void test_vector_7 (void) { printf ("\tPerforming CCM test #7 (no associated data)..."); /* Test based on RFC 3610 test vector #9 but with no associated data */ const uint8_t key[16] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[13] = { 0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; uint8_t * hdr = NULL; uint8_t data[25] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; uint8_t decrypted[25]; uint8_t ciphertext[50]; uint16_t mlen = 10; tc_aes128_set_encrypt_key (&sched, key); if (tc_ccm_config (&c, &sched, nonce, sizeof(nonce), mlen) == 0) { fprintf (stderr, "ccm_config failed\n"); exit (-1); } if (tc_ccm_generation_encryption (ciphertext, hdr, 0, data, sizeof(data), &c) == 0) { fprintf (stderr, "ccm_encrypt failed\n"); exit (-1); } if (tc_ccm_decryption_verification (decrypted, hdr, 0, ciphertext, sizeof(data)+mlen, &c) == 0) { fprintf (stderr, "ccm_decrypt failed\n"); show_str ("\t\tExpected", data, sizeof(data)); show_str ("\t\tComputed", decrypted, sizeof (decrypted)); exit (-1); } printf("Success!\n"); }
void test_vector_8 (void) { printf ("\tPerforming CCM test #8 (no payload data)..."); /* Test based on RFC 3610 test vector #9 but with no payload data */ const uint8_t key[16] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[13] = { 0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; const uint8_t hdr[8] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; uint8_t *data = NULL; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; uint8_t decrypted[25]; uint8_t ciphertext[50]; uint16_t mlen = 10; tc_aes128_set_encrypt_key (&sched, key); if (tc_ccm_config (&c, &sched, nonce, sizeof(nonce), mlen) == 0) { fprintf (stderr, "ccm_config failed\n"); exit (-1); } if (tc_ccm_generation_encryption (ciphertext, hdr, sizeof(hdr), data, 0, &c) == 0) { fprintf (stderr, "ccm_encrypt failed\n"); exit (-1); } if (tc_ccm_decryption_verification (decrypted, hdr, sizeof(hdr), ciphertext, mlen, &c) == 0) { fprintf (stderr, "ccm_decrypt failed\n"); show_str ("\t\tExpected", data, sizeof(data)); show_str ("\t\tComputed", decrypted, sizeof (decrypted)); exit (-1); } printf("Success!\n"); }
static void do_test ( const uint8_t *key, uint8_t *nonce, size_t nlen, const uint8_t *hdr, size_t hlen, const uint8_t *data, size_t dlen, const uint8_t *expected, size_t elen, const int mlen) { uint8_t ciphertext[50]; uint8_t decrypted[25]; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; tc_aes128_set_encrypt_key (&sched, key); if (tc_ccm_config (&c, &sched, nonce, nlen, mlen) == 0) { fprintf (stderr, "ccm_config failed\n"); exit (-1); } if (tc_ccm_generation_encryption (ciphertext, hdr, hlen, data, dlen, &c) == 0) { fprintf (stderr, "ccm_encrypt failed\n"); exit (-1); } if (memcmp (expected, ciphertext, elen) != 0) { fprintf (stderr, "ccm_encrypt produced wrong ciphertext\n"); show_str ("\t\tExpected", expected, elen); show_str ("\t\tComputed", ciphertext, elen); exit (-1); } if (tc_ccm_decryption_verification (decrypted, hdr, hlen, ciphertext, dlen+mlen, &c) == 0) { fprintf (stderr, "ccm_decrypt failed\n"); show_str ("\t\tExpected", data, dlen); show_str ("\t\tComputed", decrypted, sizeof (decrypted)); exit (-1); } printf("Success!\n"); }
int32_t tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k) { return tc_aes128_set_encrypt_key(s, k); }
/* * NIST SP 800-38a CTR Test for encryption and decryption. */ unsigned int test_1_and_2(void) { const uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; uint8_t ctr[16] = { 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff }; const uint8_t plaintext[64] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; const uint8_t ciphertext[80] = { 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff, 0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce, 0x98, 0x06, 0xf6, 0x6b, 0x79, 0x70, 0xfd, 0xff, 0x86, 0x17, 0x18, 0x7b, 0xb9, 0xff, 0xfd, 0xff, 0x5a, 0xe4, 0xdf, 0x3e, 0xdb, 0xd5, 0xd3, 0x5e, 0x5b, 0x4f, 0x09, 0x02, 0x0d, 0xb0, 0x3e, 0xab, 0x1e, 0x03, 0x1d, 0xda, 0x2f, 0xbe, 0x03, 0xd1, 0x79, 0x21, 0x70, 0xa0, 0xf3, 0x00, 0x9c, 0xee }; struct tc_aes_key_sched_struct sched; uint8_t out[80]; uint8_t decrypted[64]; unsigned int result = TC_PASS; TC_PRINT("CTR test #1 (encryption SP 800-38a tests):\n"); (void)tc_aes128_set_encrypt_key(&sched, key); (void)memcpy(out, ctr, sizeof(ctr)); if (tc_ctr_mode(&out[TC_AES_BLOCK_SIZE], sizeof(plaintext), plaintext, sizeof(plaintext), ctr, &sched) == 0) { TC_ERROR("CTR test #1 (encryption SP 800-38a tests) failed in %s.\n", __func__); result = TC_FAIL; goto exitTest1; } result = check_result(1, ciphertext, sizeof(out), out, sizeof(out)); TC_END_RESULT(result); TC_PRINT("CTR test #2 (decryption SP 800-38a tests):\n"); (void) memcpy(ctr, out, sizeof(ctr)); if (tc_ctr_mode(decrypted, sizeof(decrypted), &out[TC_AES_BLOCK_SIZE], sizeof(decrypted), ctr, &sched) == 0) { TC_ERROR("CTR test #2 (decryption SP 800-38a tests) failed in %s.\n", __func__); result = TC_FAIL; goto exitTest1; } result = check_result(2, plaintext, sizeof(plaintext), decrypted, sizeof(plaintext)); exitTest1: TC_END_RESULT(result); return result; }
/* Example of AES-CTR encryption and decryption. */ int do_aes_ctr(void) { uint64_t t_init, t_end; uint64_t t_op_usec; struct tc_aes_key_sched_struct sched; QM_PUTS("AES-CTR Encrypting plain text..."); /* Initialize AES data structure and set the key. */ bzero(&sched, sizeof(sched)); tc_aes128_set_encrypt_key(&sched, aes_ctr_key); /* Copy the first counter value before the ciphered text. */ memcpy(aes_ctr_out, aes_ctr_ctr, sizeof(aes_ctr_ctr)); /* Get system tick before calculation. */ t_init = _rdtsc(); /* Everything is ready, cipher the text. */ tc_ctr_mode(&aes_ctr_out[TC_AES_BLOCK_SIZE], sizeof(aes_ctr_plaintext), aes_ctr_plaintext, sizeof(aes_ctr_plaintext), aes_ctr_ctr, &sched); /* Get system tick after calculation and compute calculation time. */ t_end = _rdtsc(); t_op_usec = (t_end - t_init) / SYS_TICKS_PER_US_32MHZ; /* Compare ciphered text to pre-computed cipher text. */ if (memcmp(aes_ctr_ciphertext, aes_ctr_out, sizeof(aes_ctr_out)) == 0) { QM_PRINTF("AES-CTR encryption success (%lu usecs)\n", (unsigned long)t_op_usec); } else { QM_PUTS("Error: AES-CTR mismatch in data encrypted"); return 1; } QM_PUTS("AES-CTR Decrypting cipher text..."); /* Copy back the first counter value in the counter variable. */ memcpy(aes_ctr_ctr, aes_ctr_out, sizeof(aes_ctr_ctr)); /* Get system tick before calculation. */ t_init = _rdtsc(); /* Decipher the encrypted text. */ tc_ctr_mode(aes_ctr_decrypted, sizeof(aes_ctr_decrypted), &aes_ctr_out[TC_AES_BLOCK_SIZE], sizeof(aes_ctr_decrypted), aes_ctr_ctr, &sched); /* Get system tick after calculation and compute calculation time. */ t_end = _rdtsc(); t_op_usec = (t_end - t_init) / SYS_TICKS_PER_US_32MHZ; /* Compare deciphered text to original text. */ if (memcmp(aes_ctr_plaintext, aes_ctr_decrypted, sizeof(aes_ctr_plaintext)) == 0) { QM_PRINTF("AES-CTR decryption success (%lu usecs)\n", (unsigned long)t_op_usec); } else { QM_PUTS("Error: AES-CTR mismatch in data decrypted"); return 1; } return 0; }