RSAES_OAEP_SHA_Encryptor pub(pubFile); RandomPool randPool; randPool.IncorporateEntropy((byte *)seed, strlen(seed)); std::string result; StringSource(message, true, new PK_EncryptorFilter(randPool, pub, new HexEncoder(new StringSink(result)))); return result; } std::string RSADecryptString(const char *privFilename, const char *ciphertext) { FileSource privFile(privFilename, true, new HexDecoder); RSAES_OAEP_SHA_Decryptor priv(privFile); std::string result; StringSource(ciphertext, true, new HexDecoder(new PK_DecryptorFilter(Test::GlobalRNG(), priv, new StringSink(result)))); return result; } void RSASignFile(const char *privFilename, const char *messageFilename, const char *signatureFilename) { FileSource privFile(privFilename, true, new HexDecoder); RSASS::Signer priv(privFile); FileSource f(messageFilename, true, new SignerFilter(Test::GlobalRNG(), priv, new HexEncoder(new FileSink(signatureFilename)))); } bool RSAVerifyFile(const char *pubFilename, const char *messageFilename, const char *signatureFilename) { FileSource pubFile(pubFilename, true, new HexDecoder); RSASS::Verifier pub(pubFile); FileSource signatureFile(signatureFilename, true, new HexDecoder); if (signatureFile.MaxRetrievable() != pub.SignatureLength()) return false; SecByteBlock signature(pub.SignatureLength()); signatureFile.Get(signature, signature.size()); SignatureVerificationFilter *verifierFilter = new SignatureVerificationFilter(pub); verifierFilter->Put(signature, pub.SignatureLength()); FileSource f(messageFilename, true, verifierFilter); return verifierFilter->GetLastResult(); } void DigestFile(const char *filename) { SHA1 sha; RIPEMD160 ripemd; SHA256 sha256; Tiger tiger; SHA512 sha512; Whirlpool whirlpool; vector_member_ptrs filters(6); filters[0].reset(new HashFilter(sha)); filters[1].reset(new HashFilter(ripemd)); filters[2].reset(new HashFilter(tiger)); filters[3].reset(new HashFilter(sha256)); filters[4].reset(new HashFilter(sha512)); filters[5].reset(new HashFilter(whirlpool)); member_ptr channelSwitch(new ChannelSwitch); size_t i; for (i=0; iAddDefaultRoute(*filters[i]); FileSource(filename, true, channelSwitch.release()); HexEncoder encoder(new FileSink(std::cout), false); for (i=0; iAlgorithmName() << ": "; filters[i]->TransferTo(encoder); std::cout << "\n"; } } void HmacFile(const char *hexKey, const char *file) { member_ptr mac; if (strcmp(hexKey, "selftest") == 0) { std::cerr << "Computing HMAC/SHA1 value for self test.\n"; mac.reset(NewIntegrityCheckingMAC()); } else { std::string decodedKey; StringSource(hexKey, true, new HexDecoder(new StringSink(decodedKey))); mac.reset(new HMAC((const byte *)decodedKey.data(), decodedKey.size())); } FileSource(file, true, new HashFilter(*mac, new HexEncoder(new FileSink(std::cout)))); } void AES_CTR_Encrypt(const char *hexKey, const char *hexIV, const char *infile, const char *outfile) { SecByteBlock key = HexDecodeString(hexKey); SecByteBlock iv = HexDecodeString(hexIV); CTR_Mode::Encryption aes(key, key.size(), iv); FileSource(infile, true, new StreamTransformationFilter(aes, new FileSink(outfile))); } std::string EncryptString(const char *instr, const char *passPhrase) { std::string outstr; DefaultEncryptorWithMAC encryptor(passPhrase, new HexEncoder(new StringSink(outstr))); encryptor.Put((byte *)instr, strlen(instr)); encryptor.MessageEnd(); return outstr; } std::string DecryptString(const char *instr, const char *passPhrase) { std::string outstr; HexDecoder decryptor(new DefaultDecryptorWithMAC(passPhrase, new StringSink(outstr))); decryptor.Put((byte *)instr, strlen(instr)); decryptor.MessageEnd(); return outstr; } void EncryptFile(const char *in, const char *out, const char *passPhrase) { FileSource f(in, true, new DefaultEncryptorWithMAC(passPhrase, new FileSink(out))); } void DecryptFile(const char *in, const char *out, const