blob: 669d91e7925666f46cf2e399e0f551560e8f4118 [file] [log] [blame]
Daniel King34b822c2016-05-15 17:28:08 -03001/* BEGIN_HEADER */
2#include "mbedtls/chacha20.h"
3/* END_HEADER */
4
5/* BEGIN_DEPENDENCIES
6 * depends_on:MBEDTLS_CHACHA20_C
7 * END_DEPENDENCIES
8 */
Daniel King6155cc82016-05-18 11:51:22 -03009
10/* BEGIN_CASE */
11void chacha20_crypt( char *hex_key_string,
12 char *hex_nonce_string,
13 int counter,
14 char *hex_src_string,
15 char *hex_dst_string )
16{
Manuel Pégourié-Gonnard528524b2018-05-09 11:21:21 +020017 unsigned char key_str[32]; /* size set by the standard */
18 unsigned char nonce_str[12]; /* size set by the standard */
19 unsigned char src_str[375]; /* max size of binary input */
20 unsigned char dst_str[751]; /* hex expansion of the above */
21 unsigned char output[751];
Daniel King6155cc82016-05-18 11:51:22 -030022 size_t key_len;
23 size_t nonce_len;
24 size_t src_len;
25 size_t dst_len;
Manuel Pégourié-Gonnard55c0d092018-05-09 12:37:58 +020026 mbedtls_chacha20_context ctx;
Daniel King6155cc82016-05-18 11:51:22 -030027
Manuel Pégourié-Gonnard528524b2018-05-09 11:21:21 +020028 memset( key_str, 0x00, sizeof( key_str ) );
29 memset( nonce_str, 0x00, sizeof( nonce_str ) );
30 memset( src_str, 0x00, sizeof( src_str ) );
31 memset( dst_str, 0x00, sizeof( dst_str ) );
32 memset( output, 0x00, sizeof( output ) );
Daniel King6155cc82016-05-18 11:51:22 -030033
34 key_len = unhexify( key_str, hex_key_string );
35 nonce_len = unhexify( nonce_str, hex_nonce_string );
36 src_len = unhexify( src_str, hex_src_string );
37 dst_len = unhexify( dst_str, hex_dst_string );
38
39 TEST_ASSERT( src_len == dst_len );
40 TEST_ASSERT( key_len == 32U );
41 TEST_ASSERT( nonce_len == 12U );
42
Manuel Pégourié-Gonnard55c0d092018-05-09 12:37:58 +020043 /*
44 * Test the integrated API
45 */
Daniel King6155cc82016-05-18 11:51:22 -030046 TEST_ASSERT( mbedtls_chacha20_crypt( key_str, nonce_str, counter, src_len, src_str, output ) == 0 );
47
48 hexify( dst_str, output, src_len );
Manuel Pégourié-Gonnard55c0d092018-05-09 12:37:58 +020049 TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 );
Daniel King6155cc82016-05-18 11:51:22 -030050
Manuel Pégourié-Gonnard55c0d092018-05-09 12:37:58 +020051 /*
52 * Test the streaming API
53 */
54 mbedtls_chacha20_init( &ctx );
55
56 TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, key_str ) == 0 );
57
58 TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str, counter ) == 0 );
59
60 memset( output, 0x00, sizeof( output ) );
61 TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_len, src_str, output ) == 0 );
62
63 hexify( dst_str, output, src_len );
64 TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 );
65
66 /*
67 * Test the streaming API again, piecewise
68 */
69
Manuel Pégourié-Gonnard14656022018-05-09 12:51:54 +020070 /* Don't free/init the context nor set the key again,
71 * in order to test that starts() does the right thing. */
Manuel Pégourié-Gonnard55c0d092018-05-09 12:37:58 +020072 TEST_ASSERT( mbedtls_chacha20_starts( &ctx, nonce_str, counter ) == 0 );
73
74 memset( output, 0x00, sizeof( output ) );
75 TEST_ASSERT( mbedtls_chacha20_update( &ctx, 1, src_str, output ) == 0 );
76 TEST_ASSERT( mbedtls_chacha20_update( &ctx, src_len - 1, src_str + 1, output + 1 ) == 0 );
77
78 hexify( dst_str, output, src_len );
79 TEST_ASSERT( strcmp( (char*) dst_str, hex_dst_string ) == 0 );
80
81 mbedtls_chacha20_free( &ctx );
Daniel King6155cc82016-05-18 11:51:22 -030082}
83/* END_CASE */
84
Manuel Pégourié-Gonnard2aca2362018-05-10 10:11:42 +020085/* BEGIN_CASE */
86void chacha20_bad_params()
87{
88 unsigned char key[32];
89 unsigned char nonce[12];
90 unsigned char src[1];
91 unsigned char dst[1];
92 uint32_t counter = 0;
93 size_t len = sizeof( src );
94 mbedtls_chacha20_context ctx;
95
96 mbedtls_chacha20_init( NULL );
97 mbedtls_chacha20_free( NULL );
98
99 mbedtls_chacha20_init( &ctx );
100
101 TEST_ASSERT( mbedtls_chacha20_setkey( NULL, key )
102 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
103 TEST_ASSERT( mbedtls_chacha20_setkey( &ctx, NULL )
104 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
105
106 TEST_ASSERT( mbedtls_chacha20_starts( NULL, nonce, counter )
107 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
108 TEST_ASSERT( mbedtls_chacha20_starts( &ctx, NULL, counter )
109 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
110
111 TEST_ASSERT( mbedtls_chacha20_update( NULL, 0, src, dst )
112 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
113 TEST_ASSERT( mbedtls_chacha20_update( &ctx, len, NULL, dst )
114 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
115 TEST_ASSERT( mbedtls_chacha20_update( &ctx, len, src, NULL )
116 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
117 TEST_ASSERT( mbedtls_chacha20_update( &ctx, 0, NULL, NULL )
118 == 0 );
119
120 mbedtls_chacha20_free( &ctx );
121
122 TEST_ASSERT( mbedtls_chacha20_crypt( NULL, nonce, counter, 0, src, dst )
123 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
124 TEST_ASSERT( mbedtls_chacha20_crypt( key, NULL, counter, 0, src, dst )
125 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
126 TEST_ASSERT( mbedtls_chacha20_crypt( key, nonce, counter, len, NULL, dst )
127 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
128 TEST_ASSERT( mbedtls_chacha20_crypt( key, nonce, counter, len, src, NULL )
129 == MBEDTLS_ERR_CHACHA20_BAD_INPUT_DATA );
130 TEST_ASSERT( mbedtls_chacha20_crypt( key, nonce, counter, 0, NULL, NULL )
131 == 0 );
132}
133/* END_CASE */
134
Daniel King34b822c2016-05-15 17:28:08 -0300135/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
136void chacha20_self_test()
137{
Manuel Pégourié-Gonnardfce88b22018-05-09 13:06:12 +0200138 TEST_ASSERT( mbedtls_chacha20_self_test( 1 ) == 0 );
Daniel King34b822c2016-05-15 17:28:08 -0300139}
Manuel Pégourié-Gonnard528524b2018-05-09 11:21:21 +0200140/* END_CASE */