~ubuntu-branches/ubuntu/precise/dropbear/precise

« back to all changes in this revision

Viewing changes to libtomcrypt/src/modes/f8/f8_test_mode.c

  • Committer: Bazaar Package Importer
  • Author(s): Gerrit Pape
  • Date: 2007-03-02 20:48:18 UTC
  • mfrom: (1.3.2 upstream)
  • Revision ID: james.westby@ubuntu.com-20070302204818-ozmbou2sbyj7dus5
Tags: 0.49-1
* new upstream release, fixes
  * CVE-2007-1099: dropbear dbclient insufficient warning on hostkey
    mismatch (closes: #412899).
  * dbclient uses static "Password:" prompt instead of using the server's
    prompt (closes: #394996).
* debian/control: Suggests: openssh-client, not ssh (closes: #405686);
  Standards-Version: 3.7.2.2.
* debian/README.Debian: ssh -> openssh-server, openssh-client; remove
  'Replacing OpenSSH "sshd" with Dropbear' part, this is simply done by not
  installing the openssh-server package.
* debian/README.runit: runsvstat -> sv status.

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
 
2
 *
 
3
 * LibTomCrypt is a library that provides various cryptographic
 
4
 * algorithms in a highly modular and flexible manner.
 
5
 *
 
6
 * The library is free for all purposes without any express
 
7
 * guarantee it works.
 
8
 *
 
9
 * Tom St Denis, tomstdenis@gmail.com, http://libtomcrypt.com
 
10
 */
 
11
#include "tomcrypt.h"
 
12
 
 
13
/**
 
14
   @file f8_test_mode.c
 
15
   F8 implementation, test, Tom St Denis
 
16
*/
 
17
 
 
18
 
 
19
#ifdef LTC_F8_MODE
 
20
 
 
21
int f8_test_mode(void)
 
22
{
 
23
#ifndef LTC_TEST
 
24
   return CRYPT_NOP;
 
25
#else
 
26
   static const unsigned char key[16] = { 0x23, 0x48, 0x29, 0x00, 0x84, 0x67, 0xbe, 0x18, 
 
27
                                          0x6c, 0x3d, 0xe1, 0x4a, 0xae, 0x72, 0xd6, 0x2c };
 
28
   static const unsigned char salt[4] = { 0x32, 0xf2, 0x87, 0x0d };
 
29
   static const unsigned char IV[16]  = { 0x00, 0x6e, 0x5c, 0xba, 0x50, 0x68, 0x1d, 0xe5, 
 
30
                                          0x5c, 0x62, 0x15, 0x99, 0xd4, 0x62, 0x56, 0x4a };
 
31
   static const unsigned char pt[39]  = { 0x70, 0x73, 0x65, 0x75, 0x64, 0x6f, 0x72, 0x61, 
 
32
                                          0x6e, 0x64, 0x6f, 0x6d, 0x6e, 0x65, 0x73, 0x73,
 
33
                                          0x20, 0x69, 0x73, 0x20, 0x74, 0x68, 0x65, 0x20, 
 
34
                                          0x6e, 0x65, 0x78, 0x74, 0x20, 0x62, 0x65, 0x73,
 
35
                                          0x74, 0x20, 0x74, 0x68, 0x69, 0x6e, 0x67       };
 
36
   static const unsigned char ct[39]  = { 0x01, 0x9c, 0xe7, 0xa2, 0x6e, 0x78, 0x54, 0x01, 
 
37
                                          0x4a, 0x63, 0x66, 0xaa, 0x95, 0xd4, 0xee, 0xfd,
 
38
                                          0x1a, 0xd4, 0x17, 0x2a, 0x14, 0xf9, 0xfa, 0xf4, 
 
39
                                          0x55, 0xb7, 0xf1, 0xd4, 0xb6, 0x2b, 0xd0, 0x8f,
 
40
                                          0x56, 0x2c, 0x0e, 0xef, 0x7c, 0x48, 0x02       };
 
41
   unsigned char buf[39];
 
42
   symmetric_F8  f8;
 
43
   int           err, idx;
 
44
   
 
45
   idx = find_cipher("aes");
 
46
   if (idx == -1) {
 
47
      idx = find_cipher("rijndael");
 
48
      if (idx == -1) return CRYPT_NOP;
 
49
   }      
 
50
   
 
51
   /* initialize the context */
 
52
   if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) {
 
53
      return err;
 
54
   }
 
55
   
 
56
   /* encrypt block */
 
57
   if ((err = f8_encrypt(pt, buf, sizeof(pt), &f8)) != CRYPT_OK) {
 
58
      f8_done(&f8);
 
59
      return err;
 
60
   }
 
61
   f8_done(&f8);
 
62
 
 
63
   /* compare */
 
64
   if (XMEMCMP(buf, ct, sizeof(ct))) {
 
65
      return CRYPT_FAIL_TESTVECTOR;
 
66
   }      
 
67
   
 
68
   return CRYPT_OK;
 
69
#endif   
 
70
}   
 
71
 
 
72
#endif
 
73
 
 
74
/* $Source: /cvs/libtom/libtomcrypt/src/modes/f8/f8_test_mode.c,v $ */
 
75
/* $Revision: 1.3 $ */
 
76
/* $Date: 2006/11/13 11:55:25 $ */