|  | /* BEGIN_HEADER */ | 
|  | #include "mbedtls/sha1.h" | 
|  | #include "mbedtls/sha256.h" | 
|  | #include "mbedtls/sha512.h" | 
|  | /* END_HEADER */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */ | 
|  | void sha1_valid_param( ) | 
|  | { | 
|  | TEST_VALID_PARAM( mbedtls_sha1_free( NULL ) ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ | 
|  | void sha1_invalid_param( ) | 
|  | { | 
|  | mbedtls_sha1_context ctx; | 
|  | unsigned char buf[64] = { 0 }; | 
|  | size_t const buflen = sizeof( buf ); | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha1_init( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha1_clone( NULL, &ctx ) ); | 
|  | TEST_INVALID_PARAM( mbedtls_sha1_clone( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_starts_ret( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_update_ret( NULL, buf, buflen ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_update_ret( &ctx, NULL, buflen ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_finish_ret( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_finish_ret( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha1_process( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha1_process( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_ret( NULL, buflen, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA1_BAD_INPUT_DATA, | 
|  | mbedtls_sha1_ret( buf, buflen, NULL ) ); | 
|  |  | 
|  | exit: | 
|  | return; | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C */ | 
|  | void mbedtls_sha1( data_t * src_str, data_t * hash ) | 
|  | { | 
|  | unsigned char output[41]; | 
|  |  | 
|  | memset(output, 0x00, 41); | 
|  |  | 
|  |  | 
|  | TEST_ASSERT( mbedtls_sha1_ret( src_str->x, src_str->len, output ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 20, hash->len ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ | 
|  | void sha256_valid_param( ) | 
|  | { | 
|  | TEST_VALID_PARAM( mbedtls_sha256_free( NULL ) ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ | 
|  | void sha256_invalid_param( ) | 
|  | { | 
|  | mbedtls_sha256_context ctx; | 
|  | unsigned char buf[64] = { 0 }; | 
|  | size_t const buflen = sizeof( buf ); | 
|  | int valid_type = 0; | 
|  | int invalid_type = 42; | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha256_init( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha256_clone( NULL, &ctx ) ); | 
|  | TEST_INVALID_PARAM( mbedtls_sha256_clone( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_starts_ret( NULL, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_starts_ret( &ctx, invalid_type ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_update_ret( NULL, buf, buflen ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_update_ret( &ctx, NULL, buflen ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_finish_ret( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_finish_ret( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha256_process( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha256_process( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_ret( NULL, buflen, | 
|  | buf, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_ret( buf, buflen, | 
|  | NULL, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA256_BAD_INPUT_DATA, | 
|  | mbedtls_sha256_ret( buf, buflen, | 
|  | buf, invalid_type ) ); | 
|  |  | 
|  | exit: | 
|  | return; | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ | 
|  | void sha224( data_t * src_str, data_t * hash ) | 
|  | { | 
|  | unsigned char output[57]; | 
|  |  | 
|  | memset(output, 0x00, 57); | 
|  |  | 
|  |  | 
|  | TEST_ASSERT( mbedtls_sha256_ret( src_str->x, src_str->len, output, 1 ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 28, hash->len ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C */ | 
|  | void mbedtls_sha256( data_t * src_str, data_t * hash ) | 
|  | { | 
|  | unsigned char output[65]; | 
|  |  | 
|  | memset(output, 0x00, 65); | 
|  |  | 
|  |  | 
|  | TEST_ASSERT( mbedtls_sha256_ret( src_str->x, src_str->len, output, 0 ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 32, hash->len ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ | 
|  | void sha512_valid_param( ) | 
|  | { | 
|  | TEST_VALID_PARAM( mbedtls_sha512_free( NULL ) ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ | 
|  | void sha512_invalid_param( ) | 
|  | { | 
|  | mbedtls_sha512_context ctx; | 
|  | unsigned char buf[64] = { 0 }; | 
|  | size_t const buflen = sizeof( buf ); | 
|  | int valid_type = 0; | 
|  | int invalid_type = 42; | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha512_init( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_sha512_clone( NULL, &ctx ) ); | 
|  | TEST_INVALID_PARAM( mbedtls_sha512_clone( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_starts_ret( NULL, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_starts_ret( &ctx, invalid_type ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_update_ret( NULL, buf, buflen ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_update_ret( &ctx, NULL, buflen ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_finish_ret( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_finish_ret( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha512_process( NULL, buf ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_internal_sha512_process( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_ret( NULL, buflen, | 
|  | buf, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_ret( buf, buflen, | 
|  | NULL, valid_type ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_SHA512_BAD_INPUT_DATA, | 
|  | mbedtls_sha512_ret( buf, buflen, | 
|  | buf, invalid_type ) ); | 
|  |  | 
|  | exit: | 
|  | return; | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ | 
|  | void sha384( data_t * src_str, data_t * hash ) | 
|  | { | 
|  | unsigned char output[97]; | 
|  |  | 
|  | memset(output, 0x00, 97); | 
|  |  | 
|  |  | 
|  | TEST_ASSERT( mbedtls_sha512_ret( src_str->x, src_str->len, output, 1 ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 48, hash->len ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C */ | 
|  | void mbedtls_sha512( data_t * src_str, data_t * hash ) | 
|  | { | 
|  | unsigned char output[129]; | 
|  |  | 
|  | memset(output, 0x00, 129); | 
|  |  | 
|  |  | 
|  | TEST_ASSERT( mbedtls_sha512_ret( src_str->x, src_str->len, output, 0 ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_test_hexcmp( output, hash->x, 64, hash->len ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA1_C:MBEDTLS_SELF_TEST */ | 
|  | void sha1_selftest(  ) | 
|  | { | 
|  | TEST_ASSERT( mbedtls_sha1_self_test( 1 ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA256_C:MBEDTLS_SELF_TEST */ | 
|  | void sha256_selftest(  ) | 
|  | { | 
|  | TEST_ASSERT( mbedtls_sha256_self_test( 1 ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SHA512_C:MBEDTLS_SELF_TEST */ | 
|  | void sha512_selftest(  ) | 
|  | { | 
|  | TEST_ASSERT( mbedtls_sha512_self_test( 1 ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ |