modes_test.c 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. /* test CFB/OFB/CBC modes */
  2. #include <tomcrypt_test.h>
  3. int modes_test(void)
  4. {
  5. unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16];
  6. int cipher_idx;
  7. #ifdef LTC_CBC_MODE
  8. symmetric_CBC cbc;
  9. #endif
  10. #ifdef LTC_CFB_MODE
  11. symmetric_CFB cfb;
  12. #endif
  13. #ifdef LTC_OFB_MODE
  14. symmetric_OFB ofb;
  15. #endif
  16. unsigned long l;
  17. /* make a random pt, key and iv */
  18. yarrow_read(pt, 64, &yarrow_prng);
  19. yarrow_read(key, 16, &yarrow_prng);
  20. yarrow_read(iv, 16, &yarrow_prng);
  21. /* get idx of AES handy */
  22. cipher_idx = find_cipher("aes");
  23. if (cipher_idx == -1) {
  24. fprintf(stderr, "test requires AES");
  25. return 1;
  26. }
  27. #ifdef LTC_F8_MODE
  28. DO(f8_test_mode());
  29. #endif
  30. #ifdef LTC_LRW_MODE
  31. DO(lrw_test());
  32. #endif
  33. #ifdef LTC_CBC_MODE
  34. /* test CBC mode */
  35. /* encode the block */
  36. DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
  37. l = sizeof(iv2);
  38. DO(cbc_getiv(iv2, &l, &cbc));
  39. if (l != 16 || memcmp(iv2, iv, 16)) {
  40. fprintf(stderr, "cbc_getiv failed");
  41. return 1;
  42. }
  43. DO(cbc_encrypt(pt, ct, 64, &cbc));
  44. /* decode the block */
  45. DO(cbc_setiv(iv2, l, &cbc));
  46. zeromem(tmp, sizeof(tmp));
  47. DO(cbc_decrypt(ct, tmp, 64, &cbc));
  48. if (memcmp(tmp, pt, 64) != 0) {
  49. fprintf(stderr, "CBC failed");
  50. return 1;
  51. }
  52. #endif
  53. #ifdef LTC_CFB_MODE
  54. /* test CFB mode */
  55. /* encode the block */
  56. DO(cfb_start(cipher_idx, iv, key, 16, 0, &cfb));
  57. l = sizeof(iv2);
  58. DO(cfb_getiv(iv2, &l, &cfb));
  59. /* note we don't memcmp iv2/iv since cfb_start processes the IV for the first block */
  60. if (l != 16) {
  61. fprintf(stderr, "cfb_getiv failed");
  62. return 1;
  63. }
  64. DO(cfb_encrypt(pt, ct, 64, &cfb));
  65. /* decode the block */
  66. DO(cfb_setiv(iv, l, &cfb));
  67. zeromem(tmp, sizeof(tmp));
  68. DO(cfb_decrypt(ct, tmp, 64, &cfb));
  69. if (memcmp(tmp, pt, 64) != 0) {
  70. fprintf(stderr, "CFB failed");
  71. return 1;
  72. }
  73. #endif
  74. #ifdef LTC_OFB_MODE
  75. /* test OFB mode */
  76. /* encode the block */
  77. DO(ofb_start(cipher_idx, iv, key, 16, 0, &ofb));
  78. l = sizeof(iv2);
  79. DO(ofb_getiv(iv2, &l, &ofb));
  80. if (l != 16 || memcmp(iv2, iv, 16)) {
  81. fprintf(stderr, "ofb_getiv failed");
  82. return 1;
  83. }
  84. DO(ofb_encrypt(pt, ct, 64, &ofb));
  85. /* decode the block */
  86. DO(ofb_setiv(iv2, l, &ofb));
  87. zeromem(tmp, sizeof(tmp));
  88. DO(ofb_decrypt(ct, tmp, 64, &ofb));
  89. if (memcmp(tmp, pt, 64) != 0) {
  90. fprintf(stderr, "OFB failed");
  91. return 1;
  92. }
  93. #endif
  94. #ifdef LTC_CTR_MODE
  95. DO(ctr_test());
  96. #endif
  97. #ifdef LTC_XTS_MODE
  98. DO(xts_test());
  99. #endif
  100. return 0;
  101. }
  102. /* $Source$ */
  103. /* $Revision$ */
  104. /* $Date$ */