forked from wolfSSL/wolfssl
		
	
		
			
				
	
	
		
			1506 lines
		
	
	
		
			40 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			1506 lines
		
	
	
		
			40 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* mcapi_test.c
 | 
						|
 *
 | 
						|
 * Copyright (C) 2006-2017 wolfSSL Inc.
 | 
						|
 *
 | 
						|
 * This file is part of wolfSSL.
 | 
						|
 *
 | 
						|
 * wolfSSL is free software; you can redistribute it and/or modify
 | 
						|
 * it under the terms of the GNU General Public License as published by
 | 
						|
 * the Free Software Foundation; either version 2 of the License, or
 | 
						|
 * (at your option) any later version.
 | 
						|
 *
 | 
						|
 * wolfSSL is distributed in the hope that it will be useful,
 | 
						|
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
 * GNU General Public License for more details.
 | 
						|
 *
 | 
						|
 * You should have received a copy of the GNU General Public License
 | 
						|
 * along with this program; if not, write to the Free Software
 | 
						|
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
 | 
						|
 */
 | 
						|
 | 
						|
 | 
						|
 | 
						|
/* Tests Microchip CRYPTO API layer */
 | 
						|
 | 
						|
 | 
						|
 | 
						|
/* mc api header */
 | 
						|
#include "crypto.h"
 | 
						|
 | 
						|
#include <wolfssl/wolfcrypt/settings.h>
 | 
						|
 | 
						|
/* sanity test against our default implementation, wolfssl headers  */
 | 
						|
#include <wolfssl/wolfcrypt/md5.h>
 | 
						|
#include <wolfssl/wolfcrypt/sha.h>
 | 
						|
#include <wolfssl/wolfcrypt/sha256.h>
 | 
						|
#include <wolfssl/wolfcrypt/sha512.h>
 | 
						|
#include <wolfssl/wolfcrypt/hmac.h>
 | 
						|
#include <wolfssl/wolfcrypt/compress.h>
 | 
						|
#include <wolfssl/wolfcrypt/random.h>
 | 
						|
#include <wolfssl/wolfcrypt/des3.h>
 | 
						|
#include <wolfssl/wolfcrypt/aes.h>
 | 
						|
#include <wolfssl/wolfcrypt/ecc.h>
 | 
						|
#include <wolfssl/wolfcrypt/rsa.h>
 | 
						|
#define USE_CERT_BUFFERS_1024
 | 
						|
#include <wolfssl/certs_test.h>
 | 
						|
 | 
						|
#if defined(WOLFSSL_MICROCHIP_PIC32MZ)
 | 
						|
    #define MICROCHIP_PIC32
 | 
						|
    #include <xc.h>
 | 
						|
    #pragma config ICESEL = ICS_PGx2
 | 
						|
            /* ICE/ICD Comm Channel Select (Communicate on PGEC2/PGED2) */
 | 
						|
    #include <stdio.h>
 | 
						|
    #include <stdlib.h>
 | 
						|
    #include "PIC32MZ-serial.h"
 | 
						|
    #define  SYSTEMConfigPerformance /* void out SYSTEMConfigPerformance(); */
 | 
						|
#elif defined(MICROCHIP_PIC32)
 | 
						|
    #define PIC32_STARTER_KIT
 | 
						|
    #include <stdio.h>
 | 
						|
    #include <stdlib.h>
 | 
						|
    #include <p32xxxx.h>
 | 
						|
    #define _SUPPRESS_PLIB_WARNING
 | 
						|
    #define _DISABLE_OPENADC10_CONFIGPORT_WARNING
 | 
						|
    #include <plib.h>
 | 
						|
    #include <sys/appio.h>
 | 
						|
    #define init_serial()  /* void out init_serial() */
 | 
						|
#else
 | 
						|
    #include <stdio.h>  /* order matters above ? */
 | 
						|
#endif
 | 
						|
#define OUR_DATA_SIZE 1024
 | 
						|
static byte ourData[OUR_DATA_SIZE];
 | 
						|
static byte* key = NULL;
 | 
						|
static byte* iv  = NULL;
 | 
						|
static CRYPT_RNG_CTX mcRng;
 | 
						|
static WC_RNG        defRng;
 | 
						|
 | 
						|
static int check_md5(void);
 | 
						|
static int check_sha(void);
 | 
						|
static int check_sha256(void);
 | 
						|
static int check_sha384(void);
 | 
						|
static int check_sha512(void);
 | 
						|
static int check_hmac(void);
 | 
						|
static int check_compress(void);
 | 
						|
static int check_rng(void);
 | 
						|
static int check_des3(void);
 | 
						|
static int check_aescbc(void);
 | 
						|
static int check_aesctr(void);
 | 
						|
static int check_aesdirect(void);
 | 
						|
static int check_rsa(void);
 | 
						|
static int check_ecc(void);
 | 
						|
 | 
						|
 | 
						|
int main(int argc, char** argv)
 | 
						|
{
 | 
						|
    int ret;
 | 
						|
    int i;
 | 
						|
 | 
						|
    (void)argc;
 | 
						|
    (void)argv;
 | 
						|
 | 
						|
#if defined(MICROCHIP_PIC32)
 | 
						|
    init_serial() ;  /* initialize PIC32MZ serial I/O */
 | 
						|
    SYSTEMConfigPerformance(80000000);
 | 
						|
    DBINIT();
 | 
						|
#endif
 | 
						|
 | 
						|
    /* align key, iv pointers */
 | 
						|
    key = (byte*)XMALLOC(32, NULL, DYNAMIC_TYPE_KEY);
 | 
						|
    if (key == NULL) {
 | 
						|
        printf("mcapi key alloc failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    iv = (byte*)XMALLOC(16, NULL, DYNAMIC_TYPE_KEY);
 | 
						|
    if (iv == NULL) {
 | 
						|
