|  | /* BEGIN_HEADER */ | 
|  | #include "mbedtls/chacha20.h" | 
|  | /* END_HEADER */ | 
|  |  | 
|  | /* BEGIN_DEPENDENCIES | 
|  | * depends_on:MBEDTLS_CHACHA20_C | 
|  | * END_DEPENDENCIES | 
|  | */ | 
|  |  | 
|  | /* BEGIN_CASE */ | 
|  | void chacha20_crypt( char *hex_key_string, | 
|  | char *hex_nonce_string, | 
|  | int counter, | 
|  | char *hex_src_string, | 
|  | char *hex_dst_string ) | 
|  | { | 
|  | unsigned char key_str[32]; /* size set by the standard */ | 
|  | unsigned char nonce_str[12]; /* size set by the standard */ | 
|  | unsigned char src_str[375]; /* max size of binary input */ | 
|  | unsigned char dst_str[751]; /* hex expansion of the above */ | 
|  | unsigned char output[751]; | 
|  | size_t key_len; | 
|  | size_t nonce_len; | 
|  | size_t src_len; | 
|  | size_t dst_len; | 
|  | mbedtls_chacha20_context ctx; | 
|  |  | 
|  | memset( key_str,    0x00, sizeof( key_str ) ); | 
|  | memset( nonce_str,  0x00, sizeof( nonce_str ) ); | 
|  | memset( src_str,    0x00, sizeof( src_str ) ); | 
|  | memset( dst_str,    0x00, sizeof( dst_str ) ); | 
|  | memset( output,     0x00, sizeof( output ) ); | 
|  |  | 
|  | key_len   = mbedtls_test_unhexify( key_str, hex_key_string ); | 
|  | nonce_len = mbedtls_test_unhexify( nonce_str, hex_nonce_string ); | 
|  | src_len   = mbedtls_test_unhexify( src_str, hex_src_string ); | 
|  | dst_len   = mbedtls_test_unhexify( dst_str, hex_dst_string ); | 
|  |  | 
|  | TEST_ASSERT( src_len   == dst_len ); | 
|  | TEST_ASSERT( key_len   == 32U ); | 
|  | TEST_ASSERT( nonce_len == 12U ); | 
|  |  | 
|  | /* | 
|  | * Test the integrated API | 
|  | */ | 
|  | TEST_ASSERT( mbedtls_chacha20_crypt( key_str, nonce_str, counter, src_len, src_str, output ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( dst_str, output, src_len ); | 
|  | TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 ); | 
|  |  | 
|  | /* | 
|  | * Test the streaming API | 
|  | */ | 
|  | mbedtls_chacha20_init( &ctx ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str, counter ) == 0 ); | 
|  |  | 
|  | memset( output, 0x00, sizeof( output ) ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_len, src_str, output ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( dst_str, output, src_len ); | 
|  | TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 ); | 
|  |  | 
|  | /* | 
|  | * Test the streaming API again, piecewise | 
|  | */ | 
|  |  | 
|  | /* Don't free/init the context nor set the key again, | 
|  | * in order to test that starts() does the right thing. */ | 
|  | TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str, counter ) == 0 ); | 
|  |  | 
|  | memset( output, 0x00, sizeof( output ) ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str, output ) == 0 ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_len - 1, src_str + 1, output + 1 ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( dst_str, output, src_len ); | 
|  | TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 ); | 
|  |  | 
|  | mbedtls_chacha20_free( &ctx ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ | 
|  | void chacha20_bad_params() | 
|  | { | 
|  | unsigned char key[32]; | 
|  | unsigned char nonce[12]; | 
|  | unsigned char src[1]; | 
|  | unsigned char dst[1]; | 
|  | uint32_t counter = 0; | 
|  | size_t len = sizeof( src ); | 
|  | mbedtls_chacha20_context ctx; | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_chacha20_init( NULL ) ); | 
|  | TEST_VALID_PARAM( mbedtls_chacha20_free( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_setkey( NULL, key ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_setkey( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_starts( NULL, nonce, counter ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_starts( &ctx, NULL, counter ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( NULL, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( &ctx, len, NULL, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( &ctx, len, src, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL ) ); | 
|  |  | 
|  | exit: | 
|  | return; | 
|  |  | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ | 
|  | void chacha20_self_test() | 
|  | { | 
|  | TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ |