hmac_test.cpp 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384
  1. /*
  2. * Copyright (C) 2015 The Android Open Source Project
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include <keymaster/km_openssl/hmac.h>
  17. #include <gtest/gtest.h>
  18. #include <string.h>
  19. #include "android_keymaster_test_utils.h"
  20. using std::string;
  21. namespace keymaster {
  22. namespace test {
  23. struct HmacTest {
  24. const char* data;
  25. const char* key;
  26. uint8_t digest[32];
  27. };
  28. static const HmacTest kHmacTests[] = {
  29. {
  30. "Test Using Larger Than Block-Size Key - Hash Key First",
  31. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
  32. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
  33. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
  34. "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa",
  35. {
  36. 0x60, 0xe4, 0x31, 0x59, 0x1e, 0xe0, 0xb6, 0x7f, 0x0d, 0x8a, 0x26, 0xaa, 0xcb, 0xf5,
  37. 0xb7, 0x7f, 0x8e, 0x0b, 0xc6, 0x21, 0x37, 0x28, 0xc5, 0x14, 0x05, 0x46, 0x04, 0x0f,
  38. 0x0e, 0xe3, 0x7f, 0x54,
  39. },
  40. },
  41. {
  42. "The test message for the MD2, MD5, and SHA-1 hashing algorithms.",
  43. "46697265666f7820616e64205468756e64657242697264206172652061776573"
  44. "6f6d652100",
  45. {
  46. 0x05, 0x75, 0x9a, 0x9e, 0x70, 0x5e, 0xe7, 0x44, 0xe2, 0x46, 0x4b, 0x92, 0x22, 0x14,
  47. 0x22, 0xe0, 0x1b, 0x92, 0x8a, 0x0c, 0xfe, 0xf5, 0x49, 0xe9, 0xa7, 0x1b, 0x56, 0x7d,
  48. 0x1d, 0x29, 0x40, 0x48,
  49. },
  50. },
  51. };
  52. TEST(HmacTest, SHA256) {
  53. for (size_t i = 0; i < 2; i++) {
  54. const HmacTest& test(kHmacTests[i]);
  55. HmacSha256 hmac;
  56. const string key = hex2str(test.key);
  57. Buffer key_buffer(key.data(), key.size());
  58. ASSERT_TRUE(hmac.Init(key_buffer));
  59. uint8_t digest_copy[sizeof(test.digest)];
  60. memcpy(digest_copy, test.digest, sizeof(test.digest));
  61. Buffer digest_buffer(reinterpret_cast<uint8_t*>(digest_copy), sizeof(digest_copy));
  62. Buffer data_buffer(test.data, strlen(test.data));
  63. EXPECT_TRUE(hmac.Verify(data_buffer, digest_buffer));
  64. digest_copy[16] ^= 0x80;
  65. digest_buffer.Reinitialize(reinterpret_cast<uint8_t*>(digest_copy), sizeof(digest_copy));
  66. EXPECT_FALSE(hmac.Verify(data_buffer, digest_buffer));
  67. }
  68. }
  69. } // namespace test
  70. } // namespace keymaster