1
by weidai
Initial revision |
1 |
// fipstest.cpp - written and placed in the public domain by Wei Dai
|
2 |
||
3 |
#include "pch.h" |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
4 |
|
5 |
#ifndef CRYPTOPP_IMPORTS
|
|
6 |
||
80
by weidai
fix GCC compile |
7 |
#define CRYPTOPP_DEFAULT_NO_DLL
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
8 |
#include "dll.h" |
78
by weidai
merge in 5.0.4 changes (exclude DES and SHA-2 from DLL), |
9 |
|
10 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
11 |
#define _WIN32_WINNT 0x0400
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
12 |
#include <windows.h> |
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
13 |
|
232
by weidai
port to GCC 4, reorganize implementations of SetKey |
14 |
#if defined(_MSC_VER) && _MSC_VER >= 1400
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
15 |
#ifdef _M_IX86
|
16 |
#define _CRT_DEBUGGER_HOOK _crt_debugger_hook
|
|
17 |
#else
|
|
18 |
#define _CRT_DEBUGGER_HOOK __crt_debugger_hook
|
|
19 |
#endif
|
|
20 |
extern "C" {_CRTIMP void __cdecl _CRT_DEBUGGER_HOOK(int);} |
|
21 |
#endif
|
|
78
by weidai
merge in 5.0.4 changes (exclude DES and SHA-2 from DLL), |
22 |
#endif
|
1
by weidai
Initial revision |
23 |
|
318
by weidai
change default FIPS RNG to use AES instead of DES_EDE |
24 |
#include <iostream> |
25 |
||
1
by weidai
Initial revision |
26 |
NAMESPACE_BEGIN(CryptoPP) |
27 |
||
28 |
extern PowerUpSelfTestStatus g_powerUpSelfTestStatus; |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
29 |
SecByteBlock g_actualMac; |
30 |
unsigned long g_macFileLocation = 0; |
|
31 |
||
222
by weidai
fix self-test when installed into unicode paths |
32 |
// use a random dummy string here, to be searched/replaced later with the real MAC
|
33 |
static const byte s_moduleMac[CryptoPP::HMAC<CryptoPP::SHA1>::DIGESTSIZE] = CRYPTOPP_DUMMY_DLL_MAC; |
|
34 |
CRYPTOPP_COMPILE_ASSERT(sizeof(s_moduleMac) == CryptoPP::SHA1::DIGESTSIZE); |
|
35 |
||
36 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
37 |
static HMODULE s_hModule = NULL; |
|
38 |
#endif
|
|
39 |
||
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
40 |
const byte * CRYPTOPP_API GetActualMacAndLocation(unsigned int &macSize, unsigned int &fileLocation) |
41 |
{
|
|
184
by weidai
port to MSVC .NET 2005 beta 2 |
42 |
macSize = (unsigned int)g_actualMac.size(); |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
43 |
fileLocation = g_macFileLocation; |
44 |
return g_actualMac; |
|
45 |
}
|
|
1
by weidai
Initial revision |
46 |
|
7
by weidai
bug fixes and KAT for X9.17 RNG |
47 |
void KnownAnswerTest(RandomNumberGenerator &rng, const char *output) |
48 |
{
|
|
49 |
EqualityComparisonFilter comparison; |
|
50 |
||
51 |
RandomNumberStore(rng, strlen(output)/2).TransferAllTo(comparison, "0"); |
|
52 |
StringSource(output, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); |
|
53 |
||
54 |
comparison.ChannelMessageSeriesEnd("0"); |
|
55 |
comparison.ChannelMessageSeriesEnd("1"); |
|
56 |
}
|
|
57 |
||
58 |
template <class CIPHER> |
|
59 |
void X917RNG_KnownAnswerTest( |
|
60 |
const char *key, |
|
61 |
const char *seed, |
|
181
by weidai
changes done for FIPS-140 lab code drop |
62 |
const char *deterministicTimeVector, |
7
by weidai
bug fixes and KAT for X9.17 RNG |
63 |
const char *output, |
64 |
CIPHER *dummy = NULL) |
|
65 |
{
|
|
43
by weidai
fix bug in Grouper |
66 |
#ifdef OS_RNG_AVAILABLE
|
181
by weidai
changes done for FIPS-140 lab code drop |
67 |
std::string decodedKey, decodedSeed, decodedDeterministicTimeVector; |
7
by weidai
bug fixes and KAT for X9.17 RNG |
68 |
StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); |
69 |
StringSource(seed, true, new HexDecoder(new StringSink(decodedSeed))); |
|
181
by weidai
changes done for FIPS-140 lab code drop |
70 |
StringSource(deterministicTimeVector, true, new HexDecoder(new StringSink(decodedDeterministicTimeVector))); |
7
by weidai
bug fixes and KAT for X9.17 RNG |
71 |
|
72 |
AutoSeededX917RNG<CIPHER> rng; |
|
181
by weidai
changes done for FIPS-140 lab code drop |
73 |
rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (const byte *)decodedDeterministicTimeVector.data()); |
