mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
Merge branch 'bugfix/sha_dma_mode_incorrect_result_v4.4' into 'release/v4.4'
fix(sha): DMA mode iteration calculation issue for certain data lengths (v4.4) See merge request espressif/esp-idf!25129
This commit is contained in:
commit
ab260561ab
@ -215,7 +215,6 @@ int esp_sha_dma(esp_sha_type sha_type, const void *input, uint32_t ilen,
|
||||
{
|
||||
int ret = 0;
|
||||
unsigned char *dma_cap_buf = NULL;
|
||||
int dma_op_num = ( ilen / (SOC_SHA_DMA_MAX_BUFFER_SIZE + 1) ) + 1;
|
||||
|
||||
if (buf_len > block_length(sha_type)) {
|
||||
ESP_LOGE(TAG, "SHA DMA buf_len cannot exceed max size for a single block");
|
||||
@ -249,6 +248,16 @@ int esp_sha_dma(esp_sha_type sha_type, const void *input, uint32_t ilen,
|
||||
buf = dma_cap_buf;
|
||||
}
|
||||
|
||||
uint32_t dma_op_num;
|
||||
|
||||
if (ilen > 0) {
|
||||
/* Number of DMA operations based on maximum chunk size in single operation */
|
||||
dma_op_num = (ilen + SOC_SHA_DMA_MAX_BUFFER_SIZE - 1) / SOC_SHA_DMA_MAX_BUFFER_SIZE;
|
||||
} else {
|
||||
/* For zero input length, we must allow at-least 1 DMA operation to see
|
||||
* if there is any pending data that is yet to be copied out */
|
||||
dma_op_num = 1;
|
||||
}
|
||||
|
||||
/* The max amount of blocks in a single hardware operation is 2^6 - 1 = 63
|
||||
Thus we only do a single DMA input list + dma buf list,
|
||||
|
@ -510,6 +510,40 @@ TEST_CASE("mbedtls SHA256 PSRAM DMA", "[mbedtls]")
|
||||
TEST_ASSERT_EQUAL_STRING(expected_hash, hash_str);
|
||||
|
||||
}
|
||||
|
||||
#if SOC_SHA_SUPPORT_DMA
|
||||
TEST_CASE("mbedtls SHA256 PSRAM DMA large buffer", "[hw_crypto]")
|
||||
{
|
||||
mbedtls_sha256_context sha256_ctx;
|
||||
unsigned char sha256[32];
|
||||
|
||||
const size_t SZ = 257984; // specific size to cover issue in https://github.com/espressif/esp-idf/issues/11915
|
||||
void *buffer = heap_caps_malloc(SZ, MALLOC_CAP_8BIT | MALLOC_CAP_SPIRAM);
|
||||
TEST_ASSERT_NOT_NULL(buffer);
|
||||
memset(buffer, 0x55, SZ);
|
||||
|
||||
mbedtls_sha256_init(&sha256_ctx);
|
||||
int r = mbedtls_sha256_starts(&sha256_ctx, false);
|
||||
TEST_ASSERT_EQUAL(0, r);
|
||||
r = mbedtls_sha256_update(&sha256_ctx, buffer, SZ);
|
||||
TEST_ASSERT_EQUAL(0, r);
|
||||
r = mbedtls_sha256_finish(&sha256_ctx, sha256);
|
||||
TEST_ASSERT_EQUAL(0, r);
|
||||
mbedtls_sha256_free(&sha256_ctx);
|
||||
free(buffer);
|
||||
|
||||
/* Check the result. Reference value can be calculated using:
|
||||
* dd if=/dev/zero bs=257984 count=1 | tr '\000' '\125' | sha256sum
|
||||
*/
|
||||
const char *expected_hash = "f2330c9f81ff1c8f0515247faa82be8b6f9685601de6f5dae79172766f136c33";
|
||||
|
||||
char hash_str[sizeof(sha256) * 2 + 1];
|
||||
utils_bin2hex(hash_str, sizeof(hash_str), sha256, sizeof(sha256));
|
||||
|
||||
TEST_ASSERT_EQUAL_STRING(expected_hash, hash_str);
|
||||
}
|
||||
#endif // SOC_SHA_SUPPORT_DMA
|
||||
|
||||
#endif //CONFIG_SPIRAM_USE_MALLOC
|
||||
|
||||
#if CONFIG_ESP_SYSTEM_RTC_FAST_MEM_AS_HEAP_DEPCHECK
|
||||
|
Loading…
Reference in New Issue
Block a user