@@ -4,6 +4,7 @@
[userv-utils] / ipif / blowfishtest.c
1 /*
2 * test program for blowfish; very hard to use (sorry!)
3 */
4 /*
5 * Copyright (C) 1997,2000 Ian Jackson
6 *
7 * This is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with userv-utils; if not, write to the Free Software
19 * Foundation, 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
20 */
21
22 #include <stdio.h>
23 #include <string.h>
24 #include <stdlib.h>
25 #include <assert.h>
26
27 #include "blowfish.h"
28 #include "hex.h"
29
30 int main(void) {
31 char buf[200], keybuf[200], plainbuf[200], cipherbuf[200], comparebuf[200], ivbuf[200];
32 char keytxt[sizeof(buf)+1], plaintxt[sizeof(buf)+1], ciphertxt[sizeof(buf)+1];
33 uint8_t key[BLOWFISH_MAXKEYBYTES*2], plain[100], cipher[100], compare[100];
34 uint8_t iv[BLOWFISH_BLOCKBYTES];
35 int keysz, plainsz, ciphersz, cskey, csiv, csplain, i;
36 struct blowfish_expandedkey ek;
37 struct blowfish_cbc_state cs;
38
39 setvbuf(stdout,0,_IOLBF,BUFSIZ);
40 buf[sizeof(buf)-2]=0;
41 keytxt[sizeof(buf)]= 0;
42 plaintxt[sizeof(buf)]= 0;
43 ciphertxt[sizeof(buf)]= 0;
44 cskey= csiv= csplain= 0;
45 while (fgets(buf,sizeof(buf),stdin)) {
46 if (buf[sizeof(buf)-2]) { fprintf(stderr,"line too long %s...\n",buf); exit(1); }
47 if (sscanf(buf,"ecb %s %s %s\n",keytxt,plaintxt,ciphertxt) ==3) {
48 unhex("ecb key",keytxt,key,&keysz,1,sizeof(key));
49 unhex("ecb plain",plaintxt,plain,0,BLOWFISH_BLOCKBYTES,BLOWFISH_BLOCKBYTES);
50 unhex("ecb cipher",ciphertxt,cipher,0,BLOWFISH_BLOCKBYTES,BLOWFISH_BLOCKBYTES);
51 printf("ecb %s %s %s\n",
52 tohex(key,keysz,keybuf),
53 tohex(plain,BLOWFISH_BLOCKBYTES,plainbuf),
54 tohex(cipher,BLOWFISH_BLOCKBYTES,cipherbuf));
55 blowfish_loadkey(&ek,key,keysz);
56 blowfish_encrypt(&ek,plain,compare);
57 if (memcmp(cipher,compare,BLOWFISH_BLOCKBYTES)) {
58 fprintf(stderr,"encryption mismatch - got %s\n",
59 tohex(compare,BLOWFISH_BLOCKBYTES,comparebuf));
60 exit(1);
61 }
62 blowfish_decrypt(&ek,cipher,compare);
63 if (memcmp(plain,compare,BLOWFISH_BLOCKBYTES)) {
64 fprintf(stderr,"decryption mismatch - got %s\n",
65 tohex(compare,BLOWFISH_BLOCKBYTES,comparebuf));
66 exit(1);
67 }
68 } else if (sscanf(buf,"key %s\n",keytxt)) {
69 unhex("key",keytxt,key,&keysz,1,sizeof(key));
70 blowfish_loadkey(&cs.ek,key,keysz);
71 cskey= 1;
72 } else if (sscanf(buf,"iv %s\n",keytxt)) {
73 unhex("iv",keytxt,iv,0,BLOWFISH_BLOCKBYTES,BLOWFISH_BLOCKBYTES);
74 csiv= 1;
75 } else if (sscanf(buf,"plain %s\n",plaintxt)) {
76 unhex("plain",plaintxt,plain,&plainsz,0,sizeof(plain));
77 csplain= 1;
78 } else if (sscanf(buf,"cbc %s\n",ciphertxt)) {
79 if (!cskey || !csiv || !csplain) {
80 fprintf(stderr,"failed to specify%s%s%s\n",
81 cskey ? "" : " key",
82 csiv ? "" : " iv",
83 csplain ? "" : " plain");
84 exit(1);
85 }
86 unhex("cbc cipher",ciphertxt,cipher,&ciphersz,0,sizeof(cipher));
87 printf("key %s\niv %s\nplain %s\ncipher %s\n",
88 tohex(key,keysz,keybuf),
89 tohex(iv,BLOWFISH_BLOCKBYTES,ivbuf),
90 tohex(plain,plainsz,plainbuf),
91 tohex(cipher,ciphersz,cipherbuf));
92 if (plainsz % BLOWFISH_BLOCKBYTES ||
93 ciphersz % BLOWFISH_BLOCKBYTES ||
94 plainsz != ciphersz) {
95 fprintf(stderr,"size mismatch plain=%d cipher=%d block=%d\n",
96 plainsz,ciphersz,BLOWFISH_BLOCKBYTES);
97 exit(1);
98 }
99 blowfish_cbc_setiv(&cs,iv);
100 for (i=0; i<plainsz; i+=BLOWFISH_BLOCKBYTES)
101 blowfish_cbc_decrypt(&cs,cipher+i,compare+i);
102 if (memcmp(plain,compare,BLOWFISH_BLOCKBYTES)) {
103 fprintf(stderr,"decryption mismatch - got %s\n",
104 tohex(compare,plainsz,comparebuf));
105 exit(1);
106 }
107 blowfish_cbc_setiv(&cs,iv);
108 for (i=0; i<plainsz; i+=BLOWFISH_BLOCKBYTES)
109 blowfish_cbc_encrypt(&cs,plain+i,compare+i);
110 if (memcmp(cipher,compare,BLOWFISH_BLOCKBYTES)) {
111 fprintf(stderr,"encryption mismatch - got %s\n",
112 tohex(compare,plainsz,comparebuf));
113 exit(1);
114 }
115 } else if (buf[0]=='#' || buf[0]=='\n') {
116 } else {
117 fprintf(stderr,"huh ? %s",buf);
118 }
119 }
120 if (ferror(stdin)) { perror("stdin"); exit(1); }
121 return 0;
122 }