iw6-mod/deps/libtomcrypt/tests/modes_test.c
2025-02-20 05:32:33 -05:00

161 lines
4.3 KiB
C

/* LibTomCrypt, modular cryptographic library -- Tom St Denis */
/* SPDX-License-Identifier: Unlicense */
/* test CFB/OFB/CBC modes */
#include <tomcrypt_test.h>
#ifdef LTC_CFB_MODE
static const struct {
int width;
const char *key, *iv, *pt, *ct;
} cfb_testvectors[] = {
{
1,
"2b7e151628aed2a6abf7158809cf4f3c",
"000102030405060708090a0b0c0d0e0f",
"6bc1",
"68b3",
},
{
8,
"2b7e151628aed2a6abf7158809cf4f3c",
"000102030405060708090a0b0c0d0e0f",
"6bc1b3e22e409f96e93d7e117393172aae2d",
"3b79424c9c0dd436bace9e0ed4586a4f32b9",
},
};
#endif
int modes_test(void)
{
int ret = CRYPT_NOP;
#ifdef LTC_CBC_MODE
symmetric_CBC cbc;
#endif
#ifdef LTC_OFB_MODE
symmetric_OFB ofb;
#endif
#ifdef LTC_CFB_MODE
symmetric_CFB cfb;
unsigned char tmp2[64];
unsigned long n;
#endif
#if defined(LTC_CBC_MODE) || defined(LTC_CFB_MODE) || defined(LTC_OFB_MODE)
unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16];
int cipher_idx;
unsigned long l;
/* make a random pt, key and iv */
ENSURE(yarrow_read(pt, 64, &yarrow_prng) == 64);
ENSURE(yarrow_read(key, 16, &yarrow_prng) == 16);
ENSURE(yarrow_read(iv, 16, &yarrow_prng) == 16);
/* get idx of AES handy */
cipher_idx = find_cipher("aes");
if (cipher_idx == -1) {
fprintf(stderr, "test requires AES");
return 1;
}
#endif
#ifdef LTC_F8_MODE
DO(ret = f8_test_mode());
#endif
#ifdef LTC_LRW_MODE
DO(ret = lrw_test());
#endif
#ifdef LTC_CBC_MODE
/* test CBC mode */
/* encode the block */
DO(ret = cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
l = sizeof(iv2);
DO(ret = cbc_getiv(iv2, &l, &cbc));
if (l != 16 || memcmp(iv2, iv, 16)) {
fprintf(stderr, "cbc_getiv failed");
return 1;
}
DO(ret = cbc_encrypt(pt, ct, 64, &cbc));
/* decode the block */
DO(ret = cbc_setiv(iv2, l, &cbc));
zeromem(tmp, sizeof(tmp));
DO(ret = cbc_decrypt(ct, tmp, 64, &cbc));
if (memcmp(tmp, pt, 64) != 0) {
fprintf(stderr, "CBC failed");
return 1;
}
#endif
#ifdef LTC_CFB_MODE
/* test CFB mode */
/* encode the block */
DO(ret = cfb_start(cipher_idx, iv, key, 16, 0, &cfb));
l = sizeof(iv2);
DO(ret = cfb_getiv(iv2, &l, &cfb));
/* note we don't memcmp iv2/iv since cfb_start processes the IV for the first block */
ENSURE(l == 16);
DO(ret = cfb_encrypt(pt, ct, 64, &cfb));
/* decode the block */
DO(ret = cfb_setiv(iv, l, &cfb));
zeromem(tmp, sizeof(tmp));
DO(ret = cfb_decrypt(ct, tmp, 64, &cfb));
COMPARE_TESTVECTOR(tmp, 64, pt, 64, "cfb128-enc-dec", 0);
cfb_done(&cfb);
XMEMSET(&cfb, 0, sizeof(cfb));
#define b16(e, w) do { \
l = sizeof(w); \
DO(base16_decode(e . w, XSTRLEN(e . w), w, &l)); \
} while(0)
for (n = 0; n < sizeof(cfb_testvectors)/sizeof(cfb_testvectors[0]); ++n) {
b16(cfb_testvectors[n], key);
b16(cfb_testvectors[n], iv);
b16(cfb_testvectors[n], pt);
b16(cfb_testvectors[n], ct);
DO(cfb_start_ex(cipher_idx, iv, key, 16, 0, cfb_testvectors[n].width, &cfb));
l = sizeof(iv2);
DO(cfb_getiv(iv2, &l, &cfb));
ENSURE(l == 16);
DO(ret = cfb_encrypt(pt, tmp, 2, &cfb));
COMPARE_TESTVECTOR(tmp, 2, ct, 2, "cfb-enc", n);
DO(cfb_setiv(iv2, l, &cfb));
DO(ret = cfb_decrypt(tmp, tmp2, 2, &cfb));
COMPARE_TESTVECTOR(tmp2, 2, pt, 2, "cfb-dec", n);
}
#endif
#ifdef LTC_OFB_MODE
/* test OFB mode */
/* encode the block */
DO(ret = ofb_start(cipher_idx, iv, key, 16, 0, &ofb));
l = sizeof(iv2);
DO(ret = ofb_getiv(iv2, &l, &ofb));
if (l != 16 || memcmp(iv2, iv, 16)) {
fprintf(stderr, "ofb_getiv failed");
return 1;
}
DO(ret = ofb_encrypt(pt, ct, 64, &ofb));
/* decode the block */
DO(ret = ofb_setiv(iv2, l, &ofb));
zeromem(tmp, sizeof(tmp));
DO(ret = ofb_decrypt(ct, tmp, 64, &ofb));
if (memcmp(tmp, pt, 64) != 0) {
fprintf(stderr, "OFB failed");
return 1;
}
#endif
#if defined(LTC_CTR_MODE) && defined(LTC_RIJNDAEL)
DO(ret = ctr_test());
#endif
#ifdef LTC_XTS_MODE
DO(ret = xts_test());
#endif
return 0;
}