Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
M
mariadb
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
mariadb
Commits
d94a982a
Commit
d94a982a
authored
Sep 01, 2015
by
Sergei Golubchik
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
my_crypt unittest
parent
e238d6c5
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
123 additions
and
1 deletion
+123
-1
unittest/mysys/CMakeLists.txt
unittest/mysys/CMakeLists.txt
+3
-1
unittest/mysys/aes-t.c
unittest/mysys/aes-t.c
+120
-0
No files found.
unittest/mysys/CMakeLists.txt
View file @
d94a982a
...
@@ -13,9 +13,11 @@
...
@@ -13,9 +13,11 @@
# along with this program; if not, write to the Free Software
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
MY_ADD_TESTS
(
bitmap base64 my_vsnprintf my_atomic my_rdtsc lf my_malloc
MY_ADD_TESTS
(
bitmap base64 my_vsnprintf my_atomic my_rdtsc lf my_malloc
aes
LINK_LIBRARIES mysys
)
LINK_LIBRARIES mysys
)
ADD_DEFINITIONS
(
${
SSL_DEFINES
}
)
MY_ADD_TESTS
(
ma_dyncol
MY_ADD_TESTS
(
ma_dyncol
LINK_LIBRARIES mysqlclient
)
LINK_LIBRARIES mysqlclient
)
...
...
unittest/mysys/aes-t.c
0 → 100644
View file @
d94a982a
/* Copyright (c) 2003, 2006, 2007 MySQL AB, 2009 Sun Microsystems, Inc.
Use is subject to license terms.
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
#include <my_global.h>
#include <my_sys.h>
#include <my_crypt.h>
#include <tap.h>
#include <string.h>
#include <ctype.h>
#define DO_TEST_P(mode, slen, fill, dlen, hash) \
do { \
memset(src, fill, src_len= slen); \
ok(my_aes_encrypt_ ## mode(src, src_len, dst, &dst_len, \
key, sizeof(key), iv, sizeof(iv), 0) == MY_AES_OK, \
"encrypt " #mode " %u", src_len); \
ok(dst_len <= my_aes_get_size(src_len), \
"my_aes_get_size(%u) >= %u", src_len, dst_len); \
my_md5(md5, (char*)dst, dst_len); \
ok(dst_len == dlen && memcmp(md5, hash, sizeof(md5)) == 0, "md5"); \
ok(my_aes_decrypt_ ## mode(dst, dst_len, ddst, &ddst_len, \
key, sizeof(key), iv, sizeof(iv), 0) == MY_AES_OK, \
"decrypt " #mode " %u", dst_len); \
ok(ddst_len == src_len && memcmp(src, ddst, src_len) == 0, "memcmp"); \
} while(0)
#define DO_TEST_N(mode, slen, fill, dlen, hash) \
do { \
memset(src, fill, src_len= slen); \
ok(my_aes_encrypt_ ## mode(src, src_len, dst, &dst_len, \
key, sizeof(key), iv, sizeof(iv), 1) == MY_AES_OK, \
"encrypt " #mode " %u nopad", src_len); \
my_md5(md5, (char*)dst, dst_len); \
ok(dst_len == dlen && memcmp(md5, hash, sizeof(md5)) == 0, "md5"); \
ok(my_aes_decrypt_ ## mode(dst, dst_len, ddst, &ddst_len, \
key, sizeof(key), iv, sizeof(iv), 1) == MY_AES_OK, \
"decrypt " #mode " %u", dst_len); \
ok(ddst_len == src_len && memcmp(src, ddst, src_len) == 0, "memcmp"); \
} while(0)
#ifdef HAVE_YASSL
#define DO_TEST_X(mode, slen, fill, dlen, hash) \
skip(4, #mode " is not supported")
#else
#define DO_TEST_X(mode, slen, fill, dlen, hash) \
do { \
memset(src, fill, src_len= slen); \
ok(my_aes_encrypt_ ## mode(src, src_len, dst, &dst_len, \
key, sizeof(key), iv, sizeof(iv)) == MY_AES_OK, \
"encrypt " #mode " %u", src_len); \
my_md5(md5, (char*)dst, dst_len); \
ok(dst_len == dlen && memcmp(md5, hash, sizeof(md5)) == 0, "md5"); \
ok(my_aes_decrypt_ ## mode(dst, dst_len, ddst, &ddst_len, \
key, sizeof(key), iv, sizeof(iv)) == MY_AES_OK, \
"decrypt " #mode " %u", dst_len); \
ok(ddst_len == src_len && memcmp(src, ddst, src_len) == 0, "memcmp"); \
} while(0)
#endif
/* useful macro for debugging */
#define PRINT_MD5() \
do { \
uint i; \
printf("\""); \
for (i=0; i < sizeof(md5); i++) \
printf("\\x%02x", md5[i]); \
printf("\"\n"); \
} while(0);
int
main
(
int
argc
__attribute__
((
unused
)),
char
*
argv
[])
{
uchar
key
[
16
]
=
{
1
,
2
,
3
,
4
,
5
,
6
,
7
,
8
,
9
,
0
,
1
,
2
,
3
,
4
,
5
,
6
};
uchar
iv
[
16
]
=
{
2
,
3
,
4
,
5
,
6
,
7
,
8
,
9
,
0
,
1
,
2
,
3
,
4
,
5
,
6
,
7
};
uchar
src
[
1000
],
dst
[
1100
],
ddst
[
1000
];
uchar
md5
[
MY_MD5_HASH_SIZE
];
uint
src_len
,
dst_len
,
ddst_len
;
MY_INIT
(
argv
[
0
]);
plan
(
84
);
DO_TEST_P
(
ecb
,
200
,
'.'
