+++ /dev/null
-/* nessie_stream_test.c */
-/*
- This file is part of the Crypto-avr-lib/microcrypt-lib.
- Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
-
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation, either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-*/
-/**
- *
- * author: Daniel Otte
- * email: daniel.otte@rub.de
- * license: GPLv3
- *
- * a suit for running the nessie-tests for streamciphers
- *
- * */
-#include <stdint.h>
-#include <string.h>
-#include "nessie_stream_test.h"
-#include "nessie_common.h"
-#include "uart.h"
-
-nessie_stream_ctx_t nessie_stream_ctx;
-
-
-#define BLOCKSIZE_B 64
-
-static
-void memxor(void* dest, void* src, uint8_t length){
- while(length--){
- *((uint8_t*)dest) ^= *((uint8_t*)src);
- dest = (uint8_t*)dest +1;
- src = (uint8_t*)src +1;
- }
-}
-
-
-static
-void nessie_gen_block(void* ctx, uint8_t* block){
- uint16_t i;
- for(i=0; i<BLOCKSIZE_B; ++i){
- block[i] = nessie_stream_ctx.cipher_enc(ctx);
- }
-}
-
-static
-void nessie_stream_enc(uint8_t* key){
- uint8_t ctx[nessie_stream_ctx.ctx_size_B];
- uint8_t buffer[BLOCKSIZE_B];
- uint8_t xorbuffer[BLOCKSIZE_B];
- uint8_t i;
-
- memset(xorbuffer, 0, BLOCKSIZE_B);
-
- nessie_print_item("key", key, (nessie_stream_ctx.keysize_b+7)/8);
-
- nessie_stream_ctx.cipher_genctx(key, nessie_stream_ctx.keysize_b, ctx);
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[0..63]", buffer, BLOCKSIZE_B);
-
- for(i=0; i<((192-0)/BLOCKSIZE_B-1); ++i){
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- }
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[192..255]", buffer, BLOCKSIZE_B);
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[256..319]", buffer, BLOCKSIZE_B);
-
- for(i=0; i<((448-256)/BLOCKSIZE_B-1); ++i){
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- }
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[448..511]", buffer, BLOCKSIZE_B);
-
- nessie_print_item("stream[0..511]xored", xorbuffer, BLOCKSIZE_B);
-
-}
-
-
-static
-void nessie_stream_enc_large(uint8_t* key){
- uint8_t ctx[nessie_stream_ctx.ctx_size_B];
- uint8_t buffer[BLOCKSIZE_B];
- uint8_t xorbuffer[BLOCKSIZE_B];
- uint32_t i;
-
- memset(xorbuffer, 0, BLOCKSIZE_B);
-
- nessie_print_item("key", key, (nessie_stream_ctx.keysize_b+7)/8);
-
- nessie_stream_ctx.cipher_genctx(key, nessie_stream_ctx.keysize_b, ctx);
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[0..63]", buffer, BLOCKSIZE_B);
-
- for(i=0; i<((65472-0)/BLOCKSIZE_B-1); ++i){
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- }
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[65472..65535]", buffer, BLOCKSIZE_B);
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[65536..65599]", buffer, BLOCKSIZE_B);
-
- for(i=0; i<((131008-65536)/BLOCKSIZE_B-1); ++i){
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- }
-
- nessie_gen_block(ctx, buffer);
- memxor(xorbuffer, buffer, BLOCKSIZE_B);
- nessie_print_item("stream[131008..131071]", buffer, BLOCKSIZE_B);
-
- nessie_print_item("stream[0..131071]xored", xorbuffer, BLOCKSIZE_B);
-
-}
-
-void nessie_stream_run(void){
- uint16_t i;
- uint8_t set;
- uint8_t key[(nessie_stream_ctx.keysize_b+7)/8];
-
- nessie_print_header(nessie_stream_ctx.name, nessie_stream_ctx.keysize_b,
- 0, 0, 0, nessie_stream_ctx.ivsize_b);
- /* test set 1 */
- set=1;
- nessie_print_setheader(set);
- for(i=0; i<nessie_stream_ctx.keysize_b; ++i){
- nessie_print_set_vector(set, i);
- memset(key, 0, (nessie_stream_ctx.keysize_b+7)/8);
- key[i/8] |= 0x80>>(i%8);
- nessie_stream_enc(key);
- }
- /* test set 2 */
- set=2;
- nessie_print_setheader(set);
- for(i=0; i<256; ++i){
- nessie_print_set_vector(set, i);
- memset(key, i, (nessie_stream_ctx.keysize_b+7)/8);
- nessie_stream_enc(key);
- }
- /* test set 3 */
- set=3;
- nessie_print_setheader(set);
- for(i=0; i<256; ++i){
- uint8_t j;
- nessie_print_set_vector(set, i);
- for(j=0; j<(nessie_stream_ctx.keysize_b+7)/8; ++j){
- key[j]=(i+j)&0xff;
- }
- nessie_stream_enc(key);
- }
- /* test set 4 */
- set=4;
- nessie_print_setheader(set);
- for(i=0; i<4; ++i){
- uint8_t j;
- nessie_print_set_vector(set, i);
- for(j=0; j<(nessie_stream_ctx.keysize_b+7)/8; ++j){
- key[j]=(i*5+j*0x53)&0xff;
- }
- nessie_stream_enc_large(key);
- }
-
- nessie_print_footer();
-}