diff options
author | Gaurav Shah <gauravsh@google.com> | 2010-01-28 15:01:23 -0800 |
---|---|---|
committer | Gaurav Shah <gauravsh@google.com> | 2010-01-28 15:01:23 -0800 |
commit | 322536d2f9d30f42218cc9f2ab40574557da8a9a (patch) | |
tree | 727100592841f05950ca16970ae37aece7bf3c24 /tests/sha_tests.c | |
download | vboot-322536d2f9d30f42218cc9f2ab40574557da8a9a.tar.gz |
RSA signature verification and SHA-1/256/512 reference implementation for verified boot.
Also contains some preliminary tests for these primitives.
Review URL: http://codereview.chromium.org/553023
Diffstat (limited to 'tests/sha_tests.c')
-rw-r--r-- | tests/sha_tests.c | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/tests/sha_tests.c b/tests/sha_tests.c new file mode 100644 index 00000000..2c07b3fc --- /dev/null +++ b/tests/sha_tests.c @@ -0,0 +1,99 @@ +/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. + * Use of this source code is governed by a BSD-style license that can be + * found in the LICENSE file. + */ + +/* FIPS 180-2 Tests for message digest functions. */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> + +#include "sha.h" + +#include "sha_test_vectors.h" + +int SHA1_tests(void) { + int i, success = 1; + uint8_t sha1_digest[SHA1_DIGEST_SIZE]; + uint8_t* test_inputs[3]; + test_inputs[0] = (uint8_t *) oneblock_msg; + test_inputs[1] = (uint8_t *) multiblock_msg1; + test_inputs[2] = (uint8_t *) long_msg; + + for (i = 0; i < 3; i++) { + SHA1(test_inputs[i], strlen((char *)test_inputs[i]), + sha1_digest); + if (!memcmp(sha1_digest, sha1_results[i], SHA1_DIGEST_SIZE)) { + fprintf(stderr, "Test vector %d PASSED for SHA-1\n", i+1); + } + else { + fprintf(stderr, "Test vector %d FAILED for SHA-1\n", i+1); + success = 0; + } + } + return success; +} + +int SHA256_tests(void) { + int i, success = 1; + uint8_t sha256_digest[SHA256_DIGEST_SIZE]; + uint8_t* test_inputs[3]; + test_inputs[0] = (uint8_t *) oneblock_msg; + test_inputs[1] = (uint8_t *) multiblock_msg1; + test_inputs[2] = (uint8_t *) long_msg; + + for (i = 0; i < 3; i++) { + SHA256(test_inputs[i], strlen((char *)test_inputs[i]), + sha256_digest); + if (!memcmp(sha256_digest, sha256_results[i], SHA256_DIGEST_SIZE)) { + fprintf(stderr, "Test vector %d PASSED for SHA-256\n", i+1); + } + else { + fprintf(stderr, "Test vector %d FAILED for SHA-256\n", i+1); + success = 0; + } + } + return success; +} + +int SHA512_tests(void) { + int i, success = 1; + uint8_t sha512_digest[SHA512_DIGEST_SIZE]; + uint8_t* test_inputs[3]; + test_inputs[0] = (uint8_t *) oneblock_msg; + test_inputs[1] = (uint8_t *) multiblock_msg2; + test_inputs[2] = (uint8_t *) long_msg; + + for (i = 0; i < 3; i++) { + SHA512(test_inputs[i], strlen((char *)test_inputs[i]), + sha512_digest); + if (!memcmp(sha512_digest, sha512_results[i], SHA512_DIGEST_SIZE)) { + fprintf(stderr, "Test vector %d PASSED for SHA-512\n", i+1); + } + else { + fprintf(stderr, "Test vector %d FAILED for SHA-512\n", i+1); + success = 0; + } + } + return success; +} + +int main(int argc, char* argv[]) { + int success = 1; + /* Initialize long_msg with 'a' x 1,000,000 */ + long_msg = (char *) malloc(1000001); + memset(long_msg, 'a', 1000000); + long_msg[1000000]=0; + + if (!SHA1_tests()) + success = 0; + if (!SHA256_tests()) + success = 0; + if (!SHA512_tests()) + success = 0; + + free(long_msg); + + return !success; +} |