1/* crypto/hmac/hmactest.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#include <string.h> 61#include <stdlib.h> 62 63#include "../e_os.h" 64 65#ifdef OPENSSL_NO_HMAC 66int main(int argc, char *argv[]) 67{ 68 printf("No HMAC support\n"); 69 return (0); 70} 71#else 72# include <openssl/hmac.h> 73# ifndef OPENSSL_NO_MD5 74# include <openssl/md5.h> 75# endif 76 77# ifdef CHARSET_EBCDIC 78# include <openssl/ebcdic.h> 79# endif 80 81# ifndef OPENSSL_NO_MD5 82static struct test_st { 83 unsigned char key[16]; 84 int key_len; 85 unsigned char data[64]; 86 int data_len; 87 unsigned char *digest; 88} test[8] = { 89 { 90 "", 0, "More text test vectors to stuff up EBCDIC machines :-)", 54, 91 (unsigned char *)"e9139d1e6ee064ef8cf514fc7dc83e86", 92 }, 93 { 94 { 95 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 96 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 97 }, 16, "Hi There", 8, 98 (unsigned char *)"9294727a3638bb1c13f48ef8158bfc9d", 99 }, 100 { 101 "Jefe", 4, "what do ya want for nothing?", 28, 102 (unsigned char *)"750c783e6ab0b503eaa86e310a5db738", 103 }, 104 { 105 { 106 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 107 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 108 }, 16, { 109 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 110 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 111 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 112 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 113 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd 114 }, 50, (unsigned char *)"56be34521d144c88dbb8c733f0e8b3f6", 115 }, 116 { 117 "", 0, "My test data", 12, 118 (unsigned char *)"61afdecb95429ef494d61fdee15990cabf0826fc" 119 }, 120 { 121 "", 0, "My test data", 12, 122 (unsigned char *)"2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776" 123 }, 124 { 125 "123456", 6, "My test data", 12, 126 (unsigned char *)"bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd" 127 }, 128 { 129 "12345", 5, "My test data again", 12, 130 (unsigned char *)"7dbe8c764c068e3bcd6e6b0fbcd5e6fc197b15bb" 131 } 132}; 133# endif 134 135static char *pt(unsigned char *md, unsigned int len); 136 137int main(int argc, char *argv[]) 138{ 139# ifndef OPENSSL_NO_MD5 140 int i; 141 char *p; 142# endif 143 int err = 0; 144 HMAC_CTX ctx, ctx2; 145 unsigned char buf[EVP_MAX_MD_SIZE]; 146 unsigned int len; 147 148# ifdef OPENSSL_NO_MD5 149 printf("test skipped: MD5 disabled\n"); 150# else 151 152# ifdef CHARSET_EBCDIC 153 ebcdic2ascii(test[0].data, test[0].data, test[0].data_len); 154 ebcdic2ascii(test[1].data, test[1].data, test[1].data_len); 155 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); 156 ebcdic2ascii(test[2].data, test[2].data, test[2].data_len); 157# endif 158 159 for (i = 0; i < 4; i++) { 160 p = pt(HMAC(EVP_md5(), 161 test[i].key, test[i].key_len, 162 test[i].data, test[i].data_len, NULL, NULL), 163 MD5_DIGEST_LENGTH); 164 165 if (strcmp(p, (char *)test[i].digest) != 0) { 166 printf("Error calculating HMAC on %d entry'\n", i); 167 printf("got %s instead of %s\n", p, test[i].digest); 168 err++; 169 } else 170 printf("test %d ok\n", i); 171 } 172# endif /* OPENSSL_NO_MD5 */ 173 174/* test4 */ 175 HMAC_CTX_init(&ctx); 176 if (HMAC_Init_ex(&ctx, NULL, 0, NULL, NULL)) { 177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n"); 178 err++; 179 goto test5; 180 } 181 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) { 182 printf("Should fail HMAC_Update with ctx not set up (test 4)\n"); 183 err++; 184 goto test5; 185 } 186 if (HMAC_Init_ex(&ctx, NULL, 0, EVP_sha1(), NULL)) { 187 printf("Should fail to initialise HMAC with empty key (test 4)\n"); 188 err++; 189 goto test5; 190 } 191 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) { 192 printf("Should fail HMAC_Update with ctx not set up (test 4)\n"); 193 err++; 194 goto test5; 195 } 196 printf("test 4 ok\n"); 197test5: 198 HMAC_CTX_cleanup(&ctx); 199 HMAC_CTX_init(&ctx); 200 if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) { 201 printf("Should fail to initialise HMAC with empty MD (test 5)\n"); 202 err++; 203 goto test6; 204 } 205 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) { 206 printf("Should fail HMAC_Update with ctx not set up (test 5)\n"); 207 err++; 208 goto test6; 209 } 210 if (HMAC_Init_ex(&ctx, test[4].key, -1, EVP_sha1(), NULL)) { 211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n"); 212 err++; 213 goto test6; 214 } 215 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) { 216 printf("Failed to initialise HMAC (test 5)\n"); 217 err++; 218 goto test6; 219 } 220 if (!HMAC_Update(&ctx, test[4].data, test[4].data_len)) { 221 printf("Error updating HMAC with data (test 5)\n"); 222 err++; 223 goto test6; 224 } 225 if (!HMAC_Final(&ctx, buf, &len)) { 226 printf("Error finalising data (test 5)\n"); 227 err++; 228 goto test6; 229 } 230 p = pt(buf, len); 231 if (strcmp(p, (char *)test[4].digest) != 0) { 232 printf("Error calculating interim HMAC on test 5\n"); 233 printf("got %s instead of %s\n", p, test[4].digest); 234 err++; 235 goto test6; 236 } 237 if (HMAC_Init_ex(&ctx, NULL, 0, EVP_sha256(), NULL)) { 238 printf("Should disallow changing MD without a new key (test 5)\n"); 239 err++; 240 goto test6; 241 } 242 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) { 243 printf("Failed to reinitialise HMAC (test 5)\n"); 244 err++; 245 goto test6; 246 } 247 if (!HMAC_Update(&ctx, test[5].data, test[5].data_len)) { 248 printf("Error updating HMAC with data (sha256) (test 5)\n"); 249 err++; 250 goto test6; 251 } 252 if (!HMAC_Final(&ctx, buf, &len)) { 253 printf("Error finalising data (sha256) (test 5)\n"); 254 err++; 255 goto test6; 256 } 257 p = pt(buf, len); 258 if (strcmp(p, (char *)test[5].digest) != 0) { 259 printf("Error calculating 2nd interim HMAC on test 5\n"); 260 printf("got %s instead of %s\n", p, test[5].digest); 261 err++; 262 goto test6; 263 } 264 if (!HMAC_Init_ex(&ctx, test[6].key, test[6].key_len, NULL, NULL)) { 265 printf("Failed to reinitialise HMAC with key (test 5)\n"); 266 err++; 267 goto test6; 268 } 269 if (!HMAC_Update(&ctx, test[6].data, test[6].data_len)) { 270 printf("Error updating HMAC with data (new key) (test 5)\n"); 271 err++; 272 goto test6; 273 } 274 if (!HMAC_Final(&ctx, buf, &len)) { 275 printf("Error finalising data (new key) (test 5)\n"); 276 err++; 277 goto test6; 278 } 279 p = pt(buf, len); 280 if (strcmp(p, (char *)test[6].digest) != 0) { 281 printf("error calculating HMAC on test 5\n"); 282 printf("got %s instead of %s\n", p, test[6].digest); 283 err++; 284 } else { 285 printf("test 5 ok\n"); 286 } 287test6: 288 HMAC_CTX_cleanup(&ctx); 289 HMAC_CTX_init(&ctx); 290 if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) { 291 printf("Failed to initialise HMAC (test 6)\n"); 292 err++; 293 goto end; 294 } 295 if (!HMAC_Update(&ctx, test[7].data, test[7].data_len)) { 296 printf("Error updating HMAC with data (test 6)\n"); 297 err++; 298 goto end; 299 } 300 if (!HMAC_CTX_copy(&ctx2, &ctx)) { 301 printf("Failed to copy HMAC_CTX (test 6)\n"); 302 err++; 303 goto end; 304 } 305 if (!HMAC_Final(&ctx2, buf, &len)) { 306 printf("Error finalising data (test 6)\n"); 307 err++; 308 goto end; 309 } 310 p = pt(buf, len); 311 if (strcmp(p, (char *)test[7].digest) != 0) { 312 printf("Error calculating HMAC on test 6\n"); 313 printf("got %s instead of %s\n", p, test[7].digest); 314 err++; 315 } else { 316 printf("test 6 ok\n"); 317 } 318end: 319 HMAC_CTX_cleanup(&ctx); 320 EXIT(err); 321 return (0); 322} 323 324# ifndef OPENSSL_NO_MD5 325static char *pt(unsigned char *md, unsigned int len) 326{ 327 unsigned int i; 328 static char buf[80]; 329 330 for (i = 0; i < len; i++) 331 sprintf(&(buf[i * 2]), "%02x", md[i]); 332 return (buf); 333} 334# endif 335#endif 336