2017-06-19 13:49:18 +00:00
|
|
|
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
|
|
|
|
*
|
|
|
|
* LibTomCrypt is a library that provides various cryptographic
|
|
|
|
* algorithms in a highly modular and flexible manner.
|
|
|
|
*
|
|
|
|
* The library is free for all purposes without any express
|
|
|
|
* guarantee it works.
|
|
|
|
*/
|
2017-06-08 09:51:36 +00:00
|
|
|
#include <tomcrypt_test.h>
|
|
|
|
|
|
|
|
#ifdef LTC_PRNG_ENABLE_LTC_RNG
|
|
|
|
|
|
|
|
static unsigned long my_test_rng_read;
|
|
|
|
|
|
|
|
static unsigned long my_test_rng(unsigned char *buf, unsigned long len,
|
|
|
|
void (*callback)(void))
|
|
|
|
{
|
|
|
|
unsigned long n;
|
|
|
|
LTC_UNUSED_PARAM(callback);
|
|
|
|
for (n = 0; n < len; ++n) {
|
|
|
|
buf[n] = 4;
|
|
|
|
}
|
|
|
|
my_test_rng_read += n;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int prng_test(void)
|
|
|
|
{
|
2017-06-09 11:30:28 +00:00
|
|
|
int err = CRYPT_NOP;
|
|
|
|
int x;
|
2017-06-19 10:28:22 +00:00
|
|
|
unsigned char buf[4096] = { 0 };
|
2017-06-09 11:30:28 +00:00
|
|
|
unsigned long n, one;
|
|
|
|
prng_state nprng;
|
|
|
|
|
2017-06-08 09:51:36 +00:00
|
|
|
#ifdef LTC_PRNG_ENABLE_LTC_RNG
|
|
|
|
unsigned long before;
|
|
|
|
|
|
|
|
unsigned long (*previous)(unsigned char *, unsigned long , void (*)(void)) = ltc_rng;
|
|
|
|
ltc_rng = my_test_rng;
|
|
|
|
|
|
|
|
before = my_test_rng_read;
|
|
|
|
|
2017-12-07 12:26:30 +00:00
|
|
|
if ((err = rng_make_prng(128, find_prng("yarrow"), &nprng, NULL)) != CRYPT_OK) {
|
2017-06-08 09:51:36 +00:00
|
|
|
fprintf(stderr, "rng_make_prng with 'my_test_rng' failed: %s\n", error_to_string(err));
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
2017-12-07 12:26:30 +00:00
|
|
|
DO(yarrow_done(&nprng));
|
2017-06-08 09:51:36 +00:00
|
|
|
|
|
|
|
if (before == my_test_rng_read) {
|
|
|
|
fprintf(stderr, "somehow there was no read from the ltc_rng! %lu == %lu\n", before, my_test_rng_read);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
ltc_rng = previous;
|
|
|
|
#endif
|
2017-06-09 11:30:28 +00:00
|
|
|
|
|
|
|
/* test prngs (test, import/export) */
|
|
|
|
for (x = 0; prng_descriptor[x].name != NULL; x++) {
|
2017-06-09 13:04:46 +00:00
|
|
|
if(strstr(prng_descriptor[x].name, "no_prng") == prng_descriptor[x].name) continue;
|
2017-06-09 11:30:28 +00:00
|
|
|
DOX(prng_descriptor[x].test(), prng_descriptor[x].name);
|
|
|
|
DOX(prng_descriptor[x].start(&nprng), prng_descriptor[x].name);
|
|
|
|
DOX(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng), prng_descriptor[x].name);
|
|
|
|
DOX(prng_descriptor[x].ready(&nprng), prng_descriptor[x].name);
|
|
|
|
n = sizeof(buf);
|
|
|
|
if (strcmp(prng_descriptor[x].name, "sprng")) {
|
|
|
|
one = 1;
|
|
|
|
if (prng_descriptor[x].pexport(buf, &one, &nprng) != CRYPT_BUFFER_OVERFLOW) {
|
|
|
|
fprintf(stderr, "Error testing pexport with a short buffer (%s)\n", prng_descriptor[x].name);
|
|
|
|
return CRYPT_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
DOX(prng_descriptor[x].pexport(buf, &n, &nprng), prng_descriptor[x].name);
|
|
|
|
prng_descriptor[x].done(&nprng);
|
|
|
|
DOX(prng_descriptor[x].pimport(buf, n, &nprng), prng_descriptor[x].name);
|
2017-12-07 10:57:22 +00:00
|
|
|
DOX(prng_descriptor[x].pimport(buf, sizeof(buf), &nprng), prng_descriptor[x].name); /* try to import larger data */
|
2017-06-09 11:30:28 +00:00
|
|
|
DOX(prng_descriptor[x].ready(&nprng), prng_descriptor[x].name);
|
|
|
|
if (prng_descriptor[x].read(buf, 100, &nprng) != 100) {
|
|
|
|
fprintf(stderr, "Error reading from imported PRNG (%s)!\n", prng_descriptor[x].name);
|
|
|
|
return CRYPT_ERROR;
|
|
|
|
}
|
|
|
|
prng_descriptor[x].done(&nprng);
|
|
|
|
}
|
2017-12-07 12:26:30 +00:00
|
|
|
|
|
|
|
if ((err = rng_make_prng(-1, find_prng("yarrow"), &nprng, NULL)) != CRYPT_OK) {
|
|
|
|
fprintf(stderr, "rng_make_prng(-1,..) with 'yarrow' failed: %s\n", error_to_string(err));
|
|
|
|
}
|
|
|
|
DO(yarrow_done(&nprng));
|
2017-12-07 10:57:22 +00:00
|
|
|
|
|
|
|
#ifdef LTC_FORTUNA
|
|
|
|
DO(fortuna_start(&nprng));
|
|
|
|
DO(fortuna_add_entropy(buf, 32, &nprng));
|
|
|
|
DO(fortuna_ready(&nprng));
|
|
|
|
if (fortuna_read(buf + 32, 32, &nprng) != 32) {
|
|
|
|
fprintf(stderr, "Error reading from Fortuna after fortuna_add_entropy()!\n");
|
|
|
|
return CRYPT_ERROR;
|
|
|
|
}
|
|
|
|
DO(fortuna_done(&nprng));
|
|
|
|
|
|
|
|
DO(fortuna_start(&nprng));
|
|
|
|
DO(fortuna_add_random_event(0, 0, buf, 32, &nprng));
|
|
|
|
DO(fortuna_ready(&nprng));
|
|
|
|
if (fortuna_read(buf + 64, 32, &nprng) != 32) {
|
|
|
|
fprintf(stderr, "Error reading from Fortuna after fortuna_add_random_event()!\n");
|
|
|
|
return CRYPT_ERROR;
|
|
|
|
}
|
|
|
|
DO(fortuna_done(&nprng));
|
|
|
|
|
|
|
|
if (compare_testvector(buf + 64, 32, buf + 32, 32, "fortuna_add_entropy() vs. fortuna_add_random_event()", 0) != 0) {
|
|
|
|
err = CRYPT_FAIL_TESTVECTOR;
|
|
|
|
}
|
|
|
|
#endif
|
2017-06-08 09:51:36 +00:00
|
|
|
return err;
|
|
|
|
}
|
2017-06-19 13:49:18 +00:00
|
|
|
|
|
|
|
/* ref: $Format:%D$ */
|
|
|
|
/* git commit: $Format:%H$ */
|
|
|
|
/* commit time: $Format:%ai$ */
|