211 lines
5.8 KiB
C
211 lines
5.8 KiB
C
/**
|
|
* @file hmac_signer_test.c
|
|
*
|
|
* @brief Tests for the hmac_signer_t class.
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
|
* Hochschule fuer Technik Rapperswil
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the
|
|
* Free Software Foundation; either version 2 of the License, or (at your
|
|
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* for more details.
|
|
*/
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include "hmac_signer_test.h"
|
|
|
|
#include <transforms/signers/signer.h>
|
|
#include <utils/allocator.h>
|
|
#include <daemon.h>
|
|
|
|
|
|
/*
|
|
* Described in header.
|
|
*/
|
|
void test_hmac_md5_signer(protected_tester_t *tester)
|
|
{
|
|
/* Test cases from RFC2202
|
|
*
|
|
* test_case = 5
|
|
* key = 0x0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
|
|
* key_len = 16
|
|
* data = "Test With Truncation"
|
|
* data_len = 20
|
|
* digest = 0x56461ef2342edc00f9bab995690efd4c
|
|
* digest-96 0x56461ef2342edc00f9bab995
|
|
*
|
|
* currently only this test 5 gets performed!
|
|
*/
|
|
chunk_t keys[4];
|
|
chunk_t data[4];
|
|
chunk_t signature[4];
|
|
chunk_t reference[4];
|
|
chunk_t wrong_reference[4];
|
|
int i;
|
|
logger_t *logger;
|
|
bool valid;
|
|
|
|
logger = charon->logger_manager->create_logger(charon->logger_manager,TESTER,"HMAC MD5 96");
|
|
|
|
signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_MD5_96);
|
|
tester->assert_true(tester, (signer != NULL), "signer create call check");
|
|
|
|
|
|
/*
|
|
* values for test 5
|
|
*/
|
|
u_int8_t key1[] = {
|
|
0x0c,0x0c,0x0c,0x0c,
|
|
0x0c,0x0c,0x0c,0x0c,
|
|
0x0c,0x0c,0x0c,0x0c,
|
|
0x0c,0x0c,0x0c,0x0c,
|
|
};
|
|
keys[0].ptr = key1;
|
|
keys[0].len = sizeof(key1);
|
|
data[0].ptr = "Test With Truncation";
|
|
data[0].len = 20;
|
|
u_int8_t reference1[] = {
|
|
0x56,0x46,0x1e,0xf2,0x34,0x2e,
|
|
0xdc,0x00,0xf9,0xba,0xb9,0x95
|
|
};
|
|
reference[0].ptr = reference1;
|
|
reference[0].len = sizeof(reference1);
|
|
|
|
u_int8_t wrong_reference1[] = {
|
|
0x56,0x46,0x1e,0xa2,0x34,0x2e,
|
|
0xdc,0x00,0xf9,0xba,0xb9,0x95
|
|
};
|
|
|
|
wrong_reference[0].ptr = wrong_reference1;
|
|
wrong_reference[0].len = sizeof(wrong_reference1);
|
|
|
|
for (i=0; i<1; i++)
|
|
{
|
|
signer->set_key(signer, keys[i]);
|
|
signer->allocate_signature(signer, data[i], &signature[i]);
|
|
tester->assert_true(tester, signature[i].len == 12, "chunk len");
|
|
tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
|
|
logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
|
|
logger->log_chunk(logger,RAW,"signature:",&signature[i]);
|
|
allocator_free(signature[i].ptr);
|
|
valid = signer->verify_signature(signer, data[i],reference[i]);
|
|
tester->assert_true(tester, (valid == TRUE), "Signature valid check");
|
|
|
|
valid = signer->verify_signature(signer, data[i],wrong_reference[i]);
|
|
tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
|
|
}
|
|
|
|
|
|
|
|
signer->destroy(signer);
|
|
charon->logger_manager->destroy_logger(charon->logger_manager,logger);
|
|
}
|
|
|
|
|
|
/*
|
|
* Described in header.
|
|
*/
|
|
void test_hmac_sha1_signer(protected_tester_t *tester)
|
|
{
|
|
/*
|
|
* test_case = 7
|
|
* key = 0xaa repeated 80 times
|
|
* key_len = 80
|
|
* data = "Test Using Larger Than Block-Size Key and Larger
|
|
* Than One Block-Size Data"
|
|
* data_len = 73
|
|
* digest = 0x4c1a03424b55e07fe7f27be1d58bb9324a9a5a04
|
|
* digest-96 = 0x4c1a03424b55e07fe7f27be1
|
|
*/
|
|
|
|
chunk_t keys[4];
|
|
chunk_t data[4];
|
|
chunk_t signature[4];
|
|
chunk_t reference[4];
|
|
chunk_t wrong_reference[4];
|
|
int i;
|
|
logger_t *logger;
|
|
bool valid;
|
|
|
|
logger = charon->logger_manager->create_logger(charon->logger_manager,TESTER,"HMAC SHA1 96");
|
|
|
|
signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_SHA1_96);
|
|
tester->assert_true(tester, (signer != NULL), "signer create call check");
|
|
|
|
|
|
/*
|
|
* values for test 5
|
|
*/
|
|
u_int8_t key1[] = {
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
0xaa,0xaa,0xaa,0xaa,
|
|
};
|
|
keys[0].ptr = key1;
|
|
keys[0].len = sizeof(key1);
|
|
data[0].ptr = "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data";
|
|
data[0].len = 73;
|
|
u_int8_t reference1[] = {
|
|
0xe8,0xe9,0x9d,0x0f,0x45,0x23,
|
|
0x7d,0x78,0x6d,0x6b,0xba,0xa7
|
|
};
|
|
reference[0].ptr = reference1;
|
|
reference[0].len = sizeof(reference1);
|
|
|
|
u_int8_t wrong_reference1[] = {
|
|
0xe8,0xe9,0x9d,0x0f,0x46,0x23,
|
|
0x7d,0x71,0x6d,0x6b,0xba,0xa7
|
|
};
|
|
|
|
wrong_reference[0].ptr = wrong_reference1;
|
|
wrong_reference[0].len = sizeof(wrong_reference1);
|
|
|
|
for (i=0; i<1; i++)
|
|
{
|
|
signer->set_key(signer, keys[i]);
|
|
signer->allocate_signature(signer, data[i], &signature[i]);
|
|
tester->assert_true(tester, signature[i].len == 12, "chunk len");
|
|
tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
|
|
logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
|
|
logger->log_chunk(logger,RAW,"signature:",&signature[i]);
|
|
allocator_free(signature[i].ptr);
|
|
valid = signer->verify_signature(signer, data[i],reference[i]);
|
|
tester->assert_true(tester, (valid == TRUE), "Signature valid check");
|
|
|
|
valid = signer->verify_signature(signer, data[i],wrong_reference[i]);
|
|
tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
|
|
}
|
|
|
|
signer->destroy(signer);
|
|
charon->logger_manager->destroy_logger(charon->logger_manager,logger);
|
|
|
|
}
|