mirror of
				https://github.com/smaeul/u-boot.git
				synced 2025-11-04 05:50:17 +00:00 
			
		
		
		
	Move this header out of the common header. Network support is used in quite a few places but it still does not warrant blanket inclusion. Note that this net.h header itself has quite a lot in it. It could be split into the driver-mode support, functions, structures, checksumming, etc. Signed-off-by: Simon Glass <sjg@chromium.org>
		
			
				
	
	
		
			169 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			169 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0+
 | 
						|
/*
 | 
						|
 * Copyright (c) 2019 Philippe Reynes <philippe.reynes@softathome.com>
 | 
						|
 *
 | 
						|
 * Unit tests for aes functions
 | 
						|
 */
 | 
						|
 | 
						|
#include <common.h>
 | 
						|
#include <command.h>
 | 
						|
#include <hexdump.h>
 | 
						|
#include <rand.h>
 | 
						|
#include <uboot_aes.h>
 | 
						|
#include <test/lib.h>
 | 
						|
#include <test/test.h>
 | 
						|
#include <test/ut.h>
 | 
						|
 | 
						|
#define TEST_AES_ONE_BLOCK		0
 | 
						|
#define TEST_AES_CBC_CHAIN		1
 | 
						|
 | 
						|
struct test_aes_s {
 | 
						|
	int key_len;
 | 
						|
	int key_exp_len;
 | 
						|
	int type;
 | 
						|
	int num_block;
 | 
						|
};
 | 
						|
 | 
						|
static struct test_aes_s test_aes[] = {
 | 
						|
	{ AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | 
						|
	{ AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | 
						|
	{ AES192_KEY_LENGTH, AES192_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | 
						|
	{ AES192_KEY_LENGTH, AES192_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | 
						|
	{ AES256_KEY_LENGTH, AES256_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | 
						|
	{ AES256_KEY_LENGTH, AES256_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | 
						|
};
 | 
						|
 | 
						|
static void rand_buf(u8 *buf, int size)
 | 
						|
{
 | 
						|
	int i;
 | 
						|
 | 
						|
	for (i = 0; i < size; i++)
 | 
						|
		buf[i] = rand() & 0xff;
 | 
						|
}
 | 
						|
 | 
						|
static int lib_test_aes_one_block(struct unit_test_state *uts, int key_len,
 | 
						|
				  u8 *key_exp, u8 *iv, int num_block,
 | 
						|
				  u8 *nocipher, u8 *ciphered, u8 *uncipher)
 | 
						|
{
 | 
						|
	aes_encrypt(key_len, nocipher, key_exp, ciphered);
 | 
						|
	aes_decrypt(key_len, ciphered, key_exp, uncipher);
 | 
						|
 | 
						|
	ut_asserteq_mem(nocipher, uncipher, AES_BLOCK_LENGTH);
 | 
						|
 | 
						|
	/* corrupt the expanded key */
 | 
						|
	key_exp[0]++;
 | 
						|
	aes_decrypt(key_len, ciphered, key_exp, uncipher);
 | 
						|
	ut_assertf(memcmp(nocipher, uncipher, AES_BLOCK_LENGTH),
 | 
						|
		   "nocipher and uncipher should be different\n");
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int lib_test_aes_cbc_chain(struct unit_test_state *uts, int key_len,
 | 
						|
				  u8 *key_exp, u8 *iv, int num_block,
 | 
						|
				  u8 *nocipher, u8 *ciphered, u8 *uncipher)
 | 
						|
{
 | 
						|
	aes_cbc_encrypt_blocks(key_len, key_exp, iv,
 | 
						|
			       nocipher, ciphered, num_block);
 | 
						|
	aes_cbc_decrypt_blocks(key_len, key_exp, iv,
 | 
						|
			       ciphered, uncipher, num_block);
 | 
						|
 | 
						|
	ut_asserteq_mem(nocipher, uncipher, num_block * AES_BLOCK_LENGTH);
 | 
						|
 | 
						|
	/* corrupt the expanded key */
 | 
						|
	key_exp[0]++;
 | 
						|
	aes_cbc_decrypt_blocks(key_len, key_exp, iv,
 | 
						|
			       ciphered, uncipher, num_block);
 | 
						|
	ut_assertf(memcmp(nocipher, uncipher, num_block * AES_BLOCK_LENGTH),
 | 
						|
		   "nocipher and uncipher should be different\n");
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int _lib_test_aes_run(struct unit_test_state *uts, int key_len,
 | 
						|
			     int key_exp_len, int type, int num_block)
 | 
						|
{
 | 
						|
	u8 *key, *key_exp, *iv;
 | 
						|
	u8 *nocipher, *ciphered, *uncipher;
 | 
						|
	int ret;
 | 
						|
 | 
						|
	/* Allocate all the buffer */
 | 
						|
	key = malloc(key_len);
 | 
						|
	key_exp = malloc(key_exp_len);
 | 
						|
	iv = malloc(AES_BLOCK_LENGTH);
 | 
						|
	nocipher = malloc(num_block * AES_BLOCK_LENGTH);
 | 
						|
	ciphered = malloc((num_block + 1) * AES_BLOCK_LENGTH);
 | 
						|
	uncipher = malloc((num_block + 1) * AES_BLOCK_LENGTH);
 | 
						|
 | 
						|
	if (!key || !key_exp || !iv || !nocipher || !ciphered || !uncipher) {
 | 
						|
		printf("%s: can't allocate memory\n", __func__);
 | 
						|
		ret = -1;
 | 
						|
		goto out;
 | 
						|
	}
 | 
						|
 | 
						|
	/* Initialize all buffer */
 | 
						|
	rand_buf(key, key_len);
 | 
						|
	rand_buf(iv, AES_BLOCK_LENGTH);
 | 
						|
	rand_buf(nocipher, num_block * AES_BLOCK_LENGTH);
 | 
						|
	memset(ciphered, 0, (num_block + 1) * AES_BLOCK_LENGTH);
 | 
						|
	memset(uncipher, 0, (num_block + 1) * AES_BLOCK_LENGTH);
 | 
						|
 | 
						|
	/* Expand the key */
 | 
						|
	aes_expand_key(key, key_len, key_exp);
 | 
						|
 | 
						|
	/* Encrypt and decrypt */
 | 
						|
	switch (type) {
 | 
						|
	case TEST_AES_ONE_BLOCK:
 | 
						|
		ret = lib_test_aes_one_block(uts, key_len, key_exp, iv,
 | 
						|
					     num_block, nocipher,
 | 
						|
					     ciphered, uncipher);
 | 
						|
		break;
 | 
						|
	case TEST_AES_CBC_CHAIN:
 | 
						|
		ret = lib_test_aes_cbc_chain(uts, key_len, key_exp, iv,
 | 
						|
					     num_block, nocipher,
 | 
						|
					     ciphered, uncipher);
 | 
						|
		break;
 | 
						|
	default:
 | 
						|
		printf("%s: unknown type (type=%d)\n", __func__, type);
 | 
						|
		ret = -1;
 | 
						|
	};
 | 
						|
 | 
						|
 out:
 | 
						|
	/* Free all the data */
 | 
						|
	free(key);
 | 
						|
	free(key_exp);
 | 
						|
	free(iv);
 | 
						|
	free(nocipher);
 | 
						|
	free(ciphered);
 | 
						|
	free(uncipher);
 | 
						|
 | 
						|
	return ret;
 | 
						|
}
 | 
						|
 | 
						|
static int lib_test_aes_run(struct unit_test_state *uts,
 | 
						|
			    struct test_aes_s *test)
 | 
						|
{
 | 
						|
	int key_len = test->key_len;
 | 
						|
	int key_exp_len = test->key_exp_len;
 | 
						|
	int type = test->type;
 | 
						|
	int num_block = test->num_block;
 | 
						|
 | 
						|
	return _lib_test_aes_run(uts, key_len, key_exp_len,
 | 
						|
				 type, num_block);
 | 
						|
}
 | 
						|
 | 
						|
static int lib_test_aes(struct unit_test_state *uts)
 | 
						|
{
 | 
						|
	int i, ret = 0;
 | 
						|
 | 
						|
	for (i = 0; i < ARRAY_SIZE(test_aes); i++) {
 | 
						|
		ret = lib_test_aes_run(uts, &test_aes[i]);
 | 
						|
		if (ret)
 | 
						|
			break;
 | 
						|
	}
 | 
						|
 | 
						|
	return ret;
 | 
						|
}
 | 
						|
 | 
						|
LIB_TEST(lib_test_aes, 0);
 |