1 /* basic.c - basic regression tests
2 * Copyright (C) 2001, 2002, 2003, 2005, 2008,
3 * 2009 Free Software Foundation, Inc.
5 * This file is part of Libgcrypt.
7 * Libgcrypt is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as
9 * published by the Free Software Foundation; either version 2.1 of
10 * the License, or (at your option) any later version.
12 * Libgcrypt is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this program; if not, see <http://www.gnu.org/licenses/>.
30 #include "../src/gcrypt.h"
33 # define DIM(v) (sizeof(v)/sizeof((v)[0]))
37 typedef struct test_spec_pubkey_key
43 test_spec_pubkey_key_t;
45 typedef struct test_spec_pubkey
49 test_spec_pubkey_key_t key;
53 #define FLAG_CRYPT (1 << 0)
54 #define FLAG_SIGN (1 << 1)
55 #define FLAG_GRIP (1 << 2)
58 static int error_count;
59 static int in_fips_mode;
60 static int die_on_error;
63 fail (const char *format, ...)
67 va_start (arg_ptr, format);
68 vfprintf (stderr, format, arg_ptr);
76 mismatch (const void *expected, size_t expectedlen,
77 const void *computed, size_t computedlen)
79 const unsigned char *p;
81 fprintf (stderr, "expected:");
82 for (p = expected; expectedlen; p++, expectedlen--)
83 fprintf (stderr, " %02x", *p);
84 fprintf (stderr, "\ncomputed:");
85 for (p = computed; computedlen; p++, computedlen--)
86 fprintf (stderr, " %02x", *p);
87 fprintf (stderr, "\n");
92 die (const char *format, ...)
96 va_start (arg_ptr, format);
97 vfprintf (stderr, format, arg_ptr);
102 #define MAX_DATA_LEN 100
105 progress_handler (void *cb_data, const char *what, int printchar,
106 int current, int total)
113 if (printchar == '\n')
114 fputs ( "<LF>", stdout);
121 check_cbc_mac_cipher (void)
126 char key[MAX_DATA_LEN];
127 unsigned char plaintext[MAX_DATA_LEN];
129 char mac[MAX_DATA_LEN];
135 "This is a sample plaintext for CBC MAC of sixtyfour bytes.......",
136 0, "\x23\x8f\x6d\xc7\x53\x6a\x62\x97\x11\xc4\xa5\x16\x43\xea\xb0\xb6" },
138 "abcdefghABCDEFGH01234567",
139 "This is a sample plaintext for CBC MAC of sixtyfour bytes.......",
140 0, "\x5c\x11\xf0\x01\x47\xbd\x3d\x3a" },
143 "This is a sample plaintext for CBC MAC of sixtyfour bytes.......",
144 0, "\xfa\x4b\xdf\x9d\xfa\xab\x01\x70" }
147 unsigned char out[MAX_DATA_LEN];
148 int i, blklen, keylen;
149 gcry_error_t err = 0;
152 fprintf (stderr, " Starting CBC MAC checks.\n");
154 for (i = 0; i < sizeof (tv) / sizeof (tv[0]); i++)
156 if (gcry_cipher_test_algo (tv[i].algo) && in_fips_mode)
159 fprintf (stderr, " algorithm %d not available in fips mode\n",
164 err = gcry_cipher_open (&hd,
166 GCRY_CIPHER_MODE_CBC, GCRY_CIPHER_CBC_MAC);
169 fail ("cbc-mac algo %d, gcry_cipher_open failed: %s\n",
170 tv[i].algo, gpg_strerror (err));
174 blklen = gcry_cipher_get_algo_blklen(tv[i].algo);
177 fail ("cbc-mac algo %d, gcry_cipher_get_algo_blklen failed\n",
179 gcry_cipher_close (hd);
183 keylen = gcry_cipher_get_algo_keylen (tv[i].algo);
186 fail ("cbc-mac algo %d, gcry_cipher_get_algo_keylen failed\n",
191 err = gcry_cipher_setkey (hd, tv[i].key, keylen);
194 fail ("cbc-mac algo %d, gcry_cipher_setkey failed: %s\n",
195 tv[i].algo, gpg_strerror (err));
196 gcry_cipher_close (hd);
200 err = gcry_cipher_setiv (hd, NULL, 0);
203 fail ("cbc-mac algo %d, gcry_cipher_setiv failed: %s\n",
204 tv[i].algo, gpg_strerror (err));
205 gcry_cipher_close (hd);
210 fprintf (stderr, " checking CBC MAC for %s [%i]\n",
211 gcry_cipher_algo_name (tv[i].algo),
213 err = gcry_cipher_encrypt (hd,
218 strlen ((char*)tv[i].plaintext));
221 fail ("cbc-mac algo %d, gcry_cipher_encrypt failed: %s\n",
222 tv[i].algo, gpg_strerror (err));
223 gcry_cipher_close (hd);
230 for (j = 0; j < gcry_cipher_get_algo_blklen (tv[i].algo); j++)
231 printf ("\\x%02x", out[j] & 0xFF);
236 if (memcmp (tv[i].mac, out, blklen))
237 fail ("cbc-mac algo %d, encrypt mismatch entry %d\n", tv[i].algo, i);
239 gcry_cipher_close (hd);
242 fprintf (stderr, " Completed CBC MAC checks.\n");
246 check_aes128_cbc_cts_cipher (void)
248 char key[128 / 8] = "chicken teriyaki";
249 unsigned char plaintext[] =
250 "I would like the General Gau's Chicken, please, and wonton soup.";
253 unsigned char out[MAX_DATA_LEN];
257 { "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4\xd8\xa5\x80\x36\x2d\xa7\xff\x7f"
260 { "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1\xd4\x45\xd4\xc8\xef\xf7\xed\x22"
261 "\x97\x68\x72\x68\xd6\xec\xcc\xc0\xc0\x7b\x25\xe2\x5e\xcf\xe5",
263 { "\x39\x31\x25\x23\xa7\x86\x62\xd5\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
264 "\x97\x68\x72\x68\xd6\xec\xcc\xc0\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84",
266 { "\x97\x68\x72\x68\xd6\xec\xcc\xc0\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
267 "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c\x1b\x55\x49\xd2\xf8\x38\x02\x9e"
268 "\x39\x31\x25\x23\xa7\x86\x62\xd5\xbe\x7f\xcb\xcc\x98\xeb\xf5",
270 { "\x97\x68\x72\x68\xd6\xec\xcc\xc0\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
271 "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8"
272 "\x39\x31\x25\x23\xa7\x86\x62\xd5\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8",
274 { "\x97\x68\x72\x68\xd6\xec\xcc\xc0\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84"
275 "\x39\x31\x25\x23\xa7\x86\x62\xd5\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
276 "\x48\x07\xef\xe8\x36\xee\x89\xa5\x26\x73\x0d\xbc\x2f\x7b\xc8\x40"
277 "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
281 unsigned char out[MAX_DATA_LEN];
283 gcry_error_t err = 0;
286 fprintf (stderr, " Starting AES128 CBC CTS checks.\n");
287 err = gcry_cipher_open (&hd,
289 GCRY_CIPHER_MODE_CBC, GCRY_CIPHER_CBC_CTS);
292 fail ("aes-cbc-cts, gcry_cipher_open failed: %s\n", gpg_strerror (err));
296 err = gcry_cipher_setkey (hd, key, 128 / 8);
299 fail ("aes-cbc-cts, gcry_cipher_setkey failed: %s\n",
301 gcry_cipher_close (hd);
305 for (i = 0; i < sizeof (tv) / sizeof (tv[0]); i++)
307 err = gcry_cipher_setiv (hd, NULL, 0);
310 fail ("aes-cbc-cts, gcry_cipher_setiv failed: %s\n",
312 gcry_cipher_close (hd);
317 fprintf (stderr, " checking encryption for length %i\n", tv[i].inlen);
318 err = gcry_cipher_encrypt (hd, out, MAX_DATA_LEN,
319 plaintext, tv[i].inlen);
322 fail ("aes-cbc-cts, gcry_cipher_encrypt failed: %s\n",
324 gcry_cipher_close (hd);
328 if (memcmp (tv[i].out, out, tv[i].inlen))
329 fail ("aes-cbc-cts, encrypt mismatch entry %d\n", i);
331 err = gcry_cipher_setiv (hd, NULL, 0);
334 fail ("aes-cbc-cts, gcry_cipher_setiv failed: %s\n",
336 gcry_cipher_close (hd);
340 fprintf (stderr, " checking decryption for length %i\n", tv[i].inlen);
341 err = gcry_cipher_decrypt (hd, out, tv[i].inlen, NULL, 0);
344 fail ("aes-cbc-cts, gcry_cipher_decrypt failed: %s\n",
346 gcry_cipher_close (hd);
350 if (memcmp (plaintext, out, tv[i].inlen))
351 fail ("aes-cbc-cts, decrypt mismatch entry %d\n", i);
354 gcry_cipher_close (hd);
356 fprintf (stderr, " Completed AES128 CBC CTS checks.\n");
360 check_ctr_cipher (void)
365 char key[MAX_DATA_LEN];
366 char ctr[MAX_DATA_LEN];
369 unsigned char plaintext[MAX_DATA_LEN];
371 char out[MAX_DATA_LEN];
375 /* http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf */
377 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
378 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
379 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
381 "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce" },
382 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
384 "\x98\x06\xf6\x6b\x79\x70\xfd\xff\x86\x17\x18\x7b\xb9\xff\xfd\xff" },
385 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
387 "\x5a\xe4\xdf\x3e\xdb\xd5\xd3\x5e\x5b\x4f\x09\x02\x0d\xb0\x3e\xab" },
388 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
390 "\x1e\x03\x1d\xda\x2f\xbe\x03\xd1\x79\x21\x70\xa0\xf3\x00\x9c\xee" },
395 { GCRY_CIPHER_AES192,
396 "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b"
397 "\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b",
398 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
399 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
401 "\x1a\xbc\x93\x24\x17\x52\x1c\xa2\x4f\x2b\x04\x59\xfe\x7e\x6e\x0b" },
402 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
404 "\x09\x03\x39\xec\x0a\xa6\xfa\xef\xd5\xcc\xc2\xc6\xf4\xce\x8e\x94" },
405 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
407 "\x1e\x36\xb2\x6b\xd1\xeb\xc6\x70\xd1\xbd\x1d\x66\x56\x20\xab\xf7" },
408 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
410 "\x4f\x78\xa7\xf6\xd2\x98\x09\x58\x5a\x97\xda\xec\x58\xc6\xb0\x50" },
414 { GCRY_CIPHER_AES256,
415 "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
416 "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4",
417 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
418 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
420 "\x60\x1e\xc3\x13\x77\x57\x89\xa5\xb7\xa7\xf5\x04\xbb\xf3\xd2\x28" },
421 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
423 "\xf4\x43\xe3\xca\x4d\x62\xb5\x9a\xca\x84\xe9\x90\xca\xca\xf5\xc5" },
424 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
426 "\x2b\x09\x30\xda\xa2\x3d\xe9\x4c\xe8\x70\x17\xba\x2d\x84\x98\x8d" },
427 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
429 "\xdf\xc9\xc5\x8d\xb6\x7a\xad\xa6\x13\xc2\xdd\x08\x45\x79\x41\xa6" },
433 /* Some truncation tests. With a truncated second block and
434 also with a single truncated block. */
436 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
437 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
438 {{"\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
440 "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce" },
441 {"\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e",
443 "\x98\x06\xf6\x6b\x79\x70\xfd\xff\x86\x17\x18\x7b\xb9\xff\xfd" },
448 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
449 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
450 {{"\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
452 "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce" },
460 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
461 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
462 {{"\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17",
464 "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6" },
469 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
470 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
477 /* Tests to see whether it works correctly as a stream cipher. */
479 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
480 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
481 {{"\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
483 "\x87\x4d\x61\x91\xb6\x20\xe3\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce" },
484 {"\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e",
486 "\x98\x06\xf6\x6b\x79\x70\xfd\xff\x86\x17\x18\x7b\xb9\xff\xfd" },
487 {"\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
489 "\xff\x5a\xe4\xdf\x3e\xdb\xd5\xd3\x5e\x5b\x4f\x09\x02\x0d\xb0\x3e\xab" },
490 {"\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
492 "\x1e\x03\x1d\xda\x2f\xbe\x03\xd1\x79\x21\x70\xa0\xf3\x00\x9c\xee" },
498 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
499 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
512 {"\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
514 "\x26\x1b\xef\x68\x64\x99\x0d\xb6\xce" },
515 {"\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e",
517 "\x98\x06\xf6\x6b\x79\x70\xfd\xff\x86\x17\x18\x7b\xb9\xff\xfd" },
518 {"\x51\x30\xc8\x1c\x46\xa3\x5c\xe4\x11",
520 "\xff\x5a\xe4\xdf\x3e\xdb\xd5\xd3\x5e" },
526 /* A selfmade test vector using an 64 bit block cipher. */
528 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
529 "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8",
530 {{"\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
532 "\xe8\xa7\xac\x68\xca\xca\xa0\x20\x10\xcb\x1b\xcc\x79\x2c\xc4\x48" },
533 {"\xae\x2d\x8a\x57\x1e\x03\xac\x9c",
535 "\x16\xe8\x72\x77\xb0\x98\x29\x68" },
536 {"\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
538 "\x9a\xb3\xa8\x03\x3b\xb4\x14\xba" },
539 {"\xae\x2d\x8a\x57\x1e\x03\xac\x9c\xa1\x00",
541 "\x31\x5e\xd3\xfb\x1b\x8d\xd1\xf9\xb0\x83" },
554 gcry_cipher_hd_t hde, hdd;
555 unsigned char out[MAX_DATA_LEN];
556 int i, j, keylen, blklen;
557 gcry_error_t err = 0;
560 fprintf (stderr, " Starting CTR cipher checks.\n");
561 for (i = 0; i < sizeof (tv) / sizeof (tv[0]); i++)
566 err = gcry_cipher_open (&hde, tv[i].algo, GCRY_CIPHER_MODE_CTR, 0);
568 err = gcry_cipher_open (&hdd, tv[i].algo, GCRY_CIPHER_MODE_CTR, 0);
571 fail ("aes-ctr, gcry_cipher_open failed: %s\n", gpg_strerror (err));
575 keylen = gcry_cipher_get_algo_keylen(tv[i].algo);
578 fail ("aes-ctr, gcry_cipher_get_algo_keylen failed\n");
582 err = gcry_cipher_setkey (hde, tv[i].key, keylen);
584 err = gcry_cipher_setkey (hdd, tv[i].key, keylen);
587 fail ("aes-ctr, gcry_cipher_setkey failed: %s\n",
589 gcry_cipher_close (hde);
590 gcry_cipher_close (hdd);
594 blklen = gcry_cipher_get_algo_blklen(tv[i].algo);
597 fail ("aes-ctr, gcry_cipher_get_algo_blklen failed\n");
601 err = gcry_cipher_setctr (hde, tv[i].ctr, blklen);
603 err = gcry_cipher_setctr (hdd, tv[i].ctr, blklen);
606 fail ("aes-ctr, gcry_cipher_setctr failed: %s\n",
608 gcry_cipher_close (hde);
609 gcry_cipher_close (hdd);
614 fprintf (stderr, " checking CTR mode for %s [%i]\n",
615 gcry_cipher_algo_name (tv[i].algo),
617 for (j = 0; tv[i].data[j].inlen; j++)
619 err = gcry_cipher_encrypt (hde, out, MAX_DATA_LEN,
620 tv[i].data[j].plaintext,
621 tv[i].data[j].inlen == -1 ?
