X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=test_src%2Fmain-aes-test.c;h=7d1fa9a96f4b2eb98257ad37d95441264efd70d3;hb=3711896e923a5d819733fbfe50590e7e1e6ab51a;hp=e2d3685d6e0ec813dcac488e06053143b71a435f;hpb=302f07c97444e2f5f5560dc2fd9af58d4b591d45;p=avr-crypto-lib.git diff --git a/test_src/main-aes-test.c b/test_src/main-aes-test.c index e2d3685..7d1fa9a 100644 --- a/test_src/main-aes-test.c +++ b/test_src/main-aes-test.c @@ -18,7 +18,7 @@ */ /* * AES test-suit - * + * */ #include "config.h" @@ -27,17 +27,17 @@ #include "debug.h" #include "aes/aes.h" -#include "aes/aes128_enc.h" -#include "aes/aes128_dec.h" -#include "aes/aes192_enc.h" -#include "aes/aes192_dec.h" -#include "aes/aes256_enc.h" -#include "aes/aes256_dec.h" -#include "aes/aes_keyschedule.h" #include "nessie_bc_test.h" #include "cli.h" #include "performance_test.h" +#include "dump.h" + +#include "bcal_aes128.h" +#include "bcal_aes192.h" +#include "bcal_aes256.h" +#include "bcal-cbc.h" +#include "bcal-cfb_byte.h" #include #include @@ -59,28 +59,28 @@ void testrun_nessie_aes(void){ nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)aes128_dec; nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)aes_init; nessie_bc_run(); - + nessie_bc_ctx.keysize_b = 192; nessie_bc_ctx.ctx_size_B = sizeof(aes192_ctx_t); nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)aes192_enc; nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)aes192_dec; nessie_bc_run(); - + nessie_bc_ctx.keysize_b = 256; nessie_bc_ctx.ctx_size_B = sizeof(aes256_ctx_t); nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)aes256_enc; nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)aes256_dec; - nessie_bc_run(); + nessie_bc_run(); } void testrun_test_aes(void){ - uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, + uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; uint8_t data[16] = { 0x32, 0x43, 0xf6, 0xa8, - 0x88, 0x5a, 0x30, 0x8d, - 0x31, 0x31, 0x98, 0xa2, + 0x88, 0x5a, 0x30, 0x8d, + 0x31, 0x31, 0x98, 0xa2, 0xe0, 0x37, 0x07, 0x34 }; aes128_ctx_t ctx; aes128_init(key, &ctx); @@ -94,12 +94,24 @@ void testrun_test_aes(void){ aes128_dec(data, &ctx); cli_putstr_P(PSTR("\r\n plaintext: ")); cli_hexdump(data, 16); - - + cli_putstr(PSTR("\r\n testing bcal:")); + bcgen_ctx_t bcal_ctx; + uint8_t r; + r = bcal_cipher_init(&aes128_desc, key, 128, &bcal_ctx); + cli_putstr_P(PSTR("\r\n init = 0x")); + cli_hexdump(&r, 1); + + bcal_cipher_enc(data, &bcal_ctx); + cli_putstr_P(PSTR("\r\n ciphertext: ")); + cli_hexdump(data, 16); + bcal_cipher_dec(data, &bcal_ctx); + cli_putstr_P(PSTR("\r\n plaintext: ")); + cli_hexdump(data, 16); + bcal_cipher_free(&bcal_ctx); } void testrun_testkey_aes128(void){ - uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, + uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c}; @@ -118,11 +130,11 @@ void testrun_testkey_aes128(void){ } void testrun_testkey_aes192(void){ - uint8_t key[24] = { 0x8e, 0x73, 0xb0, 0xf7, + uint8_t key[24] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, - 0xc8, 0x10, 0xf3, 0x2b, - 0x80, 0x90, 0x79, 0xe5, - 0x62, 0xf8, 0xea, 0xd2, + 0xc8, 0x10, 0xf3, 0x2b, + 0x80, 0x90, 0x79, 0xe5, + 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b}; aes192_ctx_t ctx; uint8_t i; @@ -141,13 +153,13 @@ void testrun_testkey_aes192(void){ void testrun_testkey_aes256(void){ - uint8_t key[32] = { 0x60, 0x3d, 0xeb, 0x10, - 0x15, 0xca, 0x71, 0xbe, - 0x2b, 0x73, 0xae, 0xf0, - 0x85, 0x7d, 0x77, 0x81, - 0x1f, 0x35, 0x2c, 0x07, - 0x3b, 0x61, 0x08, 0xd7, - 0x2d, 0x98, 0x10, 0xa3, + uint8_t key[32] = { 0x60, 0x3d, 0xeb, 0x10, + 0x15, 0xca, 0x71, 0xbe, + 0x2b, 0x73, 0xae, 0xf0, + 0x85, 0x7d, 0x77, 0x81, + 0x1f, 0x35, 0x2c, 0x07, + 0x3b, 0x61, 0x08, 0xd7, + 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4}; aes256_ctx_t ctx; uint8_t i; @@ -169,6 +181,95 @@ void testrun_testkey_aes(void){ testrun_testkey_aes192(); testrun_testkey_aes256(); } + +uint8_t modes_key[] PROGMEM={ 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, + 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c + }; +uint8_t modes_iv[] PROGMEM={ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f + }; +uint8_t modes_plain[] PROGMEM={ 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, + 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, + /* --- */ + 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, + 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, + /* --- */ + 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, + 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, + /* --- */ + 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, + 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 + }; + +void testrun_aes128_cbc(void){ + uint8_t key[16]; + uint8_t iv[16]; + uint8_t plain[64]; + + bcal_cbc_ctx_t ctx; + uint8_t