1 /* test_hashes.c - unit tests and benchmark for LibRHash algorithms
2  *
3  * Copyright (c) 2008, Aleksey Kravchenko <rhash.admin@gmail.com>
4  *
5  * Permission to use, copy, modify, and/or distribute this software for any
6  * purpose with or without fee is hereby granted.
7  *
8  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH
9  * REGARD TO THIS SOFTWARE  INCLUDING ALL IMPLIED WARRANTIES OF  MERCHANTABILITY
10  * AND FITNESS.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,
11  * INDIRECT,  OR CONSEQUENTIAL DAMAGES  OR ANY DAMAGES WHATSOEVER RESULTING FROM
12  * LOSS OF USE,  DATA OR PROFITS,  WHETHER IN AN ACTION OF CONTRACT,  NEGLIGENCE
13  * OR OTHER TORTIOUS ACTION,  ARISING OUT OF  OR IN CONNECTION  WITH THE USE  OR
14  * PERFORMANCE OF THIS SOFTWARE.
15  */
16 
17 #include <unistd.h>
18 #include <stdio.h>
19 #include <stdarg.h>
20 #include <string.h>
21 #include <assert.h>
22 #include <ctype.h>
23 
24 #include "byte_order.h"
25 #include "rhash_timing.h"
26 #include "rhash_torrent.h"
27 
28 #ifdef USE_RHASH_DLL
29 # define RHASH_API __declspec(dllimport)
30 #endif
31 #include "rhash.h"
32 #include "test_hashes.h"
33 
34 /*=========================================================================*
35  *                              Test vectors                               *
36  *=========================================================================*/
37 
38  /* verified by cksfv */
39  const char* crc32_tests[] = {
40 	"", "00000000",
41 	"a", "E8B7BE43",
42 	"abc", "352441C2",
43 	"message digest", "20159D7F",
44 	"abcdefghijklmnopqrstuvwxyz", "4C2750BD",
45 	"The quick brown fox jumps over the lazy dog", "414FA339",
46 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "1FC2E6D2",
47 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "7CA94A72",
48 	0
49 };
50 
51  const char* crc32c_tests[] = {
52 	"", "00000000",
53 	"a", "C1D04330",
54 	"abc", "364B3FB7",
55 	"message digest", "02BD79D0",
56 	"abcdefghijklmnopqrstuvwxyz", "9EE6EF25",
57 	"The quick brown fox jumps over the lazy dog", "22620404",
58 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "A245D57D",
59 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "477A6781",
60 	0
61 };
62 
63 const char* md4_tests[] = {
64 	"", "31D6CFE0D16AE931B73C59D7E0C089C0",
65 	"a", "BDE52CB31DE33E46245E05FBDBD6FB24",
66 	"abc", "A448017AAF21D8525FC10AE87AA6729D",
67 	"message digest", "D9130A8164549FE818874806E1C7014B",
68 	"abcdefghijklmnopqrstuvwxyz", "D79E1C308AA5BBCDEEA8ED63DF412DA9",
69 	"The quick brown fox jumps over the lazy dog", "1BEE69A46BA811185C194762ABAEAE90",
70 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "043F8582F241DB351CE627E153E7F0E4",
71 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "E33B4DDC9C38F2199C3E7B164FCC0536",
72 	0
73 };
74 
75 /* for short messages ed2k test vectors coincide with md4 */
76 #define ed2k_tests md4_tests
77 
78 /* test vectors from spec */
79 const char* md5_tests[] = {
80 	"", "D41D8CD98F00B204E9800998ECF8427E",
81 	"a", "0CC175B9C0F1B6A831C399E269772661",
82 	"abc", "900150983CD24FB0D6963F7D28E17F72",
83 	"message digest", "F96B697D7CB7938D525A2F31AAF161D0",
84 	"abcdefghijklmnopqrstuvwxyz", "C3FCD3D76192E4007DFB496CCA67E13B",
85 	"The quick brown fox jumps over the lazy dog", "9E107D9D372BB6826BD81D3542A419D6",
86 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "D174AB98D277D9F5A5611C2C9F419D9F",
87 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "57EDF4A22BE3C955AC49DA2E2107B67A",
88 	0
89 };
90 
91 /* test vectors from spec */
92 const char* sha1_tests[] = {
93 	"", "DA39A3EE5E6B4B0D3255BFEF95601890AFD80709",
94 	"a", "86F7E437FAA5A7FCE15D1DDCB9EAEAEA377667B8",
95 	"abc", "A9993E364706816ABA3E25717850C26C9CD0D89D",
96 	"message digest", "C12252CEDA8BE8994D5FA0290A47231C1D16AAE3",
97 	"The quick brown fox jumps over the lazy dog", "2FD4E1C67A2D28FCED849EE1BB76E7391B93EB12",
98 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "761C457BF73B14D27E9E9265C46F4B4DDA11F940",
99 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "50ABF5706A150990A08B2C5EA40FA0E585554732",
100 	0
101 };
102 
103 /* tests from spec and NESSIE test vectors */
104 const char* tiger_tests[] = {
105 	"", "3293AC630C13F0245F92BBB1766E16167A4E58492DDE73F3",
106 	"a", "77BEFBEF2E7EF8AB2EC8F93BF587A7FC613E247F5F247809",
107 	"abc", "2AAB1484E8C158F2BFB8C5FF41B57A525129131C957B5F93",
108 	"Tiger", "DD00230799F5009FEC6DEBC838BB6A27DF2B9D6F110C7937",
109 	"The quick brown fox jumps over the lazy dog", "6D12A41E72E644F017B6F0E2F7B44C6285F06DD5D2C5B075",
110 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", "F71C8583902AFB879EDFE610F82C0D4786A3A534504486B5",
111 	"ABCDEFGHIJKLMNOPQRSTUVWXYZ=abcdefghijklmnopqrstuvwxyz+0123456789", "48CEEB6308B87D46E95D656112CDF18D97915F9765658957",
112 	"Tiger - A Fast New Hash Function, by Ross Anderson and Eli Biham", "8A866829040A410C729AD23F5ADA711603B3CDD357E4C15E",
113 	"Tiger - A Fast New Hash Function, by Ross Anderson and Eli Biham, proceedings of Fast Software Encryption 3, Cambridge.", "CE55A6AFD591F5EBAC547FF84F89227F9331DAB0B611C889",
114 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+-", "C54034E5B43EB8005848A7E0AE6AAC76E4FF590AE715FD25",
115 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "8DCEA680A17583EE502BA38A3C368651890FFBCCDC49A8CC",
116 
117 	"message digest", "D981F8CB78201A950DCF3048751E441C517FCA1AA55A29F6",
118 	"abcdefghijklmnopqrstuvwxyz", "1714A472EEE57D30040412BFCC55032A0B11602FF37BEEE9",
119 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "0F7BF9A19B9C58F2B7610DF7E84F0AC3A71C631E7B53F78E",
120 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "8DCEA680A17583EE502BA38A3C368651890FFBCCDC49A8CC",
121 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "1C14795529FD9F207A958F84C52F11E887FA0CABDFD91BFD",
122 	0
123 };
124 
125 /* verified by strong dc++ */
126 const char* tth_tests[] = {
127 	"", "LWPNACQDBZRYXW3VHJVCJ64QBZNGHOHHHZWCLNQ",
128 	"a", "CZQUWH3IYXBF5L3BGYUGZHASSMXU647IP2IKE4Y",
129 	"abc", "ASD4UJSEH5M47PDYB46KBTSQTSGDKLBHYXOMUIA",
130 	"message digest", "YM432MSOX5QILIH2L4TNO62E3O35WYGWSBSJOBA",
131 	"abcdefghijklmnopqrstuvwxyz", "LMHNA2VYO465P2RDOGTR2CL6XKHZNI2X4CCUY5Y",
132 	"The quick brown fox jumps over the lazy dog", "WLM2MITXFTCQXEOYO3M4EL5APES353NQLI66ORY",
133 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "TF74ENF7MF2WPDE35M23NRSVKJIRKYRMTLWAHWQ",
134 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "NBKCANQ2ODNTSV4C7YJFF3JRAV7LKTFIPHQNBJY",
135 	0
136 };
137 
138 const char* aich_tests[] = {
139 	"", "3I42H3S6NNFQ2MSVX7XZKYAYSCX5QBYJ",
140 	"a", "Q336IN72UWT7ZYK5DXOLT2XK5I3XMZ5Y",
141 	"abc", "VGMT4NSHA2AWVOR6EVYXQUGCNSONBWE5",
142 	"message digest", "YERFFTW2RPUJSTK7UAUQURZDDQORNKXD",
143 	"abcdefghijklmnopqrstuvwxyz", "GLIQY64M7FSXBSQEZY37FIM5QQSA2OUJ",
144 	"The quick brown fox jumps over the lazy dog", "F7KODRT2FUUPZ3MET3Q3W5XHHENZH2YS",
145 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "OYOEK67XHMKNE7U6SJS4I32LJXNBD6KA",
146 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "KCV7K4DKCUEZBIELFRPKID5A4WCVKRZS",
147 	0
148 };
149 
150 const char* whirlpool_tests[] = {
151 	"", "19FA61D75522A4669B44E39C1D2E1726C530232130D407F89AFEE0964997F7A73E83BE698B288FEBCF88E3E03C4F0757EA8964E59B63D93708B138CC42A66EB3",
152 	"a", "8ACA2602792AEC6F11A67206531FB7D7F0DFF59413145E6973C45001D0087B42D11BC645413AEFF63A42391A39145A591A92200D560195E53B478584FDAE231A",
153 	"abc", "4E2448A4C6F486BB16B6562C73B4020BF3043E3A731BCE721AE1B303D97E6D4C7181EEBDB6C57E277D0E34957114CBD6C797FC9D95D8B582D225292076D4EEF5",
154 	"message digest", "378C84A4126E2DC6E56DCC7458377AAC838D00032230F53CE1F5700C0FFB4D3B8421557659EF55C106B4B52AC5A4AAA692ED920052838F3362E86DBD37A8903E",
