1 | /*
|
---|
2 | * Copyright (c) 1995 - 2002 Kungliga Tekniska Högskolan
|
---|
3 | * (Royal Institute of Technology, Stockholm, Sweden).
|
---|
4 | * All rights reserved.
|
---|
5 | *
|
---|
6 | * Redistribution and use in source and binary forms, with or without
|
---|
7 | * modification, are permitted provided that the following conditions
|
---|
8 | * are met:
|
---|
9 | *
|
---|
10 | * 1. Redistributions of source code must retain the above copyright
|
---|
11 | * notice, this list of conditions and the following disclaimer.
|
---|
12 | *
|
---|
13 | * 2. Redistributions in binary form must reproduce the above copyright
|
---|
14 | * notice, this list of conditions and the following disclaimer in the
|
---|
15 | * documentation and/or other materials provided with the distribution.
|
---|
16 | *
|
---|
17 | * 3. Neither the name of the Institute nor the names of its contributors
|
---|
18 | * may be used to endorse or promote products derived from this software
|
---|
19 | * without specific prior written permission.
|
---|
20 | *
|
---|
21 | * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
---|
22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
---|
23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
---|
24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
---|
25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
---|
26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
---|
27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
---|
28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
---|
29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
---|
30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
---|
31 | * SUCH DAMAGE.
|
---|
32 | */
|
---|
33 |
|
---|
34 | #include <config.h>
|
---|
35 |
|
---|
36 | #define HC_DEPRECATED_CRYPTO
|
---|
37 |
|
---|
38 | #include <stdio.h>
|
---|
39 | #ifdef HAVE_STDLIB_H
|
---|
40 | #include <stdlib.h>
|
---|
41 | #endif
|
---|
42 | #include <string.h>
|
---|
43 | #ifdef KRB5
|
---|
44 | #include <krb5-types.h>
|
---|
45 | #endif
|
---|
46 | #include <md2.h>
|
---|
47 | #include <md4.h>
|
---|
48 | #include <md5.h>
|
---|
49 | #include <sha.h>
|
---|
50 | #include <evp.h>
|
---|
51 |
|
---|
52 | #define ONE_MILLION_A "one million a's"
|
---|
53 |
|
---|
54 | struct hash_foo {
|
---|
55 | const char *name;
|
---|
56 | size_t psize;
|
---|
57 | size_t hsize;
|
---|
58 | void (*init)(void*);
|
---|
59 | void (*update)(void*, const void*, size_t);
|
---|
60 | void (*final)(void*, void*);
|
---|
61 | const EVP_MD * (*evp)(void);
