aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/testcases
diff options
context:
space:
mode:
Diffstat (limited to 'Source/charon/testcases')
-rw-r--r--Source/charon/testcases/Makefile.testcases4
-rw-r--r--Source/charon/testcases/aes_cbc_crypter_test.c10
-rw-r--r--Source/charon/testcases/hmac_signer_test.c214
-rw-r--r--Source/charon/testcases/hmac_signer_test.h42
-rw-r--r--Source/charon/testcases/testcases.c19
5 files changed, 280 insertions, 9 deletions
diff --git a/Source/charon/testcases/Makefile.testcases b/Source/charon/testcases/Makefile.testcases
index a1087d4e9..bc1a537a9 100644
--- a/Source/charon/testcases/Makefile.testcases
+++ b/Source/charon/testcases/Makefile.testcases
@@ -59,6 +59,10 @@ $(BUILD_DIR)linked_list_test.o : $(TESTCASES_DIR)linked_list_test.c $(TESTCASES_
TEST_OBJS+= $(BUILD_DIR)hmac_test.o
$(BUILD_DIR)hmac_test.o : $(TESTCASES_DIR)hmac_test.c $(TESTCASES_DIR)hmac_test.h
$(CC) $(CFLAGS) -c -o $@ $<
+
+TEST_OBJS+= $(BUILD_DIR)hmac_signer_test.o
+$(BUILD_DIR)hmac_signer_test.o : $(TESTCASES_DIR)hmac_signer_test.c $(TESTCASES_DIR)hmac_signer_test.h
+ $(CC) $(CFLAGS) -c -o $@ $<
TEST_OBJS+= $(BUILD_DIR)scheduler_test.o
$(BUILD_DIR)scheduler_test.o : $(TESTCASES_DIR)scheduler_test.c $(TESTCASES_DIR)scheduler_test.h
diff --git a/Source/charon/testcases/aes_cbc_crypter_test.c b/Source/charon/testcases/aes_cbc_crypter_test.c
index bbb892834..7b6e84417 100644
--- a/Source/charon/testcases/aes_cbc_crypter_test.c
+++ b/Source/charon/testcases/aes_cbc_crypter_test.c
@@ -109,7 +109,8 @@ void test_aes_cbc_crypter(tester_t *tester)
chunk_t data2 = {ptr: plaintext2, len : 32};
chunk_t encrypted2;
chunk_t decrypted2;
-
+
+
crypter = (crypter_t *) aes_cbc_crypter_create(16);
tester->assert_true(tester, (crypter != NULL), "create call test");
@@ -131,7 +132,8 @@ void test_aes_cbc_crypter(tester_t *tester)
logger->log_chunk(logger,RAW,"decrypted :", &decrypted2);
allocator_free_chunk(&decrypted2);
-
+
+ tester->assert_true(tester, (crypter->destroy(crypter) == SUCCESS), "destroy call test");
/*
* Test 3 of RFC3603
@@ -173,7 +175,7 @@ void test_aes_cbc_crypter(tester_t *tester)
chunk_t data3 = {ptr: plaintext3, len : 64};
chunk_t encrypted3;
chunk_t decrypted3;
-
+
crypter = (crypter_t *) aes_cbc_crypter_create(16);
tester->assert_true(tester, (crypter != NULL), "create call test");
@@ -198,10 +200,8 @@ void test_aes_cbc_crypter(tester_t *tester)
tester->assert_true(tester, (crypter->destroy(crypter) == SUCCESS), "destroy call test");
-
-
global_logger_manager->destroy_logger(global_logger_manager,logger);
}
diff --git a/Source/charon/testcases/hmac_signer_test.c b/Source/charon/testcases/hmac_signer_test.c
new file mode 100644
index 000000000..f11107d9b
--- /dev/null
+++ b/Source/charon/testcases/hmac_signer_test.c
@@ -0,0 +1,214 @@
+/**
+ * @file hmac_signer_test.c
+ *
+ * @brief Tests the hmac SHA1 and MD5 signer class hmac_signer_t
+ *
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
+
+
+#include <string.h>
+
+#include "hmac_signer_test.h"
+
+#include <transforms/signers/signer.h>
+#include <utils/allocator.h>
+#include <globals.h>
+
+
+/*
+ * Described in header.
+ */
+void test_hmac_md5_signer(tester_t *tester)
+{
+ /* Test cases from RFC2202
+ *
+ * test_case = 5
+ * key = 0x0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c0c
+ * key_len = 16
+ * data = "Test With Truncation"
+ * data_len = 20
+ * digest = 0x56461ef2342edc00f9bab995690efd4c
+ * digest-96 0x56461ef2342edc00f9bab995
+ *
+ * currently only this test 5 gets performed!
+ */
+ chunk_t keys[4];
+ chunk_t data[4];
+ chunk_t signature[4];
+ chunk_t reference[4];
+ chunk_t wrong_reference[4];
+ int i;
+ logger_t *logger;
+ bool valid;
+
+ logger = global_logger_manager->create_logger(global_logger_manager,TESTER,"HMAC MD5 96");
+
+ signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_MD5_96);
+ tester->assert_true(tester, (signer != NULL), "signer create call check");
+
+
+ /*
+ * values for test 5
+ */
+ u_int8_t key1[] = {
+ 0x0c,0x0c,0x0c,0x0c,
+ 0x0c,0x0c,0x0c,0x0c,
+ 0x0c,0x0c,0x0c,0x0c,
+ 0x0c,0x0c,0x0c,0x0c,
+ };
+ keys[0].ptr = key1;
+ keys[0].len = sizeof(key1);
+ data[0].ptr = "Test With Truncation";
+ data[0].len = 20;
+ u_int8_t reference1[] = {
+ 0x56,0x46,0x1e,0xf2,0x34,0x2e,
+ 0xdc,0x00,0xf9,0xba,0xb9,0x95
+ };
+ reference[0].ptr = reference1;
+ reference[0].len = sizeof(reference1);
+
+ u_int8_t wrong_reference1[] = {
+ 0x56,0x46,0x1e,0xa2,0x34,0x2e,
+ 0xdc,0x00,0xf9,0xba,0xb9,0x95
+ };
+
+ wrong_reference[0].ptr = wrong_reference1;
+ wrong_reference[0].len = sizeof(wrong_reference1);
+
+ for (i=0; i<1; i++)
+ {
+ signer->set_key(signer, keys[i]);
+ signer->allocate_signature(signer, data[i], &signature[i]);
+ tester->assert_true(tester, signature[i].len == 12, "chunk len");
+ tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
+ logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
+ logger->log_chunk(logger,RAW,"signature:",&signature[i]);
+ allocator_free(signature[i].ptr);
+ signer->verify_signature(signer, data[i],reference[i], &valid);
+ tester->assert_true(tester, (valid == TRUE), "Signature valid check");
+
+ signer->verify_signature(signer, data[i],wrong_reference[i], &valid);
+ tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
+ }
+
+
+
+ tester->assert_true(tester, (signer->destroy(signer) == SUCCESS), "signer destroy call check");
+
+ global_logger_manager->destroy_logger(global_logger_manager,logger);
+}
+
+
+/*
+ * Described in header.
+ */
+void test_hmac_sha1_signer(tester_t *tester)
+{
+ /*
+ * test_case = 7
+ * key = 0xaa repeated 80 times
+ * key_len = 80
+ * data = "Test Using Larger Than Block-Size Key and Larger
+ * Than One Block-Size Data"
+ * data_len = 73
+ * digest = 0x4c1a03424b55e07fe7f27be1d58bb9324a9a5a04
+ * digest-96 = 0x4c1a03424b55e07fe7f27be1
+ */
+
+ chunk_t keys[4];
+ chunk_t data[4];
+ chunk_t signature[4];
+ chunk_t reference[4];
+ chunk_t wrong_reference[4];
+ int i;
+ logger_t *logger;
+ bool valid;
+
+ logger = global_logger_manager->create_logger(global_logger_manager,TESTER,"HMAC SHA1 96");
+
+ signer_t *signer = (signer_t *) signer_create(AUTH_HMAC_SHA1_96);
+ tester->assert_true(tester, (signer != NULL), "signer create call check");
+
+
+ /*
+ * values for test 5
+ */
+ u_int8_t key1[] = {
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ 0xaa,0xaa,0xaa,0xaa,
+ };
+ keys[0].ptr = key1;
+ keys[0].len = sizeof(key1);
+ data[0].ptr = "Test Using Larger Than Block-Size Key and Larger Than One Block-Size Data";
+ data[0].len = 73;
+ u_int8_t reference1[] = {
+ 0xe8,0xe9,0x9d,0x0f,0x45,0x23,
+ 0x7d,0x78,0x6d,0x6b,0xba,0xa7
+ };
+ reference[0].ptr = reference1;
+ reference[0].len = sizeof(reference1);
+
+ u_int8_t wrong_reference1[] = {
+ 0xe8,0xe9,0x9d,0x0f,0x46,0x23,
+ 0x7d,0x71,0x6d,0x6b,0xba,0xa7
+ };
+
+ wrong_reference[0].ptr = wrong_reference1;
+ wrong_reference[0].len = sizeof(wrong_reference1);
+
+ for (i=0; i<1; i++)
+ {
+ signer->set_key(signer, keys[i]);
+ signer->allocate_signature(signer, data[i], &signature[i]);
+ tester->assert_true(tester, signature[i].len == 12, "chunk len");
+ tester->assert_true(tester, (memcmp(signature[i].ptr, reference[i].ptr, 12) == 0), "hmac value");
