FFmpeg coverage


Directory: ../../../ffmpeg/
File: src/libavutil/tests/blowfish.c
Date: 2024-11-20 23:03:26
Exec Total Coverage
Lines: 31 44 70.5%
Functions: 2 2 100.0%
Branches: 8 18 44.4%

Line Branch Exec Source
1 /*
2 * This file is part of FFmpeg.
3 *
4 * FFmpeg is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
8 *
9 * FFmpeg is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
13 *
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with FFmpeg; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
17 */
18
19 #include <stdint.h>
20 #include <stdio.h>
21 #include <stdlib.h>
22 #include <string.h>
23
24 #include "libavutil/mem.h"
25 #include "libavutil/blowfish.h"
26
27 #define NUM_VARIABLE_KEY_TESTS 34
28
29 /* plaintext bytes -- left halves */
30 static const uint32_t plaintext_l[NUM_VARIABLE_KEY_TESTS] = {
31 0x00000000, 0xFFFFFFFF, 0x10000000, 0x11111111, 0x11111111,
32 0x01234567, 0x00000000, 0x01234567, 0x01A1D6D0, 0x5CD54CA8,
33 0x0248D438, 0x51454B58, 0x42FD4430, 0x059B5E08, 0x0756D8E0,
34 0x762514B8, 0x3BDD1190, 0x26955F68, 0x164D5E40, 0x6B056E18,
35 0x004BD6EF, 0x480D3900, 0x437540C8, 0x072D43A0, 0x02FE5577,
36 0x1D9D5C50, 0x30553228, 0x01234567, 0x01234567, 0x01234567,
37 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF
38 };
39
40 /* plaintext bytes -- right halves */
41 static const uint32_t plaintext_r[NUM_VARIABLE_KEY_TESTS] = {
42 0x00000000, 0xFFFFFFFF, 0x00000001, 0x11111111, 0x11111111,
43 0x89ABCDEF, 0x00000000, 0x89ABCDEF, 0x39776742, 0x3DEF57DA,
44 0x06F67172, 0x2DDF440A, 0x59577FA2, 0x51CF143A, 0x774761D2,
45 0x29BF486A, 0x49372802, 0x35AF609A, 0x4F275232, 0x759F5CCA,
46 0x09176062, 0x6EE762F2, 0x698F3CFA, 0x77075292, 0x8117F12A,
47 0x18F728C2, 0x6D6F295A, 0x89ABCDEF, 0x89ABCDEF, 0x89ABCDEF,
48 0xFFFFFFFF, 0x00000000, 0x00000000, 0xFFFFFFFF
49 };
50
51 /* key bytes for variable key tests */
52 static const uint8_t variable_key[NUM_VARIABLE_KEY_TESTS][8] = {
53 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
54 { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF },
55 { 0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
56 { 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11 },
57 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
58 { 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11 },
59 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
60 { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 },
61 { 0x7C, 0xA1, 0x10, 0x45, 0x4A, 0x1A, 0x6E, 0x57 },
62 { 0x01, 0x31, 0xD9, 0x61, 0x9D, 0xC1, 0x37, 0x6E },
63 { 0x07, 0xA1, 0x13, 0x3E, 0x4A, 0x0B, 0x26, 0x86 },
64 { 0x38, 0x49, 0x67, 0x4C, 0x26, 0x02, 0x31, 0x9E },
65 { 0x04, 0xB9, 0x15, 0xBA, 0x43, 0xFE, 0xB5, 0xB6 },
66 { 0x01, 0x13, 0xB9, 0x70, 0xFD, 0x34, 0xF2, 0xCE },
67 { 0x01, 0x70, 0xF1, 0x75, 0x46, 0x8F, 0xB5, 0xE6 },
68 { 0x43, 0x29, 0x7F, 0xAD, 0x38, 0xE3, 0x73, 0xFE },
