Mercurial > pidgin
view libpurple/tests/test_cipher.c @ 22238:4cc1dfbc499b
Get rid of yahoo_privacy_check and use purple_privacy_check directly.
I think the former function may have done stuff in days of yore, but
now it's purpose is only to call purple_privacy_check then print a
debug message with the result. The debug message doesn't seem overly
useful to me... does anyone think it's important? If so, why? And
if we really want that debug message, could we just add it to
purple_privacy_check()?
author | Mark Doliner <mark@kingant.net> |
---|---|
date | Thu, 31 Jan 2008 22:58:11 +0000 |
parents | f786e478e08b |
children | fae699fece1f |
line wrap: on
line source
#include <glib.h> #include <check.h> #include <stdlib.h> #include <string.h> #undef HAVE_DBUS #include "tests.h" #include "../cipher.h" /****************************************************************************** * MD4 Tests *****************************************************************************/ #define MD4_TEST(data, digest) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ gchar cdigest[33]; \ gboolean ret = FALSE; \ \ cipher = purple_ciphers_find_cipher("md4"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_append(context, (guchar *)(data), strlen((data))); \ \ ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ NULL); \ \ fail_unless(ret == TRUE, NULL); \ \ fail_unless(strcmp((digest), cdigest) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } START_TEST(test_md4_empty_string) { MD4_TEST("", "31d6cfe0d16ae931b73c59d7e0c089c0"); } END_TEST START_TEST(test_md4_a) { MD4_TEST("a", "bde52cb31de33e46245e05fbdbd6fb24"); } END_TEST START_TEST(test_md4_abc) { MD4_TEST("abc", "a448017aaf21d8525fc10ae87aa6729d"); } END_TEST START_TEST(test_md4_message_digest) { MD4_TEST("message digest", "d9130a8164549fe818874806e1c7014b"); } END_TEST START_TEST(test_md4_a_to_z) { MD4_TEST("abcdefghijklmnopqrstuvwxyz", "d79e1c308aa5bbcdeea8ed63df412da9"); } END_TEST START_TEST(test_md4_A_to_Z_a_to_z_0_to_9) { MD4_TEST("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "043f8582f241db351ce627e153e7f0e4"); } END_TEST START_TEST(test_md4_1_to_0_8_times) { MD4_TEST("123456789012345678901234567890123456789012345678901234567890" "12345678901234567890", "e33b4ddc9c38f2199c3e7b164fcc0536"); } END_TEST /****************************************************************************** * MD5 Tests *****************************************************************************/ #define MD5_TEST(data, digest) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ gchar cdigest[33]; \ gboolean ret = FALSE; \ \ cipher = purple_ciphers_find_cipher("md5"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_append(context, (guchar *)(data), strlen((data))); \ \ ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ NULL); \ \ fail_unless(ret == TRUE, NULL); \ \ fail_unless(strcmp((digest), cdigest) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } START_TEST(test_md5_empty_string) { MD5_TEST("", "d41d8cd98f00b204e9800998ecf8427e"); } END_TEST START_TEST(test_md5_a) { MD5_TEST("a", "0cc175b9c0f1b6a831c399e269772661"); } END_TEST START_TEST(test_md5_abc) { MD5_TEST("abc", "900150983cd24fb0d6963f7d28e17f72"); } END_TEST START_TEST(test_md5_message_digest) { MD5_TEST("message digest", "f96b697d7cb7938d525a2f31aaf161d0"); } END_TEST