4 * MDDRIVER.C - test driver for MD2, MD4 and MD5
6 * $FreeBSD: src/sbin/md5/md5.c,v 1.35 2006/01/17 15:35:57 phk Exp $
10 * Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All
13 * RSA Data Security, Inc. makes no representations concerning either
14 * the merchantability of this software or the suitability of this
15 * software for any particular purpose. It is provided "as is"
16 * without express or implied warranty of any kind.
18 * These notices must be retained in any copies of any part of this
19 * documentation and/or software.
23 #include <sys/types.h>
26 #include <sys/resource.h>
43 * Length of test block, number of test blocks.
45 #define TEST_BLOCK_LEN 10000
46 #define TEST_BLOCK_COUNT 100000
53 typedef void (DIGEST_Init
)(void *);
54 typedef void (DIGEST_Update
)(void *, const unsigned char *, size_t);
55 typedef char *(DIGEST_End
)(void *, char *);
57 extern const char *MD5TestOutput
[MDTESTCOUNT
];
58 extern const char *SHA1_TestOutput
[MDTESTCOUNT
];
59 extern const char *SHA256_TestOutput
[MDTESTCOUNT
];
60 extern const char *RIPEMD160_TestOutput
[MDTESTCOUNT
];
62 typedef struct Algorithm_t
{
65 const char *(*TestOutput
)[MDTESTCOUNT
];
67 DIGEST_Update
*Update
;
69 char *(*Data
)(const void *, unsigned int, char *);
70 char *(*File
)(const char *, char *);
73 static void MDString(Algorithm_t
*, const char *);
74 static void MDTimeTrial(Algorithm_t
*);
75 static void MDTestSuite(Algorithm_t
*);
76 static void MDFilter(Algorithm_t
*, int);
77 static void usage(int excode
);
83 RIPEMD160_CTX ripemd160
;
86 /* max(MD5_DIGEST_LENGTH, SHA_DIGEST_LENGTH,
87 SHA256_DIGEST_LENGTH, RIPEMD160_DIGEST_LENGTH)*2+1 */
88 #define HEX_DIGEST_LENGTH 65
90 /* algorithm function table */
92 struct Algorithm_t Algorithm
[] = {
93 { "md5", "MD5", &MD5TestOutput
, (DIGEST_Init
*)&MD5Init
,
94 (DIGEST_Update
*)&MD5Update
, (DIGEST_End
*)&MD5End
,
96 { "sha1", "SHA1", &SHA1_TestOutput
, (DIGEST_Init
*)&SHA1_Init
,
97 (DIGEST_Update
*)&SHA1_Update
, (DIGEST_End
*)&SHA1_End
,
98 &SHA1_Data
, &SHA1_File
},
99 { "sha256", "SHA256", &SHA256_TestOutput
, (DIGEST_Init
*)&SHA256_Init
,
100 (DIGEST_Update
*)&SHA256_Update
, (DIGEST_End
*)&SHA256_End
,
101 &SHA256_Data
, &SHA256_File
},
102 { "rmd160", "RMD160", &RIPEMD160_TestOutput
,
103 (DIGEST_Init
*)&RIPEMD160_Init
, (DIGEST_Update
*)&RIPEMD160_Update
,
104 (DIGEST_End
*)&RIPEMD160_End
, &RIPEMD160_Data
, &RIPEMD160_File
}
108 * There is no need to use a huge mmap, just pick something
111 #define MAXMMAP (32*1024*1024)
114 digestfile(const char *fname
, char *buf
, const Algorithm_t
*alg
,
115 off_t
*beginp
, off_t
*endp
)
123 off_t end
= *endp
, begin
= *beginp
;
126 fd
= open(fname
, O_RDONLY
);
128 warn("can't open %s", fname
);
132 if (fstat(fd
, &st
) == -1) {
133 warn("can't fstat %s after opening", fname
);
137 /* Non-positive end means, it has to be counted from the back: */
140 /* Negative begin means, it has to be counted from the back: */
144 if (begin
< 0 || end
< 0 || begin
> st
.st_size
|| end
> st
.st_size
) {
145 warnx("%s is %jd bytes long, not large enough for the "
146 "specified offsets [%jd-%jd]", fname
,
147 (intmax_t)st
.st_size
,
148 (intmax_t)*beginp
, (intmax_t)*endp
);
152 warnx("%s is %jd bytes long. Begin-offset %jd (%jd) is "
153 "larger than end-offset %jd (%jd)",
154 fname
, (intmax_t)st
.st_size
,
155 (intmax_t)begin
, (intmax_t)*beginp
,
156 (intmax_t)end
, (intmax_t)*endp
);
165 pagesize
= getpagesize();
170 if (end
- begin
> MAXMMAP
)
175 map
= mmap(NULL
, size
, PROT_READ
, MAP_NOCORE
, fd
, begin
);
176 if (map
== MAP_FAILED
) {
177 warn("mmaping of %s between %jd and %jd ",
178 fname
, (intmax_t)begin
, (intmax_t)begin
+ size
);
182 * Try to give kernel a hint. Not that it
183 * cares at the time of this writing :-(
186 madvise(map
, size
, MADV_SEQUENTIAL
);
187 alg
->Update(&context
, map
, size
);
190 } while (begin
< end
);
192 result
= alg
->End(&context
, buf
);
200 parseint(const char *arg
)
202 double result
; /* Use double to allow things like 0.5Kb */
205 result
= strtod(arg
, &endp
);
209 result
*= 1024; /* FALLTHROUGH */
212 result
*= 1024; /* FALLTHROUGH */
216 if (endp
[1] == 'b' || endp
[1] == 'B')
218 result
*= 1024; /* FALLTHROUGH */
222 warnx("%c (%d): unrecognized suffix", endp
[0], (int)endp
[0]);
230 errx(EX_USAGE
, "`%s' is not a valid offset.", arg
);
235 Arguments (may be any combination):
236 -sstring - digests string
238 -x - runs test script
239 filename - digests file
240 (none) - digests standard input
243 main(int argc
, char *argv
[])
247 char buf
[HEX_DIGEST_LENGTH
];
248 int failed
, useoffsets
= 0;
249 off_t begin
= 0, end
= 0; /* To shut compiler warning */
251 const char* progname
;
253 if ((progname
= strrchr(argv
[0], '/')) == NULL
)
258 for (digest
= 0; digest
< sizeof(Algorithm
)/sizeof(*Algorithm
); digest
++)
259 if (strcasecmp(Algorithm
[digest
].progname
, progname
) == 0)
262 if (digest
== sizeof(Algorithm
)/sizeof(*Algorithm
))
266 while ((ch
= getopt(argc
, argv
, "hb:e:pqrs:tx")) != -1) {
269 begin
= parseint(optarg
);
273 end
= parseint(optarg
);
277 MDFilter(&Algorithm
[digest
], 1);
287 MDString(&Algorithm
[digest
], optarg
);
290 MDTimeTrial(&Algorithm
[digest
]);
293 MDTestSuite(&Algorithm
[digest
]);
307 p
= digestfile(*argv
, buf
, Algorithm
+ digest
,
310 p
= Algorithm
[digest
].File(*argv
, buf
);
312 /* digestfile() outputs its own diagnostics */
321 printf("%s %s[%jd-%jd]\n",
328 } else if (useoffsets
) {
329 printf("%s (%s[%jd-%jd]) = %s\n",
330 Algorithm
[digest
].name
, *argv
,
335 printf("%s (%s) = %s\n",
336 Algorithm
[digest
].name
,
341 } else if (!sflag
&& (optind
== 1 || qflag
|| rflag
))
342 MDFilter(&Algorithm
[digest
], 0);
350 * Digests a string and prints the result.
353 MDString(Algorithm_t
*alg
, const char *string
)
355 size_t len
= strlen(string
);
356 char buf
[HEX_DIGEST_LENGTH
];
359 printf("%s\n", alg
->Data(string
, len
, buf
));
361 printf("%s \"%s\"\n", alg
->Data(string
, len
, buf
), string
);
363 printf("%s (\"%s\") = %s\n", alg
->name
, string
, alg
->Data(string
, len
, buf
));
366 * Measures the time to digest TEST_BLOCK_COUNT TEST_BLOCK_LEN-byte blocks.
369 MDTimeTrial(Algorithm_t
*alg
)
372 struct rusage before
, after
;
373 struct timeval total
;
375 unsigned char block
[TEST_BLOCK_LEN
];
377 char *p
, buf
[HEX_DIGEST_LENGTH
];
380 ("%s time trial. Digesting %d %d-byte blocks ...",
381 alg
->name
, TEST_BLOCK_COUNT
, TEST_BLOCK_LEN
);
384 /* Initialize block */
385 for (i
= 0; i
< TEST_BLOCK_LEN
; i
++)
386 block
[i
] = (unsigned char) (i
& 0xff);
389 getrusage(0, &before
);
393 for (i
= 0; i
< TEST_BLOCK_COUNT
; i
++)
394 alg
->Update(&context
, block
, TEST_BLOCK_LEN
);
395 p
= alg
->End(&context
, buf
);
398 getrusage(0, &after
);
399 timersub(&after
.ru_utime
, &before
.ru_utime
, &total
);
400 seconds
= total
.tv_sec
+ (float) total
.tv_usec
/ 1000000;
403 printf("Digest = %s", p
);
404 printf("\nTime = %f seconds\n", seconds
);
406 ("Speed = %f bytes/second\n",
407 (float) TEST_BLOCK_LEN
* (float) TEST_BLOCK_COUNT
/ seconds
);
410 * Digests a reference suite of strings and prints the results.
