X-Git-Url: https://gerrit.opnfv.org/gerrit/gitweb?a=blobdiff_plain;f=src%2Fceph%2Fsrc%2Ftest%2Fceph_crypto.cc;fp=src%2Fceph%2Fsrc%2Ftest%2Fceph_crypto.cc;h=86b5c62cfc19daea6328a718a11c33abb86fc344;hb=812ff6ca9fcd3e629e49d4328905f33eee8ca3f5;hp=0000000000000000000000000000000000000000;hpb=15280273faafb77777eab341909a3f495cf248d9;p=stor4nfv.git diff --git a/src/ceph/src/test/ceph_crypto.cc b/src/ceph/src/test/ceph_crypto.cc new file mode 100644 index 0000000..86b5c62 --- /dev/null +++ b/src/ceph/src/test/ceph_crypto.cc @@ -0,0 +1,158 @@ +#include "gtest/gtest.h" +#include "common/ceph_argparse.h" +#include "common/ceph_crypto.h" +#include "common/common_init.h" +#include "global/global_init.h" +#include "global/global_context.h" + +class CryptoEnvironment: public ::testing::Environment { +public: + void SetUp() override { + ceph::crypto::init(g_ceph_context); + } +}; + +TEST(MD5, Simple) { + ceph::crypto::MD5 h; + h.Update((const byte*)"foo", 3); + unsigned char digest[CEPH_CRYPTO_MD5_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_MD5_DIGESTSIZE] = { + 0xac, 0xbd, 0x18, 0xdb, 0x4c, 0xc2, 0xf8, 0x5c, + 0xed, 0xef, 0x65, 0x4f, 0xcc, 0xc4, 0xa4, 0xd8, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_MD5_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +TEST(MD5, MultiUpdate) { + ceph::crypto::MD5 h; + h.Update((const byte*)"", 0); + h.Update((const byte*)"fo", 2); + h.Update((const byte*)"", 0); + h.Update((const byte*)"o", 1); + h.Update((const byte*)"", 0); + unsigned char digest[CEPH_CRYPTO_MD5_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_MD5_DIGESTSIZE] = { + 0xac, 0xbd, 0x18, 0xdb, 0x4c, 0xc2, 0xf8, 0x5c, + 0xed, 0xef, 0x65, 0x4f, 0xcc, 0xc4, 0xa4, 0xd8, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_MD5_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +TEST(MD5, Restart) { + ceph::crypto::MD5 h; + h.Update((const byte*)"bar", 3); + h.Restart(); + h.Update((const byte*)"foo", 3); + unsigned char digest[CEPH_CRYPTO_MD5_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_MD5_DIGESTSIZE] = { + 0xac, 0xbd, 0x18, 0xdb, 0x4c, 0xc2, 0xf8, 0x5c, + 0xed, 0xef, 0x65, 0x4f, 0xcc, 0xc4, 0xa4, 0xd8, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_MD5_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +TEST(HMACSHA1, Simple) { + ceph::crypto::HMACSHA1 h((const byte*)"sekrit", 6); + h.Update((const byte*)"foo", 3); + unsigned char digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE] = { + 0x04, 0xbc, 0x52, 0x66, 0xb6, 0xff, 0xad, 0xad, 0x9d, 0x57, + 0xce, 0x13, 0xea, 0x8c, 0xf5, 0x6b, 0xf9, 0x95, 0x2f, 0xd6, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +TEST(HMACSHA1, MultiUpdate) { + ceph::crypto::HMACSHA1 h((const byte*)"sekrit", 6); + h.Update((const byte*)"", 0); + h.Update((const byte*)"fo", 2); + h.Update((const byte*)"", 0); + h.Update((const byte*)"o", 1); + h.Update((const byte*)"", 0); + unsigned char digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE] = { + 0x04, 0xbc, 0x52, 0x66, 0xb6, 0xff, 0xad, 0xad, 0x9d, 0x57, + 0xce, 0x13, 0xea, 0x8c, 0xf5, 0x6b, 0xf9, 0x95, 0x2f, 0xd6, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +TEST(HMACSHA1, Restart) { + ceph::crypto::HMACSHA1 h((const byte*)"sekrit", 6); + h.Update((const byte*)"bar", 3); + h.Restart(); + h.Update((const byte*)"foo", 3); + unsigned char digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE]; + h.Final(digest); + int err; + unsigned char want_digest[CEPH_CRYPTO_HMACSHA1_DIGESTSIZE] = { + 0x04, 0xbc, 0x52, 0x66, 0xb6, 0xff, 0xad, 0xad, 0x9d, 0x57, + 0xce, 0x13, 0xea, 0x8c, 0xf5, 0x6b, 0xf9, 0x95, 0x2f, 0xd6, + }; + err = memcmp(digest, want_digest, CEPH_CRYPTO_HMACSHA1_DIGESTSIZE); + ASSERT_EQ(0, err); +} + +class ForkDeathTest : public ::testing::Test { + protected: + void SetUp() override { + // shutdown NSS so it can be reinitialized after the fork + // some data structures used by NSPR are only initialized once, and they + // will be cleaned up with ceph::crypto::shutdown(false), so we need to + // keep them around after fork. + ceph::crypto::shutdown(true); + } + + void TearDown() override { + // undo the NSS shutdown we did in the parent process, after the + // test is done + ceph::crypto::init(g_ceph_context); + } +}; + +void do_simple_crypto() { + // ensure that the shutdown/fork/init sequence results in a working + // NSS crypto library; this function is run in the child, after the + // fork, and if you comment out the ceph::crypto::init, or if the + // trick were to fail, you would see this ending in an assert and + // not exit status 0 + ceph::crypto::init(g_ceph_context); + ceph::crypto::MD5 h; + h.Update((const byte*)"foo", 3); + unsigned char digest[CEPH_CRYPTO_MD5_DIGESTSIZE]; + h.Final(digest); + exit(0); +} + +#if GTEST_HAS_DEATH_TEST +TEST_F(ForkDeathTest, MD5) { + ASSERT_EXIT(do_simple_crypto(), ::testing::ExitedWithCode(0), "^$"); +} +#endif //GTEST_HAS_DEATH_TEST + +int main(int argc, char **argv) { + std::vector args(argv, argv + argc); + env_to_vec(args); + auto cct = global_init(NULL, args, + CEPH_ENTITY_TYPE_CLIENT, + CODE_ENVIRONMENT_UTILITY, + CINIT_FLAG_NO_DEFAULT_CONFIG_FILE); + common_init_finish(g_ceph_context); + ::testing::InitGoogleTest(&argc, argv); + return RUN_ALL_TESTS(); +}