1 /* $NetBSD: mdtest.c,v 1.1.1.2 2014/04/24 12:45:30 pettai Exp $ */
4 * Copyright (c) 1995 - 2002 Kungliga Tekniska Högskolan
5 * (Royal Institute of Technology, Stockholm, Sweden).
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 #define HC_DEPRECATED_CRYPTO
46 #include <krb5/krb5-types.h>
54 #define ONE_MILLION_A "one million a's"
61 void (*update
)(void*, const void*, size_t);
62 void (*final
)(void*, void*);
63 const EVP_MD
* (*evp
)(void);
68 (void (*)(void*))MD2_Init
,
69 (void (*)(void*,const void*, size_t))MD2_Update
,
70 (void (*)(void*, void*))MD2_Final
,
76 (void (*)(void*))MD4_Init
,
77 (void (*)(void*,const void*, size_t))MD4_Update
,
78 (void (*)(void*, void*))MD4_Final
,
84 (void (*)(void*))MD5_Init
,
85 (void (*)(void*,const void*, size_t))MD5_Update
,
86 (void (*)(void*, void*))MD5_Final
,
92 (void (*)(void*))SHA1_Init
,
93 (void (*)(void*,const void*, size_t))SHA1_Update
,
94 (void (*)(void*, void*))SHA1_Final
,
97 struct hash_foo sha256
= {
101 (void (*)(void*))SHA256_Init
,
102 (void (*)(void*,const void*, size_t))SHA256_Update
,
103 (void (*)(void*, void*))SHA256_Final
,
106 struct hash_foo sha384
= {
110 (void (*)(void*))SHA384_Init
,
111 (void (*)(void*,const void*, size_t))SHA384_Update
,
112 (void (*)(void*, void*))SHA384_Final
,
115 struct hash_foo sha512
= {
119 (void (*)(void*))SHA512_Init
,
120 (void (*)(void*,const void*, size_t))SHA512_Update
,
121 (void (*)(void*, void*))SHA512_Final
,
127 unsigned char hash
[64];
130 struct test md2_tests
[] = {
132 "\x83\x50\xe5\xa3\xe2\x4c\x15\x3d\xf2\x27\x5c\x9f\x80\x69\x27\x73" },
134 "\x32\xec\x01\xec\x4a\x6d\xac\x72\xc0\xab\x96\xfb\x34\xc0\xb5\xd1" },
136 "\xda\x85\x3b\x0d\x3f\x88\xd9\x9b\x30\x28\x3a\x69\xe6\xde\xd6\xbb" },
138 "\xab\x4f\x49\x6b\xfb\x2a\x53\x0b\x21\x9f\xf3\x30\x31\xfe\x06\xb0" },
139 {"abcdefghijklmnopqrstuvwxyz",
140 "\x4e\x8d\xdf\xf3\x65\x02\x92\xab\x5a\x41\x08\xc3\xaa\x47\x94\x0b" },
141 {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
142 "\xda\x33\xde\xf2\xa4\x2d\xf1\x39\x75\x35\x28\x46\xc3\x03\x38\xcd" },
143 {"12345678901234567890123456789012345678901234567890123456789012345678901234567890",
144 "\xd5\x97\x6f\x79\xd8\x3d\x3a\x0d\xc9\x80\x6c\x3c\x66\xf3\xef\xd8" },
148 struct test md4_tests
[] = {
150 {0x31, 0xd6, 0xcf, 0xe0, 0xd1, 0x6a, 0xe9, 0x31, 0xb7, 0x3c, 0x59,
151 0xd7, 0xe0, 0xc0, 0x89, 0xc0}},
153 {0xbd, 0xe5, 0x2c, 0xb3, 0x1d, 0xe3, 0x3e, 0x46, 0x24, 0x5e, 0x05,
154 0xfb, 0xdb, 0xd6, 0xfb, 0x24}},
156 {0xa4, 0x48, 0x01, 0x7a, 0xaf, 0x21, 0xd8, 0x52, 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d}},
158 {0xd9, 0x13, 0x0a, 0x81, 0x64, 0x54, 0x9f, 0xe8, 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b}},
159 {"abcdefghijklmnopqrstuvwxyz", {0xd7, 0x9e, 0x1c, 0x30, 0x8a, 0xa5, 0xbb, 0xcd, 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9, }},
160 {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
161 {0x04, 0x3f, 0x85, 0x82, 0xf2, 0x41, 0xdb, 0x35, 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4}},
162 {"12345678901234567890123456789012345678901234567890123456789012345678901234567890",
163 {0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36, }},
166 struct test md5_tests
[] = {
167 {"", {0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04, 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e}},
168 {"a", {0x0c, 0xc1, 0x75, 0xb9, 0xc0, 0xf1, 0xb6, 0xa8, 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61}},
169 {"abc", {0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0, 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72}},
170 {"message digest", {0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0}},
171 {"abcdefghijklmnopqrstuvwxyz", {0xc3, 0xfc, 0xd3, 0xd7, 0x61, 0x92, 0xe4, 0x00, 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b}},
172 {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", {0xd1, 0x74, 0xab, 0x98, 0xd2, 0x77, 0xd9, 0xf5, 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f}},
173 {"12345678901234567890123456789012345678901234567890123456789012345678901234567890", {0x57, 0xed, 0xf4, 0xa2, 0x2b, 0xe3, 0xc9, 0x55, 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a}},
176 struct test sha1_tests
[] = {
178 {0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A,
179 0xBA, 0x3E, 0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C,
180 0x9C, 0xD0, 0xD8, 0x9D}},
181 { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
182 {0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E,
183 0xBA, 0xAE, 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5,
184 0xE5, 0x46, 0x70, 0xF1}},
186 {0x34, 0xaa, 0x97, 0x3c, 0xd4, 0xc4, 0xda, 0xa4,
187 0xf6, 0x1e, 0xeb, 0x2b, 0xdb, 0xad, 0x27, 0x31,
188 0x65, 0x34, 0x01, 0x6f}},
192 struct test sha256_tests
[] = {
194 { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea,
195 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23,
196 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
197 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad }},
198 { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
199 { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8,
200 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39,
201 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67,
202 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 }},
204 {0xcd,0xc7,0x6e,0x5c, 0x99,0x14,0xfb,0x92,
205 0x81,0xa1,0xc7,0xe2, 0x84,0xd7,0x3e,0x67,
206 0xf1,0x80,0x9a,0x48, 0xa4,0x97,0x20,0x0e,
207 0x04,0x6d,0x39,0xcc, 0xc7,0x11,0x2c,0xd0 }},
211 struct test sha384_tests
[] = {
213 { 0xcb,0x00,0x75,0x3f,0x45,0xa3,0x5e,0x8b,
214 0xb5,0xa0,0x3d,0x69,0x9a,0xc6,0x50,0x07,
215 0x27,0x2c,0x32,0xab,0x0e,0xde,0xd1,0x63,
216 0x1a,0x8b,0x60,0x5a,0x43,0xff,0x5b,0xed,
217 0x80,0x86,0x07,0x2b,0xa1,0xe7,0xcc,0x23,
218 0x58,0xba,0xec,0xa1,0x34,0xc8,0x25,0xa7}},
219 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno"
220 "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
221 { 0x09,0x33,0x0c,0x33,0xf7,0x11,0x47,0xe8,
222 0x3d,0x19,0x2f,0xc7,0x82,0xcd,0x1b,0x47,
223 0x53,0x11,0x1b,0x17,0x3b,0x3b,0x05,0xd2,
224 0x2f,0xa0,0x80,0x86,0xe3,0xb0,0xf7,0x12,
225 0xfc,0xc7,0xc7,0x1a,0x55,0x7e,0x2d,0xb9,
226 0x66,0xc3,0xe9,0xfa,0x91,0x74,0x60,0x39}},
228 { 0x9d,0x0e,0x18,0x09,0x71,0x64,0x74,0xcb,
