xref: /openbmc/qemu/tests/unit/test-crypto-hmac.c (revision 9ad4c7c9)
1da668aa1SThomas Huth /*
2da668aa1SThomas Huth  * QEMU Crypto hmac algorithms tests
3da668aa1SThomas Huth  *
4da668aa1SThomas Huth  * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
5da668aa1SThomas Huth  *
6da668aa1SThomas Huth  * Authors:
7da668aa1SThomas Huth  *    Longpeng(Mike) <longpeng2@huawei.com>
8da668aa1SThomas Huth  *
9da668aa1SThomas Huth  * This work is licensed under the terms of the GNU GPL, version 2 or
10da668aa1SThomas Huth  * (at your option) any later version.  See the COPYING file in the
11da668aa1SThomas Huth  * top-level directory.
12da668aa1SThomas Huth  *
13da668aa1SThomas Huth  */
14da668aa1SThomas Huth 
15da668aa1SThomas Huth #include "qemu/osdep.h"
16da668aa1SThomas Huth #include "crypto/init.h"
17da668aa1SThomas Huth #include "crypto/hmac.h"
18da668aa1SThomas Huth 
19da668aa1SThomas Huth #define INPUT_TEXT1 "ABCDEFGHIJKLMNOPQRSTUVWXY"
20da668aa1SThomas Huth #define INPUT_TEXT2 "Zabcdefghijklmnopqrstuvwx"
21da668aa1SThomas Huth #define INPUT_TEXT3 "yz0123456789"
22da668aa1SThomas Huth #define INPUT_TEXT INPUT_TEXT1 \
23da668aa1SThomas Huth               INPUT_TEXT2 \
24da668aa1SThomas Huth               INPUT_TEXT3
25da668aa1SThomas Huth 
26da668aa1SThomas Huth #define KEY "monkey monkey monkey monkey"
27da668aa1SThomas Huth 
28da668aa1SThomas Huth typedef struct QCryptoHmacTestData QCryptoHmacTestData;
29da668aa1SThomas Huth struct QCryptoHmacTestData {
30da668aa1SThomas Huth     QCryptoHashAlgorithm alg;
31da668aa1SThomas Huth     const char *hex_digest;
32da668aa1SThomas Huth };
33da668aa1SThomas Huth 
34da668aa1SThomas Huth static QCryptoHmacTestData test_data[] = {
35da668aa1SThomas Huth     {
36da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_MD5,
37da668aa1SThomas Huth         .hex_digest =
38da668aa1SThomas Huth             "ede9cb83679ba82d88fbeae865b3f8fc",
39da668aa1SThomas Huth     },
40da668aa1SThomas Huth     {
41da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_SHA1,
42da668aa1SThomas Huth         .hex_digest =
43da668aa1SThomas Huth             "c7b5a631e3aac975c4ededfcd346e469"
44da668aa1SThomas Huth             "dbc5f2d1",
45da668aa1SThomas Huth     },
46da668aa1SThomas Huth     {
47da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_SHA224,
48da668aa1SThomas Huth         .hex_digest =
49da668aa1SThomas Huth             "5f768179dbb29ca722875d0f461a2e2f"
50da668aa1SThomas Huth             "597d0210340a84df1a8e9c63",
51da668aa1SThomas Huth     },
52da668aa1SThomas Huth     {
53da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_SHA256,
54da668aa1SThomas Huth         .hex_digest =
55da668aa1SThomas Huth             "3798f363c57afa6edaffe39016ca7bad"
56da668aa1SThomas Huth             "efd1e670afb0e3987194307dec3197db",
57da668aa1SThomas Huth     },
58da668aa1SThomas Huth     {
59da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_SHA384,
60da668aa1SThomas Huth         .hex_digest =
61da668aa1SThomas Huth             "d218680a6032d33dccd9882d6a6a7164"
62da668aa1SThomas Huth             "64f26623be257a9b2919b185294f4a49"
63da668aa1SThomas Huth             "9e54b190bfd6bc5cedd2cd05c7e65e82",
64da668aa1SThomas Huth     },
65da668aa1SThomas Huth     {
66da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_SHA512,
