/** @file | |
Application for HMAC Primitives Validation. | |
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR> | |
SPDX-License-Identifier: BSD-2-Clause-Patent | |
**/ | |
#include "TestBaseCryptLib.h" | |
// | |
// Max Known Digest Size is SHA512 Output (64 bytes) by far | |
// | |
#define MAX_DIGEST_SIZE 64 | |
// | |
// Data string for HMAC validation | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST CHAR8 *HmacData = "Hi There"; | |
// | |
// Key value for HMAC-MD5 validation. (From "2. Test Cases for HMAC-MD5" of IETF RFC2202) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacMd5Key[16] = { | |
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b | |
}; | |
// | |
// Result for HMAC-MD5("Hi There"). (From "2. Test Cases for HMAC-MD5" of IETF RFC2202) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacMd5Digest[] = { | |
0x92, 0x94, 0x72, 0x7a, 0x36, 0x38, 0xbb, 0x1c, 0x13, 0xf4, 0x8e, 0xf8, 0x15, 0x8b, 0xfc, 0x9d | |
}; | |
// | |
// Key value for HMAC-SHA-1 validation. (From "3. Test Cases for HMAC-SHA-1" of IETF RFC2202) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha1Key[20] = { | |
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | |
0x0b, 0x0b, 0x0b, 0x0b | |
}; | |
// | |
// Result for HMAC-SHA-1 ("Hi There"). (From "3. Test Cases for HMAC-SHA-1" of IETF RFC2202) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha1Digest[] = { | |
0xb6, 0x17, 0x31, 0x86, 0x55, 0x05, 0x72, 0x64, 0xe2, 0x8b, 0xc0, 0xb6, 0xfb, 0x37, 0x8c, 0x8e, | |
0xf1, 0x46, 0xbe, 0x00 | |
}; | |
// | |
// Key value for HMAC-SHA-256 validation. (From "4. Test Vectors" of IETF RFC4231) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha256Key[20] = { | |
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | |
0x0b, 0x0b, 0x0b, 0x0b | |
}; | |
// | |
// Result for HMAC-SHA-256 ("Hi There"). (From "4. Test Vectors" of IETF RFC4231) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha256Digest[] = { | |
0xb0, 0x34, 0x4c, 0x61, 0xd8, 0xdb, 0x38, 0x53, 0x5c, 0xa8, 0xaf, 0xce, 0xaf, 0x0b, 0xf1, 0x2b, | |
0x88, 0x1d, 0xc2, 0x00, 0xc9, 0x83, 0x3d, 0xa7, 0x26, 0xe9, 0x37, 0x6c, 0x2e, 0x32, 0xcf, 0xf7 | |
}; | |
// | |
// Key value for HMAC-SHA-384 validation. (From "4. Test Vectors" of IETF RFC4231) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha384Key[20] = { | |
0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | |
0x0b, 0x0b, 0x0b, 0x0b | |
}; | |
// | |
// Result for HMAC-SHA-384 ("Hi There"). (From "4. Test Vectors" of IETF RFC4231) | |
// | |
GLOBAL_REMOVE_IF_UNREFERENCED CONST UINT8 HmacSha384Digest[] = { | |
0xaf, 0xd0, 0x39, 0x44, 0xd8, 0x48, 0x95, 0x62, 0x6b, 0x08, 0x25, 0xf4, 0xab, 0x46, 0x90, 0x7f, | |
0x15, 0xf9, 0xda, 0xdb, 0xe4, 0x10, 0x1e, 0xc6, 0x82, 0xaa, 0x03, 0x4c, 0x7c, 0xeb, 0xc5, 0x9c, | |
0xfa, 0xea, 0x9e, 0xa9, 0x07, 0x6e, 0xde, 0x7f, 0x4a, 0xf1, 0x52, 0xe8, 0xb2, 0xfa, 0x9c, 0xb6 | |
}; | |
typedef | |
VOID * | |
(EFIAPI *EFI_HMAC_NEW)( | |
VOID | |
); | |
typedef | |
VOID | |
(EFIAPI *EFI_HMAC_FREE)( | |
IN VOID *HashContext | |
); | |
typedef | |
BOOLEAN | |
(EFIAPI *EFI_HMAC_INIT)( | |
IN OUT VOID *HashContext, | |
IN CONST UINT8 *Key, | |
IN UINTN KeySize | |
); | |
typedef | |
BOOLEAN | |
(EFIAPI *EFI_HMAC_DUP)( | |
IN CONST VOID *HashContext, | |
OUT VOID *NewHashContext | |
); | |
typedef | |
BOOLEAN | |
(EFIAPI *EFI_HMAC_UPDATE)( | |
IN OUT VOID *HashContext, | |
IN CONST VOID *Data, | |
IN UINTN DataSize | |
); | |
typedef | |
BOOLEAN | |
(EFIAPI *EFI_HMAC_FINAL)( | |
IN OUT VOID *HashContext, | |
OUT UINT8 *HashValue | |
); | |
typedef | |
BOOLEAN | |
(EFIAPI *EFI_HMAC_ALL)( | |
IN CONST VOID *Data, | |
IN UINTN DataSize, | |
