| /* BEGIN_HEADER */ |
| #include <polarssl/md2.h> |
| #include <polarssl/md4.h> |
| #include <polarssl/md5.h> |
| #include <polarssl/ripemd160.h> |
| /* END_HEADER */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C */ |
| void md2_text( char *text_src_string, char *hex_hash_string ) |
| { |
| unsigned char src_str[100]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 ); |
| |
| md2( src_str, strlen( (char *) src_str ), output ); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C */ |
| void md4_text( char *text_src_string, char *hex_hash_string ) |
| { |
| unsigned char src_str[100]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 ); |
| |
| md4( src_str, strlen( (char *) src_str ), output ); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C */ |
| void md5_text( char *text_src_string, char *hex_hash_string ) |
| { |
| unsigned char src_str[100]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 ); |
| |
| md5( src_str, strlen( (char *) src_str ), output ); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C */ |
| void ripemd160_text( char *text_src_string, char *hex_hash_string ) |
| { |
| unsigned char src_str[100]; |
| unsigned char hash_str[41]; |
| unsigned char output[20]; |
| |
| memset(src_str, 0x00, sizeof src_str); |
| memset(hash_str, 0x00, sizeof hash_str); |
| memset(output, 0x00, sizeof output); |
| |
| strncpy( (char *) src_str, text_src_string, sizeof(src_str) - 1 ); |
| |
| ripemd160( src_str, strlen( (char *) src_str ), output ); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C */ |
| void md2_hmac( int trunc_size, char *hex_key_string, char *hex_src_string, |
| char *hex_hash_string ) |
| { |
| unsigned char src_str[200]; |
| unsigned char key_str[200]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| int key_len, src_len; |
| md2_context ctx; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( key_str, 0x00, sizeof key_str ); |
| md2_init( &ctx ); |
| |
| key_len = unhexify( key_str, hex_key_string ); |
| src_len = unhexify( src_str, hex_src_string ); |
| |
| /* Test the all-in-one interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md2_hmac( key_str, key_len, src_str, src_len, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Also test the "streaming" interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| memset( &ctx, 0x00, sizeof ctx ); |
| |
| md2_hmac_starts( &ctx, key_str, key_len ); |
| md2_hmac_update( &ctx, src_str, 0 ); |
| md2_hmac_update( &ctx, src_str, src_len / 2 ); |
| md2_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md2_hmac_update( &ctx, src_str + src_len, 0 ); |
| md2_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Again, to test hmac_reset() */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md2_hmac_reset( &ctx ); |
| md2_hmac_update( &ctx, src_str, src_len / 2 ); |
| md2_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md2_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| exit: |
| md2_free( &ctx ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C */ |
| void md4_hmac( int trunc_size, char *hex_key_string, char *hex_src_string, |
| char *hex_hash_string ) |
| { |
| unsigned char src_str[200]; |
| unsigned char key_str[200]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| int key_len, src_len; |
| md4_context ctx; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( key_str, 0x00, sizeof key_str ); |
| md4_init( &ctx ); |
| |
| key_len = unhexify( key_str, hex_key_string ); |
| src_len = unhexify( src_str, hex_src_string ); |
| |
| /* Test the all-in-one interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md4_hmac( key_str, key_len, src_str, src_len, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Also test the "streaming" interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| memset( &ctx, 0x00, sizeof ctx ); |
| |
| md4_hmac_starts( &ctx, key_str, key_len ); |
| md4_hmac_update( &ctx, src_str, 0 ); |
| md4_hmac_update( &ctx, src_str, src_len / 2 ); |
| md4_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md4_hmac_update( &ctx, src_str + src_len, 0 ); |
| md4_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Again, to test hmac_reset() */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md4_hmac_reset( &ctx ); |
| md4_hmac_update( &ctx, src_str, src_len / 2 ); |
| md4_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md4_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| exit: |
| md4_free( &ctx ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C */ |
| void md5_hmac( int trunc_size, char *hex_key_string, char *hex_src_string, |
| char *hex_hash_string ) |
| { |
| unsigned char src_str[200]; |
| unsigned char key_str[200]; |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| int key_len, src_len; |
| md5_context ctx; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( key_str, 0x00, sizeof key_str ); |
| md5_init( &ctx ); |
| |
| key_len = unhexify( key_str, hex_key_string ); |
| src_len = unhexify( src_str, hex_src_string ); |
| |
| /* Test the all-in-one interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md5_hmac( key_str, key_len, src_str, src_len, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Also test the "streaming" interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| memset( &ctx, 0x00, sizeof ctx ); |
| |
| md5_hmac_starts( &ctx, key_str, key_len ); |
| md5_hmac_update( &ctx, src_str, 0 ); |
| md5_hmac_update( &ctx, src_str, src_len / 2 ); |
| md5_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md5_hmac_update( &ctx, src_str + src_len, 0 ); |
| md5_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Again, to test hmac_reset() */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md5_hmac_reset( &ctx ); |
| md5_hmac_update( &ctx, src_str, src_len / 2 ); |
| md5_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| md5_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| exit: |
| md5_free( &ctx ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C */ |
| void ripemd160_hmac( int trunc_size, char *hex_key_string, char *hex_src_string, |
| char *hex_hash_string ) |
| { |
| unsigned char src_str[200]; |
| unsigned char key_str[200]; |
| unsigned char hash_str[41]; |
| unsigned char output[20]; |
| int key_len, src_len; |
| ripemd160_context ctx; |
| |
| memset( src_str, 0x00, sizeof src_str ); |
| memset( key_str, 0x00, sizeof key_str ); |
| ripemd160_init( &ctx ); |
| |
| key_len = unhexify( key_str, hex_key_string ); |
| src_len = unhexify( src_str, hex_src_string ); |
| |
| /* Test the all-in-one interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| ripemd160_hmac( key_str, key_len, src_str, src_len, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Also test the "streaming" interface */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| memset( &ctx, 0x00, sizeof ctx ); |
| |
| ripemd160_hmac_starts( &ctx, key_str, key_len ); |
| ripemd160_hmac_update( &ctx, src_str, 0 ); |
| ripemd160_hmac_update( &ctx, src_str, src_len / 2 ); |
| ripemd160_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| ripemd160_hmac_update( &ctx, src_str + src_len, 0 ); |
| ripemd160_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| /* Again, to test hmac_reset() */ |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| ripemd160_hmac_reset( &ctx ); |
| ripemd160_hmac_update( &ctx, src_str, src_len / 2 ); |
| ripemd160_hmac_update( &ctx, src_str + src_len / 2, src_len - src_len / 2 ); |
| ripemd160_hmac_finish( &ctx, output ); |
| |
| hexify( hash_str, output, sizeof output ); |
| TEST_ASSERT( strncmp( (char *) hash_str, hex_hash_string, trunc_size * 2 ) == 0 ); |
| |
| exit: |
| ripemd160_free( &ctx ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C:POLARSSL_FS_IO */ |
| void md2_file( char *filename, char *hex_hash_string ) |
| { |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md2_file( filename, output); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C:POLARSSL_FS_IO */ |
| void md4_file( char *filename, char *hex_hash_string ) |
| { |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md4_file( filename, output); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C:POLARSSL_FS_IO */ |
| void md5_file( char *filename, char *hex_hash_string ) |
| { |
| unsigned char hash_str[33]; |
| unsigned char output[16]; |
| |
| memset( hash_str, 0x00, sizeof hash_str ); |
| memset( output, 0x00, sizeof output ); |
| |
| md5_file( filename, output); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C:POLARSSL_FS_IO */ |
| void ripemd160_file( char *filename, char *hex_hash_string ) |
| { |
| unsigned char hash_str[41]; |
| unsigned char output[20]; |
| |
| memset(hash_str, 0x00, sizeof hash_str ); |
| memset(output, 0x00, sizeof output ); |
| |
| ripemd160_file( filename, output); |
| hexify( hash_str, output, sizeof output ); |
| |
| TEST_ASSERT( strcmp( (char *) hash_str, hex_hash_string ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD2_C:POLARSSL_SELF_TEST */ |
| void md2_selftest() |
| { |
| TEST_ASSERT( md2_self_test( 0 ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD4_C:POLARSSL_SELF_TEST */ |
| void md4_selftest() |
| { |
| TEST_ASSERT( md4_self_test( 0 ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_MD5_C:POLARSSL_SELF_TEST */ |
| void md5_selftest() |
| { |
| TEST_ASSERT( md5_self_test( 0 ) == 0 ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:POLARSSL_RIPEMD160_C:POLARSSL_SELF_TEST */ |
| void ripemd160_selftest() |
| { |
| TEST_ASSERT( ripemd160_self_test( 0 ) == 0 ); |
| } |
| /* END_CASE */ |