/* BEGIN_HEADER */ #include "mbedtls/sha1.h" #include "mbedtls/sha256.h" #include "mbedtls/sha512.h" #include "mbedtls/sha3.h" /* END_HEADER */ /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */ void mbedtls_sha1(data_t *src_str, data_t *hash) { unsigned char output[41]; memset(output, 0x00, 41); TEST_ASSERT(mbedtls_sha1(src_str->x, src_str->len, output) == 0); TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 20, hash->len) == 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ void sha256_invalid_param() { mbedtls_sha256_context ctx; unsigned char buf[64] = { 0 }; size_t const buflen = sizeof(buf); int invalid_type = 42; TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, mbedtls_sha256_starts(&ctx, invalid_type)); TEST_EQUAL(MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, mbedtls_sha256(buf, buflen, buf, invalid_type)); exit: return; } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA224_C */ void sha224(data_t *src_str, data_t *hash) { unsigned char output[57]; memset(output, 0x00, 57); TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 1), 0); TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 28, hash->len), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ void mbedtls_sha256(data_t *src_str, data_t *hash) { unsigned char output[65]; memset(output, 0x00, 65); TEST_EQUAL(mbedtls_sha256(src_str->x, src_str->len, output, 0), 0); TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 32, hash->len), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ void sha512_invalid_param() { mbedtls_sha512_context ctx; unsigned char buf[64] = { 0 }; size_t const buflen = sizeof(buf); int invalid_type = 42; TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, mbedtls_sha512_starts(&ctx, invalid_type)); TEST_EQUAL(MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, mbedtls_sha512(buf, buflen, buf, invalid_type)); exit: return; } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA384_C */ void sha384(data_t *src_str, data_t *hash) { unsigned char output[97]; memset(output, 0x00, 97); TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 1), 0); TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 48, hash->len), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ void mbedtls_sha512(data_t *src_str, data_t *hash) { unsigned char output[129]; memset(output, 0x00, 129); TEST_EQUAL(mbedtls_sha512(src_str->x, src_str->len, output, 0), 0); TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 64, hash->len), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_SELF_TEST */ void sha1_selftest() { TEST_ASSERT(mbedtls_sha1_self_test(1) == 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA224_C:MBEDTLS_SELF_TEST */ void sha224_selftest() { TEST_EQUAL(mbedtls_sha224_self_test(1), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_SELF_TEST */ void sha256_selftest() { TEST_EQUAL(mbedtls_sha256_self_test(1), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA384_C:MBEDTLS_SELF_TEST */ void sha384_selftest() { TEST_EQUAL(mbedtls_sha384_self_test(1), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_SELF_TEST */ void sha512_selftest() { TEST_EQUAL(mbedtls_sha512_self_test(1), 0); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ void mbedtls_sha3( int family, data_t *in, data_t *hash ) { unsigned char *output = NULL; ASSERT_ALLOC( output, hash->len ); TEST_ASSERT( mbedtls_sha3( family, in->x, in->len, output, hash->len ) == 0 ); ASSERT_COMPARE( output, hash->len, hash->x, hash->len ); exit: mbedtls_free( output ); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ void mbedtls_sha3_multi( int family, data_t *in, data_t *hash ) { unsigned char *output = NULL; mbedtls_sha3_context ctx; const unsigned int block_size = 256; ASSERT_ALLOC( output, hash->len ); mbedtls_sha3_init( &ctx ); mbedtls_sha3_starts( &ctx, family ); for( size_t l = 0; l < in->len; l += block_size ) TEST_ASSERT( mbedtls_sha3_update( &ctx, in->x + l, MIN( in->len - l, block_size ) ) == 0 ); TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, hash->len ) == 0 ); ASSERT_COMPARE( output, hash->len, hash->x, hash->len ); exit: mbedtls_free( output ); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ void sha3_streaming( int type, data_t *input ) { mbedtls_sha3_context ctx; unsigned char reference_hash[64]; unsigned char hash[64]; size_t chunk_size; size_t hash_length = ( type == MBEDTLS_SHA3_224 ? 28 : type == MBEDTLS_SHA3_256 ? 32 : type == MBEDTLS_SHA3_384 ? 48 : type == MBEDTLS_SHA3_512 ? 64 : 0 ); mbedtls_sha3_init( &ctx ); memset( reference_hash, 0, sizeof( reference_hash ) ); memset( hash, 0, sizeof( hash ) ); TEST_ASSERT( hash_length != 0 ); /* Generate a reference hash */ mbedtls_sha3( type, input->x, input->len, reference_hash, hash_length ); /* Repeat each test with increasingly-sized data chunks * E.g. start by processing bytes individual bytes, then 2-byte chunks, * then 3-byte chunks, and so on... * At each test ensure that the same hash is generated. */ for( chunk_size = 1; chunk_size < input->len; chunk_size++ ) { size_t i; size_t remaining = input->len; mbedtls_sha3_init( &ctx ); TEST_ASSERT( mbedtls_sha3_starts( &ctx, type ) == 0 ); for ( i = 0; i < input->len; i += chunk_size ) { size_t len = remaining >= chunk_size ? chunk_size : remaining; TEST_ASSERT( mbedtls_sha3_update( &ctx, input->x + i, len ) == 0 ); remaining -= len; } mbedtls_sha3_finish( &ctx, hash, hash_length ); mbedtls_sha3_free( &ctx ); ASSERT_COMPARE( hash, hash_length, reference_hash, hash_length ); } exit: mbedtls_sha3_free( &ctx ); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */ void sha3_reuse( data_t *input1, data_t *hash1, data_t *input2, data_t *hash2 ) { unsigned char output[64]; mbedtls_sha3_context ctx; mbedtls_sha3_id type1, type2; mbedtls_sha3_init( &ctx ); switch( hash1->len ) { case 28: type1 = MBEDTLS_SHA3_224; break; case 32: type1 = MBEDTLS_SHA3_256; break; case 48: type1 = MBEDTLS_SHA3_384; break; case 64: type1 = MBEDTLS_SHA3_512; break; default: TEST_ASSERT( ! "hash1->len validity" ); break; } switch( hash2->len ) { case 28: type2 = MBEDTLS_SHA3_224; break; case 32: type2 = MBEDTLS_SHA3_256; break; case 48: type2 = MBEDTLS_SHA3_384; break; case 64: type2 = MBEDTLS_SHA3_512; break; default: TEST_ASSERT( ! "hash2->len validity" ); break; } /* Round 1 */ TEST_ASSERT( mbedtls_sha3_starts( &ctx, type1 ) == 0 ); TEST_ASSERT( mbedtls_sha3_update( &ctx, input1->x, input1->len ) == 0 ); TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 ); ASSERT_COMPARE( output, hash1->len, hash1->x, hash1->len ); /* Round 2 */ TEST_ASSERT( mbedtls_sha3_starts( &ctx, type2 ) == 0 ); TEST_ASSERT( mbedtls_sha3_update( &ctx, input2->x, input2->len ) == 0 ); TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 ); ASSERT_COMPARE( output, hash2->len, hash2->x, hash2->len ); exit: mbedtls_sha3_free( &ctx ); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C:MBEDTLS_SELF_TEST */ void sha3_selftest() { TEST_ASSERT( mbedtls_sha3_self_test( 0 ) == 0 ); } /* END_CASE */