forked from wolfSSL/wolfssl
Add AES-XTS tests to tests/api
Co-Authored-By: sean@wolfssl.com <sean@wolfssl.com>
This commit is contained in:
@ -89362,7 +89362,6 @@ TEST_CASE testCases[] = {
|
||||
TEST_DECL(test_wc_AesGcmSetKey),
|
||||
TEST_DECL(test_wc_AesGcmEncryptDecrypt),
|
||||
TEST_DECL(test_wc_AesGcmMixedEncDecLongIV),
|
||||
TEST_DECL(test_wc_AesGcmStream),
|
||||
TEST_DECL(test_wc_GmacSetKey),
|
||||
TEST_DECL(test_wc_GmacUpdate),
|
||||
TEST_DECL(test_wc_AesCcmSetKey),
|
||||
|
@ -27,6 +27,7 @@ tests_unit_test_SOURCES += tests/api/test_camellia.c
|
||||
tests_unit_test_SOURCES += tests/api/test_arc4.c
|
||||
tests_unit_test_SOURCES += tests/api/test_rc2.c
|
||||
tests_unit_test_SOURCES += tests/api/test_aes.c
|
||||
tests_unit_test_SOURCES += tests/api/test_aes_xts.c
|
||||
tests_unit_test_SOURCES += tests/api/test_ascon.c
|
||||
tests_unit_test_SOURCES += tests/api/test_sm4.c
|
||||
tests_unit_test_SOURCES += tests/api/test_wc_encrypt.c
|
||||
@ -62,6 +63,7 @@ EXTRA_DIST += tests/api/test_camellia.h
|
||||
EXTRA_DIST += tests/api/test_arc4.h
|
||||
EXTRA_DIST += tests/api/test_rc2.h
|
||||
EXTRA_DIST += tests/api/test_aes.h
|
||||
EXTRA_DIST += tests/api/test_aes_xts.h
|
||||
EXTRA_DIST += tests/api/test_ascon.h
|
||||
EXTRA_DIST += tests/api/test_sm4.h
|
||||
EXTRA_DIST += tests/api/test_ascon_kats.h
|
||||
|
448
tests/api/test_aes_xts.c
Normal file
448
tests/api/test_aes_xts.c
Normal file
@ -0,0 +1,448 @@
|
||||
/* test_aes_xts.c
|
||||
*
|
||||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifdef HAVE_CONFIG_H
|
||||
#include <config.h>
|
||||
#endif
|
||||
|
||||
#if !defined(WOLFSSL_USER_SETTINGS) && !defined(WOLFSSL_NO_OPTIONS_H)
|
||||
#include <wolfssl/options.h>
|
||||
#endif
|
||||
#include <wolfssl/wolfcrypt/settings.h>
|
||||
|
||||
#ifdef NO_INLINE
|
||||
#include <wolfssl/wolfcrypt/misc.h>
|
||||
#else
|
||||
#define WOLFSSL_MISC_INCLUDED
|
||||
#include <wolfcrypt/src/misc.c>
|
||||
#endif
|
||||
|
||||
#include <wolfssl/wolfcrypt/aes.h>
|
||||
#include <wolfssl/wolfcrypt/wc_encrypt.h>
|
||||
#include <wolfssl/wolfcrypt/types.h>
|
||||
#include <tests/unit.h>
|
||||
#include <tests/api/api.h>
|
||||
#include <tests/api/test_aes_xts.h>
|
||||
|
||||
/*******************************************************************************
|
||||
* AES-XTS
|
||||
******************************************************************************/
|
||||
|
||||
#ifdef WOLFSSL_AES_XTS
|
||||
|
||||
/*
|
||||
* Testing function for wc_AesXtsSetKey().
|
||||
*/
|
||||
int test_wc_AesXtsSetKey(void)
|
||||
{
|
||||
EXPECT_DECLS;
|
||||
#ifdef WOLFSSL_AES_XTS
|
||||
XtsAes aes;
|
||||
byte key32[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
|
||||
};
|
||||
byte key64[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
|
||||
};
|
||||
byte badKey[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65
|
||||
};
|
||||
|
||||
/* Initialize */
|
||||
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test key sizes */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key64, sizeof(key64), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test bad args */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(NULL, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, NULL, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, badKey, sizeof(badKey), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID),
|
||||
WC_NO_ERR_TRACE(WC_KEY_SIZE_E));
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), 999,
|
||||
NULL, INVALID_DEVID),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
wc_AesXtsFree(&aes);
|
||||
#endif
|
||||
return EXPECT_RESULT();
|
||||
}
|
||||
|
||||
/*
|
||||
* Testing function for wc_AesXtsEncrypt() and wc_AesXtsDecrypt()
|
||||
*/
|
||||
int test_wc_AesXtsEncryptDecrypt(void)
|
||||
{
|
||||
EXPECT_DECLS;
|
||||
#ifdef WOLFSSL_AES_XTS
|
||||
XtsAes aes;
|
||||
byte key32[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
|
||||
};
|
||||
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
|
||||
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
|
||||
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
|
||||
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
|
||||
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
|
||||
};
|
||||
byte tweak[] = {
|
||||
0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
|
||||
0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x00
|
||||
};
|
||||
byte ciphertext[sizeof(plaintext)];
|
||||
byte decrypted[sizeof(plaintext)];
|
||||
|
||||
/* Init stack variables */
|
||||
XMEMSET(ciphertext, 0, sizeof(ciphertext));
|
||||
XMEMSET(decrypted, 0, sizeof(decrypted));
|
||||
|
||||
/* Initialize */
|
||||
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test encryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, plaintext,
|
||||
sizeof(plaintext), tweak, sizeof(tweak)), 0);
|
||||
|
||||
/* Test decryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, ciphertext,
|
||||
sizeof(ciphertext), tweak, sizeof(tweak)), 0);
|
||||
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
|
||||
|
||||
/* Test bad args for encryption */
|
||||
ExpectIntEQ(wc_AesXtsEncrypt(NULL, ciphertext, plaintext,
|
||||
sizeof(plaintext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncrypt(&aes, NULL, plaintext,
|
||||
sizeof(plaintext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, NULL,
|
||||
sizeof(plaintext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, plaintext,
|
||||
sizeof(plaintext), NULL, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
/* Test bad args for decryption */
|
||||
ExpectIntEQ(wc_AesXtsDecrypt(NULL, decrypted, ciphertext,
|
||||
sizeof(ciphertext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecrypt(&aes, NULL, ciphertext,
|
||||
sizeof(ciphertext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, NULL,
|
||||
sizeof(ciphertext), tweak, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, ciphertext,
|
||||
sizeof(ciphertext), NULL, sizeof(tweak)),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
wc_AesXtsFree(&aes);
|
||||
#endif
|
||||
return EXPECT_RESULT();
|
||||
}
|
||||
|
||||
/*
|
||||
* Testing function for wc_AesXtsEncryptSector() and wc_AesXtsDecryptSector()
|
||||
*/
|
||||
int test_wc_AesXtsSectorEncryptDecrypt(void)
|
||||
{
|
||||
EXPECT_DECLS;
|
||||
#ifdef WOLFSSL_AES_XTS
|
||||
XtsAes aes;
|
||||
byte key32[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
|
||||
};
|
||||
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
|
||||
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
|
||||
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
|
||||
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
|
||||
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
|
||||
};
|
||||
word64 sector = 0x1234567890ABCDEF;
|
||||
byte ciphertext[sizeof(plaintext)];
|
||||
byte decrypted[sizeof(plaintext)];
|
||||
|
||||
/* Init stack variables */
|
||||
XMEMSET(ciphertext, 0, sizeof(ciphertext));
|
||||
XMEMSET(decrypted, 0, sizeof(decrypted));
|
||||
|
||||
/* Initialize */
|
||||
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test sector encryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, ciphertext, plaintext,
|
||||
sizeof(plaintext), sector), 0);
|
||||
|
||||
/* Test sector decryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, decrypted, ciphertext,
|
||||
sizeof(ciphertext), sector), 0);
|
||||
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
|
||||
|
||||
/* Test bad args for sector encryption */
|
||||
ExpectIntEQ(wc_AesXtsEncryptSector(NULL, ciphertext, plaintext,
|
||||
sizeof(plaintext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, NULL, plaintext,
|
||||
sizeof(plaintext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, ciphertext, NULL,
|
||||
sizeof(plaintext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
/* Test bad args for sector decryption */
|
||||
ExpectIntEQ(wc_AesXtsDecryptSector(NULL, decrypted, ciphertext,
|
||||
sizeof(ciphertext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, NULL, ciphertext,
|
||||
sizeof(ciphertext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, decrypted, NULL,
|
||||
sizeof(ciphertext), sector),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
wc_AesXtsFree(&aes);
|
||||
#endif
|
||||
return EXPECT_RESULT();
|
||||
}
|
||||
|
||||
/*
|
||||
* Testing function for AES-XTS streaming API.
