📄 testlib.c
字号:
static void randSleep( void )
{
Sleep( ( rand() % 150 ) + 1 );
}
unsigned __stdcall processDataThread( void *arg )
{
CRYPT_CONTEXT cryptContext;
BYTE buffer[ 1024 ];
int threadNo = ( int ) arg;
int status;
randSleep();
memset( buffer, '*', 1024 );
status = cryptCreateContext( &cryptContext, CRYPT_UNUSED,
CRYPT_ALGO_3DES );
if( cryptStatusOK( status ) )
{
randSleep();
status = cryptSetAttributeString( cryptContext, CRYPT_CTXINFO_KEY,
"123456781234567812345678", 24 );
}
if( cryptStatusOK( status ) )
{
randSleep();
status = cryptEncrypt( cryptContext, buffer, 1024 );
}
if( cryptStatusOK( status ) )
{
randSleep();
status = cryptEncrypt( cryptContext, buffer, 0 );
}
if( cryptStatusOK( status ) )
{
randSleep();
status = cryptDestroyContext( cryptContext );
}
if( cryptStatusError( status ) )
printf( "\nEncryption failed with status %d.\n", status );
else
printf( "%d ", threadNo );
_endthreadex( 0 );
return( 0 );
}
static void testStressThreads( void )
{
HANDLE hThreadArray[ NO_THREADS ];
int i;
/* Start the threads */
for( i = 0; i < NO_THREADS; i++ )
{
unsigned threadID;
hThreadArray[ i ] = ( HANDLE ) \
_beginthreadex( NULL, 0, &processDataThread, ( void * ) i, 0,
&threadID );
if( hThreadArray[ i ] == 0 )
printf( "Thread %d couldn't be created.\n", i );
}
printf( "Threads completed: " );
/* Wait for all the threads to complete */
if( WaitForMultipleObjects( NO_THREADS, hThreadArray, TRUE,
15000 ) == WAIT_TIMEOUT )
puts( "\nNot all threads completed in 15s." );
else
puts( "." );
for( i = 0; i < NO_THREADS; i++ )
CloseHandle( hThreadArray[ i ] );
}
#endif /* WINDOWS_THREADS */
#if defined( UNIX_THREADS ) || defined( WINDOWS_THREADS )
#ifdef UNIX_THREADS
void *envelopeDataThread( void *arg )
#else
unsigned __stdcall envelopeDataThread( void *arg )
#endif /* Different threading models */
{
static const char *envData = "qwertyuiopasdfghjklzxcvbnm";
BYTE fileBuffer[ BUFFER_SIZE ];
const unsigned uThread = ( unsigned ) arg;
const time_t startTime = time( NULL );
int count, status;
printf( "Thread %d started.\n", uThread );
fflush( stdout );
filenameFromTemplate( fileBuffer, CERT_FILE_TEMPLATE, 13 );
for( count = 0; count < 150; count++ )
{
CRYPT_ENVELOPE cryptEnvelope;
CRYPT_CERTIFICATE cryptCert;
BYTE envBuffer[ BUFFER_SIZE ];
int bytesCopied;
/* Create the cert and envelope and add the cert to the envelope */
status = importCertFile( &cryptCert, fileBuffer );
if( cryptStatusOK( status ) )
status = cryptCreateEnvelope( &cryptEnvelope, CRYPT_UNUSED,
CRYPT_FORMAT_CRYPTLIB );
if( cryptStatusOK( status ) )
status = cryptSetAttribute( cryptEnvelope,
CRYPT_ENVINFO_PUBLICKEY, cryptCert );
if( cryptStatusError( status ) )
break;
/* Envelope data and destroy the envelope */
status = cryptPushData( cryptEnvelope, envData, strlen( envData ),
&bytesCopied );
if( cryptStatusOK( status ) )
status = cryptPushData( cryptEnvelope, NULL, 0, NULL );
if( cryptStatusOK( status ) )
status = cryptPopData( cryptEnvelope, envBuffer, BUFFER_SIZE,
&bytesCopied );
if( cryptStatusOK( status ) )
status = cryptDestroyEnvelope( cryptEnvelope );
if( cryptStatusError( status ) )
break;
putchar( uThread + '0' );
}
printf( "Thread %u exited after %d seconds.\n", uThread,
time( NULL ) - startTime );
fflush( stdout );
#ifdef UNIX_THREADS
pthread_exit( NULL );
#else
_endthreadex( 0 );
#endif /* Different threading models */
return( 0 );
}
static void testContinuousThreads( void )
{
unsigned threadID1, threadID2;
#ifdef UNIX_THREADS
pthread_t thread1, thread2;
#else
HANDLE hThread1, hThread2;
#endif /* Different threading models */
cryptAddRandom( "xyzzy", 5 );
#ifdef UNIX_THREADS
pthread_create( &thread1, NULL, envelopeDataThread, ( void * ) 1 );
pthread_create( &thread2, NULL, envelopeDataThread, ( void * ) 2 );
#else
hThread1 = ( HANDLE ) _beginthreadex( NULL, 0, envelopeDataThread,
( void * ) 1, 0, &threadID1 );
hThread2 = ( HANDLE ) _beginthreadex( NULL, 0, envelopeDataThread,
( void * ) 2, 0, &threadID2 );
#endif /* Different threading models */
delayThread( 30 );
printf( "Hit a key..." );
fflush( stdout );
getchar();
cryptEnd();
exit( EXIT_SUCCESS );
}
#endif /* UNIX_THREADS || WINDOWS_THREADS */
static void smokeTest( void )
{
testDataProcessing();
testKernelChecks();
testStressObjects();
#if defined( UNIX_THREADS ) || defined( WINDOWS_THREADS )
testStressThreads();
#endif /* UNIX_THREADS || WINDOWS_THREADS */
}
#endif /* SMOKE_TEST */
/****************************************************************************
* *
* Misc.Kludges *
* *
****************************************************************************/
/* Prototypes for general debug routines used to evaluate problems with certs
and envelopes from other apps */
void xxxCertImport( const char *fileName );
void xxxDataImport( const char *fileName );
void xxxSignedDataImport( const char *fileName );
void xxxEncryptedDataImport( const char *fileName );
void xxxEnvTest( void );
/* Update the cryptlib config file. This code can be used to set the
information required to load PKCS #11 device drivers:
- Set the driver path in the CRYPT_OPTION_DEVICE_PKCS11_DVR01 setting
below.
- Add a call to updateConfig() from somewhere (e.g.the test kludge function).
- Run the test code until it calls updateConfig().
- Remove the updateConfig() call, then run the test code as normal.
The testDevices() call will report the results of trying to use your
driver */
static void updateConfig( void )
{
#if 0
const char *driverPath = "c:/winnt/system32/aetpkss1.dll"; /* AET */
const char *driverPath = "c:/winnt/system32/cryst32.dll"; /* Chrysalis */
const char *driverPath = "c:/winnt/system32/pkcs201n.dll"; /* Datakey */
const char *driverPath = "c:/winnt/system32/dkck201.dll"; /* Datakey */
const char *driverPath = "c:/winnt/system32/dkck232.dll"; /* Datakey/iKey */
const char *driverPath = "c:/program files/eracom/cprov sw/cryptoki.dll"; /* Eracom */
const char *driverPath = "c:/winnt/system32/sadaptor.dll"; /* Eutron */
const char *driverPath = "c:/winnt/system32/pk2priv.dll"; /* Gemplus */
const char *driverPath = "c:/winnt/system32/nxpkcs11.dll"; /* Nexus */
const char *driverPath = "c:/winnt/system32/micardoPKCS11.dll"; /* Orga Micardo */
const char *driverPath = "c:/winnt/system32/cryptoki22.dll";/* Rainbow */
const char *driverPath = "c:/winnt/system32/p11card.dll"; /* Safelayer */
const char *driverPath = "c:/winnt/system32/slbck.dll"; /* Schlumberger */
const char *driverPath = "c:/winnt/system32/SpyPK11.dll"; /* Spyrus Rosetta */
#endif /* 0 */
const char *driverPath = "c:/program files/eracom/cprov sw/cryptoki.dll"; /* Eracom */
/* Set the path for a PKCS #11 device driver. We only enable one of
these at a time to speed the startup time */
cryptSetAttributeString( CRYPT_UNUSED, CRYPT_OPTION_DEVICE_PKCS11_DVR01,
driverPath, strlen( driverPath ) );
/* Update the options */
cryptSetAttribute( CRYPT_UNUSED, CRYPT_OPTION_CONFIGCHANGED, FALSE );
}
/* Add trusted certs to the config file and make sure that they're
persistent. This can't be done in the normal self-test since it requires
that cryptlib be restarted as part of the test to re-read the config file,
and because it modifies the cryptlib config file */
static void updateConfigCert( void )
{
CRYPT_CERTIFICATE trustedCert;
/* Import the first cert, make it trusted, and commit the changes */
importCertFromTemplate( &trustedCert, CERT_FILE_TEMPLATE, 1 );
cryptSetAttribute( trustedCert, CRYPT_CERTINFO_TRUSTED_IMPLICIT, TRUE );
cryptSetAttribute( CRYPT_UNUSED, CRYPT_OPTION_CONFIGCHANGED, FALSE );
cryptDestroyCert( trustedCert );
cryptEnd();
/* Do the same with a second cert. At the conclusion of this, we should
have two trusted certs on disk */
cryptInit();
importCertFromTemplate( &trustedCert, CERT_FILE_TEMPLATE, 2 );
cryptSetAttribute( trustedCert, CRYPT_CERTINFO_TRUSTED_IMPLICIT, TRUE );
cryptSetAttribute( CRYPT_UNUSED, CRYPT_OPTION_CONFIGCHANGED, FALSE );
cryptDestroyCert( trustedCert );
cryptEnd();
}
/* Generic test code insertion point. The following routine is called
before any of the other tests are run and can be used to handle special-
case tests that aren't part of the main test suite */
void testKludge( void )
{
/* Performance-testing test harness */
#if 0
void performanceTests( const CRYPT_DEVICE cryptDevice );
performanceTests( CRYPT_UNUSED );
#endif /* 0 */
/* Memory diagnostic test harness */
#if 0
testReadFileCertPrivkey();
testEnvelopePKCCrypt(); /* Use "Datasize, certificate" */
testEnvelopeSign(); /* Use "Datasize, certificate" */
#endif /* 0 */
/* Simple (brute-force) server code. NB: Remember to change
setLocalConnect() to not bind the server to localhost if expecting
external connections */
#if 0
while( TRUE )
testSessionTSPServer();
#endif /* 0 */
/* Functions that can be pressed into service in combination with the
special-purpose defines at the start of testkey.c to generate custom
certs/keys */
/* testWriteFileCertChain(); /* To generate user priv.key+cert */
/* testReadWriteFileKey();
testUpdateFileCert(); /* To generate CA priv.key+cert */
#if 0
puts( "Hit a key..." );
getchar();
if( cryptEnd() == CRYPT_ERROR_INCOMPLETE )
{
puts( "Objects remained allocated." );
getchar();
}
exit( 0 );
#endif /* 0 */
}
/****************************************************************************
* *
* Main Test Code *
* *
****************************************************************************/
#ifdef __WINDOWS__
#define INC_CHILD
#endif /* __WINDOWS__ */
/* Comprehensive cryptlib stress test */
int main( int argc, char **argv )
{
#ifdef TEST_LOWLEVEL
CRYPT_ALGO_TYPE cryptAlgo;
#endif /* TEST_LOWLEVEL */
#ifdef TEST_CONFIG
int i;
#endif /* TEST_CONFIG */
#ifdef TEST_SELFTEST
int value;
#endif /* TEST_SELFTEST */
int status;
void testSystemSpecific( void );
/* Get rid of compiler warnings */
if( argc || argv );
/* Make sure various system-specific features are set right */
testSystemSpecific();
/* VisualAge C++ doesn't set the TZ correctly. The check for this isn't
as simple as it would seem since most IBM compilers define the same
preprocessor values even though it's not documented anywhere, so we
have to enable the tzset() call for (effectively) all IBM compilers
and then disable it for ones other than VisualAge C++ */
#if ( defined( __IBMC__ ) || defined( __IBMCPP__ ) ) && !defined( __VMCMS__ )
tzset();
#endif /* VisualAge C++ */
/* Initialise cryptlib */
status = cryptInit();
if( cryptStatusError( status ) )
{
printf( "cryptInit() failed with error code %d.\n", status );
exit( EXIT_FAILURE );
}
#ifndef TEST_RANDOM
/* In order to avoid having to do a randomness poll for every test run,
we bypass the randomness-handling by adding some junk. This is only
enabled when cryptlib is built in debug mode, so it won't work with
any production systems */
cryptAddRandom( "xyzzy", 5 );
#endif /* TEST_RANDOM */
/* Perform a general sanity check to make sure that the self-test is
being run the right way */
if( !checkFileAccess() )
exit( EXIT_FAILURE );
/* For general testing purposes we can insert test code at this point to
test special cases that aren't covered in the general tests below */
testKludge();
#i
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -