101 lines
3.0 KiB
C++
101 lines
3.0 KiB
C++
/**
|
|
* Copyright (c) 2021 OceanBase
|
|
* OceanBase CE is licensed under Mulan PubL v2.
|
|
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
|
* You may obtain a copy of Mulan PubL v2 at:
|
|
* http://license.coscl.org.cn/MulanPubL-2.0
|
|
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
|
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
|
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
|
* See the Mulan PubL v2 for more details.
|
|
*/
|
|
|
|
#include <gtest/gtest.h>
|
|
#include "share/ob_encryption_util.h"
|
|
#define randmod(x) rand()%x
|
|
#define private public
|
|
using namespace oceanbase::common;
|
|
using namespace oceanbase::share;
|
|
|
|
class TestNationalEncrypt : public ::testing::Test
|
|
{
|
|
public:
|
|
bool equal(char *A, char *B, int len);
|
|
};
|
|
|
|
bool TestNationalEncrypt::equal(char *A, char *B, int len)
|
|
{
|
|
int ret = true;
|
|
for (int i = 0; i < len; ++i) {
|
|
if (A[i] != B[i]) {
|
|
ret = false;
|
|
break;
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
TEST_F(TestNationalEncrypt, basic_test)
|
|
{
|
|
int ret = OB_SUCCESS;
|
|
char input_buf[31];
|
|
char encrypt_buf[100];
|
|
char decrypt_buf[100];
|
|
int64_t encrypt_len = 0;
|
|
int64_t decrypt_len = 0;
|
|
char key[16];
|
|
MEMCPY(key, "oceanbaseforever", 16);
|
|
MEMCPY(input_buf, "1234567890123456789012345678901", 31);
|
|
ret = ObSm4Encryption::sm4_encrypt(key, 16, input_buf, 31, 100, encrypt_buf, encrypt_len);
|
|
ASSERT_EQ(ret, OB_SUCCESS);
|
|
ASSERT_EQ(encrypt_len, 32);
|
|
ret = ObSm4Encryption::sm4_decrypt(key, 16, encrypt_buf, 32, 100, decrypt_buf, decrypt_len);
|
|
ASSERT_EQ(ret, OB_SUCCESS);
|
|
ASSERT_EQ(decrypt_len, 31);
|
|
ASSERT_EQ(true, equal(decrypt_buf, input_buf, 31));
|
|
}
|
|
TEST_F(TestNationalEncrypt, random_test)
|
|
{
|
|
//Random encryption and decryption test 20,000 times
|
|
int ret = OB_SUCCESS;
|
|
srand((unsigned)time(NULL));
|
|
int64_t index = 20000;
|
|
while (index--) {
|
|
int64_t buf_len = randmod(1024) + 1;
|
|
char *buf = new char[buf_len];
|
|
char key[16];
|
|
for (int i = 0; i < buf_len; ++i) {
|
|
char tmp = 'a';
|
|
if (rand() % 2 == 1) {
|
|
tmp = 'A';
|
|
}
|
|
buf[i] = tmp + randmod(26);
|
|
}
|
|
for (auto &c : key) {
|
|
c = 'a' + randmod(26);
|
|
}
|
|
char *encrypt_buf = new char[(buf_len/16 + 1) * 16];
|
|
char *decrypt_buf = new char[(buf_len/16 + 1) * 16];
|
|
int64_t encrypt_len = 0, decrypt_len = 0;
|
|
ret = ObSm4Encryption::sm4_encrypt(key, 16, buf, buf_len, (buf_len/16 + 1) * 16, encrypt_buf, encrypt_len);
|
|
ASSERT_EQ(ret, OB_SUCCESS);
|
|
ASSERT_EQ(encrypt_len, (buf_len/16 + 1) * 16);
|
|
ret = ObSm4Encryption::sm4_decrypt(key, 16, encrypt_buf, encrypt_len, (buf_len / 16 + 1) * 16, decrypt_buf, decrypt_len);
|
|
ASSERT_EQ(ret, OB_SUCCESS);
|
|
ASSERT_EQ(decrypt_len, buf_len);
|
|
ASSERT_EQ(true, equal(decrypt_buf, buf, buf_len));
|
|
delete []buf;
|
|
delete []encrypt_buf;
|
|
delete []decrypt_buf;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
OB_LOGGER.set_log_level("WARN");
|
|
testing::InitGoogleTest(&argc, argv);
|
|
return RUN_ALL_TESTS();
|
|
}
|