229 0x08,0x6e,0x83,0x4e,0x31,0x0a,0x4a,0x1c,
230 0xed,0x14,0x9e,0x9c,0x00,0xf2,0x48,0x52,
231 0x79,0x72,0xce,0xc5,0x70,0x4c,0x2a,0x5b,
232 0x07,0xb8,0xb3,0xdc,0x38,0xec,0xc4,0xeb,
233 0xae,0x97,0xdd,0xd8,0x7f,0x3d,0x89,0x85}},
237 struct test sha512_tests
[] = {
239 { 0xdd,0xaf,0x35,0xa1,0x93,0x61,0x7a,0xba,
240 0xcc,0x41,0x73,0x49,0xae,0x20,0x41,0x31,
241 0x12,0xe6,0xfa,0x4e,0x89,0xa9,0x7e,0xa2,
242 0x0a,0x9e,0xee,0xe6,0x4b,0x55,0xd3,0x9a,
243 0x21,0x92,0x99,0x2a,0x27,0x4f,0xc1,0xa8,
244 0x36,0xba,0x3c,0x23,0xa3,0xfe,0xeb,0xbd,
245 0x45,0x4d,0x44,0x23,0x64,0x3c,0xe8,0x0e,
246 0x2a,0x9a,0xc9,0x4f,0xa5,0x4c,0xa4,0x9f }},
247 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno"
248 "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
249 { 0x8e,0x95,0x9b,0x75,0xda,0xe3,0x13,0xda,
250 0x8c,0xf4,0xf7,0x28,0x14,0xfc,0x14,0x3f,
251 0x8f,0x77,0x79,0xc6,0xeb,0x9f,0x7f,0xa1,
252 0x72,0x99,0xae,0xad,0xb6,0x88,0x90,0x18,
253 0x50,0x1d,0x28,0x9e,0x49,0x00,0xf7,0xe4,
254 0x33,0x1b,0x99,0xde,0xc4,0xb5,0x43,0x3a,
255 0xc7,0xd3,0x29,0xee,0xb6,0xdd,0x26,0x54,
256 0x5e,0x96,0xe5,0x5b,0x87,0x4b,0xe9,0x09 }},
258 { 0xe7,0x18,0x48,0x3d,0x0c,0xe7,0x69,0x64,
259 0x4e,0x2e,0x42,0xc7,0xbc,0x15,0xb4,0x63,
260 0x8e,0x1f,0x98,0xb1,0x3b,0x20,0x44,0x28,
261 0x56,0x32,0xa8,0x03,0xaf,0xa9,0x73,0xeb,
262 0xde,0x0f,0xf2,0x44,0x87,0x7e,0xa6,0x0a,
263 0x4c,0xb0,0x43,0x2c,0xe5,0x77,0xc3,0x1b,
264 0xeb,0x00,0x9c,0x5c,0x2c,0x49,0xaa,0x2e,
265 0x4e,0xad,0xb2,0x17,0xad,0x8c,0xc0,0x9b }},
270 hash_test (struct hash_foo
*hash
, struct test
*tests
)
275 void *ctx
= malloc(hash
->psize
);
276 unsigned char *res
= malloc(hash
->hsize
);
278 printf ("%s... ", hash
->name
);
279 for (t
= tests
; t
->str
; ++t
) {
282 ectx
= EVP_MD_CTX_create();
283 EVP_DigestInit_ex(ectx
, hash
->evp(), NULL
);
286 if(strcmp(t
->str
, ONE_MILLION_A
) == 0) {
288 memset(buf
, 'a', sizeof(buf
));
289 for(i
= 0; i
< 1000; i
++) {
290 (*hash
->update
)(ctx
, buf
, sizeof(buf
));
291 EVP_DigestUpdate(ectx
, buf
, sizeof(buf
));
294 (*hash
->update
)(ctx
, (unsigned char *)t
->str
, strlen(t
->str
));
295 EVP_DigestUpdate(ectx
, t
->str
, strlen(t
->str
));
298 (*hash
->final
) (res
, ctx
);
299 if (memcmp (res
, t
->hash
, hash
->hsize
) != 0) {
302 printf ("%s(\"%s\") failed\n", hash
->name
, t
->str
);
303 printf("should be: ");
304 for(i
= 0; i
< hash
->hsize
; ++i
) {
305 if(i
> 0 && (i
% 16) == 0)
307 printf("%02x ", t
->hash
[i
]);
309 printf("\nresult was: ");
310 for(i
= 0; i
< hash
->hsize
; ++i
) {
311 if(i
> 0 && (i
% 16) == 0)
313 printf("%02x ", res
[i
]);
319 EVP_DigestFinal_ex(ectx
, res
, &esize
);
320 EVP_MD_CTX_destroy(ectx
);
322 if (hash
->hsize
!= esize
) {
323 printf("EVP %s returned wrong hash size\n", hash
->name
);
327 if (memcmp (res
, t
->hash
, hash
->hsize
) != 0) {
328 printf("EVP %s failed here old function where successful!\n",
335 printf ("success\n");
343 hash_test(&md2
, md2_tests
) +
344 hash_test(&md4
, md4_tests
) +
345 hash_test(&md5
, md5_tests
) +
346 hash_test(&sha1
, sha1_tests
) +
347 hash_test(&sha256
, sha256_tests
) +
348 hash_test(&sha384
, sha384_tests
) +
349 hash_test(&sha512
, sha512_tests
);