hmactest.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  2. * All rights reserved.
  3. *
  4. * This package is an SSL implementation written
  5. * by Eric Young (eay@cryptsoft.com).
  6. * The implementation was written so as to conform with Netscapes SSL.
  7. *
  8. * This library is free for commercial and non-commercial use as long as
  9. * the following conditions are aheared to. The following conditions
  10. * apply to all code found in this distribution, be it the RC4, RSA,
  11. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  12. * included with this distribution is covered by the same copyright terms
  13. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  14. *
  15. * Copyright remains Eric Young's, and as such any Copyright notices in
  16. * the code are not to be removed.
  17. * If this package is used in a product, Eric Young should be given attribution
  18. * as the author of the parts of the library used.
  19. * This can be in the form of a textual message at program startup or
  20. * in documentation (online or textual) provided with the package.
  21. *
  22. * Redistribution and use in source and binary forms, with or without
  23. * modification, are permitted provided that the following conditions
  24. * are met:
  25. * 1. Redistributions of source code must retain the copyright
  26. * notice, this list of conditions and the following disclaimer.
  27. * 2. Redistributions in binary form must reproduce the above copyright
  28. * notice, this list of conditions and the following disclaimer in the
  29. * documentation and/or other materials provided with the distribution.
  30. * 3. All advertising materials mentioning features or use of this software
  31. * must display the following acknowledgement:
  32. * "This product includes cryptographic software written by
  33. * Eric Young (eay@cryptsoft.com)"
  34. * The word 'cryptographic' can be left out if the rouines from the library
  35. * being used are not cryptographic related :-).
  36. * 4. If you include any Windows specific code (or a derivative thereof) from
  37. * the apps directory (application code) you must include an acknowledgement:
  38. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  39. *
  40. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  41. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  42. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  43. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  44. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  45. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  46. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  48. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  49. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  50. * SUCH DAMAGE.
  51. *
  52. * The licence and distribution terms for any publically available version or
  53. * derivative of this code cannot be changed. i.e. this code cannot simply be
  54. * copied and put under another distribution licence
  55. * [including the GNU Public Licence.]
  56. */
  57. #include <stdio.h>
  58. #include <string.h>
  59. #include <stdlib.h>
  60. #include "../e_os.h"
  61. # include <openssl/hmac.h>
  62. # include <openssl/sha.h>
  63. # ifndef OPENSSL_NO_MD5
  64. # include <openssl/md5.h>
  65. # endif
  66. # ifdef CHARSET_EBCDIC
  67. # include <openssl/ebcdic.h>
  68. # endif
  69. # ifndef OPENSSL_NO_MD5
  70. static struct test_st {
  71. unsigned char key[16];
  72. int key_len;
  73. unsigned char data[64];
  74. int data_len;
  75. unsigned char *digest;
  76. } test[8] = {
  77. {
  78. "", 0, "More text test vectors to stuff up EBCDIC machines :-)", 54,
  79. (unsigned char *)"e9139d1e6ee064ef8cf514fc7dc83e86",
  80. },
  81. {
  82. {
  83. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  84. 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
  85. }, 16, "Hi There", 8,
  86. (unsigned char *)"9294727a3638bb1c13f48ef8158bfc9d",
  87. },
  88. {
