1
0
mirror of https://github.com/samba-team/samba.git synced 2025-03-20 22:50:26 +03:00

r17494: add tests for the example values from rfc 1320 (MD4)

metze
(This used to be commit 5609ab2116e3568e4f1a82b3ae781f17a6ffb645)
This commit is contained in:
Stefan Metzmacher 2006-08-11 13:13:03 +00:00 committed by Gerald (Jerry) Carter
parent a889fef4b1
commit b165e48b3e
3 changed files with 86 additions and 0 deletions

View File

@ -0,0 +1,84 @@
/*
Unix SMB/CIFS implementation.
MD4 tests
Copyright (C) Stefan Metzmacher 2006
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
#include "lib/crypto/crypto.h"
struct torture_context;
/*
This uses the test values from rfc1320
*/
BOOL torture_local_crypto_md4(struct torture_context *torture)
{
BOOL ret = True;
uint32_t i;
struct {
DATA_BLOB data;
DATA_BLOB md4;
} testarray[] = {
{
.data = data_blob_string_const(""),
.md4 = strhex_to_data_blob("31d6cfe0d16ae931b73c59d7e0c089c0")
},{
.data = data_blob_string_const("a"),
.md4 = strhex_to_data_blob("bde52cb31de33e46245e05fbdbd6fb24")
},{
.data = data_blob_string_const("abc"),
.md4 = strhex_to_data_blob("a448017aaf21d8525fc10ae87aa6729d")
},{
.data = data_blob_string_const("message digest"),
.md4 = strhex_to_data_blob("d9130a8164549fe818874806e1c7014b")
},{
.data = data_blob_string_const("abcdefghijklmnopqrstuvwxyz"),
.md4 = strhex_to_data_blob("d79e1c308aa5bbcdeea8ed63df412da9")
},{
.data = data_blob_string_const("ABCDEFGHIJKLMNOPQRSTUVWXYZ"
"abcdefghijklmnopqrstuvwxyz"
"0123456789"),
.md4 = strhex_to_data_blob("043f8582f241db351ce627e153e7f0e4")
},{
.data = data_blob_string_const("123456789012345678901234567890"
"123456789012345678901234567890"
"12345678901234567890"),
.md4 = strhex_to_data_blob("e33b4ddc9c38f2199c3e7b164fcc0536")
}
};
for (i=0; i < ARRAY_SIZE(testarray); i++) {
uint8_t md4[16];
int e;
mdfour(md4, testarray[i].data.data, testarray[i].data.length);
e = memcmp(testarray[i].md4.data,
md4,
MIN(testarray[i].md4.length, sizeof(md4)));
if (e != 0) {
printf("md4 test[%u]: failed\n", i);
dump_data(0, testarray[i].data.data, testarray[i].data.length);
dump_data(0, testarray[i].md4.data, testarray[i].md4.length);
dump_data(0, md4, sizeof(md4));
ret = False;
}
}
return ret;
}

View File

@ -8,6 +8,7 @@ PRIVATE_PROTO_HEADER = \
OBJ_FILES = \
iconv.o \
../../lib/talloc/testsuite.o \
../../lib/crypto/md4test.o \
../../lib/crypto/md5test.o \
../../lib/crypto/sha1test.o \
../../lib/crypto/hmacsha1test.o \

View File

@ -51,6 +51,7 @@ NTSTATUS torture_local_init(void)
TALLOC_CTX *mem_ctx = talloc_autofree_context();
register_torture_op("LOCAL-TALLOC", torture_local_talloc);
register_torture_op("LOCAL-CRYPTO-MD4", torture_local_crypto_md4);
register_torture_op("LOCAL-CRYPTO-MD5", torture_local_crypto_md5);
register_torture_op("LOCAL-CRYPTO-SHA1", torture_local_crypto_sha1);
register_torture_op("LOCAL-CRYPTO-HMACSHA1", torture_local_crypto_hmacsha1);