X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=main.c;h=f747ffe6ff464621c09de6e7b6d14a716fea9191;hb=8537c7a0647b533f078af9c35bce533335c7556e;hp=ad0fda4c8ec9d1a3ea0fe8056075b0cd93fdffe7;hpb=79c9a6582ba071646a3062175715f59ebe210603;p=avr-crypto-lib.git diff --git a/main.c b/main.c index ad0fda4..f747ffe 100644 --- a/main.c +++ b/main.c @@ -3,31 +3,6 @@ * */ -/* implemented: - * - * xtea (C+ASM) - * SHA256 (C+ASM) - * ARCFOUR (C+ASM) - * HMAC-SHA256 (C) - * PRNG (C) - * - */ - -/* to implement: - * -aes - * -seal (broken?) - * -serpent - * -cast - * -des (???) - * -twofish - * -blowfish - * -skipjack (???) - * -idea (???) - * -kasumi--- - * -camellia - * modes: cbc, ecb, ... - * need Hashes, asymetrics, signatures, ... - */ #include "config.h" #include "serial-tools.h" @@ -36,7 +11,6 @@ #include "sha256.h" #include "xtea.h" -#include "arcfour.h" #include "prng.h" #include "cast5.h" @@ -139,6 +113,8 @@ void testrun_xtea(void){ uart_hexdump(block, 8); } +#if 0 + void testrun_arcfour(void){ arcfour_ctx_t s; char *b; @@ -148,28 +124,28 @@ void testrun_arcfour(void){ * RC4( "Secret", "Attack at dawn" ) == "45a01f64 5fc35b38 3552544b 9bf5" **/ uart_putstr("\r\narcfour(\"Plaintext\", \"Key\")="); - arcfour_init(&s, "Key", 3); + arcfour_init(&s, (uint8_t*)"Key", 3); b="Plaintext"; while (*b) *b++ ^= arcfour_gen(&s); uart_hexdump(b-9, 9); uart_putstr("\r\narcfour(\"pedia\", \"Wiki\")="); - arcfour_init(&s, "Wiki", 4); + arcfour_init(&s, (uint8_t*)"Wiki", 4); b="pedia"; while (*b) *b++ ^= arcfour_gen(&s); uart_hexdump(b-5, 5); uart_putstr("\r\narcfour(\"Attack at dawn\", \"Secret\")="); - arcfour_init(&s, "Secret", 6); + arcfour_init(&s, (uint8_t*)"Secret", 6); b="Attack at dawn"; while (*b) *b++ ^= arcfour_gen(&s); uart_hexdump(b-14, 14); uart_putstr("\r\narcfour(00.00.00.00.00.00.00.00, 01.23.45.67.89.AB.CD.EF)="); - arcfour_init(&s, "\x01\x23\x45\x67\x89\xAB\xCD\xEF", 8); + arcfour_init(&s, (uint8_t*)"\x01\x23\x45\x67\x89\xAB\xCD\xEF", 8); int i=0; uint8_t a[8]; memset(a, 0 , 8); @@ -178,6 +154,8 @@ void testrun_arcfour(void){ uart_hexdump(a, 8); } +#endif + void testrun_prng(void){ uint8_t i,block[32]; uart_putstr("\r\naddEntropy(32, 0x00000000)"); @@ -193,7 +171,7 @@ void testrun_cast5(void){ cast5_ctx_t s; uint8_t i; uart_putstr("\r\nCAST5:\r\nkey: 01 23 45 67 34 56 78 23 45 67 89 34 56 78 9A"); - cast5_init(&s, "\x01\x23\x45\x67\x12\x34\x56\x78\x23\x45\x67\x89\x34\x56\x78\x9A", 128); + cast5_init(&s, (uint8_t*)"\x01\x23\x45\x67\x12\x34\x56\x78\x23\x45\x67\x89\x34\x56\x78\x9A", 128); uint8_t block[] = {0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF}; uart_putstr("\r\nplaintext: "); uart_hexdump(block, 8); @@ -238,8 +216,8 @@ restart: uart_putstr("\r\n"); testrun_cast5(); uart_putstr("\r\n"); - testrun_arcfour(); - uart_putstr("\r\n"); + // testrun_arcfour(); + // uart_putstr("\r\n"); testrun_sha256(); goto restart; }