|
---|
62 | } md2 = {
|
---|
63 | "MD2",
|
---|
64 | sizeof(MD2_CTX),
|
---|
65 | 16,
|
---|
66 | (void (*)(void*))MD2_Init,
|
---|
67 | (void (*)(void*,const void*, size_t))MD2_Update,
|
---|
68 | (void (*)(void*, void*))MD2_Final,
|
---|
69 | EVP_md2
|
---|
70 | }, md4 = {
|
---|
71 | "MD4",
|
---|
72 | sizeof(MD4_CTX),
|
---|
73 | 16,
|
---|
74 | (void (*)(void*))MD4_Init,
|
---|
75 | (void (*)(void*,const void*, size_t))MD4_Update,
|
---|
76 | (void (*)(void*, void*))MD4_Final,
|
---|
77 | EVP_md4
|
---|
78 | }, md5 = {
|
---|
79 | "MD5",
|
---|
80 | sizeof(MD5_CTX),
|
---|
81 | 16,
|
---|
82 | (void (*)(void*))MD5_Init,
|
---|
83 | (void (*)(void*,const void*, size_t))MD5_Update,
|
---|
84 | (void (*)(void*, void*))MD5_Final,
|
---|
85 | EVP_md5
|
---|
86 | }, sha1 = {
|
---|
87 | "SHA-1",
|
---|
88 | sizeof(struct sha),
|
---|
89 | 20,
|
---|
90 | (void (*)(void*))SHA1_Init,
|
---|
91 | (void (*)(void*,const void*, size_t))SHA1_Update,
|
---|
92 | (void (*)(void*, void*))SHA1_Final,
|
---|
93 | EVP_sha1
|
---|
94 | };
|
---|
95 | struct hash_foo sha256 = {
|
---|
96 | "SHA-256",
|
---|
97 | sizeof(SHA256_CTX),
|
---|
98 | 32,
|
---|
99 | (void (*)(void*))SHA256_Init,
|
---|
100 | (void (*)(void*,const void*, size_t))SHA256_Update,
|
---|
101 | (void (*)(void*, void*))SHA256_Final,
|
---|
102 | EVP_sha256
|
---|
103 | };
|
---|
104 | struct hash_foo sha384 = {
|
---|
105 | "SHA-384",
|
---|
106 | sizeof(SHA384_CTX),
|
---|
107 | 48,
|
---|
108 | (void (*)(void*))SHA384_Init,
|
---|
109 | (void (*)(void*,const void*, size_t))SHA384_Update,
|
---|
110 | (void (*)(void*, void*))SHA384_Final,
|
---|
111 | EVP_sha384
|
---|
112 | };
|
---|
113 | struct hash_foo sha512 = {
|
---|
114 | "SHA-512",
|
---|
115 | sizeof(SHA512_CTX),
|
---|
116 | 64,
|
---|
117 | (void (*)(void*))SHA512_Init,
|
---|
118 | (void (*)(void*,const void*, size_t))SHA512_Update,
|
---|
119 | (void (*)(void*, void*))SHA512_Final,
|
---|
120 | EVP_sha512
|
---|
121 | };
|
---|
122 |
|
---|
123 | struct test {
|
---|
124 | char *str;
|
---|
125 | unsigned char hash[64];
|
---|
126 | };
|
---|
127 |
|
---|
128 | struct test md2_tests[] = {
|
---|
129 | {"",
|
---|
130 | "\x83\x50\xe5\xa3\xe2\x4c\x15\x3d\xf2\x27\x5c\x9f\x80\x69\x27\x73" },
|
---|
131 | {"a",
|
---|
132 | "\x32\xec\x01\xec\x4a\x6d\xac\x72\xc0\xab\x96\xfb\x34\xc0\xb5\xd1" },
|
---|
133 | {"abc",
|
---|
134 | "\xda\x85\x3b\x0d\x3f\x88\xd9\x9b\x30\x28\x3a\x69\xe6\xde\xd6\xbb" },
|
---|
135 | {"message digest",
|
---|
136 | "\xab\x4f\x49\x6b\xfb\x2a\x53\x0b\x21\x9f\xf3\x30\x31\xfe\x06\xb0" },