155 	"abcdefghijklmnopqrstuvwxyz", "F1D754662636FFE92C82EBB9212A484A8D38631EAD4238F5442EE13B8054E41B08BF2A9251C30B6A0B8AAE86177AB4A6F68F673E7207865D5D9819A3DBA4EB3B",
156 	"The quick brown fox jumps over the lazy dog", "B97DE512E91E3828B40D2B0FDCE9CEB3C4A71F9BEA8D88E75C4FA854DF36725FD2B52EB6544EDCACD6F8BEDDFEA403CB55AE31F03AD62A5EF54E42EE82C3FB35",
157 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
158 	"DC37E008CF9EE69BF11F00ED9ABA26901DD7C28CDEC066CC6AF42E40F82F3A1E08EBA26629129D8FB7CB57211B9281A65517CC879D7B962142C65F5A7AF01467",
159 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890",
160 	"466EF18BABB0154D25B9D38A6414F5C08784372BCCB204D6549C4AFADB6014294D5BD8DF2A6C44E538CD047B2681A51A2C60481E88C5A20B2C2A80CF3A9A083B",
161 	"abcdbcdecdefdefgefghfghighijhijk",
162 	"2A987EA40F917061F5D6F0A0E4644F488A7A5A52DEEE656207C562F988E95C6916BDC8031BC5BE1B7B947639FE050B56939BAAA0ADFF9AE6745B7B181C3BE3FD",
163 	0
164 };
165 
166 /* test vectors from RIPEMD-160 spec */
167 const char* ripemd_tests[] = {
168 	"", "9C1185A5C5E9FC54612808977EE8F548B2258D31",
169 	"a", "0BDC9D2D256B3EE9DAAE347BE6F4DC835A467FFE",
170 	"abc", "8EB208F7E05D987A9B044A8E98C6B087F15A0BFC",
171 	"message digest", "5D0689EF49D2FAE572B881B123A85FFA21595F36",
172 	"abcdefghijklmnopqrstuvwxyz", "F71C27109C692C1B56BBDCEB5B9D2865B3708DBC",
173 	"The quick brown fox jumps over the lazy dog", "37F332F68DB77BD9D7EDD4969571AD671CF9DD3B",
174 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "12A053384A9C0C88E405A06C27DCF49ADA62EB2B",
175 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "B0E20B6E3116640286ED3A87A5713079B21F5189",
176 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "9B752E45573D4B39F4DBD3323CAB82BF63326BFB",
177 	0
178 };
179 
180 /*
181 * Two important test-cases (some libraries calculate them incorrectly):
182 * GOST94( <100000 characters of 'a'> ) = 5C00CCC2734CDD3332D3D4749576E3C1A7DBAF0E7EA74E9FA602413C90A129FA
183 * GOST94( <128 characters of 'U'> ) = 53A3A3ED25180CEF0C1D85A074273E551C25660A87062A52D926A9E8FE5733A4
184 */
185 
186 /* test vectors from internet, verified by OpenSSL and some other programs */
187 const char* gost94_tests[] = {
188 	"", "CE85B99CC46752FFFEE35CAB9A7B0278ABB4C2D2055CFF685AF4912C49490F8D",
189 	"a", "D42C539E367C66E9C88A801F6649349C21871B4344C6A573F849FDCE62F314DD",
190 	"abc", "F3134348C44FB1B2A277729E2285EBB5CB5E0F29C975BC753B70497C06A4D51D",
191 	"message digest", "AD4434ECB18F2C99B60CBE59EC3D2469582B65273F48DE72DB2FDE16A4889A4D",
192 	"The quick brown fox jumps over the lazy dog", "77B7FA410C9AC58A25F49BCA7D0468C9296529315EACA76BD1A10F376D1F4294",
193 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "95C1AF627C356496D80274330B2CFF6A10C67B5F597087202F94D06D2338CF8E",
194 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "CC178DCAD4DF619DCAA00AAC79CA355C00144E4ADA2793D7BD9B3518EAD3CCD3",
195 	"UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU", "53A3A3ED25180CEF0C1D85A074273E551C25660A87062A52D926A9E8FE5733A4",
196 	/* two test strings from GOST standard */
197 	"This is message, length=32 bytes", "B1C466D37519B82E8319819FF32595E047A28CB6F83EFF1C6916A815A637FFFA",
198 	"Suppose the original message has length = 50 bytes", "471ABA57A60A770D3A76130635C1FBEA4EF14DE51F78B4AE57DD893B62F55208",
199 	"The quick brown fox jumps over the lazy cog", "A3EBC4DAAAB78B0BE131DAB5737A7F67E602670D543521319150D2E14EEEC445", /* test from Wikipedia */
200 	0
201 };
202 
203 /* tested with openssl */
204 const char* gost94_cryptopro_tests[] = {
205 	"", "981E5F3CA30C841487830F84FB433E13AC1101569B9C13584AC483234CD656C0",
206 	"a", "E74C52DD282183BF37AF0079C9F78055715A103F17E3133CEFF1AACF2F403011",
207 	"abc", "B285056DBF18D7392D7677369524DD14747459ED8143997E163B2986F92FD42C",
208 	"message digest", "BC6041DD2AA401EBFA6E9886734174FEBDB4729AA972D60F549AC39B29721BA0",
209 	"The quick brown fox jumps over the lazy dog", "9004294A361A508C586FE53D1F1B02746765E71B765472786E4770D565830A76",
210 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "73B70A39497DE53A6E08C67B6D4DB853540F03E9389299D9B0156EF7E85D0F61",
211 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "6BC7B38989B28CF93AE8842BF9D752905910A7528A61E5BCE0782DE43E610C90",
212 	"UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU", "1C4AC7614691BBF427FA2316216BE8F10D92EDFD37CD1027514C1008F649C4E8",
213 	"This is message, length=32 bytes", "2CEFC2F7B7BDC514E18EA57FA74FF357E7FA17D652C75F69CB1BE7893EDE48EB",
214 	"Suppose the original message has length = 50 bytes", "C3730C5CBCCACF915AC292676F21E8BD4EF75331D9405E5F1A61DC3130A65011",
215 	0
216 };
217 
218 const char* gost12_256_tests[] = {
219 	"", "3F539A213E97C802CC229D474C6AA32A825A360B2A933A949FD925208D9CE1BB",
220 	"a", "BA31099B9CC84EC2A671E9313572378920A705B363B031A1CB4FC03E01CE8DF3",
221 	"abc", "4E2919CF137ED41EC4FB6270C61826CC4FFFB660341E0AF3688CD0626D23B481",
222 	"message digest", "0D45451B2004234DE7FBD289B89C665A494FFEFE93C2FF6D6F99677C99086BFF",
223 	"012345678901234567890123456789012345678901234567890123456789012", "9D151EEFD8590B89DAA6BA6CB74AF9275DD051026BB149A452FD84E5E57B5500",
224 	"abcdefghijklmnopqrstuvwxyz", "C9086ED61FB0A090AAF4438EFD39F0D060CB3EC7E25343B5C4C350054BFD3E27",
225 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "74F945F366AB17DD1E7D114AB9ADF68B97A8D6A1CBBE299CBA06B77735457F94",
226 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "2C6644B1F5AB3E0AB56ADF1FEEB4D6A8742FCFC61B53B69C3B536AC283AB88AA",
227 	"The quick brown fox jumps over the lazy dog", "3E7DEA7F2384B6C5A3D0E24AAA29C05E89DDD762145030EC22C71A6DB8B2C1F4",
228 	0
229 };
230 
231 const char* gost12_512_tests[] = {
232 	"", "8E945DA209AA869F0455928529BCAE4679E9873AB707B55315F56CEB98BEF0A7362F715528356EE83CDA5F2AAC4C6AD2BA3A715C1BCD81CB8E9F90BF4C1C1A8A",
233 	"012345678901234567890123456789012345678901234567890123456789012", "1B54D01A4AF5B9D5CC3D86D68D285462B19ABC2475222F35C085122BE4BA1FFA00AD30F8767B3A82384C6574F024C311E2A481332B08EF7F41797891C1646F48",
234 	"a", "8B2A40ECAB7B7496BC4CC0F773595452BAF658849B495ACC3BA017206810EFB00420CCD73FB3297E0F7890941B84AC4A8BC27E3C95E1F97C094609E2136ABB7E",
235 	"abc", "28156E28317DA7C98F4FE2BED6B542D0DAB85BB224445FCEDAF75D46E26D7EB8D5997F3E0915DD6B7F0AAB08D9C8BEB0D8C64BAE2AB8B3C8C6BC53B3BF0DB728",
236 	"message digest", "96B52F322E3ECF6348D177608E2DDB084309C1642A94923C0BC50E41E4CC50E851D1DD94E4B7A35C30503CAF87E3E2AC334E2C805ADB99B5ADB5443DD4AC23C8",
237 	"abcdefghijklmnopqrstuvwxyz", "EC7B127DCCA6B0D741B10ED42062CC4487B4A93F96CFC7FAF2E7F79778B1F44159089C91FB0910BEC0EEE7CDCA524FCF291CF933FFF406F4F3A03872F2341FF8",
238 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "CC49B68C195D18D3FEF26F3D4A6554DB62298B96D19FBEFA52A139E8558D0528535569EBDEA172692857EDE3351C02FE9D749EF7273DCECACA5B3E295511650B",
239 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "116201023E88D93A4D076BA77207E8702C6CFA6FCC69B82BB22AE6BE9B63F16B19BAAF8771E01E6DC25C2B4486FA3BBF8601905762CBBAD5BA25A1E034879192",
240 	"The quick brown fox jumps over the lazy dog", "D2B793A0BB6CB5904828B5B6DCFB443BB8F33EFC06AD09368878AE4CDC8245B97E60802469BED1E7C21A64FF0B179A6A1E0BB74D92965450A0ADAB69162C00FE",
241 	0
242 };
243 
244 /* test vectors verified by mhash */
245 const char* snefru256_tests[] = {
246 	"", "8617F366566A011837F4FB4BA5BEDEA2B892F3ED8B894023D16AE344B2BE5881",
247 	"a", "45161589AC317BE0CEBA70DB2573DDDA6E668A31984B39BF65E4B664B584C63D",
248 	"abc", "7D033205647A2AF3DC8339F6CB25643C33EBC622D32979C4B612B02C4903031B",
249 	"message digest", "C5D4CE38DAA043BDD59ED15DB577500C071B917C1A46CD7B4D30B44A44C86DF8",
250 	"abcdefghijklmnopqrstuvwxyz", "9304BB2F876D9C4F54546CF7EC59E0A006BEAD745F08C642F25A7C808E0BF86E",
