--- /dev/null
+#!/usr/bin/ruby
+# rsaes_oaep_check.rb
+=begin
+ This file is part of the AVR-Crypto-Lib.
+ Copyright (C) 2008 Daniel Otte (daniel.otte@rub.de)
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+=end
+
+require 'rubygems'
+require 'serialport'
+require 'getopt/std'
+
+$buffer_size = 0 # set automatically in init_system
+$conffile_check = Hash.new
+$conffile_check.default = 0
+$debug = false
+$logfile = nil
+
+################################################################################
+# readconfigfile #
+################################################################################
+
+def read_line_from_device()
+ repeat_counter = 10000
+ l = nil
+ s = ''
+ begin
+ l = $sp.gets()
+ repeat_counter -= 1
+ end while !l && repeat_counter > 0
+ t = Time.new
+ $logfile.printf("DBG: (%02d:%02d:%02d)<< %s\n", t.hour, t.min, t.sec, l.inspect) if $debug
+ if l && l.include?("AVR-Crypto-Lib")
+ $logfile.printf("DBG: system crashed !!!\n")
+ exit(false)
+ end
+ return l
+end
+
+def readconfigfile(fname, conf)
+ return conf if $conffile_check[fname]==1
+ $conffile_check[fname]=1
+ section = "default"
+ if not File.exists?(fname)
+ return conf
+ end
+ file = File.open(fname, "r")
+ until file.eof
+ line = file.gets()
+ next if /[\s]*#/.match(line)
+ if m=/\[[\s]*([^\s]*)[\s]*\]/.match(line)
+ section=m[1]
+ conf[m[1]] = Hash.new
+ next
+ end
+ next if ! /=/.match(line)
+ m=/[\s]*([^\s]*)[\s]*=[\s]*([^\s]*)/.match(line)
+ if m[1]=="include"
+ Dir.glob(m[2]){ |fn| conf = readconfigfile(fn, conf) }
+ else
+ conf[section][m[1]] = m[2]
+ end
+ end
+ file.close()
+ return conf
+end
+
+################################################################################
+# reset_system #
+################################################################################
+
+def reset_system
+ $sp.print("\r")
+ sleep 0.1
+ $sp.print("\r")
+ sleep 0.1
+ $sp.print("echo off\r")
+ sleep 0.1
+end
+
+
+def read_block(f)
+ d = Array.new
+ begin
+ l = f.gets
+ x = l.split.collect { |e| e.to_i(16) }
+ d += x
+ end while x.length == 16
+ return d
+end
+
+def goto_next_header(f)
+ while l = f.gets()
+ m = /^#\ (=|-)*[=-]{5}/.match(l)
+ t = :subblock if m && m[1] == '-'
+ t = :mainblock if m && m[1] == '='
+ if !m && n = /^#\ (.*)$/.match(l)
+ id = n[1]
+ id.sub!(/[\r\n]/,'')
+ return t,id
+ end
+ if !m && !id
+ t = nil
+ end
+ end
+ return nil,nil if !l
+end
+
+def skip_file_header(f)
+ while l = f.gets()
+ return if m = /^#\ [=]{40}/.match(l)
+ end
+end
+
+def test_parse(f)
+ skip_file_header(f)
+ loop do
+ a,b = goto_next_header(f)
+ if !b
+ puts(">>EOF<<")
+ return
+ end
+ if a
+ printf(">>%sblock: %s\n", a==:mainblock ? "main":"sub", b)
+ next
+ end
+ printf(">item: %s\n", b)
+ d = read_block(f)
+ printf(">length: %d (0x%x)\n>data:", d.length, d.length)
+ i = 0
+ d.each do |e|
+ printf("\n>") if i % 16 == 0
+ printf(" %02x", e)
+ i += 1
+ end
+ puts('')
+ end
+end
+=begin
+>item: RSA modulus n:
+>item: RSA public exponent e:
+>item: RSA private exponent d:
+>item: Prime p:
+>item: Prime q:
+>item: p's CRT exponent dP:
+>item: q's CRT exponent dQ:
+>item: CRT coefficient qInv:
+=end
+
+def read_key(f)
+ h = Hash.new
+ 8.times do
+ q,id = goto_next_header(f)
+ d = read_block(f)
+ m = /[\ \t]([^\ \t]*):[\ \t]*$/.match(id)
+ if m
+ id = m[1]
+ end
+ h[id] = d
+ end
+ req_items = ['n', 'e', 'd', 'p', 'q', 'dP', 'dQ', 'qInv']
+ req_items.each do |e|
+ printf("ERROR: key component %s is missing!\n", e) if !h[e]
+ end
+ h.each_key do |e|
+ printf("ERROR: unknown item '%s'!\n", e) if !req_items.index(e)
+ end
+ return h
+end
+
+=begin
+>item: Message to be encrypted:
+>item: Seed:
+>item: Encryption:
+=end
+
+def read_tv(f)
+ subst_hash = {
+ 'Message to be encrypted:' => 'msg',
+ 'Seed:' => 'seed',
+ 'Encryption:' => 'enc'}
+ h = Hash.new
+ 3.times do
+ q,id = goto_next_header(f)
+ d = read_block(f)
+ n = subst_hash[id]
+ printf("ERROR: unknown item '%s'!\n", id) if !n
+ h[n] = d
+ end
+ req_items = ['msg', 'seed', 'enc']
+ req_items.each do |e|
+ printf("ERROR: testvector component %s is missing!\n", e) if !h[e]
+ end
+ while h['enc'][0] == 0
+ h['enc'].delete_at(0)
+ end
+ return h
+end
+
+def wait_for_dot
+ begin
+ s = $sp.gets()
+ end while !s || !s.include?('.')
+end
+
+def load_bigint(d)
+ $sp.printf("%d\r", d.length)
+ while l = read_line_from_device()
+ break if /data:/.match(l)
+ end
+ printf "ERROR: got no answer from system!" if !l
+ i = 0
+ d.each do |e|
+ $sp.printf("%02x", e)
+ i += 1
+ if i % 60 == 0
+# we should now wait for incomming dot
+ wait_for_dot()
+ print('.')
+ end
+ end
+end
+
+def hexdump(a)
+ i = 0
+ a.each do |e|
+ printf("\n\t") if i % 16 == 0
+ printf('%02x ', e)
+ i += 1
+ end
+ puts('') if i % 16 != 1
+end
+
+def str_hexdump(a)
+ i = 0
+ s = ''
+ a.each do |e|
+ s += "\n\t" if i % 16 == 0
+ s += sprintf('%02x ', e)
+ i += 1
+ end
+ s += "\n" if i % 16 != 1
+ return s
+end
+
+def load_key(k)
+ $sp.print("load-key\r")
+ sleep 0.1
+ v = ['n', 'e', 'p', 'q', 'dP', 'dQ', 'qInv']
+ v.each do |e|
+ load_bigint(k[e])
+ $logfile.printf("DBG: loaded %s\n", e) if $debug
+ end
+ while l = read_line_from_device()
+ break if />/.match(l)
+ end
+end
+
+def check_tv(tv)
+ sleep 0.1
+ $sp.print("seed-test\r")
+ sleep 0.1
+ load_bigint(tv['msg'])
+ $logfile.printf("DBG: loaded %s\n", 'msg') if $debug
+ sleep 0.1
+ tv['seed'].each { |e| $sp.printf(" %02x", e) }
+ while l = read_line_from_device()
+ break if /ciphertext:/.match(l)
+ end
+ test_enc = ''
+ loop do
+ l = read_line_from_device()
+ break if ! /([0-9A-Fa-f]{2}\s*)+/.match(l)
+ test_enc += l if l
+ end
+ test_enc_a = Array.new
+ test_enc = test_enc.split(/[\W\r\n]+/)
+ test_enc.each do |e|
+ v = e.sub(/[^0-9A-Fa-f]/, '')
+ test_enc_a << v if v.length == 2
+ end
+ test_enc_a.collect!{ |e| e.to_i(16) }
+ enc_ok = (test_enc_a == tv['enc'])
+ if !enc_ok
+ $logfile.printf("DBG: ref = %s test = %s\n", str_hexdump(tv['enc']) , str_hexdump(test_enc_a))
+ end
+ m = nil
+ loop do
+ l = read_line_from_device()
+ m = /(>>OK<<|ERROR)/.match(l)
+ break if m
+ end
+ return true if enc_ok && (m[1] == '>>OK<<')
+ return false
+end
+
+def run_test(f,skip_key=1,skip_vec=1)
+ ok = 0
+ fail = 0
+ key_idx = 0
+ vec_idx = 0
+ skip_file_header(f)
+ loop do
+ a,b = goto_next_header(f)
+ $logfile.printf("DBG: a=%s b=%s\n", a.inspect, b.inspect) if $debug
+ return ok,fail if !b
+ if a == :mainblock
+# Example 1: A 1024-bit RSA Key Pair
+ b.sub!(/[\d]+:/) { |s| sprintf("%3d,", s.to_i)}
+ printf("\n>> %s: ", b)
+ # (35-b.length).times { putc(' ')}
+ end
+ if a == :subblock
+ if b == 'Components of the RSA Key Pair'
+ k = read_key(f)
+ key_idx += 1
+ vec_idx = 0
+ load_key(k) if skip_key <= key_idx
+ else
+ tv = read_tv(f)
+ vec_idx += 1
+ if (key_idx > skip_key) || (key_idx == skip_key && vec_idx >= skip_vec)
+ r = check_tv(tv)
+ if r
+ ok += 1
+ putc('*')
+ else
+ fail += 1
+ putc('!')
+ end
+ else
+ putc('o')
+ end
+ end
+ end
+ end
+end
+
+########################################
+# MAIN
+########################################
+
+
+opts = Getopt::Std.getopts("dc:f:il:s:n:")
+
+conf = Hash.new
+conf = readconfigfile("/etc/testport.conf", conf)
+conf = readconfigfile("~/.testport.conf", conf)
+conf = readconfigfile("testport.conf", conf)
+conf = readconfigfile(opts["c"], conf) if opts["c"]
+
+#puts conf.inspect
+
+puts("serial port interface version: " + SerialPort::VERSION);
+$linewidth = 64
+params = { "baud" => conf["PORT"]["baud"].to_i,
+ "data_bits" => conf["PORT"]["databits"].to_i,
+ "stop_bits" => conf["PORT"]["stopbits"].to_i,
+ "parity" => SerialPort::NONE }
+params["paraty"] = SerialPort::ODD if conf["PORT"]["paraty"].downcase == "odd"
+params["paraty"] = SerialPort::EVEN if conf["PORT"]["paraty"].downcase == "even"
+params["paraty"] = SerialPort::MARK if conf["PORT"]["paraty"].downcase == "mark"
+params["paraty"] = SerialPort::SPACE if conf["PORT"]["paraty"].downcase == "space"
+
+puts("\nPort: "+conf["PORT"]["port"]+"@" +
+ params["baud"].to_s +
+ " " +
+ params["data_bits"].to_s +
+ conf["PORT"]["paraty"][0,1].upcase +
+ params["stop_bits"].to_s +
+ "\n")
+
+$sp = SerialPort.new(conf["PORT"]["port"], params)
+
+$sp.read_timeout=1000; # 5 minutes
+$sp.flow_control = SerialPort::SOFT
+
+$debug = true if opts['d']
+
+if opts['s'] && m = opts['s'].match(/([\d]+\.([\d]+))/)
+ sk = m[1].to_i
+ sv = m[2].to_i
+else
+ sk = 1
+ sv = 1
+end
+
+if opts['l'] && ! opts['n']
+ $logfile = File.open(opts['l'], 'w')
+end
+
+base_name = 'rsaes_oaep'
+
+if opts['n']
+ logfilename = conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '.txt'
+ if File.exists?(logfilename)
+ i=1
+ begin
+ logfilename = sprintf('%s%04d%s', conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '_', i, '.txt')
+ i+=1
+ end while(File.exists?(logfilename))
+ while(i>2) do
+ n1 = sprintf('%s%04d%s', conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '_', i-2, '.txt')
+ n2 = sprintf('%s%04d%s', conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '_', i-1, '.txt')
+ File.rename(n1, n2)
+ printf("%s -> %s\n", n1, n2)
+ i-=1
+ end
+ n1 = sprintf('%s%s', conf['PORT']['testlogbase'], base_name + '_' + opts['n'] + '.txt')
+ n2 = sprintf('%s%04d%s', conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '_', 1, '.txt')
+ File.rename(n1, n2)
+ printf("%s -> %s\n", n1, n2)
+ logfilename = conf['PORT']['testlogbase'] + base_name + '_' + opts['n'] + '.txt'
+ end
+ printf("logging to %s", logfilename)
+ $logfile = File.open(logfilename, 'w')
+end
+
+
+$logfile = STDOUT if ! $logfile
+$logfile.sync = true
+reset_system()
+
+f = File.open(opts['f'], "r")
+exit if !f
+ok,fail = run_test(f,sk,sv)
+printf("\nOK: %d FAIL: %d :-%s\n",ok,fail, fail==0 ? ')':'(')
+
+