mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-13 03:10:10 +01:00
commit
dd3b0c4237
@ -100,11 +100,26 @@
|
||||
|
||||
issuerName = this.mapIssuerOrganization(cert.issuerOrganization);
|
||||
if (!issuerName) issuerName = cert.issuerName;
|
||||
|
||||
|
||||
var protocolVersion = " (unknown)";
|
||||
switch(status.protocolVersion) {
|
||||
case 0:
|
||||
protocolVersion = " (SSL3)";
|
||||
break;
|
||||
case 1:
|
||||
protocolVersion = " (TLS1.0)";
|
||||
break;
|
||||
case 2:
|
||||
protocolVersion = " (TLS1.1)";
|
||||
break;
|
||||
case 3:
|
||||
protocolVersion = " (TLS1.2)";
|
||||
break;
|
||||
}
|
||||
return {
|
||||
hostName : hName,
|
||||
cAName : issuerName,
|
||||
encryptionAlgorithm : status.cipherName,
|
||||
encryptionAlgorithm : status.cipherName+protocolVersion,
|
||||
encryptionStrength : status.secretKeyLength,
|
||||
isBroken : isBroken,
|
||||
cert : cert
|
||||
|
@ -47,4 +47,5 @@ interface nsISSLStatus : nsISupports {
|
||||
readonly attribute string cipherName;
|
||||
readonly attribute unsigned long keyLength;
|
||||
readonly attribute unsigned long secretKeyLength;
|
||||
readonly attribute unsigned long protocolVersion;
|
||||
};
|
||||
|
@ -659,6 +659,7 @@ public:
|
||||
nsCOMPtr<nsIX509Cert> mServerCert;
|
||||
PRUint32 mKeyLength;
|
||||
PRUint32 mSecretKeyLength;
|
||||
PRUint32 mProtocolVersion;
|
||||
nsXPIDLCString mCipherName;
|
||||
};
|
||||
|
||||
@ -693,6 +694,16 @@ nsSSLStatus::GetSecretKeyLength(PRUint32* _result)
|
||||
return NS_OK;
|
||||
}
|
||||
|
||||
NS_IMETHODIMP
|
||||
nsSSLStatus::GetProtocolVersion(PRUint32* _result)
|
||||
{
|
||||
NS_ASSERTION(_result, "non-NULL destination required");
|
||||
|
||||
*_result = mProtocolVersion;
|
||||
|
||||
return NS_OK;
|
||||
}
|
||||
|
||||
NS_IMETHODIMP
|
||||
nsSSLStatus::GetCipherName(char** _result)
|
||||
{
|
||||
@ -704,7 +715,7 @@ nsSSLStatus::GetCipherName(char** _result)
|
||||
}
|
||||
|
||||
nsSSLStatus::nsSSLStatus()
|
||||
: mKeyLength(0), mSecretKeyLength(0)
|
||||
: mKeyLength(0), mSecretKeyLength(0), mProtocolVersion(0)
|
||||
{
|
||||
}
|
||||
|
||||
@ -867,6 +878,13 @@ void PR_CALLBACK HandshakeCallback(PRFileDesc* fd, void* client_data) {
|
||||
status->mSecretKeyLength = encryptBits;
|
||||
status->mCipherName.Adopt(cipherName);
|
||||
|
||||
SSLChannelInfo channelInfo;
|
||||
if (SSL_GetChannelInfo(fd, &channelInfo, sizeof(channelInfo)) == SECSuccess) {
|
||||
// Get the protocol version
|
||||
// 0=ssl3, 1=tls1, 2=tls1.1, 3=tls1.2
|
||||
status->mProtocolVersion = channelInfo.protocolVersion & 0xFF;
|
||||
}
|
||||
|
||||
infoObject->SetSSLStatus(status);
|
||||
}
|
||||
|
||||
|
@ -61,6 +61,9 @@ endif
|
||||
ifdef BUILD_OPT
|
||||
NSPR_CONFIGURE_OPTS += --disable-debug --enable-optimize
|
||||
endif
|
||||
ifdef USE_X32
|
||||
NSPR_CONFIGURE_OPTS += --enable-x32
|
||||
endif
|
||||
ifdef USE_64
|
||||
NSPR_CONFIGURE_OPTS += --enable-64bit
|
||||
endif
|
||||
@ -70,6 +73,9 @@ endif
|
||||
ifdef USE_DEBUG_RTL
|
||||
NSPR_CONFIGURE_OPTS += --enable-debug-rtl
|
||||
endif
|
||||
ifdef USE_STATIC_RTL
|
||||
NSPR_CONFIGURE_OPTS += --enable-static-rtl
|
||||
endif
|
||||
ifdef NS_USE_GCC
|
||||
NSPR_COMPILERS = CC=gcc CXX=g++
|
||||
endif
|
||||
|
@ -19,8 +19,6 @@ ARCH=$(uname -s)
|
||||
|
||||
ulimit -c unlimited 2> /dev/null
|
||||
|
||||
export NSS_ENABLE_ECC=1
|
||||
export NSS_ECC_MORE_THAN_SUITE_B=1
|
||||
export NSPR_LOG_MODULES="pkix:1"
|
||||
|
||||
#export JAVA_HOME_32=
|
||||
|
@ -288,7 +288,7 @@ prepare()
|
||||
mv ${OUTPUTDIR} ${OUTPUTDIR}.last >/dev/null 2>&1
|
||||
mkdir -p ${OUTPUTDIR}
|
||||
|
||||
if [ -n "${NSS_ENABLE_ECC}" -a -n "${NSS_ECC_MORE_THAN_SUITE_B}" ]; then
|
||||
if [ -z "${NSS_DISABLE_ECC}" -a -n "${NSS_ECC_MORE_THAN_SUITE_B}" ]; then
|
||||
cd ${HGDIR}/nss
|
||||
ECF="lib/freebl/ecl/ecl-curve.h"
|
||||
print_log "hg revert -r NSS_3_11_1_RTM ${ECF}"
|
||||
|
@ -35,13 +35,24 @@ output_binary (void *arg, const unsigned char *obuf, PRInt32 size)
|
||||
return nb;
|
||||
}
|
||||
|
||||
static PRBool
|
||||
isBase64Char(char c)
|
||||
{
|
||||
return ((c >= 'A' && c <= 'Z')
|
||||
|| (c >= 'a' && c <= 'z')
|
||||
|| (c >= '0' && c <= '9')
|
||||
|| c == '+'
|
||||
|| c == '/'
|
||||
|| c == '=');
|
||||
}
|
||||
|
||||
static SECStatus
|
||||
decode_file(FILE *outFile, FILE *inFile)
|
||||
{
|
||||
NSSBase64Decoder *cx;
|
||||
int nb;
|
||||
SECStatus status = SECFailure;
|
||||
char ibuf[4096];
|
||||
const char *ptr;
|
||||
|
||||
cx = NSSBase64Decoder_Create(output_binary, outFile);
|
||||
if (!cx) {
|
||||
@ -50,19 +61,29 @@ decode_file(FILE *outFile, FILE *inFile)
|
||||
|
||||
for (;;) {
|
||||
if (feof(inFile)) break;
|
||||
nb = fread(ibuf, 1, sizeof(ibuf), inFile);
|
||||
if (nb != sizeof(ibuf)) {
|
||||
if (nb == 0) {
|
||||
if (ferror(inFile)) {
|
||||
PORT_SetError(SEC_ERROR_IO);
|
||||
goto loser;
|
||||
}
|
||||
/* eof */
|
||||
break;
|
||||
if (!fgets(ibuf, sizeof(ibuf), inFile)) {
|
||||
if (ferror(inFile)) {
|
||||
PORT_SetError(SEC_ERROR_IO);
|
||||
goto loser;
|
||||
}
|
||||
/* eof */
|
||||
break;
|
||||
}
|
||||
for (ptr = ibuf; *ptr; ++ptr) {
|
||||
char c = *ptr;
|
||||
if (c == '\n' || c == '\r') {
|
||||
break; /* found end of line */