69 { 0x07, 0xA7, 0x13, 0x70, 0x45, 0xDA, 0x2A, 0x16 },
70 { 0x04, 0x68, 0x91, 0x04, 0xC2, 0xFD, 0x3B, 0x2F },
71 { 0x37, 0xD0, 0x6B, 0xB5, 0x16, 0xCB, 0x75, 0x46 },
72 { 0x1F, 0x08, 0x26, 0x0D, 0x1A, 0xC2, 0x46, 0x5E },
73 { 0x58, 0x40, 0x23, 0x64, 0x1A, 0xBA, 0x61, 0x76 },
74 { 0x02, 0x58, 0x16, 0x16, 0x46, 0x29, 0xB0, 0x07 },
75 { 0x49, 0x79, 0x3E, 0xBC, 0x79, 0xB3, 0x25, 0x8F },
76 { 0x4F, 0xB0, 0x5E, 0x15, 0x15, 0xAB, 0x73, 0xA7 },
77 { 0x49, 0xE9, 0x5D, 0x6D, 0x4C, 0xA2, 0x29, 0xBF },
78 { 0x01, 0x83, 0x10, 0xDC, 0x40, 0x9B, 0x26, 0xD6 },
79 { 0x1C, 0x58, 0x7F, 0x1C, 0x13, 0x92, 0x4F, 0xEF },
80 { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 },
81 { 0x1F, 0x1F, 0x1F, 0x1F, 0x0E, 0x0E, 0x0E, 0x0E },
82 { 0xE0, 0xFE, 0xE0, 0xFE, 0xF1, 0xFE, 0xF1, 0xFE },
83 { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 },
84 { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF },
85 { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF },
86 { 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10 }
87 };
88
89 /* ciphertext bytes -- left halves */
90 static const uint32_t ciphertext_l[NUM_VARIABLE_KEY_TESTS] = {
91 0x4EF99745, 0x51866FD5, 0x7D856F9A, 0x2466DD87, 0x61F9C380,
92 0x7D0CC630, 0x4EF99745, 0x0ACEAB0F, 0x59C68245, 0xB1B8CC0B,
93 0x1730E577, 0xA25E7856, 0x353882B1, 0x48F4D088, 0x432193B7,
94 0x13F04154, 0x2EEDDA93, 0xD887E039, 0x5F99D04F, 0x4A057A3B,
95 0x452031C1, 0x7555AE39, 0x53C55F9C, 0x7A8E7BFA, 0xCF9C5D7A,
96 0xD1ABB290, 0x55CB3774, 0xFA34EC48, 0xA7907951, 0xC39E072D,
97 0x014933E0, 0xF21E9A77, 0x24594688, 0x6B5C5A9C
98 };
99
100 /* ciphertext bytes -- right halves */
101 static const uint32_t ciphertext_r[NUM_VARIABLE_KEY_TESTS] = {
102 0x6198DD78, 0xB85ECB8A, 0x613063F2, 0x8B963C9D, 0x2281B096,
103 0xAFDA1EC7, 0x6198DD78, 0xC6A0A28D, 0xEB05282B, 0x250F09A0,
104 0x8BEA1DA4, 0xCF2651EB, 0x09CE8F1A, 0x4C379918, 0x8951FC98,
105 0xD69D1AE5, 0xFFD39C79, 0x3C2DA6E3, 0x5B163969, 0x24D3977B,
106 0xE4FADA8E, 0xF59B87BD, 0xB49FC019, 0x937E89A3, 0x4986ADB5,
107 0x658BC778, 0xD13EF201, 0x47B268B2, 0x08EA3CAE, 0x9FAC631D,
108 0xCDAFF6E4, 0xB71C49BC, 0x5754369A, 0x5D9E0A5A
109 };
110
111 /* plaintext bytes */
112 static const uint8_t plaintext[8] = "BLOWFISH";
113
114 static const uint8_t plaintext2[16] = "BLOWFISHBLOWFISH";
115
116 /* ciphertext bytes */
117 static const uint8_t ciphertext[8] = {
118 0x32, 0x4E, 0xD0, 0xFE, 0xF4, 0x13, 0xA2, 0x03
119 };
120
121 static const uint8_t ciphertext2[16] = {
122 0x53, 0x00, 0x40, 0x06, 0x63, 0xf2, 0x1d, 0x99,
123 0x3b, 0x9b, 0x27, 0x64, 0x46, 0xfd, 0x20, 0xc1,
124 };
125
126 #define IV "blowfish"
127
128 8 static void test_blowfish(AVBlowfish *ctx, uint8_t *dst, const uint8_t *src,
129 const uint8_t *ref, int len, uint8_t *iv, int dir,
130 const char *test)
131 {
132 8 av_blowfish_crypt(ctx, dst, src, len, iv, dir);
133
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 8 times.
