X-Git-Url: https://git.cryptolib.org/?a=blobdiff_plain;f=main-tdes-test.c;h=b3933dc0a18aa67330095c5a91591e91a6993e2e;hb=96ebafd201c9e8441c7677577b24aa402c1defc6;hp=fbb88d6bf86f47c9c07c1eb91a81ef9fead37fb7;hpb=79c9a6582ba071646a3062175715f59ebe210603;p=avr-crypto-lib.git diff --git a/main-tdes-test.c b/main-tdes-test.c index fbb88d6..b3933dc 100644 --- a/main-tdes-test.c +++ b/main-tdes-test.c @@ -1,245 +1,131 @@ -/** - * \file main-tdes-test.c - * \author Daniel Otte - * \date 2007-06-17 - * \brief test suit for TDES/TDEA - * \par License - * GPL +/* main-tdes-test.c */ +/* + This file is part of the Crypto-avr-lib/microcrypt-lib. + Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ +/* + * tdes test-suit * - */ +*/ + #include "config.h" #include "serial-tools.h" #include "uart.h" #include "debug.h" #include "des.h" +#include "nessie_bc_test.h" +#include "cli.h" +#include "performance_test.h" #include #include +#include +char* cipher_name = "TDES"; /***************************************************************************** * additional validation-functions * *****************************************************************************/ - -/***************************************************************************** - * self tests * - *****************************************************************************/ - -void testencrypt(uint8_t* block, uint8_t* key){ - uart_putstr("\r\n==testy-encrypt==\r\n key: "); - uart_hexdump(key,8); - uart_putstr("\r\n plain: "); - uart_hexdump(block,8); - tdes_encrypt(block,block,key); - uart_putstr("\r\n crypt: "); - uart_hexdump(block,8); +void tdes_init_dummy(const void* key, uint16_t keysize_b, void* ctx){ + memcpy(ctx, key, 8*3); } -void testdecrypt(uint8_t* block, uint8_t* key){ - uart_putstr("\r\n==testy-decrypt==\r\n key: "); - uart_hexdump(key,8); - uart_putstr("\r\n crypt: "); - uart_hexdump(block,8); - tdes_decrypt(block,block,key); - uart_putstr("\r\n plain: "); - uart_hexdump(block,8); +void tdes_enc_dummy(void* buffer, void* ctx){ + tdes_encrypt(buffer, buffer, ctx); +} + +void tdes_dec_dummy(void* buffer, void* ctx){ + tdes_decrypt(buffer, buffer, ctx); +} + +void testrun_nessie_tdes(void){ + nessie_bc_init(); + nessie_bc_ctx.blocksize_B = 8; + nessie_bc_ctx.keysize_b = 192; + nessie_bc_ctx.name = cipher_name; + nessie_bc_ctx.ctx_size_B = sizeof(8*3); + nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)tdes_enc_dummy; + nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)tdes_dec_dummy; + nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)tdes_init_dummy; + + nessie_bc_run(); } -/******************************************************************************/ -void testrun_des(void){ +void testrun_performance_tdes(void){ + uint16_t i,c; + uint64_t t; + char str[16]; + uint8_t key[8*3], data[8]; -/* uint8_t key[]= { 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; */ -/* uint8_t data[]={ 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; */ - - uint8_t key[] = { 0x3b, 0x38, 0x98, 0x37, 0x15, 0x20, 0xf7, 0x5e, - 0x92, 0x2f, 0xb5, 0x10, 0xc7, 0x1f, 0x43, 0x6e, - 0x3b, 0x38, 0x98, 0x37, 0x15, 0x20, 0xf7, 0x5e - }; - uint8_t data[]= { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; - testencrypt(data,key); - testdecrypt(data,key); -} - -/******************************************************************************/ - -void nessie_testenc(uint8_t* data, uint8_t* key){ - uint16_t i; - uart_putstr("\r\n\t key = \t"); uart_hexdump(key, 24); - uart_putstr("\r\n\t plain = \t"); uart_hexdump(data, 8); - tdes_encrypt(data,data,key); - uart_putstr("\r\n\t cipher = \t"); uart_hexdump(data, 8); - tdes_decrypt(data,data,key); - uart_putstr("\r\n\t decrypted = \t"); uart_hexdump(data, 8); + calibrateTimer(); + getOverhead(&c, &i); + uart_putstr_P(PSTR("\r\n\r\n=== benchmark ===")); + utoa(c, str, 10); + uart_putstr_P(PSTR("\r\n\tconst overhead: ")); + uart_putstr(str); + utoa(i, str, 10); + uart_putstr_P(PSTR("\r\n\tinterrupt overhead: ")); + uart_putstr(str); - for(i=0;i<100; ++i) - tdes_encrypt(data,data,key); - uart_putstr("\r\n\tIterated 100 times = \t"); uart_hexdump(data, 8); - for(;i<1000; ++i) - tdes_encrypt(data,data,key); - uart_putstr("\r\n\tIterated 1000 times = \t"); uart_hexdump(data, 8); + memset(key, 0, 8*3); + memset(data, 0, 8); -} - -/******************************************************************************/ -/* -Set 8, vector# 0: - key=0001020304050607 - cipher=0011223344556677 - plain=41AD068548809D02 - encrypted=0011223344556677 -*/ -void nessie_testdec(uint8_t* data, uint8_t* key){ - uart_putstr("\r\n\t key = \t"); uart_hexdump(key, 24); - uart_putstr("\r\n\t cipher = \t"); uart_hexdump(data, 8); - tdes_decrypt(data,data,key); - uart_putstr("\r\n\t plain = \t"); uart_hexdump(data, 8); - tdes_encrypt(data,data,key); - uart_putstr("\r\n\t encrypted = \t"); uart_hexdump(data, 8); -} - -/******************************************************************************/ - -void nessie_testrun(void){ - /* - Set 1, vector# 0: - key=8000000000000000 - plain=0000000000000000 - cipher=95A8D72813DAA94D - decrypted=0000000000000000 - Iterated 100 times=F749E1F8DEFAF605 - Iterated 1000 times=F396DD0B33D04244 - */ - uint8_t key[24]; - uint8_t data[8]; - uint16_t set=1, vector; - /* set 1 */ - for(vector=0;vector<192;++vector){ - memset(key, 0, 24); - memset(data, 0, 8); - key[vector/8] = 1<<(7-vector%8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 1); - nessie_testenc(data, key); - } - /* set 2 */ - set = 2; - for(vector=0;vector<64;++vector){ - memset(key, 0, 24); - memset(data, 0, 8); - data[vector/8] = 1<<(7-vector%8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 1); - nessie_testenc(data, key); - } - /* set 3 */ - set = 3; - for(vector=0;vector<256;++vector){ - memset(key, vector, 24); - memset(data, vector, 8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 2); - nessie_testenc(data, key); - } - /* set 4 */ - set = 4; - { uint8_t lk[2][24] = { /* local keys */ - { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, - 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, - { 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, 0xB3, 0x00, - 0x95, 0x2C, 0x49, 0x10, 0x48, 0x81, 0xFF, 0x48, - 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, 0xB3, 0x00 } }; - uint8_t ld[2][8] = { /* local data */ - { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, - { 0xEA, 0x02, 0x47, 0x14, 0xAD, 0x5C, 0x4D, 0x84 } }; - - for(vector=0;vector<2;++vector){ - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 2); - nessie_testenc(ld[vector], lk[vector]); - } - } - /* set 5 */ - set = 5; - for(vector=0;vector<192;++vector){ - memset(key, 0, 24); - memset(data, 0, 8); - key[vector/8] = 1<<(7-vector%8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 1); - nessie_testdec(data, key); - } - /* set 6 */ - set = 6; - for(vector=0;vector<64;++vector){ - memset(key, 0, 24); - memset(data, 0, 8); - data[vector/8] = 1<<(7-vector%8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 1); - nessie_testdec(data, key); - } - /* set 7 */ - set = 7; - for(vector=0;vector<256;++vector){ - memset(key, vector, 24); - memset(data, vector, 8); - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 2); - nessie_testdec(data, key); - } - /* set 8 */ - set = 8; - { uint8_t lk[2][24] = { - { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, - 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F, - 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17 }, - { 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, 0xB3, 0x00, - 0x95, 0x2C, 0x49, 0x10, 0x48, 0x81, 0xFF, 0x48, - 0x2B, 0xD6, 0x45, 0x9F, 0x82, 0xC5, 0xB3, 0x00 } }; - uint8_t ld[2][8] = { /* local data */ - { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77 }, - { 0xEA, 0x02, 0x47, 0x14, 0xAD, 0x5C, 0x4D, 0x84 } }; - - for(vector=0;vector<2;++vector){ - uart_putstr("\r\n Set "); uart_hexdump(&set, 1); - uart_putstr(", vector# "); uart_hexdump(&vector, 2); - nessie_testdec(ld[vector], lk[vector]); - } - } + startTimer(1); + tdes_encrypt(data, data, key); + t = stopTimer(); + uart_putstr_P(PSTR("\r\n\tencrypt time: ")); + ultoa((unsigned long)t, str, 10); + uart_putstr(str); + startTimer(1); + tdes_decrypt(data, data, key); + t = stopTimer(); + uart_putstr_P(PSTR("\r\n\tdecrypt time: ")); + ultoa((unsigned long)t, str, 10); + uart_putstr(str); + uart_putstr_P(PSTR("\r\n")); } - /***************************************************************************** * main * *****************************************************************************/ int main (void){ - char str[20]; - + char str[20]; DEBUG_INIT(); uart_putstr("\r\n"); - uart_putstr("\r\n\r\nCrypto-VS (TDES/TDEA; "); - uart_putstr(__DATE__);uart_putstr(", ");uart_putstr(__TIME__); - uart_putstr(")\r\nloaded and running\r\n"); + uart_putstr_P(PSTR("\r\n\r\nCrypto-VS (")); + uart_putstr(cipher_name); + uart_putstr_P(PSTR(")\r\nloaded and running\r\n")); + + PGM_P u = PSTR("nessie\0test\0performance\0"); + void_fpt v[] = {testrun_nessie_tdes, testrun_nessie_tdes, testrun_performance_tdes}; -restart: while(1){ - if (!getnextwordn(str,20)) {DEBUG_S("DBG: W1\r\n"); goto error;} - if (!strcmp(str, "test")) { testrun_des(); } - else if (!strcmp(str, "nessie")) { nessie_testrun();} - else {DEBUG_S("DBG: 1b\r\n"); goto error;} - - goto restart; + if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;} + if(execcommand_d0_P(str, u, v)<0){ + uart_putstr_P(PSTR("\r\nunknown command\r\n")); + } continue; error: uart_putstr("ERROR\r\n"); } - }