|
||||
}
|
||||
if (!isBase64Char(c)) {
|
||||
ptr = ibuf; /* ignore line */
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (ibuf == ptr) {
|
||||
continue; /* skip empty or non-base64 line */
|
||||
}
|
||||
|
||||
status = NSSBase64Decoder_Update(cx, ibuf, nb);
|
||||
status = NSSBase64Decoder_Update(cx, ibuf, ptr-ibuf);
|
||||
if (status != SECSuccess) goto loser;
|
||||
}
|
||||
|
||||
@ -99,10 +120,11 @@ int main(int argc, char **argv)
|
||||
progName = progName ? progName+1 : argv[0];
|
||||
|
||||
/* Parse command line arguments */
|
||||
optstate = PL_CreateOptState(argc, argv, "i:o:");
|
||||
optstate = PL_CreateOptState(argc, argv, "?hi:o:");
|
||||
while ((status = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
|
||||
switch (optstate->option) {
|
||||
case '?':
|
||||
case 'h':
|
||||
Usage(progName);
|
||||
break;
|
||||
|
||||
|
@ -21,7 +21,7 @@
|
||||
#include "secoid.h"
|
||||
#include "nssutil.h"
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
#include "ecl-curve.h"
|
||||
SECStatus EC_DecodeParams(const SECItem *encodedParams,
|
||||
ECParams **ecparams);
|
||||
@ -56,8 +56,7 @@ char *testdir = NULL;
|
||||
#define TIMEMARK(seconds) \
|
||||
time1 = PR_SecondsToInterval(seconds); \
|
||||
{ \
|
||||
PRInt64 tmp, L100; \
|
||||
LL_I2L(L100, 100); \
|
||||
PRInt64 tmp; \
|
||||
if (time2 == 0) { \
|
||||
time2 = 1; \
|
||||
} \
|
||||
@ -133,7 +132,7 @@ static void Usage()
|
||||
PRINTUSAGE(progName, "-S -m mode", "Sign a buffer");
|
||||
PRINTUSAGE("", "", "[-i plaintext] [-o signature] [-k key]");
|
||||
PRINTUSAGE("", "", "[-b bufsize]");
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
PRINTUSAGE("", "", "[-n curvename]");
|
||||
#endif
|
||||
PRINTUSAGE("", "", "[-p repetitions | -5 time_interval] [-4 th_num]");
|
||||
@ -141,7 +140,7 @@ static void Usage()
|
||||
PRINTUSAGE("", "-i", "file which contains input buffer");
|
||||
PRINTUSAGE("", "-o", "file for signature");
|
||||
PRINTUSAGE("", "-k", "file which contains key");
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
PRINTUSAGE("", "-n", "name of curve for EC key generation; one of:");
|
||||
PRINTUSAGE("", "", " sect163k1, nistk163, sect163r1, sect163r2,");
|
||||
PRINTUSAGE("", "", " nistb163, sect193r1, sect193r2, sect233k1, nistk233,");
|
||||
@ -313,7 +312,6 @@ serialize_key(SECItem *it, int ni, PRFileDesc *file)
|
||||
{
|
||||
unsigned char len[4];
|
||||
int i;
|
||||
SECStatus status;
|
||||
NSSBase64Encoder *cx;
|
||||
cx = NSSBase64Encoder_Create(output_ascii, file);
|
||||
for (i=0; i<ni; i++, it++) {
|
||||
@ -321,11 +319,11 @@ serialize_key(SECItem *it, int ni, PRFileDesc *file)
|
||||
len[1] = (it->len >> 16) & 0xff;
|
||||
len[2] = (it->len >> 8) & 0xff;
|
||||
len[3] = (it->len & 0xff);
|
||||
status = NSSBase64Encoder_Update(cx, len, 4);
|
||||
status = NSSBase64Encoder_Update(cx, it->data, it->len);
|
||||
NSSBase64Encoder_Update(cx, len, 4);
|
||||
NSSBase64Encoder_Update(cx, it->data, it->len);
|
||||
}
|
||||
status = NSSBase64Encoder_Destroy(cx, PR_FALSE);
|
||||
status = PR_Write(file, "\r\n", 2);
|
||||
NSSBase64Encoder_Destroy(cx, PR_FALSE);
|
||||
PR_Write(file, "\r\n", 2);
|
||||
}
|
||||
|
||||
void
|
||||
@ -390,7 +388,7 @@ dsakey_from_filedata(SECItem *filedata)
|
||||
return key;
|
||||
}
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
static ECPrivateKey *
|
||||
eckey_from_filedata(SECItem *filedata)
|
||||
{
|
||||
@ -544,7 +542,7 @@ getECParams(const char *curve)
|
||||
|
||||
return ecparams;
|
||||
}
|
||||
#endif /* NSS_ENABLE_ECC */
|
||||
#endif /* NSS_DISABLE_ECC */
|
||||
|
||||
static void
|
||||
dump_pqg(PQGParams *pqg)
|
||||
@ -562,7 +560,7 @@ dump_dsakey(DSAPrivateKey *key)
|
||||
SECU_PrintInteger(stdout, &key->privateValue, "PRIVATE VALUE:", 0);
|
||||
}
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
static void
|
||||
dump_ecp(ECParams *ecp)
|
||||
{
|
||||
@ -651,7 +649,7 @@ typedef enum {
|
||||
bltestRSA, /* Public Key Ciphers */
|
||||
bltestRSA_OAEP, /* . (Public Key Enc.) */
|
||||
bltestRSA_PSS, /* . (Public Key Sig.) */
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
bltestECDSA, /* . (Public Key Sig.) */
|
||||
#endif
|
||||
bltestDSA, /* . (Public Key Sig.) */
|
||||
@ -690,7 +688,7 @@ static char *mode_strings[] =
|
||||
"rsa",
|
||||
"rsa_oaep",
|
||||
"rsa_pss",
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
"ecdsa",
|
||||
#endif
|
||||
/*"pqg",*/
|
||||
@ -744,7 +742,7 @@ typedef struct
|
||||
PQGParams *pqg;
|
||||
} bltestDSAParams;
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
typedef struct
|
||||
{
|
||||
char *curveName;
|
||||
@ -763,7 +761,7 @@ typedef struct
|
||||
union {
|
||||
bltestRSAParams rsa;
|
||||
bltestDSAParams dsa;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
bltestECDSAParams ecdsa;
|
||||
#endif
|
||||
} cipherParams;
|
||||
@ -1266,7 +1264,7 @@ dsa_verifyDigest(void *cx, SECItem *output, const SECItem *input)
|
||||
return DSA_VerifyDigest((DSAPublicKey *)params->pubKey, output, input);
|
||||
}
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
SECStatus
|
||||
ecdsa_signDigest(void *cx, SECItem *output, const SECItem *input)
|
||||
{
|
||||