8 if (memcmp(dst, ref, 8*len)) {
134 int i;
135 printf("%s failed\ngot ", test);
136 for (i = 0; i < 8*len; i++)
137 printf("%02x ", dst[i]);
138 printf("\nexpected ");
139 for (i = 0; i < 8*len; i++)
140 printf("%02x ", ref[i]);
141 printf("\n");
142 exit(1);
143 }
144 8 }
145
146 1 int main(void)
147 {
148 uint32_t tmptext_l[NUM_VARIABLE_KEY_TESTS];
149 uint32_t tmptext_r[NUM_VARIABLE_KEY_TESTS];
150 uint8_t tmp[16], iv[8];
151 int i;
152 1 AVBlowfish *ctx = av_blowfish_alloc();
153
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 1 times.
1 if (!ctx)
154 return 1;
155
156 1 av_blowfish_init(ctx, "abcdefghijklmnopqrstuvwxyz", 26);
157
158 1 test_blowfish(ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption");
159 1 test_blowfish(ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption");
160 1 test_blowfish(ctx, tmp, tmp, ciphertext, 1, NULL, 0, "Inplace encryption");
161 1 test_blowfish(ctx, tmp, tmp, plaintext, 1, NULL, 1, "Inplace decryption");
162 1 memcpy(iv, IV, 8);
163 1 test_blowfish(ctx, tmp, plaintext2, ciphertext2, 2, iv, 0, "CBC encryption");
164 1 memcpy(iv, IV, 8);
165 1 test_blowfish(ctx, tmp, ciphertext2, plaintext2, 2, iv, 1, "CBC decryption");
166 1 memcpy(iv, IV, 8);
167 1 test_blowfish(ctx, tmp, tmp, ciphertext2, 2, iv, 0, "Inplace CBC encryption");
168 1 memcpy(iv, IV, 8);
169 1 test_blowfish(ctx, tmp, tmp, plaintext2, 2, iv, 1, "Inplace CBC decryption");
170
171 1 memcpy(tmptext_l, plaintext_l, sizeof(*plaintext_l) * NUM_VARIABLE_KEY_TESTS);
172 1 memcpy(tmptext_r, plaintext_r, sizeof(*plaintext_r) * NUM_VARIABLE_KEY_TESTS);
173
174
2/2
✓ Branch 0 taken 34 times.
✓ Branch 1 taken 1 times.
35 for (i = 0; i < NUM_VARIABLE_KEY_TESTS; i++) {
175 34 av_blowfish_init(ctx, variable_key[i], 8);
176
177 34 av_blowfish_crypt_ecb(ctx, &tmptext_l[i], &tmptext_r[i], 0);
178
2/4
✓ Branch 0 taken 34 times.
✗ Branch 1 not taken.
✗ Branch 2 not taken.
✓ Branch 3 taken 34 times.
34 if (tmptext_l[i] != ciphertext_l[i] || tmptext_r[i] != ciphertext_r[i]) {
179 printf("Test encryption failed.\n");
180 return 2;
181 }
182
183 34 av_blowfish_crypt_ecb(ctx, &tmptext_l[i], &tmptext_r[i], 1);
184
2/4
✓ Branch 0 taken 34 times.
✗ Branch 1 not taken.
✗ Branch 2 not taken.
✓ Branch 3 taken 34 times.
34 if (tmptext_l[i] != plaintext_l[i] || tmptext_r[i] != plaintext_r[i]) {
185 printf("Test decryption failed.\n");
186 return 3;
187 }
188 }
189 1 printf("Test encryption/decryption success.\n");
190 1 av_free(ctx);
191
192 1 return 0;
193 }
194
195