622 strlen ((char*)tv[i].data[j].plaintext) :
623 tv[i].data[j].inlen);
626 fail ("aes-ctr, gcry_cipher_encrypt (%d, %d) failed: %s\n",
627 i, j, gpg_strerror (err));
628 gcry_cipher_close (hde);
629 gcry_cipher_close (hdd);
633 if (memcmp (tv[i].data[j].out, out, tv[i].data[j].inlen))
635 fail ("aes-ctr, encrypt mismatch entry %d:%d\n", i, j);
636 mismatch (tv[i].data[j].out, tv[i].data[j].inlen,
637 out, tv[i].data[j].inlen);
640 err = gcry_cipher_decrypt (hdd, out, tv[i].data[j].inlen, NULL, 0);
643 fail ("aes-ctr, gcry_cipher_decrypt (%d, %d) failed: %s\n",
644 i, j, gpg_strerror (err));
645 gcry_cipher_close (hde);
646 gcry_cipher_close (hdd);
650 if (memcmp (tv[i].data[j].plaintext, out, tv[i].data[j].inlen))
652 fail ("aes-ctr, decrypt mismatch entry %d:%d\n", i, j);
653 mismatch (tv[i].data[j].plaintext, tv[i].data[j].inlen,
654 out, tv[i].data[j].inlen);
659 /* Now check that we get valid return codes back for good and
661 err = gcry_cipher_encrypt (hde, out, MAX_DATA_LEN,
662 "1234567890123456", 16);
664 fail ("aes-ctr, encryption failed for valid input");
666 err = gcry_cipher_encrypt (hde, out, 15,
667 "1234567890123456", 16);
668 if (gpg_err_code (err) != GPG_ERR_BUFFER_TOO_SHORT)
669 fail ("aes-ctr, too short output buffer returned wrong error: %s\n",
672 err = gcry_cipher_encrypt (hde, out, 0,
673 "1234567890123456", 16);
674 if (gpg_err_code (err) != GPG_ERR_BUFFER_TOO_SHORT)
675 fail ("aes-ctr, 0 length output buffer returned wrong error: %s\n",
678 err = gcry_cipher_encrypt (hde, out, 16,
679 "1234567890123456", 16);
681 fail ("aes-ctr, correct length output buffer returned error: %s\n",
684 /* Again, now for decryption. */
685 err = gcry_cipher_decrypt (hde, out, MAX_DATA_LEN,
686 "1234567890123456", 16);
688 fail ("aes-ctr, decryption failed for valid input");
690 err = gcry_cipher_decrypt (hde, out, 15,
691 "1234567890123456", 16);
692 if (gpg_err_code (err) != GPG_ERR_BUFFER_TOO_SHORT)
693 fail ("aes-ctr, too short output buffer returned wrong error: %s\n",
696 err = gcry_cipher_decrypt (hde, out, 0,
697 "1234567890123456", 16);
698 if (gpg_err_code (err) != GPG_ERR_BUFFER_TOO_SHORT)
699 fail ("aes-ctr, 0 length output buffer returned wrong error: %s\n",
702 err = gcry_cipher_decrypt (hde, out, 16,
703 "1234567890123456", 16);
705 fail ("aes-ctr, correct length output buffer returned error: %s\n",
708 gcry_cipher_close (hde);
709 gcry_cipher_close (hdd);
712 fprintf (stderr, " Completed CTR cipher checks.\n");
716 check_cfb_cipher (void)
721 char key[MAX_DATA_LEN];
722 char iv[MAX_DATA_LEN];
725 unsigned char plaintext[MAX_DATA_LEN];
727 char out[MAX_DATA_LEN];
732 /* http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf */
734 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
735 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
736 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
738 "\x3b\x3f\xd9\x2e\xb7\x2d\xad\x20\x33\x34\x49\xf8\xe8\x3c\xfb\x4a" },
739 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
741 "\xc8\xa6\x45\x37\xa0\xb3\xa9\x3f\xcd\xe3\xcd\xad\x9f\x1c\xe5\x8b"},
742 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
744 "\x26\x75\x1f\x67\xa3\xcb\xb1\x40\xb1\x80\x8c\xf1\x87\xa4\xf4\xdf" },
745 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
747 "\xc0\x4b\x05\x35\x7c\x5d\x1c\x0e\xea\xc4\xc6\x6f\x9f\xf7\xf2\xe6" },
750 { GCRY_CIPHER_AES192,
751 "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b"
752 "\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b",
753 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
754 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
756 "\xcd\xc8\x0d\x6f\xdd\xf1\x8c\xab\x34\xc2\x59\x09\xc9\x9a\x41\x74" },
757 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
759 "\x67\xce\x7f\x7f\x81\x17\x36\x21\x96\x1a\x2b\x70\x17\x1d\x3d\x7a" },
760 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
762 "\x2e\x1e\x8a\x1d\xd5\x9b\x88\xb1\xc8\xe6\x0f\xed\x1e\xfa\xc4\xc9" },
763 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
765 "\xc0\x5f\x9f\x9c\xa9\x83\x4f\xa0\x42\xae\x8f\xba\x58\x4b\x09\xff" },
768 { GCRY_CIPHER_AES256,
769 "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
770 "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4",
771 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
772 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
774 "\xdc\x7e\x84\xbf\xda\x79\x16\x4b\x7e\xcd\x84\x86\x98\x5d\x38\x60" },
775 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
777 "\x39\xff\xed\x14\x3b\x28\xb1\xc8\x32\x11\x3c\x63\x31\xe5\x40\x7b" },
778 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
780 "\xdf\x10\x13\x24\x15\xe5\x4b\x92\xa1\x3e\xd0\xa8\x26\x7a\xe2\xf9" },
781 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
783 "\x75\xa3\x85\x74\x1a\xb9\xce\xf8\x20\x31\x62\x3d\x55\xb1\xe4\x71" }
787 gcry_cipher_hd_t hde, hdd;
788 unsigned char out[MAX_DATA_LEN];
789 int i, j, keylen, blklen;
790 gcry_error_t err = 0;
793 fprintf (stderr, " Starting CFB checks.\n");
795 for (i = 0; i < sizeof (tv) / sizeof (tv[0]); i++)
798 fprintf (stderr, " checking CFB mode for %s [%i]\n",
799 gcry_cipher_algo_name (tv[i].algo),
801 err = gcry_cipher_open (&hde, tv[i].algo, GCRY_CIPHER_MODE_CFB, 0);
803 err = gcry_cipher_open (&hdd, tv[i].algo, GCRY_CIPHER_MODE_CFB, 0);
806 fail ("aes-cfb, gcry_cipher_open failed: %s\n", gpg_strerror (err));
810 keylen = gcry_cipher_get_algo_keylen(tv[i].algo);
813 fail ("aes-cfb, gcry_cipher_get_algo_keylen failed\n");
817 err = gcry_cipher_setkey (hde, tv[i].key, keylen);
819 err = gcry_cipher_setkey (hdd, tv[i].key, keylen);
822 fail ("aes-cfb, gcry_cipher_setkey failed: %s\n",
824 gcry_cipher_close (hde);
825 gcry_cipher_close (hdd);
829 blklen = gcry_cipher_get_algo_blklen(tv[i].algo);
832 fail ("aes-cfb, gcry_cipher_get_algo_blklen failed\n");
836 err = gcry_cipher_setiv (hde, tv[i].iv, blklen);
838 err = gcry_cipher_setiv (hdd, tv[i].iv, blklen);
841 fail ("aes-cfb, gcry_cipher_setiv failed: %s\n",
843 gcry_cipher_close (hde);
844 gcry_cipher_close (hdd);
848 for (j = 0; tv[i].data[j].inlen; j++)
850 err = gcry_cipher_encrypt (hde, out, MAX_DATA_LEN,
851 tv[i].data[j].plaintext,
852 tv[i].data[j].inlen);
855 fail ("aes-cfb, gcry_cipher_encrypt (%d, %d) failed: %s\n",
856 i, j, gpg_strerror (err));
857 gcry_cipher_close (hde);
858 gcry_cipher_close (hdd);
862 if (memcmp (tv[i].data[j].out, out, tv[i].data[j].inlen)) {
863 fail ("aes-cfb, encrypt mismatch entry %d:%d\n", i, j);
865 err = gcry_cipher_decrypt (hdd, out, tv[i].data[j].inlen, NULL, 0);
868 fail ("aes-cfb, gcry_cipher_decrypt (%d, %d) failed: %s\n",
869 i, j, gpg_strerror (err));
870 gcry_cipher_close (hde);
871 gcry_cipher_close (hdd);
875 if (memcmp (tv[i].data[j].plaintext, out, tv[i].data[j].inlen))
876 fail ("aes-cfb, decrypt mismatch entry %d:%d\n", i, j);
879 gcry_cipher_close (hde);
880 gcry_cipher_close (hdd);
883 fprintf (stderr, " Completed CFB checks.\n");
887 check_ofb_cipher (void)
892 char key[MAX_DATA_LEN];
893 char iv[MAX_DATA_LEN];
896 unsigned char plaintext[MAX_DATA_LEN];
898 char out[MAX_DATA_LEN];
903 /* http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf */
905 "\x2b\x7e\x15\x16\x28\xae\xd2\xa6\xab\xf7\x15\x88\x09\xcf\x4f\x3c",
906 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
907 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
909 "\x3b\x3f\xd9\x2e\xb7\x2d\xad\x20\x33\x34\x49\xf8\xe8\x3c\xfb\x4a" },
910 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
912 "\x77\x89\x50\x8d\x16\x91\x8f\x03\xf5\x3c\x52\xda\xc5\x4e\xd8\x25"},
913 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
915 "\x97\x40\x05\x1e\x9c\x5f\xec\xf6\x43\x44\xf7\xa8\x22\x60\xed\xcc" },
916 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
918 "\x30\x4c\x65\x28\xf6\x59\xc7\x78\x66\xa5\x10\xd9\xc1\xd6\xae\x5e" },
921 { GCRY_CIPHER_AES192,
922 "\x8e\x73\xb0\xf7\xda\x0e\x64\x52\xc8\x10\xf3\x2b"
923 "\x80\x90\x79\xe5\x62\xf8\xea\xd2\x52\x2c\x6b\x7b",
924 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
925 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
927 "\xcd\xc8\x0d\x6f\xdd\xf1\x8c\xab\x34\xc2\x59\x09\xc9\x9a\x41\x74" },
928 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
930 "\xfc\xc2\x8b\x8d\x4c\x63\x83\x7c\x09\xe8\x17\x00\xc1\x10\x04\x01" },
931 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
933 "\x8d\x9a\x9a\xea\xc0\xf6\x59\x6f\x55\x9c\x6d\x4d\xaf\x59\xa5\xf2" },
934 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
936 "\x6d\x9f\x20\x08\x57\xca\x6c\x3e\x9c\xac\x52\x4b\xd9\xac\xc9\x2a" },
939 { GCRY_CIPHER_AES256,
940 "\x60\x3d\xeb\x10\x15\xca\x71\xbe\x2b\x73\xae\xf0\x85\x7d\x77\x81"
941 "\x1f\x35\x2c\x07\x3b\x61\x08\xd7\x2d\x98\x10\xa3\x09\x14\xdf\xf4",
942 "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f",
943 { { "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96\xe9\x3d\x7e\x11\x73\x93\x17\x2a",
945 "\xdc\x7e\x84\xbf\xda\x79\x16\x4b\x7e\xcd\x84\x86\x98\x5d\x38\x60" },
946 { "\xae\x2d\x8a\x57\x1e\x03\xac\x9c\x9e\xb7\x6f\xac\x45\xaf\x8e\x51",
948 "\x4f\xeb\xdc\x67\x40\xd2\x0b\x3a\xc8\x8f\x6a\xd8\x2a\x4f\xb0\x8d" },
949 { "\x30\xc8\x1c\x46\xa3\x5c\xe4\x11\xe5\xfb\xc1\x19\x1a\x0a\x52\xef",
951 "\x71\xab\x47\xa0\x86\xe8\x6e\xed\xf3\x9d\x1c\x5b\xba\x97\xc4\x08" },
952 { "\xf6\x9f\x24\x45\xdf\x4f\x9b\x17\xad\x2b\x41\x7b\xe6\x6c\x37\x10",
954 "\x01\x26\x14\x1d\x67\xf3\x7b\xe8\x53\x8f\x5a\x8b\xe7\x40\xe4\x84" }
958 gcry_cipher_hd_t hde, hdd;
959 unsigned char out[MAX_DATA_LEN];
960 int i, j, keylen, blklen;
961 gcry_error_t err = 0;
964 fprintf (stderr, " Starting OFB checks.\n");
966 for (i = 0; i < sizeof (tv) / sizeof (tv[0]); i++)
969 fprintf (stderr, " checking OFB mode for %s [%i]\n",
970 gcry_cipher_algo_name (tv[i].algo),
972 err = gcry_cipher_open (&hde, tv[i].algo, GCRY_CIPHER_MODE_OFB, 0);
974 err = gcry_cipher_open (&hdd, tv[i].algo, GCRY_CIPHER_MODE_OFB, 0);
977 fail ("aes-ofb, gcry_cipher_open failed: %s\n", gpg_strerror (err));
981 keylen = gcry_cipher_get_algo_keylen(tv[i].algo);
