mirror of
https://gitlab.nic.cz/labs/bird.git
synced 2024-12-23 10:11:53 +00:00
Add HMAC-SHA384 and HMAC-SHA512 (both not work!)
This commit is contained in:
parent
e7ac4efd54
commit
71adc0f9e2
122
lib/sha512.c
122
lib/sha512.c
@ -491,3 +491,125 @@ sha512_final(sha512_context *ctx)
|
||||
|
||||
return ctx->bctx.buf;
|
||||
}
|
||||
|
||||
/**
|
||||
* SHA512-HMAC
|
||||
*/
|
||||
|
||||
static void
|
||||
sha512_hash_buffer(byte *outbuf, const byte *buffer, size_t length)
|
||||
{
|
||||
sha512_context hd_tmp;
|
||||
|
||||
sha512_init(&hd_tmp);
|
||||
sha512_update(&hd_tmp, buffer, length);
|
||||
memcpy(outbuf, sha512_final(&hd_tmp), SHA512_SIZE);
|
||||
}
|
||||
|
||||
void
|
||||
sha512_hmac_init(sha512_hmac_context *ctx, const byte *key, size_t keylen)
|
||||
{
|
||||
byte keybuf[SHA512_BLOCK_SIZE], buf[SHA512_BLOCK_SIZE];
|
||||
|
||||
// Hash the key if necessary
|
||||
if (keylen <= SHA512_BLOCK_SIZE)
|
||||
{
|
||||
memcpy(keybuf, key, keylen);
|
||||
bzero(keybuf + keylen, SHA512_BLOCK_SIZE - keylen);
|
||||
}
|
||||
else
|
||||
{
|
||||
sha512_hash_buffer(keybuf, key, keylen);
|
||||
bzero(keybuf + SHA512_SIZE, SHA512_BLOCK_SIZE - SHA512_SIZE);
|
||||
}
|
||||
|
||||
// Initialize the inner digest
|
||||
sha512_init(&ctx->ictx);
|
||||
int i;
|
||||
for (i = 0; i < SHA512_BLOCK_SIZE; i++)
|
||||
buf[i] = keybuf[i] ^ 0x36;
|
||||
sha512_update(&ctx->ictx, buf, SHA512_BLOCK_SIZE);
|
||||
|
||||
// Initialize the outer digest
|
||||
sha512_init(&ctx->octx);
|
||||
for (i = 0; i < SHA512_BLOCK_SIZE; i++)
|
||||
buf[i] = keybuf[i] ^ 0x5c;
|
||||
sha512_update(&ctx->octx, buf, SHA512_BLOCK_SIZE);
|
||||
}
|
||||
|
||||
void sha512_hmac_update(sha512_hmac_context *ctx, const byte *buf, size_t buflen)
|
||||
{
|
||||
// Just update the inner digest
|
||||
sha512_update(&ctx->ictx, buf, buflen);
|
||||
}
|
||||
|
||||
byte *sha512_hmac_final(sha512_hmac_context *hd)
|
||||
{
|
||||
// Finish the inner digest
|
||||
byte *isha = sha512_final(&hd->ictx);
|
||||
|
||||
// Finish the outer digest
|
||||
sha512_update(&hd->octx, isha, SHA512_SIZE);
|
||||
return sha512_final(&hd->octx);
|
||||
}
|
||||
|
||||
/**
|
||||
* SHA384-HMAC
|
||||
*/
|
||||
|
||||
static void
|
||||
sha384_hash_buffer(byte *outbuf, const byte *buffer, size_t length)
|
||||
{
|
||||
sha384_context hd_tmp;
|
||||
|
||||
sha384_init(&hd_tmp);
|
||||
sha384_update(&hd_tmp, buffer, length);
|
||||
memcpy(outbuf, sha384_final(&hd_tmp), SHA384_SIZE);
|
||||
}
|
||||
|
||||
void
|
||||
sha384_hmac_init(sha384_hmac_context *ctx, const byte *key, size_t keylen)
|
||||
{
|
||||
byte keybuf[SHA384_BLOCK_SIZE], buf[SHA384_BLOCK_SIZE];
|
||||
|
||||
// Hash the key if necessary
|
||||
if (keylen <= SHA384_BLOCK_SIZE)
|
||||
{
|
||||
memcpy(keybuf, key, keylen);
|
||||
bzero(keybuf + keylen, SHA384_BLOCK_SIZE - keylen);
|
||||
}
|
||||
else
|
||||
{
|
||||
sha384_hash_buffer(keybuf, key, keylen);
|
||||
bzero(keybuf + SHA384_SIZE, SHA384_BLOCK_SIZE - SHA384_SIZE);
|
||||
}
|
||||
|
||||
// Initialize the inner digest
|
||||
sha384_init(&ctx->ictx);
|
||||
int i;
|
||||
for (i = 0; i < SHA384_BLOCK_SIZE; i++)
|
||||
buf[i] = keybuf[i] ^ 0x36;
|
||||
sha384_update(&ctx->ictx, buf, SHA384_BLOCK_SIZE);
|
||||
|
||||
// Initialize the outer digest
|
||||
sha384_init(&ctx->octx);
|
||||
for (i = 0; i < SHA384_BLOCK_SIZE; i++)
|
||||
buf[i] = keybuf[i] ^ 0x5c;
