/* ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ #include "hal.h" #include "cry_test_root.h" /** * @file cry_test_sequence_002.c * @brief Test Sequence 002 code. * * @page cry_test_sequence_002 [2] AES CFB * * File: @ref cry_test_sequence_002.c * *

Description

* AES CFB. * *

Test Cases

* - @subpage cry_test_002_001 * - @subpage cry_test_002_002 * . */ /**************************************************************************** * Shared code. ****************************************************************************/ #include #include "ref_aes.h" static const CRYConfig config_Polling = { TRANSFER_POLLING, AES_CFBS_128, //cfbs 0 }; static const CRYConfig config_DMA = { TRANSFER_DMA, AES_CFBS_128, //cfbs 0 }; /**************************************************************************** * Test cases. ****************************************************************************/ /** * @page cry_test_002_001 [2.1] AES CFB Polling * *

Description

* testing AES CFB with various Keys. * *

Test Steps

* - [2.1.1] loading the key with 16 byte size. * - [2.1.2] Encrypt. * - [2.1.3] Decrypt. * - [2.1.4] loading the key with 24 byte size. * - [2.1.5] Encrypt. * - [2.1.6] Decrypt. * - [2.1.7] loading the key with 32 byte size. * - [2.1.8] Encrypt. * - [2.1.9] Decrypt. * . */ static void cry_test_002_001_setup(void) { memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN); memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN); memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN); cryStart(&CRYD1, &config_Polling); } static void cry_test_002_001_teardown(void) { cryStop(&CRYD1); } static void cry_test_002_001_execute(void) { cryerror_t ret; /* [2.1.1] loading the key with 16 byte size.*/ test_set_step(1); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.1.2] Encrypt.*/ test_set_step(2); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_128)[i], "encrypt mismatch"); } } /* [2.1.3] Decrypt.*/ test_set_step(3); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } /* [2.1.4] loading the key with 24 byte size.*/ test_set_step(4); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.1.5] Encrypt.*/ test_set_step(5); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_192)[i], "encrypt mismatch"); } } /* [2.1.6] Decrypt.*/ test_set_step(6); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } /* [2.1.7] loading the key with 32 byte size.*/ test_set_step(7); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.1.8] Encrypt.*/ test_set_step(8); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_256)[i], "encrypt mismatch"); } } /* [2.1.9] Decrypt.*/ test_set_step(9); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } } static const testcase_t cry_test_002_001 = { "AES CFB Polling", cry_test_002_001_setup, cry_test_002_001_teardown, cry_test_002_001_execute }; /** * @page cry_test_002_002 [2.2] AES CFB DMA * *

Description

* testing AES CFB with various Keys. * *

Test Steps

* - [2.2.1] loading the key with 16 byte size. * - [2.2.2] Encrypt. * - [2.2.3] Decrypt. * - [2.2.4] loading the key with 24 byte size. * - [2.2.5] Encrypt. * - [2.2.6] Decrypt. * - [2.2.7] loading the key with 32 byte size. * - [2.2.8] Encrypt. * - [2.2.9] Decrypt. * . */ static void cry_test_002_002_setup(void) { memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN); memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN); memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN); cryStart(&CRYD1, &config_DMA); } static void cry_test_002_002_teardown(void) { cryStop(&CRYD1); } static void cry_test_002_002_execute(void) { cryerror_t ret; /* [2.2.1] loading the key with 16 byte size.*/ test_set_step(1); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.2.2] Encrypt.*/ test_set_step(2); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_128)[i], "encrypt mismatch"); } } /* [2.2.3] Decrypt.*/ test_set_step(3); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } /* [2.2.4] loading the key with 24 byte size.*/ test_set_step(4); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.2.5] Encrypt.*/ test_set_step(5); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_192)[i], "encrypt mismatch"); } } /* [2.2.6] Decrypt.*/ test_set_step(6); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } /* [2.2.7] loading the key with 32 byte size.*/ test_set_step(7); { ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys); test_assert(ret == CRY_NOERROR, "failed load transient key"); } /* [2.2.8] Encrypt.*/ test_set_step(8); { ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "encrypt failed"); SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_256)[i], "encrypt mismatch"); } } /* [2.2.9] Decrypt.*/ test_set_step(9); { ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors); test_assert(ret == CRY_NOERROR, "decrypt failed"); SHOW_DECRYPDATA(TEST_DATA_WORD_LEN); for (int i = 0; i < TEST_DATA_WORD_LEN; i++) { test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch"); } } } static const testcase_t cry_test_002_002 = { "AES CFB DMA", cry_test_002_002_setup, cry_test_002_002_teardown, cry_test_002_002_execute }; /**************************************************************************** * Exported data. ****************************************************************************/ /** * @brief Array of test cases. */ const testcase_t * const cry_test_sequence_002_array[] = { &cry_test_002_001, &cry_test_002_002, NULL }; /** * @brief AES CFB. */ const testsequence_t cry_test_sequence_002 = { "AES CFB", cry_test_sequence_002_array };