summaryrefslogtreecommitdiff
path: root/source4/lib/crypto
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2006-08-11 10:49:38 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 14:15:28 -0500
commit22cb98b042bd0c506810a67a9da08ea871d4ffa6 (patch)
tree58a697c6976a5a1f982905f4dd5488c020b345c7 /source4/lib/crypto
parentea197d7758ada6cf61ff161ac13a27a937894aec (diff)
downloadsamba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.tar.gz
samba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.tar.bz2
samba-22cb98b042bd0c506810a67a9da08ea871d4ffa6.zip
r17490: add all test values from rfc 2202
metze (This used to be commit d3e2e1af80c419ca0008e400b3d8899f2e0d0d83)
Diffstat (limited to 'source4/lib/crypto')
-rw-r--r--source4/lib/crypto/hmacsha1test.c78
1 files changed, 66 insertions, 12 deletions
diff --git a/source4/lib/crypto/hmacsha1test.c b/source4/lib/crypto/hmacsha1test.c
index 2631fe1659..92a50ed933 100644
--- a/source4/lib/crypto/hmacsha1test.c
+++ b/source4/lib/crypto/hmacsha1test.c
@@ -1,9 +1,37 @@
+/*
+ Unix SMB/CIFS implementation.
+ HMAC SHA-1 tests
+ Copyright (C) Stefan Metzmacher
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
#include "includes.h"
-
#include "lib/crypto/crypto.h"
struct torture_context;
+static DATA_BLOB data_blob_repeat_byte(uint8_t byte, size_t length)
+{
+ DATA_BLOB b = data_blob(NULL, length);
+ memset(b.data, byte, length);
+ return b;
+}
+
+/*
+ This uses the test values from rfc2202
+*/
BOOL torture_local_crypto_hmacsha1(struct torture_context *torture)
{
BOOL ret = True;
@@ -11,33 +39,59 @@ BOOL torture_local_crypto_hmacsha1(struct torture_context *torture)
struct {
DATA_BLOB key;
DATA_BLOB data;
- DATA_BLOB digest;
+ DATA_BLOB sha1;
} testarray[] = {
{
- .key = strhex_to_data_blob("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b"),
+ .key = data_blob_repeat_byte(0x0b, 20),
.data = data_blob_string_const("Hi There"),
- .digest = strhex_to_data_blob("b617318655057264e28bc0b6fb378c8ef146be00")
+ .sha1 = strhex_to_data_blob("b617318655057264e28bc0b6fb378c8ef146be00")
+ },{
+ .key = data_blob_string_const("Jefe"),
+ .data = data_blob_string_const("what do ya want for nothing?"),
+ .sha1 = strhex_to_data_blob("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79")
+ },{
+ .key = data_blob_repeat_byte(0xaa, 20),
+ .data = data_blob_repeat_byte(0xdd, 50),
+ .sha1 = strhex_to_data_blob("125d7342b9ac11cd91a39af48aa17b4f63f175d3")
+ },{
+ .key = strhex_to_data_blob("0102030405060708090a0b0c0d0e0f10111213141516171819"),
+ .data = data_blob_repeat_byte(0xcd, 50),
+ .sha1 = strhex_to_data_blob("4c9007f4026250c6bc8414f9bf50c86c2d7235da")
+ },{
+ .key = data_blob_repeat_byte(0x0c, 20),
+ .data = data_blob_string_const("Test With Truncation"),
+ .sha1 = strhex_to_data_blob("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04")
+ /* sha1-96 = 0x4c1a03424b55e07fe7f27be1 */
+ },{
+ .key = data_blob_repeat_byte(0xaa, 80),
+ .data = data_blob_string_const("Test Using Larger Than Block-Size Key - Hash Key First"),
+ .sha1 = strhex_to_data_blob("aa4ae5e15272d00e95705637ce8a3b55ed402112")
+ },{
+ .key = data_blob_repeat_byte(0xaa, 80),
+ .data = data_blob_string_const("Test Using Larger Than Block-Size Key "
+ "and Larger Than One Block-Size Data"),
+ .sha1 = strhex_to_data_blob("e8e99d0f45237d786d6bbaa7965c7808bbff1a91")
}
};
for (i=0; i < ARRAY_SIZE(testarray); i++) {
struct HMACSHA1Context ctx;
- uint8_t digest[SHA1HashSize];
+ uint8_t sha1[SHA1HashSize];
int e;
hmac_sha1_init(testarray[i].key.data, testarray[i].key.length, &ctx);
hmac_sha1_update(testarray[i].data.data, testarray[i].data.length, &ctx);
- hmac_sha1_final(digest, &ctx);
+ hmac_sha1_final(sha1, &ctx);
- e = memcmp(testarray[i].digest.data,
- digest,
- MIN(testarray[i].digest.length, SHA1HashSize));
+ e = memcmp(testarray[i].sha1.data,
+ sha1,
+ MIN(testarray[i].sha1.length, sizeof(sha1)));
if (e != 0) {
- printf("test[%u]: failed\n", i);
+ printf("hmacsha1 test[%u]: failed\n", i);
dump_data(0, testarray[i].key.data, testarray[i].key.length);
dump_data(0, testarray[i].data.data, testarray[i].data.length);
- dump_data(0, testarray[i].digest.data, testarray[i].digest.length);
- dump_data(0, digest, sizeof(digest));
+ dump_data(0, testarray[i].sha1.data, testarray[i].sha1.length);
+ dump_data(0, sha1, sizeof(sha1));
ret = False;
}
}