webrtc/rtc_base/message_digest_unittest.cc
Philipp Hancke 486aa857b5 Add SHA224 and SHA256 HMAC tests to message digest
SHA384 and SHA512 are not yet tested since our (custom)
HMAC code does not support those algorithms and rejects a block size.
Note that this is only used for computing TURN MD5 and STUN SHA1 HMACs

BUG=None

Change-Id: Idabc651d988a5e5f3abd1fad0f36726bcc7a69a3
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/358780
Reviewed-by: Florent Castelli <orphis@webrtc.org>
Commit-Queue: Philipp Hancke <phancke@meta.com>
Reviewed-by: Harald Alvestrand <hta@webrtc.org>
Cr-Commit-Position: refs/heads/main@{#42753}
2024-08-09 14:44:45 +00:00

201 lines
8.4 KiB
C++

/*
* Copyright 2012 The WebRTC Project Authors. All rights reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include "rtc_base/message_digest.h"
#include <openssl/evp.h>
#include <openssl/sha.h>
#include "absl/strings/string_view.h"
#include "rtc_base/string_encode.h"
#include "test/gtest.h"
namespace rtc {
// Test vectors from RFC 1321.
TEST(MessageDigestTest, TestMd5Digest) {
// Test the string versions of the APIs.
EXPECT_EQ("d41d8cd98f00b204e9800998ecf8427e", ComputeDigest(DIGEST_MD5, ""));
EXPECT_EQ("900150983cd24fb0d6963f7d28e17f72",
ComputeDigest(DIGEST_MD5, "abc"));
EXPECT_EQ("c3fcd3d76192e4007dfb496cca67e13b",
ComputeDigest(DIGEST_MD5, "abcdefghijklmnopqrstuvwxyz"));
// Test the raw buffer versions of the APIs; also check output buffer size.
char output[16];
EXPECT_EQ(sizeof(output),
ComputeDigest(DIGEST_MD5, "abc", 3, output, sizeof(output)));
EXPECT_EQ("900150983cd24fb0d6963f7d28e17f72",
hex_encode(absl::string_view(output, sizeof(output))));
EXPECT_EQ(0U,
ComputeDigest(DIGEST_MD5, "abc", 3, output, sizeof(output) - 1));
}
// Test vectors from RFC 3174.
TEST(MessageDigestTest, TestSha1Digest) {
// Test the string versions of the APIs.
EXPECT_EQ("da39a3ee5e6b4b0d3255bfef95601890afd80709",
ComputeDigest(DIGEST_SHA_1, ""));
EXPECT_EQ("a9993e364706816aba3e25717850c26c9cd0d89d",
ComputeDigest(DIGEST_SHA_1, "abc"));
EXPECT_EQ("84983e441c3bd26ebaae4aa1f95129e5e54670f1",
ComputeDigest(
DIGEST_SHA_1,
"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"));
// Test the raw buffer versions of the APIs; also check output buffer size.
char output[EVP_MAX_MD_SIZE];
EXPECT_EQ(static_cast<size_t>(SHA_DIGEST_LENGTH),
ComputeDigest(DIGEST_SHA_1, "abc", 3, output, SHA_DIGEST_LENGTH));
EXPECT_EQ("a9993e364706816aba3e25717850c26c9cd0d89d",
hex_encode(absl::string_view(output, SHA_DIGEST_LENGTH)));
EXPECT_EQ(
0U, ComputeDigest(DIGEST_SHA_1, "abc", 3, output, SHA_DIGEST_LENGTH - 1));
}
// Test that we fail properly if a bad digest algorithm is specified.
TEST(MessageDigestTest, TestBadDigest) {
std::string output;
EXPECT_FALSE(ComputeDigest("sha-9000", "abc", &output));
EXPECT_EQ("", ComputeDigest("sha-9000", "abc"));
}
// Test vectors from RFC 2202.
TEST(MessageDigestTest, TestMd5Hmac) {
// Test the string versions of the APIs.
EXPECT_EQ("9294727a3638bb1c13f48ef8158bfc9d",
ComputeHmac(DIGEST_MD5, std::string(16, '\x0b'), "Hi There"));
EXPECT_EQ("750c783e6ab0b503eaa86e310a5db738",
ComputeHmac(DIGEST_MD5, "Jefe", "what do ya want for nothing?"));
EXPECT_EQ("56be34521d144c88dbb8c733f0e8b3f6",
ComputeHmac(DIGEST_MD5, std::string(16, '\xaa'),
std::string(50, '\xdd')));
EXPECT_EQ(
"697eaf0aca3a3aea3a75164746ffaa79",
ComputeHmac(DIGEST_MD5,
"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
"\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
std::string(50, '\xcd')));
EXPECT_EQ(
"56461ef2342edc00f9bab995690efd4c",
ComputeHmac(DIGEST_MD5, std::string(16, '\x0c'), "Test With Truncation"));
EXPECT_EQ(
"6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd",
ComputeHmac(DIGEST_MD5, std::string(80, '\xaa'),
"Test Using Larger Than Block-Size Key - Hash Key First"));
EXPECT_EQ("6f630fad67cda0ee1fb1f562db3aa53e",
ComputeHmac(DIGEST_MD5, std::string(80, '\xaa'),
"Test Using Larger Than Block-Size Key and Larger "