r; + + memcpy_P(key, modes_key, 16); + memcpy_P(iv, modes_iv, 16); + memcpy_P(plain, modes_plain, 64); + + cli_putstr_P(PSTR("\r\n** AES128-CBC-TEST **")); + r = bcal_cbc_init(&aes128_desc, key, 128, &ctx); + cli_putstr_P(PSTR("\r\n init = 0x")); + cli_hexdump(&r, 1); + cli_putstr_P(PSTR("\r\n key: ")); + cli_hexdump(key, 128/8); + cli_putstr_P(PSTR("\r\n IV: ")); + cli_hexdump(iv, 128/8); + cli_putstr_P(PSTR("\r\n plaintext:")); + cli_hexdump_block(plain, 4*128/8, 4, 8); + if(r) + return; + bcal_cbc_encMsg(iv, plain, 4, &ctx); + cli_putstr_P(PSTR("\r\n ciphertext: ")); + cli_hexdump_block(plain, 4*128/8, 4, 8); + bcal_cbc_decMsg(iv, plain, 4, &ctx); + cli_putstr_P(PSTR("\r\n plaintext: ")); + cli_hexdump_block(plain, 4*128/8, 4, 8); + bcal_cbc_free(&ctx); +} + +void testrun_aes128_cfb8(void){ + uint8_t key[16]; + uint8_t iv[16]; + uint8_t plain[64]; + + bcal_cfb_B_ctx_t ctx; + uint8_t r; + + memcpy_P(key, modes_key, 16); + memcpy_P(iv, modes_iv, 16); + memcpy_P(plain, modes_plain, 64); + + cli_putstr_P(PSTR("\r\n** AES128-CFB8-TEST **")); + r = bcal_cfb_B_init(&aes128_desc, key, 128, 8, &ctx); + cli_putstr_P(PSTR("\r\n init = 0x")); + cli_hexdump(&r, 1); + cli_putstr_P(PSTR("\r\n key: ")); + cli_hexdump(key, 128/8); + cli_putstr_P(PSTR("\r\n IV: ")); + cli_hexdump(iv, 128/8); + cli_putstr_P(PSTR("\r\n plaintext:")); + cli_hexdump_block(plain, 4*128/8, 4, 8); + if(r) + return; + bcal_cfb_B_encMsg(iv, plain, 64, &ctx); + cli_putstr_P(PSTR("\r\n ciphertext: ")); + cli_hexdump_block(plain, 64, 4, 8); + + bcal_cfb_B_decMsg(iv, plain, 64, &ctx); + cli_putstr_P(PSTR("\r\n plaintext: ")); + cli_hexdump_block(plain, 64, 4, 8); + + bcal_cfb_B_free(&ctx); + +} + /*****************************************************************************/ void testrun_performance_aes128(void){ @@ -176,36 +277,36 @@ void testrun_performance_aes128(void){ char str[16]; uint8_t key[32], data[16]; aes128_ctx_t ctx; - + calibrateTimer(); print_overhead(); - + memset(key, 0, 32); memset(data, 0, 16); - + startTimer(1); aes128_init(key, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tctx-gen time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes128_enc(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tencrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes128_dec(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tdecrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - + cli_putstr_P(PSTR("\r\n")); } @@ -215,36 +316,36 @@ void testrun_performance_aes192(void){ char str[16]; uint8_t key[32], data[16]; aes192_ctx_t ctx; - + calibrateTimer(); print_overhead(); - + memset(key, 0, 32); memset(data, 0, 16); - + startTimer(1); aes192_init(key, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tctx-gen time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes192_enc(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tencrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes192_dec(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tdecrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - + cli_putstr_P(PSTR("\r\n")); } @@ -254,36 +355,36 @@ void testrun_performance_aes256(void){ char str[16]; uint8_t key[32], data[16]; aes256_ctx_t ctx; - + calibrateTimer(); print_overhead(); - + memset(key, 0, 32); memset(data, 0, 16); - + startTimer(1); aes256_init(key, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tctx-gen time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes256_enc(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tencrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - - + + startTimer(1); aes256_dec(data, &ctx); t = stopTimer(); cli_putstr_P(PSTR("\r\n\tdecrypt time: ")); ultoa((unsigned long)t, str, 10); cli_putstr(str); - + cli_putstr_P(PSTR("\r\n")); } @@ -303,24 +404,30 @@ void testrun_performance_aes(void){ const char nessie_str[] PROGMEM = "nessie"; const char test_str[] PROGMEM = "test"; const char testkey_str[] PROGMEM = "testkey"; +const char testcbc_str[] PROGMEM = "testcbc"; +const char testcfb8_str[] PROGMEM = "testcfb8"; const char performance_str[] PROGMEM = "performance"; +const char dump_str[] PROGMEM = "dump"; const char echo_str[] PROGMEM = "echo"; cmdlist_entry_t cmdlist[] PROGMEM = { { nessie_str, NULL, testrun_nessie_aes }, { test_str, NULL, testrun_test_aes}, { testkey_str, NULL, testrun_testkey_aes}, + { testcbc_str, NULL, testrun_aes128_cbc}, + { testcfb8_str, NULL, testrun_aes128_cfb8}, { performance_str, NULL, testrun_performance_aes}, + { dump_str, (void*)1, (void_fpt)dump}, { echo_str, (void*)1, (void_fpt)echo_ctrl}, { NULL, NULL, NULL} }; - + int main (void){ DEBUG_INIT(); - + cli_rx = (cli_rx_fpt)uart0_getc; - cli_tx = (cli_tx_fpt)uart0_putc; + cli_tx = (cli_tx_fpt)uart0_putc; for(;;){ cli_putstr_P(PSTR("\r\n\r\nCrypto-VS (")); cli_putstr(algo_name);