X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=test_crypto.c;h=f9099a278698c6fb7d5dccaf857c59c671e01850;hp=695c4fe249fbe0178f434973ef82a397d36fac77;hb=2b714d273b08b945ef677e0fbbf2c8d3d4437980;hpb=3d841899fe8859b2ce6af8fdfd8fa961c7651425 diff --git a/test_crypto.c b/test_crypto.c index 695c4fe..f9099a2 100644 --- a/test_crypto.c +++ b/test_crypto.c @@ -1,20 +1,36 @@ +/* +Copyright (c) 2013 Eugene Crosser + +This software is provided 'as-is', without any express or implied +warranty. In no event will the authors be held liable for any damages +arising from the use of this software. + +Permission is granted to anyone to use this software for any purpose, +including commercial applications, and to alter it and redistribute it +freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must + not claim that you wrote the original software. If you use this + software in a product, an acknowledgment in the product documentation + would be appreciated but is not required. + + 2. Altered source versions must be plainly marked as such, and must + not be misrepresented as being the original software. + + 3. This notice may not be removed or altered from any source + distribution. +*/ + +#ifdef HAVE_CONFIG_H +# include "config.h" +#endif #include #include #include #include #include "crypto.h" -unsigned char pt[48] = "the quick brown fox jumps over a lazy dog"; -unsigned char key[16] = { -0x0f,0x65,0xd1,0x3a,0xfe,0xcb,0xc4,0xb9,0x52,0xb1,0x60,0xcf,0xe8,0x55,0x6a,0xdd -}; - -static void usage(const char const *cmd) -{ - fprintf(stderr, "usage: %s\n", cmd); -} - -#define printh(p,x) printh_f(p, x, sizeof(x)) +#define printh(x) printh_f(#x, x, sizeof(x)) void printh_f(char *p, unsigned char *x, size_t l) { int i; @@ -23,23 +39,106 @@ void printh_f(char *p, unsigned char *x, size_t l) printf("\n"); } -int main(int argc, char *argv[]) +int test_enc_dec(int iface1, int iface2) { unsigned long err; - unsigned char ct1[48], re1[48]; - unsigned char sha1[20], sha2[20]; - unsigned char hmac1[20], hmac2[20]; - - printf("source: %s\n", pt); - printh("source", pt); - printh("key", key); - if (select_crypto_if(0)) return 1; - if (err = encrypt(key, sizeof(key), pt, ct1, sizeof(pt))) + unsigned char pt[48] = "the quick brown fox jumps over a lazy dog"; + unsigned char key[16] = {0x0f,0x65,0xd1,0x3a,0xfe,0xcb,0xc4,0xb9, + 0x52,0xb1,0x60,0xcf,0xe8,0x55,0x6a,0xdd}; + unsigned char ct[64]; + unsigned char re[48]; + + printf("%d -> %d\n", iface1, iface2); + printh(pt); + printh(key); + if (select_crypto_if(iface1)) return 1; + memset(ct, 0xfe, sizeof(ct)); + if ((err = encrypt(key, sizeof(key), pt, ct, sizeof(pt)))) { printf("encrypt error: %s\n", crypto_errstr(err)); - printh("ct1", ct1); - if (err = decrypt(key, sizeof(key), ct1, re1, sizeof(re1))) + return 1; + } + printh(ct); + if (select_crypto_if(iface2)) return 1; + memset(re, 0xab, sizeof(re)); + if ((err = decrypt(key, sizeof(key), ct, re, sizeof(re)))) { printf("decrypt error: %s\n", crypto_errstr(err)); - printh("re1", re1); - if (select_crypto_if(1)) return 1; + return 1; + } + printh(re); + if (memcmp(pt, re, sizeof(pt))) { + printf("fail\n"); + return 1; + } + return 0; +} + +int test_sha(int iface) +{ + unsigned char sha1[20]; + unsigned long err; + int shalen; + unsigned char spt[3] = "abc"; + unsigned char sstd[20] = {0xA9,0x99,0x3E,0x36,0x47,0x06,0x81,0x6A, + 0xBA,0x3E,0x25,0x71,0x78,0x50,0xC2,0x6C,0x9C,0xD0,0xD8,0x9D}; + + if (select_crypto_if(iface)) return 1; + memset(sha1, 0, sizeof(sha1)); + shalen = sizeof(sha1); + if ((err = hash(spt, sizeof(spt), sha1, &shalen))) { + printf("hash error: %s\n", crypto_errstr(err)); + return 1; + } + printf("%d: len=%d ", iface, shalen); + printh(sha1); + if (memcmp(sha1, sstd, sizeof(sstd))) { + printf("fail\n"); + return 1; + } return 0; } + +int test_hmac(int iface) +{ + unsigned char hmac1[20]; + unsigned long err; + int hmaclen; + unsigned char hpt[28] = "what do ya want for nothing?"; + unsigned char hkey[4] = "Jefe"; + unsigned char hstd[20] = {0xef,0xfc,0xdf,0x6a,0xe5,0xeb,0x2f,0xa2, + 0xd2,0x74,0x16,0xd5,0xf1,0x84,0xdf,0x9c,0x25,0x9a,0x7c,0x79}; + + if (select_crypto_if(iface)) return 1; + memset(hmac1, 0, sizeof(hmac1)); + hmaclen = sizeof(hmac1); + if ((err = hmac(hkey, sizeof(hkey), hpt, sizeof(hpt), + hmac1, &hmaclen))) { + printf("hash error: %s\n", crypto_errstr(err)); + return 1; + } + printf("%d: len=%d ", iface, hmaclen); + printh(hmac1); + if (memcmp(hmac1, hstd, sizeof(hstd))) { + printf("fail\n"); + return 1; + } + return 0; +} + +int main(int argc, char *argv[]) +{ + int rc, maxrc = 0; + int numifs, i, j; + const char *name; + + for (numifs = 0; (name = crypto_init(numifs)); numifs++) + printf("%d: %s\n", numifs, name); + printf("Testing %d interfaces\n\n", numifs); + + for (i = 0; i < numifs; i++) + if ((rc = test_sha(i)) > maxrc) maxrc = rc; + for (i = 0; i < numifs; i++) + if ((rc = test_hmac(i)) > maxrc) maxrc = rc; + for (i = 0; i < numifs; i++) for (j = 0; j < numifs; j++) + if ((rc = test_enc_dec(i,j)) > maxrc) maxrc = rc; + return maxrc; +}