mbedtls/tests/suites/test_suite_des.function
Gilles Peskine 449bd8303e Switch to the new code style
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
2023-01-11 14:50:10 +01:00

281 lines
7.0 KiB
C

/* BEGIN_HEADER */
#include "mbedtls/des.h"
/* END_HEADER */
/* BEGIN_DEPENDENCIES
* depends_on:MBEDTLS_DES_C
* END_DEPENDENCIES
*/
/* BEGIN_CASE */
void des_check_weak(data_t *key, int ret)
{
TEST_ASSERT(mbedtls_des_key_check_weak(key->x) == ret);
}
/* END_CASE */
/* BEGIN_CASE */
void des_encrypt_ecb(data_t *key_str, data_t *src_str, data_t *dst)
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init(&ctx);
TEST_ASSERT(mbedtls_des_setkey_enc(&ctx, key_str->x) == 0);
TEST_ASSERT(mbedtls_des_crypt_ecb(&ctx, src_str->x, output) == 0);
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, 8, dst->len) == 0);
exit:
mbedtls_des_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE */
void des_decrypt_ecb(data_t *key_str, data_t *src_str, data_t *dst)
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init(&ctx);
TEST_ASSERT(mbedtls_des_setkey_dec(&ctx, key_str->x) == 0);
TEST_ASSERT(mbedtls_des_crypt_ecb(&ctx, src_str->x, output) == 0);
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, 8, dst->len) == 0);
exit:
mbedtls_des_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
void des_encrypt_cbc(data_t *key_str, data_t *iv_str,
data_t *src_str, data_t *dst, int cbc_result)
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init(&ctx);
TEST_ASSERT(mbedtls_des_setkey_enc(&ctx, key_str->x) == 0);
TEST_ASSERT(mbedtls_des_crypt_cbc(&ctx, MBEDTLS_DES_ENCRYPT, src_str->len, iv_str->x,
src_str->x, output) == cbc_result);
if (cbc_result == 0) {
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, src_str->len,
dst->len) == 0);
}
exit:
mbedtls_des_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
void des_decrypt_cbc(data_t *key_str, data_t *iv_str,
data_t *src_str, data_t *dst,
int cbc_result)
{
unsigned char output[100];
mbedtls_des_context ctx;
memset(output, 0x00, 100);
mbedtls_des_init(&ctx);
TEST_ASSERT(mbedtls_des_setkey_dec(&ctx, key_str->x) == 0);
TEST_ASSERT(mbedtls_des_crypt_cbc(&ctx, MBEDTLS_DES_DECRYPT, src_str->len, iv_str->x,
src_str->x, output) == cbc_result);
if (cbc_result == 0) {
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, src_str->len,
dst->len) == 0);
}
exit:
mbedtls_des_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE */
void des3_encrypt_ecb(int key_count, data_t *key_str,
data_t *src_str, data_t *dst)
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init(&ctx);
if (key_count == 2) {
TEST_ASSERT(mbedtls_des3_set2key_enc(&ctx, key_str->x) == 0);
} else if (key_count == 3) {
TEST_ASSERT(mbedtls_des3_set3key_enc(&ctx, key_str->x) == 0);
} else {
TEST_ASSERT(0);
}
TEST_ASSERT(mbedtls_des3_crypt_ecb(&ctx, src_str->x, output) == 0);
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, 8, dst->len) == 0);
exit:
mbedtls_des3_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE */
void des3_decrypt_ecb(int key_count, data_t *key_str,
data_t *src_str, data_t *dst)
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init(&ctx);
if (key_count == 2) {
TEST_ASSERT(mbedtls_des3_set2key_dec(&ctx, key_str->x) == 0);
} else if (key_count == 3) {
TEST_ASSERT(mbedtls_des3_set3key_dec(&ctx, key_str->x) == 0);
} else {
TEST_ASSERT(0);
}
TEST_ASSERT(mbedtls_des3_crypt_ecb(&ctx, src_str->x, output) == 0);
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, 8, dst->len) == 0);
exit:
mbedtls_des3_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
void des3_encrypt_cbc(int key_count, data_t *key_str,
data_t *iv_str, data_t *src_str,
data_t *dst, int cbc_result)
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init(&ctx);
if (key_count == 2) {
TEST_ASSERT(mbedtls_des3_set2key_enc(&ctx, key_str->x) == 0);
} else if (key_count == 3) {
TEST_ASSERT(mbedtls_des3_set3key_enc(&ctx, key_str->x) == 0);
} else {
TEST_ASSERT(0);
}
TEST_ASSERT(mbedtls_des3_crypt_cbc(&ctx, MBEDTLS_DES_ENCRYPT, src_str->len, iv_str->x,
src_str->x, output) == cbc_result);
if (cbc_result == 0) {
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x,
src_str->len, dst->len) == 0);
}
exit:
mbedtls_des3_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CBC */
void des3_decrypt_cbc(int key_count, data_t *key_str,
data_t *iv_str, data_t *src_str,
data_t *dst, int cbc_result)
{
unsigned char output[100];
mbedtls_des3_context ctx;
memset(output, 0x00, 100);
mbedtls_des3_init(&ctx);
if (key_count == 2) {
TEST_ASSERT(mbedtls_des3_set2key_dec(&ctx, key_str->x) == 0);
} else if (key_count == 3) {
TEST_ASSERT(mbedtls_des3_set3key_dec(&ctx, key_str->x) == 0);
} else {
TEST_ASSERT(0);
}
TEST_ASSERT(mbedtls_des3_crypt_cbc(&ctx, MBEDTLS_DES_DECRYPT, src_str->len, iv_str->x,
src_str->x, output) == cbc_result);
if (cbc_result == 0) {
TEST_ASSERT(mbedtls_test_hexcmp(output, dst->x, src_str->len,
dst->len) == 0);
}
exit:
mbedtls_des3_free(&ctx);
}
/* END_CASE */
/* BEGIN_CASE */
void des_key_parity_run()
{
int i, j, cnt;
unsigned char key[MBEDTLS_DES_KEY_SIZE];
unsigned int parity;
memset(key, 0, MBEDTLS_DES_KEY_SIZE);
cnt = 0;
// Iterate through all possible byte values
//
for (i = 0; i < 32; i++) {
for (j = 0; j < 8; j++) {
key[j] = cnt++;
}
// Set the key parity according to the table
//
mbedtls_des_key_set_parity(key);
// Check the parity with a function
//
for (j = 0; j < 8; j++) {
parity = key[j] ^ (key[j] >> 4);
parity = parity ^
(parity >> 1) ^
(parity >> 2) ^
(parity >> 3);
parity &= 1;
if (parity != 1) {
TEST_ASSERT(0);
}
}
// Check the parity with the table
//
TEST_ASSERT(mbedtls_des_key_check_key_parity(key) == 0);
}
}
/* END_CASE */
/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
void des_selftest()
{
TEST_ASSERT(mbedtls_des_self_test(1) == 0);
}
/* END_CASE */