/* BEGIN_HEADER */ #include "block_cipher_internal.h" #define BLOCK_SIZE 16 #if defined(MBEDTLS_AES_C) #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_AES #define BADKEY_ERROR MBEDTLS_ERR_AES_INVALID_KEY_LENGTH #elif defined(MBEDTLS_ARIA_C) #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_ARIA #define BADKEY_ERROR MBEDTLS_ERR_ARIA_BAD_INPUT_DATA #elif defined(MBEDTLS_CAMELLIA_C) #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_CAMELLIA #define BADKEY_ERROR MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA #else #undef VALID_CIPHER_ID #endif /* END_HEADER */ /* BEGIN_DEPENDENCIES * depends_on:MBEDTLS_BLOCK_CIPHER_C * END_DEPENDENCIES */ /* BEGIN_CASE depends_on:VALID_CIPHER_ID */ void invalid() { /* That size is valid for a key or an input/output block. */ unsigned char buf[16] = { 0 }; mbedtls_block_cipher_context_t ctx; mbedtls_block_cipher_init(&ctx); /* Bad parameters to setup */ TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA, mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_NONE)); TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA, mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_DES)); /* setkey() before successful setup() */ TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT, mbedtls_block_cipher_setkey(&ctx, buf, 128)); /* encrypt() before successful setup() */ TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT, mbedtls_block_cipher_encrypt(&ctx, buf, buf)); /* free() before successful setup() * No return value to check, but shouldn't cause memory errors. */ mbedtls_block_cipher_free(&ctx); /* Now properly setup the context */ mbedtls_block_cipher_init(&ctx); TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, VALID_CIPHER_ID)); /* Bad parameters to setkey() */ TEST_EQUAL(BADKEY_ERROR, mbedtls_block_cipher_setkey(&ctx, buf, 42)); exit: mbedtls_block_cipher_free(&ctx); } /* END_CASE */ /* BEGIN_CASE */ void test_vec(int cipher_id_arg, data_t *key, data_t *input, data_t *outref) { mbedtls_block_cipher_context_t ctx; mbedtls_cipher_id_t cipher_id = cipher_id_arg; unsigned char output[BLOCK_SIZE]; mbedtls_block_cipher_init(&ctx); memset(output, 0x00, sizeof(output)); TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_id)); TEST_EQUAL(0, mbedtls_block_cipher_setkey(&ctx, key->x, 8 * key->len)); /* Encrypt with input != output */ TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, input->x, output)); ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len); /* Encrypt with input == output. * (Also, encrypting again ensures the previous call to encrypt() * did not change the state of the context.) */ memcpy(output, input->x, BLOCK_SIZE); TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, output, output)); ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len); exit: mbedtls_block_cipher_free(&ctx); } /* END_CASE */ /* BEGIN_CASE */ void block_cipher_psa_dynamic_dispatch(int cipher_type, int pre_psa_ret, int post_psa_engine) { mbedtls_block_cipher_context_t ctx; (void) post_psa_engine; /* Intentionally no PSA init here! (Will be done later.) */ mbedtls_block_cipher_init(&ctx); /* Before PSA crypto init */ TEST_EQUAL(pre_psa_ret, mbedtls_block_cipher_setup(&ctx, cipher_type)); #if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA) TEST_EQUAL(ctx.engine, MBEDTLS_BLOCK_CIPHER_ENGINE_LEGACY); #endif mbedtls_block_cipher_free(&ctx); /* Now initilize PSA Crypto */ BLOCK_CIPHER_PSA_INIT(); mbedtls_block_cipher_init(&ctx); /* After PSA Crypto init */ TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_type)); #if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA) TEST_EQUAL(ctx.engine, post_psa_engine); #endif exit: mbedtls_block_cipher_free(&ctx); BLOCK_CIPHER_PSA_DONE(); } /* END_CASE */