blob: 155bfc520941e01b9b12648a940bb428b4854524 [file] [log] [blame]
Paul Bakker0e04d0e2011-11-27 14:46:59 +00001BEGIN_HEADER
2#include <polarssl/ctr_drbg.h>
3
4int test_offset;
Paul Bakker69e095c2011-12-10 21:55:01 +00005int entropy_func( void *data, unsigned char *buf, size_t len )
Paul Bakker0e04d0e2011-11-27 14:46:59 +00006{
Paul Bakker69e095c2011-12-10 21:55:01 +00007 unsigned char *p = (unsigned char *) data;
Paul Bakker0e04d0e2011-11-27 14:46:59 +00008 memcpy( buf, p + test_offset, len );
9 test_offset += 32;
10 return( 0 );
11}
Paul Bakker18d32912011-12-10 21:42:49 +000012
13int ctr_drbg_init_entropy_len(
14 ctr_drbg_context *ctx,
15 int (*f_entropy)(void *, unsigned char *, size_t),
16 void *p_entropy,
17 const unsigned char *custom,
18 size_t len,
19 size_t entropy_len );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000020END_HEADER
21
22BEGIN_DEPENDENCIES
23depends_on:POLARSSL_CTR_DRBG_C
24END_DEPENDENCIES
25
26BEGIN_CASE
27ctr_drbg_validate_pr:add_init_string:entropy_string:add1_string:add2_string:result_str
28{
29 unsigned char entropy[512];
30 unsigned char add_init[512];
31 unsigned char add1[512];
32 unsigned char add2[512];
33 ctr_drbg_context ctx;
34 unsigned char buf[512];
35 unsigned char output_str[512];
36 int add_init_len, add1_len, add2_len;
37
38 memset( output_str, 0, 512 );
39
40 unhexify( entropy, {entropy_string} );
41 add_init_len = unhexify( add_init, {add_init_string} );
42 add1_len = unhexify( add1, {add1_string} );
43 add2_len = unhexify( add2, {add2_string} );
44
45 test_offset = 0;
Paul Bakker18d32912011-12-10 21:42:49 +000046 TEST_ASSERT( ctr_drbg_init_entropy_len( &ctx, entropy_func, entropy, add_init, add_init_len, 32 ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000047 ctr_drbg_set_prediction_resistance( &ctx, CTR_DRBG_PR_ON );
48
49 TEST_ASSERT( ctr_drbg_random_with_add( &ctx, buf, 16, add1, add1_len ) == 0 );
50 TEST_ASSERT( ctr_drbg_random_with_add( &ctx, buf, 16, add2, add2_len ) == 0 );
51 hexify( output_str, buf, 16 );
52 TEST_ASSERT( strcmp( (char *) output_str, {result_str} ) == 0 );
53}
54END_CASE
55
56BEGIN_CASE
57ctr_drbg_validate_nopr:add_init_string:entropy_string:add1_string:add_reseed_string:add2_string:result_str
58{
59 unsigned char entropy[512];
60 unsigned char add_init[512];
61 unsigned char add1[512];
62 unsigned char add_reseed[512];
63 unsigned char add2[512];
64 ctr_drbg_context ctx;
65 unsigned char buf[512];
66 unsigned char output_str[512];
67 int add_init_len, add1_len, add_reseed_len, add2_len;
68
69 memset( output_str, 0, 512 );
70
71 unhexify( entropy, {entropy_string} );
72 add_init_len = unhexify( add_init, {add_init_string} );
73 add1_len = unhexify( add1, {add1_string} );
74 add_reseed_len = unhexify( add_reseed, {add_reseed_string} );
75 add2_len = unhexify( add2, {add2_string} );
76
77 test_offset = 0;
Paul Bakker18d32912011-12-10 21:42:49 +000078 TEST_ASSERT( ctr_drbg_init_entropy_len( &ctx, entropy_func, entropy, add_init, add_init_len, 32 ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000079
80 TEST_ASSERT( ctr_drbg_random_with_add( &ctx, buf, 16, add1, add1_len ) == 0 );
81 TEST_ASSERT( ctr_drbg_reseed( &ctx, add_reseed, add_reseed_len ) == 0 );
82 TEST_ASSERT( ctr_drbg_random_with_add( &ctx, buf, 16, add2, add2_len ) == 0 );
83 hexify( output_str, buf, 16 );
84 TEST_ASSERT( strcmp( (char *) output_str, {result_str} ) == 0 );
85}
86END_CASE