Add sha3 streaming and reuse tests.

Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es>
diff --git a/tests/suites/test_suite_shax.function b/tests/suites/test_suite_shax.function
index 025bdb4..aee55b9 100644
--- a/tests/suites/test_suite_shax.function
+++ b/tests/suites/test_suite_shax.function
@@ -178,6 +178,101 @@
 }
 /* END_CASE */
 
+/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
+void sha3_streaming( int type, data_t *input )
+{
+    mbedtls_sha3_context ctx;
+    unsigned char reference_hash[64];
+    unsigned char hash[64];
+    size_t chunk_size;
+    size_t hash_length = ( type == MBEDTLS_SHA3_224 ? 28 :
+                           type == MBEDTLS_SHA3_256 ? 32 :
+                           type == MBEDTLS_SHA3_384 ? 48 :
+                           type == MBEDTLS_SHA3_512 ? 64 :
+                           0 );
+
+    mbedtls_sha3_init( &ctx );
+    memset( reference_hash, 0, sizeof( reference_hash ) );
+    memset( hash, 0, sizeof( hash ) );
+    TEST_ASSERT( hash_length != 0 );
+
+    /* Generate a reference hash */
+    mbedtls_sha3( type, input->x, input->len, reference_hash, hash_length );
+
+    /* Repeat each test with increasingly-sized data chunks
+     * E.g. start by processing bytes individual bytes, then 2-byte chunks,
+     * then 3-byte chunks, and so on...
+     * At each test ensure that the same hash is generated.
+     */
+    for( chunk_size = 1; chunk_size < input->len; chunk_size++ )
+    {
+        size_t i;
+        size_t remaining = input->len;
+
+        mbedtls_sha3_init( &ctx );
+        TEST_ASSERT( mbedtls_sha3_starts( &ctx, type ) == 0 );
+
+        for ( i = 0; i < input->len; i += chunk_size )
+        {
+            size_t len = remaining >= chunk_size ? chunk_size : remaining;
+            TEST_ASSERT( mbedtls_sha3_update( &ctx, input->x + i, len ) == 0 );
+            remaining -= len;
+        }
+
+        mbedtls_sha3_finish( &ctx, hash, hash_length );
+        mbedtls_sha3_free( &ctx );
+
+        ASSERT_COMPARE( hash, hash_length, reference_hash, hash_length );
+    }
+
+exit:
+    mbedtls_sha3_free( &ctx );
+}
+/* END_CASE */
+
+/* BEGIN_CASE depends_on:MBEDTLS_SHA3_C */
+void sha3_reuse( data_t *input1, data_t *hash1,
+                 data_t *input2, data_t *hash2 )
+{
+    unsigned char output[64];
+    mbedtls_sha3_context ctx;
+    mbedtls_sha3_id type1, type2;
+
+    mbedtls_sha3_init( &ctx );
+    switch( hash1->len )
+    {
+        case 28: type1 = MBEDTLS_SHA3_224; break;
+        case 32: type1 = MBEDTLS_SHA3_256; break;
+        case 48: type1 = MBEDTLS_SHA3_384; break;
+        case 64: type1 = MBEDTLS_SHA3_512; break;
+        default: TEST_ASSERT( ! "hash1->len validity" ); break;
+    }
+    switch( hash2->len )
+    {
+        case 28: type2 = MBEDTLS_SHA3_224; break;
+        case 32: type2 = MBEDTLS_SHA3_256; break;
+        case 48: type2 = MBEDTLS_SHA3_384; break;
+        case 64: type2 = MBEDTLS_SHA3_512; break;
+        default: TEST_ASSERT( ! "hash2->len validity" ); break;
+    }
+
+    /* Round 1 */
+    TEST_ASSERT( mbedtls_sha3_starts( &ctx, type1 ) == 0 );
+    TEST_ASSERT( mbedtls_sha3_update( &ctx, input1->x, input1->len ) == 0 );
+    TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
+    ASSERT_COMPARE( output, hash1->len, hash1->x, hash1->len );
+
+    /* Round 2 */
+    TEST_ASSERT( mbedtls_sha3_starts( &ctx, type2 ) == 0 );
+    TEST_ASSERT( mbedtls_sha3_update( &ctx, input2->x, input2->len ) == 0 );
+    TEST_ASSERT( mbedtls_sha3_finish( &ctx, output, sizeof( output ) ) == 0 );
+    ASSERT_COMPARE( output, hash2->len, hash2->x, hash2->len );
+
+exit:
+    mbedtls_sha3_free( &ctx );
+}
+/* END_CASE */
+
 /* BEGIN_CASE depends_on:MBEDTLS_SHA3_C:MBEDTLS_SELF_TEST */
 void sha3_selftest()
 {