67da668aa1SThomas Huth         .hex_digest =
68da668aa1SThomas Huth             "835a4f5b3750b4c1fccfa88da2f746a4"
69da668aa1SThomas Huth             "900160c9f18964309bb736c13b59491b"
70da668aa1SThomas Huth             "8e32d37b724cc5aebb0f554c6338a3b5"
71da668aa1SThomas Huth             "94c4ba26862b2dadb59b7ede1d08d53e",
72da668aa1SThomas Huth     },
73da668aa1SThomas Huth     {
74da668aa1SThomas Huth         .alg = QCRYPTO_HASH_ALG_RIPEMD160,
75da668aa1SThomas Huth         .hex_digest =
76da668aa1SThomas Huth             "94964ed4c1155b62b668c241d67279e5"
77da668aa1SThomas Huth             "8a711676",
78da668aa1SThomas Huth     },
79da668aa1SThomas Huth };
80da668aa1SThomas Huth 
81da668aa1SThomas Huth static const char hex[] = "0123456789abcdef";
82da668aa1SThomas Huth 
test_hmac_alloc(void)83da668aa1SThomas Huth static void test_hmac_alloc(void)
84da668aa1SThomas Huth {
85da668aa1SThomas Huth     size_t i;
86da668aa1SThomas Huth 
87da668aa1SThomas Huth     for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
88da668aa1SThomas Huth         QCryptoHmacTestData *data = &test_data[i];
89da668aa1SThomas Huth         QCryptoHmac *hmac = NULL;
90da668aa1SThomas Huth         uint8_t *result = NULL;
91da668aa1SThomas Huth         size_t resultlen = 0;
92da668aa1SThomas Huth         const char *exp_output = NULL;
93da668aa1SThomas Huth         int ret;
94da668aa1SThomas Huth         size_t j;
95da668aa1SThomas Huth 
96da668aa1SThomas Huth         if (!qcrypto_hmac_supports(data->alg)) {
97da668aa1SThomas Huth             return;
98da668aa1SThomas Huth         }
99da668aa1SThomas Huth 
100da668aa1SThomas Huth         exp_output = data->hex_digest;
101da668aa1SThomas Huth 
102da668aa1SThomas Huth         hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
103*7ea450b0SDaniel P. Berrangé                                 strlen(KEY), &error_fatal);
104da668aa1SThomas Huth         g_assert(hmac != NULL);
105da668aa1SThomas Huth 
106da668aa1SThomas Huth         ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
107da668aa1SThomas Huth                                  strlen(INPUT_TEXT), &result,
108*7ea450b0SDaniel P. Berrangé                                  &resultlen, &error_fatal);
109da668aa1SThomas Huth         g_assert(ret == 0);
110da668aa1SThomas Huth 
111da668aa1SThomas Huth         for (j = 0; j < resultlen; j++) {
112da668aa1SThomas Huth             g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
113da668aa1SThomas Huth             g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
114da668aa1SThomas Huth         }
115da668aa1SThomas Huth 
116da668aa1SThomas Huth         qcrypto_hmac_free(hmac);
117da668aa1SThomas Huth 
118da668aa1SThomas Huth         g_free(result);
119da668aa1SThomas Huth     }
120da668aa1SThomas Huth }
121da668aa1SThomas Huth 
test_hmac_prealloc(void)122da668aa1SThomas Huth static void test_hmac_prealloc(void)
123da668aa1SThomas Huth {
124da668aa1SThomas Huth     size_t i;
125da668aa1SThomas Huth 
126da668aa1SThomas Huth     for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
127da668aa1SThomas Huth         QCryptoHmacTestData *data = &test_data[i];
128da668aa1SThomas Huth         QCryptoHmac *hmac = NULL;
129da668aa1SThomas Huth         uint8_t *result = NULL;
130da668aa1SThomas Huth         size_t resultlen = 0;
131da668aa1SThomas Huth         const char *exp_output = NULL;
132da668aa1SThomas Huth         int ret;
133da668aa1SThomas Huth         size_t j;
134da668aa1SThomas Huth 
135da668aa1SThomas Huth         if (!qcrypto_hmac_supports(data->alg)) {
136da668aa1SThomas Huth             return;
137da668aa1SThomas Huth         }
138da668aa1SThomas Huth 
139da668aa1SThomas Huth         exp_output = data->hex_digest;
140da668aa1SThomas Huth 
141da668aa1SThomas Huth         resultlen = strlen(exp_output) / 2;
142da668aa1SThomas Huth         result = g_new0(uint8_t, resultlen);
143da668aa1SThomas Huth 
144da668aa1SThomas Huth         hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
145*7ea450b0SDaniel P. Berrangé                                 strlen(KEY), &error_fatal);
146da668aa1SThomas Huth         g_assert(hmac != NULL);
147da668aa1SThomas Huth 
148da668aa1SThomas Huth         ret = qcrypto_hmac_bytes(hmac, (const char *)INPUT_TEXT,
149da668aa1SThomas Huth                                  strlen(INPUT_TEXT), &result,
150*7ea450b0SDaniel P. Berrangé                                  &resultlen, &error_fatal);
151da668aa1SThomas Huth         g_assert(ret == 0);
152da668aa1SThomas Huth 
153da668aa1SThomas Huth         exp_output = data->hex_digest;
154da668aa1SThomas Huth         for (j = 0; j < resultlen; j++) {
155da668aa1SThomas Huth             g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
156da668aa1SThomas Huth             g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
157da668aa1SThomas Huth         }
158da668aa1SThomas Huth 
159da668aa1SThomas Huth         qcrypto_hmac_free(hmac);
160da668aa1SThomas Huth 
161da668aa1SThomas Huth         g_free(result);
162da668aa1SThomas Huth     }
163da668aa1SThomas Huth }
164da668aa1SThomas Huth 
test_hmac_iov(void)165da668aa1SThomas Huth static void test_hmac_iov(void)
166da668aa1SThomas Huth {
167da668aa1SThomas Huth     size_t i;
168da668aa1SThomas Huth 
169da668aa1SThomas Huth     for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
170da668aa1SThomas Huth         QCryptoHmacTestData *data = &test_data[i];
171da668aa1SThomas Huth         QCryptoHmac *hmac = NULL;
172da668aa1SThomas Huth         uint8_t *result = NULL;
173da668aa1SThomas Huth         size_t resultlen = 0;
174da668aa1SThomas Huth         const char *exp_output = NULL;
175da668aa1SThomas Huth         int ret;
176da668aa1SThomas Huth         size_t j;
177da668aa1SThomas Huth         struct iovec iov[3] = {
178da668aa1SThomas Huth             { .iov_base = (char *)INPUT_TEXT1, .iov_len = strlen(INPUT_TEXT1) },
179da668aa1SThomas Huth             { .iov_base = (char *)INPUT_TEXT2, .iov_len = strlen(INPUT_TEXT2) },
180da668aa1SThomas Huth             { .iov_base = (char *)INPUT_TEXT3, .iov_len = strlen(INPUT_TEXT3) },
181da668aa1SThomas Huth         };
182da668aa1SThomas Huth 
183da668aa1SThomas Huth         if (!qcrypto_hmac_supports(data->alg)) {
184da668aa1SThomas Huth             return;
185da668aa1SThomas Huth         }
186da668aa1SThomas Huth 
187da668aa1SThomas Huth         exp_output = data->hex_digest;
188da668aa1SThomas Huth 
189da668aa1SThomas Huth         hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
190*7ea450b0SDaniel P. Berrangé                                 strlen(KEY), &error_fatal);
