1 /* crypto/hmac/hmactest.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
65 #ifdef OPENSSL_NO_HMAC
66 int main(int argc, char *argv[])
68 printf("No HMAC support\n");
72 # include <openssl/hmac.h>
73 # ifndef OPENSSL_NO_MD5
74 # include <openssl/md5.h>
77 # ifdef CHARSET_EBCDIC
78 # include <openssl/ebcdic.h>
81 # ifndef OPENSSL_NO_MD5
82 static struct test_st {
83 unsigned char key[16];
85 unsigned char data[64];
87 unsigned char *digest;
90 "", 0, "More text test vectors to stuff up EBCDIC machines :-)", 54,
91 (unsigned char *)"e9139d1e6ee064ef8cf514fc7dc83e86",
95 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
96 0x0b, 0x0b, 0x0b, 0x0b, 0x0b,
98 (unsigned char *)"9294727a3638bb1c13f48ef8158bfc9d",
101 "Jefe", 4, "what do ya want for nothing?", 28,
102 (unsigned char *)"750c783e6ab0b503eaa86e310a5db738",
106 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
107 0xaa, 0xaa, 0xaa, 0xaa, 0xaa,
109 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
110 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
111 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
112 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd,
113 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd
114 }, 50, (unsigned char *)"56be34521d144c88dbb8c733f0e8b3f6",
117 "", 0, "My test data", 12,
118 (unsigned char *)"61afdecb95429ef494d61fdee15990cabf0826fc"
121 "", 0, "My test data", 12,
122 (unsigned char *)"2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776"
125 "123456", 6, "My test data", 12,
126 (unsigned char *)"bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd"
129 "12345", 5, "My test data again", 12,
130 (unsigned char *)"7dbe8c764c068e3bcd6e6b0fbcd5e6fc197b15bb"
135 static char *pt(unsigned char *md, unsigned int len);
137 int main(int argc, char *argv[])
139 # ifndef OPENSSL_NO_MD5
145 unsigned char buf[EVP_MAX_MD_SIZE];
148 # ifdef OPENSSL_NO_MD5
149 printf("test skipped: MD5 disabled\n");
152 # ifdef CHARSET_EBCDIC
153 ebcdic2ascii(test[0].data, test[0].data, test[0].data_len);
154 ebcdic2ascii(test[1].data, test[1].data, test[1].data_len);
155 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len);
156 ebcdic2ascii(test[2].data, test[2].data, test[2].data_len);
159 for (i = 0; i < 4; i++) {
160 p = pt(HMAC(EVP_md5(),
161 test[i].key, test[i].key_len,
162 test[i].data, test[i].data_len, NULL, NULL),
165 if (strcmp(p, (char *)test[i].digest) != 0) {
166 printf("Error calculating HMAC on %d entry'\n", i);
167 printf("got %s instead of %s\n", p, test[i].digest);
170 printf("test %d ok\n", i);
172 # endif /* OPENSSL_NO_MD5 */
176 if (HMAC_Init_ex(&ctx, NULL, 0, NULL, NULL)) {
177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n");
181 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) {
182 printf("Should fail HMAC_Update with ctx not set up (test 4)\n");
186 if (HMAC_Init_ex(&ctx, NULL, 0, EVP_sha1(), NULL)) {
187 printf("Should fail to initialise HMAC with empty key (test 4)\n");
191 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) {
192 printf("Should fail HMAC_Update with ctx not set up (test 4)\n");
196 printf("test 4 ok\n");
198 HMAC_CTX_cleanup(&ctx);
200 if (HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, NULL, NULL)) {
201 printf("Should fail to initialise HMAC with empty MD (test 5)\n");
205 if (HMAC_Update(&ctx, test[4].data, test[4].data_len)) {
206 printf("Should fail HMAC_Update with ctx not set up (test 5)\n");
210 if (HMAC_Init_ex(&ctx, test[4].key, -1, EVP_sha1(), NULL)) {
211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n");
215 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) {
216 printf("Failed to initialise HMAC (test 5)\n");
220 if (!HMAC_Update(&ctx, test[4].data, test[4].data_len)) {
221 printf("Error updating HMAC with data (test 5)\n");
225 if (!HMAC_Final(&ctx, buf, &len)) {
226 printf("Error finalising data (test 5)\n");
231 if (strcmp(p, (char *)test[4].digest) != 0) {
232 printf("Error calculating interim HMAC on test 5\n");
233 printf("got %s instead of %s\n", p, test[4].digest);
237 if (HMAC_Init_ex(&ctx, NULL, 0, EVP_sha256(), NULL)) {
238 printf("Should disallow changing MD without a new key (test 5)\n");
242 if (!HMAC_Init_ex(&ctx, test[4].key, test[4].key_len, EVP_sha256(), NULL)) {
243 printf("Failed to reinitialise HMAC (test 5)\n");
247 if (!HMAC_Update(&ctx, test[5].data, test[5].data_len)) {
248 printf("Error updating HMAC with data (sha256) (test 5)\n");
252 if (!HMAC_Final(&ctx, buf, &len)) {
253 printf("Error finalising data (sha256) (test 5)\n");
258 if (strcmp(p, (char *)test[5].digest) != 0) {
259 printf("Error calculating 2nd interim HMAC on test 5\n");
260 printf("got %s instead of %s\n", p, test[5].digest);
264 if (!HMAC_Init_ex(&ctx, test[6].key, test[6].key_len, NULL, NULL)) {
265 printf("Failed to reinitialise HMAC with key (test 5)\n");
269 if (!HMAC_Update(&ctx, test[6].data, test[6].data_len)) {
270 printf("Error updating HMAC with data (new key) (test 5)\n");
274 if (!HMAC_Final(&ctx, buf, &len)) {
275 printf("Error finalising data (new key) (test 5)\n");
280 if (strcmp(p, (char *)test[6].digest) != 0) {
281 printf("error calculating HMAC on test 5\n");
282 printf("got %s instead of %s\n", p, test[6].digest);
285 printf("test 5 ok\n");
288 HMAC_CTX_cleanup(&ctx);
290 if (!HMAC_Init_ex(&ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) {
291 printf("Failed to initialise HMAC (test 6)\n");
295 if (!HMAC_Update(&ctx, test[7].data, test[7].data_len)) {
296 printf("Error updating HMAC with data (test 6)\n");
300 if (!HMAC_CTX_copy(&ctx2, &ctx)) {
301 printf("Failed to copy HMAC_CTX (test 6)\n");
305 if (!HMAC_Final(&ctx2, buf, &len)) {
306 printf("Error finalising data (test 6)\n");
311 if (strcmp(p, (char *)test[7].digest) != 0) {
312 printf("Error calculating HMAC on test 6\n");
313 printf("got %s instead of %s\n", p, test[7].digest);
316 printf("test 6 ok\n");
319 HMAC_CTX_cleanup(&ctx);
324 # ifndef OPENSSL_NO_MD5
325 static char *pt(unsigned char *md, unsigned int len)
330 for (i = 0; i < len; i++)
331 sprintf(&(buf[i * 2]), "%02x", md[i]);