IN CONST UINT8 *Key, | |
IN UINTN KeySize, | |
OUT UINT8 *HashValue | |
); | |
typedef struct { | |
UINT32 DigestSize; | |
EFI_HMAC_NEW HmacNew; | |
EFI_HMAC_FREE HmacFree; | |
EFI_HMAC_INIT HmacInit; | |
EFI_HMAC_DUP HmacDup; | |
EFI_HMAC_UPDATE HmacUpdate; | |
EFI_HMAC_FINAL HmacFinal; | |
EFI_HMAC_ALL HmacAll; | |
CONST UINT8 *Key; | |
UINTN KeySize; | |
CONST UINT8 *Digest; | |
VOID *HmacCtx; | |
} HMAC_TEST_CONTEXT; | |
HMAC_TEST_CONTEXT mHmacSha256TestCtx = { SHA256_DIGEST_SIZE, HmacSha256New, HmacSha256Free, HmacSha256SetKey, HmacSha256Duplicate, HmacSha256Update, HmacSha256Final, HmacSha256All, HmacSha256Key, sizeof (HmacSha256Key), HmacSha256Digest }; | |
HMAC_TEST_CONTEXT mHmacSha384TestCtx = { SHA384_DIGEST_SIZE, HmacSha384New, HmacSha384Free, HmacSha384SetKey, HmacSha384Duplicate, HmacSha384Update, HmacSha384Final, HmacSha384All, HmacSha384Key, sizeof (HmacSha384Key), HmacSha384Digest }; | |
UNIT_TEST_STATUS | |
EFIAPI | |
TestVerifyHmacPreReq ( | |
UNIT_TEST_CONTEXT Context | |
) | |
{ | |
HMAC_TEST_CONTEXT *HmacTestContext; | |
HmacTestContext = Context; | |
HmacTestContext->HmacCtx = HmacTestContext->HmacNew (); | |
if (HmacTestContext->HmacCtx == NULL) { | |
return UNIT_TEST_ERROR_TEST_FAILED; | |
} | |
return UNIT_TEST_PASSED; | |
} | |
VOID | |
EFIAPI | |
TestVerifyHmacCleanUp ( | |
UNIT_TEST_CONTEXT Context | |
) | |
{ | |
HMAC_TEST_CONTEXT *HmacTestContext; | |
HmacTestContext = Context; | |
if (HmacTestContext->HmacCtx != NULL) { | |
HmacTestContext->HmacFree (HmacTestContext->HmacCtx); | |
} | |
} | |
UNIT_TEST_STATUS | |
EFIAPI | |
TestVerifyHmac ( | |
IN UNIT_TEST_CONTEXT Context | |
) | |
{ | |
UINT8 Digest[MAX_DIGEST_SIZE]; | |
UINT8 DigestCopy[MAX_DIGEST_SIZE]; | |
UINT8 DigestByAll[MAX_DIGEST_SIZE]; | |
VOID *HmacCopyContext; | |
BOOLEAN Status; | |
HMAC_TEST_CONTEXT *HmacTestContext; | |
HmacTestContext = Context; | |
ZeroMem (Digest, MAX_DIGEST_SIZE); | |
ZeroMem (DigestCopy, MAX_DIGEST_SIZE); | |
ZeroMem (DigestByAll, MAX_DIGEST_SIZE); | |
HmacCopyContext = HmacTestContext->HmacNew (); | |
Status = HmacTestContext->HmacInit (HmacTestContext->HmacCtx, HmacTestContext->Key, HmacTestContext->KeySize); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacInit (HmacCopyContext, HmacTestContext->Key, HmacTestContext->KeySize); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacUpdate (HmacTestContext->HmacCtx, HmacData, 8); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacDup (HmacTestContext->HmacCtx, HmacCopyContext); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacFinal (HmacTestContext->HmacCtx, Digest); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacFinal (HmacCopyContext, DigestCopy); | |
UT_ASSERT_TRUE (Status); | |
Status = HmacTestContext->HmacAll (HmacData, 8, HmacTestContext->Key, HmacTestContext->KeySize, DigestByAll); | |
UT_ASSERT_TRUE (Status); | |
UT_ASSERT_MEM_EQUAL (Digest, HmacTestContext->Digest, HmacTestContext->DigestSize); | |
UT_ASSERT_MEM_EQUAL (Digest, DigestCopy, HmacTestContext->DigestSize); | |
UT_ASSERT_MEM_EQUAL (Digest, DigestByAll, HmacTestContext->DigestSize); | |
return UNIT_TEST_PASSED; | |
} | |
TEST_DESC mHmacTest[] = { | |
// | |
// -----Description---------------------Class---------------------Function---------------Pre------------------Post------------Context | |
// | |
{ "TestVerifyHmacSha256()", "CryptoPkg.BaseCryptLib.Hmac", TestVerifyHmac, TestVerifyHmacPreReq, TestVerifyHmacCleanUp, &mHmacSha256TestCtx }, | |
{ "TestVerifyHmacSha384()", "CryptoPkg.BaseCryptLib.Hmac", TestVerifyHmac, TestVerifyHmacPreReq, TestVerifyHmacCleanUp, &mHmacSha384TestCtx }, | |
}; | |
UINTN mHmacTestNum = ARRAY_SIZE (mHmacTest); |