START_TEST(test_md5_a_to_z) { MD5_TEST("abcdefghijklmnopqrstuvwxyz", "c3fcd3d76192e4007dfb496cca67e13b"); } END_TEST START_TEST(test_md5_A_to_Z_a_to_z_0_to_9) { MD5_TEST("ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", "d174ab98d277d9f5a5611c2c9f419d9f"); } END_TEST START_TEST(test_md5_1_to_0_8_times) { MD5_TEST("123456789012345678901234567890123456789012345678901234567890" "12345678901234567890", "57edf4a22be3c955ac49da2e2107b67a"); } END_TEST /****************************************************************************** * SHA-1 Tests *****************************************************************************/ #define SHA1_TEST(data, digest) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ gchar cdigest[41]; \ gboolean ret = FALSE; \ \ cipher = purple_ciphers_find_cipher("sha1"); \ context = purple_cipher_context_new(cipher, NULL); \ \ if((data)) { \ purple_cipher_context_append(context, (guchar *)(data), strlen((data))); \ } else { \ gint j; \ guchar buff[1000]; \ \ memset(buff, 'a', 1000); \ \ for(j = 0; j < 1000; j++) \ purple_cipher_context_append(context, buff, 1000); \ } \ \ ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ NULL); \ \ fail_unless(ret == TRUE, NULL); \ \ fail_unless(strcmp((digest), cdigest) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } START_TEST(test_sha1_a) { SHA1_TEST("a", "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"); } END_TEST START_TEST(test_sha1_abc) { SHA1_TEST("abc", "a9993e364706816aba3e25717850c26c9cd0d89d"); } END_TEST START_TEST(test_sha1_abcd_gibberish) { SHA1_TEST("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq", "84983e441c3bd26ebaae4aa1f95129e5e54670f1"); } END_TEST START_TEST(test_sha1_1000_as_1000_times) { SHA1_TEST(NULL, "34aa973cd4c4daa4f61eeb2bdbad27316534016f"); } END_TEST /****************************************************************************** * DES Tests *****************************************************************************/ #define DES_TEST(in, keyz, out, len) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ guchar answer[len+1]; \ gint ret = 0; \ guchar decrypt[len+1] = in; \ guchar key[8+1] = keyz;\ guchar encrypt[len+1] = out;\ size_t outlen; \ \ cipher = purple_ciphers_find_cipher("des"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_set_key(context, key); \ \ ret = purple_cipher_context_encrypt(context, decrypt, len, answer, &outlen); \ fail_unless(ret == 0, NULL); \ fail_unless(outlen == (len), NULL); \ fail_unless(memcmp(encrypt, answer, len) == 0, NULL); \ \ ret = purple_cipher_context_decrypt(context, encrypt, len, answer, &outlen); \ fail_unless(ret == 0, NULL); \ fail_unless(outlen == (len), NULL); \ fail_unless(memcmp(decrypt, answer, len) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } START_TEST(test_des_12345678) { DES_TEST("12345678", "\x3b\x38\x98\x37\x15\x20\xf7\x5e", "\x06\x22\x05\xac\x6a\x0d\x55\xdd", 8); } END_TEST START_TEST(test_des_abcdefgh) { DES_TEST("abcdefgh", "\x3b\x38\x98\x37\x15\x20\xf7\x5e", "\x62\xe0\xc6\x8c\x48\xe4\x75\xed", 8); } END_TEST /****************************************************************************** * DES3 Tests * See http://csrc.nist.gov/groups/ST/toolkit/examples.html * and some NULL things I made up *****************************************************************************/ #define DES3_TEST(in, key, iv, out, len, mode) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ guchar answer[len+1]; \ guchar decrypt[len+1] = in; \ guchar encrypt[len+1] = out; \ size_t outlen; \ gint ret = 0; \ \ cipher = purple_ciphers_find_cipher("des3"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_set_key(context, (guchar *)key); \ purple_cipher_context_set_batch_mode(context, (mode)); \ purple_cipher_context_set_iv(context, (guchar *)iv, 8); \ \ ret = purple_cipher_context_encrypt(context, decrypt, len, answer, &outlen); \ fail_unless(ret == 0, NULL); \ fail_unless(outlen == (len), NULL); \ fail_unless(memcmp(encrypt, answer, len) == 0, NULL); \ \ ret = purple_cipher_context_decrypt(context, encrypt, len, answer, &outlen); \ fail_unless(ret == 0, NULL); \ fail_unless(outlen == (len), NULL); \ fail_unless(memcmp(decrypt, answer, len) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } START_TEST(test_des3_ecb_nist1) { DES3_TEST( "\x6B\xC1\xBE\xE2\x2E\x40\x9F\x96\xE9\x3D\x7E\x11\x73\x93\x17\x2A" "\xAE\x2D\x8A\x57\x1E\x03\xAC\x9C\x9E\xB7\x6F\xAC\x45\xAF\x8E\x51", "\x01\x23\x45\x67\x89\xAB\xCD\xEF" "\x23\x45\x67\x89\xAB\xCD\xEF\x01" "\x45\x67\x89\xAB\xCD\xEF\x01\x23", "00000000", /* ignored */ "\x71\x47\x72\xF3\x39\x84\x1D\x34\x26\x7F\xCC\x4B\xD2\x94\x9C\xC3" "\xEE\x11\xC2\x2A\x57\x6A\x30\x38\x76\x18\x3F\x99\xC0\xB6\xDE\x87", 32, PURPLE_CIPHER_BATCH_MODE_ECB); } END_TEST START_TEST(test_des3_ecb_nist2) { DES3_TEST( "\x6B\xC1\xBE\xE2\x2E\x40\x9F\x96\xE9\x3D\x7E\x11\x73\x93\x17\x2A" "\xAE\x2D\x8A\x57\x1E\x03\xAC\x9C\x9E\xB7\x6F\xAC\x45\xAF\x8E\x51", "\x01\x23\x45\x67\x89\xAB\xCD\xEF" "\x23\x45\x67\x89\xAB\xCD\xEF\x01" "\x01\x23\x45\x67\x89\xAB\xCD\xEF", "00000000", /* ignored */ "\x06\xED\xE3\xD8\x28\x84\x09\x0A\xFF\x32\x2C\x19\xF0\x51\x84\x86" "\x73\x05\x76\x97\x2A\x66\x6E\x58\xB6\xC8\x8C\xF1\x07\x34\x0D\x3D", 32, PURPLE_CIPHER_BATCH_MODE_ECB); } END_TEST START_TEST(test_des3_ecb_null_key) { DES3_TEST( "\x16\xf4\xb3\x77\xfd\x4b\x9e\xca", "\x38\x00\x88\x6a\xef\xcb\x00\xad" "\x5d\xe5\x29\x00\x7d\x98\x64\x4c" "\x86\x00\x7b\xd3\xc7\x00\x7b\x32", "00000000", /* ignored */ "\xc0\x60\x30\xa1\xb7\x25\x42\x44", 8, PURPLE_CIPHER_BATCH_MODE_ECB); } END_TEST START_TEST(test_des3_ecb_null_text) { DES3_TEST( "\x65\x73\x34\xc1\x19\x00\x79\x65", "\x32\x64\xda\x10\x13\x6a\xfe\x1e" "\x37\x54\xd1\x2c\x41\x04\x10\x40" "\xaf\x1c\x75\x2b\x51\x3a\x03\xf5", "00000000", /* ignored */ "\xe5\x80\xf6\x12\xf8\x4e\xd9\x6c", 8, PURPLE_CIPHER_BATCH_MODE_ECB); } END_TEST START_TEST(test_des3_ecb_null_key_and_text) { DES3_TEST( "\xdf\x7f\x00\x92\xe7\xc1\x49\xd2", "\x0e\x41\x00\xc4\x8b\xf0\x6e\xa1" "\x66\x49\x42\x63\x22\x00\xf0\x99" "\x6b\x22\xc1\x37\x9c\x00\xe4\x8f", "00000000", /* ignored */ "\x73\xd8\x1f\x1f\x50\x01\xe4\x79", 8, PURPLE_CIPHER_BATCH_MODE_ECB); } END_TEST START_TEST(test_des3_cbc_nist1) { DES3_TEST( "\x6B\xC1\xBE\xE2\x2E\x40\x9F\x96\xE9\x3D\x7E\x11\x73\x93\x17\x2A" "\xAE\x2D\x8A\x57\x1E\x03\xAC\x9C\x9E\xB7\x6F\xAC\x45\xAF\x8E\x51", "\x01\x23\x45\x67\x89\xAB\xCD\xEF" "\x23\x45\x67\x89\xAB\xCD\xEF\x01" "\x45\x67\x89\xAB\xCD\xEF\x01\x23", "\xF6\x9F\x24\x45\xDF\x4F\x9B\x17", "\x20\x79\xC3\xD5\x3A\xA7\x63\xE1\x93\xB7\x9E\x25\x69\xAB\x52\x62" "\x51\x65\x70\x48\x1F\x25\xB5\x0F\x73\xC0\xBD\xA8\x5C\x8E\x0D\xA7", 32, PURPLE_CIPHER_BATCH_MODE_CBC); } END_TEST START_TEST(test_des3_cbc_nist2) { DES3_TEST( "\x6B\xC1\xBE\xE2\x2E\x40\x9F\x96\xE9\x3D\x7E\x11\x73\x93\x17\x2A" "\xAE\x2D\x8A\x57\x1E\x03\xAC\x9C\x9E\xB7\x6F\xAC\x45\xAF\x8E\x51", "\x01\x23\x45\x67\x89\xAB\xCD\xEF" "\x23\x45\x67\x89\xAB\xCD\xEF\x01" "\x01\x23\x45\x67\x89\xAB\xCD\xEF", "\xF6\x9F\x24\x45\xDF\x4F\x9B\x17", "\x74\x01\xCE\x1E\xAB\x6D\x00\x3C\xAF\xF8\x4B\xF4\x7B\x36\xCC\x21" "\x54\xF0\x23\x8F\x9F\xFE\xCD\x8F\x6A\xCF\x11\x83\x92\xB4\x55\x81", 32, PURPLE_CIPHER_BATCH_MODE_CBC); } END_TEST START_TEST(test_des3_cbc_null_key) { DES3_TEST( "\x16\xf4\xb3\x77\xfd\x4b\x9e\xca", "\x38\x00\x88\x6a\xef\xcb\x00\xad" "\x5d\xe5\x29\x00\x7d\x98\x64\x4c" "\x86\x00\x7b\xd3\xc7\x00\x7b\x32", "\x31\x32\x33\x34\x35\x36\x37\x38", "\x52\xe7\xde\x96\x39\x87\x87\xdb", 8, PURPLE_CIPHER_BATCH_MODE_CBC); } END_TEST START_TEST(test_des3_cbc_null_text) { DES3_TEST( "\x65\x73\x34\xc1\x19\x00\x79\x65", "\x32\x64\xda\x10\x13\x6a\xfe\x1e" "\x37\x54\xd1\x2c\x41\x04\x10\x40" "\xaf\x1c\x75\x2b\x51\x3a\x03\xf5", "\x7C\xAF\x0D\x57\x1E\x57\x10\xDA", "\x40\x12\x0e\x00\x85\xff\x6c\xc2", 8, PURPLE_CIPHER_BATCH_MODE_CBC); } END_TEST START_TEST(test_des3_cbc_null_key_and_text) { DES3_TEST( "\xdf\x7f\x00\x92\xe7\xc1\x49\xd2", "\x0e\x41\x00\xc4\x8b\xf0\x6e\xa1" "\x66\x49\x42\x63\x22\x00\xf0\x99" "\x6b\x22\xc1\x37\x9c\x00\xe4\x8f", "\x01\x19\x0D\x2c\x40\x67\x89\x67", "\xa7\xc1\x10\xbe\x9b\xd5\x8a\x67", 8, PURPLE_CIPHER_BATCH_MODE_CBC); } END_TEST /****************************************************************************** * HMAC Tests * See RFC2202 and some other NULL tests I made up *****************************************************************************/ #define HMAC_TEST(data, data_len, key, key_len, type, digest) { \ PurpleCipher *cipher = NULL; \ PurpleCipherContext *context = NULL; \ gchar cdigest[41]; \ gboolean ret = FALSE; \ \ cipher = purple_ciphers_find_cipher("hmac"); \ context = purple_cipher_context_new(cipher, NULL); \ purple_cipher_context_set_option(context, "hash", type); \ purple_cipher_context_set_key_with_len(context, (guchar *)key, (key_len)); \ \ purple_cipher_context_append(context, (guchar *)(data), (data_len)); \ ret = purple_cipher_context_digest_to_str(context, sizeof(cdigest), cdigest, \ NULL); \ \ fail_unless(ret == TRUE, NULL); \ fail_unless(strcmp((digest), cdigest) == 0, NULL); \ \ purple_cipher_context_destroy(context); \ } /* HMAC MD5 */ START_TEST(test_hmac_md5_Hi) { HMAC_TEST("Hi There", 8, "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 16, "md5", "9294727a3638bb1c13f48ef8158bfc9d"); } END_TEST START_TEST(test_hmac_md5_what) { HMAC_TEST("what do ya want for nothing?", 28, "Jefe", 4, "md5", "750c783e6ab0b503eaa86e310a5db738"); } END_TEST START_TEST(test_hmac_md5_dd) { HMAC_TEST("\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd", 50, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 16, "md5", "56be34521d144c88dbb8c733f0e8b3f6"); } END_TEST START_TEST(test_hmac_md5_cd) { HMAC_TEST("\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd", 50, "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a" "\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14" "\x15\x16\x17\x18\x19", 25, "md5", "697eaf0aca3a3aea3a75164746ffaa79"); } END_TEST START_TEST(test_hmac_md5_truncation) { HMAC_TEST("Test With Truncation", 20, "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c", 16, "md5", "56461ef2342edc00f9bab995690efd4c"); } END_TEST START_TEST(test_hmac_md5_large_key) { HMAC_TEST("Test Using Larger Than Block-Size Key - Hash Key First", 54, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 80, "md5", "6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd"); } END_TEST START_TEST(test_hmac_md5_large_key_and_data) { HMAC_TEST("Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data", 73, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 80, "md5", "6f630fad67cda0ee1fb1f562db3aa53e"); } END_TEST START_TEST(test_hmac_md5_null_key) { HMAC_TEST("Hi There", 8, "\x0a\x0b\x00\x0d\x0e\x0f\x1a\x2f\x0b\x0b" "\x0b\x00\x00\x0b\x0b\x49\x5f\x6e\x0b\x0b", 20, "md5", "597bfd644b797a985561eeb03a169e59"); } END_TEST START_TEST(test_hmac_md5_null_text) { HMAC_TEST("Hi\x00There", 8, "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 20, "md5", "70be8e1b7b50dfcc335d6cd7992c564f"); } END_TEST START_TEST(test_hmac_md5_null_key_and_text) { HMAC_TEST("Hi\x00Th\x00re", 8, "\x0c\x0d\x00\x0f\x10\x1a\x3a\x3a\xe6\x34" "\x0b\x00\x00\x0b\x0b\x49\x5f\x6e\x0b\x0b", 20, "md5", "b31bcbba35a33a067cbba9131cba4889"); } END_TEST /* HMAC SHA1 */ START_TEST(test_hmac_sha1_Hi) { HMAC_TEST("Hi There", 8, "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 20, "sha1", "b617318655057264e28bc0b6fb378c8ef146be00"); } END_TEST START_TEST(test_hmac_sha1_what) { HMAC_TEST("what do ya want for nothing?", 28, "Jefe", 4, "sha1", "effcdf6ae5eb2fa2d27416d5f184df9c259a7c79"); } END_TEST START_TEST(test_hmac_sha1_dd) { HMAC_TEST("\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd" "\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd\xdd", 50, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 20, "sha1", "125d7342b9ac11cd91a39af48aa17b4f63f175d3"); } END_TEST START_TEST(test_hmac_sha1_cd) { HMAC_TEST("\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd" "\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd\xcd", 50, "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a" "\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14" "\x15\x16\x17\x18\x19", 25, "sha1", "4c9007f4026250c6bc8414f9bf50c86c2d7235da"); } END_TEST START_TEST(test_hmac_sha1_truncation) { HMAC_TEST("Test With Truncation", 20, "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c" "\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c\x0c", 20, "sha1", "4c1a03424b55e07fe7f27be1d58bb9324a9a5a04"); } END_TEST START_TEST(test_hmac_sha1_large_key) { HMAC_TEST("Test Using Larger Than Block-Size Key - Hash Key First", 54, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 80, "sha1", "aa4ae5e15272d00e95705637ce8a3b55ed402112"); } END_TEST START_TEST(test_hmac_sha1_large_key_and_data) { HMAC_TEST("Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data", 73, "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa" "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 80, "sha1", "e8e99d0f45237d786d6bbaa7965c7808bbff1a91"); } END_TEST START_TEST(test_hmac_sha1_null_key) { HMAC_TEST("Hi There", 8, "\x0a\x0b\x00\x0d\x0e\x0f\x1a\x2f\x0b\x0b" "\x0b\x00\x00\x0b\x0b\x49\x5f\x6e\x0b\x0b", 20, "sha1", "eb62a2e0e33d300be669c52aab3f591bc960aac5"); } END_TEST START_TEST(test_hmac_sha1_null_text) { HMAC_TEST("Hi\x00There", 