1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.]
61 #include <sys/types.h>
66 #include <openssl/crypto.h>
67 #include <openssl/rand.h>
68 #include <openssl/bio.h>
69 #include <openssl/err.h>
70 #include <openssl/bn.h>
73 int main(int argc, char *argv[])
75 printf("No DSA support\n");
79 # include <openssl/dsa.h>
81 static int dsa_cb(int p, int n, BN_GENCB *arg);
84 * seed, out_p, out_q, out_g are taken from the updated Appendix 5 to FIPS
85 * PUB 186 and also appear in Appendix 5 to FIPS PIB 186-1
87 static unsigned char seed[20] = {
88 0xd5, 0x01, 0x4e, 0x4b, 0x60, 0xef, 0x2b, 0xa8, 0xb6, 0x21, 0x1b, 0x40,
89 0x62, 0xba, 0x32, 0x24, 0xe0, 0x42, 0x7d, 0xd3,
92 static unsigned char out_p[] = {
93 0x8d, 0xf2, 0xa4, 0x94, 0x49, 0x22, 0x76, 0xaa,
94 0x3d, 0x25, 0x75, 0x9b, 0xb0, 0x68, 0x69, 0xcb,
95 0xea, 0xc0, 0xd8, 0x3a, 0xfb, 0x8d, 0x0c, 0xf7,
96 0xcb, 0xb8, 0x32, 0x4f, 0x0d, 0x78, 0x82, 0xe5,
97 0xd0, 0x76, 0x2f, 0xc5, 0xb7, 0x21, 0x0e, 0xaf,
98 0xc2, 0xe9, 0xad, 0xac, 0x32, 0xab, 0x7a, 0xac,
99 0x49, 0x69, 0x3d, 0xfb, 0xf8, 0x37, 0x24, 0xc2,
100 0xec, 0x07, 0x36, 0xee, 0x31, 0xc8, 0x02, 0x91,
103 static unsigned char out_q[] = {
104 0xc7, 0x73, 0x21, 0x8c, 0x73, 0x7e, 0xc8, 0xee,
105 0x99, 0x3b, 0x4f, 0x2d, 0xed, 0x30, 0xf4, 0x8e,
106 0xda, 0xce, 0x91, 0x5f,
109 static unsigned char out_g[] = {
110 0x62, 0x6d, 0x02, 0x78, 0x39, 0xea, 0x0a, 0x13,
111 0x41, 0x31, 0x63, 0xa5, 0x5b, 0x4c, 0xb5, 0x00,
112 0x29, 0x9d, 0x55, 0x22, 0x95, 0x6c, 0xef, 0xcb,
113 0x3b, 0xff, 0x10, 0xf3, 0x99, 0xce, 0x2c, 0x2e,
114 0x71, 0xcb, 0x9d, 0xe5, 0xfa, 0x24, 0xba, 0xbf,
115 0x58, 0xe5, 0xb7, 0x95, 0x21, 0x92, 0x5c, 0x9c,
116 0xc4, 0x2e, 0x9f, 0x6f, 0x46, 0x4b, 0x08, 0x8c,
117 0xc5, 0x72, 0xaf, 0x53, 0xe6, 0xd7, 0x88, 0x02,
120 static const unsigned char str1[] = "12345678901234567890";
122 static const char rnd_seed[] =
123 "string to make the random number generator think it has entropy";
125 static BIO *bio_err = NULL;
127 int main(int argc, char **argv)
131 int counter, ret = 0, i, j;
132 unsigned char buf[256];
134 unsigned char sig[256];
136 BIGNUM *p = NULL, *q = NULL, *g = NULL;
139 bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
141 CRYPTO_set_mem_debug(1);
142 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
144 RAND_seed(rnd_seed, sizeof rnd_seed);
146 BIO_printf(bio_err, "test generation of DSA parameters\n");
152 BN_GENCB_set(cb, dsa_cb, bio_err);
153 if (((dsa = DSA_new()) == NULL) || !DSA_generate_parameters_ex(dsa, 512,
159 BIO_printf(bio_err, "seed\n");
160 for (i = 0; i < 20; i += 4) {
161 BIO_printf(bio_err, "%02X%02X%02X%02X ",
162 seed[i], seed[i + 1], seed[i + 2], seed[i + 3]);
164 BIO_printf(bio_err, "\ncounter=%d h=%ld\n", counter, h);
166 DSA_print(bio_err, dsa, 0);
167 if (counter != 105) {
168 BIO_printf(bio_err, "counter should be 105\n");
172 BIO_printf(bio_err, "h should be 2\n");
176 DSA_get0_pqg(dsa, &p, &q, &g);
177 i = BN_bn2bin(q, buf);
179 if ((i != j) || (memcmp(buf, out_q, i) != 0)) {
180 BIO_printf(bio_err, "q value is wrong\n");
184 i = BN_bn2bin(p, buf);
186 if ((i != j) || (memcmp(buf, out_p, i) != 0)) {
187 BIO_printf(bio_err, "p value is wrong\n");
191 i = BN_bn2bin(g, buf);
193 if ((i != j) || (memcmp(buf, out_g, i) != 0)) {
194 BIO_printf(bio_err, "g value is wrong\n");
198 DSA_set_flags(dsa, DSA_FLAG_NO_EXP_CONSTTIME);
199 DSA_generate_key(dsa);
200 DSA_sign(0, str1, 20, sig, &siglen, dsa);
201 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
204 DSA_clear_flags(dsa, DSA_FLAG_NO_EXP_CONSTTIME);
205 DSA_generate_key(dsa);
206 DSA_sign(0, str1, 20, sig, &siglen, dsa);
207 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
212 ERR_print_errors(bio_err);
216 #ifndef OPENSSL_NO_CRYPTO_MDEBUG
217 if (CRYPTO_mem_leaks(bio_err) <= 0)
225 static int dsa_cb(int p, int n, BN_GENCB *arg)
228 static int ok = 0, num = 0;
242 BIO_write(BN_GENCB_get_arg(arg), &c, 1);
243 (void)BIO_flush(BN_GENCB_get_arg(arg));
245 if (!ok && (p == 0) && (num > 1)) {
246 BIO_printf(BN_GENCB_get_arg(arg), "error in dsatest\n");