        printf("mcapi iv alloc failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    for (i = 0; i < OUR_DATA_SIZE; i++)
 | 
						|
        ourData[i] = (byte)i;
 | 
						|
 | 
						|
    ret = check_md5();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_md5 failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_sha();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_sha failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_sha256();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_sha256 failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_sha384();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_sha384 failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_sha512();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_sha512 failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_hmac();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_hmac failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_compress();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_compress failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_rng();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_rng failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_des3();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_des3 failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_aescbc();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_aes cbc failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_aesctr();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_aes ctr failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_aesdirect();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_aes direct failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_rsa();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_rsa failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = check_ecc();
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi check_ecc failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    XFREE(iv,  NULL, DYNAMIC_TYPE_KEY);
 | 
						|
    XFREE(key, NULL, DYNAMIC_TYPE_KEY);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi md5 against internal */
 | 
						|
static int check_md5(void)
 | 
						|
{
 | 
						|
    CRYPT_MD5_CTX mcMd5;
 | 
						|
    Md5           defMd5;
 | 
						|
    int           ret;
 | 
						|
    byte          mcDigest[CRYPT_MD5_DIGEST_SIZE];
 | 
						|
    byte          defDigest[MD5_DIGEST_SIZE];
 | 
						|
 | 
						|
    CRYPT_MD5_Initialize(&mcMd5);
 | 
						|
    ret = wc_InitMd5(&defMd5);
 | 
						|
 | 
						|
    if (ret == 0) {
 | 
						|
        CRYPT_MD5_DataAdd(&mcMd5, ourData, OUR_DATA_SIZE);
 | 
						|
        ret = wc_Md5Update(&defMd5, ourData, OUR_DATA_SIZE);
 | 
						|
    }
 | 
						|
 | 
						|
    if (ret == 0) {
 | 
						|
        CRYPT_MD5_Finalize(&mcMd5, mcDigest);
 | 
						|
        ret = wc_Md5Final(&defMd5, defDigest);
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_MD5_DIGEST_SIZE) != 0) {
 | 
						|
        printf("md5 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("md5         mcapi test passed\n");
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi sha against internal */
 | 
						|
static int check_sha(void)
 | 
						|
{
 | 
						|
    CRYPT_SHA_CTX mcSha;
 | 
						|
    Sha           defSha;
 | 
						|
    int           ret = 0;
 | 
						|
    byte          mcDigest[CRYPT_SHA_DIGEST_SIZE];
 | 
						|
    byte          defDigest[SHA_DIGEST_SIZE];
 | 
						|
 | 
						|
    CRYPT_SHA_Initialize(&mcSha);
 | 
						|
    ret = wc_InitSha(&defSha);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha init default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA_DataAdd(&mcSha, ourData, OUR_DATA_SIZE);
 | 
						|
    wc_ShaUpdate(&defSha, ourData, OUR_DATA_SIZE);
 | 
						|
 | 
						|
    CRYPT_SHA_Finalize(&mcSha, mcDigest);
 | 
						|
    wc_ShaFinal(&defSha, defDigest);
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
 | 
						|
        printf("sha final memcmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("sha         mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi sha256 against internal */
 | 
						|
static int check_sha256(void)
 | 
						|
{
 | 
						|
    CRYPT_SHA256_CTX mcSha256;
 | 
						|
    wc_Sha256        defSha256;
 | 
						|
    int              ret;
 | 
						|
    byte             mcDigest[CRYPT_SHA256_DIGEST_SIZE];
 | 
						|
    byte             defDigest[WC_SHA256_DIGEST_SIZE];
 | 
						|
 | 
						|
    CRYPT_SHA256_Initialize(&mcSha256);
 | 
						|
    ret = wc_InitSha256(&defSha256);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha256 init default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA256_DataAdd(&mcSha256, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_Sha256Update(&defSha256, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha256 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA256_Finalize(&mcSha256, mcDigest);
 | 
						|
    ret = wc_Sha256Final(&defSha256, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha256 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
 | 
						|
        printf("sha256 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("sha256      mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi sha384 against internal */
 | 
						|
static int check_sha384(void)
 | 
						|
{
 | 
						|
    CRYPT_SHA384_CTX mcSha384;
 | 
						|
    wc_Sha384        defSha384;
 | 
						|
    int              ret;
 | 
						|
    byte             mcDigest[CRYPT_SHA384_DIGEST_SIZE];
 | 
						|
    byte             defDigest[WC_SHA384_DIGEST_SIZE];
 | 
						|
 | 
						|
    CRYPT_SHA384_Initialize(&mcSha384);
 | 
						|
    ret = wc_InitSha384(&defSha384);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha384 init default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA384_DataAdd(&mcSha384, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_Sha384Update(&defSha384, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha384 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA384_Finalize(&mcSha384, mcDigest);
 | 
						|
    ret = wc_Sha384Final(&defSha384, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha384 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
 | 
						|
        printf("sha384 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("sha384      mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi sha512 against internal */
 | 
						|
static int check_sha512(void)
 | 
						|
{
 | 
						|
    CRYPT_SHA512_CTX mcSha512;
 | 
						|
    wc_Sha512        defSha512;
 | 
						|
    int              ret;
 | 
						|
    byte             mcDigest[CRYPT_SHA512_DIGEST_SIZE];
 | 
						|
    byte             defDigest[WC_SHA512_DIGEST_SIZE];
 | 
						|
 | 
						|
    CRYPT_SHA512_Initialize(&mcSha512);
 | 
						|
    ret = wc_InitSha512(&defSha512);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha512 init default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA512_DataAdd(&mcSha512, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_Sha512Update(&defSha512, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha512 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_SHA512_Finalize(&mcSha512, mcDigest);
 | 
						|
    ret = wc_Sha512Final(&defSha512, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("sha512 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
 | 
						|
        printf("sha512 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("sha512      mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi hmac against internal */
 | 
						|
static int check_hmac(void)
 | 
						|
{
 | 
						|
    CRYPT_HMAC_CTX mcHmac;
 | 
						|
    Hmac           defHmac;
 | 
						|
    int            ret;
 | 
						|
    byte           mcDigest[CRYPT_SHA512_DIGEST_SIZE];
 | 
						|
    byte           defDigest[WC_SHA512_DIGEST_SIZE];
 | 
						|
 | 
						|
    strncpy((char*)key, "Jefe", 4);
 | 
						|
 | 
						|
    /* SHA1 */
 | 
						|
    CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA, key, 4);
 | 
						|
    ret = wc_HmacSetKey(&defHmac, WC_SHA, key, 4);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha setkey default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
 | 
						|
    ret = wc_HmacFinal(&defHmac, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA_DIGEST_SIZE) != 0) {
 | 
						|
        printf("hmac sha final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("hmac sha    mcapi test passed\n");
 | 
						|
 | 
						|
    /* SHA-256 */
 | 
						|
    CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA256, key, 4);
 | 
						|
    ret = wc_HmacSetKey(&defHmac, WC_SHA256, key, 4);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha256 setkey default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha256 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
 | 
						|
    ret = wc_HmacFinal(&defHmac, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha256 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA256_DIGEST_SIZE) != 0) {
 | 
						|
        printf("hmac sha256 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("hmac sha256 mcapi test passed\n");
 | 
						|
 | 
						|
    /* SHA-384 */
 | 
						|
    CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA384, key, 4);
 | 
						|
    ret = wc_HmacSetKey(&defHmac, WC_SHA384, key, 4);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha384 setkey default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha384 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
 | 
						|
    ret = wc_HmacFinal(&defHmac, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha384 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA384_DIGEST_SIZE) != 0) {
 | 
						|
        printf("hmac sha384 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("hmac sha384 mcapi test passed\n");
 | 
						|
 | 
						|
    /* SHA-512 */
 | 
						|
    CRYPT_HMAC_SetKey(&mcHmac, CRYPT_HMAC_SHA512, key, 4);
 | 
						|
    ret = wc_HmacSetKey(&defHmac, WC_SHA512, key, 4);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha512 setkey default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_DataAdd(&mcHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    ret = wc_HmacUpdate(&defHmac, ourData, OUR_DATA_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha512 update default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    CRYPT_HMAC_Finalize(&mcHmac, mcDigest);
 | 
						|
    ret = wc_HmacFinal(&defHmac, defDigest);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("hmac sha512 final default failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(mcDigest, defDigest, CRYPT_SHA512_DIGEST_SIZE) != 0) {
 | 
						|
        printf("hmac sha512 final memcmp fialed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    printf("hmac sha512 mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi compress against internal */
 | 
						|
static int check_compress(void)
 | 
						|
{
 | 
						|
    const unsigned char text[] =
 | 
						|
    "Biodiesel cupidatat marfa, cliche aute put a bird on it incididunt elit\n"
 | 
						|
    "polaroid. Sunt tattooed bespoke reprehenderit. Sint twee organic id\n"
 | 
						|
    "marfa. Commodo veniam ad esse gastropub. 3 wolf moon sartorial vero,\n"
 | 
						|
    "plaid delectus biodiesel squid +1 vice. Post-ironic keffiyeh leggings\n"
 | 
						|
    "selfies cray fap hoodie, forage anim. Carles cupidatat shoreditch, VHS\n"
 | 
						|
    "small batch meggings kogi dolore food truck bespoke gastropub.\n"
 | 
						|
    "\n"
 | 
						|
    "Terry richardson adipisicing actually typewriter tumblr, twee whatever\n"
 | 
						|
    "four loko you probably haven't heard of them high life. Messenger bag\n"
 | 
						|
    "whatever tattooed deep v mlkshk. Brooklyn pinterest assumenda chillwave\n"
 | 
						|
    "et, banksy ullamco messenger bag umami pariatur direct trade forage.\n"
 | 
						|
    "Typewriter culpa try-hard, pariatur sint brooklyn meggings. Gentrify\n"
 | 
						|
    "food truck next level, tousled irony non semiotics PBR ethical anim cred\n"
 | 
						|
    "readymade. Mumblecore brunch lomo odd future, portland organic terry\n"
 | 
						|
    "four loko whatever street art yr farm-to-table.\n";
 | 
						|
 | 
						|
    unsigned int inSz  = sizeof(text);
 | 
						|
    unsigned int outSz;
 | 
						|
    unsigned char cBuffer[1024];
 | 
						|
    unsigned char dBuffer[1024];
 | 
						|
 | 
						|
    int ret1, ret2;
 | 
						|
 | 
						|
    /* dynamic */
 | 
						|
    ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 0);
 | 
						|
    ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 0);
 | 
						|
 | 
						|
    if (ret1 != ret2 || ret1 < 0) {
 | 
						|
        printf("compress dynamic ret failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(cBuffer, dBuffer, ret1) != 0) {
 | 
						|
        printf("compress dynamic cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    outSz = ret1;
 | 
						|
 | 
						|
    ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
 | 
						|
 | 
						|
    if (memcmp(dBuffer, text, inSz) != 0) {
 | 
						|
        printf("mcapi decompress dynamic cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    memset(dBuffer, 0, sizeof(dBuffer));
 | 
						|
 | 
						|
    ret1 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
 | 
						|
 | 
						|
    if (memcmp(dBuffer, text, inSz) != 0) {
 | 
						|
        printf("decompress dynamic cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    memset(cBuffer, 0, sizeof(cBuffer));
 | 
						|
    memset(dBuffer, 0, sizeof(dBuffer));
 | 
						|
 | 
						|
    /* static */
 | 
						|
    ret1 = CRYPT_HUFFMAN_Compress(cBuffer, sizeof(cBuffer), text, inSz, 1);
 | 
						|
    ret2 = wc_Compress(dBuffer, sizeof(dBuffer), text, inSz, 1);
 | 
						|
 | 
						|
    if (ret1 != ret2 || ret1 < 0) {
 | 
						|
        printf("compress static ret failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(cBuffer, dBuffer, ret1) != 0) {
 | 
						|
        printf("compress static cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    outSz = ret1;
 | 
						|
 | 
						|
    ret1 = CRYPT_HUFFMAN_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
 | 
						|
 | 
						|
    if (memcmp(dBuffer, text, inSz) != 0) {
 | 
						|
        printf("mcapi decompress static cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    memset(dBuffer, 0, sizeof(dBuffer));
 | 
						|
 | 
						|
    ret1 = wc_DeCompress(dBuffer, sizeof(dBuffer), cBuffer, outSz);
 | 
						|
 | 
						|
    if (memcmp(dBuffer, text, inSz) != 0) {
 | 
						|
        printf("decompress static cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("huffman     mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
#define RANDOM_BYTE_SZ 32
 | 
						|
 | 
						|
/* check mcapi rng */
 | 
						|
static int check_rng(void)
 | 
						|
{
 | 
						|
    int           ret;
 | 
						|
    int           i;
 | 
						|
    byte          in[RANDOM_BYTE_SZ];
 | 
						|
    byte          out[RANDOM_BYTE_SZ];
 | 
						|
 | 
						|
    for (i = 0; i < RANDOM_BYTE_SZ; i++)
 | 
						|
        in[i] = (byte)i;
 | 
						|
 | 
						|
    for (i = 0; i < RANDOM_BYTE_SZ; i++)
 | 
						|
        out[i] = (byte)i;
 | 
						|
 | 
						|
    ret = wc_InitRng(&defRng);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default rng init failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RNG_Initialize(&mcRng);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rng init failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RNG_Get(&mcRng, &out[0]);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rng get failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RNG_BlockGenerate(&mcRng, out, RANDOM_BYTE_SZ);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rng block gen failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(in, out, RANDOM_BYTE_SZ) == 0) {
 | 
						|
        printf("mcapi rng block gen output failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("rng         mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
#define TDES_TEST_SIZE 32
 | 
						|
 | 
						|
/* check mcapi des3 */
 | 
						|
static int check_des3(void)
 | 
						|
{
 | 
						|
    CRYPT_TDES_CTX mcDes3;
 | 
						|
    Des3           defDes3;
 | 
						|
    int            ret;
 | 
						|
    byte           out1[TDES_TEST_SIZE];
 | 
						|
    byte           out2[TDES_TEST_SIZE];
 | 
						|
 | 
						|
    strncpy((char*)key, "1234567890abcdefghijklmn", 24);
 | 
						|
    strncpy((char*)iv,  "12345678", 8);
 | 
						|
 | 
						|
    /* cbc encrypt */
 | 
						|
    ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi tdes key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_Des3_SetKey(&defDes3, key, iv, DES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default des3 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_TDES_CBC_Encrypt(&mcDes3, out1, ourData, TDES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi tdes cbc encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_Des3_CbcEncrypt(&defDes3, out2, ourData, TDES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi default tdes cbc encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi tdes cbc encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* cbc decrypt */
 | 
						|
    ret = CRYPT_TDES_KeySet(&mcDes3, key, iv, CRYPT_TDES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi tdes key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_Des3_SetKey(&defDes3, key, iv, DES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default des3 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_TDES_CBC_Decrypt(&mcDes3, out2, out1, TDES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi tdes cbc decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_Des3_CbcDecrypt(&defDes3, out1, out1, TDES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi default tdes cbc decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, out2, TDES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi tdes cbc decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, TDES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi tdes cbc decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("tdes        mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
#define AES_TEST_SIZE 32
 | 
						|
 | 
						|
/* check mcapi aes cbc */
 | 
						|
static int check_aescbc(void)
 | 
						|
{
 | 
						|
    CRYPT_AES_CTX mcAes;
 | 
						|
    Aes           defAes;
 | 
						|
    int           ret;
 | 
						|
    byte          out1[AES_TEST_SIZE];
 | 
						|
    byte          out2[AES_TEST_SIZE];
 | 
						|
 | 
						|
    strncpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
 | 
						|
    strncpy((char*)iv,  "1234567890abcdef", 16);
 | 
						|
 | 
						|
    /* 128 cbc encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 cbc encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 cbc encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 128 cbc decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, DES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 cbc decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 cbc decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 cbc decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 cbc encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 cbc encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 cbc encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 cbc decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 cbc decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 cbc decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 cbc decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 cbc encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 cbc encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 cbc encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 cbc decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CBC_Decrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 cbc decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesCbcDecrypt(&defAes, out1, out1, AES_TEST_SIZE);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 cbc decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 cbc decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("aes-cbc     mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi aes ctr */
 | 
						|
static int check_aesctr(void)
 | 
						|
{
 | 
						|
    CRYPT_AES_CTX mcAes;
 | 
						|
    Aes           defAes;
 | 
						|
    int           ret;
 | 
						|
    byte          out1[AES_TEST_SIZE];
 | 
						|
    byte          out2[AES_TEST_SIZE];
 | 
						|
 | 
						|
    strncpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
 | 
						|
    strncpy((char*)iv,  "1234567890abcdef", 16);
 | 
						|
 | 
						|
    /* 128 ctr encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 ctr encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 ctr encrypt set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 ctr encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 128 ctr decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 ctr decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 ctr decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 ctr encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 ctr encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 ctr encrypt set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 ctr encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 ctr decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 ctr decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 ctr decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 ctr encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out1, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 ctr encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesCtrEncrypt(&defAes, out2, ourData, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 ctr encrypt set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    if (memcmp(out1, out2, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 ctr encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 ctr decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_CTR_Encrypt(&mcAes, out2, out1, AES_TEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 ctr decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out2, ourData, AES_TEST_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 ctr decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("aes-ctr     mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi aes direct */
 | 
						|
static int check_aesdirect(void)
 | 
						|
{
 | 
						|
    CRYPT_AES_CTX mcAes;
 | 
						|
    Aes           defAes;
 | 
						|
    int           ret;
 | 
						|
    byte          out1[CRYPT_AES_BLOCK_SIZE];
 | 
						|
    byte          out2[16];  /* one block at a time */
 | 
						|
 | 
						|
    strncpy((char*)key, "1234567890abcdefghijklmnopqrstuv", 32);
 | 
						|
    strncpy((char*)iv,  "1234567890abcdef", 16);
 | 
						|
 | 
						|
