qemu/tests/unit/test-crypto-hmac.c
<<
>>
Prefs
   1/*
   2 * QEMU Crypto hmac algorithms tests
   3 *
   4 * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
   5 *
   6 * Authors:
   7 *    Longpeng(Mike) <longpeng2@huawei.com>
   8 *
   9 * This work is licensed under the terms of the GNU GPL, version 2 or
  10 * (at your option) any later version.  See the COPYING file in the
  11 * top-level directory.
  12 *
  13 */
  14
  15#include "qemu/osdep.h"
  16#include "crypto/init.h"
  17#include "crypto/hmac.h"
  18
  19#define INPUT_TEXT1 "ABCDEFGHIJKLMNOPQRSTUVWXY"
  20#define INPUT_TEXT2 "Zabcdefghijklmnopqrstuvwx"
  21#define INPUT_TEXT3 "yz0123456789"
  22#define INPUT_TEXT INPUT_TEXT1 \
  23              INPUT_TEXT2 \
  24              INPUT_TEXT3
  25
  26#define KEY "monkey monkey monkey monkey"
  27
  28typedef struct QCryptoHmacTestData QCryptoHmacTestData;
  29struct QCryptoHmacTestData {
  30    QCryptoHashAlgorithm alg;
  31    const char *hex_digest;
  32};
  33
  34static QCryptoHmacTestData test_data[] = {
  35    {
  36        .alg = QCRYPTO_HASH_ALG_MD5,
  37        .hex_digest =
  38            "ede9cb83679ba82d88fbeae865b3f8fc",
  39    },
  40    {
  41        .alg = QCRYPTO_HASH_ALG_SHA1,
  42        .hex_digest =
  43            "c7b5a631e3aac975c4ededfcd346e469"
  44            "dbc5f2d1",
  45    },
  46    {
  47        .alg = QCRYPTO_HASH_ALG_SHA224,
  48        .hex_digest =
  49            "5f768179dbb29ca722875d0f461a2e2f"
  50            "597d0210340a84df1a8e9c63",
  51    },
  52    {
  53        .alg = QCRYPTO_HASH_ALG_SHA256,
  54        .hex_digest =
  55            "3798f363c57afa6edaffe39016ca7bad"
  56            "efd1e670afb0e3987194307dec3197db",
  57    },
  58    {
  59        .alg = QCRYPTO_HASH_ALG_SHA384,
  60        .hex_digest =
  61            "d218680a6032d33dccd9882d6a6a7164"
  62            "64f26623be257a9b2919b185294f4a49"
  63            "9e54b190bfd6bc5cedd2cd05c7e65e82",
  64    },
  65    {
  66        .alg = QCRYPTO_HASH_ALG_SHA512,
  67        .hex_digest =
  68            "835a4f5b3750b4c1fccfa88da2f746a4"
  69            "900160c9f18964309bb736c13b59491b"
  70            "8e32d37b724cc5aebb0f554c6338a3b5"
  71            "94c4ba26862b2dadb59b7ede1d08d53e",
  72    },
  73    {
  74        .alg = QCRYPTO_HASH_ALG_RIPEMD160,
  75        .hex_digest =
  76            "94964ed4c1155b62b668c241d67279e5"
  77            "8a711676",
  78    },
  79};
  80
  81static const char hex[] = "0123456789abcdef";
  82
  83static void test_hmac_alloc(void)
  84{
  85    size_t i;
  86
  87    for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
  88        QCryptoHmacTestData *data = &test_data[i];
  89        QCryptoHmac *hmac = NULL;
  90        uint8_t *result = NULL;
  91        size_t resultlen = 0;
  92        const char *exp_output = NULL;
  93        int ret;
  94        size_t j;
  95
  96        if (!qcrypto_hmac_supports(data->alg)) {
  97            return;
  98        }
  99
 100        exp_output = data->hex_digest;
 101
 102        hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
 103                                strlen(KEY), &error_fatal);
 104        g_assert(hmac != NULL);
 105
 106        ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
 107                                 strlen(INPUT_TEXT), &result,
 108                                 &resultlen, &error_fatal);
 109        g_assert(ret == 0);
 110
 111        for (j = 0; j < resultlen; j++) {
 112            g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
 113            g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
 114        }
 115
 116        qcrypto_hmac_free(hmac);
 117
 118        g_free(result);
 119    }
 120}
 121
 122static void test_hmac_prealloc(void)
 123{
 124    size_t i;
 125
 126    for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
 127        QCryptoHmacTestData *data = &test_data[i];
 128        QCryptoHmac *hmac = NULL;
 129        uint8_t *result = NULL;
 130        size_t resultlen = 0;
