I added functionality to get the RSSI, BER, and Cell Neighbor for reporting connection issues to M2X

Dependencies:   WncControllerK64F

Committer:
JMF
Date:
Mon Nov 14 21:15:42 2016 +0000
Revision:
16:8a4105d407d3
Parent:
12:0071cb144c7a
updated to ensure it builds with TLS by correcting config defaults.

Who changed what in which revision?

UserRevisionLine numberNew contents of line
JMF 12:0071cb144c7a 1 /*
JMF 12:0071cb144c7a 2 * FIPS-180-2 compliant SHA-256 implementation
JMF 12:0071cb144c7a 3 *
JMF 12:0071cb144c7a 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
JMF 12:0071cb144c7a 5 * SPDX-License-Identifier: Apache-2.0
JMF 12:0071cb144c7a 6 *
JMF 12:0071cb144c7a 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
JMF 12:0071cb144c7a 8 * not use this file except in compliance with the License.
JMF 12:0071cb144c7a 9 * You may obtain a copy of the License at
JMF 12:0071cb144c7a 10 *
JMF 12:0071cb144c7a 11 * http://www.apache.org/licenses/LICENSE-2.0
JMF 12:0071cb144c7a 12 *
JMF 12:0071cb144c7a 13 * Unless required by applicable law or agreed to in writing, software
JMF 12:0071cb144c7a 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
JMF 12:0071cb144c7a 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
JMF 12:0071cb144c7a 16 * See the License for the specific language governing permissions and
JMF 12:0071cb144c7a 17 * limitations under the License.
JMF 12:0071cb144c7a 18 *
JMF 12:0071cb144c7a 19 * This file is part of mbed TLS (https://tls.mbed.org)
JMF 12:0071cb144c7a 20 */
JMF 12:0071cb144c7a 21 /*
JMF 12:0071cb144c7a 22 * The SHA-256 Secure Hash Standard was published by NIST in 2002.
JMF 12:0071cb144c7a 23 *
JMF 12:0071cb144c7a 24 * http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf
JMF 12:0071cb144c7a 25 */
JMF 12:0071cb144c7a 26
JMF 12:0071cb144c7a 27 #if !defined(MBEDTLS_CONFIG_FILE)
JMF 12:0071cb144c7a 28 #include "mbedtls/config.h"
JMF 12:0071cb144c7a 29 #else
JMF 12:0071cb144c7a 30 #include MBEDTLS_CONFIG_FILE
JMF 12:0071cb144c7a 31 #endif
JMF 12:0071cb144c7a 32
JMF 12:0071cb144c7a 33 #if defined(MBEDTLS_SHA256_C)
JMF 12:0071cb144c7a 34
JMF 12:0071cb144c7a 35 #include "mbedtls/sha256.h"
JMF 12:0071cb144c7a 36
JMF 12:0071cb144c7a 37 #include <string.h>
JMF 12:0071cb144c7a 38
JMF 12:0071cb144c7a 39 #if defined(MBEDTLS_SELF_TEST)
JMF 12:0071cb144c7a 40 #if defined(MBEDTLS_PLATFORM_C)
JMF 12:0071cb144c7a 41 #include "mbedtls/platform.h"
JMF 12:0071cb144c7a 42 #else
JMF 12:0071cb144c7a 43 #include <stdio.h>
JMF 12:0071cb144c7a 44 #define mbedtls_printf printf
JMF 12:0071cb144c7a 45 #endif /* MBEDTLS_PLATFORM_C */
JMF 12:0071cb144c7a 46 #endif /* MBEDTLS_SELF_TEST */
JMF 12:0071cb144c7a 47
JMF 12:0071cb144c7a 48 #if !defined(MBEDTLS_SHA256_ALT)
JMF 12:0071cb144c7a 49
JMF 12:0071cb144c7a 50 /* Implementation that should never be optimized out by the compiler */
JMF 12:0071cb144c7a 51 static void mbedtls_zeroize( void *v, size_t n ) {
JMF 12:0071cb144c7a 52 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
JMF 12:0071cb144c7a 53 }
JMF 12:0071cb144c7a 54
JMF 12:0071cb144c7a 55 /*
JMF 12:0071cb144c7a 56 * 32-bit integer manipulation macros (big endian)
JMF 12:0071cb144c7a 57 */
JMF 12:0071cb144c7a 58 #ifndef GET_UINT32_BE
JMF 12:0071cb144c7a 59 #define GET_UINT32_BE(n,b,i) \
JMF 12:0071cb144c7a 60 do { \
JMF 12:0071cb144c7a 61 (n) = ( (uint32_t) (b)[(i) ] << 24 ) \
JMF 12:0071cb144c7a 62 | ( (uint32_t) (b)[(i) + 1] << 16 ) \
JMF 12:0071cb144c7a 63 | ( (uint32_t) (b)[(i) + 2] << 8 ) \
JMF 12:0071cb144c7a 64 | ( (uint32_t) (b)[(i) + 3] ); \
JMF 12:0071cb144c7a 65 } while( 0 )
JMF 12:0071cb144c7a 66 #endif
JMF 12:0071cb144c7a 67
JMF 12:0071cb144c7a 68 #ifndef PUT_UINT32_BE
JMF 12:0071cb144c7a 69 #define PUT_UINT32_BE(n,b,i) \
JMF 12:0071cb144c7a 70 do { \
JMF 12:0071cb144c7a 71 (b)[(i) ] = (unsigned char) ( (n) >> 24 ); \
JMF 12:0071cb144c7a 72 (b)[(i) + 1] = (unsigned char) ( (n) >> 16 ); \
JMF 12:0071cb144c7a 73 (b)[(i) + 2] = (unsigned char) ( (n) >> 8 ); \
JMF 12:0071cb144c7a 74 (b)[(i) + 3] = (unsigned char) ( (n) ); \
JMF 12:0071cb144c7a 75 } while( 0 )
JMF 12:0071cb144c7a 76 #endif
JMF 12:0071cb144c7a 77
JMF 12:0071cb144c7a 78 void mbedtls_sha256_init( mbedtls_sha256_context *ctx )
JMF 12:0071cb144c7a 79 {
JMF 12:0071cb144c7a 80 memset( ctx, 0, sizeof( mbedtls_sha256_context ) );
JMF 12:0071cb144c7a 81 }
JMF 12:0071cb144c7a 82
JMF 12:0071cb144c7a 83 void mbedtls_sha256_free( mbedtls_sha256_context *ctx )
JMF 12:0071cb144c7a 84 {
JMF 12:0071cb144c7a 85 if( ctx == NULL )
JMF 12:0071cb144c7a 86 return;
JMF 12:0071cb144c7a 87
JMF 12:0071cb144c7a 88 mbedtls_zeroize( ctx, sizeof( mbedtls_sha256_context ) );
JMF 12:0071cb144c7a 89 }
JMF 12:0071cb144c7a 90
JMF 12:0071cb144c7a 91 void mbedtls_sha256_clone( mbedtls_sha256_context *dst,
JMF 12:0071cb144c7a 92 const mbedtls_sha256_context *src )
JMF 12:0071cb144c7a 93 {
JMF 12:0071cb144c7a 94 *dst = *src;
JMF 12:0071cb144c7a 95 }
JMF 12:0071cb144c7a 96
JMF 12:0071cb144c7a 97 /*
JMF 12:0071cb144c7a 98 * SHA-256 context setup
JMF 12:0071cb144c7a 99 */
JMF 12:0071cb144c7a 100 void mbedtls_sha256_starts( mbedtls_sha256_context *ctx, int is224 )
JMF 12:0071cb144c7a 101 {
JMF 12:0071cb144c7a 102 ctx->total[0] = 0;
JMF 12:0071cb144c7a 103 ctx->total[1] = 0;
JMF 12:0071cb144c7a 104
JMF 12:0071cb144c7a 105 if( is224 == 0 )
JMF 12:0071cb144c7a 106 {
JMF 12:0071cb144c7a 107 /* SHA-256 */
JMF 12:0071cb144c7a 108 ctx->state[0] = 0x6A09E667;
JMF 12:0071cb144c7a 109 ctx->state[1] = 0xBB67AE85;
JMF 12:0071cb144c7a 110 ctx->state[2] = 0x3C6EF372;
JMF 12:0071cb144c7a 111 ctx->state[3] = 0xA54FF53A;
JMF 12:0071cb144c7a 112 ctx->state[4] = 0x510E527F;
JMF 12:0071cb144c7a 113 ctx->state[5] = 0x9B05688C;
JMF 12:0071cb144c7a 114 ctx->state[6] = 0x1F83D9AB;
JMF 12:0071cb144c7a 115 ctx->state[7] = 0x5BE0CD19;
JMF 12:0071cb144c7a 116 }
JMF 12:0071cb144c7a 117 else
JMF 12:0071cb144c7a 118 {
JMF 12:0071cb144c7a 119 /* SHA-224 */
JMF 12:0071cb144c7a 120 ctx->state[0] = 0xC1059ED8;
JMF 12:0071cb144c7a 121 ctx->state[1] = 0x367CD507;
JMF 12:0071cb144c7a 122 ctx->state[2] = 0x3070DD17;
JMF 12:0071cb144c7a 123 ctx->state[3] = 0xF70E5939;
JMF 12:0071cb144c7a 124 ctx->state[4] = 0xFFC00B31;
JMF 12:0071cb144c7a 125 ctx->state[5] = 0x68581511;
JMF 12:0071cb144c7a 126 ctx->state[6] = 0x64F98FA7;
JMF 12:0071cb144c7a 127 ctx->state[7] = 0xBEFA4FA4;
JMF 12:0071cb144c7a 128 }
JMF 12:0071cb144c7a 129
JMF 12:0071cb144c7a 130 ctx->is224 = is224;
JMF 12:0071cb144c7a 131 }
JMF 12:0071cb144c7a 132
JMF 12:0071cb144c7a 133 #if !defined(MBEDTLS_SHA256_PROCESS_ALT)
JMF 12:0071cb144c7a 134 static const uint32_t K[] =
JMF 12:0071cb144c7a 135 {
JMF 12:0071cb144c7a 136 0x428A2F98, 0x71374491, 0xB5C0FBCF, 0xE9B5DBA5,
JMF 12:0071cb144c7a 137 0x3956C25B, 0x59F111F1, 0x923F82A4, 0xAB1C5ED5,
JMF 12:0071cb144c7a 138 0xD807AA98, 0x12835B01, 0x243185BE, 0x550C7DC3,
JMF 12:0071cb144c7a 139 0x72BE5D74, 0x80DEB1FE, 0x9BDC06A7, 0xC19BF174,
JMF 12:0071cb144c7a 140 0xE49B69C1, 0xEFBE4786, 0x0FC19DC6, 0x240CA1CC,
JMF 12:0071cb144c7a 141 0x2DE92C6F, 0x4A7484AA, 0x5CB0A9DC, 0x76F988DA,
JMF 12:0071cb144c7a 142 0x983E5152, 0xA831C66D, 0xB00327C8, 0xBF597FC7,
JMF 12:0071cb144c7a 143 0xC6E00BF3, 0xD5A79147, 0x06CA6351, 0x14292967,
JMF 12:0071cb144c7a 144 0x27B70A85, 0x2E1B2138, 0x4D2C6DFC, 0x53380D13,
JMF 12:0071cb144c7a 145 0x650A7354, 0x766A0ABB, 0x81C2C92E, 0x92722C85,
JMF 12:0071cb144c7a 146 0xA2BFE8A1, 0xA81A664B, 0xC24B8B70, 0xC76C51A3,
JMF 12:0071cb144c7a 147 0xD192E819, 0xD6990624, 0xF40E3585, 0x106AA070,
JMF 12:0071cb144c7a 148 0x19A4C116, 0x1E376C08, 0x2748774C, 0x34B0BCB5,
JMF 12:0071cb144c7a 149 0x391C0CB3, 0x4ED8AA4A, 0x5B9CCA4F, 0x682E6FF3,
JMF 12:0071cb144c7a 150 0x748F82EE, 0x78A5636F, 0x84C87814, 0x8CC70208,
JMF 12:0071cb144c7a 151 0x90BEFFFA, 0xA4506CEB, 0xBEF9A3F7, 0xC67178F2,
JMF 12:0071cb144c7a 152 };
JMF 12:0071cb144c7a 153
JMF 12:0071cb144c7a 154 #define SHR(x,n) ((x & 0xFFFFFFFF) >> n)
JMF 12:0071cb144c7a 155 #define ROTR(x,n) (SHR(x,n) | (x << (32 - n)))
JMF 12:0071cb144c7a 156
JMF 12:0071cb144c7a 157 #define S0(x) (ROTR(x, 7) ^ ROTR(x,18) ^ SHR(x, 3))
JMF 12:0071cb144c7a 158 #define S1(x) (ROTR(x,17) ^ ROTR(x,19) ^ SHR(x,10))
JMF 12:0071cb144c7a 159
JMF 12:0071cb144c7a 160 #define S2(x) (ROTR(x, 2) ^ ROTR(x,13) ^ ROTR(x,22))
JMF 12:0071cb144c7a 161 #define S3(x) (ROTR(x, 6) ^ ROTR(x,11) ^ ROTR(x,25))
