modes_test.c 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. /* test CFB/OFB/CBC modes */
  2. #include <tomcrypt_test.h>
  3. int modes_test(void)
  4. {
  5. unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16];
  6. int cipher_idx;
  7. #ifdef CBC
  8. symmetric_CBC cbc;
  9. #endif
  10. #ifdef CFB
  11. symmetric_CFB cfb;
  12. #endif
  13. #ifdef OFB
  14. symmetric_OFB ofb;
  15. #endif
  16. #ifdef CTR
  17. symmetric_CTR ctr;
  18. #endif
  19. unsigned long l;
  20. /* make a random pt, key and iv */
  21. yarrow_read(pt, 64, &yarrow_prng);
  22. yarrow_read(key, 16, &yarrow_prng);
  23. yarrow_read(iv, 16, &yarrow_prng);
  24. /* get idx of AES handy */
  25. cipher_idx = find_cipher("aes");
  26. if (cipher_idx == -1) {
  27. fprintf(stderr, "test requires AES");
  28. return 1;
  29. }
  30. #ifdef LTC_F8_MODE
  31. DO(f8_test_mode());
  32. #endif
  33. #ifdef LRW_MODE
  34. DO(lrw_test());
  35. #endif
  36. #ifdef CBC
  37. /* test CBC mode */
  38. /* encode the block */
  39. DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
  40. l = sizeof(iv2);
  41. DO(cbc_getiv(iv2, &l, &cbc));
  42. if (l != 16 || memcmp(iv2, iv, 16)) {
  43. fprintf(stderr, "cbc_getiv failed");
  44. return 1;
  45. }
  46. DO(cbc_encrypt(pt, ct, 64, &cbc));
  47. /* decode the block */
  48. DO(cbc_setiv(iv2, l, &cbc));
  49. zeromem(tmp, sizeof(tmp));
  50. DO(cbc_decrypt(ct, tmp, 64, &cbc));
  51. if (memcmp(tmp, pt, 64) != 0) {
  52. fprintf(stderr, "CBC failed");
  53. return 1;
  54. }
  55. #endif
  56. #ifdef CFB
  57. /* test CFB mode */
  58. /* encode the block */
  59. DO(cfb_start(cipher_idx, iv, key, 16, 0, &cfb));
  60. l = sizeof(iv2);
  61. DO(cfb_getiv(iv2, &l, &cfb));
  62. /* note we don't memcmp iv2/iv since cfb_start processes the IV for the first block */
  63. if (l != 16) {
  64. fprintf(stderr, "cfb_getiv failed");
  65. return 1;
  66. }
  67. DO(cfb_encrypt(pt, ct, 64, &cfb));
  68. /* decode the block */
  69. DO(cfb_setiv(iv, l, &cfb));
  70. zeromem(tmp, sizeof(tmp));
  71. DO(cfb_decrypt(ct, tmp, 64, &cfb));
  72. if (memcmp(tmp, pt, 64) != 0) {
  73. fprintf(stderr, "CFB failed");
  74. return 1;
  75. }
  76. #endif
  77. #ifdef OFB
  78. /* test OFB mode */
  79. /* encode the block */
  80. DO(ofb_start(cipher_idx, iv, key, 16, 0, &ofb));
  81. l = sizeof(iv2);
  82. DO(ofb_getiv(iv2, &l, &ofb));
  83. if (l != 16 || memcmp(iv2, iv, 16)) {
  84. fprintf(stderr, "ofb_getiv failed");
  85. return 1;
  86. }
  87. DO(ofb_encrypt(pt, ct, 64, &ofb));
  88. /* decode the block */
  89. DO(ofb_setiv(iv2, l, &ofb));
  90. zeromem(tmp, sizeof(tmp));
  91. DO(ofb_decrypt(ct, tmp, 64, &ofb));
  92. if (memcmp(tmp, pt, 64) != 0) {
  93. fprintf(stderr, "OFB failed");
  94. return 1;
  95. }
  96. #endif
  97. #ifdef CTR
  98. /* test CTR mode */
  99. /* encode the block */
  100. DO(ctr_start(cipher_idx, iv, key, 16, 0, CTR_COUNTER_LITTLE_ENDIAN, &ctr));
  101. l = sizeof(iv2);
  102. DO(ctr_getiv(iv2, &l, &ctr));
  103. if (l != 16 || memcmp(iv2, iv, 16)) {
  104. fprintf(stderr, "ctr_getiv failed");
  105. return 1;
  106. }
  107. DO(ctr_encrypt(pt, ct, 57, &ctr));
  108. /* decode the block */
  109. DO(ctr_setiv(iv2, l, &ctr));
  110. zeromem(tmp, sizeof(tmp));
  111. DO(ctr_decrypt(ct, tmp, 57, &ctr));
  112. if (memcmp(tmp, pt, 57) != 0) {
  113. fprintf(stderr, "CTR failed");
  114. return 1;
  115. }
  116. #endif
  117. return 0;
  118. }
  119. /* $Source$ */
  120. /* $Revision$ */
  121. /* $Date$ */