/* BEGIN_HEADER */ #include "mbedtls/chacha20.h" /* END_HEADER */ /* BEGIN_DEPENDENCIES * depends_on:MBEDTLS_CHACHA20_C * END_DEPENDENCIES */ /* BEGIN_CASE */ void chacha20_crypt(data_t *key_str, data_t *nonce_str, int counter, data_t *src_str, data_t *expected_output_str) { unsigned char output[375]; mbedtls_chacha20_context ctx; memset(output, 0x00, sizeof(output)); TEST_ASSERT(src_str->len == expected_output_str->len); TEST_ASSERT(key_str->len == 32U); TEST_ASSERT(nonce_str->len == 12U); /* * Test the integrated API */ TEST_ASSERT(mbedtls_chacha20_crypt(key_str->x, nonce_str->x, counter, src_str->len, src_str->x, output) == 0); TEST_MEMORY_COMPARE(output, expected_output_str->len, expected_output_str->x, expected_output_str->len); /* * Test the streaming API */ mbedtls_chacha20_init(&ctx); TEST_ASSERT(mbedtls_chacha20_setkey(&ctx, key_str->x) == 0); TEST_ASSERT(mbedtls_chacha20_starts(&ctx, nonce_str->x, counter) == 0); memset(output, 0x00, sizeof(output)); TEST_ASSERT(mbedtls_chacha20_update(&ctx, src_str->len, src_str->x, output) == 0); TEST_MEMORY_COMPARE(output, expected_output_str->len, expected_output_str->x, expected_output_str->len); /* * Test the streaming API again, piecewise */ /* Don't free/init the context nor set the key again, * in order to test that starts() does the right thing. */ TEST_ASSERT(mbedtls_chacha20_starts(&ctx, nonce_str->x, counter) == 0); memset(output, 0x00, sizeof(output)); TEST_ASSERT(mbedtls_chacha20_update(&ctx, 1, src_str->x, output) == 0); TEST_ASSERT(mbedtls_chacha20_update(&ctx, src_str->len - 1, src_str->x + 1, output + 1) == 0); TEST_MEMORY_COMPARE(output, expected_output_str->len, expected_output_str->x, expected_output_str->len); mbedtls_chacha20_free(&ctx); } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ void chacha20_bad_params() { unsigned char key[32]; unsigned char nonce[12]; unsigned char src[1]; unsigned char dst[1]; uint32_t counter = 0; size_t len = sizeof(src); mbedtls_chacha20_context ctx; TEST_INVALID_PARAM(mbedtls_chacha20_init(NULL)); TEST_VALID_PARAM(mbedtls_chacha20_free(NULL)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_setkey(NULL, key)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_setkey(&ctx, NULL)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_starts(NULL, nonce, counter)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_starts(&ctx, NULL, counter)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_update(NULL, 0, src, dst)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_update(&ctx, len, NULL, dst)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_update(&ctx, len, src, NULL)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_crypt(NULL, nonce, counter, 0, src, dst)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_crypt(key, NULL, counter, 0, src, dst)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_crypt(key, nonce, counter, len, NULL, dst)); TEST_INVALID_PARAM_RET(MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, mbedtls_chacha20_crypt(key, nonce, counter, len, src, NULL)); exit: return; } /* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ void chacha20_self_test() { TEST_ASSERT(mbedtls_chacha20_self_test(1) == 0); } /* END_CASE */