123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921 |
- <?xml version="1.0" encoding="UTF-8"?>
- <SPC5-Config version="1.0.0">
- <application name="Crypto Test Suite" version="1.0.0" standalone="true" locked="false">
- <description>Test Specification for Hal Crypto </description>
- <component id="org.chibios.spc5.components.portable.generic_startup">
- <component id="org.chibios.spc5.components.portable.chibios_unitary_tests_engine" />
- </component>
- <instances>
- <instance locked="false" id="org.chibios.spc5.components.portable.generic_startup" />
- <instance locked="false" id="org.chibios.spc5.components.portable.chibios_unitary_tests_engine">
- <description>
- <brief>
- <value>Chibios Hal Crypto Test Suite.</value>
- </brief>
- <copyright>
- <value><![CDATA[/*
- ChibiOS - Copyright (C) 2006..2018 Giovanni Di Sirio
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */]]></value>
- </copyright>
- <introduction>
- <value>Test suite for ChibiOS Crypto Hal. The purpose of this suite is to perform unit tests on the Hal Crypto and to converge to 100% code coverage through successive improvements.</value>
- </introduction>
- </description>
- <global_data_and_code>
- <code_prefix>
- <value>cry_</value>
- </code_prefix>
- <global_definitions>
- <value><![CDATA[
- extern void cryptoTest_setStream(BaseSequentialStream * s);
- extern void cryptoTest_printArray32(bool isLE,const uint32_t *a,size_t len);
- #ifdef LOG_CRYPTO_DATA
- #define SHOW_ENCRYPDATA(w) cryptoTest_printArray32(true,msg_encrypted,w)
- #define SHOW_DECRYPDATA(w) cryptoTest_printArray32(true,msg_decrypted,w)
- #define SHOW_DATA(d,w) cryptoTest_printArray32(true,d,w)
- #else
- #define SHOW_ENCRYPDATA(w)
- #define SHOW_DECRYPDATA(w)
- #define SHOW_DATA(d,w)
- #endif
- #define TEST_DATA_BYTE_LEN 640
- #define TEST_DATA_WORD_LEN (TEST_DATA_BYTE_LEN / 4)
- #define TEST_MSG_DATA_BYTE_LEN 640
- #define TEST_MSG_DATA_WORD_LEN (TEST_MSG_DATA_BYTE_LEN / 4)
- #define SHA_LEN_0 3
- #define SHA_LEN_1 56
- #define SHA_LEN_2 64
- #define SHA_LEN_3 128
- #define TEST_GCM_KEY1_LEN 32
- #define TEST_P_LEN 60
- #define TEST_A_LEN 20
- #define TEST_IV1_LEN 12
- #define TEST_CL_LEN 60
- #define TEST_TL_LEN 16
- extern const char test_plain_data[TEST_DATA_BYTE_LEN];
- extern uint32_t msg_clear[TEST_MSG_DATA_WORD_LEN];
- extern uint32_t msg_encrypted[TEST_MSG_DATA_WORD_LEN];
- extern uint32_t msg_decrypted[TEST_MSG_DATA_WORD_LEN];
- extern const uint32_t test_keys[8];
- extern const uint32_t test_vectors[4];
- extern const uint8_t sha_msg0[SHA_LEN_0];
- extern const uint8_t sha_msg1[SHA_LEN_1];
- extern const uint8_t sha_msg2[SHA_LEN_2];
- extern const uint8_t sha_msg3[SHA_LEN_3];
- ]]></value>
- </global_definitions>
- <global_code>
- <value><![CDATA[
- #if CRYPTO_LOG_LEVEL == 1
- #include "chprintf.h"
- #endif
- const uint32_t test_keys[8]=
- {
- 0x01234567, //KEY 1 low part
- 0x89ABCDEF, //KEY 1 hi part
- 0x76543210, //KEY 2 low part
- 0xFEDCBA98, //KEY 2 hi part
- 0x55AA55AA,
- 0xAA55AA55,
- 0x0000FFFF,
- 0xFFFF0000
- };
- const uint32_t test_vectors[4]=
- {
- 0x11223344, //VECTOR 1 low part
- 0x55667788, //VECTOR 1 hi part
- 0x11112222,
- 0x33334444
- };
- const char test_plain_data[TEST_DATA_BYTE_LEN] ="\
- Lorem ipsum dolor sit amet, consectetur adipiscing elit. Praesen\
- t et pellentesque risus. Sed id gravida elit. Proin eget accumsa\
- n mi. Aliquam vitae dui porta, euismod velit viverra, elementum \
- lacus. Nunc turpis orci, venenatis vel vulputate nec, luctus sit\
- amet urna. Ut et nunc purus. Aliquam erat volutpat. Vestibulum n\
- ulla dolor, cursus vitae cursus eget, dapibus eget sapien. Integ\
- er justo eros, commodo ut massa eu, bibendum elementum tellus. N\
- am quis dolor in libero placerat congue. Sed sodales urna sceler\
- isque dui faucibus, vitae malesuada dui fermentum. Proin ultrici\
- es sit amet justo at ornare. Suspendisse efficitur purus nullam.";
- const uint8_t sha_msg0[SHA_LEN_0] = "abc";
- const uint8_t sha_msg1[SHA_LEN_1] = "abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq";
- const uint8_t sha_msg2[SHA_LEN_2] = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
- const uint8_t sha_msg3[SHA_LEN_3] = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa";
-
- ALIGNED_VAR(4) uint32_t msg_clear[TEST_MSG_DATA_WORD_LEN];
- ALIGNED_VAR(4) uint32_t msg_encrypted[TEST_MSG_DATA_WORD_LEN];
- ALIGNED_VAR(4) uint32_t msg_decrypted[TEST_MSG_DATA_WORD_LEN];
- BaseSequentialStream * ts;
- #if CRYPTO_LOG_LEVEL == 1
- static uint32_t toBigEndian(uint32_t v)
- {
- return (v & 0x000000ff) << 24u |
- ( (v & 0x0000ff00) << 8u ) |
- ( (v & 0x00ff0000) >> 8u ) |
- ( (v & 0xff000000) >> 24u );
- }
- #endif
- void cryptoTest_setStream(BaseSequentialStream * s)
- {
- ts = s;
- }
- void cryptoTest_printArray(const uint8_t *a,size_t len)
- {
- #if CRYPTO_LOG_LEVEL == 1
- for(size_t i=0;i<len;i++)
- {
- chprintf(ts,"%02X",a[i]);
- }
- chprintf(ts,"\r\n");
- #else
- (void)a;
- (void)len;
- #endif
- }
- void cryptoTest_printArray32(bool isLE,const uint32_t *a,size_t len)
- {
- #if CRYPTO_LOG_LEVEL == 1
- uint32_t data;
- for(size_t i=0;i<len;i++)
- {
- if (isLE)
- data = toBigEndian(a[i]);
- else
- data = a[i];
- chprintf(ts,"%08X ",data);
- }
- chprintf(ts,"\r\n");
- #else
- (void)isLE;
- (void)a;
- (void)len;
- #endif
- }
- ]]></value>
- </global_code>
- </global_data_and_code>
- <sequences>
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>AES ECB</value>
- </brief>
- <description>
- <value>AES ECB</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_aes.h"
- static const CRYConfig config_Polling = {
- TRANSFER_POLLING,
- AES_CFBS_128 //cfbs
- };
- static const CRYConfig config_DMA = {
- TRANSFER_DMA,
- AES_CFBS_128 //cfbs
- };
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>AES ECB Polling</value>
- </brief>
- <description>
- <value>testing AES ECB with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- <case>
- <brief>
- <value>AES ECB DMA</value>
- </brief>
- <description>
- <value>testing AES ECB with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_ECB_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- </cases>
- </sequence>
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>AES CFB</value>
- </brief>
- <description>
- <value>AES CFB</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_aes.h"
- static const CRYConfig config_Polling = {
- TRANSFER_POLLING,
- AES_CFBS_128 //cfbs
- };
- static const CRYConfig config_DMA = {
- TRANSFER_DMA,
- AES_CFBS_128 //cfbs
- };
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>AES CFB Polling</value>
- </brief>
- <description>
- <value>testing AES CFB with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- <case>
- <brief>
- <value>AES CFB DMA</value>
- </brief>
- <description>
- <value>testing AES CFB with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CFB_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CFB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- </cases>
- </sequence>
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>AES CBC</value>
- </brief>
- <description>
- <value>AES CBC</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_aes.h"
- static const CRYConfig config_Polling = {
- TRANSFER_POLLING,
- AES_CFBS_128 //cfbs
- };
- static const CRYConfig config_DMA = {
- TRANSFER_DMA,
- AES_CFBS_128 //cfbs
- };
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>AES CBC Polling</value>
- </brief>
- <description>
- <value>testing AES CBC with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- <case>
- <brief>
- <value>AES CBC DMA</value>
- </brief>
- <description>
- <value>testing AES CBC with various Keys</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_128)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_192)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 32 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,32, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refAES_CBC_256)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptAES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
- </cases>
- </sequence>
-
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>(T)DES</value>
- </brief>
- <description>
- <value>(T)DES testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_des.h"
- static const CRYConfig configDES_Polling=
- {
- TRANSFER_POLLING,
- 0
- };
- static const CRYConfig configDES_DMA=
- {
- TRANSFER_DMA,
- 0
- };
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>DES Polling</value>
- </brief>
- <description>
- <value>testing DES in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &configDES_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 8 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,8, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES(&CRYD1, 0, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(2);
- for (int i = 0; i < 2; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refDES_ECB_8)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES(&CRYD1, 0, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(2);
- for (int i = 0; i < 2; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- <case>
- <brief>
- <value>TDES CBC Polling</value>
- </brief>
- <description>
- <value>testing TDES CBC in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &configDES_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_CBC_16)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_CBC_24)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
- </steps>
- </case>
- <case>
- <brief>
- <value>TDES ECB Polling</value>
- </brief>
- <description>
- <value>testing TDES ECB in polling mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &configDES_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_ECB_16)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_ECB_24)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
-
-
-
- <case>
- <brief>
- <value>TDES CBC DMA</value>
- </brief>
- <description>
- <value>testing TDES CBC in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &configDES_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_CBC_16)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_CBC_24)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_CBC(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted,(uint8_t*)test_vectors);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
- </steps>
- </case>
- <case>
- <brief>
- <value>TDES ECB DMA</value>
- </brief>
- <description>
- <value>testing TDES ECB in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memcpy((char*) msg_clear, test_plain_data, TEST_DATA_BYTE_LEN);
- memset(msg_encrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(msg_decrypted, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &configDES_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key with 16 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,16, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_ECB_16)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>loading the key with 24 byte size</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_des,24, (uint8_t *) test_keys);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Encrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryEncryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_clear, (uint8_t*) msg_encrypted);
- test_assert(ret == CRY_NOERROR, "encrypt failed");
- SHOW_ENCRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_encrypted[i] == ((uint32_t*) refTDES_ECB_24)[i], "encrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>Decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- ret = cryDecryptDES_ECB(&CRYD1, 0,TEST_DATA_BYTE_LEN, (uint8_t*) msg_encrypted, (uint8_t*) msg_decrypted);
- test_assert(ret == CRY_NOERROR, "decrypt failed");
- SHOW_DECRYPDATA(TEST_DATA_WORD_LEN);
- for (int i = 0; i < TEST_DATA_WORD_LEN; i++) {
- test_assert(msg_decrypted[i] == msg_clear[i], "decrypt mismatch");
- }
- ]]></value>
- </code>
- </step>
- </steps>
- </case>
-
- </cases>
- </sequence>
-
-
-
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>TRNG</value>
- </brief>
- <description>
- <value>TRNG testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- static const CRYConfig configTRNG_Polling=
- {
- TRANSFER_POLLING,
- 0
- };
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>TRNG Polling</value>
- </brief>
- <description>
- <value>testing TRNG in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- cryStart(&CRYD1, &configTRNG_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Random generation and test</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- uint32_t random[4];
- int i;
- ret = cryTRNG(&CRYD1,(uint8_t*)&random);
- test_assert(ret == CRY_NOERROR , "failed random");
- SHOW_DATA(&random[0],4);
- for (i=0;i<4;i++) {
- test_assert(random[i] != 0 , "failed random generation (zero)");
- }
- for (i=1;i<4;i++)
- {
- test_assert(random[i-1] != random[i] , "failed random generation");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
-
- </cases>
- </sequence>
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>SHA</value>
- </brief>
- <description>
- <value>SHA testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_sha.h"
- /* Buffer size for each SHA transfer, size should be multiple of block size
- (block size: 64 for SHA_1/SHA_256/SHA_224, 128 for SHA_384/SHA_512) */
- #define MAX_SHA_BLOCK_SIZE TEST_MSG_DATA_BYTE_LEN
- #define MAX_SHA_BLOCK_SIZE_INWORD (MAX_SHA_BLOCK_SIZE/4)
- #define shabuffer msg_decrypted
- #define MAX_DIGEST_SIZE_INBYTE TEST_MSG_DATA_BYTE_LEN
- #define MAX_DIGEST_SIZE_INWORD (MAX_DIGEST_SIZE_INBYTE/4)
- #define digest msg_encrypted
- static const CRYConfig configSHA_Polling=
- {
- TRANSFER_POLLING,
- 0
- };
- static cryerror_t crySHA1(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA1Context shactxp;
-
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- ret = crySHA1Init(cryp,&shactxp);
- ret = crySHA1Update(cryp,&shactxp,size,in);
- ret = crySHA1Final(cryp,&shactxp,out);
- return ret;
- }
- static cryerror_t crySHA256(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA256Context shactxp;
-
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- ret = crySHA256Init(cryp,&shactxp);
- ret = crySHA256Update(cryp,&shactxp,size,in);
- ret = crySHA256Final(cryp,&shactxp,out);
- return ret;
- }
- static cryerror_t crySHA512(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA512Context shactxp;
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
-
- ret = crySHA512Init(cryp,&shactxp);
- ret = crySHA512Update(cryp,&shactxp,size,in);
- ret = crySHA512Final(cryp,&shactxp,out);
- return ret;
- }
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>SHA1 Polling</value>
- </brief>
- <description>
- <value>testing SHA1 in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- Empty Block Test
- ret = crySHA1(&CRYD1,0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
-
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_EMPTY;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- One Block Test
- ret = crySHA1(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_3;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA1(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_56;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA1(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_64;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA1(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_128;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- <case>
- <brief>
- <value>SHA256 Polling</value>
- </brief>
- <description>
- <value>testing SHA256 in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- One Block Test
- ret = crySHA256(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_3;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA256(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 56 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_56;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 56 byte digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA256(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 64 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_64;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 64 byte digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA256(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 128 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_128;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 128 byte digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
- <case>
- <brief>
- <value>SHA512 Polling</value>
- </brief>
- <description>
- <value>testing SHA512 in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- One Block Test
- ret = crySHA512(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_3;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA512(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 56 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_56;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 56 byte digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA512(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 64 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_64;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 64 byte digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA512(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 128 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_128;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 128 byte digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
- </cases>
- </sequence>
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>SHA</value>
- </brief>
- <description>
- <value>SHA testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_sha.h"
- /* Buffer size for each SHA transfer, size should be multiple of block size
- (block size: 64 for SHA_1/SHA_256/SHA_224, 128 for SHA_384/SHA_512) */
- #define MAX_SHA_BLOCK_SIZE TEST_MSG_DATA_BYTE_LEN
- #define MAX_SHA_BLOCK_SIZE_INWORD (MAX_SHA_BLOCK_SIZE/4)
- #define shabuffer msg_decrypted
- #define MAX_DIGEST_SIZE_INBYTE TEST_MSG_DATA_BYTE_LEN
- #define MAX_DIGEST_SIZE_INWORD (MAX_DIGEST_SIZE_INBYTE/4)
- #define digest msg_encrypted
- static const CRYConfig configSHA_DMA=
- {
- TRANSFER_DMA,
- 0
- };
- static cryerror_t crySHA1(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA1Context shactxp;
-
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- ret = crySHA1Init(cryp,&shactxp);
- ret = crySHA1Update(cryp,&shactxp,size,in);
- ret = crySHA1Final(cryp,&shactxp,out);
- return ret;
- }
- static cryerror_t crySHA256(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA256Context shactxp;
-
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
-
- ret = crySHA256Init(cryp,&shactxp);
- ret = crySHA256Update(cryp,&shactxp,size,in);
- ret = crySHA256Final(cryp,&shactxp,out);
- return ret;
- }
- static cryerror_t crySHA512(CRYDriver *cryp, size_t size,const uint8_t *in, uint8_t *out) {
- cryerror_t ret;
- SHA512Context shactxp;
-
- shactxp.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- shactxp.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- ret = crySHA512Init(cryp,&shactxp);
- ret = crySHA512Update(cryp,&shactxp,size,in);
- ret = crySHA512Final(cryp,&shactxp,out);
- return ret;
- }
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>SHA1 DMA</value>
- </brief>
- <description>
- <value>testing SHA1 in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- Empty Block Test
- ret = crySHA1(&CRYD1,0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
-
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_EMPTY;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- One Block Test
- ret = crySHA1(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_3;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA1(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_56;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA1(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_64;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA1(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha1 failed");
- SHOW_DATA(digest,5);
- ref = (uint32_t*)refSHA_SHA1_128;
- for (int i = 0; i < 5; i++) {
- test_assert(digest[i] == ref[i], "sha1 digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- <case>
- <brief>
- <value>SHA256 DMA</value>
- </brief>
- <description>
- <value>testing SHA256 in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- One Block Test
- ret = crySHA256(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_3;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA256(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 56 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_56;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 56 byte digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA256(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 64 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_64;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 64 byte digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA256(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha256 128 byte failed");
- SHOW_DATA(digest,8);
- ref = (uint32_t*)refSHA_SHA256_128;
- for (int i = 0; i < 8; i++) {
- test_assert(digest[i] == ref[i], "sha256 128 byte digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
- <case>
- <brief>
- <value>SHA512 DMA</value>
- </brief>
- <description>
- <value>testing SHA512 in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memset(digest, 0, MAX_DIGEST_SIZE_INWORD);
- memcpy((char*) msg_clear, sha_msg0, SHA_LEN_0);
- cryStart(&CRYD1, &configSHA_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
-
- <step>
- <description>
- <value>Digest</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- //---- One Block Test
- ret = crySHA512(&CRYD1,SHA_LEN_0,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_3;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 digest mismatch");
- }
- //---- Multi Block Test 56 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg1, SHA_LEN_1);
- ret = crySHA512(&CRYD1,SHA_LEN_1,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 56 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_56;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 56 byte digest mismatch");
- }
- //---- Multi Block Test 64 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg2, SHA_LEN_2);
- ret = crySHA512(&CRYD1,SHA_LEN_2,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 64 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_64;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 64 byte digest mismatch");
- }
- //---- Multi Block Test 128 Byte
- memset(msg_clear, 0, TEST_MSG_DATA_BYTE_LEN);
- memcpy((char*) msg_clear, sha_msg3, SHA_LEN_3);
- ret = crySHA512(&CRYD1,SHA_LEN_3,(uint8_t*)msg_clear,(uint8_t*)digest);
- test_assert(ret == CRY_NOERROR, "sha512 128 byte failed");
- SHOW_DATA(digest,16);
- ref = (uint32_t*)refSHA_SHA512_128;
- for (int i = 0; i < 16; i++) {
- test_assert(digest[i] == ref[i], "sha512 128 byte digest mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
- </cases>
- </sequence>
-
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>GCM</value>
- </brief>
- <description>
- <value>GCM testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_gcm.h"
- #define plaintext msg_clear
- #define cypher msg_encrypted
- #define authtag msg_decrypted
- static const CRYConfig config_Polling=
- {
- TRANSFER_POLLING,
- 0
- };
- static const CRYConfig config_DMA=
- {
- TRANSFER_DMA,
- 0
- };
- struct test_el_t
- {
- uint32_t size;
- const uint8_t * data;
- };
- struct test_gcm_t
- {
- struct test_el_t key;
- struct test_el_t p;
- struct test_el_t iv;
- struct test_el_t aad;
- struct test_el_t c;
- struct test_el_t t;
- };
- #define TEST_GCM_LEN 3
- const struct test_gcm_t test_gcm_k[TEST_GCM_LEN]={
- { {K3_LEN,K3},{P3_LEN,P3},{IV3_LEN,IV3},{AAD3_LEN,A3},{C3_LEN,C3},{T3_LEN,T3} },
- { {K4_LEN,K4},{P4_LEN,P4},{IV4_LEN,IV4},{AAD4_LEN,A4},{C4_LEN,C4},{T4_LEN,T4} },
- { {K5_LEN,K5},{P5_LEN,P5},{IV5_LEN,IV5},{AAD5_LEN,A5},{C5_LEN,C5},{T5_LEN,T5} }
- };
-
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>GCM Polling</value>
- </brief>
- <description>
- <value>testing GCM in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(cypher, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(authtag, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- uint8_t i,len1,len2;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key, encrypt and decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- for (i = 0;i<TEST_GCM_LEN;i++) {
