|  | /* BEGIN_HEADER */ | 
|  | #include "mbedtls/chacha20.h" | 
|  | /* END_HEADER */ | 
|  |  | 
|  | /* BEGIN_DEPENDENCIES | 
|  | * depends_on:MBEDTLS_CHACHA20_C | 
|  | * END_DEPENDENCIES | 
|  | */ | 
|  |  | 
|  | /* BEGIN_CASE */ | 
|  | void chacha20_crypt( data_t *key_str, | 
|  | data_t *nonce_str, | 
|  | int counter, | 
|  | data_t *src_str, | 
|  | data_t *expected_output_str ) | 
|  | { | 
|  | unsigned char output[375]; | 
|  | mbedtls_chacha20_context ctx; | 
|  |  | 
|  | /* | 
|  | * Buffers to store the ASCII string representation of output and | 
|  | * expected_output_str. | 
|  | */ | 
|  | unsigned char output_string[751] = { '\0' }; | 
|  | unsigned char expected_output_string[751] = { '\0' }; | 
|  |  | 
|  | memset( output, 0x00, sizeof( output ) ); | 
|  |  | 
|  | TEST_ASSERT( src_str->len   == expected_output_str->len ); | 
|  | TEST_ASSERT( key_str->len   == 32U ); | 
|  | TEST_ASSERT( nonce_str->len == 12U ); | 
|  |  | 
|  | /* | 
|  | * Test the integrated API | 
|  | */ | 
|  | TEST_ASSERT( mbedtls_chacha20_crypt( key_str->x, nonce_str->x, counter, src_str->len, src_str->x, output ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( expected_output_string, | 
|  | expected_output_str->x, | 
|  | expected_output_str->len); | 
|  | mbedtls_test_hexify( output_string, output, src_str->len ); | 
|  | TEST_ASSERT( strcmp( (char *)output_string, | 
|  | (char *)expected_output_string ) == 0 ); | 
|  |  | 
|  | /* | 
|  | * Test the streaming API | 
|  | */ | 
|  | mbedtls_chacha20_init( &ctx ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str->x ) == 0 ); | 
|  |  | 
|  | TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); | 
|  |  | 
|  | memset( output, 0x00, sizeof( output ) ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len, src_str->x, output ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( output_string, output, src_str->len ); | 
|  | TEST_ASSERT( strcmp( (char *)output_string, | 
|  | (char *)expected_output_string ) == 0 ); | 
|  |  | 
|  | /* | 
|  | * Test the streaming API again, piecewise | 
|  | */ | 
|  |  | 
|  | /* Don't free/init the context nor set the key again, | 
|  | * in order to test that starts() does the right thing. */ | 
|  | TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); | 
|  |  | 
|  | memset( output, 0x00, sizeof( output ) ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str->x, output ) == 0 ); | 
|  | TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len - 1, | 
|  | src_str->x + 1, output + 1 ) == 0 ); | 
|  |  | 
|  | mbedtls_test_hexify( output_string, output, src_str->len ); | 
|  | TEST_ASSERT( strcmp( (char *)output_string, | 
|  | (char *)expected_output_string ) == 0 ); | 
|  |  | 
|  | mbedtls_chacha20_free( &ctx ); | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ | 
|  | void chacha20_bad_params() | 
|  | { | 
|  | unsigned char key[32]; | 
|  | unsigned char nonce[12]; | 
|  | unsigned char src[1]; | 
|  | unsigned char dst[1]; | 
|  | uint32_t counter = 0; | 
|  | size_t len = sizeof( src ); | 
|  | mbedtls_chacha20_context ctx; | 
|  |  | 
|  | TEST_INVALID_PARAM( mbedtls_chacha20_init( NULL ) ); | 
|  | TEST_VALID_PARAM( mbedtls_chacha20_free( NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_setkey( NULL, key ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_setkey( &ctx, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_starts( NULL, nonce, counter ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_starts( &ctx, NULL, counter ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( NULL, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( &ctx, len, NULL, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_update( &ctx, len, src, NULL ) ); | 
|  |  | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst ) ); | 
|  | TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, | 
|  | mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL ) ); | 
|  |  | 
|  | exit: | 
|  | return; | 
|  |  | 
|  | } | 
|  | /* END_CASE */ | 
|  |  | 
|  | /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ | 
|  | void chacha20_self_test() | 
|  | { | 
|  | TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 ); | 
|  | } | 
|  | /* END_CASE */ |