/* test_ccm_mode.c - TinyCrypt AES-CCM tests (RFC 3610 tests) */ /* * Copyright (C) 2015 by Intel Corporation, All Rights Reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * - Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * - Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * - Neither the name of Intel Corporation nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. */ /* * DESCRIPTION * This module tests the following AES-CCM Mode routines: * * Scenarios tested include: * - AES128 CCM mode encryption RFC 3610 test vector #1 * - AES128 CCM mode encryption RFC 3610 test vector #2 * - AES128 CCM mode encryption RFC 3610 test vector #3 * - AES128 CCM mode encryption RFC 3610 test vector #7 * - AES128 CCM mode encryption RFC 3610 test vector #8 * - AES128 CCM mode encryption RFC 3610 test vector #9 * - AES128 CCM mode encryption No associated data * - AES128 CCM mode encryption No payload data */ #include #include #include #include #include #define CIPHERTEXT_LEN 50 #define DECRYPTED_LEN 25 #define NUM_NIST_KEYS 16 #define NONCE_LEN 13 #define HEADER_LEN 8 #define M_LEN8 8 #define M_LEN10 10 #define DATA_BUF_LEN23 23 #define DATA_BUF_LEN24 24 #define DATA_BUF_LEN25 25 #define EXPECTED_BUF_LEN31 31 #define EXPECTED_BUF_LEN32 32 #define EXPECTED_BUF_LEN33 33 #define EXPECTED_BUF_LEN34 34 #define EXPECTED_BUF_LEN35 35 uint32_t do_test(const uint8_t *key, uint8_t *nonce, size_t nlen, const uint8_t *hdr, size_t hlen, const uint8_t *data, size_t dlen, const uint8_t *expected, size_t elen, const int mlen) { uint32_t result = TC_PASS; uint8_t ciphertext[CIPHERTEXT_LEN]; uint8_t decrypted[DECRYPTED_LEN]; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; tc_aes128_set_encrypt_key(&sched, key); result = tc_ccm_config(&c, &sched, nonce, nlen, mlen); /**TESTPOINT: Check CCM config*/ zassert_true(result, "CCM config failed"); result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), hdr, hlen, data, dlen, &c); /**TESTPOINT: Check CCM encrypt*/ zassert_true(result, "ccm_encrypt failed"); /**TESTPOINT: Verify ciphertext*/ if (memcmp(expected, ciphertext, elen) != 0) { show_str("\t\tExpected", expected, elen); show_str("\t\tComputed", ciphertext, elen); /**ASSERTION: Signal wrong output and assert*/ zassert_true(0, "ccm_encrypt produced wrong ciphertext"); } result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), hdr, hlen, ciphertext, dlen + mlen, &c); /**TESTPOINT: Check decryption*/ if (result == 0U) { show_str("\t\tExpected", data, dlen); show_str("\t\tComputed", decrypted, sizeof(decrypted)); /**ASSERTION: Decrypt failed, so exit by assert*/ zassert_true(0, "ccm_decrypt failed"); } result = TC_PASS; return result; } ZTEST(tinycrypt, test_ccm_vector_1) { uint32_t result = TC_PASS; /* RFC 3610 test vector #1 */ const uint8_t key[NUM_NIST_KEYS] = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x03, 0x02, 0x01, 0x00, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN23] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e }; const uint8_t expected[EXPECTED_BUF_LEN31] = { 0x58, 0x8c, 0x97, 0x9a, 0x61, 0xc6, 0x63, 0xd2, 0xf0, 0x66, 0xd0, 0xc2, 0xc0, 0xf9, 0x89, 0x80, 0x6d, 0x5f, 0x6b, 0x61, 0xda, 0xc3, 0x84, 0x17, 0xe8, 0xd1, 0x2c, 0xfd, 0xf9, 0x26, 0xe0 }; uint16_t mlen = M_LEN8; TC_PRINT("%s: Performing CCM test #1 (RFC 3610 test vector #1):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #1 (RFC 3610 test vector #1) failed."); } ZTEST(tinycrypt, test_ccm_vector_2) { uint32_t result = TC_PASS; /* RFC 3610 test vector #2 */ const uint8_t key[NUM_NIST_KEYS] = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x04, 0x03, 0x02, 0x01, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN24] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; const uint8_t expected[EXPECTED_BUF_LEN32] = { 0x72, 0xc9, 0x1a, 0x36, 0xe1, 0x35, 0xf8, 0xcf, 0x29, 0x1c, 0xa8, 0x94, 0x08, 0x5c, 0x87, 0xe3, 0xcc, 0x15, 0xc4, 0x39, 0xc9, 0xe4, 0x3a, 0x3b, 0xa0, 0x91, 0xd5, 0x6e, 0x10, 0x40, 0x09, 0x16 }; uint16_t mlen = M_LEN8; TC_PRINT("%s: Performing CCM test #2 (RFC 3610 test vector #2):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #2 failed."); } ZTEST(tinycrypt, test_ccm_vector_3) { uint32_t result = TC_PASS; /* RFC 3610 test vector #3 */ const uint8_t key[NUM_NIST_KEYS] = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x05, 0x04, 0x03, 0x02, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN25] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }; const uint8_t expected[EXPECTED_BUF_LEN33] = { 0x51, 0xb1, 0xe5, 0xf4, 0x4a, 0x19, 0x7d, 0x1d, 0xa4, 0x6b, 0x0f, 0x8e, 0x2d, 0x28, 0x2a, 0xe8, 0x71, 0xe8, 0x38, 0xbb, 0x64, 0xda, 0x85, 0x96, 0x57, 0x4a, 0xda, 0xa7, 0x6f, 0xbd, 0x9f, 0xb0, 0xc5 }; uint16_t mlen = M_LEN8; TC_PRINT("%s: Performing CCM test #3 (RFC 3610 test vector #3):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #3 failed."); } ZTEST(tinycrypt, test_ccm_vector_4) { uint32_t result = TC_PASS; /* RFC 3610 test vector #7 */ const uint8_t key[NUM_NIST_KEYS] = { 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7, 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x09, 0x08, 0x07, 0x06, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN23] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e }; const uint8_t expected[EXPECTED_BUF_LEN33] = { 0x01, 0x35, 0xD1, 0xB2, 0xC9, 0x5F, 0x41, 0xD5, 0xD1, 0xD4, 0xFE, 0xC1, 0x85, 0xD1, 0x66, 0xB8, 0x09, 0x4E, 0x99, 0x9D, 0xFE, 0xD9, 0x6C, 0x04, 0x8C, 0x56, 0x60, 0x2C, 0x97, 0xAC, 0xBB, 0x74, 0x90 }; uint16_t mlen = M_LEN10; TC_PRINT("%s: Performing CCM test #4 (RFC 3610 test vector #7):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #4 failed."); } ZTEST(tinycrypt, test_ccm_vector_5) { uint32_t result = TC_PASS; /* RFC 3610 test vector #8 */ const uint8_t key[NUM_NIST_KEYS] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x0A, 0x09, 0x08, 0x07, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN24] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f }; const uint8_t expected[EXPECTED_BUF_LEN34] = { 0x7B, 0x75, 0x39, 0x9A, 0xC0, 0x83, 0x1D, 0xD2, 0xF0, 0xBB, 0xD7, 0x58, 0x79, 0xA2, 0xFD, 0x8F, 0x6C, 0xAE, 0x6B, 0x6C, 0xD9, 0xB7, 0xDB, 0x24, 0xC1, 0x7B, 0x44, 0x33, 0xF4, 0x34, 0x96, 0x3F, 0x34, 0xB4 }; uint16_t mlen = M_LEN10; TC_PRINT("%s: Performing CCM test #5 (RFC 3610 test vector #8):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #5 failed."); } ZTEST(tinycrypt, test_ccm_vector_6) { uint32_t result = TC_PASS; /* RFC 3610 test vector #9 */ const uint8_t key[NUM_NIST_KEYS] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; const uint8_t hdr[HEADER_LEN] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; const uint8_t data[DATA_BUF_LEN25] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }; const uint8_t expected[EXPECTED_BUF_LEN35] = { 0x82, 0x53, 0x1a, 0x60, 0xCC, 0x24, 0x94, 