1/* BEGIN_HEADER */ 2#include "mbedtls/chacha20.h" 3/* END_HEADER */ 4 5/* BEGIN_DEPENDENCIES 6 * depends_on:MBEDTLS_CHACHA20_C 7 * END_DEPENDENCIES 8 */ 9 10/* BEGIN_CASE */ 11void chacha20_crypt( data_t *key_str, 12 data_t *nonce_str, 13 int counter, 14 data_t *src_str, 15 data_t *expected_output_str ) 16{ 17 unsigned char output[375]; 18 mbedtls_chacha20_context ctx; 19 20 memset( output, 0x00, sizeof( output ) ); 21 22 TEST_ASSERT( src_str->len == expected_output_str->len ); 23 TEST_ASSERT( key_str->len == 32U ); 24 TEST_ASSERT( nonce_str->len == 12U ); 25 26 /* 27 * Test the integrated API 28 */ 29 TEST_ASSERT( mbedtls_chacha20_crypt( key_str->x, nonce_str->x, counter, src_str->len, src_str->x, output ) == 0 ); 30 31 ASSERT_COMPARE( output, expected_output_str->len, 32 expected_output_str->x, expected_output_str->len ); 33 34 /* 35 * Test the streaming API 36 */ 37 mbedtls_chacha20_init( &ctx ); 38 39 TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str->x ) == 0 ); 40 41 TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); 42 43 memset( output, 0x00, sizeof( output ) ); 44 TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len, src_str->x, output ) == 0 ); 45 46 ASSERT_COMPARE( output, expected_output_str->len, 47 expected_output_str->x, expected_output_str->len ); 48 49 /* 50 * Test the streaming API again, piecewise 51 */ 52 53 /* Don't free/init the context nor set the key again, 54 * in order to test that starts() does the right thing. */ 55 TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str->x, counter ) == 0 ); 56 57 memset( output, 0x00, sizeof( output ) ); 58 TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str->x, output ) == 0 ); 59 TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_str->len - 1, 60 src_str->x + 1, output + 1 ) == 0 ); 61 62 ASSERT_COMPARE( output, expected_output_str->len, 63 expected_output_str->x, expected_output_str->len ); 64 65 mbedtls_chacha20_free( &ctx ); 66} 67/* END_CASE */ 68 69/* BEGIN_CASE depends_on:MBEDTLS_CHECK_PARAMS:!MBEDTLS_PARAM_FAILED_ALT */ 70void chacha20_bad_params() 71{ 72 unsigned char key[32]; 73 unsigned char nonce[12]; 74 unsigned char src[1]; 75 unsigned char dst[1]; 76 uint32_t counter = 0; 77 size_t len = sizeof( src ); 78 mbedtls_chacha20_context ctx; 79 80 TEST_INVALID_PARAM( mbedtls_chacha20_init( NULL ) ); 81 TEST_VALID_PARAM( mbedtls_chacha20_free( NULL ) ); 82 83 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 84 mbedtls_chacha20_setkey( NULL, key ) ); 85 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 86 mbedtls_chacha20_setkey( &ctx, NULL ) ); 87 88 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 89 mbedtls_chacha20_starts( NULL, nonce, counter ) ); 90 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 91 mbedtls_chacha20_starts( &ctx, NULL, counter ) ); 92 93 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 94 mbedtls_chacha20_update( NULL, 0, src, dst ) ); 95 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 96 mbedtls_chacha20_update( &ctx, len, NULL, dst ) ); 97 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 98 mbedtls_chacha20_update( &ctx, len, src, NULL ) ); 99 100 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 101 mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst ) ); 102 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 103 mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst ) ); 104 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 105 mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst ) ); 106 TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA, 107 mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL ) ); 108 109exit: 110 return; 111 112} 113/* END_CASE */ 114 115/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */ 116void chacha20_self_test() 117{ 118 TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 ); 119} 120/* END_CASE */ 121