|
||||
sha384_update(&ctx->octx, buf, SHA384_BLOCK_SIZE);
|
||||
}
|
||||
|
||||
void sha384_hmac_update(sha384_hmac_context *ctx, const byte *buf, size_t buflen)
|
||||
{
|
||||
// Just update the inner digest
|
||||
sha384_update(&ctx->ictx, buf, buflen);
|
||||
}
|
||||
|
||||
byte *sha384_hmac_final(sha384_hmac_context *hd)
|
||||
{
|
||||
// Finish the inner digest
|
||||
byte *isha = sha384_final(&hd->ictx);
|
||||
|
||||
// Finish the outer digest
|
||||
sha384_update(&hd->octx, isha, SHA384_SIZE);
|
||||
return sha384_final(&hd->octx);
|
||||
}
|
||||
|
29
lib/sha512.h
29
lib/sha512.h
@ -15,11 +15,13 @@
|
||||
#include "sysdep/config.h"
|
||||
#include "lib/sha256.h"
|
||||
|
||||
#define SHA512_SIZE 64
|
||||
#define SHA512_HEX_SIZE 129
|
||||
#define SHA384_SIZE 48
|
||||
#define SHA384_HEX_SIZE 97
|
||||
#define SHA384_BLOCK_SIZE 128
|
||||
|
||||
#define SHA384_SIZE 48
|
||||
#define SHA384_HEX_SIZE 97
|
||||
#define SHA512_SIZE 64
|
||||
#define SHA512_HEX_SIZE 129
|
||||
#define SHA512_BLOCK_SIZE 128
|
||||
|
||||
typedef struct
|
||||
{
|
||||
@ -51,4 +53,23 @@ byte* sha384_final(sha384_context *ctx)
|
||||
|
||||
static unsigned int sha512_transform(void *context, const unsigned char *data, size_t nblks);
|
||||
|
||||
/**
|
||||
* HMAC-SHA512, HMAC-SHA384
|
||||
*/
|
||||
typedef struct
|
||||
{
|
||||
sha512_context ictx;
|
||||
sha512_context octx;
|
||||
} sha512_hmac_context;
|
||||
typedef sha512_hmac_context sha384_hmac_context;
|
||||
|
||||
void sha512_hmac_init(sha512_hmac_context *ctx, const byte *key, size_t keylen);
|
||||
void sha384_hmac_init(sha384_hmac_context *ctx, const byte *key, size_t keylen);
|
||||
|
||||
void sha512_hmac_update(sha512_hmac_context *ctx, const byte *buf, size_t buflen);
|
||||
void sha384_hmac_update(sha384_hmac_context *ctx, const byte *buf, size_t buflen);
|
||||
|
||||
byte *sha512_hmac_final(sha512_hmac_context *ctx);
|
||||
byte *sha384_hmac_final(sha384_hmac_context *ctx);
|
||||
|
||||
#endif /* _BIRD_SHA512_H_ */
|
||||
|
@ -111,6 +111,335 @@ t_sha384(void)
|
||||
return BT_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
t_sha512_concating(void)
|
||||
{
|
||||
char hash_a[SHA512_HEX_SIZE];
|
||||
char hash_b[SHA512_HEX_SIZE];
|
||||
|
||||
char *str_a = "a" "bb" "ccc" "dddd" "eeeee" "ffffff";
|
||||
char *str_b1 = "a" ;
|
||||
char *str_b2 = "bb" ;
|
||||
char *str_b3 = "ccc" ;
|
||||
char *str_b4 = "dddd" ;
|
||||
char *str_b5 = "eeeee" ;
|
||||
char *str_b6 = "ffffff";
|
||||
|
||||
sha512_context ctx_a;
|
||||
sha512_init(&ctx_a);
|
||||
sha512_update(&ctx_a, str_a, strlen(str_a));
|
||||
byte *hash_a_ = sha512_final(&ctx_a);
|
||||
byte_to_hex(hash_a, hash_a_, SHA512_SIZE);
|
||||
|
||||
sha512_context ctx_b;
|
||||
sha512_init(&ctx_b);
|
||||
sha512_update(&ctx_b, str_b1, strlen(str_b1));
|
||||
sha512_update(&ctx_b, str_b2, strlen(str_b2));
|
||||
sha512_update(&ctx_b, str_b3, strlen(str_b3));
|
||||
sha512_update(&ctx_b, str_b4, strlen(str_b4));
|
||||
sha512_update(&ctx_b, str_b5, strlen(str_b5));
|
||||
sha512_update(&ctx_b, str_b6, strlen(str_b6));
|
||||
byte *hash_b_ = sha512_final(&ctx_b);
|
||||
byte_to_hex(hash_b, hash_b_, SHA512_SIZE);
|
||||
|
||||
int are_hash_a_b_equal = (strncmp(hash_a, hash_b, sizeof(hash_a)) == 0);
|
||||
bt_assert_msg(are_hash_a_b_equal, "Hashes are different: \n A: %s \n B: %s ", hash_a, hash_b);
