345 lines
11 KiB
Text
345 lines
11 KiB
Text
/* BEGIN_HEADER */
|
|
#include <polarssl/md.h>
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
* depends_on:POLARSSL_MD_C
|
|
* END_DEPENDENCIES
|
|
*/
|
|
|
|
/* BEGIN_CASE */
|
|
void md_process( )
|
|
{
|
|
const int *md_type_ptr;
|
|
const md_info_t *info;
|
|
md_context_t ctx;
|
|
unsigned char buf[150];
|
|
|
|
memset( &ctx, 0, sizeof ctx );
|
|
|
|
/*
|
|
* Very minimal testing of md_process, just make sure the various
|
|
* xxx_process_wrap() function pointers are valid. (Testing that they
|
|
* indeed do the right thing whould require messing with the internal
|
|
* state of the underlying md/sha context.)
|
|
*
|
|
* Also tests that md_list() only returns valid MDs.
|
|
*/
|
|
for( md_type_ptr = md_list(); *md_type_ptr != 0; md_type_ptr++ )
|
|
{
|
|
info = md_info_from_type( *md_type_ptr );
|
|
TEST_ASSERT( info != NULL );
|
|
TEST_ASSERT( md_init_ctx( &ctx, info ) == 0 );
|
|
TEST_ASSERT( md_process( &ctx, buf ) == 0 );
|
|
TEST_ASSERT( md_free_ctx( &ctx ) == 0 );
|
|
}
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_null_args( )
|
|
{
|
|
md_context_t ctx;
|
|
const md_info_t *info = md_info_from_type( *( md_list() ) );
|
|
unsigned char buf[1] = { 0 };
|
|
|
|
memset( &ctx, 0, sizeof( md_context_t ) );
|
|
|
|
TEST_ASSERT( md_get_size( NULL ) == 0 );
|
|
|
|
TEST_ASSERT( md_get_type( NULL ) == POLARSSL_MD_NONE );
|
|
|
|
TEST_ASSERT( md_info_from_string( NULL ) == NULL );
|
|
|
|
TEST_ASSERT( md_init_ctx( &ctx, NULL ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_init_ctx( NULL, info ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_starts( NULL ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_starts( &ctx ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_update( NULL, buf, 1 ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_update( &ctx, buf, 1 ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_finish( NULL, buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_finish( &ctx, buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md( NULL, buf, 1, buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_file( NULL, "", buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_hmac_starts( NULL, buf, 1 )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_hmac_starts( &ctx, buf, 1 )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_hmac_update( NULL, buf, 1 )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_hmac_update( &ctx, buf, 1 )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_hmac_finish( NULL, buf )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_hmac_finish( &ctx, buf )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_hmac_reset( NULL ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_hmac_reset( &ctx ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_hmac( NULL, buf, 1, buf, 1, buf )
|
|
== POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
|
|
TEST_ASSERT( md_process( NULL, buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
TEST_ASSERT( md_process( &ctx, buf ) == POLARSSL_ERR_MD_BAD_INPUT_DATA );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_info( int md_type, char *md_name, int md_size )
|
|
{
|
|
const md_info_t *md_info;
|
|
const int *md_type_ptr;
|
|
int found;
|
|
|
|
md_info = md_info_from_type( md_type );
|
|
TEST_ASSERT( md_info != NULL );
|
|
TEST_ASSERT( md_info == md_info_from_string( md_name ) );
|
|
|
|
TEST_ASSERT( md_get_type( md_info ) == (md_type_t) md_type );
|
|
TEST_ASSERT( md_get_size( md_info ) == (unsigned char) md_size );
|
|
|
|
found = 0;
|
|
for( md_type_ptr = md_list(); *md_type_ptr != 0; md_type_ptr++ )
|
|
if( *md_type_ptr == md_type )
|
|
found = 1;
|
|
TEST_ASSERT( found == 1 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_text( char *text_md_name, char *text_src_string, char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[1000];
|
|
unsigned char hash_str[1000];
|
|
unsigned char output[100];
|
|
const md_info_t *md_info = NULL;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 1000);
|
|
memset(hash_str, 0x00, 1000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string(md_name);
|
|
TEST_ASSERT( md_info != NULL );
|
|
|
|
TEST_ASSERT ( 0 == md( md_info, src_str, strlen( (char *) src_str ), output ) );
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_hex( char *text_md_name, char *hex_src_string, char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[10000];
|
|
unsigned char hash_str[10000];
|
|
unsigned char output[100];
|
|
int src_len;
|
|
const md_info_t *md_info = NULL;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 10000);
|
|
memset(hash_str, 0x00, 10000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string(md_name);
|
|
TEST_ASSERT( md_info != NULL );
|
|
|
|
src_len = unhexify( src_str, hex_src_string );
|
|
