mirror of
https://github.com/bluekitchen/btstack.git
synced 2025-04-02 16:20:31 +00:00
test/sm: re-implemented aes_cmac using software AES
This commit is contained in:
parent
4f4918761b
commit
94d1976d90
2
test/security_manager/.gitignore
vendored
2
test/security_manager/.gitignore
vendored
@ -1,3 +1,5 @@
|
|||||||
destest
|
destest
|
||||||
security_manager
|
security_manager
|
||||||
aestest
|
aestest
|
||||||
|
aes_cmac_test
|
||||||
|
ectest
|
||||||
|
@ -4,13 +4,16 @@ CC = g++
|
|||||||
|
|
||||||
BTSTACK_ROOT = ../..
|
BTSTACK_ROOT = ../..
|
||||||
|
|
||||||
CFLAGS = -DUNIT_TEST -x c++ -g -Wall -Wno-unused
|
CFLAGS = -DUNIT_TEST -g
|
||||||
|
CPPFLAGS = -x c++ -Wall -Wno-unused
|
||||||
CFLAGS += -I. -I.. -I${BTSTACK_ROOT}/src -I${BTSTACK_ROOT}/ble -I${BTSTACK_ROOT}/platform/posix
|
CFLAGS += -I. -I.. -I${BTSTACK_ROOT}/src -I${BTSTACK_ROOT}/ble -I${BTSTACK_ROOT}/platform/posix
|
||||||
|
CFLAGS += -I${BTSTACK_ROOT}/3rd-party/mbedtls/include
|
||||||
LDFLAGS += -lCppUTest -lCppUTestExt
|
LDFLAGS += -lCppUTest -lCppUTestExt
|
||||||
|
|
||||||
VPATH += ${BTSTACK_ROOT}/src
|
VPATH += ${BTSTACK_ROOT}/src
|
||||||
VPATH += ${BTSTACK_ROOT}/src/ble
|
VPATH += ${BTSTACK_ROOT}/src/ble
|
||||||
VPATH += ${BTSTACK_ROOT}/platform/posix
|
VPATH += ${BTSTACK_ROOT}/platform/posix
|
||||||
|
VPATH += ${BTSTACK_ROOT}/3rd-party/mbedtls/library
|
||||||
|
|
||||||
COMMON = \
|
COMMON = \
|
||||||
btstack_linked_list.c \
|
btstack_linked_list.c \
|
||||||
@ -28,14 +31,45 @@ COMMON = \
|
|||||||
|
|
||||||
COMMON_OBJ = $(COMMON:.c=.o)
|
COMMON_OBJ = $(COMMON:.c=.o)
|
||||||
|
|
||||||
all: security_manager aestest
|
MBEDTLS = \
|
||||||
|
aes.c \
|
||||||
|
aesni.c \
|
||||||
|
asn1parse.c \
|
||||||
|
asn1write.c \
|
||||||
|
base64.c \
|
||||||
|
bignum.c \
|
||||||
|
ctr_drbg.c \
|
||||||
|
ecp.c \
|
||||||
|
ecp_curves.c \
|
||||||
|
entropy.c \
|
||||||
|
entropy_poll.c \
|
||||||
|
error.c \
|
||||||
|
md.c \
|
||||||
|
md5.c \
|
||||||
|
md_wrap.c \
|
||||||
|
oid.c \
|
||||||
|
pem.c \
|
||||||
|
pk.c \
|
||||||
|
pk_wrap.c \
|
||||||
|
pkwrite.c \
|
||||||
|
sha256.c \
|
||||||
|
sha512.c \
|
||||||
|
timing.c \
|
||||||
|
|
||||||
|
all: security_manager aestest ectest aes_cmac_test
|
||||||
|
|
||||||
security_manager: ${CORE_OBJ} ${COMMON_OBJ} security_manager.c
|
security_manager: ${CORE_OBJ} ${COMMON_OBJ} security_manager.c
|
||||||
${CC} ${CORE_OBJ} ${COMMON_OBJ} security_manager.c ${CFLAGS} ${LDFLAGS} -o $@
|
${CC} ${CORE_OBJ} ${COMMON_OBJ} security_manager.c ${CFLAGS} ${CPPFLAGS} ${LDFLAGS} -o $@
|
||||||
|
|
||||||
aestest: aestest.c rijndael.c
|
aestest: aestest.c rijndael.c
|
||||||
${CC} ${CFLAGS} rijndael.c aestest.c -o $@
|
${CC} ${CFLAGS} rijndael.c aestest.c -o $@
|
||||||
|
|
||||||
|
ectest: ectest.c ${MBEDTLS} rijndael.c
|
||||||
|
gcc ${CFLAGS} $^ -o $@
|
||||||
|
|
||||||
|
aes_cmac_test: aes_cmac_test.c ${MBEDTLS} rijndael.c
|
||||||
|
gcc ${CFLAGS} $^ -o $@
|
||||||
|
|
||||||
test: all
|
test: all
|
||||||
./security_manager
|
./security_manager
|
||||||
./aestest
|
./aestest
|
||||||
|
189
test/security_manager/aes_cmac_test.c
Normal file
189
test/security_manager/aes_cmac_test.c
Normal file
@ -0,0 +1,189 @@
|
|||||||
|
|
||||||
|
#include "rijndael.h"
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
typedef uint8_t sm_key_t[16];
|
||||||
|
|
||||||
|
static const char * key_string = "2b7e1516 28aed2a6 abf71588 09cf4f3c";
|
||||||
|
static const char * k0_string = "7df76b0c 1ab899b3 3e42f047 b91b546f";
|
||||||
|
static const char * k1_string = "fbeed618 35713366 7c85e08f 7236a8de";
|
||||||
|
static const char * k2_string = "f7ddac30 6ae266cc f90bc11e e46d513b";
|
||||||
|
|
||||||
|
static const char * m0_string = "";
|
||||||
|
static const char * cmac_m0_string = "bb1d6929 e9593728 7fa37d12 9b756746";
|
||||||
|
|
||||||
|
static const char * m16_string = "6bc1bee2 2e409f96 e93d7e11 7393172a";
|
||||||
|
static const char * cmac_m16_string = "070a16b4 6b4d4144 f79bdd9d d04a287c";
|
||||||
|
|
||||||
|
static const char * m40_string = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411";
|
||||||
|
static const char * cmac_m40_string = "dfa66747 de9ae630 30ca3261 1497c827";
|
||||||
|
|
||||||
|
static const char * m64_string = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411 e5fbc119 1a0a52ef f69f2445 df4f9b17 ad2b417b e66c3710";
|
||||||
|
static const char * cmac_m64_string = "51f0bebf 7e3b9d92 fc497417 79363cfe";
|
||||||
|
|
||||||
|
|
||||||
|
static int nibble_for_char(char c){
|
||||||
|
if (c >= '0' && c <= '9') return c - '0';
|
||||||
|
if (c >= 'a' && c <= 'f') return c - 'a' + 10;
|
||||||
|
if (c >= 'A' && c <= 'F') return c - 'F' + 10;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int parse_hex(uint8_t * buffer, const char * hex_string){
|
||||||
|
int len = 0;
|
||||||
|
while (*hex_string){
|
||||||
|
if (*hex_string == ' '){
|
||||||
|
hex_string++;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
int high_nibble = nibble_for_char(*hex_string++);
|
||||||
|
int low_nibble = nibble_for_char(*hex_string++);
|
||||||
|
*buffer++ = (high_nibble << 4) | low_nibble;
|
||||||
|
len++;
|
||||||
|
}
|
||||||
|
return len;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void sm_shift_left_by_one_bit_inplace(int len, uint8_t * data){
|
||||||
|
int i;
|
||||||
|
int carry = 0;
|
||||||
|
for (i=len-1; i >= 0 ; i--){
|
||||||
|
int new_carry = data[i] >> 7;
|
||||||
|
data[i] = data[i] << 1 | carry;
|
||||||
|
carry = new_carry;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void aes128_calc_cyphertext(uint8_t key[16], uint8_t plaintext[16], uint8_t cyphertext[16]){
|
||||||
|
uint32_t rk[RKLENGTH(KEYBITS)];
|
||||||
|
int nrounds = rijndaelSetupEncrypt(rk, &key[0], KEYBITS);
|
||||||
|
rijndaelEncrypt(rk, nrounds, plaintext, cyphertext);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void hexdump2(void *data, int size){
|
||||||
|
if (size <= 0) return;
|
||||||
|
int i;
|
||||||
|
for (i=0; i<size;i++){
|
||||||
|
printf("%02X ", ((uint8_t *)data)[i]);
|
||||||
|
}
|
||||||
|
printf("\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void calc_subkeys(sm_key_t k0, sm_key_t k1, sm_key_t k2){
|
||||||
|
memcpy(k1, k0, 16);
|
||||||
|
sm_shift_left_by_one_bit_inplace(16, k1);
|
||||||
|
if (k0[0] & 0x80){
|
||||||
|
k1[15] ^= 0x87;
|
||||||
|
}
|
||||||
|
memcpy(k2, k1, 16);
|
||||||
|
sm_shift_left_by_one_bit_inplace(16, k2);
|
||||||
|
if (k1[0] & 0x80){
|
||||||
|
k2[15] ^= 0x87;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#define LOG_KEY(NAME) { printf("%16s: ", #NAME); hexdump2(NAME, 16); }
|
||||||
|
#define PARSE_KEY(NAME) { parse_hex(NAME, NAME##_string); LOG_KEY(NAME); }
|
||||||
|
#define VALIDATE_KEY(NAME) { LOG_KEY(NAME); sm_key_t test; parse_hex(test, NAME##_string); if (memcmp(NAME, test, 16)){ printf("Error calculating key\n"); } }
|
||||||
|
#define VALIDATE_MESSAGE(NAME) validate_message(#NAME, NAME##_string, cmac_##NAME##_string)
|
||||||
|
|
||||||
|
static void aes_cmac(sm_key_t aes_cmac, uint8_t * data, int sm_cmac_message_len){
|
||||||
|
sm_key_t key, k0, k1, k2, zero;
|
||||||
|
memset(zero, 0, 16);
|
||||||
|
parse_hex(key, key_string);
|
||||||
|
|
||||||
|
aes128_calc_cyphertext(key, zero, k0);
|
||||||
|
calc_subkeys(k0, k1, k2);
|
||||||
|
|
||||||
|
int sm_cmac_block_count = (sm_cmac_message_len + 15) / 16;
|
||||||
|
|
||||||
|
// step 3: ..
|
||||||
|
if (sm_cmac_block_count==0){
|
||||||
|
sm_cmac_block_count = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
// step 4: set m_last
|
||||||
|
sm_key_t sm_cmac_m_last;
|
||||||
|
int sm_cmac_last_block_complete = sm_cmac_message_len != 0 && (sm_cmac_message_len & 0x0f) == 0;
|
||||||
|
int i;
|
||||||
|
if (sm_cmac_last_block_complete){
|
||||||
|
for (i=0;i<16;i++){
|
||||||
|
sm_cmac_m_last[i] = data[sm_cmac_message_len - 16 + i] ^ k1[i];
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
int valid_octets_in_last_block = sm_cmac_message_len & 0x0f;
|
||||||
|
for (i=0;i<16;i++){
|
||||||
|
if (i < valid_octets_in_last_block){
|
||||||
|
sm_cmac_m_last[i] = data[(sm_cmac_message_len & 0xfff0) + i] ^ k2[i];
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
if (i == valid_octets_in_last_block){
|
||||||
|
sm_cmac_m_last[i] = 0x80 ^ k2[i];
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
sm_cmac_m_last[i] = k2[i];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// printf("sm_cmac_start: len %u, block count %u\n", sm_cmac_message_len, sm_cmac_block_count);
|
||||||
|
// LOG_KEY(sm_cmac_m_last);
|
||||||
|
|
||||||
|
// Step 5
|
||||||
|
sm_key_t sm_cmac_x;
|
||||||
|
memset(sm_cmac_x, 0, 16);
|
||||||
|
|
||||||
|
// Step 6
|
||||||
|
sm_key_t sm_cmac_y;
|
||||||
|
for (int block = 0 ; block < sm_cmac_block_count-1 ; block++){
|
||||||
|
for (i=0;i<16;i++){
|
||||||
|
sm_cmac_y[i] = sm_cmac_x[i] ^ data[block * 16 + i];
|
||||||
|
}
|
||||||
|
aes128_calc_cyphertext(key, sm_cmac_y, sm_cmac_x);
|
||||||
|
}
|
||||||
|
for (i=0;i<16;i++){
|
||||||
|
sm_cmac_y[i] = sm_cmac_x[i] ^ sm_cmac_m_last[i];
|
||||||
|
}
|
||||||
|
|
||||||
|
// Step 7
|
||||||
|
aes128_calc_cyphertext(key, sm_cmac_y, aes_cmac);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void validate_message(const char * name, const char * message_string, const char * cmac_string){
|
||||||
|
|
||||||
|
uint8_t m[128];
|
||||||
|
int len = parse_hex(m, message_string);
|
||||||
|
|
||||||
|
sm_key_t cmac;
|
||||||
|
parse_hex(cmac, cmac_string);
|
||||||
|
|
||||||
|
printf("-- verify message %s, len %u:\nm: %s\ncmac: %s\n", name, len, message_string, cmac_string);
|
||||||
|
|
||||||
|
sm_key_t cmac_test;
|
||||||
|
aes_cmac(cmac_test, m, len);
|
||||||
|
|
||||||
|
LOG_KEY(cmac_test);
|
||||||
|
|
||||||
|
if (memcmp(cmac_test, cmac, 16)){
|
||||||
|
printf("CMAC incorrect!\n");
|
||||||
|
} else {
|
||||||
|
printf("CMAC correct!\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
sm_key_t key, k0, k1, k2, zero;
|
||||||
|
memset(zero, 0, 16);
|
||||||
|
PARSE_KEY(key);
|
||||||
|
|
||||||
|
aes128_calc_cyphertext(key, zero, k0);
|
||||||
|
VALIDATE_KEY(k0);
|
||||||
|
calc_subkeys(k0, k1, k2);
|
||||||
|
VALIDATE_KEY(k1);
|
||||||
|
VALIDATE_KEY(k2);
|
||||||
|
|
||||||
|
VALIDATE_MESSAGE(m0);
|
||||||
|
VALIDATE_MESSAGE(m16);
|
||||||
|
VALIDATE_MESSAGE(m40);
|
||||||
|
VALIDATE_MESSAGE(m64);
|
||||||
|
}
|
6
test/security_manager/ectest.c
Normal file
6
test/security_manager/ectest.c
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user