|
---|
137 | {"abcdefghijklmnopqrstuvwxyz",
|
---|
138 | "\x4e\x8d\xdf\xf3\x65\x02\x92\xab\x5a\x41\x08\xc3\xaa\x47\x94\x0b" },
|
---|
139 | {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
|
---|
140 | "\xda\x33\xde\xf2\xa4\x2d\xf1\x39\x75\x35\x28\x46\xc3\x03\x38\xcd" },
|
---|
141 | {"12345678901234567890123456789012345678901234567890123456789012345678901234567890",
|
---|
142 | "\xd5\x97\x6f\x79\xd8\x3d\x3a\x0d\xc9\x80\x6c\x3c\x66\xf3\xef\xd8" },
|
---|
143 | {NULL }
|
---|
144 | };
|
---|
145 |
|
---|
146 | struct test md4_tests[] = {
|
---|
147 | {"",
|
---|
148 | {0x31, 0xd6, 0xcf, 0xe0, 0xd1, 0x6a, 0xe9, 0x31, 0xb7, 0x3c, 0x59,
|
---|
149 | 0xd7, 0xe0, 0xc0, 0x89, 0xc0}},
|
---|
150 | {"a",
|
---|
151 | {0xbd, 0xe5, 0x2c, 0xb3, 0x1d, 0xe3, 0x3e, 0x46, 0x24, 0x5e, 0x05,
|
---|
152 | 0xfb, 0xdb, 0xd6, 0xfb, 0x24}},
|
---|
153 | {"abc",
|
---|
154 | {0xa4, 0x48, 0x01, 0x7a, 0xaf, 0x21, 0xd8, 0x52, 0x5f, 0xc1, 0x0a, 0xe8, 0x7a, 0xa6, 0x72, 0x9d}},
|
---|
155 | {"message digest",
|
---|
156 | {0xd9, 0x13, 0x0a, 0x81, 0x64, 0x54, 0x9f, 0xe8, 0x18, 0x87, 0x48, 0x06, 0xe1, 0xc7, 0x01, 0x4b}},
|
---|
157 | {"abcdefghijklmnopqrstuvwxyz", {0xd7, 0x9e, 0x1c, 0x30, 0x8a, 0xa5, 0xbb, 0xcd, 0xee, 0xa8, 0xed, 0x63, 0xdf, 0x41, 0x2d, 0xa9, }},
|
---|
158 | {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
|
---|
159 | {0x04, 0x3f, 0x85, 0x82, 0xf2, 0x41, 0xdb, 0x35, 0x1c, 0xe6, 0x27, 0xe1, 0x53, 0xe7, 0xf0, 0xe4}},
|
---|
160 | {"12345678901234567890123456789012345678901234567890123456789012345678901234567890",
|
---|
161 | {0xe3, 0x3b, 0x4d, 0xdc, 0x9c, 0x38, 0xf2, 0x19, 0x9c, 0x3e, 0x7b, 0x16, 0x4f, 0xcc, 0x05, 0x36, }},
|
---|
162 | {NULL, { 0x0 }}};
|
---|
163 |
|
---|
164 | struct test md5_tests[] = {
|
---|
165 | {"", {0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04, 0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e}},
|
---|
166 | {"a", {0x0c, 0xc1, 0x75, 0xb9, 0xc0, 0xf1, 0xb6, 0xa8, 0x31, 0xc3, 0x99, 0xe2, 0x69, 0x77, 0x26, 0x61}},
|
---|
167 | {"abc", {0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0, 0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72}},
|
---|
168 | {"message digest", {0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0}},
|
---|
169 | {"abcdefghijklmnopqrstuvwxyz", {0xc3, 0xfc, 0xd3, 0xd7, 0x61, 0x92, 0xe4, 0x00, 0x7d, 0xfb, 0x49, 0x6c, 0xca, 0x67, 0xe1, 0x3b}},
|
---|
170 | {"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", {0xd1, 0x74, 0xab, 0x98, 0xd2, 0x77, 0xd9, 0xf5, 0xa5, 0x61, 0x1c, 0x2c, 0x9f, 0x41, 0x9d, 0x9f}},
|
---|
171 | {"12345678901234567890123456789012345678901234567890123456789012345678901234567890", {0x57, 0xed, 0xf4, 0xa2, 0x2b, 0xe3, 0xc9, 0x55, 0xac, 0x49, 0xda, 0x2e, 0x21, 0x07, 0xb6, 0x7a}},
|
---|
172 | {NULL, { 0x0 }}};
|
---|
173 |
|
---|
174 | struct test sha1_tests[] = {
|
---|
175 | { "abc",
|
---|
176 | {0xA9, 0x99, 0x3E, 0x36, 0x47, 0x06, 0x81, 0x6A,
|
---|
177 | 0xBA, 0x3E, 0x25, 0x71, 0x78, 0x50, 0xC2, 0x6C,
|
---|
178 | 0x9C, 0xD0, 0xD8, 0x9D}},
|
---|
179 | { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
|
---|
180 | {0x84, 0x98, 0x3E, 0x44, 0x1C, 0x3B, 0xD2, 0x6E,
|
---|
181 | 0xBA, 0xAE, 0x4A, 0xA1, 0xF9, 0x51, 0x29, 0xE5,
|
---|
182 | 0xE5, 0x46, 0x70, 0xF1}},
|
---|
183 | { ONE_MILLION_A,
|
---|
184 | {0x34, 0xaa, 0x97, 0x3c, 0xd4, 0xc4, 0xda, 0xa4,
|
---|
185 | 0xf6, 0x1e, 0xeb, 0x2b, 0xdb, 0xad, 0x27, 0x31,
|
---|
186 | 0x65, 0x34, 0x01, 0x6f}},
|
---|
187 | { NULL }
|
---|
188 | };
|
---|
189 |
|
---|
190 | struct test sha256_tests[] = {
|
---|
191 | { "abc",
|
---|
192 | { 0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea,
|
---|
193 | 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23,
|
---|
194 | 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c,
|
---|
195 | 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad }},
|
---|
196 | { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
|
---|
197 | { 0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8,
|
---|
198 | 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39,
|
---|
199 | 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67,
|
---|
200 | 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1 }},
|
---|
201 | { ONE_MILLION_A,
|
---|
202 | {0xcd,0xc7,0x6e,0x5c, 0x99,0x14,0xfb,0x92,
|
---|
203 | 0x81,0xa1,0xc7,0xe2, 0x84,0xd7,0x3e,0x67,
|
---|
204 | 0xf1,0x80,0x9a,0x48, 0xa4,0x97,0x20,0x0e,
|
---|
205 | 0x04,0x6d,0x39,0xcc, 0xc7,0x11,0x2c,0xd0 }},
|
---|
206 | { NULL }
|
---|
207 | };
|
---|
208 |
|
---|
209 | struct test sha384_tests[] = {
|
---|
210 | { "abc",
|
---|
211 | { 0xcb,0x00,0x75,0x3f,0x45,0xa3,0x5e,0x8b,
|
---|
212 | 0xb5,0xa0,0x3d,0x69,0x9a,0xc6,0x50,0x07,
|
---|
213 | 0x27,0x2c,0x32,0xab,0x0e,0xde,0xd1,0x63,
|
---|
214 | 0x1a,0x8b,0x60,0x5a,0x43,0xff,0x5b,0xed,
|
---|
215 | 0x80,0x86,0x07,0x2b,0xa1,0xe7,0xcc,0x23,
|
---|
216 | 0x58,0xba,0xec,0xa1,0x34,0xc8,0x25,0xa7}},
|
---|
217 | { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno"
|
---|
218 | "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
|
---|
