summaryrefslogtreecommitdiffstats
path: root/libraries/Sha/examples/sha1test/sha1test.pde
diff options
context:
space:
mode:
Diffstat (limited to 'libraries/Sha/examples/sha1test/sha1test.pde')
-rw-r--r--libraries/Sha/examples/sha1test/sha1test.pde131
1 files changed, 131 insertions, 0 deletions
diff --git a/libraries/Sha/examples/sha1test/sha1test.pde b/libraries/Sha/examples/sha1test/sha1test.pde
new file mode 100644
index 0000000..9fd205b
--- /dev/null
+++ b/libraries/Sha/examples/sha1test/sha1test.pde
@@ -0,0 +1,131 @@
+/**
+ * Cryptosuite - A cryptographic library for Arduino
+ * Copyright (C) 2010 Peter Knight (Cathedrow)
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "sha1.h"
+
+void printHash(uint8_t* hash) {
+ int i;
+ for (i=0; i<20; i++) {
+ Serial.print("0123456789abcdef"[hash[i]>>4]);
+ Serial.print("0123456789abcdef"[hash[i]&0xf]);
+ }
+ Serial.println();
+}
+
+uint8_t hmacKey1[]={
+ 0x00,0x01,0x02,0x03,0x04,0x05,0x06,0x07,0x08,0x09,0x0a,0x0b,0x0c,0x0d,0x0e,0x0f,
+ 0x10,0x11,0x12,0x13,0x14,0x15,0x16,0x17,0x18,0x19,0x1a,0x1b,0x1c,0x1d,0x1e,0x1f,
+ 0x20,0x21,0x22,0x23,0x24,0x25,0x26,0x27,0x28,0x29,0x2a,0x2b,0x2c,0x2d,0x2e,0x2f,
+ 0x30,0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39,0x3a,0x3b,0x3c,0x3d,0x3e,0x3f
+};
+uint8_t hmacKey2[]={
+ 0x30,0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39,0x3a,0x3b,0x3c,0x3d,0x3e,0x3f,
+ 0x40,0x41,0x42,0x43
+};
+uint8_t hmacKey3[]={
+ 0x50,0x51,0x52,0x53,0x54,0x55,0x56,0x57,0x58,0x59,0x5a,0x5b,0x5c,0x5d,0x5e,0x5f,
+ 0x60,0x61,0x62,0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6a,0x6b,0x6c,0x6d,0x6e,0x6f,
+ 0x70,0x71,0x72,0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7a,0x7b,0x7c,0x7d,0x7e,0x7f,
+ 0x80,0x81,0x82,0x83,0x84,0x85,0x86,0x87,0x88,0x89,0x8a,0x8b,0x8c,0x8d,0x8e,0x8f,
+ 0x90,0x91,0x92,0x93,0x94,0x95,0x96,0x97,0x98,0x99,0x9a,0x9b,0x9c,0x9d,0x9e,0x9f,
+ 0xa0,0xa1,0xa2,0xa3,0xa4,0xa5,0xa6,0xa7,0xa8,0xa9,0xaa,0xab,0xac,0xad,0xae,0xaf,
+ 0xb0,0xb1,0xb2,0xb3
+};
+uint8_t hmacKey4[]={
+ 0x70,0x71,0x72,0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7a,0x7b,0x7c,0x7d,0x7e,0x7f,
+ 0x80,0x81,0x82,0x83,0x84,0x85,0x86,0x87,0x88,0x89,0x8a,0x8b,0x8c,0x8d,0x8e,0x8f,
+ 0x90,0x91,0x92,0x93,0x94,0x95,0x96,0x97,0x98,0x99,0x9a,0x9b,0x9c,0x9d,0x9e,0x9f,
+ 0xa0
+};
+
+
+void setup() {
+ uint8_t* hash;
+ uint32_t a;
+
+ Serial.begin(9600);
+
+ // SHA tests
+ Serial.println("Test: FIPS 180-2 C.1 and RFC3174 7.3 TEST1");
+ Serial.println("Expect:a9993e364706816aba3e25717850c26c9cd0d89d");
+ Serial.print("Result:");
+ Sha1.init();
+ Sha1.print("abc");
+ printHash(Sha1.result());
+ Serial.println();
+
+ Serial.println("Test: FIPS 180-2 C.2 and RFC3174 7.3 TEST2");
+ Serial.println("Expect:84983e441c3bd26ebaae4aa1f95129e5e54670f1");
+ Serial.print("Result:");
+ Sha1.init();
+ Sha1.print("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq");
+ printHash(Sha1.result());
+ Serial.println();
+
+ Serial.println("Test: RFC3174 7.3 TEST4");
+ Serial.println("Expect:dea356a2cddd90c7a7ecedc5ebb563934f460452");
+ Serial.print("Result:");
+ Sha1.init();
+ for (a=0; a<80; a++) Sha1.print("01234567");
+ printHash(Sha1.result());
+ Serial.println();
+
+ // HMAC tests
+ Serial.println("Test: FIPS 198a A.1");
+ Serial.println("Expect:4f4ca3d5d68ba7cc0a1208c9c61e9c5da0403c0a");
+ Serial.print("Result:");
+ Sha1.initHmac(hmacKey1,64);
+ Sha1.print("Sample #1");
+ printHash(Sha1.resultHmac());
+ Serial.println();
+
+ Serial.println("Test: FIPS 198a A.2");
+ Serial.println("Expect:0922d3405faa3d194f82a45830737d5cc6c75d24");
+ Serial.print("Result:");
+ Sha1.initHmac(hmacKey2,20);
+ Sha1.print("Sample #2");
+ printHash(Sha1.resultHmac());
+ Serial.println();
+
+ Serial.println("Test: FIPS 198a A.3");
+ Serial.println("Expect:bcf41eab8bb2d802f3d05caf7cb092ecf8d1a3aa");
+ Serial.print("Result:");
+ Sha1.initHmac(hmacKey3,100);
+ Sha1.print("Sample #3");
+ printHash(Sha1.resultHmac());
+ Serial.println();
+
+ Serial.println("Test: FIPS 198a A.4");
+ Serial.println("Expect:9ea886efe268dbecce420c7524df32e0751a2a26");
+ Serial.print("Result:");
+ Sha1.initHmac(hmacKey4,49);
+ Sha1.print("Sample #4");
+ printHash(Sha1.resultHmac());
+ Serial.println();
+
+ // Long tests
+ Serial.println("Test: FIPS 180-2 C.3 and RFC3174 7.3 TEST3 (Processing 1000000 characters. This will take a while.)");
+ Serial.println("Expect:34aa973cd4c4daa4f61eeb2bdbad27316534016f");
+ Serial.print("Result:");
+ Sha1.init();
+ for (a=0; a<1000000; a++) Sha1.write('a');
+ printHash(Sha1.result());
+}
+
+void loop() {
+} \ No newline at end of file