mirror of
				https://github.com/Mbed-TLS/mbedtls.git
				synced 2025-10-30 10:45:34 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			399 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			399 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| /* BEGIN_HEADER */
 | |
| #include <polarssl/md2.h>
 | |
| #include <polarssl/md4.h>
 | |
| #include <polarssl/md5.h>
 | |
| #include <polarssl/ripemd160.h>
 | |
| /* END_HEADER */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C */
 | |
| void md2_text( char *text_src_string, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[100];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
 | |
| 
 | |
|     md2( src_str, strlen( (char *) src_str ), output );
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C */
 | |
| void md4_text( char *text_src_string, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[100];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
 | |
| 
 | |
|     md4( src_str, strlen( (char *) src_str ), output );
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C */
 | |
| void md5_text( char *text_src_string, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[100];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
 | |
| 
 | |
|     md5( src_str, strlen( (char *) src_str ), output );
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C */
 | |
| void ripemd160_text( char *text_src_string, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[100];
 | |
|     unsigned char hash_str[41];
 | |
|     unsigned char output[20];
 | |
| 
 | |
|     memset(src_str, 0x00, sizeof src_str);
 | |
|     memset(hash_str, 0x00, sizeof hash_str);
 | |
|     memset(output, 0x00, sizeof output);
 | |
| 
 | |
|     strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 );
 | |
| 
 | |
|     ripemd160( src_str, strlen( (char *) src_str ), output );
 | |
|     hexify( hash_str, output, sizeof output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C */
 | |
| void md2_hmac( int trunc_size, char *hex_key_string, char *hex_src_string,
 | |
|                char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[200];
 | |
|     unsigned char key_str[200];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
|     int key_len, src_len;
 | |
|     md2_context ctx;
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( key_str, 0x00, sizeof key_str );
 | |
| 
 | |
|     key_len = unhexify( key_str, hex_key_string );
 | |
|     src_len = unhexify( src_str, hex_src_string );
 | |
| 
 | |
|     /* Test the all-in-one interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md2_hmac( key_str, key_len, src_str, src_len, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Also test the "streaming" interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
|     memset( &ctx, 0x00, sizeof ctx );
 | |
| 
 | |
|     md2_hmac_starts( &ctx, key_str, key_len );
 | |
|     md2_hmac_update( &ctx, src_str, 0 );
 | |
|     md2_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md2_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md2_hmac_update( &ctx, src_str + src_len, 0 );
 | |
|     md2_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Again, to test hmac_reset() */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md2_hmac_reset( &ctx );
 | |
|     md2_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md2_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md2_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C */
 | |
| void md4_hmac( int trunc_size, char *hex_key_string, char *hex_src_string,
 | |
|                char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[200];
 | |
|     unsigned char key_str[200];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
|     int key_len, src_len;
 | |
|     md4_context ctx;
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( key_str, 0x00, sizeof key_str );
 | |
| 
 | |
|     key_len = unhexify( key_str, hex_key_string );
 | |
|     src_len = unhexify( src_str, hex_src_string );
 | |
| 
 | |
|     /* Test the all-in-one interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md4_hmac( key_str, key_len, src_str, src_len, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Also test the "streaming" interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
|     memset( &ctx, 0x00, sizeof ctx );
 | |
| 
 | |
|     md4_hmac_starts( &ctx, key_str, key_len );
 | |
|     md4_hmac_update( &ctx, src_str, 0 );
 | |
|     md4_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md4_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md4_hmac_update( &ctx, src_str + src_len, 0 );
 | |
|     md4_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Again, to test hmac_reset() */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md4_hmac_reset( &ctx );
 | |
|     md4_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md4_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md4_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C */
 | |
| void md5_hmac( int trunc_size, char *hex_key_string, char *hex_src_string,
 | |
|                char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[200];
 | |
|     unsigned char key_str[200];
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
|     int key_len, src_len;
 | |
|     md5_context ctx;
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( key_str, 0x00, sizeof key_str );
 | |
| 
 | |
|     key_len = unhexify( key_str, hex_key_string );
 | |
|     src_len = unhexify( src_str, hex_src_string );
 | |
| 
 | |
|     /* Test the all-in-one interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md5_hmac( key_str, key_len, src_str, src_len, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Also test the "streaming" interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
|     memset( &ctx, 0x00, sizeof ctx );
 | |
| 
 | |
|     md5_hmac_starts( &ctx, key_str, key_len );
 | |
|     md5_hmac_update( &ctx, src_str, 0 );
 | |
|     md5_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md5_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md5_hmac_update( &ctx, src_str + src_len, 0 );
 | |
|     md5_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Again, to test hmac_reset() */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md5_hmac_reset( &ctx );
 | |
|     md5_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     md5_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     md5_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C */
 | |
| void ripemd160_hmac( int trunc_size, char *hex_key_string, char *hex_src_string,
 | |
|                      char *hex_hash_string )
 | |
| {
 | |
|     unsigned char src_str[200];
 | |
|     unsigned char key_str[200];
 | |
|     unsigned char hash_str[41];
 | |
|     unsigned char output[20];
 | |
|     int key_len, src_len;
 | |
|     ripemd160_context ctx;
 | |
| 
 | |
|     memset( src_str, 0x00, sizeof src_str );
 | |
|     memset( key_str, 0x00, sizeof key_str );
 | |
| 
 | |
|     key_len = unhexify( key_str, hex_key_string );
 | |
|     src_len = unhexify( src_str, hex_src_string );
 | |
| 
 | |
|     /* Test the all-in-one interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     ripemd160_hmac( key_str, key_len, src_str, src_len, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Also test the "streaming" interface */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
|     memset( &ctx, 0x00, sizeof ctx );
 | |
| 
 | |
|     ripemd160_hmac_starts( &ctx, key_str, key_len );
 | |
|     ripemd160_hmac_update( &ctx, src_str, 0 );
 | |
|     ripemd160_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     ripemd160_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     ripemd160_hmac_update( &ctx, src_str + src_len, 0 );
 | |
|     ripemd160_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| 
 | |
|     /* Again, to test hmac_reset() */
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     ripemd160_hmac_reset( &ctx );
 | |
|     ripemd160_hmac_update( &ctx, src_str, src_len / 2 );
 | |
|     ripemd160_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 );
 | |
|     ripemd160_hmac_finish( &ctx, output );
 | |
| 
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
|     TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C:POLARSSL_FS_IO */
 | |
| void md2_file( char *filename, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md2_file( filename, output);
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C:POLARSSL_FS_IO */
 | |
| void md4_file( char *filename, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md4_file( filename, output);
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C:POLARSSL_FS_IO */
 | |
| void md5_file( char *filename, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char hash_str[33];
 | |
|     unsigned char output[16];
 | |
| 
 | |
|     memset( hash_str, 0x00, sizeof hash_str );
 | |
|     memset( output, 0x00, sizeof output );
 | |
| 
 | |
|     md5_file( filename, output);
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C:POLARSSL_FS_IO */
 | |
| void ripemd160_file( char *filename, char *hex_hash_string )
 | |
| {
 | |
|     unsigned char hash_str[41];
 | |
|     unsigned char output[20];
 | |
| 
 | |
|     memset(hash_str, 0x00, sizeof hash_str );
 | |
|     memset(output, 0x00, sizeof output );
 | |
| 
 | |
|     ripemd160_file( filename, output);
 | |
|     hexify( hash_str, output, sizeof  output );
 | |
| 
 | |
|     TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C:POLARSSL_SELF_TEST */
 | |
| void md2_selftest()
 | |
| {
 | |
|     TEST_ASSERT( md2_self_test( 0 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C:POLARSSL_SELF_TEST */
 | |
| void md4_selftest()
 | |
| {
 | |
|     TEST_ASSERT( md4_self_test( 0 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C:POLARSSL_SELF_TEST */
 | |
| void md5_selftest()
 | |
| {
 | |
|     TEST_ASSERT( md5_self_test( 0 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 | |
| 
 | |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C:POLARSSL_SELF_TEST */
 | |
| void ripemd160_selftest()
 | |
| {
 | |
|     TEST_ASSERT( ripemd160_self_test( 0 ) == 0 );
 | |
| }
 | |
| /* END_CASE */
 |