2014-05-30 10:38:18 +02:00
|
|
|
/* BEGIN_HEADER */
|
|
|
|
#include <polarssl/entropy.h>
|
2014-05-30 11:42:01 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Number of calls made to entropy_dummy_source()
|
|
|
|
*/
|
|
|
|
static size_t entropy_dummy_calls;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Dummy entropy source
|
|
|
|
*
|
|
|
|
* If data is NULL, write exactly the requested length.
|
|
|
|
* Otherwise, write the length indicated by data or error if negative
|
|
|
|
*/
|
|
|
|
static int entropy_dummy_source( void *data, unsigned char *output,
|
|
|
|
size_t len, size_t *olen )
|
|
|
|
{
|
|
|
|
entropy_dummy_calls++;
|
|
|
|
|
|
|
|
if( data == NULL )
|
|
|
|
*olen = len;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
int *d = (int *) data;
|
|
|
|
|
|
|
|
if( *d < 0 )
|
|
|
|
return( POLARSSL_ERR_ENTROPY_SOURCE_FAILED );
|
|
|
|
else
|
|
|
|
*olen = *d;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset( output, 0x2a, *olen );
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
2014-05-30 10:38:18 +02:00
|
|
|
/* END_HEADER */
|
|
|
|
|
|
|
|
/* BEGIN_DEPENDENCIES
|
|
|
|
* depends_on:POLARSSL_ENTROPY_C
|
|
|
|
* END_DEPENDENCIES
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* BEGIN_CASE depends_on:POLARSSL_FS_IO */
|
|
|
|
void entropy_seed_file( char *path, int ret )
|
|
|
|
{
|
|
|
|
entropy_context ctx;
|
|
|
|
|
|
|
|
entropy_init( &ctx );
|
|
|
|
|
|
|
|
TEST_ASSERT( entropy_write_seed_file( &ctx, path ) == ret );
|
|
|
|
TEST_ASSERT( entropy_update_seed_file( &ctx, path ) == ret );
|
|
|
|
|
|
|
|
entropy_free( &ctx );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
2014-05-30 11:42:01 +02:00
|
|
|
/* BEGIN_CASE */
|
|
|
|
void entropy_too_many_sources( )
|
|
|
|
{
|
|
|
|
entropy_context ctx;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
entropy_init( &ctx );
|
|
|
|
|
|
|
|
/*
|
|
|
|
* It's hard to tell precisely when the error will occur,
|
|
|
|
* since we don't know how many sources were automatically added.
|
|
|
|
*/
|
|
|
|
for( i = 0; i < ENTROPY_MAX_SOURCES; i++ )
|
|
|
|
(void) entropy_add_source( &ctx, entropy_dummy_source, NULL, 16 );
|
|
|
|
|
|
|
|
TEST_ASSERT( entropy_add_source( &ctx, entropy_dummy_source, NULL, 16 )
|
|
|
|
== POLARSSL_ERR_ENTROPY_MAX_SOURCES );
|
|
|
|
|
|
|
|
entropy_free( &ctx );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
|
|
|
void entropy_func_len( int len, int ret )
|
|
|
|
{
|
|
|
|
entropy_context ctx;
|
|
|
|
unsigned char buf[ENTROPY_BLOCK_SIZE + 10] = { 0 };
|
|
|
|
unsigned char acc[ENTROPY_BLOCK_SIZE + 10] = { 0 };
|
|
|
|
size_t i, j;
|
|
|
|
|
|
|
|
entropy_init( &ctx );
|
|
|
|
|
|
|
|
/*
|
|
|
|
* See comments in entropy_self_test()
|
|
|
|
*/
|
|
|
|
for( i = 0; i < 8; i++ )
|
|
|
|
{
|
|
|
|
TEST_ASSERT( entropy_func( &ctx, buf, len ) == ret );
|
|
|
|
for( j = 0; j < sizeof( buf ); j++ )
|
|
|
|
acc[j] |= buf[j];
|
|
|
|
}
|
|
|
|
|
|
|
|
if( ret == 0 )
|
|
|
|
for( j = 0; j < (size_t) len; j++ )
|
|
|
|
TEST_ASSERT( acc[j] != 0 );
|
|
|
|
|
|
|
|
for( j = len; j < sizeof( buf ); j++ )
|
|
|
|
TEST_ASSERT( acc[j] == 0 );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
|
|
|
void entropy_source_fail( char *path )
|
|
|
|
{
|
|
|
|
entropy_context ctx;
|
|
|
|
int fail = -1;
|
|
|
|
unsigned char buf[16];
|
|
|
|
|
|
|
|
entropy_init( &ctx );
|
|
|
|
|
|
|
|
TEST_ASSERT( entropy_add_source( &ctx, entropy_dummy_source, &fail, 16 )
|
|
|
|
== 0 );
|
|
|
|
|
|
|
|
TEST_ASSERT( entropy_func( &ctx, buf, sizeof( buf ) )
|
|
|
|
== POLARSSL_ERR_ENTROPY_SOURCE_FAILED );
|
|
|
|
TEST_ASSERT( entropy_gather( &ctx )
|
|
|
|
== POLARSSL_ERR_ENTROPY_SOURCE_FAILED );
|
|
|
|
#if defined(POLARSSL_FS_IO)
|
|
|
|
TEST_ASSERT( entropy_write_seed_file( &ctx, path )
|
|
|
|
== POLARSSL_ERR_ENTROPY_SOURCE_FAILED );
|
|
|
|
TEST_ASSERT( entropy_update_seed_file( &ctx, path )
|
|
|
|
== POLARSSL_ERR_ENTROPY_SOURCE_FAILED );
|
|
|
|
#else
|
|
|
|
((void) path);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
entropy_free( &ctx );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
|
|
|
/* BEGIN_CASE */
|
|
|
|
void entropy_threshold( int threshold, int chunk_size, int result )
|
|
|
|
{
|
|
|
|
entropy_context ctx;
|
|
|
|
unsigned char buf[ENTROPY_BLOCK_SIZE] = { 0 };
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
entropy_init( &ctx );
|
|
|
|
|
|
|
|
TEST_ASSERT( entropy_add_source( &ctx, entropy_dummy_source,
|
|
|
|
&chunk_size, threshold ) == 0 );
|
|
|
|
|
|
|
|
entropy_dummy_calls = 0;
|
|
|
|
ret = entropy_func( &ctx, buf, sizeof( buf ) );
|
|
|
|
|
|
|
|
if( result >= 0 )
|
|
|
|
{
|
|
|
|
TEST_ASSERT( ret == 0 );
|
|
|
|
TEST_ASSERT( entropy_dummy_calls == (size_t) result );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
TEST_ASSERT( ret == result );
|
|
|
|
}
|
|
|
|
|
|
|
|
entropy_free( &ctx );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|
|
|
|
|
2014-05-30 10:38:18 +02:00
|
|
|
/* BEGIN_CASE depends_on:POLARSSL_SELF_TEST */
|
|
|
|
void entropy_selftest( )
|
|
|
|
{
|
|
|
|
TEST_ASSERT( entropy_self_test( 0 ) == 0 );
|
|
|
|
}
|
|
|
|
/* END_CASE */
|