📄 testenv.c
字号:
/* Create the envelope, push in the data, pop the enveloped result, and
destroy the envelope */
if( !createEnvelope( &cryptEnvelope, formatType ) )
return( FALSE );
if( useDatasize )
cryptSetAttribute( cryptEnvelope, CRYPT_ENVINFO_DATASIZE, length );
if( useLargeBuffer )
cryptSetAttribute( cryptEnvelope, CRYPT_ATTRIBUTE_BUFFERSIZE,
length + 1024 );
count = pushData( cryptEnvelope, inBufPtr, length, NULL, 0 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, outBufPtr, bufSize );
if( cryptStatusError( count ) )
return( FALSE );
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
/* Tell them what happened */
printf( "Enveloped data has size %d bytes.\n", count );
if( !useLargeBuffer )
debugDump( dumpFileName, outBufPtr, count );
/* Create the envelope, push in the data, pop the de-enveloped result,
and destroy the envelope */
if( !createDeenvelope( &cryptEnvelope ) )
return( FALSE );
if( useLargeBuffer )
cryptSetAttribute( cryptEnvelope, CRYPT_ATTRIBUTE_BUFFERSIZE,
length + 1024 );
count = pushData( cryptEnvelope, outBufPtr, count, NULL, 0 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, outBufPtr, bufSize );
if( cryptStatusError( count ) )
return( FALSE );
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
/* Make sure the result matches what we pushed */
if( count != length )
{
puts( "De-enveloped data length != original length." );
return( FALSE );
}
if( useLargeBuffer )
{
int i;
for( i = 0; i < length; i++ )
if( outBufPtr[ i ] != ( i & 0xFF ) )
{
printf( "De-enveloped data != original data at byte %d.\n", i );
return( FALSE );
}
}
else
if( memcmp( outBufPtr, ENVELOPE_TESTDATA, length ) )
{
puts( "De-enveloped data != original data." );
return( FALSE );
}
/* Clean up */
if( useLargeBuffer )
free( inBufPtr );
puts( "Enveloping of plain data succeeded.\n" );
return( TRUE );
}
int testEnvelopeData( void )
{
if( !envelopeData( "env_datn", FALSE, FALSE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Indefinite-length */
if( !envelopeData( "env_dat", TRUE, FALSE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Datasize */
return( envelopeData( "env_dat.pgp", TRUE, FALSE, CRYPT_FORMAT_PGP ) );
} /* PGP format */
int testLargeBufferEnvelopeData( void )
{
if( !envelopeData( NULL, TRUE, TRUE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Datasize, large buffer */
return( envelopeData( NULL, TRUE, TRUE, CRYPT_FORMAT_PGP ) );
} /* Large buffer, PGP format */
/* Test compressed enveloping */
static int envelopeDecompress( BYTE *buffer, const int length )
{
CRYPT_ENVELOPE cryptEnvelope;
BYTE smallBuffer[ 128 ];
int count, zeroCount;
/* Create the envelope, push in the data, and pop the de-enveloped
result */
if( !createDeenvelope( &cryptEnvelope ) )
return( FALSE );
count = pushData( cryptEnvelope, buffer, length, NULL, 0 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, buffer, FILEBUFFER_SIZE );
if( cryptStatusError( count ) )
{
#ifdef __hpux
if( count == -1 )
puts( "Older HPUX compilers break zlib, to remedy this you can "
"either get a better\ncompiler/OS or grab a debugger and "
"try to figure out what HPUX is doing to\nzlib. To "
"continue the self-tests, comment out the call to\n"
"testEnvelopeCompress() and rebuild." );
#endif /* __hpux */
return( FALSE );
}
/* See what happens when we try and pop out more data. This test is done
because some compressed-data formats don't indicate the end of the
data properly, and we need to make sure the de-enveloping code handles
this correctly */
zeroCount = popData( cryptEnvelope, smallBuffer, 128 );
if( zeroCount != 0 )
{
puts( "Attempt to pop more data after end-of-data had been reached "
"succeeded, the\nenvelope should have reported 0 bytes "
"available." );
return( FALSE );
}
/* Clean up */
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
return( count );
}
static int envelopeCompress( const char *dumpFileName,
const BOOLEAN useDatasize,
const CRYPT_FORMAT_TYPE formatType )
{
CRYPT_ENVELOPE cryptEnvelope;
FILE *inFile;
BYTE *buffer, *envelopedBuffer;
int dataCount = 0, count;
printf( "Testing %scompressed data enveloping%s...\n",
( formatType == CRYPT_FORMAT_PGP ) ? "PGP " : "",
useDatasize ? " with datasize hint" : "" );
/* Since this needs a nontrivial amount of data for the compression, we
read it from an external file into dynamically-allocated buffers */
if( ( ( buffer = malloc( FILEBUFFER_SIZE ) ) == NULL ) || \
( ( envelopedBuffer = malloc( FILEBUFFER_SIZE ) ) == NULL ) )
{
if( buffer != NULL )
free( buffer );
puts( "Couldn't allocate test buffers." );
return( FALSE );
}
inFile = fopen( COMPRESS_FILE, "rb" );
if( inFile != NULL )
{
dataCount = fread( buffer, 1, FILEBUFFER_SIZE, inFile );
fclose( inFile );
}
if( dataCount < 1000 || dataCount == FILEBUFFER_SIZE )
{
free( buffer );
free( envelopedBuffer );
puts( "Couldn't read test file for compression." );
return( FALSE );
}
/* Create the envelope, push in the data, pop the enveloped result, and
destroy the envelope */
if( !createEnvelope( &cryptEnvelope, formatType ) )
return( FALSE );
cryptSetAttribute( cryptEnvelope, CRYPT_ENVINFO_COMPRESSION,
CRYPT_USE_DEFAULT );
if( useDatasize )
cryptSetAttribute( cryptEnvelope, CRYPT_ENVINFO_DATASIZE, dataCount );
count = pushData( cryptEnvelope, buffer, dataCount, NULL, 0 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, envelopedBuffer, FILEBUFFER_SIZE );
if( count > dataCount - 1000 )
{
puts( "Compression of data failed." );
return( FALSE );
}
if( cryptStatusError( count ) )
return( FALSE );
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
/* Tell them what happened */
printf( "Enveloped data has size %d bytes.\n", count );
debugDump( dumpFileName, envelopedBuffer, count );
/* De-envelope the data and make sure the result matches what we
pushed */
count = envelopeDecompress( envelopedBuffer, count );
if( !count )
return( FALSE );
if( count != dataCount || memcmp( buffer, envelopedBuffer, dataCount ) )
{
puts( "De-enveloped data != original data." );
return( FALSE );
}
/* Clean up */
free( buffer );
free( envelopedBuffer );
puts( "Enveloping of compressed data succeeded.\n" );
return( TRUE );
}
int testEnvelopeCompress( void )
{
/* In practice these two produce identical output since we always have to
use the indefinite-length encoding internally because we don't know in
advance how large the compressed data will be */
if( !envelopeCompress( "env_cprn", FALSE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Indefinite length */
if( !envelopeCompress( "env_cpr", TRUE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Datasize */
return( envelopeCompress( "env_cpr.pgp", TRUE, CRYPT_FORMAT_PGP ) );
} /* PGP format */
/* Test encrypted enveloping with a raw session key */
static int envelopeSessionCrypt( const char *dumpFileName,
const BOOLEAN useDatasize,
const CRYPT_FORMAT_TYPE formatType )
{
CRYPT_ENVELOPE cryptEnvelope;
CRYPT_CONTEXT cryptContext;
CRYPT_ALGO cryptAlgo = ( formatType == CRYPT_FORMAT_PGP ) ? \
selectCipher( CRYPT_ALGO_IDEA ) : \
selectCipher( CRYPT_ALGO_CAST );
int count;
printf( "Testing %sraw-session-key encrypted enveloping%s...\n",
( formatType == CRYPT_FORMAT_PGP ) ? "PGP " : "",
( useDatasize && ( formatType != CRYPT_FORMAT_PGP ) ) ? \
" with datasize hint" : "" );
if( formatType != CRYPT_FORMAT_PGP )
{
/* If this version has been built without support for CAST-128, the
self-test will fall back to the (always available) Blowfish,
however this doesn't have an OID defined so we need to convert
the choice to 3DES */
if( cryptAlgo == CRYPT_ALGO_BLOWFISH )
cryptAlgo = CRYPT_ALGO_3DES;
/* Create the session key context. We don't check for errors here
since this code will already have been tested earlier */
cryptCreateContext( &cryptContext, CRYPT_UNUSED, cryptAlgo );
cryptSetAttribute( cryptContext, CRYPT_CTXINFO_MODE, CRYPT_MODE_CBC );
}
else
{
/* PGP only allows a limited subset of algorithms, in addition we
have to specifically check that IDEA is available since it's
