blob: d3a6bf857a11e9832239ce86417d9b5abad68828 [file] [log] [blame]
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +01001/*
2 * Example computing a SHA-256 hash using the PSA Crypto API
3 *
4 * The example computes the SHA-256 hash of a test string using the
5 * one-shot API call psa_hash_compute() and the using multi-part
6 * operation, which requires psa_hash_setup(), psa_hash_update() and
7 * psa_hash_finish(). The multi-part operation is popular on embedded
8 * devices where a rolling hash needs to be computed.
9 *
10 *
11 * Copyright The Mbed TLS Contributors
12 * SPDX-License-Identifier: Apache-2.0
13 *
14 * Licensed under the Apache License, Version 2.0 (the "License"); you may
15 * not use this file except in compliance with the License.
16 * You may obtain a copy of the License at
17 *
18 * http://www.apache.org/licenses/LICENSE-2.0
19 *
20 * Unless required by applicable law or agreed to in writing, software
21 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
22 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
23 * See the License for the specific language governing permissions and
24 * limitations under the License.
25 */
26
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010027#include "psa/crypto.h"
28#include <string.h>
29#include <stdio.h>
30#include <stdlib.h>
31
32#include "mbedtls/build_info.h"
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010033#include "mbedtls/platform.h"
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010034
Thomas Daubney86f97952023-10-10 16:50:49 +010035/* Information about hashing with the PSA API can be
36 * found here:
37 * https://arm-software.github.io/psa-api/crypto/1.1/api/ops/hashes.html
Thomas Daubney34500872023-10-11 10:04:54 +010038 *
Thomas Daubney86f97952023-10-10 16:50:49 +010039 * The algorithm used by this demo is SHA 256.
Thomas Daubney606110f2023-07-28 15:57:10 +010040 * Please see include/psa/crypto_values.h to see the other
Thomas Daubney86f97952023-10-10 16:50:49 +010041 * algorithms that are supported by Mbed TLS.
42 * If you switch to a different algorithm you will need to update
Thomas Daubney2e677812023-10-12 10:46:43 +010043 * the hash data in the EXAMPLE_HASH_VALUE macro below. */
Thomas Daubney1c2378b2023-10-11 15:19:38 +010044
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010045#if !defined(MBEDTLS_PSA_CRYPTO_C) || !defined(PSA_WANT_ALG_SHA_256)
Thomas Daubney209c9c92023-07-18 14:59:45 +010046int main(void)
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010047{
Thomas Daubney2c872342023-07-28 14:21:38 +010048 mbedtls_printf("MBEDTLS_PSA_CRYPTO_C and PSA_WANT_ALG_SHA_256"
Thomas Daubney9520df72023-07-25 10:56:54 +010049 "not defined.\r\n");
Thomas Daubney209c9c92023-07-18 14:59:45 +010050 return EXIT_SUCCESS;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010051}
52#else
53
Thomas Daubney2e677812023-10-12 10:46:43 +010054#define HASH_ALG PSA_ALG_SHA_256
55
56const uint8_t sample_message[] = "Hello World!";
57/* sample_message is terminated with a null byte which is not part of
58 * the message itself so we make sure to subtract it in order to get
59 * the message length. */
60const size_t sample_message_length = sizeof(sample_message) - 1;
61
62#define EXPECTED_HASH_VALUE { \
63 0x7f, 0x83, 0xb1, 0x65, 0x7f, 0xf1, 0xfc, 0x53, 0xb9, 0x2d, 0xc1, 0x81, \
64 0x48, 0xa1, 0xd6, 0x5d, 0xfc, 0x2d, 0x4b, 0x1f, 0xa3, 0xd6, 0x77, 0x28, \
65 0x4a, 0xdd, 0xd2, 0x00, 0x12, 0x6d, 0x90, 0x69 \
66}
67
68const uint8_t expected_hash[] = EXPECTED_HASH_VALUE;
69const size_t expected_hash_len = sizeof(expected_hash);
70
Thomas Daubney209c9c92023-07-18 14:59:45 +010071int main(void)
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010072{
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010073 psa_status_t status;
Thomas Daubney1db78fa2023-07-24 16:49:14 +010074 uint8_t hash[PSA_HASH_LENGTH(HASH_ALG)];
Thomas Daubney6fc4ca22023-07-28 14:31:06 +010075 size_t hash_length;
Thomas Daubneyc0500372023-07-28 14:44:25 +010076 psa_hash_operation_t hash_operation = PSA_HASH_OPERATION_INIT;
77 psa_hash_operation_t cloned_hash_operation = PSA_HASH_OPERATION_INIT;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010078
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010079 mbedtls_printf("PSA Crypto API: SHA-256 example\n\n");
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010080
Thomas Daubney209c9c92023-07-18 14:59:45 +010081 status = psa_crypto_init();
82 if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010083 mbedtls_printf("psa_crypto_init failed\n");
Thomas Daubney209c9c92023-07-18 14:59:45 +010084 return EXIT_FAILURE;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010085 }
86
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010087 /* Compute hash using multi-part operation */
Thomas Daubneyc0500372023-07-28 14:44:25 +010088 status = psa_hash_setup(&hash_operation, HASH_ALG);
Thomas Daubney2e677812023-10-12 10:46:43 +010089 if (status == PSA_ERROR_NOT_SUPPORTED) {
Thomas Daubney76053882023-10-10 17:38:53 +010090 mbedtls_printf("unknown hash algorithm supplied\n");
91 return EXIT_FAILURE;
Thomas Daubney2e677812023-10-12 10:46:43 +010092 } else if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010093 mbedtls_printf("psa_hash_setup failed\n");
Thomas Daubney209c9c92023-07-18 14:59:45 +010094 return EXIT_FAILURE;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +010095 }
96
Thomas Daubney1c2378b2023-10-11 15:19:38 +010097 status = psa_hash_update(&hash_operation, sample_message, sample_message_length);
Thomas Daubney209c9c92023-07-18 14:59:45 +010098 if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +010099 mbedtls_printf("psa_hash_update failed\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100100 goto cleanup;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100101 }
102
Thomas Daubneyc0500372023-07-28 14:44:25 +0100103 status = psa_hash_clone(&hash_operation, &cloned_hash_operation);
Thomas Daubney209c9c92023-07-18 14:59:45 +0100104 if (status != PSA_SUCCESS) {
Thomas Daubneycd79f772023-10-11 15:28:13 +0100105 mbedtls_printf("PSA hash clone failed\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100106 goto cleanup;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100107 }
108
Thomas Daubneyc0500372023-07-28 14:44:25 +0100109 status = psa_hash_finish(&hash_operation, hash, sizeof(hash), &hash_length);
Thomas Daubney209c9c92023-07-18 14:59:45 +0100110 if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100111 mbedtls_printf("psa_hash_finish failed\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100112 goto cleanup;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100113 }
114
Thomas Daubneyce141242023-07-28 16:14:20 +0100115 /* Check the result of the operation against the sample */
Thomas Daubney2e677812023-10-12 10:46:43 +0100116 if (hash_length != expected_hash_len ||
117 (memcmp(hash, expected_hash, expected_hash_len) != 0)) {
Thomas Daubneyce141242023-07-28 16:14:20 +0100118 mbedtls_printf("Multi-part hash operation gave the wrong result!\n\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100119 goto cleanup;
Thomas Daubneyce141242023-07-28 16:14:20 +0100120 }
121
Thomas Daubney209c9c92023-07-18 14:59:45 +0100122 status =
Thomas Daubney2e677812023-10-12 10:46:43 +0100123 psa_hash_verify(&cloned_hash_operation, expected_hash,
124 expected_hash_len);
Thomas Daubney209c9c92023-07-18 14:59:45 +0100125 if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100126 mbedtls_printf("psa_hash_verify failed\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100127 goto cleanup;
Thomas Daubney209c9c92023-07-18 14:59:45 +0100128 } else {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100129 mbedtls_printf("Multi-part hash operation successful!\n");
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100130 }
131
Thomas Daubney3071c852023-07-28 14:47:47 +0100132 /* Clear local variables prior to one-shot hash demo */
Thomas Daubney209c9c92023-07-18 14:59:45 +0100133 memset(hash, 0, sizeof(hash));
Thomas Daubney6fc4ca22023-07-28 14:31:06 +0100134 hash_length = 0;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100135
Thomas Daubney3071c852023-07-28 14:47:47 +0100136 /* Compute hash using one-shot function call */
Thomas Daubney1db78fa2023-07-24 16:49:14 +0100137 status = psa_hash_compute(HASH_ALG,
Thomas Daubney1c2378b2023-10-11 15:19:38 +0100138 sample_message, sample_message_length,
Thomas Daubney209c9c92023-07-18 14:59:45 +0100139 hash, sizeof(hash),
Thomas Daubney6fc4ca22023-07-28 14:31:06 +0100140 &hash_length);
Thomas Daubney209c9c92023-07-18 14:59:45 +0100141 if (status != PSA_SUCCESS) {
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100142 mbedtls_printf("psa_hash_compute failed\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100143 goto cleanup;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100144 }
145
Thomas Daubney2e677812023-10-12 10:46:43 +0100146 if (hash_length != expected_hash_len ||
147 (memcmp(hash, expected_hash, expected_hash_len) != 0)) {
Thomas Daubneya2b75192023-07-28 15:21:46 +0100148 mbedtls_printf("One-shot hash operation gave the wrong result!\n\n");
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100149 goto cleanup;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100150 }
151
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100152 mbedtls_printf("One-shot hash operation successful!\n\n");
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100153
Thomas Daubney1f987362023-07-28 15:23:06 +0100154 /* Print out result */
Thomas Daubney606110f2023-07-28 15:57:10 +0100155 mbedtls_printf("The SHA-256( '%s' ) is: ", sample_message);
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100156
Thomas Daubney2e677812023-10-12 10:46:43 +0100157 for (size_t j = 0; j < expected_hash_len; j++) {
Thomas Daubney9730cb12023-07-28 15:07:19 +0100158 mbedtls_printf("%02x", hash[j]);
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100159 }
160
Thomas Daubneyf7348ae2023-07-24 12:18:40 +0100161 mbedtls_printf("\n");
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100162
Thomas Daubney209c9c92023-07-18 14:59:45 +0100163 mbedtls_psa_crypto_free();
164 return EXIT_SUCCESS;
Thomas Daubney5c2dcbd2023-08-03 16:03:30 +0100165
166cleanup:
167 psa_hash_abort(&hash_operation);
168 psa_hash_abort(&cloned_hash_operation);
169 return EXIT_FAILURE;
Hannes Tschofenigf8b9ebf2023-07-18 13:46:10 +0100170}
Thomas Daubney2e677812023-10-12 10:46:43 +0100171#endif /* !MBEDTLS_PSA_CRYPTO_C || !PSA_WANT_ALG_SHA_256 */