From eb781d290b82dc5eda0533eaa9af318191f9773a Mon Sep 17 00:00:00 2001 From: Vicki Pfau Date: Sun, 30 Mar 2025 16:44:33 -0700 Subject: [PATCH] Core: Add SHA1 hashing for ROMs --- CHANGES | 1 + include/mgba-util/sha1.h | 33 +++++ include/mgba/core/core.h | 5 - include/mgba/core/interface.h | 6 + src/core/scripting.c | 3 + src/gb/core.c | 10 ++ src/gba/core.c | 14 ++ src/platform/qt/ROMInfo.cpp | 6 + src/platform/qt/ROMInfo.ui | 19 ++- src/util/CMakeLists.txt | 1 + src/util/sha1.c | 258 ++++++++++++++++++++++++++++++++++ src/util/test/hash.c | 92 ++++++++++++ 12 files changed, 442 insertions(+), 6 deletions(-) create mode 100644 include/mgba-util/sha1.h create mode 100644 src/util/sha1.c diff --git a/CHANGES b/CHANGES index 25485133c..2c4e2f0e2 100644 --- a/CHANGES +++ b/CHANGES @@ -37,6 +37,7 @@ Misc: - Core: Improve rumble emulation by averaging state over entire frame (fixes mgba.io/i/3232) - Core: Add MD5 hashing for ROMs - Core: Add support for specifying an arbitrary portable directory + - Core: Add SHA1 hashing for ROMs - FFmpeg: Add Ut Video option - GB: Prevent incompatible BIOSes from being used on differing models - GB Serialize: Add missing savestate support for MBC6 and NT (newer) diff --git a/include/mgba-util/sha1.h b/include/mgba-util/sha1.h new file mode 100644 index 000000000..28c97e75e --- /dev/null +++ b/include/mgba-util/sha1.h @@ -0,0 +1,33 @@ +/* Copyright (c) 2013-2025 Jeffrey Pfau + * + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. + * + * Based on https://github.com/clibs/sha1 + */ +#ifndef SHA1_H +#define SHA1_H + +#include + +CXX_GUARD_START + +struct SHA1Context { + uint32_t state[5]; + uint32_t count[2]; + unsigned char buffer[64]; +}; + +void sha1Init(struct SHA1Context* ctx); +void sha1Update(struct SHA1Context* ctx, const void* input, size_t len); +void sha1Finalize(uint8_t digest[20], struct SHA1Context* ctx); + +void sha1Buffer(const void* input, size_t len, uint8_t* result); + +struct VFile; +bool sha1File(struct VFile* vf, uint8_t* result); + +CXX_GUARD_END + +#endif diff --git a/include/mgba/core/core.h b/include/mgba/core/core.h index 64eda6627..c2951c6c2 100644 --- a/include/mgba/core/core.h +++ b/include/mgba/core/core.h @@ -28,11 +28,6 @@ enum mPlatform { mPLATFORM_GB = 1, }; -enum mCoreChecksumType { - mCHECKSUM_CRC32, - mCHECKSUM_MD5, -}; - struct mAudioBuffer; struct mCoreConfig; struct mCoreSync; diff --git a/include/mgba/core/interface.h b/include/mgba/core/interface.h index 033047cac..2ceaf0bbd 100644 --- a/include/mgba/core/interface.h +++ b/include/mgba/core/interface.h @@ -188,6 +188,12 @@ struct mCoreRegisterInfo { enum mCoreRegisterType type; }; +enum mCoreChecksumType { + mCHECKSUM_CRC32, + mCHECKSUM_MD5, + mCHECKSUM_SHA1, +}; + CXX_GUARD_END #endif diff --git a/src/core/scripting.c b/src/core/scripting.c index 20659f0bc..c87829f75 100644 --- a/src/core/scripting.c +++ b/src/core/scripting.c @@ -353,6 +353,9 @@ static struct mScriptValue* _mScriptCoreChecksum(const struct mCore* core, int t case mCHECKSUM_MD5: size = 16; break; + case mCHECKSUM_SHA1: + size = 20; + break; } if (!size) { return &mScriptValueNull; diff --git a/src/gb/core.c b/src/gb/core.c index a97dd175f..9b0d491ea 100644 --- a/src/gb/core.c +++ b/src/gb/core.c @@ -24,6 +24,7 @@ #include #include #include +#include #include static const struct mCoreChannelInfo _GBVideoLayers[] = { @@ -539,6 +540,15 @@ static void _GBCoreChecksum(const struct mCore* core, void* data, enum mCoreChec md5Buffer("", 0, data); } break; + case mCHECKSUM_SHA1: + if (gb->romVf) { + sha1File(gb->romVf, data); + } else if (gb->memory.rom && gb->isPristine) { + sha1Buffer(gb->memory.rom, gb->pristineRomSize, data); + } else { + sha1Buffer("", 0, data); + } + break; } return; } diff --git a/src/gba/core.c b/src/gba/core.c index 65ec999f2..6c2ffe1f5 100644 --- a/src/gba/core.c +++ b/src/gba/core.c @@ -31,6 +31,7 @@ #include #endif #include +#include #include #include #include @@ -701,6 +702,19 @@ static void _GBACoreChecksum(const struct mCore* core, void* data, enum mCoreChe md5Buffer("", 0, data); } break; + case mCHECKSUM_SHA1: + if (gba->romVf) { + sha1File(gba->romVf, data); + } else if (gba->mbVf) { + sha1File(gba->mbVf, data); + } else if (gba->memory.rom && gba->isPristine) { + sha1Buffer(gba->memory.rom, gba->pristineRomSize, data); + } else if (gba->memory.rom) { + sha1Buffer(gba->memory.rom, gba->memory.romSize, data); + } else { + sha1Buffer("", 0, data); + } + break; } return; } diff --git a/src/platform/qt/ROMInfo.cpp b/src/platform/qt/ROMInfo.cpp index 25aafeda8..40760dccf 100644 --- a/src/platform/qt/ROMInfo.cpp +++ b/src/platform/qt/ROMInfo.cpp @@ -25,6 +25,7 @@ ROMInfo::ROMInfo(std::shared_ptr controller, QWidget* parent) #endif uint32_t crc32 = 0; uint8_t md5[16]{}; + uint8_t sha1[20]{}; CoreController::Interrupter interrupter(controller); mCore* core = controller->thread()->core; @@ -41,6 +42,7 @@ ROMInfo::ROMInfo(std::shared_ptr controller, QWidget* parent) core->checksum(core, &crc32, mCHECKSUM_CRC32); core->checksum(core, &md5, mCHECKSUM_MD5); + core->checksum(core, &sha1, mCHECKSUM_SHA1); m_ui.size->setText(QString::number(core->romSize(core)) + tr(" bytes")); @@ -69,6 +71,10 @@ ROMInfo::ROMInfo(std::shared_ptr controller, QWidget* parent) md5[0x0], md5[0x1], md5[0x2], md5[0x3], md5[0x4], md5[0x5], md5[0x6], md5[0x7], md5[0x8], md5[0x9], md5[0xA], md5[0xB], md5[0xC], md5[0xD], md5[0xE], md5[0xF])); + m_ui.sha1->setText(QString::asprintf("%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", + sha1[ 0], sha1[ 1], sha1[ 2], sha1[ 3], sha1[ 4], sha1[ 5], sha1[ 6], sha1[ 7], sha1[ 8], sha1[ 9], + sha1[10], sha1[11], sha1[12], sha1[13], sha1[14], sha1[15], sha1[16], sha1[17], sha1[18], sha1[19])); + QString savePath = controller->savePath(); if (!savePath.isEmpty()) { m_ui.savefile->setText(savePath); diff --git a/src/platform/qt/ROMInfo.ui b/src/platform/qt/ROMInfo.ui index a4a179ca8..f6ba67398 100644 --- a/src/platform/qt/ROMInfo.ui +++ b/src/platform/qt/ROMInfo.ui @@ -95,13 +95,30 @@ + + + SHA-1 + + + + + + + {SHA1} + + + Qt::LinksAccessibleByMouse|Qt::TextSelectableByKeyboard|Qt::TextSelectableByMouse + + + + Save file: - + {SAVEFILE} diff --git a/src/util/CMakeLists.txt b/src/util/CMakeLists.txt index 2f4ba2dcd..8009f5ad2 100644 --- a/src/util/CMakeLists.txt +++ b/src/util/CMakeLists.txt @@ -7,6 +7,7 @@ set(BASE_SOURCE_FILES gbk-table.c hash.c md5.c + sha1.c string.c table.c