|
||||
|
||||
return BT_SUCCESS;
|
||||
}
|
||||
|
||||
#define HMAC_BUFFER_SIZE 160
|
||||
struct hmac_data_in {
|
||||
byte key[HMAC_BUFFER_SIZE];
|
||||
uint key_len;
|
||||
byte data[HMAC_BUFFER_SIZE];
|
||||
uint data_len;
|
||||
};
|
||||
|
||||
static void
|
||||
get_sha512_hmac(const struct hmac_data_in in, char (*out_hash)[SHA512_HEX_SIZE])
|
||||
{
|
||||
sha512_hmac_context ctx;
|
||||
sha512_hmac_init(&ctx, in.key, in.key_len);
|
||||
sha512_hmac_update(&ctx, in.data, in.data_len);
|
||||
byte *hash_byte = sha512_hmac_final(&ctx);
|
||||
byte_to_hex((char*)out_hash, hash_byte, SHA512_SIZE);
|
||||
}
|
||||
|
||||
static void
|
||||
get_sha384_hmac(const struct hmac_data_in in, char (*out_hash)[SHA384_HEX_SIZE])
|
||||
{
|
||||
sha384_hmac_context ctx;
|
||||
sha384_hmac_init(&ctx, in.key, in.key_len);
|
||||
sha384_hmac_update(&ctx, in.data, in.data_len);
|
||||
byte *hash_byte = sha384_hmac_final(&ctx);
|
||||
byte_to_hex((char*)out_hash, hash_byte, SHA384_SIZE);
|
||||
}
|
||||
|
||||
static int
|
||||
t_sha512_hmac(void)
|
||||
{
|
||||
struct in_out {
|
||||
struct hmac_data_in in;
|
||||
char out[SHA512_HEX_SIZE];
|
||||
} in_out[] = {
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
|
||||
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = "Hi There",
|
||||
.data_len = 8,
|
||||
},
|
||||
.out = "87aa7cdea5ef619d4ff0b4241a1d6cb02379f4e2ce4ec2787ad0b30545e17cdedaa833b7d6b8a702038b274eaea3f4e4be9d914eeb61f1702e696c203a126854",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = "Jefe",
|
||||
.key_len = 4,
|
||||
.data = "what do ya want for nothing?",
|
||||
.data_len = 28,
|
||||
},
|
||||
.out = "164b7a7bfcf819e2e395fbe73b56e0a387bd64222e831fd610270cd7ea2505549758bf75c05a994a6d034f65f8f0e6fdcaeab1a34d4a6b4b636e070a38bce737",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = {
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
},
|
||||
.data_len = 50,
|
||||
},
|
||||
.out = "fa73b0089d56a284efb0f0756c890be9b1b5dbdd8ee81a3655f83e33b2279d39bf3e848279a722c806b485a47e67c807b946a337bee8942674278859e13292fb",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a,
|
||||
0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14,
|
||||
0x15, 0x16, 0x17, 0x18, 0x19,
|
||||
},
|
||||
.key_len = 25,
|
||||
.data = {
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
},
|
||||
.data_len = 50,
|
||||
},
|
||||
.out = "b0ba465637458c6990e5a8c5f61d4af7e576d97ff94b872de76f8050361ee3dba91ca5c11aa25eb4d679275cc5788063a5f19741120c4f2de2adebeb10a298dd",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
|
||||
0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = "Test With Truncation",
|
||||
.data_len = 20,
|
||||
},
|
||||
.out = "415fad6271580a531d4179bc891d87a6",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa,
|
||||
},
|
||||
.key_len = 131,
|
||||
.data = "Test Using Larger Than Block-Size Key - Hash Key First",
|
||||
.data_len = 54,
|
||||
},
|
||||
.out = "80b24263c7c1a3ebb71493c1dd7be8b49b46d1f41b4aeec1121b013783f8f3526b56d037e05f2598bd0fd2215d6a1e5295e64f73f63f0aec8b915a985d786598",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa,
|
||||
},
|
||||
.key_len = 131,
|
||||
.data = "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
|
||||
.data_len = 152,
|
||||
},
|
||||
