1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/ossrv/stdlibs/libcrypt/test/src/tcrypt.cpp Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,473 @@
1.4 +/*
1.5 +* Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +*
1.19 +*/
1.20 +
1.21 +// INCLUDE FILES
1.22 +#include <e32svr.h>
1.23 +#include "tcrypt.h"
1.24 +
1.25 +// EXTERNAL FUNCTION PROTOTYPES
1.26 +extern "C" {
1.27 +IMPORT_C char *crypt(const char *key, const char *salt);
1.28 +IMPORT_C void setkey(const char *key);
1.29 +IMPORT_C void encrypt(char block[], int edflag);
1.30 +}
1.31 +
1.32 +// LOCAL FUNCTION PROTOTYPES
1.33 +LOCAL_C void GetBitVector(char data[], char* buffer);
1.34 +LOCAL_C char *TrimWhiteSpaces(char *string);
1.35 +
1.36 +// ============================= LOCAL FUNCTIONS ===============================
1.37 +
1.38 +// -----------------------------------------------------------------------------
1.39 +// TrimWhiteSpaces
1.40 +// To to trim whitespaces in the input string
1.41 +// -----------------------------------------------------------------------------
1.42 +//
1.43 +LOCAL_C char *TrimWhiteSpaces(char *string)
1.44 +{
1.45 + char *pTemp = string;
1.46 + for(;*string != '\0'; string++)
1.47 + {
1.48 + if((*string == ' ') || (*string == '\t'))
1.49 + {
1.50 + pTemp++;
1.51 + }
1.52 + }
1.53 +
1.54 + return pTemp;
1.55 +}
1.56 +
1.57 +// -----------------------------------------------------------------------------
1.58 +// GetBitVector
1.59 +// This function unpacks the byte to obtain the corresponding bit vector
1.60 +// -----------------------------------------------------------------------------
1.61 +//
1.62 +LOCAL_C void GetBitVector(char data[], char* buffer)
1.63 +{
1.64 + int temp;
1.65 + if(buffer != NULL )
1.66 + {
1.67 + temp = strlen(buffer);
1.68 + for(int i = 0 ; i<temp ; ++i, ++buffer)
1.69 + {
1.70 + data[i] = *buffer - '0';
1.71 + }
1.72 + }
1.73 +}
1.74 +
1.75 +
1.76 +CTestCrypt::~CTestCrypt()
1.77 + {
1.78 +
1.79 + }
1.80 +
1.81 +CTestCrypt::CTestCrypt(const TDesC& aStepName)
1.82 + {
1.83 + // MANDATORY Call to base class method to set up the human readable name for logging.
1.84 + SetTestStepName(aStepName);
1.85 + }
1.86 +
1.87 +TVerdict CTestCrypt::doTestStepPreambleL()
1.88 + {
1.89 + __UHEAP_MARK;
1.90 +
1.91 + SetTestStepResult(EPass);
1.92 + iTestDataFile = fopen("C:\\tcrypt\\test_data.dat", "r");
1.93 + if(iTestDataFile == NULL)
1.94 + {
1.95 + SetTestStepResult(EFail);
1.96 + }
1.97 +
1.98 + return TestStepResult();
1.99 + }
1.100 +
1.101 +TVerdict CTestCrypt::doTestStepPostambleL()
1.102 + {
1.103 + fclose(iTestDataFile);
1.104 + __UHEAP_MARKEND;
1.105 + return TestStepResult();
1.106 + }
1.107 +
1.108 +TVerdict CTestCrypt::doTestStepL()
1.109 + {
1.110 + int err;
1.111 +
1.112 + if(TestStepName() == KEncrypt)
1.113 + {
1.114 + INFO_PRINTF1(_L("Encrypt():"));
1.115 + err = Encrypt();
1.116 + SetTestStepResult(err ? static_cast<TVerdict>(err) : EPass);
1.117 + }
1.118 + else if(TestStepName() == KCrypt)
1.119 + {
1.120 + INFO_PRINTF1(_L("Crypt():"));
1.121 + err = Crypt();
1.122 + SetTestStepResult(err ? static_cast<TVerdict>(err) : EPass);
1.123 + }
1.124 +
1.125 + return TestStepResult();
1.126 + }
1.127 +
1.128 +
1.129 +// -----------------------------------------------------------------------------
1.130 +// CTestCrypt::Encrypt
1.131 +// Encrypt function
1.132 +// -----------------------------------------------------------------------------
1.133 +//
1.134 +TInt CTestCrypt::Encrypt()
1.135 +{
1.136 + static int tId = 0;
1.137 + char pTemp[30];
1.138 + memset(pTemp, 0, 30);
1.139 + sprintf(pTemp, "ENCRYPT_TEST_DATA_%d", ++tId);
1.140 + INFO_PRINTF2(_L("Begin: ENCRYPT_TEST_DATA_%d\n"), tId);
1.141 +
1.142 + // locate "test_data_id" from within the file
1.143 + if(!RepositionFilePointer(pTemp))
1.144 + {
1.145 + // String not found...invalid test data ID
1.146 + INFO_PRINTF1(_L("Requested test data ID could not be found\n"));
1.147 + return KErrNotFound;
1.148 + }
1.149 +
1.150 + // Get the key, data block, operation to be performed and the
1.151 + // expected output for the current test data ID
1.152 + char key[64] =
1.153 + {
1.154 + 0
1.155 + };
1.156 + char block[64] =
1.157 + {
1.158 + 0
1.159 + };
1.160 + char output[64] =
1.161 + {
1.162 + 0
1.163 + };
1.164 + int edflag = -1;
1.165 + if(GetEncryptTestData(key, block, &edflag, output) != KErrNone)
1.166 + {
1.167 + // Test data not found or is not present in the expected
1.168 + // format
1.169 + INFO_PRINTF1(_L("Test data not found or is not present in the expected format\n"));
1.170 + return KErrNotFound;
1.171 + }
1.172 +
1.173 + // Perform encryption/decryption
1.174 +
1.175 + // Invoke setkey from the libcrypt library
1.176 + setkey(key);
1.177 +
1.178 + // Call the encrypt function
1.179 + encrypt(block,edflag);
1.180 +
1.181 + // Verify if the final output is same as the expected output
1.182 +
1.183 + if(!strcmp(block,block))
1.184 + {
1.185 + INFO_PRINTF2(_L("End: ENCRYPT_TEST_DATA_%d\n"), tId);
1.186 + // Test case passed
1.187 + return KErrNone;
1.188 + }
1.189 + INFO_PRINTF1(_L("Output from the encrypt() function does not match the \"expected output\""));
1.190 + INFO_PRINTF2(_L("End: ENCRYPT_TEST_DATA_%d\n"), tId);
1.191 + return KErrNotFound;
1.192 +}
1.193 +
1.194 +// -----------------------------------------------------------------------------
1.195 +// CTestCrypt::RepositionFilePointer
1.196 +// This function positions the file pointer to the line immediately following
1.197 +// the string aString
1.198 +// -----------------------------------------------------------------------------
1.199 +//
1.200 +
1.201 +TInt CTestCrypt::RepositionFilePointer(const char *aString)
1.202 +{
1.203 + char buffer[256];
1.204 + char * ptr = NULL;
1.205 + while(fgets((char*)buffer, 256, iTestDataFile) != NULL)
1.206 + {
1.207 + ptr = NULL;
1.208 +
1.209 + if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
1.210 + *ptr='\0';
1.211 + if(!strcmp(buffer, aString))
1.212 + {
1.213 + return 1;
1.214 + }
1.215 + memset(buffer, 0, 256);
1.216 + }
1.217 + return 0;
1.218 +}
1.219 +
1.220 +// -----------------------------------------------------------------------------
1.221 +// CTestCrypt::GetEncryptTestData
1.222 +// This function reads the test data for encrypt() API
1.223 +// -----------------------------------------------------------------------------
1.224 +//
1.225 +TInt CTestCrypt::GetEncryptTestData(char key[], char block[], int *edflag, char output[])
1.226 +{
1.227 + char buffer[256];
1.228 + char *p = NULL;
1.229 + bool bKey = false, // will be set to true upon reading 'key'
1.230 + bBlock = false, // will be set to true upon reading 'data block'
1.231 + bEdflag = false, // will be set to true upon reading 'edflag'
1.232 + bOutput = false; // will be set to true upon reading 'expected output'
1.233 +
1.234 + char *pTemp = NULL;
1.235 + char * ptr = NULL;
1.236 +
1.237 + while((p = fgets(buffer, 256, iTestDataFile)) != NULL)
1.238 + {
1.239 +
1.240 + ptr = NULL;
1.241 +
1.242 + if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
1.243 + *ptr='\0';
1.244 + if(strstr(buffer, "//") != NULL)
1.245 + {
1.246 + continue;
1.247 + }
1.248 + if(!strcmp(buffer, "END_TEST_DATA"))
1.249 + {
1.250 + if(bKey && bBlock && bEdflag && bOutput)
1.251 + {
1.252 + return KErrNone;
1.253 + }
1.254 + return KErrNotFound;
1.255 + }
1.256 + if(strstr(buffer, "KEY") != NULL)
1.257 + {
1.258 + // Read the key
1.259 +
1.260 + // Get bytes...
1.261 + pTemp = strstr(buffer, ":");
1.262 + if(pTemp != NULL)
1.263 + {
1.264 + pTemp++;
1.265 + pTemp = TrimWhiteSpaces(pTemp);
1.266 + GetBitVector(key, pTemp);
1.267 + }
1.268 + bKey = true;
1.269 + continue;
1.270 + }
1.271 + if(strstr(buffer, "DATA_BLOCK") != NULL)
1.272 + {
1.273 + // Read the data block
1.274 +
1.275 + pTemp = strstr(buffer, ":");
1.276 + if(pTemp != NULL)
1.277 + {
1.278 + pTemp++;
1.279 + pTemp = TrimWhiteSpaces(pTemp);
1.280 + GetBitVector(block, pTemp);
1.281 + }
1.282 + bBlock = true;
1.283 + continue;
1.284 + }
1.285 + if(strstr(buffer, "ED_FLAG") != NULL)
1.286 + {
1.287 + // Read the ed_flag parameter
1.288 +
1.289 + pTemp = strstr(buffer, ":");
1.290 + if(pTemp != NULL)
1.291 + {
1.292 + pTemp++;
1.293 + pTemp = TrimWhiteSpaces(pTemp);
1.294 + *edflag = (*pTemp) - '0';
1.295 + }
1.296 + bEdflag = true;
1.297 + continue;
1.298 + }
1.299 + if(strstr(buffer, "EXPECTED_OUTPUT") != NULL)
1.300 + {
1.301 + // Read the bit vector for the expected output
1.302 +
1.303 + pTemp = strstr(buffer, ":");
1.304 + if(pTemp != NULL)
1.305 + {
1.306 + pTemp++;
1.307 + pTemp = TrimWhiteSpaces(pTemp);
1.308 + GetBitVector(output, pTemp);
1.309 + }
1.310 + bOutput = true;
1.311 + continue;
1.312 + }
1.313 + }
1.314 +
1.315 + return KErrNotFound;
1.316 +}
1.317 +
1.318 +// -----------------------------------------------------------------------------
1.319 +// CTestCrypt::Crypt
1.320 +// Test function to perform crypt() on the input data
1.321 +// -----------------------------------------------------------------------------
1.322 +//
1.323 +TInt CTestCrypt::Crypt()
1.324 +{
1.325 + static int tId = 0;
1.326 + char pTemp[30];
1.327 + memset(pTemp, 0, 30);
1.328 + sprintf(pTemp, "CRYPT_TEST_DATA_%d", ++tId);
1.329 + INFO_PRINTF2(_L("Begin CRYPT_TEST_DATA_%d\n"), tId);
1.330 +
1.331 + // locate "test_data_id" from within the file
1.332 + if(!RepositionFilePointer(pTemp))
1.333 + {
1.334 + // String not found...invalid test data ID
1.335 + INFO_PRINTF1(_L("Requested test data ID could not be found\n"));
1.336 + return KErrNotFound;
1.337 + }
1.338 +
1.339 + char password[34] =
1.340 + {
1.341 + '\0'
1.342 + };
1.343 + char salt[30] =
1.344 + {
1.345 + '\0'
1.346 + };
1.347 + char output[35] =
1.348 + {
1.349 + '\0'
1.350 + };
1.351 +
1.352 + if(GetCryptTestData(password, salt, output) != KErrNone)
1.353 + {
1.354 + // Data not in the expected format or is invalid
1.355 + INFO_PRINTF1(_L("Test data not found or is not present in the expected format\n"));
1.356 + return KErrNotFound;
1.357 + }
1.358 +
1.359 + char *crypt_output = NULL;
1.360 + // Invoke crypt()
1.361 + crypt_output = crypt(password,salt);
1.362 + if(!strcmp(output,""))
1.363 + {
1.364 + // Since salt is NULL, the expected output is ignored...