@ -1436,7 +1434,7 @@ bltest_aes_init(bltestCipherInfo *cipherInfo, PRBool encrypt)
|
||||
int minorMode;
|
||||
int i;
|
||||
int keylen = aesp->key.buf.len;
|
||||
int blocklen = AES_BLOCK_SIZE;
|
||||
unsigned int blocklen = AES_BLOCK_SIZE;
|
||||
PRIntervalTime time1, time2;
|
||||
unsigned char *params;
|
||||
int len;
|
||||
@ -1635,6 +1633,8 @@ bltest_rsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt)
|
||||
cipherInfo->cipher.pubkeyCipher = encrypt ? rsa_encryptOAEP
|
||||
: rsa_decryptOAEP;
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
return SECSuccess;
|
||||
}
|
||||
@ -1720,7 +1720,7 @@ bltest_dsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt)
|
||||
return SECSuccess;
|
||||
}
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
SECStatus
|
||||
bltest_ecdsa_init(bltestCipherInfo *cipherInfo, PRBool encrypt)
|
||||
{
|
||||
@ -2077,7 +2077,7 @@ finish:
|
||||
|
||||
SECStatus
|
||||
pubkeyInitKey(bltestCipherInfo *cipherInfo, PRFileDesc *file,
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
int keysize, int exponent, char *curveName)
|
||||
#else
|
||||
int keysize, int exponent)
|
||||
@ -2090,7 +2090,7 @@ pubkeyInitKey(bltestCipherInfo *cipherInfo, PRFileDesc *file,
|
||||
RSAPrivateKey **rsaKey = NULL;
|
||||
bltestDSAParams *dsap;
|
||||
DSAPrivateKey **dsaKey = NULL;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
SECItem *tmpECParamsDER;
|
||||
ECParams *tmpECParams = NULL;
|
||||
SECItem ecSerialize[3];
|
||||
@ -2132,7 +2132,7 @@ pubkeyInitKey(bltestCipherInfo *cipherInfo, PRFileDesc *file,
|
||||
dsap->keysize = (*dsaKey)->params.prime.len*8;
|
||||
}
|
||||
break;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
case bltestECDSA:
|
||||
ecKey = (ECPrivateKey **)&asymk->privKey;
|
||||
if (curveName != NULL) {
|
||||
@ -2244,7 +2244,7 @@ cipherInit(bltestCipherInfo *cipherInfo, PRBool encrypt)
|
||||
}
|
||||
return bltest_dsa_init(cipherInfo, encrypt);
|
||||
break;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
case bltestECDSA:
|
||||
if (encrypt) {
|
||||
SECITEM_AllocItem(cipherInfo->arena, &cipherInfo->output.buf,
|
||||
@ -2494,7 +2494,7 @@ cipherFinish(bltestCipherInfo *cipherInfo)
|
||||
case bltestRSA_PSS: /* will be freed with it. */
|
||||
case bltestRSA_OAEP:
|
||||
case bltestDSA:
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
case bltestECDSA:
|
||||
#endif
|
||||
case bltestMD2: /* hash contexts are ephemeral */
|
||||
@ -2569,8 +2569,6 @@ printPR_smpString(const char *sformat, char *reportStr,
|
||||
fprintf(stdout, sformat, reportStr);
|
||||
PR_smprintf_free(reportStr);
|
||||
} else {
|
||||
int prnRes;
|
||||
LL_L2I(prnRes, rNum);
|
||||
fprintf(stdout, nformat, rNum);
|
||||
}
|
||||
}
|
||||
@ -2674,7 +2672,7 @@ print_td:
|
||||
fprintf(stdout, "%8d", info->params.asymk.cipherParams.dsa.keysize);
|
||||
}
|
||||
break;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
case bltestECDSA:
|
||||
if (td) {
|
||||
fprintf(stdout, "%12s", "ec_curve");
|
||||
@ -2791,8 +2789,8 @@ mode_str_to_hash_alg(const SECItem *modeStr)
|
||||
case bltestSHA256: return HASH_AlgSHA256;
|
||||
case bltestSHA384: return HASH_AlgSHA384;
|
||||
case bltestSHA512: return HASH_AlgSHA512;
|
||||
default: return HASH_AlgNULL;
|
||||
}
|
||||
return HASH_AlgNULL;
|
||||
}
|
||||
|
||||
void
|
||||
@ -2906,7 +2904,7 @@ get_params(PLArenaPool *arena, bltestParams *params,
|
||||
sprintf(filename, "%s/tests/%s/%s%d", testdir, modestr, "ciphertext",j);
|
||||
load_file_data(arena, ¶ms->asymk.sig, filename, bltestBase64Encoded);
|
||||
break;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
case bltestECDSA:
|
||||
sprintf(filename, "%s/tests/%s/%s%d", testdir, modestr, "key", j);
|
||||
load_file_data(arena, ¶ms->asymk.key, filename, bltestBase64Encoded);
|
||||
@ -2938,46 +2936,62 @@ SECStatus
|
||||
verify_self_test(bltestIO *result, bltestIO *cmp, bltestCipherMode mode,
|
||||
PRBool forward, SECStatus sigstatus)
|
||||
{
|
||||
int res;
|
||||
PRBool equal;
|
||||
char *modestr = mode_strings[mode];
|
||||
res = SECITEM_CompareItem(&result->pBuf, &cmp->buf);
|
||||
equal = SECITEM_ItemsAreEqual(&result->pBuf, &cmp->buf);
|
||||
if (is_sigCipher(mode)) {
|
||||
if (forward) {
|
||||
if (res == 0) {
|
||||
if (equal) {
|
||||
printf("Signature self-test for %s passed.\n", modestr);
|
||||
} else {
|
||||
printf("Signature self-test for %s failed!\n", modestr);
|
||||
}
|
||||
return equal ? SECSuccess : SECFailure;
|
||||
} else {
|
||||
if (sigstatus == SECSuccess) {
|
||||
printf("Verification self-test for %s passed.\n", modestr);
|
||||
} else {
|
||||
printf("Verification self-test for %s failed!\n", modestr);
|
||||
}
|
||||
return sigstatus;
|
||||
}
|
||||
return sigstatus;
|
||||
} else if (is_hashCipher(mode)) {
|
||||
if (res == 0) {
|
||||
if (equal) {
|
||||
printf("Hash self-test for %s passed.\n", modestr);
|
||||
} else {
|
||||
printf("Hash self-test for %s failed!\n", modestr);
|
||||
}
|
||||
} else {
|
||||
if (forward) {
|
||||
if (res == 0) {
|
||||
if (equal) {
|
||||
printf("Encryption self-test for %s passed.\n", modestr);
|
||||
} else {
|
||||
printf("Encryption self-test for %s failed!\n", modestr);
|
||||
}