.out = "e37b6a775dc87dbaa4dfa9f96e5e3ffddebd71f8867289865df5a32d20cdc944b6022cac3c4982b10d5eeb55c3e4de15134676fb6de0446065c97440fa8c6a58",
|
||||
},
|
||||
};
|
||||
|
||||
bt_assert_fn_in_out(get_sha512_hmac, in_out, NULL, "'%s'");
|
||||
|
||||
return BT_SUCCESS;
|
||||
}
|
||||
|
||||
static int
|
||||
t_sha384_hmac(void)
|
||||
{
|
||||
struct in_out {
|
||||
struct hmac_data_in in;
|
||||
char out[SHA384_HEX_SIZE];
|
||||
} in_out[] = {
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
|
||||
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = "Hi There",
|
||||
.data_len = 8,
|
||||
},
|
||||
.out = "afd03944d84895626b0825f4ab46907f15f9dadbe4101ec682aa034c7cebc59cfaea9ea9076ede7f4af152e8b2fa9cb6",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = "Jefe",
|
||||
.key_len = 4,
|
||||
.data = "what do ya want for nothing?",
|
||||
.data_len = 28,
|
||||
},
|
||||
.out = "af45d2e376484031617f78d2b58a6b1b9c7ef464f5a01b47e42ec3736322445e8e2240ca5e69e2c78b3239ecfab21649",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = {
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
|
||||
},
|
||||
.data_len = 50,
|
||||
},
|
||||
.out = "88062608d3e6ad8a0aa2ace014c8a86f0aa635d947ac9febe83ef4e55966144b2a5ab39dc13814b94e3ab6e101a34f27",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a,
|
||||
0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14,
|
||||
0x15, 0x16, 0x17, 0x18, 0x19,
|
||||
},
|
||||
.key_len = 25,
|
||||
.data = {
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd,
|
||||
},
|
||||
.data_len = 50,
|
||||
},
|
||||
.out = "3e8a69b7783c25851933ab6290af6ca77a9981480850009cc5577c6e1f573b4e6801dd23c4a7d679ccf8a386c674cffb",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
|
||||
0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c,
|
||||
},
|
||||
.key_len = 20,
|
||||
.data = "Test With Truncation",
|
||||
.data_len = 20,
|
||||
},
|
||||
.out = "3abf34c3503b2a23a46efc619baef897",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa,
|
||||
},
|
||||
.key_len = 131,
|
||||
.data = "Test Using Larger Than Block-Size Key - Hash Key First",
|
||||
.data_len = 54,
|
||||
},
|
||||
.out = "4ece084485813e9088d2c63a041bc5b44f9ef1012a2b588f3cd11f05033ac4c60c2ef6ab4030fe8296248df163f44952",
|
||||
},
|
||||
{
|
||||
.in = {
|
||||
.key = {
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
|
||||
0xaa,
|
||||
},
|
||||
.key_len = 131,
|
||||
.data = "This is a test using a larger than block-size key and a larger than block-size data. The key needs to be hashed before being used by the HMAC algorithm.",
|
||||
.data_len = 152,
|
||||
},
|
||||
.out = "4ece084485813e9088d2c63a041bc5b44f9ef1012a2b588f3cd11f05033ac4c60c2ef6ab4030fe8296248df163f44952",
|
||||
},
|
||||
};
|
||||
|
||||
bt_assert_fn_in_out(get_sha384_hmac, in_out, NULL, "'%s'");
|
||||
|
||||
return BT_SUCCESS;
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char *argv[])
|
||||
{
|
||||
@ -118,6 +447,10 @@ main(int argc, char *argv[])
|
||||
|
||||
bt_test_suite(t_sha512, "Testing SHA512");
|
||||
bt_test_suite(t_sha384, "Testing SHA384");
|
||||
bt_test_suite(t_sha512_concating, "Testing concating input string to hash process via sha512_update");
|
||||
|
||||
bt_test_suite(t_sha512_hmac, "Test Suite by RFC 4231");
|
||||
bt_test_suite(t_sha384_hmac, "Test Suite by RFC 4231");
|
||||
|
||||
return bt_end();
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user