Add AES-XTS tests to tests/api

Co-Authored-By: sean@wolfssl.com <sean@wolfssl.com>
This commit is contained in:
Devin AI
2025-03-17 01:04:57 +00:00
parent 4e60e9fbed
commit 8ae76bb05f
4 changed files with 484 additions and 1 deletions

View File

@ -89362,7 +89362,6 @@ TEST_CASE testCases[] = {
TEST_DECL(test_wc_AesGcmSetKey),
TEST_DECL(test_wc_AesGcmEncryptDecrypt),
TEST_DECL(test_wc_AesGcmMixedEncDecLongIV),
TEST_DECL(test_wc_AesGcmStream),
TEST_DECL(test_wc_GmacSetKey),
TEST_DECL(test_wc_GmacUpdate),
TEST_DECL(test_wc_AesCcmSetKey),

View File

@ -27,6 +27,7 @@ tests_unit_test_SOURCES += tests/api/test_camellia.c
tests_unit_test_SOURCES += tests/api/test_arc4.c
tests_unit_test_SOURCES += tests/api/test_rc2.c
tests_unit_test_SOURCES += tests/api/test_aes.c
tests_unit_test_SOURCES += tests/api/test_aes_xts.c
tests_unit_test_SOURCES += tests/api/test_ascon.c
tests_unit_test_SOURCES += tests/api/test_sm4.c
tests_unit_test_SOURCES += tests/api/test_wc_encrypt.c
@ -62,6 +63,7 @@ EXTRA_DIST += tests/api/test_camellia.h
EXTRA_DIST += tests/api/test_arc4.h
EXTRA_DIST += tests/api/test_rc2.h
EXTRA_DIST += tests/api/test_aes.h
EXTRA_DIST += tests/api/test_aes_xts.h
EXTRA_DIST += tests/api/test_ascon.h
EXTRA_DIST += tests/api/test_sm4.h
EXTRA_DIST += tests/api/test_ascon_kats.h

