OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file | |
2 // for details. All rights reserved. Use of this source code is governed by a | |
3 // BSD-style license that can be found in the LICENSE file. | |
4 | |
5 // Library tag to allow the test to run on Dartium. | |
6 library hmac_md5_test; | |
7 | |
8 import "package:expect/expect.dart"; | |
9 import "package:crypto/crypto.dart"; | |
10 | |
11 // Data from http://tools.ietf.org/html/rfc2202. | |
12 var hmac_md5_inputs = | |
13 const [ | |
14 const [ 0x48, 0x69, 0x20, 0x54, 0x68, 0x65, 0x72, 0x65 ], | |
15 const [ 0x77, 0x68, 0x61, 0x74, 0x20, 0x64, 0x6f, 0x20, 0x79, 0x61, | |
16 0x20, 0x77, 0x61, 0x6e, 0x74, 0x20, 0x66, 0x6f, 0x72, 0x20, | |
17 0x6e, 0x6f, 0x74, 0x68, 0x69, 0x6e, 0x67, 0x3f ], | |
18 const [ 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, | |
19 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, | |
20 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, | |
21 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, | |
22 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd ], | |
23 const [ 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, | |
24 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, | |
25 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, | |
26 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, | |
27 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd, 0xcd ], | |
28 const [ 0x54, 0x65, 0x73, 0x74, 0x20, 0x57, 0x69, 0x74, 0x68, 0x20, | |
29 0x54, 0x72, 0x75, 0x6e, 0x63, 0x61, 0x74, 0x69, 0x6f, 0x6e ], | |
30 const [ 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69, 0x6e, 0x67, | |
31 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x54, 0x68, | |
32 0x61, 0x6e, 0x20, 0x42, 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, | |
33 0x69, 0x7a, 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x2d, 0x20, | |
34 0x48, 0x61, 0x73, 0x68, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x46, | |
35 0x69, 0x72, 0x73, 0x74 ], | |
36 const [ 0x54, 0x65, 0x73, 0x74, 0x20, 0x55, 0x73, 0x69, 0x6e, 0x67, | |
37 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x54, 0x68, | |
38 0x61, 0x6e, 0x20, 0x42, 0x6c, 0x6f, 0x63, 0x6b, 0x2d, 0x53, | |
39 0x69, 0x7a, 0x65, 0x20, 0x4b, 0x65, 0x79, 0x20, 0x61, 0x6e, | |
40 0x64, 0x20, 0x4c, 0x61, 0x72, 0x67, 0x65, 0x72, 0x20, 0x54, | |
41 0x68, 0x61, 0x6e, 0x20, 0x4f, 0x6e, 0x65, 0x20, 0x42, 0x6c, | |
42 0x6f, 0x63, 0x6b, 0x2d, 0x53, 0x69, 0x7a, 0x65, 0x20, 0x44, | |
43 0x61, 0x74, 0x61 ] ]; | |
44 | |
45 var hmac_md5_keys = | |
46 const [ const [0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, | |
47 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b, 0x0b], | |
48 const [ 0x4a, 0x65, 0x66, 0x65 ], | |
49 const [0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
50 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa], | |
51 const [ 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, | |
52 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, | |
53 0x15, 0x16, 0x17, 0x18, 0x19 ], | |
54 const [ 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, | |
55 0x0c, 0x0c, 0x0c, 0x0c, 0x0c, 0x0c ], | |
56 const [ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
57 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
58 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
59 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
60 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
61 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
62 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
63 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
64 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa ], | |
65 const [ 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
66 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
67 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
68 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
69 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
70 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
71 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
72 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, | |
73 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa ] ]; | |
74 | |
75 var hmac_md5_string_macs = | |
76 const [ '9294727a3638bb1c13f48ef8158bfc9d', | |
77 '750c783e6ab0b503eaa86e310a5db738', | |
78 '56be34521d144c88dbb8c733f0e8b3f6', | |
79 '697eaf0aca3a3aea3a75164746ffaa79', | |
80 '56461ef2342edc00f9bab995690efd4c', | |
81 '6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd', | |
82 '6f630fad67cda0ee1fb1f562db3aa53e' ]; | |
83 | |
84 var hmac_md5_macs = | |
85 const [ const [0x92, 0x94, 0x72, 0x7a, 0x36, 0x38, 0xbb, 0x1c, 0x13, 0xf4, | |
86 0x8e, 0xf8, 0x15, 0x8b, 0xfc, 0x9d], | |
87 const [0x75, 0x0c, 0x78, 0x3e, 0x6a, 0xb0, 0xb5, 0x03, 0xea, 0xa8, | |
88 0x6e, 0x31, 0x0a, 0x5d, 0xb7, 0x38], | |
89 const [0x56, 0xbe, 0x34, 0x52, 0x1d, 0x14, 0x4c, 0x88, 0xdb, 0xb8, | |
90 0xc7, 0x33, 0xf0, 0xe8, 0xb3, 0xf6], | |
91 const [0x69, 0x7e, 0xaf, 0x0a, 0xca, 0x3a, 0x3a, 0xea, 0x3a, 0x75, | |
92 0x16, 0x47, 0x46, 0xff, 0xaa, 0x79], | |
93 const [0x56, 0x46, 0x1e, 0xf2, 0x34, 0x2e, 0xdc, 0x00, 0xf9, 0xba, | |
94 0xb9, 0x95, 0x69, 0x0e, 0xfd, 0x4c], | |
95 const [0x6b, 0x1a, 0xb7, 0xfe, 0x4b, 0xd7, 0xbf, 0x8f, 0x0b, 0x62, | |
96 0xe6, 0xce, 0x61, 0xb9, 0xd0, 0xcd], | |
97 const [0x6f, 0x63, 0x0f, 0xad, 0x67, 0xcd, 0xa0, 0xee, 0x1f, 0xb1, | |
98 0xf5, 0x62, 0xdb, 0x3a, 0xa5, 0x3e]]; | |
99 | |
100 void testStandardVectors(inputs, keys, string_macs, macs) { | |
101 for (var i = 0; i < inputs.length; i++) { | |
102 var h = new HMAC(new MD5(), keys[i]); | |
103 h.add(inputs[i]); | |
104 var d = h.close(); | |
105 Expect.isTrue(CryptoUtils.bytesToHex(d).startsWith(string_macs[i]), '$i'); | |
106 Expect.isTrue(h.verify(macs[i])); | |
107 Expect.isFalse(h.verify(macs[(i+1)%macs.length])); | |
108 Expect.throws(() => h.verify([])); | |
109 } | |
110 } | |
111 | |
112 void main() { | |
113 testStandardVectors(hmac_md5_inputs, hmac_md5_keys, | |
114 hmac_md5_string_macs, hmac_md5_macs); | |
115 } | |
OLD | NEW |