Later commits will touch existing digest code, so this is a good
opportunity to add a self test to ensure MD5/SHA continues to work.

Signed-off-by: Ahmad Fatoum <[email protected]>
---
 test/self/Kconfig  |   6 ++
 test/self/Makefile |   1 +
 test/self/digest.c | 190 +++++++++++++++++++++++++++++++++++++++++++++
 3 files changed, 197 insertions(+)
 create mode 100644 test/self/digest.c

diff --git a/test/self/Kconfig b/test/self/Kconfig
index ce5048c70ec9..641df9fece1c 100644
--- a/test/self/Kconfig
+++ b/test/self/Kconfig
@@ -36,6 +36,7 @@ config SELFTEST_ENABLE_ALL
        imply SELFTEST_FS_RAMFS
        imply SELFTEST_TFTP
        imply SELFTEST_JSON
+       imply SELFTEST_DIGEST
        help
          Selects all self-tests compatible with current configuration
 
@@ -69,4 +70,9 @@ config SELFTEST_JSON
        bool "JSON selftest"
        depends on JSMN
 
+config SELFTEST_DIGEST
+       bool "Digest selftest"
+       depends on DIGEST
+       select PRINTF_HEXSTR
+
 endif
diff --git a/test/self/Makefile b/test/self/Makefile
index 98ebd1fd66c1..d6cedede356e 100644
--- a/test/self/Makefile
+++ b/test/self/Makefile
@@ -9,6 +9,7 @@ obj-$(CONFIG_SELFTEST_OF_MANIPULATION) += of_manipulation.o 
of_manipulation.dtb.
 obj-$(CONFIG_SELFTEST_ENVIRONMENT_VARIABLES) += envvar.o
 obj-$(CONFIG_SELFTEST_FS_RAMFS) += ramfs.o
 obj-$(CONFIG_SELFTEST_JSON) += json.o
+obj-$(CONFIG_SELFTEST_DIGEST) += digest.o
 
 clean-files := *.dtb *.dtb.S .*.dtc .*.pre .*.dts *.dtb.z
 clean-files += *.dtbo *.dtbo.S .*.dtso
diff --git a/test/self/digest.c b/test/self/digest.c
new file mode 100644
index 000000000000..c90f860643e0
--- /dev/null
+++ b/test/self/digest.c
@@ -0,0 +1,190 @@
+// SPDX-License-Identifier: GPL-2.0-only
+
+#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
+#define DEBUG 1
+#include <common.h>
+#include <bselftest.h>
+#include <clock.h>
+#include <digest.h>
+
+BSELFTEST_GLOBALS();
+
+struct digest_test_case {
+       const char *name;
+       const void *buf;
+       size_t buf_size;
+       const void *digest_str;
+       u64 time_ns;
+};
+
+#define TEST_CASE(buf, digest_str) \
+       { #buf, buf, sizeof(buf), digest_str }
+
+#define test_digest(option, algo, ...) do { \
+       struct digest_test_case *t, cases[] = { __VA_ARGS__, { /* sentinel */ } 
}; \
+       for (t = cases; t->buf; t++) \
+               __test_digest((option), (algo), t, __func__, __LINE__); \
+       if (!__is_defined(DEBUG)) \
+               break; \
+       printf("%s:\t", algo); \
+       for (t = cases; t->buf; t++) \
+               printf(" digest(%zu bytes) = %10lluns", t->buf_size, 
t->time_ns); \
+       printf("\n"); \
+} while (0)
+
+static inline const char *digest_suffix(const char *str, const char *suffix)
+{
+       static char buf[32];
+
+       if (!*suffix)
+               return str;
+
+       WARN_ON(snprintf(buf, sizeof(buf), "%s-%s", str, suffix) >= 
sizeof(buf));
+       return buf;
+}
+
+static void __test_digest(bool option,
+                         const char *algo, struct digest_test_case *t,
+                         const char *func, int line)
+{
+       unsigned char *output, *digest;
+       struct digest *d;
+       int hash_len, digest_len;
+       u64 start;
+       int ret;
+
+       total_tests++;
+
+       if (!option) {
+               skipped_tests++;
+               return;
+       }
+
+       d = digest_alloc(algo);
+       if (!d) {
+               printf("%s:%d: failed to allocate %s digest\n", func, line, 
algo);
+               goto fail;
+       }
+
+       hash_len = digest_length(d);
+       digest_len = strlen(t->digest_str) / 2;
+       if (hash_len != digest_len) {
+               printf("%s:%d: %s digests have length %u, but %u expected\n",
+                      func, line, algo, hash_len, digest_len);
+               goto fail;
+       }
+
+       output = calloc(hash_len, 1);
+       if (WARN_ON(!output))
+               goto fail;
+
+       digest = calloc(digest_len, 1);
+       if (WARN_ON(!digest))
+               goto fail;
+
+       ret = hex2bin(digest, t->digest_str, digest_len);
+       if (WARN_ON(ret))
+               goto fail;
+
+       start = get_time_ns();
+
+       ret = digest_digest(d, t->buf, t->buf_size, output);
+       if (ret) {
+               printf("%s:%d: error calculating %s(%s): %pe\n",
+                      func, line, algo, t->name, ERR_PTR(ret));
+               goto fail;
+       }
+
+       t->time_ns = get_time_ns() - start;
+
+       if (memcmp(output, digest, hash_len)) {
+               printf("%s:%d: mismatch calculating %s(%s):\n\tgot: 
%*phN\n\tbut: %*phN expected\n",
+                      func, line, algo, t->name, hash_len, output, hash_len, 
digest);
+               goto fail;
+       }
+
+       return;
+fail:
+       failed_tests++;
+}
+
+static const u8 zeroes7[7] = {};
+static const u8 one32[32] = { 1 };
+static u8 inc4097[4097];
+
+static void test_digest_md5(const char *suffix)
+{
+       test_digest(IS_ENABLED(CONFIG_HAVE_DIGEST_MD5), digest_suffix("md5", 
suffix),
+               TEST_CASE(zeroes7, "d310a40483f9399dd7ed1712e0fdd702"),
+               TEST_CASE(one32,   "b39ac6e2aa7e375c38ba7ae921b5ba89"),
+               TEST_CASE(inc4097, "70410aad262cd11e63ae854804c8024b"));
+}
+
+static void test_digests_sha12(const char *suffix)
+{
+       bool cond;
+
+       cond = !strcmp(suffix, "asm") ? IS_ENABLED(CONFIG_DIGEST_SHA1_ARM) :
+              IS_ENABLED(CONFIG_HAVE_DIGEST_SHA1);
+
+       test_digest(cond, digest_suffix("sha1", suffix),
+               TEST_CASE(zeroes7, "77ce0377defbd11b77b1f4ad54ca40ea5ef28490"),
+               TEST_CASE(one32,   "cbd9cbfc20182e4b71e593e7ad598fc383cc6058"),
+               TEST_CASE(inc4097, "c627e736efd8bb0dff1778335c9c79cb1f27e396"));
+
+
+       cond = !strcmp(suffix, "asm") ? IS_ENABLED(CONFIG_DIGEST_SHA256_ARM) :
+              IS_ENABLED(CONFIG_HAVE_DIGEST_SHA1);
+
+       test_digest(cond, digest_suffix("sha224", suffix),
+               TEST_CASE(zeroes7, 
"fbf6df85218ac5632461a8a17c6f294e6f35264cbfc0a9774a4f665b"),
+               TEST_CASE(one32,   
"343cb3950305e6e6331e294b0a4925739d09ecbd2b43a2fc87c09941"),
+               TEST_CASE(inc4097, 
"6596b5dcfbd857f4246d6b94508b8a1a5b715a4f644a0c1e7d54c4f7"));
+
+       test_digest(cond, digest_suffix("sha256", suffix),
+               TEST_CASE(zeroes7, 
"837885c8f8091aeaeb9ec3c3f85a6ff470a415e610b8ba3e49f9b33c9cf9d619"),
+               TEST_CASE(one32,   
"01d0fabd251fcbbe2b93b4b927b26ad2a1a99077152e45ded1e678afa45dbec5"),
+               TEST_CASE(inc4097, 
"1e973d029df2b2c66cb42a942c5edb45966f02abaff29fe99410e44d271d0efc"));
+}
+
+
+static void test_digests_sha35(const char *suffix)
+{
+       test_digest(IS_ENABLED(CONFIG_HAVE_DIGEST_SHA384), 
digest_suffix("sha384", suffix),
+               TEST_CASE(zeroes7, 
"b56705a73cf280f06d3a6b482c441a3d280c930d0c44b04f364dcdcedcfbc47c"
+                                  "f3645a71da7b97f9e5d3a0924f6b9634"),
+               TEST_CASE(one32,   
"dd606b49d7658a5eae905d593271c280819f92eb1a9a4986057aedc0a5f2eaea"
+                                  "99052904718f6d83f16ad209d793f253"),
+               TEST_CASE(inc4097, 
"f76046b90890f20ae94066a3ad33010f5b3b2fd46977414636bbc634898b06fd"
+                                  "4cb8f85e0926e8817e518300a930529e"));
+
+       test_digest(IS_ENABLED(CONFIG_HAVE_DIGEST_SHA512), 
digest_suffix("sha512", suffix),
+               TEST_CASE(zeroes7, 
"76afca18a9b81ffb967ffcf0460ed221c3605d3820057214d785fa88259bb5cb"
+                                  
"729576178e6edb0134f645d2e2e92cbabf1333462f3b9058692c950f51c64a92"),
+               TEST_CASE(one32,   
"ce0c265ecc82dd8cee6e56ce44e45dafd7a0c5750df914b253a1fb7a8af66ddb"
+                                  
"99763607f0a85d0bd43669194a3a40577a528af395f4f17e06f1defcc6deb2a5"),
+               TEST_CASE(inc4097, 
"42eb09aca460d79b0c0aeac28187ed055a92e33602b69428461697680ff9f48f"
+                                  
"60a5a68aa0017e3446433349b42592b74713d7787628a58e400b7f588b9bd69b"));
+}
+
+static void test_digests(void)
+{
+       int i;
+
+       for (i = 0; i < ARRAY_SIZE(inc4097); i++)
+               inc4097[i] = i;
+
+       test_digest_md5("generic");
+
+       test_digests_sha12("generic");
+       if (IS_ENABLED(CONFIG_CPU_32))
+               test_digests_sha12("asm");
+
+       test_digests_sha35("generic");
+
+       test_digest_md5("");
+       test_digests_sha12("");
+       test_digests_sha35("");
+
+}
+bselftest(core, test_digests);
-- 
2.39.2


Reply via email to