mirror of
				https://github.com/Mbed-TLS/mbedtls.git
				synced 2025-10-28 23:14:56 +03:00 
			
		
		
		
	Rename remaining test data
This commit is contained in:
		
				
					committed by
					
						 Andrzej Kurek
						Andrzej Kurek
					
				
			
			
				
	
			
			
			
						parent
						
							9aeea93cc3
						
					
				
				
					commit
					c79e92b802
				
			| @@ -423,23 +423,23 @@ int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, | ||||
| /* | ||||
|  * The data is the same for all tests, only the used length changes | ||||
|  */ | ||||
| static const unsigned char key[] = { | ||||
| static const unsigned char key_test_data[] = { | ||||
|     0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, | ||||
|     0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f | ||||
| }; | ||||
|  | ||||
| static const unsigned char iv[] = { | ||||
| static const unsigned char iv_test_data[] = { | ||||
|     0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, | ||||
|     0x18, 0x19, 0x1a, 0x1b | ||||
| }; | ||||
|  | ||||
| static const unsigned char ad[] = { | ||||
| static const unsigned char ad_test_data[] = { | ||||
|     0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, | ||||
|     0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, | ||||
|     0x10, 0x11, 0x12, 0x13 | ||||
| }; | ||||
|  | ||||
| static const unsigned char msg[CCM_SELFTEST_PT_MAX_LEN] = { | ||||
| static const unsigned char msg_test_data[CCM_SELFTEST_PT_MAX_LEN] = { | ||||
|     0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, | ||||
|     0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, | ||||
|     0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, | ||||
| @@ -450,7 +450,7 @@ static const size_t add_len_test_data[NB_TESTS] = { 8, 16, 20 }; | ||||
| static const size_t msg_len_test_data[NB_TESTS] = { 4, 16, 24 }; | ||||
| static const size_t tag_len_test_data[NB_TESTS] = { 4, 6,  8  }; | ||||
|  | ||||
| static const unsigned char res[NB_TESTS][CCM_SELFTEST_CT_MAX_LEN] = { | ||||
| static const unsigned char res_test_data[NB_TESTS][CCM_SELFTEST_CT_MAX_LEN] = { | ||||
|     {   0x71, 0x62, 0x01, 0x5b, 0x4d, 0xac, 0x25, 0x5d }, | ||||
|     {   0xd2, 0xa1, 0xf0, 0xe0, 0x51, 0xea, 0x5f, 0x62, | ||||
|         0x08, 0x1a, 0x77, 0x92, 0x07, 0x3d, 0x59, 0x3d, | ||||
| @@ -476,7 +476,7 @@ int mbedtls_ccm_self_test( int verbose ) | ||||
|  | ||||
|     mbedtls_ccm_init( &ctx ); | ||||
|  | ||||
|     if( mbedtls_ccm_setkey( &ctx, MBEDTLS_CIPHER_ID_AES, key, 8 * sizeof key ) != 0 ) | ||||
|     if( mbedtls_ccm_setkey( &ctx, MBEDTLS_CIPHER_ID_AES, key_test_data, 8 * sizeof key_test_data ) != 0 ) | ||||
|     { | ||||
|         if( verbose != 0 ) | ||||
|             mbedtls_printf( "  CCM: setup failed" ); | ||||
| @@ -491,15 +491,16 @@ int mbedtls_ccm_self_test( int verbose ) | ||||
|  | ||||
|         memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); | ||||
|         memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); | ||||
|         memcpy( plaintext, msg, msg_len_test_data[i] ); | ||||
|         memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); | ||||
|  | ||||
|         ret = mbedtls_ccm_encrypt_and_tag( &ctx, msg_len_test_data[i], | ||||
|                                            iv, iv_len_test_data[i], ad, add_len_test_data[i], | ||||
|                                            iv_test_data, iv_len_test_data[i], | ||||
|                                            ad_test_data, add_len_test_data[i], | ||||
|                                            plaintext, ciphertext, | ||||
|                                            ciphertext + msg_len_test_data[i], tag_len_test_data[i] ); | ||||
|  | ||||
|         if( ret != 0 || | ||||