char *passPhrase) { FileSource f(in, true, new DefaultDecryptorWithMAC(passPhrase, new FileSink(out))); } void SecretShareFile(int threshold, int nShares, const char *filename, const char *seed) { CRYPTOPP_ASSERT(nShares >= 1 && nShares<=1000); if (nShares < 1 || nShares > 1000) throw InvalidArgument("SecretShareFile: " + IntToString(nShares) + " is not in range [1, 1000]"); RandomPool rng; rng.IncorporateEntropy((byte *)seed, strlen(seed)); ChannelSwitch *channelSwitch = NULLPTR; FileSource source(filename, false, new SecretSharing(rng, threshold, nShares, channelSwitch = new ChannelSwitch)); vector_member_ptrs fileSinks(nShares); std::string channel; for (int i=0; i(i); fileSinks[i]->Put((const byte *)channel.data(), 4); channelSwitch->AddRoute(channel, *fileSinks[i], DEFAULT_CHANNEL); } source.PumpAll(); } void SecretRecoverFile(int threshold, const char *outFilename, char *const *inFilenames) { CRYPTOPP_ASSERT(threshold >= 1 && threshold <=1000); if (threshold < 1 || threshold > 1000) throw InvalidArgument("SecretRecoverFile: " + IntToString(threshold) + " is not in range [1, 1000]"); SecretRecovery recovery(threshold, new FileSink(outFilename)); vector_member_ptrs fileSources(threshold); SecByteBlock channel(4); int i; for (i=0; iPump(4); fileSources[i]->Get(channel, 4); fileSources[i]->Attach(new ChannelSwitch(recovery, std::string((char *)channel.begin(), 4))); } while (fileSources[0]->Pump(256)) for (i=1; iPump(256); for (i=0; iPumpAll(); } void InformationDisperseFile(int threshold, int nShares, const char *filename) { CRYPTOPP_ASSERT(threshold >= 1 && threshold <=1000); if (threshold < 1 || threshold > 1000) throw InvalidArgument("InformationDisperseFile: " + IntToString(nShares) + " is not in range [1, 1000]"); ChannelSwitch *channelSwitch = NULLPTR; FileSource source(filename, false, new InformationDispersal(threshold, nShares, channelSwitch = new ChannelSwitch)); vector_member_ptrs fileSinks(nShares); std::string channel; for (int i=0; i(i); fileSinks[i]->Put((const byte *)channel.data(), 4); channelSwitch->AddRoute(channel, *fileSinks[i], DEFAULT_CHANNEL); } source.PumpAll(); } void InformationRecoverFile(int threshold, const char *outFilename, char *const *inFilenames) { CRYPTOPP_ASSERT(threshold<=1000); if (threshold < 1 || threshold > 1000) throw InvalidArgument("InformationRecoverFile: " + IntToString(threshold) + " is not in range [1, 1000]"); InformationRecovery recovery(threshold, new FileSink(outFilename)); vector_member_ptrs fileSources(threshold); SecByteBlock channel(4); int i; for (i=0; iPump(4); fileSources[i]->Get(channel, 4); fileSources[i]->Attach(new ChannelSwitch(recovery, std::string((char *)channel.begin(), 4))); } while (fileSources[0]->Pump(256)) for (i=1; iPump(256); for (i=0; iPumpAll(); } void GzipFile(const char *in, const char *out, int deflate_level) { // FileSource(in, true, new Gzip(new FileSink(out), deflate_level)); // use a filter graph to compare decompressed data with original // // Source ----> Gzip ------> Sink // \ | // \ Gunzip // \ | // \ v // > ComparisonFilter EqualityComparisonFilter comparison; Gunzip gunzip(new ChannelSwitch(comparison, "0")); gunzip.SetAutoSignalPropagation(0); FileSink sink(out); ChannelSwitch *cs; Gzip gzip(cs = new ChannelSwitch(sink), deflate_level); cs->AddDefaultRoute(gunzip); cs = new ChannelSwitch(gzip); cs->AddDefaultRoute(comparison, "1"); FileSource source(in, true, cs); comparison.ChannelMessageSeriesEnd("0"); comparison.ChannelMessageSeriesEnd("1"); } void GunzipFile(const char *in, const char *out) { FileSource(in, true, new Gunzip(new FileSink(out))); } void Base64Encode(const char *in, const char *out) { FileSource(in, true, new Base64Encoder(new FileSink(out))); } void Base64Decode(const char *in, const char *out) { FileSource(in, true, new Base64Decoder(new FileSink(out))); } void