Crypto++  5.6.4
Free C++ class library of cryptographic schemes
fipstest.cpp
1 // fipstest.cpp - written and placed in the public domain by Wei Dai
2 
3 #include "pch.h"
4 #include "config.h"
5 
6 #ifndef CRYPTOPP_IMPORTS
7 
8 #define CRYPTOPP_DEFAULT_NO_DLL
9 #include "dll.h"
10 #include "cryptlib.h"
11 #include "filters.h"
12 #include "smartptr.h"
13 #include "misc.h"
14 
15 // Simply disable CRYPTOPP_WIN32_AVAILABLE for Windows Phone and Windows Store apps
16 #ifdef CRYPTOPP_WIN32_AVAILABLE
17 # if defined(WINAPI_FAMILY)
18 # if !(WINAPI_FAMILY_PARTITION(WINAPI_PARTITION_DESKTOP))
19 # undef CRYPTOPP_WIN32_AVAILABLE
20 # endif
21 # endif
22 #endif
23 
24 #ifdef CRYPTOPP_WIN32_AVAILABLE
25 #ifndef _WIN32_WINNT
26 #define _WIN32_WINNT 0x0400
27 #endif
28 
29 #include <windows.h>
30 
31 #if defined(_MSC_VER) && _MSC_VER >= 1400
32 #ifdef _M_IX86
33 #define _CRT_DEBUGGER_HOOK _crt_debugger_hook
34 #else
35 #define _CRT_DEBUGGER_HOOK __crt_debugger_hook
36 #endif
37 #if _MSC_VER < 1900
38 extern "C" {_CRTIMP void __cdecl _CRT_DEBUGGER_HOOK(int);}
39 #else
40 extern "C" {void __cdecl _CRT_DEBUGGER_HOOK(int); }
41 #endif
42 #endif
43 #endif
44 
45 #include <iostream>
46 
47 #if CRYPTOPP_MSC_VERSION
48 # pragma warning(disable: 4100)
49 #endif
50 
51 NAMESPACE_BEGIN(CryptoPP)
52 
53 extern PowerUpSelfTestStatus g_powerUpSelfTestStatus;
54 SecByteBlock g_actualMac;
55 unsigned long g_macFileLocation = 0;
56 
57 // use a random dummy string here, to be searched/replaced later with the real MAC
58 static const byte s_moduleMac[CryptoPP::HMAC<CryptoPP::SHA1>::DIGESTSIZE] = CRYPTOPP_DUMMY_DLL_MAC;
59 CRYPTOPP_COMPILE_ASSERT(sizeof(s_moduleMac) == CryptoPP::SHA1::DIGESTSIZE);
60 
61 #ifdef CRYPTOPP_WIN32_AVAILABLE
62 static HMODULE s_hModule = NULL;
63 #endif
64 
65 const byte * CRYPTOPP_API GetActualMacAndLocation(unsigned int &macSize, unsigned int &fileLocation)
66 {
67  macSize = (unsigned int)g_actualMac.size();
68  fileLocation = g_macFileLocation;
69  return g_actualMac;
70 }
71 
72 void KnownAnswerTest(RandomNumberGenerator &rng, const char *output)
73 {
74  EqualityComparisonFilter comparison;
75 
76  RandomNumberStore(rng, strlen(output)/2).TransferAllTo(comparison, "0");
77  StringSource(output, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
78 
79  comparison.ChannelMessageSeriesEnd("0");
80  comparison.ChannelMessageSeriesEnd("1");
81 }
82 
83 template <class CIPHER>
84 void X917RNG_KnownAnswerTest(
85  const char *key,
86  const char *seed,
87  const char *deterministicTimeVector,
88  const char *output,
89  CIPHER *dummy = NULL)
90 {
91  CRYPTOPP_UNUSED(dummy);
92 #ifdef OS_RNG_AVAILABLE
93  std::string decodedKey, decodedSeed, decodedDeterministicTimeVector;
94  StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
95  StringSource(seed, true, new HexDecoder(new StringSink(decodedSeed)));
96  StringSource(deterministicTimeVector, true, new HexDecoder(new StringSink(decodedDeterministicTimeVector)));
97 
98  AutoSeededX917RNG<CIPHER> rng(false, false);
99  rng.Reseed((const byte *)decodedKey.data(), decodedKey.size(), (const byte *)decodedSeed.data(), (const byte *)decodedDeterministicTimeVector.data());
100  KnownAnswerTest(rng, output);
101 #else
102  throw 0;
103 #endif
104 }
105 
106 void KnownAnswerTest(StreamTransformation &encryption, StreamTransformation &decryption, const char *plaintext, const char *ciphertext)
107 {
108  EqualityComparisonFilter comparison;
109 
110  StringSource(plaintext, true, new HexDecoder(new StreamTransformationFilter(encryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING)));
111  StringSource(ciphertext, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
112 
113  StringSource(ciphertext, true, new HexDecoder(new StreamTransformationFilter(decryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING)));
114  StringSource(plaintext, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
115 
116  comparison.ChannelMessageSeriesEnd("0");
117  comparison.ChannelMessageSeriesEnd("1");
118 }
119 
120 template <class CIPHER>
121 void SymmetricEncryptionKnownAnswerTest(
122  const char *key,
123  const char *hexIV,
124  const char *plaintext,
125  const char *ecb,
126  const char *cbc,
127  const char *cfb,
128  const char *ofb,
129  const char *ctr,
130  CIPHER *dummy = NULL)
131 {
132  CRYPTOPP_UNUSED(dummy);
133  std::string decodedKey;
134  StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
135 
136  typename CIPHER::Encryption encryption((const byte *)decodedKey.data(), decodedKey.size());
137  typename CIPHER::Decryption decryption((const byte *)decodedKey.data(), decodedKey.size());
138 
139  SecByteBlock iv(encryption.BlockSize());
140  StringSource(hexIV, true, new HexDecoder(new ArraySink(iv, iv.size())));
141 
142  if (ecb)
143  KnownAnswerTest(ECB_Mode_ExternalCipher::Encryption(encryption).Ref(), ECB_Mode_ExternalCipher::Decryption(decryption).Ref(), plaintext, ecb);
144  if (cbc)
145  KnownAnswerTest(CBC_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CBC_Mode_ExternalCipher::Decryption(decryption, iv).Ref(), plaintext, cbc);
146  if (cfb)
147  KnownAnswerTest(CFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, cfb);
148  if (ofb)
149  KnownAnswerTest(OFB_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), OFB_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ofb);
150  if (ctr)
151  KnownAnswerTest(CTR_Mode_ExternalCipher::Encryption(encryption, iv).Ref(), CTR_Mode_ExternalCipher::Decryption(encryption, iv).Ref(), plaintext, ctr);
152 }
153 
154 void KnownAnswerTest(HashTransformation &hash, const char *message, const char *digest)
155 {
156  EqualityComparisonFilter comparison;
157  StringSource(digest, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
158  StringSource(message, true, new HashFilter(hash, new ChannelSwitch(comparison, "0")));
159 
160  comparison.ChannelMessageSeriesEnd("0");
161  comparison.ChannelMessageSeriesEnd("1");
162 }
163 
164 template <class HASH>
165 void SecureHashKnownAnswerTest(const char *message, const char *digest, HASH *dummy = NULL)
166 {
167  CRYPTOPP_UNUSED(dummy);
168  HASH hash;
169  KnownAnswerTest(hash, message, digest);
170 }
171 
172 template <class MAC>
173 void MAC_KnownAnswerTest(const char *key, const char *message, const char *digest, MAC *dummy = NULL)
174 {
175  CRYPTOPP_UNUSED(dummy);
176  std::string decodedKey;
177  StringSource(key, true, new HexDecoder(new StringSink(decodedKey)));
178 
179  MAC mac((const byte *)decodedKey.data(), decodedKey.size());
180  KnownAnswerTest(mac, message, digest);
181 }
182 
183 template <class SCHEME>
184 void SignatureKnownAnswerTest(const char *key, const char *message, const char *signature, SCHEME *dummy = NULL)
185 {
186  typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
187  typename SCHEME::Verifier verifier(signer);
188 
189  CRYPTOPP_UNUSED(dummy);
190  RandomPool rng;
191  EqualityComparisonFilter comparison;
192 
193  StringSource(message, true, new SignerFilter(rng, signer, new ChannelSwitch(comparison, "0")));
194  StringSource(signature, true, new HexDecoder(new ChannelSwitch(comparison, "1")));
195 
196  comparison.ChannelMessageSeriesEnd("0");
197  comparison.ChannelMessageSeriesEnd("1");
198 
200  StringSource(signature, true, new HexDecoder(new Redirector(verifierFilter, Redirector::DATA_ONLY)));
201  StringSource(message, true, new Redirector(verifierFilter));
202 }
203 
204 void EncryptionPairwiseConsistencyTest(const PK_Encryptor &encryptor, const PK_Decryptor &decryptor)
205 {
206  try
207  {
208  RandomPool rng;
209  const char *testMessage ="test message";
210  std::string ciphertext, decrypted;
211 
212  StringSource(
213  testMessage,
214  true,
215  new PK_EncryptorFilter(
216  rng,
217  encryptor,
218  new StringSink(ciphertext)));
219 
220  if (ciphertext == testMessage)
221  throw 0;
222 
223  StringSource(
224  ciphertext,
225  true,
226  new PK_DecryptorFilter(
227  rng,
228  decryptor,
229  new StringSink(decrypted)));
230 
231  if (decrypted != testMessage)
232  throw 0;
233  }
234  catch (...)
