mirror of
				https://xff.cz/git/u-boot/
				synced 2025-10-31 18:35:42 +01:00 
			
		
		
		
	Move this header out of the common header. Network support is used in quite a few places but it still does not warrant blanket inclusion. Note that this net.h header itself has quite a lot in it. It could be split into the driver-mode support, functions, structures, checksumming, etc. Signed-off-by: Simon Glass <sjg@chromium.org>
		
			
				
	
	
		
			169 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			169 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0+
 | |
| /*
 | |
|  * Copyright (c) 2019 Philippe Reynes <philippe.reynes@softathome.com>
 | |
|  *
 | |
|  * Unit tests for aes functions
 | |
|  */
 | |
| 
 | |
| #include <common.h>
 | |
| #include <command.h>
 | |
| #include <hexdump.h>
 | |
| #include <rand.h>
 | |
| #include <uboot_aes.h>
 | |
| #include <test/lib.h>
 | |
| #include <test/test.h>
 | |
| #include <test/ut.h>
 | |
| 
 | |
| #define TEST_AES_ONE_BLOCK		0
 | |
| #define TEST_AES_CBC_CHAIN		1
 | |
| 
 | |
| struct test_aes_s {
 | |
| 	int key_len;
 | |
| 	int key_exp_len;
 | |
| 	int type;
 | |
| 	int num_block;
 | |
| };
 | |
| 
 | |
| static struct test_aes_s test_aes[] = {
 | |
| 	{ AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | |
| 	{ AES128_KEY_LENGTH, AES128_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | |
| 	{ AES192_KEY_LENGTH, AES192_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | |
| 	{ AES192_KEY_LENGTH, AES192_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | |
| 	{ AES256_KEY_LENGTH, AES256_EXPAND_KEY_LENGTH, TEST_AES_ONE_BLOCK,  1 },
 | |
| 	{ AES256_KEY_LENGTH, AES256_EXPAND_KEY_LENGTH, TEST_AES_CBC_CHAIN, 16 },
 | |
| };
 | |
| 
 | |
| static void rand_buf(u8 *buf, int size)
 | |
| {
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < size; i++)
 | |
| 		buf[i] = rand() & 0xff;
 | |
| }
 | |
| 
 | |
| static int lib_test_aes_one_block(struct unit_test_state *uts, int key_len,
 | |
| 				  u8 *key_exp, u8 *iv, int num_block,
 | |
| 				  u8 *nocipher, u8 *ciphered, u8 *uncipher)
 | |
| {
 | |
| 	aes_encrypt(key_len, nocipher, key_exp, ciphered);
 | |
| 	aes_decrypt(key_len, ciphered, key_exp, uncipher);
 | |
| 
 | |
| 	ut_asserteq_mem(nocipher, uncipher, AES_BLOCK_LENGTH);
 | |
| 
 | |
| 	/* corrupt the expanded key */
 | |
| 	key_exp[0]++;
 | |
| 	aes_decrypt(key_len, ciphered, key_exp, uncipher);
 | |
| 	ut_assertf(memcmp(nocipher, uncipher, AES_BLOCK_LENGTH),
 | |
| 		   "nocipher and uncipher should be different\n");
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int lib_test_aes_cbc_chain(struct unit_test_state *uts, int key_len,
 | |
| 				  u8 *key_exp, u8 *iv, int num_block,
 | |
| 				  u8 *nocipher, u8 *ciphered, u8 *uncipher)
 | |
| {
 | |
| 	aes_cbc_encrypt_blocks(key_len, key_exp, iv,
 | |
| 			       nocipher, ciphered, num_block);
 | |
| 	aes_cbc_decrypt_blocks(key_len, key_exp, iv,
 | |
| 			       ciphered, uncipher, num_block);
 | |
| 
 | |
| 	ut_asserteq_mem(nocipher, uncipher, num_block * AES_BLOCK_LENGTH);
 | |
| 
 | |
| 	/* corrupt the expanded key */
 | |
| 	key_exp[0]++;
 | |
| 	aes_cbc_decrypt_blocks(key_len, key_exp, iv,
 | |
| 			       ciphered, uncipher, num_block);
 | |
| 	ut_assertf(memcmp(nocipher, uncipher, num_block * AES_BLOCK_LENGTH),
 | |
| 		   "nocipher and uncipher should be different\n");
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static int _lib_test_aes_run(struct unit_test_state *uts, int key_len,
 | |
| 			     int key_exp_len, int type, int num_block)
 | |
| {
 | |
| 	u8 *key, *key_exp, *iv;
 | |
| 	u8 *nocipher, *ciphered, *uncipher;
 | |
| 	int ret;
 | |
| 
 | |
| 	/* Allocate all the buffer */
 | |
| 	key = malloc(key_len);
 | |
| 	key_exp = malloc(key_exp_len);
 | |
| 	iv = malloc(AES_BLOCK_LENGTH);
 | |
| 	nocipher = malloc(num_block * AES_BLOCK_LENGTH);
 | |
| 	ciphered = malloc((num_block + 1) * AES_BLOCK_LENGTH);
 | |
| 	uncipher = malloc((num_block + 1) * AES_BLOCK_LENGTH);
 | |
| 
 | |
| 	if (!key || !key_exp || !iv || !nocipher || !ciphered || !uncipher) {
 | |
| 		printf("%s: can't allocate memory\n", __func__);
 | |
| 		ret = -1;
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	/* Initialize all buffer */
 | |
| 	rand_buf(key, key_len);
 | |
| 	rand_buf(iv, AES_BLOCK_LENGTH);
 | |
| 	rand_buf(nocipher, num_block * AES_BLOCK_LENGTH);
 | |
| 	memset(ciphered, 0, (num_block + 1) * AES_BLOCK_LENGTH);
 | |
| 	memset(uncipher, 0, (num_block + 1) * AES_BLOCK_LENGTH);
 | |
| 
 | |
| 	/* Expand the key */
 | |
| 	aes_expand_key(key, key_len, key_exp);
 | |
| 
 | |
| 	/* Encrypt and decrypt */
 | |
| 	switch (type) {
 | |
| 	case TEST_AES_ONE_BLOCK:
 | |
| 		ret = lib_test_aes_one_block(uts, key_len, key_exp, iv,
 | |
| 					     num_block, nocipher,
 | |
| 					     ciphered, uncipher);
 | |
| 		break;
 | |
| 	case TEST_AES_CBC_CHAIN:
 | |
| 		ret = lib_test_aes_cbc_chain(uts, key_len, key_exp, iv,
 | |
| 					     num_block, nocipher,
 | |
| 					     ciphered, uncipher);
 | |
| 		break;
 | |
| 	default:
 | |
| 		printf("%s: unknown type (type=%d)\n", __func__, type);
 | |
| 		ret = -1;
 | |
| 	};
 | |
| 
 | |
|  out:
 | |
| 	/* Free all the data */
 | |
| 	free(key);
 | |
| 	free(key_exp);
 | |
| 	free(iv);
 | |
| 	free(nocipher);
 | |
| 	free(ciphered);
 | |
| 	free(uncipher);
 | |
| 
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| static int lib_test_aes_run(struct unit_test_state *uts,
 | |
| 			    struct test_aes_s *test)
 | |
| {
 | |
| 	int key_len = test->key_len;
 | |
| 	int key_exp_len = test->key_exp_len;
 | |
| 	int type = test->type;
 | |
| 	int num_block = test->num_block;
 | |
| 
 | |
| 	return _lib_test_aes_run(uts, key_len, key_exp_len,
 | |
| 				 type, num_block);
 | |
| }
 | |
| 
 | |
| static int lib_test_aes(struct unit_test_state *uts)
 | |
| {
 | |
| 	int i, ret = 0;
 | |
| 
 | |
| 	for (i = 0; i < ARRAY_SIZE(test_aes); i++) {
 | |
| 		ret = lib_test_aes_run(uts, &test_aes[i]);
 | |
| 		if (ret)
 | |
| 			break;
 | |
| 	}
 | |
| 
 | |
| 	return ret;
 | |
| }
 | |
| 
 | |
| LIB_TEST(lib_test_aes, 0);
 |