 131        const char *exp_output = NULL;
 132        int ret;
 133        size_t j;
 134
 135        if (!qcrypto_hmac_supports(data->alg)) {
 136            return;
 137        }
 138
 139        exp_output = data->hex_digest;
 140
 141        resultlen = strlen(exp_output) / 2;
 142        result = g_new0(uint8_t, resultlen);
 143
 144        hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
 145                                strlen(KEY), &error_fatal);
 146        g_assert(hmac != NULL);
 147
 148        ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
 149                                 strlen(INPUT_TEXT), &result,
 150                                 &resultlen, &error_fatal);
 151        g_assert(ret == 0);
 152
 153        exp_output = data->hex_digest;
 154        for (j = 0; j < resultlen; j++) {
 155            g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
 156            g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
 157        }
 158
 159        qcrypto_hmac_free(hmac);
 160
 161        g_free(result);
 162    }
 163}
 164
 165static void test_hmac_iov(void)
 166{
 167    size_t i;
 168
 169    for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
 170        QCryptoHmacTestData *data = &test_data[i];
 171        QCryptoHmac *hmac = NULL;
 172        uint8_t *result = NULL;
 173        size_t resultlen = 0;
 174        const char *exp_output = NULL;
 175        int ret;
 176        size_t j;
 177        struct iovec iov[3] = {
 178            { .iov_base = (char *)INPUT_TEXT1, .iov_len = strlen(INPUT_TEXT1) },
 179            { .iov_base = (char *)INPUT_TEXT2, .iov_len = strlen(INPUT_TEXT2) },
 180            { .iov_base = (char *)INPUT_TEXT3, .iov_len = strlen(INPUT_TEXT3) },
 181        };
 182
 183        if (!qcrypto_hmac_supports(data->alg)) {
 184            return;
 185        }
 186
 187        exp_output = data->hex_digest;
 188
 189        hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
 190                                strlen(KEY), &error_fatal);
 191        g_assert(hmac != NULL);
 192
 193        ret = qcrypto_hmac_bytesv(hmac, iov, 3, &result,
 194                                  &resultlen, &error_fatal);
 195        g_assert(ret == 0);
 196
 197        for (j = 0; j < resultlen; j++) {
 198            g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
 199            g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
 200        }
 201
 202        qcrypto_hmac_free(hmac);
 203
 204        g_free(result);
 205    }
 206}
 207
 208static void test_hmac_digest(void)
 209{
 210    size_t i;
 211
 212    for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
 213        QCryptoHmacTestData *data = &test_data[i];
 214        QCryptoHmac *hmac = NULL;
 215        uint8_t *result = NULL;
 216        const char *exp_output = NULL;
 217        int ret;
 218
 219        if (!qcrypto_hmac_supports(data->alg)) {
 220            return;
 221        }
 222
 223        exp_output = data->hex_digest;
 224
 225        hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
 226                                strlen(KEY), &error_fatal);
 227        g_assert(hmac != NULL);
 228
 229        ret = qcrypto_hmac_digest(hmac, (const char *)INPUT_TEXT,
 230                                  strlen(INPUT_TEXT), (char **)&result,
 231                                  &error_fatal);
 232        g_assert(ret == 0);
 233
 234        g_assert_cmpstr((const char *)result, ==, exp_output);
 235
 236        qcrypto_hmac_free(hmac);
 237
 238        g_free(result);
 239    }
 240}
 241
 242int main(int argc, char **argv)
 243{
 244    g_test_init(&argc, &argv, NULL);
 245
 246    g_assert(qcrypto_init(NULL) == 0);
 247
 248    g_test_add_func("/crypto/hmac/iov", test_hmac_iov);
 249    g_test_add_func("/crypto/hmac/alloc", test_hmac_alloc);
 250    g_test_add_func("/crypto/hmac/prealloc", test_hmac_prealloc);
 251    g_test_add_func("/crypto/hmac/digest", test_hmac_digest);
 252
 253    return g_test_run();
 254}
 255