mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-23 17:55:01 +00:00
Error codes reported by the crypto and storage APIs are now very specific, and tests verify the proper errors are reported. More specific error codes coming to other files next, but I don't want this CL to get too long. This also changes test_common.c so TEST_EQ() reports mismatched values in both decimal and hex, and adds TEST_SUCC() to test for a successful return value. BUG=chromium:370082 BRANCH=none TEST=make clean && VBOOT2=1 COV=1 make Change-Id: I255c8e5769284fbc286b9d94631b19677a71cdd0 Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/202778 Reviewed-by: Bill Richardson <wfrichar@chromium.org>
150 lines
3.8 KiB
C
150 lines
3.8 KiB
C
/* Copyright (c) 2014 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*/
|
|
|
|
/* FIPS 180-2 Tests for message digest functions. */
|
|
|
|
#include "2sysincludes.h"
|
|
#include "2rsa.h"
|
|
#include "2sha.h"
|
|
#include "2return_codes.h"
|
|
|
|
#include "sha_test_vectors.h"
|
|
#include "test_common.h"
|
|
|
|
static int vb2_digest(const uint8_t *buf,
|
|
uint32_t size,
|
|
uint32_t algorithm,
|
|
uint8_t *digest,
|
|
uint32_t digest_size)
|
|
{
|
|
struct vb2_digest_context dc;
|
|
int rv;
|
|
|
|
rv = vb2_digest_init(&dc, algorithm);
|
|
if (rv)
|
|
return rv;
|
|
|
|
rv = vb2_digest_extend(&dc, buf, size);
|
|
if (rv)
|
|
return rv;
|
|
|
|
return vb2_digest_finalize(&dc, digest, digest_size);
|
|
}
|
|
|
|
void sha1_tests(void)
|
|
{
|
|
uint8_t digest[VB2_SHA1_DIGEST_SIZE];
|
|
uint8_t *test_inputs[3];
|
|
int i;
|
|
|
|
test_inputs[0] = (uint8_t *) oneblock_msg;
|
|
test_inputs[1] = (uint8_t *) multiblock_msg1;
|
|
test_inputs[2] = (uint8_t *) long_msg;
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
TEST_SUCC(vb2_digest(test_inputs[i],
|
|
strlen((char *)test_inputs[i]),
|
|
VB2_ALG_RSA1024_SHA1, digest,
|
|
sizeof(digest)),
|
|
"vb2_digest() SHA1");
|
|
TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)),
|
|
0, "SHA1 digest");
|
|
}
|
|
|
|
TEST_EQ(vb2_digest(test_inputs[0], strlen((char *)test_inputs[0]),
|
|
VB2_ALG_RSA1024_SHA1, digest, sizeof(digest) - 1),
|
|
VB2_ERROR_SHA_FINALIZE_DIGEST_SIZE, "vb2_digest() too small");
|
|
}
|
|
|
|
void sha256_tests(void)
|
|
{
|
|
uint8_t digest[VB2_SHA256_DIGEST_SIZE];
|
|
uint8_t *test_inputs[3];
|
|
int i;
|
|
|
|
test_inputs[0] = (uint8_t *) oneblock_msg;
|
|
test_inputs[1] = (uint8_t *) multiblock_msg1;
|
|
test_inputs[2] = (uint8_t *) long_msg;
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
TEST_SUCC(vb2_digest(test_inputs[i],
|
|
strlen((char *)test_inputs[i]),
|
|
VB2_ALG_RSA1024_SHA256, digest,
|
|
sizeof(digest)),
|
|
"vb2_digest() SHA256");
|
|
TEST_EQ(memcmp(digest, sha256_results[i], sizeof(digest)),
|
|
0, "SHA-256 digest");
|
|
}
|
|
|
|
TEST_EQ(vb2_digest(test_inputs[0], strlen((char *)test_inputs[0]),
|
|
VB2_ALG_RSA1024_SHA256, digest, sizeof(digest) - 1),
|
|
VB2_ERROR_SHA_FINALIZE_DIGEST_SIZE, "vb2_digest() too small");
|
|
}
|
|
|
|
void sha512_tests(void)
|
|
{
|
|
uint8_t digest[VB2_SHA512_DIGEST_SIZE];
|
|
uint8_t *test_inputs[3];
|
|
int i;
|
|
|
|
test_inputs[0] = (uint8_t *) oneblock_msg;
|
|
test_inputs[1] = (uint8_t *) multiblock_msg2;
|
|
test_inputs[2] = (uint8_t *) long_msg;
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
TEST_SUCC(vb2_digest(test_inputs[i],
|
|
strlen((char *)test_inputs[i]),
|
|
VB2_ALG_RSA1024_SHA512, digest,
|
|
sizeof(digest)),
|
|
"vb2_digest() SHA512");
|
|
TEST_EQ(memcmp(digest, sha512_results[i], sizeof(digest)),
|
|
0, "SHA-512 digest");
|
|
}
|
|
|
|
TEST_EQ(vb2_digest(test_inputs[0], strlen((char *)test_inputs[0]),
|
|
VB2_ALG_RSA1024_SHA512, digest, sizeof(digest) - 1),
|
|
VB2_ERROR_SHA_FINALIZE_DIGEST_SIZE, "vb2_digest() too small");
|
|
}
|
|
|
|
void misc_tests(void)
|
|
{
|
|
uint8_t digest[VB2_SHA512_DIGEST_SIZE];
|
|
struct vb2_digest_context dc;
|
|
|
|
TEST_EQ(vb2_digest_size(VB2_ALG_COUNT), 0, "digest size invalid alg");
|
|
|
|
TEST_EQ(vb2_digest((uint8_t *)oneblock_msg, strlen(oneblock_msg),
|
|
VB2_ALG_COUNT, digest, sizeof(digest)),
|
|
VB2_ERROR_SHA_INIT_ALGORITHM,
|
|
"vb2_digest() invalid alg");
|
|
|
|
/* Test bad algorithm inside extend and finalize */
|
|
vb2_digest_init(&dc, VB2_ALG_RSA1024_SHA1);
|
|
dc.algorithm = VB2_ALG_COUNT;
|
|
TEST_EQ(vb2_digest_extend(&dc, digest, sizeof(digest)),
|
|
VB2_ERROR_SHA_EXTEND_ALGORITHM,
|
|
"vb2_digest_extend() invalid alg");
|
|
TEST_EQ(vb2_digest_finalize(&dc, digest, sizeof(digest)),
|
|
VB2_ERROR_SHA_FINALIZE_ALGORITHM,
|
|
"vb2_digest_finalize() invalid alg");
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
/* Initialize long_msg with 'a' x 1,000,000 */
|
|
long_msg = (char *) malloc(1000001);
|
|
memset(long_msg, 'a', 1000000);
|
|
long_msg[1000000]=0;
|
|
|
|
sha1_tests();
|
|
sha256_tests();
|
|
sha512_tests();
|
|
misc_tests();
|
|
|
|
free(long_msg);
|
|
|
|
return gTestSuccess ? 0 : 255;
|
|
}
|