1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.]
61 #include <sys/types.h>
66 #include <openssl/crypto.h>
67 #include <openssl/rand.h>
68 #include <openssl/bio.h>
69 #include <openssl/err.h>
70 #include <openssl/bn.h>
73 int main(int argc, char *argv[])
75 printf("No DSA support\n");
79 # include <openssl/dsa.h>
81 static int dsa_cb(int p, int n, BN_GENCB *arg);
84 * seed, out_p, out_q, out_g are taken from the updated Appendix 5 to FIPS
85 * PUB 186 and also appear in Appendix 5 to FIPS PIB 186-1
87 static unsigned char seed[20] = {
88 0xd5, 0x01, 0x4e, 0x4b, 0x60, 0xef, 0x2b, 0xa8, 0xb6, 0x21, 0x1b, 0x40,
89 0x62, 0xba, 0x32, 0x24, 0xe0, 0x42, 0x7d, 0xd3,
92 static unsigned char out_p[] = {
93 0x8d, 0xf2, 0xa4, 0x94, 0x49, 0x22, 0x76, 0xaa,
94 0x3d, 0x25, 0x75, 0x9b, 0xb0, 0x68, 0x69, 0xcb,
95 0xea, 0xc0, 0xd8, 0x3a, 0xfb, 0x8d, 0x0c, 0xf7,
96 0xcb, 0xb8, 0x32, 0x4f, 0x0d, 0x78, 0x82, 0xe5,
97 0xd0, 0x76, 0x2f, 0xc5, 0xb7, 0x21, 0x0e, 0xaf,
98 0xc2, 0xe9, 0xad, 0xac, 0x32, 0xab, 0x7a, 0xac,
99 0x49, 0x69, 0x3d, 0xfb, 0xf8, 0x37, 0x24, 0xc2,
100 0xec, 0x07, 0x36, 0xee, 0x31, 0xc8, 0x02, 0x91,
103 static unsigned char out_q[] = {
104 0xc7, 0x73, 0x21, 0x8c, 0x73, 0x7e, 0xc8, 0xee,
105 0x99, 0x3b, 0x4f, 0x2d, 0xed, 0x30, 0xf4, 0x8e,
106 0xda, 0xce, 0x91, 0x5f,
109 static unsigned char out_g[] = {
110 0x62, 0x6d, 0x02, 0x78, 0x39, 0xea, 0x0a, 0x13,
111 0x41, 0x31, 0x63, 0xa5, 0x5b, 0x4c, 0xb5, 0x00,
112 0x29, 0x9d, 0x55, 0x22, 0x95, 0x6c, 0xef, 0xcb,
113 0x3b, 0xff, 0x10, 0xf3, 0x99, 0xce, 0x2c, 0x2e,
114 0x71, 0xcb, 0x9d, 0xe5, 0xfa, 0x24, 0xba, 0xbf,
115 0x58, 0xe5, 0xb7, 0x95, 0x21, 0x92, 0x5c, 0x9c,
116 0xc4, 0x2e, 0x9f, 0x6f, 0x46, 0x4b, 0x08, 0x8c,
117 0xc5, 0x72, 0xaf, 0x53, 0xe6, 0xd7, 0x88, 0x02,
120 static const unsigned char str1[] = "12345678901234567890";
122 static const char rnd_seed[] =
123 "string to make the random number generator think it has entropy";
125 static BIO *bio_err = NULL;
127 int main(int argc, char **argv)
131 int counter, ret = 0, i, j;
132 unsigned char buf[256];
134 unsigned char sig[256];
138 bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT);
140 CRYPTO_set_mem_debug(1);
141 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
143 RAND_seed(rnd_seed, sizeof rnd_seed);
145 BIO_printf(bio_err, "test generation of DSA parameters\n");
151 BN_GENCB_set(cb, dsa_cb, bio_err);
152 if (((dsa = DSA_new()) == NULL) || !DSA_generate_parameters_ex(dsa, 512,
158 BIO_printf(bio_err, "seed\n");
159 for (i = 0; i < 20; i += 4) {
160 BIO_printf(bio_err, "%02X%02X%02X%02X ",
161 seed[i], seed[i + 1], seed[i + 2], seed[i + 3]);
163 BIO_printf(bio_err, "\ncounter=%d h=%ld\n", counter, h);
165 DSA_print(bio_err, dsa, 0);
166 if (counter != 105) {
167 BIO_printf(bio_err, "counter should be 105\n");
171 BIO_printf(bio_err, "h should be 2\n");
175 i = BN_bn2bin(dsa->q, buf);
177 if ((i != j) || (memcmp(buf, out_q, i) != 0)) {
178 BIO_printf(bio_err, "q value is wrong\n");
182 i = BN_bn2bin(dsa->p, buf);
184 if ((i != j) || (memcmp(buf, out_p, i) != 0)) {
185 BIO_printf(bio_err, "p value is wrong\n");
189 i = BN_bn2bin(dsa->g, buf);
191 if ((i != j) || (memcmp(buf, out_g, i) != 0)) {
192 BIO_printf(bio_err, "g value is wrong\n");
196 dsa->flags |= DSA_FLAG_NO_EXP_CONSTTIME;
197 DSA_generate_key(dsa);
198 DSA_sign(0, str1, 20, sig, &siglen, dsa);
199 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
202 dsa->flags &= ~DSA_FLAG_NO_EXP_CONSTTIME;
203 DSA_generate_key(dsa);
204 DSA_sign(0, str1, 20, sig, &siglen, dsa);
205 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
210 ERR_print_errors(bio_err);
214 #ifndef OPENSSL_NO_CRYPTO_MDEBUG
215 if (CRYPTO_mem_leaks(bio_err) <= 0)
220 # ifdef OPENSSL_SYS_NETWARE
227 static int dsa_cb(int p, int n, BN_GENCB *arg)
230 static int ok = 0, num = 0;
244 BIO_write(BN_GENCB_get_arg(arg), &c, 1);
245 (void)BIO_flush(BN_GENCB_get_arg(arg));
247 if (!ok && (p == 0) && (num > 1)) {
248 BIO_printf(BN_GENCB_get_arg(arg), "error in dsatest\n");