251 	"The quick brown fox jumps over the lazy dog", "674CAA75F9D8FD2089856B95E93A4FB42FA6C8702F8980E11D97A142D76CB358",
252 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "83AA9193B62FFD269FAA43D31E6AC2678B340E2A85849470328BE9773A9E5728",
253 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "D5FCE38A152A2D9B83AB44C29306EE45AB0AED0E38C957EC431DAB6ED6BB71B8",
254 	0
255 };
256 
257 /* test vectors verified by mhash */
258 const char* snefru128_tests[] = {
259 	"", "8617F366566A011837F4FB4BA5BEDEA2",
260 	"a", "BF5CE540AE51BC50399F96746C5A15BD",
261 	"abc", "553D0648928299A0F22A275A02C83B10",
262 	"message digest", "96D6F2F4112C4BAF29F653F1594E2D5D",
263 	"abcdefghijklmnopqrstuvwxyz", "7840148A66B91C219C36F127A0929606",
264 	"The quick brown fox jumps over the lazy dog", "59D9539D0DD96D635B5BDBD1395BB86C",
265 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "0EFD7F93A549F023B79781090458923E",
266 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "D9204ED80BB8430C0B9C244FE485814A",
267 	0
268 };
269 
270 /* checked against test vectors: http://www.randombit.net/text/has160.html */
271 const char* has160_tests[] = {
272 	"", "307964EF34151D37C8047ADEC7AB50F4FF89762D",
273 	"a", "4872BCBC4CD0F0A9DC7C2F7045E5B43B6C830DB8",
274 	"abc", "975E810488CF2A3D49838478124AFCE4B1C78804",
275 	"message digest", "2338DBC8638D31225F73086246BA529F96710BC6",
276 	"abcdefghijklmnopqrstuvwxyz", "596185C9AB6703D0D0DBB98702BC0F5729CD1D3C",
277 	"The quick brown fox jumps over the lazy dog", "ABE2B8C711F9E8579AA8EB40757A27B4EF14A7EA",
278 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "CB5D7EFBCA2F02E0FB7167CABB123AF5795764E5",
279 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "07F05C8C0773C55CA3A5A695CE6ACA4C438911B5",
280 	0
281 };
282 
283 /* unconfirmed test vectors */
284 const char* sha224_tests[] = {
285 	"", "D14A028C2A3A2BC9476102BB288234C415A2B01F828EA62AC5B3E42F",
286 	"a", "ABD37534C7D9A2EFB9465DE931CD7055FFDB8879563AE98078D6D6D5",
287 	"abc", "23097D223405D8228642A477BDA255B32AADBCE4BDA0B3F7E36C9DA7",
288 	"message digest", "2CB21C83AE2F004DE7E81C3C7019CBCB65B71AB656B22D6D0C39B8EB",
289 	"abcdefghijklmnopqrstuvwxyz", "45A5F72C39C5CFF2522EB3429799E49E5F44B356EF926BCF390DCCC2",
290 	"The quick brown fox jumps over the lazy dog", "730E109BD7A8A32B1CB9D9A09AA2325D2430587DDBC0C38BAD911525",
291 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "75388B16512776CC5DBA5DA1FD890150B0C6455CB4F58B1952522525",
292 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "BFF72B4FCB7D75E5632900AC5F90D219E05E97A7BDE72E740DB393D9",
293 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "B50AECBE4E9BB0B57BC5F3AE760A8E01DB24F203FB3CDCD13148046E",
294 	0
295 };
296 
297 /* test vectors from the NESSIE project */
298 const char* sha256_tests[] = {
299 	"", "E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855",
300 	"a", "CA978112CA1BBDCAFAC231B39A23DC4DA786EFF8147C4E72B9807785AFEE48BB",
301 	"abc", "BA7816BF8F01CFEA414140DE5DAE2223B00361A396177A9CB410FF61F20015AD",
302 	"message digest", "F7846F55CF23E14EEBEAB5B4E1550CAD5B509E3348FBC4EFA3A1413D393CB650",
303 	"abcdefghijklmnopqrstuvwxyz", "71C480DF93D6AE2F1EFAD1447C66C9525E316218CF51FC8D9ED832F2DAF18B73",
304 	"The quick brown fox jumps over the lazy dog", "D7A8FBB307D7809469CA9ABCB0082E4F8D5651E46D3CDB762D02D0BF37C9E592",
305 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "248D6A61D20638B8E5C026930C3E6039A33CE45964FF2167F6ECEDD419DB06C1",
306 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "DB4BFCBD4DA0CD85A60C3C37D3FBD8805C77F15FC6B1FDFE614EE0A7C8FDB4C0",
307 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "F371BC4A311F2B009EEF952DD83CA80E2B60026C8E935592D0F9C308453C813E",
308 	0
309 };
310 
311 const char* sha384_tests[] = {
312 	"", "38B060A751AC96384CD9327EB1B1E36A21FDB71114BE07434C0CC7BF63F6E1DA274EDEBFE76F65FBD51AD2F14898B95B",
313 	"a", "54A59B9F22B0B80880D8427E548B7C23ABD873486E1F035DCE9CD697E85175033CAA88E6D57BC35EFAE0B5AFD3145F31",
314 	"abc", "CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7",
315 	"message digest", "473ED35167EC1F5D8E550368A3DB39BE54639F828868E9454C239FC8B52E3C61DBD0D8B4DE1390C256DCBB5D5FD99CD5",
316 	"abcdefghijklmnopqrstuvwxyz", "FEB67349DF3DB6F5924815D6C3DC133F091809213731FE5C7B5F4999E463479FF2877F5F2936FA63BB43784B12F3EBB4",
317 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "3391FDDDFC8DC7393707A65B1B4709397CF8B1D162AF05ABFE8F450DE5F36BC6B0455A8520BC4E6F5FE95B1FE3C8452B",
318 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "1761336E3F7CBFE51DEB137F026F89E01A448E3B1FAFA64039C1464EE8732F11A5341A6F41E0C202294736ED64DB1A84",
319 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "B12932B0627D1C060942F5447764155655BD4DA0C9AFA6DD9B9EF53129AF1B8FB0195996D2DE9CA0DF9D821FFEE67026",
320 	0
321 };
322 
323 const char* sha512_tests[] = {
324 	"", "CF83E1357EEFB8BDF1542850D66D8007D620E4050B5715DC83F4A921D36CE9CE47D0D13C5D85F2B0FF8318D2877EEC2F63B931BD47417A81A538327AF927DA3E",
325 	"a", "1F40FC92DA241694750979EE6CF582F2D5D7D28E18335DE05ABC54D0560E0F5302860C652BF08D560252AA5E74210546F369FBBBCE8C12CFC7957B2652FE9A75",
326 	"abc", "DDAF35A193617ABACC417349AE20413112E6FA4E89A97EA20A9EEEE64B55D39A2192992A274FC1A836BA3C23A3FEEBBD454D4423643CE80E2A9AC94FA54CA49F",
327 	"message digest", "107DBF389D9E9F71A3A95F6C055B9251BC5268C2BE16D6C13492EA45B0199F3309E16455AB1E96118E8A905D5597B72038DDB372A89826046DE66687BB420E7C",
328 	"abcdefghijklmnopqrstuvwxyz", "4DBFF86CC2CA1BAE1E16468A05CB9881C97F1753BCE3619034898FAA1AABE429955A1BF8EC483D7421FE3C1646613A59ED5441FB0F321389F77F48A879C7B1F1",
329 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "204A8FC6DDA82F0A0CED7BEB8E08A41657C16EF468B228A8279BE331A703C33596FD15C13B1B07F9AA1D3BEA57789CA031AD85C7A71DD70354EC631238CA3445",
330 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "1E07BE23C26A86EA37EA810C8EC7809352515A970E9253C26F536CFC7A9996C45C8370583E0A78FA4A90041D71A4CEAB7423F19C71B9D5A3E01249F0BEBD5894",
331 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "72EC1EF1124A45B047E8B7C75A932195135BB61DE24EC0D1914042246E0AEC3A2354E093D76F3048B456764346900CB130D2A4FD5DD16ABB5E30BCB850DEE843",
332 	0
333 };
334 
335 /* SHA3 test vectors were verified by the reference implementation of Keccak */
336 const char* sha3_224_tests[] = {
337 	"", "6B4E03423667DBB73B6E15454F0EB1ABD4597F9A1B078E3F5B5A6BC7",
338 	"a", "9E86FF69557CA95F405F081269685B38E3A819B309EE942F482B6A8B",
339 	"abc", "E642824C3F8CF24AD09234EE7D3C766FC9A3A5168D0C94AD73B46FDF",
340 	"message digest", "18768BB4C48EB7FC88E5DDB17EFCF2964ABD7798A39D86A4B4A1E4C8",
341 	"abcdefghijklmnopqrstuvwxyz", "5CDECA81E123F87CAD96B9CBA999F16F6D41549608D4E0F4681B8239",
342 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "A67C289B8250A6F437A20137985D605589A8C163D45261B15419556E",
343 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "0526898E185869F91B3E2A76DD72A15DC6940A67C8164A044CD25CC8",
344 	"The quick brown fox jumps over the lazy dog", "D15DADCEAA4D5D7BB3B48F446421D542E08AD8887305E28D58335795",
345 	0
346 };
347 const char* sha3_256_tests[] = {
348 	"", "A7FFC6F8BF1ED76651C14756A061D662F580FF4DE43B49FA82D80A4B80F8434A",
349 	"a", "80084BF2FBA02475726FEB2CAB2D8215EAB14BC6BDD8BFB2C8151257032ECD8B",
350 	"abc", "3A985DA74FE225B2045C172D6BD390BD855F086E3E9D525B46BFE24511431532",
351 	"message digest", "EDCDB2069366E75243860C18C3A11465ECA34BCE6143D30C8665CEFCFD32BFFD",
352 	"abcdefghijklmnopqrstuvwxyz", "7CAB2DC765E21B241DBC1C255CE620B29F527C6D5E7F5F843E56288F0D707521",
353 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "A79D6A9DA47F04A3B9A9323EC9991F2105D4C78A7BC7BEEB103855A7A11DFB9F",
354 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "293E5CE4CE54EE71990AB06E511B7CCD62722B1BEB414F5FF65C8274E0F5BE1D",
355 	"The quick brown fox jumps over the lazy dog", "69070DDA01975C8C120C3AADA1B282394E7F032FA9CF32F4CB2259A0897DFC04",
356 	0
357 };
358 const char* sha3_384_tests[] = {
359 	"", "0C63A75B845E4F7D01107D852E4C2485C51A50AAAA94FC61995E71BBEE983A2AC3713831264ADB47FB6BD1E058D5F004",
360 	"a", "1815F774F320491B48569EFEC794D249EEB59AAE46D22BF77DAFE25C5EDC28D7EA44F93EE1234AA88F61C91912A4CCD9",
361 	"abc", "EC01498288516FC926459F58E2C6AD8DF9B473CB0FC08C2596DA7CF0E49BE4B298D88CEA927AC7F539F1EDF228376D25",
362 	"message digest", "D9519709F44AF73E2C8E291109A979DE3D61DC02BF69DEF7FBFFDFFFE662751513F19AD57E17D4B93BA1E484FC1980D5",
363 	"abcdefghijklmnopqrstuvwxyz", "FED399D2217AAF4C717AD0C5102C15589E1C990CC2B9A5029056A7F7485888D6AB65DB2370077A5CADB53FC9280D278F",
364 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "D5B972302F5080D0830E0DE7B6B2CF383665A008F4C4F386A61112652C742D20CB45AA51BD4F542FC733E2719E999291",
365 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "3C213A17F514638ACB3BF17F109F3E24C16F9F14F085B52A2F2B81ADC0DB83DF1A58DB2CE013191B8BA72D8FAE7E2A5E",
366 	"The quick brown fox jumps over the lazy dog", "7063465E08A93BCE31CD89D2E3CA8F602498696E253592ED26F07BF7E703CF328581E1471A7BA7AB119B1A9EBDF8BE41",
367 	0
368 };
369 const char* sha3_512_tests[] = {
370 	"", "A69F73CCA23A9AC5C8B567DC185A756E97C982164FE25859E0D1DCC1475C80A615B2123AF1F5F94C11E3E9402C3AC558F500199D95B6D3E301758586281DCD26",
371 	"a", "697F2D856172CB8309D6B8B97DAC4DE344B549D4DEE61EDFB4962D8698B7FA803F4F93FF24393586E28B5B957AC3D1D369420CE53332712F997BD336D09AB02A",
372 	"abc", "B751850B1A57168A5693CD924B6B096E08F621827444F70D884F5D0240D2712E10E116E9192AF3C91A7EC57647E3934057340B4CF408D5A56592F8274EEC53F0",
373 	"message digest", "3444E155881FA15511F57726C7D7CFE80302A7433067B29D59A71415CA9DD141AC892D310BC4D78128C98FDA839D18D7F0556F2FE7ACB3C0CDA4BFF3A25F5F59",
374 	"abcdefghijklmnopqrstuvwxyz", "AF328D17FA28753A3C9F5CB72E376B90440B96F0289E5703B729324A975AB384EDA565FC92AADED143669900D761861687ACDC0A5FFA358BD0571AAAD80ACA68",
375 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "D1DB17B4745B255E5EB159F66593CC9C143850979FC7A3951796ABA80165AAB536B46174CE19E3F707F0E5C6487F5F03084BC0EC9461691EF20113E42AD28163",
376 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "9524B9A5536B91069526B4F6196B7E9475B4DA69E01F0C855797F224CD7335DDB286FD99B9B32FFE33B59AD424CC1744F6EB59137F5FB8601932E8A8AF0AE930",
377 	"The quick brown fox jumps over the lazy dog", "01DEDD5DE4EF14642445BA5F5B97C15E47B9AD931326E4B0727CD94CEFC44FFF23F07BF543139939B49128CAF436DC1BDEE54FCB24023A08D9403F9B4BF0D450",
378 	0
379 };
380 
381 #ifdef USE_KECCAK
382 const char* keccak_224_tests[] = {
383 	"", "F71837502BA8E10837BDD8D365ADB85591895602FC552B48B7390ABD",
384 	"a", "7CF87D912EE7088D30EC23F8E7100D9319BFF090618B439D3FE91308",
385 	"abc", "C30411768506EBE1C2871B1EE2E87D38DF342317300A9B97A95EC6A8",
386 	"message digest", "B53B2CD638F440FA49916036ACDB22245673992FB1B1963B96FB9E93",
387 	"abcdefghijklmnopqrstuvwxyz", "162BAB64DC3BA594BD3B43FD8ABEC4AA03B36C2784CAC53A58F9B076",
388 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "4FB72D7B6B24BD1F5D4B8EF559FD9188EB66CAA01BCE34C621A05412",
389 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "744C1765A53043E186BC30BAB07FA379B421CF0BCA8224CB83E5D45B",
390 	"The quick brown fox jumps over the lazy dog", "310AEE6B30C47350576AC2873FA89FD190CDC488442F3EF654CF23FE",
391 	0
392 };
393 
394 const char* keccak_256_tests[] = {
395 	"", "C5D2460186F7233C927E7DB2DCC703C0E500B653CA82273B7BFAD8045D85A470",
396 	"a", "3AC225168DF54212A25C1C01FD35BEBFEA408FDAC2E31DDD6F80A4BBF9A5F1CB",
397 	"abc", "4E03657AEA45A94FC7D47BA826C8D667C0D1E6E33A64A036EC44F58FA12D6C45",
398 	"message digest", "856AB8A3AD0F6168A4D0BA8D77487243F3655DB6FC5B0E1669BC05B1287E0147",
399 	"abcdefghijklmnopqrstuvwxyz", "9230175B13981DA14D2F3334F321EB78FA0473133F6DA3DE896FEB22FB258936",
400 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "6E61C013AEF4C6765389FFCD406DD72E7E061991F4A3A8018190DB86BD21EBB4",
401 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "1523A0CD0E7E1FAABA17E1C12210FABC49FA99A7ABC061E3D6C978EEF4F748C4",
402 	"The quick brown fox jumps over the lazy dog", "4D741B6F1EB29CB2A9B9911C82F56FA8D73B04959D3D9D222895DF6C0B28AA15",
403 	0
404 };
405 
406 const char* keccak_384_tests[] = {
407 	"", "2C23146A63A29ACF99E73B88F8C24EAA7DC60AA771780CCC006AFBFA8FE2479B2DD2B21362337441AC12B515911957FF",
408 	"a", "85E964C0843A7EE32E6B5889D50E130E6485CFFC826A30167D1DC2B3A0CC79CBA303501A1EEABA39915F13BAAB5ABACF",
409 	"abc", "F7DF1165F033337BE098E7D288AD6A2F74409D7A60B49C36642218DE161B1F99F8C681E4AFAF31A34DB29FB763E3C28E",
410 	"message digest", "8A377DB088C43E44040A2BFB26676704999D90527913CABFF0A3484825DAA54D3061E67DA7D836A0805356962AF310E8",
411 	"abcdefghijklmnopqrstuvwxyz", "C5A708EC2178D8C398461547435E482CEE0D85DE3D75DDBFF54E6606A7E9F994F023A6033B2BF4C516A5F71FC7470D1A",
412 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "7377C5707506575C26937F3DF0D44A773F8C7452C074EE1725C1AB62F741F95059459D64CAEBF35A7C247FE28616CAB6",
413 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "FD6E89CBE3271545F94C3E6786803260F929C1589E3091AFD58CF32EF53A4F29B69C1166CB2982E2CB65CF5EB903E669",
414 	"The quick brown fox jumps over the lazy dog", "283990FA9D5FB731D786C5BBEE94EA4DB4910F18C62C03D173FC0A5E494422E8A0B3DA7574DAE7FA0BAF005E504063B3",
415 	0
416 };
417 
418 const char* keccak_512_tests[] = {
419 	"", "0EAB42DE4C3CEB9235FC91ACFFE746B29C29A8C366B7C60E4E67C466F36A4304C00FA9CAF9D87976BA469BCBE06713B435F091EF2769FB160CDAB33D3670680E",
420 	"a", "9C46DBEC5D03F74352CC4A4DA354B4E9796887EEB66AC292617692E765DBE400352559B16229F97B27614B51DBFBBB14613F2C10350435A8FEAF53F73BA01C7C",
421 	"abc", "18587DC2EA106B9A1563E32B3312421CA164C7F1F07BC922A9C83D77CEA3A1E5D0C69910739025372DC14AC9642629379540C17E2A65B19D77AA511A9D00BB96",
422 	"message digest", "CCCC49FA63822B00004CF6C889B28A035440FFB3EF50E790599935518E2AEFB0E2F1839170797F7763A5C43B2DCF02ABF579950E36358D6D04DFDDC2ABAC7545",
423 	"abcdefghijklmnopqrstuvwxyz", "E55BDCA64DFE33F36AE3153C727833F9947D92958073F4DD02E38A82D8ACB282B1EE1330A68252A54C6D3D27306508CA765ACD45606CAEAF51D6BDC459F551F1",
424 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "D5FA6B93D54A87BBDE52DBB44DAF96A3455DAEF9D60CDB922BC4B72A5BBBA97C5BF8C59816FEDE302FC64E98CE1B864DF7BE671C968E43D1BAE23AD76A3E702D",
425 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "BC08A9A245E99F62753166A3226E874896DE0914565BEE0F8BE29D678E0DA66C508CC9948E8AD7BE78EAA4EDCED482253F8AB2E6768C9C8F2A2F0AFFF083D51C",
426 	"The quick brown fox jumps over the lazy dog", "D135BB84D0439DBAC432247EE573A23EA7D3C9DEB2A968EB31D47C4FB45F1EF4422D6C531B5B9BD6F449EBCC449EA94D0A8F05F62130FDA612DA53C79659F609",
427 	0
428 };
429 #endif /* USE_KECCAK */
430 
431 /* verified by eBASH SUPERCOP implementation */
432 const char* edonr256_tests[] = {
433 	"", "86E7C84024C55DBDC9339B395C95E88DB8F781719851AD1D237C6E6A8E370B80",
434 	"a", "943AA9225A2CF154EC2E4DD81237720BA538CA8DF2FD83C0B893C5D265F353A0",
435 	"abc", "0360F65D97C2152EA6EBE3D462BF49831E2D5F67B6140992320585D89FD271CE",
436 	"message digest", "8D27558F4DD9307614A8166CADB136927D1E79A0C04BD8EF77C3FAFC0917E28A",
437 	"abcdefghijklmnopqrstuvwxyz", "5415737AF0D827459EFACB7FE33C0E89CF807E6E608A4D70EF9DEB07BF3BF6BF",
438 	"The quick brown fox jumps over the lazy dog", "E77A5AC00923B86C1811D42F1CB1198F43412A6D987DC98BDAE11E6D91399609",
439 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "19DE86BC3F0481098A3E623AA1330995043300A9A5D6C2AD584705F62686417F",
440 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "3B57F954420F49FAC6A80CE6CE013FDB47E71CE824DA78A8F66864203D8EF252",
441 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "286F39D5168775C8E541ED2F0FE3ECF3146380B9C479DE41BD847E866420A776",
442 	0
443 };
444 
445 /* verified by eBASH SUPERCOP implementation */
446 const char* edonr512_tests[] = {
447 	"", "C7AFBDF3E5B4590EB0B25000BF83FB16D4F9B722EE7F9A2DC2BD382035E8EE38D6F6F15C7B8EEC85355AC59AF989799950C64557EAB0E687D0FCBDBA90AE9704",
448 	"a", "B59EC44F7BEEF8A04CEED38A973D77C65E22E9458D5F67B497948DA34986C093B5EFC5483FBEE55F2F740FCAD31F18D80DB44BB6B8843E7FD599188E7C07233B",
449 	"abc", "FE79BCFA310245D9139DA8BC91B99FD022326F7F3ACA1DFDFB6C84E4125D71FE9BB6A1D41AFCE358F8472835220A7829D5146B2BBFC8E5C2627F60A9B517C1A4",
450 	"message digest", "A76B6C5CA8778F39EC1F85D64BADBDBF329725C9A6FB92656D94A82922A26FD51D271A6F135F33157143B960CD8D7D20DC99503AA39871FD64050E061689E4E3",
451 	"abcdefghijklmnopqrstuvwxyz", "754640B7B01782C1F345A3864B456DB805E39163FA1A06113A37CB8FB18D30F8DC43C7C3FDB407849CAD437C90DBD28E28AEFEF8898589B388ADEBA153B3DE0B",
452 	"The quick brown fox jumps over the lazy dog", "B986ADABFA9ADB1E5B152B6D64C733389082E354FDE2FD9740FAEA6766F440EA4391FC745BB9B11A821756944077BB30723F616645492C70FA4C614DB7E9D45B",
453 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "EE5EF974E8677636970A50E7636EC34EFB1F9D8023C715A26747D73D3665D78D2BB4962381901F76892A630133D476A278E4E3C62176FCE1563904636284415B",
454 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "0755F846450A6F84001846E1066828727BF5975383867B87E0120F27B79482524EB01137459185F73C24C23BDD9D901AD1577C3EA1A824E6ACE34BBBA119E92F",
455 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "0998912DA5B13FC5D7332CBC3B240E44547CE9C861867D901DD39D5A43D2EE80686BC4AD70DFF9159FE12CE94255AD5467B2B59D31562FC08B3697B67323075F",
456 	0
457 };
458 
459 /* verified by b2sum utility */
460 const char* blake2s_tests[] = {
461 	"", "69217A3079908094E11121D042354A7C1F55B6482CA1A51E1B250DFD1ED0EEF9",
462 	"a", "4A0D129873403037C2CD9B9048203687F6233FB6738956E0349BD4320FEC3E90",
463 	"abc", "508C5E8C327C14E2E1A72BA34EEB452F37458B209ED63A294D999B4C86675982",
464 	"message digest", "FA10AB775ACF89B7D3C8A6E823D586F6B67BDBAC4CE207FE145B7D3AC25CD28C",
465 	"abcdefghijklmnopqrstuvwxyz", "BDF88EB1F86A0CDF0E840BA88FA118508369DF186C7355B4B16CF79FA2710A12",
466 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "C75439EA17E1DE6FA4510C335DC3D3F343E6F9E1CE2773E25B4174F1DF8B119B",
467 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "FDAEDB290A0D5AF9870864FEC2E090200989DC9CD53A3C092129E8535E8B4F66",
468 	"The quick brown fox jumps over the lazy dog", "606BEEEC743CCBEFF6CBCDF5D5302AA855C256C29B88C8ED331EA1A6BF3C8812",
469 	0
470 };
471 
472 /* verified by b2sum utility */
473 const char* blake2b_tests[] = {
474 	"", "786A02F742015903C6C6FD852552D272912F4740E15847618A86E217F71F5419D25E1031AFEE585313896444934EB04B903A685B1448B755D56F701AFE9BE2CE",
475 	"a", "333FCB4EE1AA7C115355EC66CEAC917C8BFD815BF7587D325AEC1864EDD24E34D5ABE2C6B1B5EE3FACE62FED78DBEF802F2A85CB91D455A8F5249D330853CB3C",
476 	"abc", "BA80A53F981C4D0D6A2797B69F12F6E94C212F14685AC4B74B12BB6FDBFFA2D17D87C5392AAB792DC252D5DE4533CC9518D38AA8DBF1925AB92386EDD4009923",
477 	"message digest", "3C26CE487B1C0F062363AFA3C675EBDBF5F4EF9BDC022CFBEF91E3111CDC283840D8331FC30A8A0906CFF4BCDBCD230C61AAEC60FDFAD457ED96B709A382359A",
478 	"abcdefghijklmnopqrstuvwxyz", "C68EDE143E416EB7B4AAAE0D8E48E55DD529EAFED10B1DF1A61416953A2B0A5666C761E7D412E6709E31FFE221B7A7A73908CB95A4D120B8B090A87D1FBEDB4C",
479 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "99964802E5C25E703722905D3FB80046B6BCA698CA9E2CC7E49B4FE1FA087C2EDF0312DFBB275CF250A1E542FD5DC2EDD313F9C491127C2E8C0C9B24168E2D50",
480 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "686F41EC5AFFF6E87E1F076F542AA466466FF5FBDE162C48481BA48A748D842799F5B30F5B67FC684771B33B994206D05CC310F31914EDD7B97E41860D77D282",
481 	"The quick brown fox jumps over the lazy dog", "A8ADD4BDDDFD93E4877D2746E62817B116364A1FA7BC148D95090BC7333B3673F82401CF7AA2E4CB1ECD90296E3F14CB5413F8ED77BE73045B13914CDCD6A918",
482 	0
483 };
484 
485 /* BTIH calculated with filename = "test.txt", verified using uTorrent */
486 const char* btih_with_filename_tests[] = {
487 	"", "042C8E2D2780B0AFAE6599A02914D6C3F1515B12",
488 	"a", "7527A903193C87093C05DE0F0F81126A4B98EE1A",
489 	"abc", "CBF4F6D5CCDE0E6DD6BC8F013AA7F920900C11A2",
490 	"message digest", "FFFCE897C2D5FB8ED4B6AD773CC0FFA071AEC393",
491 	"abcdefghijklmnopqrstuvwxyz", "606A31B06B17547C226C9EA8EE00EEBA6E0E5BFC",
492 	"The quick brown fox jumps over the lazy dog", "1EED1B4C56186456E3DE420FE69A67F53CA6A52A",
493 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "6BD6F0B19FA3F54CE0311BF6D2D6D3955B1BD20C",
494 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "95880C5A8EB06C1AC28BA6A531505E0F2BCD77AE",
495 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "674E17AA21981A33892119E601DF3E2E689C4E62",
496 	0
497 };
498 
499 /* BTIH calculated without a filename, can't be verified by torrent tools */
500 const char* btih_without_a_filename_tests[] = {
501 	"", "A4A6678B3A933D1D9A182CC38E73124F7672C7EB",
502 	"a", "827CD89846FC132E2E67E29C2784C65443BB4DC1",
503 	"abc", "88713704608141F4E86F58C86247CA1E3D91D864",
504 	"message digest", "C654901E82A8FC13C343271520FAF52EBEEF2183",
505 	"abcdefghijklmnopqrstuvwxyz", "4AE72ED186D196D8F117E449D34E216B0941FF61",
506 	"The quick brown fox jumps over the lazy dog", "A9328020229C163BBF07181C8DF37CE84FC66589",
507 	"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "DB9A7E577A346FF058D78576102F2EB9DC849018",
508 	"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "7F8FEED959E89BB097B5F741C0342B6DF0A7864D",
509 	"12345678901234567890123456789012345678901234567890123456789012345678901234567890", "92D6F01285FDA7D43E7D09A5AFF01C383CEEE610",
510 	0
511 };
512 
513 /** Set of test vectors for one hash function */
514 struct test_vectors_t {
515 	/** Hash function id */
516 	unsigned hash_id;
517 	/** Array of pairs (message, message_digest) */
518 	const char** tests;
519 };
520 
521 /**
522  * Array of test vectors for short messages
523  */
524 struct test_vectors_t short_test_vectors[] = {
525 	{ RHASH_CRC32, crc32_tests },
526 	{ RHASH_CRC32C, crc32c_tests },
527 	{ RHASH_MD4, md4_tests },
528 	{ RHASH_MD5, md5_tests },
529 	{ RHASH_SHA1, sha1_tests },
530 	{ RHASH_TIGER, tiger_tests },
531 	{ RHASH_TTH, tth_tests },
532 	{ RHASH_BTIH, btih_with_filename_tests },
533 	{ RHASH_BTIH, btih_without_a_filename_tests },
534 	{ RHASH_ED2K, ed2k_tests },
535 	{ RHASH_AICH, aich_tests },
536 	{ RHASH_WHIRLPOOL, whirlpool_tests },
537 	{ RHASH_RIPEMD160, ripemd_tests },
538 	{ RHASH_GOST12_256, gost12_256_tests },
539 	{ RHASH_GOST12_512, gost12_512_tests },
540 	{ RHASH_GOST94, gost94_tests },
541 	{ RHASH_GOST94_CRYPTOPRO, gost94_cryptopro_tests },
542 	{ RHASH_HAS160, has160_tests },
543 	{ RHASH_SNEFRU128, snefru128_tests },
544 	{ RHASH_SNEFRU256, snefru256_tests },
545 	{ RHASH_SHA224, sha224_tests },
546 	{ RHASH_SHA256, sha256_tests },
547 	{ RHASH_SHA384, sha384_tests },
548 	{ RHASH_SHA512, sha512_tests },
549 	{ RHASH_SHA3_224, sha3_224_tests },
550 	{ RHASH_SHA3_256, sha3_256_tests },
551 	{ RHASH_SHA3_384, sha3_384_tests },
552 	{ RHASH_SHA3_512, sha3_512_tests },
553 	{ RHASH_EDONR256, edonr256_tests },
554 	{ RHASH_EDONR512, edonr512_tests },
555 	{ RHASH_BLAKE2S, blake2s_tests },
556 	{ RHASH_BLAKE2B, blake2b_tests },
557 	{ 0, 0 }
558 };
559 
560 /*=========================================================================*
561  *               Functions for calculating a message digest                *
562  *=========================================================================*/
563 
564 /**
565  * The total number of errors
566  */
567 static int g_errors = 0;
568 
569 /**
570  * Print a formatted message to the message log.
571  * @param format the format of the message
572  */
log_message(char * format,...)573 static void log_message(char* format, ...)
574 {
575 	va_list vl;
576 	va_start(vl, format);
577 	vprintf(format, vl);
578 	fflush(stdout);
579 	va_end(vl);
580 }
581 
582 enum ChunkedDataBitFlags {
583 	CHDT_NO_FLAGS = 0,
584 	CHDT_SET_FILENAME = 1,
585 	CHDT_REPEAT_SMALL_CHUNK = 2
586 };
587 
588 /**
589  * Calculate message digest of the data by chunks of the specified size.
590  *
591  * @param hash_id id of the hash algorithm to use
592  * @param data the data to hash
593  * @param chunk_size the size of a chunk
594  * @param total_size the total size of the data to be hashed
595  * @param flags bit flags to control the hashing process
596  */
hash_data_by_chunks(unsigned hash_id,const char * data,size_t chunk_size,size_t total_size,unsigned flags)597 static char* hash_data_by_chunks(unsigned hash_id, const char* data, size_t chunk_size, size_t total_size, unsigned flags)
598 {
599 	struct rhash_context* ctx;
600 	size_t left, size;
601 	static char out[130];
602 	assert(rhash_get_hash_length(hash_id) < 130);
603 
604 	ctx = rhash_init(hash_id);
605 
606 	if ((hash_id & RHASH_BTIH) && (flags & CHDT_SET_FILENAME)) {
607 		rhash_torrent_add_file(ctx, "test.txt", (unsigned long long)total_size);
608 	}
609 	if (!!(flags & CHDT_REPEAT_SMALL_CHUNK)) {
610 		/* repeat the small chunk of data until the total_size is reached */
611 		for (left = total_size; left > 0; left -= size) {
612 			size = (left > chunk_size ? chunk_size : left);
613 			rhash_update(ctx, (const unsigned char*)data, size);
614 		}
615 	} else {
616 		/* split the long data buffer and hash it by small chunks */
617 		size_t index;
618 		for (index = 0, left = total_size; left > 0; index += size, left -= size) {
619 			size = (left > chunk_size ? chunk_size : left);
620 			rhash_update(ctx, (const unsigned char*)data + index, size);
621 		}
622 	}
623 	rhash_final(ctx, 0);
624 	rhash_print(out, ctx, hash_id, RHPR_UPPERCASE);
625 	rhash_free(ctx);
626 	return out;
627 }
628 
629 /**
630  * Test a hash algorithm against a message of given length, consisting
631  * of repeated chunks.
632  * Report error if calculated hash differs from the expected value.
633  *
634  * @param hash_id id of the algorithm to test
635  * @param data the data to hash
636  * @param chunk_size the size of the chunk in bytes
637  * @param total_size the total size of the data to be hashed
638  * @param hash the expected hash value
639  * @param flags bit flags to control the hashing process
640  */
assert_hash_long_msg(unsigned hash_id,const char * data,size_t chunk_size,size_t total_size,const char * hash,const char * msg_name,unsigned flags)641 static void assert_hash_long_msg(unsigned hash_id, const char* data, size_t chunk_size, size_t total_size, const char* hash, const char* msg_name, unsigned flags)
642 {
643 	char* result;
644 	result = hash_data_by_chunks(hash_id, data, chunk_size, total_size, flags);
645 	if (strcmp(result, hash) != 0) {
646 		const char* hash_name = rhash_get_name(hash_id); /* the hash function name */
647 		if (msg_name)
648 			log_message("failed: %s(%s) = %s, expected %s\n", hash_name, msg_name, result, hash);
649 		else
650 			log_message("failed: %s(\"%s\") = %s, expected %s\n", hash_name, data, result, hash);
651 		g_errors++;
652 	}
653 }
654 
655 /**
656  * Calculate message digest for the data of given size.
657  *
658  * @param hash_id id of the hash algorithm to use
659  * @param data the data to hash
660  * @param data_size the size of the data
661  * @param flags bit flags to control the hashing process
662  */
hash_data(unsigned hash_id,const char * data,size_t data_size,unsigned flags)663 static char* hash_data(unsigned hash_id, const char* data, size_t data_size, unsigned flags)
664 {
665 	return hash_data_by_chunks(hash_id, data, data_size, data_size, flags);
666 }
667 
668 /**
669  * Calculate message digest of the given message.
670  *
671  * @param hash_id id of the hash algorithm to use
672  * @param str the message to hash
673  * @param flags bit flags to control the hashing process
674  */
hash_message(unsigned hash_id,const char * str,unsigned flags)675 static char* hash_message(unsigned hash_id, const char* str, unsigned flags)
676 {
677 	return hash_data(hash_id, str, strlen(str), flags);
678 }
679 
680 /**
681  * Test a hash algorithm on given message by comparing the result hash value
682  * against the expected one. Report error on fail.
683  *
684  * @param hash_id id of the algorithm to test
685  * @param str the message to hash
686  * @param expected_hash the expected hash value
687  * @param flags bit flags to control the hashing process
688  */
assert_hash(unsigned hash_id,const char * str,const char * expected_hash,unsigned flags)689 static void assert_hash(unsigned hash_id, const char* str, const char* expected_hash, unsigned flags)
690 {
691 	size_t length = strlen(str);
692 	assert_hash_long_msg(hash_id, str, length, length, expected_hash, NULL, flags);
693 }
694 
695 /**
696  * Test a hash algorithm using a message consisting of given repeated character.
697  * Report error if calculated hash doesn't coincide with expected value.
698  *
699  * @param hash_id id of the algorithm to test
700  * @param ch the character the message is filled with
701  * @param msg_size the size of message in bytes
702  * @param expected_hash the expected hash value
703  * @param flags bit flags to control the hashing process
704  */
assert_rep_hash(unsigned hash_id,char ch,size_t msg_size,const char * hash,unsigned flags)705 static void assert_rep_hash(unsigned hash_id, char ch, size_t msg_size, const char* hash, unsigned flags)
706 {
707 	char ALIGN_ATTR(64) msg_chunk[8192]; /* 8 KiB */
708 	char msg_name[20];
709 	memset(msg_chunk, ch, 8192);
710 	if (ch >= 32)
711 		sprintf(msg_name, "\"%c\"x%d", ch, (int)msg_size);
712 	else
713 		sprintf(msg_name, "\"\\%o\"x%d", (unsigned)(unsigned char)ch, (int)msg_size);
714 	assert_hash_long_msg(hash_id, msg_chunk, 8192, msg_size, hash, msg_name, flags | CHDT_REPEAT_SMALL_CHUNK);
715 }
716 
717 /*=========================================================================*
718  *                             Test functions                              *
719  *=========================================================================*/
720 
721 /**
722  * Test a hash algorithm on array of known short messages.
723  *
724  * @param hash_id id of the algorithm to test
725  * @param ptr pointer to array of pairs <message,expected-hash>
726  * @param flags bit flags to control the hashing process
727  */
test_known_strings_pairs(unsigned hash_id,const char ** ptr,unsigned flags)728 static void test_known_strings_pairs(unsigned hash_id, const char** ptr, unsigned flags)
729 {
730 	for (; ptr[0] && ptr[1]; ptr += 2) {
731 		assert_hash(hash_id, ptr[0], ptr[1], flags);
732 	}
733 }
734 
735 /**
736  * Test a hash algorithm on known short messages.
737  *
738  * @param hash_id id of the algorithm to test
739  */
test_known_strings(unsigned hash_id)740 static void test_known_strings(unsigned hash_id)
741 {
742 	int i;
743 	for (i = 0; short_test_vectors[i].tests != 0; i++) {
744 		if (hash_id == short_test_vectors[i].hash_id) {
745 			unsigned flags = (short_test_vectors[i].tests == btih_with_filename_tests ? CHDT_SET_FILENAME : CHDT_NO_FLAGS);
746 			test_known_strings_pairs(hash_id, short_test_vectors[i].tests, flags);
747 			break;
748 		}
749 	}
750 }
751 
752 /**
753  * Verify hash algorithms by testing them against known short messages.
754  */
test_all_known_strings(void)755 static void test_all_known_strings(void)
756 {
757 	int i;
758 	for (i = 0; short_test_vectors[i].tests != 0; i++) {
759 		unsigned flags = (short_test_vectors[i].tests == btih_with_filename_tests ? CHDT_SET_FILENAME : CHDT_NO_FLAGS);
760 		test_known_strings_pairs(short_test_vectors[i].hash_id, short_test_vectors[i].tests, flags);
761 	}
762 }
763 
764 /**
765  * A pair <algorithm-id, expected-hash-value>.
766  */
767 typedef struct id_to_hash_t {
768 	int hash_id;
769 	const char* expected_hash;
770 } id_to_hash_t;
771 
772 /**
773  * Verify hash algorithms by testing them on long messages, like
774  * 1,000,000 charaters of 'a'.
775  */
test_long_strings(void)776 static void test_long_strings(void)
777 {
778 	unsigned count;
779 
780 	struct id_to_hash_t tests[] = {
781 		{ RHASH_CRC32, "DC25BFBC" }, /* verified with cksfv */
782 		{ RHASH_CRC32C, "436FE240" },
783 		{ RHASH_MD4, "BBCE80CC6BB65E5C6745E30D4EECA9A4" }, /* checked by md4sum */
784 		{ RHASH_MD5, "7707D6AE4E027C70EEA2A935C2296F21" }, /* checked by md5sum */
785 		{ RHASH_SHA1, "34AA973CD4C4DAA4F61EEB2BDBAD27316534016F" }, /* checked by sha1sum */
786 		{ RHASH_ED2K, "BBCE80CC6BB65E5C6745E30D4EECA9A4" }, /* checked by eMule' Link Creator (uses eMule algorithm) */
787 		{ RHASH_AICH, "KSYPATEV3KP26FJYUEEBCPL5LQJ5FGUK" }, /* checked by eMule' Link Creator */
788 		{ RHASH_TIGER, "6DB0E2729CBEAD93D715C6A7D36302E9B3CEE0D2BC314B41" }, /* from Tiger author's page (NESSIE test vector) */
789 		{ RHASH_TTH, "KEPTIGT4CQKF7S5EUVNJZSXXIPNMB3XSOAAQS4Y" }, /* verified with Strong DC++ */
790 		{ RHASH_WHIRLPOOL, "0C99005BEB57EFF50A7CF005560DDF5D29057FD86B20BFD62DECA0F1CCEA4AF51FC15490EDDC47AF32BB2B66C34FF9AD8C6008AD677F77126953B226E4ED8B01" }, /* taken from the algorithm reference */
791 		{ RHASH_RIPEMD160, "52783243C1697BDBE16D37F97F68F08325DC1528" }, /* taken from the algorithm reference */
792 		{ RHASH_GOST94_CRYPTOPRO, "8693287AA62F9478F7CB312EC0866B6C4E4A0F11160441E8F4FFCD2715DD554F" }, /* verified with openssl */
793 		{ RHASH_GOST94, "5C00CCC2734CDD3332D3D4749576E3C1A7DBAF0E7EA74E9FA602413C90A129FA" }, /* verified with openssl */
794 		{ RHASH_HAS160, "D6AD6F0608B878DA9B87999C2525CC84F4C9F18D" }, /* verified against jacksum implementation */
795 		{ RHASH_SNEFRU128, "5071F647BC51CFD48F9A8F2D2ED84829" }, /* verified by mhash */
796 		{ RHASH_SNEFRU256, "4A02811F28C121F2162ABB251A01A2A58E6CFC27534AAB10EA6AF0A8DF17FFBF" }, /* verified by mhash */
797 		{ RHASH_SHA224, "20794655980C91D8BBB4C1EA97618A4BF03F42581948B2EE4EE7AD67" }, /* verified against jacksum implementation */
798 		{ RHASH_SHA256, "CDC76E5C9914FB9281A1C7E284D73E67F1809A48A497200E046D39CCC7112CD0" }, /* from NESSIE test vectors */
799 		{ RHASH_SHA384, "9D0E1809716474CB086E834E310A4A1CED149E9C00F248527972CEC5704C2A5B07B8B3DC38ECC4EBAE97DDD87F3D8985" }, /* from NESSIE test vectors */
800 		{ RHASH_SHA512, "E718483D0CE769644E2E42C7BC15B4638E1F98B13B2044285632A803AFA973EBDE0FF244877EA60A4CB0432CE577C31BEB009C5C2C49AA2E4EADB217AD8CC09B" }, /* from NESSIE test vectors */
801 		{ RHASH_SHA3_224, "D69335B93325192E516A912E6D19A15CB51C6ED5C15243E7A7FD653C" },
802 		{ RHASH_SHA3_256, "5C8875AE474A3634BA4FD55EC85BFFD661F32ACA75C6D699D0CDCB6C115891C1" },
803 		{ RHASH_SHA3_384, "EEE9E24D78C1855337983451DF97C8AD9EEDF256C6334F8E948D252D5E0E76847AA0774DDB90A842190D2C558B4B8340" },
804 		{ RHASH_SHA3_512, "3C3A876DA14034AB60627C077BB98F7E120A2A5370212DFFB3385A18D4F38859ED311D0A9D5141CE9CC5C66EE689B266A8AA18ACE8282A0E0DB596C90B0A7B87" },
805 		{ RHASH_EDONR256, "56F4B8DC0A41C8EA0A6A42C949883CD5DC25DF8CF4E43AD474FD4492A7A07966" }, /* verified by eBASH SUPERCOP implementation */
806 		{ RHASH_EDONR512, "B4A5A255D67869C990FE79B5FCBDA69958794B8003F01FD11E90FEFEC35F22BD84FFA2E248E8B3C1ACD9B7EFAC5BC66616E234A6E938D3526DEE26BD0DE9C562" }, /* verified by eBASH SUPERCOP implementation */
807 		{ RHASH_BLAKE2S, "BEC0C0E6CDE5B67ACB73B81F79A67A4079AE1C60DAC9D2661AF18E9F8B50DFA5" }, /* verified by b2sum utility */
808 		{ RHASH_BLAKE2B, "98FB3EFB7206FD19EBF69B6F312CF7B64E3B94DBE1A17107913975A793F177E1D077609D7FBA363CBBA00D05F7AA4E4FA8715D6428104C0A75643B0FF3FD3EAF" }, /* verified by b2sum utility */
809 		{ RHASH_GOST12_256, "841AF1A0B2F92A800FB1B7E4AABC8E48763153C448A0FC57C90BA830E130F152" },
810 		{ RHASH_GOST12_512, "D396A40B126B1F324465BFA7AA159859AB33FAC02DCDD4515AD231206396A266D0102367E4C544EF47D2294064E1A25342D0CD25AE3D904B45ABB1425AE41095" },
811 #ifdef USE_KECCAK
812 		{ RHASH_KECCAK_224, "19F9167BE2A04C43ABD0ED554788101B9C339031ACC8E1468531303F" }, /* verified by reference implementation */
813 		{ RHASH_KECCAK_256, "FADAE6B49F129BBB812BE8407B7B2894F34AECF6DBD1F9B0F0C7E9853098FC96" }, /* verified by reference implementation */
814 		{ RHASH_KECCAK_384, "0C8324E1EBC182822C5E2A086CAC07C2FE00E3BCE61D01BA8AD6B71780E2DEC5FB89E5AE90CB593E57BC6258FDD94E17" }, /* verified by reference implementation */
815 		{ RHASH_KECCAK_512, "5CF53F2E556BE5A624425EDE23D0E8B2C7814B4BA0E4E09CBBF3C2FAC7056F61E048FC341262875EBC58A5183FEA651447124370C1EBF4D6C89BC9A7731063BB" }, /* verified by reference implementation */
816 #endif
817 		{ RHASH_BTIH, "90AE73EE72A12B5A3A39DCA4C5E24BE1F39B6A1B" } /* BTIH with filename="test.txt", verified using uTorrent */
818 	};
819 
820 	/* test all algorithms on 1,000,000 characters of 'a' */
821 	for (count = 0; count < (sizeof(tests) / sizeof(id_to_hash_t)); count++) {
822 		unsigned flags = (tests[count].hash_id == RHASH_BTIH ? CHDT_SET_FILENAME : CHDT_NO_FLAGS);
823 		assert_rep_hash(tests[count].hash_id, 'a', 1000000, tests[count].expected_hash, flags);
824 	}
825 
826 	/* BTIH calculated without a filename. The hash value can't be verified by torrent tools */
827 	assert_rep_hash(RHASH_BTIH, 'a', 1000000, "24742F9AE1BD416CF0A6916F2849FE7ABFAC405E", 0);
828 
829 	/* now we verify some specific cases, which caused problems in many libraries */
830 	assert_rep_hash(RHASH_GOST94, 0xFF, 64, "13416C4EC74A63C3EC90CB1748FD462C7572C6C6B41844E48CC1184D1E916098", 0);
831 	assert_rep_hash(RHASH_GOST94_CRYPTOPRO, 0xFF, 64, "58504D26B3677E756BA3F4A9FD2F14B3BA5457066A4AA1D700659B90DCDDD3C6", 0);
832 
833 	/* these messages verified by eMule LinkCreator (which uses eMule variant of ED2K hash) */
834 	assert_rep_hash(RHASH_ED2K, 0, 9728000, "FC21D9AF828F92A8DF64BEAC3357425D", 0);
835 	assert_rep_hash(RHASH_ED2K, 0, 9728000 - 1, "AC44B93FC9AFF773AB0005C911F8396F", 0);
836 	assert_rep_hash(RHASH_ED2K, 0, 9728000 + 1, "06329E9DBA1373512C06386FE29E3C65", 0); /* msg with: 9728000 < size <= 9732096 */
837 	assert_rep_hash(RHASH_AICH, 0, 9728000, "5D3N4HQHIUMQ7IU7A5QLPLI6RHSWOR7B", 0);
838 	assert_rep_hash(RHASH_AICH, 0, 9728000 - 1, "L6SPMD2CM6PRZBGRQ6UFC4HJFFOATRA4", 0);
839 	assert_rep_hash(RHASH_AICH, 0, 9728000 + 1, "HL3TFXORIUEPXUWFPY3JLR7SMKGTO4IH", 0);
840 #if 0
841 	assert_rep_hash(RHASH_ED2K, 0, 9728000 * 5, "3B613901DABA54F6C0671793E28A1205", 0);
842 	assert_rep_hash(RHASH_AICH, 0, 9728000 * 5, "EZCO3XF2RJ4FERRDEXGOSSRGL5NA5BBM", 0);
843 #endif
844 }
845 
846 /**
847  * Verify for all algorithms, that rhash_final() returns the same result as
848  * rhash_print().
849  */
test_results_consistency(void)850 static void test_results_consistency(void)
851 {
852 	const char* msg = "a";
853 	size_t msg_size = strlen(msg);
854 
855 	size_t digest_size;
856 	struct rhash_context* ctx;
857 	unsigned char res1[70];
858 	char res2[70];
859 	unsigned i, hash_id;
860 
861 	for (i = 0, hash_id = 1; (hash_id & RHASH_ALL_HASHES); hash_id <<= 1, i++) {
862 		digest_size = rhash_get_digest_size(hash_id);
863 		assert(digest_size < 70);
864 
865 		ctx = rhash_init(hash_id);
866 
867 #ifndef USE_BTIH_WITH_TEST_FILENAME
868 		if ((hash_id & RHASH_BTIH) != 0) {
869 			rhash_torrent_add_file(ctx, "test.txt", (unsigned long long)msg_size);
870 		}
871 #endif
872 
873 		rhash_update(ctx, msg, msg_size);
874 		rhash_final(ctx, res1);
875 		rhash_print(res2, ctx, hash_id, RHPR_RAW);
876 		rhash_free(ctx);
877 
878 		if (memcmp(res1, res2, digest_size) != 0) {
879 			log_message("failed: inconsistent %s(\"%s\") hash results\n", rhash_get_name(hash_id), msg);
880 			g_errors++;
881 		}
882 	}
883 }
884 
885 /**
886  * Verify that calculated hash doesn't depend on message alignment.