8, "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b" "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 20, "sha1", "31ca58d849e971e418e3439de2c6f83144b6abb7"); } END_TEST START_TEST(test_hmac_sha1_null_key_and_text) { HMAC_TEST("Hi\x00Th\x00re", 8, "\x0c\x0d\x00\x0f\x10\x1a\x3a\x3a\xe6\x34" "\x0b\x00\x00\x0b\x0b\x49\x5f\x6e\x0b\x0b", 20, "sha1", "e6b8e2fede87aa09dcb13e554df1435e056eae36"); } END_TEST /****************************************************************************** * Suite *****************************************************************************/ Suite * cipher_suite(void) { Suite *s = suite_create("Cipher Suite"); TCase *tc = NULL; /* md4 tests */ tc = tcase_create("MD4"); tcase_add_test(tc, test_md4_empty_string); tcase_add_test(tc, test_md4_a); tcase_add_test(tc, test_md4_abc); tcase_add_test(tc, test_md4_message_digest); tcase_add_test(tc, test_md4_a_to_z); tcase_add_test(tc, test_md4_A_to_Z_a_to_z_0_to_9); tcase_add_test(tc, test_md4_1_to_0_8_times); suite_add_tcase(s, tc); /* md5 tests */ tc = tcase_create("MD5"); tcase_add_test(tc, test_md5_empty_string); tcase_add_test(tc, test_md5_a); tcase_add_test(tc, test_md5_abc); tcase_add_test(tc, test_md5_message_digest); tcase_add_test(tc, test_md5_a_to_z); tcase_add_test(tc, test_md5_A_to_Z_a_to_z_0_to_9); tcase_add_test(tc, test_md5_1_to_0_8_times); suite_add_tcase(s, tc); /* sha1 tests */ tc = tcase_create("SHA1"); tcase_add_test(tc, test_sha1_a); tcase_add_test(tc, test_sha1_abc); tcase_add_test(tc, test_sha1_abcd_gibberish); tcase_add_test(tc, test_sha1_1000_as_1000_times); suite_add_tcase(s, tc); /* des tests */ tc = tcase_create("DES"); tcase_add_test(tc, test_des_12345678); tcase_add_test(tc, test_des_abcdefgh); suite_add_tcase(s, tc); /* des3 ecb tests */ tc = tcase_create("DES3 ECB"); tcase_add_test(tc, test_des3_ecb_nist1); tcase_add_test(tc, test_des3_ecb_nist2); tcase_add_test(tc, test_des3_ecb_null_key); tcase_add_test(tc, test_des3_ecb_null_text); tcase_add_test(tc, test_des3_ecb_null_key_and_text); suite_add_tcase(s, tc); /* des3 cbc tests */ tc = tcase_create("DES3 CBC"); tcase_add_test(tc, test_des3_cbc_nist1); tcase_add_test(tc, test_des3_cbc_nist2); tcase_add_test(tc, test_des3_cbc_null_key); tcase_add_test(tc, test_des3_cbc_null_text); tcase_add_test(tc, test_des3_cbc_null_key_and_text); suite_add_tcase(s, tc); /* hmac tests */ tc = tcase_create("HMAC"); tcase_add_test(tc, test_hmac_md5_Hi); tcase_add_test(tc, test_hmac_md5_what); tcase_add_test(tc, test_hmac_md5_dd); tcase_add_test(tc, test_hmac_md5_cd); tcase_add_test(tc, test_hmac_md5_truncation); tcase_add_test(tc, test_hmac_md5_large_key); tcase_add_test(tc, test_hmac_md5_large_key_and_data); tcase_add_test(tc, test_hmac_md5_null_key); tcase_add_test(tc, test_hmac_md5_null_text); tcase_add_test(tc, test_hmac_md5_null_key_and_text); tcase_add_test(tc, test_hmac_sha1_Hi); tcase_add_test(tc, test_hmac_sha1_what); tcase_add_test(tc, test_hmac_sha1_dd); tcase_add_test(tc, test_hmac_sha1_cd); tcase_add_test(tc, test_hmac_sha1_truncation); tcase_add_test(tc, test_hmac_sha1_large_key); tcase_add_test(tc, test_hmac_sha1_large_key_and_data); tcase_add_test(tc, test_hmac_sha1_null_key); tcase_add_test(tc, test_hmac_sha1_null_text); tcase_add_test(tc, test_hmac_sha1_null_key_and_text); suite_add_tcase(s, tc); return s; }