avr-crypto-lib/main-noekeon-test.c

233 lines
5.8 KiB
C
Raw Normal View History

2008-04-11 17:54:24 +00:00
/*
* serpent test-suit
*
*/
#include "config.h"
#include "serial-tools.h"
#include "uart.h"
#include "debug.h"
#include "noekeon.h"
#include "nessie_bc_test.h"
#include "cli.h"
#include "performance_test.h"
#include <stdint.h>
#include <string.h>
#include <stdlib.h>
char* cipher_name = "Noekeon";
/*****************************************************************************
* additional validation-functions *
*****************************************************************************/
void noekeon_genctx_dummy(uint8_t* key, uint16_t keysize, void* ctx){
noekeon_init(key, ctx);
}
void testrun_nessie_noekeon_indirect(void){
char str[strlen(cipher_name)+10];
strcpy(str, cipher_name);
strcat(str, "-indirect");
nessie_bc_ctx.blocksize_B = 16;
nessie_bc_ctx.keysize_b = 128;
nessie_bc_ctx.name = str;
nessie_bc_ctx.ctx_size_B = sizeof(noekeon_ctx_t);
nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)noekeon_enc;
nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)noekeon_dec;
nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)noekeon_genctx_dummy;
nessie_bc_run();
}
void noekeon_genctx_dummy_direct(uint8_t* key, uint16_t keysize, void* ctx){
memcpy(ctx, key, 16);
}
void testrun_nessie_noekeon_direct(void){
char str[strlen(cipher_name)+10];
strcpy(str, cipher_name);
strcat(str, "-Direct");
nessie_bc_ctx.blocksize_B = 16;
nessie_bc_ctx.keysize_b = 128;
nessie_bc_ctx.name = str;
nessie_bc_ctx.ctx_size_B = sizeof(noekeon_ctx_t);
nessie_bc_ctx.cipher_enc = (nessie_bc_enc_fpt)noekeon_enc;
nessie_bc_ctx.cipher_dec = (nessie_bc_dec_fpt)noekeon_dec;
nessie_bc_ctx.cipher_genctx = (nessie_bc_gen_fpt)noekeon_genctx_dummy_direct;
nessie_bc_run();
}
void testrun_stdtest_rundirect(void* data, void* key){
uart_putstr_P(PSTR("\r\n "));
uart_putstr_P(PSTR("k = "));
uart_hexdump(key,16);
uart_putstr_P(PSTR("\r\n "));
uart_putstr_P(PSTR("a = "));
uart_hexdump(data,16);
noekeon_enc(data, key);
uart_putstr_P(PSTR("\r\nafter NESSIEencrypt, b = "));
uart_hexdump(data,16);
noekeon_dec(data, key);
uart_putstr_P(PSTR("\r\nafter NESSIEdecrypt, a?= "));
uart_hexdump(data,16);
uart_putstr_P(PSTR("\r\n"));
}
void testrun_stdtest_runindirect(void* data, void* key){
noekeon_ctx_t ctx;
uart_putstr_P(PSTR("\r\n "));
uart_putstr_P(PSTR("k = "));
uart_hexdump(key,16);
uart_putstr_P(PSTR("\r\n "));
uart_putstr_P(PSTR("a = "));
uart_hexdump(data,16);
noekeon_init(key, &ctx);
noekeon_enc(data, &ctx);
uart_putstr_P(PSTR("\r\nafter NESSIEencrypt, b = "));
uart_hexdump(data,16);
noekeon_dec(data, &ctx);
uart_putstr_P(PSTR("\r\nafter NESSIEdecrypt, a?= "));
uart_hexdump(data,16);
uart_putstr_P(PSTR("\r\n"));
}
void testrun_stdtest_noekeon(void){
uint8_t key[16], data[16];
uint8_t key3[16];
noekeon_ctx_t ctx;
uart_putstr_P(PSTR("\r\nTest vectors for block cipher Noekeon in Indirect-Key Mode:\r\n"));
memset(key, 0, 16);
memset(data, 0, 16);
testrun_stdtest_runindirect(data, key);
memset(key, 0xFF, 16);
memset(data, 0xFF, 16);
testrun_stdtest_runindirect(data, key);
memset(key, 0, 16);
memset(data, 0, 16);
noekeon_init(key, &ctx);
noekeon_enc(data, &ctx);
memcpy(key3, data, 16);
memset(key, 0xFF, 16);
memset(data, 0xFF, 16);
noekeon_init(key, &ctx);
noekeon_enc(data, &ctx);
testrun_stdtest_runindirect(data, key3);
uart_putstr_P(PSTR("\r\nTest vectors for block cipher Noekeon in Direct-Key Mode:\r\n"));
memset(key, 0, 16);
memset(data, 0, 16);
testrun_stdtest_rundirect(data, key);
memset(key, 0xFF, 16);
memset(data, 0xFF, 16);
testrun_stdtest_rundirect(data, key);
memset(key, 0, 16);
memset(data, 0, 16);
noekeon_enc(data, key);
memcpy(key3, data, 16);
memset(key, 0xFF, 16);
memset(data, 0xFF, 16);
noekeon_enc(data, key);
testrun_stdtest_rundirect(data, key3);
}
void testrun_performance_noekeon(void){
uint16_t i,c;
uint64_t t;
char str[16];
2008-04-11 17:54:24 +00:00
uint8_t key[16], data[16];
noekeon_ctx_t ctx;
calibrateTimer();
getOverhead(&c, &i);
uart_putstr_P(PSTR("\r\n\r\n=== benchmark ==="));
utoa(c, str, 10);
uart_putstr_P(PSTR("\r\n\tconst overhead: "));
uart_putstr(str);
utoa(i, str, 10);
uart_putstr_P(PSTR("\r\n\tinterrupt overhead: "));
uart_putstr(str);
memset(key, 0, 16);
memset(data, 0, 16);
startTimer(1);
noekeon_init(key, &ctx);
t = stopTimer();
uart_putstr_P(PSTR("\r\n\tctx-gen time: "));
ultoa((unsigned long)t, str, 10);
uart_putstr(str);
// uart_hexdump(&t, 8);
2008-04-11 17:54:24 +00:00
startTimer(1);
noekeon_enc(data, ctx);
t = stopTimer();
uart_putstr_P(PSTR("\r\n\tencrypt time: "));
ultoa((unsigned long)t, str, 10);
uart_putstr(str);
// uart_hexdump(&t, 8);
2008-04-11 17:54:24 +00:00
startTimer(1);
noekeon_dec(data, ctx);
t = stopTimer();
uart_putstr_P(PSTR("\r\n\tdecrypt time: "));
ultoa((unsigned long)t, str, 10);
uart_putstr(str);
// uart_hexdump(&t, 8);
2008-04-11 17:54:24 +00:00
uart_putstr_P(PSTR("\r\n"));
}
/*****************************************************************************
* main *
*****************************************************************************/
typedef void(*void_fpt)(void);
int main (void){
char str[20];
DEBUG_INIT();
uart_putstr("\r\n");
uart_putstr_P(PSTR("\r\n\r\nCrypto-VS ("));
uart_putstr(cipher_name);
uart_putstr_P(PSTR(")\r\nloaded and running\r\n"));
PGM_P u = PSTR("nessie\0test\0direct\0indirect\0performance\0");
void_fpt v[] = {testrun_nessie_noekeon_direct,
testrun_stdtest_noekeon,
testrun_nessie_noekeon_direct,
testrun_nessie_noekeon_indirect,
testrun_performance_noekeon};
while(1){
if (!getnextwordn(str,20)){DEBUG_S("DBG: W1\r\n"); goto error;}
if(execcommand_d0_P(str, u, v)<0){
uart_putstr_P(PSTR("\r\nunknown command\r\n"));
}
continue;
error:
uart_putstr("ERROR\r\n");
}
}