diff options
-rw-r--r-- | os/hal/ports/SAMA/LLD/CRYPTOv1/sama_sha_lld.c | 70 | ||||
-rw-r--r-- | os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.c | 295 | ||||
-rw-r--r-- | os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.h | 47 | ||||
-rw-r--r-- | test/crypto/configuration.xml | 298 | ||||
-rw-r--r-- | test/crypto/crypto_test.mk | 14 | ||||
-rw-r--r-- | test/crypto/ref/gen_cfiles.bat | 3 | ||||
-rw-r--r-- | test/crypto/ref/gen_testref.bat | 6 | ||||
-rw-r--r-- | test/crypto/ref/hmac_ref.bat | 13 | ||||
-rw-r--r-- | test/crypto/source/test/cry_test_root.c | 2 | ||||
-rw-r--r-- | test/crypto/source/test/cry_test_root.h | 1 | ||||
-rw-r--r-- | test/crypto/source/test/cry_test_sequence_005.c | 26 | ||||
-rw-r--r-- | test/crypto/source/test/cry_test_sequence_009.c | 279 | ||||
-rw-r--r-- | test/crypto/source/test/cry_test_sequence_009.h | 27 | ||||
-rw-r--r-- | test/crypto/source/testref/ref_hmac.c | 48 | ||||
-rw-r--r-- | test/crypto/source/testref/ref_hmac.h | 23 |
15 files changed, 1094 insertions, 58 deletions
diff --git a/os/hal/ports/SAMA/LLD/CRYPTOv1/sama_sha_lld.c b/os/hal/ports/SAMA/LLD/CRYPTOv1/sama_sha_lld.c index a2c925cd5..b88386366 100644 --- a/os/hal/ports/SAMA/LLD/CRYPTOv1/sama_sha_lld.c +++ b/os/hal/ports/SAMA/LLD/CRYPTOv1/sama_sha_lld.c @@ -179,6 +179,21 @@ cryerror_t sama_sha_lld_init(CRYDriver *cryp, struct sha_data *sha) algoregval = SHA_MR_ALGO_SHA512;
break;
#endif
+ case CRY_HMACSHA_1:
+ algoregval = SHA_MR_ALGO_HMAC_SHA1;
+ break;
+ case CRY_HMACSHA_224:
+ algoregval = SHA_MR_ALGO_HMAC_SHA224;
+ break;
+ case CRY_HMACSHA_256:
+ algoregval = SHA_MR_ALGO_HMAC_SHA256;
+ break;
+ case CRY_HMACSHA_384:
+ algoregval = SHA_MR_ALGO_HMAC_SHA384;
+ break;
+ case CRY_HMACSHA_512:
+ algoregval = SHA_MR_ALGO_HMAC_SHA512;
+ break;
default:
osalMutexUnlock(&cryp->mutex);
return CRY_ERR_INV_ALGO;
@@ -232,14 +247,19 @@ static uint32_t shaOutputSize(shadalgo_t algo) {
switch (algo) {
case CRY_SHA_1:
+ case CRY_HMACSHA_1:
return 20;
case CRY_SHA_224:
+ case CRY_HMACSHA_224:
return 28;
case CRY_SHA_256:
+ case CRY_HMACSHA_256:
return 32;
case CRY_SHA_384:
+ case CRY_HMACSHA_384:
return 48;
case CRY_SHA_512:
+ case CRY_HMACSHA_512:
return 64;
default:
return 0;
@@ -248,28 +268,42 @@ static uint32_t shaOutputSize(shadalgo_t algo) static uint32_t shadPaddedMessSize(uint8_t mode, uint32_t len)
{
- uint32_t k;
-
- switch (mode) {
- case CRY_SHA_1:
- case CRY_SHA_224:
- case CRY_SHA_256:
- k = (512 + 448 - (((len * 8) % 512) + 1)) % 512;
- len += (k - 7) / 8 + 9;
- break;
- case CRY_SHA_384:
- case CRY_SHA_512:
- k = (1024 + 896 - (((len * 8) % 1024) + 1)) % 1024;
- len += (k - 7) / 8 + 17;
- break;
- }
- return len;
+ uint32_t k;
+
+ switch (mode) {
+ case CRY_SHA_1:
+ case CRY_SHA_224:
+ case CRY_SHA_256:
+ case CRY_HMACSHA_1:
+ case CRY_HMACSHA_224:
+ case CRY_HMACSHA_256:
+ k = (512 + 448 - (((len * 8) % 512) + 1)) % 512;
+ len += (k - 7) / 8 + 9;
+ break;
+ case CRY_SHA_384:
+ case CRY_SHA_512:
+ case CRY_HMACSHA_384:
+ case CRY_HMACSHA_512:
+ k = (1024 + 896 - (((len * 8) % 1024) + 1)) % 1024;
+ len += (k - 7) / 8 + 17;
+ break;
+ }
+ return len;
}
uint8_t shaBlockSize(shadalgo_t algo)
{
- if ( (algo == CRY_SHA_384) || (algo == CRY_SHA_512) ) {
- return 128;
+
+ switch(algo)
+ {
+ case CRY_SHA_384:
+ case CRY_HMACSHA_384:
+ case CRY_SHA_512:
+ case CRY_HMACSHA_512:
+ return 128;
+
+ default:
+ break;
}
return 64;
diff --git a/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.c b/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.c index 01209bc6e..b62e4654c 100644 --- a/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.c +++ b/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.c @@ -786,9 +786,6 @@ cryerror_t cry_lld_decrypt_AES_CTR(CRYDriver *cryp, *
* @notapi
*/
-
-uint8_t gcmbuff[32*2];
-
cryerror_t cry_lld_encrypt_AES_GCM(CRYDriver *cryp,
crykey_t key_id,
size_t size,
@@ -1457,6 +1454,10 @@ cryerror_t cry_lld_SHA512_final(CRYDriver *cryp, SHA512Context *sha512ctxp, */
cryerror_t cry_lld_TRNG(CRYDriver *cryp, uint8_t *out) {
+ size_t i=0;
+
+ osalMutexLock(&cryp->mutex);
+
if (!(cryp->enabledPer & TRNG_PER)) {
cryp->enabledPer |= TRNG_PER;
pmcEnableTRNG();
@@ -1464,14 +1465,298 @@ cryerror_t cry_lld_TRNG(CRYDriver *cryp, uint8_t *out) { //start trng
TRNG->TRNG_CR = TRNG_CR_ENABLE | TRNG_CR_KEY_PASSWD;
}
+ while (i<4) {
+ while (!(TRNG->TRNG_ISR & TRNG_ISR_DATRDY));
- while (!(TRNG->TRNG_ISR & TRNG_ISR_DATRDY));
+ ((uint32_t*) out)[i] = TRNG->TRNG_ODATA;
+ i++;
+ }
- *((uint32_t*) out) = TRNG->TRNG_ODATA;
+ osalMutexUnlock(&cryp->mutex);
return (cryerror_t)CRY_NOERROR;
}
+
+/**
+ * @brief Hash initialization using HMAC_SHA256.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[out] hmacsha256ctxp pointer to a HMAC_SHA256 context to be
+ * initialized
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+cryerror_t cry_lld_HMACSHA256_init(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp) {
+
+ hmacsha256ctxp->kipad = 0;
+
+ if (cryp->key0_size > HAL_CRY_MAX_KEY_SIZE)
+ return CRY_ERR_INV_KEY_SIZE;
+
+ if (cryp->key0_size > 64) //this implementation doesn't hash the key
+ return CRY_ERR_INV_KEY_TYPE;
+
+ return cry_lld_SHA256_init(cryp,&hmacsha256ctxp->shacontext);
+
+}
+
+/**
+ * @brief Hash update using HMAC.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[in] hmacsha256ctxp pointer to a HMAC_SHA256 context
+ * @param[in] size size of input buffer
+ * @param[in] in buffer containing the input text
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+cryerror_t cry_lld_HMACSHA256_update(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp,
+ size_t size,
+ const uint8_t *in) {
+ uint8_t i;
+ cryerror_t res;
+ uint32_t buffer[16];
+
+ if (hmacsha256ctxp->kipad == 0)
+ {
+ memset(buffer,0,64);
+ memcpy(buffer,cryp->key0_buffer,cryp->key0_size);
+
+ memset((uint8_t *)buffer + cryp->key0_size, 0, 64 - cryp->key0_size);
+
+ for (i = 0; i < 16; ++i) {
+ buffer[i] ^= 0x36363636;
+ }
+
+
+ res = cry_lld_SHA256_update(cryp,&hmacsha256ctxp->shacontext,64,(const uint8_t *)buffer);
+
+ hmacsha256ctxp->kipad = 1;
+ }
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ return cry_lld_SHA256_update(cryp,&hmacsha256ctxp->shacontext,size,in);
+
+
+}
+
+/**
+ * @brief Hash finalization using HMAC.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[in] hmacsha256ctxp pointer to a HMAC_SHA256 context
+ * @param[out] out 256 bits output buffer
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+
+cryerror_t cry_lld_HMACSHA256_final(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp,
+ uint8_t *out) {
+
+ uint8_t i;
+ cryerror_t res;
+ uint32_t buffer[16]; //max block size for sha256
+ uint8_t digest[32];
+
+ //H( k1pad || m )
+
+ res = cry_lld_SHA256_final(cryp, &hmacsha256ctxp->shacontext,digest);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ res = cry_lld_SHA256_init(cryp,&hmacsha256ctxp->shacontext);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ memset(buffer,0,64);
+ memcpy(buffer,cryp->key0_buffer,cryp->key0_size);
+
+ memset((uint8_t *)buffer + cryp->key0_size, 0, 64 - cryp->key0_size);
+
+ for (i = 0; i < 16; ++i) {
+ buffer[i] ^= 0x5C5C5C5C;
+ }
+
+
+ // k+opad || H( k+ipad || m )
+ res = cry_lld_SHA256_update(cryp,&hmacsha256ctxp->shacontext,64,(const uint8_t *)buffer);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ res = cry_lld_SHA256_update(cryp,&hmacsha256ctxp->shacontext,32,digest);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ hmacsha256ctxp->shacontext.sha.out = out;
+
+ return cry_lld_SHA256_final(cryp, &hmacsha256ctxp->shacontext,out);
+}
+
+/**
+ * @brief Hash initialization using HMAC_SHA512.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[out] hmacsha512ctxp pointer to a HMAC_SHA512 context to be
+ * initialized
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+cryerror_t cry_lld_HMACSHA512_init(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp) {
+
+ hmacsha512ctxp->kipad = 0;
+
+ if (cryp->key0_size > HAL_CRY_MAX_KEY_SIZE)
+ return CRY_ERR_INV_KEY_SIZE;
+
+ if (cryp->key0_size > 128) //this implementation doesn't hash the key
+ return CRY_ERR_INV_KEY_TYPE;
+
+
+ return cry_lld_SHA512_init(cryp,&hmacsha512ctxp->shacontext);
+}
+
+/**
+ * @brief Hash update using HMAC.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[in] hmacsha512ctxp pointer to a HMAC_SHA512 context
+ * @param[in] size size of input buffer
+ * @param[in] in buffer containing the input text
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+cryerror_t cry_lld_HMACSHA512_update(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp,
+ size_t size,
+ const uint8_t *in) {
+
+ cryerror_t res;
+ uint8_t i;
+ uint32_t buffer[32];
+
+ if (hmacsha512ctxp->kipad == 0)
+ {
+ memset(buffer,0,128);
+ memcpy(buffer,cryp->key0_buffer,cryp->key0_size);
+
+
+ memset((uint8_t *)buffer + cryp->key0_size, 0, 128 - cryp->key0_size);
+
+ for (i = 0; i < 32; ++i) {
+ buffer[i] ^= 0x36363636;
+ }
+
+
+ res = cry_lld_SHA512_update(cryp,&hmacsha512ctxp->shacontext,128,(const uint8_t *)buffer);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ hmacsha512ctxp->kipad = 1;
+ }
+
+ return cry_lld_SHA512_update(cryp,&hmacsha512ctxp->shacontext,size,in);
+}
+
+/**
+ * @brief Hash finalization using HMAC.
+ * @note Use of this algorithm is not recommended because proven weak.
+ *
+ * @param[in] cryp pointer to the @p CRYDriver object
+ * @param[in] hmacsha512ctxp pointer to a HMAC_SHA512 context
+ * @param[out] out 512 bits output buffer
+ * @return The operation status.
+ * @retval CRY_NOERROR if the operation succeeded.
+ * @retval CRY_ERR_INV_ALGO if the operation is unsupported on this
+ * device instance.
+ *
+ * @notapi
+ */
+cryerror_t cry_lld_HMACSHA512_final(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp,
+ uint8_t *out) {
+
+ uint8_t i;
+ cryerror_t res;
+ uint32_t buffer[32]; //max block size for sha256
+ uint8_t digest[64];
+
+ //H( k1pad || m )
+
+ res = cry_lld_SHA512_final(cryp, &hmacsha512ctxp->shacontext,digest);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ res = cry_lld_SHA512_init(cryp,&hmacsha512ctxp->shacontext);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+
+ memset(buffer,0,128);
+ memcpy(buffer,cryp->key0_buffer,cryp->key0_size);
+
+ memset((uint8_t *)buffer + cryp->key0_size, 0, 128 - cryp->key0_size);
+
+ for (i = 0; i < 32; ++i) {
+ buffer[i] ^= 0x5C5C5C5C;
+ }
+
+
+ // k+opad || H( k+ipad || m )
+ res = cry_lld_SHA512_update(cryp,&hmacsha512ctxp->shacontext,128,(const uint8_t *)buffer);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ res = cry_lld_SHA512_update(cryp,&hmacsha512ctxp->shacontext,64,digest);
+
+ if (res!= CRY_NOERROR)
+ return res;
+
+ hmacsha512ctxp->shacontext.sha.out = out;
+
+ return cry_lld_SHA512_final(cryp, &hmacsha512ctxp->shacontext,out);
+}
+
+
#endif /* HAL_USE_CRY */
/** @} */
diff --git a/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.h b/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.h index e6c08ca68..1bacbc80b 100644 --- a/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.h +++ b/os/hal/ports/SAMA/SAMA5D2x/hal_crypto_lld.h @@ -15,7 +15,7 @@ */
/**
- * @file hal_cry_lld.h
+ * @file hal_crypto_lld.h
* @brief PLATFORM cryptographic subsystem low level driver header.
*
* @addtogroup CRYPTO
@@ -47,6 +47,8 @@ #define CRY_LLD_SUPPORTS_SHA1 TRUE
#define CRY_LLD_SUPPORTS_SHA256 TRUE
#define CRY_LLD_SUPPORTS_SHA512 TRUE
+#define CRY_LLD_SUPPORTS_HMAC_SHA256 TRUE
+#define CRY_LLD_SUPPORTS_HMAC_SHA512 TRUE
#define CRY_LLD_SUPPORTS_TRNG TRUE
/** @{ */
@@ -118,7 +120,13 @@ typedef enum { CRY_SHA_224,
CRY_SHA_256,
CRY_SHA_384,
- CRY_SHA_512
+ CRY_SHA_512,
+
+ CRY_HMACSHA_1,
+ CRY_HMACSHA_224,
+ CRY_HMACSHA_256,
+ CRY_HMACSHA_384,
+ CRY_HMACSHA_512,
}shadalgo_t;
@@ -241,6 +249,25 @@ typedef struct { struct sha_data sha;
} SHA512Context;
#endif
+#if (CRY_LLD_SUPPORTS_HMAC_SHA256 == TRUE) || defined(__DOXYGEN__)
+/**
+ * @brief Type of a HMAC_SHA256 context.
+ */
+typedef struct {
+ SHA256Context shacontext;
+ uint8_t kipad;
+} HMACSHA256Context;
+#endif
+
+#if (CRY_LLD_SUPPORTS_HMAC_SHA512 == TRUE) || defined(__DOXYGEN__)
+/**
+ * @brief Type of a HMAC_SHA512 context.
+ */
+typedef struct {
+ SHA512Context shacontext;
+ uint8_t kipad;
+} HMACSHA512Context;
+#endif
/*===========================================================================*/
/* Driver macros. */
@@ -381,6 +408,22 @@ extern "C" { size_t size, const uint8_t *in);
cryerror_t cry_lld_SHA512_final(CRYDriver *cryp, SHA512Context *sha512ctxp,
uint8_t *out);
+ cryerror_t cry_lld_HMACSHA256_init(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp);
+ cryerror_t cry_lld_HMACSHA256_update(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp,
+ size_t size, const uint8_t *in);
+ cryerror_t cry_lld_HMACSHA256_final(CRYDriver *cryp,
+ HMACSHA256Context *hmacsha256ctxp,
+ uint8_t *out);
+ cryerror_t cry_lld_HMACSHA512_init(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp);
+ cryerror_t cry_lld_HMACSHA512_update(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp,
+ size_t size, const uint8_t *in);
+ cryerror_t cry_lld_HMACSHA512_final(CRYDriver *cryp,
+ HMACSHA512Context *hmacsha512ctxp,
+ uint8_t *out);
cryerror_t cry_lld_TRNG(CRYDriver *cryp, uint8_t *out);
#ifdef __cplusplus
}
diff --git a/test/crypto/configuration.xml b/test/crypto/configuration.xml index 846702494..a06e67e98 100644 --- a/test/crypto/configuration.xml +++ b/test/crypto/configuration.xml @@ -2369,23 +2369,23 @@ cryStart(&CRYD1, &configTRNG_Polling); </tags> <code> <value><![CDATA[ -uint32_t random[10]; - int i,j; - for (i=0;i<10;i++) - { - ret = cryTRNG(&CRYD1,(uint8_t*)&random[i]); +uint32_t random[4]; +int i; - test_assert(ret == CRY_NOERROR , "failed random"); +ret = cryTRNG(&CRYD1,(uint8_t*)&random); - SHOW_DATA(&random[i],1); +test_assert(ret == CRY_NOERROR , "failed random"); - test_assert(random[i] != 0 , "failed random generation (zero)"); +SHOW_DATA(&random[0],4); + +for (i=0;i<4;i++) { + test_assert(random[i] != 0 , "failed random generation (zero)"); +} +for (i=1;i<4;i++) +{ + test_assert(random[i-1] != random[i] , "failed random generation"); +} - for (j=0;j<i;j++) - { - test_assert(random[i] != random[j] , "failed random generation"); - } - } ]]></value> </code> @@ -3641,6 +3641,278 @@ for (i = 0;i<TEST_GCM_LEN;i++) { </cases> </sequence> + +<sequence> + <type index="0"> + <value>Internal Tests</value> + </type> + <brief> + <value>HMAC</value> + </brief> + <description> + <value>HMAC testing</value> + </description> + <condition> + <value /> + </condition> + <shared_code> + <value><![CDATA[ +#include <string.h> +#include "ref_hmac.h" +#define plaintext msg_clear +#define HMACOUT msg_encrypted +#define shabuffer msg_decrypted + +#define MAX_SHA_BLOCK_SIZE TEST_MSG_DATA_BYTE_LEN +#define MAX_SHA_BLOCK_SIZE_INWORD (MAX_SHA_BLOCK_SIZE/4) + +static const CRYConfig config_Polling= +{ + TRANSFER_POLLING, + 0 +}; + +static const CRYConfig config_DMA= +{ + TRANSFER_DMA, + 0 +}; + + +static const int hmackeys_size[]= +{ + 20, + 4, + 20 +}; + +static const uint8_t hmackey_1[]= +{ + 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B, + 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B, + +}; + +// "Hi There", +static const uint8_t hmacmsg1[8]= "Hi There"; +static const size_t hmacmsg_size[]= +{ + 8, +}; +static void cryHMAC256(CRYDriver *cryp) { + + cryerror_t ret; + HMACSHA256Context hmacshactxp; + uint8_t *keyp; + + + hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0]; + hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE; + + keyp =(uint8_t *)hmackey_1; + ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp); + + test_assert(ret == CRY_NOERROR, "failed load transient key"); + + ret = cryHMACSHA256Init(cryp,&hmacshactxp); + + test_assert(ret == CRY_NOERROR, "failed init HMACSHA256"); + + ret = cryHMACSHA256Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1); + + test_assert(ret == CRY_NOERROR, "failed update HMACSHA256"); + + ret = cryHMACSHA256Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT); + + test_assert(ret == CRY_NOERROR, "failed final HMACSHA256"); + + + SHOW_DATA(HMACOUT,8); + +} + +static void cryHMAC512(CRYDriver *cryp) { + + cryerror_t ret; + HMACSHA512Context hmacshactxp; + uint8_t *keyp; + + + hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0]; + hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE; + + keyp =(uint8_t *)hmackey_1; + ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp); + + test_assert(ret == CRY_NOERROR, "failed load transient key"); + + ret = cryHMACSHA512Init(cryp,&hmacshactxp); + + test_assert(ret == CRY_NOERROR, "failed init HMACSHA512"); + + ret = cryHMACSHA512Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1); + + test_assert(ret == CRY_NOERROR, "failed update HMACSHA512"); + + ret = cryHMACSHA512Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT); + + test_assert(ret == CRY_NOERROR, "failed final HMACSHA512"); + + + SHOW_DATA(HMACOUT,16); + +} + + ]]></value> + </shared_code> + <cases> + <case> + <brief> + <value>HMAC Polling</value> + </brief> + <description> + <value>testing HMAC in polled mode</value> + </description> + <condition> + <value /> + </condition> + <various_code> + <setup_code> + <value><![CDATA[ +memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN); +cryStart(&CRYD1, &config_Polling); + + ]]></value> + </setup_code> + <teardown_code> + <value><![CDATA[cryStop(&CRYD1);]]></value> + </teardown_code> + <local_variables> + <value><![CDATA[ +]]></value> + </local_variables> + </various_code> + <steps> + <step> + <description> + <value>hmac 256</value> + </description> + <tags> + <value /> + </tags> + <code> + <value><![CDATA[ +cryHMAC256(&CRYD1); + +for (int i = 0; i < 8; i++) { + test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch"); +} +]]></value> + </code> + </step> + <step> + <description> + <value>hmac 512</value> + </description> + <tags> + <value /> + </tags> + <code> + <value><![CDATA[ +cryHMAC512(&CRYD1); + +for (int i = 0; i < 16; i++) { + test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch"); +} +]]></value> + </code> + </step> + + + + + </steps> + </case> + + + <case> + <brief> + <value>HMAC DMA</value> + </brief> + <description> + <value>testing HMAC in DMA mode</value> + </description> + <condition> + <value /> + </condition> + <various_code> + <setup_code> + <value><![CDATA[ +memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN); +cryStart(&CRYD1, &config_DMA); + + ]]></value> + </setup_code> + <teardown_code> + <value><![CDATA[cryStop(&CRYD1);]]></value> + </teardown_code> + <local_variables> + <value><![CDATA[ +]]></value> + </local_variables> + </various_code> + <steps> + <step> + <description> + <value>hmac 256</value> + </description> + <tags> + <value /> + </tags> + <code> + <value><![CDATA[ +cryHMAC256(&CRYD1); + + +for (int i = 0; i < 8; i++) { + test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch"); +} +]]></value> + </code> + </step> + + <step> + <description> + <value>hmac 512</value> + </description> + <tags> + <value /> + </tags> + <code> + <value><![CDATA[ +cryHMAC512(&CRYD1); + +for (int i = 0; i < 16; i++) { + test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch"); +} +]]></value> + </code> + </step> + + + + + + + + </steps> + </case> + + + </cases> + </sequence> + + </sequences> </instance> </instances> diff --git a/test/crypto/crypto_test.mk b/test/crypto/crypto_test.mk index 1e53235f3..787fa1d66 100644 --- a/test/crypto/crypto_test.mk +++ b/test/crypto/crypto_test.mk @@ -1,9 +1,10 @@ # List of all the ChibiOS OS Library test files.
-TESTSRC += ${CHIBIOS}/test/crypto/source/test/cry_test_root.c \
- ${CHIBIOS}/test/crypto/source/testref/ref_aes.c \
- ${CHIBIOS}/test/crypto/source/testref/ref_des.c \
- ${CHIBIOS}/test/crypto/source/testref/ref_sha.c \
- ${CHIBIOS}/test/crypto/source/testref/ref_gcm.c \
+TESTSRC += ${CHIBIOS}/test/crypto/source/test/cry_test_root.c \
+ ${CHIBIOS}/test/crypto/source/testref/ref_aes.c \
+ ${CHIBIOS}/test/crypto/source/testref/ref_des.c \
+ ${CHIBIOS}/test/crypto/source/testref/ref_sha.c \
+ ${CHIBIOS}/test/crypto/source/testref/ref_gcm.c \
+ ${CHIBIOS}/test/crypto/source/testref/ref_hmac.c \
${CHIBIOS}/test/crypto/source/test/cry_test_sequence_001.c \
${CHIBIOS}/test/crypto/source/test/cry_test_sequence_002.c \
${CHIBIOS}/test/crypto/source/test/cry_test_sequence_003.c \
@@ -11,7 +12,8 @@ TESTSRC += ${CHIBIOS}/test/crypto/source/test/cry_test_root.c \ ${CHIBIOS}/test/crypto/source/test/cry_test_sequence_005.c \
${CHIBIOS}/test/crypto/source/test/cry_test_sequence_006.c \
${CHIBIOS}/test/crypto/source/test/cry_test_sequence_007.c \
- ${CHIBIOS}/test/crypto/source/test/cry_test_sequence_008.c
+ ${CHIBIOS}/test/crypto/source/test/cry_test_sequence_008.c \
+ ${CHIBIOS}/test/crypto/source/test/cry_test_sequence_009.c
# Required include directories
TESTINC += ${CHIBIOS}/test/crypto/source/testref \
${CHIBIOS}/test/crypto/source/test
diff --git a/test/crypto/ref/gen_cfiles.bat b/test/crypto/ref/gen_cfiles.bat index 9d09a3f82..2269f91f3 100644 --- a/test/crypto/ref/gen_cfiles.bat +++ b/test/crypto/ref/gen_cfiles.bat @@ -3,3 +3,6 @@ %PYTHON%\python genfile.py -f des_ecb_8,tdes_ecb_16,tdes_ecb_24,tdes_cbc_16,tdes_cbc_24 -o ref_des -p ../source/testref
%PYTHON%\python genfile.py -f sha_sha1_empty,sha_sha1_3,sha_sha1_56,sha_sha1_64,sha_sha1_128,sha_sha256_3,sha_sha256_56,sha_sha256_64,sha_sha256_128,sha_sha512_3,sha_sha512_56,sha_sha512_64,sha_sha512_128 -o ref_sha -p ../source/testref
+
+
+%PYTHON%\python genfile.py -f hmac_hmac256_1,hmac_hmac256_2,hmac_hmac512_1,hmac_hmac512_2 -o ref_hmac -p ../source/testref
\ No newline at end of file diff --git a/test/crypto/ref/gen_testref.bat b/test/crypto/ref/gen_testref.bat index 17abaaae9..ac8e90dbc 100644 --- a/test/crypto/ref/gen_testref.bat +++ b/test/crypto/ref/gen_testref.bat @@ -14,8 +14,12 @@ echo|set /p="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" > echo|set /p="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" > plaintext_5
+echo|set /p="Hi There" > plaintext_6
+
+echo|set /p="what do ya want for nothing?" > plaintext_7
+
call aes_ref.bat
call des_ref.bat
call sha_ref.bat
-
+call hmac_ref.bat
call gen_cfiles.bat
\ No newline at end of file diff --git a/test/crypto/ref/hmac_ref.bat b/test/crypto/ref/hmac_ref.bat new file mode 100644 index 000000000..78eb88b00 --- /dev/null +++ b/test/crypto/ref/hmac_ref.bat @@ -0,0 +1,13 @@ +
+
+call %OPENSSL%\openssl dgst -sha256 -hmac "" -c -binary -out hmac_hmac256_1 plaintext_6
+ren hmac_hmac256_1 hmac_hmac256_1.enc
+
+call %OPENSSL%\openssl dgst -sha256 -hmac "Jefe" -c -binary -out hmac_hmac256_2 plaintext_7
+ren hmac_hmac256_2 hmac_hmac256_2.enc
+
+call %OPENSSL%\openssl dgst -sha512 -hmac "" -c -binary -out hmac_hmac512_1 plaintext_6
+ren hmac_hmac512_1 hmac_hmac512_1.enc
+
+call %OPENSSL%\openssl dgst -sha512 -hmac "Jefe" -c -binary -out hmac_hmac512_2 plaintext_7
+ren hmac_hmac512_2 hmac_hmac512_2.enc
diff --git a/test/crypto/source/test/cry_test_root.c b/test/crypto/source/test/cry_test_root.c index 9c8feb713..397e49131 100644 --- a/test/crypto/source/test/cry_test_root.c +++ b/test/crypto/source/test/cry_test_root.c @@ -29,6 +29,7 @@ * - @subpage cry_test_sequence_006
* - @subpage cry_test_sequence_007
* - @subpage cry_test_sequence_008
+ * - @subpage cry_test_sequence_009
* .
*/
@@ -58,6 +59,7 @@ const testsequence_t * const cry_test_suite_array[] = { &cry_test_sequence_006,
&cry_test_sequence_007,
&cry_test_sequence_008,
+ &cry_test_sequence_009,
NULL
};
diff --git a/test/crypto/source/test/cry_test_root.h b/test/crypto/source/test/cry_test_root.h index 110dd851f..689339013 100644 --- a/test/crypto/source/test/cry_test_root.h +++ b/test/crypto/source/test/cry_test_root.h @@ -32,6 +32,7 @@ #include "cry_test_sequence_006.h"
#include "cry_test_sequence_007.h"
#include "cry_test_sequence_008.h"
+#include "cry_test_sequence_009.h"
#if !defined(__DOXYGEN__)
diff --git a/test/crypto/source/test/cry_test_sequence_005.c b/test/crypto/source/test/cry_test_sequence_005.c index 35c759950..6649d39a6 100644 --- a/test/crypto/source/test/cry_test_sequence_005.c +++ b/test/crypto/source/test/cry_test_sequence_005.c @@ -78,23 +78,23 @@ static void cry_test_005_001_execute(void) { /* [5.1.1] Random generation and test.*/
test_set_step(1);
{
- uint32_t random[10];
- int i,j;
- for (i=0;i<10;i++)
- {
- ret = cryTRNG(&CRYD1,(uint8_t*)&random[i]);
+ uint32_t random[4];
+ int i;
- test_assert(ret == CRY_NOERROR , "failed random");
+ ret = cryTRNG(&CRYD1,(uint8_t*)&random);
- SHOW_DATA(&random[i],1);
+ test_assert(ret == CRY_NOERROR , "failed random");
- test_assert(random[i] != 0 , "failed random generation (zero)");
+ SHOW_DATA(&random[0],4);
+
+ for (i=0;i<4;i++) {
+ test_assert(random[i] != 0 , "failed random generation (zero)");
+ }
+ for (i=1;i<4;i++)
+ {
+ test_assert(random[i-1] != random[i] , "failed random generation");
+ }
- for (j=0;j<i;j++)
- {
- test_assert(random[i] != random[j] , "failed random generation");
- }
- }
}
}
diff --git a/test/crypto/source/test/cry_test_sequence_009.c b/test/crypto/source/test/cry_test_sequence_009.c new file mode 100644 index 000000000..c0023ea7e --- /dev/null +++ b/test/crypto/source/test/cry_test_sequence_009.c @@ -0,0 +1,279 @@ +/*
+ ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+
+#include "hal.h"
+#include "cry_test_root.h"
+
+/**
+ * @file cry_test_sequence_009.c
+ * @brief Test Sequence 009 code.
+ *
+ * @page cry_test_sequence_009 [9] HMAC
+ *
+ * File: @ref cry_test_sequence_009.c
+ *
+ * <h2>Description</h2>
+ * HMAC testing.
+ *
+ * <h2>Test Cases</h2>
+ * - @subpage cry_test_009_001
+ * - @subpage cry_test_009_002
+ * .
+ */
+
+/****************************************************************************
+ * Shared code.
+ ****************************************************************************/
+
+#include <string.h>
+#include "ref_hmac.h"
+#define plaintext msg_clear
+#define HMACOUT msg_encrypted
+#define shabuffer msg_decrypted
+
+#define MAX_SHA_BLOCK_SIZE TEST_MSG_DATA_BYTE_LEN
+#define MAX_SHA_BLOCK_SIZE_INWORD (MAX_SHA_BLOCK_SIZE/4)
+
+static const CRYConfig config_Polling=
+{
+ TRANSFER_POLLING,
+ 0
+};
+
+static const CRYConfig config_DMA=
+{
+ TRANSFER_DMA,
+ 0
+};
+
+
+static const int hmackeys_size[]=
+{
+ 20,
+ 4,
+ 20
+};
+
+static const uint8_t hmackey_1[]=
+{
+ 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,
+ 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,
+
+};
+
+// "Hi There",
+static const uint8_t hmacmsg1[8]= "Hi There";
+static const size_t hmacmsg_size[]=
+{
+ 8,
+};
+static void cryHMAC256(CRYDriver *cryp) {
+
+ cryerror_t ret;
+ HMACSHA256Context hmacshactxp;
+ uint8_t *keyp;
+
+
+ hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0];
+ hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
+
+ keyp =(uint8_t *)hmackey_1;
+ ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp);
+
+ test_assert(ret == CRY_NOERROR, "failed load transient key");
+
+ ret = cryHMACSHA256Init(cryp,&hmacshactxp);
+
+ test_assert(ret == CRY_NOERROR, "failed init HMACSHA256");
+
+ ret = cryHMACSHA256Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1);
+
+ test_assert(ret == CRY_NOERROR, "failed update HMACSHA256");
+
+ ret = cryHMACSHA256Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT);
+
+ test_assert(ret == CRY_NOERROR, "failed final HMACSHA256");
+
+
+ SHOW_DATA(HMACOUT,8);
+
+}
+
+static void cryHMAC512(CRYDriver *cryp) {
+
+ cryerror_t ret;
+ HMACSHA512Context hmacshactxp;
+ uint8_t *keyp;
+
+
+ hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0];
+ hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
+
+ keyp =(uint8_t *)hmackey_1;
+ ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp);
+
+ test_assert(ret == CRY_NOERROR, "failed load transient key");
+
+ ret = cryHMACSHA512Init(cryp,&hmacshactxp);
+
+ test_assert(ret == CRY_NOERROR, "failed init HMACSHA512");
+
+ ret = cryHMACSHA512Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1);
+
+ test_assert(ret == CRY_NOERROR, "failed update HMACSHA512");
+
+ ret = cryHMACSHA512Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT);
+
+ test_assert(ret == CRY_NOERROR, "failed final HMACSHA512");
+
+
+ SHOW_DATA(HMACOUT,16);
+
+}
+
+
+
+/****************************************************************************
+ * Test cases.
+ ****************************************************************************/
+
+/**
+ * @page cry_test_009_001 [9.1] HMAC Polling
+ *
+ * <h2>Description</h2>
+ * testing HMAC in polled mode.
+ *
+ * <h2>Test Steps</h2>
+ * - [9.1.1] hmac 256.
+ * - [9.1.2] hmac 512.
+ * .
+ */
+
+static void cry_test_009_001_setup(void) {
+ memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN);
+ cryStart(&CRYD1, &config_Polling);
+
+
+}
+
+static void cry_test_009_001_teardown(void) {
+ cryStop(&CRYD1);
+}
+
+static void cry_test_009_001_execute(void) {
+
+ /* [9.1.1] hmac 256.*/
+ test_set_step(1);
+ {
+ cryHMAC256(&CRYD1);
+
+ for (int i = 0; i < 8; i++) {
+ test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch");
+ }
+ }
+
+ /* [9.1.2] hmac 512.*/
+ test_set_step(2);
+ {
+ cryHMAC512(&CRYD1);
+
+ for (int i = 0; i < 16; i++) {
+ test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch");
+ }
+ }
+}
+
+static const testcase_t cry_test_009_001 = {
+ "HMAC Polling",
+ cry_test_009_001_setup,
+ cry_test_009_001_teardown,
+ cry_test_009_001_execute
+};
+
+/**
+ * @page cry_test_009_002 [9.2] HMAC DMA
+ *
+ * <h2>Description</h2>
+ * testing HMAC in DMA mode.
+ *
+ * <h2>Test Steps</h2>
+ * - [9.2.1] hmac 256.
+ * - [9.2.2] hmac 512.
+ * .
+ */
+
+static void cry_test_009_002_setup(void) {
+ memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN);
+ cryStart(&CRYD1, &config_DMA);
+
+
+}
+
+static void cry_test_009_002_teardown(void) {
+ cryStop(&CRYD1);
+}
+
+static void cry_test_009_002_execute(void) {
+
+ /* [9.2.1] hmac 256.*/
+ test_set_step(1);
+ {
+ cryHMAC256(&CRYD1);
+
+
+ for (int i = 0; i < 8; i++) {
+ test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch");
+ }
+ }
+
+ /* [9.2.2] hmac 512.*/
+ test_set_step(2);
+ {
+ cryHMAC512(&CRYD1);
+
+ for (int i = 0; i < 16; i++) {
+ test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch");
+ }
+ }
+}
+
+static const testcase_t cry_test_009_002 = {
+ "HMAC DMA",
+ cry_test_009_002_setup,
+ cry_test_009_002_teardown,
+ cry_test_009_002_execute
+};
+
+/****************************************************************************
+ * Exported data.
