Squash using #if 0 a longstanding TODO to avoid warnings
[heimdal.git] / lib / hcrypto / test_cipher.c
blobc566e4bfd0062cca027e29073174b97849319050
1 /*
2 * Copyright (c) 2006-2016 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include <config.h>
35 #include <roken.h>
37 #define HC_DEPRECATED_CRYPTO
39 #include <getarg.h>
41 #include <evp.h>
42 #include <evp-hcrypto.h>
43 #include <evp-cc.h>
44 #if defined(_WIN32)
45 #include <evp-w32.h>
46 #endif
47 #include <evp-pkcs11.h>
48 #include <evp-openssl.h>
49 #include <hex.h>
50 #include <err.h>
52 struct tests {
53 const char *name;
54 void *key;
55 size_t keysize;
56 void *iv;
57 size_t datasize;
58 void *indata;
59 void *outdata;
60 void *outiv;
63 struct tests aes_tests[] = {
64 { "aes-256",
65 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
66 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
67 32,
68 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
69 16,
70 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
71 "\xdc\x95\xc0\x78\xa2\x40\x89\x89\xad\x48\xa2\x14\x92\x84\x20\x87",
72 NULL
76 struct tests aes_cfb_tests[] = {
77 { "aes-cfb8-128",
78 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
79 16,
80 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
81 16,
82 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
83 "\x66\x16\xf9\x2e\x42\xa8\xf1\x1a\x91\x16\x68\x57\x8e\xc3\xaa\x0f",
84 NULL
89 struct tests rc2_tests[] = {
90 { "rc2",
91 "\x88\xbc\xa9\x0e\x90\x87\x5a\x7f\x0f\x79\xc3\x84\x62\x7b\xaf\xb2",
92 16,
93 "\x00\x00\x00\x00\x00\x00\x00\x00",
95 "\x00\x00\x00\x00\x00\x00\x00\x00",
96 "\x22\x69\x55\x2a\xb0\xf8\x5c\xa6",
97 NULL
102 struct tests rc2_40_tests[] = {
103 { "rc2-40",
104 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
106 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
108 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
109 "\xc0\xb8\xff\xa5\xd6\xeb\xc9\x62\xcc\x52\x5f\xfe\x9a\x3c\x97\xe6",
110 NULL
114 struct tests des_ede3_tests[] = {
115 { "des-ede3",
116 "\x19\x17\xff\xe6\xbb\x77\x2e\xfc"
117 "\x29\x76\x43\xbc\x63\x56\x7e\x9a"
118 "\x00\x2e\x4d\x43\x1d\x5f\xfd\x58",
120 "\xbf\x9a\x12\xb7\x26\x69\xfd\x05",
122 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
123 "\x55\x95\x97\x76\xa9\x6c\x66\x40\x64\xc7\xf4\x1c\x21\xb7\x14\x1b",
124 NULL
128 struct tests camellia128_tests[] = {
129 { "camellia128",
130 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
132 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
134 "\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
135 "\x07\x92\x3A\x39\xEB\x0A\x81\x7D\x1C\x4D\x87\xBD\xB8\x2D\x1F\x1C",
136 NULL
140 struct tests rc4_tests[] = {
142 "rc4 8",
143 "\x01\x23\x45\x67\x89\xAB\xCD\xEF",
145 NULL,
147 "\x00\x00\x00\x00\x00\x00\x00\x00",
148 "\x74\x94\xC2\xE7\x10\x4B\x08\x79",
149 NULL
152 "rc4 5",
153 "\x61\x8a\x63\xd2\xfb",
155 NULL,
157 "\xdc\xee\x4c\xf9\x2c",
158 "\xf1\x38\x29\xc9\xde",
159 NULL
162 "rc4 309",
163 "\x29\x04\x19\x72\xfb\x42\xba\x5f\xc7\x12\x77\x12\xf1\x38\x29\xc9",
165 NULL,
166 309,
167 "\x52\x75\x69\x73\x6c\x69\x6e\x6e"
168 "\x75\x6e\x20\x6c\x61\x75\x6c\x75"
169 "\x20\x6b\x6f\x72\x76\x69\x73\x73"
170 "\x73\x61\x6e\x69\x2c\x20\x74\xe4"
171 "\x68\x6b\xe4\x70\xe4\x69\x64\x65"
172 "\x6e\x20\x70\xe4\xe4\x6c\x6c\xe4"
173 "\x20\x74\xe4\x79\x73\x69\x6b\x75"
174 "\x75\x2e\x20\x4b\x65\x73\xe4\x79"
175 "\xf6\x6e\x20\x6f\x6e\x20\x6f\x6e"
176 "\x6e\x69\x20\x6f\x6d\x61\x6e\x61"
177 "\x6e\x69\x2c\x20\x6b\x61\x73\x6b"
178 "\x69\x73\x61\x76\x75\x75\x6e\x20"
179 "\x6c\x61\x61\x6b\x73\x6f\x74\x20"
180 "\x76\x65\x72\x68\x6f\x75\x75\x2e"
181 "\x20\x45\x6e\x20\x6d\x61\x20\x69"
182 "\x6c\x6f\x69\x74\x73\x65\x2c\x20"
183 "\x73\x75\x72\x65\x20\x68\x75\x6f"
184 "\x6b\x61\x61\x2c\x20\x6d\x75\x74"
185 "\x74\x61\x20\x6d\x65\x74\x73\xe4"
186 "\x6e\x20\x74\x75\x6d\x6d\x75\x75"
187 "\x73\x20\x6d\x75\x6c\x6c\x65\x20"
188 "\x74\x75\x6f\x6b\x61\x61\x2e\x20"
189 "\x50\x75\x75\x6e\x74\x6f\x20\x70"
190 "\x69\x6c\x76\x65\x6e\x2c\x20\x6d"
191 "\x69\x20\x68\x75\x6b\x6b\x75\x75"
192 "\x2c\x20\x73\x69\x69\x6e\x74\x6f"
193 "\x20\x76\x61\x72\x61\x6e\x20\x74"
194 "\x75\x75\x6c\x69\x73\x65\x6e\x2c"
195 "\x20\x6d\x69\x20\x6e\x75\x6b\x6b"
196 "\x75\x75\x2e\x20\x54\x75\x6f\x6b"
197 "\x73\x75\x74\x20\x76\x61\x6e\x61"
198 "\x6d\x6f\x6e\x20\x6a\x61\x20\x76"
199 "\x61\x72\x6a\x6f\x74\x20\x76\x65"
200 "\x65\x6e\x2c\x20\x6e\x69\x69\x73"
201 "\x74\xe4\x20\x73\x79\x64\xe4\x6d"
202 "\x65\x6e\x69\x20\x6c\x61\x75\x6c"
203 "\x75\x6e\x20\x74\x65\x65\x6e\x2e"
204 "\x20\x2d\x20\x45\x69\x6e\x6f\x20"
205 "\x4c\x65\x69\x6e\x6f",
206 "\x35\x81\x86\x99\x90\x01\xe6\xb5"
207 "\xda\xf0\x5e\xce\xeb\x7e\xee\x21"
208 "\xe0\x68\x9c\x1f\x00\xee\xa8\x1f"
209 "\x7d\xd2\xca\xae\xe1\xd2\x76\x3e"
210 "\x68\xaf\x0e\xad\x33\xd6\x6c\x26"
211 "\x8b\xc9\x46\xc4\x84\xfb\xe9\x4c"
212 "\x5f\x5e\x0b\x86\xa5\x92\x79\xe4"
213 "\xf8\x24\xe7\xa6\x40\xbd\x22\x32"
214 "\x10\xb0\xa6\x11\x60\xb7\xbc\xe9"
215 "\x86\xea\x65\x68\x80\x03\x59\x6b"
216 "\x63\x0a\x6b\x90\xf8\xe0\xca\xf6"
217 "\x91\x2a\x98\xeb\x87\x21\x76\xe8"
218 "\x3c\x20\x2c\xaa\x64\x16\x6d\x2c"
219 "\xce\x57\xff\x1b\xca\x57\xb2\x13"
220 "\xf0\xed\x1a\xa7\x2f\xb8\xea\x52"
221 "\xb0\xbe\x01\xcd\x1e\x41\x28\x67"
222 "\x72\x0b\x32\x6e\xb3\x89\xd0\x11"
223 "\xbd\x70\xd8\xaf\x03\x5f\xb0\xd8"
