diff options
author | Evgeny Grin (Karlson2k) <k2k@narod.ru> | 2019-04-19 09:13:08 +0300 |
---|---|---|
committer | Evgeny Grin (Karlson2k) <k2k@narod.ru> | 2019-04-19 09:16:36 +0300 |
commit | c7d3fb718c4432c9dee9da65f99a8e9505658071 (patch) | |
tree | 56a8e8eef24534349723a63ea7909de3c5fc253d /src/microhttpd/test_sha256.c | |
parent | 0b8c463dd87a739075518e3c48792e259171ca2e (diff) | |
download | libmicrohttpd-c7d3fb718c4432c9dee9da65f99a8e9505658071.tar.gz libmicrohttpd-c7d3fb718c4432c9dee9da65f99a8e9505658071.zip |
Tests: added test_sha256 for SHA-256 testing
Diffstat (limited to 'src/microhttpd/test_sha256.c')
-rw-r--r-- | src/microhttpd/test_sha256.c | 335 |
1 files changed, 335 insertions, 0 deletions
diff --git a/src/microhttpd/test_sha256.c b/src/microhttpd/test_sha256.c new file mode 100644 index 00000000..50e119f8 --- /dev/null +++ b/src/microhttpd/test_sha256.c | |||
@@ -0,0 +1,335 @@ | |||
1 | /* | ||
2 | This file is part of libmicrohttpd | ||
3 | Copyright (C) 2019 Karlson2k (Evgeny Grin) | ||
4 | |||
5 | This test tool is free software; you can redistribute it and/or | ||
6 | modify it under the terms of the GNU General Public License as | ||
7 | published by the Free Software Foundation; either version 2, or | ||
8 | (at your option) any later version. | ||
9 | |||
10 | This test tool is distributed in the hope that it will be useful, | ||
11 | but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
13 | Lesser General Public License for more details. | ||
14 | |||
15 | You should have received a copy of the GNU Lesser General Public | ||
16 | License along with this library; if not, write to the Free Software | ||
17 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||
18 | */ | ||
19 | |||
20 | /** | ||
21 | * @file microhttpd/test_sha256.h | ||
22 | * @brief Unit tests for SHA-256 functions | ||
23 | * @author Karlson2k (Evgeny Grin) | ||
24 | */ | ||
25 | |||
26 | #include "mhd_options.h" | ||
27 | #include "sha256.h" | ||
28 | #include "test_helpers.h" | ||
29 | #include <stdio.h> | ||
30 | |||
31 | static int verbose = 0; /* verbose level (0-1)*/ | ||
32 | |||
33 | |||
34 | struct str_with_len | ||
35 | { | ||
36 | const char * const str; | ||
37 | const size_t len; | ||
38 | }; | ||
39 | |||
40 | #define D_STR_W_LEN(s) {(s), (sizeof((s)) / sizeof(char)) - 1} | ||
41 | |||
42 | struct data_unit1 | ||
43 | { | ||
44 | const struct str_with_len str_l; | ||
45 | const uint8_t digest[SHA256_DIGEST_SIZE]; | ||
46 | }; | ||
47 | |||
48 | static const struct data_unit1 data_units1[] = { | ||
49 | {D_STR_W_LEN("abc"), | ||
50 | {0xba, 0x78, 0x16, 0xbf, 0x8f, 0x01, 0xcf, 0xea, 0x41, 0x41, 0x40, 0xde, 0x5d, 0xae, 0x22, 0x23, | ||
51 | 0xb0, 0x03, 0x61, 0xa3, 0x96, 0x17, 0x7a, 0x9c, 0xb4, 0x10, 0xff, 0x61, 0xf2, 0x00, 0x15, 0xad}}, | ||
52 | {D_STR_W_LEN("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq"), | ||
53 | {0x24, 0x8d, 0x6a, 0x61, 0xd2, 0x06, 0x38, 0xb8, 0xe5, 0xc0, 0x26, 0x93, 0x0c, 0x3e, 0x60, 0x39, | ||
54 | 0xa3, 0x3c, 0xe4, 0x59, 0x64, 0xff, 0x21, 0x67, 0xf6, 0xec, 0xed, 0xd4, 0x19, 0xdb, 0x06, 0xc1}}, | ||
55 | {D_STR_W_LEN(""), | ||
56 | {0xe3, 0xb0, 0xc4, 0x42, 0x98, 0xfc, 0x1c, 0x14, 0x9a, 0xfb, 0xf4, 0xc8, 0x99, 0x6f, 0xb9, 0x24, | ||
57 | 0x27, 0xae, 0x41, 0xe4, 0x64, 0x9b, 0x93, 0x4c, 0xa4, 0x95, 0x99, 0x1b, 0x78, 0x52, 0xb8, 0x55}}, | ||
58 | {D_STR_W_LEN("1234567890!@~%&$@#{}[]\\/!?`."), | ||
59 | {0x2f, 0xad, 0x7a, 0xff, 0x7d, 0xfe, 0xcd, 0x78, 0xe4, 0xa6, 0xf3, 0x85, 0x97, 0x9d, 0xdc, 0x39, | ||
60 | 0x55, 0x24, 0x35, 0x4a, 0x00, 0x6f, 0x42, 0x72, 0x41, 0xc1, 0x52, 0xa7, 0x01, 0x0b, 0x2c, 0x41}}, | ||
61 | {D_STR_W_LEN("Simple string."), | ||
62 | {0x01, 0x73, 0x17, 0xc4, 0x0a, 0x9a, 0x0e, 0x81, 0xb3, 0xa4, 0xb1, 0x8e, 0xe9, 0xd6, 0xc2, 0xdf, | ||
63 | 0xfa, 0x7d, 0x53, 0x4e, 0xa1, 0xda, 0xb2, 0x5a, 0x75, 0xbb, 0x2c, 0x30, 0x2f, 0x5f, 0x7a, 0xf4}}, | ||
64 | {D_STR_W_LEN("abcdefghijklmnopqrstuvwxyz"), | ||
65 | {0x71, 0xc4, 0x80, 0xdf, 0x93, 0xd6, 0xae, 0x2f, 0x1e, 0xfa, 0xd1, 0x44, 0x7c, 0x66, 0xc9, 0x52, | ||
66 | 0x5e, 0x31, 0x62, 0x18, 0xcf, 0x51, 0xfc, 0x8d, 0x9e, 0xd8, 0x32, 0xf2, 0xda, 0xf1, 0x8b, 0x73}}, | ||
67 | {D_STR_W_LEN("zyxwvutsrqponMLKJIHGFEDCBA"), | ||
68 | {0xce, 0x7d, 0xde, 0xb6, 0x1f, 0x7c, 0x1d, 0x83, 0x7c, 0x60, 0xd8, 0x36, 0x73, 0x82, 0xac, 0x92, | ||
69 | 0xca, 0x37, 0xfd, 0x72, 0x8b, 0x0c, 0xd1, 0x6c, 0x55, 0xd5, 0x88, 0x98, 0x24, 0xfa, 0x16, 0xf2}}, | ||
70 | {D_STR_W_LEN("abcdefghijklmnopqrstuvwxyzzyxwvutsrqponMLKJIHGFEDCBA" | ||
71 | "abcdefghijklmnopqrstuvwxyzzyxwvutsrqponMLKJIHGFEDCBA"), | ||
72 | {0x27, 0xd1, 0xe8, 0xbc, 0x6a, 0x79, 0x16, 0x83, 0x61, 0x73, 0xa9, 0xa8, 0x9b, 0xaf, 0xaf, 0xcf, | ||
73 | 0x47, 0x4d, 0x09, 0xef, 0x6d, 0x50, 0x35, 0x12, 0x25, 0x72, 0xd8, 0x68, 0xdc, 0x1f, 0xd2, 0xf4}}, | ||
74 | }; | ||
75 | |||
76 | static const size_t units1_num = sizeof(data_units1) / sizeof(data_units1[0]); | ||
77 | |||
78 | struct bin_with_len | ||
79 | { | ||
80 | const uint8_t bin[512]; | ||
81 | const size_t len; | ||
82 | }; | ||
83 | |||
84 | struct data_unit2 | ||
85 | { | ||
86 | const struct bin_with_len bin_l; | ||
87 | const uint8_t digest[SHA256_DIGEST_SIZE]; | ||
88 | }; | ||
89 | |||
90 | /* Size must be less than 512 bytes! */ | ||
91 | static const struct data_unit2 data_units2[] = { | ||
92 | { { {97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, | ||
93 | 117, 118, 119, 120, 121, 122}, 26},/* a..z ASCII sequence */ | ||
94 | {0x71, 0xc4, 0x80, 0xdf, 0x93, 0xd6, 0xae, 0x2f, 0x1e, 0xfa, 0xd1, 0x44, 0x7c, 0x66, 0xc9, 0x52, | ||
95 | 0x5e, 0x31, 0x62, 0x18, 0xcf, 0x51, 0xfc, 0x8d, 0x9e, 0xd8, 0x32, 0xf2, 0xda, 0xf1, 0x8b, 0x73} | ||
96 | }, | ||
97 | { { {65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, | ||
98 | 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, | ||
99 | 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65, 65 | ||
100 | }, 72 },/* 'A' x 72 times */ | ||
101 | {0x6a, 0x6d, 0x69, 0x1a, 0xc9, 0xba, 0x70, 0x95, 0x50, 0x46, 0x75, 0x7c, 0xd6, 0x85, 0xb6, 0x25, | ||
102 | 0x77, 0x73, 0xff, 0x3a, 0xd9, 0x3f, 0x43, 0xd4, 0xd4, 0x81, 0x2c, 0x5b, 0x10, 0x6f, 0x4b, 0x5b} | ||
103 | }, | ||
104 | { { {19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, | ||
105 | 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, | ||
106 | 68, 69, 70, 71, 72, 73}, 55},/* 19..73 sequence */ | ||
107 | {0x06, 0xe4, 0xb3, 0x9e, 0xf1, 0xfb, 0x6c, 0xcf, 0xd7, 0x3f, 0x50, 0x9e, 0xf4, 0x16, 0x17, 0xd4, | ||
108 | 0x63, 0x7c, 0x39, 0x1e, 0xa8, 0x0f, 0xa9, 0x88, 0x03, 0x44, 0x98, 0x0e, 0x95, 0x81, 0xf0, 0x2a} | ||
109 | }, | ||
110 | { { {7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, | ||
111 | 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, | ||
112 | 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69}, 63},/* 7..69 sequence */ | ||
113 | {0x4a, 0xd3, 0xc6, 0x87, 0x1f, 0xd1, 0xc5, 0xe2, 0x3e, 0x52, 0xdc, 0x22, 0xd1, 0x10, 0xd2, 0x05, | ||
114 | 0x15, 0x23, 0xcd, 0x15, 0xac, 0x24, 0x88, 0x26, 0x02, 0x00, 0x70, 0x78, 0x9f, 0x17, 0xf8, 0xd9} | ||
115 | }, | ||
116 | { { {38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, | ||
117 | 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, | ||
118 | 87, 88, 89, 90, 91, 92}, 55},/* 38..92 sequence */ | ||
119 | {0xe6, 0x03, 0x0f, 0xc9, 0x0d, 0xca, 0x0c, 0x26, 0x41, 0xcf, 0x43, 0x27, 0xec, 0xd6, 0x28, 0x2a, | ||
120 | 0x98, 0x24, 0x55, 0xd3, 0x5a, 0xed, 0x8b, 0x32, 0x19, 0x78, 0xeb, 0x83, 0x1d, 0x19, 0x92, 0x79} | ||
121 | }, | ||
122 | { { {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, | ||
123 | 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, | ||
124 | 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72}, | ||
125 | 72},/* 1..72 sequence */ | ||
126 | {0x87, 0xa2, 0xfa, 0x2e, 0xec, 0x53, 0x05, 0x3c, 0xb1, 0xee, 0x07, 0xd7, 0x59, 0x70, 0xf6, 0x50, | ||
127 | 0xcd, 0x9d, 0xc5, 0x8b, 0xdc, 0xb8, 0x65, 0x30, 0x4f, 0x70, 0x82, 0x9e, 0xbd, 0xe2, 0x7d, 0xac} | ||
128 | }, | ||
129 | { { {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, | ||
130 | 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, | ||
131 | 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, | ||
132 | 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, | ||
133 | 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, | ||
134 | 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, | ||
135 | 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, | ||
136 | 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, | ||
137 | 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, | ||
138 | 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, | ||
139 | 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, | ||
140 | 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255}, 256}, /* 0..255 sequence */ | ||
141 | {0x40, 0xaf, 0xf2, 0xe9, 0xd2, 0xd8, 0x92, 0x2e, 0x47, 0xaf, 0xd4, 0x64, 0x8e, 0x69, 0x67, 0x49, | ||
142 | 0x71, 0x58, 0x78, 0x5f, 0xbd, 0x1d, 0xa8, 0x70, 0xe7, 0x11, 0x02, 0x66, 0xbf, 0x94, 0x48, 0x80} | ||
143 | }, | ||