0x5a, 0x4b, 0x82, 0x79, 0x18, 0x1a, 0xb5, 0xc8, 0x4d, 0xf2, 0x1c, 0xe7, 0xf9, 0xb7, 0x3f, 0x42, 0xe1, 0x97, 0xea, 0x9c, 0x07, 0xe5, 0x6b, 0x5e, 0xb1, 0x7e, 0x5f, 0x4e }; uint16_t mlen = M_LEN10; TC_PRINT("%s: Performing CCM test #6 (RFC 3610 test vector #9):\n", __func__); result = do_test(key, nonce, sizeof(nonce), hdr, sizeof(hdr), data, sizeof(data), expected, sizeof(expected), mlen); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #6 failed."); } ZTEST(tinycrypt, test_ccm_vector_7) { uint32_t result = TC_PASS; /* Test based on RFC 3610 test vector #9 but with no associated data */ const uint8_t key[NUM_NIST_KEYS] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; uint8_t *hdr = NULL; uint8_t data[DATA_BUF_LEN25] = { 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20 }; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; uint8_t decrypted[DECRYPTED_LEN]; uint8_t ciphertext[CIPHERTEXT_LEN]; uint16_t mlen = M_LEN10; TC_PRINT("%s: Performing CCM test #7 (no associated data):\n", __func__); tc_aes128_set_encrypt_key(&sched, key); /**TESTPOINT: Check CCM configuration*/ zassert_true(tc_ccm_config(&c, &sched, nonce, sizeof(nonce), mlen), "ccm_config failed"); result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), hdr, 0, data, sizeof(data), &c); /**TESTPOINT: Check CCM encryption*/ zassert_true(result, "ccm_encryption failed"); result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), hdr, 0, ciphertext, sizeof(data) + mlen, &c); if (result == 0U) { TC_ERROR("ccm_decrypt failed in %s.\n", __func__); show_str("\t\tExpected", data, sizeof(data)); show_str("\t\tComputed", decrypted, sizeof(decrypted)); /**TESTPOINT: Check CCM decryption, and assert*/ zassert_true(result, "ccm_decryption failed"); } result = TC_PASS; /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #7 failed."); } ZTEST(tinycrypt, test_ccm_vector_8) { uint32_t result = TC_PASS; /* Test based on RFC 3610 test vector #9 but with no payload data */ const uint8_t key[NUM_NIST_KEYS] = { 0xC0, 0xC1, 0xC2, 0xC3, 0xC4, 0xC5, 0xC6, 0xC7, 0xC8, 0xC9, 0xCA, 0xCB, 0xCC, 0xCD, 0xCE, 0xCF }; uint8_t nonce[NONCE_LEN] = { 0x00, 0x00, 0x00, 0x0B, 0x0A, 0x09, 0x08, 0xA0, 0xA1, 0xA2, 0xA3, 0xA4, 0xA5 }; const uint8_t hdr[8] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07 }; uint8_t data[] = {}; struct tc_ccm_mode_struct c; struct tc_aes_key_sched_struct sched; uint8_t decrypted[DECRYPTED_LEN]; uint8_t ciphertext[CIPHERTEXT_LEN]; uint16_t mlen = M_LEN10; TC_PRINT("%s: Performing CCM test #8 (no payload data):\n", __func__); tc_aes128_set_encrypt_key(&sched, key); /**TESTPOINT: Check CCM configuration*/ zassert_true(tc_ccm_config(&c, &sched, nonce, sizeof(nonce), mlen), "CCM config failed"); result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), hdr, sizeof(hdr), data, sizeof(data), &c); /**TESTPOINT: Check CCM encryption*/ zassert_true(result, "ccm_encrypt failed"); result = tc_ccm_decryption_verification(decrypted, sizeof(decrypted), hdr, sizeof(hdr), ciphertext, mlen, &c); /**TESTPOINT: Check CCM decryption*/ if (result == 0U) { show_str("\t\tExpected", data, sizeof(data)); show_str("\t\tComputed", decrypted, sizeof(decrypted)); /**ASSERTION: Decrypt failed, so exit by assert*/ zassert_true(0, "ccm_decrypt failed"); } result = TC_PASS; TC_END_RESULT(result); /**TESTPOINT: Check result*/ zassert_false(result, "CCM test #8 (no payload data) failed."); }