219 | { 0x09,0x33,0x0c,0x33,0xf7,0x11,0x47,0xe8,
|
---|
220 | 0x3d,0x19,0x2f,0xc7,0x82,0xcd,0x1b,0x47,
|
---|
221 | 0x53,0x11,0x1b,0x17,0x3b,0x3b,0x05,0xd2,
|
---|
222 | 0x2f,0xa0,0x80,0x86,0xe3,0xb0,0xf7,0x12,
|
---|
223 | 0xfc,0xc7,0xc7,0x1a,0x55,0x7e,0x2d,0xb9,
|
---|
224 | 0x66,0xc3,0xe9,0xfa,0x91,0x74,0x60,0x39}},
|
---|
225 | { ONE_MILLION_A,
|
---|
226 | { 0x9d,0x0e,0x18,0x09,0x71,0x64,0x74,0xcb,
|
---|
227 | 0x08,0x6e,0x83,0x4e,0x31,0x0a,0x4a,0x1c,
|
---|
228 | 0xed,0x14,0x9e,0x9c,0x00,0xf2,0x48,0x52,
|
---|
229 | 0x79,0x72,0xce,0xc5,0x70,0x4c,0x2a,0x5b,
|
---|
230 | 0x07,0xb8,0xb3,0xdc,0x38,0xec,0xc4,0xeb,
|
---|
231 | 0xae,0x97,0xdd,0xd8,0x7f,0x3d,0x89,0x85}},
|
---|
232 | {NULL}
|
---|
233 | };
|
---|
234 |
|
---|
235 | struct test sha512_tests[] = {
|
---|
236 | { "abc",
|
---|
237 | { 0xdd,0xaf,0x35,0xa1,0x93,0x61,0x7a,0xba,
|
---|
238 | 0xcc,0x41,0x73,0x49,0xae,0x20,0x41,0x31,
|
---|
239 | 0x12,0xe6,0xfa,0x4e,0x89,0xa9,0x7e,0xa2,
|
---|
240 | 0x0a,0x9e,0xee,0xe6,0x4b,0x55,0xd3,0x9a,
|
---|
241 | 0x21,0x92,0x99,0x2a,0x27,0x4f,0xc1,0xa8,
|
---|
242 | 0x36,0xba,0x3c,0x23,0xa3,0xfe,0xeb,0xbd,
|
---|
243 | 0x45,0x4d,0x44,0x23,0x64,0x3c,0xe8,0x0e,
|
---|
244 | 0x2a,0x9a,0xc9,0x4f,0xa5,0x4c,0xa4,0x9f }},
|
---|
245 | { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmno"
|
---|
246 | "ijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu",
|
---|
247 | { 0x8e,0x95,0x9b,0x75,0xda,0xe3,0x13,0xda,
|
---|
248 | 0x8c,0xf4,0xf7,0x28,0x14,0xfc,0x14,0x3f,
|
---|
249 | 0x8f,0x77,0x79,0xc6,0xeb,0x9f,0x7f,0xa1,
|
---|
250 | 0x72,0x99,0xae,0xad,0xb6,0x88,0x90,0x18,
|
---|
251 | 0x50,0x1d,0x28,0x9e,0x49,0x00,0xf7,0xe4,
|
---|
252 | 0x33,0x1b,0x99,0xde,0xc4,0xb5,0x43,0x3a,
|
---|
253 | 0xc7,0xd3,0x29,0xee,0xb6,0xdd,0x26,0x54,
|
---|
254 | 0x5e,0x96,0xe5,0x5b,0x87,0x4b,0xe9,0x09 }},
|
---|
255 | { ONE_MILLION_A,
|
---|
256 | { 0xe7,0x18,0x48,0x3d,0x0c,0xe7,0x69,0x64,
|
---|
257 | 0x4e,0x2e,0x42,0xc7,0xbc,0x15,0xb4,0x63,
|
---|
258 | 0x8e,0x1f,0x98,0xb1,0x3b,0x20,0x44,0x28,
|
---|
259 | 0x56,0x32,0xa8,0x03,0xaf,0xa9,0x73,0xeb,
|
---|
260 | 0xde,0x0f,0xf2,0x44,0x87,0x7e,0xa6,0x0a,
|
---|
261 | 0x4c,0xb0,0x43,0x2c,0xe5,0x77,0xc3,0x1b,
|
---|
262 | 0xeb,0x00,0x9c,0x5c,0x2c,0x49,0xaa,0x2e,
|
---|
263 | 0x4e,0xad,0xb2,0x17,0xad,0x8c,0xc0,0x9b }},
|
---|
264 | { NULL }
|
---|
265 | };
|
---|
266 |
|
---|
267 | static int
|
---|
268 | hash_test (struct hash_foo *hash, struct test *tests)
|
---|
269 | {
|
---|
270 | struct test *t;
|
---|
271 | EVP_MD_CTX *ectx;
|
---|
272 | unsigned int esize;
|
---|
273 | void *ctx = malloc(hash->psize);