191da668aa1SThomas Huth         g_assert(hmac != NULL);
192da668aa1SThomas Huth 
193da668aa1SThomas Huth         ret = qcrypto_hmac_bytesv(hmac, iov, 3, &result,
194*7ea450b0SDaniel P. Berrangé                                   &resultlen, &error_fatal);
195da668aa1SThomas Huth         g_assert(ret == 0);
196da668aa1SThomas Huth 
197da668aa1SThomas Huth         for (j = 0; j < resultlen; j++) {
198da668aa1SThomas Huth             g_assert(exp_output[j * 2] == hex[(result[j] >> 4) & 0xf]);
199da668aa1SThomas Huth             g_assert(exp_output[j * 2 + 1] == hex[result[j] & 0xf]);
200da668aa1SThomas Huth         }
201da668aa1SThomas Huth 
202da668aa1SThomas Huth         qcrypto_hmac_free(hmac);
203da668aa1SThomas Huth 
204da668aa1SThomas Huth         g_free(result);
205da668aa1SThomas Huth     }
206da668aa1SThomas Huth }
207da668aa1SThomas Huth 
test_hmac_digest(void)208da668aa1SThomas Huth static void test_hmac_digest(void)
209da668aa1SThomas Huth {
210da668aa1SThomas Huth     size_t i;
211da668aa1SThomas Huth 
212da668aa1SThomas Huth     for (i = 0; i < G_N_ELEMENTS(test_data); i++) {
213da668aa1SThomas Huth         QCryptoHmacTestData *data = &test_data[i];
214da668aa1SThomas Huth         QCryptoHmac *hmac = NULL;
215da668aa1SThomas Huth         uint8_t *result = NULL;
216da668aa1SThomas Huth         const char *exp_output = NULL;
217da668aa1SThomas Huth         int ret;
218da668aa1SThomas Huth 
219da668aa1SThomas Huth         if (!qcrypto_hmac_supports(data->alg)) {
220da668aa1SThomas Huth             return;
221da668aa1SThomas Huth         }
222da668aa1SThomas Huth 
223da668aa1SThomas Huth         exp_output = data->hex_digest;
224da668aa1SThomas Huth 
225da668aa1SThomas Huth         hmac = qcrypto_hmac_new(data->alg, (const uint8_t *)KEY,
226*7ea450b0SDaniel P. Berrangé                                 strlen(KEY), &error_fatal);
227da668aa1SThomas Huth         g_assert(hmac != NULL);
228da668aa1SThomas Huth 
229da668aa1SThomas Huth         ret = qcrypto_hmac_digest(hmac, (const char *)INPUT_TEXT,
230da668aa1SThomas Huth                                   strlen(INPUT_TEXT), (char **)&result,
231*7ea450b0SDaniel P. Berrangé                                   &error_fatal);
232da668aa1SThomas Huth         g_assert(ret == 0);
233da668aa1SThomas Huth 
234da668aa1SThomas Huth         g_assert_cmpstr((const char *)result, ==, exp_output);
235da668aa1SThomas Huth 
236da668aa1SThomas Huth         qcrypto_hmac_free(hmac);
237da668aa1SThomas Huth 
238da668aa1SThomas Huth         g_free(result);
239da668aa1SThomas Huth     }
240da668aa1SThomas Huth }
241da668aa1SThomas Huth 
main(int argc,char ** argv)242da668aa1SThomas Huth int main(int argc, char **argv)
243da668aa1SThomas Huth {
244da668aa1SThomas Huth     g_test_init(&argc, &argv, NULL);
245da668aa1SThomas Huth 
246da668aa1SThomas Huth     g_assert(qcrypto_init(NULL) == 0);
247da668aa1SThomas Huth 
248da668aa1SThomas Huth     g_test_add_func("/crypto/hmac/iov", test_hmac_iov);
249da668aa1SThomas Huth     g_test_add_func("/crypto/hmac/alloc", test_hmac_alloc);
250da668aa1SThomas Huth     g_test_add_func("/crypto/hmac/prealloc", test_hmac_prealloc);
251da668aa1SThomas Huth     g_test_add_func("/crypto/hmac/digest", test_hmac_digest);
252da668aa1SThomas Huth 
253da668aa1SThomas Huth     return g_test_run();
254da668aa1SThomas Huth }
255