179 lines
4.8 KiB
C++
179 lines
4.8 KiB
C++
/*
|
|
* Hello world example of using the hashing functions of mbed TLS
|
|
*
|
|
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
* not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
|
*/
|
|
|
|
/*
|
|
* This program illustrates various ways of hashing a buffer.
|
|
* You normally need only one of these two includes.
|
|
*/
|
|
#include "mbedtls/sha256.h" /* SHA-256 only */
|
|
#include "mbedtls/md.h" /* generic interface */
|
|
|
|
#if defined(TARGET_LIKE_MBED)
|
|
#include "mbed/mbed.h"
|
|
#endif
|
|
#include <cstdio>
|
|
|
|
static void print_hex(const char *title, const unsigned char buf[], size_t len)
|
|
{
|
|
printf("%s: ", title);
|
|
|
|
for (size_t i = 0; i < len; i++)
|
|
printf("%02x", buf[i]);
|
|
|
|
printf("\r\n");
|
|
}
|
|
|
|
static const char hello_str[] = "Hello, world!";
|
|
static const unsigned char *hello_buffer = (const unsigned char *) hello_str;
|
|
static const size_t hello_len = sizeof hello_str - 1;
|
|
|
|
int example(void)
|
|
{
|
|
printf( "\r\n\r\n" );
|
|
|
|
/*
|
|
* Method 1: use all-in-one function of a specific SHA-xxx module
|
|
*/
|
|
unsigned char output1[32]; /* SHA-256 outputs 32 bytes */
|
|
|
|
/* 0 here means use the full SHA-256, not the SHA-224 variant */
|
|
mbedtls_sha256(hello_buffer, hello_len, output1, 0);
|
|
|
|
print_hex("Method 1", output1, sizeof output1);
|
|
|
|
|
|
/*
|
|
* Method 2: use the streaming interface of a specific SHA-xxx module
|
|
* This is useful if we get our input piecewise.
|
|
*/
|
|
unsigned char output2[32];
|
|
mbedtls_sha256_context ctx2;
|
|
|
|
mbedtls_sha256_init(&ctx2);
|
|
mbedtls_sha256_starts(&ctx2, 0); /* SHA-256, not 224 */
|
|
|
|
/* Simulating multiple fragments */
|
|
mbedtls_sha256_update(&ctx2, hello_buffer, 1);
|
|
mbedtls_sha256_update(&ctx2, hello_buffer + 1, 1);
|
|
mbedtls_sha256_update(&ctx2, hello_buffer + 2, hello_len - 2);
|
|
|
|
mbedtls_sha256_finish(&ctx2, output2);
|
|
print_hex("Method 2", output2, sizeof output2);
|
|
|
|
/* Or you could re-use the context by doing mbedtls_sha256_starts() again */
|
|
mbedtls_sha256_free(&ctx2);
|
|
|
|
/*
|
|
* Method 3: use all-in-one function of the generice interface
|
|
*/
|
|
unsigned char output3[MBEDTLS_MD_MAX_SIZE]; /* Enough for any hash */
|
|
|
|
/* Can easily pick any hash you want, by identifier */
|
|
const mbedtls_md_info_t *md_info3 = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
|
|
|
if (md_info3 == NULL)
|
|
{
|
|
printf("SHA256 not available\r\n");
|
|
return 1;
|
|
}
|
|
|
|
int ret3 = mbedtls_md(md_info3, hello_buffer, hello_len, output3);
|
|
|
|
if (ret3 != 0)
|
|
{
|
|
printf("md() returned -0x%04X\r\n", -ret3);
|
|
return 1;
|
|
}
|
|
|
|
print_hex("Method 3", output3, mbedtls_md_get_size(md_info3));
|
|
|
|
|
|
/*
|
|
* Method 4: streaming & generic interface
|
|
*/
|
|
unsigned char output4[MBEDTLS_MD_MAX_SIZE]; /* Enough for any hash */
|
|
|
|
const mbedtls_md_info_t *md_info4 = mbedtls_md_info_from_type(MBEDTLS_MD_SHA256);
|
|
|
|
if (md_info4 == NULL)
|
|
{
|
|
printf("SHA256 not available\r\n");
|
|
return 1;
|
|
}
|
|
|
|
mbedtls_md_context_t ctx4;
|
|
|
|
mbedtls_md_init(&ctx4);
|
|
|
|
int ret4 = mbedtls_md_init_ctx(&ctx4, md_info4);
|
|
if (ret4 != 0)
|
|
{
|
|
printf("md_init_ctx() returned -0x%04X\r\n", -ret4);
|
|
return 1;
|
|
}
|
|
|
|
mbedtls_md_starts(&ctx4);
|
|
|
|
/* Simulating multiple fragments */
|
|
mbedtls_md_update(&ctx4, hello_buffer, 1);
|
|
mbedtls_md_update(&ctx4, hello_buffer + 1, 1);
|
|
mbedtls_md_update(&ctx4, hello_buffer + 2, hello_len - 2);
|
|
|
|
mbedtls_md_finish(&ctx4, output4);
|
|
print_hex("Method 4", output4, mbedtls_md_get_size(md_info4));
|
|
|
|
/* Or you could re-use the context by doing mbedtls_md_starts() again */
|
|
mbedtls_md_free(&ctx4);
|
|
|
|
|
|
printf("\r\nDONE\r\n");
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if defined(TARGET_LIKE_MBED)
|
|
|
|
#include "mbed/test_env.h"
|
|
#include "minar/minar.h"
|
|
|
|
static void run() {
|
|
/* Use 115200 bps for consistency with other examples */
|
|
Serial pc(USBTX, USBRX);
|
|
pc.baud(115200);
|
|
|
|
MBED_HOSTTEST_TIMEOUT(10);
|
|
MBED_HOSTTEST_SELECT(default);
|
|
MBED_HOSTTEST_DESCRIPTION(mbed TLS example on hashing);
|
|
MBED_HOSTTEST_START("MBEDTLS_EX_HASHING");
|
|
MBED_HOSTTEST_RESULT(example() == 0);
|
|
}
|
|
|
|
void app_start(int, char*[]) {
|
|
minar::Scheduler::postCallback(FunctionPointer0<void>(run).bind());
|
|
}
|
|
|
|
#else
|
|
|
|
int main() {
|
|
return example();
|
|
}
|
|
|
|
#endif
|