|
---|
274 | unsigned char *res = malloc(hash->hsize);
|
---|
275 |
|
---|
276 | printf ("%s... ", hash->name);
|
---|
277 | for (t = tests; t->str; ++t) {
|
---|
278 | char buf[1000];
|
---|
279 |
|
---|
280 | ectx = EVP_MD_CTX_create();
|
---|
281 | EVP_DigestInit_ex(ectx, hash->evp(), NULL);
|
---|
282 |
|
---|
283 | (*hash->init)(ctx);
|
---|
284 | if(strcmp(t->str, ONE_MILLION_A) == 0) {
|
---|
285 | int i;
|
---|
286 | memset(buf, 'a', sizeof(buf));
|
---|
287 | for(i = 0; i < 1000; i++) {
|
---|
288 | (*hash->update)(ctx, buf, sizeof(buf));
|
---|
289 | EVP_DigestUpdate(ectx, buf, sizeof(buf));
|
---|
290 | }
|
---|
291 | } else {
|
---|
292 | (*hash->update)(ctx, (unsigned char *)t->str, strlen(t->str));
|
---|
293 | EVP_DigestUpdate(ectx, t->str, strlen(t->str));
|
---|
294 | }
|
---|
295 |
|
---|
296 | (*hash->final) (res, ctx);
|
---|
297 | if (memcmp (res, t->hash, hash->hsize) != 0) {
|
---|
298 | int i;
|
---|
299 |
|
---|
300 | printf ("%s(\"%s\") failed\n", hash->name, t->str);
|
---|
301 | printf("should be: ");
|
---|
302 | for(i = 0; i < hash->hsize; ++i) {
|
---|
303 | if(i > 0 && (i % 16) == 0)
|
---|
304 | printf("\n ");
|
---|
305 | printf("%02x ", t->hash[i]);
|
---|
306 | }
|
---|
307 | printf("\nresult was: ");
|
---|
308 | for(i = 0; i < hash->hsize; ++i) {
|
---|
309 | if(i > 0 && (i % 16) == 0)
|
---|
310 | printf("\n ");
|
---|
311 | printf("%02x ", res[i]);
|
---|
312 | }
|
---|
313 | printf("\n");
|
---|
314 | return 1;
|
---|
315 | }
|
---|
316 |
|
---|
317 | EVP_DigestFinal_ex(ectx, res, &esize);
|
---|
318 | EVP_MD_CTX_destroy(ectx);
|
---|
319 |
|
---|
320 | if (hash->hsize != esize) {
|
---|
321 | printf("EVP %s returned wrong hash size\n", hash->name);
|
---|
322 | return 1;
|
---|
323 | }
|
---|
324 |
|
---|
325 | if (memcmp (res, t->hash, hash->hsize) != 0) {
|
---|
326 | printf("EVP %s failed here old function where successful!\n",
|
---|
327 | hash->name);
|
---|
328 | return 1;
|
---|
329 | }
|
---|
330 | }
|
---|
331 | free(ctx);
|
---|
332 | free(res);
|
---|
333 | printf ("success\n");
|
---|
334 | return 0;
|
---|
335 | }
|
---|
336 |
|
---|
337 | int
|
---|
338 | main (void)
|
---|
339 | {
|
---|
340 | return
|
---|
341 | hash_test(&md2, md2_tests) +
|
---|
342 | hash_test(&md4, md4_tests) +
|
---|
343 | hash_test(&md5, md5_tests) +
|
---|
344 | hash_test(&sha1, sha1_tests) +
|
---|
345 | hash_test(&sha256, sha256_tests) +
|
---|
346 | hash_test(&sha384, sha384_tests) +
|
---|
347 | hash_test(&sha512, sha512_tests);
|
---|
348 | }
|
---|