possible to build cryptlib without IDEA support */
if( cryptAlgo != CRYPT_ALGO_IDEA )
{
puts( "Can't test PGP enveloping because the IDEA algorithm "
"isn't available in this\nbuild of cryptlib.\n" );
return( TRUE );
}
cryptCreateContext( &cryptContext, CRYPT_UNUSED, cryptAlgo );
cryptSetAttribute( cryptContext, CRYPT_CTXINFO_MODE, CRYPT_MODE_CFB );
}
cryptSetAttributeString( cryptContext, CRYPT_CTXINFO_KEY,
"0123456789ABCDEF", 16 );
/* Create the envelope, push in a password and the data, pop the
enveloped result, and destroy the envelope */
if( !createEnvelope( &cryptEnvelope, formatType ) || \
!addEnvInfoNumeric( cryptEnvelope, CRYPT_ENVINFO_SESSIONKEY,
cryptContext ) )
return( FALSE );
if( useDatasize )
cryptSetAttribute( cryptEnvelope, CRYPT_ENVINFO_DATASIZE,
ENVELOPE_TESTDATA_SIZE );
count = pushData( cryptEnvelope, ENVELOPE_TESTDATA,
ENVELOPE_TESTDATA_SIZE, NULL, 0 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, buffer, BUFFER_SIZE );
if( cryptStatusError( count ) )
return( FALSE );
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
/* Tell them what happened */
printf( "Enveloped data has size %d bytes.\n", count );
debugDump( dumpFileName, buffer, count );
/* Create the envelope, push in the data, pop the de-enveloped result,
and destroy the envelope */
if( !createDeenvelope( &cryptEnvelope ) )
return( FALSE );
count = pushData( cryptEnvelope, buffer, count, NULL, cryptContext );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, buffer, BUFFER_SIZE );
if( cryptStatusError( count ) )
return( FALSE );
if( !destroyEnvelope( cryptEnvelope ) )
return( FALSE );
/* Make sure the result matches what we pushed */
if( count != ENVELOPE_TESTDATA_SIZE || \
memcmp( buffer, ENVELOPE_TESTDATA, ENVELOPE_TESTDATA_SIZE ) )
{
puts( "De-enveloped data != original data." );
return( FALSE );
}
/* Clean up */
cryptDestroyContext( cryptContext );
puts( "Enveloping of raw-session-key-encrypted data succeeded.\n" );
return( TRUE );
}
int testEnvelopeSessionCrypt( void )
{
if( !envelopeSessionCrypt( "env_sesn", FALSE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Indefinite length */
if( !envelopeSessionCrypt( "env_ses", TRUE, CRYPT_FORMAT_CRYPTLIB ) )
return( FALSE ); /* Datasize */
#if 0
/* Although in theory PGP supports raw session-key based enveloping, in
practice this key is always (implicitly) derived from a user password,
so the enveloping code doesn't allow the use of raw session keys */
return( envelopeSessionCrypt( "env_ses.pgp", TRUE, CRYPT_FORMAT_PGP ) );
#endif /* 0 */
return( TRUE );
}
/* Test encrypted enveloping */
static int envelopeDecrypt( BYTE *buffer, const int length )
{
CRYPT_ENVELOPE cryptEnvelope;
int count;
/* Create the envelope, push in the data, pop the de-enveloped result,
and destroy the envelope */
if( !createDeenvelope( &cryptEnvelope ) )
return( FALSE );
count = pushData( cryptEnvelope, buffer, length, "Password", 8 );
if( cryptStatusError( count ) )
return( FALSE );
count = popData( cryptEnvelope, buffer, BUFFER_SIZE );
if( cryptStatusError( count ) )
return( FALSE );
destroyEnvelope( cryptEnvelope );
return( count );
}
static int envelopeCrypt( const char *dumpFileName, const BOOLEAN useDatasize,
const BOOLEAN useAltCipher, const BOOLEAN multiKeys,
const CRYPT_FORMAT_TYPE formatType )
{
CRYPT_ENVELOPE cryptEnvelope;
int count;
printf( "Testing %s%spassword-encrypted enveloping%s",
( formatType == CRYPT_FORMAT_PGP ) ? "PGP " : "",
multiKeys ? "multiple-" : "",
( useDatasize && ( formatType != CRYPT_FORMAT_PGP ) ) ? \
" with datasize hint" : "" );
if( useAltCipher )
printf( ( formatType == CRYPT_FORMAT_PGP ) ? \
" with non-default cipher type" : " and stream cipher" );
puts( "..." );
/* Create the envelope, push in a password and the data, pop the
enveloped result, and destroy the envelope */
if( !createEnvelope( &cryptEnvelope, formatType ) || \
!addEnvInfoString( cryptEnvelope, CRYPT_ENVINFO_PASSWORD, "Password", 8 ) )
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -