/* test_cbc_mode.c - TinyCrypt implementation of some AES-CBC tests */ /* * Copyright (C) 2015 by Intel Corporation, All Rights Reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * - Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * - Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * - Neither the name of Intel Corporation nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* DESCRIPTION This module tests the following AES-CBC Mode routines: Scenarios tested include: - AES128 CBC mode encryption SP 800-38a tests */ #include #include #include "test_utils.h" #include #include #include /* * NIST test vectors from SP 800-38a: * * Block #1 * Plaintext 6bc1bee22e409f96e93d7e117393172a * Input Block 6bc0bce12a459991e134741a7f9e1925 * Output Block 7649abac8119b246cee98e9b12e9197d * Ciphertext 7649abac8119b246cee98e9b12e9197d * Block #2 * Plaintext ae2d8a571e03ac9c9eb76fac45af8e51 * Input Block d86421fb9f1a1eda505ee1375746972c * Output Block 5086cb9b507219ee95db113a917678b2 * Ciphertext 5086cb9b507219ee95db113a917678b2 * Block #3 * Plaintext 30c81c46a35ce411e5fbc1191a0a52ef * Input Block 604ed7ddf32efdff7020d0238b7c2a5d * Output Block 73bed6b8e3c1743b7116e69e22229516 * Ciphertext 73bed6b8e3c1743b7116e69e22229516 * Block #4 * Plaintext f69f2445df4f9b17ad2b417be66c3710 * Input Block 8521f2fd3c8eef2cdc3da7e5c44ea206 * Output Block 3ff1caa1681fac09120eca307586e1a7 * Ciphertext 3ff1caa1681fac09120eca307586e1a7 */ const uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; const uint8_t iv[16] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }; const uint8_t plaintext[64] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; const uint8_t ciphertext[80] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 0x50, 0x86, 0xcb, 0x9b, 0x50, 0x72, 0x19, 0xee, 0x95, 0xdb, 0x11, 0x3a, 0x91, 0x76, 0x78, 0xb2, 0x73, 0xbe, 0xd6, 0xb8, 0xe3, 0xc1, 0x74, 0x3b, 0x71, 0x16, 0xe6, 0x9e, 0x22, 0x22, 0x95, 0x16, 0x3f, 0xf1, 0xca, 0xa1, 0x68, 0x1f, 0xac, 0x09, 0x12, 0x0e, 0xca, 0x30, 0x75, 0x86, 0xe1, 0xa7 }; /* * NIST SP 800-38a CBC Test for encryption and decryption. */ uint32_t test_1_and_2(void) { struct tc_aes_key_sched_struct a; uint8_t iv_buffer[16]; uint8_t encrypted[80]; uint8_t decrypted[64]; uint8_t *p; uint32_t length; int result = TC_PASS; (void)tc_aes128_set_encrypt_key(&a, key); (void)memcpy(iv_buffer, iv, TC_AES_BLOCK_SIZE); TC_PRINT("CBC test #1 (encryption SP 800-38a tests):\n"); if (tc_cbc_mode_encrypt(encrypted, sizeof(plaintext) + TC_AES_BLOCK_SIZE, plaintext, sizeof(plaintext), iv_buffer, &a) == 0) { TC_ERROR("CBC test #1 (encryption SP 800-38a tests) failed in %s.\n", __func__); result = TC_FAIL; goto exitTest1; } result = check_result(1, ciphertext, sizeof(encrypted), encrypted, sizeof(encrypted), 1); TC_END_RESULT(result); TC_PRINT("CBC test #2 (decryption SP 800-38a tests):\n"); (void)tc_aes128_set_decrypt_key(&a, key); p = &encrypted[TC_AES_BLOCK_SIZE]; length = ((uint32_t) sizeof(encrypted)) - TC_AES_BLOCK_SIZE; if (tc_cbc_mode_decrypt(decrypted, length - TC_AES_BLOCK_SIZE, p, length, encrypted, &a) == 0) { TC_ERROR("CBC test #2 (decryption SP 800-38a tests) failed in.\n", __func__); result = TC_FAIL; goto exitTest1; } result = check_result(2, plaintext, sizeof(decrypted), decrypted, sizeof(decrypted), 1); exitTest1: TC_END_RESULT(result); return result; } /* * Main task to test AES */ #ifdef CONFIG_MICROKERNEL void mainloop(void) #else void main(void) #endif { uint32_t result = TC_PASS; TC_START("Performing AES128 tests:"); TC_PRINT("Performing CBC tests:\n"); result = test_1_and_2(); if (result == TC_FAIL) { /* terminate test */ TC_ERROR("CBC test #1 failed.\n"); goto exitTest; } TC_PRINT("All CBC tests succeeded!\n"); exitTest: TC_END_RESULT(result); TC_END_REPORT(result); }