mirror of https://github.com/ARMmbed/mbed-os.git
229 lines
8.8 KiB
C++
229 lines
8.8 KiB
C++
/*
|
|
* Copyright (c) 2013-2016, ARM Limited, All Rights Reserved
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
* not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "mbed.h"
|
|
#include "greentea-client/test_env.h"
|
|
#include "unity/unity.h"
|
|
#include "utest/utest.h"
|
|
|
|
#include "mbedtls/sha256.h"
|
|
|
|
/**
|
|
* \name SECTION: Compatibility code
|
|
*
|
|
* Depending on whether the alternative (hatdware accelerated) hashing
|
|
* functions are provided or not, different API should be used for hashing.
|
|
* \{
|
|
*/
|
|
|
|
#if defined(MBEDTLS_SHA256_ALT)
|
|
|
|
/**
|
|
* \brief This function starts a SHA-256 checksum calculation.
|
|
*
|
|
* \deprecated Superseded by mbedtls_sha256_starts_ret() in 2.7.0.
|
|
*
|
|
* \param ctx The SHA-256 context to initialize.
|
|
* \param is224 Determines which function to use.
|
|
* <ul><li>0: Use SHA-256.</li>
|
|
* <li>1: Use SHA-224.</li></ul>
|
|
*/
|
|
void mbedtls_sha256_starts( mbedtls_sha256_context *ctx,
|
|
int is224 )
|
|
{
|
|
mbedtls_sha256_starts_ret( ctx, is224 );
|
|
}
|
|
|
|
/**
|
|
* \brief This function feeds an input buffer into an ongoing
|
|
* SHA-256 checksum calculation.
|
|
*
|
|
* \deprecated Superseded by mbedtls_sha256_update_ret() in 2.7.0.
|
|
*
|
|
* \param ctx The SHA-256 context to initialize.
|
|
* \param input The buffer holding the data.
|
|
* \param ilen The length of the input data.
|
|
*/
|
|
void mbedtls_sha256_update( mbedtls_sha256_context *ctx,
|
|
const unsigned char *input,
|
|
size_t ilen )
|
|
{
|
|
mbedtls_sha256_update_ret( ctx, input, ilen );
|
|
}
|
|
|
|
/**
|
|
* \brief This function finishes the SHA-256 operation, and writes
|
|
* the result to the output buffer.
|
|
*
|
|
* \deprecated Superseded by mbedtls_sha256_finish_ret() in 2.7.0.
|
|
*
|
|
* \param ctx The SHA-256 context.
|
|
* \param output The SHA-224or SHA-256 checksum result.
|
|
*/
|
|
void mbedtls_sha256_finish( mbedtls_sha256_context *ctx,
|
|
unsigned char output[32] )
|
|
{
|
|
mbedtls_sha256_finish_ret( ctx, output );
|
|
}
|
|
|
|
#endif /* defined(MBEDTLS_SHA256_ALT) */
|
|
|
|
/* \} name SECTION: Compatibility code */
|
|
|
|
using namespace utest::v1;
|
|
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
/* Tests several call to mbedtls_sha256_update function that are not modulo 64 bytes */
|
|
void test_case_sha256_split() {
|
|
const unsigned char test_buf[] = {"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"};
|
|
// sha256_output_values for 3*abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
const unsigned char test_sum[] =
|
|
{ 0x50, 0xEA, 0x82, 0x5D, 0x96, 0x84, 0xF4, 0x22,
|
|
0x9C, 0xA2, 0x9F, 0x1F, 0xEC, 0x51, 0x15, 0x93,
|
|
0xE2, 0x81, 0xE4, 0x6A, 0x14, 0x0D, 0x81, 0xE0,
|
|
0x00, 0x5F, 0x8F, 0x68, 0x86, 0x69, 0xA0, 0x6C};
|
|
unsigned char outsum[32];
|
|
int i;
|
|
|
|
mbedtls_sha256_context ctx;
|
|
printf("test sha256\n");
|
|
mbedtls_sha256_init( &ctx );
|
|
mbedtls_sha256_starts( &ctx, 0);
|
|
#if 0
|
|
printf("test not splitted\n");
|
|
mbedtls_sha256_update( &ctx, test_buf, 168 );
|
|
#else
|
|
printf("test splitted into 3 pieces\n");
|
|
mbedtls_sha256_update( &ctx, test_buf, 2 );
|
|
mbedtls_sha256_update( &ctx, test_buf+2, 66 );
|
|
mbedtls_sha256_update( &ctx, test_buf+68, 100 );
|
|
#endif
|
|
|
|
mbedtls_sha256_finish( &ctx, outsum );
|
|
mbedtls_sha256_free( &ctx );
|
|
|
|
printf("\nreceived result : ");
|
|
for (i=0;i<32;i++) { printf("%02X",outsum[i]);}
|
|
printf("\nawaited result : 50EA825D9684F4229CA29F1FEC511593E281E46A140D81E0005F8F688669A06C\n"); // for abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
|
|
printf("\nend of test sha256\n");
|
|
TEST_ASSERT_EQUAL_UINT8_ARRAY(outsum, test_sum,32);
|
|
}
|
|
|
|
/* Tests that treating 2 sha256 objects in // does not impact the result */
|
|
void test_case_sha256_multi() {
|
|
const unsigned char test_buf[] = {"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"};
|
|
const unsigned char test_buf2[] = {"abcdefghijklmnopqrstuvwxyz012345678901234567890123456789"};
|
|
|
|
// sha256_output_values for abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
const unsigned char test_sum1[] =
|
|
{ 0x24, 0x8D, 0x6A, 0x61, 0xD2, 0x06, 0x38, 0xB8,
|
|
0xE5, 0xC0, 0x26, 0x93, 0x0C, 0x3E, 0x60, 0x39,
|
|
0xA3, 0x3C, 0xE4, 0x59, 0x64, 0xFF, 0x21, 0x67,
|
|
0xF6, 0xEC, 0xED, 0xD4, 0x19, 0xDB, 0x06, 0xC1 };
|
|
// sha256_output_values for 3*abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
const unsigned char test_sum2[] =
|
|
{ 0x50, 0xEA, 0x82, 0x5D, 0x96, 0x84, 0xF4, 0x22,
|
|
0x9C, 0xA2, 0x9F, 0x1F, 0xEC, 0x51, 0x15, 0x93,
|
|
0xE2, 0x81, 0xE4, 0x6A, 0x14, 0x0D, 0x81, 0xE0,
|
|
0x00, 0x5F, 0x8F, 0x68, 0x86, 0x69, 0xA0, 0x6C};
|
|
// sha256_output_values for abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopqabcdefghijklmnopqrstuvwxyz012345678901234567890123456789
|
|
const unsigned char test_sum3[] =
|
|
{ 0x6D, 0x5D, 0xDB, 0x5F, 0x4A, 0x94, 0xAB, 0x7E,
|
|
0x5C, 0xF7, 0x9A, 0xD8, 0x3F, 0x58, 0xD3, 0x97,
|
|
0xFE, 0x79, 0xFB, 0x0D, 0x79, 0xB2, 0x0D, 0x22,
|
|
0xFF, 0x95, 0x9F, 0x04, 0xA2, 0xE4, 0x6C, 0x68};
|
|
unsigned char outsum1[32], outsum2[32], outsum3[32];
|
|
int i;
|
|
|
|
mbedtls_sha256_context ctx1;
|
|
mbedtls_sha256_context ctx2;
|
|
mbedtls_sha256_context ctx3;
|
|
printf("test sha256_multi\n");
|
|
//Init both contexts
|
|
mbedtls_sha256_init( &ctx1);
|
|
mbedtls_sha256_init( &ctx2);
|
|
mbedtls_sha256_init( &ctx3);
|
|
//Start both contexts
|
|
mbedtls_sha256_starts( &ctx1, 0);