984 fail ("aes-ofb, gcry_cipher_get_algo_keylen failed\n");
988 err = gcry_cipher_setkey (hde, tv[i].key, keylen);
990 err = gcry_cipher_setkey (hdd, tv[i].key, keylen);
993 fail ("aes-ofb, gcry_cipher_setkey failed: %s\n",
995 gcry_cipher_close (hde);
996 gcry_cipher_close (hdd);
1000 blklen = gcry_cipher_get_algo_blklen(tv[i].algo);
1003 fail ("aes-ofb, gcry_cipher_get_algo_blklen failed\n");
1007 err = gcry_cipher_setiv (hde, tv[i].iv, blklen);
1009 err = gcry_cipher_setiv (hdd, tv[i].iv, blklen);
1012 fail ("aes-ofb, gcry_cipher_setiv failed: %s\n",
1013 gpg_strerror (err));
1014 gcry_cipher_close (hde);
1015 gcry_cipher_close (hdd);
1019 for (j = 0; tv[i].data[j].inlen; j++)
1021 err = gcry_cipher_encrypt (hde, out, MAX_DATA_LEN,
1022 tv[i].data[j].plaintext,
1023 tv[i].data[j].inlen);
1026 fail ("aes-ofb, gcry_cipher_encrypt (%d, %d) failed: %s\n",
1027 i, j, gpg_strerror (err));
1028 gcry_cipher_close (hde);
1029 gcry_cipher_close (hdd);
1033 if (memcmp (tv[i].data[j].out, out, tv[i].data[j].inlen))
1034 fail ("aes-ofb, encrypt mismatch entry %d:%d\n", i, j);
1036 err = gcry_cipher_decrypt (hdd, out, tv[i].data[j].inlen, NULL, 0);
1039 fail ("aes-ofb, gcry_cipher_decrypt (%d, %d) failed: %s\n",
1040 i, j, gpg_strerror (err));
1041 gcry_cipher_close (hde);
1042 gcry_cipher_close (hdd);
1046 if (memcmp (tv[i].data[j].plaintext, out, tv[i].data[j].inlen))
1047 fail ("aes-ofb, decrypt mismatch entry %d:%d\n", i, j);
1050 err = gcry_cipher_reset(hde);
1052 err = gcry_cipher_reset(hdd);
1055 fail ("aes-ofb, gcry_cipher_reset (%d, %d) failed: %s\n",
1056 i, j, gpg_strerror (err));
1057 gcry_cipher_close (hde);
1058 gcry_cipher_close (hdd);
1062 /* gcry_cipher_reset clears the IV */
1063 err = gcry_cipher_setiv (hde, tv[i].iv, blklen);
1065 err = gcry_cipher_setiv (hdd, tv[i].iv, blklen);
1068 fail ("aes-ofb, gcry_cipher_setiv failed: %s\n",
1069 gpg_strerror (err));
1070 gcry_cipher_close (hde);
1071 gcry_cipher_close (hdd);
1075 /* this time we encrypt and decrypt one byte at a time */
1076 for (j = 0; tv[i].data[j].inlen; j++)
1079 for (byteNum = 0; byteNum < tv[i].data[j].inlen; ++byteNum)
1081 err = gcry_cipher_encrypt (hde, out+byteNum, 1,
1082 (tv[i].data[j].plaintext) + byteNum,
1086 fail ("aes-ofb, gcry_cipher_encrypt (%d, %d) failed: %s\n",
1087 i, j, gpg_strerror (err));
1088 gcry_cipher_close (hde);
1089 gcry_cipher_close (hdd);
1094 if (memcmp (tv[i].data[j].out, out, tv[i].data[j].inlen))
1095 fail ("aes-ofb, encrypt mismatch entry %d:%d\n", i, j);
1097 for (byteNum = 0; byteNum < tv[i].data[j].inlen; ++byteNum)
1099 err = gcry_cipher_decrypt (hdd, out+byteNum, 1, NULL, 0);
1102 fail ("aes-ofb, gcry_cipher_decrypt (%d, %d) failed: %s\n",
1103 i, j, gpg_strerror (err));
1104 gcry_cipher_close (hde);
1105 gcry_cipher_close (hdd);
1110 if (memcmp (tv[i].data[j].plaintext, out, tv[i].data[j].inlen))
1111 fail ("aes-ofb, decrypt mismatch entry %d:%d\n", i, j);
1114 gcry_cipher_close (hde);
1115 gcry_cipher_close (hdd);
1118 fprintf (stderr, " Completed OFB checks.\n");
1122 /* Check that our bulk encryption fucntions work properly. */
1124 check_bulk_cipher_modes (void)
1136 { GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CFB,
1137 "abcdefghijklmnop", 16,
1138 "1234567890123456", 16,
1140 { 0x53, 0xda, 0x27, 0x3c, 0x78, 0x3d, 0x54, 0x66, 0x19, 0x63,
1141 0xd7, 0xe6, 0x20, 0x10, 0xcd, 0xc0, 0x5a, 0x0b, 0x06, 0xcc }
1143 { GCRY_CIPHER_AES192, GCRY_CIPHER_MODE_CFB,
1144 "abcdefghijklmnopABCDEFG", 24,
1145 "1234567890123456", 16,
1147 { 0xc7, 0xb1, 0xd0, 0x09, 0x95, 0x04, 0x34, 0x61, 0x2b, 0xd9,
1148 0xcb, 0xb3, 0xc7, 0xcb, 0xef, 0xea, 0x16, 0x19, 0x9b, 0x3e }
1150 { GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_CFB,
1151 "abcdefghijklmnopABCDEFGHIJKLMNOP", 32,
1152 "1234567890123456", 16,
1154 { 0x31, 0xe1, 0x1f, 0x63, 0x65, 0x47, 0x8c, 0x3f, 0x53, 0xdb,
1155 0xd9, 0x4d, 0x91, 0x1d, 0x02, 0x9c, 0x05, 0x25, 0x58, 0x29 }
1157 { GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CBC,
1158 "abcdefghijklmnop", 16,
1159 "1234567890123456", 16,
1161 { 0xdc, 0x0c, 0xc2, 0xd9, 0x6b, 0x47, 0xf9, 0xeb, 0x06, 0xb4,
1162 0x2f, 0x6e, 0xec, 0x72, 0xbf, 0x55, 0x26, 0x7f, 0xa9, 0x97 }
1164 { GCRY_CIPHER_AES192, GCRY_CIPHER_MODE_CBC,
1165 "abcdefghijklmnopABCDEFG", 24,
1166 "1234567890123456", 16,
1168 { 0x2b, 0x90, 0x9b, 0xe6, 0x40, 0xab, 0x6e, 0xc2, 0xc5, 0xb1,
1169 0x87, 0xf5, 0x43, 0x84, 0x7b, 0x04, 0x06, 0x47, 0xd1, 0x8f }
1171 { GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_CBC,
1172 "abcdefghijklmnopABCDEFGHIJKLMNOP", 32,
1173 "1234567890123456", 16,
1175 { 0xaa, 0xa8, 0xdf, 0x03, 0xb0, 0xba, 0xc4, 0xe3, 0xc1, 0x02,
1176 0x38, 0x31, 0x8d, 0x86, 0xcb, 0x49, 0x6d, 0xad, 0xae, 0x01 }
1178 { GCRY_CIPHER_AES, GCRY_CIPHER_MODE_OFB,
1179 "abcdefghijklmnop", 16,
1180 "1234567890123456", 16,
1182 { 0x65, 0xfe, 0xde, 0x48, 0xd0, 0xa1, 0xa6, 0xf9, 0x24, 0x6b,
1183 0x52, 0x5f, 0x21, 0x8a, 0x6f, 0xc7, 0x70, 0x3b, 0xd8, 0x4a }
1185 { GCRY_CIPHER_AES192, GCRY_CIPHER_MODE_OFB,
1186 "abcdefghijklmnopABCDEFG", 24,
1187 "1234567890123456", 16,
1189 { 0x59, 0x5b, 0x02, 0xa2, 0x88, 0xc0, 0xbe, 0x94, 0x43, 0xaa,
1190 0x39, 0xf6, 0xbd, 0xcc, 0x83, 0x99, 0xee, 0x00, 0xa1, 0x91 }
1192 { GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_OFB,
1193 "abcdefghijklmnopABCDEFGHIJKLMNOP", 32,
1194 "1234567890123456", 16,
1196 { 0x38, 0x8c, 0xe1, 0xe2, 0xbe, 0x67, 0x60, 0xe8, 0xeb, 0xce,
1197 0xd0, 0xc6, 0xaa, 0xd6, 0xf6, 0x26, 0x15, 0x56, 0xd0, 0x2b }
1199 { GCRY_CIPHER_AES, GCRY_CIPHER_MODE_CTR,
1200 "abcdefghijklmnop", 16,
1201 "1234567890123456", 16,
1203 { 0x9a, 0x48, 0x94, 0xd6, 0x50, 0x46, 0x81, 0xdb, 0x68, 0x34,
1204 0x3b, 0xc5, 0x9e, 0x66, 0x94, 0x81, 0x98, 0xa0, 0xf9, 0xff }
1206 { GCRY_CIPHER_AES192, GCRY_CIPHER_MODE_CTR,
1207 "abcdefghijklmnopABCDEFG", 24,
1208 "1234567890123456", 16,
1210 { 0x2c, 0x2c, 0xd3, 0x75, 0x81, 0x2a, 0x59, 0x07, 0xeb, 0x08,
1211 0xce, 0x28, 0x4c, 0x0c, 0x6a, 0xa8, 0x8f, 0xa3, 0x98, 0x7e }
1213 { GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_CTR,
1214 "abcdefghijklmnopABCDEFGHIJKLMNOP", 32,
1215 "1234567890123456", 16,
1217 { 0x64, 0xce, 0x73, 0x03, 0xc7, 0x89, 0x99, 0x1f, 0xf1, 0xce,
1218 0xfe, 0xfb, 0xb9, 0x42, 0x30, 0xdf, 0xbb, 0x68, 0x6f, 0xd3 }
1220 { GCRY_CIPHER_AES, GCRY_CIPHER_MODE_ECB,
1221 "abcdefghijklmnop", 16,
1222 "1234567890123456", 16,
1224 { 0x51, 0xae, 0xf5, 0xac, 0x22, 0xa0, 0xba, 0x11, 0xc5, 0xaa,
1225 0xb4, 0x70, 0x99, 0xce, 0x18, 0x08, 0x12, 0x9b, 0xb1, 0xc5 }
1227 { GCRY_CIPHER_AES192, GCRY_CIPHER_MODE_ECB,
1228 "abcdefghijklmnopABCDEFG", 24,
1229 "1234567890123456", 16,
1231 { 0x57, 0x91, 0xea, 0x48, 0xd8, 0xbf, 0x9e, 0xc1, 0xae, 0x33,
1232 0xb3, 0xfd, 0xf7, 0x7a, 0xeb, 0x30, 0xb1, 0x62, 0x0d, 0x82 }
1234 { GCRY_CIPHER_AES256, GCRY_CIPHER_MODE_ECB,
1235 "abcdefghijklmnopABCDEFGHIJKLMNOP", 32,
1236 "1234567890123456", 16,
1238 { 0x2d, 0x71, 0x54, 0xb9, 0xc5, 0x28, 0x76, 0xff, 0x76, 0xb5,
1239 0x99, 0x37, 0x99, 0x9d, 0xf7, 0x10, 0x6d, 0x86, 0x4f, 0x3f }
1242 gcry_cipher_hd_t hde = NULL;
1243 gcry_cipher_hd_t hdd = NULL;
1244 unsigned char *buffer_base, *outbuf_base; /* Allocated buffers. */
1245 unsigned char *buffer, *outbuf; /* Aligned buffers. */
1247 unsigned char hash[20];
1248 int i, j, keylen, blklen;
1249 gcry_error_t err = 0;
1252 fprintf (stderr, "Starting bulk cipher checks.\n");
1254 buflen = 16*100; /* We check a 1600 byte buffer. */
1255 buffer_base = gcry_xmalloc (buflen+16);
1256 buffer = buffer_base + (16 - ((size_t)buffer_base & 0x0f));
1257 outbuf_base = gcry_xmalloc (buflen+16);
1258 outbuf = outbuf_base + (16 - ((size_t)outbuf_base & 0x0f));
1261 for (i = 0; i < DIM (tv); i++)
1264 fprintf (stderr, " checking bulk encryption for %s [%i], mode %d\n",
1265 gcry_cipher_algo_name (tv[i].algo),
1266 tv[i].algo, tv[i].mode);
1267 err = gcry_cipher_open (&hde, tv[i].algo, tv[i].mode, 0);
1269 err = gcry_cipher_open (&hdd, tv[i].algo, tv[i].mode, 0);
1272 fail ("gcry_cipher_open failed: %s\n", gpg_strerror (err));
1276 keylen = gcry_cipher_get_algo_keylen(tv[i].algo);
1279 fail ("gcry_cipher_get_algo_keylen failed\n");
1283 err = gcry_cipher_setkey (hde, tv[i].key, tv[i].keylen);
1285 err = gcry_cipher_setkey (hdd, tv[i].key, tv[i].keylen);
1288 fail ("gcry_cipher_setkey failed: %s\n", gpg_strerror (err));
1292 blklen = gcry_cipher_get_algo_blklen(tv[i].algo);
1295 fail ("gcry_cipher_get_algo_blklen failed\n");
1299 err = gcry_cipher_setiv (hde, tv[i].iv, tv[i].ivlen);
1301 err = gcry_cipher_setiv (hdd, tv[i].iv, tv[i].ivlen);
1304 fail ("gcry_cipher_setiv failed: %s\n", gpg_strerror (err));
1308 /* Fill the buffer with our test pattern. */
1309 for (j=0; j < buflen; j++)
1310 buffer[j] = ((j & 0xff) ^ ((j >> 8) & 0xff));
1312 err = gcry_cipher_encrypt (hde, outbuf, buflen, buffer, buflen);
1315 fail ("gcry_cipher_encrypt (algo %d, mode %d) failed: %s\n",
1316 tv[i].algo, tv[i].mode, gpg_strerror (err));
1320 gcry_md_hash_buffer (GCRY_MD_SHA1, hash, outbuf, buflen);
1322 printf ("/*[%d]*/\n", i);
1323 fputs (" {", stdout);
1324 for (j=0; j < 20; j++)
1325 printf (" 0x%02x%c%s", hash[j], j==19? ' ':',', j == 9? "\n ":"");
1329 if (memcmp (hash, tv[i].t1_hash, 20))
1330 fail ("encrypt mismatch (algo %d, mode %d)\n",
1331 tv[i].algo, tv[i].mode);
1333 err = gcry_cipher_decrypt (hdd, outbuf, buflen, NULL, 0);
1336 fail ("gcry_cipher_decrypt (algo %d, mode %d) failed: %s\n",
1337 tv[i].algo, tv[i].mode, gpg_strerror (err));
1341 if (memcmp (buffer, outbuf, buflen))
1342 fail ("decrypt mismatch (algo %d, mode %d)\n",
1343 tv[i].algo, tv[i].mode);
1345 gcry_cipher_close (hde); hde = NULL;
1346 gcry_cipher_close (hdd); hdd = NULL;
1350 fprintf (stderr, "Completed bulk cipher checks.\n");
1352 gcry_cipher_close (hde);
1353 gcry_cipher_close (hdd);
1354 gcry_free (buffer_base);
1355 gcry_free (outbuf_base);
1359 /* The core of the cipher check. In addition to the parameters passed
1360 to check_one_cipher it also receives the KEY and the plain data.
