/* testblow.c */

/******************************* LICENSE ***********************************
 * Copyright (C) 2000-19 David Ireland, DI Management Services Pty Limited.
 * All rights reserved. <www.di-mgt.com.au> <www.cryptosys.net>
 * The code in this module is licensed under the terms of the MIT license.  
 * For a copy, see <http://opensource.org/licenses/MIT>
****************************************************************************
*/
/*
'*****************************************************************
Correction 29 July 2003: 
Changed sWord[5] to sWord[9] in readDataLine().
Thanks to Mehul Motani for pointing out the error.
*****************************************************************
[2019-12-12] Changed license to MIT.
*/

#include <stdio.h>
#include "blowfish.h"

void outputWord(UWORD32 w);
void outputBytes(UBYTE08 b[], int n);
void readDataLine(char *dataline, UBYTE08 key[], 
	UWORD32 *xL, UWORD32 *xR, char cc[]);

/* Test suite by Eric Young */
/*   key bytes               clear bytes             cipher bytes */
char *datalines[] = 
{
	"0000000000000000        0000000000000000        4EF997456198DD78",
	"FFFFFFFFFFFFFFFF        FFFFFFFFFFFFFFFF        51866FD5B85ECB8A",
	"3000000000000000        1000000000000001        7D856F9A613063F2",
	"1111111111111111        1111111111111111        2466DD878B963C9D",
	"0123456789ABCDEF        1111111111111111        61F9C3802281B096",
	"1111111111111111        0123456789ABCDEF        7D0CC630AFDA1EC7",
	"0000000000000000        0000000000000000        4EF997456198DD78",
	"FEDCBA9876543210        0123456789ABCDEF        0ACEAB0FC6A0A28D",
	"7CA110454A1A6E57        01A1D6D039776742        59C68245EB05282B",
	"0131D9619DC1376E        5CD54CA83DEF57DA        B1B8CC0B250F09A0",
	"07A1133E4A0B2686        0248D43806F67172        1730E5778BEA1DA4",
	"3849674C2602319E        51454B582DDF440A        A25E7856CF2651EB",
	"04B915BA43FEB5B6        42FD443059577FA2        353882B109CE8F1A",
	"0113B970FD34F2CE        059B5E0851CF143A        48F4D0884C379918",
	"0170F175468FB5E6        0756D8E0774761D2        432193B78951FC98",
	"43297FAD38E373FE        762514B829BF486A        13F04154D69D1AE5",
	"07A7137045DA2A16        3BDD119049372802        2EEDDA93FFD39C79",
	"04689104C2FD3B2F        26955F6835AF609A        D887E0393C2DA6E3",
	"37D06BB516CB7546        164D5E404F275232        5F99D04F5B163969",
	"1F08260D1AC2465E        6B056E18759F5CCA        4A057A3B24D3977B",
	"584023641ABA6176        004BD6EF09176062        452031C1E4FADA8E",
	"025816164629B007        480D39006EE762F2        7555AE39F59B87BD",
	"49793EBC79B3258F        437540C8698F3CFA        53C55F9CB49FC019",
	"4FB05E1515AB73A7        072D43A077075292        7A8E7BFA937E89A3",
	"49E95D6D4CA229BF        02FE55778117F12A        CF9C5D7A4986ADB5",
	"018310DC409B26D6        1D9D5C5018F728C2        D1ABB290658BC778",
	"1C587F1C13924FEF        305532286D6F295A        55CB3774D13EF201",
	"0101010101010101        0123456789ABCDEF        FA34EC4847B268B2",
	"1F1F1F1F0E0E0E0E        0123456789ABCDEF        A790795108EA3CAE",
	"E0FEE0FEF1FEF1FE        0123456789ABCDEF        C39E072D9FAC631D",
	"0000000000000000        FFFFFFFFFFFFFFFF        014933E0CDAFF6E4",
	"FFFFFFFFFFFFFFFF        0000000000000000        F21E9A77B71C49BC",
	"0123456789ABCDEF        0000000000000000        245946885754369A",
	"FEDCBA9876543210        FFFFFFFFFFFFFFFF        6B5C5A9C5D9E0A5A",
	"\0"
};

/* key bytes and input data - overwritten by readDataLine */
UBYTE08 key[8] =
{
	0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10
};

UWORD32 data[2] =
{
	0x01234567, 0x89ABCDEF
};

char correctCipher[17] = "0ACEAB0FC6A0A28D";

void main(void)
{
	blf_ctx c;

	int i;
	
	for (i = 0; *datalines[i] != '\0'; i++)
	{

		readDataLine(datalines[i], key, &data[0], &data[1], correctCipher);

		printf("Key={");
		outputBytes(key, 8);
		printf("}\t");

		printf("BF("); outputWord(data[0]); outputWord(data[1]); 
		printf(")=");

		blf_key(&c, key, 8);
		blf_enc(&c, data, 1);

		outputWord(data[0]); 
		outputWord(data[1]);
		printf("\n");

		/* now decipher it */

		blf_dec(&c, data, 1);
		printf("                     check=");
		outputWord(data[0]); 
		outputWord(data[1]);
		printf("  %s", correctCipher);
		printf("\n");

	}

}

void outputWord(UWORD32 w)
/* prints 32 bit word in hex */
{
	printf("%08x", w);
}

void outputBytes(UBYTE08 b[], int n)
/* prints n x 8-bit bytes in hex */
{
	int i;
	for (i = 0; i < n; i++)
		printf("%02x", b[i]);
}

void readDataLine(char *dataline, UBYTE08 key[], 
	UWORD32 *xL, UWORD32 *xR, char ccStr[])
{
	UWORD32 w;
	UBYTE08 b;
	char keyStr[32], clearStr[32];
	char sWord[9];
	int i, j;

	sscanf(dataline, "%s %s %s", keyStr, clearStr, ccStr);

	/* Get first 8 digits of input = 32-bit word */
	for (i = 0; i < 8; i++)
		sWord[i] = clearStr[i];
	sWord[i] = '\0';
	sscanf(sWord, "%08x", &w);
	*xL = w;

	/* Get next 8 digits = 32-bit word */
	for (i = 0; i < 8; i++)
		sWord[i] = clearStr[i+8];
	sWord[i] = '\0';
	sscanf(sWord, "%08x", &w);
	*xR = w;

	/* Split key string into 8 octets */
	for (j = 0; j < 8; j++)
	{
		for (i = 0; i < 2; i++)
			sWord[i] = keyStr[i+j*2];
		sWord[i] = '\0';
		sscanf(sWord, "%02x", &b);
		key[j] = b;
	}

}