mirror of
https://github.com/QuasarApp/qca.git
synced 2025-04-29 13:04:31 +00:00
the new Qt4 stuff, and the removal of QCString from the API When I run this, I get: # Running normal tests... # Base64UnitTest - 22 tests passed, 0 tests failed BigIntUnitTest - 252 tests passed, 0 tests failed CertUnitTest - 0 tests passed, 1 test failed Unexpected failure: certunittest.cpp[40]: failed on "QCA::haveSystemStore()" result = '0', expected = '1' CipherUnitTest - 2740 tests passed, 0 tests failed HashUnitTest - 186 tests passed, 0 tests failed HexUnitTest - 17 tests passed, 0 tests failed KDFUnitTest - 0 tests passed, 0 tests failed; also 2 skipped Skipped tests: kdfunittest.cpp[80]: "PBKDF version 1 with SHA1 not supported" kdfunittest.cpp[98]: "PBKDF version 2 with SHA1 not supported" KeyLengthUnitTest - 9 tests passed, 0 tests failed MACUnitTest - 33 tests passed, 0 tests failed RandomUnitTest - 67 tests passed, 0 tests failed SecureArrayUnitTest - 32 tests passed, 0 tests failed StaticUnitTest - 31 tests passed, 0 tests failed SymmetricKeyUnitTest - 13 tests passed, 0 tests failed # Done with normal tests: Total test cases: 13 Total test steps : 3405 Total passed test steps (including unexpected) : 3402 Total unexpected passed test steps : 0 Total failed test steps (including expected) : 1 Total expected failed test steps : 0 Total skipped test steps : 2 CCMAIL: delta-affinix.com@lists.affinix.com svn path=/trunk/kdesupport/qca/; revision=394072
93 lines
3.2 KiB
C++
93 lines
3.2 KiB
C++
/**
|
|
* symmetrickeyunittest.cpp
|
|
*
|
|
* Copyright (C) 2004 Brad Hards <bradh@frogmouth.net>
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
#include "symmetrickeyunittest.h"
|
|
#include <QtCrypto>
|
|
|
|
SymmetricKeyUnitTest::SymmetricKeyUnitTest()
|
|
: Tester()
|
|
{
|
|
|
|
}
|
|
|
|
struct weakKey {
|
|
QByteArray key;
|
|
bool weak;
|
|
};
|
|
|
|
// These are from the Botan test suite
|
|
static struct weakKey DESTestValues[] = {
|
|
{ "ffffffffffffffff" , true },
|
|
{ "0000000000000000" , true },
|
|
{ "d5d44ff720683d0d" , false },
|
|
{ "d5d44ff720683d0d" , false },
|
|
{ "1046913489980131" , false },
|
|
{ "1007103489988020" , false },
|
|
{ "10071034c8980120" , false },
|
|
{ "1046103489988020" , false },
|
|
{ 0, 0 }
|
|
};
|
|
|
|
void SymmetricKeyUnitTest::allTests()
|
|
{
|
|
QCA::Initializer init;
|
|
|
|
QCA::SymmetricKey emptyKey;
|
|
CHECK( emptyKey.size(), 0 );
|
|
|
|
QCA::SymmetricKey randomKey(10);
|
|
CHECK( randomKey.size(),10 );
|
|
|
|
QByteArray byteArray(10, 'c');
|
|
QSecureArray secureArray( byteArray );
|
|
QCA::SymmetricKey keyArray = secureArray;
|
|
CHECK( secureArray.size(), 10 );
|
|
CHECK( keyArray.size(), secureArray.size() );
|
|
CHECK( QCA::arrayToHex ( keyArray ), QString( "63636363636363636363" ) );
|
|
CHECK( QCA::arrayToHex ( secureArray ), QString( "63636363636363636363" ) );
|
|
keyArray[3] = 0x00; // test keyArray detaches OK
|
|
CHECK( QCA::arrayToHex ( keyArray ), QString( "63636300636363636363" ) );
|
|
CHECK( QCA::arrayToHex ( secureArray ), QString( "63636363636363636363" ) );
|
|
|
|
QCA::SymmetricKey anotherKey;
|
|
anotherKey = keyArray;
|
|
CHECK( QCA::arrayToHex ( anotherKey ), QString( "63636300636363636363" ) );
|
|
QCA::SymmetricKey bigKey( 100 );
|
|
anotherKey = bigKey;
|
|
CHECK( anotherKey.size(), 100 );
|
|
anotherKey = secureArray;
|
|
CHECK( QCA::arrayToHex ( secureArray ), QString( "63636363636363636363" ) );
|
|
CHECK( anotherKey.size(), 10 );
|
|
anotherKey = emptyKey;
|
|
CHECK( anotherKey.size(), 0 );
|
|
|
|
// for (int n = 0; (0 != DESTestValues[n].weak); n++) {
|
|
// QCA::SymmetricKey key(QCA::hexToArray(DESTestValues[n].key));
|
|
// CHECK( key.isWeakDESKey(), DESTestValues[n].weak );
|
|
// }
|
|
}
|
|
|