+void testrun_aes128_cmac(void){
+ uint8_t key[16];
+ uint8_t tag[16];
+ uint8_t plain[64];
+ uint16_t length[] = { 0, 128, 320, 512 };
+ bcal_cmac_ctx_t ctx;
+ uint8_t r,i;
+
+ memcpy_P(key, modes_key, 16);
+ memcpy_P(plain, modes_plain, 64);
+
+ cli_putstr_P(PSTR("\r\n** AES128-CMAC-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 128/8);
+ for(i=0; i<4; ++i){
+ r = bcal_cmac_init(&aes128_desc, key, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ cli_putstr_P(PSTR("\r\n message: "));
+ cli_hexdump_block(plain, length[i]/8, 4, 16);
+ if(r)
+ return;
+ bcal_cmac(tag, 128, plain, length[i], &ctx);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 128/8, 4, 16);
+ bcal_cmac_free(&ctx);
+ }
+}
+/*
+Klen = 16
+Mlen = 18
+Tlen = 2
+Key = 3250974e306b4b678f914b514d1e90f6
+Msg = cf132fd4ebc25fd3866f1a95a6193a1a9cdf
+*/
+void testrun_aes128_cmac72(void){
+ uint8_t key[16]= {
+ 0x32, 0x50, 0x97, 0x4e, 0x30, 0x6b, 0x4b, 0x67,
+ 0x8f, 0x91, 0x4b, 0x51, 0x4d, 0x1e, 0x90, 0xf6
+ };
+ uint8_t tag[2];
+ uint8_t plain[18] = {
+ 0xcf, 0x13, 0x2f, 0xd4, 0xeb, 0xc2, 0x5f, 0xd3,
+ 0x86, 0x6f, 0x1a, 0x95, 0xa6, 0x19, 0x3a, 0x1a,
+ 0x9c, 0xdf,
+ };
+ bcal_cmac_ctx_t ctx;
+ uint8_t r;
+
+
+ cli_putstr_P(PSTR("\r\n** AES128-CMAC-72-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 128/8);
+ r = bcal_cmac_init(&aes128_desc, key, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ cli_putstr_P(PSTR("\r\n message: "));
+ cli_hexdump_block(plain, 18, 4, 16);
+ if(r)
+ return;
+ bcal_cmac(tag, 16, plain, 18*8, &ctx);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 2, 4, 16);
+ bcal_cmac_free(&ctx);
+}
+/*
+Count = 0
+Klen = 24
+Mlen = 0
+Tlen = 2
+Key = 2b2aaa666be161ed16648e862ac9bd1e317f71bc69e268b5
+Msg = 00
+*/
+void testrun_aes192_cmac0(void){
+ uint8_t key[24]= {
+ 0x2b, 0x2a, 0xaa, 0x66, 0x6b, 0xe1, 0x61, 0xed,
+ 0x16, 0x64, 0x8e, 0x86, 0x2a, 0xc9, 0xbd, 0x1e,
+ 0x31, 0x7f, 0x71, 0xbc, 0x69, 0xe2, 0x68, 0xb5
+ };
+ uint8_t tag[2];
+ uint8_t plain[1] = {
+ 0x00
+ };
+ bcal_cmac_ctx_t ctx;
+ uint8_t r;
+
+
+ cli_putstr_P(PSTR("\r\n** AES192-CMAC-0-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 192/8);
+ r = bcal_cmac_init(&aes192_desc, key, 192, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ if(r)
+ return;
+ bcal_cmac(tag, 16, plain, 0*8, &ctx);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 2, 4, 16);
+ bcal_cmac_free(&ctx);
+}
+/*
+MSG:
+KEY: 233952DEE4D5ED5F9B9C6D6FF80FF478
+NONCE: 62EC67F9C3A4A407FCB2A8C49031A8B3
+HEADER: 6BFB914FD07EAE6B
+CIPHER: E037830E8389F27B025A2D6527E79D01
+*/
+
+void testrun_aes128_eax(void){
+ uint8_t key[16]= {
+ 0x23, 0x39, 0x52, 0xDE, 0xE4, 0xD5, 0xED, 0x5F,
+ 0x9B, 0x9C, 0x6D, 0x6F, 0xF8, 0x0F, 0xF4, 0x78
+ };
+ uint8_t nonce[16] = {
+ 0x62, 0xEC, 0x67, 0xF9, 0xC3, 0xA4, 0xA4, 0x07,
+ 0xFC, 0xB2, 0xA8, 0xC4, 0x90, 0x31, 0xA8, 0xB3
+ };
+ uint8_t header[8] = {
+ 0x6B, 0xFB, 0x91, 0x4F, 0xD0, 0x7E, 0xAE, 0x6B
+ };
+ uint8_t tag[16];
+
+ bcal_eax_ctx_t ctx;
+ uint8_t r;
+
+
+ cli_putstr_P(PSTR("\r\n** AES128-EAX-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 16);
+ cli_putstr_P(PSTR("\r\n nonce: "));
+ cli_hexdump(nonce, 16);
+ cli_putstr_P(PSTR("\r\n header: "));
+ cli_hexdump(header, 8);
+ r = bcal_eax_init(&aes128_desc, key, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ if(r)
+ return;
+ bcal_eax_loadNonce(nonce, 16*8, &ctx);
+ bcal_eax_addLastHeader(header, 8*8, &ctx);
+ bcal_eax_encLastBlock(NULL, 0, &ctx);
+ bcal_eax_ctx2tag(tag, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 16, 4, 16);
+ bcal_eax_free(&ctx);
+}
+
+/*
+MSG: F7FB
+KEY: 91945D3F4DCBEE0BF45EF52255F095A4
+NONCE: BECAF043B0A23D843194BA972C66DEBD
+HEADER: FA3BFD4806EB53FA
+CIPHER:
+ */
+void testrun_aes128_eax2(void){
+ uint8_t key[16]= {
+ 0x91, 0x94, 0x5D, 0x3F, 0x4D, 0xCB, 0xEE, 0x0B,
+ 0xF4, 0x5E, 0xF5, 0x22, 0x55, 0xF0, 0x95, 0xA4,
+ };
+ uint8_t msg[2] = { 0xF7, 0xFB };
+ uint8_t nonce[16] = {
+ 0xBE, 0xCA, 0xF0, 0x43, 0xB0, 0xA2, 0x3D, 0x84,
+ 0x31, 0x94, 0xBA, 0x97, 0x2C, 0x66, 0xDE, 0xBD,
+ };
+ uint8_t header[8] = {
+ 0xFA, 0x3B, 0xFD, 0x48, 0x06, 0xEB, 0x53, 0xFA
+ };
+ uint8_t tag[16];
+
+ bcal_eax_ctx_t ctx;
+ uint8_t r;
+
+
+ cli_putstr_P(PSTR("\r\n** AES128-EAX2-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 16);
+ cli_putstr_P(PSTR("\r\n msg: "));
+ cli_hexdump(msg, 2);
+ cli_putstr_P(PSTR("\r\n nonce: "));
+ cli_hexdump(nonce, 16);
+ cli_putstr_P(PSTR("\r\n header: "));
+ cli_hexdump(header, 8);
+ r = bcal_eax_init(&aes128_desc, key, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ if(r)
+ return;
+ bcal_eax_loadNonce(nonce, 16*8, &ctx);
+ bcal_eax_addLastHeader(header, 8*8, &ctx);
+ bcal_eax_encLastBlock(msg, 2*8, &ctx);
+ bcal_eax_ctx2tag(tag, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n cipher: "));
+ cli_hexdump_block(msg, 2, 4, 16);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 16, 4, 16);
+ bcal_eax_free(&ctx);
+}
+/*
+MSG: 1A47CB4933
+KEY: 01F74AD64077F2E704C0F60ADA3DD523
+NONCE: 70C3DB4F0D26368400A10ED05D2BFF5E
+HEADER: 234A3463C1264AC6
+CIPHER:
+*/
+void testrun_aes128_eax3(void){
+ uint8_t key[16]= {
+ 0x01, 0xF7, 0x4A, 0xD6, 0x40, 0x77, 0xF2, 0xE7,
+ 0x04, 0xC0, 0xF6, 0x0A, 0xDA, 0x3D, 0xD5, 0x23
+ };
+ uint8_t msg[5] = {
+ 0x1A, 0x47, 0xCB, 0x49, 0x33
+ };
+ uint8_t nonce[16] = {
+ 0x70, 0xC3, 0xDB, 0x4F, 0x0D, 0x26, 0x36, 0x84,
+ 0x00, 0xA1, 0x0E, 0xD0, 0x5D, 0x2B, 0xFF, 0x5E
+ };
+ uint8_t header[8] = {
+ 0x23, 0x4A, 0x34, 0x63, 0xC1, 0x26, 0x4A, 0xC6
+ };
+ uint8_t tag[16];
+
+ bcal_eax_ctx_t ctx;
+ uint8_t r;
+
+
+ cli_putstr_P(PSTR("\r\n** AES128-EAX3-TEST **"));
+
+ cli_putstr_P(PSTR("\r\n key: "));
+ cli_hexdump(key, 16);
+ cli_putstr_P(PSTR("\r\n msg: "));
+ cli_hexdump(msg, 5);
+ cli_putstr_P(PSTR("\r\n nonce: "));
+ cli_hexdump(nonce, 16);
+ cli_putstr_P(PSTR("\r\n header: "));
+ cli_hexdump(header, 8);
+ r = bcal_eax_init(&aes128_desc, key, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n init = 0x"));
+ cli_hexdump(&r, 1);
+ if(r)
+ return;
+ bcal_eax_loadNonce(nonce, 16*8, &ctx);
+ bcal_eax_addLastHeader(header, 8*8, &ctx);
+ bcal_eax_encLastBlock(msg, 5*8, &ctx);
+ bcal_eax_ctx2tag(tag, 128, &ctx);
+ cli_putstr_P(PSTR("\r\n cipher: "));
+ cli_hexdump_block(msg, 5, 4, 16);
+ cli_putstr_P(PSTR("\r\n tag: "));
+ cli_hexdump_block(tag, 16, 4, 16);
+ bcal_eax_free(&ctx);
+}
+