144 | { { {199, 198, 197, 196, 195, 194, 193, 192, 191, 190, 189, 188, 187, 186, 185, 184, 183, 182, 181, 180, | ||
145 | 179, 178, 177, 176, 175, 174, 173, 172, 171, 170, 169, 168, 167, 166, 165, 164, 163, 162, 161, 160, | ||
146 | 159, 158, 157, 156, 155, 154, 153, 152, 151, 150, 149, 148, 147, 146, 145, 144, 143, 142, 141, 140, | ||
147 | 139}, 61}, /* 199..139 sequence */ | ||
148 | {0x85, 0xf8, 0xa2, 0x83, 0xd6, 0x3c, 0x76, 0x8e, 0xea, 0x8f, 0x1c, 0x57, 0x2d, 0x85, 0xb6, 0xff, | ||
149 | 0xd8, 0x33, 0x57, 0x62, 0x1d, 0x37, 0xae, 0x0e, 0xfc, 0x22, 0xd3, 0xd5, 0x8f, 0x53, 0x21, 0xb7} | ||
150 | }, | ||
151 | { { {255, 254, 253, 252, 251, 250, 249, 248, 247, 246, 245, 244, 243, 242, 241, 240, 239, 238, 237, 236, | ||
152 | 235, 234, 233, 232, 231, 230, 229, 228, 227, 226, 225, 224, 223, 222, 221, 220, 219, 218, 217, 216, | ||
153 | 215, 214, 213, 212, 211, 210, 209, 208, 207, 206, 205, 204, 203, 202, 201, 200, 199, 198, 197, 196, | ||
154 | 195, 194, 193, 192, 191, 190, 189, 188, 187, 186, 185, 184, 183, 182, 181, 180, 179, 178, 177, 176, | ||
155 | 175, 174, 173, 172, 171, 170, 169, 168, 167, 166, 165, 164, 163, 162, 161, 160, 159, 158, 157, 156, | ||
156 | 155, 154, 153, 152, 151, 150, 149, 148, 147, 146, 145, 144, 143, 142, 141, 140, 139, 138, 137, 136, | ||
157 | 135, 134, 133, 132, 131, 130, 129, 128, 127, 126, 125, 124, 123, 122, 121, 120, 119, 118, 117, 116, | ||
158 | 115, 114, 113, 112, 111, 110, 109, 108, 107, 106, 105, 104, 103, 102, 101, 100, 99, 98, 97, 96, 95, | ||
159 | 94, 93, 92, 91, 90, 89, 88, 87, 86, 85, 84, 83, 82, 81, 80, 79, 78, 77, 76, 75, 74, 73, 72, 71, 70, | ||
160 | 69, 68, 67, 66, 65, 64, 63, 62, 61, 60, 59, 58, 57, 56, 55, 54, 53, 52, 51, 50, 49, 48, 47, 46, 45, | ||
161 | 44, 43, 42, 41, 40, 39, 38, 37, 36, 35, 34, 33, 32, 31, 30, 29, 28, 27, 26, 25, 24, 23, 22, 21, 20, | ||
162 | 19, 18, 17, 16, 15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1}, 255}, /* 255..1 sequence */ | ||
163 | {0x61, 0x86, 0x96, 0xab, 0x3e, 0xaa, 0x0e, 0x64, 0xb2, 0xf7, 0x2d, 0x75, 0x47, 0x5a, 0x14, 0x97, | ||
164 | 0xa3, 0x3d, 0x59, 0xa4, 0x08, 0xd9, 0x9e, 0x73, 0xf2, 0x78, 0x00, 0x5b, 0x4b, 0x55, 0xca, 0x43} | ||
165 | }, | ||
166 | { { {41, 35, 190, 132, 225, 108, 214, 174, 82, 144, 73, 241, 241, 187, 233, 235, 179, 166, 219, 60, 135, | ||
167 | 12, 62, 153, 36, 94, 13, 28, 6, 183, 71, 222, 179, 18, 77, 200, 67, 187, 139, 166, 31, 3, 90, 125, 9, | ||
168 | 56, 37, 31, 93, 212, 203, 252, 150, 245, 69, 59, 19, 13, 137, 10, 28, 219, 174, 50, 32, 154, 80, 238, | ||
169 | 64, 120, 54, 253, 18, 73, 50, 246, 158, 125, 73, 220, 173, 79, 20, 242, 68, 64, 102, 208, 107, 196, | ||
170 | 48, 183, 50, 59, 161, 34, 246, 34, 145, 157, 225, 139, 31, 218, 176, 202, 153, 2, 185, 114, 157, 73, | ||
171 | 44, 128, 126, 197, 153, 213, 233, 128, 178, 234, 201, 204, 83, 191, 103, 214, 191, 20, 214, 126, 45, | ||
172 | 220, 142, 102, 131, 239, 87, 73, 97, 255, 105, 143, 97, 205, 209, 30, 157, 156, 22, 114, 114, 230, | ||
173 | 29, 240, 132, 79, 74, 119, 2, 215, 232, 57, 44, 83, 203, 201, 18, 30, 51, 116, 158, 12, 244, 213, | ||