448
tests/api/test_aes_xts.c Normal file
View File

@ -0,0 +1,448 @@
/* test_aes_xts.c
*
* Copyright (C) 2006-2025 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#if !defined(WOLFSSL_USER_SETTINGS) && !defined(WOLFSSL_NO_OPTIONS_H)
#include <wolfssl/options.h>
#endif
#include <wolfssl/wolfcrypt/settings.h>
#ifdef NO_INLINE
#include <wolfssl/wolfcrypt/misc.h>
#else
#define WOLFSSL_MISC_INCLUDED
#include <wolfcrypt/src/misc.c>
#endif
#include <wolfssl/wolfcrypt/aes.h>
#include <wolfssl/wolfcrypt/wc_encrypt.h>
#include <wolfssl/wolfcrypt/types.h>
#include <tests/unit.h>
#include <tests/api/api.h>
#include <tests/api/test_aes_xts.h>
/*******************************************************************************
* AES-XTS
******************************************************************************/
#ifdef WOLFSSL_AES_XTS
/*
* Testing function for wc_AesXtsSetKey().
*/
int test_wc_AesXtsSetKey(void)
{
EXPECT_DECLS;
#ifdef WOLFSSL_AES_XTS
XtsAes aes;
byte key32[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
};
byte key64[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
};
byte badKey[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65
};
/* Initialize */
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
/* Test key sizes */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsSetKey(&aes, key64, sizeof(key64), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
/* Test bad args */
ExpectIntEQ(wc_AesXtsSetKey(NULL, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsSetKey(&aes, NULL, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsSetKey(&aes, badKey, sizeof(badKey), AES_ENCRYPTION,
NULL, INVALID_DEVID),
WC_NO_ERR_TRACE(WC_KEY_SIZE_E));
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), 999,
NULL, INVALID_DEVID),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
wc_AesXtsFree(&aes);
#endif
return EXPECT_RESULT();
}
/*
* Testing function for wc_AesXtsEncrypt() and wc_AesXtsDecrypt()
*/
int test_wc_AesXtsEncryptDecrypt(void)
{
EXPECT_DECLS;
#ifdef WOLFSSL_AES_XTS
XtsAes aes;
byte key32[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
};
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
};
byte tweak[] = {
0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x00
};
byte ciphertext[sizeof(plaintext)];
byte decrypted[sizeof(plaintext)];
/* Init stack variables */
XMEMSET(ciphertext, 0, sizeof(ciphertext));
XMEMSET(decrypted, 0, sizeof(decrypted));
/* Initialize */
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
/* Test encryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, plaintext,
sizeof(plaintext), tweak, sizeof(tweak)), 0);
/* Test decryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, ciphertext,
sizeof(ciphertext), tweak, sizeof(tweak)), 0);
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
/* Test bad args for encryption */
ExpectIntEQ(wc_AesXtsEncrypt(NULL, ciphertext, plaintext,
sizeof(plaintext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncrypt(&aes, NULL, plaintext,
sizeof(plaintext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, NULL,
sizeof(plaintext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncrypt(&aes, ciphertext, plaintext,
sizeof(plaintext), NULL, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
/* Test bad args for decryption */
ExpectIntEQ(wc_AesXtsDecrypt(NULL, decrypted, ciphertext,
sizeof(ciphertext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecrypt(&aes, NULL, ciphertext,
sizeof(ciphertext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, NULL,
sizeof(ciphertext), tweak, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecrypt(&aes, decrypted, ciphertext,
sizeof(ciphertext), NULL, sizeof(tweak)),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
wc_AesXtsFree(&aes);
#endif
return EXPECT_RESULT();
}
/*
* Testing function for wc_AesXtsEncryptSector() and wc_AesXtsDecryptSector()
*/
int test_wc_AesXtsSectorEncryptDecrypt(void)
{
EXPECT_DECLS;
#ifdef WOLFSSL_AES_XTS
XtsAes aes;
byte key32[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
};
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
};
word64 sector = 0x1234567890ABCDEF;
byte ciphertext[sizeof(plaintext)];
byte decrypted[sizeof(plaintext)];
/* Init stack variables */
XMEMSET(ciphertext, 0, sizeof(ciphertext));
XMEMSET(decrypted, 0, sizeof(decrypted));
/* Initialize */
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
/* Test sector encryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, ciphertext, plaintext,
sizeof(plaintext), sector), 0);
/* Test sector decryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, decrypted, ciphertext,
sizeof(ciphertext), sector), 0);
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
/* Test bad args for sector encryption */
ExpectIntEQ(wc_AesXtsEncryptSector(NULL, ciphertext, plaintext,
sizeof(plaintext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, NULL, plaintext,
sizeof(plaintext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptSector(&aes, ciphertext, NULL,
sizeof(plaintext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
/* Test bad args for sector decryption */
ExpectIntEQ(wc_AesXtsDecryptSector(NULL, decrypted, ciphertext,
sizeof(ciphertext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, NULL, ciphertext,
sizeof(ciphertext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptSector(&aes, decrypted, NULL,
sizeof(ciphertext), sector),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
wc_AesXtsFree(&aes);
#endif
return EXPECT_RESULT();
}
/*
* Testing function for AES-XTS streaming API.
*/
int test_wc_AesXtsStreamEncryptDecrypt(void)
{
EXPECT_DECLS;
#if defined(WOLFSSL_AES_XTS) && defined(WOLFSSL_AESXTS_STREAM)
XtsAes aes;
byte key32[] = {
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66,
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
0x38, 0x39, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66
};
byte plaintext[] = { /* Now is the time for all good men w/o trailing 0 */
0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20,
0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
0x67, 0x6f, 0x6f, 0x64, 0x20, 0x6d, 0x65, 0x6e
};
byte tweak[] = {
0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88,
0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff, 0x00
};
byte ciphertext[sizeof(plaintext)];
byte decrypted[sizeof(plaintext)];
struct XtsAesStreamData stream;
int i;
/* Init stack variables */
XMEMSET(ciphertext, 0, sizeof(ciphertext));
XMEMSET(decrypted, 0, sizeof(decrypted));
/* Initialize */
ExpectIntEQ(wc_AesXtsInit(&aes, NULL, INVALID_DEVID), 0);
/* Test encryption with streaming API */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
/* Test initialization */
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
/* Test update with full block */
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, plaintext,
WC_AES_BLOCK_SIZE, &stream), 0);
/* Test final with remaining data */
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext + WC_AES_BLOCK_SIZE,
plaintext + WC_AES_BLOCK_SIZE,
sizeof(plaintext) - WC_AES_BLOCK_SIZE,
&stream), 0);
/* Test decryption with streaming API */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
NULL, INVALID_DEVID), 0);
/* Test initialization */
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
/* Test update with full block */
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, ciphertext,
WC_AES_BLOCK_SIZE, &stream), 0);
/* Test final with remaining data */
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted + WC_AES_BLOCK_SIZE,
ciphertext + WC_AES_BLOCK_SIZE,
sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
&stream), 0);
/* Verify decryption matches original plaintext */
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
/* Test byte-by-byte encryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_ENCRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
/* Encrypt one byte at a time */
for (i = 0; i < (int)sizeof(plaintext) - WC_AES_BLOCK_SIZE; i++) {
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext + i, plaintext + i,
1, &stream), 0);
}
/* Final encryption with last block */
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes,
ciphertext + sizeof(plaintext) - WC_AES_BLOCK_SIZE,
plaintext + sizeof(plaintext) - WC_AES_BLOCK_SIZE,
WC_AES_BLOCK_SIZE, &stream), 0);
/* Test byte-by-byte decryption */
ExpectIntEQ(wc_AesXtsSetKey(&aes, key32, sizeof(key32), AES_DECRYPTION,
NULL, INVALID_DEVID), 0);
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), &stream), 0);
/* Decrypt one byte at a time */
for (i = 0; i < (int)sizeof(ciphertext) - WC_AES_BLOCK_SIZE; i++) {
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted + i, ciphertext + i,
1, &stream), 0);
}
/* Final decryption with last block */
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes,
decrypted + sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
ciphertext + sizeof(ciphertext) - WC_AES_BLOCK_SIZE,
WC_AES_BLOCK_SIZE, &stream), 0);
/* Verify decryption matches original plaintext */
ExpectIntEQ(XMEMCMP(plaintext, decrypted, sizeof(plaintext)), 0);
/* Test bad args for streaming encryption */
ExpectIntEQ(wc_AesXtsEncryptInit(NULL, tweak, sizeof(tweak), &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, NULL, sizeof(tweak), &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, 0, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptInit(&aes, tweak, sizeof(tweak), NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptUpdate(NULL, ciphertext, plaintext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, NULL, plaintext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, NULL,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptUpdate(&aes, ciphertext, plaintext,
WC_AES_BLOCK_SIZE, NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptFinal(NULL, ciphertext, plaintext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, NULL, plaintext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext, NULL,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsEncryptFinal(&aes, ciphertext, plaintext,
WC_AES_BLOCK_SIZE, NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
/* Test bad args for streaming decryption */
ExpectIntEQ(wc_AesXtsDecryptInit(NULL, tweak, sizeof(tweak), &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, NULL, sizeof(tweak), &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, 0, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptInit(&aes, tweak, sizeof(tweak), NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptUpdate(NULL, decrypted, ciphertext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, NULL, ciphertext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, NULL,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptUpdate(&aes, decrypted, ciphertext,
WC_AES_BLOCK_SIZE, NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptFinal(NULL, decrypted, ciphertext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, NULL, ciphertext,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted, NULL,
WC_AES_BLOCK_SIZE, &stream),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
ExpectIntEQ(wc_AesXtsDecryptFinal(&aes, decrypted, ciphertext,
WC_AES_BLOCK_SIZE, NULL),
WC_NO_ERR_TRACE(BAD_FUNC_ARG));
wc_AesXtsFree(&aes);
#endif /* WOLFSSL_AES_XTS && WOLFSSL_AESXTS_STREAM */
return EXPECT_RESULT();
}
#endif /* WOLFSSL_AES_XTS */

34
tests/api/test_aes_xts.h Normal file
View File

@ -0,0 +1,34 @@
/* test_aes_xts.h
*
* Copyright (C) 2006-2025 wolfSSL Inc.
*
* This file is part of wolfSSL.
*
* wolfSSL is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* wolfSSL is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
*/
#ifndef WOLFCRYPT_TEST_AES_XTS_H
#define WOLFCRYPT_TEST_AES_XTS_H
#ifdef WOLFSSL_AES_XTS
int test_wc_AesXtsSetKey(void);
int test_wc_AesXtsEncryptDecrypt(void);
int test_wc_AesXtsSectorEncryptDecrypt(void);
#if defined(WOLFSSL_AESXTS_STREAM)
int test_wc_AesXtsStreamEncryptDecrypt(void);
#endif
#endif /* WOLFSSL_AES_XTS */
#endif /* WOLFCRYPT_TEST_AES_XTS_H */