1
0
Fork 0
nrf51-cryptolib/tests/test_cmac.c

152 lines
4.8 KiB
C

#include <assert.h>
#include <inttypes.h>
#include <stdint.h>
#include <stdio.h>
#include <string.h>
#include "../aes.h"
#include "../cmac.h"
uint8_t zeros[16] = {0};
uint8_t ones[16] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff,
0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
void test_xor(void) {
uint8_t out[16];
printf("Testing block_xor: ");
block_xor(out, zeros, zeros);
assert(block_eq(out, zeros));
printf(".");
block_xor(out, zeros, ones);
assert(block_eq(out, ones));
printf(".");
block_xor(out, ones, zeros);
assert(block_eq(out, ones));
printf(".");
block_xor(out, ones, ones);
assert(block_eq(out, zeros));
printf(".\n");
}
void test_cmac(void) {
printf("Testing CMAC: ");
fflush(stdout);
uint8_t k[16] = {0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c};
cmac_aes128_init(k);
uint8_t tag[16];
/* Test Null Message, NIST Example */
uint8_t case1[16] = {0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28,
0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46};
cmac_aes128(tag, NULL, 0, 16);
printf("%s", block_eq(tag, case1) ? "." : "F");
/* 16b example */
uint8_t msg2[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a};
uint8_t case2[16] = {0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44,
0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c};
cmac_aes128(tag, msg2, sizeof(msg2), 16);
printf("%s", block_eq(tag, case2) ? "." : "F");
/* 40b example */
uint8_t msg3[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11};
uint8_t case3[16] = {0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30,
0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27};
cmac_aes128(tag, msg3, sizeof(msg3), 16);
printf("%s", block_eq(tag, case3) ? "." : "F");
/* 64b example */
uint8_t msg4[] = {0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96,
0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a,
0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51,
0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11,
0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17,
0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10};
uint8_t case4[16] = {0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92,
0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe};
cmac_aes128(tag, msg4, sizeof(msg4), 16);
printf("%s", block_eq(tag, case4) ? "." : "F");
printf("\n");
}
/* void test_truncate_tag(void) { */
/* printf("Testing truncate_tag: "); */
/* uint8_t test[16] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, */
/* 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; */
/* uint8_t tag[16] = {0}; */
/* for (int i = 0; i < 128; i++) { */
/* /\* Truncation and shift are the same operation on the all ones block_t *\/ */
/* uint8_t tag2[16]; */
/* block_shiftl(tag2, test, 128-i); */
/* cmac_truncate(tag, &test, i); */
/* assert(block_eq(tag, tag2)); */
/* } */
/* printf(".\n"); */
/* } */
void test_shiftr(void) {
printf("Testing block_shiftr: ");
uint8_t out[16];
//uint32_t check;
for (int i = 0; i < 128; i++) {
printf("Shift Right by %d", i);
block_shiftr(out, ones, i);
//check = (0xffffffff >> i);
block_print("", out);
//printf("Check: %" PRIu32 ", %" PRIu32 "\n", *(uint32_t *)out, check);
fflush(stdout);
//assert(check == out.ui32[0]);
}
fflush(stdout);
printf(".\n");
return;
}
void test_shiftl(void) {
printf("Testing block_shiftl: ");
uint8_t out[16];
//uint32_t check;
for (int i = 0; i < 129; i++) {
//printf("Shift Left by %d", i);
block_shiftl(out, ones, i);
block_print("", out);
//check = (0xffffffff << i);
//printf("Check: %.8x, %.8x\n", out32[3], check);
fflush(stdout);
//assert(check == out.ui32[3]);
}
printf(".\n");
return;
}
void test_expand_keys(void) {
printf("Testing expand_keys: ");
uint8_t k[16] = {0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6,
0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c};
cmac_aes128_init(k);
uint8_t k_test[32];
cmac_get_subkeys(k_test);
uint8_t k1_test[16] = {0xfb, 0xee, 0xd6, 0x18, 0x35, 0x71, 0x33, 0x66,
0x7c, 0x85, 0xe0, 0x8f, 0x72, 0x36, 0xa8, 0xde};
printf("%s", block_eq(k_test, k1_test) ? "." : "F");
uint8_t k2_test[16] = {0xf7, 0xdd, 0xac, 0x30, 0x6a, 0xe2, 0x66, 0xcc,
0xf9, 0x0b, 0xc1, 0x1e, 0xe4, 0x6d, 0x51, 0x3b};
printf("%s", block_eq(k_test+16, k2_test) ? "." : "F");
printf("\n");
}
int main() {
test_xor();
test_expand_keys();
test_cmac();
//test_truncate_tag();
return 0;
}