174 | 212, 159, 212, 164, 89, 126, 53, 207, 50, 34, 244, 204, 207, 211, 144, 45, 72, 211, 143, 117, 230, | ||
175 | 217, 29, 42, 229, 192, 247, 43, 120, 129, 135, 68, 14, 95, 80, 0, 212, 97, 141, 190, 123, 5, 21, 7, | ||
176 | 59, 51, 130, 31, 24, 112, 146, 218, 100, 84, 206, 177, 133, 62, 105, 21, 248, 70, 106, 4, 150, 115, | ||
177 | 14, 217, 22, 47, 103, 104, 212, 247, 74, 74, 208, 87, 104}, 255}, /* pseudo-random data */ | ||
178 | {0x08, 0x7f, 0x86, 0xac, 0xe2, 0x2e, 0x28, 0x56, 0x74, 0x53, 0x4f, 0xc0, 0xfb, 0xb8, 0x79, 0x57, | ||
179 | 0xc5, 0xc8, 0xd1, 0xb7, 0x47, 0xb7, 0xd9, 0xea, 0x97, 0xa8, 0x67, 0xe9, 0x26, 0x93, 0xee, 0xa3} | ||
180 | } | ||
181 | }; | ||
182 | |||
183 | static const size_t units2_num = sizeof(data_units2) / sizeof(data_units2[0]); | ||
184 | |||
185 | |||
186 | /* | ||
187 | * Helper functions | ||
188 | */ | ||
189 | |||
190 | /** | ||
191 | * Print bin as hex | ||
192 | * | ||
193 | * @param bin binary data | ||
194 | * @param len number of bytes in bin | ||
195 | * @param hex pointer to len*2+1 bytes buffer | ||
196 | */ | ||
197 | static void | ||
198 | bin2hex (const uint8_t *bin, | ||
199 | size_t len, | ||
200 | char *hex) | ||
201 | { | ||
202 | while (len-- > 0) | ||
203 | { | ||
204 | unsigned int b1, b2; | ||
205 | b1 = (*bin >> 4) & 0xf; | ||
206 | *hex++ = (char)((b1 > 9) ? (b1 + 'A' - 10) : (b1 + '0')); | ||
207 | b2 = *bin++ & 0xf; | ||
208 | *hex++ = (char)((b2 > 9) ? (b2 + 'A' - 10) : (b2 + '0')); | ||
209 | } | ||
210 | *hex = 0; | ||
211 | } | ||
212 | |||
213 | static int | ||
214 | check_result (const char *test_name, | ||
215 | unsigned int check_num, | ||
216 | const uint8_t calcualted[SHA256_DIGEST_SIZE], | ||
217 | const uint8_t expected[SHA256_DIGEST_SIZE]) | ||
218 | { | ||
219 | int failed = memcmp(calcualted, expected, SHA256_DIGEST_SIZE); | ||
220 | check_num++; /* Print 1-based numbers */ | ||
221 | if (failed) | ||
222 | { | ||
223 | char calc_str[SHA256_DIGEST_STRING_SIZE]; | ||
224 | char expc_str[SHA256_DIGEST_STRING_SIZE]; | ||
225 | bin2hex(calcualted, SHA256_DIGEST_SIZE, calc_str); | ||
226 | bin2hex(expected, SHA256_DIGEST_SIZE, expc_str); | ||
227 | fprintf (stderr, "FAILED: %s check %u: calculated digest %s, expected digest %s.\n", | ||
228 | test_name, check_num, calc_str, expc_str); | ||
229 | fflush (stderr); | ||
230 | } | ||
231 | else if (verbose) | ||
232 | { | ||
233 | char calc_str[SHA256_DIGEST_STRING_SIZE]; | ||
234 | bin2hex(calcualted, SHA256_DIGEST_SIZE, calc_str); | ||
235 | printf ("PASSED: %s check %u: calculated digest %s match expected digest.\n", | ||
236 | test_name, check_num, calc_str); | ||
237 | fflush (stdout); | ||
238 | } | ||
239 | return failed ? 1 : 0; | ||
240 | } | ||
241 | |||
242 | |||
243 | /* | ||
244 | * Tests | ||
245 | */ | ||
246 | |||
247 | /* Calculated SHA-256 as one pass for whole data */ | ||
248 | int test1_str(void) | ||
249 | { | ||
250 | int num_failed = 0; | ||
251 | for (unsigned int i = 0; i < units1_num; i++) | ||
252 | { | ||
253 | struct sha256_ctx ctx; | ||
254 | uint8_t digest[SHA256_DIGEST_SIZE]; | ||
255 | |||
256 | sha256_init (&ctx); | ||
257 | sha256_update (&ctx, (const uint8_t*)data_units1[i].str_l.str, data_units1[i].str_l.len); | ||
258 | sha256_digest (&ctx, digest); | ||
259 | num_failed += check_result (__FUNCTION__, i, digest, | ||
260 | data_units1[i].digest); | ||
261 | } | ||
262 | return num_failed; | ||
263 | } | ||
264 | |||
265 | int test1_bin(void) | ||
266 | { | ||
267 | int num_failed = 0; | ||
268 | for (unsigned int i = 0; i < units2_num; i++) | ||
269 | { | ||
270 | struct sha256_ctx ctx; | ||
271 | uint8_t digest[SHA256_DIGEST_SIZE]; | ||
272 | |||
273 | sha256_init (&ctx); | ||
274 | sha256_update (&ctx, data_units2[i].bin_l.bin, data_units2[i].bin_l.len); | ||
275 | sha256_digest (&ctx, digest); | ||
276 | num_failed += check_result (__FUNCTION__, i, digest, | ||
277 | data_units2[i].digest); | ||
278 | } | ||
279 | return num_failed; | ||
280 | } | ||
281 | |||
282 | /* Calculated SHA-256 as two iterations for whole data */ | ||
283 | int test2_str(void) | ||
284 | { | ||
285 | int num_failed = 0; | ||
286 | for (unsigned int i = 0; i < units1_num; i++) | ||
287 | { | ||
288 | struct sha256_ctx ctx; | ||
289 | uint8_t digest[SHA256_DIGEST_SIZE]; | ||
290 | size_t part_s = data_units1[i].str_l.len / 4; | ||
291 | |||
292 | sha256_init (&ctx); | ||
293 | sha256_update (&ctx, (const uint8_t*)data_units1[i].str_l.str, part_s); | ||
294 | sha256_update (&ctx, (const uint8_t*)data_units1[i].str_l.str + part_s, data_units1[i].str_l.len - part_s); | ||
295 | sha256_digest (&ctx, digest); | ||
296 | num_failed += check_result (__FUNCTION__, i, digest, | ||
297 | data_units1[i].digest); | ||
298 | } | ||
299 | return num_failed; | ||
300 | } | ||
301 | |||
302 | int test2_bin(void) | ||
303 | { | ||
304 | int num_failed = 0; | ||
305 | for (unsigned int i = 0; i < units2_num; i++) | ||
306 | { | ||
307 | struct sha256_ctx ctx; | ||
308 | uint8_t digest[SHA256_DIGEST_SIZE]; | ||
309 | size_t part_s = data_units2[i].bin_l.len * 2 / 3; | ||
310 | |||
311 | sha256_init (&ctx); | ||
312 | sha256_update (&ctx, data_units2[i].bin_l.bin, part_s); | ||
313 | sha256_update (&ctx, data_units2[i].bin_l.bin + part_s, data_units2[i].bin_l.len - part_s); | ||
314 | sha256_digest (&ctx, digest); | ||
315 | num_failed += check_result (__FUNCTION__, i, digest, | ||
316 | data_units2[i].digest); | ||
317 | } | ||
318 | return num_failed; | ||
319 | } | ||
320 | |||
321 | int main(int argc, char * argv[]) | ||
322 | { | ||
323 | int num_failed = 0; | ||
324 | (void)has_in_name; /* Mute compiler warning. */ | ||
325 | if (has_param(argc, argv, "-v") || has_param(argc, argv, "--verbose")) | ||
326 | verbose = 1; | ||
327 | |||
328 | num_failed += test1_str(); | ||
329 | num_failed += test1_bin(); | ||
330 | |||
331 | num_failed += test2_str(); | ||
332 | num_failed += test2_bin(); | ||
333 | |||
334 | return num_failed ? 1 : 0; | ||
335 | } | ||