TEST_ASSERT ( 0 == md( md_info, src_str, src_len, output ) );
|
|
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_text_multi( char *text_md_name, char *text_src_string,
|
|
char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[1000];
|
|
unsigned char hash_str[1000];
|
|
unsigned char output[100];
|
|
|
|
const md_info_t *md_info = NULL;
|
|
md_context_t ctx = MD_CONTEXT_T_INIT;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 1000);
|
|
memset(hash_str, 0x00, 1000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string(md_name);
|
|
TEST_ASSERT( md_info != NULL );
|
|
TEST_ASSERT ( 0 == md_init_ctx( &ctx, md_info ) );
|
|
|
|
TEST_ASSERT ( 0 == md_starts( &ctx ) );
|
|
TEST_ASSERT ( ctx.md_ctx != NULL );
|
|
TEST_ASSERT ( 0 == md_update( &ctx, src_str, strlen( (char *) src_str ) ) );
|
|
TEST_ASSERT ( 0 == md_finish( &ctx, output ) );
|
|
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
|
|
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_hex_multi( char *text_md_name, char *hex_src_string,
|
|
char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[10000];
|
|
unsigned char hash_str[10000];
|
|
unsigned char output[100];
|
|
int src_len;
|
|
const md_info_t *md_info = NULL;
|
|
md_context_t ctx = MD_CONTEXT_T_INIT;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 10000);
|
|
memset(hash_str, 0x00, 10000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string(md_name);
|
|
TEST_ASSERT( md_info != NULL );
|
|
TEST_ASSERT ( 0 == md_init_ctx( &ctx, md_info ) );
|
|
|
|
src_len = unhexify( src_str, hex_src_string );
|
|
|
|
TEST_ASSERT ( 0 == md_starts( &ctx ) );
|
|
TEST_ASSERT ( ctx.md_ctx != NULL );
|
|
TEST_ASSERT ( 0 == md_update( &ctx, src_str, src_len ) );
|
|
TEST_ASSERT ( 0 == md_finish( &ctx, output ) );
|
|
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
|
|
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_hmac( char *text_md_name, int trunc_size, char *hex_key_string,
|
|
char *hex_src_string, char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[10000];
|
|
unsigned char key_str[10000];
|
|
unsigned char hash_str[10000];
|
|
unsigned char output[100];
|
|
int key_len, src_len;
|
|
const md_info_t *md_info = NULL;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 10000);
|
|
memset(key_str, 0x00, 10000);
|
|
memset(hash_str, 0x00, 10000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string( md_name );
|
|
TEST_ASSERT( md_info != NULL );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
src_len = unhexify( src_str, hex_src_string );
|
|
|
|
TEST_ASSERT ( md_hmac( md_info, key_str, key_len, src_str, src_len, output ) == 0 );
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void md_hmac_multi( char *text_md_name, int trunc_size, char *hex_key_string,
|
|
char *hex_src_string, char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char src_str[10000];
|
|
unsigned char key_str[10000];
|
|
unsigned char hash_str[10000];
|
|
unsigned char output[100];
|
|
int key_len, src_len;
|
|
const md_info_t *md_info = NULL;
|
|
md_context_t ctx = MD_CONTEXT_T_INIT;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(src_str, 0x00, 10000);
|
|
memset(key_str, 0x00, 10000);
|
|
memset(hash_str, 0x00, 10000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string( md_name );
|
|
TEST_ASSERT( md_info != NULL );
|
|
TEST_ASSERT ( 0 == md_init_ctx( &ctx, md_info ) );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
src_len = unhexify( src_str, hex_src_string );
|
|
|
|
TEST_ASSERT ( 0 == md_hmac_starts( &ctx, key_str, key_len ) );
|
|
TEST_ASSERT ( ctx.md_ctx != NULL );
|
|
TEST_ASSERT ( 0 == md_hmac_update( &ctx, src_str, src_len ) );
|
|
TEST_ASSERT ( 0 == md_hmac_finish( &ctx, output ) );
|
|
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
|
|
|
|
/* Test again, for reset() */
|
|
memset(hash_str, 0x00, 10000);
|
|
memset(output, 0x00, 100);
|
|
|
|
TEST_ASSERT ( 0 == md_hmac_reset( &ctx ) );
|
|
TEST_ASSERT ( 0 == md_hmac_update( &ctx, src_str, src_len ) );
|
|
TEST_ASSERT ( 0 == md_hmac_finish( &ctx, output ) );
|
|
TEST_ASSERT ( 0 == md_free_ctx( &ctx ) );
|
|
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:POLARSSL_FS_IO */
|
|
void md_file( char *text_md_name, char *filename, char *hex_hash_string )
|
|
{
|
|
char md_name[100];
|
|
unsigned char hash_str[1000];
|
|
unsigned char output[100];
|
|
const md_info_t *md_info = NULL;
|
|
|
|
memset(md_name, 0x00, 100);
|
|
memset(hash_str, 0x00, 1000);
|
|
memset(output, 0x00, 100);
|
|
|
|
strncpy( (char *) md_name, text_md_name, sizeof(md_name) - 1 );
|
|
md_info = md_info_from_string( md_name );
|
|
TEST_ASSERT( md_info != NULL );
|
|
|
|
md_file( md_info, filename, output);
|
|
hexify( hash_str, output, md_get_size(md_info) );
|
|
|
|
TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
|
|
}
|
|
/* END_CASE */
|