|
|
mbedtls_sha256_starts( &ctx2, 0);
|
|
|
|
printf("upd ctx1\n");
|
|
mbedtls_sha256_update( &ctx1, test_buf, 56 );
|
|
printf("upd ctx2\n");
|
|
mbedtls_sha256_update( &ctx2, test_buf, 66 );
|
|
printf("finish ctx1\n");
|
|
mbedtls_sha256_finish( &ctx1, outsum1 );
|
|
printf("upd ctx2\n");
|
|
mbedtls_sha256_update( &ctx2, test_buf+66, 46 );
|
|
printf("clone ctx2 in ctx3\n");
|
|
mbedtls_sha256_clone(&ctx3, (const mbedtls_sha256_context *)&ctx2);
|
|
printf("free ctx1\n");
|
|
mbedtls_sha256_free( &ctx1 );
|
|
printf("upd ctx2\n");
|
|
mbedtls_sha256_update( &ctx2, test_buf+112, 56 );
|
|
printf("upd ctx3 with different values than ctx2\n");
|
|
mbedtls_sha256_update( &ctx3, test_buf2, 56 );
|
|
printf("finish ctx2\n");
|
|
mbedtls_sha256_finish( &ctx2, outsum2 );
|
|
printf("finish ctx3\n");
|
|
mbedtls_sha256_finish( &ctx3, outsum3 );
|
|
printf("free ctx2\n");
|
|
mbedtls_sha256_free( &ctx2 );
|
|
printf("free ctx3\n");
|
|
mbedtls_sha256_free( &ctx3 );
|
|
|
|
printf("\nreceived result ctx1 : ");
|
|
for (i=0;i<32;i++) { printf("%02X",outsum1[i]);}
|
|
printf("\nawaited result : 248D6A61D20638B8E5C026930C3E6039A33CE45964FF216F6ECEDD19DB06C1\n"); // for abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
printf("\nreceived result ctx2 : ");
|
|
for (i=0;i<32;i++) { printf("%02X",outsum2[i]);}
|
|
printf("\nawaited result : 50EA825D9684F4229CA29F1FEC511593E281E46A140D81E0005F8F688669A06C\n"); // for 3*abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq
|
|
printf("\nreceived result ctx3 : ");
|
|
for (i=0;i<32;i++) { printf("%02X",outsum3[i]);}
|
|
printf("\nawaited result : 6D5DDB5F4A94AB7E5CF79AD83F58D397FE79FB0D79B20D22FF959F04A2E46C68\n"); // for 2*abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq+3*0123456789
|
|
printf("\nend of test sha256\n");
|
|
TEST_ASSERT_EQUAL_UINT8_ARRAY(outsum1, test_sum1,32);
|
|
TEST_ASSERT_EQUAL_UINT8_ARRAY(outsum2, test_sum2,32);
|
|
TEST_ASSERT_EQUAL_UINT8_ARRAY(outsum3, test_sum3,32);
|
|
}
|
|
#endif //MBEDTLS_SHA256_C
|
|
|
|
utest::v1::status_t greentea_failure_handler(const Case *const source, const failure_t reason) {
|
|
greentea_case_failure_abort_handler(source, reason);
|
|
return STATUS_CONTINUE;
|
|
}
|
|
|
|
Case cases[] = {
|
|
#if defined(MBEDTLS_SHA256_C)
|
|
Case("Crypto: sha256_split", test_case_sha256_split, greentea_failure_handler),
|
|
Case("Crypto: sha256_multi", test_case_sha256_multi, greentea_failure_handler),
|
|
#endif
|
|
};
|
|
|
|
utest::v1::status_t greentea_test_setup(const size_t number_of_cases) {
|
|
GREENTEA_SETUP(10, "default_auto");
|
|
return greentea_test_setup_handler(number_of_cases);
|
|
}
|
|
|
|
Specification specification(greentea_test_setup, cases, greentea_test_teardown_handler);
|
|
|
|
int main() {
|
|
Harness::run(specification);
|
|
}
|