|
||||
} else {
|
||||
if (res == 0) {
|
||||
if (equal) {
|
||||
printf("Decryption self-test for %s passed.\n", modestr);
|
||||
} else {
|
||||
printf("Decryption self-test for %s failed!\n", modestr);
|
||||
}
|
||||
}
|
||||
}
|
||||
return (res != 0);
|
||||
return equal ? SECSuccess : SECFailure;
|
||||
}
|
||||
|
||||
static SECStatus
|
||||
ReadFileToItem(SECItem *dst, const char *filename)
|
||||
{
|
||||
PRFileDesc *file;
|
||||
SECStatus rv;
|
||||
|
||||
file = PR_Open(filename, PR_RDONLY, 00660);
|
||||
if (!file) {
|
||||
return SECFailure;
|
||||
}
|
||||
rv = SECU_FileToItem(dst, file);
|
||||
PR_Close(file);
|
||||
return rv;
|
||||
}
|
||||
|
||||
static SECStatus
|
||||
@ -2988,22 +3002,19 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
bltestIO pt, ct;
|
||||
bltestCipherMode mode;
|
||||
bltestParams *params;
|
||||
int i, j, nummodes, numtests;
|
||||
unsigned int i, j, nummodes, numtests;
|
||||
char *modestr;
|
||||
char filename[256];
|
||||
PRFileDesc *file;
|
||||
PLArenaPool *arena;
|
||||
SECItem item;
|
||||
PRBool finished;
|
||||
SECStatus rv = SECSuccess, srv;
|
||||
|
||||
PORT_Memset(&cipherInfo, 0, sizeof(cipherInfo));
|
||||
arena = PORT_NewArena(BLTEST_DEFAULT_CHUNKSIZE);
|
||||
cipherInfo.arena = arena;
|
||||
|
||||
finished = PR_FALSE;
|
||||
nummodes = (numModes == 0) ? NUMMODES : numModes;
|
||||
for (i=0; i < nummodes && !finished; i++) {
|
||||
for (i=0; i < nummodes; i++) {
|
||||
if (numModes > 0)
|
||||
mode = modes[i];
|
||||
else
|
||||
@ -3017,13 +3028,11 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
params = &cipherInfo.params;
|
||||
/* get the number of tests in the directory */
|
||||
sprintf(filename, "%s/tests/%s/%s", testdir, modestr, "numtests");
|
||||
file = PR_Open(filename, PR_RDONLY, 00660);
|
||||
if (!file) {
|
||||
fprintf(stderr, "%s: File %s does not exist.\n", progName,filename);
|
||||
return SECFailure;
|
||||
if (ReadFileToItem(&item, filename) != SECSuccess) {
|
||||
fprintf(stderr, "%s: Cannot read file %s.\n", progName, filename);
|
||||
rv = SECFailure;
|
||||
continue;
|
||||
}
|
||||
rv = SECU_FileToItem(&item, file);
|
||||
PR_Close(file);
|
||||
/* loop over the tests in the directory */
|
||||
numtests = 0;
|
||||
for (j=0; j<item.len; j++) {
|
||||
@ -3048,8 +3057,6 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
** Align the input buffer (plaintext) according to request
|
||||
** then perform operation and compare to ciphertext
|
||||
*/
|
||||
/* XXX for now */
|
||||
rv = SECSuccess;
|
||||
if (encrypt) {
|
||||
bltestCopyIO(arena, &cipherInfo.input, &pt);
|
||||
misalignBuffer(arena, &cipherInfo.input, inoff);
|
||||
@ -3059,11 +3066,10 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
rv |= cipherDoOp(&cipherInfo);
|
||||
rv |= cipherFinish(&cipherInfo);
|
||||
rv |= verify_self_test(&cipherInfo.output,
|
||||
&ct, mode, PR_TRUE, 0);
|
||||
&ct, mode, PR_TRUE, SECSuccess);
|
||||
/* If testing hash, only one op to test */
|
||||
if (is_hashCipher(mode))
|
||||
continue;
|
||||
/*if (rv) return rv;*/
|
||||
if (is_sigCipher(mode)) {
|
||||
/* Verify operations support detached signature files. For
|
||||
** consistency between tests that run Sign/Verify back to
|
||||
@ -3079,8 +3085,6 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
}
|
||||
if (!decrypt)
|
||||
continue;
|
||||
/* XXX for now */
|
||||
rv = SECSuccess;
|
||||
/* Reverse Operation (Decrypt/Verify)
|
||||
** Align the input buffer (ciphertext) according to request
|
||||
** then perform operation and compare to plaintext
|
||||
@ -3100,7 +3104,6 @@ blapi_selftest(bltestCipherMode *modes, int numModes, int inoff, int outoff,
|
||||
rv |= cipherFinish(&cipherInfo);
|
||||
rv |= verify_self_test(&cipherInfo.output,
|
||||
&pt, mode, PR_FALSE, srv);
|
||||
/*if (rv) return rv;*/
|
||||
}
|
||||
}
|
||||
return rv;
|
||||
@ -3128,7 +3131,7 @@ dump_file(bltestCipherMode mode, char *filename)
|
||||
load_file_data(arena, &keydata, filename, bltestBase64Encoded);
|
||||
key = dsakey_from_filedata(&keydata.buf);
|
||||
dump_dsakey(key);
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
} else if (mode == bltestECDSA) {
|
||||
ECPrivateKey *key;
|
||||
load_file_data(arena, &keydata, filename, bltestBase64Encoded);
|
||||
@ -3373,7 +3376,7 @@ enum {
|
||||
opt_Key,
|
||||
opt_HexWSpc,
|
||||
opt_Mode,
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
opt_CurveName,
|
||||
#endif
|
||||
opt_Output,
|
||||
@ -3426,7 +3429,7 @@ static secuCommandFlag bltest_options[] =
|
||||
{ /* opt_Key */ 'k', PR_TRUE, 0, PR_FALSE },
|
||||
{ /* opt_HexWSpc */ 'l', PR_FALSE, 0, PR_FALSE },
|
||||
{ /* opt_Mode */ 'm', PR_TRUE, 0, PR_FALSE },
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
{ /* opt_CurveName */ 'n', PR_TRUE, 0, PR_FALSE },
|
||||
#endif
|
||||
{ /* opt_Output */ 'o', PR_TRUE, 0, PR_FALSE },
|
||||
@ -3452,16 +3455,15 @@ static secuCommandFlag bltest_options[] =
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
char *infileName, *outfileName, *keyfileName, *ivfileName;
|
||||
SECStatus rv = SECFailure;
|
||||
|
||||
double totalTime;
|
||||
double totalTime = 0.0;
|
||||
PRIntervalTime time1, time2;
|
||||
PRFileDesc *outfile = NULL;
|
||||
bltestCipherInfo *cipherInfoListHead, *cipherInfo;
|
||||
bltestCipherInfo *cipherInfoListHead, *cipherInfo = NULL;
|
||||
bltestIOMode ioMode;
|
||||
int bufsize, exponent, curThrdNum;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
char *curveName = NULL;
|
||||
#endif
|
||||
int i, commandsEntered;
|
||||
@ -3506,8 +3508,6 @@ int main(int argc, char **argv)
|
||||
|
||||
cipherInfo = PORT_ZNew(bltestCipherInfo);
|
||||
cipherInfoListHead = cipherInfo;
|
||||
/* set some defaults */
|
||||
infileName = outfileName = keyfileName = ivfileName = NULL;
|
||||
|
||||
/* Check the number of commands entered on the command line. */
|
||||
commandsEntered = 0;
|
||||
@ -3605,7 +3605,7 @@ int main(int argc, char **argv)
|
||||
rv = blapi_selftest(modesToTest, numModesToTest, inoff, outoff,
|
||||
encrypt, decrypt);
|
||||
PORT_Free(cipherInfo);
|
||||
return rv;
|
||||
return rv == SECSuccess ? 0 : 1;
|
||||
}
|
||||
|
||||
/* Do FIPS self-test */
|
||||
@ -3695,7 +3695,7 @@ int main(int argc, char **argv)
|
||||
else
|
||||
exponent = 65537;
|
||||
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
if (bltest.options[opt_CurveName].activated)
|
||||
curveName = PORT_Strdup(bltest.options[opt_CurveName].arg);
|
||||
else
|
||||
@ -3707,8 +3707,10 @@ int main(int argc, char **argv)
|
||||
fprintf(stderr, "%s: You must specify a signature file with -f.\n",
|
||||
progName);
|
||||
|
||||
print_usage:
|
||||
PORT_Free(cipherInfo);
|
||||
print_usage:
|
||||
if (cipherInfo) {
|
||||
PORT_Free(cipherInfo);
|
||||
}
|
||||
Usage();
|
||||
}
|
||||
|
||||
@ -3783,7 +3785,7 @@ int main(int argc, char **argv)
|
||||
file = PR_Open("tmp.key", PR_WRONLY|PR_CREATE_FILE, 00660);
|
||||
}
|
||||
params->key.mode = bltestBase64Encoded;
|
||||
#ifdef NSS_ENABLE_ECC
|
||||
#ifndef NSS_DISABLE_ECC
|
||||
pubkeyInitKey(cipherInfo, file, keysize, exponent, curveName);
|
||||
#else
|
||||
pubkeyInitKey(cipherInfo, file, keysize, exponent);
|
||||
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext1
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext1
Normal file
@ -0,0 +1 @@
|
||||
AzZ2PpZtkllaVnzJzlN/Xg==
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext10
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext10
Normal file
@ -0,0 +1,3 @@
|
||||
eykx9YVfcXFF4A8VKp9HlDWbH/yz5V9ZTjMJi1HCOmx0oGwdlP3tf9KuQsfbesrv
|
||||
WETLM67dxoUlhe0AIKZpnSy1OAnO/RaRSM5CKSr6sGNEOXgwbFgsGLnODaPQhM5N
|
||||
PEgs/Y/PGoUITon7iLQKCE1elyRm0HZmEm+3YfhAePI=
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext11
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext11
Normal file
@ -0,0 +1,3 @@
|
||||
sJUS8+/57Q2FiQmDpz2tu3w2eNUlgb5kqKj8WG9JDyUhKXpHigWYBA69D1UJ+vsJ
|
||||
afnZ5gDq7zOxuT7tmWh7Fn+JpQZarEOc5G87jSLTCGXmTkXvjNMLaYQ1OoRKEcjN
|
||||
YNug6IZrPuMNJLP6imQ7MoNT4GAQ+oJzyP1U7woraTDlUgquXNWQL5uGozWSykNl
|
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext12
Normal file
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext12
Normal file
@ -0,0 +1,4 @@
|
||||
a+ihKABFWjIFOIU+DLoxvS2A6gyFFkpMXCYa5IVBfZPv/i68DQoLUdbqGGM9IQz2
|
||||
PAxN28J2B/LoHtkRMZHvhtVvO5m+bEFaQVApn7hGznFgtAtjuvEXnRknWi6DaYN2
|
||||
0ouSVIxo4G5tmU4sFQHtKXAU5wLN7+4vZWRHcGAJYU2AHeHKr3P4t/pWzxupS2MZ
|
||||
M7vld2JDgIUPEXQ1oDVbKw==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext13
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext13
Normal file
@ -0,0 +1 @@
|
||||
UdRHefkNQKgASCdsA1y0nKKke8ubnPcnC5FEeTeH1T8=
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext14
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext14
Normal file
@ -0,0 +1,2 @@
|
||||
1fVYl2C/nHYiKP3iNt4fot0trUSNs/qb4MQZbv1Go1yE3RrHfZ21jJWRjLMXpkMK
|
||||
CNL7ao6LDxybcsejRNw0nw==
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext15
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext15
Normal file
@ -0,0 +1,2 @@
|
||||
dTlZdL0ys2ZWVKbI45a4iuNLEjV1hyp6tofY52tG35EailkM0B0vXDML46Zibp3T
|
||||
ql4Q7RTo/4KYEbb+1Q8/UzykOFocvKePXEdE5Q8vg1kWXCSF0TJOdsPq52oMysYp
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext16
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext16
Normal file
@ -0,0 +1,3 @@
|
||||
gVjiFCDyW1nWrpQ/ocvyHwLpefQZ2rASanIbfu9Vvumtl/XM/30jkFe7wZqMN4FC
|
||||
92cvHV5+F9e+vLAHDoNVys5mYBcaU7YYFq6CSm72nORwtv/TtbtLQ4h02R0nhU07
|
||||
byWGDTholY3jMH1isTOb3duKMYwM4PM8F8rw6fYECCA=
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext17
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext17
Normal file
@ -0,0 +1,3 @@
|
||||
km2ySMwbog8MV2MafIrvCU95GTe5BZSeNGAkDov6b6SDEVobMQtuQ2nK68UmKIg3
|
||||
ex3apYAOpJaivf8PmhAx5xKcmiDjViHn8Li6yg2HAw8q58qFk8hZlnegb9SyYAnq
|
||||
0I/srCTKqc8srTtHDIInQVp7Hg8uqz+tltcKIJyLsmxidnfiUxuUNcpuPERNGVtf
|
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext18
Normal file
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext18
Normal file
@ -0,0 +1,4 @@
|
||||
yCzyxHbeqMtqbmB6QNLwORvoLqnshKU3poIPmvuZe3Y5fQBUJPqmp03E6MeqSokA
|
||||
aQ+JS20dyoBnU5PSJDrax2LxWTAeNX6YtyR2IxDNWnuv4cKgMNukb9k6n9uJzBMs
|
||||
qcF9xyAx7Ggi7lqdmdvKZseEwBsIhcu2LinZeAGSfsQVpdIVFY0yX57miUN60bdo
|
||||
StM8DZJzlFGsh/Of+MMbhA==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext19
