mbedtls/tests/suites/test_suite_shax.function
Pol Henarejos 90f803c584
Add sha3 streaming and reuse tests.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
2022-05-20 20:50:29 +02:00

282 lines
7.8 KiB
Plaintext

/* BEGIN_HEADER */
#include "mbedtls/sha1.h"
#include "mbedtls/sha256.h"
#include "mbedtls/sha512.h"
#include "mbedtls/sha3.h"
/* END_HEADER */
/* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */
void mbedtls_sha1( data_t * src_str, data_t * hash )
{
unsigned char output[41];
memset(output, 0x00, 41);
TEST_ASSERT( mbedtls_sha1( src_str->x, src_str->len, output ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 20, hash->len ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:NOT_DEFINED */
void sha256_invalid_param( )
{
mbedtls_sha256_context ctx;
unsigned char buf[64] = { 0 };
size_t const buflen = sizeof( buf );
int valid_type = 0;
int invalid_type = 42;
TEST_EQUAL( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256_starts( &ctx, invalid_type ) );
TEST_EQUAL( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA,
mbedtls_sha256( buf, buflen,
buf, invalid_type ) );
exit:
return;
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA224_C */
void sha224( data_t * src_str, data_t * hash )
{
unsigned char output[57];
memset(output, 0x00, 57);
TEST_ASSERT( mbedtls_sha256( src_str->x, src_str->len, output, 1 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 28, hash->len ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */
void mbedtls_sha256( data_t * src_str, data_t * hash )
{
unsigned char output[65];
memset(output, 0x00, 65);
TEST_ASSERT( mbedtls_sha256( src_str->x, src_str->len, output, 0 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 32, hash->len ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:NOT_DEFINED */
void sha512_invalid_param( )
{
mbedtls_sha512_context ctx;
unsigned char buf[64] = { 0 };
size_t const buflen = sizeof( buf );
int valid_type = 0;
int invalid_type = 42;
TEST_EQUAL( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512_starts( &ctx, invalid_type ) );
TEST_EQUAL( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA,
mbedtls_sha512( buf, buflen,
buf, invalid_type ) );
exit:
return;
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA384_C */
void sha384( data_t * src_str, data_t * hash )
{
unsigned char output[97];
memset(output, 0x00, 97);
TEST_ASSERT( mbedtls_sha512( src_str->x, src_str->len, output, 1 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 48, hash->len ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */
void mbedtls_sha512( data_t * src_str, data_t * hash )
{
unsigned char output[129];
memset(output, 0x00, 129);
TEST_ASSERT( mbedtls_sha512( src_str->x, src_str->len, output, 0 ) == 0 );
TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 64, hash->len ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_SELF_TEST */
void sha1_selftest( )
{
TEST_ASSERT( mbedtls_sha1_self_test( 1 ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_SELF_TEST */
void sha256_selftest( )
{
TEST_ASSERT( mbedtls_sha256_self_test( 1 ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_SELF_TEST */
void sha512_selftest( )
{
TEST_ASSERT( mbedtls_sha512_self_test( 1 ) == 0 );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
void mbedtls_sha3( int family, data_t *in, data_t *hash )
{
unsigned char *output = NULL;
ASSERT_ALLOC( output, hash->len );
TEST_ASSERT( mbedtls_sha3( family, in->x, in->len, output, hash->len ) == 0 );
ASSERT_COMPARE( output, hash->len, hash->x, hash->len );
exit:
mbedtls_free( output );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
void mbedtls_sha3_multi( int family, data_t *in, data_t *hash )
{
unsigned char *output = NULL;
mbedtls_sha3_context ctx;
const unsigned int block_size = 256;
ASSERT_ALLOC( output, hash->len );
mbedtls_sha3_init( &ctx );
mbedtls_sha3_starts( &ctx, family );
for( size_t l = 0; l < in->len; l += block_size )
TEST_ASSERT( mbedtls_sha3_update( &ctx, in->x + l, MIN( in->len - l, block_size ) ) == 0 );
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, hash->len ) == 0 );
ASSERT_COMPARE( output, hash->len, hash->x, hash->len );
exit:
mbedtls_free( output );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
void sha3_streaming( int type, data_t *input )
{
mbedtls_sha3_context ctx;
unsigned char reference_hash[64];
unsigned char hash[64];
size_t chunk_size;
size_t hash_length = ( type == MBEDTLS_SHA3_224 ? 28 :
type == MBEDTLS_SHA3_256 ? 32 :
type == MBEDTLS_SHA3_384 ? 48 :
type == MBEDTLS_SHA3_512 ? 64 :
0 );
mbedtls_sha3_init( &ctx );
memset( reference_hash, 0, sizeof( reference_hash ) );
memset( hash, 0, sizeof( hash ) );
TEST_ASSERT( hash_length != 0 );
/* Generate a reference hash */
mbedtls_sha3( type, input->x, input->len, reference_hash, hash_length );
/* Repeat each test with increasingly-sized data chunks
* E.g. start by processing bytes individual bytes, then 2-byte chunks,
* then 3-byte chunks, and so on...
* At each test ensure that the same hash is generated.
*/
for( chunk_size = 1; chunk_size < input->len; chunk_size++ )
{
size_t i;
size_t remaining = input->len;
mbedtls_sha3_init( &ctx );
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type ) == 0 );
for ( i = 0; i < input->len; i += chunk_size )
{
size_t len = remaining >= chunk_size ? chunk_size : remaining;
TEST_ASSERT( mbedtls_sha3_update( &ctx, input->x + i, len ) == 0 );
remaining -= len;
}
mbedtls_sha3_finish( &ctx, hash, hash_length );
mbedtls_sha3_free( &ctx );
ASSERT_COMPARE( hash, hash_length, reference_hash, hash_length );
}
exit:
mbedtls_sha3_free( &ctx );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
void sha3_reuse( data_t *input1, data_t *hash1,
data_t *input2, data_t *hash2 )
{
unsigned char output[64];
mbedtls_sha3_context ctx;
mbedtls_sha3_id type1, type2;
mbedtls_sha3_init( &ctx );
switch( hash1->len )
{
case 28: type1 = MBEDTLS_SHA3_224; break;
case 32: type1 = MBEDTLS_SHA3_256; break;
case 48: type1 = MBEDTLS_SHA3_384; break;
case 64: type1 = MBEDTLS_SHA3_512; break;
default: TEST_ASSERT( ! "hash1->len validity" ); break;
}
switch( hash2->len )
{
case 28: type2 = MBEDTLS_SHA3_224; break;
case 32: type2 = MBEDTLS_SHA3_256; break;
case 48: type2 = MBEDTLS_SHA3_384; break;
case 64: type2 = MBEDTLS_SHA3_512; break;
default: TEST_ASSERT( ! "hash2->len validity" ); break;
}
/* Round 1 */
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type1 ) == 0 );
TEST_ASSERT( mbedtls_sha3_update( &ctx, input1->x, input1->len ) == 0 );
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
ASSERT_COMPARE( output, hash1->len, hash1->x, hash1->len );
/* Round 2 */
TEST_ASSERT( mbedtls_sha3_starts( &ctx, type2 ) == 0 );
TEST_ASSERT( mbedtls_sha3_update( &ctx, input2->x, input2->len ) == 0 );
TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
ASSERT_COMPARE( output, hash2->len, hash2->x, hash2->len );
exit:
mbedtls_sha3_free( &ctx );
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C:MBEDTLS_SELF_TEST */
void sha3_selftest()
{
TEST_ASSERT( mbedtls_sha3_self_test( 0 ) == 0 );
}
/* END_CASE */