"Than One Block-Size Data"));
// Test the raw buffer versions of the APIs; also check output buffer size.
std::string key(16, '\x0b');
std::string input("Hi There");
char output[16];
EXPECT_EQ(sizeof(output),
ComputeHmac(DIGEST_MD5, key.c_str(), key.size(), input.c_str(),
input.size(), output, sizeof(output)));
EXPECT_EQ("9294727a3638bb1c13f48ef8158bfc9d",
hex_encode(absl::string_view(output, sizeof(output))));
EXPECT_EQ(0U, ComputeHmac(DIGEST_MD5, key.c_str(), key.size(), input.c_str(),
input.size(), output, sizeof(output) - 1));
}
// Test vectors from RFC 2202.
TEST(MessageDigestTest, TestSha1Hmac) {
// Test the string versions of the APIs.
EXPECT_EQ("b617318655057264e28bc0b6fb378c8ef146be00",
ComputeHmac(DIGEST_SHA_1, std::string(20, '\x0b'), "Hi There"));
EXPECT_EQ("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79",
ComputeHmac(DIGEST_SHA_1, "Jefe", "what do ya want for nothing?"));
EXPECT_EQ("125d7342b9ac11cd91a39af48aa17b4f63f175d3",
ComputeHmac(DIGEST_SHA_1, std::string(20, '\xaa'),
std::string(50, '\xdd')));
EXPECT_EQ(
"4c9007f4026250c6bc8414f9bf50c86c2d7235da",
ComputeHmac(DIGEST_SHA_1,
"\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f"
"\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19",
std::string(50, '\xcd')));
EXPECT_EQ("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04",
ComputeHmac(DIGEST_SHA_1, std::string(20, '\x0c'),
"Test With Truncation"));
EXPECT_EQ(
"aa4ae5e15272d00e95705637ce8a3b55ed402112",
ComputeHmac(DIGEST_SHA_1, std::string(80, '\xaa'),
"Test Using Larger Than Block-Size Key - Hash Key First"));
EXPECT_EQ("e8e99d0f45237d786d6bbaa7965c7808bbff1a91",
ComputeHmac(DIGEST_SHA_1, std::string(80, '\xaa'),
"Test Using Larger Than Block-Size Key and Larger "
"Than One Block-Size Data"));
// Test the raw buffer versions of the APIs; also check output buffer size.
std::string key(20, '\x0b');
std::string input("Hi There");
char output[EVP_MAX_MD_SIZE];
EXPECT_EQ(static_cast<size_t>(SHA_DIGEST_LENGTH),
ComputeHmac(DIGEST_SHA_1, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA_DIGEST_LENGTH));
EXPECT_EQ("b617318655057264e28bc0b6fb378c8ef146be00",
hex_encode(absl::string_view(output, SHA_DIGEST_LENGTH)));
EXPECT_EQ(0U,
ComputeHmac(DIGEST_SHA_1, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA_DIGEST_LENGTH - 1));
}
// Test vectors from RFC 4231.
// https://datatracker.ietf.org/doc/html/rfc4231#section-4.2
TEST(MessageDigestTest, TestSha2Hmac) {
std::string key(20, '\x0b');
std::string input("Hi There");
char output[EVP_MAX_MD_SIZE];
EXPECT_EQ(
"896fb1128abbdf196832107cd49df33f"
"47b4b1169912ba4f53684b22",
ComputeHmac(DIGEST_SHA_224, key, input));
EXPECT_EQ(
"b0344c61d8db38535ca8afceaf0bf12b"
"881dc200c9833da726e9376c2e32cff7",
ComputeHmac(DIGEST_SHA_256, key, input));
// Test the raw buffer versions of the APIs; also check output buffer size.
// SHA-224
EXPECT_EQ(static_cast<size_t>(SHA224_DIGEST_LENGTH),
ComputeHmac(DIGEST_SHA_224, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA224_DIGEST_LENGTH));
EXPECT_EQ(
"896fb1128abbdf196832107cd49df33f"
"47b4b1169912ba4f53684b22",
hex_encode(absl::string_view(output, SHA224_DIGEST_LENGTH)));
EXPECT_EQ(0U,
ComputeHmac(DIGEST_SHA_224, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA224_DIGEST_LENGTH - 1));
// SHA-256
EXPECT_EQ(static_cast<size_t>(SHA256_DIGEST_LENGTH),
ComputeHmac(DIGEST_SHA_256, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA256_DIGEST_LENGTH));
EXPECT_EQ(
"b0344c61d8db38535ca8afceaf0bf12b"
"881dc200c9833da726e9376c2e32cff7",
hex_encode(absl::string_view(output, SHA256_DIGEST_LENGTH)));
EXPECT_EQ(0U,
ComputeHmac(DIGEST_SHA_256, key.c_str(), key.size(), input.c_str(),
input.size(), output, SHA256_DIGEST_LENGTH - 1));
}
TEST(MessageDigestTest, TestBadHmac) {
std::string output;
EXPECT_FALSE(ComputeHmac("sha-9000", "key", "abc", &output));
EXPECT_EQ("", ComputeHmac("sha-9000", "key", "abc"));
}
} // namespace rtc