edb68153e3
- kf6-knewstuff/kwallet: removed all-zero blake3 placeholders - CONSOLE-TO-KDE-DESKTOP-PLAN.md: 20→22 KF6 enabled count - BOOT-PROCESS-IMPROVEMENT-PLAN.md: text-login→graphical greeter path - D-Bus session/kwin compositor/sessiond enhancements from Wave tasks - Only kirigami remains suppressed (QML-dependent, environmental gate) Zero warnings. 24 commits total.
88 lines
3.7 KiB
C++
88 lines
3.7 KiB
C++
/*
|
|
This file is part of the KDE libraries
|
|
SPDX-FileCopyrightText: 2016 Michael Pyne <mpyne@kde.org>
|
|
|
|
SPDX-License-Identifier: LGPL-2.0-only
|
|
*/
|
|
|
|
#include "backend/blowfish.h"
|
|
|
|
#include <QByteArray>
|
|
#include <QObject>
|
|
#include <QTest>
|
|
|
|
#include <stdint.h>
|
|
|
|
class TestBlowfish : public QObject
|
|
{
|
|
Q_OBJECT
|
|
private Q_SLOTS:
|
|
void testBlowfishCipher();
|
|
};
|
|
|
|
// Source for test vectors: https://www.schneier.com/code/vectors.txt
|
|
static const char *const keys[] = {
|
|
"0000000000000000", "FFFFFFFFFFFFFFFF", "3000000000000000", "1111111111111111", "0123456789ABCDEF", "1111111111111111", "0000000000000000",
|
|
"FEDCBA9876543210", "7CA110454A1A6E57", "0131D9619DC1376E", "07A1133E4A0B2686", "3849674C2602319E", "04B915BA43FEB5B6", "0113B970FD34F2CE",
|
|
"0170F175468FB5E6", "43297FAD38E373FE", "07A7137045DA2A16", "04689104C2FD3B2F", "37D06BB516CB7546", "1F08260D1AC2465E", "584023641ABA6176",
|
|
"025816164629B007", "49793EBC79B3258F", "4FB05E1515AB73A7", "49E95D6D4CA229BF", "018310DC409B26D6", "1C587F1C13924FEF", "0101010101010101",
|
|
"1F1F1F1F0E0E0E0E", "E0FEE0FEF1FEF1FE", "0000000000000000", "FFFFFFFFFFFFFFFF", "0123456789ABCDEF", "FEDCBA9876543210",
|
|
};
|
|
|
|
static const char *const cleartexts[] = {
|
|
"0000000000000000", "FFFFFFFFFFFFFFFF", "1000000000000001", "1111111111111111", "1111111111111111", "0123456789ABCDEF", "0000000000000000",
|
|
"0123456789ABCDEF", "01A1D6D039776742", "5CD54CA83DEF57DA", "0248D43806F67172", "51454B582DDF440A", "42FD443059577FA2", "059B5E0851CF143A",
|
|
"0756D8E0774761D2", "762514B829BF486A", "3BDD119049372802", "26955F6835AF609A", "164D5E404F275232", "6B056E18759F5CCA", "004BD6EF09176062",
|
|
"480D39006EE762F2", "437540C8698F3CFA", "072D43A077075292", "02FE55778117F12A", "1D9D5C5018F728C2", "305532286D6F295A", "0123456789ABCDEF",
|
|
"0123456789ABCDEF", "0123456789ABCDEF", "FFFFFFFFFFFFFFFF", "0000000000000000", "0000000000000000", "FFFFFFFFFFFFFFFF",
|
|
};
|
|
|
|
static const char *const ciphertexts[] = {
|
|
"4EF997456198DD78", "51866FD5B85ECB8A", "7D856F9A613063F2", "2466DD878B963C9D", "61F9C3802281B096", "7D0CC630AFDA1EC7", "4EF997456198DD78",
|
|
"0ACEAB0FC6A0A28D", "59C68245EB05282B", "B1B8CC0B250F09A0", "1730E5778BEA1DA4", "A25E7856CF2651EB", "353882B109CE8F1A", "48F4D0884C379918",
|
|
"432193B78951FC98", "13F04154D69D1AE5", "2EEDDA93FFD39C79", "D887E0393C2DA6E3", "5F99D04F5B163969", "4A057A3B24D3977B", "452031C1E4FADA8E",
|
|
"7555AE39F59B87BD", "53C55F9CB49FC019", "7A8E7BFA937E89A3", "CF9C5D7A4986ADB5", "D1ABB290658BC778", "55CB3774D13EF201", "FA34EC4847B268B2",
|
|
"A790795108EA3CAE", "C39E072D9FAC631D", "014933E0CDAFF6E4", "F21E9A77B71C49BC", "245946885754369A", "6B5C5A9C5D9E0A5A",
|
|
};
|
|
|
|
static QByteArray readBinaryData(const char *const src)
|
|
{
|
|
return QByteArray::fromHex(QByteArray(src));
|
|
}
|
|
|
|
#define ARRAY_SIZE(arr) (sizeof(arr) / sizeof(arr[0]))
|
|
|
|
void TestBlowfish::testBlowfishCipher()
|
|
{
|
|
BlowFish bf;
|
|
QByteArray result;
|
|
|
|
result.reserve(qstrlen(ciphertexts[0]) / 2);
|
|
|
|
for (std::size_t i = 0; i < ARRAY_SIZE(keys); i++) {
|
|
QByteArray key = readBinaryData(keys[i]);
|
|
QByteArray cleartext = readBinaryData(cleartexts[i]);
|
|
QByteArray ciphertext = readBinaryData(ciphertexts[i]);
|
|
|
|
bf.setKey(key.data(), 8 * key.size());
|
|
QVERIFY(bf.readyToGo());
|
|
|
|
// Verify encrypted cleartext == ciphertext
|
|
QByteArray temp = cleartext;
|
|
QCOMPARE(bf.encrypt(temp.data(), temp.size()), temp.size());
|
|
QVERIFY(temp == ciphertext);
|
|
|
|
bf.setKey(key.data(), 8 * key.size());
|
|
QVERIFY(bf.readyToGo());
|
|
|
|
// Verify decryption of ciphertext w/ same key yield cleartext
|
|
temp = ciphertext;
|
|
QCOMPARE(bf.decrypt(temp.data(), temp.size()), temp.size());
|
|
QVERIFY(temp == cleartext);
|
|
}
|
|
}
|
|
|
|
QTEST_APPLESS_MAIN(TestBlowfish)
|
|
|
|
#include "blowfishtest.moc"
|