diff options
author | Stefan Metzmacher <metze@samba.org> | 2006-08-11 10:49:38 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 14:15:28 -0500 |
commit | 22cb98b042bd0c506810a67a9da08ea871d4ffa6 (patch) | |
tree | 58a697c6976a5a1f982905f4dd5488c020b345c7 | |
parent | ea197d7758ada6cf61ff161ac13a27a937894aec (diff) | |
download | samba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.tar.gz samba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.tar.bz2 samba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.zip |
r17490: add all test values from rfc 2202
metze
(This used to be commit d3e2e1af80c419ca0008e400b3d8899f2e0d0d83)
-rw-r--r-- | source4/lib/crypto/hmacsha1test.c | 78 |
1 files changed, 66 insertions, 12 deletions
diff --git a/source4/lib/crypto/hmacsha1test.c b/source4/lib/crypto/hmacsha1test.c index 2631fe1659..92a50ed933 100644 --- a/source4/lib/crypto/hmacsha1test.c +++ b/source4/lib/crypto/hmacsha1test.c @@ -1,9 +1,37 @@ +/* + Unix SMB/CIFS implementation. + HMAC SHA-1 tests + Copyright (C) Stefan Metzmacher + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ #include "includes.h" - #include "lib/crypto/crypto.h" struct torture_context; +static DATA_BLOB data_blob_repeat_byte(uint8_t byte, size_t length) +{ + DATA_BLOB b = data_blob(NULL, length); + memset(b.data, byte, length); + return b; +} + +/* + This uses the test values from rfc2202 +*/ BOOL torture_local_crypto_hmacsha1(struct torture_context *torture) { BOOL ret = True; @@ -11,33 +39,59 @@ BOOL torture_local_crypto_hmacsha1(struct torture_context *torture) struct { DATA_BLOB key; DATA_BLOB data; - DATA_BLOB digest; + DATA_BLOB sha1; } testarray[] = { { - .key = strhex_to_data_blob("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"), + .key = data_blob_repeat_byte(0x0b, 20), .data = data_blob_string_const("Hi There"), - .digest = strhex_to_data_blob("b617318655057264e28bc0b6fb378c8ef146be00") + .sha1 = strhex_to_data_blob("b617318655057264e28bc0b6fb378c8ef146be00") + },{ + .key = data_blob_string_const("Jefe"), + .data = data_blob_string_const("what do ya want for nothing?"), + .sha1 = strhex_to_data_blob("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79") + },{ + .key = data_blob_repeat_byte(0xaa, 20), + .data = data_blob_repeat_byte(0xdd, 50), + .sha1 = strhex_to_data_blob("125d7342b9ac11cd91a39af48aa17b4f63f175d3") + },{ + .key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f10111213141516171819"), + .data = data_blob_repeat_byte(0xcd, 50), + .sha1 = strhex_to_data_blob("4c9007f4026250c6bc8414f9bf50c86c2d7235da") + },{ + .key = data_blob_repeat_byte(0x0c, 20), + .data = data_blob_string_const("Test With Truncation"), + .sha1 = strhex_to_data_blob("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04") + /* sha1-96 = 0x4c1a03424b55e07fe7f27be1 */ + },{ + .key = data_blob_repeat_byte(0xaa, 80), + .data = data_blob_string_const("Test Using Larger Than Block-Size Key - Hash Key First"), + .sha1 = strhex_to_data_blob("aa4ae5e15272d00e95705637ce8a3b55ed402112") + },{ + .key = data_blob_repeat_byte(0xaa, 80), + .data = data_blob_string_const("Test Using Larger Than Block-Size Key " + "and Larger Than One Block-Size Data"), + .sha1 = strhex_to_data_blob("e8e99d0f45237d786d6bbaa7965c7808bbff1a91") } }; for (i=0; i < ARRAY_SIZE(testarray); i++) { struct HMACSHA1Context ctx; - uint8_t digest[SHA1HashSize]; + uint8_t sha1[SHA1HashSize]; int e; hmac_sha1_init(testarray[i].key.data, testarray[i].key.length, &ctx); hmac_sha1_update(testarray[i].data.data, testarray[i].data.length, &ctx); - hmac_sha1_final(digest, &ctx); + hmac_sha1_final(sha1, &ctx); - e = memcmp(testarray[i].digest.data, - digest, - MIN(testarray[i].digest.length, SHA1HashSize)); + e = memcmp(testarray[i].sha1.data, + sha1, + MIN(testarray[i].sha1.length, sizeof(sha1))); if (e != 0) { - printf("test[%u]: failed\n", i); + printf("hmacsha1 test[%u]: failed\n", i); dump_data(0, testarray[i].key.data, testarray[i].key.length); dump_data(0, testarray[i].data.data, testarray[i].data.length); - dump_data(0, testarray[i].digest.data, testarray[i].digest.length); - dump_data(0, digest, sizeof(digest)); + dump_data(0, testarray[i].sha1.data, testarray[i].sha1.length); + dump_data(0, sha1, sizeof(sha1)); ret = False; } } |