1 /* $NetBSD: mdtest.c,v 1.3 2023/06/19 21:41:43 christos Exp $ */ 2 3 /* 4 * Copyright (c) 1995 - 2016 Kungliga Tekniska Högskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include <config.h> 37 #include <krb5/roken.h> 38 39 #define HC_DEPRECATED_CRYPTO 40 41 #ifdef KRB5 42 #include <krb5/krb5-types.h> 43 #endif 44 #include <md4.h> 45 #include <md5.h> 46 #include <sha.h> 47 #include <evp.h> 48 49 #define ONE_MILLION_A "one million a's" 50 51 struct hash_foo { 52 const char *name; 53 size_t psize; 54 size_t hsize; 55 int (*init)(void*); 56 int (*update)(void*, const void*, size_t); 57 int (*final)(void*, void*); 58 const EVP_MD * (*evp)(void); 59 } md4 = { 60 "MD4", 61 sizeof(MD4_CTX), 62 16, 63 (int (*)(void*))MD4_Init, 64 (int (*)(void*,const void*, size_t))MD4_Update, 65 (int (*)(void*, void*))MD4_Final, 66 EVP_md4 67 }, md5 = { 68 "MD5", 69 sizeof(MD5_CTX), 70 16, 71 (int (*)(void*))MD5_Init, 72 (int (*)(void*,const void*, size_t))MD5_Update, 73 (int (*)(void*, void*))MD5_Final, 74 EVP_md5 75 }, sha1 = { 76 "SHA-1", 77 sizeof(struct sha), 78 20, 79 (int (*)(void*))SHA1_Init, 80 (int (*)(void*,const void*, size_t))SHA1_Update, 81 (int (*)(void*, void*))SHA1_Final, 82 EVP_sha1 83 }; 84 struct hash_foo sha256 = { 85 "SHA-256", 86 sizeof(SHA256_CTX), 87 32, 88 (int (*)(void*))SHA256_Init, 89 (int (*)(void*,const void*, size_t))SHA256_Update, 90 (int (*)(void*, void*))SHA256_Final, 91 EVP_sha256 92 }; 93 struct hash_foo sha384 = { 94 "SHA-384", 95 sizeof(SHA384_CTX), 96 48, 97 (int (*)(void*))SHA384_Init, 98 (int (*)(void*,const void*, size_t))SHA384_Update, 99 (int (*)(void*, void*))SHA384_Final, 100 EVP_sha384 101 }; 102 struct hash_foo sha512 = { 103 "SHA-512", 104 sizeof(SHA512_CTX), 105 64, 106 (int (*)(void*))SHA512_Init, 107 (int (*)(void*,const void*, size_t))SHA512_Update, 108 (int (*)(void*, void*))SHA512_Final, 109 EVP_sha512 110 }; 111 112 struct test { 113 char *str; 114 unsigned char hash[64]; 115 }; 116 117 struct test md4_tests[] = { 118 {"", 119 {0x31, 0xd6, 0xcf, 0xe0, 0xd1, 0x6a, 0xe9, 0x31, 0xb7, 0x3c, 0x59, 120 0xd7, 0xe0, 0xc0, 0x89, 0xc0}}, 121 {"a", 122 {0xbd, 0xe5, 0x2c, 0xb3, 0x1d, 0xe3, 0x3e, 0x46, 0x24, 0x5e, 0x05, 123 0xfb, 0xdb, 0xd6, 0xfb, 0x24}}, 124 {"abc", 125 {0xa4, 0x48, 0x01, 0x7a, 0xaf, 0x21, 0xd8, 0x52, 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d}}, 126 {"message digest", 127 {0xd9, 0x13, 0x0a, 0x81, 0x64, 0x54, 0x9f, 0xe8, 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b}}, 128 {"abcdefghijklmnopqrstuvwxyz", {0xd7, 0x9e, 0x1c, 0x30, 0x8a, 0xa5, 0xbb, 0xcd, 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9, }}, 129 {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 130 {0x04, 0x3f, 0x85, 0x82, 0xf2, 0x41, 0xdb, 0x35, 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4}}, 131 {"12345678901234567890123456789012345678901234567890123456789012345678901234567890", 132 {0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36, }}, 133 {NULL, { 0x0 }}}; 134 135 struct test md5_tests[] = { 136 {"", {0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04, 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e}}, 137 {"a", {0x0c, 0xc1, 0x75, 0xb9, 0xc0, 0xf1, 0xb6, 0xa8, 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61}}, 138 {"abc", {0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0, 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72}}, 139 {"message digest", {0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0}}, 140 {"abcdefghijklmnopqrstuvwxyz", {0xc3, 0xfc, 0xd3, 0xd7, 0x61, 0x92, 0xe4, 0x00, 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b}}, 141 {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", {0xd1, 0x74, 0xab, 0x98, 0xd2, 0x77, 0xd9, 0xf5, 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f}}, 142 {"12345678901234567890123456789012345678901234567890123456789012345678901234567890", {0x57, 0xed, 0xf4, 0xa2, 0x2b, 0xe3, 0xc9, 0x55, 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a}}, 143 {NULL, { 0x0 }}}; 144 145 struct test sha1_tests[] = { 146 { "abc", 147 {0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A, 148 0xBA, 0x3E, 0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C, 149 0x9C, 0xD0, 0xD8, 0x9D}}, 150 { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 151 {0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E, 152 0xBA, 0xAE, 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5, 153 0xE5, 0x46, 0x70, 0xF1}}, 154 { ONE_MILLION_A, 155 {0x34, 0xaa, 0x97, 0x3c, 0xd4, 0xc4, 0xda, 0xa4, 156 0xf6, 0x1e, 0xeb, 0x2b, 0xdb, 0xad, 0x27, 0x31, 157 0x65, 0x34, 0x01, 0x6f}}, 158 { NULL, { 0 } } 159 }; 160 161 struct test sha256_tests[] = { 162 { "abc", 163 { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, 164 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, 165 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, 166 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad }}, 167 { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", 168 { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, 169 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, 170 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, 171 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 }}, 172 { ONE_MILLION_A, 173 {0xcd,0xc7,0x6e,0x5c, 0x99,0x14,0xfb,0x92, 174 0x81,0xa1,0xc7,0xe2, 0x84,0xd7,0x3e,0x67, 175 0xf1,0x80,0x9a,0x48, 0xa4,0x97,0x20,0x0e, 176 0x04,0x6d,0x39,0xcc, 0xc7,0x11,0x2c,0xd0 }}, 177 { NULL, { 0 } } 178 }; 179 180 struct test sha384_tests[] = { 181 { "abc", 182 { 0xcb,0x00,0x75,0x3f,0x45,0xa3,0x5e,0x8b, 183 0xb5,0xa0,0x3d,0x69,0x9a,0xc6,0x50,0x07, 184 0x27,0x2c,0x32,0xab,0x0e,0xde,0xd1,0x63, 185 0x1a,0x8b,0x60,0x5a,0x43,0xff,0x5b,0xed, 186 0x80,0x86,0x07,0x2b,0xa1,0xe7,0xcc,0x23, 187 0x58,0xba,0xec,0xa1,0x34,0xc8,0x25,0xa7}}, 188 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno" 189 "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 190 { 0x09,0x33,0x0c,0x33,0xf7,0x11,0x47,0xe8, 191 0x3d,0x19,0x2f,0xc7,0x82,0xcd,0x1b,0x47, 192 0x53,0x11,0x1b,0x17,0x3b,0x3b,0x05,0xd2, 193 0x2f,0xa0,0x80,0x86,0xe3,0xb0,0xf7,0x12, 194 0xfc,0xc7,0xc7,0x1a,0x55,0x7e,0x2d,0xb9, 195 0x66,0xc3,0xe9,0xfa,0x91,0x74,0x60,0x39}}, 196 { ONE_MILLION_A, 197 { 0x9d,0x0e,0x18,0x09,0x71,0x64,0x74,0xcb, 198 0x08,0x6e,0x83,0x4e,0x31,0x0a,0x4a,0x1c, 199 0xed,0x14,0x9e,0x9c,0x00,0xf2,0x48,0x52, 200 0x79,0x72,0xce,0xc5,0x70,0x4c,0x2a,0x5b, 201 0x07,0xb8,0xb3,0xdc,0x38,0xec,0xc4,0xeb, 202 0xae,0x97,0xdd,0xd8,0x7f,0x3d,0x89,0x85}}, 203 {NULL, { 0 }} 204 }; 205 206 struct test sha512_tests[] = { 207 { "abc", 208 { 0xdd,0xaf,0x35,0xa1,0x93,0x61,0x7a,0xba, 209 0xcc,0x41,0x73,0x49,0xae,0x20,0x41,0x31, 210 0x12,0xe6,0xfa,0x4e,0x89,0xa9,0x7e,0xa2, 211 0x0a,0x9e,0xee,0xe6,0x4b,0x55,0xd3,0x9a, 212 0x21,0x92,0x99,0x2a,0x27,0x4f,0xc1,0xa8, 213 0x36,0xba,0x3c,0x23,0xa3,0xfe,0xeb,0xbd, 214 0x45,0x4d,0x44,0x23,0x64,0x3c,0xe8,0x0e, 215 0x2a,0x9a,0xc9,0x4f,0xa5,0x4c,0xa4,0x9f }}, 216 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno" 217 "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 218 { 0x8e,0x95,0x9b,0x75,0xda,0xe3,0x13,0xda, 219 0x8c,0xf4,0xf7,0x28,0x14,0xfc,0x14,0x3f, 220 0x8f,0x77,0x79,0xc6,0xeb,0x9f,0x7f,0xa1, 221 0x72,0x99,0xae,0xad,0xb6,0x88,0x90,0x18, 222 0x50,0x1d,0x28,0x9e,0x49,0x00,0xf7,0xe4, 223 0x33,0x1b,0x99,0xde,0xc4,0xb5,0x43,0x3a, 224 0xc7,0xd3,0x29,0xee,0xb6,0xdd,0x26,0x54, 225 0x5e,0x96,0xe5,0x5b,0x87,0x4b,0xe9,0x09 }}, 226 { ONE_MILLION_A, 227 { 0xe7,0x18,0x48,0x3d,0x0c,0xe7,0x69,0x64, 228 0x4e,0x2e,0x42,0xc7,0xbc,0x15,0xb4,0x63, 229 0x8e,0x1f,0x98,0xb1,0x3b,0x20,0x44,0x28, 230 0x56,0x32,0xa8,0x03,0xaf,0xa9,0x73,0xeb, 231 0xde,0x0f,0xf2,0x44,0x87,0x7e,0xa6,0x0a, 232 0x4c,0xb0,0x43,0x2c,0xe5,0x77,0xc3,0x1b, 233 0xeb,0x00,0x9c,0x5c,0x2c,0x49,0xaa,0x2e, 234 0x4e,0xad,0xb2,0x17,0xad,0x8c,0xc0,0x9b }}, 235 { NULL, { 0 } } 236 }; 237 238 static int 239 hash_test (struct hash_foo *hash, struct test *tests) 240 { 241 struct test *t; 242 EVP_MD_CTX *ectx; 243 unsigned int esize; 244 void *ctx = malloc(hash->psize); 245 unsigned char *res = malloc(hash->hsize); 246 247 printf ("%s... ", hash->name); 248 for (t = tests; t->str; ++t) { 249 char buf[1000]; 250 251 ectx = EVP_MD_CTX_create(); 252 if (hash->evp() == NULL) { 253 printf("unavailable\n"); 254 continue; 255 } 256 EVP_DigestInit_ex(ectx, hash->evp(), NULL); 257 258 (*hash->init)(ctx); 259 if(strcmp(t->str, ONE_MILLION_A) == 0) { 260 int i; 261 memset(buf, 'a', sizeof(buf)); 262 for(i = 0; i < 1000; i++) { 263 (*hash->update)(ctx, buf, sizeof(buf)); 264 EVP_DigestUpdate(ectx, buf, sizeof(buf)); 265 } 266 } else { 267 (*hash->update)(ctx, (unsigned char *)t->str, strlen(t->str)); 268 EVP_DigestUpdate(ectx, t->str, strlen(t->str)); 269 } 270 271 (*hash->final) (res, ctx); 272 if (memcmp (res, t->hash, hash->hsize) != 0) { 273 int i; 274 275 printf ("%s(\"%s\") failed\n", hash->name, t->str); 276 printf("should be: "); 277 for(i = 0; i < hash->hsize; ++i) { 278 if(i > 0 && (i % 16) == 0) 279 printf("\n "); 280 printf("%02x ", t->hash[i]); 281 } 282 printf("\nresult was: "); 283 for(i = 0; i < hash->hsize; ++i) { 284 if(i > 0 && (i % 16) == 0) 285 printf("\n "); 286 printf("%02x ", res[i]); 287 } 288 printf("\n"); 289 return 1; 290 } 291 292 EVP_DigestFinal_ex(ectx, res, &esize); 293 EVP_MD_CTX_destroy(ectx); 294 295 if (hash->hsize != esize) { 296 printf("EVP %s returned wrong hash size\n", hash->name); 297 return 1; 298 } 299 300 if (memcmp (res, t->hash, hash->hsize) != 0) { 301 printf("EVP %s failed here old function where successful!\n", 302 hash->name); 303 return 1; 304 } 305 } 306 free(ctx); 307 free(res); 308 printf ("success\n"); 309 return 0; 310 } 311 312 int 313 main (void) 314 { 315 return 316 hash_test(&md4, md4_tests) + 317 hash_test(&md5, md5_tests) + 318 hash_test(&sha1, sha1_tests) + 319 hash_test(&sha256, sha256_tests) + 320 hash_test(&sha384, sha384_tests) + 321 hash_test(&sha512, sha512_tests); 322 } 323