vector.c diff --git a/src/util/sha1.c b/src/util/sha1.c new file mode 100644 index 000000000..7e238e8bc --- /dev/null +++ b/src/util/sha1.c @@ -0,0 +1,258 @@ +/* Copyright (c) 2013-2025 Jeffrey Pfau + * + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. + * + * Based on https://github.com/clibs/sha1 + * + * Test Vectors (from FIPS PUB 180-1) + * "abc" + * A9993E36 4706816A BA3E2571 7850C26C 9CD0D89D + * "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq" + * 84983E44 1C3BD26E BAAE4AA1 F95129E5 E54670F1 + * A million repetitions of "a" + * 34AA973C D4C4DAA4 F61EEB2B DBAD2731 6534016F + */ +#include + +#include + +/* #define SHA1HANDSOFF * Copies data before messing with it. */ + +#define SHA1HANDSOFF + +#define rol(value, bits) (((value) << (bits)) | ((value) >> (32 - (bits)))) + +/* blk0() and blk() perform the initial expand. */ +/* I got the idea of expanding during the round function from SSLeay */ +#ifndef __BIG_ENDIAN__ +#define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ + |(rol(block->l[i],8)&0x00FF00FF)) +#else +#define blk0(i) block->l[i] +#endif +#define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ + ^block->l[(i+2)&15]^block->l[i&15],1)) + +/* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ +#define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); +#define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); +#define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); +#define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); +#define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30); + +/* Hash a single 512-bit block. This is the core of the algorithm. */ +static void sha1Transform(uint32_t state[5], const uint8_t buffer[64]) { + uint32_t a, b, c, d, e; + + typedef union { + unsigned char c[64]; + uint32_t l[16]; + } CHAR64LONG16; + +#ifdef SHA1HANDSOFF + CHAR64LONG16 block[1]; /* use array to appear as a pointer */ + + memcpy(block, buffer, 64); +#else + /* The following had better never be used because it causes the + * pointer-to-const buffer to be cast into a pointer to non-const. + * And the result is written through. I threw a "const" in, hoping + * this will cause a diagnostic. + */ + CHAR64LONG16 *block = (const CHAR64LONG16 *) buffer; +#endif + /* Copy context->state[] to working vars */ + a = state[0]; + b = state[1]; + c = state[2]; + d = state[3]; + e = state[4]; + /* 4 rounds of 20 operations each. Loop unrolled. */ + R0(a, b, c, d, e, 0); + R0(e, a, b, c, d, 1); + R0(d, e, a, b, c, 2); + R0(c, d, e, a, b, 3); + R0(b, c, d, e, a, 4); + R0(a, b, c, d, e, 5); + R0(e, a, b, c, d, 6); + R0(d, e, a, b, c, 7); + R0(c, d, e, a, b, 8); + R0(b, c, d, e, a, 9); + R0(a, b, c, d, e, 10); + R0(e, a, b, c, d, 11); + R0(d, e, a, b, c, 12); + R0(c, d, e, a, b, 13); + R0(b, c, d, e, a, 14); + R0(a, b, c, d, e, 15); + R1(e, a, b, c, d, 16); + R1(d, e, a, b, c, 17); + R1(c, d, e, a, b, 18); + R1(b, c, d, e, a, 19); + R2(a, b, c, d, e, 20); + R2(e, a, b, c, d, 21); + R2(d, e, a, b, c, 22); + R2(c, d, e, a, b, 23); + R2(b, c, d, e, a, 24); + R2(a, b, c, d, e, 25); + R2(e, a, b, c, d, 26); + R2(d, e, a, b, c, 27); + R2(c, d, e, a, b, 28); + R2(b, c, d, e, a, 29); + R2(a, b, c, d, e, 30); + R2(e, a, b, c, d, 31); + R2(d, e, a, b, c, 32); + R2(c, d, e, a, b, 33); + R2(b, c, d, e, a, 34); + R2(a, b, c, d, e, 35); + R2(e, a, b, c, d, 36); + R2(d, e, a, b, c, 37); + R2(c, d, e, a, b, 38); + R2(b, c, d, e, a, 39); + R3(a, b, c, d, e, 40); + R3(e, a, b, c, d, 41); + R3(d, e, a, b, c, 42); + R3(c, d, e, a, b, 43); + R3(b, c, d, e, a, 44); + R3(a, b, c, d, e, 45); + R3(e, a, b, c, d, 46); + R3(d, e, a, b, c, 47); + R3(c, d, e, a, b, 48); + R3(b, c, d, e, a, 49); + R3(a, b, c, d, e, 50); + R3(e, a, b, c, d, 51); + R3(d, e, a, b, c, 52); + R3(c, d, e, a, b, 53); + R3(b, c, d, e, a, 54); + R3(a, b, c, d, e, 55); + R3(e, a, b, c, d, 56); + R3(d, e, a, b, c, 57); + R3(c, d, e, a, b, 58); + R3(b, c, d, e, a, 59); + R4(a, b, c, d, e, 60); + R4(e, a, b, c, d, 61); + R4(d, e, a, b, c, 62); + R4(c, d, e, a, b, 63); + R4(b, c, d, e, a, 64); + R4(a, b, c, d, e, 65); + R4(e, a, b, c, d, 66); + R4(d, e, a, b, c, 67); + R4(c, d, e, a, b, 68); + R4(b, c, d, e, a, 69); + R4(a, b, c, d, e, 70); + R4(e, a, b, c, d, 71); + R4(d, e, a, b, c, 72); + R4(c, d, e, a, b, 73); + R4(b, c, d, e, a, 74); + R4(a, b, c, d, e, 75); + R4(e, a, b, c, d, 76); + R4(d, e, a, b, c, 77); + R4(c, d, e, a, b, 78); + R4(b, c, d, e, a, 79); + /* Add the working vars back into context.state[] */ + state[0] += a; + state[1] += b; + state[2] += c; + state[3] += d; + state[4] += e; + /* Wipe variables */ + a = b = c = d = e = 0; +#ifdef SHA1HANDSOFF + memset(block, '\0', sizeof(block)); +#endif +} + +/* shaInit - Initialize new context */ +void sha1Init(struct SHA1Context* context) { + /* SHA1 initialization constants */ + context->state[0] = 0x67452301; + context->state[1] = 0xEFCDAB89; + context->state[2] = 0x98BADCFE; + context->state[3] = 0x10325476; + context->state[4] = 0xC3D2E1F0; + context->count[0] = context->count[1] = 0; +} + +/* Run your data through this. */ +void sha1Update(struct SHA1Context* context, const void* data, size_t len) { + size_t i; + size_t j; + + j = context->count[0]; + if ((context->count[0] += len << 3) < j) { + ++context->count[1]; + } + context->count[1] += (len >> 29); + j = (j >> 3) & 63; + if ((j + len) > 63) { + memcpy(&context->buffer[j], data, (i = 64 - j)); + sha1Transform(context->state, context->buffer); + for (; i + 63 < len; i += 64) { + sha1Transform(context->state, &((uint8_t*) data)[i]); + } + j = 0; + } else { + i = 0; + } + memcpy(&context->buffer[j], &((uint8_t*) data)[i], len - i); +} + +/* Add padding and return the message digest. */ +void sha1Finalize(uint8_t digest[20], struct SHA1Context* context) { + unsigned i; + uint8_t finalcount[8]; + uint8_t c; + + for (i = 0; i < 8; ++i) { + finalcount[i] = (uint8_t) ((context->count[(i >= 4 ? 0 : 1)] >> ((3 - (i & 3)) * 8)) & 255); /* Endian independent */ + } + c = 0200; + sha1Update(context, &c, 1); + while ((context->count[0] & 504) != 448) { + c = 0000; + sha1Update(context, &c, 1); + } + sha1Update(context, finalcount, 8); /* Should cause a SHA1Transform() */ + for (i = 0; i < 20; ++i) { + digest[i] = (uint8_t) ((context->state[i >> 2] >> ((3 - (i & 3)) * 8)) & 255); + } + /* Wipe variables */ + memset(context, '\0', sizeof(*context)); + memset(&finalcount, '\0', sizeof(finalcount)); +} + +void sha1Buffer(const void* input, size_t len, uint8_t* result) { + struct SHA1Context ctx; + size_t i; + + sha1Init(&ctx); + for (i = 0; i + 63 < len; i += 64) { + sha1Update(&ctx, &((const uint8_t*) input)[i], 64); + } + for (; i < len; ++i) { + sha1Update(&ctx, &((const uint8_t*) input)[i], 1); + } + sha1Finalize(result, &ctx); +} + +bool sha1File(struct VFile* vf, uint8_t* result) { + struct SHA1Context ctx; + uint8_t buffer[2048]; + sha1Init(&ctx); + + ssize_t read; + ssize_t position = vf->seek(vf, 0, SEEK_CUR); + if (vf->seek(vf, 0, SEEK_SET) < 0) { + return false; + } + while ((read = vf->read(vf, buffer, sizeof(buffer))) > 0) { + sha1Update(&ctx, buffer, read); + } + vf->seek(vf, position, SEEK_SET); + if (read < 0) { + return false; + } + sha1Finalize(result, &ctx); + return true; +} diff --git a/src/util/test/hash.c b/src/util/test/hash.c index 6d014435b..27bb8a0bd 100644 --- a/src/util/test/hash.c +++ b/src/util/test/hash.c @@ -7,6 +7,7 @@ #include #include +#include M_TEST_DEFINE(emptyCrc32) { uint8_t buffer[1] = {0}; @@ -115,6 +116,92 @@ M_TEST_DEFINE(twoBlockMd5) { }), 16); } +M_TEST_DEFINE(emptySha1) { + uint8_t buffer[1] = {0}; + uint8_t digest[20] = {0}; + sha1Buffer(buffer, 0, digest); + assert_memory_equal(digest, ((uint8_t[]) { + 0xDA, 0x39, 0xA3, 0xEE, 0x5E, 0x6B, 0x4B, 0x0D, 0x32, 0x55, + 0xBF, 0xEF, 0x95, 0x60, 0x18, 0x90, 0xAF, 0xD8, 0x07, 0x09 + }), 16); +} + +M_TEST_DEFINE(newlineSha1) { + uint8_t buffer[1] = { '\n' }; + uint8_t digest[20] = {0}; + sha1Buffer(buffer, 1, digest); + assert_memory_equal(digest, ((uint8_t[]) { + 0xAD, 0xC8, 0x3B, 0x19, 0xE7, 0x93, 0x49, 0x1B, 0x1C, 0x6E, + 0xA0, 0xFD, 0x8B, 0x46, 0xCD, 0x9F, 0x32, 0xE5, 0x92, 0xFC + }), 20); +} + +M_TEST_DEFINE(fullBlockSha1) { + uint8_t buffer[64] = { + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + }; + uint8_t digest[20] = {0}; + sha1Buffer(buffer, 64, digest); + assert_memory_equal(digest, ((uint8_t[]) { + 0xCB, 0x4D, 0xD3, 0xDA, 0xCA, 0x2D, 0x6F, 0x25, 0x44, 0xBC, + 0x0D, 0xAA, 0x6B, 0xEB, 0xB7, 0x8A, 0xED, 0x0B, 0xD0, 0x34 + }), 20); +} + +M_TEST_DEFINE(overflowBlockSha1) { + uint8_t buffer[65] = { + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x0a, + }; + uint8_t digest[20] = {0}; + sha1Buffer(buffer, 65, digest); + assert_memory_equal(digest, ((uint8_t[]) { + 0xA3, 0x96, 0x68, 0x5E, 0xF7, 0x73, 0x87, 0x13, 0x2C, 0x43, + 0x64, 0x42, 0x2D, 0x16, 0x65, 0x39, 0x65, 0x6F, 0xB8, 0x93 + }), 20); +} + +M_TEST_DEFINE(twoBlockSha1) { + uint8_t buffer[128] = { + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, + }; + uint8_t digest[20] = {0}; + sha1Buffer(buffer, 128, digest); + assert_memory_equal(digest, ((uint8_t[]) { + 0xFF, 0xB5, 0xE5, 0xD9, 0x6E, 0x19, 0x71, 0x4F, 0xFE, 0xF6, + 0x0A, 0xC8, 0x74, 0x9E, 0xCA, 0xEF, 0xBE, 0xC9, 0xD2, 0x95 + }), 20); +} + M_TEST_SUITE_DEFINE(Hashes, cmocka_unit_test(emptyCrc32), cmocka_unit_test(newlineCrc32), @@ -127,4 +214,9 @@ M_TEST_SUITE_DEFINE(Hashes, cmocka_unit_test(fullBlockMd5), cmocka_unit_test(overflowBlockMd5), cmocka_unit_test(twoBlockMd5), + cmocka_unit_test(emptySha1), + cmocka_unit_test(newlineSha1), + cmocka_unit_test(fullBlockSha1), + cmocka_unit_test(overflowBlockSha1), + cmocka_unit_test(twoBlockSha1), )