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext19
Normal file
@ -0,0 +1 @@
|
||||
L6Dfciqf07ZMsY+ys9tV/yJnQidXKJQT+PZXUHQSpkw=
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext2
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext2
Normal file
@ -0,0 +1 @@
|
||||
qaFjG/SZaVTrwJOVeyNFiQ==
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext20
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext20
Normal file
@ -0,0 +1,2 @@
|
||||
BdXHdylCGwi3N+QRGfpEONH1cMx3Kk1sPff/7aA4TvhCiM43/ExMfRElpJmwUTZM
|
||||
OJ/WOb3aZH2qO9rasutVlA==
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext21
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext21
Normal file
@ -0,0 +1,2 @@
|
||||
rD1tuv4uD3QGMv2eggv2BEzVsVUcu5zAPAslw5zLfzO4Oqz8pAoyZfK7/4eRU0SK
|
||||
ysuI/Ps7t7EP5GOmjAEJ8Cg4Lj5VexrfAu1kira7iV3wIF0m67+ppf2M69jkvuPc
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext22
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext22
Normal file
@ -0,0 +1,3 @@
|
||||
kLe5YwojePU/UBq3vv8DkVUAgHG8hDjniZMs/T6xKZGVRl5mM4SUY/20Q3Unji/b
|
||||
ExCCHmSSz4D/Fct3JQn7Qm867uJ71JOIgv0q5rW9nZH6SkOxe7Q5675ZwEIxAWOo
|
||||
Kl/lOIeW7uNaGBoScfAL4puFLY+nWbrQH/RnjwEFlM0=
|
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext23
Normal file
3
security/nss/cmd/bltest/tests/aes_cbc/ciphertext23
Normal file
@ -0,0 +1,3 @@
|
||||
AlSyNGO8q+xaOV63TI+w6xN6B7xvXp9h7AsFfeMFcU+PopQiHJGhWcMVk5uB4wDu
|
||||
kCGS7F8VJUQo2HcveTJOxDKYyiHACzcCc+5eXtkOQ++h4FpdFxIJ/jT58pI326Km
|
||||
cmZQ/TsTIXR9EgiGPGw8az4th5q18leC8Iuo8qu+Y+C+20oifoGvs2u2ZFUINW00
|
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext24
Normal file
4
security/nss/cmd/bltest/tests/aes_cbc/ciphertext24
Normal file
@ -0,0 +1,4 @@
|
||||
/Fhz5Q3o+vTGuEunB7CFTp25qy6ffXB/u6M4xoQ6GPxvrOuvZj0mKW+zKbTSbxhJ
|
||||
THngnneWR/m6+odIljDXn0MBYQwjAMGdvzFIt8rIxPSUQQJ1TzMukrb3xedbxhee
|
||||
uHegeNRxkAkCF0TBTxP9KlWiucRNGAAGhahFpPYyx8VqdzBu+maiTQXQiNzXwT/i
|
||||
T8RHJ1ll255NN/vJMERIzQ==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext3
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext3
Normal file
@ -0,0 +1 @@
|
||||
J1z8BBPYzLcFE8OFmx0Pcg==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext4
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext4
Normal file
@ -0,0 +1 @@
|
||||
ybgTX/G1rcQT39BTshvZbQ==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext5
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext5
Normal file
@ -0,0 +1 @@
|
||||
XJ2ETtRvmIUIXl1qT5TH1w==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext6
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext6
Normal file
@ -0,0 +1 @@
|
||||
qf91vXz2YT03Mcd8O20MBA==
|
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext7
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/ciphertext7
Normal file
@ -0,0 +1 @@
|
||||
xNxh2XJZZ6MCAQSpc48jhoUnzoOaqxdS/YvblagsTQA=
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext8
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext8
Normal file
@ -0,0 +1,2 @@
|
||||
Gblgl3LGPzOGCL9utSyhC+ZQl/icHgkFxCQB/Ud5GuLFRAstRzEWyni9n/L7YBXP
|
||||
0xZSTq59y5Wuc46+roSkZw==
|
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext9
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/ciphertext9
Normal file
@ -0,0 +1,2 @@
|
||||
O4YRv8SXPFzY6YKwc7MxhM0mEQFZFy5EmI61/1ZhoeFvrWclj8v+5VRpJnoS3DdI
|
||||
k7TjUz029WNMMJVYNZbxNaqM0RONyJi8VlHuNakuv4mrautTZmU7xgpw4AdPwR7+
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv1
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv1
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/iv10
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv10
Normal file
@ -0,0 +1 @@
|
||||
檠4馬\ミョ凌XS,エ刀
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv11
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv11
Normal file
@ -0,0 +1 @@
|
||||
$_&[v腚马誓Ⅷ
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv12
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv12
Normal file
@ -0,0 +1 @@
|
||||
╩К/╚╢H╞└≈√$Jв
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv13
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv13
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD>f~庚y`<60>[」<>
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv14
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv14
Normal file
@ -0,0 +1 @@
|
||||
戯ノ 彝惠9淆ホ<8
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv15
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv15
Normal file
@ -0,0 +1 @@
|
||||
6κΈƒ―ο“lΓ<EFBFBD>c(FΝ
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv16
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv16
Normal file
@ -0,0 +1 @@
|
||||
闳浶椕<EFBFBD>鯫H佦m库
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv17
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv17
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD><EFBFBD>(3<>E
<1D><17><><EFBFBD><
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv18
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv18
Normal file
@ -0,0 +1 @@
|
||||
$@Ђ8,Ка{›¶cUБ
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv19
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv19
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD><EFBFBD><EFBFBD>4<EFBFBD><EFBFBD>7<EFBFBD>Equ<EFBFBD>W<><57>
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv2
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv2
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/iv20
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv20
Normal file
@ -0,0 +1 @@
|
||||
ÀÍ+ëÌ»lI’ÕH*ÇVè
|
2
security/nss/cmd/bltest/tests/aes_cbc/iv21
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/iv21
Normal file
@ -0,0 +1,2 @@
|
||||
³Ë—¨
|
||||
S™¸ÂE
;“•
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv22
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv22
Normal file
@ -0,0 +1 @@
|
||||
LïüYcÔY`&u>–I
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv23
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv23
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/iv24
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv24
Normal file
@ -0,0 +1 @@
|
||||
же<EFBFBD>ИЯыгЖъЁЕ?~с
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv3
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv3
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv4
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv4
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv5
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv5
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv6
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/iv6
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/iv7
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv7
Normal file
@ -0,0 +1 @@
|
||||
ェムX<ルe羹/40ミeサ
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv8
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv8
Normal file
@ -0,0 +1 @@
|
||||
È ]‹± `iŸ|—J
|
1
security/nss/cmd/bltest/tests/aes_cbc/iv9
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/iv9
Normal file
@ -0,0 +1 @@
|
||||
e<EFBFBD><EFBFBD>60<EFBFBD>ָB<02><EFBFBD>z
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/key1
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key1
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/key10
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key10
Normal file
@ -0,0 +1 @@
|
||||
Ä‘Ê1ùEŽ)©%ìU<C3AC>x
|
1
security/nss/cmd/bltest/tests/aes_cbc/key11
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key11
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD>}qーMnーjhワjq<6A>
|
1
security/nss/cmd/bltest/tests/aes_cbc/key12
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key12
Normal file
@ -0,0 +1 @@
|
||||
,A7QĂ'0WŁ6xk
|
1
security/nss/cmd/bltest/tests/aes_cbc/key13
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key13
Normal file
@ -0,0 +1 @@
|
||||
곱<EFBFBD>X<1A>s<EFBFBD><73><1C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Q<11>.k!
|
1
security/nss/cmd/bltest/tests/aes_cbc/key14
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key14
Normal file
@ -0,0 +1 @@
|
||||
{±{M÷…i~¬Ï–˜âËuæy|é5Ë
|
1
security/nss/cmd/bltest/tests/aes_cbc/key15
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key15
Normal file
@ -0,0 +1 @@
|
||||
ãþÌuðZ ³ƒßÓ‰£Ó<ɸT³²TÀô
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/key16
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key16
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/key17
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key17
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD><EFBFBD><EFBFBD><g<>)N<><4E>f<EFBFBD><66><EFBFBD>OE<4F>(<28><><EFBFBD><EFBFBD>3<EFBFBD>
|
1
security/nss/cmd/bltest/tests/aes_cbc/key18
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key18
Normal file
@ -0,0 +1 @@
|
||||
*ŐćJŞUWíÁk,jMK^î
|
1
security/nss/cmd/bltest/tests/aes_cbc/key19
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key19
Normal file
@ -0,0 +1 @@
|
||||
ÜâlkLû(eÚNìÒÏþlßC3Û›_w´`g›Ô<E280BA>®
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/key2
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key2
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/key20
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key20
Normal file
@ -0,0 +1 @@
|
||||
“˙cqŻj[Ž<>¬ßZ=KŻŃŻµsľzŢž†‚ćcĺ
|
2
security/nss/cmd/bltest/tests/aes_cbc/key21
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/key21
Normal file
@ -0,0 +1,2 @@
|
||||
s¸תנ3¬™…\צשיה…i
|
||||
Y₪†<E282AA>MֿHׂ‚ת®*
|
1
security/nss/cmd/bltest/tests/aes_cbc/key22
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key22
Normal file
@ -0,0 +1 @@
|
||||
E<EFBFBD>g<EFBFBD>!- <20><><EFBFBD>9 eX-<2D><><EFBFBD><EFBFBD><EFBFBD>"<22><><EFBFBD>8<EFBFBD><38>R&
|
1
security/nss/cmd/bltest/tests/aes_cbc/key23
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key23
Normal file
@ -0,0 +1 @@
|
||||
ÒA-°„]„ås+‹½d)WG;<3B>û™Ê‹ÿpç’
ÁÛì‰
|
1
security/nss/cmd/bltest/tests/aes_cbc/key24
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key24
Normal file
@ -0,0 +1 @@
|
||||
HľY~c,w#$ČÓúśZžÍě]
;ţĂvĹS+
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/key3
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key3
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/key4
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key4
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/key5
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key5
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/key6
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key6
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/key7
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/key7
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/key8
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key8
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD><EFBFBD><EFBFBD>Wn<12>
<0A>><3E><><EFBFBD>+<2B>9
|
1
security/nss/cmd/bltest/tests/aes_cbc/key9
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/key9
Normal file
@ -0,0 +1 @@
|
||||
»η·ΊOρ®|4ώ‹F^
|
11
security/nss/cmd/bltest/tests/aes_cbc/mktst.sh
Normal file
11
security/nss/cmd/bltest/tests/aes_cbc/mktst.sh
Normal file
@ -0,0 +1,11 @@
|
||||
#!/bin/sh
|
||||
for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
|
||||
do
|
||||
file="test$i.txt"
|
||||
grep "KEY = " $file | sed -e 's;KEY = ;;' | hex > key$i
|
||||
grep "IV = " $file | sed -e 's;IV = ;;' | hex > iv$i
|
||||
grep "PLAINTEXT = " $file | sed -e 's;PLAINTEXT = ;;' | hex > plaintext$i
|
||||
grep "CIPHERTEXT = " $file | sed -e 's;CIPHERTEXT = ;;' | hex > ciphertext$i.bin
|
||||
btoa < ciphertext$i.bin > ciphertext$i
|
||||
rm ciphertext$i.bin
|
||||
done
|
@ -1 +1 @@
|
||||
1
|
||||
25
|
||||
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext1
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext1
Normal file
@ -0,0 +1 @@
|
||||
<EFBFBD>D<EFBFBD><EFBFBD><<3C>'<27><>]<5D><><08>s<EFBFBD>
|
2
security/nss/cmd/bltest/tests/aes_cbc/plaintext10
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/plaintext10
Normal file
@ -0,0 +1,2 @@
|
||||
ثjx~
ٌV<D98C><56>e<EFBFBD><EFBFBD><7F>3l<33><6C><07>عى@<40>ئQRd<52><64>.<2E>My،^{ز<>Lم<4C><08>.وT<D988>S<EFBFBD>
|
||||
<EFBFBD>ykشة<D8B4><D8A9>ا<EFBFBD>ثُMَ<><D98E>vر<76><D8B1>ق¤<D982>G<EFBFBD>f<EFBFBD>lM<6C>PلfT<66>G<EFBFBD>6<EFBFBD>اآ<D8A7><D8A2>$<24><>k<EFBFBD>{mE_ًع؟ٌُ<D98F><D98C>ا<EFBFBD>5دخ<D8AF>Eث<45>
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext11
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext11
Normal file
@ -0,0 +1 @@
|
||||
ø+ï<s¦÷ø
²…rmi¶¿UîÂZ…<5A>; àD_&¹»;£Ñ†nMØòåøì´ämt§§Œ Íü{ÌžG›§ ʺ”8#ŠÐÀQÕÙ<C395>ãÝÎnkKÔ«ÏžŽØ®ß¡Ï–;“ g¹}wm·n~‘?tHã‚DPŸ¯6½‚áS6Ó\ŸÔä‰?Û„O‡)
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext12
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext12
Normal file
@ -0,0 +1 @@
|
||||
@Ů0ů S4Ů<34>o♜?‚ ?jW¨ÄuÉESŃŃi:Üa€Iđ§i˘îÖ¦ËŔ>ĹĚÍĽŤěLĺ`ĎŇ"W 2mM甎TÖĐ×ţ×Rű#ńŞD”ű°0éŢÔç~7Ŕy-‚€@Ă%±ĄďŃ_ČBä@ĘCtż8óĂü>ă's;ŠîĽĐUw/Ü`?{,¦źöb6+ŕˇq»Üę]?
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext13
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext13
Normal file
@ -0,0 +1 @@
|
||||
漀L萄h#!卪餴泷弃9:煱-Y踭罖伋<E7BD96>
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext14
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext14
Normal file
@ -0,0 +1 @@
|
||||
Û7…¨‰´½8wTÚ"/L-+þ
yà[Éû©A¾ê0ñ#ž¬ð<06>FìÃhé†ü¦·ÅŽIyÒ–½y†ïõO
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext15
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext15
Normal file
@ -0,0 +1 @@
|
||||
“/_:X Õ:kêªd1:4ˆôë°õµ~ø8áW–#;Öæ€wS‹.Qïp<C3AF><IVC.ŠŽæ£NB²jؽ®l*ù¦Ç™o;`ÒgAñÉôà=JR° eJ3óMÎ
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext16
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext16
Normal file
@ -0,0 +1 @@
|
||||
БЈvѓы(”gЭ,‰пє»То$ПСќDYmн&‚Зљ/qz2їj$єЭ2¤оc|s·¤¦%†5e‘ыџъEЅь<±"bAіЮОШ™jҐЁУиќpа¤KАWФ†# Ц"©?©Ъ)ЄнхЩиvЙF ”_шмИ?'7ћХ\фђЕy'
|
2
security/nss/cmd/bltest/tests/aes_cbc/plaintext17
Normal file
2
security/nss/cmd/bltest/tests/aes_cbc/plaintext17
Normal file
@ -0,0 +1,2 @@
|
||||
[ì¼1ؾm6®JXcÑJCkUÒž¦ºªArqqm³£;.PkE †ßæ<C39F>ƒJÂÞ0¼A%NÅ@Ä}B7Çy/ÜבMŠò±ufBÕŒu©/kÅ=2j饷á±
|
||||
—VWF’“M™9ü9ž ?~ߎ~d‚êÝ1 @pè—´ŒkÊ+@E“P€é3w5ŒB ôÞÞ
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext18
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext18
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext19
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext19
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext2
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext2
Normal file
@ -0,0 +1 @@
|
||||
利トdュuヌテ"}ケNr
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext20
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext20
Normal file
@ -0,0 +1 @@
|
||||
▀7Ы█Т╩%∙kФ1sхэXЙ≈ЪI╤C{4и©П√╘OМж┌5&╚бz▌anН%J╢V}ж▌▄мL8╛V;c°
|
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext21
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext21
Normal file
@ -0,0 +1 @@
|
||||
:Þ¦ànBÄðA‘òw^ö7Œ°ˆ$^ÜOdHâ2[`Ð4[Ÿœxße–ì<E28093>"·¹çn<C3A7><v³-]g'?ƒþzoÃÝ<I‘púW³¾¬a´<61>ð©á?„F@ÄPšÓzß°®
|
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext22
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext22
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext23
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext23
Normal file
Binary file not shown.
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext24
Normal file
BIN
security/nss/cmd/bltest/tests/aes_cbc/plaintext24
Normal file
Binary file not shown.
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext3
Normal file
1
security/nss/cmd/bltest/tests/aes_cbc/plaintext3
Normal file
@ -0,0 +1 @@
|
||||
zj<7A><6A>)゙xmuカ9
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user