2023-11-10 11:21:17 +01:00
|
|
|
/* BEGIN_HEADER */
|
|
|
|
#include "block_cipher_internal.h"
|
|
|
|
|
|
|
|
#define BLOCK_SIZE 16
|
2023-11-10 11:52:10 +01:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_AES_C)
|
|
|
|
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_AES
|
|
|
|
#define BADKEY_ERROR MBEDTLS_ERR_AES_INVALID_KEY_LENGTH
|
|
|
|
#elif defined(MBEDTLS_ARIA_C)
|
|
|
|
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_ARIA
|
|
|
|
#define BADKEY_ERROR MBEDTLS_ERR_ARIA_BAD_INPUT_DATA
|
|
|
|
#elif defined(MBEDTLS_CAMELLIA_C)
|
|
|
|
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_CAMELLIA
|
|
|
|
#define BADKEY_ERROR MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA
|
|
|
|
#else
|
|
|
|
#undef VALID_CIPHER_ID
|
|
|
|
#endif
|
2023-11-10 11:21:17 +01:00
|
|
|
/* END_HEADER */
|
|
|
|
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
|
|
* depends_on:MBEDTLS_BLOCK_CIPHER_C
|
|
|
|
* END_DEPENDENCIES
|
|
|
|
*/
|
|
|
|
|
2023-11-10 11:52:10 +01:00
|
|
|
/* BEGIN_CASE depends_on:VALID_CIPHER_ID */
|
2023-11-10 11:21:17 +01:00
|
|
|
void invalid()
|
|
|
|
{
|
2023-11-10 11:52:10 +01:00
|
|
|
/* That size is valid for a key or an input/output block. */
|
|
|
|
unsigned char buf[16] = { 0 };
|
|
|
|
|
2023-11-10 11:21:17 +01:00
|
|
|
mbedtls_block_cipher_context_t ctx;
|
|
|
|
|
|
|
|
mbedtls_block_cipher_init(&ctx);
|
|
|
|
|
2023-11-10 11:52:10 +01:00
|
|
|
/* Bad parameters to setup */
|
2023-11-10 11:21:17 +01:00
|
|
|
TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
|
|
|
|
mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_NONE));
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
|
|
|
|
mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_DES));
|
|
|
|
|
2023-11-10 11:52:10 +01:00
|
|
|
/* setkey() before successful setup() */
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
|
|
|
|
mbedtls_block_cipher_setkey(&ctx, buf, 128));
|
|
|
|
|
2023-11-10 12:02:53 +01:00
|
|
|
/* encrypt() before successful setup() */
|
|
|
|
TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
|
|
|
|
mbedtls_block_cipher_encrypt(&ctx, buf, buf));
|
|
|
|
|
|
|
|
/* free() before successful setup()
|
|
|
|
* No return value to check, but shouldn't cause memory errors. */
|
|
|
|
mbedtls_block_cipher_free(&ctx);
|
|
|
|
|
2023-11-10 11:52:10 +01:00
|
|
|
/* Now properly setup the context */
|
2023-11-10 12:02:53 +01:00
|
|
|
mbedtls_block_cipher_init(&ctx);
|
2023-11-10 11:52:10 +01:00
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, VALID_CIPHER_ID));
|
|
|
|
|
|
|
|
/* Bad parameters to setkey() */
|
|
|
|
TEST_EQUAL(BADKEY_ERROR,
|
|
|
|
mbedtls_block_cipher_setkey(&ctx, buf, 42));
|
|
|
|
|
2023-11-10 11:21:17 +01:00
|
|
|
exit:
|
|
|
|
mbedtls_block_cipher_free(&ctx);
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
2023-11-10 12:02:53 +01:00
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
|
|
|
void test_vec(int cipher_id_arg, data_t *key, data_t *input, data_t *outref)
|
|
|
|
{
|
|
|
|
mbedtls_block_cipher_context_t ctx;
|
|
|
|
mbedtls_cipher_id_t cipher_id = cipher_id_arg;
|
|
|
|
unsigned char output[BLOCK_SIZE];
|
|
|
|
|
|
|
|
mbedtls_block_cipher_init(&ctx);
|
|
|
|
|
|
|
|
memset(output, 0x00, sizeof(output));
|
|
|
|
|
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_id));
|
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_setkey(&ctx, key->x, 8 * key->len));
|
|
|
|
|
|
|
|
/* Encrypt with input != output */
|
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, input->x, output));
|
|
|
|
ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);
|
|
|
|
|
|
|
|
/* Encrypt with input == output.
|
|
|
|
* (Also, encrypting again ensures the previous call to encrypt()
|
|
|
|
* did not change the state of the context.) */
|
|
|
|
memcpy(output, input->x, BLOCK_SIZE);
|
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, output, output));
|
|
|
|
ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);
|
|
|
|
|
|
|
|
exit:
|
|
|
|
mbedtls_block_cipher_free(&ctx);
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
2023-12-12 15:34:25 +01:00
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
|
|
|
void block_cipher_psa_dynamic_dispatch(int cipher_type, int pre_psa_ret, int post_psa_engine)
|
|
|
|
{
|
|
|
|
mbedtls_block_cipher_context_t ctx;
|
2023-12-13 17:40:21 +01:00
|
|
|
(void) post_psa_engine;
|
2023-12-12 15:34:25 +01:00
|
|
|
|
|
|
|
/* Intentionally no PSA init here! (Will be done later.) */
|
|
|
|
|
|
|
|
mbedtls_block_cipher_init(&ctx);
|
|
|
|
|
|
|
|
/* Before PSA crypto init */
|
|
|
|
TEST_EQUAL(pre_psa_ret, mbedtls_block_cipher_setup(&ctx, cipher_type));
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
|
|
|
|
TEST_EQUAL(ctx.engine, MBEDTLS_BLOCK_CIPHER_ENGINE_LEGACY);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
mbedtls_block_cipher_free(&ctx);
|
|
|
|
|
|
|
|
/* Now initilize PSA Crypto */
|
|
|
|
BLOCK_CIPHER_PSA_INIT();
|
|
|
|
|
|
|
|
mbedtls_block_cipher_init(&ctx);
|
|
|
|
/* After PSA Crypto init */
|
|
|
|
TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_type));
|
|
|
|
#if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
|
|
|
|
TEST_EQUAL(ctx.engine, post_psa_engine);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
exit:
|
|
|
|
mbedtls_block_cipher_free(&ctx);
|
|
|
|
BLOCK_CIPHER_PSA_DONE();
|
|
|
|
}
|
|
|
|
/* END_CASE */
|