    /* 128 direct encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 direct encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesEncryptDirect(&defAes, out2, ourData);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 direct encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 128 direct decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 16, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 16, iv, DES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-128 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-128 direct decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesDecryptDirect(&defAes, out1, out1);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 direct decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-128 direct decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 direct encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 direct encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesEncryptDirect(&defAes, out2, ourData);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 direct encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 192 direct decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 24, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 24, iv, AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-192 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-192 direct decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesDecryptDirect(&defAes, out1, out1);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 direct decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-192 direct decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 direct encrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_ENCRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Encrypt(&mcAes, out1, ourData);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 direct encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesEncryptDirect(&defAes, out2, ourData);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 direct encrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* 256 direct decrypt */
 | 
						|
    ret = CRYPT_AES_KeySet(&mcAes, key, 32, iv, CRYPT_AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    ret = wc_AesSetKey(&defAes, key, 32, iv, AES_DECRYPTION);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default aes-256 key set failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_AES_DIRECT_Decrypt(&mcAes, out2, out1);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi aes-256 direct decrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    wc_AesDecryptDirect(&defAes, out1, out1);
 | 
						|
 | 
						|
    if (memcmp(out1, out2, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 direct decrypt cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out1, ourData, CRYPT_AES_BLOCK_SIZE) != 0) {
 | 
						|
        printf("mcapi aes-256 direct decrypt orig cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("aes-direct  mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
#define RSA_TEST_SIZE 64
 | 
						|
 | 
						|
/* check mcapi rsa */
 | 
						|
static int check_rsa(void)
 | 
						|
{
 | 
						|
    CRYPT_RSA_CTX mcRsa;
 | 
						|
    RsaKey        defRsa;
 | 
						|
    int           ret;
 | 
						|
    int           ret2;
 | 
						|
    unsigned int  keySz = (unsigned int)sizeof(client_key_der_1024);
 | 
						|
    unsigned int  idx   = 0;
 | 
						|
    byte          out1[256];
 | 
						|
    byte          out2[256];
 | 
						|
 | 
						|
    ret = wc_InitRsaKey(&defRsa, NULL);
 | 
						|
    if (ret == 0)
 | 
						|
        ret = CRYPT_RSA_Initialize(&mcRsa);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rsa init failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RSA_PrivateKeyDecode(&mcRsa, client_key_der_1024, keySz);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rsa private key decode failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = wc_RsaPrivateKeyDecode(client_key_der_1024, &idx, &defRsa, keySz);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("default rsa private key decode failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RSA_SetRng(&mcRsa, &mcRng);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rsa set rng failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RSA_PublicEncrypt(&mcRsa, out1, sizeof(out1), ourData,
 | 
						|
                                  RSA_TEST_SIZE, &mcRng);
 | 
						|
    if (ret < 0) {
 | 
						|
        printf("mcapi rsa public encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret2 = wc_RsaPublicEncrypt(ourData, RSA_TEST_SIZE, out2, sizeof(out2),
 | 
						|
                            &defRsa, &defRng);
 | 
						|
    if (ret2 < 0) {
 | 
						|
        printf("default rsa public encrypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ret != ret2) {
 | 
						|
        printf("default rsa public encrypt sz != mcapi sz\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ret != CRYPT_RSA_EncryptSizeGet(&mcRsa)) {
 | 
						|
        printf("mcapi encrypt sz get != mcapi sz\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_RSA_PrivateDecrypt(&mcRsa, out2, sizeof(out2), out1, ret);
 | 
						|
    if (ret < 0) {
 | 
						|
        printf("mcapi rsa private derypt failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (ret != RSA_TEST_SIZE) {
 | 
						|
        printf("mcapi rsa private derypt plain size wrong\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(out2, ourData, ret) != 0) {
 | 
						|
        printf("mcapi rsa private derypt plain text bad\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    wc_FreeRsaKey(&defRsa);
 | 
						|
    ret = CRYPT_RSA_Free(&mcRsa);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi rsa free failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("rsa         mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* check mcapi ecc */
 | 
						|
static int check_ecc(void)
 | 
						|
{
 | 
						|
    CRYPT_ECC_CTX userA;
 | 
						|
    CRYPT_ECC_CTX userB;
 | 
						|
    int           ret;
 | 
						|
    byte          sharedA[100];
 | 
						|
    byte          sharedB[100];
 | 
						|
    byte          sig[100];
 | 
						|
    unsigned int  aSz   = (unsigned int)sizeof(sharedA);
 | 
						|
    unsigned int  bSz   = (unsigned int)sizeof(sharedB);
 | 
						|
    unsigned int  sigSz = (unsigned int)sizeof(sig);
 | 
						|
    unsigned int  usedA = 0;
 | 
						|
    unsigned int  usedB = 0;
 | 
						|
    int verifyStatus = 0;
 | 
						|
 | 
						|
    /* init */
 | 
						|
    ret = CRYPT_ECC_Initialize(&userA);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc init failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_Initialize(&userB);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc init b failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* dhe + helpers */
 | 
						|
    ret = CRYPT_ECC_DHE_KeyMake(&userA, &mcRng, 32);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc make key failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_DHE_KeyMake(&userB, &mcRng, 32);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc make key b failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_KeySizeGet(&userA);
 | 
						|
    if (ret <= 0) {
 | 
						|
        printf("mcapi ecc key size get failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_SignatureSizeGet(&userA);
 | 
						|
    if (ret <= 0) {
 | 
						|
        printf("mcapi ecc signature size get failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_DHE_SharedSecretMake(&userA, &userB, sharedA, aSz, &usedA);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc make shared secret failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_DHE_SharedSecretMake(&userB, &userA, sharedB, bSz, &usedB);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc make shared secret failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (usedA != usedB || usedA <= 0) {
 | 
						|
        printf("mcapi ecc make shared secret output size match failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    if (memcmp(sharedA, sharedB, usedA) != 0) {
 | 
						|
        printf("mcapi ecc make shared secret output match cmp failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* dsa */
 | 
						|
    ret = CRYPT_ECC_DSA_HashSign(&userA, &mcRng, sig, sigSz, &usedA, ourData,
 | 
						|
                                 CRYPT_SHA_DIGEST_SIZE);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc sign hash failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    sigSz = usedA;
 | 
						|
    if (sigSz <= 0) {
 | 
						|
        printf("mcapi ecc sign hash bad sig size\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_DSA_HashVerify(&userA, sig, sigSz, ourData,
 | 
						|
                                   CRYPT_SHA_DIGEST_SIZE, &verifyStatus);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc verify hash failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
    if (verifyStatus != 1) {
 | 
						|
        printf("mcapi ecc verify hash status failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    /* import / export */
 | 
						|
    usedA = 0;
 | 
						|
    ret = CRYPT_ECC_PublicExport(&userA, sharedA, aSz, &usedA);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc public export failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_PublicImport(&userB, sharedA, usedA);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc public import failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_Free(&userA);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc free failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    ret = CRYPT_ECC_Free(&userB);
 | 
						|
    if (ret != 0) {
 | 
						|
        printf("mcapi ecc free b failed\n");
 | 
						|
        return -1;
 | 
						|
    }
 | 
						|
 | 
						|
    printf("ecc         mcapi test passed\n");
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 |