235  {
236  throw SelfTestFailure(encryptor.AlgorithmName() + ": pairwise consistency test failed");
237  }
238 }
239 
240 void SignaturePairwiseConsistencyTest(const PK_Signer &signer, const PK_Verifier &verifier)
241 {
242  try
243  {
244  RandomPool rng;
245 
246  StringSource(
247  "test message",
248  true,
249  new SignerFilter(
250  rng,
251  signer,
252  new VerifierFilter(verifier, NULL, VerifierFilter::THROW_EXCEPTION),
253  true));
254  }
255  catch (...)
256  {
257  throw SelfTestFailure(signer.AlgorithmName() + ": pairwise consistency test failed");
258  }
259 }
260 
261 template <class SCHEME>
262 void SignaturePairwiseConsistencyTest(const char *key, SCHEME *dummy = NULL)
263 {
264  typename SCHEME::Signer signer(StringSource(key, true, new HexDecoder).Ref());
265  typename SCHEME::Verifier verifier(signer);
266 
267  CRYPTOPP_UNUSED(dummy);
268  SignaturePairwiseConsistencyTest(signer, verifier);
269 }
270 
272 {
273  byte key[] = {0x47, 0x1E, 0x33, 0x96, 0x65, 0xB1, 0x6A, 0xED, 0x0B, 0xF8, 0x6B, 0xFD, 0x01, 0x65, 0x05, 0xCC};
274  return new HMAC<SHA1>(key, sizeof(key));
275 }
276 
277 bool IntegrityCheckModule(const char *moduleFilename, const byte *expectedModuleMac, SecByteBlock *pActualMac, unsigned long *pMacFileLocation)
278 {
280  unsigned int macSize = mac->DigestSize();
281 
282  SecByteBlock tempMac;
283  SecByteBlock &actualMac = pActualMac ? *pActualMac : tempMac;
284  actualMac.resize(macSize);
285 
286  unsigned long tempLocation = 0;
287  unsigned long &macFileLocation = pMacFileLocation ? *pMacFileLocation : tempLocation;
288  macFileLocation = 0;
289 
290  MeterFilter verifier(new HashFilter(*mac, new ArraySink(actualMac, actualMac.size())));
291 // MeterFilter verifier(new FileSink("c:\\dt.tmp"));
292  std::ifstream moduleStream;
293 
294 #ifdef CRYPTOPP_WIN32_AVAILABLE
295  HMODULE h = NULL;
296  {
297  char moduleFilenameBuf[MAX_PATH] = "";
298  if (moduleFilename == NULL)
299  {
300 #if (_MSC_VER >= 1400 && !defined(_STLPORT_VERSION)) // ifstream doesn't support wide filename on other compilers
301  wchar_t wideModuleFilename[MAX_PATH];
302  if (GetModuleFileNameW(s_hModule, wideModuleFilename, MAX_PATH) > 0)
303  {
304  moduleStream.open(wideModuleFilename, std::ios::in | std::ios::binary);
305  h = GetModuleHandleW(wideModuleFilename);
306  }
307  else
308 #endif
309  {
310  GetModuleFileNameA(s_hModule, moduleFilenameBuf, MAX_PATH);
311  moduleFilename = moduleFilenameBuf;
312  }
313  }
314 #endif
315  if (moduleFilename != NULL)
316  {
317  moduleStream.open(moduleFilename, std::ios::in | std::ios::binary);
318 #ifdef CRYPTOPP_WIN32_AVAILABLE
319  h = GetModuleHandleA(moduleFilename);
320  moduleFilename = NULL;
321  }
322 #endif
323  }
324 
325  if (!moduleStream)
326  {
327 #ifdef CRYPTOPP_WIN32_AVAILABLE
328  OutputDebugString("Crypto++ DLL integrity check failed. Cannot open file for reading.");
329 #endif
330  return false;
331  }
332  FileStore file(moduleStream);
333 
334 #ifdef CRYPTOPP_WIN32_AVAILABLE
335  // try to hash from memory first
336  const byte *memBase = (const byte *)h;
337  const IMAGE_DOS_HEADER *ph = (IMAGE_DOS_HEADER *)memBase;
338  const IMAGE_NT_HEADERS *phnt = (IMAGE_NT_HEADERS *)(memBase + ph->e_lfanew);
339  const IMAGE_SECTION_HEADER *phs = IMAGE_FIRST_SECTION(phnt);
340  DWORD nSections = phnt->FileHeader.NumberOfSections;
341  size_t currentFilePos = 0;
342 
343  size_t checksumPos = (byte *)&phnt->OptionalHeader.CheckSum - memBase;
344  size_t checksumSize = sizeof(phnt->OptionalHeader.CheckSum);
345  size_t certificateTableDirectoryPos = (byte *)&phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY] - memBase;
346  size_t certificateTableDirectorySize = sizeof(phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY]);
347  size_t certificateTablePos = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].VirtualAddress;
348  size_t certificateTableSize = phnt->OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY].Size;
349 
350  verifier.AddRangeToSkip(0, checksumPos, checksumSize);
351  verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize);
352  verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize);
353 
354  while (nSections--)
355  {
356  switch (phs->Characteristics)
357  {
358  default:
359  break;
360  case IMAGE_SCN_CNT_CODE | IMAGE_SCN_MEM_EXECUTE | IMAGE_SCN_MEM_READ:
361  case IMAGE_SCN_CNT_INITIALIZED_DATA | IMAGE_SCN_MEM_READ:
362  unsigned int sectionSize = STDMIN(phs->SizeOfRawData, phs->Misc.VirtualSize);
363  const byte *sectionMemStart = memBase + phs->VirtualAddress;
364  unsigned int sectionFileStart = phs->PointerToRawData;
365  size_t subSectionStart = 0, nextSubSectionStart;
366 
367  do
368  {
369  const byte *subSectionMemStart = sectionMemStart + subSectionStart;
370  size_t subSectionFileStart = sectionFileStart + subSectionStart;
371  size_t subSectionSize = sectionSize - subSectionStart;
372  nextSubSectionStart = 0;
373 
374  unsigned int entriesToReadFromDisk[] = {IMAGE_DIRECTORY_ENTRY_IMPORT, IMAGE_DIRECTORY_ENTRY_IAT};
375  for (unsigned int i=0; i<sizeof(entriesToReadFromDisk)/sizeof(entriesToReadFromDisk[0]); i++)
376  {
377  const IMAGE_DATA_DIRECTORY &entry = phnt->OptionalHeader.DataDirectory[entriesToReadFromDisk[i]];
378  const byte *entryMemStart = memBase + entry.VirtualAddress;
379  if (subSectionMemStart <= entryMemStart && entryMemStart < subSectionMemStart + subSectionSize)
380  {
381  subSectionSize = entryMemStart - subSectionMemStart;
382  nextSubSectionStart = entryMemStart - sectionMemStart + entry.Size;
383  }
384  }
385 
386 #if defined(_MSC_VER) && _MSC_VER >= 1400
387  // first byte of _CRT_DEBUGGER_HOOK gets modified in memory by the debugger invisibly, so read it from file
388  if (IsDebuggerPresent())
389  {
390  if (subSectionMemStart <= (byte *)&_CRT_DEBUGGER_HOOK && (byte *)&_CRT_DEBUGGER_HOOK < subSectionMemStart + subSectionSize)
391  {
392  subSectionSize = (byte *)&_CRT_DEBUGGER_HOOK - subSectionMemStart;
393  nextSubSectionStart = (byte *)&_CRT_DEBUGGER_HOOK - sectionMemStart + 1;
394  }
395  }
396 #endif
397 
398  if (subSectionMemStart <= expectedModuleMac && expectedModuleMac < subSectionMemStart + subSectionSize)
399  {
400  // found stored MAC
401  macFileLocation = (unsigned long)(subSectionFileStart + (expectedModuleMac - subSectionMemStart));
402  verifier.AddRangeToSkip(0, macFileLocation, macSize);
403  }
404 
405  file.TransferTo(verifier, subSectionFileStart - currentFilePos);
406  verifier.Put(subSectionMemStart, subSectionSize);
407  file.Skip(subSectionSize);
408  currentFilePos = subSectionFileStart + subSectionSize;
409  subSectionStart = nextSubSectionStart;
410  } while (nextSubSectionStart != 0);
411  }
412  phs++;
413  }
414 #endif
415  file.TransferAllTo(verifier);
416 
417 #ifdef CRYPTOPP_WIN32_AVAILABLE
418  // if that fails (could be caused by debug breakpoints or DLL base relocation modifying image in memory),
419  // hash from disk instead
420  if (!VerifyBufsEqual(expectedModuleMac, actualMac, macSize))
421  {
422  OutputDebugString("In memory integrity check failed. This may be caused by debug breakpoints or DLL relocation.\n");
423  moduleStream.clear();
424  moduleStream.seekg(0);
425  verifier.Initialize(MakeParameters(Name::OutputBuffer(), ByteArrayParameter(actualMac, (unsigned int)actualMac.size())));
