diff options
author | Jaeden Amero <jaeden.amero@arm.com> | 2018-05-31 10:40:34 +0100 |
---|---|---|
committer | Jaeden Amero <jaeden.amero@arm.com> | 2018-06-13 12:13:58 +0100 |
commit | 142383e25b4330ad7e77f2aab2166bc7c8e6337c (patch) | |
tree | 1e1d04a95d844c7f04edfc7d349529920a0d9950 /tests/suites | |
parent | 8cfc75f603dd1519e9383ef88a6bda21aa431b46 (diff) | |
download | mbedtls-142383e25b4330ad7e77f2aab2166bc7c8e6337c.zip mbedtls-142383e25b4330ad7e77f2aab2166bc7c8e6337c.tar.gz mbedtls-142383e25b4330ad7e77f2aab2166bc7c8e6337c.tar.bz2 |
aes: xts: Add tests for invalid key sizes
Test that we get the error we expect when using various valid and invalid
keysizes with mbedtls_aes_xts_setkey_enc() and
mbedtls_aes_xts_setkey_dec().
Diffstat (limited to 'tests/suites')
-rw-r--r-- | tests/suites/test_suite_aes.function | 15 | ||||
-rw-r--r-- | tests/suites/test_suite_aes.xts.data | 15 |
2 files changed, 30 insertions, 0 deletions
diff --git a/tests/suites/test_suite_aes.function b/tests/suites/test_suite_aes.function index aec4a49..e346dc7 100644 --- a/tests/suites/test_suite_aes.function +++ b/tests/suites/test_suite_aes.function @@ -258,6 +258,21 @@ void aes_crypt_xts_size( int size, int retval ) } /* END_CASE */ +/* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_XTS */ +void aes_crypt_xts_keysize( int size, int retval ) +{ + mbedtls_aes_xts_context ctx; + const unsigned char *key = NULL; + size_t key_len = size; + + mbedtls_aes_xts_init( &ctx ); + + TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == retval ); + TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == retval ); +exit: + mbedtls_aes_xts_free( &ctx ); +} +/* END_CASE */ /* BEGIN_CASE depends_on:MBEDTLS_CIPHER_MODE_CFB */ diff --git a/tests/suites/test_suite_aes.xts.data b/tests/suites/test_suite_aes.xts.data index a0a6626..6af5227 100644 --- a/tests/suites/test_suite_aes.xts.data +++ b/tests/suites/test_suite_aes.xts.data @@ -13,6 +13,21 @@ aes_crypt_xts_size:16777217:MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH AES-128-XTS Encrypt Fail Sector Too Large (by 1 block) aes_crypt_xts_size:16777232:MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH +AES-0-XTS Setkey Fail Invalid Key Length +aes_crypt_xts_keysize:0:MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + +AES-4-XTS Setkey Fail Invalid Key Length +aes_crypt_xts_keysize:1:MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + +AES-64-XTS Setkey Fail Invalid Key Length +aes_crypt_xts_keysize:16:MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + +AES-192-XTS Setkey Fail Invalid Key Length +aes_crypt_xts_keysize:48:MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + +AES-384-XTS Setkey Fail Invalid Key Length +aes_crypt_xts_keysize:96:MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + AES-128-XTS Encrypt NIST XTSTestVectors #1 aes_encrypt_xts:"a1b90cba3f06ac353b2c343876081762090923026e91771815f29dab01932f2f":"4faef7117cda59c66e4b92013e768ad5":"ebabce95b14d3c8d6fb350390790311c":"778ae8b43cb98d5a825081d5be471c63" |