+ ****************************************************************************/
+
+/**
+ * @brief Array of test cases.
+ */
+const testcase_t * const cry_test_sequence_009_array[] = {
+ &cry_test_009_001,
+ &cry_test_009_002,
+ NULL
+};
+
+/**
+ * @brief HMAC.
+ */
+const testsequence_t cry_test_sequence_009 = {
+ "HMAC",
+ cry_test_sequence_009_array
+};
diff --git a/test/crypto/source/test/cry_test_sequence_009.h b/test/crypto/source/test/cry_test_sequence_009.h new file mode 100644 index 000000000..a57f9848a --- /dev/null +++ b/test/crypto/source/test/cry_test_sequence_009.h @@ -0,0 +1,27 @@ +/*
+ ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+
+/**
+ * @file cry_test_sequence_009.h
+ * @brief Test Sequence 009 header.
+ */
+
+#ifndef CRY_TEST_SEQUENCE_009_H
+#define CRY_TEST_SEQUENCE_009_H
+
+extern const testsequence_t cry_test_sequence_009;
+
+#endif /* CRY_TEST_SEQUENCE_009_H */
diff --git a/test/crypto/source/testref/ref_hmac.c b/test/crypto/source/testref/ref_hmac.c new file mode 100644 index 000000000..4b5e9a760 --- /dev/null +++ b/test/crypto/source/testref/ref_hmac.c @@ -0,0 +1,48 @@ +/*
+ ChibiOS - Copyright (C) 2006..2017 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+
+#include "hal.h"
+
+const uint8_t refHMAC_HMAC256_1[]={
+0xB0,0x34,0x4C,0x61,0xD8,0xDB,0x38,0x53,0x5C,0xA8,
+0xAF,0xCE,0xAF,0x0B,0xF1,0x2B,0x88,0x1D,0xC2,0x00,
+0xC9,0x83,0x3D,0xA7,0x26,0xE9,0x37,0x6C,0x2E,0x32,
+0xCF,0xF7,
+};
+const uint8_t refHMAC_HMAC256_2[]={
+0x5B,0xDC,0xC1,0x46,0xBF,0x60,0x75,0x4E,0x6A,0x04,
+0x24,0x26,0x08,0x95,0x75,0xC7,0x5A,0x00,0x3F,0x08,
+0x9D,0x27,0x39,0x83,0x9D,0xEC,0x58,0xB9,0x64,0xEC,
+0x38,0x43,
+};
+const uint8_t refHMAC_HMAC512_1[]={
+0x87,0xAA,0x7C,0xDE,0xA5,0xEF,0x61,0x9D,0x4F,0xF0,
+0xB4,0x24,0x1A,0x1D,0x6C,0xB0,0x23,0x79,0xF4,0xE2,
+0xCE,0x4E,0xC2,0x78,0x7A,0xD0,0xB3,0x05,0x45,0xE1,
+0x7C,0xDE,0xDA,0xA8,0x33,0xB7,0xD6,0xB8,0xA7,0x02,
+0x03,0x8B,0x27,0x4E,0xAE,0xA3,0xF4,0xE4,0xBE,0x9D,
+0x91,0x4E,0xEB,0x61,0xF1,0x70,0x2E,0x69,0x6C,0x20,
+0x3A,0x12,0x68,0x54,
+};
+const uint8_t refHMAC_HMAC512_2[]={
+0x16,0x4B,0x7A,0x7B,0xFC,0xF8,0x19,0xE2,0xE3,0x95,
+0xFB,0xE7,0x3B,0x56,0xE0,0xA3,0x87,0xBD,0x64,0x22,
+0x2E,0x83,0x1F,0xD6,0x10,0x27,0x0C,0xD7,0xEA,0x25,
+0x05,0x54,0x97,0x58,0xBF,0x75,0xC0,0x5A,0x99,0x4A,
+0x6D,0x03,0x4F,0x65,0xF8,0xF0,0xE6,0xFD,0xCA,0xEA,
+0xB1,0xA3,0x4D,0x4A,0x6B,0x4B,0x63,0x6E,0x07,0x0A,
+0x38,0xBC,0xE7,0x37,
+};
diff --git a/test/crypto/source/testref/ref_hmac.h b/test/crypto/source/testref/ref_hmac.h new file mode 100644 index 000000000..fa9738c2d --- /dev/null +++ b/test/crypto/source/testref/ref_hmac.h @@ -0,0 +1,23 @@ +/*
+ ChibiOS - Copyright (C) 2006..2017 Giovanni Di Sirio
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+*/
+#ifndef TEST_REF_HMAC_H_
+#define TEST_REF_HMAC_H_
+
+extern const uint8_t refHMAC_HMAC256_1[];
+extern const uint8_t refHMAC_HMAC256_2[];
+extern const uint8_t refHMAC_HMAC512_1[];
+extern const uint8_t refHMAC_HMAC512_2[];
+#endif //TEST_REF_HMAC_H_
|