1361 PASS is printed with error messages. The function returns 0 on
1364 check_one_cipher_core (int algo, int mode, int flags,
1365 const char *key, size_t nkey,
1366 const unsigned char *plain, size_t nplain,
1367 int bufshift, int pass)
1369 gcry_cipher_hd_t hd;
1370 unsigned char in_buffer[1040+1], out_buffer[1040+1];
1371 unsigned char *in, *out;
1373 gcry_error_t err = 0;
1375 assert (nkey == 32);
1376 assert (nplain == 1040);
1377 assert (sizeof(in_buffer) == nplain + 1);
1378 assert (sizeof(out_buffer) == sizeof(in_buffer));
1385 else if (bufshift == 1)
1390 else if (bufshift == 2)
1401 keylen = gcry_cipher_get_algo_keylen (algo);
1404 fail ("pass %d, algo %d, mode %d, gcry_cipher_get_algo_keylen failed\n",
1409 if (keylen < 40 / 8 || keylen > 32)
1411 fail ("pass %d, algo %d, mode %d, keylength problem (%d)\n", pass, algo, mode, keylen);
1415 err = gcry_cipher_open (&hd, algo, mode, flags);
1418 fail ("pass %d, algo %d, mode %d, gcry_cipher_open failed: %s\n",
1419 pass, algo, mode, gpg_strerror (err));
1423 err = gcry_cipher_setkey (hd, key, keylen);
1426 fail ("pass %d, algo %d, mode %d, gcry_cipher_setkey failed: %s\n",
1427 pass, algo, mode, gpg_strerror (err));
1428 gcry_cipher_close (hd);
1432 err = gcry_cipher_encrypt (hd, out, nplain, plain, nplain);
1435 fail ("pass %d, algo %d, mode %d, gcry_cipher_encrypt failed: %s\n",
1436 pass, algo, mode, gpg_strerror (err));
1437 gcry_cipher_close (hd);
1441 gcry_cipher_reset (hd);
1443 err = gcry_cipher_decrypt (hd, in, nplain, out, nplain);
1446 fail ("pass %d, algo %d, mode %d, gcry_cipher_decrypt failed: %s\n",
1447 pass, algo, mode, gpg_strerror (err));
1448 gcry_cipher_close (hd);
1452 if (memcmp (plain, in, nplain))
1453 fail ("pass %d, algo %d, mode %d, encrypt-decrypt mismatch\n",
1456 /* Again, using in-place encryption. */
1457 gcry_cipher_reset (hd);
1459 memcpy (out, plain, nplain);
1460 err = gcry_cipher_encrypt (hd, out, nplain, NULL, 0);
1463 fail ("pass %d, algo %d, mode %d, in-place, gcry_cipher_encrypt failed:"
1465 pass, algo, mode, gpg_strerror (err));
1466 gcry_cipher_close (hd);
1470 gcry_cipher_reset (hd);
1472 err = gcry_cipher_decrypt (hd, out, nplain, NULL, 0);
1475 fail ("pass %d, algo %d, mode %d, in-place, gcry_cipher_decrypt failed:"
1477 pass, algo, mode, gpg_strerror (err));
1478 gcry_cipher_close (hd);
1482 if (memcmp (plain, out, nplain))
1483 fail ("pass %d, algo %d, mode %d, in-place, encrypt-decrypt mismatch\n",
1487 gcry_cipher_close (hd);
1495 check_one_cipher (int algo, int mode, int flags)
1498 unsigned char plain[1040+1];
1501 for (bufshift=0; bufshift < 4; bufshift++)
1503 /* Pass 0: Standard test. */
1504 memcpy (key, "0123456789abcdef.,;/[]{}-=ABCDEF", 32);
1505 memcpy (plain, "foobar42FOOBAR17", 16);
1506 for (i = 16; i < 1040; i += 16)
1508 memcpy (&plain[i], &plain[i-16], 16);
1515 if (check_one_cipher_core (algo, mode, flags, key, 32, plain, 1040,
1516 bufshift, 0+10*bufshift))
1519 /* Pass 1: Key not aligned. */
1520 memmove (key+1, key, 32);
1521 if (check_one_cipher_core (algo, mode, flags, key+1, 32, plain, 1040,
1522 bufshift, 1+10*bufshift))
1525 /* Pass 2: Key not aligned and data not aligned. */
1526 memmove (plain+1, plain, 1024);
1527 if (check_one_cipher_core (algo, mode, flags, key+1, 32, plain+1, 1040,
1528 bufshift, 2+10*bufshift))
1531 /* Pass 3: Key aligned and data not aligned. */
1532 memmove (key, key+1, 32);
1533 if (check_one_cipher_core (algo, mode, flags, key, 32, plain+1, 1040,
1534 bufshift, 3+10*bufshift))
1544 check_ciphers (void)
1546 static int algos[] = {
1548 GCRY_CIPHER_BLOWFISH,
1563 GCRY_CIPHER_TWOFISH,
1564 GCRY_CIPHER_TWOFISH128,
1567 GCRY_CIPHER_SERPENT128,
1568 GCRY_CIPHER_SERPENT192,
1569 GCRY_CIPHER_SERPENT256,
1572 GCRY_CIPHER_RFC2268_40,
1578 GCRY_CIPHER_CAMELLIA128,
1579 GCRY_CIPHER_CAMELLIA192,
1580 GCRY_CIPHER_CAMELLIA256,
1587 static int algos2[] = {
1589 GCRY_CIPHER_ARCFOUR,
1596 fprintf (stderr, "Starting Cipher checks.\n");
1597 for (i = 0; algos[i]; i++)
1599 if (gcry_cipher_test_algo (algos[i]) && in_fips_mode)
1602 fprintf (stderr, " algorithm %d not available in fips mode\n",
1607 fprintf (stderr, " checking %s [%i]\n",
1608 gcry_cipher_algo_name (algos[i]),
1609 gcry_cipher_map_name (gcry_cipher_algo_name (algos[i])));
1611 check_one_cipher (algos[i], GCRY_CIPHER_MODE_ECB, 0);
1612 check_one_cipher (algos[i], GCRY_CIPHER_MODE_CFB, 0);
1613 check_one_cipher (algos[i], GCRY_CIPHER_MODE_OFB, 0);
1614 check_one_cipher (algos[i], GCRY_CIPHER_MODE_CBC, 0);
1615 check_one_cipher (algos[i], GCRY_CIPHER_MODE_CBC, GCRY_CIPHER_CBC_CTS);
1616 check_one_cipher (algos[i], GCRY_CIPHER_MODE_CTR, 0);
1619 for (i = 0; algos2[i]; i++)
1621 if (gcry_cipher_test_algo (algos[i]) && in_fips_mode)
1624 fprintf (stderr, " algorithm %d not available in fips mode\n",
1629 fprintf (stderr, " checking `%s'\n",
1630 gcry_cipher_algo_name (algos2[i]));
1632 check_one_cipher (algos2[i], GCRY_CIPHER_MODE_STREAM, 0);
1634 /* we have now run all cipher's selftests */
1637 fprintf (stderr, "Completed Cipher checks.\n");
1639 /* TODO: add some extra encryption to test the higher level functions */
1644 check_cipher_modes(void)
1647 fprintf (stderr, "Starting Cipher Mode checks.\n");
1649 check_aes128_cbc_cts_cipher ();
1650 check_cbc_mac_cipher ();
1651 check_ctr_cipher ();
1652 check_cfb_cipher ();
1653 check_ofb_cipher ();
1656 fprintf (stderr, "Completed Cipher Mode checks.\n");
1660 check_one_md (int algo, const char *data, int len, const char *expect)
1662 gcry_md_hd_t hd, hd2;
1666 gcry_error_t err = 0;
1668 err = gcry_md_open (&hd, algo, 0);
1671 fail ("algo %d, gcry_md_open failed: %s\n", algo, gpg_strerror (err));
1675 mdlen = gcry_md_get_algo_dlen (algo);
1676 if (mdlen < 1 || mdlen > 500)
1678 fail ("algo %d, gcry_md_get_algo_dlen failed: %d\n", algo, mdlen);
1682 if (*data == '!' && !data[1])
1683 { /* hash one million times a "a" */
1686 /* Write in odd size chunks so that we test the buffering. */
1687 memset (aaa, 'a', 1000);
1688 for (i = 0; i < 1000; i++)
1689 gcry_md_write (hd, aaa, 1000);
1692 gcry_md_write (hd, data, len);
1694 err = gcry_md_copy (&hd2, hd);
1697 fail ("algo %d, gcry_md_copy failed: %s\n", algo, gpg_strerror (err));
1702 p = gcry_md_read (hd2, algo);
1704 if (memcmp (p, expect, mdlen))
1706 printf ("computed: ");
1707 for (i = 0; i < mdlen; i++)
1708 printf ("%02x ", p[i] & 0xFF);
1709 printf ("\nexpected: ");
1710 for (i = 0; i < mdlen; i++)
1711 printf ("%02x ", expect[i] & 0xFF);
1714 fail ("algo %d, digest mismatch\n", algo);
1717 gcry_md_close (hd2);
1722 check_digests (void)
1732 "\x31\xD6\xCF\xE0\xD1\x6A\xE9\x31\xB7\x3C\x59\xD7\xE0\xC0\x89\xC0" },
1734 "\xbd\xe5\x2c\xb3\x1d\xe3\x3e\x46\x24\x5e\x05\xfb\xdb\xd6\xfb\x24" },
1735 { GCRY_MD_MD4, "message digest",
1736 "\xd9\x13\x0a\x81\x64\x54\x9f\xe8\x18\x87\x48\x06\xe1\xc7\x01\x4b" },
1738 "\xD4\x1D\x8C\xD9\x8F\x00\xB2\x04\xE9\x80\x09\x98\xEC\xF8\x42\x7E" },
1740 "\x0C\xC1\x75\xB9\xC0\xF1\xB6\xA8\x31\xC3\x99\xE2\x69\x77\x26\x61" },
1741 { GCRY_MD_MD5, "abc",
1742 "\x90\x01\x50\x98\x3C\xD2\x4F\xB0\xD6\x96\x3F\x7D\x28\xE1\x7F\x72" },
1743 { GCRY_MD_MD5, "message digest",
1744 "\xF9\x6B\x69\x7D\x7C\xB7\x93\x8D\x52\x5A\x2F\x31\xAA\xF1\x61\xD0" },
1745 { GCRY_MD_SHA1, "abc",
1746 "\xA9\x99\x3E\x36\x47\x06\x81\x6A\xBA\x3E"
1747 "\x25\x71\x78\x50\xC2\x6C\x9C\xD0\xD8\x9D" },
1749 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
1750 "\x84\x98\x3E\x44\x1C\x3B\xD2\x6E\xBA\xAE"
1751 "\x4A\xA1\xF9\x51\x29\xE5\xE5\x46\x70\xF1" },
1752 { GCRY_MD_SHA1, "!" /* kludge for "a"*1000000 */ ,
1753 "\x34\xAA\x97\x3C\xD4\xC4\xDA\xA4\xF6\x1E"
1754 "\xEB\x2B\xDB\xAD\x27\x31\x65\x34\x01\x6F" },
1756 { GCRY_MD_SHA224, "abc",
1757 "\x23\x09\x7d\x22\x34\x05\xd8\x22\x86\x42\xa4\x77\xbd\xa2\x55\xb3"
1758 "\x2a\xad\xbc\xe4\xbd\xa0\xb3\xf7\xe3\x6c\x9d\xa7" },
1760 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
1761 "\x75\x38\x8b\x16\x51\x27\x76\xcc\x5d\xba\x5d\xa1\xfd\x89\x01\x50"
1762 "\xb0\xc6\x45\x5c\xb4\xf5\x8b\x19\x52\x52\x25\x25" },
1763 { GCRY_MD_SHA224, "!",
1764 "\x20\x79\x46\x55\x98\x0c\x91\xd8\xbb\xb4\xc1\xea\x97\x61\x8a\x4b"
1765 "\xf0\x3f\x42\x58\x19\x48\xb2\xee\x4e\xe7\xad\x67" },
1766 { GCRY_MD_SHA256, "abc",
1767 "\xba\x78\x16\xbf\x8f\x01\xcf\xea\x41\x41\x40\xde\x5d\xae\x22\x23"
1768 "\xb0\x03\x61\xa3\x96\x17\x7a\x9c\xb4\x10\xff\x61\xf2\x00\x15\xad" },
1770 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
1771 "\x24\x8d\x6a\x61\xd2\x06\x38\xb8\xe5\xc0\x26\x93\x0c\x3e\x60\x39"
1772 "\xa3\x3c\xe4\x59\x64\xff\x21\x67\xf6\xec\xed\xd4\x19\xdb\x06\xc1" },
1773 { GCRY_MD_SHA256, "!",
1774 "\xcd\xc7\x6e\x5c\x99\x14\xfb\x92\x81\xa1\xc7\xe2\x84\xd7\x3e\x67"
1775 "\xf1\x80\x9a\x48\xa4\x97\x20\x0e\x04\x6d\x39\xcc\xc7\x11\x2c\xd0" },
1776 { GCRY_MD_SHA384, "abc",
1777 "\xcb\x00\x75\x3f\x45\xa3\x5e\x8b\xb5\xa0\x3d\x69\x9a\xc6\x50\x07"
1778 "\x27\x2c\x32\xab\x0e\xde\xd1\x63\x1a\x8b\x60\x5a\x43\xff\x5b\xed"