,
208
,
"
\xd8\x73\x8e\x3a\xbc\x66\x99\x13\x7f\x90\x23\x52\xee\x97\x6f\x9a
"
);
DO_TEST_P
(
ecb
,
128
,
'?'
,
144
,
"
\x19\x58\x33\x85\x4c\xaa\x7f\x06\xd1\xb2\xec\xd7\xb7\x6a\xa9\x5b
"
);
DO_TEST_P
(
cbc
,
159
,
'%'
,
160
,
"
\x4b\x03\x18\x3d\xf1\xa7\xcd\xa1\x46\xb3\xc6\x8a\x92\xc0\x0f\xc9
"
);
DO_TEST_P
(
cbc
,
192
,
'@'
,
208
,
"
\x54\xc4\x75\x1d\xff\xe0\xf6\x80\xf0\x85\xbb\x8b\xda\x07\x21\x17
"
);
DO_TEST_N
(
ecb
,
200
,
'.'
,
200
,
"
\xbf\xec\x43\xd1\x66\x8d\x01\xad\x3a\x25\xee\xa6\x3d\xc6\xc4\x68
"
);
DO_TEST_N
(
ecb
,
128
,
'?'
,
128
,
"
\x5b\x44\x20\xf3\xd9\xb4\x9d\x74\x5e\xb7\x5a\x0a\xe7\x32\x35\xc3
"
);
DO_TEST_N
(
cbc
,
159
,
'%'
,
159
,
"
\xf3\x6e\x40\x00\x3c\x08\xa0\xb1\x2d\x1f\xcf\xce\x54\xc9\x73\x83
"
);
DO_TEST_N
(
cbc
,
192
,
'@'
,
192
,
"
\x30\xe5\x28\x8c\x4a\x3b\x02\xd7\x56\x40\x59\x25\xac\x58\x09\x22
"
);
DO_TEST_X
(
ctr
,
200
,
'.'
,
200
,
"
\x5a\x77\x19\xea\x67\x50\xe3\xab\x7f\x39\x6f\xc4\xa8\x09\xc5\x88
"
);
DO_TEST_X
(
gcm
,
128
,
'?'
,
144
,
"
\x54\x6a\x7c\xa2\x04\xdc\x6e\x80\x1c\xcd\x5f\x7a\x7b\x08\x9e\x9d
"
);
/* test short inputs (less that one block) */
DO_TEST_P
(
ecb
,
1
,
'.'
,
16
,
"
\x6c\xd7\x66\x5b\x1b\x1e\x3a\x04\xfd\xb1\x91\x8d\x0e\xfd\xf1\x86
"
);
DO_TEST_P
(
ecb
,
2
,
'?'
,
16
,
"
\xdb\x84\x9e\xaf\x5f\xcc\xdb\x6b\xf2\x1c\xeb\x53\x75\xa3\x53\x5e
"
);
DO_TEST_P
(
cbc
,
3
,
'%'
,
16
,
"
\x60\x8e\x45\x9a\x07\x39\x63\xce\x02\x19\xdd\x52\xe3\x09\x2a\x66
"
);
DO_TEST_P
(
cbc
,
4
,
'@'
,
16
,
"
\x90\xc2\x6b\xf8\x84\x79\x83\xbd\xc1\x60\x71\x04\x55\x6a\xce\x9e
"
);
DO_TEST_N
(
ecb
,
5
,
'.'
,
5
,
"
\x6b\x60\xdc\xa4\x24\x9b\x02\xbb\x24\x41\x9b\xb0\xd1\x01\xcd\xba
"
);
DO_TEST_N
(
ecb
,
6
,
'?'
,
6
,
"
\x35\x8f\xb7\x9d\xd9\x61\x21\xcf\x25\x66\xd5\x9e\x91\xc1\x42\x7e
"
);
DO_TEST_N
(
cbc
,
7
,
'%'
,
7
,
"
\x94\x5e\x80\x71\x41\x7a\x64\x5d\x6f\x2e\x5b\x66\x9b\x5a\x3d\xda
"
);
DO_TEST_N
(
cbc
,
8
,
'@'
,
8
,
"
\xb8\x53\x97\xb9\x40\xa6\x98\xaf\x0c\x7b\x9a\xac\xad\x7e\x3c\xe0
"
);
DO_TEST_X
(
gcm
,
9
,
'?'
,
25
,
"
\x5e\x05\xfd\xb2\x8e\x17\x04\x1e\xff\x6d\x71\x81\xcd\x85\x8d\xb5
"
);
my_end
(
0
);
return
exit_status
();
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment