]> git.cryptolib.org Git - avr-crypto-lib.git/blobdiff - test_src/main-twister384-test.c
twister now in ASM
[avr-crypto-lib.git] / test_src / main-twister384-test.c
diff --git a/test_src/main-twister384-test.c b/test_src/main-twister384-test.c
new file mode 100644 (file)
index 0000000..87adf5e
--- /dev/null
@@ -0,0 +1,210 @@
+/* main-twister384-test.c */
+/*
+    This file is part of the Crypto-avr-lib/microcrypt-lib.
+    Copyright (C) 2008  Daniel Otte (daniel.otte@rub.de)
+
+    This program is free software: you can redistribute it and/or modify
+    it under the terms of the GNU General Public License as published by
+    the Free Software Foundation, either version 3 of the License, or
+    (at your option) any later version.
+
+    This program is distributed in the hope that it will be useful,
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+    GNU General Public License for more details.
+
+    You should have received a copy of the GNU General Public License
+    along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
+/*
+ * twister test suit
+ * 
+*/
+
+#include "config.h"
+#include "serial-tools.h"
+#include "uart.h"
+#include "debug.h"
+
+#include "twister-big.h"
+#include "nessie_hash_test.h"
+#include "performance_test.h"
+
+#include <stdint.h>
+#include <string.h>
+#include <stdlib.h>
+#include "cli.h"
+
+char* algo_name = "TWISTER-384";
+
+/*****************************************************************************
+ *  additional validation-functions                                                                                     *
+ *****************************************************************************/
+void twister384_init_dummy(void* ctx){
+       twister_big_init(ctx, 384);
+}
+
+void twister384_next_dummy(void* buffer, void* ctx){
+       twister_big_nextBlock(ctx, buffer);
+}
+
+void twister384_last_dummy(void* buffer, uint16_t size_b, void* ctx){
+       twister_big_lastBlock(ctx, buffer, size_b);
+}
+
+void twister384_ctx2hash_dummy(void* buffer, void* ctx){
+       twister_big_ctx2hash(buffer, ctx, 384);
+}
+
+
+void testrun_nessie_twister384(void){
+       nessie_hash_ctx.hashsize_b  = 384;
+       nessie_hash_ctx.blocksize_B = 512/8;
+       nessie_hash_ctx.ctx_size_B  = sizeof(twister_big_ctx_t);
+       nessie_hash_ctx.name = algo_name;
+       nessie_hash_ctx.hash_init = (nessie_hash_init_fpt)twister384_init_dummy;
+       nessie_hash_ctx.hash_next = (nessie_hash_next_fpt)twister384_next_dummy;
+       nessie_hash_ctx.hash_last = (nessie_hash_last_fpt)twister384_last_dummy;
+       nessie_hash_ctx.hash_conv = (nessie_hash_conv_fpt)twister384_ctx2hash_dummy;
+       
+       nessie_hash_run();
+}
+
+/******************************************************************************   
+ * selftests
+ ******************************************************************************/
+
+void print_hash(void* hash){
+       uart_hexdump(hash, 256/8);
+       uart_putstr_P(PSTR("\r\n\t"));
+       uart_hexdump((uint8_t*)hash+256/8, 128/8);
+       
+}
+
+void testrun_twister384(void){
+       twister384_hash_t hash;
+       char* testv[]={
+               "", 
+               "a", 
+               "abc", 
+               "message digest", 
+               "abcdefghijklmnopqrstuvwxyz", 
+               "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789", 
+               "12345678901234567890123456789012345678901234567890123456789012345678901234567890"};
+       uint32_t i;
+       
+       uart_putstr_P(PSTR("\r\n=== TWISTER-384 test suit (MD5 test values) ==="));
+       for(i=0; i<7; ++i){
+               uart_putstr_P(PSTR("\r\n TWISTER-384 (\""));
+               uart_putstr(testv[i]);
+               uart_putstr_P(PSTR("\") = \r\n\t"));
+               twister384(&hash, testv[i], strlen(testv[i])*8);
+               print_hash(hash);
+       //      return;
+       }
+       
+       uart_putstr_P(PSTR("\r\n\r\n=== TWISTER-384 test suit (short test values) ==="));
+       uint8_t stestv[]= {0x00, 0x00, 0xC0, 0xC0, 0x80, 0x48, 0x50};
+       uint8_t stestl[]= {   0,    1,    2,    3,    4,    5,    6};   
+       for(i=0; i<7; ++i){
+               uart_putstr_P(PSTR("\r\n TWISTER-384 (\""));
+               uart_hexdump(&(stestv[i]), 1);
+               uart_putstr_P(PSTR("\") = \r\n\t"));
+               twister384(hash, &(stestv[i]), stestl[i]);
+               print_hash(hash);
+       }
+       
+#ifdef TWISTER_LONGTEST
+       uart_putstr_P(PSTR("\r\n\r\n=== TWISTER-384 test suit (long test) ==="));
+       char* ltest= "abcdefghbcdefghicdefghijdefghijk"
+                           "efghijklfghijklmghijklmnhijklmno"; 
+       twister384_ctx_t ctx;
+       twister384_init(&ctx);  
+       uart_putstr_P(PSTR("\r\n TWISTER-384 ( 16777216 x \""));
+       uart_putstr(ltest);     
+       uart_putstr_P(PSTR("\") = \r\n\t"));
+       for(i=0; i<16777216; ++i){
+               twister384_nextBlock(&ctx, ltest);
+       }
+       twister384_ctx2hash(hash, &ctx);
+       print_hash(hash);
+#endif
+}
+
+
+void testrun_performance_twister384(void){
+       uint64_t t;
+       char str[16];
+       uint8_t data[64];
+       twister_big_ctx_t ctx;
+       
+       calibrateTimer();
+       print_overhead();
+       
+       memset(data, 0, 64);
+       
+       startTimer(1);
+       twister_big_init(&ctx, 384);
+       t = stopTimer();
+       uart_putstr_P(PSTR("\r\n\tctx-gen time: "));
+       ultoa((unsigned long)t, str, 10);
+       uart_putstr(str);
+       
+       
+       startTimer(1);
+       twister_big_nextBlock(&ctx, data);
+       t = stopTimer();
+       uart_putstr_P(PSTR("\r\n\tone-block time: "));
+       ultoa((unsigned long)t, str, 10);
+       uart_putstr(str);
+       
+       
+       startTimer(1);
+       twister_big_lastBlock(&ctx, data, 0);
+       t = stopTimer();
+       uart_putstr_P(PSTR("\r\n\tlast block time: "));
+       ultoa((unsigned long)t, str, 10);
+       uart_putstr(str);
+       
+       startTimer(1);
+       twister_big_ctx2hash(data, &ctx, 384);
+       t = stopTimer();
+       uart_putstr_P(PSTR("\r\n\tctx2hash time: "));
+       ultoa((unsigned long)t, str, 10);
+       uart_putstr(str);
+
+       uart_putstr_P(PSTR("\r\n"));
+}
+
+
+/*****************************************************************************
+ * main
+ *
+ *****************************************************************************/
+
+int main (void){
+       char str[20];
+
+       
+       DEBUG_INIT();
+       uart_putstr_P(PSTR("\r\n"));
+
+       uart_putstr_P(PSTR("\r\n\r\nCrypto-VS (")); 
+       uart_putstr(algo_name);
+       uart_putstr_P(PSTR(")\r\nloaded and running\r\n"));
+       PGM_P    u   = PSTR("nessie\0test\0performance\0");
+       void_fpt v[] = { testrun_nessie_twister384, 
+                         testrun_twister384, 
+                         testrun_performance_twister384 };
+
+       while(1){ 
+               if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;}
+               if(execcommand_d0_P(str, u, v)<0){
+                       uart_putstr_P(PSTR("\r\nunknown command\r\n"));
+               }
+               continue;
+       error:
+               uart_putstr("ERROR\r\n");
+       }
+}
+