X-Git-Url: https://git.cryptolib.org/?p=avr-crypto-lib.git;a=blobdiff_plain;f=test_src%2Fmain-camellia-test.c;h=4eb03959048136febf3596385972aa4b078ceda8;hp=4d64a506be1605e2e7caea88c5ceedcbb85fb0d3;hb=4b5da1dc27a791b5c448274a3db09cd035b33493;hpb=2159c273c9d3361571a6ff1ab63d9bc76582fbab diff --git a/test_src/main-camellia-test.c b/test_src/main-camellia-test.c index 4d64a50..4eb0395 100644 --- a/test_src/main-camellia-test.c +++ b/test_src/main-camellia-test.c @@ -1,7 +1,7 @@ /* main-camellia-test.c */ /* - This file is part of the Crypto-avr-lib/microcrypt-lib. - Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) + This file is part of the AVR-Crypto-Lib. + Copyright (C) 2006-2015 Daniel Otte (bg@nerilex.org) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -21,115 +21,165 @@ * */ -#include "config.h" -#include "serial-tools.h" -#include "uart.h" -#include "debug.h" +#include "main-test-common.h" #include "camellia.h" -#include "nessie_bc_test.h" #include "performance_test.h" -#include "cli.h" +#include "bcal_camellia128.h" +#include "bcal-performance.h" +#include "bcal-nessie.h" -char* cipher_name = "Camellia"; - - -#include -#include -#include -#include +char *algo_name = "Camellia"; +const bcdesc_t *const algolist[] PROGMEM = { + (bcdesc_t*)&camellia128_desc, + NULL +}; /***************************************************************************** * additional validation-functions * *****************************************************************************/ -void camellia128_init_dummy(void* key, uint16_t keysize_b, void* ctx){ - camellia128_init(key, ctx); -} void testrun_nessie_camellia(void){ - nessie_bc_ctx.blocksize_B = 16; - nessie_bc_ctx.keysize_b = 128; - nessie_bc_ctx.name = cipher_name; - nessie_bc_ctx.ctx_size_B = sizeof(camellia128_ctx_t); - nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)camellia128_enc; - nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)camellia128_dec; - nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)camellia128_init_dummy; - - nessie_bc_run(); + bcal_nessie_multiple(algolist); } +/* + * P No.001 : 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 + */ -void test_performance_camellia(void){ - uint64_t t; - char str[6]; - uint8_t key[16], data[16]; - camellia128_ctx_t ctx; - - calibrateTimer(); - print_overhead(); - - memset(key, 0, 16); - memset(data, 0, 16); - - startTimer(1); - camellia128_init(key, &ctx); - t = stopTimer(); - uart_putstr_P(PSTR("\r\n\tctx-gen time: ")); - ultoa((unsigned long)t, str, 10); - uart_putstr(str); - - - startTimer(1); - camellia128_enc(data, &ctx); - t = stopTimer(); - uart_putstr_P(PSTR("\r\n\tencrypt time: ")); - ultoa((unsigned long)t, str, 10); - uart_putstr(str); - - - startTimer(1); - camellia128_dec(data, &ctx); - t = stopTimer(); - uart_putstr_P(PSTR("\r\n\tdecrypt time: ")); - ultoa((unsigned long)t, str, 10); - uart_putstr(str); - - uart_putstr_P(PSTR("\r\n")); +const uint8_t test_keys[] PROGMEM = { + 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, + 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, + 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, 0x0F, + 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, 0xF0, + 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF, + 0xFF, 0xEE, 0xDD, 0xCC, 0xBB, 0xAA, 0x99, 0x88, 0x77, 0x66, 0x55, 0x44, 0x33, 0x22, 0x11, 0x00, + 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, + 0xFE, 0xDC, 0xBA, 0x98, 0x76, 0x54, 0x32, 0x10, 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF, + 0x10, 0x32, 0x54, 0x76, 0x98, 0xBA, 0xDC, 0xFE, 0xEF, 0xCD, 0xAB, 0x89, 0x67, 0x45, 0x23, 0x01, + 0xEF, 0xCD, 0xAB, 0x89, 0x67, 0x45, 0x23, 0x01, 0x10, 0x32, 0x54, 