7
by weidai
bug fixes and KAT for X9.17 RNG |
74 |
KnownAnswerTest(rng, output); |
43
by weidai
fix bug in Grouper |
75 |
#else
|
76 |
throw 0; |
|
77 |
#endif
|
|
7
by weidai
bug fixes and KAT for X9.17 RNG |
78 |
}
|
79 |
||
1
by weidai
Initial revision |
80 |
void KnownAnswerTest(StreamTransformation &encryption, StreamTransformation &decryption, const char *plaintext, const char *ciphertext) |
81 |
{
|
|
82 |
EqualityComparisonFilter comparison; |
|
83 |
||
84 |
StringSource(plaintext, true, new HexDecoder(new StreamTransformationFilter(encryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING))); |
|
85 |
StringSource(ciphertext, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); |
|
86 |
||
87 |
StringSource(ciphertext, true, new HexDecoder(new StreamTransformationFilter(decryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING))); |
|
88 |
StringSource(plaintext, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); |
|
89 |
||
90 |
comparison.ChannelMessageSeriesEnd("0"); |
|
91 |
comparison.ChannelMessageSeriesEnd("1"); |
|
92 |
}
|
|
93 |
||
94 |
template <class CIPHER> |
|
95 |
void SymmetricEncryptionKnownAnswerTest( |
|
96 |
const char *key, |
|
97 |
const char *hexIV, |
|
98 |
const char *plaintext, |
|
99 |
const char *ecb, |
|
100 |
const char *cbc, |
|
101 |
const char *cfb, |
|
102 |
const char *ofb, |
|
103 |
const char *ctr, |
|
104 |
CIPHER *dummy = NULL) |
|
105 |
{
|
|
106 |
std::string decodedKey; |
|
107 |
StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); |
|
108 |
||
109 |
typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size()); |
|
110 |
typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size()); |
|
111 |
||
112 |
SecByteBlock iv(encryption.BlockSize()); |
|
113 |
StringSource(hexIV, true, new HexDecoder(new ArraySink(iv, iv.size()))); |
|
114 |
||
115 |
if (ecb) |
|
116 |
KnownAnswerTest(ECB_Mode_ExternalCipher::Encryption(encryption).Ref(), ECB_Mode_ExternalCipher::Decryption(decryption).Ref(), plaintext, ecb); |
|
117 |
if (cbc) |
|
118 |
KnownAnswerTest(CBC_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CBC_Mode_ExternalCipher::Decryption(decryption, iv).Ref(), plaintext, cbc); |
|
119 |
if (cfb) |
|
120 |
KnownAnswerTest(CFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, cfb); |
|
121 |
if (ofb) |
|
122 |
KnownAnswerTest(OFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), OFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ofb); |
|
123 |
if (ctr) |
|
124 |
KnownAnswerTest(CTR_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CTR_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ctr); |
|
125 |
}
|
|
126 |
||
127 |
void KnownAnswerTest(HashTransformation &hash, const char *message, const char *digest) |
|
128 |
{
|
|
129 |
EqualityComparisonFilter comparison; |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
130 |
StringSource(digest, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); |
1
by weidai
Initial revision |
131 |
StringSource(message, true, new HashFilter(hash, new ChannelSwitch(comparison, "0"))); |
132 |
||
133 |
comparison.ChannelMessageSeriesEnd("0"); |
|
134 |
comparison.ChannelMessageSeriesEnd("1"); |
|
135 |
}
|
|
136 |
||
137 |
template <class HASH> |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
138 |
void SecureHashKnownAnswerTest(const char *message, const char *digest, HASH *dummy = NULL) |
1
by weidai
Initial revision |
139 |
{
|
140 |
HASH hash; |
|
141 |
KnownAnswerTest(hash, message, digest); |
|
142 |
}
|
|
143 |
||
144 |
template <class MAC> |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
145 |
void MAC_KnownAnswerTest(const char *key, const char *message, const char *digest, MAC *dummy = NULL) |
1
by weidai
Initial revision |
146 |
{
|
147 |
std::string decodedKey; |
|
148 |
StringSource(key, true, new HexDecoder(new StringSink(decodedKey))); |
|
149 |
||
150 |
MAC mac((const byte *)decodedKey.data(), decodedKey.size()); |
|
151 |
KnownAnswerTest(mac, message, digest); |
|
152 |
}
|
|
153 |
||
154 |
template <class SCHEME> |
|
155 |
void SignatureKnownAnswerTest(const char *key, const char *message, const char *signature, SCHEME *dummy = NULL) |
|
156 |
{
|
|
43
by weidai
fix bug in Grouper |
157 |
#ifdef OS_RNG_AVAILABLE
|
318
by weidai
change default FIPS RNG to use AES instead of DES_EDE |
158 |
DefaultAutoSeededRNG rng; |
43
by weidai
fix bug in Grouper |
159 |
#else
|
160 |
RandomNumberGenerator &rng = NullRNG(); |
|
161 |
#endif
|
|
162 |
||
1
by weidai
Initial revision |
163 |
typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref()); |
164 |
typename SCHEME::Verifier verifier(signer); |
|
165 |
||
166 |
EqualityComparisonFilter comparison; |
|
167 |
||
43
by weidai
fix bug in Grouper |
168 |
StringSource(message, true, new SignerFilter(rng, signer, new ChannelSwitch(comparison, "0"))); |
1
by weidai
Initial revision |
169 |
StringSource(signature, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); |
170 |
||
171 |
comparison.ChannelMessageSeriesEnd("0"); |
|
172 |
comparison.ChannelMessageSeriesEnd("1"); |
|
173 |
||
174 |
VerifierFilter verifierFilter(verifier, NULL, VerifierFilter::SIGNATURE_AT_BEGIN | VerifierFilter::THROW_EXCEPTION); |
|
43
by weidai
fix bug in Grouper |
175 |
StringSource(signature, true, new HexDecoder(new Redirector(verifierFilter, Redirector::DATA_ONLY))); |
1
by weidai
Initial revision |
176 |
StringSource(message, true, new Redirector(verifierFilter)); |
177 |
}
|
|
178 |
||
179 |
void EncryptionPairwiseConsistencyTest(const PK_Encryptor &encryptor, const PK_Decryptor &decryptor) |
|
180 |
{
|
|
181 |
try
|
|
182 |
{
|
|
183 |
#ifdef OS_RNG_AVAILABLE
|
|
318
by weidai
change default FIPS RNG to use AES instead of DES_EDE |
184 |
DefaultAutoSeededRNG rng; |
1
by weidai
Initial revision |
185 |
#else
|
186 |
RandomNumberGenerator &rng = NullRNG(); |
|
187 |
#endif
|
|
188 |
const char *testMessage ="test message"; |
|
133
by weidai
fix bug in EncryptionPairwiseConsistencyTest |
189 |
std::string ciphertext, decrypted; |
1
by weidai
Initial revision |
190 |
|
191 |
StringSource( |
|
192 |
testMessage, |
|
193 |
true, |
|
194 |
new PK_EncryptorFilter( |
|
195 |
rng, |
|
196 |
encryptor, |
|
133
by weidai
fix bug in EncryptionPairwiseConsistencyTest |
197 |
new StringSink(ciphertext))); |
198 |
||
199 |
if (ciphertext == testMessage) |
|
200 |
throw 0; |
|
201 |
||
202 |
StringSource( |
|
203 |
ciphertext, |
|
204 |
true, |
|
205 |
new PK_DecryptorFilter( |
|
206 |
rng, |
|
207 |
decryptor, |
|
208 |
new StringSink(decrypted))); |
|
209 |
||
210 |
if (decrypted != testMessage) |
|
211 |
throw 0; |
|
1
by weidai
Initial revision |
212 |
}
|
213 |
catch (...) |
|
214 |
{
|
|
215 |
throw SelfTestFailure(encryptor.AlgorithmName() + ": pairwise consistency test failed"); |
|
216 |
}
|
|
217 |
}
|
|
218 |
||
219 |
void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier) |
|
220 |
{
|
|
221 |
try
|
|
222 |
{
|
|
223 |
#ifdef OS_RNG_AVAILABLE
|
|
318
by weidai
change default FIPS RNG to use AES instead of DES_EDE |
224 |
DefaultAutoSeededRNG rng; |
1
by weidai
Initial revision |
225 |
#else
|
226 |
RandomNumberGenerator &rng = NullRNG(); |
|
227 |
#endif
|
|
228 |
||
229 |
StringSource( |
|
230 |
"test message", |
|
231 |
true, |
|
232 |
new SignerFilter( |
|
233 |
rng, |
|
234 |
signer, |
|
235 |
new VerifierFilter(verifier, NULL, VerifierFilter::THROW_EXCEPTION), |
|
236 |
true)); |
|
237 |
}
|
|
238 |
catch (...) |
|
239 |
{
|
|
240 |
throw SelfTestFailure(signer.AlgorithmName() + ": pairwise consistency test failed"); |
|
241 |
}
|
|
242 |
}
|
|
243 |
||
244 |
template <class SCHEME> |
|
245 |
void SignaturePairwiseConsistencyTest(const char *key, SCHEME *dummy = NULL) |
|
246 |
{
|
|
247 |
typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref()); |
|
248 |
typename SCHEME::Verifier verifier(signer); |
|
249 |
||
250 |
SignaturePairwiseConsistencyTest(signer, verifier); |
|
251 |
}
|
|
252 |
||
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
253 |
MessageAuthenticationCode * NewIntegrityCheckingMAC() |
254 |
{
|
|
255 |
byte key[] = {0x47, 0x1E, 0x33, 0x96, 0x65, 0xB1, 0x6A, 0xED, 0x0B, 0xF8, 0x6B, 0xFD, 0x01, 0x65, 0x05, 0xCC}; |
|
256 |
return new HMAC<SHA1>(key, sizeof(key)); |
|
257 |
}
|
|
258 |
||
259 |
bool IntegrityCheckModule(const char *moduleFilename, const byte *expectedModuleMac, SecByteBlock *pActualMac, unsigned long *pMacFileLocation) |
|
260 |
{
|
|
261 |
std::auto_ptr<MessageAuthenticationCode> mac(NewIntegrityCheckingMAC()); |
|
262 |
unsigned int macSize = mac->DigestSize(); |
|
263 |
||
264 |
SecByteBlock tempMac; |
|
265 |
SecByteBlock &actualMac = pActualMac ? *pActualMac : tempMac; |
|
266 |
actualMac.resize(macSize); |
|
267 |
||
268 |
unsigned long tempLocation; |
|
269 |
unsigned long &macFileLocation = pMacFileLocation ? *pMacFileLocation : tempLocation; |
|
270 |
macFileLocation = 0; |
|
271 |
||
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
272 |
MeterFilter verifier(new HashFilter(*mac, new ArraySink(actualMac, actualMac.size()))); |
273 |
// MeterFilter verifier(new FileSink("c:\\dt.tmp"));
|
|
222
by weidai
fix self-test when installed into unicode paths |
274 |
std::ifstream moduleStream; |
275 |
||
276 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
277 |
HMODULE h; |
|
278 |
{
|
|
279 |
char moduleFilenameBuf[MAX_PATH] = ""; |
|
280 |
if (moduleFilename == NULL) |
|
281 |
{
|
|
374
by weidai
fix compile with fix compile for for STLport 5.1.3 and MSVC 2005 |
282 |
#if (_MSC_VER >= 1400 && !defined(_STLPORT_VERSION)) // ifstream doesn't support wide filename on other compilers |
222
by weidai
fix self-test when installed into unicode paths |
283 |
wchar_t wideModuleFilename[MAX_PATH]; |
284 |
if (GetModuleFileNameW(s_hModule, wideModuleFilename, MAX_PATH) > 0) |
|
285 |
{
|
|
286 |
moduleStream.open(wideModuleFilename, std::ios::in | std::ios::binary); |
|
287 |
h = GetModuleHandleW(wideModuleFilename); |
|
288 |
}
|
|
289 |
else
|
|
230
by weidai
cygwin workaround |
290 |
#endif
|
222
by weidai
fix self-test when installed into unicode paths |
291 |
{
|
292 |
GetModuleFileNameA(s_hModule, moduleFilenameBuf, MAX_PATH); |
|
293 |
moduleFilename = moduleFilenameBuf; |
|
294 |
}
|
|
295 |
}
|
|
296 |
#endif
|
|
297 |
if (moduleFilename != NULL) |
|
298 |
{
|
|
299 |
moduleStream.open(moduleFilename, std::ios::in | std::ios::binary); |
|
300 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
301 |
h = GetModuleHandleA(moduleFilename); |
|
302 |
moduleFilename = NULL; |
|
303 |
}
|
|
304 |
#endif
|
|
305 |
}
|
|
306 |
||
307 |
if (!moduleStream) |
|
308 |
{
|
|
309 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
310 |
OutputDebugString("Crypto++ DLL integrity check failed. Cannot open file for reading."); |
|
311 |
#endif
|
|
312 |
return false; |
|
313 |
}
|
|
314 |
FileStore file(moduleStream); |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
315 |
|
316 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
317 |
// try to hash from memory first
|
|
89
by weidai
fix in-memory integrity check on Win 9x |
318 |
const byte *memBase = (const byte *)h; |
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
319 |
const IMAGE_DOS_HEADER *ph = (IMAGE_DOS_HEADER *)memBase; |
320 |
const IMAGE_NT_HEADERS *phnt = (IMAGE_NT_HEADERS *)(memBase + ph->e_lfanew); |
|
321 |
const IMAGE_SECTION_HEADER *phs = IMAGE_FIRST_SECTION(phnt); |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
322 |
DWORD nSections = phnt->FileHeader.NumberOfSections; |
184
by weidai
port to MSVC .NET 2005 beta 2 |
323 |
size_t currentFilePos = 0; |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
324 |
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
325 |
size_t checksumPos = (byte *)&phnt->OptionalHeader.CheckSum - memBase; |
326 |
size_t checksumSize = sizeof(phnt->OptionalHeader.CheckSum); |
|
327 |
size_t certificateTableDirectoryPos = (byte *)&phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY] - memBase; |
|
328 |
size_t certificateTableDirectorySize = sizeof(phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY]); |
|
329 |
size_t certificateTablePos = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress; |
|
330 |
size_t certificateTableSize = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].Size; |
|
331 |
||
332 |
verifier.AddRangeToSkip(0, checksumPos, checksumSize); |
|
333 |
verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize); |
|
334 |
verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize); |
|
335 |
||
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
336 |
while (nSections--) |
337 |
{
|
|
338 |
switch (phs->Characteristics) |
|
339 |
{
|
|
340 |
default: |
|
341 |
break; |
|
342 |
case IMAGE_SCN_CNT_CODE | IMAGE_SCN_MEM_EXECUTE | IMAGE_SCN_MEM_READ: |
|
343 |
case IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ: |
|
89
by weidai
fix in-memory integrity check on Win 9x |
344 |
unsigned int sectionSize = STDMIN(phs->SizeOfRawData, phs->Misc.VirtualSize); |
345 |
const byte *sectionMemStart = memBase + phs->VirtualAddress; |
|
346 |
unsigned int sectionFileStart = phs->PointerToRawData; |
|
184
by weidai
port to MSVC .NET 2005 beta 2 |
347 |
size_t subSectionStart = 0, nextSubSectionStart; |
89
by weidai
fix in-memory integrity check on Win 9x |
348 |
|
349 |
do
|
|
350 |
{
|
|
351 |
const byte *subSectionMemStart = sectionMemStart + subSectionStart; |
|
184
by weidai
port to MSVC .NET 2005 beta 2 |
352 |
size_t subSectionFileStart = sectionFileStart + subSectionStart; |
353 |
size_t subSectionSize = sectionSize - subSectionStart; |
|
89
by weidai
fix in-memory integrity check on Win 9x |
354 |
nextSubSectionStart = 0; |
355 |
||
356 |
unsigned int entriesToReadFromDisk[] = {IMAGE_DIRECTORY_ENTRY_IMPORT, IMAGE_DIRECTORY_ENTRY_IAT}; |
|
357 |
for (unsigned int i=0; i<sizeof(entriesToReadFromDisk)/sizeof(entriesToReadFromDisk[0]); i++) |
|
358 |
{
|
|
359 |
const IMAGE_DATA_DIRECTORY &entry = phnt->OptionalHeader.DataDirectory[entriesToReadFromDisk[i]]; |
|
360 |
const byte *entryMemStart = memBase + entry.VirtualAddress; |
|
361 |
if (subSectionMemStart <= entryMemStart && entryMemStart < subSectionMemStart + subSectionSize) |
|
362 |
{
|
|
363 |
subSectionSize = entryMemStart - subSectionMemStart; |
|
364 |
nextSubSectionStart = entryMemStart - sectionMemStart + entry.Size; |
|
365 |
}
|
|
366 |
}
|
|
367 |
||
232
by weidai
port to GCC 4, reorganize implementations of SetKey |
368 |
#if defined(_MSC_VER) && _MSC_VER >= 1400
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
369 |
// first byte of _CRT_DEBUGGER_HOOK gets modified in memory by the debugger invisibly, so read it from file
|
370 |
if (IsDebuggerPresent()) |
|
371 |
{
|
|
372 |
if (subSectionMemStart <= (byte *)&_CRT_DEBUGGER_HOOK && (byte *)&_CRT_DEBUGGER_HOOK < subSectionMemStart + subSectionSize) |
|
373 |
{
|
|
374 |
subSectionSize = (byte *)&_CRT_DEBUGGER_HOOK - subSectionMemStart; |
|
375 |
nextSubSectionStart = (byte *)&_CRT_DEBUGGER_HOOK - sectionMemStart + 1; |
|
376 |
}
|
|
377 |
}
|
|
378 |
#endif
|
|
379 |
||
89
by weidai
fix in-memory integrity check on Win 9x |
380 |
if (subSectionMemStart <= expectedModuleMac && expectedModuleMac < subSectionMemStart + subSectionSize) |
381 |
{
|
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
382 |
// found stored MAC
|
184
by weidai
port to MSVC .NET 2005 beta 2 |
383 |
macFileLocation = (unsigned long)(subSectionFileStart + (expectedModuleMac - subSectionMemStart)); |
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
384 |
verifier.AddRangeToSkip(0, macFileLocation, macSize); |
89
by weidai
fix in-memory integrity check on Win 9x |
385 |
}
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
386 |
|
387 |
file.TransferTo(verifier, subSectionFileStart - currentFilePos); |
|
388 |
verifier.Put(subSectionMemStart, subSectionSize); |
|
89
by weidai
fix in-memory integrity check on Win 9x |
389 |
file.Skip(subSectionSize); |
390 |
currentFilePos = subSectionFileStart + subSectionSize; |
|
391 |
subSectionStart = nextSubSectionStart; |
|
392 |
} while (nextSubSectionStart != 0); |
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
393 |
}
|
394 |
phs++; |
|
395 |
}
|
|
396 |
#endif
|
|
397 |
file.TransferAllTo(verifier); |
|
398 |
||
399 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
400 |
// if that fails (could be caused by debug breakpoints or DLL base relocation modifying image in memory),
|
|
401 |
// hash from disk instead
|
|
412
by weidai
changes for 5.6: |
402 |
if (!VerifyBufsEqual(expectedModuleMac, actualMac, macSize)) |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
403 |
{
|
404 |
OutputDebugString("In memory integrity check failed. This may be caused by debug breakpoints or DLL relocation.\n"); |
|
222
by weidai
fix self-test when installed into unicode paths |
405 |
moduleStream.clear(); |
406 |
moduleStream.seekg(0); |
|
218
by weidai
change DLL integrity self-test to allow DLL to be Authenticode signed |
407 |
verifier.Initialize(MakeParameters(Name::OutputBuffer(), ByteArrayParameter(actualMac, (unsigned int)actualMac.size()))); |
408 |
// verifier.Initialize(MakeParameters(Name::OutputFileName(), (const char *)"c:\\dt2.tmp"));
|
|
409 |
verifier.AddRangeToSkip(0, checksumPos, checksumSize); |
|
410 |
verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize); |
|
411 |
verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize); |
|
412 |
verifier.AddRangeToSkip(0, macFileLocation, macSize); |
|
222
by weidai
fix self-test when installed into unicode paths |
413 |
FileStore(moduleStream).TransferAllTo(verifier); |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
414 |
}
|
415 |
#endif
|
|
416 |
||
412
by weidai
changes for 5.6: |
417 |
if (VerifyBufsEqual(expectedModuleMac, actualMac, macSize)) |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
418 |
return true; |
419 |
||
420 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
|
421 |
std::string hexMac; |
|
422 |
HexEncoder(new StringSink(hexMac)).PutMessageEnd(actualMac, actualMac.size()); |
|
222
by weidai
fix self-test when installed into unicode paths |
423 |
OutputDebugString((("Crypto++ DLL integrity check failed. Actual MAC is: " + hexMac) + "\n").c_str()); |
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
424 |
#endif
|
425 |
return false; |
|
426 |
}
|
|
427 |
||
428 |
void DoPowerUpSelfTest(const char *moduleFilename, const byte *expectedModuleMac) |
|
1
by weidai
Initial revision |
429 |
{
|
430 |
g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_NOT_DONE; |
|
431 |
SetPowerUpSelfTestInProgressOnThisThread(true); |
|
432 |
||
433 |
try
|
|
434 |
{
|
|
222
by weidai
fix self-test when installed into unicode paths |
435 |
if (FIPS_140_2_ComplianceEnabled() || expectedModuleMac != NULL) |
1
by weidai
Initial revision |
436 |
{
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
437 |
if (!IntegrityCheckModule(moduleFilename, expectedModuleMac, &g_actualMac, &g_macFileLocation)) |
1
by weidai
Initial revision |
438 |
throw 0; // throw here so we break in the debugger, this will be caught right away |
439 |
}
|
|
440 |
||
441 |
// algorithm tests
|
|
442 |
||
318
by weidai
change default FIPS RNG to use AES instead of DES_EDE |
443 |
X917RNG_KnownAnswerTest<AES>( |
444 |
"2b7e151628aed2a6abf7158809cf4f3c", // key |
|
445 |
"000102030405060708090a0b0c0d0e0f", // seed |
|
446 |
"00000000000000000000000000000001", // time vector |
|
447 |
"D176EDD27493B0395F4D10546232B0693DC7061C03C3A554F09CECF6F6B46D945A"); // output |
|
7
by weidai
bug fixes and KAT for X9.17 RNG |
448 |
|
1
by weidai
Initial revision |
449 |
SymmetricEncryptionKnownAnswerTest<DES_EDE3>( |
450 |
"385D7189A5C3D485E1370AA5D408082B5CCCCB5E19F2D90E", |
|
451 |
"C141B5FCCD28DC8A", |
|
452 |
"6E1BD7C6120947A464A6AAB293A0F89A563D8D40D3461B68", |
|
453 |
"64EAAD4ACBB9CEAD6C7615E7C7E4792FE587D91F20C7D2F4", |
|
454 |
"6235A461AFD312973E3B4F7AA7D23E34E03371F8E8C376C9", |
|
455 |
"E26BA806A59B0330DE40CA38E77A3E494BE2B212F6DD624B", |
|
456 |
"E26BA806A59B03307DE2BCC25A08BA40A8BA335F5D604C62", |
|
457 |
"E26BA806A59B03303C62C2EFF32D3ACDD5D5F35EBCC53371"); |
|
458 |
||
459 |
SymmetricEncryptionKnownAnswerTest<SKIPJACK>( |
|
460 |
"1555E5531C3A169B2D65", |
|
461 |
"6EC9795701F49864", |
|
462 |
"00AFA48E9621E52E8CBDA312660184EDDB1F33D9DACDA8DA", |
|
463 |
"DBEC73562EFCAEB56204EB8AE9557EBF77473FBB52D17CD1", |
|
464 |
"0C7B0B74E21F99B8F2C8DF37879F6C044967F42A796DCA8B", |
|
465 |
"79FDDA9724E36CC2E023E9A5C717A8A8A7FDA465CADCBF63", |
|
466 |
"79FDDA9724E36CC26CACBD83C1ABC06EAF5B249BE5B1E040", |
