mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-01-31 00:32:50 +00:00
4e747337ee
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
294 lines
7.8 KiB
C
294 lines
7.8 KiB
C
/* BEGIN_HEADER */
|
|
#include "mbedtls/sha1.h"
|
|
#include "mbedtls/sha256.h"
|
|
#include "mbedtls/sha512.h"
|
|
#include "mbedtls/sha3.h"
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */
|
|
void mbedtls_sha1(data_t *src_str, data_t *hash)
|
|
{
|
|
unsigned char output[41];
|
|
|
|
memset(output, 0x00, 41);
|
|
|
|
|
|
TEST_ASSERT(mbedtls_sha1(src_str->x, src_str->len, output) == 0);
|
|
|
|
TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 20, hash->len) == 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */
|
|
void sha256_invalid_param()
|
|
{
|
|
mbedtls_sha256_context ctx;
|
|
unsigned char buf[64] = { 0 };
|
|
size_t const buflen = sizeof(buf);
|
|
int invalid_type = 42;
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
|
|
mbedtls_sha256_starts(&ctx, invalid_type));
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
|
|
mbedtls_sha256(buf, buflen,
|
|
buf, invalid_type));
|
|
|
|
exit:
|
|
return;
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA224_C */
|
|
void sha224(data_t *src_str, data_t *hash)
|
|
{
|
|
unsigned char output[57];
|
|
|
|
memset(output, 0x00, 57);
|
|
|
|
|
|
TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 1), 0);
|
|
|
|
TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 28, hash->len), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */
|
|
void mbedtls_sha256(data_t *src_str, data_t *hash)
|
|
{
|
|
unsigned char output[65];
|
|
|
|
memset(output, 0x00, 65);
|
|
|
|
|
|
TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 0), 0);
|
|
|
|
TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 32, hash->len), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */
|
|
void sha512_invalid_param()
|
|
{
|
|
mbedtls_sha512_context ctx;
|
|
unsigned char buf[64] = { 0 };
|
|
size_t const buflen = sizeof(buf);
|
|
int invalid_type = 42;
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
|
|
mbedtls_sha512_starts(&ctx, invalid_type));
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
|
|
mbedtls_sha512(buf, buflen,
|
|
buf, invalid_type));
|
|
|
|
exit:
|
|
return;
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA384_C */
|
|
void sha384(data_t *src_str, data_t *hash)
|
|
{
|
|
unsigned char output[97];
|
|
|
|
memset(output, 0x00, 97);
|
|
|
|
|
|
TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 1), 0);
|
|
|
|
TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 48, hash->len), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */
|
|
void mbedtls_sha512(data_t *src_str, data_t *hash)
|
|
{
|
|
unsigned char output[129];
|
|
|
|
memset(output, 0x00, 129);
|
|
|
|
|
|
TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 0), 0);
|
|
|
|
TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 64, hash->len), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_SELF_TEST */
|
|
void sha1_selftest()
|
|
{
|
|
TEST_ASSERT(mbedtls_sha1_self_test(1) == 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA224_C:MBEDTLS_SELF_TEST */
|
|
void sha224_selftest()
|
|
{
|
|
TEST_EQUAL(mbedtls_sha224_self_test(1), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_SELF_TEST */
|
|
void sha256_selftest()
|
|
{
|
|
TEST_EQUAL(mbedtls_sha256_self_test(1), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA384_C:MBEDTLS_SELF_TEST */
|
|
void sha384_selftest()
|
|
{
|
|
TEST_EQUAL(mbedtls_sha384_self_test(1), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_SELF_TEST */
|
|
void sha512_selftest()
|
|
{
|
|
TEST_EQUAL(mbedtls_sha512_self_test(1), 0);
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
|
|
void mbedtls_sha3( int family, data_t *in, data_t *hash )
|
|
{
|
|
unsigned char *output = NULL;
|
|
|
|
ASSERT_ALLOC( output, hash->len );
|
|
|
|
TEST_ASSERT( mbedtls_sha3( family, in->x, in->len, output, hash->len ) == 0 );
|
|
|
|
ASSERT_COMPARE( output, hash->len, hash->x, hash->len );
|
|
|
|
exit:
|
|
mbedtls_free( output );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
|
|
void mbedtls_sha3_multi( int family, data_t *in, data_t *hash )
|
|
{
|
|
unsigned char *output = NULL;
|
|
mbedtls_sha3_context ctx;
|
|
const unsigned int block_size = 256;
|
|
|
|
ASSERT_ALLOC( output, hash->len );
|
|
|
|
mbedtls_sha3_init( &ctx );
|
|
mbedtls_sha3_starts( &ctx, family );
|
|
|
|
for( size_t l = 0; l < in->len; l += block_size )
|
|
TEST_ASSERT( mbedtls_sha3_update( &ctx, in->x + l, MIN( in->len - l, block_size ) ) == 0 );
|
|
|
|
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, hash->len ) == 0 );
|
|
|
|
ASSERT_COMPARE( output, hash->len, hash->x, hash->len );
|
|
|
|
exit:
|
|
mbedtls_free( output );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
|
|
void sha3_streaming( int type, data_t *input )
|
|
{
|
|
mbedtls_sha3_context ctx;
|
|
unsigned char reference_hash[64];
|
|
unsigned char hash[64];
|
|
size_t chunk_size;
|
|
size_t hash_length = ( type == MBEDTLS_SHA3_224 ? 28 :
|
|
type == MBEDTLS_SHA3_256 ? 32 :
|
|
type == MBEDTLS_SHA3_384 ? 48 :
|
|
type == MBEDTLS_SHA3_512 ? 64 :
|
|
0 );
|
|
|
|
mbedtls_sha3_init( &ctx );
|
|
memset( reference_hash, 0, sizeof( reference_hash ) );
|
|
memset( hash, 0, sizeof( hash ) );
|
|
TEST_ASSERT( hash_length != 0 );
|
|
|
|
/* Generate a reference hash */
|
|
mbedtls_sha3( type, input->x, input->len, reference_hash, hash_length );
|
|
|
|
/* Repeat each test with increasingly-sized data chunks
|
|
* E.g. start by processing bytes individual bytes, then 2-byte chunks,
|
|
* then 3-byte chunks, and so on...
|
|
* At each test ensure that the same hash is generated.
|
|
*/
|
|
for( chunk_size = 1; chunk_size < input->len; chunk_size++ )
|
|
{
|
|
size_t i;
|
|
size_t remaining = input->len;
|
|
|
|
mbedtls_sha3_init( &ctx );
|
|
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type ) == 0 );
|
|
|
|
for ( i = 0; i < input->len; i += chunk_size )
|
|
{
|
|
size_t len = remaining >= chunk_size ? chunk_size : remaining;
|
|
TEST_ASSERT( mbedtls_sha3_update( &ctx, input->x + i, len ) == 0 );
|
|
remaining -= len;
|
|
}
|
|
|
|
mbedtls_sha3_finish( &ctx, hash, hash_length );
|
|
mbedtls_sha3_free( &ctx );
|
|
|
|
ASSERT_COMPARE( hash, hash_length, reference_hash, hash_length );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_sha3_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
|
|
void sha3_reuse( data_t *input1, data_t *hash1,
|
|
data_t *input2, data_t *hash2 )
|
|
{
|
|
unsigned char output[64];
|
|
mbedtls_sha3_context ctx;
|
|
mbedtls_sha3_id type1, type2;
|
|
|
|
mbedtls_sha3_init( &ctx );
|
|
switch( hash1->len )
|
|
{
|
|
case 28: type1 = MBEDTLS_SHA3_224; break;
|
|
case 32: type1 = MBEDTLS_SHA3_256; break;
|
|
case 48: type1 = MBEDTLS_SHA3_384; break;
|
|
case 64: type1 = MBEDTLS_SHA3_512; break;
|
|
default: TEST_ASSERT( ! "hash1->len validity" ); break;
|
|
}
|
|
switch( hash2->len )
|
|
{
|
|
case 28: type2 = MBEDTLS_SHA3_224; break;
|
|
case 32: type2 = MBEDTLS_SHA3_256; break;
|
|
case 48: type2 = MBEDTLS_SHA3_384; break;
|
|
case 64: type2 = MBEDTLS_SHA3_512; break;
|
|
default: TEST_ASSERT( ! "hash2->len validity" ); break;
|
|
}
|
|
|
|
/* Round 1 */
|
|
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type1 ) == 0 );
|
|
TEST_ASSERT( mbedtls_sha3_update( &ctx, input1->x, input1->len ) == 0 );
|
|
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
|
|
ASSERT_COMPARE( output, hash1->len, hash1->x, hash1->len );
|
|
|
|
/* Round 2 */
|
|
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type2 ) == 0 );
|
|
TEST_ASSERT( mbedtls_sha3_update( &ctx, input2->x, input2->len ) == 0 );
|
|
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
|
|
ASSERT_COMPARE( output, hash2->len, hash2->x, hash2->len );
|
|
|
|
exit:
|
|
mbedtls_sha3_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C:MBEDTLS_SELF_TEST */
|
|
void sha3_selftest()
|
|
{
|
|
TEST_ASSERT( mbedtls_sha3_self_test( 0 ) == 0 );
|
|
}
|
|
/* END_CASE */
|