void test_vector_7 (void) {
  printf ("\tPerforming CCM test #7 (no associated data)...");
  /* Test based on RFC 3610 test vector #9 but with no associated data */
  const uint8_t key[16] = {
        0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7,
        0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF
    };
    uint8_t nonce[13] = {
        0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0,
        0xA1, 0xA2, 0xA3, 0xA4, 0xA5
    };
    uint8_t * hdr = NULL;

    uint8_t data[25] = {
        0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13,
        0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20
    };

  struct tc_ccm_mode_struct c;
  struct tc_aes_key_sched_struct sched;
  uint8_t decrypted[25];
  uint8_t ciphertext[50];

  uint16_t mlen = 10;

  tc_aes128_set_encrypt_key (&sched, key);
  if (tc_ccm_config (&c, &sched, nonce, sizeof(nonce), mlen) == 0) {
    fprintf (stderr, "ccm_config failed\n");
    exit (-1);
  }

  if (tc_ccm_generation_encryption (ciphertext, hdr, 0, data, sizeof(data), &c) == 0) {
    fprintf (stderr, "ccm_encrypt failed\n");
    exit (-1);
  }

  if (tc_ccm_decryption_verification (decrypted, hdr, 0, ciphertext, sizeof(data)+mlen, &c) == 0) {
    fprintf (stderr, "ccm_decrypt failed\n");
    show_str ("\t\tExpected", data, sizeof(data));
    show_str ("\t\tComputed", decrypted, sizeof (decrypted));
    exit (-1);
  }
  printf("Success!\n");

}
void test_vector_8 (void) {
  printf ("\tPerforming CCM test #8 (no payload data)...");
  /* Test based on RFC 3610 test vector #9 but with no payload data */
  const uint8_t key[16] = {
        0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7,
        0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF
    };
    uint8_t nonce[13] = {
        0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0,
        0xA1, 0xA2, 0xA3, 0xA4, 0xA5
    };
    const uint8_t hdr[8] = {
        0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07
    };

    uint8_t *data = NULL;

  struct tc_ccm_mode_struct c;
  struct tc_aes_key_sched_struct sched;
  uint8_t decrypted[25];
  uint8_t ciphertext[50];

  uint16_t mlen = 10;

  tc_aes128_set_encrypt_key (&sched, key);
  if (tc_ccm_config (&c, &sched, nonce, sizeof(nonce), mlen) == 0) {
    fprintf (stderr, "ccm_config failed\n");
    exit (-1);
  }

  if (tc_ccm_generation_encryption (ciphertext, hdr, sizeof(hdr), data, 0, &c) == 0) {
    fprintf (stderr, "ccm_encrypt failed\n");
    exit (-1);
  }

  if (tc_ccm_decryption_verification (decrypted, hdr, sizeof(hdr), ciphertext, mlen, &c) == 0) {
    fprintf (stderr, "ccm_decrypt failed\n");
    show_str ("\t\tExpected", data, sizeof(data));
    show_str ("\t\tComputed", decrypted, sizeof (decrypted));
    exit (-1);
  }
  printf("Success!\n");

}
static void do_test (
    const uint8_t *key,
    uint8_t *nonce,
    size_t nlen,
    const uint8_t *hdr,
    size_t hlen,
    const uint8_t *data,
    size_t dlen,
    const uint8_t *expected,
    size_t elen,
    const int mlen) {

  uint8_t ciphertext[50];
  uint8_t decrypted[25];
  struct tc_ccm_mode_struct c;
  struct tc_aes_key_sched_struct sched;

  tc_aes128_set_encrypt_key (&sched, key);
  if (tc_ccm_config (&c, &sched, nonce, nlen, mlen) == 0) {
    fprintf (stderr, "ccm_config failed\n");
    exit (-1);
  }

  if (tc_ccm_generation_encryption (ciphertext, hdr, hlen, data, dlen, &c) == 0) {
    fprintf (stderr, "ccm_encrypt failed\n");
    exit (-1);
  }

  if (memcmp (expected, ciphertext, elen) != 0) {
    fprintf (stderr, "ccm_encrypt produced wrong ciphertext\n");
    show_str ("\t\tExpected", expected, elen);
    show_str ("\t\tComputed", ciphertext, elen);
    exit (-1);
  }