|
||||
*/
|
||||
int test_wc_AesXtsStreamEncryptDecrypt(void)
|
||||
{
|
||||
EXPECT_DECLS;
|
||||
#if defined(WOLFSSL_AES_XTS) && defined(WOLFSSL_AESXTS_STREAM)
|
||||
XtsAes aes;
|
||||
byte key32[] = {
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
|
||||
};
|
||||
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
|
||||
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
|
||||
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
|
||||
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
|
||||
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
|
||||
};
|
||||
byte tweak[] = {
|
||||
0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
|
||||
0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x00
|
||||
};
|
||||
byte ciphertext[sizeof(plaintext)];
|
||||
byte decrypted[sizeof(plaintext)];
|
||||
struct XtsAesStreamData stream;
|
||||
int i;
|
||||
|
||||
/* Init stack variables */
|
||||
XMEMSET(ciphertext, 0, sizeof(ciphertext));
|
||||
XMEMSET(decrypted, 0, sizeof(decrypted));
|
||||
|
||||
/* Initialize */
|
||||
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test encryption with streaming API */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test initialization */
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
|
||||
|
||||
/* Test update with full block */
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, plaintext,
|
||||
WC_AES_BLOCK_SIZE, &stream), 0);
|
||||
|
||||
/* Test final with remaining data */
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext + WC_AES_BLOCK_SIZE,
|
||||
plaintext + WC_AES_BLOCK_SIZE,
|
||||
sizeof(plaintext) - WC_AES_BLOCK_SIZE,
|
||||
&stream), 0);
|
||||
|
||||
/* Test decryption with streaming API */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
|
||||
/* Test initialization */
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
|
||||
|
||||
/* Test update with full block */
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, &stream), 0);
|
||||
|
||||
/* Test final with remaining data */
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted + WC_AES_BLOCK_SIZE,
|
||||
ciphertext + WC_AES_BLOCK_SIZE,
|
||||
sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
|
||||
&stream), 0);
|
||||
|
||||
/* Verify decryption matches original plaintext */
|
||||
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
|
||||
|
||||
/* Test byte-by-byte encryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
|
||||
|
||||
/* Encrypt one byte at a time */
|
||||
for (i = 0; i < (int)sizeof(plaintext) - WC_AES_BLOCK_SIZE; i++) {
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext + i, plaintext + i,
|
||||
1, &stream), 0);
|
||||
}
|
||||
|
||||
/* Final encryption with last block */
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes,
|
||||
ciphertext + sizeof(plaintext) - WC_AES_BLOCK_SIZE,
|
||||
plaintext + sizeof(plaintext) - WC_AES_BLOCK_SIZE,
|
||||
WC_AES_BLOCK_SIZE, &stream), 0);
|
||||
|
||||
/* Test byte-by-byte decryption */
|
||||
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
|
||||
NULL, INVALID_DEVID), 0);
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
|
||||
|
||||
/* Decrypt one byte at a time */
|
||||
for (i = 0; i < (int)sizeof(ciphertext) - WC_AES_BLOCK_SIZE; i++) {
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted + i, ciphertext + i,
|
||||
1, &stream), 0);
|
||||
}
|
||||
|
||||
/* Final decryption with last block */
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes,
|
||||
decrypted + sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
|
||||
ciphertext + sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
|
||||
WC_AES_BLOCK_SIZE, &stream), 0);
|
||||
|
||||
/* Verify decryption matches original plaintext */
|
||||
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
|
||||
|
||||
/* Test bad args for streaming encryption */
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(NULL, tweak, sizeof(tweak), &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, NULL, sizeof(tweak), &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, 0, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(NULL, ciphertext, plaintext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, NULL, plaintext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, NULL,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, plaintext,
|
||||
WC_AES_BLOCK_SIZE, NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(NULL, ciphertext, plaintext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, NULL, plaintext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext, NULL,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext, plaintext,
|
||||
WC_AES_BLOCK_SIZE, NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
/* Test bad args for streaming decryption */
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(NULL, tweak, sizeof(tweak), &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, NULL, sizeof(tweak), &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, 0, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(NULL, decrypted, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, NULL, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, NULL,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(NULL, decrypted, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, NULL, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted, NULL,
|
||||
WC_AES_BLOCK_SIZE, &stream),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted, ciphertext,
|
||||
WC_AES_BLOCK_SIZE, NULL),
|
||||
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
|
||||
|
||||
wc_AesXtsFree(&aes);
|
||||
#endif /* WOLFSSL_AES_XTS && WOLFSSL_AESXTS_STREAM */
|
||||
return EXPECT_RESULT();
|
||||
}
|
||||
|
||||
#endif /* WOLFSSL_AES_XTS */
|
34
tests/api/test_aes_xts.h
Normal file
34
tests/api/test_aes_xts.h
Normal file
@ -0,0 +1,34 @@
|
||||
/* test_aes_xts.h
|
||||
*
|
||||
* Copyright (C) 2006-2025 wolfSSL Inc.
|
||||
*
|
||||
* This file is part of wolfSSL.
|
||||
*
|
||||
* wolfSSL is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* wolfSSL is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
|
||||
*/
|
||||
|
||||
#ifndef WOLFCRYPT_TEST_AES_XTS_H
|
||||
#define WOLFCRYPT_TEST_AES_XTS_H
|
||||
|
||||
#ifdef WOLFSSL_AES_XTS
|
||||
int test_wc_AesXtsSetKey(void);
|
||||
int test_wc_AesXtsEncryptDecrypt(void);
|
||||
int test_wc_AesXtsSectorEncryptDecrypt(void);
|
||||
#if defined(WOLFSSL_AESXTS_STREAM)
|
||||
int test_wc_AesXtsStreamEncryptDecrypt(void);
|
||||
#endif
|
||||
#endif /* WOLFSSL_AES_XTS */
|
||||
|
||||
#endif /* WOLFCRYPT_TEST_AES_XTS_H */
|
Reference in New Issue
Block a user