mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-27 20:35:40 +00:00
d08a2f7245
Commit 08c337d058
"Remove useless parameter from function" removed the
parameter mode from the functions mbedtls_aria_crypt_ecb() which broke their
respective test suite.
This commit fixes those test cases.
339 lines
11 KiB
Plaintext
339 lines
11 KiB
Plaintext
/* BEGIN_HEADER */
|
|
#include "mbedtls/aria.h"
|
|
|
|
/* Maxium size of data used by test vectors
|
|
* WARNING: to be adapted if and when adding larger test cases */
|
|
#define ARIA_MAX_DATASIZE 160
|
|
|
|
/* Maximum sizes of hexified things */
|
|
#define ARIA_MAX_KEY_STR ( 2 * MBEDTLS_ARIA_MAX_KEYSIZE + 1 )
|
|
#define ARIA_BLOCK_STR ( 2 * MBEDTLS_ARIA_BLOCKSIZE + 1 )
|
|
#define ARIA_MAX_DATA_STR ( 2 * ARIA_MAX_DATASIZE + 1 )
|
|
/* END_HEADER */
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
* depends_on:MBEDTLS_ARIA_C
|
|
* END_DEPENDENCIES
|
|
*/
|
|
|
|
/* BEGIN_CASE */
|
|
void aria_encrypt_ecb( char *hex_key_string, char *hex_src_string,
|
|
char *hex_dst_string, int setkey_result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
int key_len, data_len, i;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
TEST_ASSERT( mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 )
|
|
== setkey_result );
|
|
if( setkey_result == 0 )
|
|
{
|
|
for( i = 0; i < data_len; i += MBEDTLS_ARIA_BLOCKSIZE )
|
|
{
|
|
TEST_ASSERT( mbedtls_aria_crypt_ecb( &ctx, src_str + i, output + i )
|
|
== 0 );
|
|
}
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE */
|
|
void aria_decrypt_ecb( char *hex_key_string, char *hex_src_string,
|
|
char *hex_dst_string, int setkey_result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
int key_len, data_len, i;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
TEST_ASSERT( mbedtls_aria_setkey_dec( &ctx, key_str, key_len * 8 )
|
|
== setkey_result );
|
|
if( setkey_result == 0 )
|
|
{
|
|
for( i = 0; i < data_len; i += MBEDTLS_ARIA_BLOCKSIZE )
|
|
{
|
|
TEST_ASSERT( mbedtls_aria_crypt_ecb( &ctx, src_str + i, output + i )
|
|
== 0 );
|
|
}
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
|
|
void aria_encrypt_cbc( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int cbc_result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_cbc( &ctx, MBEDTLS_ARIA_ENCRYPT, data_len,
|
|
iv_str, src_str, output )
|
|
== cbc_result );
|
|
if( cbc_result == 0 )
|
|
{
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
|
|
void aria_decrypt_cbc( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int cbc_result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_dec( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_cbc( &ctx, MBEDTLS_ARIA_DECRYPT, data_len,
|
|
iv_str, src_str, output )
|
|
== cbc_result );
|
|
if( cbc_result == 0 )
|
|
{
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
}
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CFB */
|
|
void aria_encrypt_cfb128( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
size_t iv_offset = 0;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_cfb128( &ctx, MBEDTLS_ARIA_ENCRYPT,
|
|
data_len, &iv_offset, iv_str,
|
|
src_str, output )
|
|
== result );
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CFB */
|
|
void aria_decrypt_cfb128( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
mbedtls_aria_context ctx;
|
|
size_t iv_offset = 0;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_cfb128( &ctx, MBEDTLS_ARIA_DECRYPT,
|
|
data_len, &iv_offset, iv_str,
|
|
src_str, output )
|
|
== result );
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CTR */
|
|
void aria_encrypt_ctr( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
unsigned char blk[MBEDTLS_ARIA_BLOCKSIZE];
|
|
mbedtls_aria_context ctx;
|
|
size_t iv_offset = 0;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_ctr( &ctx, data_len, &iv_offset, iv_str,
|
|
blk, src_str, output )
|
|
== result );
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CTR */
|
|
void aria_decrypt_ctr( char *hex_key_string, char *hex_iv_string,
|
|
char *hex_src_string, char *hex_dst_string,
|
|
int result )
|
|
{
|
|
unsigned char key_str[ARIA_MAX_KEY_STR];
|
|
unsigned char iv_str[ARIA_BLOCK_STR];
|
|
unsigned char src_str[ARIA_MAX_DATA_STR];
|
|
unsigned char dst_str[ARIA_MAX_DATA_STR];
|
|
unsigned char output[ARIA_MAX_DATASIZE];
|
|
unsigned char blk[MBEDTLS_ARIA_BLOCKSIZE];
|
|
mbedtls_aria_context ctx;
|
|
size_t iv_offset = 0;
|
|
int key_len, data_len;
|
|
|
|
memset( key_str, 0x00, sizeof( key_str ) );
|
|
memset( iv_str, 0x00, sizeof( iv_str ) );
|
|
memset( src_str, 0x00, sizeof( src_str ) );
|
|
memset( dst_str, 0x00, sizeof( dst_str ) );
|
|
memset( output, 0x00, sizeof( output ) );
|
|
mbedtls_aria_init( &ctx );
|
|
|
|
key_len = unhexify( key_str, hex_key_string );
|
|
unhexify( iv_str, hex_iv_string );
|
|
data_len = unhexify( src_str, hex_src_string );
|
|
|
|
mbedtls_aria_setkey_enc( &ctx, key_str, key_len * 8 );
|
|
TEST_ASSERT( mbedtls_aria_crypt_ctr( &ctx, data_len, &iv_offset, iv_str,
|
|
blk, src_str, output )
|
|
== result );
|
|
hexify( dst_str, output, data_len );
|
|
|
|
TEST_ASSERT( strcasecmp( (char *) dst_str, hex_dst_string ) == 0 );
|
|
|
|
exit:
|
|
mbedtls_aria_free( &ctx );
|
|
}
|
|
/* END_CASE */
|
|
|
|
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
|
|
void aria_selftest()
|
|
{
|
|
TEST_ASSERT( mbedtls_aria_self_test( 1 ) == 0 );
|
|
}
|
|
/* END_CASE */
|