123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264 |
- /*
- * QEMU Crypto hmac algorithms tests
- *
- * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
- *
- * Authors:
- * Longpeng(Mike) <longpeng2@huawei.com>
- *
- * This work is licensed under the terms of the GNU GPL, version 2 or
- * (at your option) any later version. See the COPYING file in the
- * top-level directory.
- *
- */
- #include "qemu/osdep.h"
- #include "crypto/init.h"
- #include "crypto/hmac.h"
- #define INPUT_TEXT1 "ABCDEFGHIJKLMNOPQRSTUVWXY"
- #define INPUT_TEXT2 "Zabcdefghijklmnopqrstuvwx"
- #define INPUT_TEXT3 "yz0123456789"
- #define INPUT_TEXT INPUT_TEXT1 \
- INPUT_TEXT2 \
- INPUT_TEXT3
- #define KEY "monkey monkey monkey monkey"
- typedef struct QCryptoHmacTestData QCryptoHmacTestData;
- struct QCryptoHmacTestData {
- QCryptoHashAlgo alg;
- const char *hex_digest;
- };
- static QCryptoHmacTestData test_data[] = {
- {
- .alg = QCRYPTO_HASH_ALGO_MD5,
- .hex_digest =
- "ede9cb83679ba82d88fbeae865b3f8fc",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_SHA1,
- .hex_digest =
- "c7b5a631e3aac975c4ededfcd346e469"
- "dbc5f2d1",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_SHA224,
- .hex_digest =
- "5f768179dbb29ca722875d0f461a2e2f"
- "597d0210340a84df1a8e9c63",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_SHA256,
- .hex_digest =
- "3798f363c57afa6edaffe39016ca7bad"
- "efd1e670afb0e3987194307dec3197db",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_SHA384,
- .hex_digest =
- "d218680a6032d33dccd9882d6a6a7164"
- "64f26623be257a9b2919b185294f4a49"
- "9e54b190bfd6bc5cedd2cd05c7e65e82",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_SHA512,
- .hex_digest =
- "835a4f5b3750b4c1fccfa88da2f746a4"
- "900160c9f18964309bb736c13b59491b"
- "8e32d37b724cc5aebb0f554c6338a3b5"
- "94c4ba26862b2dadb59b7ede1d08d53e",
- },
- {
- .alg = QCRYPTO_HASH_ALGO_RIPEMD160,
- .hex_digest =
- "94964ed4c1155b62b668c241d67279e5"
- "8a711676",
- },
- #ifdef CONFIG_CRYPTO_SM3
- {
- .alg = QCRYPTO_HASH_ALGO_SM3,
- .hex_digest =
- "760e3799332bc913819b930085360ddb"
- "c05529261313d5b15b75bab4fd7ae91e",
- },
- #endif
- };
- static const char hex[] = "0123456789abcdef";
- static void test_hmac_alloc(void)
- {
- size_t i;
- for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
- QCryptoHmacTestData *data = &test_data[i];
- QCryptoHmac *hmac = NULL;
- uint8_t *result = NULL;
- size_t resultlen = 0;
- const char *exp_output = NULL;
- int ret;
- size_t j;
- if (!qcrypto_hmac_supports(data->alg)) {
- return;
- }
- exp_output = data->hex_digest;
- hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
- strlen(KEY), &error_fatal);
- g_assert(hmac != NULL);
- ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
- strlen(INPUT_TEXT), &result,
- &resultlen, &error_fatal);
- g_assert(ret == 0);
- for (j = 0; j < resultlen; j++) {
- g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
- g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
- }
- qcrypto_hmac_free(hmac);
- g_free(result);
- }
- }
- static void test_hmac_prealloc(void)
- {
- size_t i;
- for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
- QCryptoHmacTestData *data = &test_data[i];
- QCryptoHmac *hmac = NULL;
- uint8_t *result = NULL, *origresult = NULL;
- size_t resultlen = 0;
- const char *exp_output = NULL;
- int ret;
- size_t j;
- if (!qcrypto_hmac_supports(data->alg)) {
- return;
- }
- exp_output = data->hex_digest;
- resultlen = strlen(exp_output) / 2;
- origresult = result = g_new0(uint8_t, resultlen);
- hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
- strlen(KEY), &error_fatal);
- g_assert(hmac != NULL);
- ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
- strlen(INPUT_TEXT), &result,
- &resultlen, &error_fatal);
- g_assert(ret == 0);
- /* Validate that our pre-allocated pointer was not replaced */
- g_assert(result == origresult);
- exp_output = data->hex_digest;
- for (j = 0; j < resultlen; j++) {
- g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
- g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
- }
- qcrypto_hmac_free(hmac);
- g_free(result);
- }
- }
- static void test_hmac_iov(void)
- {
- size_t i;
- for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
- QCryptoHmacTestData *data = &test_data[i];
- QCryptoHmac *hmac = NULL;
- uint8_t *result = NULL;
- size_t resultlen = 0;
- const char *exp_output = NULL;
- int ret;
- size_t j;
- struct iovec iov[3] = {
- { .iov_base = (char *)INPUT_TEXT1, .iov_len = strlen(INPUT_TEXT1) },
- { .iov_base = (char *)INPUT_TEXT2, .iov_len = strlen(INPUT_TEXT2) },
- { .iov_base = (char *)INPUT_TEXT3, .iov_len = strlen(INPUT_TEXT3) },
- };
- if (!qcrypto_hmac_supports(data->alg)) {
- return;
- }
- exp_output = data->hex_digest;
- hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
- strlen(KEY), &error_fatal);
- g_assert(hmac != NULL);
- ret = qcrypto_hmac_bytesv(hmac, iov, 3, &result,
- &resultlen, &error_fatal);
- g_assert(ret == 0);
- for (j = 0; j < resultlen; j++) {
- g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
- g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
- }
- qcrypto_hmac_free(hmac);
- g_free(result);
- }
- }
- static void test_hmac_digest(void)
- {
- size_t i;
- for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
- QCryptoHmacTestData *data = &test_data[i];
- QCryptoHmac *hmac = NULL;
- uint8_t *result = NULL;
- const char *exp_output = NULL;
- int ret;
- if (!qcrypto_hmac_supports(data->alg)) {
- return;
- }
- exp_output = data->hex_digest;
- hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
- strlen(KEY), &error_fatal);
- g_assert(hmac != NULL);
- ret = qcrypto_hmac_digest(hmac, (const char *)INPUT_TEXT,
- strlen(INPUT_TEXT), (char **)&result,
- &error_fatal);
- g_assert(ret == 0);
- g_assert_cmpstr((const char *)result, ==, exp_output);
- qcrypto_hmac_free(hmac);
- g_free(result);
- }
- }
- int main(int argc, char **argv)
- {
- g_test_init(&argc, &argv, NULL);
- g_assert(qcrypto_init(NULL) == 0);
- g_test_add_func("/crypto/hmac/iov", test_hmac_iov);
- g_test_add_func("/crypto/hmac/alloc", test_hmac_alloc);
- g_test_add_func("/crypto/hmac/prealloc", test_hmac_prealloc);
- g_test_add_func("/crypto/hmac/digest", test_hmac_digest);
- return g_test_run();
- }
|