  if (tc_ccm_decryption_verification (decrypted, hdr, hlen, ciphertext, dlen+mlen, &c) == 0) {
    fprintf (stderr, "ccm_decrypt failed\n");
    show_str ("\t\tExpected", data, dlen);
    show_str ("\t\tComputed", decrypted, sizeof (decrypted));
    exit (-1);
  }
  printf("Success!\n");
}
Exemple #4
0
int32_t tc_aes128_set_decrypt_key(TCAesKeySched_t s, const uint8_t *k)
{
	return tc_aes128_set_encrypt_key(s, k);
}
Exemple #5
0
/*
 * NIST SP 800-38a CTR Test for encryption and decryption.
 */
unsigned int test_1_and_2(void)
{
        const uint8_t key[16] = {
		0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88,
		0x09, 0xcf, 0x4f, 0x3c
        };
        uint8_t ctr[16] = {
		0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb,
		0xfc, 0xfd, 0xfe, 0xff
        };
        const uint8_t plaintext[64] = {
		0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11,
		0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c,
		0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46,
		0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef,
		0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b,
		0xe6, 0x6c, 0x37, 0x10
        };
        const uint8_t ciphertext[80] = {
		0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb,
		0xfc, 0xfd, 0xfe, 0xff, 0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26,
		0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce, 0x98, 0x06, 0xf6, 0x6b,
		0x79, 0x70, 0xfd, 0xff, 0x86, 0x17, 0x18, 0x7b, 0xb9, 0xff, 0xfd, 0xff,
		0x5a, 0xe4, 0xdf, 0x3e, 0xdb, 0xd5, 0xd3, 0x5e, 0x5b, 0x4f, 0x09, 0x02,
		0x0d, 0xb0, 0x3e, 0xab, 0x1e, 0x03, 0x1d, 0xda, 0x2f, 0xbe, 0x03, 0xd1,
		0x79, 0x21, 0x70, 0xa0, 0xf3, 0x00, 0x9c, 0xee
        };
        struct tc_aes_key_sched_struct sched;
        uint8_t out[80];
        uint8_t decrypted[64];
        unsigned int result = TC_PASS;

        TC_PRINT("CTR test #1 (encryption SP 800-38a tests):\n");
        (void)tc_aes128_set_encrypt_key(&sched, key);

        (void)memcpy(out, ctr, sizeof(ctr));
        if (tc_ctr_mode(&out[TC_AES_BLOCK_SIZE], sizeof(plaintext), plaintext,
			sizeof(plaintext), ctr, &sched) == 0) {
                TC_ERROR("CTR test #1 (encryption SP 800-38a tests) failed in %s.\n", __func__);
                result = TC_FAIL;
                goto exitTest1;
        }

        result = check_result(1, ciphertext, sizeof(out), out, sizeof(out));
        TC_END_RESULT(result);

        TC_PRINT("CTR test #2 (decryption SP 800-38a tests):\n");
        (void) memcpy(ctr, out, sizeof(ctr));
        if (tc_ctr_mode(decrypted, sizeof(decrypted), &out[TC_AES_BLOCK_SIZE],
                        sizeof(decrypted), ctr, &sched) == 0) {
                TC_ERROR("CTR test #2 (decryption SP 800-38a tests) failed in %s.\n", __func__);
                result = TC_FAIL;
                goto exitTest1;
        }

        result = check_result(2, plaintext, sizeof(plaintext),
			      decrypted, sizeof(plaintext));

 exitTest1:
        TC_END_RESULT(result);
        return result;
}
Exemple #6
0
/* Example of AES-CTR encryption and decryption. */
int do_aes_ctr(void)
{
	uint64_t t_init, t_end;
	uint64_t t_op_usec;
	struct tc_aes_key_sched_struct sched;

	QM_PUTS("AES-CTR Encrypting plain text...");

	/* Initialize AES data structure and set the key. */
	bzero(&sched, sizeof(sched));
	tc_aes128_set_encrypt_key(&sched, aes_ctr_key);

	/* Copy the first counter value before the ciphered text. */
	memcpy(aes_ctr_out, aes_ctr_ctr, sizeof(aes_ctr_ctr));

	/* Get system tick before calculation. */
	t_init = _rdtsc();

	/* Everything is ready, cipher the text. */
	tc_ctr_mode(&aes_ctr_out[TC_AES_BLOCK_SIZE], sizeof(aes_ctr_plaintext),
		    aes_ctr_plaintext, sizeof(aes_ctr_plaintext), aes_ctr_ctr,
		    &sched);

	/* Get system tick after calculation and compute calculation time. */
	t_end = _rdtsc();
	t_op_usec = (t_end - t_init) / SYS_TICKS_PER_US_32MHZ;

	/* Compare ciphered text to pre-computed cipher text. */
	if (memcmp(aes_ctr_ciphertext, aes_ctr_out, sizeof(aes_ctr_out)) == 0) {
		QM_PRINTF("AES-CTR encryption success (%lu usecs)\n",
			  (unsigned long)t_op_usec);
	} else {
		QM_PUTS("Error: AES-CTR mismatch in data encrypted");
		return 1;
	}

	QM_PUTS("AES-CTR Decrypting cipher text...");

	/* Copy back the first counter value in the counter variable. */
	memcpy(aes_ctr_ctr, aes_ctr_out, sizeof(aes_ctr_ctr));

	/* Get system tick before calculation. */
	t_init = _rdtsc();

	/* Decipher the encrypted text. */
	tc_ctr_mode(aes_ctr_decrypted, sizeof(aes_ctr_decrypted),
		    &aes_ctr_out[TC_AES_BLOCK_SIZE], sizeof(aes_ctr_decrypted),
		    aes_ctr_ctr, &sched);

	/* Get system tick after calculation and compute calculation time. */
	t_end = _rdtsc();
	t_op_usec = (t_end - t_init) / SYS_TICKS_PER_US_32MHZ;

	/* Compare deciphered text to original text. */
	if (memcmp(aes_ctr_plaintext, aes_ctr_decrypted,
		   sizeof(aes_ctr_plaintext)) == 0) {
		QM_PRINTF("AES-CTR decryption success (%lu usecs)\n",
			  (unsigned long)t_op_usec);
	} else {
		QM_PUTS("Error: AES-CTR mismatch in data decrypted");
		return 1;
	}

	return 0;
}