| /* BEGIN_HEADER */ |
| #include "mbedtls/sha1.h" |
| #include "mbedtls/sha256.h" |
| #include "mbedtls/sha512.h" |
| #include "mbedtls/sha3.h" |
| /* END_HEADER */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */ |
| void mbedtls_sha1(data_t *src_str, data_t *hash) |
| { |
| unsigned char output[41]; |
| |
| memset(output, 0x00, 41); |
| |
| |
| TEST_ASSERT(mbedtls_sha1(src_str->x, src_str->len, output) == 0); |
| |
| TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 20, hash->len) == 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ |
| void sha256_invalid_param() |
| { |
| mbedtls_sha256_context ctx; |
| unsigned char buf[64] = { 0 }; |
| size_t const buflen = sizeof(buf); |
| int invalid_type = 42; |
| |
| TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, |
| mbedtls_sha256_starts(&ctx, invalid_type)); |
| |
| TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, |
| mbedtls_sha256(buf, buflen, |
| buf, invalid_type)); |
| |
| exit: |
| return; |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA224_C */ |
| void sha224(data_t *src_str, data_t *hash) |
| { |
| unsigned char output[57]; |
| |
| memset(output, 0x00, 57); |
| |
| |
| TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 1), 0); |
| |
| TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 28, hash->len), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ |
| void mbedtls_sha256(data_t *src_str, data_t *hash) |
| { |
| unsigned char output[65]; |
| |
| memset(output, 0x00, 65); |
| |
| |
| TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 0), 0); |
| |
| TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 32, hash->len), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ |
| void sha512_invalid_param() |
| { |
| mbedtls_sha512_context ctx; |
| unsigned char buf[64] = { 0 }; |
| size_t const buflen = sizeof(buf); |
| int invalid_type = 42; |
| |
| TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, |
| mbedtls_sha512_starts(&ctx, invalid_type)); |
| |
| TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, |
| mbedtls_sha512(buf, buflen, |
| buf, invalid_type)); |
| |
| exit: |
| return; |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA384_C */ |
| void sha384(data_t *src_str, data_t *hash) |
| { |
| unsigned char output[97]; |
| |
| memset(output, 0x00, 97); |
| |
| |
| TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 1), 0); |
| |
| TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 48, hash->len), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ |
| void mbedtls_sha512(data_t *src_str, data_t *hash) |
| { |
| unsigned char output[129]; |
| |
| memset(output, 0x00, 129); |
| |
| |
| TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 0), 0); |
| |
| TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 64, hash->len), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_SELF_TEST */ |
| void sha1_selftest() |
| { |
| TEST_ASSERT(mbedtls_sha1_self_test(1) == 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA224_C:MBEDTLS_SELF_TEST */ |
| void sha224_selftest() |
| { |
| TEST_EQUAL(mbedtls_sha224_self_test(1), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_SELF_TEST */ |
| void sha256_selftest() |
| { |
| TEST_EQUAL(mbedtls_sha256_self_test(1), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA384_C:MBEDTLS_SELF_TEST */ |
| void sha384_selftest() |
| { |
| TEST_EQUAL(mbedtls_sha384_self_test(1), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_SELF_TEST */ |
| void sha512_selftest() |
| { |
| TEST_EQUAL(mbedtls_sha512_self_test(1), 0); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ |
| void mbedtls_sha3(int family, data_t *in, data_t *hash) |
| { |
| unsigned char *output = NULL; |
| |
| TEST_CALLOC(output, hash->len); |
| |
| TEST_ASSERT(mbedtls_sha3(family, in->x, in->len, output, hash->len) == 0); |
| |
| TEST_MEMORY_COMPARE(output, hash->len, hash->x, hash->len); |
| |
| exit: |
| mbedtls_free(output); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ |
| void sha3_invalid_param() |
| { |
| unsigned char output[32]; |
| mbedtls_sha3_context ctx; |
| |
| mbedtls_sha3_init(&ctx); |
| TEST_EQUAL(mbedtls_sha3_starts(&ctx, MBEDTLS_SHA3_NONE), MBEDTLS_ERR_SHA3_BAD_INPUT_DATA); |
| |
| TEST_EQUAL(mbedtls_sha3_starts(&ctx, MBEDTLS_SHA3_256), 0); |
| TEST_EQUAL(mbedtls_sha3_finish(&ctx, output, 0), MBEDTLS_ERR_SHA3_BAD_INPUT_DATA); |
| |
| TEST_EQUAL(mbedtls_sha3_starts(&ctx, MBEDTLS_SHA3_256), 0); |
| TEST_EQUAL(mbedtls_sha3_finish(&ctx, output, 31), MBEDTLS_ERR_SHA3_BAD_INPUT_DATA); |
| |
| TEST_EQUAL(mbedtls_sha3_starts(&ctx, MBEDTLS_SHA3_256), 0); |
| TEST_EQUAL(mbedtls_sha3_finish(&ctx, output, 32), 0); |
| |
| exit: |
| return; |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ |
| void mbedtls_sha3_multi(int family, data_t *in, data_t *hash) |
| { |
| unsigned char *output = NULL; |
| mbedtls_sha3_context ctx; |
| const unsigned int block_size = 256; |
| |
| TEST_CALLOC(output, hash->len); |
| |
| mbedtls_sha3_init(&ctx); |
| mbedtls_sha3_starts(&ctx, family); |
| |
| for (size_t l = 0; l < in->len; l += block_size) { |
| TEST_ASSERT(mbedtls_sha3_update(&ctx, in->x + l, MIN(in->len - l, block_size)) == 0); |
| } |
| |
| TEST_ASSERT(mbedtls_sha3_finish(&ctx, output, hash->len) == 0); |
| |
| TEST_MEMORY_COMPARE(output, hash->len, hash->x, hash->len); |
| |
| exit: |
| mbedtls_free(output); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ |
| void sha3_streaming(int type, data_t *input) |
| { |
| mbedtls_sha3_context ctx; |
| unsigned char reference_hash[64]; |
| unsigned char hash[64]; |
| size_t chunk_size; |
| size_t hash_length = (type == MBEDTLS_SHA3_224 ? 28 : |
| type == MBEDTLS_SHA3_256 ? 32 : |
| type == MBEDTLS_SHA3_384 ? 48 : |
| type == MBEDTLS_SHA3_512 ? 64 : |
| 0); |
| |
| mbedtls_sha3_init(&ctx); |
| memset(reference_hash, 0, sizeof(reference_hash)); |
| memset(hash, 0, sizeof(hash)); |
| TEST_ASSERT(hash_length != 0); |
| |
| /* Generate a reference hash */ |
| mbedtls_sha3(type, input->x, input->len, reference_hash, hash_length); |
| |
| /* Repeat each test with increasingly-sized data chunks |
| * E.g. start by processing bytes individual bytes, then 2-byte chunks, |
| * then 3-byte chunks, and so on... |
| * At each test ensure that the same hash is generated. |
| */ |
| for (chunk_size = 1; chunk_size < input->len; chunk_size++) { |
| size_t i; |
| size_t remaining = input->len; |
| |
| mbedtls_sha3_init(&ctx); |
| TEST_ASSERT(mbedtls_sha3_starts(&ctx, type) == 0); |
| |
| for (i = 0; i < input->len; i += chunk_size) { |
| size_t len = remaining >= chunk_size ? chunk_size : remaining; |
| TEST_ASSERT(mbedtls_sha3_update(&ctx, input->x + i, len) == 0); |
| remaining -= len; |
| } |
| |
| mbedtls_sha3_finish(&ctx, hash, hash_length); |
| mbedtls_sha3_free(&ctx); |
| |
| TEST_MEMORY_COMPARE(hash, hash_length, reference_hash, hash_length); |
| } |
| |
| exit: |
| mbedtls_sha3_free(&ctx); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ |
| void sha3_reuse(data_t *input1, data_t *hash1, |
| data_t *input2, data_t *hash2) |
| { |
| unsigned char output[64]; |
| mbedtls_sha3_context ctx; |
| mbedtls_sha3_id type1, type2; |
| |
| mbedtls_sha3_init(&ctx); |
| switch (hash1->len) { |
| case 28: type1 = MBEDTLS_SHA3_224; break; |
| case 32: type1 = MBEDTLS_SHA3_256; break; |
| case 48: type1 = MBEDTLS_SHA3_384; break; |
| case 64: type1 = MBEDTLS_SHA3_512; break; |
| default: TEST_FAIL("hash1->len validity"); break; |
| } |
| switch (hash2->len) { |
| case 28: type2 = MBEDTLS_SHA3_224; break; |
| case 32: type2 = MBEDTLS_SHA3_256; break; |
| case 48: type2 = MBEDTLS_SHA3_384; break; |
| case 64: type2 = MBEDTLS_SHA3_512; break; |
| default: TEST_FAIL("hash2->len validity"); break; |
| } |
| |
| /* Round 1 */ |
| TEST_ASSERT(mbedtls_sha3_starts(&ctx, type1) == 0); |
| TEST_ASSERT(mbedtls_sha3_update(&ctx, input1->x, input1->len) == 0); |
| TEST_ASSERT(mbedtls_sha3_finish(&ctx, output, sizeof(output)) == 0); |
| TEST_MEMORY_COMPARE(output, hash1->len, hash1->x, hash1->len); |
| |
| /* Round 2 */ |
| TEST_ASSERT(mbedtls_sha3_starts(&ctx, type2) == 0); |
| TEST_ASSERT(mbedtls_sha3_update(&ctx, input2->x, input2->len) == 0); |
| TEST_ASSERT(mbedtls_sha3_finish(&ctx, output, sizeof(output)) == 0); |
| TEST_MEMORY_COMPARE(output, hash2->len, hash2->x, hash2->len); |
| |
| exit: |
| mbedtls_sha3_free(&ctx); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C:MBEDTLS_SELF_TEST */ |
| void sha3_selftest() |
| { |
| TEST_ASSERT(mbedtls_sha3_self_test(0) == 0); |
| } |
| /* END_CASE */ |