From: Lukasz Pawelczyk Date: Wed, 29 Jun 2016 10:25:31 +0000 (+0200) Subject: YACA: HMAC and CMAC invalid param tests X-Git-Tag: security-manager_5.5_testing~65 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=05ae6ae507d7563f9f69d1913832c41c677fe38f;p=platform%2Fcore%2Ftest%2Fsecurity-tests.git YACA: HMAC and CMAC invalid param tests Change-Id: Ie6f2ec887ec6cdf9165f63641a5c7839562d6f37 --- diff --git a/src/yaca/yaca-test-sign.cpp b/src/yaca/yaca-test-sign.cpp index 7b48de21..d48dc32f 100644 --- a/src/yaca/yaca-test-sign.cpp +++ b/src/yaca/yaca-test-sign.cpp @@ -67,7 +67,35 @@ RUNNER_TEST(T6010_yaca_sign_init_invalid_param, YacaTest) YACA_INVALID_PARAM(yaca_sign_initialize(&ctx, YACA_DIGEST_MD5, sym.get())); } -RUNNER_TEST(T6020_yaca_sign_update_invalid_param, YacaTest) +RUNNER_TEST(T6020_yaca_sign_hmac_init_invalid_param, YacaTest) +{ + yaca_context_h ctx = YACA_CONTEXT_NULL; + KeyPtr sym = generate_key(YACA_KEY_TYPE_SYMMETRIC, YACA_KEY_LENGTH_256BIT); + KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); + KeyPtr pub = extract_public_key(prv); + + YACA_INVALID_PARAM(yaca_sign_initialize_hmac(nullptr, YACA_DIGEST_MD5, sym.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_hmac(&ctx, static_cast(-1), prv.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_hmac(&ctx, YACA_DIGEST_MD5, YACA_KEY_NULL)); + YACA_INVALID_PARAM(yaca_sign_initialize_hmac(&ctx, YACA_DIGEST_MD5, prv.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_hmac(&ctx, YACA_DIGEST_MD5, pub.get())); +} + +RUNNER_TEST(T6030_yaca_sign_cmac_init_invalid_param, YacaTest) +{ + yaca_context_h ctx = YACA_CONTEXT_NULL; + KeyPtr sym = generate_key(YACA_KEY_TYPE_SYMMETRIC, YACA_KEY_LENGTH_256BIT); + KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); + KeyPtr pub = extract_public_key(prv); + + YACA_INVALID_PARAM(yaca_sign_initialize_cmac(nullptr, YACA_ENCRYPT_AES, sym.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_cmac(&ctx, static_cast(-1), prv.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_cmac(&ctx, YACA_ENCRYPT_AES, YACA_KEY_NULL)); + YACA_INVALID_PARAM(yaca_sign_initialize_cmac(&ctx, YACA_ENCRYPT_AES, prv.get())); + YACA_INVALID_PARAM(yaca_sign_initialize_cmac(&ctx, YACA_ENCRYPT_AES, pub.get())); +} + +RUNNER_TEST(T6040_yaca_sign_update_invalid_param, YacaTest) { KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); CtxPtr ctx = sign_init(YACA_DIGEST_MD5, prv); @@ -79,7 +107,7 @@ RUNNER_TEST(T6020_yaca_sign_update_invalid_param, YacaTest) YACA_INVALID_PARAM(yaca_sign_update(ctx.get(), lorem16, 0)); } -RUNNER_TEST(T6030_yaca_sign_final_invalid_param, YacaTest) +RUNNER_TEST(T6050_yaca_sign_final_invalid_param, YacaTest) { KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); CtxPtr ctx = sign_init(YACA_DIGEST_MD5, prv); @@ -91,7 +119,7 @@ RUNNER_TEST(T6030_yaca_sign_final_invalid_param, YacaTest) YACA_INVALID_PARAM(yaca_sign_finalize(ctx.get(), sign.get(), nullptr)); } -RUNNER_TEST(T6040_yaca_verify_init_invalid_param) +RUNNER_TEST(T6060_yaca_verify_init_invalid_param) { yaca_context_h ctx = YACA_CONTEXT_NULL; KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); @@ -105,7 +133,7 @@ RUNNER_TEST(T6040_yaca_verify_init_invalid_param) YACA_INVALID_PARAM(yaca_verify_initialize(&ctx, YACA_DIGEST_MD5, sym.get())); } -RUNNER_TEST(T6050_yaca_verify_update_invalid_param) +RUNNER_TEST(T6070_yaca_verify_update_invalid_param) { KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); KeyPtr pub = extract_public_key(prv); @@ -116,7 +144,7 @@ RUNNER_TEST(T6050_yaca_verify_update_invalid_param) YACA_INVALID_PARAM(yaca_sign_update(ctx.get(), lorem16, 0)); } -RUNNER_TEST(T6060_yaca_verify_final_invalid_param) +RUNNER_TEST(T6080_yaca_verify_final_invalid_param) { KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); KeyPtr pub = extract_public_key(prv); @@ -127,7 +155,7 @@ RUNNER_TEST(T6060_yaca_verify_final_invalid_param) YACA_INVALID_PARAM(yaca_verify_finalize(ctx.get(), lorem16, 0)); } -RUNNER_TEST(T6070_yaca_sign_get_output_length_invalid_param) +RUNNER_TEST(T6090_yaca_sign_get_output_length_invalid_param) { KeyPtr prv = generate_key(YACA_KEY_TYPE_RSA_PRIV, YACA_KEY_LENGTH_1024BIT); KeyPtr pub = extract_public_key(prv); @@ -140,7 +168,7 @@ RUNNER_TEST(T6070_yaca_sign_get_output_length_invalid_param) YACA_INVALID_PARAM(yaca_context_get_output_length(ctx.get(), 0, NULL)); } -RUNNER_TEST(T6080_yaca_sign_get_output_length) +RUNNER_TEST(T6100_yaca_sign_get_output_length) { const std::vector digests = { YACA_DIGEST_MD5, @@ -171,7 +199,7 @@ RUNNER_TEST(T6080_yaca_sign_get_output_length) sign_length_test(d, k); } -RUNNER_TEST(T6090_yaca_sign_test_vectors, YacaTest) +RUNNER_TEST(T6110_yaca_sign_test_vectors, YacaTest) { auto tvv = loadTestVector("sign_ascii.txt"); @@ -224,7 +252,7 @@ RUNNER_TEST(T6090_yaca_sign_test_vectors, YacaTest) } } -RUNNER_TEST(T6100_yaca_sign_verify_test_vectors, YacaTest) +RUNNER_TEST(T6120_yaca_sign_verify_test_vectors, YacaTest) { auto tvv = loadTestVector("sign_verify_ascii.txt"); @@ -278,7 +306,7 @@ RUNNER_TEST(T6100_yaca_sign_verify_test_vectors, YacaTest) } } -RUNNER_TEST(T6110_yaca_sign_hmac_test_vectors, YacaTest) +RUNNER_TEST(T6130_yaca_sign_hmac_test_vectors, YacaTest) { auto tvv = loadTestVector("sign_hmac_ascii.txt"); @@ -327,7 +355,7 @@ RUNNER_TEST(T6110_yaca_sign_hmac_test_vectors, YacaTest) } } -RUNNER_TEST(T6120_yaca_sign_cmac_test_vectors, YacaTest) +RUNNER_TEST(T6140_yaca_sign_cmac_test_vectors, YacaTest) { auto tvv = loadTestVector("sign_cmac_ascii.txt");