JMF 12:0071cb144c7a 162
JMF 12:0071cb144c7a 163 #define F0(x,y,z) ((x & y) | (z & (x | y)))
JMF 12:0071cb144c7a 164 #define F1(x,y,z) (z ^ (x & (y ^ z)))
JMF 12:0071cb144c7a 165
JMF 12:0071cb144c7a 166 #define R(t) \
JMF 12:0071cb144c7a 167 ( \
JMF 12:0071cb144c7a 168 W[t] = S1(W[t - 2]) + W[t - 7] + \
JMF 12:0071cb144c7a 169 S0(W[t - 15]) + W[t - 16] \
JMF 12:0071cb144c7a 170 )
JMF 12:0071cb144c7a 171
JMF 12:0071cb144c7a 172 #define P(a,b,c,d,e,f,g,h,x,K) \
JMF 12:0071cb144c7a 173 { \
JMF 12:0071cb144c7a 174 temp1 = h + S3(e) + F1(e,f,g) + K + x; \
JMF 12:0071cb144c7a 175 temp2 = S2(a) + F0(a,b,c); \
JMF 12:0071cb144c7a 176 d += temp1; h = temp1 + temp2; \
JMF 12:0071cb144c7a 177 }
JMF 12:0071cb144c7a 178
JMF 12:0071cb144c7a 179 void mbedtls_sha256_process( mbedtls_sha256_context *ctx, const unsigned char data[64] )
JMF 12:0071cb144c7a 180 {
JMF 12:0071cb144c7a 181 uint32_t temp1, temp2, W[64];
JMF 12:0071cb144c7a 182 uint32_t A[8];
JMF 12:0071cb144c7a 183 unsigned int i;
JMF 12:0071cb144c7a 184
JMF 12:0071cb144c7a 185 for( i = 0; i < 8; i++ )
JMF 12:0071cb144c7a 186 A[i] = ctx->state[i];
JMF 12:0071cb144c7a 187
JMF 12:0071cb144c7a 188 #if defined(MBEDTLS_SHA256_SMALLER)
JMF 12:0071cb144c7a 189 for( i = 0; i < 64; i++ )
JMF 12:0071cb144c7a 190 {
JMF 12:0071cb144c7a 191 if( i < 16 )
JMF 12:0071cb144c7a 192 GET_UINT32_BE( W[i], data, 4 * i );
JMF 12:0071cb144c7a 193 else
JMF 12:0071cb144c7a 194 R( i );
JMF 12:0071cb144c7a 195
JMF 12:0071cb144c7a 196 P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i], K[i] );
JMF 12:0071cb144c7a 197
JMF 12:0071cb144c7a 198 temp1 = A[7]; A[7] = A[6]; A[6] = A[5]; A[5] = A[4]; A[4] = A[3];
JMF 12:0071cb144c7a 199 A[3] = A[2]; A[2] = A[1]; A[1] = A[0]; A[0] = temp1;
JMF 12:0071cb144c7a 200 }
JMF 12:0071cb144c7a 201 #else /* MBEDTLS_SHA256_SMALLER */
JMF 12:0071cb144c7a 202 for( i = 0; i < 16; i++ )
JMF 12:0071cb144c7a 203 GET_UINT32_BE( W[i], data, 4 * i );
JMF 12:0071cb144c7a 204
JMF 12:0071cb144c7a 205 for( i = 0; i < 16; i += 8 )
JMF 12:0071cb144c7a 206 {
JMF 12:0071cb144c7a 207 P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], W[i+0], K[i+0] );
JMF 12:0071cb144c7a 208 P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], W[i+1], K[i+1] );
JMF 12:0071cb144c7a 209 P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], W[i+2], K[i+2] );
JMF 12:0071cb144c7a 210 P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], W[i+3], K[i+3] );
JMF 12:0071cb144c7a 211 P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], W[i+4], K[i+4] );
JMF 12:0071cb144c7a 212 P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], W[i+5], K[i+5] );
JMF 12:0071cb144c7a 213 P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], W[i+6], K[i+6] );
JMF 12:0071cb144c7a 214 P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], W[i+7], K[i+7] );
JMF 12:0071cb144c7a 215 }
JMF 12:0071cb144c7a 216
JMF 12:0071cb144c7a 217 for( i = 16; i < 64; i += 8 )
JMF 12:0071cb144c7a 218 {
JMF 12:0071cb144c7a 219 P( A[0], A[1], A[2], A[3], A[4], A[5], A[6], A[7], R(i+0), K[i+0] );
JMF 12:0071cb144c7a 220 P( A[7], A[0], A[1], A[2], A[3], A[4], A[5], A[6], R(i+1), K[i+1] );
JMF 12:0071cb144c7a 221 P( A[6], A[7], A[0], A[1], A[2], A[3], A[4], A[5], R(i+2), K[i+2] );
JMF 12:0071cb144c7a 222 P( A[5], A[6], A[7], A[0], A[1], A[2], A[3], A[4], R(i+3), K[i+3] );
JMF 12:0071cb144c7a 223 P( A[4], A[5], A[6], A[7], A[0], A[1], A[2], A[3], R(i+4), K[i+4] );
JMF 12:0071cb144c7a 224 P( A[3], A[4], A[5], A[6], A[7], A[0], A[1], A[2], R(i+5), K[i+5] );
JMF 12:0071cb144c7a 225 P( A[2], A[3], A[4], A[5], A[6], A[7], A[0], A[1], R(i+6), K[i+6] );
JMF 12:0071cb144c7a 226 P( A[1], A[2], A[3], A[4], A[5], A[6], A[7], A[0], R(i+7), K[i+7] );
JMF 12:0071cb144c7a 227 }
JMF 12:0071cb144c7a 228 #endif /* MBEDTLS_SHA256_SMALLER */
JMF 12:0071cb144c7a 229
JMF 12:0071cb144c7a 230 for( i = 0; i < 8; i++ )
JMF 12:0071cb144c7a 231 ctx->state[i] += A[i];
JMF 12:0071cb144c7a 232 }
JMF 12:0071cb144c7a 233 #endif /* !MBEDTLS_SHA256_PROCESS_ALT */
JMF 12:0071cb144c7a 234
JMF 12:0071cb144c7a 235 /*
JMF 12:0071cb144c7a 236 * SHA-256 process buffer
JMF 12:0071cb144c7a 237 */
JMF 12:0071cb144c7a 238 void mbedtls_sha256_update( mbedtls_sha256_context *ctx, const unsigned char *input,
JMF 12:0071cb144c7a 239 size_t ilen )
JMF 12:0071cb144c7a 240 {
JMF 12:0071cb144c7a 241 size_t fill;
JMF 12:0071cb144c7a 242 uint32_t left;
JMF 12:0071cb144c7a 243
JMF 12:0071cb144c7a 244 if( ilen == 0 )
JMF 12:0071cb144c7a 245 return;
JMF 12:0071cb144c7a 246
JMF 12:0071cb144c7a 247 left = ctx->total[0] & 0x3F;
JMF 12:0071cb144c7a 248 fill = 64 - left;
JMF 12:0071cb144c7a 249
JMF 12:0071cb144c7a 250 ctx->total[0] += (uint32_t) ilen;
JMF 12:0071cb144c7a 251 ctx->total[0] &= 0xFFFFFFFF;
JMF 12:0071cb144c7a 252
JMF 12:0071cb144c7a 253 if( ctx->total[0] < (uint32_t) ilen )
JMF 12:0071cb144c7a 254 ctx->total[1]++;
JMF 12:0071cb144c7a 255
JMF 12:0071cb144c7a 256 if( left && ilen >= fill )
JMF 12:0071cb144c7a 257 {
JMF 12:0071cb144c7a 258 memcpy( (void *) (ctx->buffer + left), input, fill );
JMF 12:0071cb144c7a 259 mbedtls_sha256_process( ctx, ctx->buffer );
JMF 12:0071cb144c7a 260 input += fill;
JMF 12:0071cb144c7a 261 ilen -= fill;
JMF 12:0071cb144c7a 262 left = 0;
JMF 12:0071cb144c7a 263 }
JMF 12:0071cb144c7a 264
JMF 12:0071cb144c7a 265 while( ilen >= 64 )
JMF 12:0071cb144c7a 266 {
JMF 12:0071cb144c7a 267 mbedtls_sha256_process( ctx, input );
JMF 12:0071cb144c7a 268 input += 64;
JMF 12:0071cb144c7a 269 ilen -= 64;
JMF 12:0071cb144c7a 270 }
JMF 12:0071cb144c7a 271
JMF 12:0071cb144c7a 272 if( ilen > 0 )
JMF 12:0071cb144c7a 273 memcpy( (void *) (ctx->buffer + left), input, ilen );
JMF 12:0071cb144c7a 274 }
JMF 12:0071cb144c7a 275
JMF 12:0071cb144c7a 276 static const unsigned char sha256_padding[64] =
JMF 12:0071cb144c7a 277 {
JMF 12:0071cb144c7a 278 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
JMF 12:0071cb144c7a 279 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
JMF 12:0071cb144c7a 280 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
JMF 12:0071cb144c7a 281 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
JMF 12:0071cb144c7a 282 };
JMF 12:0071cb144c7a 283
JMF 12:0071cb144c7a 284 /*
JMF 12:0071cb144c7a 285 * SHA-256 final digest
JMF 12:0071cb144c7a 286 */
JMF 12:0071cb144c7a 287 void mbedtls_sha256_finish( mbedtls_sha256_context *ctx, unsigned char output[32] )
JMF 12:0071cb144c7a 288 {
JMF 12:0071cb144c7a 289 uint32_t last, padn;
JMF 12:0071cb144c7a 290 uint32_t high, low;
JMF 12:0071cb144c7a 291 unsigned char msglen[8];
JMF 12:0071cb144c7a 292
JMF 12:0071cb144c7a 293 high = ( ctx->total[0] >> 29 )
JMF 12:0071cb144c7a 294 | ( ctx->total[1] << 3 );
JMF 12:0071cb144c7a 295 low = ( ctx->total[0] << 3 );
JMF 12:0071cb144c7a 296
JMF 12:0071cb144c7a 297 PUT_UINT32_BE( high, msglen, 0 );
JMF 12:0071cb144c7a 298 PUT_UINT32_BE( low, msglen, 4 );
JMF 12:0071cb144c7a 299
JMF 12:0071cb144c7a 300 last = ctx->total[0] & 0x3F;
JMF 12:0071cb144c7a 301 padn = ( last < 56 ) ? ( 56 - last ) : ( 120 - last );
JMF 12:0071cb144c7a 302
JMF 12:0071cb144c7a 303 mbedtls_sha256_update( ctx, sha256_padding, padn );
JMF 12:0071cb144c7a 304 mbedtls_sha256_update( ctx, msglen, 8 );
JMF 12:0071cb144c7a 305
JMF 12:0071cb144c7a 306 PUT_UINT32_BE( ctx->state[0], output, 0 );
JMF 12:0071cb144c7a 307 PUT_UINT32_BE( ctx->state[1], output, 4 );
JMF 12:0071cb144c7a 308 PUT_UINT32_BE( ctx->state[2], output, 8 );
JMF 12:0071cb144c7a 309 PUT_UINT32_BE( ctx->state[3], output, 12 );
JMF 12:0071cb144c7a 310 PUT_UINT32_BE( ctx->state[4], output, 16 );
JMF 12:0071cb144c7a 311 PUT_UINT32_BE( ctx->state[5], output, 20 );
JMF 12:0071cb144c7a 312 PUT_UINT32_BE( ctx->state[6], output, 24 );
JMF 12:0071cb144c7a 313
JMF 12:0071cb144c7a 314 if( ctx->is224 == 0 )
JMF 12:0071cb144c7a 315 PUT_UINT32_BE( ctx->state[7], output, 28 );
JMF 12:0071cb144c7a 316 }
JMF 12:0071cb144c7a 317
JMF 12:0071cb144c7a 318 #endif /* !MBEDTLS_SHA256_ALT */
JMF 12:0071cb144c7a 319
JMF 12:0071cb144c7a 320 /*
JMF 12:0071cb144c7a 321 * output = SHA-256( input buffer )
JMF 12:0071cb144c7a 322 */
JMF 12:0071cb144c7a 323 void mbedtls_sha256( const unsigned char *input, size_t ilen,
JMF 12:0071cb144c7a 324 unsigned char output[32], int is224 )
JMF 12:0071cb144c7a 325 {
JMF 12:0071cb144c7a 326 mbedtls_sha256_context ctx;
JMF 12:0071cb144c7a 327
JMF 12:0071cb144c7a 328 mbedtls_sha256_init( &ctx );
JMF 12:0071cb144c7a 329 mbedtls_sha256_starts( &ctx, is224 );
JMF 12:0071cb144c7a 330 mbedtls_sha256_update( &ctx, input, ilen );
JMF 12:0071cb144c7a 331 mbedtls_sha256_finish( &ctx, output );
JMF 12:0071cb144c7a 332 mbedtls_sha256_free( &ctx );
JMF 12:0071cb144c7a 333 }
JMF 12:0071cb144c7a 334
JMF 12:0071cb144c7a 335 #if defined(MBEDTLS_SELF_TEST)
JMF 12:0071cb144c7a 336 /*
JMF 12:0071cb144c7a 337 * FIPS-180-2 test vectors
JMF 12:0071cb144c7a 338 */
JMF 12:0071cb144c7a 339 static const unsigned char sha256_test_buf[3][57] =
JMF 12:0071cb144c7a 340 {
JMF 12:0071cb144c7a 341 { "abc" },
JMF 12:0071cb144c7a 342 { "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" },
JMF 12:0071cb144c7a 343 { "" }
JMF 12:0071cb144c7a 344 };
JMF 12:0071cb144c7a 345
JMF 12:0071cb144c7a 346 static const int sha256_test_buflen[3] =
JMF 12:0071cb144c7a 347 {
JMF 12:0071cb144c7a 348 3, 56, 1000
JMF 12:0071cb144c7a 349 };
JMF 12:0071cb144c7a 350
JMF 12:0071cb144c7a 351 static const unsigned char sha256_test_sum[6][32] =
JMF 12:0071cb144c7a 352 {
JMF 12:0071cb144c7a 353 /*
JMF 12:0071cb144c7a 354 * SHA-224 test vectors
JMF 12:0071cb144c7a 355 */
JMF 12:0071cb144c7a 356 { 0x23, 0x09, 0x7D, 0x22, 0x34, 0x05, 0xD8, 0x22,
JMF 12:0071cb144c7a 357 0x86, 0x42, 0xA4, 0x77, 0xBD, 0xA2, 0x55, 0xB3,
JMF 12:0071cb144c7a 358 0x2A, 0xAD, 0xBC, 0xE4, 0xBD, 0xA0, 0xB3, 0xF7,
JMF 12:0071cb144c7a 359 0xE3, 0x6C, 0x9D, 0xA7 },
JMF 12:0071cb144c7a 360 { 0x75, 0x38, 0x8B, 0x16, 0x51, 0x27, 0x76, 0xCC,
JMF 12:0071cb144c7a 361 0x5D, 0xBA, 0x5D, 0xA1, 0xFD, 0x89, 0x01, 0x50,
JMF 12:0071cb144c7a 362 0xB0, 0xC6, 0x45, 0x5C, 0xB4, 0xF5, 0x8B, 0x19,
JMF 12:0071cb144c7a 363 0x52, 0x52, 0x25, 0x25 },
JMF 12:0071cb144c7a 364 { 0x20, 0x79, 0x46, 0x55, 0x98, 0x0C, 0x91, 0xD8,
JMF 12:0071cb144c7a 365 0xBB, 0xB4, 0xC1, 0xEA, 0x97, 0x61, 0x8A, 0x4B,
JMF 12:0071cb144c7a 366 0xF0, 0x3F, 0x42, 0x58, 0x19, 0x48, 0xB2, 0xEE,
JMF 12:0071cb144c7a 367 0x4E, 0xE7, 0xAD, 0x67 },
JMF 12:0071cb144c7a 368
JMF 12:0071cb144c7a 369 /*
JMF 12:0071cb144c7a 370 * SHA-256 test vectors
JMF 12:0071cb144c7a 371 */
JMF 12:0071cb144c7a 372 { 0xBA, 0x78, 0x16, 0xBF, 0x8F, 0x01, 0xCF, 0xEA,
JMF 12:0071cb144c7a 373 0x41, 0x41, 0x40, 0xDE, 0x5D, 0xAE, 0x22, 0x23,
JMF 12:0071cb144c7a 374 0xB0, 0x03, 0x61, 0xA3, 0x96, 0x17, 0x7A, 0x9C,
JMF 12:0071cb144c7a 375 0xB4, 0x10, 0xFF, 0x61, 0xF2, 0x00, 0x15, 0xAD },
JMF 12:0071cb144c7a 376 { 0x24, 0x8D, 0x6A, 0x61, 0xD2, 0x06, 0x38, 0xB8,
JMF 12:0071cb144c7a 377 0xE5, 0xC0, 0x26, 0x93, 0x0C, 0x3E, 0x60, 0x39,
JMF 12:0071cb144c7a 378 0xA3, 0x3C, 0xE4, 0x59, 0x64, 0xFF, 0x21, 0x67,
JMF 12:0071cb144c7a 379 0xF6, 0xEC, 0xED, 0xD4, 0x19, 0xDB, 0x06, 0xC1 },
JMF 12:0071cb144c7a 380 { 0xCD, 0xC7, 0x6E, 0x5C, 0x99, 0x14, 0xFB, 0x92,
JMF 12:0071cb144c7a 381 0x81, 0xA1, 0xC7, 0xE2, 0x84, 0xD7, 0x3E, 0x67,
JMF 12:0071cb144c7a 382 0xF1, 0x80, 0x9A, 0x48, 0xA4, 0x97, 0x20, 0x0E,
JMF 12:0071cb144c7a 383 0x04, 0x6D, 0x39, 0xCC, 0xC7, 0x11, 0x2C, 0xD0 }
JMF 12:0071cb144c7a 384 };
JMF 12:0071cb144c7a 385
JMF 12:0071cb144c7a 386 /*
JMF 12:0071cb144c7a 387 * Checkup routine
JMF 12:0071cb144c7a 388 */
JMF 12:0071cb144c7a 389 int mbedtls_sha256_self_test( int verbose )
JMF 12:0071cb144c7a 390 {
JMF 12:0071cb144c7a 391 int i, j, k, buflen, ret = 0;
JMF 12:0071cb144c7a 392 unsigned char buf[1024];
JMF 12:0071cb144c7a 393 unsigned char sha256sum[32];
JMF 12:0071cb144c7a 394 mbedtls_sha256_context ctx;
JMF 12:0071cb144c7a 395
JMF 12:0071cb144c7a 396 mbedtls_sha256_init( &ctx );
JMF 12:0071cb144c7a 397
JMF 12:0071cb144c7a 398 for( i = 0; i < 6; i++ )
JMF 12:0071cb144c7a 399 {
JMF 12:0071cb144c7a 400 j = i % 3;
JMF 12:0071cb144c7a 401 k = i < 3;
JMF 12:0071cb144c7a 402
JMF 12:0071cb144c7a 403 if( verbose != 0 )
JMF 12:0071cb144c7a 404 mbedtls_printf( " SHA-%d test #%d: ", 256 - k * 32, j + 1 );
JMF 12:0071cb144c7a 405
JMF 12:0071cb144c7a 406 mbedtls_sha256_starts( &ctx, k );
JMF 12:0071cb144c7a 407
JMF 12:0071cb144c7a 408 if( j == 2 )
JMF 12:0071cb144c7a 409 {
JMF 12:0071cb144c7a 410 memset( buf, 'a', buflen = 1000 );
JMF 12:0071cb144c7a 411
JMF 12:0071cb144c7a 412 for( j = 0; j < 1000; j++ )
JMF 12:0071cb144c7a 413 mbedtls_sha256_update( &ctx, buf, buflen );
JMF 12:0071cb144c7a 414 }
JMF 12:0071cb144c7a 415 else
JMF 12:0071cb144c7a 416 mbedtls_sha256_update( &ctx, sha256_test_buf[j],
JMF 12:0071cb144c7a 417 sha256_test_buflen[j] );
JMF 12:0071cb144c7a 418
JMF 12:0071cb144c7a 419 mbedtls_sha256_finish( &ctx, sha256sum );
JMF 12:0071cb144c7a 420
JMF 12:0071cb144c7a 421 if( memcmp( sha256sum, sha256_test_sum[i], 32 - k * 4 ) != 0 )
JMF 12:0071cb144c7a 422 {
JMF 12:0071cb144c7a 423 if( verbose != 0 )
JMF 12:0071cb144c7a 424 mbedtls_printf( "failed\n" );
JMF 12:0071cb144c7a 425
JMF 12:0071cb144c7a 426 ret = 1;
JMF 12:0071cb144c7a 427 goto exit;
JMF 12:0071cb144c7a 428 }
JMF 12:0071cb144c7a 429
JMF 12:0071cb144c7a 430 if( verbose != 0 )
JMF 12:0071cb144c7a 431 mbedtls_printf( "passed\n" );
JMF 12:0071cb144c7a 432 }
JMF 12:0071cb144c7a 433
JMF 12:0071cb144c7a 434 if( verbose != 0 )
JMF 12:0071cb144c7a 435 mbedtls_printf( "\n" );
JMF 12:0071cb144c7a 436
JMF 12:0071cb144c7a 437 exit:
JMF 12:0071cb144c7a 438 mbedtls_sha256_free( &ctx );
JMF 12:0071cb144c7a 439
JMF 12:0071cb144c7a 440 return( ret );
JMF 12:0071cb144c7a 441 }
JMF 12:0071cb144c7a 442
JMF 12:0071cb144c7a 443 #endif /* MBEDTLS_SELF_TEST */
JMF 12:0071cb144c7a 444
JMF 12:0071cb144c7a 445 #endif /* MBEDTLS_SHA256_C */