1.365 + return KErrNone;
1.366 + }
1.367 + if(!strcmp(salt, ""))
1.368 + {
1.369 + // salt is NULL, so skip the first byte from the crypt output
1.370 + if(crypt_output != NULL)
1.371 + {
1.372 + crypt_output++;
1.373 + if(!strcmp(crypt_output, &output[0]))
1.374 + {
1.375 + INFO_PRINTF2(_L("End: CRYPT_TEST_DATA_%d\n"), tId);
1.376 + return KErrNone;
1.377 + }
1.378 + INFO_PRINTF1(_L("Output from the crypt() function does not match the \"expected output\""));
1.379 + return KErrNotFound;
1.380 + }
1.381 + }
1.382 + else
1.383 + {
1.384 + // salt is not NULL
1.385 + if(!strcmp(crypt_output, output))
1.386 + {
1.387 + INFO_PRINTF2(_L("End: CRYPT_TEST_DATA_%d\n"), tId);
1.388 + return KErrNone;
1.389 + }
1.390 + INFO_PRINTF1(_L("Output from the crypt() function does not match the \"expected output\""));
1.391 + return KErrNotFound;
1.392 + }
1.393 + return KErrNotFound;
1.394 +}
1.395 +
1.396 +// -----------------------------------------------------------------------------
1.397 +// CTestCrypt::GetCryptTestData
1.398 +// To retrieve the test data for crypt() API
1.399 +// -----------------------------------------------------------------------------
1.400 +//
1.401 +TInt CTestCrypt::GetCryptTestData(char password[], char salt[], char output[])
1.402 +{
1.403 + char buffer[256];
1.404 + char *p = NULL;
1.405 + char *pTemp = NULL;
1.406 + int nLength = 0;
1.407 + bool bPassword = false,
1.408 + bSalt = false,
1.409 + bOutput = false;
1.410 + char * ptr = NULL;
1.411 +
1.412 + while((p = fgets(buffer, 256, iTestDataFile)) != NULL)
1.413 + {
1.414 + ptr = NULL;
1.415 +
1.416 + if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
1.417 + *ptr='\0';
1.418 + if(strstr(buffer, "//") != NULL) // skip the comments
1.419 + {
1.420 + // "//" could appear within password or salt, so further
1.421 + // check is required
1.422 +
1.423 + // Since judicious use of whitespaces is allowed only from within
1.424 + // the comment lines, the comment line will always start with
1.425 + // "//"
1.426 + if(buffer[0] == '/' && buffer[1] == '/')
1.427 + {
1.428 + continue;
1.429 + }
1.430 + }
1.431 + if(!strcmp(buffer, "END_TEST_DATA"))
1.432 + {
1.433 + if(bPassword && bSalt && bOutput)
1.434 + {
1.435 + return KErrNone;
1.436 + }
1.437 + return KErrNotFound;
1.438 + }
1.439 +
1.440 + // Verify if the input buffer has "data". Data is followed by ":"
1.441 + pTemp = strstr(buffer, ":");
1.442 + if(pTemp != NULL)
1.443 + {
1.444 + pTemp++;
1.445 + pTemp = TrimWhiteSpaces(pTemp);
1.446 + nLength = strlen(pTemp);
1.447 + if(strstr(buffer, "PASSWORD") != NULL)
1.448 + {
1.449 + strncpy(password,pTemp,nLength);
1.450 + bPassword = true;
1.451 + continue;
1.452 + }
1.453 + else if(strstr(buffer, "SALT") != NULL)
1.454 + {
1.455 + strncpy(salt,pTemp,nLength);
1.456 + bSalt = true;
1.457 + continue;
1.458 + }
1.459 + else if(strstr(buffer, "EXPECTED_OUTPUT") != NULL)
1.460 + {
1.461 + strncpy(output,pTemp,nLength);
1.462 + bOutput = true;
1.463 + continue;
1.464 + }
1.465 + else
1.466 + {
1.467 + // Unexpected output
1.468 + return KErrNotFound;
1.469 + }
1.470 + }
1.471 + }
1.472 + return KErrNotFound;
1.473 +}
1.474 +
1.475 +// End of File
1.476 +