add CHD support.
[pcsx_rearmed.git] / deps / crypto / blowfish_test.c
1 /*********************************************************************
2 * Filename:   blowfish_test.c
3 * Author:     Brad Conte (brad AT bradconte.com)
4 * Copyright:
5 * Disclaimer: This code is presented "as is" without any guarantees.
6 * Details:    Performs known-answer tests on the corresponding Blowfish
7                   implementation. These tests do not encompass the full
8                   range of available test vectors, however, if the tests
9                   pass it is very, very likely that the code is correct
10                   and was compiled properly. This code also serves as
11                   example usage of the functions.
12 *********************************************************************/
13
14 /*************************** HEADER FILES ***************************/
15 #include <stdio.h>
16 #include <memory.h>
17 #include "blowfish.h"
18
19 /*********************** FUNCTION DEFINITIONS ***********************/
20 int blowfish_test()
21 {
22         BYTE key1[8]  = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
23         BYTE key2[8]  = {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff};
24         BYTE key3[24] = {0xF0,0xE1,0xD2,0xC3,0xB4,0xA5,0x96,0x87,
25                          0x78,0x69,0x5A,0x4B,0x3C,0x2D,0x1E,0x0F,
26                          0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77};
27         BYTE p1[BLOWFISH_BLOCK_SIZE] = {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
28         BYTE p2[BLOWFISH_BLOCK_SIZE] = {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff};
29         BYTE p3[BLOWFISH_BLOCK_SIZE] = {0xFE,0xDC,0xBA,0x98,0x76,0x54,0x32,0x10};
30
31         BYTE c1[BLOWFISH_BLOCK_SIZE] = {0x4e,0xf9,0x97,0x45,0x61,0x98,0xdd,0x78};
32         BYTE c2[BLOWFISH_BLOCK_SIZE] = {0x51,0x86,0x6f,0xd5,0xb8,0x5e,0xcb,0x8a};
33         BYTE c3[BLOWFISH_BLOCK_SIZE] = {0x05,0x04,0x4b,0x62,0xfa,0x52,0xd0,0x80};
34
35         BYTE enc_buf[BLOWFISH_BLOCK_SIZE];
36         BLOWFISH_KEY key;
37         int pass = 1;
38
39         // Test vector 1.
40         blowfish_key_setup(key1, &key, BLOWFISH_BLOCK_SIZE);
41         blowfish_encrypt(p1, enc_buf, &key);
42         pass = pass && !memcmp(c1, enc_buf, BLOWFISH_BLOCK_SIZE);
43         blowfish_decrypt(c1, enc_buf, &key);
44         pass = pass && !memcmp(p1, enc_buf, BLOWFISH_BLOCK_SIZE);
45
46         // Test vector 2.
47         blowfish_key_setup(key2, &key, BLOWFISH_BLOCK_SIZE);
48         blowfish_encrypt(p2, enc_buf, &key);
49         pass = pass && !memcmp(c2, enc_buf, BLOWFISH_BLOCK_SIZE);
50         blowfish_decrypt(c2, enc_buf, &key);
51         pass = pass && !memcmp(p2, enc_buf, BLOWFISH_BLOCK_SIZE);
52
53         // Test vector 3.
54         blowfish_key_setup(key3, &key, 24);
55         blowfish_encrypt(p3, enc_buf, &key);
56         pass = pass && !memcmp(c3, enc_buf, BLOWFISH_BLOCK_SIZE);
57         blowfish_decrypt(c3, enc_buf, &key);
58         pass = pass && !memcmp(p3, enc_buf, BLOWFISH_BLOCK_SIZE);
59
60         return(pass);
61 }
62
63 int main()
64 {
65         printf("Blowfish tests: %s\n", blowfish_test() ? "SUCCEEDED" : "FAILED");
66
67         return(0);
68 }