Mercurial > hg > octave-nkf > gnulib-hg
view tests/test-arctwo.c @ 12454:f7624052e60d
fcntl: support F_DUPFD_CLOEXEC on systems with fcntl
Implement F_DUPFD_CLOEXEC. The unit test still fails on systems
with other fcntl bugs (such as cygwin 1.5 mishandling F_DUPFD,
or mingw lacking fcntl altogether). Passes on Linux, both with
and without kernel support, and on cygwin 1.7.
* modules/fcntl (Files): List new files.
(configure.ac): Run a test.
* m4/fcntl.m4 (gl_FUNC_FCNTL): New file.
* lib/fcntl.c (rpl_fcntl): Likewise.
* m4/fcntl_h.m4 (gl_FCNTL_H_DEFAULTS): Add witness defaults.
(gl_FCNTL_H): Always replace fcntl.h.
* modules/fcntl-h (Makefile.am): Substitute witnesses.
* lib/fcntl.in.h (fcntl): Declare replacement.
(F_DUPFD_CLOEXEC, GNULIB_defined_F_DUPFD_CLOEXEC): New macro when
needed, plus a witness.
* doc/posix-functions/fcntl.texi (fcntl): Document this.
* doc/posix-headers/fcntl.texi (fcntl.h): Likewise.
* tests/test-fcntl.c: New file.
* modules/fcntl-tests: Likewise.
Signed-off-by: Eric Blake <ebb9@byu.net>
author | Eric Blake <ebb9@byu.net> |
---|---|
date | Mon, 07 Dec 2009 11:50:59 -0700 |
parents | e8d2c6fc33ad |
children | 442a82a053da |
line wrap: on
line source
/* * Copyright (C) 2005 Free Software Foundation * Written by Simon Josefsson * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see <http://www.gnu.org/licenses/>. */ #include <config.h> #include <stdio.h> #include <string.h> #include "arctwo.h" int main (int argc, char *argv[]) { arctwo_context ctx; char scratch[16]; /* Test vectors from Peter Gutmann's paper. */ static char key_1[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char plaintext_1[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static const char ciphertext_1[] = { 0x1C, 0x19, 0x8A, 0x83, 0x8D, 0xF0, 0x28, 0xB7 }; static char key_2[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F }; static char plaintext_2[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char ciphertext_2[] = { 0x50, 0xDC, 0x01, 0x62, 0xBD, 0x75, 0x7F, 0x31 }; /* This one was checked against libmcrypt's RFC2268. */ static char key_3[] = { 0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char plaintext_3[] = { 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char ciphertext_3[] = { 0x8f, 0xd1, 0x03, 0x89, 0x33, 0x6b, 0xf9, 0x5e }; /* From RFC2268. */ static char key_4[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char plaintext_4[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char ciphertext_4[] = { 0xeb, 0xb7, 0x73, 0xf9, 0x93, 0x27, 0x8e, 0xff }; static char key_5[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static char plaintext_5[] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static char ciphertext_5[] = { 0x27, 0x8b, 0x27, 0xe4, 0x2e, 0x2f, 0x0d, 0x49 }; static char key_6[] = { 0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static char plaintext_6[] = { 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; static char ciphertext_6[] = { 0x30, 0x64, 0x9e, 0xdf, 0x9b, 0xe7, 0xd2, 0xc2 }; /* First test. */ arctwo_setkey_ekb (&ctx, sizeof (key_1), key_1, 0); arctwo_encrypt (&ctx, plaintext_1, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_1, sizeof (ciphertext_1))) return 1; arctwo_setkey_ekb (&ctx, sizeof (key_1), key_1, 0); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_1, sizeof (plaintext_1))) return 1; /* Second test. */ arctwo_setkey_ekb (&ctx, sizeof (key_2), key_2, 0); arctwo_encrypt (&ctx, plaintext_2, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_2, sizeof (ciphertext_2))) return 1; arctwo_setkey_ekb (&ctx, sizeof (key_2), key_2, 0); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_2, sizeof (plaintext_2))) return 1; /* Third test. */ arctwo_setkey_ekb (&ctx, sizeof (key_3), key_3, 0); arctwo_encrypt (&ctx, plaintext_3, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_3, sizeof (ciphertext_3))) return 1; arctwo_setkey_ekb (&ctx, sizeof (key_3), key_3, 0); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_3, sizeof (plaintext_3))) return 1; /* Fourth test. */ arctwo_setkey_ekb (&ctx, sizeof (key_4), key_4, 63); arctwo_encrypt (&ctx, plaintext_4, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_4, sizeof (ciphertext_4))) { size_t i; printf ("expected:\n"); for (i = 0; i < sizeof (ciphertext_4); i++) printf ("%02x ", ciphertext_4[i] & 0xFF); printf ("\ncomputed:\n"); for (i = 0; i < sizeof (ciphertext_4); i++) printf ("%02x ", scratch[i] & 0xFF); printf ("\n"); return 1; } arctwo_setkey_ekb (&ctx, sizeof (key_4), key_4, 63); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_4, sizeof (plaintext_4))) return 1; /* Fifth test. */ arctwo_setkey_ekb (&ctx, sizeof (key_5), key_5, 64); arctwo_encrypt (&ctx, plaintext_5, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_5, sizeof (ciphertext_5))) { size_t i; printf ("expected:\n"); for (i = 0; i < sizeof (ciphertext_5); i++) printf ("%02x ", ciphertext_5[i] & 0xFF); printf ("\ncomputed:\n"); for (i = 0; i < sizeof (ciphertext_5); i++) printf ("%02x ", scratch[i] & 0xFF); printf ("\n"); return 1; } arctwo_setkey_ekb (&ctx, sizeof (key_5), key_5, 64); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_5, sizeof (plaintext_5))) return 1; /* Sixth test. */ arctwo_setkey_ekb (&ctx, 8, key_6, 64); arctwo_encrypt (&ctx, plaintext_6, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, ciphertext_6, sizeof (ciphertext_6))) { size_t i; printf ("expected:\n"); for (i = 0; i < sizeof (ciphertext_6); i++) printf ("%02x ", ciphertext_6[i] & 0xFF); printf ("\ncomputed:\n"); for (i = 0; i < sizeof (ciphertext_6); i++) printf ("%02x ", scratch[i] & 0xFF); printf ("\n"); return 1; } arctwo_setkey_ekb (&ctx, sizeof (key_6), key_6, 64); arctwo_decrypt (&ctx, scratch, scratch, ARCTWO_BLOCK_SIZE); if (memcmp (scratch, plaintext_6, sizeof (plaintext_6))) return 1; return 0; }