1
0
Fork 0
nrf51-cryptolib/tests/test_cmac.c

149 lines
4.9 KiB
C

#include <assert.h>
#include <inttypes.h>
#include <stdint.h>
#include <stdio.h>
#include <string.h>
#include "../aes.h"
#include "../cmac.h"
const block_t zeros = {.ui32={0,0,0,0}};
const block_t ones = {.ui32={0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff}};
void test_xor(void) {
block_t out;
printf("Testing block_xor: ");
out = block_xor(&zeros, &zeros);
assert(!memcmp(&out, &zeros, 16));
printf(".");
out = block_xor(&zeros, &ones);
assert(!memcmp(&out, &ones, 16));
printf(".");
out = block_xor(&ones, &zeros);
assert(!memcmp(&out, &ones, 16));
printf(".");
out = block_xor(&ones, &ones);
assert(!memcmp(&out, &zeros, 16));
printf(".\n");
}
void test_cmac(void) {
printf("Testing CMAC: ");
block_t k = { .ui8={0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c}};
cmac_aes128_init(&k);
/* Test Null Message, NIST Example */
uint8_t msg1[] = "";
block_t case1 = {.ui8={0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28,
0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46}};
block_t tag = cmac_aes128(msg1, 0);
printf("%s", block_cmp(&tag, &case1) ? "." : "F");
/* 16b example */
uint8_t msg2[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a};
block_t case2 = {.ui8={0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44,
0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c}};
tag = cmac_aes128(msg2, sizeof(msg2));
printf("%s", block_cmp(&tag, &case2) ? "." : "F");
/* 40b example */
uint8_t msg3[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11};
block_t case3 = {.ui8={0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30,
0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27}};
tag = cmac_aes128(msg3, sizeof(msg3));
printf("%s", block_cmp(&tag, &case3) ? "." : "F");
/* 64b example */
uint8_t msg4[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,
0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,
0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10};
block_t case4 = {.ui8={0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92,
0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe}};
tag = cmac_aes128(msg4, sizeof(msg4));
printf("%s", block_cmp(&tag, &case4) ? "." : "F");
printf("\n");
}
void test_truncate_tag(void) {
printf("Testing truncate_tag: ");
block_t test = { .ui8={0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}};
uint8_t tag[16] = {0};
for (int i = 0; i < 128; i++) {
/* Truncation and shift are the same operation on the all ones block_t */
block_t tag2 = block_shiftl(&test, 128-i);
cmac_truncate_tag(tag, &test, i);
assert(!memcmp(&tag, &tag2.ui8, 16));
}
printf(".\n");
}
void test_shiftr(void) {
printf("Testing block_shiftr: ");
block_t out;
//uint32_t check;
for (int i = 0; i < 128; i++) {
printf("Shift Right by %d", i);
out = block_shiftr(&ones, i);
//check = (0xffffffff >> i);
block_print("", &out);
//printf("Check: %" PRIu32 ", %" PRIu32 "\n", *(uint32_t *)out, check);
fflush(stdout);
//assert(check == out.ui32[0]);
}
fflush(stdout);
printf(".\n");
return;
}
void test_shiftl(void) {
printf("Testing block_shiftl: ");
block_t out;
//uint32_t check;
for (int i = 0; i < 129; i++) {
//printf("Shift Left by %d", i);
out = block_shiftl(&ones, i);
block_print("", &out);
//check = (0xffffffff << i);
//printf("Check: %.8x, %.8x\n", out32[3], check);
fflush(stdout);
//assert(check == out.ui32[3]);
}
printf(".\n");
return;
}
/* void test_expand_keys(void) { */
/* printf("Testing expand_keys: "); */
/* block_t k = { .ui8={0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, */
/* 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c}}; */
/* cmac_aes128_init(&k) */
/* block_t k1_test = {.ui8={0xfb, 0xee, 0xd6, 0x18, 0x35, 0x71, 0x33, 0x66, */
/* 0x7c, 0x85, 0xe0, 0x8f, 0x72, 0x36, 0xa8, 0xde}}; */
/* //block_print("K1", &cfg.keys[1]); */
/* //block_print("K1 Actual", &k1_test); */
/* assert(block_cmp(&k1_test, &cfg.keys[1])); */
/* printf("."); */
/* fflush(stdout); */
/* block_t k2_test = {.ui8={0xf7, 0xdd, 0xac, 0x30, 0x6a, 0xe2, 0x66, 0xcc, */
/* 0xf9, 0x0b, 0xc1, 0x1e, 0xe4, 0x6d, 0x51, 0x3b}}; */
/* assert(block_cmp(&k2_test, &cfg.keys[2])); */
/* printf(".\n"); */
/* fflush(stdout); */
/* } */
int main() {
test_xor();
test_cmac();
test_truncate_tag();
return 0;
}