quickjs-tart

quickjs-based runtime for wallet-core logic
Log | Files | Refs | README | LICENSE

test_suite_block_cipher.function (3900B)


      1 /* BEGIN_HEADER */
      2 #include "block_cipher_internal.h"
      3 
      4 #define BLOCK_SIZE 16
      5 
      6 #if defined(MBEDTLS_AES_C)
      7 #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_AES
      8 #define BADKEY_ERROR MBEDTLS_ERR_AES_INVALID_KEY_LENGTH
      9 #elif defined(MBEDTLS_ARIA_C)
     10 #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_ARIA
     11 #define BADKEY_ERROR MBEDTLS_ERR_ARIA_BAD_INPUT_DATA
     12 #elif defined(MBEDTLS_CAMELLIA_C)
     13 #define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_CAMELLIA
     14 #define BADKEY_ERROR MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA
     15 #else
     16 #undef VALID_CIPHER_ID
     17 #endif
     18 /* END_HEADER */
     19 
     20 /* BEGIN_DEPENDENCIES
     21  * depends_on:MBEDTLS_BLOCK_CIPHER_C
     22  * END_DEPENDENCIES
     23  */
     24 
     25 /* BEGIN_CASE depends_on:VALID_CIPHER_ID */
     26 void invalid()
     27 {
     28     /* That size is valid for a key or an input/output block. */
     29     unsigned char buf[16] = { 0 };
     30 
     31     mbedtls_block_cipher_context_t ctx;
     32 
     33     mbedtls_block_cipher_init(&ctx);
     34 
     35     /* Bad parameters to setup */
     36     TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
     37                mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_NONE));
     38     TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
     39                mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_DES));
     40 
     41     /* setkey() before successful setup() */
     42     TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
     43                mbedtls_block_cipher_setkey(&ctx, buf, 128));
     44 
     45     /* encrypt() before successful setup() */
     46     TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
     47                mbedtls_block_cipher_encrypt(&ctx, buf, buf));
     48 
     49     /* free() before successful setup()
     50      * No return value to check, but shouldn't cause memory errors. */
     51     mbedtls_block_cipher_free(&ctx);
     52 
     53     /* Now properly setup the context */
     54     mbedtls_block_cipher_init(&ctx);
     55     TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, VALID_CIPHER_ID));
     56 
     57     /* Bad parameters to setkey() */
     58     TEST_EQUAL(BADKEY_ERROR,
     59                mbedtls_block_cipher_setkey(&ctx, buf, 42));
     60 
     61 exit:
     62     mbedtls_block_cipher_free(&ctx);
     63 }
     64 /* END_CASE */
     65 
     66 /* BEGIN_CASE */
     67 void test_vec(int cipher_id_arg, data_t *key, data_t *input, data_t *outref)
     68 {
     69     mbedtls_block_cipher_context_t ctx;
     70     mbedtls_cipher_id_t cipher_id = cipher_id_arg;
     71     unsigned char output[BLOCK_SIZE];
     72 
     73     mbedtls_block_cipher_init(&ctx);
     74 
     75     memset(output, 0x00, sizeof(output));
     76 
     77     TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_id));
     78     TEST_EQUAL(0, mbedtls_block_cipher_setkey(&ctx, key->x, 8 * key->len));
     79 
     80     /* Encrypt with input != output */
     81     TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, input->x, output));
     82     ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);
     83 
     84     /* Encrypt with input == output.
     85      * (Also, encrypting again ensures the previous call to encrypt()
     86      * did not change the state of the context.) */
     87     memcpy(output, input->x, BLOCK_SIZE);
     88     TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, output, output));
     89     ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);
     90 
     91 exit:
     92     mbedtls_block_cipher_free(&ctx);
     93 }
     94 /* END_CASE */
     95 
     96 /* BEGIN_CASE */
     97 void block_cipher_psa_dynamic_dispatch(int cipher_type, int pre_psa_ret, int post_psa_engine)
     98 {
     99     mbedtls_block_cipher_context_t ctx;
    100     (void) post_psa_engine;
    101 
    102     /* Intentionally no PSA init here! (Will be done later.) */
    103 
    104     mbedtls_block_cipher_init(&ctx);
    105 
    106     /* Before PSA crypto init */
    107     TEST_EQUAL(pre_psa_ret, mbedtls_block_cipher_setup(&ctx, cipher_type));
    108 
    109 #if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
    110     TEST_EQUAL(ctx.engine, MBEDTLS_BLOCK_CIPHER_ENGINE_LEGACY);
    111 #endif
    112 
    113     mbedtls_block_cipher_free(&ctx);
    114 
    115     /* Now initilize PSA Crypto */
    116     BLOCK_CIPHER_PSA_INIT();
    117 
    118     mbedtls_block_cipher_init(&ctx);
    119     /* After PSA Crypto init */
    120     TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_type));
    121 #if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
    122     TEST_EQUAL(ctx.engine, post_psa_engine);
    123 #endif
    124 
    125 exit:
    126     mbedtls_block_cipher_free(&ctx);
    127     BLOCK_CIPHER_PSA_DONE();
    128 }
    129 /* END_CASE */