0x76, 0x98, 0xBA, 0xDC, 0xFE +}; + +void hexdump128(void *data){ + uint8_t i; + for(i=0; i<16; ++i){ + cli_hexdump(data, 1); + cli_putc(' '); + data = (uint8_t*)data +1; + } } +void testrun_camellia128(void){ + uint8_t data[16]; + uint8_t data2[16]; + uint8_t key[16]; + char str[4]; + uint8_t i,j; + str[3]= '\0'; + for(j=0; j<10; ++j){ + str[0] = ('0'+(j+1)/100); + str[1] = ('0'+((j+1)/10)%10); + str[2] = ('0'+(j+1)%10); + memcpy_P(key, test_keys+j*16, 16); + cli_putstr_P(PSTR("\r\nK No.")); + cli_putstr(str); + cli_putstr_P(PSTR(" : ")); + hexdump128(key); + camellia128_ctx_t ctx; + camellia128_init(key, &ctx); + for(i=0; i<128; ++i){ + memset(data, 0x00, 16); + data[i/8] = 0x80>>i%8; + memcpy(data2, data, 16); + str[0] = ('0'+(i+1)/100); + str[1] = ('0'+((i+1)/10)%10); + str[2] = ('0'+(i+1)%10); + cli_putstr_P(PSTR("\r\nP No.")); + cli_putstr(str); + cli_putstr_P(PSTR(" : ")); + hexdump128(data); + camellia128_enc(data, &ctx); + cli_putstr_P(PSTR("\r\nC No.")); + cli_putstr(str); + cli_putstr_P(PSTR(" : ")); + hexdump128(data); + camellia128_dec(data, &ctx); + if(memcmp(data, data2, 16)){ + cli_putstr_P(PSTR("\r\n DECRYPTION ERROR !!!")); + } + } + } +} + +void test_performance_camellia(void){ + bcal_performance_multiple(algolist); +} /***************************************************************************** * self tests * *****************************************************************************/ +/* +128-bit key +key 01 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 10 +plaintext 01 23 45 67 89 ab cd ef fe dc ba 98 76 54 32 10 +ciphertext 67 67 31 38 54 96 69 73 08 57 06 56 48 ea be 43 +*/ +void testrun_camellia(void){ + + uint8_t data[16] = { 0x01, 0x23, 0x45, 0x67, + 0x89, 0xab, 0xcd, 0xef, + 0xfe, 0xdc, 0xba, 0x98, + 0x76, 0x54, 0x32, 0x10 }; + + uint8_t key[16] = { 0x01, 0x23, 0x45, 0x67, + 0x89, 0xab, 0xcd, 0xef, + 0xfe, 0xdc, 0xba, 0x98, + 0x76, 0x54, 0x32, 0x10 }; + + + camellia128_ctx_t ctx; + camellia128_init(key, &ctx); + cli_putstr_P(PSTR("\r\n key: ")); + cli_hexdump(data, 16); + cli_putstr_P(PSTR("\r\n plaintext: ")); + cli_hexdump(data, 16); + camellia128_enc(data, &ctx); + cli_putstr_P(PSTR("\r\n ciphertext: ")); + cli_hexdump(data, 16); + camellia128_dec(data, &ctx); + cli_putstr_P(PSTR("\r\n decrypted: ")); + cli_hexdump(data, 16); + +} + /***************************************************************************** - * main * + * main * *****************************************************************************/ +const char nessie_str[] PROGMEM = "nessie"; +const char test_str[] PROGMEM = "test"; +const char test128_str[] PROGMEM = "test128"; +const char performance_str[] PROGMEM = "performance"; +const char echo_str[] PROGMEM = "echo"; + +const cmdlist_entry_t cmdlist[] PROGMEM = { + { nessie_str, NULL, testrun_nessie_camellia }, + { test_str, NULL, testrun_camellia}, + { test128_str, NULL, testrun_camellia128}, + { performance_str, NULL, test_performance_camellia}, + { echo_str, (void*)1, (void_fpt)echo_ctrl}, + { NULL, NULL, NULL} +}; + int main (void){ - char str[20]; - - - DEBUG_INIT(); - uart_putstr("\r\n"); - - uart_putstr_P(PSTR("\r\n\r\nCrypto-VS (")); - uart_putstr(cipher_name); - uart_putstr_P(PSTR(")\r\nloaded and running\r\n")); - - PGM_P u = PSTR("nessie\0test\0performance\0"); - void_fpt v[] = {testrun_nessie_camellia, testrun_nessie_camellia, test_performance_camellia}; - - while(1){ - if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;} - if(execcommand_d0_P(str, u, v)<0){ - uart_putstr_P(PSTR("\r\nunknown command\r\n")); - } - continue; - error: - uart_putstr("ERROR\r\n"); + main_setup(); + + for(;;){ + welcome_msg(algo_name); + cmd_interface(cmdlist); } }