413 const char *MDTestInput
[MDTESTCOUNT
] = {
418 "abcdefghijklmnopqrstuvwxyz",
419 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
420 "12345678901234567890123456789012345678901234567890123456789012345678901234567890",
421 "MD5 has not yet (2001-09-03) been broken, but sufficient attacks have been made \
422 that its security is in some doubt"
425 const char *MD5TestOutput
[MDTESTCOUNT
] = {
426 "d41d8cd98f00b204e9800998ecf8427e",
427 "0cc175b9c0f1b6a831c399e269772661",
428 "900150983cd24fb0d6963f7d28e17f72",
429 "f96b697d7cb7938d525a2f31aaf161d0",
430 "c3fcd3d76192e4007dfb496cca67e13b",
431 "d174ab98d277d9f5a5611c2c9f419d9f",
432 "57edf4a22be3c955ac49da2e2107b67a",
433 "b50663f41d44d92171cb9976bc118538"
436 const char *SHA1_TestOutput
[MDTESTCOUNT
] = {
437 "da39a3ee5e6b4b0d3255bfef95601890afd80709",
438 "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8",
439 "a9993e364706816aba3e25717850c26c9cd0d89d",
440 "c12252ceda8be8994d5fa0290a47231c1d16aae3",
441 "32d10c7b8cf96570ca04ce37f2a19d84240d3a89",
442 "761c457bf73b14d27e9e9265c46f4b4dda11f940",
443 "50abf5706a150990a08b2c5ea40fa0e585554732",
444 "18eca4333979c4181199b7b4fab8786d16cf2846"
447 const char *SHA256_TestOutput
[MDTESTCOUNT
] = {
448 "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
449 "ca978112ca1bbdcafac231b39a23dc4da786eff8147c4e72b9807785afee48bb",
450 "ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad",
451 "f7846f55cf23e14eebeab5b4e1550cad5b509e3348fbc4efa3a1413d393cb650",
452 "71c480df93d6ae2f1efad1447c66c9525e316218cf51fc8d9ed832f2daf18b73",
453 "db4bfcbd4da0cd85a60c3c37d3fbd8805c77f15fc6b1fdfe614ee0a7c8fdb4c0",
454 "f371bc4a311f2b009eef952dd83ca80e2b60026c8e935592d0f9c308453c813e",
455 "e6eae09f10ad4122a0e2a4075761d185a272ebd9f5aa489e998ff2f09cbfdd9f"
458 const char *RIPEMD160_TestOutput
[MDTESTCOUNT
] = {
459 "9c1185a5c5e9fc54612808977ee8f548b2258d31",
460 "0bdc9d2d256b3ee9daae347be6f4dc835a467ffe",
461 "8eb208f7e05d987a9b044a8e98c6b087f15a0bfc",
462 "5d0689ef49d2fae572b881b123a85ffa21595f36",
463 "f71c27109c692c1b56bbdceb5b9d2865b3708dbc",
464 "b0e20b6e3116640286ed3a87a5713079b21f5189",
465 "9b752e45573d4b39f4dbd3323cab82bf63326bfb",
466 "5feb69c6bf7c29d95715ad55f57d8ac5b2b7dd32"
470 MDTestSuite(Algorithm_t
*alg
)
473 char buffer
[HEX_DIGEST_LENGTH
];
475 printf("%s test suite:\n", alg
->name
);
476 for (i
= 0; i
< MDTESTCOUNT
; i
++) {
477 (*alg
->Data
)(MDTestInput
[i
], strlen(MDTestInput
[i
]), buffer
);
478 printf("%s (\"%s\") = %s", alg
->name
, MDTestInput
[i
], buffer
);
479 if (strcmp(buffer
, (*alg
->TestOutput
)[i
]) == 0)
480 printf(" - verified correct\n");
482 printf(" - INCORRECT RESULT!\n");
487 * Digests the standard input and prints the result.
490 MDFilter(Algorithm_t
*alg
, int tee
)
494 unsigned char buffer
[BUFSIZ
];
495 char buf
[HEX_DIGEST_LENGTH
];
498 while ((len
= fread(buffer
, 1, BUFSIZ
, stdin
))) {
499 if (tee
&& len
!= fwrite(buffer
, 1, len
, stdout
))
501 alg
->Update(&context
, buffer
, len
);
503 printf("%s\n", alg
->End(&context
, buf
));
509 fprintf(stderr
, "usage:\n\t%s [-pqrtx] [-b offset] [-e offset] "
510 "[-s string] [files ...]\n", getprogname());