|             memcmp( ciphertext, res[i], msg_len_test_data[i] + tag_len_test_data[i] ) != 0 ) | ||||
|             memcmp( ciphertext, res_test_data[i], msg_len_test_data[i] + tag_len_test_data[i] ) != 0 ) | ||||
|         { | ||||
|             if( verbose != 0 ) | ||||
|                 mbedtls_printf( "failed\n" ); | ||||
| @@ -509,12 +510,13 @@ int mbedtls_ccm_self_test( int verbose ) | ||||
|         memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); | ||||
|  | ||||
|         ret = mbedtls_ccm_auth_decrypt( &ctx, msg_len_test_data[i], | ||||
|                                         iv, iv_len_test_data[i], ad, add_len_test_data[i], | ||||
|                                         iv_test_data, iv_len_test_data[i], | ||||
|                                         ad_test_data, add_len_test_data[i], | ||||
|                                         ciphertext, plaintext, | ||||
|                                         ciphertext + msg_len_test_data[i], tag_len_test_data[i] ); | ||||
|  | ||||
|         if( ret != 0 || | ||||
|             memcmp( plaintext, msg, msg_len_test_data[i] ) != 0 ) | ||||
|             memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) | ||||
|         { | ||||
|             if( verbose != 0 ) | ||||
|                 mbedtls_printf( "failed\n" ); | ||||
|   | ||||
| @@ -557,7 +557,7 @@ void mbedtls_gcm_free( mbedtls_gcm_context *ctx ) | ||||
|  */ | ||||
| #define MAX_TESTS   6 | ||||
|  | ||||
| static const int key_index[MAX_TESTS] = | ||||
| static const int key_index_test_data[MAX_TESTS] = | ||||
|     { 0, 0, 1, 1, 1, 1 }; | ||||
|  | ||||
| static const unsigned char key_test_data[MAX_TESTS][32] = | ||||
| @@ -575,7 +575,7 @@ static const unsigned char key_test_data[MAX_TESTS][32] = | ||||
| static const size_t iv_len_test_data[MAX_TESTS] = | ||||
|     { 12, 12, 12, 12, 8, 60 }; | ||||
|  | ||||
| static const int iv_index[MAX_TESTS] = | ||||
| static const int iv_index_test_data[MAX_TESTS] = | ||||
|     { 0, 0, 1, 1, 1, 2 }; | ||||
|  | ||||
| static const unsigned char iv_test_data[MAX_TESTS][64] = | ||||
| @@ -597,10 +597,10 @@ static const unsigned char iv_test_data[MAX_TESTS][64] = | ||||
| static const size_t add_len_test_data[MAX_TESTS] = | ||||
|     { 0, 0, 0, 20, 20, 20 }; | ||||
|  | ||||
| static const int add_index[MAX_TESTS] = | ||||
| static const int add_index_test_data[MAX_TESTS] = | ||||
|     { 0, 0, 0, 1, 1, 1 }; | ||||
|  | ||||
| static const unsigned char additional[MAX_TESTS][64] = | ||||
| static const unsigned char additional_test_data[MAX_TESTS][64] = | ||||
| { | ||||
|     { 0x00 }, | ||||
|     { 0xfe, 0xed, 0xfa, 0xce, 0xde, 0xad, 0xbe, 0xef, | ||||
| @@ -608,13 +608,13 @@ static const unsigned char additional[MAX_TESTS][64] = | ||||
|       0xab, 0xad, 0xda, 0xd2 }, | ||||
| }; | ||||
|  | ||||
| static const size_t pt_len[MAX_TESTS] = | ||||
| static const size_t pt_len_test_data[MAX_TESTS] = | ||||
|     { 0, 16, 64, 60, 60, 60 }; | ||||
|  | ||||
| static const int pt_index[MAX_TESTS] = | ||||
| static const int pt_index_test_data[MAX_TESTS] = | ||||
|     { 0, 0, 1, 1, 1, 1 }; | ||||
|  | ||||
| static const unsigned char pt[MAX_TESTS][64] = | ||||
| static const unsigned char pt_test_data[MAX_TESTS][64] = | ||||
| { | ||||
|     { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, | ||||
|       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }, | ||||
| @@ -628,7 +628,7 @@ static const unsigned char pt[MAX_TESTS][64] = | ||||
|       0xba, 0x63, 0x7b, 0x39, 0x1a, 0xaf, 0xd2, 0x55 }, | ||||
| }; | ||||
|  | ||||
| static const unsigned char ct[MAX_TESTS * 3][64] = | ||||
| static const unsigned char ct_test_data[MAX_TESTS * 3][64] = | ||||
| { | ||||
