Merge pull request #786 from sfackler/sign-tweaks

Sign tweaks
This commit is contained in:
Steven Fackler 2017-12-03 18:14:06 -08:00 committed by GitHub
commit d1724d49ae
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 171 additions and 487 deletions

View File

@ -32,7 +32,7 @@
//! let mut verifier = Verifier::new(MessageDigest::sha256(), &keypair).unwrap(); //! let mut verifier = Verifier::new(MessageDigest::sha256(), &keypair).unwrap();
//! verifier.update(data).unwrap(); //! verifier.update(data).unwrap();
//! verifier.update(data2).unwrap(); //! verifier.update(data2).unwrap();
//! assert!(verifier.finish(&signature).unwrap()); //! assert!(verifier.verify(&signature).unwrap());
//! ``` //! ```
//! //!
//! Compute an HMAC: //! Compute an HMAC:
@ -53,7 +53,7 @@
//! let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap(); //! let mut signer = Signer::new(MessageDigest::sha256(), &key).unwrap();
//! signer.update(data).unwrap(); //! signer.update(data).unwrap();
//! signer.update(data2).unwrap(); //! signer.update(data2).unwrap();
//! let hmac = signer.finish().unwrap(); //! let hmac = signer.sign_to_vec().unwrap();
//! //!
//! // `Verifier` cannot be used with HMACs; use the `memcmp::eq` function instead //! // `Verifier` cannot be used with HMACs; use the `memcmp::eq` function instead
//! // //! //
@ -69,14 +69,15 @@ use std::ptr;
use {cvt, cvt_p}; use {cvt, cvt_p};
use hash::MessageDigest; use hash::MessageDigest;
use pkey::{PKeyRef, PKeyCtxRef}; use pkey::{PKeyCtxRef, PKeyRef};
use error::ErrorStack; use error::ErrorStack;
#[cfg(ossl110)] #[cfg(ossl110)]
use ffi::{EVP_MD_CTX_new, EVP_MD_CTX_free}; use ffi::{EVP_MD_CTX_free, EVP_MD_CTX_new};
#[cfg(any(ossl101, ossl102))] #[cfg(any(ossl101, ossl102))]
use ffi::{EVP_MD_CTX_create as EVP_MD_CTX_new, EVP_MD_CTX_destroy as EVP_MD_CTX_free}; use ffi::{EVP_MD_CTX_create as EVP_MD_CTX_new, EVP_MD_CTX_destroy as EVP_MD_CTX_free};
/// A type which computes cryptographic signatures of data.
pub struct Signer<'a> { pub struct Signer<'a> {
md_ctx: *mut ffi::EVP_MD_CTX, md_ctx: *mut ffi::EVP_MD_CTX,
pkey_ctx: *mut ffi::EVP_PKEY_CTX, pkey_ctx: *mut ffi::EVP_PKEY_CTX,
@ -93,6 +94,11 @@ impl<'a> Drop for Signer<'a> {
} }
impl<'a> Signer<'a> { impl<'a> Signer<'a> {
/// Creates a new `Signer`.
///
/// OpenSSL documentation at [`EVP_DigestSignInit`].
///
/// [`EVP_DigestSignInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestSignInit.html
pub fn new(type_: MessageDigest, pkey: &'a PKeyRef) -> Result<Signer<'a>, ErrorStack> { pub fn new(type_: MessageDigest, pkey: &'a PKeyRef) -> Result<Signer<'a>, ErrorStack> {
unsafe { unsafe {
ffi::init(); ffi::init();
@ -121,14 +127,21 @@ impl<'a> Signer<'a> {
} }
} }
/// Returns a shared reference to the `PKeyCtx` associated with the `Signer`.
pub fn pkey_ctx(&self) -> &PKeyCtxRef { pub fn pkey_ctx(&self) -> &PKeyCtxRef {
unsafe { PKeyCtxRef::from_ptr(self.pkey_ctx) } unsafe { PKeyCtxRef::from_ptr(self.pkey_ctx) }
} }
/// Returns a mutable reference to the `PKeyCtx` associated with the `Signer`.
pub fn pkey_ctx_mut(&mut self) -> &mut PKeyCtxRef { pub fn pkey_ctx_mut(&mut self) -> &mut PKeyCtxRef {
unsafe { PKeyCtxRef::from_ptr_mut(self.pkey_ctx) } unsafe { PKeyCtxRef::from_ptr_mut(self.pkey_ctx) }
} }
/// Feeds more data into the `Signer`.
///
/// OpenSSL documentation at [`EVP_DigestUpdate`].
///
/// [`EVP_DigestUpdate`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestInit.html
pub fn update(&mut self, buf: &[u8]) -> Result<(), ErrorStack> { pub fn update(&mut self, buf: &[u8]) -> Result<(), ErrorStack> {
unsafe { unsafe {
cvt(ffi::EVP_DigestUpdate( cvt(ffi::EVP_DigestUpdate(
@ -140,7 +153,14 @@ impl<'a> Signer<'a> {
} }
/// Computes an upper bound on the signature length. /// Computes an upper bound on the signature length.
pub fn finish_len(&self) -> Result<usize, ErrorStack> { ///
/// The actual signature may be shorter than this value. Check the return value of
/// `sign` to get the exact length.
///
/// OpenSSL documentation at [`EVP_DigestSignFinal`].
///
/// [`EVP_DigestSignFinal`]: https://www.openssl.org/docs/man1.1.0/crypto/EVP_DigestSignFinal.html
pub fn len(&self) -> Result<usize, ErrorStack> {
unsafe { unsafe {
let mut len = 0; let mut len = 0;
cvt(ffi::EVP_DigestSignFinal( cvt(ffi::EVP_DigestSignFinal(
@ -152,13 +172,15 @@ impl<'a> Signer<'a> {
} }
} }
/// Outputs the signature into the provided buffer, returning the /// Writes the signature into the provided buffer, returning the number of bytes written.
/// length of that buffer.
/// ///
/// This method will fail if the buffer is not large enough for /// This method will fail if the buffer is not large enough for the signature. Use the `len`
/// the signature, one can use `finish_len` to get an upper bound /// method to get an upper bound on the required size.
/// on the required size. ///
pub fn finish_into(&self, buf: &mut [u8]) -> Result<usize, ErrorStack> { /// OpenSSL documentation at [`EVP_DigestSignFinal`].
///
/// [`EVP_DigestSignFinal`]: https://www.openssl.org/docs/man1.1.0/crypto/EVP_DigestSignFinal.html
pub fn sign(&self, buf: &mut [u8]) -> Result<usize, ErrorStack> {
unsafe { unsafe {
let mut len = buf.len(); let mut len = buf.len();
cvt(ffi::EVP_DigestSignFinal( cvt(ffi::EVP_DigestSignFinal(
@ -170,16 +192,21 @@ impl<'a> Signer<'a> {
} }
} }
/// Combines `self.finish_len()` and `self.finish_into()`, /// Returns the signature.
/// allocating a vector of the correct size for the signature. ///
pub fn finish(&self) -> Result<Vec<u8>, ErrorStack> { /// This is a simple convenience wrapper over `len` and `sign`.
let mut buf = vec![0; self.finish_len()?]; pub fn sign_to_vec(&self) -> Result<Vec<u8>, ErrorStack> {
let len = self.finish_into(&mut buf)?; let mut buf = vec![0; self.len()?];
// The advertised length is not always equal to the real let len = self.sign(&mut buf)?;
// length for things like DSA // The advertised length is not always equal to the real length for things like DSA
buf.truncate(len); buf.truncate(len);
Ok(buf) Ok(buf)
} }
#[deprecated(since = "0.9.23", note = "renamed to sign_to_vec")]
pub fn finish(&self) -> Result<Vec<u8>, ErrorStack> {
self.sign_to_vec()
}
} }
impl<'a> Write for Signer<'a> { impl<'a> Write for Signer<'a> {
@ -208,7 +235,13 @@ impl<'a> Drop for Verifier<'a> {
} }
} }
/// A type which verifies cryptographic signatures of data.
impl<'a> Verifier<'a> { impl<'a> Verifier<'a> {
/// Creates a new `Verifier`.
///
/// OpenSSL documentation at [`EVP_DigestVerifyInit`].
///
/// [`EVP_DigestVerifyInit`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestVerifyInit.html
pub fn new(type_: MessageDigest, pkey: &'a PKeyRef) -> Result<Verifier<'a>, ErrorStack> { pub fn new(type_: MessageDigest, pkey: &'a PKeyRef) -> Result<Verifier<'a>, ErrorStack> {
unsafe { unsafe {
ffi::init(); ffi::init();
@ -237,14 +270,21 @@ impl<'a> Verifier<'a> {
} }
} }
/// Returns a shared reference to the `PKeyCtx` associated with the `Verifier`.
pub fn pkey_ctx(&self) -> &PKeyCtxRef { pub fn pkey_ctx(&self) -> &PKeyCtxRef {
unsafe { PKeyCtxRef::from_ptr(self.pkey_ctx) } unsafe { PKeyCtxRef::from_ptr(self.pkey_ctx) }
} }
/// Returns a mutable reference to the `PKeyCtx` associated with the `Verifier`.
pub fn pkey_ctx_mut(&mut self) -> &mut PKeyCtxRef { pub fn pkey_ctx_mut(&mut self) -> &mut PKeyCtxRef {
unsafe { PKeyCtxRef::from_ptr_mut(self.pkey_ctx) } unsafe { PKeyCtxRef::from_ptr_mut(self.pkey_ctx) }
} }
/// Feeds more data into the `Verifier`.
///
/// OpenSSL documentation at [`EVP_DigestUpdate`].
///
/// [`EVP_DigestUpdate`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestInit.html
pub fn update(&mut self, buf: &[u8]) -> Result<(), ErrorStack> { pub fn update(&mut self, buf: &[u8]) -> Result<(), ErrorStack> {
unsafe { unsafe {
cvt(ffi::EVP_DigestUpdate( cvt(ffi::EVP_DigestUpdate(
@ -255,7 +295,12 @@ impl<'a> Verifier<'a> {
} }
} }
pub fn finish(&self, signature: &[u8]) -> Result<bool, ErrorStack> { /// Determines if the data fed into the `Verifier` matches the provided signature.
///
/// OpenSSL documentation at [`EVP_DigestVerifyFinal`].
///
/// [`EVP_DigestVerifyFinal`]: https://www.openssl.org/docs/manmaster/man3/EVP_DigestVerifyFinal.html
pub fn verify(&self, signature: &[u8]) -> Result<bool, ErrorStack> {
unsafe { unsafe {
let r = let r =
EVP_DigestVerifyFinal(self.md_ctx, signature.as_ptr() as *const _, signature.len()); EVP_DigestVerifyFinal(self.md_ctx, signature.as_ptr() as *const _, signature.len());
@ -269,6 +314,11 @@ impl<'a> Verifier<'a> {
} }
} }
} }
#[deprecated(since = "0.9.23", note = "renamed to `verify`")]
pub fn finish(&self, signature: &[u8]) -> Result<bool, ErrorStack> {
self.verify(signature)
}
} }
impl<'a> Write for Verifier<'a> { impl<'a> Write for Verifier<'a> {
@ -297,393 +347,29 @@ unsafe fn EVP_DigestVerifyFinal(
#[cfg(test)] #[cfg(test)]
mod test { mod test {
use hex::FromHex; use hex::{FromHex, ToHex};
use std::iter; use std::iter;
use hash::MessageDigest; use hash::MessageDigest;
use sign::{Signer, Verifier}; use sign::{Signer, Verifier};
use ec::{EcGroup, EcKey}; use ec::{EcGroup, EcKey};
use nid; use nid;
use rsa::{Rsa, PKCS1_PADDING}; use rsa::{PKCS1_PADDING, Rsa};
use dsa::Dsa; use dsa::Dsa;
use pkey::PKey; use pkey::PKey;
static INPUT: &'static [u8] = &[ const INPUT: &'static str =
101, "65794a68624763694f694a53557a49314e694a392e65794a7063334d694f694a71623255694c41304b49434a6c\
121, 654841694f6a457a4d4441344d546b7a4f44417344516f67496d6830644841364c79396c654746746347786c4c\
74, 6d4e76625339706331397962323930496a7030636e566c6651";
104,
98,
71,
99,
105,
79,
105,
74,
83,
85,
122,
73,
49,
78,
105,
74,
57,
46,
101,
121,
74,
112,
99,
51,
77,
105,
79,
105,
74,
113,
98,
50,
85,
105,
76,
65,
48,
75,
73,
67,
74,
108,
101,
72,
65,
105,
79,
106,
69,
122,
77,
68,
65,
52,
77,
84,
107,
122,
79,
68,
65,
115,
68,
81,
111,
103,
73,
109,
104,
48,
100,
72,
65,
54,
76,
121,
57,
108,
101,
71,
70,
116,
99,
71,
120,
108,
76,
109,
78,
118,
98,
83,
57,
112,
99,
49,
57,
121,
98,
50,
57,
48,
73,
106,
112,
48,
99,
110,
86,
108,
102,
81,
];
static SIGNATURE: &'static [u8] = &[ const SIGNATURE: &'static str =
112, "702e218943e88fd11eb5d82dbf7845f34106ae1b81fff7731116add1717d83656d420afd3c96eedd73a2663e51\
46, 66687b000b87226e0187ed1073f945e582adfcef16d85a798ee8c66ddb3db8975b17d09402beedd5d9d9700710\
33, 8db28160d5f8040ca7445762b81fbe7ff9d92e0ae76f24f25b33bbe6f44ae61eb1040acb20044d3ef9128ed401\
137, 30795bd4bd3b41eecad066ab651981fde48df77f372dc38b9fafdd3befb18b5da3cc3c2eb02f9e3a41d612caad\
67, 15911273a05f23b9e838faaf849d698429ef5a1e88798236c3d40e604522a544c8f27a7a2db80663d16cf7caea\
232, 56de405cb2215a45b2c25566b55ac1a748a070dfc8a32a469543d019eefb47";
143,
209,
30,
181,
216,
45,
191,
120,
69,
243,
65,
6,
174,
27,
129,
255,
247,
115,
17,
22,
173,
209,
113,
125,
131,
101,
109,
66,
10,
253,
60,
150,
238,
221,
115,
162,
102,
62,
81,
102,
104,
123,
0,
11,
135,
34,
110,
1,
135,
237,
16,
115,
249,
69,
229,
130,
173,
252,
239,
22,
216,
90,
121,
142,
232,
198,
109,
219,
61,
184,
151,
91,
23,
208,
148,
2,
190,
237,
213,
217,
217,
112,
7,
16,
141,
178,
129,
96,
213,
248,
4,
12,
167,
68,
87,
98,
184,
31,
190,
127,
249,
217,
46,
10,
231,
111,
36,
242,
91,
51,
187,
230,
244,
74,
230,
30,
177,
4,
10,
203,
32,
4,
77,
62,
249,
18,
142,
212,
1,
48,
121,
91,
212,
189,
59,
65,
238,
202,
208,
102,
171,
101,
25,
129,
253,
228,
141,
247,
127,
55,
45,
195,
139,
159,
175,
221,
59,
239,
177,
139,
93,
163,
204,
60,
46,
176,
47,
158,
58,
65,
214,
18,
202,
173,
21,
145,
18,
115,
160,
95,
35,
185,
232,
56,
250,
175,
132,
157,
105,
132,
41,
239,
90,
30,
136,
121,
130,
54,
195,
212,
14,
96,
69,
34,
165,
68,
200,
242,
122,
122,
45,
184,
6,
99,
209,
108,
247,
202,
234,
86,
222,
64,
92,
178,
33,
90,
69,
178,
194,
85,
102,
181,
90,
193,
167,
72,
160,
112,
223,
200,
163,
42,
70,
149,
67,
208,
25,
238,
251,
71,
];
#[test] #[test]
fn rsa_sign() { fn rsa_sign() {
@ -697,10 +383,10 @@ mod test {
.pkey_ctx_mut() .pkey_ctx_mut()
.set_rsa_padding(PKCS1_PADDING) .set_rsa_padding(PKCS1_PADDING)
.unwrap(); .unwrap();
signer.update(INPUT).unwrap(); signer.update(&Vec::from_hex(INPUT).unwrap()).unwrap();
let result = signer.finish().unwrap(); let result = signer.sign_to_vec().unwrap();
assert_eq!(result, SIGNATURE); assert_eq!(result.to_hex(), SIGNATURE);
} }
#[test] #[test]
@ -714,8 +400,8 @@ mod test {
verifier.pkey_ctx_mut().rsa_padding().unwrap(), verifier.pkey_ctx_mut().rsa_padding().unwrap(),
PKCS1_PADDING PKCS1_PADDING
); );
verifier.update(INPUT).unwrap(); verifier.update(&Vec::from_hex(INPUT).unwrap()).unwrap();
assert!(verifier.finish(SIGNATURE).unwrap()); assert!(verifier.verify(&Vec::from_hex(SIGNATURE).unwrap()).unwrap());
} }
#[test] #[test]
@ -725,9 +411,9 @@ mod test {
let pkey = PKey::from_rsa(private_key).unwrap(); let pkey = PKey::from_rsa(private_key).unwrap();
let mut verifier = Verifier::new(MessageDigest::sha256(), &pkey).unwrap(); let mut verifier = Verifier::new(MessageDigest::sha256(), &pkey).unwrap();
verifier.update(INPUT).unwrap(); verifier.update(&Vec::from_hex(INPUT).unwrap()).unwrap();
verifier.update(b"foobar").unwrap(); verifier.update(b"foobar").unwrap();
assert!(!verifier.finish(SIGNATURE).unwrap()); assert!(!verifier.verify(&Vec::from_hex(SIGNATURE).unwrap()).unwrap());
} }
#[test] #[test]
@ -746,11 +432,11 @@ mod test {
let mut signer = Signer::new(MessageDigest::sha1(), &private_key).unwrap(); let mut signer = Signer::new(MessageDigest::sha1(), &private_key).unwrap();
signer.update(&input).unwrap(); signer.update(&input).unwrap();
let sig = signer.finish().unwrap(); let sig = signer.sign_to_vec().unwrap();
let mut verifier = Verifier::new(MessageDigest::sha1(), &public_key).unwrap(); let mut verifier = Verifier::new(MessageDigest::sha1(), &public_key).unwrap();
verifier.update(&input).unwrap(); verifier.update(&input).unwrap();
assert!(verifier.finish(&sig).unwrap()); assert!(verifier.verify(&sig).unwrap());
} }
#[test] #[test]
@ -769,12 +455,12 @@ mod test {
let mut signer = Signer::new(MessageDigest::sha1(), &private_key).unwrap(); let mut signer = Signer::new(MessageDigest::sha1(), &private_key).unwrap();
signer.update(&input).unwrap(); signer.update(&input).unwrap();
let mut sig = signer.finish().unwrap(); let mut sig = signer.sign_to_vec().unwrap();
sig[0] -= 1; sig[0] -= 1;
let mut verifier = Verifier::new(MessageDigest::sha1(), &public_key).unwrap(); let mut verifier = Verifier::new(MessageDigest::sha1(), &public_key).unwrap();
verifier.update(&input).unwrap(); verifier.update(&input).unwrap();
match verifier.finish(&sig) { match verifier.verify(&sig) {
Ok(true) => panic!("unexpected success"), Ok(true) => panic!("unexpected success"),
Ok(false) | Err(_) => {} Ok(false) | Err(_) => {}
} }
@ -785,53 +471,52 @@ mod test {
let pkey = PKey::hmac(key).unwrap(); let pkey = PKey::hmac(key).unwrap();
let mut signer = Signer::new(ty, &pkey).unwrap(); let mut signer = Signer::new(ty, &pkey).unwrap();
signer.update(data).unwrap(); signer.update(data).unwrap();
assert_eq!(signer.finish().unwrap(), *res); assert_eq!(signer.sign_to_vec().unwrap(), *res);
} }
} }
#[test] #[test]
fn hmac_md5() { fn hmac_md5() {
// test vectors from RFC 2202 // test vectors from RFC 2202
let tests: [(Vec<u8>, Vec<u8>, Vec<u8>); 7] = let tests: [(Vec<u8>, Vec<u8>, Vec<u8>); 7] = [
[ (
( iter::repeat(0x0b_u8).take(16).collect(),
iter::repeat(0x0b_u8).take(16).collect(), b"Hi There".to_vec(),
b"Hi There".to_vec(), Vec::from_hex("9294727a3638bb1c13f48ef8158bfc9d").unwrap(),
Vec::from_hex("9294727a3638bb1c13f48ef8158bfc9d").unwrap(), ),
), (
( b"Jefe".to_vec(),
b"Jefe".to_vec(), b"what do ya want for nothing?".to_vec(),
b"what do ya want for nothing?".to_vec(), Vec::from_hex("750c783e6ab0b503eaa86e310a5db738").unwrap(),
Vec::from_hex("750c783e6ab0b503eaa86e310a5db738").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(16).collect(),
iter::repeat(0xaa_u8).take(16).collect(), iter::repeat(0xdd_u8).take(50).collect(),
iter::repeat(0xdd_u8).take(50).collect(), Vec::from_hex("56be34521d144c88dbb8c733f0e8b3f6").unwrap(),
Vec::from_hex("56be34521d144c88dbb8c733f0e8b3f6").unwrap(), ),
), (
( Vec::from_hex("0102030405060708090a0b0c0d0e0f10111213141516171819").unwrap(),
Vec::from_hex("0102030405060708090a0b0c0d0e0f10111213141516171819").unwrap(), iter::repeat(0xcd_u8).take(50).collect(),
iter::repeat(0xcd_u8).take(50).collect(), Vec::from_hex("697eaf0aca3a3aea3a75164746ffaa79").unwrap(),
Vec::from_hex("697eaf0aca3a3aea3a75164746ffaa79").unwrap(), ),
), (
( iter::repeat(0x0c_u8).take(16).collect(),
iter::repeat(0x0c_u8).take(16).collect(), b"Test With Truncation".to_vec(),
b"Test With Truncation".to_vec(), Vec::from_hex("56461ef2342edc00f9bab995690efd4c").unwrap(),
Vec::from_hex("56461ef2342edc00f9bab995690efd4c").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(80).collect(),
iter::repeat(0xaa_u8).take(80).collect(), b"Test Using Larger Than Block-Size Key - Hash Key First".to_vec(),
b"Test Using Larger Than Block-Size Key - Hash Key First".to_vec(), Vec::from_hex("6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd").unwrap(),
Vec::from_hex("6b1ab7fe4bd7bf8f0b62e6ce61b9d0cd").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(80).collect(),
iter::repeat(0xaa_u8).take(80).collect(), b"Test Using Larger Than Block-Size Key \
b"Test Using Larger Than Block-Size Key \
and Larger Than One Block-Size Data" and Larger Than One Block-Size Data"
.to_vec(), .to_vec(),
Vec::from_hex("6f630fad67cda0ee1fb1f562db3aa53e").unwrap(), Vec::from_hex("6f630fad67cda0ee1fb1f562db3aa53e").unwrap(),
), ),
]; ];
test_hmac(MessageDigest::md5(), &tests); test_hmac(MessageDigest::md5(), &tests);
} }
@ -839,46 +524,45 @@ mod test {
#[test] #[test]
fn hmac_sha1() { fn hmac_sha1() {
// test vectors from RFC 2202 // test vectors from RFC 2202
let tests: [(Vec<u8>, Vec<u8>, Vec<u8>); 7] = let tests: [(Vec<u8>, Vec<u8>, Vec<u8>); 7] = [
[ (
( iter::repeat(0x0b_u8).take(20).collect(),
iter::repeat(0x0b_u8).take(20).collect(), b"Hi There".to_vec(),
b"Hi There".to_vec(), Vec::from_hex("b617318655057264e28bc0b6fb378c8ef146be00").unwrap(),
Vec::from_hex("b617318655057264e28bc0b6fb378c8ef146be00").unwrap(), ),
), (
( b"Jefe".to_vec(),
b"Jefe".to_vec(), b"what do ya want for nothing?".to_vec(),
b"what do ya want for nothing?".to_vec(), Vec::from_hex("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79").unwrap(),
Vec::from_hex("effcdf6ae5eb2fa2d27416d5f184df9c259a7c79").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(20).collect(),
iter::repeat(0xaa_u8).take(20).collect(), iter::repeat(0xdd_u8).take(50).collect(),
iter::repeat(0xdd_u8).take(50).collect(), Vec::from_hex("125d7342b9ac11cd91a39af48aa17b4f63f175d3").unwrap(),
Vec::from_hex("125d7342b9ac11cd91a39af48aa17b4f63f175d3").unwrap(), ),
), (
( Vec::from_hex("0102030405060708090a0b0c0d0e0f10111213141516171819").unwrap(),
Vec::from_hex("0102030405060708090a0b0c0d0e0f10111213141516171819").unwrap(), iter::repeat(0xcd_u8).take(50).collect(),
iter::repeat(0xcd_u8).take(50).collect(), Vec::from_hex("4c9007f4026250c6bc8414f9bf50c86c2d7235da").unwrap(),
Vec::from_hex("4c9007f4026250c6bc8414f9bf50c86c2d7235da").unwrap(), ),
), (
( iter::repeat(0x0c_u8).take(20).collect(),
iter::repeat(0x0c_u8).take(20).collect(), b"Test With Truncation".to_vec(),
b"Test With Truncation".to_vec(), Vec::from_hex("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04").unwrap(),
Vec::from_hex("4c1a03424b55e07fe7f27be1d58bb9324a9a5a04").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(80).collect(),
iter::repeat(0xaa_u8).take(80).collect(), b"Test Using Larger Than Block-Size Key - Hash Key First".to_vec(),
b"Test Using Larger Than Block-Size Key - Hash Key First".to_vec(), Vec::from_hex("aa4ae5e15272d00e95705637ce8a3b55ed402112").unwrap(),
Vec::from_hex("aa4ae5e15272d00e95705637ce8a3b55ed402112").unwrap(), ),
), (
( iter::repeat(0xaa_u8).take(80).collect(),
iter::repeat(0xaa_u8).take(80).collect(), b"Test Using Larger Than Block-Size Key \
b"Test Using Larger Than Block-Size Key \
and Larger Than One Block-Size Data" and Larger Than One Block-Size Data"
.to_vec(), .to_vec(),
Vec::from_hex("e8e99d0f45237d786d6bbaa7965c7808bbff1a91").unwrap(), Vec::from_hex("e8e99d0f45237d786d6bbaa7965c7808bbff1a91").unwrap(),
), ),
]; ];
test_hmac(MessageDigest::sha1(), &tests); test_hmac(MessageDigest::sha1(), &tests);
} }
@ -895,6 +579,6 @@ mod test {
let mut verifier = Verifier::new(MessageDigest::sha256(), &key).unwrap(); let mut verifier = Verifier::new(MessageDigest::sha256(), &key).unwrap();
verifier.update(b"hello world").unwrap(); verifier.update(b"hello world").unwrap();
assert!(verifier.finish(&signature).unwrap()); assert!(verifier.verify(&signature).unwrap());
} }
} }