1779 "\x80\x86\x07\x2b\xa1\xe7\xcc\x23\x58\xba\xec\xa1\x34\xc8\x25\xa7" },
1780 { GCRY_MD_SHA512, "abc",
1781 "\xDD\xAF\x35\xA1\x93\x61\x7A\xBA\xCC\x41\x73\x49\xAE\x20\x41\x31"
1782 "\x12\xE6\xFA\x4E\x89\xA9\x7E\xA2\x0A\x9E\xEE\xE6\x4B\x55\xD3\x9A"
1783 "\x21\x92\x99\x2A\x27\x4F\xC1\xA8\x36\xBA\x3C\x23\xA3\xFE\xEB\xBD"
1784 "\x45\x4D\x44\x23\x64\x3C\xE8\x0E\x2A\x9A\xC9\x4F\xA5\x4C\xA4\x9F" },
1785 { GCRY_MD_RMD160, "",
1786 "\x9c\x11\x85\xa5\xc5\xe9\xfc\x54\x61\x28"
1787 "\x08\x97\x7e\xe8\xf5\x48\xb2\x25\x8d\x31" },
1788 { GCRY_MD_RMD160, "a",
1789 "\x0b\xdc\x9d\x2d\x25\x6b\x3e\xe9\xda\xae"
1790 "\x34\x7b\xe6\xf4\xdc\x83\x5a\x46\x7f\xfe" },
1791 { GCRY_MD_RMD160, "abc",
1792 "\x8e\xb2\x08\xf7\xe0\x5d\x98\x7a\x9b\x04"
1793 "\x4a\x8e\x98\xc6\xb0\x87\xf1\x5a\x0b\xfc" },
1794 { GCRY_MD_RMD160, "message digest",
1795 "\x5d\x06\x89\xef\x49\xd2\xfa\xe5\x72\xb8"
1796 "\x81\xb1\x23\xa8\x5f\xfa\x21\x59\x5f\x36" },
1797 { GCRY_MD_CRC32, "", "\x00\x00\x00\x00" },
1798 { GCRY_MD_CRC32, "foo", "\x8c\x73\x65\x21" },
1799 { GCRY_MD_CRC32_RFC1510, "", "\x00\x00\x00\x00" },
1800 { GCRY_MD_CRC32_RFC1510, "foo", "\x73\x32\xbc\x33" },
1801 { GCRY_MD_CRC32_RFC1510, "test0123456789", "\xb8\x3e\x88\xd6" },
1802 { GCRY_MD_CRC32_RFC1510, "MASSACHVSETTS INSTITVTE OF TECHNOLOGY",
1803 "\xe3\x41\x80\xf7" },
1805 { GCRY_MD_CRC32_RFC1510, "\x80\x00", "\x3b\x83\x98\x4b" },
1806 { GCRY_MD_CRC32_RFC1510, "\x00\x08", "\x0e\xdb\x88\x32" },
1807 { GCRY_MD_CRC32_RFC1510, "\x00\x80", "\xed\xb8\x83\x20" },
1809 { GCRY_MD_CRC32_RFC1510, "\x80", "\xed\xb8\x83\x20" },
1811 { GCRY_MD_CRC32_RFC1510, "\x80\x00\x00\x00", "\xed\x59\xb6\x3b" },
1812 { GCRY_MD_CRC32_RFC1510, "\x00\x00\x00\x01", "\x77\x07\x30\x96" },
1814 { GCRY_MD_CRC24_RFC2440, "", "\xb7\x04\xce" },
1815 { GCRY_MD_CRC24_RFC2440, "foo", "\x4f\xc2\x55" },
1817 { GCRY_MD_TIGER, "",
1818 "\x24\xF0\x13\x0C\x63\xAC\x93\x32\x16\x16\x6E\x76"
1819 "\xB1\xBB\x92\x5F\xF3\x73\xDE\x2D\x49\x58\x4E\x7A" },
1820 { GCRY_MD_TIGER, "abc",
1821 "\xF2\x58\xC1\xE8\x84\x14\xAB\x2A\x52\x7A\xB5\x41"
1822 "\xFF\xC5\xB8\xBF\x93\x5F\x7B\x95\x1C\x13\x29\x51" },
1823 { GCRY_MD_TIGER, "Tiger",
1824 "\x9F\x00\xF5\x99\x07\x23\x00\xDD\x27\x6A\xBB\x38"
1825 "\xC8\xEB\x6D\xEC\x37\x79\x0C\x11\x6F\x9D\x2B\xDF" },
1826 { GCRY_MD_TIGER, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefg"
1827 "hijklmnopqrstuvwxyz0123456789+-",
1828 "\x87\xFB\x2A\x90\x83\x85\x1C\xF7\x47\x0D\x2C\xF8"
1829 "\x10\xE6\xDF\x9E\xB5\x86\x44\x50\x34\xA5\xA3\x86" },
1830 { GCRY_MD_TIGER, "ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdef"
1831 "ghijklmnopqrstuvwxyz+0123456789",
1832 "\x46\x7D\xB8\x08\x63\xEB\xCE\x48\x8D\xF1\xCD\x12"
1833 "\x61\x65\x5D\xE9\x57\x89\x65\x65\x97\x5F\x91\x97" },
1834 { GCRY_MD_TIGER, "Tiger - A Fast New Hash Function, "
1835 "by Ross Anderson and Eli Biham",
1836 "\x0C\x41\x0A\x04\x29\x68\x86\x8A\x16\x71\xDA\x5A"
1837 "\x3F\xD2\x9A\x72\x5E\xC1\xE4\x57\xD3\xCD\xB3\x03" },
1838 { GCRY_MD_TIGER, "Tiger - A Fast New Hash Function, "
1839 "by Ross Anderson and Eli Biham, proceedings of Fa"
1840 "st Software Encryption 3, Cambridge.",
1841 "\xEB\xF5\x91\xD5\xAF\xA6\x55\xCE\x7F\x22\x89\x4F"
1842 "\xF8\x7F\x54\xAC\x89\xC8\x11\xB6\xB0\xDA\x31\x93" },
1843 { GCRY_MD_TIGER, "Tiger - A Fast New Hash Function, "
1844 "by Ross Anderson and Eli Biham, proceedings of Fa"
1845 "st Software Encryption 3, Cambridge, 1996.",
1846 "\x3D\x9A\xEB\x03\xD1\xBD\x1A\x63\x57\xB2\x77\x4D"
1847 "\xFD\x6D\x5B\x24\xDD\x68\x15\x1D\x50\x39\x74\xFC" },
1848 { GCRY_MD_TIGER, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefgh"
1849 "ijklmnopqrstuvwxyz0123456789+-ABCDEFGHIJKLMNOPQRS"
1850 "TUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-",
1851 "\x00\xB8\x3E\xB4\xE5\x34\x40\xC5\x76\xAC\x6A\xAE"
1852 "\xE0\xA7\x48\x58\x25\xFD\x15\xE7\x0A\x59\xFF\xE4" },
1854 { GCRY_MD_TIGER1, "",
1855 "\x32\x93\xAC\x63\x0C\x13\xF0\x24\x5F\x92\xBB\xB1"
1856 "\x76\x6E\x16\x16\x7A\x4E\x58\x49\x2D\xDE\x73\xF3" },
1857 { GCRY_MD_TIGER1, "a",
1858 "\x77\xBE\xFB\xEF\x2E\x7E\xF8\xAB\x2E\xC8\xF9\x3B"
1859 "\xF5\x87\xA7\xFC\x61\x3E\x24\x7F\x5F\x24\x78\x09" },
1860 { GCRY_MD_TIGER1, "abc",
1861 "\x2A\xAB\x14\x84\xE8\xC1\x58\xF2\xBF\xB8\xC5\xFF"
1862 "\x41\xB5\x7A\x52\x51\x29\x13\x1C\x95\x7B\x5F\x93" },
1863 { GCRY_MD_TIGER1, "message digest",
1864 "\xD9\x81\xF8\xCB\x78\x20\x1A\x95\x0D\xCF\x30\x48"
1865 "\x75\x1E\x44\x1C\x51\x7F\xCA\x1A\xA5\x5A\x29\xF6" },
1866 { GCRY_MD_TIGER1, "abcdefghijklmnopqrstuvwxyz",
1867 "\x17\x14\xA4\x72\xEE\xE5\x7D\x30\x04\x04\x12\xBF"
1868 "\xCC\x55\x03\x2A\x0B\x11\x60\x2F\xF3\x7B\xEE\xE9" },
1870 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
1871 "\x0F\x7B\xF9\xA1\x9B\x9C\x58\xF2\xB7\x61\x0D\xF7"
1872 "\xE8\x4F\x0A\xC3\xA7\x1C\x63\x1E\x7B\x53\xF7\x8E" },
1874 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
1875 "abcdefghijklmnopqrstuvwxyz" "0123456789",
1876 "\x8D\xCE\xA6\x80\xA1\x75\x83\xEE\x50\x2B\xA3\x8A"
1877 "\x3C\x36\x86\x51\x89\x0F\xFB\xCC\xDC\x49\xA8\xCC" },
1879 "1234567890" "1234567890" "1234567890" "1234567890"
1880 "1234567890" "1234567890" "1234567890" "1234567890",
1881 "\x1C\x14\x79\x55\x29\xFD\x9F\x20\x7A\x95\x8F\x84"
1882 "\xC5\x2F\x11\xE8\x87\xFA\x0C\xAB\xDF\xD9\x1B\xFD" },
1883 { GCRY_MD_TIGER1, "!",
1884 "\x6D\xB0\xE2\x72\x9C\xBE\xAD\x93\xD7\x15\xC6\xA7"
1885 "\xD3\x63\x02\xE9\xB3\xCE\xE0\xD2\xBC\x31\x4B\x41" },
1887 { GCRY_MD_TIGER2, "",
1888 "\x44\x41\xBE\x75\xF6\x01\x87\x73\xC2\x06\xC2\x27"
1889 "\x45\x37\x4B\x92\x4A\xA8\x31\x3F\xEF\x91\x9F\x41" },
1890 { GCRY_MD_TIGER2, "a",
1891 "\x67\xE6\xAE\x8E\x9E\x96\x89\x99\xF7\x0A\x23\xE7"
1892 "\x2A\xEA\xA9\x25\x1C\xBC\x7C\x78\xA7\x91\x66\x36" },
1893 { GCRY_MD_TIGER2, "abc",
1894 "\xF6\x8D\x7B\xC5\xAF\x4B\x43\xA0\x6E\x04\x8D\x78"
1895 "\x29\x56\x0D\x4A\x94\x15\x65\x8B\xB0\xB1\xF3\xBF" },
1896 { GCRY_MD_TIGER2, "message digest",
1897 "\xE2\x94\x19\xA1\xB5\xFA\x25\x9D\xE8\x00\x5E\x7D"
1898 "\xE7\x50\x78\xEA\x81\xA5\x42\xEF\x25\x52\x46\x2D" },
1899 { GCRY_MD_TIGER2, "abcdefghijklmnopqrstuvwxyz",
1900 "\xF5\xB6\xB6\xA7\x8C\x40\x5C\x85\x47\xE9\x1C\xD8"
1901 "\x62\x4C\xB8\xBE\x83\xFC\x80\x4A\x47\x44\x88\xFD" },
1903 "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
1904 "\xA6\x73\x7F\x39\x97\xE8\xFB\xB6\x3D\x20\xD2\xDF"
1905 "\x88\xF8\x63\x76\xB5\xFE\x2D\x5C\xE3\x66\x46\xA9" },
1907 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
1908 "abcdefghijklmnopqrstuvwxyz" "0123456789",
1909 "\xEA\x9A\xB6\x22\x8C\xEE\x7B\x51\xB7\x75\x44\xFC"
1910 "\xA6\x06\x6C\x8C\xBB\x5B\xBA\xE6\x31\x95\x05\xCD" },
1912 "1234567890" "1234567890" "1234567890" "1234567890"
1913 "1234567890" "1234567890" "1234567890" "1234567890",
1914 "\xD8\x52\x78\x11\x53\x29\xEB\xAA\x0E\xEC\x85\xEC"
1915 "\xDC\x53\x96\xFD\xA8\xAA\x3A\x58\x20\x94\x2F\xFF" },
1916 { GCRY_MD_TIGER2, "!",
1917 "\xE0\x68\x28\x1F\x06\x0F\x55\x16\x28\xCC\x57\x15"
1918 "\xB9\xD0\x22\x67\x96\x91\x4D\x45\xF7\x71\x7C\xF4" },
1920 { GCRY_MD_WHIRLPOOL, "",
1921 "\x19\xFA\x61\xD7\x55\x22\xA4\x66\x9B\x44\xE3\x9C\x1D\x2E\x17\x26"
1922 "\xC5\x30\x23\x21\x30\xD4\x07\xF8\x9A\xFE\xE0\x96\x49\x97\xF7\xA7"
1923 "\x3E\x83\xBE\x69\x8B\x28\x8F\xEB\xCF\x88\xE3\xE0\x3C\x4F\x07\x57"
1924 "\xEA\x89\x64\xE5\x9B\x63\xD9\x37\x08\xB1\x38\xCC\x42\xA6\x6E\xB3" },
1925 { GCRY_MD_WHIRLPOOL, "a",
1926 "\x8A\xCA\x26\x02\x79\x2A\xEC\x6F\x11\xA6\x72\x06\x53\x1F\xB7\xD7"
1927 "\xF0\xDF\xF5\x94\x13\x14\x5E\x69\x73\xC4\x50\x01\xD0\x08\x7B\x42"
1928 "\xD1\x1B\xC6\x45\x41\x3A\xEF\xF6\x3A\x42\x39\x1A\x39\x14\x5A\x59"
1929 "\x1A\x92\x20\x0D\x56\x01\x95\xE5\x3B\x47\x85\x84\xFD\xAE\x23\x1A" },
1930 { GCRY_MD_WHIRLPOOL, "a",
1931 "\x8A\xCA\x26\x02\x79\x2A\xEC\x6F\x11\xA6\x72\x06\x53\x1F\xB7\xD7"
1932 "\xF0\xDF\xF5\x94\x13\x14\x5E\x69\x73\xC4\x50\x01\xD0\x08\x7B\x42"
1933 "\xD1\x1B\xC6\x45\x41\x3A\xEF\xF6\x3A\x42\x39\x1A\x39\x14\x5A\x59"
1934 "\x1A\x92\x20\x0D\x56\x01\x95\xE5\x3B\x47\x85\x84\xFD\xAE\x23\x1A" },
1935 { GCRY_MD_WHIRLPOOL,
1936 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
1937 "\xDC\x37\xE0\x08\xCF\x9E\xE6\x9B\xF1\x1F\x00\xED\x9A\xBA\x26\x90"
1938 "\x1D\xD7\xC2\x8C\xDE\xC0\x66\xCC\x6A\xF4\x2E\x40\xF8\x2F\x3A\x1E"
1939 "\x08\xEB\xA2\x66\x29\x12\x9D\x8F\xB7\xCB\x57\x21\x1B\x92\x81\xA6"
1940 "\x55\x17\xCC\x87\x9D\x7B\x96\x21\x42\xC6\x5F\x5A\x7A\xF0\x14\x67" },
1941 { GCRY_MD_WHIRLPOOL,
1943 "\x0C\x99\x00\x5B\xEB\x57\xEF\xF5\x0A\x7C\xF0\x05\x56\x0D\xDF\x5D"
1944 "\x29\x05\x7F\xD8\x6B\x20\xBF\xD6\x2D\xEC\xA0\xF1\xCC\xEA\x4A\xF5"
1945 "\x1F\xC1\x54\x90\xED\xDC\x47\xAF\x32\xBB\x2B\x66\xC3\x4F\xF9\xAD"
1946 "\x8C\x60\x08\xAD\x67\x7F\x77\x12\x69\x53\xB2\x26\xE4\xED\x8B\x01" },
1952 fprintf (stderr, "Starting hash checks.\n");
1954 for (i = 0; algos[i].md; i++)
1956 if ((gcry_md_test_algo (algos[i].md) || algos[i].md == GCRY_MD_MD5)
1960 fprintf (stderr, " algorithm %d not available in fips mode\n",
1965 fprintf (stderr, " checking %s [%i] for length %zi\n",
1966 gcry_md_algo_name (algos[i].md),
1968 !strcmp (algos[i].data, "!")?
1969 1000000 : strlen(algos[i].data));
1971 check_one_md (algos[i].md, algos[i].data, strlen (algos[i].data),
1976 fprintf (stderr, "Completed hash checks.\n");
1980 check_one_hmac (int algo, const char *data, int datalen,
1981 const char *key, int keylen, const char *expect)
1983 gcry_md_hd_t hd, hd2;
1987 gcry_error_t err = 0;
1989 err = gcry_md_open (&hd, algo, GCRY_MD_FLAG_HMAC);
1992 fail ("algo %d, gcry_md_open failed: %s\n", algo, gpg_strerror (err));
1996 mdlen = gcry_md_get_algo_dlen (algo);
1997 if (mdlen < 1 || mdlen > 500)
1999 fail ("algo %d, gcry_md_get_algo_dlen failed: %d\n", algo, mdlen);
2003 gcry_md_setkey( hd, key, keylen );
2005 gcry_md_write (hd, data, datalen);
2007 err = gcry_md_copy (&hd2, hd);
2010 fail ("algo %d, gcry_md_copy failed: %s\n", algo, gpg_strerror (err));
2015 p = gcry_md_read (hd2, algo);
2017 fail("algo %d, hmac gcry_md_read failed\n", algo);
2019 if (memcmp (p, expect, mdlen))
2021 printf ("computed: ");
2022 for (i = 0; i < mdlen; i++)
2023 printf ("%02x ", p[i] & 0xFF);
2024 printf ("\nexpected: ");
2025 for (i = 0; i < mdlen; i++)
2026 printf ("%02x ", expect[i] & 0xFF);
2029 fail ("algo %d, digest mismatch\n", algo);
2032 gcry_md_close (hd2);
2046 { GCRY_MD_MD5, "what do ya want for nothing?", "Jefe",
2047 "\x75\x0c\x78\x3e\x6a\xb0\xb5\x03\xea\xa8\x6e\x31\x0a\x5d\xb7\x38" },
2050 "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b",
2051 "\x92\x94\x72\x7a\x36\x38\xbb\x1c\x13\xf4\x8e\xf8\x15\x8b\xfc\x9d" },
2053 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2054 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2055 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2056 "\xdd\xdd\xdd\xdd\xdd",
2057 "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA",
2058 "\x56\xbe\x34\x52\x1d\x14\x4c\x88\xdb\xb8\xc7\x33\xf0\xe8\xb3\xf6" },
2060 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2061 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2062 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2063 "\xcd\xcd\xcd\xcd\xcd",
2064 "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2065 "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
2066 "\x69\x7e\xaf\x0a\xca\x3a\x3a\xea\x3a\x75\x16\x47\x46\xff\xaa\x79" },
2067 { GCRY_MD_MD5, "Test With Truncation",
2068 "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c",
2069 "\x56\x46\x1e\xf2\x34\x2e\xdc\x00\xf9\xba\xb9\x95\x69\x0e\xfd\x4c" },
2070 { GCRY_MD_MD5, "Test Using Larger Than Block-Size Key - Hash Key First",
2071 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2072 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2073 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2074 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2075 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2076 "\xaa\xaa\xaa\xaa\xaa",
2077 "\x6b\x1a\xb7\xfe\x4b\xd7\xbf\x8f\x0b\x62\xe6\xce\x61\xb9\xd0\xcd" },
2079 "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data",
2080 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2081 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2082 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2083 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2084 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2085 "\xaa\xaa\xaa\xaa\xaa",
2086 "\x6f\x63\x0f\xad\x67\xcd\xa0\xee\x1f\xb1\xf5\x62\xdb\x3a\xa5\x3e", },
2087 { GCRY_MD_SHA256, "what do ya want for nothing?", "Jefe",
2088 "\x5b\xdc\xc1\x46\xbf\x60\x75\x4e\x6a\x04\x24\x26\x08\x95\x75\xc7\x5a"
2089 "\x00\x3f\x08\x9d\x27\x39\x83\x9d\xec\x58\xb9\x64\xec\x38\x43" },
2092 "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
2094 "\xb0\x34\x4c\x61\xd8\xdb\x38\x53\x5c\xa8\xaf\xce\xaf\x0b\xf1\x2b\x88"
2095 "\x1d\xc2\x00\xc9\x83\x3d\xa7\x26\xe9\x37\x6c\x2e\x32\xcf\xf7" },
2097 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2098 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2099 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2100 "\xdd\xdd\xdd\xdd\xdd",
2101 "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
2103 "\x77\x3e\xa9\x1e\x36\x80\x0e\x46\x85\x4d\xb8\xeb\xd0\x91\x81\xa7"
2104 "\x29\x59\x09\x8b\x3e\xf8\xc1\x22\xd9\x63\x55\x14\xce\xd5\x65\xfe" },
2106 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2107 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2108 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2109 "\xcd\xcd\xcd\xcd\xcd",
2110 "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2111 "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
2112 "\x82\x55\x8a\x38\x9a\x44\x3c\x0e\xa4\xcc\x81\x98\x99\xf2\x08"
2113 "\x3a\x85\xf0\xfa\xa3\xe5\x78\xf8\x07\x7a\x2e\x3f\xf4\x67\x29\x66\x5b" },
2115 "Test Using Larger Than Block-Size Key - Hash Key First",
2116 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2117 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2118 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2119 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2120 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2121 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2122 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2123 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2125 "\x60\xe4\x31\x59\x1e\xe0\xb6\x7f\x0d\x8a\x26\xaa\xcb\xf5\xb7\x7f"
2126 "\x8e\x0b\xc6\x21\x37\x28\xc5\x14\x05\x46\x04\x0f\x0e\xe3\x7f\x54" },
2128 "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
2129 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2130 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2131 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2132 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2133 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2134 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2135 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2136 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2138 "\x9b\x09\xff\xa7\x1b\x94\x2f\xcb\x27\x63\x5f\xbc\xd5\xb0\xe9\x44"
2139 "\xbf\xdc\x63\x64\x4f\x07\x13\x93\x8a\x7f\x51\x53\x5c\x3a\x35\xe2" },
2140 { GCRY_MD_SHA224, "what do ya want for nothing?", "Jefe",
2141 "\xa3\x0e\x01\x09\x8b\xc6\xdb\xbf\x45\x69\x0f\x3a\x7e\x9e\x6d\x0f"
2142 "\x8b\xbe\xa2\xa3\x9e\x61\x48\x00\x8f\xd0\x5e\x44" },
2145 "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
2147 "\x89\x6f\xb1\x12\x8a\xbb\xdf\x19\x68\x32\x10\x7c\xd4\x9d\xf3\x3f\x47"
2148 "\xb4\xb1\x16\x99\x12\xba\x4f\x53\x68\x4b\x22" },
2150 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2151 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2152 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2153 "\xdd\xdd\xdd\xdd\xdd",
2154 "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
2156 "\x7f\xb3\xcb\x35\x88\xc6\xc1\xf6\xff\xa9\x69\x4d\x7d\x6a\xd2\x64"
2157 "\x93\x65\xb0\xc1\xf6\x5d\x69\xd1\xec\x83\x33\xea" },
2159 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2160 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2161 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2162 "\xcd\xcd\xcd\xcd\xcd",
2163 "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2164 "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
2165 "\x6c\x11\x50\x68\x74\x01\x3c\xac\x6a\x2a\xbc\x1b\xb3\x82\x62"
2166 "\x7c\xec\x6a\x90\xd8\x6e\xfc\x01\x2d\xe7\xaf\xec\x5a" },
2168 "Test Using Larger Than Block-Size Key - Hash Key First",
2169 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2170 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2171 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2172 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2173 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2174 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2175 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2176 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2178 "\x95\xe9\xa0\xdb\x96\x20\x95\xad\xae\xbe\x9b\x2d\x6f\x0d\xbc\xe2"
2179 "\xd4\x99\xf1\x12\xf2\xd2\xb7\x27\x3f\xa6\x87\x0e" },
2181 "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
2182 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2183 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2184 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2185 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2186 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2187 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2188 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2189 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2191 "\x3a\x85\x41\x66\xac\x5d\x9f\x02\x3f\x54\xd5\x17\xd0\xb3\x9d\xbd"
2192 "\x94\x67\x70\xdb\x9c\x2b\x95\xc9\xf6\xf5\x65\xd1" },
2193 { GCRY_MD_SHA384, "what do ya want for nothing?", "Jefe",
2194 "\xaf\x45\xd2\xe3\x76\x48\x40\x31\x61\x7f\x78\xd2\xb5\x8a\x6b\x1b"
2195 "\x9c\x7e\xf4\x64\xf5\xa0\x1b\x47\xe4\x2e\xc3\x73\x63\x22\x44\x5e"
2196 "\x8e\x22\x40\xca\x5e\x69\xe2\xc7\x8b\x32\x39\xec\xfa\xb2\x16\x49" },
2199 "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
2201 "\xaf\xd0\x39\x44\xd8\x48\x95\x62\x6b\x08\x25\xf4\xab\x46\x90\x7f\x15"
2202 "\xf9\xda\xdb\xe4\x10\x1e\xc6\x82\xaa\x03\x4c\x7c\xeb\xc5\x9c\xfa\xea"
2203 "\x9e\xa9\x07\x6e\xde\x7f\x4a\xf1\x52\xe8\xb2\xfa\x9c\xb6" },
2205 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2206 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2207 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2208 "\xdd\xdd\xdd\xdd\xdd",
2209 "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
2211 "\x88\x06\x26\x08\xd3\xe6\xad\x8a\x0a\xa2\xac\xe0\x14\xc8\xa8\x6f"
2212 "\x0a\xa6\x35\xd9\x47\xac\x9f\xeb\xe8\x3e\xf4\xe5\x59\x66\x14\x4b"
2213 "\x2a\x5a\xb3\x9d\xc1\x38\x14\xb9\x4e\x3a\xb6\xe1\x01\xa3\x4f\x27" },
2215 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2216 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2217 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2218 "\xcd\xcd\xcd\xcd\xcd",
2219 "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2220 "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
2221 "\x3e\x8a\x69\xb7\x78\x3c\x25\x85\x19\x33\xab\x62\x90\xaf\x6c\xa7"
2222 "\x7a\x99\x81\x48\x08\x50\x00\x9c\xc5\x57\x7c\x6e\x1f\x57\x3b\x4e"
2223 "\x68\x01\xdd\x23\xc4\xa7\xd6\x79\xcc\xf8\xa3\x86\xc6\x74\xcf\xfb" },
2225 "Test Using Larger Than Block-Size Key - Hash Key First",
2226 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2227 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2228 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2229 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2230 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2231 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2232 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2233 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2235 "\x4e\xce\x08\x44\x85\x81\x3e\x90\x88\xd2\xc6\x3a\x04\x1b\xc5\xb4"
2236 "\x4f\x9e\xf1\x01\x2a\x2b\x58\x8f\x3c\xd1\x1f\x05\x03\x3a\xc4\xc6"
2237 "\x0c\x2e\xf6\xab\x40\x30\xfe\x82\x96\x24\x8d\xf1\x63\xf4\x49\x52" },
2239 "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
2240 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2241 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2242 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2243 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2244 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2245 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2246 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2247 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2249 "\x66\x17\x17\x8e\x94\x1f\x02\x0d\x35\x1e\x2f\x25\x4e\x8f\xd3\x2c"
2250 "\x60\x24\x20\xfe\xb0\xb8\xfb\x9a\xdc\xce\xbb\x82\x46\x1e\x99\xc5"
2251 "\xa6\x78\xcc\x31\xe7\x99\x17\x6d\x38\x60\xe6\x11\x0c\x46\x52\x3e" },
2252 { GCRY_MD_SHA512, "what do ya want for nothing?", "Jefe",
2253 "\x16\x4b\x7a\x7b\xfc\xf8\x19\xe2\xe3\x95\xfb\xe7\x3b\x56\xe0\xa3"
2254 "\x87\xbd\x64\x22\x2e\x83\x1f\xd6\x10\x27\x0c\xd7\xea\x25\x05\x54"
2255 "\x97\x58\xbf\x75\xc0\x5a\x99\x4a\x6d\x03\x4f\x65\xf8\xf0\xe6\xfd"
2256 "\xca\xea\xb1\xa3\x4d\x4a\x6b\x4b\x63\x6e\x07\x0a\x38\xbc\xe7\x37" },
2259 "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b"
2261 "\x87\xaa\x7c\xde\xa5\xef\x61\x9d\x4f\xf0\xb4\x24\x1a\x1d\x6c\xb0"
2262 "\x23\x79\xf4\xe2\xce\x4e\xc2\x78\x7a\xd0\xb3\x05\x45\xe1\x7c\xde"
2263 "\xda\xa8\x33\xb7\xd6\xb8\xa7\x02\x03\x8b\x27\x4e\xae\xa3\xf4\xe4"
2264 "\xbe\x9d\x91\x4e\xeb\x61\xf1\x70\x2e\x69\x6c\x20\x3a\x12\x68\x54" },
2266 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2267 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2268 "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd"
2269 "\xdd\xdd\xdd\xdd\xdd",
2270 "\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA\xAA"
2272 "\xfa\x73\xb0\x08\x9d\x56\xa2\x84\xef\xb0\xf0\x75\x6c\x89\x0b\xe9"
2273 "\xb1\xb5\xdb\xdd\x8e\xe8\x1a\x36\x55\xf8\x3e\x33\xb2\x27\x9d\x39"
2274 "\xbf\x3e\x84\x82\x79\xa7\x22\xc8\x06\xb4\x85\xa4\x7e\x67\xc8\x07"
2275 "\xb9\x46\xa3\x37\xbe\xe8\x94\x26\x74\x27\x88\x59\xe1\x32\x92\xfb" },
2277 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2278 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2279 "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd"
2280 "\xcd\xcd\xcd\xcd\xcd",
2281 "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
2282 "\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
2283 "\xb0\xba\x46\x56\x37\x45\x8c\x69\x90\xe5\xa8\xc5\xf6\x1d\x4a\xf7"
2284 "\xe5\x76\xd9\x7f\xf9\x4b\x87\x2d\xe7\x6f\x80\x50\x36\x1e\xe3\xdb"
2285 "\xa9\x1c\xa5\xc1\x1a\xa2\x5e\xb4\xd6\x79\x27\x5c\xc5\x78\x80\x63"
2286 "\xa5\xf1\x97\x41\x12\x0c\x4f\x2d\xe2\xad\xeb\xeb\x10\xa2\x98\xdd" },
2288 "Test Using Larger Than Block-Size Key - Hash Key First",
2289 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2290 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2291 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2292 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2293 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2294 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2295 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2296 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2298 "\x80\xb2\x42\x63\xc7\xc1\xa3\xeb\xb7\x14\x93\xc1\xdd\x7b\xe8\xb4"
2299 "\x9b\x46\xd1\xf4\x1b\x4a\xee\xc1\x12\x1b\x01\x37\x83\xf8\xf3\x52"
2300 "\x6b\x56\xd0\x37\xe0\x5f\x25\x98\xbd\x0f\xd2\x21\x5d\x6a\x1e\x52"
2301 "\x95\xe6\x4f\x73\xf6\x3f\x0a\xec\x8b\x91\x5a\x98\x5d\x78\x65\x98" },
2303 "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
2304 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2305 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2306 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2307 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2308 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2309 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2310 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2311 "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa"
2313 "\xe3\x7b\x6a\x77\x5d\xc8\x7d\xba\xa4\xdf\xa9\xf9\x6e\x5e\x3f\xfd"
2314 "\xde\xbd\x71\xf8\x86\x72\x89\x86\x5d\xf5\xa3\x2d\x20\xcd\xc9\x44"
2315 "\xb6\x02\x2c\xac\x3c\x49\x82\xb1\x0d\x5e\xeb\x55\xc3\xe4\xde\x15"
2316 "\x13\x46\x76\xfb\x6d\xe0\x44\x60\x65\xc9\x74\x40\xfa\x8c\x6a\x58" },
2322 fprintf (stderr, "Starting hashed MAC checks.\n");
2324 for (i = 0; algos[i].md; i++)
2326 if ((gcry_md_test_algo (algos[i].md) || algos[i].md == GCRY_MD_MD5)
2330 fprintf (stderr, " algorithm %d not available in fips mode\n",
2336 " checking %s [%i] for %zi byte key and %zi byte data\n",
2337 gcry_md_algo_name (algos[i].md),
2339 strlen(algos[i].key), strlen(algos[i].data));
2341 check_one_hmac (algos[i].md, algos[i].data, strlen (algos[i].data),
2342 algos[i].key, strlen(algos[i].key),
2347 fprintf (stderr, "Completed hashed MAC checks.\n");
2350 /* Check that the signature SIG matches the hash HASH. PKEY is the
2351 public key used for the verification. BADHASH is a hasvalue which
2352 should; result in a bad signature status. */
2354 verify_one_signature (gcry_sexp_t pkey, gcry_sexp_t hash,
2355 gcry_sexp_t badhash, gcry_sexp_t sig)
2359 rc = gcry_pk_verify (sig, hash, pkey);
2361 fail ("gcry_pk_verify failed: %s\n", gpg_strerror (rc));
2362 rc = gcry_pk_verify (sig, badhash, pkey);
2363 if (gcry_err_code (rc) != GPG_ERR_BAD_SIGNATURE)
2364 fail ("gcry_pk_verify failed to detect a bad signature: %s\n",
2369 /* Test the public key sign function using the private ket SKEY. PKEY
2370 is used for verification. */
2372 check_pubkey_sign (int n, gcry_sexp_t skey, gcry_sexp_t pkey, int algo)
2375 gcry_sexp_t sig, badhash, hash;
2377 static const char baddata[] =
2378 "(data\n (flags pkcs1)\n"
2379 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203041#))\n";
2387 { "(data\n (flags pkcs1)\n"
2388 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2391 { "(data\n (flags oaep)\n"
2392 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2395 /* This test is to see whether hash algorithms not hard wired in
2396 pubkey.c are detected: */
2397 { "(data\n (flags pkcs1)\n"
2398 " (hash oid.1.3.14.3.2.29 "
2399 " #11223344556677889900AABBCCDDEEFF10203040#))\n",
2402 { "(data\n (flags )\n"
2403 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2406 { "(data\n (flags pkcs1)\n"
2407 " (hash foo #11223344556677889900AABBCCDDEEFF10203040#))\n",
2409 GPG_ERR_DIGEST_ALGO },
2410 { "(data\n (flags )\n" " (value #11223344556677889900AA#))\n",
2413 { "(data\n (flags )\n" " (value #0090223344556677889900AA#))\n",
2416 { "(data\n (flags raw)\n" " (value #11223344556677889900AA#))\n",
2419 { "(data\n (flags pkcs1)\n"
2420 " (value #11223344556677889900AA#))\n",
2423 { "(data\n (flags raw foo)\n"
2424 " (value #11223344556677889900AA#))\n",
2427 { "(data\n (flags pss)\n"
2428 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2431 { "(data\n (flags pss)\n"
2432 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#)\n"
2433 " (random-override #4253647587980912233445566778899019283747#))\n",
2441 rc = gcry_sexp_sscan (&badhash, NULL, baddata, strlen (baddata));
2443 die ("converting data failed: %s\n", gpg_strerror (rc));
2445 for (dataidx = 0; datas[dataidx].data; dataidx++)
2447 if (datas[dataidx].algo && datas[dataidx].algo != algo)
2451 fprintf (stderr, " signature test %d\n", dataidx);
2453 rc = gcry_sexp_sscan (&hash, NULL, datas[dataidx].data,
2454 strlen (datas[dataidx].data));
2456 die ("converting data failed: %s\n", gpg_strerror (rc));
2458 rc = gcry_pk_sign (&sig, hash, skey);
2459 if (gcry_err_code (rc) != datas[dataidx].expected_rc)
2460 fail ("gcry_pk_sign failed: %s\n", gpg_strerror (rc));
2463 verify_one_signature (pkey, hash, badhash, sig);
2465 gcry_sexp_release (sig);
2467 gcry_sexp_release (hash);
2471 gcry_sexp_release (badhash);
2475 check_pubkey_crypt (int n, gcry_sexp_t skey, gcry_sexp_t pkey, int algo)
2478 gcry_sexp_t plain, ciph, data;
2482 int algo; /* If not 0 run test only if ALGO matches. */
2486 int encrypt_expected_rc;
2487 int decrypt_expected_rc;
2491 "(data\n (flags pkcs1)\n"
2492 " (value #11223344556677889900AA#))\n",
2498 "(data\n (flags pkcs1)\n"
2499 " (value #11223344556677889900AA#))\n",
2505 "(data\n (flags oaep)\n"
2506 " (value #11223344556677889900AA#))\n",
2512 "(data\n (flags oaep)\n (hash-algo sha1)\n"
2513 " (value #11223344556677889900AA#))\n",
2514 "(flags oaep)(hash-algo sha1)",
2519 "(data\n (flags oaep)\n (hash-algo sha1)\n (label \"test\")\n"
2520 " (value #11223344556677889900AA#))\n",
2521 "(flags oaep)(hash-algo sha1)(label \"test\")",
2526 "(data\n (flags oaep)\n (hash-algo sha1)\n (label \"test\")\n"
2527 " (value #11223344556677889900AA#)\n"
2528 " (random-override #4253647587980912233445566778899019283747#))\n",
2529 "(flags oaep)(hash-algo sha1)(label \"test\")",
2534 "(data\n (flags )\n" " (value #11223344556677889900AA#))\n",
2540 "(data\n (flags )\n" " (value #0090223344556677889900AA#))\n",
2546 "(data\n (flags raw)\n" " (value #11223344556677889900AA#))\n",
2552 "(data\n (flags pkcs1)\n"
2553 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2559 "(data\n (flags raw foo)\n"
2560 " (hash sha1 #11223344556677889900AABBCCDDEEFF10203040#))\n",
2566 "(data\n (flags raw)\n"
2567 " (value #11223344556677889900AA#))\n",
2571 GPG_ERR_ENCODING_PROBLEM },
2573 "(data\n (flags oaep)\n"
2574 " (value #11223344556677889900AA#))\n",
2578 GPG_ERR_ENCODING_PROBLEM },
2580 "(data\n (flags pss)\n"
2581 " (value #11223344556677889900AA#))\n",
2590 for (dataidx = 0; datas[dataidx].data; dataidx++)
2592 if (datas[dataidx].algo && datas[dataidx].algo != algo)
2596 fprintf (stderr, " encryption/decryption test %d (algo %d)\n",
2599 rc = gcry_sexp_sscan (&data, NULL, datas[dataidx].data,
2600 strlen (datas[dataidx].data));
2602 die ("converting data failed: %s\n", gpg_strerror (rc));
2604 rc = gcry_pk_encrypt (&ciph, data, pkey);
2605 if (gcry_err_code (rc) != datas[dataidx].encrypt_expected_rc)
2606 fail ("gcry_pk_encrypt failed: %s\n", gpg_strerror (rc));
2610 /* Insert decoding hint to CIPH. */
2611 if (datas[dataidx].hint)
2613 size_t hint_len, len;
2617 /* Convert decoding hint into canonical sexp. */
2618 hint_len = gcry_sexp_new (&list, datas[dataidx].hint,
2619 strlen (datas[dataidx].hint), 1);
2620 hint_len = gcry_sexp_sprint (list, GCRYSEXP_FMT_CANON, NULL, 0);
2621 hint = gcry_malloc (hint_len);
2623 die ("can't allocate memory\n");
2624 hint_len = gcry_sexp_sprint (list, GCRYSEXP_FMT_CANON, hint,
2626 gcry_sexp_release (list);
2628 /* Convert CIPH into canonical sexp. */
2629 len = gcry_sexp_sprint (ciph, GCRYSEXP_FMT_CANON, NULL, 0);
2630 buf = gcry_malloc (len + hint_len);
2632 die ("can't allocate memory\n");
2633 len = gcry_sexp_sprint (ciph, GCRYSEXP_FMT_CANON, buf, len);
2634 /* assert (!strcmp (buf, "(7:enc-val", 10)); */
2636 /* Copy decoding hint into CIPH. */
2637 memmove (buf + 10 + hint_len, buf + 10, len - 10);
2638 memcpy (buf + 10, hint, hint_len);
2640 gcry_sexp_new (&list, buf, len + hint_len, 1);
2642 gcry_sexp_release (ciph);
2645 rc = gcry_pk_decrypt (&plain, ciph, skey);
2646 if (gcry_err_code (rc) != datas[dataidx].decrypt_expected_rc)
2647 fail ("gcry_pk_decrypt failed: %s\n", gpg_strerror (rc));
2649 if (!rc && datas[dataidx].unpadded)
2653 p1 = gcry_sexp_find_token (data, "value", 0);
2654 p2 = gcry_sexp_find_token (plain, "value", 0);
2657 const char *s1, *s2;
2660 s1 = gcry_sexp_nth_data (p1, 1, &n1);
2661 s2 = gcry_sexp_nth_data (p2, 1, &n2);
2662 if (n1 != n2 || memcmp (s1, s2, n1))
2663 fail ("gcry_pk_encrypt/gcry_pk_decrypt do not roundtrip\n");
