X-Git-Url: https://git.cryptolib.org/?p=arm-crypto-lib.git;a=blobdiff_plain;f=test_src%2Fnessie_bc_test.c;fp=test_src%2Fnessie_bc_test.c;h=e67dd1c9443c28e8df48fba6dfa39e5afa8a1233;hp=0000000000000000000000000000000000000000;hb=2a4779378a7bf4322a0e6b2024284092135e8a3d;hpb=e69f1207a9fbd9c0f45bfdbb2d8ebe9852d95969 diff --git a/test_src/nessie_bc_test.c b/test_src/nessie_bc_test.c new file mode 100644 index 0000000..e67dd1c --- /dev/null +++ b/test_src/nessie_bc_test.c @@ -0,0 +1,214 @@ +/* nessie_bc_test.c */ +/* + This file is part of the ARM-Crypto-Lib. + Copyright (C) 2006-2010 Daniel Otte (daniel.otte@rub.de) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see . +*/ +/** + * + * author: Daniel Otte + * email: daniel.otte@rub.de + * license: GPLv3 + * + * a suit for running the nessie-tests for blockciphers + * + * */ +#include +#include +#include "nessie_bc_test.h" +#include "nessie_common.h" + +volatile nessie_bc_ctx_t nessie_bc_ctx; + +void nessie_bc_init(void){ + memset((void*)&nessie_bc_ctx, 0, sizeof(nessie_bc_ctx_t)); +} + +static +void nessie_bc_free(void* ctx){ + if(nessie_bc_ctx.cipher_free) + nessie_bc_ctx.cipher_free(ctx); +} + +void nessie_bc_enc(uint8_t* key, uint8_t* pt){ + uint8_t ctx[nessie_bc_ctx.ctx_size_B]; + uint8_t buffer[nessie_bc_ctx.blocksize_B]; + uint16_t i; + + /* single test */ + nessie_print_item("key", key, (nessie_bc_ctx.keysize_b+7)/8); + nessie_bc_ctx.cipher_genctx(key, nessie_bc_ctx.keysize_b, ctx); + + memcpy(buffer, pt, nessie_bc_ctx.blocksize_B); + nessie_print_item("plain", buffer, nessie_bc_ctx.blocksize_B); + nessie_bc_ctx.cipher_enc(buffer, ctx); + nessie_print_item("cipher", buffer, nessie_bc_ctx.blocksize_B); + if(nessie_bc_ctx.cipher_dec){ + nessie_bc_ctx.cipher_dec(buffer, ctx); + nessie_print_item("decrypted", buffer, nessie_bc_ctx.blocksize_B); + } + /* 100 times test */ + memcpy(buffer, pt, nessie_bc_ctx.blocksize_B); + for(i=0; i<100; ++i){ + nessie_bc_ctx.cipher_enc(buffer, ctx); + NESSIE_SEND_ALIVE_A(i); + } + nessie_print_item("Iterated 100 times", buffer, nessie_bc_ctx.blocksize_B); +#ifndef NESSIE_NO1KTEST + /* 1000 times test, we use the 100 preceding steps to fasten things a bit */ + for(; i<1000; ++i){ + nessie_bc_ctx.cipher_enc(buffer, ctx); + NESSIE_SEND_ALIVE_A(i); + } + nessie_print_item("Iterated 1000 times", buffer, nessie_bc_ctx.blocksize_B); +#endif + nessie_bc_free(ctx); +} + +void nessie_bc_dec(uint8_t* key, uint8_t* ct){ + uint8_t ctx[nessie_bc_ctx.ctx_size_B]; + uint8_t buffer[nessie_bc_ctx.blocksize_B]; + + /* single test */ + nessie_print_item("key", key, (nessie_bc_ctx.keysize_b+7)/8); + nessie_bc_ctx.cipher_genctx(key, nessie_bc_ctx.keysize_b, ctx); + memcpy(buffer, ct, nessie_bc_ctx.blocksize_B); + nessie_print_item("cipher", buffer, nessie_bc_ctx.blocksize_B); + nessie_bc_ctx.cipher_dec(buffer, ctx); + nessie_print_item("plain", buffer, nessie_bc_ctx.blocksize_B); + nessie_bc_ctx.cipher_enc(buffer, ctx); + nessie_print_item("encrypted", buffer, nessie_bc_ctx.blocksize_B); + nessie_bc_free(ctx); +} + +void nessie_bc_run(void){ + uint16_t i; + uint8_t set; + uint8_t key[(nessie_bc_ctx.keysize_b+7)/8]; + uint8_t buffer[nessie_bc_ctx.blocksize_B]; + + nessie_print_header(nessie_bc_ctx.name, nessie_bc_ctx.keysize_b, + nessie_bc_ctx.blocksize_B*8, 0, 0, 0); + /* test set 1 */ + set=1; + nessie_print_setheader(set); + for(i=0; i>(i%8); + memset(buffer, 0, nessie_bc_ctx.blocksize_B); + nessie_bc_enc(key, buffer); + } + /* test set 2 */ + set=2; + nessie_print_setheader(set); + for(i=0; i>(i%8); + nessie_bc_enc(key, buffer); + } + /* test set 3 */ + set=3; + nessie_print_setheader(set); + for(i=0; i<256; ++i){ + nessie_print_set_vector(set, i); + memset(key, i, (nessie_bc_ctx.keysize_b+7)/8); + memset(buffer, i, nessie_bc_ctx.blocksize_B); + nessie_bc_enc(key, buffer); + } + /* test set 4 */ + set=4; + nessie_print_setheader(set); + /* 4 - 0*/ + nessie_print_set_vector(set, 0); + for(i=0; i<(nessie_bc_ctx.keysize_b+7)/8; ++i){ + key[i]=i; + } + for(i=0; i>(i%8); + memset(buffer, 0, nessie_bc_ctx.blocksize_B); + nessie_bc_dec(key, buffer); + } + /* test set 6 */ + set=6; + nessie_print_setheader(set); + for(i=0; i>(i%8); + nessie_bc_dec(key, buffer); + } + /* test set 7 */ + set=7; + nessie_print_setheader(set); + for(i=0; i<256; ++i){ + nessie_print_set_vector(set, i); + memset(key, i, (nessie_bc_ctx.keysize_b+7)/8); + memset(buffer, i, nessie_bc_ctx.blocksize_B); + nessie_bc_dec(key, buffer); + } + /* test set 8 */ + set=8; + nessie_print_setheader(set); + /* 8 - 0*/ + nessie_print_set_vector(set, 0); + for(i=0; i<(nessie_bc_ctx.keysize_b+7)/8; ++i){ + key[i]=(uint8_t)i; + } + for(i=0; i