887  */
test_unaligned_messages_consistency(void)888 static void test_unaligned_messages_consistency(void)
889 {
890 	int start, alignment_size;
891 	unsigned hash_id;
892 
893 	/* loop by hash algorithms */
894 	for (hash_id = 1; (hash_id & RHASH_ALL_HASHES); hash_id <<= 1) {
895 		char expected_hash[130];
896 		assert(rhash_get_digest_size(hash_id) < (int)sizeof(expected_hash));
897 
898 		alignment_size = (hash_id & (RHASH_TTH | RHASH_TIGER | RHASH_WHIRLPOOL | RHASH_SHA512) ? 8 : 4);
899 
900 		/* start message with different alignment */
901 		for (start = 0; start < alignment_size; start++) {
902 			char message[30];
903 			int j, msg_length = 11 + alignment_size;
904 
905 			/* fill the buffer with the shifted letter sequence */
906 			for (j = 0; j < msg_length; j++)
907 				message[start + j] = 'a' + j;
908 			message[start + j] = 0;
909 
910 			if (start == 0) {
911 				strcpy(expected_hash, hash_message(hash_id, message + start, 0)); /* save hash value */
912 			} else {
913 				assert_hash(hash_id, message + start, expected_hash, 0); /* verify hash value */
914 			}
915 		}
916 	}
917 }
918 
919 /**
920  * Test that a message digest of a data block is independent on a chunk size.
921  */
test_chunk_size_consistency(void)922 static void test_chunk_size_consistency(void)
923 {
924 	char buffer[8192];
925 	unsigned hash_id;
926 	size_t i;
927 	for (i = 0; i < sizeof(buffer); i++)
928 		buffer[i] = (char)(unsigned char)(i % 255);
929 
930 	/* loop by hash algorithms */
931 	for (hash_id = 1; (hash_id & RHASH_ALL_HASHES); hash_id <<= 1) {
932 		char expected_hash[130];
933 		strcpy(expected_hash, hash_data(hash_id, buffer, sizeof(buffer), 0)); /* save hash value */
934 		for (i = 0; i < 2; i++) {
935 			int chunk_size = (i == 0 ? 512 : 3);
936 			char msg_name[40];
937 			sprintf(msg_name, "8k buffer by chunks of %d bytes", chunk_size);
938 			assert_hash_long_msg(hash_id, buffer, chunk_size, sizeof(buffer), expected_hash, msg_name, CHDT_NO_FLAGS);
939 		}
940 	}
941 }
942 
943 /**
944  * Verify processor endianness detected at compile-time against
945  * with the actual CPU endianness in runtime.
946  */
test_endianness(void)947 static void test_endianness(void)
948 {
949 	unsigned tmp = 1;
950 	if (*(char*)&tmp == IS_BIG_ENDIAN) {
951 		log_message("error: wrong endianness detected at compile time\n");
952 		g_errors++;
953 	}
954 }
955 
test_version_sanity(void)956 static void test_version_sanity(void)
957 {
958 	unsigned version = rhash_get_version();
959 	if (!(version & 0xff000000) || (version & 0xf0e0e0e0)) {
960 		log_message("error: wrong librhash version: %x\n", version);
961 		g_errors++;
962 	}
963 }
964 
965 /**
966  * Run various simple tests.
967  */
test_generic_assumptions(void)968 static void test_generic_assumptions(void)
969 {
970 	unsigned mask = (1u << RHASH_HASH_COUNT) - 1u;
971 	if (mask != RHASH_ALL_HASHES) {
972 		log_message("error: wrong algorithms count %d for the mask 0x%x\n", RHASH_HASH_COUNT, RHASH_ALL_HASHES);
973 		g_errors++;
974 	}
975 
976 	test_endianness();
977 	test_version_sanity();
978 }
979 
980 #define TEST_PATH 0x4000000
981 
982 /**
983  * Verify a magnet link.
984  */
assert_magnet(const char * expected,rhash ctx,unsigned mask,int flags)985 static void assert_magnet(const char* expected,
986 	rhash ctx, unsigned mask, int flags)
987 {
988 	static char out[240];
989 	const char* path = (flags & TEST_PATH ? "test.txt" : NULL);
990 	size_t size;
991 	flags &= ~TEST_PATH;
992 	size = rhash_print_magnet(out, path, ctx, mask, flags);
993 
994 	if (expected && strcmp(expected, out) != 0) {
995 		log_message("error: \"%s\" != \"%s\"\n", expected, out);
996 		g_errors++;
997 	} else {
998 		size_t size2 = strlen(out) + 1;
999 		if (size != size2) {
1000 			log_message("error: rhash_print_magnet returns wrong length %d != %d for \"%s\"\n", (int)size, (int)size2, out);
1001 			g_errors++;
1002 		} else if (size != (size2 = rhash_print_magnet(NULL, path, ctx, mask, flags))) {
1003 			log_message("error: rhash_print_magnet(NULL, ...) returns wrong length %d != %d for \"%s\"\n", (int)size2, (int)size, out);
1004 			g_errors++;
1005 		}
1006 	}
1007 }
1008 
1009 /**
1010  * Test printing of magnet links.
1011  */
test_magnet(void)1012 static void test_magnet(void)
1013 {
1014 	unsigned bit;
1015 
1016 	rhash ctx = rhash_init(RHASH_ALL_HASHES);
1017 	rhash_update(ctx, "a", 1);
1018 	rhash_final(ctx, 0);
1019 
1020 	assert_magnet("magnet:?xl=1&dn=test.txt&xt=urn:tree:tiger:czquwh3iyxbf5l3bgyugzhassmxu647ip2ike4y", ctx, RHASH_TTH, RHPR_FILESIZE | TEST_PATH);
1021 	assert_magnet("magnet:?xl=1&xt=urn:md5:0CC175B9C0F1B6A831C399E269772661", ctx, RHASH_MD5, RHPR_FILESIZE | RHPR_UPPERCASE);
1022 	assert_magnet("xt=urn:ed2k:bde52cb31de33e46245e05fbdbd6fb24&xt=urn:aich:q336in72uwt7zyk5dxolt2xk5i3xmz5y&xt=urn:sha1:q336in72uwt7zyk5dxolt2xk5i3xmz5y&xt=urn:btih:827cd89846fc132e2e67e29c2784c65443bb4dc1",
1023 		ctx, RHASH_ED2K | RHASH_AICH | RHASH_SHA1 | RHASH_BTIH, RHPR_NO_MAGNET);
1024 
1025 	/* verify length calculation for all hashes */
1026 	for (bit = 1; bit < RHASH_ALL_HASHES; bit <<= 1) {
1027 		assert_magnet(NULL, ctx, bit, RHPR_FILESIZE | RHPR_NO_MAGNET);
1028 	}
1029 
1030 	rhash_free(ctx);
1031 }
1032 
1033 /**
1034  * Find a hash function id by its name.
1035  *
1036  * @param name hash algorithm name
1037  * @return algorithm id
1038  */
find_hash(const char * name)1039 static unsigned find_hash(const char* name)
1040 {
1041 	char buf[30];
1042 	unsigned hash_id;
1043 	int i;
1044 
1045 	if (strlen(name) > (sizeof(buf) - 1)) return 0;
1046 	for (i = 0; name[i]; i++) buf[i] = toupper(name[i]);
1047 	buf[i] = 0;
1048 
1049 	for (hash_id = 1; (hash_id & RHASH_ALL_HASHES); hash_id <<= 1) {
1050 		if (strcmp(buf, rhash_get_name(hash_id)) == 0) return hash_id;
1051 	}
1052 	return 0;
1053 }
1054 
1055 /**
1056  * Print status of OpenSSL plugin.
1057  */
print_openssl_status(void)1058 static void print_openssl_status(void)
1059 {
1060 	rhash_uptr_t available = rhash_get_openssl_available_mask();
1061 	rhash_uptr_t supported = rhash_get_openssl_supported_mask();
1062 	int has_openssl = rhash_is_openssl_supported();
1063 
1064 	printf("OpenSSL %s", (has_openssl ? "supported" : "not supported"));
1065 	if (has_openssl && available != RHASH_ERROR)
1066 	{
1067 		printf(", %s", (available ? "loaded" : "not loaded"));
1068 		if (available)
1069 		{
1070 			unsigned hash_id;
1071 			printf(":");
1072 			available &= RHASH_ALL_HASHES;
1073 			for (hash_id = 1; hash_id <= available; hash_id <<= 1) {
1074 				if (!!(hash_id & available))
1075 					printf(" %s", rhash_get_name(hash_id));
1076 			}
1077 			supported &= (~available & RHASH_ALL_HASHES);
1078 			for (hash_id = 1; hash_id <= supported; hash_id <<= 1) {
1079 				if (!!(hash_id & supported))
1080 					printf(" -%s", rhash_get_name(hash_id));
1081 			}
1082 		}
1083 	}
1084 	printf("\n");
1085 }
1086 
1087 /**
1088  * The program entry point.
1089  *
1090  * @param argc number of arguments including the program name
1091  * @param argv program arguments including the program name
1092  * @return program exit code
1093  */
main(int argc,char * argv[])1094 int main(int argc, char* argv[])
1095 {
1096 #ifndef USE_RHASH_DLL
1097 	rhash_library_init();
1098 #endif
1099 
1100 	test_generic_assumptions();
1101 	if (argc > 1) {
1102 		if (strcmp(argv[1], "--speed") == 0) {
1103 			unsigned hash_id = (argc > 2 ? find_hash(argv[2]) : RHASH_SHA1);
1104 			if (hash_id == 0) {
1105 				fprintf(stderr, "error: unknown hash_id: %s\n", argv[2]);
1106 				return 1;
1107 			}
1108 			test_known_strings(hash_id);
1109 
1110 			rhash_run_benchmark(hash_id, 0, stdout);
1111 		} else if (strcmp(argv[1], "--info") == 0) {
1112 			printf("%s", compiler_flags);
1113 			print_openssl_status();
1114 		} else {
1115 			printf("Options: [--speed [HASH_NAME] | --info]\n");
1116 		}
1117 	} else {
1118 		test_all_known_strings();
1119 		test_long_strings();
1120 		test_results_consistency();
1121 		test_unaligned_messages_consistency();
1122 		test_chunk_size_consistency();
1123 		test_magnet();
1124 		if (g_errors == 0)
1125 			printf("All sums are working properly!\n");
1126 		fflush(stdout);
1127 	}
1128 
1129 	if (g_errors > 0) printf("%s", compiler_flags);
1130 
1131 	return (g_errors == 0 ? 0 : 1);
1132 }
1133