File: check_plaintext.c

package info (click to toggle)
libzc 0.4.3-1
  • links: PTS
  • area: main
  • in suites: bookworm, bullseye, forky, sid, trixie
  • size: 872 kB
  • sloc: ansic: 7,407; sh: 327; python: 171; makefile: 99
file content (117 lines) | stat: -rw-r--r-- 3,230 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
 *  zc - zip crack library
 *  Copyright (C) 2012-2018 Marc Ferland
 *
 *  This program is free software: you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation, either version 3 of the License, or
 *  (at your option) any later version.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License
 *  along with this program.  If not, see <http://www.gnu.org/licenses/>.
 */

#include <check.h>
#include <stdlib.h>

#include "libzc.h"
#include "test_plaintext.h"

struct zc_ctx *ctx;

void setup_ptext()
{
	zc_new(&ctx);
}

void teardown_ptext()
{
	zc_unref(ctx);
}

START_TEST(test_zc_ptext_new)
{
	struct zc_crk_ptext *ptext;
	fail_unless(zc_crk_ptext_new(ctx, &ptext) == 0, NULL);
	fail_unless(zc_crk_ptext_unref(ptext) == 0, NULL);
}
END_TEST

START_TEST(test_zc_ptext_set_cipher_and_plaintext)
{
	struct zc_crk_ptext *ptext;
	fail_unless(zc_crk_ptext_new(ctx, &ptext) == 0, NULL);
	fail_unless(zc_crk_ptext_set_text(ptext, test_plaintext, test_ciphertext,
					  TEST_PLAINTEXT_SIZE) == 0, NULL);
	fail_unless(zc_crk_ptext_unref(ptext) == 0, NULL);
}
END_TEST

#ifdef EXTRACHECK
START_TEST(test_zc_crk_ptext_attack)
{
	struct zc_crk_ptext *ptext;
	struct zc_key out_key;
	fail_unless(zc_crk_ptext_new(ctx, &ptext) == 0, NULL);
	fail_unless(zc_crk_ptext_set_text(ptext, test_plaintext, test_ciphertext,
					  TEST_PLAINTEXT_SIZE) == 0, NULL);
	fail_unless(zc_crk_ptext_key2_reduction(ptext) == 0, NULL);
	fail_unless(zc_crk_ptext_attack(ptext, &out_key) == 0, NULL);
	fail_unless(out_key.key0 == 0x6b1e4593 &&
		    out_key.key1 == 0xd81e41ed &&
		    out_key.key2 == 0x9a616e02, NULL);
	fail_unless(zc_crk_ptext_unref(ptext) == 0, NULL);
}
END_TEST

START_TEST(test_zc_crk_ptext_find_internal_rep)
{
	struct zc_key out_key = { .key0 = 0x6b1e4593, .key1 = 0xd81e41ed, .key2 = 0x9a616e02 };
	struct zc_key internal_rep;
	fail_unless(zc_crk_ptext_find_internal_rep(&out_key, test_encrypted_header, 12,
						   &internal_rep) == 0, NULL);
	fail_unless(internal_rep.key0 == 0x9ccebdf4 &&
		    internal_rep.key1 == 0x758c65be &&
		    internal_rep.key2 == 0xc661eb70, NULL);
}
END_TEST
#endif

Suite *plaintext_suite()
{
	Suite *s = suite_create("plaintext");

	TCase *tc_core = tcase_create("Core");
	tcase_add_checked_fixture(tc_core, setup_ptext, teardown_ptext);
	tcase_add_test(tc_core, test_zc_ptext_new);
	tcase_add_test(tc_core, test_zc_ptext_set_cipher_and_plaintext);
#ifdef EXTRACHECK
	tcase_add_test(tc_core, test_zc_crk_ptext_attack);
	tcase_add_test(tc_core, test_zc_crk_ptext_find_internal_rep);
	tcase_set_timeout(tc_core, 60 * 60);
#endif
	suite_add_tcase(s, tc_core);

	return s;
}

int main()
{
	int number_failed;
	Suite *s;
	SRunner *sr;

	s = plaintext_suite();
	sr = srunner_create(s);

	srunner_run_all(sr, CK_NORMAL);
	number_failed = srunner_ntests_failed(sr);
	srunner_free(sr);

	return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
}