| /* BEGIN_HEADER */ |
| #include "mbedtls/chacha20.h" |
| /* END_HEADER */ |
| |
| /* BEGIN_DEPENDENCIES |
| * depends_on:MBEDTLS_CHACHA20_C |
| * END_DEPENDENCIES |
| */ |
| |
| /* BEGIN_CASE */ |
| void chacha20_crypt( data_t *key_str, |
| data_t *nonce_str, |
| int counter, |
| data_t *src_str, |
| data_t *expected_output_str ) |
| { |
| unsigned char output[375]; |
| mbedtls_chacha20_context ctx; |
| |
| /* |
| * Buffers to store the ASCII string representation of output and |
| * expected_output_str. |
| */ |
| unsigned char output_string[751] = { '\0' }; |
| unsigned char expected_output_string[751] = { '\0' }; |
| |
| memset( output, 0x00, sizeof( output ) ); |
| |
| TEST_ASSERT( src_str->len == expected_output_str->len ); |
| TEST_ASSERT( key_str->len == 32U ); |
| TEST_ASSERT( nonce_str->len == 12U ); |
| |
| /* |
| * Test the integrated API |
| */ |
| TEST_ASSERT( mbedtls_chacha20_crypt( key_str->x, nonce_str->x, counter, src_str->len, src_str->x, output ) == 0 ); |
| |
| mbedtls_test_hexify( expected_output_string, |
| expected_output_str->x, |
| expected_output_str->len); |
| mbedtls_test_hexify( output_string, output, src_str->len ); |
| TEST_ASSERT( strcmp( (char *)output_string, |
| (char *)expected_output_string ) == 0 ); |
| |
| /* |
| * Test the streaming API |
| */ |
| mbedtls_chacha20_init( &ctx ); |
| |
| TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str->x ) == 0 ); |
| |
| TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); |
| |
| memset( output, 0x00, sizeof( output ) ); |
| TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len, src_str->x, output ) == 0 ); |
| |
| mbedtls_test_hexify( output_string, output, src_str->len ); |
| TEST_ASSERT( strcmp( (char *)output_string, |
| (char *)expected_output_string ) == 0 ); |
| |
| /* |
| * Test the streaming API again, piecewise |
| */ |
| |
| /* Don't free/init the context nor set the key again, |
| * in order to test that starts() does the right thing. */ |
| TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); |
| |
| memset( output, 0x00, sizeof( output ) ); |
| TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str->x, output ) == 0 ); |
| TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len - 1, |
| src_str->x + 1, output + 1 ) == 0 ); |
| |
| mbedtls_test_hexify( output_string, output, src_str->len ); |
| TEST_ASSERT( strcmp( (char *)output_string, |
| (char *)expected_output_string ) == 0 ); |
| |
| mbedtls_chacha20_free( &ctx ); |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ |
| void chacha20_bad_params() |
| { |
| unsigned char key[32]; |
| unsigned char nonce[12]; |
| unsigned char src[1]; |
| unsigned char dst[1]; |
| uint32_t counter = 0; |
| size_t len = sizeof( src ); |
| mbedtls_chacha20_context ctx; |
| |
| TEST_INVALID_PARAM( mbedtls_chacha20_init( NULL ) ); |
| TEST_VALID_PARAM( mbedtls_chacha20_free( NULL ) ); |
| |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_setkey( NULL, key ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_setkey( &ctx, NULL ) ); |
| |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_starts( NULL, nonce, counter ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_starts( &ctx, NULL, counter ) ); |
| |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_update( NULL, 0, src, dst ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_update( &ctx, len, NULL, dst ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_update( &ctx, len, src, NULL ) ); |
| |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst ) ); |
| TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, |
| mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL ) ); |
| |
| exit: |
| return; |
| |
| } |
| /* END_CASE */ |
| |
| /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ |
| void chacha20_self_test() |
| { |
| TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 ); |
| } |
| /* END_CASE */ |