224 "\x58\x9d\xbc\xe3\xc6\x66\xf5\xea"
225 "\x8d\x4c\x79\x54\xc5\x0c\x3f\x34"
226 "\x0b\x04\x67\xf8\x1b\x42\x59\x61"
227 "\xc1\x18\x43\x07\x4d\xf6\x20\xf2"
228 "\x08\x40\x4b\x39\x4c\xf9\xd3\x7f"
229 "\xf5\x4b\x5f\x1a\xd8\xf6\xea\x7d"
230 "\xa3\xc5\x61\xdf\xa7\x28\x1f\x96"
231 "\x44\x63\xd2\xcc\x35\xa4\xd1\xb0"
232 "\x34\x90\xde\xc5\x1b\x07\x11\xfb"
233 "\xd6\xf5\x5f\x79\x23\x4d\x5b\x7c"
234 "\x76\x66\x22\xa6\x6d\xe9\x2b\xe9"
235 "\x96\x46\x1d\x5e\x4d\xc8\x78\xef"
236 "\x9b\xca\x03\x05\x21\xe8\x35\x1e"
237 "\x4b\xae\xd2\xfd\x04\xf9\x46\x73"
238 "\x68\xc4\xad\x6a\xc1\x86\xd0\x82"
239 "\x45\xb2\x63\xa2\x66\x6d\x1f\x6c"
240 "\x54\x20\xf1\x59\x9d\xfd\x9f\x43"
241 "\x89\x21\xc2\xf5\xa4\x63\x93\x8c"
242 "\xe0\x98\x22\x65\xee\xf7\x01\x79"
243 "\xbc\x55\x3f\x33\x9e\xb1\xa4\xc1"
244 "\xaf\x5f\x6a\x54\x7f",
245 NULL
250 static int
251 test_cipher(int i, const EVP_CIPHER *c, struct tests *t)
253 EVP_CIPHER_CTX ectx;
254 EVP_CIPHER_CTX dctx;
255 void *d;
257 if (c == NULL) {
258 printf("%s not supported\n", t->name);
259 return 0;
262 EVP_CIPHER_CTX_init(&ectx);
263 EVP_CIPHER_CTX_init(&dctx);
265 if (EVP_CipherInit_ex(&ectx, c, NULL, NULL, NULL, 1) != 1)
266 errx(1, "%s: %d EVP_CipherInit_ex einit", t->name, i);
267 if (EVP_CipherInit_ex(&dctx, c, NULL, NULL, NULL, 0) != 1)
268 errx(1, "%s: %d EVP_CipherInit_ex dinit", t->name, i);
270 EVP_CIPHER_CTX_set_key_length(&ectx, t->keysize);
271 EVP_CIPHER_CTX_set_key_length(&dctx, t->keysize);
273 if (EVP_CipherInit_ex(&ectx, NULL, NULL, t->key, t->iv, 1) != 1)
274 errx(1, "%s: %d EVP_CipherInit_ex encrypt", t->name, i);
275 if (EVP_CipherInit_ex(&dctx, NULL, NULL, t->key, t->iv, 0) != 1)
276 errx(1, "%s: %d EVP_CipherInit_ex decrypt", t->name, i);
278 d = emalloc(t->datasize);
280 if (!EVP_Cipher(&ectx, d, t->indata, t->datasize))
281 errx(1, "%s: %d EVP_Cipher encrypt failed", t->name, i);
283 if (memcmp(d, t->outdata, t->datasize) != 0) {
284 char *s, *s2;
285 hex_encode(d, t->datasize, &s);
286 hex_encode(t->outdata, t->datasize, &s2);
287 errx(1, "%s: %d encrypt not the same: %s != %s", t->name, i, s, s2);
290 if (!EVP_Cipher(&dctx, d, d, t->datasize))
291 errx(1, "%s: %d EVP_Cipher decrypt failed", t->name, i);
293 if (memcmp(d, t->indata, t->datasize) != 0) {
294 char *s;
295 hex_encode(d, t->datasize, &s);
296 errx(1, "%s: %d decrypt not the same: %s", t->name, i, s);
299 #if 0 /* TODO */
300 if (t->outiv)
301 /* XXXX check */;
302 #endif
304 EVP_CIPHER_CTX_cleanup(&ectx);
305 EVP_CIPHER_CTX_cleanup(&dctx);
306 free(d);
308 return 0;
311 static int version_flag;
312 static int help_flag;
314 static struct getargs args[] = {
315 { "version", 0, arg_flag, &version_flag,
316 "print version", NULL },
317 { "help", 0, arg_flag, &help_flag,
318 NULL, NULL }
321 static void
322 usage (int ret)
324 arg_printusage (args,
325 sizeof(args)/sizeof(*args),
326 NULL,
327 "");
328 exit (ret);
332 main(int argc, char **argv)
334 int ret = 0;
335 int i, idx = 0;
337 setprogname(argv[0]);
339 if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &idx))
340 usage(1);
342 if (help_flag)
343 usage(0);
345 if(version_flag){
346 print_version(NULL);
347 exit(0);
350 argc -= idx;
351 argv += idx;
353 /* hcrypto */
354 for (i = 0; i < sizeof(aes_tests)/sizeof(aes_tests[0]); i++)
355 ret += test_cipher(i, EVP_hcrypto_aes_256_cbc(), &aes_tests[i]);
356 for (i = 0; i < sizeof(aes_cfb_tests)/sizeof(aes_cfb_tests[0]); i++)
357 ret += test_cipher(i, EVP_hcrypto_aes_128_cfb8(), &aes_cfb_tests[i]);
358 for (i = 0; i < sizeof(rc2_tests)/sizeof(rc2_tests[0]); i++)
359 ret += test_cipher(i, EVP_hcrypto_rc2_cbc(), &rc2_tests[i]);
360 for (i = 0; i < sizeof(rc2_40_tests)/sizeof(rc2_40_tests[0]); i++)
361 ret += test_cipher(i, EVP_hcrypto_rc2_40_cbc(), &rc2_40_tests[i]);
362 for (i = 0; i < sizeof(des_ede3_tests)/sizeof(des_ede3_tests[0]); i++)
363 ret += test_cipher(i, EVP_hcrypto_des_ede3_cbc(), &des_ede3_tests[i]);
364 for (i = 0; i < sizeof(camellia128_tests)/sizeof(camellia128_tests[0]); i++)
365 ret += test_cipher(i, EVP_hcrypto_camellia_128_cbc(),
366 &camellia128_tests[i]);
367 for (i = 0; i < sizeof(rc4_tests)/sizeof(rc4_tests[0]); i++)
368 ret += test_cipher(i, EVP_hcrypto_rc4(), &rc4_tests[i]);
370 /* Common Crypto */
371 #ifdef __APPLE__
372 for (i = 0; i < sizeof(aes_tests)/sizeof(aes_tests[0]); i++)
373 ret += test_cipher(i, EVP_cc_aes_256_cbc(), &aes_tests[i]);
374 for (i = 0; i < sizeof(aes_cfb_tests)/sizeof(aes_cfb_tests[0]); i++)
375 ret += test_cipher(i, EVP_cc_aes_128_cfb8(), &aes_cfb_tests[i]);
376 for (i = 0; i < sizeof(rc2_40_tests)/sizeof(rc2_40_tests[0]); i++)
377 ret += test_cipher(i, EVP_cc_rc2_40_cbc(), &rc2_40_tests[i]);
378 for (i = 0; i < sizeof(des_ede3_tests)/sizeof(des_ede3_tests[0]); i++)
379 ret += test_cipher(i, EVP_cc_des_ede3_cbc(), &des_ede3_tests[i]);
380 for (i = 0; i < sizeof(camellia128_tests)/sizeof(camellia128_tests[0]); i++)
381 ret += test_cipher(i, EVP_cc_camellia_128_cbc(),
382 &camellia128_tests[i]);
383 for (i = 0; i < sizeof(rc4_tests)/sizeof(rc4_tests[0]); i++)
384 ret += test_cipher(i, EVP_cc_rc4(), &rc4_tests[i]);
385 #endif /* __APPLE__ */
387 /* Windows CNG (if available) */
388 #ifdef WIN32
389 for (i = 0; i < sizeof(aes_tests)/sizeof(aes_tests[0]); i++)
390 ret += test_cipher(i, EVP_w32crypto_aes_256_cbc(), &aes_tests[i]);
391 for (i = 0; i < sizeof(aes_cfb_tests)/sizeof(aes_cfb_tests[0]); i++)
392 ret += test_cipher(i, EVP_w32crypto_aes_128_cfb8(), &aes_cfb_tests[i]);
393 for (i = 0; i < sizeof(rc2_tests)/sizeof(rc2_tests[0]); i++)
394 ret += test_cipher(i, EVP_w32crypto_rc2_cbc(), &rc2_tests[i]);
395 for (i = 0; i < sizeof(rc2_40_tests)/sizeof(rc2_40_tests[0]); i++)
396 ret += test_cipher(i, EVP_w32crypto_rc2_40_cbc(), &rc2_40_tests[i]);
397 for (i = 0; i < sizeof(des_ede3_tests)/sizeof(des_ede3_tests[0]); i++)
398 ret += test_cipher(i, EVP_w32crypto_des_ede3_cbc(), &des_ede3_tests[i]);
399 for (i = 0; i < sizeof(rc4_tests)/sizeof(rc4_tests[0]); i++)
400 ret += test_cipher(i, EVP_w32crypto_rc4(), &rc4_tests[i]);
401 #endif /* WIN32 */
403 /* PKCS#11 */
404 #if __sun || defined(PKCS11_MODULE_PATH)
405 for (i = 0; i < sizeof(aes_tests)/sizeof(aes_tests[0]); i++)
406 ret += test_cipher(i, EVP_pkcs11_aes_256_cbc(), &aes_tests[i]);
407 for (i = 0; i < sizeof(aes_cfb_tests)/sizeof(aes_cfb_tests[0]); i++)
408 ret += test_cipher(i, EVP_pkcs11_aes_128_cfb8(), &aes_cfb_tests[i]);
409 for (i = 0; i < sizeof(rc2_tests)/sizeof(rc2_tests[0]); i++)
410 ret += test_cipher(i, EVP_pkcs11_rc2_cbc(), &rc2_tests[i]);
411 for (i = 0; i < sizeof(rc2_40_tests)/sizeof(rc2_40_tests[0]); i++)
412 ret += test_cipher(i, EVP_pkcs11_rc2_40_cbc(), &rc2_40_tests[i]);
413 for (i = 0; i < sizeof(des_ede3_tests)/sizeof(des_ede3_tests[0]); i++)
414 ret += test_cipher(i, EVP_pkcs11_des_ede3_cbc(), &des_ede3_tests[i]);
415 for (i = 0; i < sizeof(rc4_tests)/sizeof(rc4_tests[0]); i++)
416 ret += test_cipher(i, EVP_pkcs11_rc4(), &rc4_tests[i]);
417 #endif /* PKCS11_MODULE_PATH */
419 /* OpenSSL */
420 #ifdef HAVE_HCRYPTO_W_OPENSSL
421 for (i = 0; i < sizeof(aes_tests)/sizeof(aes_tests[0]); i++)
422 ret += test_cipher(i, EVP_ossl_aes_256_cbc(), &aes_tests[i]);
423 for (i = 0; i < sizeof(aes_cfb_tests)/sizeof(aes_cfb_tests[0]); i++)
424 ret += test_cipher(i, EVP_ossl_aes_128_cfb8(), &aes_cfb_tests[i]);
425 for (i = 0; i < sizeof(rc2_tests)/sizeof(rc2_tests[0]); i++)
426 ret += test_cipher(i, EVP_ossl_rc2_cbc(), &rc2_tests[i]);
427 for (i = 0; i < sizeof(rc2_40_tests)/sizeof(rc2_40_tests[0]); i++)
428 ret += test_cipher(i, EVP_ossl_rc2_40_cbc(), &rc2_40_tests[i]);
429 for (i = 0; i < sizeof(des_ede3_tests)/sizeof(des_ede3_tests[0]); i++)
430 ret += test_cipher(i, EVP_ossl_des_ede3_cbc(), &des_ede3_tests[i]);
431 for (i = 0; i < sizeof(rc4_tests)/sizeof(rc4_tests[0]); i++)
432 ret += test_cipher(i, EVP_ossl_rc4(), &rc4_tests[i]);
433 #endif /* PKCS11_MODULE_PATH */
435 return ret;