|     { 0x00 }, | ||||
|     { 0x03, 0x88, 0xda, 0xce, 0x60, 0xb6, 0xa3, 0x92, | ||||
| @@ -797,7 +797,7 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|                 mbedtls_printf( "  AES-GCM-%3d #%d (%s): ", | ||||
|                                 key_len, i, "enc" ); | ||||
|  | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index[i]], | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index_test_data[i]], | ||||
|                                       key_len ); | ||||
|             /* | ||||
|              * AES-192 is an optional feature that may be unavailable when | ||||
| @@ -815,14 +815,17 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|             } | ||||
|  | ||||
|             ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_ENCRYPT, | ||||
|                                         pt_len[i], | ||||
|                                         iv_test_data[iv_index[i]], iv_len_test_data[i], | ||||
|                                         additional[add_index[i]], add_len_test_data[i], | ||||
|                                         pt[pt_index[i]], buf, 16, tag_buf ); | ||||
|                                         pt_len_test_data[i], | ||||
|                                         iv_test_data[iv_index_test_data[i]], | ||||
|                                         iv_len_test_data[i], | ||||
|                                         additional_test_data[add_index_test_data[i]], | ||||
|                                         add_len_test_data[i], | ||||
|                                         pt_test_data[pt_index_test_data[i]], | ||||
|                                         buf, 16, tag_buf ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if ( memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 || | ||||
|             if ( memcmp( buf, ct_test_data[j * 6 + i], pt_len_test_data[i] ) != 0 || | ||||
|                  memcmp( tag_buf, tag_test_data[j * 6 + i], 16 ) != 0 ) | ||||
|             { | ||||
|                 ret = 1; | ||||
| @@ -840,21 +843,24 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|                 mbedtls_printf( "  AES-GCM-%3d #%d (%s): ", | ||||
|                                 key_len, i, "dec" ); | ||||
|  | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index[i]], | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index_test_data[i]], | ||||
|                                       key_len ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             ret = mbedtls_gcm_crypt_and_tag( &ctx, MBEDTLS_GCM_DECRYPT, | ||||
|                                         pt_len[i], | ||||
|                                         iv_test_data[iv_index[i]], iv_len_test_data[i], | ||||
|                                         additional[add_index[i]], add_len_test_data[i], | ||||
|                                         ct[j * 6 + i], buf, 16, tag_buf ); | ||||
|                                         pt_len_test_data[i], | ||||
|                                         iv_test_data[iv_index_test_data[i]], | ||||
|                                         iv_len_test_data[i], | ||||
|                                         additional_test_data[add_index_test_data[i]], | ||||
|                                         add_len_test_data[i], | ||||
|                                         ct_test_data[j * 6 + i], buf, 16, tag_buf ); | ||||
|  | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if( memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 || | ||||
|             if( memcmp( buf, pt_test_data[pt_index_test_data[i]], | ||||
|                         pt_len_test_data[i] ) != 0 || | ||||
|                 memcmp( tag_buf, tag_test_data[j * 6 + i], 16 ) != 0 ) | ||||
