--- /dev/null
+/* main-twister224-test.c */
+/*
+ This file is part of the Crypto-avr-lib/microcrypt-lib.
+ Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+/*
+ * twister test suit
+ *
+*/
+
+#include "config.h"
+#include "serial-tools.h"
+#include "uart.h"
+#include "debug.h"
+
+#include "twister-small.h"
+#include "nessie_hash_test.h"
+#include "performance_test.h"
+
+#include <stdint.h>
+#include <string.h>
+#include <stdlib.h>
+#include "cli.h"
+
+char* algo_name = "TWISTER-224";
+
+/*****************************************************************************
+ * additional validation-functions *
+ *****************************************************************************/
+void twister224_init_dummy(void* ctx){
+ twister_small_init(ctx, 224);
+}
+
+void twister224_next_dummy(void* buffer, void* ctx){
+ twister_small_nextBlock(ctx, buffer);
+}
+
+void twister224_last_dummy(void* buffer, uint16_t size_b, void* ctx){
+ twister_small_lastBlock(ctx, buffer, size_b);
+}
+
+void twister224_ctx2hash_dummy(void* buffer, void* ctx){
+ twister_small_ctx2hash(buffer, ctx, 224);
+}
+
+
+void testrun_nessie_twister224(void){
+ nessie_hash_ctx.hashsize_b = 224;
+ nessie_hash_ctx.blocksize_B = 512/8;
+ nessie_hash_ctx.ctx_size_B = sizeof(twister_state_t);
+ nessie_hash_ctx.name = algo_name;
+ nessie_hash_ctx.hash_init = (nessie_hash_init_fpt)twister224_init_dummy;
+ nessie_hash_ctx.hash_next = (nessie_hash_next_fpt)twister224_next_dummy;
+ nessie_hash_ctx.hash_last = (nessie_hash_last_fpt)twister224_last_dummy;
+ nessie_hash_ctx.hash_conv = (nessie_hash_conv_fpt)twister224_ctx2hash_dummy;
+
+ nessie_hash_run();
+}
+
+/*****************************************************************************
+ * self tests *
+ *****************************************************************************/
+
+void testrun_twister224(void){
+ twister224_hash_t hash;
+ char* testv[]={
+ "",
+ "a",
+ "abc",
+ "message digest",
+ "abcdefghijklmnopqrstuvwxyz",
+ "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789",
+ "12345678901234567890123456789012345678901234567890123456789012345678901234567890"};
+ uint32_t i;
+
+ uart_putstr_P(PSTR("\r\n=== TWISTER-224 test suit (MD5 test values) ==="));
+ for(i=0; i<7; ++i){
+ uart_putstr_P(PSTR("\r\n TWISTER-224 (\""));
+ uart_putstr(testv[i]);
+ uart_putstr_P(PSTR("\") = \r\n\t"));
+ twister224(&hash, testv[i], strlen(testv[i])*8);
+ uart_hexdump(hash, 224/8);
+ }
+
+ uart_putstr_P(PSTR("\r\n\r\n=== TWISTER-224 test suit (short test values) ==="));
+ uint8_t stestv[]= {0x00, 0x00, 0xC0, 0xC0, 0x80, 0x48, 0x50};
+ uint8_t stestl[]= { 0, 1, 2, 3, 4, 5, 6};
+ for(i=0; i<7; ++i){
+ uart_putstr_P(PSTR("\r\n TWISTER-224 (\""));
+ uart_hexdump(&(stestv[i]), 1);
+ uart_putstr_P(PSTR("\") = \r\n\t"));
+ twister224(&hash, &(stestv[i]), stestl[i]);
+ uart_hexdump(hash, 224/8);
+ }
+
+ uart_putstr_P(PSTR("\r\n\r\n=== TWISTER-224 test suit (long test) ==="));
+ char* ltest= "abcdefghbcdefghicdefghijdefghijk"
+ "efghijklfghijklmghijklmnhijklmno";
+ twister224_ctx_t ctx;
+ twister224_init(&ctx);
+ uart_putstr_P(PSTR("\r\n TWISTER-224 ( 16777216 x \""));
+ uart_putstr(ltest);
+ uart_putstr_P(PSTR("\") = \r\n\t"));
+ for(i=0; i<16777216; ++i){
+ twister224_nextBlock(&ctx, ltest);
+ }
+ twister224_ctx2hash(hash, &ctx)
+ uart_hexdump(hash, 224/8);
+}
+
+
+void testrun_performance_twister224(void){
+ uint64_t t;
+ char str[16];
+ uint8_t data[64];
+ twister_state_t ctx;
+
+ calibrateTimer();
+ print_overhead();
+
+ memset(data, 0, 64);
+
+ startTimer(1);
+ twister_small_init(&ctx, 224);
+ t = stopTimer();
+ uart_putstr_P(PSTR("\r\n\tctx-gen time: "));
+ ultoa((unsigned long)t, str, 10);
+ uart_putstr(str);
+
+
+ startTimer(1);
+ twister_small_nextBlock(&ctx, data);
+ t = stopTimer();
+ uart_putstr_P(PSTR("\r\n\tone-block time: "));
+ ultoa((unsigned long)t, str, 10);
+ uart_putstr(str);
+
+
+ startTimer(1);
+ twister_small_lastBlock(&ctx, data, 0);
+ t = stopTimer();
+ uart_putstr_P(PSTR("\r\n\tlast block time: "));
+ ultoa((unsigned long)t, str, 10);
+ uart_putstr(str);
+
+ startTimer(1);
+ twister_small_ctx2hash(data, &ctx, 224);
+ t = stopTimer();
+ uart_putstr_P(PSTR("\r\n\tctx2hash time: "));
+ ultoa((unsigned long)t, str, 10);
+ uart_putstr(str);
+
+ uart_putstr_P(PSTR("\r\n"));
+}
+
+
+/*****************************************************************************
+ * main *
+ *****************************************************************************/
+
+int main (void){
+ char str[20];
+
+
+ DEBUG_INIT();
+ uart_putstr_P(PSTR("\r\n"));
+
+ uart_putstr_P(PSTR("\r\n\r\nCrypto-VS ("));
+ uart_putstr(algo_name);
+ uart_putstr_P(PSTR(")\r\nloaded and running\r\n"));
+ PGM_P u = PSTR("nessie\0test\0performance\0");
+ void_fpt v[] = { testrun_nessie_twister224,
+ testrun_twister224,
+ testrun_performance_twister224 };
+
+ while(1){
+ if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;}
+ if(execcommand_d0_P(str, u, v)<0){
+ uart_putstr_P(PSTR("\r\nunknown command\r\n"));
+ }
+ continue;
+ error:
+ uart_putstr("ERROR\r\n");
+ }
+}
+