os/ossrv/stdlibs/libcrypt/test/src/tcrypt.cpp
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/ossrv/stdlibs/libcrypt/test/src/tcrypt.cpp	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,473 @@
     1.4 +/*
     1.5 +* Copyright (c) 2010 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +* All rights reserved.
     1.7 +* This component and the accompanying materials are made available
     1.8 +* under the terms of "Eclipse Public License v1.0"
     1.9 +* which accompanies this distribution, and is available
    1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +*
    1.12 +* Initial Contributors:
    1.13 +* Nokia Corporation - initial contribution.
    1.14 +*
    1.15 +* Contributors:
    1.16 +*
    1.17 +* Description:
    1.18 +*
    1.19 +*/
    1.20 +
    1.21 +// INCLUDE FILES
    1.22 +#include <e32svr.h>
    1.23 +#include "tcrypt.h"
    1.24 +
    1.25 +// EXTERNAL FUNCTION PROTOTYPES  
    1.26 +extern "C" {
    1.27 +IMPORT_C char *crypt(const char *key, const char *salt);
    1.28 +IMPORT_C void setkey(const char *key);
    1.29 +IMPORT_C void encrypt(char block[], int edflag);
    1.30 +}
    1.31 +
    1.32 +// LOCAL FUNCTION PROTOTYPES
    1.33 +LOCAL_C void GetBitVector(char data[], char* buffer);
    1.34 +LOCAL_C char *TrimWhiteSpaces(char *string);
    1.35 +
    1.36 +// ============================= LOCAL FUNCTIONS ===============================
    1.37 +
    1.38 +// -----------------------------------------------------------------------------
    1.39 +// TrimWhiteSpaces
    1.40 +// To to trim whitespaces in the input string
    1.41 +// -----------------------------------------------------------------------------
    1.42 +//
    1.43 +LOCAL_C char *TrimWhiteSpaces(char *string)
    1.44 +{
    1.45 +	char *pTemp = string;
    1.46 +	for(;*string != '\0'; string++)
    1.47 +	{
    1.48 +		if((*string == ' ') || (*string == '\t'))
    1.49 +		{
    1.50 +			pTemp++;
    1.51 +		}
    1.52 +	}
    1.53 +	
    1.54 +	return pTemp;
    1.55 +}
    1.56 +
    1.57 +// -----------------------------------------------------------------------------
    1.58 +// GetBitVector
    1.59 +// This function unpacks the byte to obtain the corresponding bit vector
    1.60 +// -----------------------------------------------------------------------------
    1.61 +//
    1.62 +LOCAL_C void GetBitVector(char data[], char* buffer)
    1.63 +{
    1.64 +	int temp;
    1.65 +	if(buffer != NULL )
    1.66 +	{
    1.67 +		temp = strlen(buffer);
    1.68 +		for(int i = 0 ; i<temp ; ++i, ++buffer)
    1.69 +		{
    1.70 +			data[i] = *buffer - '0';
    1.71 +		}
    1.72 +	}
    1.73 +}
    1.74 +
    1.75 +
    1.76 +CTestCrypt::~CTestCrypt() 
    1.77 +	{ 
    1.78 +	
    1.79 +	}  
    1.80 +
    1.81 +CTestCrypt::CTestCrypt(const TDesC& aStepName)
    1.82 +	{
    1.83 +	// MANDATORY Call to base class method to set up the human readable name for logging.
    1.84 +	SetTestStepName(aStepName);		
    1.85 +	}
    1.86 +
    1.87 +TVerdict CTestCrypt::doTestStepPreambleL()
    1.88 +	{
    1.89 +	__UHEAP_MARK;	
    1.90 +	
    1.91 +	SetTestStepResult(EPass);
    1.92 +	iTestDataFile = fopen("C:\\tcrypt\\test_data.dat", "r");	
    1.93 +	if(iTestDataFile == NULL)
    1.94 +		{
    1.95 +		SetTestStepResult(EFail);	
    1.96 +		}
    1.97 +
    1.98 +	return TestStepResult();
    1.99 +	}
   1.100 +
   1.101 +TVerdict CTestCrypt::doTestStepPostambleL()
   1.102 +	{
   1.103 +	fclose(iTestDataFile);
   1.104 +	__UHEAP_MARKEND;	
   1.105 +	return TestStepResult();
   1.106 +	}
   1.107 +
   1.108 +TVerdict CTestCrypt::doTestStepL()
   1.109 +	{
   1.110 +	int err;
   1.111 +		
   1.112 +	if(TestStepName() == KEncrypt)
   1.113 +		{
   1.114 +   		INFO_PRINTF1(_L("Encrypt():"));
   1.115 +   		err = Encrypt();
   1.116 +   		SetTestStepResult(err ? static_cast<TVerdict>(err) : EPass);
   1.117 +   		}
   1.118 +	else if(TestStepName() == KCrypt)
   1.119 +		{
   1.120 +   		INFO_PRINTF1(_L("Crypt():"));
   1.121 +   		err = Crypt();
   1.122 +   		SetTestStepResult(err ? static_cast<TVerdict>(err) : EPass);
   1.123 +   		}
   1.124 +  		
   1.125 +   	return TestStepResult(); 
   1.126 +	}
   1.127 +
   1.128 +
   1.129 +// -----------------------------------------------------------------------------
   1.130 +// CTestCrypt::Encrypt
   1.131 +// Encrypt function
   1.132 +// -----------------------------------------------------------------------------
   1.133 +//
   1.134 +TInt CTestCrypt::Encrypt()
   1.135 +{
   1.136 +	static int tId = 0;
   1.137 +	char pTemp[30];
   1.138 +	memset(pTemp, 0, 30);
   1.139 +	sprintf(pTemp, "ENCRYPT_TEST_DATA_%d", ++tId);
   1.140 +    INFO_PRINTF2(_L("Begin: ENCRYPT_TEST_DATA_%d\n"), tId);
   1.141 + 
   1.142 +    // locate "test_data_id" from within the file
   1.143 +    if(!RepositionFilePointer(pTemp))
   1.144 +    {
   1.145 +    	// String not found...invalid test data ID
   1.146 +    	INFO_PRINTF1(_L("Requested test data ID could not be found\n"));
   1.147 +    	return KErrNotFound;
   1.148 +    }
   1.149 +
   1.150 +	// Get the key, data block, operation to be performed and the 
   1.151 +	// expected output for the current test data ID
   1.152 +	char key[64] = 
   1.153 +	{
   1.154 +		 0
   1.155 +	};
   1.156 +	char block[64] = 
   1.157 +	{
   1.158 +		0
   1.159 +	};
   1.160 +	char output[64] = 
   1.161 +	{
   1.162 +		0
   1.163 +	};
   1.164 +	int edflag = -1;
   1.165 +	if(GetEncryptTestData(key, block, &edflag, output) != KErrNone)
   1.166 +	{
   1.167 +		// Test data not found or is not present in the expected 
   1.168 +		// format
   1.169 +		INFO_PRINTF1(_L("Test data not found or is not present in the expected format\n"));
   1.170 +		return KErrNotFound;
   1.171 +	}
   1.172 +	
   1.173 +	// Perform encryption/decryption
   1.174 +	
   1.175 +	// Invoke setkey from the libcrypt library
   1.176 +	setkey(key);
   1.177 +	
   1.178 +	// Call the encrypt function
   1.179 +	encrypt(block,edflag);
   1.180 +	
   1.181 +	// Verify if the final output is same as the expected output
   1.182 +
   1.183 +	if(!strcmp(block,block))
   1.184 +	{
   1.185 +		INFO_PRINTF2(_L("End: ENCRYPT_TEST_DATA_%d\n"), tId);
   1.186 +		// Test case passed
   1.187 +		return KErrNone;
   1.188 +	}
   1.189 +	INFO_PRINTF1(_L("Output from the encrypt() function does not match the \"expected output\""));
   1.190 +	INFO_PRINTF2(_L("End: ENCRYPT_TEST_DATA_%d\n"), tId);
   1.191 +	return KErrNotFound;
   1.192 +}
   1.193 +
   1.194 +// -----------------------------------------------------------------------------
   1.195 +// CTestCrypt::RepositionFilePointer
   1.196 +// This function positions the file pointer to the line immediately following
   1.197 +// the string aString
   1.198 +// -----------------------------------------------------------------------------
   1.199 +//
   1.200 +
   1.201 +TInt CTestCrypt::RepositionFilePointer(const char *aString)
   1.202 +{
   1.203 +    char buffer[256];
   1.204 +   	char * ptr = NULL;
   1.205 +    while(fgets((char*)buffer, 256, iTestDataFile) != NULL)
   1.206 +    {
   1.207 +    	 ptr = NULL;
   1.208 +    
   1.209 +    	if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
   1.210 +		*ptr='\0';
   1.211 +    	if(!strcmp(buffer, aString))
   1.212 +    	{
   1.213 +    		return 1;
   1.214 +    	}
   1.215 +    	memset(buffer, 0, 256);
   1.216 +    }
   1.217 +    return 0;
   1.218 +}
   1.219 +
   1.220 +// -----------------------------------------------------------------------------
   1.221 +// CTestCrypt::GetEncryptTestData
   1.222 +// This function reads the test data for encrypt() API
   1.223 +// -----------------------------------------------------------------------------
   1.224 +//
   1.225 +TInt CTestCrypt::GetEncryptTestData(char key[], char block[], int *edflag, char output[])
   1.226 +{
   1.227 +	char buffer[256];
   1.228 +	char *p = NULL;
   1.229 +	bool bKey = false,		// will be set to true upon reading 'key'
   1.230 +	     bBlock = false,    // will be set to true upon reading 'data block'
   1.231 +	     bEdflag = false,   // will be set to true upon reading 'edflag'
   1.232 +	     bOutput = false;   // will be set to true upon reading 'expected output'
   1.233 +	     
   1.234 +	char *pTemp = NULL;
   1.235 +   	char * ptr = NULL;
   1.236 +
   1.237 +	while((p = fgets(buffer, 256, iTestDataFile)) != NULL)
   1.238 +	{
   1.239 +
   1.240 +		ptr = NULL;
   1.241 +    
   1.242 +    	if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
   1.243 +			*ptr='\0';
   1.244 +		if(strstr(buffer, "//") != NULL)
   1.245 +		{
   1.246 +			continue;
   1.247 +		}
   1.248 +		if(!strcmp(buffer, "END_TEST_DATA"))
   1.249 +		{
   1.250 +			if(bKey && bBlock && bEdflag && bOutput)
   1.251 +			{
   1.252 +				return KErrNone;
   1.253 +			}
   1.254 +			return KErrNotFound;
   1.255 +		}
   1.256 +		if(strstr(buffer, "KEY") != NULL)
   1.257 +		{
   1.258 +			// Read the key
   1.259 +			
   1.260 +			// Get bytes...
   1.261 +			pTemp = strstr(buffer, ":");
   1.262 +			if(pTemp != NULL)
   1.263 +			{
   1.264 +				pTemp++;
   1.265 +			    pTemp = TrimWhiteSpaces(pTemp);
   1.266 +				GetBitVector(key, pTemp);
   1.267 +			}
   1.268 +			bKey = true;
   1.269 +			continue;
   1.270 +		}
   1.271 +		if(strstr(buffer, "DATA_BLOCK") != NULL)
   1.272 +		{
   1.273 +			// Read the data block
   1.274 +			
   1.275 +			pTemp = strstr(buffer, ":");
   1.276 +			if(pTemp != NULL)
   1.277 +			{
   1.278 +				pTemp++;
   1.279 +				pTemp = TrimWhiteSpaces(pTemp);
   1.280 +				GetBitVector(block, pTemp);
   1.281 +			}
   1.282 +			bBlock = true;
   1.283 +			continue;
   1.284 +		}
   1.285 +		if(strstr(buffer, "ED_FLAG") != NULL)
   1.286 +		{
   1.287 +			// Read the ed_flag parameter
   1.288 +			
   1.289 +			pTemp = strstr(buffer, ":");
   1.290 +			if(pTemp != NULL)
   1.291 +			{
   1.292 +				pTemp++;
   1.293 +				pTemp = TrimWhiteSpaces(pTemp);
   1.294 +				*edflag = (*pTemp) - '0';
   1.295 +			}
   1.296 +			bEdflag = true;
   1.297 +			continue;
   1.298 +		}
   1.299 +		if(strstr(buffer, "EXPECTED_OUTPUT") != NULL)
   1.300 +		{
   1.301 +			// Read the bit vector for the expected output
   1.302 +			
   1.303 +			pTemp = strstr(buffer, ":");
   1.304 +			if(pTemp != NULL)
   1.305 +			{
   1.306 +				pTemp++;
   1.307 +				pTemp = TrimWhiteSpaces(pTemp);
   1.308 +				GetBitVector(output, pTemp);
   1.309 +			}
   1.310 +			bOutput = true;
   1.311 +			continue;
   1.312 +		}
   1.313 +	}
   1.314 +	
   1.315 +	return KErrNotFound;
   1.316 +}
   1.317 +
   1.318 +// -----------------------------------------------------------------------------
   1.319 +// CTestCrypt::Crypt
   1.320 +// Test function to perform crypt() on the input data
   1.321 +// -----------------------------------------------------------------------------
   1.322 +//
   1.323 +TInt CTestCrypt::Crypt()
   1.324 +{
   1.325 +	static int tId = 0;
   1.326 +	char pTemp[30];
   1.327 +	memset(pTemp, 0, 30);
   1.328 +	sprintf(pTemp, "CRYPT_TEST_DATA_%d", ++tId);
   1.329 +    INFO_PRINTF2(_L("Begin CRYPT_TEST_DATA_%d\n"), tId);
   1.330 +    
   1.331 +    // locate "test_data_id" from within the file
   1.332 +    if(!RepositionFilePointer(pTemp))
   1.333 +    {
   1.334 +    	// String not found...invalid test data ID
   1.335 +    	INFO_PRINTF1(_L("Requested test data ID could not be found\n"));
   1.336 +    	return KErrNotFound;
   1.337 +    }
   1.338 +    
   1.339 +    char password[34] = 
   1.340 +    {
   1.341 +    	'\0'
   1.342 +    };
   1.343 +    char salt[30] = 
   1.344 +    {
   1.345 +    	'\0'
   1.346 +    };
   1.347 +    char output[35] = 
   1.348 +    {
   1.349 +    	'\0'
   1.350 +    };
   1.351 +    
   1.352 +    if(GetCryptTestData(password, salt, output) != KErrNone)
   1.353 +    {
   1.354 +    	// Data not in the expected format or is invalid
   1.355 +    	INFO_PRINTF1(_L("Test data not found or is not present in the expected format\n"));
   1.356 +    	return KErrNotFound;
   1.357 +    }
   1.358 +    
   1.359 +    char *crypt_output = NULL;
   1.360 +    // Invoke crypt()
   1.361 +    crypt_output = crypt(password,salt);
   1.362 +	if(!strcmp(output,""))
   1.363 +	{
   1.364 +		// Since salt is NULL, the expected output is ignored...
   1.365 +		return KErrNone;
   1.366 +	}
   1.367 +    if(!strcmp(salt, ""))
   1.368 +    {
   1.369 +		// salt is NULL, so skip the first byte from the crypt output
   1.370 +		if(crypt_output != NULL)
   1.371 +		{
   1.372 +			crypt_output++;
   1.373 +			if(!strcmp(crypt_output, &output[0]))
   1.374 +			{
   1.375 +				INFO_PRINTF2(_L("End: CRYPT_TEST_DATA_%d\n"), tId);
   1.376 +				return KErrNone;
   1.377 +			}
   1.378 +			INFO_PRINTF1(_L("Output from the crypt() function does not match the \"expected output\""));
   1.379 +			return KErrNotFound;
   1.380 +		}
   1.381 +    }
   1.382 +    else
   1.383 +    {
   1.384 +    	// salt is not NULL
   1.385 +    	if(!strcmp(crypt_output, output))
   1.386 +    	{
   1.387 +    		INFO_PRINTF2(_L("End: CRYPT_TEST_DATA_%d\n"), tId);
   1.388 +    		return KErrNone;
   1.389 +    	}
   1.390 +    	INFO_PRINTF1(_L("Output from the crypt() function does not match the \"expected output\""));
   1.391 +    	return KErrNotFound;
   1.392 +    }
   1.393 +    return KErrNotFound;
   1.394 +}
   1.395 +
   1.396 +// -----------------------------------------------------------------------------
   1.397 +// CTestCrypt::GetCryptTestData
   1.398 +// To retrieve the test data for crypt() API
   1.399 +// -----------------------------------------------------------------------------
   1.400 +//
   1.401 +TInt CTestCrypt::GetCryptTestData(char password[], char salt[], char output[])
   1.402 +{
   1.403 +	char buffer[256];
   1.404 +	char *p = NULL;
   1.405 +	char *pTemp = NULL;
   1.406 +	int nLength = 0;
   1.407 +	bool bPassword = false,
   1.408 +	     bSalt = false,
   1.409 +	     bOutput = false;
   1.410 +   	char * ptr = NULL;
   1.411 +
   1.412 +	while((p = fgets(buffer, 256, iTestDataFile)) != NULL)
   1.413 +	{
   1.414 +    	ptr = NULL;
   1.415 +    
   1.416 +    	if((ptr=strchr(buffer,'\r')) || (ptr=strchr(buffer,'\n'))) //check for both
   1.417 +			*ptr='\0';
   1.418 +		if(strstr(buffer, "//") != NULL)	// skip the comments
   1.419 +		{
   1.420 +			// "//" could appear within password or salt, so further
   1.421 +			// check is required
   1.422 +			
   1.423 +			// Since judicious use of whitespaces is allowed only from within
   1.424 +			// the comment lines, the comment line will always start with
   1.425 +			// "//"
   1.426 +			if(buffer[0] == '/' && buffer[1] == '/')
   1.427 +			{
   1.428 +				continue;
   1.429 +			}
   1.430 +		}
   1.431 +		if(!strcmp(buffer, "END_TEST_DATA"))
   1.432 +		{
   1.433 +			if(bPassword && bSalt && bOutput)
   1.434 +			{
   1.435 +				return KErrNone;
   1.436 +			}
   1.437 +			return KErrNotFound;
   1.438 +		}
   1.439 +
   1.440 +		// Verify if the input buffer has "data". Data is followed by ":"
   1.441 +		pTemp = strstr(buffer, ":");
   1.442 +		if(pTemp != NULL)
   1.443 +		{
   1.444 +			pTemp++;
   1.445 +			pTemp = TrimWhiteSpaces(pTemp);
   1.446 +			nLength = strlen(pTemp);
   1.447 +			if(strstr(buffer, "PASSWORD") != NULL)
   1.448 +			{
   1.449 +				strncpy(password,pTemp,nLength);
   1.450 +				bPassword = true;
   1.451 +				continue;
   1.452 +			}
   1.453 +			else if(strstr(buffer, "SALT") != NULL)
   1.454 +			{
   1.455 +				strncpy(salt,pTemp,nLength);
   1.456 +				bSalt = true;
   1.457 +				continue;
   1.458 +			}
   1.459 +			else if(strstr(buffer, "EXPECTED_OUTPUT") != NULL)
   1.460 +			{
   1.461 +				strncpy(output,pTemp,nLength);
   1.462 +				bOutput = true;
   1.463 +				continue;
   1.464 +			}
   1.465 +			else
   1.466 +			{
   1.467 +				// Unexpected output
   1.468 +				return KErrNotFound;
   1.469 +			}
   1.470 +		}
   1.471 +	}
   1.472 +	return KErrNotFound;
   1.473 +}
   1.474 +
   1.475 +//  End of File
   1.476 +