426 // verifier.Initialize(MakeParameters(Name::OutputFileName(), (const char *)"c:\\dt2.tmp"));
427  verifier.AddRangeToSkip(0, checksumPos, checksumSize);
428  verifier.AddRangeToSkip(0, certificateTableDirectoryPos, certificateTableDirectorySize);
429  verifier.AddRangeToSkip(0, certificateTablePos, certificateTableSize);
430  verifier.AddRangeToSkip(0, macFileLocation, macSize);
431  FileStore(moduleStream).TransferAllTo(verifier);
432  }
433 #endif
434 
435  if (VerifyBufsEqual(expectedModuleMac, actualMac, macSize))
436  return true;
437 
438 #ifdef CRYPTOPP_WIN32_AVAILABLE
439  std::string hexMac;
440  HexEncoder(new StringSink(hexMac)).PutMessageEnd(actualMac, actualMac.size());
441  OutputDebugString((("Crypto++ DLL integrity check failed. Actual MAC is: " + hexMac) + "\n").c_str());
442 #endif
443  return false;
444 }
445 
446 void DoPowerUpSelfTest(const char *moduleFilename, const byte *expectedModuleMac)
447 {
448  g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_NOT_DONE;
449  SetPowerUpSelfTestInProgressOnThisThread(true);
450 
451  try
452  {
453  if (FIPS_140_2_ComplianceEnabled() || expectedModuleMac != NULL)
454  {
455  if (!IntegrityCheckModule(moduleFilename, expectedModuleMac, &g_actualMac, &g_macFileLocation))
456  throw 0; // throw here so we break in the debugger, this will be caught right away
457  }
458 
459  // algorithm tests
460 
461  X917RNG_KnownAnswerTest<AES>(
462  "2b7e151628aed2a6abf7158809cf4f3c", // key
463  "000102030405060708090a0b0c0d0e0f", // seed
464  "00000000000000000000000000000001", // time vector
465  "D176EDD27493B0395F4D10546232B0693DC7061C03C3A554F09CECF6F6B46D945A"); // output
466 
467  SymmetricEncryptionKnownAnswerTest<DES_EDE3>(
468  "385D7189A5C3D485E1370AA5D408082B5CCCCB5E19F2D90E",
469  "C141B5FCCD28DC8A",
470  "6E1BD7C6120947A464A6AAB293A0F89A563D8D40D3461B68",
471  "64EAAD4ACBB9CEAD6C7615E7C7E4792FE587D91F20C7D2F4",
472  "6235A461AFD312973E3B4F7AA7D23E34E03371F8E8C376C9",
473  "E26BA806A59B0330DE40CA38E77A3E494BE2B212F6DD624B",
474  "E26BA806A59B03307DE2BCC25A08BA40A8BA335F5D604C62",
475  "E26BA806A59B03303C62C2EFF32D3ACDD5D5F35EBCC53371");
476 
477  SymmetricEncryptionKnownAnswerTest<SKIPJACK>(
478  "1555E5531C3A169B2D65",
479  "6EC9795701F49864",
480  "00AFA48E9621E52E8CBDA312660184EDDB1F33D9DACDA8DA",
481  "DBEC73562EFCAEB56204EB8AE9557EBF77473FBB52D17CD1",
482  "0C7B0B74E21F99B8F2C8DF37879F6C044967F42A796DCA8B",
483  "79FDDA9724E36CC2E023E9A5C717A8A8A7FDA465CADCBF63",
484  "79FDDA9724E36CC26CACBD83C1ABC06EAF5B249BE5B1E040",
485  "79FDDA9724E36CC211B0AEC607B95A96BCDA318440B82F49");
486 
487  SymmetricEncryptionKnownAnswerTest<AES>(
488  "2b7e151628aed2a6abf7158809cf4f3c",
489  "000102030405060708090a0b0c0d0e0f",
490  "6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710", // plaintext
491  "3ad77bb40d7a3660a89ecaf32466ef97f5d3d58503b9699de785895a96fdbaaf43b1cd7f598ece23881b00e3ed0306887b0c785e27e8ad3f8223207104725dd4", // ecb
492  "7649abac8119b246cee98e9b12e9197d5086cb9b507219ee95db113a917678b273bed6b8e3c1743b7116e69e222295163ff1caa1681fac09120eca307586e1a7", // cbc
493  "3b3fd92eb72dad20333449f8e83cfb4ac8a64537a0b3a93fcde3cdad9f1ce58b26751f67a3cbb140b1808cf187a4f4dfc04b05357c5d1c0eeac4c66f9ff7f2e6", // cfb
494  "3b3fd92eb72dad20333449f8e83cfb4a7789508d16918f03f53c52dac54ed8259740051e9c5fecf64344f7a82260edcc304c6528f659c77866a510d9c1d6ae5e", // ofb
495  NULL);
496 
497  SymmetricEncryptionKnownAnswerTest<AES>(
498  "2b7e151628aed2a6abf7158809cf4f3c",
499  "f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff",
500  "6bc1bee22e409f96e93d7e117393172aae2d8a571e03ac9c9eb76fac45af8e5130c81c46a35ce411e5fbc1191a0a52eff69f2445df4f9b17ad2b417be66c3710",
501  NULL,
502  NULL,
503  NULL,
504  NULL,
505  "874d6191b620e3261bef6864990db6ce9806f66b7970fdff8617187bb9fffdff5ae4df3edbd5d35e5b4f09020db03eab1e031dda2fbe03d1792170a0f3009cee"); // ctr
506 
507 
508  SecureHashKnownAnswerTest<SHA1>(
509  "abc",
510  "A9993E364706816ABA3E25717850C26C9CD0D89D");
511 
512  SecureHashKnownAnswerTest<SHA224>(
513  "abc",
514  "23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7");
515 
516  SecureHashKnownAnswerTest<SHA256>(
517  "abc",
518  "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad");
519 
520  SecureHashKnownAnswerTest<SHA384>(
521  "abc",
522  "cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7");
523 
524  SecureHashKnownAnswerTest<SHA512>(
525  "abc",
526  "ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f");
527 
528  MAC_KnownAnswerTest<HMAC<SHA1> >(
529  "303132333435363738393a3b3c3d3e3f40414243",
530  "Sample #2",
531  "0922d3405faa3d194f82a45830737d5cc6c75d24");
532 
533  const char *keyRSA1 =
534  "30820150020100300d06092a864886f70d01010105000482013a3082013602010002400a66791dc6988168de7ab77419bb7fb0"
535  "c001c62710270075142942e19a8d8c51d053b3e3782a1de5dc5af4ebe99468170114a1dfe67cdc9a9af55d655620bbab0203010001"
536  "02400123c5b61ba36edb1d3679904199a89ea80c09b9122e1400c09adcf7784676d01d23356a7d44d6bd8bd50e94bfc723fa"
537  "87d8862b75177691c11d757692df8881022033d48445c859e52340de704bcdda065fbb4058d740bd1d67d29e9c146c11cf61"
538  "0220335e8408866b0fd38dc7002d3f972c67389a65d5d8306566d5c4f2a5aa52628b0220045ec90071525325d3d46db79695e9af"
539  "acc4523964360e02b119baa366316241022015eb327360c7b60d12e5e2d16bdcd97981d17fba6b70db13b20b436e24eada590220"
540  "2ca6366d72781dfa24d34a9a24cbc2ae927a9958af426563ff63fb11658a461d";
541 
542  const char *keyRSA2 =
543  "30820273020100300D06092A864886F70D01010105000482025D3082025902010002818100D40AF9"
544  "A2B713034249E5780056D70FC7DE75D76E44565AA6A6B8ED9646F3C19F9E254D72D7DE6E49DB2264"
545  "0C1D05AB9E2A5F901D8F3FE1F7AE02CEE2ECCE54A40ABAE55A004692752E70725AEEE7CDEA67628A"
546  "82A9239B4AB660C2BC56D9F01E90CBAAB9BF0FC8E17173CEFC5709A29391A7DDF3E0B758691AAF30"
547  "725B292F4F020111027F18C0BA087D082C45D75D3594E0767E4820818EB35612B80CEAB8C880ACA5"
548  "44B6876DFFEF85A576C0D45B551AFAA1FD63209CD745DF75C5A0F0B580296EA466CD0338207E4752"
549  "FF4E7DB724D8AE18CE5CF4153BB94C27869FBB50E64F02546E4B02997A0B8623E64017CC770759C6"
550  "695DB649EEFD829D688D441BCC4E7348F1024100EF86DD7AF3F32CDE8A9F6564E43A559A0C9F8BAD"
551  "36CC25330548B347AC158A345631FA90F7B873C36EFFAE2F7823227A3F580B5DD18304D5932751E7"
552  "43E9234F024100E2A039854B55688740E32A51DF4AF88613D91A371CF8DDD95D780A89D7CF2119A9"
553  "54F1AC0F3DCDB2F6959926E6D9D37D8BC07A4C634DE6F16315BD5F0DAC340102407ECEEDB9903572"
554  "1B76909F174BA6698DCA72953D957B22C0A871C8531EDE3A1BB52984A719BC010D1CA57A555DB83F"
555  "6DE54CBAB932AEC652F38D497A6F3F30CF024100854F30E4FF232E6DADB2CD99926855F484255AB7"
556  "01FBCDCB27EC426F33A7046972AA700ADBCA008763DF87440F52F4E070531AC385B55AAC1C2AE7DD"
557  "8F9278F1024100C313F4AF9E4A9DE1253C21080CE524251560C111550772FD08690F13FBE658342E"
558  "BD2D41C9DCB12374E871B1839E26CAE252E1AE3DAAD5F1EE1F42B4D0EE7581";
559 
560  SignatureKnownAnswerTest<RSASS<PKCS1v15, SHA1> >(
561  keyRSA1,
562  "Everyone gets Friday off.",
563  "0610761F95FFD1B8F29DA34212947EC2AA0E358866A722F03CC3C41487ADC604A48FF54F5C6BEDB9FB7BD59F82D6E55D8F3174BA361B2214B2D74E8825E04E81");
564 
565  SignatureKnownAnswerTest<RSASS_ISO<SHA1> >(
566  keyRSA2,
567  "test",
568  "32F6BA41C8930DE71EE67F2627172CC539EDE04267FDE03AC295E3C50311F26C3B275D3AF513AC96"
569  "8EE493BAB7DA3A754661D1A7C4A0D1A2B7EE8B313AACD8CB8BFBC5C15EFB0EF15C86A9334A1E87AD"
570  "291EB961B5CA0E84930429B28780816AA94F96FC2367B71E2D2E4866FA966795B147F00600E5207E"
571  "2F189C883B37477C");
572 
573  SignaturePairwiseConsistencyTest<DSA>(
574  "3082014A0201003082012B06072A8648CE3804013082011E02818100F468699A6F6EBCC0120D3B34C8E007F125EC7D81F763B8D0F33869AE3BD6B9F2ECCC7DF34DF84C0307449E9B85D30D57194BCCEB310F48141914DD13A077AAF9B624A6CBE666BBA1D7EBEA95B5BA6F54417FD5D4E4220C601E071D316A24EA814E8B0122DBF47EE8AEEFD319EBB01DD95683F10DBB4FEB023F8262A07EAEB7FD02150082AD4E034DA6EEACDFDAE68C36F2BAD614F9E53B02818071AAF73361A26081529F7D84078ADAFCA48E031DB54AD57FB1A833ADBD8672328AABAA0C756247998D7A5B10DACA359D231332CE8120B483A784FE07D46EEBFF0D7D374A10691F78653E6DC29E27CCB1B174923960DFE5B959B919B2C3816C19251832AFD8E35D810E598F82877ABF7D40A041565168BD7F0E21E3FE2A8D8C1C0416021426EBA66E846E755169F84A1DA981D86502405DDF");
575 
576  SignaturePairwiseConsistencyTest<ECDSA<EC2N, SHA1> >(
577  "302D020100301006072A8648CE3D020106052B8104000404163014020101040F0070337065E1E196980A9D00E37211");
578 
579  SignaturePairwiseConsistencyTest<ECDSA<ECP, SHA1> >(
580  "3039020100301306072A8648CE3D020106082A8648CE3D030101041F301D02010104182BB8A13C8B867010BD9471D9E81FDB01ABD0538C64D6249A");
581 
582  SignaturePairwiseConsistencyTest<RSASS<PSS, SHA1> >(keyRSA1);
583  }
584  catch (...)
585  {
586  g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_FAILED;
587  goto done;
588  }
589 
590  g_powerUpSelfTestStatus = POWER_UP_SELF_TEST_PASSED;
591 
592 done:
593  SetPowerUpSelfTestInProgressOnThisThread(false);
594  return;
595 }
596 
597 #ifdef CRYPTOPP_WIN32_AVAILABLE
598 
600 {
601  CryptoPP::DoPowerUpSelfTest(NULL, s_moduleMac);
602 }
603 
604 #else
605 
607 {
608  throw NotImplemented("DoDllPowerUpSelfTest() only available on Windows");
609 }
610 
611 #endif // #ifdef CRYPTOPP_WIN32_AVAILABLE
612 
613 NAMESPACE_END
614 
615 #ifdef CRYPTOPP_WIN32_AVAILABLE
616 
617 // DllMain needs to be in the global namespace
618 BOOL APIENTRY DllMain(HANDLE hModule,
619  DWORD dwReason,
620  LPVOID /*lpReserved*/)
621 {
622  if (dwReason == DLL_PROCESS_ATTACH)
623  {
624  CryptoPP::s_hModule = (HMODULE)hModule;
626  }
627  return TRUE;
628 }
629 
630 #endif // #ifdef CRYPTOPP_WIN32_AVAILABLE
631 
632 #endif // #ifndef CRYPTOPP_IMPORTS
The self tests were executed via DoPowerUpSelfTest() or DoDllPowerUpSelfTest(), and the result was su...
Definition: fips140.h:47
Interface for message authentication codes.
Definition: cryptlib.h:1114
Randomness Pool based on AES-256.
Definition: randpool.h:49
Filter wrapper for PK_Verifier.
Definition: filters.h:694
Utility functions for the Crypto++ library.
void resize(size_type newSize)
Change size and preserve contents.
Definition: secblock.h:705
Converts given data to base 16.
Definition: hex.h:16
Interface for public-key signers.
Definition: cryptlib.h:2548
Interface for public-key encryptors.
Definition: cryptlib.h:2356
Pass data only.
Definition: filters.h:763
Decode base 16 data back to bytes.
Definition: hex.h:36
Abstract base classes that provide a uniform interface to this library.
size_type size() const
Provides the count of elements in the SecBlock.
Definition: secblock.h:524
Indicates the filter should throw a HashVerificationFailed if a failure is encountered.
Definition: filters.h:720
The self tests were executed via DoPowerUpSelfTest() or DoDllPowerUpSelfTest(), but the result was fa...
Definition: fips140.h:44
Classes for automatic resource management.
Filter wrapper for PK_Signer.
Definition: filters.h:668
Library configuration file.
Interface for random number generators.
Definition: cryptlib.h:1193
SecBlock typedef.
Definition: secblock.h:731
Used to pass byte array input as part of a NameValuePairs object.
Definition: algparam.h:104
Route input to different and/or multiple channels based on channel ID.
Definition: channels.h:92
bool IntegrityCheckModule(const char *moduleFilename, const byte *expectedModuleMac, SecByteBlock *pActualMac=NULL, unsigned long *pMacFileLocation=NULL)
Verifies the MAC on the module.
Definition: fipstest.cpp:277
Pointer that overloads operator ->
Definition: smartptr.h:39
bool FIPS_140_2_ComplianceEnabled()
Determines whether the library provides FIPS validated cryptography.
Definition: fips140.cpp:29
Copy input to a memory buffer.
Definition: filters.h:1016
lword TransferTo(BufferedTransformation &target, lword transferMax=LWORD_MAX, const std::string &channel=DEFAULT_CHANNEL)
move transferMax bytes of the buffered output to target as input
Definition: cryptlib.h:1663
Interface for public-key decryptors.
Definition: cryptlib.h:2392
A method was called which was not implemented.
Definition: cryptlib.h:208
Filter wrapper for HashTransformation.
Definition: filters.h:508
RNG-based implementation of Source interface.
Definition: filters.h:1097
lword Skip(lword skipMax=ULONG_MAX)
Discard skipMax bytes from the output buffer.
Definition: files.cpp:166
AlgorithmParameters MakeParameters(const char *name, const T &value, bool throwIfNotUsed=true)
Create an object that implements NameValuePairs.
Definition: algparam.h:554
Exception thrown when a crypto algorithm is used after a self test fails.
Definition: fips140.h:23
bool ChannelMessageSeriesEnd(const std::string &channel, int propagation=-1, bool blocking=true)
Marks the end of a series of messages on a channel.
Definition: mqueue.cpp:135
#define CRYPTOPP_COMPILE_ASSERT(expr)
Compile time assertion.
Definition: misc.h:123
SHA-1
Definition: sha.h:22
virtual std::string AlgorithmName() const
Provides the name of this algorithm.
Definition: cryptlib.h:523
Filter wrapper for PK_Decryptor.
Definition: filters.h:943
MessageAuthenticationCode * NewIntegrityCheckingMAC()
Class object that calculates the MAC on the module.
Definition: fipstest.cpp:271
void DoDllPowerUpSelfTest()
Performs the power-up self test on the DLL.
Definition: fipstest.cpp:599
Automatically Seeded X9.17 RNG.
Definition: osrng.h:178
Interface for the data processing portion of stream ciphers.
Definition: cryptlib.h:822
const T & STDMIN(const T &a, const T &b)
Replacement function for std::min.
Definition: misc.h:467
Redirect input to another BufferedTransformation without owning it.
Definition: filters.h:755
Implementation of BufferedTransformation's attachment interface.
file-based implementation of Store interface
Definition: files.h:15
The self tests have not been performed.
Definition: fips140.h:41
const char * OutputBuffer()
ByteArrayParameter.
Definition: argnames.h:56
Filter wrapper for PK_Encryptor.
Definition: filters.h:928
Filter wrapper for StreamTransformation.
Definition: filters.h:476
#define CRYPTOPP_DUMMY_DLL_MAC
The placeholder used prior to embedding the actual MAC in the module.
Definition: fips140.h:109
virtual unsigned int DigestSize() const =0
Provides the digest size of the hash.
void TransferAllTo(BufferedTransformation &target, const std::string &channel=DEFAULT_CHANNEL)
Transfer all bytes from this object to another BufferedTransformation.
Definition: cryptlib.h:1771
Interface for public-key signature verifiers.
Definition: cryptlib.h:2615
HMAC.
Definition: hmac.h:50
void DoPowerUpSelfTest(const char *moduleFilename, const byte *expectedModuleMac)
Performs the power-up self test.
Definition: fipstest.cpp:446
PowerUpSelfTestStatus
Status of the power-up self test.
Definition: fips140.h:38
Interface for hash functions and data processing part of MACs.
Definition: cryptlib.h:931
bool VerifyBufsEqual(const byte *buf1, const byte *buf2, size_t count)
Performs a near constant-time comparison of two equally sized buffers.
Definition: misc.cpp:96
Measure how many bytes and messages pass through the filter.
Definition: filters.h:220
size_t PutMessageEnd(const byte *inString, size_t length, int propagation=-1, bool blocking=true)
Input multiple bytes for processing and signal the end of a message.
Definition: cryptlib.h:1456
A filter that checks messages on two channels for equality.
Definition: mqueue.h:71
No padding added to a block.
Definition: filters.h:461
Crypto++ library namespace.
Indicates the signature is at the beginning of the message (i.e., concatenation of signature+message)...
Definition: filters.h:712
Functions and definitions required for building the FIPS-140 DLL on Windows.