  89. "Jefe", 4, "what do ya want for nothing?", 28,
  90. (unsigned char *)"750c783e6ab0b503eaa86e310a5db738",
  91. },
  92. {
  93. {
  94. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  95. 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
  96. }, 16, {
  97. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  98. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  99. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  100. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
  101. 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd
  102. }, 50, (unsigned char *)"56be34521d144c88dbb8c733f0e8b3f6",
  103. },
  104. {
  105. "", 0, "My test data", 12,
  106. (unsigned char *)"61afdecb95429ef494d61fdee15990cabf0826fc"
  107. },
  108. {
  109. "", 0, "My test data", 12,
  110. (unsigned char *)"2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776"
  111. },
  112. {
  113. "123456", 6, "My test data", 12,
  114. (unsigned char *)"bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd"
  115. },
  116. {
  117. "12345", 5, "My test data again", 12,
  118. (unsigned char *)"7dbe8c764c068e3bcd6e6b0fbcd5e6fc197b15bb"
  119. }
  120. };
  121. # endif
  122. static char *pt(unsigned char *md, unsigned int len);
  123. int main(int argc, char *argv[])
  124. {
  125. # ifndef OPENSSL_NO_MD5
  126. int i;
  127. char *p;
  128. # endif
  129. int err = 0;
  130. HMAC_CTX *ctx = NULL, *ctx2 = NULL;
  131. unsigned char buf[EVP_MAX_MD_SIZE];
  132. unsigned int len;
  133. # ifdef OPENSSL_NO_MD5
  134. printf("test skipped: MD5 disabled\n");
  135. # else
  136. # ifdef CHARSET_EBCDIC
  137. ebcdic2ascii(test[0].data, test[0].data, test[0].data_len);
  138. ebcdic2ascii(test[1].data, test[1].data, test[1].data_len);
  139. ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
  140. ebcdic2ascii(test[2].data, test[2].data, test[2].data_len);
  141. # endif
  142. for (i = 0; i < 4; i++) {
  143. p = pt(HMAC(EVP_md5(),
  144. test[i].key, test[i].key_len,
  145. test[i].data, test[i].data_len, NULL, NULL),
  146. MD5_DIGEST_LENGTH);
  147. if (strcmp(p, (char *)test[i].digest) != 0) {
  148. printf("Error calculating HMAC on %d entry'\n", i);
  149. printf("got %s instead of %s\n", p, test[i].digest);
  150. err++;
  151. } else
  152. printf("test %d ok\n", i);
  153. }
  154. # endif /* OPENSSL_NO_MD5 */
  155. /* test4 */
  156. ctx = HMAC_CTX_new();
  157. if (ctx == NULL) {
  158. printf("HMAC malloc failure (test 4)\n");
  159. err++;
  160. goto end;
  161. }
  162. if (HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) {
  163. printf("Should fail to initialise HMAC with empty MD and key (test 4)\n");
  164. err++;
  165. goto test5;
  166. }
  167. if (HMAC_Update(ctx, test[4].data, test[4].data_len)) {
  168. printf("Should fail HMAC_Update with ctx not set up (test 4)\n");
  169. err++;
  170. goto test5;
  171. }
  172. if (HMAC_Init_ex(ctx, NULL, 0, EVP_sha1(), NULL)) {
  173. printf("Should fail to initialise HMAC with empty key (test 4)\n");
  174. err++;
  175. goto test5;
  176. }
  177. if (HMAC_Update(ctx, test[4].data, test[4].data_len)) {
  178. printf("Should fail HMAC_Update with ctx not set up (test 4)\n");
  179. err++;
  180. goto test5;
  181. }
  182. printf("test 4 ok\n");
  183. test5:
  184. /* Test 5 has empty key; test that single-shot accepts a NULL key. */
  185. p = pt(HMAC(EVP_sha1(), NULL, 0, test[4].data, test[4].data_len,
  186. NULL, NULL), SHA_DIGEST_LENGTH);
  187. if (strcmp(p, (char *)test[4].digest) != 0) {
  188. printf("Error calculating HMAC on %d entry'\n", i);
  189. printf("got %s instead of %s\n", p, test[4].digest);
  190. err++;
  191. }
  192. HMAC_CTX_reset(ctx);
  193. if (HMAC_Init_ex(ctx, test[4].key, test[4].key_len, NULL, NULL)) {
  194. printf("Should fail to initialise HMAC with empty MD (test 5)\n");
  195. err++;
  196. goto test6;
  197. }
  198. if (HMAC_Update(ctx, test[4].data, test[4].data_len)) {
  199. printf("Should fail HMAC_Update with ctx not set up (test 5)\n");
  200. err++;
  201. goto test6;
  202. }
  203. if (HMAC_Init_ex(ctx, test[4].key, -1, EVP_sha1(), NULL)) {
  204. printf("Should fail to initialise HMAC with invalid key len(test 5)\n");
  205. err++;
  206. goto test6;
  207. }
  208. if (!HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) {
  209. printf("Failed to initialise HMAC (test 5)\n");
  210. err++;
  211. goto test6;
  212. }
  213. if (!HMAC_Update(ctx, test[4].data, test[4].data_len)) {
  214. printf("Error updating HMAC with data (test 5)\n");
  215. err++;
  216. goto test6;
  217. }
  218. if (!HMAC_Final(ctx, buf, &len)) {
  219. printf("Error finalising data (test 5)\n");
  220. err++;
  221. goto test6;
  222. }
  223. p = pt(buf, len);
  224. if (strcmp(p, (char *)test[4].digest) != 0) {
  225. printf("Error calculating interim HMAC on test 5\n");
  226. printf("got %s instead of %s\n", p, test[4].digest);
  227. err++;
  228. goto test6;
  229. }
  230. if (HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL)) {
  231. printf("Should disallow changing MD without a new key (test 5)\n");
  232. err++;
  233. goto test6;
  234. }
  235. if (!HMAC_Init_ex(ctx, test[5].key, test[5].key_len, EVP_sha256(), NULL)) {
  236. printf("Failed to reinitialise HMAC (test 5)\n");
  237. err++;
  238. goto test6;
  239. }
  240. if (!HMAC_Update(ctx, test[5].data, test[5].data_len)) {
  241. printf("Error updating HMAC with data (sha256) (test 5)\n");
  242. err++;
  243. goto test6;
  244. }
  245. if (!HMAC_Final(ctx, buf, &len)) {
  246. printf("Error finalising data (sha256) (test 5)\n");
  247. err++;
  248. goto test6;
  249. }
  250. p = pt(buf, len);
  251. if (strcmp(p, (char *)test[5].digest) != 0) {
  252. printf("Error calculating 2nd interim HMAC on test 5\n");
  253. printf("got %s instead of %s\n", p, test[5].digest);
  254. err++;
  255. goto test6;
  256. }
  257. if (!HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) {
  258. printf("Failed to reinitialise HMAC with key (test 5)\n");
  259. err++;
  260. goto test6;
  261. }
  262. if (!HMAC_Update(ctx, test[6].data, test[6].data_len)) {
  263. printf("Error updating HMAC with data (new key) (test 5)\n");
  264. err++;
  265. goto test6;
  266. }
  267. if (!HMAC_Final(ctx, buf, &len)) {
  268. printf("Error finalising data (new key) (test 5)\n");
  269. err++;
  270. goto test6;
  271. }
  272. p = pt(buf, len);
  273. if (strcmp(p, (char *)test[6].digest) != 0) {
  274. printf("error calculating HMAC on test 5\n");
  275. printf("got %s instead of %s\n", p, test[6].digest);
  276. err++;
  277. } else {
  278. printf("test 5 ok\n");
  279. }
  280. test6:
  281. HMAC_CTX_reset(ctx);
  282. ctx2 = HMAC_CTX_new();
  283. if (ctx2 == NULL) {
  284. printf("HMAC malloc failure (test 6)\n");
  285. err++;
  286. goto end;
  287. }
  288. if (!HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) {
  289. printf("Failed to initialise HMAC (test 6)\n");
  290. err++;
  291. goto end;
  292. }
  293. if (!HMAC_Update(ctx, test[7].data, test[7].data_len)) {
  294. printf("Error updating HMAC with data (test 6)\n");
  295. err++;
  296. goto end;
  297. }
  298. if (!HMAC_CTX_copy(ctx2, ctx)) {
  299. printf("Failed to copy HMAC_CTX (test 6)\n");
  300. err++;
  301. goto end;
  302. }
  303. if (!HMAC_Final(ctx2, buf, &len)) {
  304. printf("Error finalising data (test 6)\n");
  305. err++;
  306. goto end;
  307. }
  308. p = pt(buf, len);
  309. if (strcmp(p, (char *)test[7].digest) != 0) {
  310. printf("Error calculating HMAC on test 6\n");
  311. printf("got %s instead of %s\n", p, test[7].digest);
  312. err++;
  313. } else {
  314. printf("test 6 ok\n");
  315. }
  316. end:
  317. HMAC_CTX_free(ctx2);
  318. HMAC_CTX_free(ctx);
  319. EXIT(err);
  320. }
  321. # ifndef OPENSSL_NO_MD5
  322. static char *pt(unsigned char *md, unsigned int len)
  323. {
  324. unsigned int i;
  325. static char buf[80];
  326. for (i = 0; i < len; i++)
  327. sprintf(&(buf[i * 2]), "%02x", md[i]);
  328. return (buf);
  329. }
  330. # endif