2665 gcry_sexp_release (p1);
2666 gcry_sexp_release (p2);
2670 gcry_sexp_release (plain);
2672 gcry_sexp_release (ciph);
2674 gcry_sexp_release (data);
2680 check_pubkey_grip (int n, const unsigned char *grip,
2681 gcry_sexp_t skey, gcry_sexp_t pkey, int algo)
2683 unsigned char sgrip[20], pgrip[20];
2687 if (!gcry_pk_get_keygrip (skey, sgrip))
2688 die ("get keygrip for private RSA key failed\n");
2689 if (!gcry_pk_get_keygrip (pkey, pgrip))
2690 die ("[%i] get keygrip for public RSA key failed\n", n);
2691 if (memcmp (sgrip, pgrip, 20))
2692 fail ("[%i] keygrips don't match\n", n);
2693 if (memcmp (sgrip, grip, 20))
2694 fail ("wrong keygrip for RSA key\n");
2698 do_check_one_pubkey (int n, gcry_sexp_t skey, gcry_sexp_t pkey,
2699 const unsigned char *grip, int algo, int flags)
2701 if (flags & FLAG_SIGN)
2702 check_pubkey_sign (n, skey, pkey, algo);
2703 if (flags & FLAG_CRYPT)
2704 check_pubkey_crypt (n, skey, pkey, algo);
2705 if (grip && (flags & FLAG_GRIP))
2706 check_pubkey_grip (n, grip, skey, pkey, algo);
2710 check_one_pubkey (int n, test_spec_pubkey_t spec)
2712 gcry_error_t err = GPG_ERR_NO_ERROR;
2713 gcry_sexp_t skey, pkey;
2715 err = gcry_sexp_sscan (&skey, NULL, spec.key.secret,
2716 strlen (spec.key.secret));
2718 err = gcry_sexp_sscan (&pkey, NULL, spec.key.public,
2719 strlen (spec.key.public));
2721 die ("converting sample key failed: %s\n", gpg_strerror (err));
2723 do_check_one_pubkey (n, skey, pkey,
2724 (const unsigned char*)spec.key.grip,
2725 spec.id, spec.flags);
2727 gcry_sexp_release (skey);
2728 gcry_sexp_release (pkey);
2732 get_keys_new (gcry_sexp_t *pkey, gcry_sexp_t *skey)
2734 gcry_sexp_t key_spec, key, pub_key, sec_key;
2737 fprintf (stderr, " generating RSA key:");
2738 rc = gcry_sexp_new (&key_spec,
2739 in_fips_mode ? "(genkey (rsa (nbits 4:1024)))"
2740 : "(genkey (rsa (nbits 4:1024)(transient-key)))",
2743 die ("error creating S-expression: %s\n", gpg_strerror (rc));
2744 rc = gcry_pk_genkey (&key, key_spec);
2745 gcry_sexp_release (key_spec);
2747 die ("error generating RSA key: %s\n", gpg_strerror (rc));
2749 pub_key = gcry_sexp_find_token (key, "public-key", 0);
2751 die ("public part missing in key\n");
2753 sec_key = gcry_sexp_find_token (key, "private-key", 0);
2755 die ("private part missing in key\n");
2757 gcry_sexp_release (key);
2763 check_one_pubkey_new (int n)
2765 gcry_sexp_t skey, pkey;
2767 get_keys_new (&pkey, &skey);
2768 do_check_one_pubkey (n, skey, pkey, NULL,
2769 GCRY_PK_RSA, FLAG_SIGN | FLAG_CRYPT);
2770 gcry_sexp_release (pkey);
2771 gcry_sexp_release (skey);
2774 /* Run all tests for the public key functions. */
2778 test_spec_pubkey_t pubkeys[] =
2781 GCRY_PK_RSA, FLAG_CRYPT | FLAG_SIGN,
2785 " (n #00e0ce96f90b6c9e02f3922beada93fe50a875eac6bcc18bb9a9cf2e84965caa"
2786 " 2d1ff95a7f542465c6c0c19d276e4526ce048868a7a914fd343cc3a87dd74291"
2787 " ffc565506d5bbb25cbac6a0e2dd1f8bcaab0d4a29c2f37c950f363484bf269f7"
2788 " 891440464baf79827e03a36e70b814938eebdc63e964247be75dc58b014b7ea251#)\n"
2790 " (d #046129F2489D71579BE0A75FE029BD6CDB574EBF57EA8A5B0FDA942CAB943B11"
2791 " 7D7BB95E5D28875E0F9FC5FCC06A72F6D502464DABDED78EF6B716177B83D5BD"
2792 " C543DC5D3FED932E59F5897E92E6F58A0F33424106A3B6FA2CBF877510E4AC21"
2793 " C3EE47851E97D12996222AC3566D4CCB0B83D164074ABF7DE655FC2446DA1781#)\n"
2794 " (p #00e861b700e17e8afe6837e7512e35b6ca11d0ae47d8b85161c67baf64377213"
2795 " fe52d772f2035b3ca830af41d8a4120e1c1c70d12cc22f00d28d31dd48a8d424f1#)\n"
2796 " (q #00f7a7ca5367c661f8e62df34f0d05c10c88e5492348dd7bddc942c9a8f369f9"
2797 " 35a07785d2db805215ed786e4285df1658eed3ce84f469b81b50d358407b4ad361#)\n"
2798 " (u #304559a9ead56d2309d203811a641bb1a09626bc8eb36fffa23c968ec5bd891e"
2799 " ebbafc73ae666e01ba7c8990bae06cc2bbe10b75e69fcacb353a6473079d8e9b#)))\n",
2803 " (n #00e0ce96f90b6c9e02f3922beada93fe50a875eac6bcc18bb9a9cf2e84965caa"
2804 " 2d1ff95a7f542465c6c0c19d276e4526ce048868a7a914fd343cc3a87dd74291"
2805 " ffc565506d5bbb25cbac6a0e2dd1f8bcaab0d4a29c2f37c950f363484bf269f7"
2806 " 891440464baf79827e03a36e70b814938eebdc63e964247be75dc58b014b7ea251#)\n"
2807 " (e #010001#)))\n",
2809 "\x32\x10\x0c\x27\x17\x3e\xf6\xe9\xc4\xe9"
2810 "\xa2\x5d\x3d\x69\xf8\x6d\x37\xa4\xf9\x39"}
2813 GCRY_PK_DSA, FLAG_SIGN,
2817 " (p #00AD7C0025BA1A15F775F3F2D673718391D00456978D347B33D7B49E7F32EDAB"
2818 " 96273899DD8B2BB46CD6ECA263FAF04A28903503D59062A8865D2AE8ADFB5191"
2819 " CF36FFB562D0E2F5809801A1F675DAE59698A9E01EFE8D7DCFCA084F4C6F5A44"
2820 " 44D499A06FFAEA5E8EF5E01F2FD20A7B7EF3F6968AFBA1FB8D91F1559D52D8777B#)\n"
2821 " (q #00EB7B5751D25EBBB7BD59D920315FD840E19AEBF9#)\n"
2822 " (g #1574363387FDFD1DDF38F4FBE135BB20C7EE4772FB94C337AF86EA8E49666503"
2823 " AE04B6BE81A2F8DD095311E0217ACA698A11E6C5D33CCDAE71498ED35D13991E"
2824 " B02F09AB40BD8F4C5ED8C75DA779D0AE104BC34C960B002377068AB4B5A1F984"
2825 " 3FBA91F537F1B7CAC4D8DD6D89B0D863AF7025D549F9C765D2FC07EE208F8D15#)\n"
2826 " (y #64B11EF8871BE4AB572AA810D5D3CA11A6CDBC637A8014602C72960DB135BF46"
2827 " A1816A724C34F87330FC9E187C5D66897A04535CC2AC9164A7150ABFA8179827"
2828 " 6E45831AB811EEE848EBB24D9F5F2883B6E5DDC4C659DEF944DCFD80BF4D0A20"
2829 " 42CAA7DC289F0C5A9D155F02D3D551DB741A81695B74D4C8F477F9C7838EB0FB#)\n"
2830 " (x #11D54E4ADBD3034160F2CED4B7CD292A4EBF3EC0#)))\n",
2834 " (p #00AD7C0025BA1A15F775F3F2D673718391D00456978D347B33D7B49E7F32EDAB"
2835 " 96273899DD8B2BB46CD6ECA263FAF04A28903503D59062A8865D2AE8ADFB5191"
2836 " CF36FFB562D0E2F5809801A1F675DAE59698A9E01EFE8D7DCFCA084F4C6F5A44"
2837 " 44D499A06FFAEA5E8EF5E01F2FD20A7B7EF3F6968AFBA1FB8D91F1559D52D8777B#)\n"
2838 " (q #00EB7B5751D25EBBB7BD59D920315FD840E19AEBF9#)\n"
2839 " (g #1574363387FDFD1DDF38F4FBE135BB20C7EE4772FB94C337AF86EA8E49666503"
2840 " AE04B6BE81A2F8DD095311E0217ACA698A11E6C5D33CCDAE71498ED35D13991E"
2841 " B02F09AB40BD8F4C5ED8C75DA779D0AE104BC34C960B002377068AB4B5A1F984"
2842 " 3FBA91F537F1B7CAC4D8DD6D89B0D863AF7025D549F9C765D2FC07EE208F8D15#)\n"
2843 " (y #64B11EF8871BE4AB572AA810D5D3CA11A6CDBC637A8014602C72960DB135BF46"
2844 " A1816A724C34F87330FC9E187C5D66897A04535CC2AC9164A7150ABFA8179827"
2845 " 6E45831AB811EEE848EBB24D9F5F2883B6E5DDC4C659DEF944DCFD80BF4D0A20"
2846 " 42CAA7DC289F0C5A9D155F02D3D551DB741A81695B74D4C8F477F9C7838EB0FB#)))\n",
2848 "\xc6\x39\x83\x1a\x43\xe5\x05\x5d\xc6\xd8"
2849 "\x4a\xa6\xf9\xeb\x23\xbf\xa9\x12\x2d\x5b" }
2852 GCRY_PK_ELG, FLAG_SIGN | FLAG_CRYPT,
2856 " (p #00B93B93386375F06C2D38560F3B9C6D6D7B7506B20C1773F73F8DE56E6CD65D"
2857 " F48DFAAA1E93F57A2789B168362A0F787320499F0B2461D3A4268757A7B27517"
2858 " B7D203654A0CD484DEC6AF60C85FEB84AAC382EAF2047061FE5DAB81A20A0797"
2859 " 6E87359889BAE3B3600ED718BE61D4FC993CC8098A703DD0DC942E965E8F18D2A7#)\n"
2861 " (y #72DAB3E83C9F7DD9A931FDECDC6522C0D36A6F0A0FEC955C5AC3C09175BBFF2B"
2862 " E588DB593DC2E420201BEB3AC17536918417C497AC0F8657855380C1FCF11C5B"
2863 " D20DB4BEE9BDF916648DE6D6E419FA446C513AAB81C30CB7B34D6007637BE675"
2864 " 56CE6473E9F9EE9B9FADD275D001563336F2186F424DEC6199A0F758F6A00FF4#)\n"
2865 " (x #03C28900087B38DABF4A0AB98ACEA39BB674D6557096C01D72E31C16BDD32214#)))\n",
2869 " (p #00B93B93386375F06C2D38560F3B9C6D6D7B7506B20C1773F73F8DE56E6CD65D"
2870 " F48DFAAA1E93F57A2789B168362A0F787320499F0B2461D3A4268757A7B27517"
2871 " B7D203654A0CD484DEC6AF60C85FEB84AAC382EAF2047061FE5DAB81A20A0797"
2872 " 6E87359889BAE3B3600ED718BE61D4FC993CC8098A703DD0DC942E965E8F18D2A7#)\n"
2874 " (y #72DAB3E83C9F7DD9A931FDECDC6522C0D36A6F0A0FEC955C5AC3C09175BBFF2B"
2875 " E588DB593DC2E420201BEB3AC17536918417C497AC0F8657855380C1FCF11C5B"
2876 " D20DB4BEE9BDF916648DE6D6E419FA446C513AAB81C30CB7B34D6007637BE675"
2877 " 56CE6473E9F9EE9B9FADD275D001563336F2186F424DEC6199A0F758F6A00FF4#)))\n",
2879 "\xa7\x99\x61\xeb\x88\x83\xd2\xf4\x05\xc8"
2880 "\x4f\xba\x06\xf8\x78\x09\xbc\x1e\x20\xe5" }
2885 fprintf (stderr, "Starting public key checks.\n");
2886 for (i = 0; i < sizeof (pubkeys) / sizeof (*pubkeys); i++)
2889 if (gcry_pk_test_algo (pubkeys[i].id) && in_fips_mode)
2892 fprintf (stderr, " algorithm %d not available in fips mode\n",
2896 check_one_pubkey (i, pubkeys[i]);
2899 fprintf (stderr, "Completed public key checks.\n");
2902 fprintf (stderr, "Starting additional public key checks.\n");
2903 for (i = 0; i < sizeof (pubkeys) / sizeof (*pubkeys); i++)
2906 if (gcry_pk_test_algo (pubkeys[i].id) && in_fips_mode)
2909 fprintf (stderr, " algorithm %d not available in fips mode\n",
2913 check_one_pubkey_new (i);
2916 fprintf (stderr, "Completed additional public key checks.\n");
2921 main (int argc, char **argv)
2927 int selftest_only = 0;
2932 while (argc && last_argc != argc )
2935 if (!strcmp (*argv, "--"))
2940 else if (!strcmp (*argv, "--verbose"))
2945 else if (!strcmp (*argv, "--debug"))
2947 verbose = debug = 1;
2950 else if (!strcmp (*argv, "--fips"))
2955 else if (!strcmp (*argv, "--selftest"))
2961 else if (!strcmp (*argv, "--die"))
2968 gcry_control (GCRYCTL_SET_VERBOSITY, (int)verbose);
2971 gcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
2973 /* Check that we test exactly our version - including the patchlevel. */
2974 if (strcmp (GCRYPT_VERSION, gcry_check_version (NULL)))
2975 die ("version mismatch; pgm=%s, library=%s\n",
2976 GCRYPT_VERSION,gcry_check_version (NULL));
2978 if ( gcry_fips_mode_active () )
2982 gcry_control (GCRYCTL_DISABLE_SECMEM, 0);
2985 gcry_set_progress_handler (progress_handler, NULL);
2987 gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
2989 gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
2990 /* No valuable keys are create, so we can speed up our RNG. */
2991 gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
2996 check_cipher_modes ();
2997 check_bulk_cipher_modes ();
3004 if (in_fips_mode && !selftest_only)
3006 /* If we are in fips mode do some more tests. */
3009 /* First trigger a self-test. */
3010 gcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
3011 if (!gcry_control (GCRYCTL_OPERATIONAL_P, 0))
3012 fail ("not in operational state after self-test\n");
3014 /* Get us into the error state. */
3015 err = gcry_md_open (&md, GCRY_MD_SHA1, 0);
3017 fail ("failed to open SHA-1 hash context: %s\n", gpg_strerror (err));
3020 err = gcry_md_enable (md, GCRY_MD_SHA256);
3022 fail ("failed to add SHA-256 hash context: %s\n",
3023 gpg_strerror (err));
3026 /* gcry_md_get_algo is only defined for a context with
3027 just one digest algorithm. With our setup it should
3028 put the oibrary intoerror state. */
3029 fputs ("Note: Two lines with error messages follow "
3030 "- this is expected\n", stderr);
3031 gcry_md_get_algo (md);
3033 if (gcry_control (GCRYCTL_OPERATIONAL_P, 0))
3034 fail ("expected error state but still in operational state\n");
3037 /* Now run a self-test and to get back into
3038 operational state. */
3039 gcry_control (GCRYCTL_FORCE_FIPS_MODE, 0);
3040 if (!gcry_control (GCRYCTL_OPERATIONAL_P, 0))
3041 fail ("did not reach operational after error "
3050 /* If in standard mode, run selftests. */
3051 if (gcry_control (GCRYCTL_SELFTEST, 0))
3052 fail ("running self-test failed\n");
3056 fprintf (stderr, "\nAll tests completed. Errors: %i\n", error_count);
3058 if (in_fips_mode && !gcry_fips_mode_active ())
3059 fprintf (stderr, "FIPS mode is not anymore active\n");
3061 return error_count ? 1 : 0;