HexEncode(const char *in, const char *out) { FileSource(in, true, new HexEncoder(new FileSink(out))); } void HexDecode(const char *in, const char *out) { FileSource(in, true, new HexDecoder(new FileSink(out))); } void ForwardTcpPort(const char *sourcePortName, const char *destinationHost, const char *destinationPortName) { // Quiet warnings for Windows Phone and Windows Store builds CRYPTOPP_UNUSED(sourcePortName), CRYPTOPP_UNUSED(destinationHost), CRYPTOPP_UNUSED(destinationPortName); #ifdef SOCKETS_AVAILABLE SocketsInitializer sockInit; Socket sockListen, sockSource, sockDestination; int sourcePort = Socket::PortNameToNumber(sourcePortName); int destinationPort = Socket::PortNameToNumber(destinationPortName); sockListen.Create(); sockListen.Bind(sourcePort); const int flag = 1; int err = setsockopt(sockListen, IPPROTO_TCP, TCP_NODELAY, (char*)&flag, sizeof(int)); CRYPTOPP_ASSERT(err == 0); if(err != 0) throw Socket::Err(sockListen, "setsockopt", sockListen.GetLastError()); std::cout << "Listing on port " << sourcePort << ".\n"; sockListen.Listen(); sockListen.Accept(sockSource); std::cout << "Connection accepted on port " << sourcePort << ".\n"; sockListen.CloseSocket(); std::cout << "Making connection to " << destinationHost << ", port " << destinationPort << ".\n"; sockDestination.Create(); sockDestination.Connect(destinationHost, destinationPort); std::cout << "Connection made to " << destinationHost << ", starting to forward.\n"; SocketSource out(sockSource, false, new SocketSink(sockDestination)); SocketSource in(sockDestination, false, new SocketSink(sockSource)); WaitObjectContainer waitObjects; while (!(in.SourceExhausted() && out.SourceExhausted())) { waitObjects.Clear(); out.GetWaitObjects(waitObjects, CallStack("ForwardTcpPort - out", NULLPTR)); in.GetWaitObjects(waitObjects, CallStack("ForwardTcpPort - in", NULLPTR)); waitObjects.Wait(INFINITE_TIME); if (!out.SourceExhausted()) { std::cout << "o" << std::flush; out.PumpAll2(false); if (out.SourceExhausted()) std::cout << "EOF received on source socket.\n"; } if (!in.SourceExhausted()) { std::cout << "i" << std::flush; in.PumpAll2(false); if (in.SourceExhausted()) std::cout << "EOF received on destination socket.\n"; } } #else std::cout << "Socket support was not enabled at compile time.\n"; exit(-1); #endif } bool Validate(int alg, bool thorough, const char *seedInput) { bool result; // Some editors have problems with the '\0' character when redirecting output. // seedInput is argv[3] when issuing 'cryptest.exe v all ' std::string seed = (seedInput ? seedInput : IntToString(std::time(NULLPTR))); seed.resize(16, ' '); OFB_Mode::Encryption& prng = dynamic_cast::Encryption&>(Test::GlobalRNG()); prng.SetKeyWithIV((byte *)seed.data(), 16, (byte *)seed.data()); Test::g_testBegin = std::time(NULLPTR); PrintSeedAndThreads(seed); switch (alg) { case 0: result = Test::ValidateAll(thorough); break; case 1: result = Test::TestSettings(); break; case 2: result = Test::TestOS_RNG(); break; // case 3: result = Test::TestSecRandom(); break; case 4: result = Test::ValidateMD5(); break; case 5: result = Test::ValidateSHA(); break; case 6: result = Test::ValidateDES(); break; case 7: result = Test::ValidateIDEA(); break; case 8: result = Test::ValidateARC4(); break; case 9: result = Test::ValidateRC5(); break; case 10: result = Test::ValidateBlowfish(); break; // case 11: result = Test::ValidateDiamond2(); break; case 12: result = Test::ValidateThreeWay(); break; case 13: result = Test::ValidateBBS(); break; case 14: result = Test::ValidateDH(); break; case 15: result = Test::ValidateRSA(); break; case 16: result = Test::ValidateElGamal(); break; case 17: result = Test::ValidateDSA(thorough); break; // case 18: result = Test::ValidateHAVAL(); break; case 19: result = Test::ValidateSAFER(); break; case 20: result = Test::ValidateLUC(); break; case 21: result = Test::ValidateRabin(); break; // case 22: result = Test::ValidateBlumGoldwasser(); break; case 23: result = Test::ValidateECP(); break; case 24: result = Test::ValidateEC2N(); break; // case 25: result = Test::ValidateMD5MAC(); break; case 26: result = Test::ValidateGOST(); break; case 27: result = Test::ValidateTiger(); break; case 28: result = Test::ValidateRIPEMD(); break; case 29: result = Test::ValidateHMAC(); break; // case 30: result = Test::ValidateXMACC(); break; case 31: result = Test::ValidateSHARK(); break; case 32: result = Test::ValidateLUC_DH(); break; case 33: result = Test::ValidateLUC_DL(); break; case 34: result = Test::ValidateSEAL(); break; case 35: result = Test::ValidateCAST(); break; case 36: result = Test::ValidateSquare(); break; case 37: result = Test::ValidateRC2(); break; case 38: result = Test::ValidateRC6(); break; case 39: result = Test::ValidateMARS(); break; case 40: result = Test::ValidateRW(); break; case 41: result = Test::ValidateMD2(); break; case 42: result = Test::ValidateNR(); break; case 43: result = Test::ValidateMQV(); break; case 44: result = Test::ValidateRijndael(); break; case 45: result = Test::ValidateTwofish(); break; case 46: result = Test::ValidateSerpent(); break; case 47: result = Test::ValidateCipherModes(); break; case 48: result = Test::ValidateCRC32(); break; case 49: result = Test::ValidateCRC32C(); break; case 50: result = Test::ValidateECDSA(); break; case 51: result = Test::ValidateECGDSA(); break; case 52: result = Test::ValidateXTR_DH(); break; case 53: result = Test::ValidateSKIPJACK(); break; case 54: result = Test::ValidateSHA2(); break; case 55: result = Test::ValidatePanama(); break; case 56: result = Test::ValidateAdler32(); break; case 57: result = Test::ValidateMD4(); break; case 58: result = Test::ValidatePBKDF(); break; case 59: result = Test::ValidateESIGN(); break; case 60: result = Test::ValidateDLIES(); break; case 61: result = Test::ValidateBaseCode(); break; case 62: result = Test::ValidateSHACAL2(); break; case 63: result = Test::ValidateCamellia(); break; case 64: result = Test::ValidateWhirlpool(); break; case 65: result = Test::ValidateTTMAC(); break; case 66: result = Test::ValidateSalsa(); break; case 67: result = Test::ValidateSosemanuk(); break; case 68: result = Test::ValidateVMAC(); break; case 69: result = Test::ValidateCCM(); break; case 70: result = Test::ValidateGCM(); break; case 71: result = Test::ValidateCMAC(); break; case 72: result = Test::ValidateHKDF(); break; case 73: result = Test::ValidateBLAKE2s(); break; case 74: result = Test::ValidateBLAKE2b(); break; case 75: result = Test::ValidatePoly1305(); break; case 76: result = Test::ValidateSipHash(); break; case 77: result = Test::ValidateHashDRBG(); break; case 78: result = Test::ValidateHmacDRBG(); break; #if defined(CRYPTOPP_DEBUG) && !defined(CRYPTOPP_IMPORTS) // http://github.com/weidai11/cryptopp/issues/92 case 9999: result = Test::TestSecBlock(); break; // http://github.com/weidai11/cryptopp/issues/64 case 9998: result = Test::TestPolynomialMod2(); break; // http://github.com/weidai11/cryptopp/issues/336 case 9997: result = Test::TestIntegerBitops(); break; // http://github.com/weidai11/cryptopp/issues/360 case 9996: result = Test::TestRounding(); break; // http://github.com/weidai11/cryptopp/issues/242 case 9995: result = Test::TestHuffmanCodes(); break; // http://github.com/weidai11/cryptopp/issues/346 case 9994: result = Test::TestASN1Parse(); break; #endif default: return false; } Test::g_testEnd = std::time(NULLPTR); std::cout << "\nSeed used was " << seed << std::endl; std::cout << "Test started at " << Test::TimeToString(Test::g_testBegin) << std::endl; std::cout << "Test ended at " << Test::TimeToString(Test::g_testEnd) << std::endl; return result; }