mirror of
https://github.com/bolucat/Archive.git
synced 2026-04-23 00:17:16 +08:00
165 lines
4.2 KiB
C
165 lines
4.2 KiB
C
#ifdef HAVE_CONFIG_H
|
|
#include "config.h"
|
|
#endif
|
|
|
|
#include <assert.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <sodium.h>
|
|
|
|
int verbose = 0;
|
|
|
|
#include "crypto.h"
|
|
|
|
/* Provide nonce_cache symbol needed by crypto.c */
|
|
struct cache *nonce_cache = NULL;
|
|
|
|
static void
|
|
test_crypto_md5(void)
|
|
{
|
|
/* MD5("") = d41d8cd98f00b204e9800998ecf8427e */
|
|
unsigned char result[16];
|
|
crypto_md5((const unsigned char *)"", 0, result);
|
|
|
|
unsigned char expected[] = {
|
|
0xd4, 0x1d, 0x8c, 0xd9, 0x8f, 0x00, 0xb2, 0x04,
|
|
0xe9, 0x80, 0x09, 0x98, 0xec, 0xf8, 0x42, 0x7e
|
|
};
|
|
assert(memcmp(result, expected, 16) == 0);
|
|
(void)expected;
|
|
|
|
/* MD5("abc") = 900150983cd24fb0d6963f7d28e17f72 */
|
|
crypto_md5((const unsigned char *)"abc", 3, result);
|
|
unsigned char expected_abc[] = {
|
|
0x90, 0x01, 0x50, 0x98, 0x3c, 0xd2, 0x4f, 0xb0,
|
|
0xd6, 0x96, 0x3f, 0x7d, 0x28, 0xe1, 0x7f, 0x72
|
|
};
|
|
assert(memcmp(result, expected_abc, 16) == 0);
|
|
(void)expected_abc;
|
|
}
|
|
|
|
static void
|
|
test_crypto_derive_key(void)
|
|
{
|
|
uint8_t key[32];
|
|
|
|
/* derive_key should produce deterministic output from a password */
|
|
int ret = crypto_derive_key("password", key, 32);
|
|
assert(ret == 32);
|
|
|
|
/* Same password should produce same key */
|
|
uint8_t key2[32];
|
|
ret = crypto_derive_key("password", key2, 32);
|
|
assert(ret == 32);
|
|
assert(memcmp(key, key2, 32) == 0);
|
|
|
|
/* Different password should produce different key */
|
|
uint8_t key3[32];
|
|
ret = crypto_derive_key("different", key3, 32);
|
|
assert(ret == 32);
|
|
assert(memcmp(key, key3, 32) != 0);
|
|
(void)ret;
|
|
}
|
|
|
|
static void
|
|
test_crypto_hkdf(void)
|
|
{
|
|
/* RFC 5869 Test Case 1 */
|
|
const mbedtls_md_info_t *md = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
|
assert(md != NULL);
|
|
|
|
unsigned char ikm[22];
|
|
memset(ikm, 0x0b, 22);
|
|
|
|
unsigned char salt[] = {
|
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
|
0x08, 0x09, 0x0a, 0x0b, 0x0c
|
|
};
|
|
|
|
unsigned char info[] = {
|
|
0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7,
|
|
0xf8, 0xf9
|
|
};
|
|
|
|
unsigned char okm[42];
|
|
int ret = crypto_hkdf(md, salt, sizeof(salt), ikm, sizeof(ikm),
|
|
info, sizeof(info), okm, sizeof(okm));
|
|
assert(ret == 0);
|
|
(void)ret;
|
|
|
|
unsigned char expected_okm[] = {
|
|
0x3c, 0xb2, 0x5f, 0x25, 0xfa, 0xac, 0xd5, 0x7a,
|
|
0x90, 0x43, 0x4f, 0x64, 0xd0, 0x36, 0x2f, 0x2a,
|
|
0x2d, 0x2d, 0x0a, 0x90, 0xcf, 0x1a, 0x5a, 0x4c,
|
|
0x5d, 0xb0, 0x2d, 0x56, 0xec, 0xc4, 0xc5, 0xbf,
|
|
0x34, 0x00, 0x72, 0x08, 0xd5, 0xb8, 0x87, 0x18,
|
|
0x58, 0x65
|
|
};
|
|
assert(memcmp(okm, expected_okm, 42) == 0);
|
|
(void)expected_okm;
|
|
}
|
|
|
|
static void
|
|
test_crypto_hkdf_extract(void)
|
|
{
|
|
const mbedtls_md_info_t *md = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
|
assert(md != NULL);
|
|
|
|
unsigned char ikm[22];
|
|
memset(ikm, 0x0b, 22);
|
|
|
|
unsigned char salt[] = {
|
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
|
0x08, 0x09, 0x0a, 0x0b, 0x0c
|
|
};
|
|
|
|
unsigned char prk[32];
|
|
int ret = crypto_hkdf_extract(md, salt, sizeof(salt), ikm, sizeof(ikm), prk);
|
|
assert(ret == 0);
|
|
(void)ret;
|
|
|
|
/* RFC 5869 Test Case 1 PRK */
|
|
unsigned char expected_prk[] = {
|
|
0x07, 0x77, 0x09, 0x36, 0x2c, 0x2e, 0x32, 0xdf,
|
|
0x0d, 0xdc, 0x3f, 0x0d, 0xc4, 0x7b, 0xba, 0x63,
|
|
0x90, 0xb6, 0xc7, 0x3b, 0xb5, 0x0f, 0x9c, 0x31,
|
|
0x22, 0xec, 0x84, 0x4a, 0xd7, 0xc2, 0xb3, 0xe5
|
|
};
|
|
assert(memcmp(prk, expected_prk, 32) == 0);
|
|
(void)expected_prk;
|
|
}
|
|
|
|
static void
|
|
test_crypto_parse_key(void)
|
|
{
|
|
/* base64_encode uses URL-safe base64 with -_ instead of +/ */
|
|
uint8_t key[32];
|
|
|
|
/* A known base64-encoded 32-byte key (all zeros) */
|
|
/* 32 zero bytes = "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=" in standard base64 */
|
|
/* With URL-safe: same since no +/ needed */
|
|
int ret = crypto_parse_key("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=", key, 32);
|
|
assert(ret == 32);
|
|
(void)ret;
|
|
|
|
/* All bytes should be 0 */
|
|
for (int i = 0; i < 32; i++) {
|
|
assert(key[i] == 0);
|
|
}
|
|
}
|
|
|
|
int
|
|
main(void)
|
|
{
|
|
if (sodium_init() < 0) {
|
|
return 1;
|
|
}
|
|
|
|
test_crypto_md5();
|
|
test_crypto_derive_key();
|
|
test_crypto_hkdf();
|
|
test_crypto_hkdf_extract();
|
|
test_crypto_parse_key();
|
|
return 0;
|
|
}
|