]> git.dujemihanovic.xyz Git - u-boot.git/commitdiff
aes: add test unit for aes128
authorPhilippe Reynes <philippe.reynes@softathome.com>
Mon, 6 Jan 2020 14:22:36 +0000 (15:22 +0100)
committerTom Rini <trini@konsulko.com>
Fri, 17 Jan 2020 15:15:49 +0000 (10:15 -0500)
This commit add test unit for aes128.

Signed-off-by: Philippe Reynes <philippe.reynes@softathome.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
test/lib/Makefile
test/lib/test_aes.c [new file with mode: 0644]

index 72d2ec74b5f43d40dafc6b4b8a8cdc3a90a19393..230068d5a0019b806d5da0fc4528bc0c0570ae24 100644 (file)
@@ -8,3 +8,4 @@ obj-y += lmb.o
 obj-y += string.o
 obj-$(CONFIG_ERRNO_STR) += test_errno_str.o
 obj-$(CONFIG_UT_LIB_ASN1) += asn1.o
+obj-$(CONFIG_AES) += test_aes.o
diff --git a/test/lib/test_aes.c b/test/lib/test_aes.c
new file mode 100644 (file)
index 0000000..2b0e894
--- /dev/null
@@ -0,0 +1,162 @@
+// SPDX-License-Identifier: GPL-2.0+
+/*
+ * Copyright (c) 2019 Philippe Reynes <philippe.reynes@softathome.com>
+ *
+ * Unit tests for aes functions
+ */
+
+#include <common.h>
+#include <command.h>
+#include <hexdump.h>
+#include <uboot_aes.h>
+#include <test/lib.h>
+#include <test/test.h>
+#include <test/ut.h>
+
+#define TEST_AES_ONE_BLOCK             0
+#define TEST_AES_CBC_CHAIN             1
+
+struct test_aes_s {
+       int key_len;
+       int key_exp_len;
+       int type;
+       int num_block;
+};
+
+static struct test_aes_s test_aes[] = {
+       { AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
+       { AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
+};
+
+static void rand_buf(u8 *buf, int size)
+{
+       int i;
+
+       for (i = 0; i < size; i++)
+               buf[i] = rand() & 0xff;
+}
+
+static int lib_test_aes_one_block(struct unit_test_state *uts, int key_len,
+                                 u8 *key_exp, u8 *iv, int num_block,
+                                 u8 *nocipher, u8 *ciphered, u8 *uncipher)
+{
+       aes_encrypt(key_len, nocipher, key_exp, ciphered);
+       aes_decrypt(key_len, ciphered, key_exp, uncipher);
+
+       ut_asserteq_mem(nocipher, uncipher, AES_BLOCK_LENGTH);
+
+       /* corrupt the expanded key */
+       key_exp[0]++;
+       aes_decrypt(key_len, ciphered, key_exp, uncipher);
+       ut_assertf(memcmp(nocipher, uncipher, AES_BLOCK_LENGTH),
+                  "nocipher and uncipher should be different\n");
+
+       return 0;
+}
+
+static int lib_test_aes_cbc_chain(struct unit_test_state *uts, int key_len,
+                                 u8 *key_exp, u8 *iv, int num_block,
+                                 u8 *nocipher, u8 *ciphered, u8 *uncipher)
+{
+       aes_cbc_encrypt_blocks(key_len, key_exp, iv,
+                              nocipher, ciphered, num_block);
+       aes_cbc_decrypt_blocks(key_len, key_exp, iv,
+                              ciphered, uncipher, num_block);
+
+       ut_asserteq_mem(nocipher, uncipher, num_block * AES_BLOCK_LENGTH);
+
+       /* corrupt the expanded key */
+       key_exp[0]++;
+       aes_cbc_decrypt_blocks(key_len, key_exp, iv,
+                              ciphered, uncipher, num_block);
+       ut_assertf(memcmp(nocipher, uncipher, num_block * AES_BLOCK_LENGTH),
+                  "nocipher and uncipher should be different\n");
+
+       return 0;
+}
+
+static int _lib_test_aes_run(struct unit_test_state *uts, int key_len,
+                            int key_exp_len, int type, int num_block)
+{
+       u8 *key, *key_exp, *iv;
+       u8 *nocipher, *ciphered, *uncipher;
+       int ret;
+
+       /* Allocate all the buffer */
+       key = malloc(key_len);
+       ut_assertnonnull(key);
+       key_exp = malloc(key_exp_len);
+       ut_assertnonnull(key_exp);
+       iv = malloc(AES_BLOCK_LENGTH);
+       ut_assertnonnull(iv);
+       nocipher = malloc(num_block * AES_BLOCK_LENGTH);
+       ut_assertnonnull(nocipher);
+       ciphered = malloc((num_block + 1) * AES_BLOCK_LENGTH);
+       ut_assertnonnull(ciphered);
+       uncipher = malloc((num_block + 1) * AES_BLOCK_LENGTH);
+       ut_assertnonnull(uncipher);
+
+       /* Initialize all buffer */
+       rand_buf(key, key_len);
+       rand_buf(iv, AES_BLOCK_LENGTH);
+       rand_buf(nocipher, num_block * AES_BLOCK_LENGTH);
+       memset(ciphered, 0, (num_block + 1) * AES_BLOCK_LENGTH);
+       memset(uncipher, 0, (num_block + 1) * AES_BLOCK_LENGTH);
+
+       /* Expand the key */
+       aes_expand_key(key, key_len, key_exp);
+
+       /* Encrypt and decrypt */
+       switch (type) {
+       case TEST_AES_ONE_BLOCK:
+               ret = lib_test_aes_one_block(uts, key_len, key_exp, iv,
+                                            num_block, nocipher,
+                                            ciphered, uncipher);
+               break;
+       case TEST_AES_CBC_CHAIN:
+               ret = lib_test_aes_cbc_chain(uts, key_len, key_exp, iv,
+                                            num_block, nocipher,
+                                            ciphered, uncipher);
+               break;
+       default:
+               printf("%s: unknown type (type=%d)\n", __func__, type);
+               ret = -1;
+       };
+
+       /* Free all the data */
+       free(key);
+       free(key_exp);
+       free(iv);
+       free(nocipher);
+       free(ciphered);
+       free(uncipher);
+
+       return ret;
+}
+
+static int lib_test_aes_run(struct unit_test_state *uts,
+                           struct test_aes_s *test)
+{
+       int key_len = test->key_len;
+       int key_exp_len = test->key_exp_len;
+       int type = test->type;
+       int num_block = test->num_block;
+
+       return _lib_test_aes_run(uts, key_len, key_exp_len,
+                                type, num_block);
+}
+
+static int lib_test_aes(struct unit_test_state *uts)
+{
+       int i, ret = 0;
+
+       for (i = 0; i < ARRAY_SIZE(test_aes); i++) {
+               ret = lib_test_aes_run(uts, &test_aes[i]);
+               if (ret)
+                       break;
+       }
+
+       return ret;
+}
+
+LIB_TEST(lib_test_aes, 0);