|             { | ||||
|                 ret = 1; | ||||
| @@ -872,32 +878,38 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|                 mbedtls_printf( "  AES-GCM-%3d #%d split (%s): ", | ||||
|                                 key_len, i, "enc" ); | ||||
|  | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index[i]], | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index_test_data[i]], | ||||
|                                       key_len ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_ENCRYPT, | ||||
|                                       iv_test_data[iv_index[i]], iv_len_test_data[i], | ||||
|                                       additional[add_index[i]], add_len_test_data[i] ); | ||||
|                                       iv_test_data[iv_index_test_data[i]], | ||||
|                                       iv_len_test_data[i], | ||||
|                                       additional_test_data[add_index_test_data[i]], | ||||
|                                       add_len_test_data[i] ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if( pt_len[i] > 32 ) | ||||
|             if( pt_len_test_data[i] > 32 ) | ||||
|             { | ||||
|                 size_t rest_len = pt_len[i] - 32; | ||||
|                 ret = mbedtls_gcm_update( &ctx, 32, pt[pt_index[i]], buf ); | ||||
|                 size_t rest_len = pt_len_test_data[i] - 32; | ||||
|                 ret = mbedtls_gcm_update( &ctx, 32, | ||||
|                                           pt_test_data[pt_index_test_data[i]], | ||||
|                                           buf ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
|  | ||||
|                 ret = mbedtls_gcm_update( &ctx, rest_len, pt[pt_index[i]] + 32, | ||||
|                 ret = mbedtls_gcm_update( &ctx, rest_len, | ||||
|                                           pt_test_data[pt_index_test_data[i]] + 32, | ||||
|                                   buf + 32 ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
|             } | ||||
|             else | ||||
|             { | ||||
|                 ret = mbedtls_gcm_update( &ctx, pt_len[i], pt[pt_index[i]], buf ); | ||||
|                 ret = mbedtls_gcm_update( &ctx, pt_len_test_data[i], | ||||
|                                           pt_test_data[pt_index_test_data[i]], buf ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
|             } | ||||
| @@ -906,7 +918,7 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if( memcmp( buf, ct[j * 6 + i], pt_len[i] ) != 0 || | ||||
|             if( memcmp( buf, ct_test_data[j * 6 + i], pt_len_test_data[i] ) != 0 || | ||||
|                 memcmp( tag_buf, tag_test_data[j * 6 + i], 16 ) != 0 ) | ||||
|             { | ||||
|                 ret = 1; | ||||
| @@ -924,32 +936,36 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|                 mbedtls_printf( "  AES-GCM-%3d #%d split (%s): ", | ||||
|                                 key_len, i, "dec" ); | ||||
|  | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, key_test_data[key_index[i]], | ||||
|             ret = mbedtls_gcm_setkey( &ctx, cipher, | ||||
|                                       key_test_data[key_index_test_data[i]], | ||||
|                                       key_len ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             ret = mbedtls_gcm_starts( &ctx, MBEDTLS_GCM_DECRYPT, | ||||
|                               iv_test_data[iv_index[i]], iv_len_test_data[i], | ||||
|                               additional[add_index[i]], add_len_test_data[i] ); | ||||
|                               iv_test_data[iv_index_test_data[i]], | ||||
|                               iv_len_test_data[i], | ||||
|                               additional_test_data[add_index_test_data[i]], | ||||
|                               add_len_test_data[i] ); | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if( pt_len[i] > 32 ) | ||||
|             if( pt_len_test_data[i] > 32 ) | ||||
|             { | ||||
|                 size_t rest_len = pt_len[i] - 32; | ||||
|                 ret = mbedtls_gcm_update( &ctx, 32, ct[j * 6 + i], buf ); | ||||
|                 size_t rest_len = pt_len_test_data[i] - 32; | ||||
|                 ret = mbedtls_gcm_update( &ctx, 32, ct_test_data[j * 6 + i], buf ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
|  | ||||
|                 ret = mbedtls_gcm_update( &ctx, rest_len, ct[j * 6 + i] + 32, | ||||
|                 ret = mbedtls_gcm_update( &ctx, rest_len, ct_test_data[j * 6 + i] + 32, | ||||
|                                           buf + 32 ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
|             } | ||||
|             else | ||||
|             { | ||||
|                 ret = mbedtls_gcm_update( &ctx, pt_len[i], ct[j * 6 + i], | ||||
|                 ret = mbedtls_gcm_update( &ctx, pt_len_test_data[i], | ||||
|                                           ct_test_data[j * 6 + i], | ||||
|                                           buf ); | ||||
|                 if( ret != 0 ) | ||||
|                     goto exit; | ||||
| @@ -959,7 +975,8 @@ int mbedtls_gcm_self_test( int verbose ) | ||||
|             if( ret != 0 ) | ||||
|                 goto exit; | ||||
|  | ||||
|             if( memcmp( buf, pt[pt_index[i]], pt_len[i] ) != 0 || | ||||
|             if( memcmp( buf, pt_test_data[pt_index_test_data[i]], | ||||
|                         pt_len_test_data[i] ) != 0 || | ||||
|                 memcmp( tag_buf, tag_test_data[j * 6 + i], 16 ) != 0 ) | ||||
|             { | ||||
|                 ret = 1; | ||||
|   | ||||
| @@ -328,13 +328,13 @@ static const unsigned char salt_test_data[MAX_TESTS][40] = | ||||
|     "sa\0lt", | ||||
| }; | ||||
|  | ||||
| static const uint32_t it_cnt[MAX_TESTS] = | ||||
| static const uint32_t it_cnt_test_data[MAX_TESTS] = | ||||
|     { 1, 2, 4096, 4096, 4096 }; | ||||
|  | ||||
| static const uint32_t key_len[MAX_TESTS] = | ||||
| static const uint32_t key_len_test_data[MAX_TESTS] = | ||||
|     { 20, 20, 20, 25, 16 }; | ||||
|  | ||||
| static const unsigned char result_key[MAX_TESTS][32] = | ||||
| static const unsigned char result_key_test_data[MAX_TESTS][32] = | ||||
| { | ||||
|     { 0x0c, 0x60, 0xc8, 0x0f, 0x96, 0x1f, 0x0e, 0x71, | ||||
|       0xf3, 0xa9, 0xb5, 0x24, 0xaf, 0x60, 0x12, 0x06, | ||||
| @@ -380,10 +380,12 @@ int mbedtls_pkcs5_self_test( int verbose ) | ||||
|         if( verbose != 0 ) | ||||
|             mbedtls_printf( "  PBKDF2 (SHA1) #%d: ", i ); | ||||
|  | ||||
|         ret = mbedtls_pkcs5_pbkdf2_hmac( &sha1_ctx, password_test_data[i], plen_test_data[i], salt_test_data[i], | ||||
|                                   slen_test_data[i], it_cnt[i], key_len[i], key ); | ||||
|         ret = mbedtls_pkcs5_pbkdf2_hmac( &sha1_ctx, password_test_data[i], | ||||
|                                          plen_test_data[i], salt_test_data[i], | ||||
|                                          slen_test_data[i], it_cnt_test_data[i], | ||||
|                                          key_len_test_data[i], key ); | ||||
|         if( ret != 0 || | ||||
|             memcmp( result_key[i], key, key_len[i] ) != 0 ) | ||||
|             memcmp( result_key_test_data[i], key, key_len_test_data[i] ) != 0 ) | ||||
|         { | ||||
|             if( verbose != 0 ) | ||||
|                 mbedtls_printf( "failed\n" ); | ||||
|   | ||||
		Reference in New Issue
	
	Block a user