+ logger->log_chunk(logger,RAW,"expected signature:",&reference[i]);
+ logger->log_chunk(logger,RAW,"signature:",&signature[i]);
+ allocator_free(signature[i].ptr);
+ signer->verify_signature(signer, data[i],reference[i], &valid);
+ tester->assert_true(tester, (valid == TRUE), "Signature valid check");
+
+ signer->verify_signature(signer, data[i],wrong_reference[i], &valid);
+ tester->assert_true(tester, (valid == FALSE), "Signature not valid check");
+ }
+
+
+
+ tester->assert_true(tester, (signer->destroy(signer) == SUCCESS), "signer destroy call check");
+
+ global_logger_manager->destroy_logger(global_logger_manager,logger);
+
+}
diff --git a/Source/charon/testcases/hmac_signer_test.h b/Source/charon/testcases/hmac_signer_test.h
new file mode 100644
index 000000000..cefb6364f
--- /dev/null
+++ b/Source/charon/testcases/hmac_signer_test.h
@@ -0,0 +1,42 @@
+/**
+ * @file hmac_signer_test.h
+ *
+ * @brief Tests the hmac SHA1 and MD5 signer class hmac_signer_t
+ *
+ */
+
+/*
+ * Copyright (C) 2005 Jan Hutter, Martin Willi
+ * Hochschule fuer Technik Rapperswil
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by the
+ * Free Software Foundation; either version 2 of the License, or (at your
+ * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
+ * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
+ * for more details.
+ */
+
+#ifndef _HMAC_SIGNER_TEST_H_
+#define _HMAC_SIGNER_TEST_H_
+
+#include <utils/tester.h>
+
+/**
+ * @brief Test function used to test the hmac sign functionality using MD5.
+ *
+ * @param tester associated tester object
+ */
+void test_hmac_md5_signer(tester_t *tester);
+
+/**
+ * @brief Test function used to test the hmac sign functionality using SHA1.
+ *
+ * @param tester associated tester object
+ */
+void test_hmac_sha1_signer(tester_t *tester);
+
+#endif //_HMAC_SIGNER_TEST_H_
diff --git a/Source/charon/testcases/testcases.c b/Source/charon/testcases/testcases.c
index 3577f2663..ac69b2825 100644
--- a/Source/charon/testcases/testcases.c
+++ b/Source/charon/testcases/testcases.c
@@ -52,6 +52,7 @@
#include <testcases/hmac_test.h>
#include <testcases/prf_plus_test.h>
#include <testcases/aes_cbc_crypter_test.h>
+#include <testcases/hmac_signer_test.h>
/* output for test messages */
extern FILE * stderr;
@@ -201,7 +202,15 @@ test_t prf_plus_test = {test_prf_plus, "prf+"};
*/
test_t aes_cbc_crypter_test = {test_aes_cbc_crypter, "AES CBC"};
+/**
+ * Test for hmac signer with MD5
+ */
+test_t hmac_signer_test1 = {test_hmac_md5_signer, "HMAC MD5 signer test"};
+/**
+ * Test for hmac signer with SHA1
+ */
+test_t hmac_signer_test2 = {test_hmac_sha1_signer, "HMAC SHA1 signer test"};
/**
@@ -280,9 +289,11 @@ logger_manager_t *global_logger_manager;
&hmac_test2,
&prf_plus_test,
&aes_cbc_crypter_test,
+ &hmac_signer_test1,
+ &hmac_signer_test2,
NULL
};
- global_logger_manager = logger_manager_create(FULL);
+ global_logger_manager = logger_manager_create(0);
global_socket = socket_create(4600);
@@ -293,13 +304,13 @@ logger_manager_t *global_logger_manager;
global_ike_sa_manager = ike_sa_manager_create();
global_logger_manager->disable_logger_level(global_logger_manager,TESTER,FULL);
-// global_logger_manager->enable_logger_level(global_logger_manager,TESTER,RAW);
+ //global_logger_manager->enable_logger_level(global_logger_manager,TESTER,RAW);
tester_t *tester = tester_create(test_output, FALSE);
-// tester->perform_tests(tester,all_tests);
- tester->perform_test(tester,&aes_cbc_crypter_test);
+ tester->perform_tests(tester,all_tests);
+// tester->perform_test(tester,&hmac_signer_test2);