Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 1 | /* BEGIN_HEADER */ |
Manuel Pégourié-Gonnard | 7f80997 | 2015-03-09 17:05:11 +0000 | [diff] [blame] | 2 | #include "mbedtls/gcm.h" |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 3 | |
| 4 | /* Use the multipart interface to process the encrypted data in two parts |
| 5 | * and check that the output matches the expected output. |
| 6 | * The context must have been set up with the key. */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 7 | static int check_multipart(mbedtls_gcm_context *ctx, |
| 8 | int mode, |
| 9 | const data_t *iv, |
| 10 | const data_t *add, |
| 11 | const data_t *input, |
| 12 | const data_t *expected_output, |
| 13 | const data_t *tag, |
| 14 | size_t n1, |
| 15 | size_t n1_add) |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 16 | { |
| 17 | int ok = 0; |
| 18 | uint8_t *output = NULL; |
| 19 | size_t n2 = input->len - n1; |
Mateusz Starzyk | 658f4fd | 2021-05-26 14:26:48 +0200 | [diff] [blame] | 20 | size_t n2_add = add->len - n1_add; |
Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 21 | size_t olen; |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 22 | |
| 23 | /* Sanity checks on the test data */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 24 | TEST_ASSERT(n1 <= input->len); |
| 25 | TEST_ASSERT(n1_add <= add->len); |
| 26 | TEST_EQUAL(input->len, expected_output->len); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 27 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 28 | TEST_EQUAL(0, mbedtls_gcm_starts(ctx, mode, |
| 29 | iv->x, iv->len)); |
| 30 | TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x, n1_add)); |
| 31 | TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x + n1_add, n2_add)); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 32 | |
| 33 | /* Allocate a tight buffer for each update call. This way, if the function |
| 34 | * tries to write beyond the advertised required buffer size, this will |
| 35 | * count as an overflow for memory sanitizers and static checkers. */ |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 36 | TEST_CALLOC(output, n1); |
Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 37 | olen = 0xdeadbeef; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 38 | TEST_EQUAL(0, mbedtls_gcm_update(ctx, input->x, n1, output, n1, &olen)); |
| 39 | TEST_EQUAL(n1, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 40 | TEST_MEMORY_COMPARE(output, olen, expected_output->x, n1); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 41 | mbedtls_free(output); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 42 | output = NULL; |
| 43 | |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 44 | TEST_CALLOC(output, n2); |
Gilles Peskine | a56c448 | 2021-04-15 17:22:35 +0200 | [diff] [blame] | 45 | olen = 0xdeadbeef; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 46 | TEST_EQUAL(0, mbedtls_gcm_update(ctx, input->x + n1, n2, output, n2, &olen)); |
| 47 | TEST_EQUAL(n2, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 48 | TEST_MEMORY_COMPARE(output, olen, expected_output->x + n1, n2); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 49 | mbedtls_free(output); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 50 | output = NULL; |
| 51 | |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 52 | TEST_CALLOC(output, tag->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 53 | TEST_EQUAL(0, mbedtls_gcm_finish(ctx, NULL, 0, &olen, output, tag->len)); |
| 54 | TEST_EQUAL(0, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 55 | TEST_MEMORY_COMPARE(output, tag->len, tag->x, tag->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 56 | mbedtls_free(output); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 57 | output = NULL; |
| 58 | |
| 59 | ok = 1; |
| 60 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 61 | mbedtls_free(output); |
| 62 | return ok; |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 63 | } |
| 64 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 65 | static void check_cipher_with_empty_ad(mbedtls_gcm_context *ctx, |
| 66 | int mode, |
| 67 | const data_t *iv, |
| 68 | const data_t *input, |
| 69 | const data_t *expected_output, |
| 70 | const data_t *tag, |
| 71 | size_t ad_update_count) |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 72 | { |
| 73 | size_t n; |
| 74 | uint8_t *output = NULL; |
| 75 | size_t olen; |
| 76 | |
| 77 | /* Sanity checks on the test data */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 78 | TEST_EQUAL(input->len, expected_output->len); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 79 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 80 | TEST_EQUAL(0, mbedtls_gcm_starts(ctx, mode, |
| 81 | iv->x, iv->len)); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 82 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 83 | for (n = 0; n < ad_update_count; n++) { |
| 84 | TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, NULL, 0)); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 85 | } |
| 86 | |
| 87 | /* Allocate a tight buffer for each update call. This way, if the function |
| 88 | * tries to write beyond the advertised required buffer size, this will |
| 89 | * count as an overflow for memory sanitizers and static checkers. */ |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 90 | TEST_CALLOC(output, input->len); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 91 | olen = 0xdeadbeef; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 92 | TEST_EQUAL(0, mbedtls_gcm_update(ctx, input->x, input->len, output, input->len, &olen)); |
| 93 | TEST_EQUAL(input->len, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 94 | TEST_MEMORY_COMPARE(output, olen, expected_output->x, input->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 95 | mbedtls_free(output); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 96 | output = NULL; |
| 97 | |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 98 | TEST_CALLOC(output, tag->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 99 | TEST_EQUAL(0, mbedtls_gcm_finish(ctx, NULL, 0, &olen, output, tag->len)); |
| 100 | TEST_EQUAL(0, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 101 | TEST_MEMORY_COMPARE(output, tag->len, tag->x, tag->len); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 102 | |
| 103 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 104 | mbedtls_free(output); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 105 | } |
| 106 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 107 | static void check_empty_cipher_with_ad(mbedtls_gcm_context *ctx, |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 108 | int mode, |
| 109 | const data_t *iv, |
| 110 | const data_t *add, |
| 111 | const data_t *tag, |
| 112 | size_t cipher_update_count) |
| 113 | { |
| 114 | size_t olen; |
| 115 | size_t n; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 116 | uint8_t *output_tag = NULL; |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 117 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 118 | TEST_EQUAL(0, mbedtls_gcm_starts(ctx, mode, iv->x, iv->len)); |
| 119 | TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x, add->len)); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 120 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 121 | for (n = 0; n < cipher_update_count; n++) { |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 122 | olen = 0xdeadbeef; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 123 | TEST_EQUAL(0, mbedtls_gcm_update(ctx, NULL, 0, NULL, 0, &olen)); |
| 124 | TEST_EQUAL(0, olen); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 125 | } |
| 126 | |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 127 | TEST_CALLOC(output_tag, tag->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 128 | TEST_EQUAL(0, mbedtls_gcm_finish(ctx, NULL, 0, &olen, |
| 129 | output_tag, tag->len)); |
| 130 | TEST_EQUAL(0, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 131 | TEST_MEMORY_COMPARE(output_tag, tag->len, tag->x, tag->len); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 132 | |
| 133 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 134 | mbedtls_free(output_tag); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 135 | } |
| 136 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 137 | static void check_no_cipher_no_ad(mbedtls_gcm_context *ctx, |
| 138 | int mode, |
| 139 | const data_t *iv, |
| 140 | const data_t *tag) |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 141 | { |
| 142 | uint8_t *output = NULL; |
Gilles Peskine | 5a7be10 | 2021-06-23 21:51:32 +0200 | [diff] [blame] | 143 | size_t olen = 0; |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 144 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 145 | TEST_EQUAL(0, mbedtls_gcm_starts(ctx, mode, |
| 146 | iv->x, iv->len)); |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 147 | TEST_CALLOC(output, tag->len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 148 | TEST_EQUAL(0, mbedtls_gcm_finish(ctx, NULL, 0, &olen, output, tag->len)); |
| 149 | TEST_EQUAL(0, olen); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 150 | TEST_MEMORY_COMPARE(output, tag->len, tag->x, tag->len); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 151 | |
| 152 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 153 | mbedtls_free(output); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 154 | } |
| 155 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 156 | /* END_HEADER */ |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 157 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 158 | /* BEGIN_DEPENDENCIES |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 159 | * depends_on:MBEDTLS_GCM_C |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 160 | * END_DEPENDENCIES |
| 161 | */ |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 162 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 163 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 164 | void gcm_bad_parameters(int cipher_id, int direction, |
| 165 | data_t *key_str, data_t *src_str, |
| 166 | data_t *iv_str, data_t *add_str, |
| 167 | int tag_len_bits, int gcm_result) |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 168 | { |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 169 | unsigned char output[128]; |
| 170 | unsigned char tag_output[16]; |
| 171 | mbedtls_gcm_context ctx; |
Azim Khan | 317efe8 | 2017-08-02 17:33:54 +0100 | [diff] [blame] | 172 | size_t tag_len = tag_len_bits / 8; |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 173 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 174 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 175 | mbedtls_gcm_init(&ctx); |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 176 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 177 | memset(output, 0x00, sizeof(output)); |
| 178 | memset(tag_output, 0x00, sizeof(tag_output)); |
Darryl Green | 11999bb | 2018-03-13 15:22:58 +0000 | [diff] [blame] | 179 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 180 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 181 | TEST_ASSERT(mbedtls_gcm_crypt_and_tag(&ctx, direction, src_str->len, iv_str->x, iv_str->len, |
| 182 | add_str->x, add_str->len, src_str->x, output, tag_len, |
| 183 | tag_output) == gcm_result); |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 184 | |
| 185 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 186 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 187 | BLOCK_CIPHER_PSA_DONE(); |
Ron Eldor | 5a21fd6 | 2016-12-16 16:15:56 +0200 | [diff] [blame] | 188 | } |
| 189 | /* END_CASE */ |
| 190 | |
| 191 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 192 | void gcm_encrypt_and_tag(int cipher_id, data_t *key_str, |
| 193 | data_t *src_str, data_t *iv_str, |
| 194 | data_t *add_str, data_t *dst, |
| 195 | int tag_len_bits, data_t *tag, |
| 196 | int init_result) |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 197 | { |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 198 | unsigned char output[128]; |
| 199 | unsigned char tag_output[16]; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 200 | mbedtls_gcm_context ctx; |
Azim Khan | f1aaec9 | 2017-05-30 14:23:15 +0100 | [diff] [blame] | 201 | size_t tag_len = tag_len_bits / 8; |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 202 | size_t n1; |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 203 | size_t n1_add; |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 204 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 205 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 206 | mbedtls_gcm_init(&ctx); |
Manuel Pégourié-Gonnard | c34e8dd | 2015-04-28 21:42:17 +0200 | [diff] [blame] | 207 | |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 208 | memset(output, 0x00, 128); |
| 209 | memset(tag_output, 0x00, 16); |
| 210 | |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 211 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 212 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == init_result); |
| 213 | if (init_result == 0) { |
| 214 | TEST_ASSERT(mbedtls_gcm_crypt_and_tag(&ctx, MBEDTLS_GCM_ENCRYPT, src_str->len, iv_str->x, |
| 215 | iv_str->len, add_str->x, add_str->len, src_str->x, |
| 216 | output, tag_len, tag_output) == 0); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 217 | |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 218 | TEST_MEMORY_COMPARE(output, src_str->len, dst->x, dst->len); |
| 219 | TEST_MEMORY_COMPARE(tag_output, tag_len, tag->x, tag->len); |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 220 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 221 | for (n1 = 0; n1 <= src_str->len; n1 += 1) { |
| 222 | for (n1_add = 0; n1_add <= add_str->len; n1_add += 1) { |
| 223 | mbedtls_test_set_step(n1 * 10000 + n1_add); |
| 224 | if (!check_multipart(&ctx, MBEDTLS_GCM_ENCRYPT, |
| 225 | iv_str, add_str, src_str, |
| 226 | dst, tag, |
| 227 | n1, n1_add)) { |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 228 | goto exit; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 229 | } |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 230 | } |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 231 | } |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 232 | } |
Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 233 | |
Paul Bakker | bd51b26 | 2014-07-10 15:26:12 +0200 | [diff] [blame] | 234 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 235 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 236 | BLOCK_CIPHER_PSA_DONE(); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 237 | } |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 238 | /* END_CASE */ |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 239 | |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 240 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 241 | void gcm_decrypt_and_verify(int cipher_id, data_t *key_str, |
| 242 | data_t *src_str, data_t *iv_str, |
| 243 | data_t *add_str, int tag_len_bits, |
| 244 | data_t *tag_str, char *result, |
| 245 | data_t *pt_result, int init_result) |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 246 | { |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 247 | unsigned char output[128]; |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 248 | mbedtls_gcm_context ctx; |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 249 | int ret; |
Azim Khan | f1aaec9 | 2017-05-30 14:23:15 +0100 | [diff] [blame] | 250 | size_t tag_len = tag_len_bits / 8; |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 251 | size_t n1; |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 252 | size_t n1_add; |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 253 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 254 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 255 | mbedtls_gcm_init(&ctx); |
Manuel Pégourié-Gonnard | c34e8dd | 2015-04-28 21:42:17 +0200 | [diff] [blame] | 256 | |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 257 | memset(output, 0x00, 128); |
| 258 | |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 259 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 260 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == init_result); |
| 261 | if (init_result == 0) { |
| 262 | ret = mbedtls_gcm_auth_decrypt(&ctx, |
| 263 | src_str->len, |
| 264 | iv_str->x, |
| 265 | iv_str->len, |
| 266 | add_str->x, |
| 267 | add_str->len, |
| 268 | tag_str->x, |
| 269 | tag_len, |
| 270 | src_str->x, |
| 271 | output); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 272 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 273 | if (strcmp("FAIL", result) == 0) { |
| 274 | TEST_ASSERT(ret == MBEDTLS_ERR_GCM_AUTH_FAILED); |
| 275 | } else { |
| 276 | TEST_ASSERT(ret == 0); |
Tom Cosgrove | e4e9e7d | 2023-07-21 11:40:20 +0100 | [diff] [blame] | 277 | TEST_MEMORY_COMPARE(output, src_str->len, pt_result->x, pt_result->len); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 278 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 279 | for (n1 = 0; n1 <= src_str->len; n1 += 1) { |
| 280 | for (n1_add = 0; n1_add <= add_str->len; n1_add += 1) { |
| 281 | mbedtls_test_set_step(n1 * 10000 + n1_add); |
| 282 | if (!check_multipart(&ctx, MBEDTLS_GCM_DECRYPT, |
| 283 | iv_str, add_str, src_str, |
| 284 | pt_result, tag_str, |
| 285 | n1, n1_add)) { |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 286 | goto exit; |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 287 | } |
Mateusz Starzyk | af4ecdd | 2021-06-15 15:29:48 +0200 | [diff] [blame] | 288 | } |
Gilles Peskine | 36dd93e | 2021-04-13 13:02:03 +0200 | [diff] [blame] | 289 | } |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 290 | } |
| 291 | } |
Manuel Pégourié-Gonnard | 4fe9200 | 2013-09-13 13:45:58 +0200 | [diff] [blame] | 292 | |
Paul Bakker | bd51b26 | 2014-07-10 15:26:12 +0200 | [diff] [blame] | 293 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 294 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 295 | BLOCK_CIPHER_PSA_DONE(); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 296 | } |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 297 | /* END_CASE */ |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 298 | |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 299 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 300 | void gcm_decrypt_and_verify_empty_cipher(int cipher_id, |
| 301 | data_t *key_str, |
| 302 | data_t *iv_str, |
| 303 | data_t *add_str, |
| 304 | data_t *tag_str, |
| 305 | int cipher_update_calls) |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 306 | { |
| 307 | mbedtls_gcm_context ctx; |
| 308 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 309 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 310 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 311 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 312 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 313 | check_empty_cipher_with_ad(&ctx, MBEDTLS_GCM_DECRYPT, |
| 314 | iv_str, add_str, tag_str, |
| 315 | cipher_update_calls); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 316 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 317 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 318 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 319 | } |
| 320 | /* END_CASE */ |
| 321 | |
| 322 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 323 | void gcm_decrypt_and_verify_empty_ad(int cipher_id, |
| 324 | data_t *key_str, |
| 325 | data_t *iv_str, |
| 326 | data_t *src_str, |
| 327 | data_t *tag_str, |
| 328 | data_t *pt_result, |
| 329 | int ad_update_calls) |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 330 | { |
| 331 | mbedtls_gcm_context ctx; |
| 332 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 333 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 334 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 335 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 336 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 337 | check_cipher_with_empty_ad(&ctx, MBEDTLS_GCM_DECRYPT, |
| 338 | iv_str, src_str, pt_result, tag_str, |
| 339 | ad_update_calls); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 340 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 341 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 342 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 343 | } |
| 344 | /* END_CASE */ |
| 345 | |
| 346 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 347 | void gcm_decrypt_and_verify_no_ad_no_cipher(int cipher_id, |
| 348 | data_t *key_str, |
| 349 | data_t *iv_str, |
| 350 | data_t *tag_str) |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 351 | { |
| 352 | mbedtls_gcm_context ctx; |
| 353 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 354 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 355 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 356 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 357 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 358 | check_no_cipher_no_ad(&ctx, MBEDTLS_GCM_DECRYPT, |
| 359 | iv_str, tag_str); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 360 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 361 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 362 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 363 | } |
| 364 | /* END_CASE */ |
| 365 | |
| 366 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 367 | void gcm_encrypt_and_tag_empty_cipher(int cipher_id, |
| 368 | data_t *key_str, |
| 369 | data_t *iv_str, |
| 370 | data_t *add_str, |
| 371 | data_t *tag_str, |
| 372 | int cipher_update_calls) |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 373 | { |
| 374 | mbedtls_gcm_context ctx; |
| 375 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 376 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 377 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 378 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 379 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 380 | check_empty_cipher_with_ad(&ctx, MBEDTLS_GCM_ENCRYPT, |
| 381 | iv_str, add_str, tag_str, |
| 382 | cipher_update_calls); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 383 | |
| 384 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 385 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 386 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 387 | } |
| 388 | /* END_CASE */ |
| 389 | |
| 390 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 391 | void gcm_encrypt_and_tag_empty_ad(int cipher_id, |
| 392 | data_t *key_str, |
| 393 | data_t *iv_str, |
| 394 | data_t *src_str, |
| 395 | data_t *dst, |
| 396 | data_t *tag_str, |
| 397 | int ad_update_calls) |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 398 | { |
| 399 | mbedtls_gcm_context ctx; |
| 400 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 401 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 402 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 403 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 404 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 405 | check_cipher_with_empty_ad(&ctx, MBEDTLS_GCM_ENCRYPT, |
| 406 | iv_str, src_str, dst, tag_str, |
| 407 | ad_update_calls); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 408 | |
| 409 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 410 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 411 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | fc60622 | 2021-06-16 11:04:07 +0200 | [diff] [blame] | 412 | } |
| 413 | /* END_CASE */ |
| 414 | |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 415 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 416 | void gcm_encrypt_and_verify_no_ad_no_cipher(int cipher_id, |
| 417 | data_t *key_str, |
| 418 | data_t *iv_str, |