-
- test_print("gcm test : ");
- test_printn(i);
- test_println("");
- /* loading the key .*/
- {
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,test_gcm_k[i].key.size, (uint8_t *) test_gcm_k[i].key.data);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- }
- /* Encrypt.*/
- {
- ret = cryEncryptAES_GCM(&CRYD1,
- 0,
- test_gcm_k[i].p.size,
- test_gcm_k[i].p.data,
- (uint8_t*)cypher,
- test_gcm_k[i].iv.data,
- test_gcm_k[i].aad.size,
- test_gcm_k[i].aad.data,
- (uint8_t*)authtag);
- test_assert(ret == CRY_NOERROR, "failed encryption");
- len1 = test_gcm_k[i].c.size/4;
- len2 = test_gcm_k[i].t.size/4;
- SHOW_DATA(cypher,len1);
- SHOW_DATA(authtag,len2);
- ref = (uint32_t*)test_gcm_k[i].c.data;
- for (uint8_t i = 0; i < len1; i++) {
- test_assert(ref[i] == cypher[i], "c mismatch");
- }
- ref = (uint32_t*)test_gcm_k[i].t.data;
- for (uint8_t i = 0; i < len2; i++) {
- test_assert(ref[i] == authtag[i], "t mismatch");
- }
- }
- /* Decrypt.*/
- {
- memset(plaintext, 0, test_gcm_k[i].p.size);
- ret = cryDecryptAES_GCM(&CRYD1,
- 0,
- test_gcm_k[i].c.size,
- (uint8_t*)cypher,
- (uint8_t*)plaintext,
- test_gcm_k[i].iv.data,
- test_gcm_k[i].aad.size,
- test_gcm_k[i].aad.data,
- (uint8_t*)authtag);
- test_assert(ret == CRY_NOERROR, "failed decryption");
- len1 = test_gcm_k[i].p.size/4;
- SHOW_DATA(plaintext,len1);
- ref = (uint32_t*)test_gcm_k[i].p.data;
- for (uint8_t i = 0; i < len1; i++) {
- test_assert(ref[i] == plaintext[i], "decrypt plain mismatch");
- }
- }
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- <case>
- <brief>
- <value>GCM DMA</value>
- </brief>
- <description>
- <value>testing GCM in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(cypher, 0xff, TEST_MSG_DATA_BYTE_LEN);
- memset(authtag, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- cryerror_t ret;
- uint32_t *ref;
- uint8_t i,len1,len2;
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>loading the key, encrypt and decrypt</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- for (i = 0;i<TEST_GCM_LEN;i++) {
- test_print("gcm test : ");
- test_printn(i);
- test_println("");
- /* loading the key .*/
- {
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_aes,test_gcm_k[i].key.size, (uint8_t *) test_gcm_k[i].key.data);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- }
- /* Encrypt.*/
- {
- ret = cryEncryptAES_GCM(&CRYD1,
- 0,
- test_gcm_k[i].p.size,
- test_gcm_k[i].p.data,
- (uint8_t*)cypher,
- test_gcm_k[i].iv.data,
- test_gcm_k[i].aad.size,
- test_gcm_k[i].aad.data,
- (uint8_t*)authtag);
- test_assert(ret == CRY_NOERROR, "failed encryption");
- len1 = test_gcm_k[i].c.size/4;
- len2 = test_gcm_k[i].t.size/4;
- SHOW_DATA(cypher,len1);
- SHOW_DATA(authtag,len2);
- ref = (uint32_t*)test_gcm_k[i].c.data;
- for (uint8_t i = 0; i < len1; i++) {
- test_assert(ref[i] == cypher[i], "c mismatch");
- }
- ref = (uint32_t*)test_gcm_k[i].t.data;
- for (uint8_t i = 0; i < len2; i++) {
- test_assert(ref[i] == authtag[i], "t mismatch");
- }
- }
- /* Decrypt.*/
- {
- memset(plaintext, 0, test_gcm_k[i].p.size);
- ret = cryDecryptAES_GCM(&CRYD1,
- 0,
- test_gcm_k[i].c.size,
- (uint8_t*)cypher,
- (uint8_t*)plaintext,
- test_gcm_k[i].iv.data,
- test_gcm_k[i].aad.size,
- test_gcm_k[i].aad.data,
- (uint8_t*)authtag);
- test_assert(ret == CRY_NOERROR, "failed decryption");
- len1 = test_gcm_k[i].p.size/4;
- SHOW_DATA(plaintext,len1);
- ref = (uint32_t*)test_gcm_k[i].p.data;
- for (uint8_t i = 0; i < len1; i++) {
- test_assert(ref[i] == plaintext[i], "decrypt plain mismatch");
- }
- }
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- </cases>
- </sequence>
-
- <sequence>
- <type index="0">
- <value>Internal Tests</value>
- </type>
- <brief>
- <value>HMAC</value>
- </brief>
- <description>
- <value>HMAC testing</value>
- </description>
- <condition>
- <value />
- </condition>
- <shared_code>
- <value><![CDATA[
- #include <string.h>
- #include "ref_hmac.h"
- #define plaintext msg_clear
- #define HMACOUT msg_encrypted
- #define shabuffer msg_decrypted
- #define MAX_SHA_BLOCK_SIZE TEST_MSG_DATA_BYTE_LEN
- #define MAX_SHA_BLOCK_SIZE_INWORD (MAX_SHA_BLOCK_SIZE/4)
- static const CRYConfig config_Polling=
- {
- TRANSFER_POLLING,
- 0
- };
- static const CRYConfig config_DMA=
- {
- TRANSFER_DMA,
- 0
- };
- static const int hmackeys_size[]=
- {
- 20,
- 4,
- 20
- };
- static const uint8_t hmackey_1[]=
- {
- 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,
- 0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,0x0B,
- };
- // "Hi There",
- static const uint8_t hmacmsg1[8]= "Hi There";
- static const size_t hmacmsg_size[]=
- {
- 8,
- };
- static void cryHMAC256(CRYDriver *cryp) {
- cryerror_t ret;
- HMACSHA256Context hmacshactxp;
- uint8_t *keyp;
- hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- keyp =(uint8_t *)hmackey_1;
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ret = cryHMACSHA256Init(cryp,&hmacshactxp);
-
- test_assert(ret == CRY_NOERROR, "failed init HMACSHA256");
- ret = cryHMACSHA256Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1);
-
- test_assert(ret == CRY_NOERROR, "failed update HMACSHA256");
- ret = cryHMACSHA256Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT);
-
- test_assert(ret == CRY_NOERROR, "failed final HMACSHA256");
- SHOW_DATA(HMACOUT,8);
- }
- static void cryHMAC512(CRYDriver *cryp) {
- cryerror_t ret;
- HMACSHA512Context hmacshactxp;
- uint8_t *keyp;
- hmacshactxp.shacontext.sha.sha_buffer = (uint8_t*)&shabuffer[0];
- hmacshactxp.shacontext.sha.sha_buffer_size = MAX_SHA_BLOCK_SIZE;
- keyp =(uint8_t *)hmackey_1;
- ret = cryLoadTransientKey(&CRYD1, (cryalgorithm_t) cry_algo_hmac,hmackeys_size[0], keyp);
- test_assert(ret == CRY_NOERROR, "failed load transient key");
- ret = cryHMACSHA512Init(cryp,&hmacshactxp);
-
- test_assert(ret == CRY_NOERROR, "failed init HMACSHA512");
- ret = cryHMACSHA512Update(cryp,&hmacshactxp,hmacmsg_size[0],(const uint8_t *)&hmacmsg1);
-
- test_assert(ret == CRY_NOERROR, "failed update HMACSHA512");
- ret = cryHMACSHA512Final(cryp,&hmacshactxp,(uint8_t *)HMACOUT);
-
- test_assert(ret == CRY_NOERROR, "failed final HMACSHA512");
- SHOW_DATA(HMACOUT,16);
- }
- ]]></value>
- </shared_code>
- <cases>
- <case>
- <brief>
- <value>HMAC Polling</value>
- </brief>
- <description>
- <value>testing HMAC in polled mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_Polling);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>hmac 256</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- cryHMAC256(&CRYD1);
- for (int i = 0; i < 8; i++) {
- test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch");
- }
- ]]></value>
- </code>
- </step>
- <step>
- <description>
- <value>hmac 512</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- cryHMAC512(&CRYD1);
- for (int i = 0; i < 16; i++) {
- test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
- </steps>
- </case>
-
- <case>
- <brief>
- <value>HMAC DMA</value>
- </brief>
- <description>
- <value>testing HMAC in DMA mode</value>
- </description>
- <condition>
- <value />
- </condition>
- <various_code>
- <setup_code>
- <value><![CDATA[
- memset(HMACOUT, 0xff, TEST_MSG_DATA_BYTE_LEN);
- cryStart(&CRYD1, &config_DMA);
- ]]></value>
- </setup_code>
- <teardown_code>
- <value><![CDATA[cryStop(&CRYD1);]]></value>
- </teardown_code>
- <local_variables>
- <value><![CDATA[
- ]]></value>
- </local_variables>
- </various_code>
- <steps>
- <step>
- <description>
- <value>hmac 256</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- cryHMAC256(&CRYD1);
- for (int i = 0; i < 8; i++) {
- test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC256_1)[i], "hmac mismatch");
- }
- ]]></value>
- </code>
- </step>
-
- <step>
- <description>
- <value>hmac 512</value>
- </description>
- <tags>
- <value />
- </tags>
- <code>
- <value><![CDATA[
- cryHMAC512(&CRYD1);
- for (int i = 0; i < 16; i++) {
- test_assert(HMACOUT[i] == ((uint32_t*) refHMAC_HMAC512_1)[i], "hmac mismatch");
- }
- ]]></value>
- </code>
- </step>
-
-
-
-
- </steps>
- </case>
-
- </cases>
- </sequence>
- </sequences>
- </instance>
- </instances>
- <exportedFeatures />
- </application>
- </SPC5-Config>
|