|
467 |
"79FDDA9724E36CC211B0AEC607B95A96BCDA318440B82F49"); |
|
468 |
||
469 |
SymmetricEncryptionKnownAnswerTest<AES>( |
|
470 |
"2b7e151628aed2a6abf7158809cf4f3c", |
|
471 |
"000102030405060708090a0b0c0d0e0f", |
|
472 |
"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710", // plaintext |
|
473 |
"3ad77bb40d7a3660a89ecaf32466ef97f5d3d58503b9699de785895a96fdbaaf43b1cd7f598ece23881b00e3ed0306887b0c785e27e8ad3f8223207104725dd4", // ecb |
|
474 |
"7649abac8119b246cee98e9b12e9197d5086cb9b507219ee95db113a917678b273bed6b8e3c1743b7116e69e222295163ff1caa1681fac09120eca307586e1a7", // cbc |
|
475 |
"3b3fd92eb72dad20333449f8e83cfb4ac8a64537a0b3a93fcde3cdad9f1ce58b26751f67a3cbb140b1808cf187a4f4dfc04b05357c5d1c0eeac4c66f9ff7f2e6", // cfb |
|
476 |
"3b3fd92eb72dad20333449f8e83cfb4a7789508d16918f03f53c52dac54ed8259740051e9c5fecf64344f7a82260edcc304c6528f659c77866a510d9c1d6ae5e", // ofb |
|
477 |
NULL); |
|
478 |
||
479 |
SymmetricEncryptionKnownAnswerTest<AES>( |
|
480 |
"2b7e151628aed2a6abf7158809cf4f3c", |
|
481 |
"f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff", |
|
482 |
"6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710", |
|
483 |
NULL, |
|
484 |
NULL, |
|
485 |
NULL, |
|
486 |
NULL, |
|
487 |
"874d6191b620e3261bef6864990db6ce9806f66b7970fdff8617187bb9fffdff5ae4df3edbd5d35e5b4f09020db03eab1e031dda2fbe03d1792170a0f3009cee"); // ctr |
|
488 |
||
489 |
||
181
by weidai
changes done for FIPS-140 lab code drop |
490 |
SecureHashKnownAnswerTest<SHA1>( |
1
by weidai
Initial revision |
491 |
"abc", |
492 |
"A9993E364706816ABA3E25717850C26C9CD0D89D"); |
|
181
by weidai
changes done for FIPS-140 lab code drop |
493 |
|
494 |
SecureHashKnownAnswerTest<SHA224>( |
|
495 |
"abc", |
|
496 |
"23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7"); |
|
497 |
||
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
498 |
SecureHashKnownAnswerTest<SHA256>( |
499 |
"abc", |
|
500 |
"ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad"); |
|
501 |
||
502 |
SecureHashKnownAnswerTest<SHA384>( |
|
503 |
"abc", |
|
504 |
"cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7"); |
|
505 |
||
506 |
SecureHashKnownAnswerTest<SHA512>( |
|
507 |
"abc", |
|
508 |
"ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f"); |
|
181
by weidai
changes done for FIPS-140 lab code drop |
509 |
|
510 |
MAC_KnownAnswerTest<HMAC<SHA1> >( |
|
1
by weidai
Initial revision |
511 |
"303132333435363738393a3b3c3d3e3f40414243", |
512 |
"Sample #2", |
|
513 |
"0922d3405faa3d194f82a45830737d5cc6c75d24"); |
|
181
by weidai
changes done for FIPS-140 lab code drop |
514 |
|
515 |
const char *keyRSA1 = |
|
1
by weidai
Initial revision |
516 |
"30820150020100300d06092a864886f70d01010105000482013a3082013602010002400a66791dc6988168de7ab77419bb7fb0"
|
517 |
"c001c62710270075142942e19a8d8c51d053b3e3782a1de5dc5af4ebe99468170114a1dfe67cdc9a9af55d655620bbab0203010001"
|
|
518 |
"02400123c5b61ba36edb1d3679904199a89ea80c09b9122e1400c09adcf7784676d01d23356a7d44d6bd8bd50e94bfc723fa"
|
|
519 |
"87d8862b75177691c11d757692df8881022033d48445c859e52340de704bcdda065fbb4058d740bd1d67d29e9c146c11cf61"
|
|
520 |
"0220335e8408866b0fd38dc7002d3f972c67389a65d5d8306566d5c4f2a5aa52628b0220045ec90071525325d3d46db79695e9af"
|
|
521 |
"acc4523964360e02b119baa366316241022015eb327360c7b60d12e5e2d16bdcd97981d17fba6b70db13b20b436e24eada590220"
|
|
181
by weidai
changes done for FIPS-140 lab code drop |
522 |
"2ca6366d72781dfa24d34a9a24cbc2ae927a9958af426563ff63fb11658a461d"; |
523 |
||
524 |
const char *keyRSA2 = |
|
525 |
"30820273020100300D06092A864886F70D01010105000482025D3082025902010002818100D40AF9"
|
|
526 |
"A2B713034249E5780056D70FC7DE75D76E44565AA6A6B8ED9646F3C19F9E254D72D7DE6E49DB2264"
|
|
527 |
"0C1D05AB9E2A5F901D8F3FE1F7AE02CEE2ECCE54A40ABAE55A004692752E70725AEEE7CDEA67628A"
|
|
528 |
"82A9239B4AB660C2BC56D9F01E90CBAAB9BF0FC8E17173CEFC5709A29391A7DDF3E0B758691AAF30"
|
|
529 |
"725B292F4F020111027F18C0BA087D082C45D75D3594E0767E4820818EB35612B80CEAB8C880ACA5"
|
|
530 |
"44B6876DFFEF85A576C0D45B551AFAA1FD63209CD745DF75C5A0F0B580296EA466CD0338207E4752"
|
|
531 |
"FF4E7DB724D8AE18CE5CF4153BB94C27869FBB50E64F02546E4B02997A0B8623E64017CC770759C6"
|
|
532 |
"695DB649EEFD829D688D441BCC4E7348F1024100EF86DD7AF3F32CDE8A9F6564E43A559A0C9F8BAD"
|
|
533 |
"36CC25330548B347AC158A345631FA90F7B873C36EFFAE2F7823227A3F580B5DD18304D5932751E7"
|
|
534 |
"43E9234F024100E2A039854B55688740E32A51DF4AF88613D91A371CF8DDD95D780A89D7CF2119A9"
|
|
535 |
"54F1AC0F3DCDB2F6959926E6D9D37D8BC07A4C634DE6F16315BD5F0DAC340102407ECEEDB9903572"
|
|
536 |
"1B76909F174BA6698DCA72953D957B22C0A871C8531EDE3A1BB52984A719BC010D1CA57A555DB83F"
|
|
537 |
"6DE54CBAB932AEC652F38D497A6F3F30CF024100854F30E4FF232E6DADB2CD99926855F484255AB7"
|
|
538 |
"01FBCDCB27EC426F33A7046972AA700ADBCA008763DF87440F52F4E070531AC385B55AAC1C2AE7DD"
|
|
539 |
"8F9278F1024100C313F4AF9E4A9DE1253C21080CE524251560C111550772FD08690F13FBE658342E"
|
|
540 |
"BD2D41C9DCB12374E871B1839E26CAE252E1AE3DAAD5F1EE1F42B4D0EE7581"; |
|
541 |
||
542 |
SignatureKnownAnswerTest<RSASS<PKCS1v15, SHA1> >( |
|
543 |
keyRSA1, |
|
1
by weidai
Initial revision |
544 |
"Everyone gets Friday off.", |
545 |
"0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81"); |
|
546 |
||
181
by weidai
changes done for FIPS-140 lab code drop |
547 |
SignatureKnownAnswerTest<RSASS_ISO<SHA1> >( |
548 |
keyRSA2, |
|
549 |
"test", |
|
550 |
"32F6BA41C8930DE71EE67F2627172CC539EDE04267FDE03AC295E3C50311F26C3B275D3AF513AC96"
|
|
551 |
"8EE493BAB7DA3A754661D1A7C4A0D1A2B7EE8B313AACD8CB8BFBC5C15EFB0EF15C86A9334A1E87AD"
|
|
552 |
"291EB961B5CA0E84930429B28780816AA94F96FC2367B71E2D2E4866FA966795B147F00600E5207E"
|
|
553 |
"2F189C883B37477C"); |
|
554 |
||
1
by weidai
Initial revision |
555 |
SignaturePairwiseConsistencyTest<DSA>( |
556 |
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|
|
557 |
||
181
by weidai
changes done for FIPS-140 lab code drop |
558 |
SignaturePairwiseConsistencyTest<ECDSA<EC2N, SHA1> >( |
1
by weidai
Initial revision |
559 |
"302D020100301006072A8648CE3D020106052B8104000404163014020101040F0070337065E1E196980A9D00E37211"); |
560 |
||
181
by weidai
changes done for FIPS-140 lab code drop |
561 |
SignaturePairwiseConsistencyTest<ECDSA<ECP, SHA1> >( |
1
by weidai
Initial revision |
562 |
"3039020100301306072A8648CE3D020106082A8648CE3D030101041F301D02010104182BB8A13C8B867010BD9471D9E81FDB01ABD0538C64D6249A"); |
181
by weidai
changes done for FIPS-140 lab code drop |
563 |
|
564 |
SignaturePairwiseConsistencyTest<RSASS<PSS, SHA1> >(keyRSA1); |
|
1
by weidai
Initial revision |
565 |
}
|
566 |
catch (...) |
|
567 |
{
|
|
568 |
g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_FAILED; |
|
569 |
goto done; |
|
570 |
}
|
|
571 |
||
572 |
g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_PASSED; |
|
573 |
||
574 |
done: |
|
575 |
SetPowerUpSelfTestInProgressOnThisThread(false); |
|
576 |
return; |
|
577 |
}
|
|
578 |
||
125
by weidai
reduce source file dependencies |
579 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
580 |
||
581 |
void DoDllPowerUpSelfTest() |
|
582 |
{
|
|
222
by weidai
fix self-test when installed into unicode paths |
583 |
CryptoPP::DoPowerUpSelfTest(NULL, s_moduleMac); |
125
by weidai
reduce source file dependencies |
584 |
}
|
585 |
||
586 |
#else
|
|
587 |
||
588 |
void DoDllPowerUpSelfTest() |
|
589 |
{
|
|
590 |
throw NotImplemented("DoDllPowerUpSelfTest() only available on Windows"); |
|
591 |
}
|
|
592 |
||
593 |
#endif // #ifdef CRYPTOPP_WIN32_AVAILABLE |
|
594 |
||
1
by weidai
Initial revision |
595 |
NAMESPACE_END
|
75
by weidai
create DLL version, fix GetNextIV() bug in CTR and OFB modes |
596 |
|
125
by weidai
reduce source file dependencies |
597 |
#ifdef CRYPTOPP_WIN32_AVAILABLE
|
598 |
||
599 |
// DllMain needs to be in the global namespace
|
|
600 |
BOOL APIENTRY DllMain(HANDLE hModule, |
|
601 |
DWORD ul_reason_for_call, |
|
602 |
LPVOID lpReserved) |
|
603 |
{
|
|
604 |
if (ul_reason_for_call == DLL_PROCESS_ATTACH) |
|
605 |
{
|
|
606 |
CryptoPP::s_hModule = (HMODULE)hModule; |
|
607 |
CryptoPP::DoDllPowerUpSelfTest(); |
|
608 |
}
|
|
609 |
return TRUE; |
|
610 |
}
|
|
611 |
||
612 |
#endif // #ifdef CRYPTOPP_WIN32_AVAILABLE |
|
613 |
||
614 |
#endif // #ifndef CRYPTOPP_IMPORTS |