| 419 | data_t *tag_str) |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 420 | { |
| 421 | mbedtls_gcm_context ctx; |
| 422 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 423 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 424 | mbedtls_gcm_init(&ctx); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 425 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 426 | TEST_ASSERT(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8) == 0); |
| 427 | check_no_cipher_no_ad(&ctx, MBEDTLS_GCM_ENCRYPT, |
| 428 | iv_str, tag_str); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 429 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 430 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 431 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | 469c9f3 | 2021-06-18 00:06:52 +0200 | [diff] [blame] | 432 | } |
| 433 | /* END_CASE */ |
| 434 | |
Tuvshinzaya Erdenekhuu | 104eb7f | 2022-07-29 14:48:21 +0100 | [diff] [blame] | 435 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 436 | void gcm_invalid_param() |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 437 | { |
| 438 | mbedtls_gcm_context ctx; |
| 439 | unsigned char valid_buffer[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 }; |
| 440 | mbedtls_cipher_id_t valid_cipher = MBEDTLS_CIPHER_ID_AES; |
Ronald Cron | 875b5fb | 2021-05-21 08:50:00 +0200 | [diff] [blame] | 441 | int invalid_bitlen = 1; |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 442 | |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 443 | mbedtls_gcm_init(&ctx); |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 444 | |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 445 | /* mbedtls_gcm_setkey */ |
Ronald Cron | 875b5fb | 2021-05-21 08:50:00 +0200 | [diff] [blame] | 446 | TEST_EQUAL( |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 447 | MBEDTLS_ERR_GCM_BAD_INPUT, |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 448 | mbedtls_gcm_setkey(&ctx, valid_cipher, valid_buffer, invalid_bitlen)); |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 449 | |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 450 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 451 | mbedtls_gcm_free(&ctx); |
Andrzej Kurek | c470b6b | 2019-01-31 08:20:20 -0500 | [diff] [blame] | 452 | } |
| 453 | /* END_CASE */ |
| 454 | |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 455 | /* BEGIN_CASE */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 456 | void gcm_update_output_buffer_too_small(int cipher_id, int mode, |
| 457 | data_t *key_str, const data_t *input, |
| 458 | const data_t *iv) |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 459 | { |
| 460 | mbedtls_gcm_context ctx; |
| 461 | uint8_t *output = NULL; |
Mateusz Starzyk | 33d01ff | 2021-10-21 14:55:59 +0200 | [diff] [blame] | 462 | size_t olen = 0; |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 463 | size_t output_len = input->len - 1; |
| 464 | |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 465 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 466 | mbedtls_gcm_init(&ctx); |
| 467 | TEST_EQUAL(mbedtls_gcm_setkey(&ctx, cipher_id, key_str->x, key_str->len * 8), 0); |
| 468 | TEST_EQUAL(0, mbedtls_gcm_starts(&ctx, mode, iv->x, iv->len)); |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 469 | |
Tom Cosgrove | 05b2a87 | 2023-07-21 11:31:13 +0100 | [diff] [blame] | 470 | TEST_CALLOC(output, output_len); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 471 | TEST_EQUAL(MBEDTLS_ERR_GCM_BUFFER_TOO_SMALL, |
| 472 | mbedtls_gcm_update(&ctx, input->x, input->len, output, output_len, &olen)); |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 473 | |
| 474 | exit: |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 475 | mbedtls_free(output); |
| 476 | mbedtls_gcm_free(&ctx); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 477 | BLOCK_CIPHER_PSA_DONE(); |
Mateusz Starzyk | c48f43b | 2021-10-04 13:46:38 +0200 | [diff] [blame] | 478 | } |
| 479 | /* END_CASE */ |
| 480 | |
Andrzej Kurek | f502bcb | 2022-09-27 09:27:56 -0400 | [diff] [blame] | 481 | /* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST:MBEDTLS_AES_C */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 482 | void gcm_selftest() |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 483 | { |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 484 | BLOCK_CIPHER_PSA_INIT(); |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 485 | TEST_ASSERT(mbedtls_gcm_self_test(1) == 0); |
Valerio Setti | 10e9aa2 | 2023-12-12 11:54:20 +0100 | [diff] [blame] | 486 | BLOCK_CIPHER_PSA_DONE(); |
Paul Bakker | 89e80c9 | 2012-03-20 13:50:09 +0000 | [diff] [blame] | 487 | } |
Paul Bakker | 33b43f1 | 2013-08-20 11:48:36 +0200 | [diff] [blame] | 488 | /* END_CASE */ |