/* BEGIN_HEADER */
#include "block_cipher_internal.h"

#define BLOCK_SIZE 16

#if defined(MBEDTLS_AES_C)
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_AES
#define BADKEY_ERROR MBEDTLS_ERR_AES_INVALID_KEY_LENGTH
#elif defined(MBEDTLS_ARIA_C)
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_ARIA
#define BADKEY_ERROR MBEDTLS_ERR_ARIA_BAD_INPUT_DATA
#elif defined(MBEDTLS_CAMELLIA_C)
#define VALID_CIPHER_ID MBEDTLS_CIPHER_ID_CAMELLIA
#define BADKEY_ERROR MBEDTLS_ERR_CAMELLIA_BAD_INPUT_DATA
#else
#undef VALID_CIPHER_ID
#endif
/* END_HEADER */

/* BEGIN_DEPENDENCIES
 * depends_on:MBEDTLS_BLOCK_CIPHER_C
 * END_DEPENDENCIES
 */

/* BEGIN_CASE depends_on:VALID_CIPHER_ID */
void invalid()
{
    /* That size is valid for a key or an input/output block. */
    unsigned char buf[16] = { 0 };

    mbedtls_block_cipher_context_t ctx;

    mbedtls_block_cipher_init(&ctx);

    /* Bad parameters to setup */
    TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
               mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_NONE));
    TEST_EQUAL(MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
               mbedtls_block_cipher_setup(&ctx, MBEDTLS_CIPHER_ID_DES));

    /* setkey() before successful setup() */
    TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
               mbedtls_block_cipher_setkey(&ctx, buf, 128));

    /* encrypt() before successful setup() */
    TEST_EQUAL(MBEDTLS_ERR_CIPHER_INVALID_CONTEXT,
               mbedtls_block_cipher_encrypt(&ctx, buf, buf));

    /* free() before successful setup()
     * No return value to check, but shouldn't cause memory errors. */
    mbedtls_block_cipher_free(&ctx);

    /* Now properly setup the context */
    mbedtls_block_cipher_init(&ctx);
    TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, VALID_CIPHER_ID));

    /* Bad parameters to setkey() */
    TEST_EQUAL(BADKEY_ERROR,
               mbedtls_block_cipher_setkey(&ctx, buf, 42));

exit:
    mbedtls_block_cipher_free(&ctx);
}
/* END_CASE */

/* BEGIN_CASE */
void test_vec(int cipher_id_arg, data_t *key, data_t *input, data_t *outref)
{
    mbedtls_block_cipher_context_t ctx;
    mbedtls_cipher_id_t cipher_id = cipher_id_arg;
    unsigned char output[BLOCK_SIZE];

    mbedtls_block_cipher_init(&ctx);

    memset(output, 0x00, sizeof(output));

    TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_id));
    TEST_EQUAL(0, mbedtls_block_cipher_setkey(&ctx, key->x, 8 * key->len));

    /* Encrypt with input != output */
    TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, input->x, output));
    ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);

    /* Encrypt with input == output.
     * (Also, encrypting again ensures the previous call to encrypt()
     * did not change the state of the context.) */
    memcpy(output, input->x, BLOCK_SIZE);
    TEST_EQUAL(0, mbedtls_block_cipher_encrypt(&ctx, output, output));
    ASSERT_COMPARE(output, BLOCK_SIZE, outref->x, outref->len);

exit:
    mbedtls_block_cipher_free(&ctx);
}
/* END_CASE */

/* BEGIN_CASE */
void block_cipher_psa_dynamic_dispatch(int cipher_type, int pre_psa_ret, int post_psa_engine)
{
    mbedtls_block_cipher_context_t ctx;
    (void) post_psa_engine;

    /* Intentionally no PSA init here! (Will be done later.) */

    mbedtls_block_cipher_init(&ctx);

    /* Before PSA crypto init */
    TEST_EQUAL(pre_psa_ret, mbedtls_block_cipher_setup(&ctx, cipher_type));

#if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
    TEST_EQUAL(ctx.engine, MBEDTLS_BLOCK_CIPHER_ENGINE_LEGACY);
#endif

    mbedtls_block_cipher_free(&ctx);

    /* Now initilize PSA Crypto */
    BLOCK_CIPHER_PSA_INIT();

    mbedtls_block_cipher_init(&ctx);
    /* After PSA Crypto init */
    TEST_EQUAL(0, mbedtls_block_cipher_setup(&ctx, cipher_type));
#if defined(MBEDTLS_BLOCK_CIPHER_SOME_PSA)
    TEST_EQUAL(ctx.engine, post_psa_engine);
#endif

exit:
    mbedtls_block_cipher_free(&ctx);
    BLOCK_CIPHER_PSA_DONE();
}
/* END_CASE */