mirror of
https://github.com/espressif/esp-idf.git
synced 2025-08-04 21:24:32 +02:00
test(crypto): Change partition address and update the test cases
- Also format key manager test cases generation script
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
# SPDX-FileCopyrightText: 2024 Espressif Systems (Shanghai) CO LTD
|
||||
# SPDX-FileCopyrightText: 2024-2025 Espressif Systems (Shanghai) CO LTD
|
||||
# SPDX-License-Identifier: Unlicense OR CC0-1.0
|
||||
import os
|
||||
import struct
|
||||
@@ -7,13 +7,14 @@ from typing import Any
|
||||
from cryptography.hazmat.backends import default_backend
|
||||
from cryptography.hazmat.primitives import serialization
|
||||
from cryptography.hazmat.primitives.asymmetric import ec
|
||||
from cryptography.hazmat.primitives.ciphers import algorithms
|
||||
from cryptography.hazmat.primitives.ciphers import Cipher
|
||||
from cryptography.hazmat.primitives.ciphers import algorithms
|
||||
from cryptography.hazmat.primitives.ciphers import modes
|
||||
from ecdsa.curves import NIST256p
|
||||
|
||||
# Constants
|
||||
TEST_COUNT = 5
|
||||
STORAGE_PARTITION_OFFSET = 0x160000
|
||||
|
||||
|
||||
# Helper functions
|
||||
@@ -45,7 +46,9 @@ def calculate_aes_cipher(data: bytes, key: bytes) -> Any:
|
||||
return encryptor.update(data) + encryptor.finalize()
|
||||
|
||||
|
||||
def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, key: bytes, do_decrypt: bool = False) -> bytes:
|
||||
def _flash_encryption_operation_aes_xts(
|
||||
input_data: bytes, flash_address: int, key: bytes, do_decrypt: bool = False
|
||||
) -> bytes:
|
||||
backend = default_backend()
|
||||
|
||||
indata = input_data
|
||||
@@ -54,9 +57,9 @@ def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, k
|
||||
indata = (b'\x00' * pad_left) + indata
|
||||
|
||||
pad_right = (0x80 - (len(indata) % 0x80)) % 0x80
|
||||
indata += (b'\x00' * pad_right)
|
||||
indata += b'\x00' * pad_right
|
||||
|
||||
inblocks = [indata[i:i + 0x80] for i in range(0, len(indata), 0x80)]
|
||||
inblocks = [indata[i : i + 0x80] for i in range(0, len(indata), 0x80)]
|
||||
|
||||
output = b''
|
||||
for inblock in inblocks:
|
||||
@@ -68,17 +71,17 @@ def _flash_encryption_operation_aes_xts(input_data: bytes, flash_address: int, k
|
||||
outblock = encryptor.update(inblock[::-1])
|
||||
output += outblock[::-1]
|
||||
|
||||
return output[pad_left:len(output) - pad_right]
|
||||
return output[pad_left : len(output) - pad_right]
|
||||
|
||||
|
||||
def generate_xts_test_data(key: bytes, base_flash_address: int = 0x120000) -> list:
|
||||
def generate_xts_test_data(key: bytes, base_flash_address: int = STORAGE_PARTITION_OFFSET) -> list:
|
||||
xts_test_data = []
|
||||
plaintext_data = bytes(range(1, 129))
|
||||
data_size = 16
|
||||
flash_address = base_flash_address
|
||||
for i in range(TEST_COUNT):
|
||||
data_size = (data_size * 2) % 256
|
||||
if (data_size < 16):
|
||||
if data_size < 16:
|
||||
data_size = 16
|
||||
input_data = plaintext_data[:data_size]
|
||||
flash_address = base_flash_address + (i * 0x100)
|
||||
@@ -96,7 +99,7 @@ def generate_ecdsa_256_key_and_pub_key(filename: str) -> tuple:
|
||||
pem = private_key.private_bytes(
|
||||
encoding=serialization.Encoding.PEM,
|
||||
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
||||
encryption_algorithm=serialization.NoEncryption()
|
||||
encryption_algorithm=serialization.NoEncryption(),
|
||||
)
|
||||
|
||||
with open('ecdsa_256_key.pem', 'wb') as pem_file:
|
||||
@@ -134,10 +137,19 @@ def generate_k1_G(key_file_path: str) -> tuple:
|
||||
return k1_G, k1_G
|
||||
|
||||
|
||||
def write_to_c_header(init_key: bytes, k1: bytes, k2_info: bytes, k1_encrypted_32: list,
|
||||
test_data_xts_aes_128: list, k1_encrypted_64: list,
|
||||
xts_test_data_xts_aes_256: list, pubx: bytes,
|
||||
puby: bytes, k1_G_0: bytes, k1_G_1: bytes) -> None:
|
||||
def write_to_c_header(
|
||||
init_key: bytes,
|
||||
k1: bytes,
|
||||
k2_info: bytes,
|
||||
k1_encrypted_32: list,
|
||||
test_data_xts_aes_128: list,
|
||||
k1_encrypted_64: list,
|
||||
xts_test_data_xts_aes_256: list,
|
||||
pubx: bytes,
|
||||
puby: bytes,
|
||||
k1_G_0: bytes,
|
||||
k1_G_1: bytes,
|
||||
) -> None:
|
||||
with open('key_manager_test_cases.h', 'w', encoding='utf-8') as file:
|
||||
header_content = """#include <stdint.h>
|
||||
|
||||
@@ -176,10 +188,19 @@ test_data_aes_mode_t test_data_xts_aes_128 = {
|
||||
.k1_encrypted = { { %s }, { } },
|
||||
.plaintext_data = { %s },
|
||||
.xts_test_data = {
|
||||
""" % (key_to_c_format(init_key), key_to_c_format(k2_info), key_to_c_format(k1_encrypted_32[0]), key_to_c_format(bytes(range(1, 129))))
|
||||
""" % (
|
||||
key_to_c_format(init_key),
|
||||
key_to_c_format(k2_info),
|
||||
key_to_c_format(k1_encrypted_32[0]),
|
||||
key_to_c_format(bytes(range(1, 129))),
|
||||
)
|
||||
|
||||
for data_size, flash_address, ciphertext in test_data_xts_aes_128:
|
||||
header_content += f'\t\t{{.data_size = {data_size}, .data_offset = 0x{flash_address:x}, .ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n'
|
||||
header_content += (
|
||||
f'\t\t{{.data_size = {data_size}, '
|
||||
f'.data_offset = 0x{flash_address:x}, '
|
||||
f'.ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n'
|
||||
)
|
||||
header_content += '\t}\n};\n\n'
|
||||
|
||||
# For 64-byte k1 key
|
||||
@@ -187,14 +208,22 @@ test_data_aes_mode_t test_data_xts_aes_128 = {
|
||||
header_content += 'test_data_aes_mode_t test_data_xts_aes_256 = {\n'
|
||||
header_content += f'\t.init_key = {{{key_to_c_format(init_key)}}},\n'
|
||||
header_content += f'\t.k2_info = {{{key_to_c_format(k2_info)}}},\n'
|
||||
header_content += f'\t.k1_encrypted = {{{{{key_to_c_format(k1_encrypted_64[0])}}}, {{{key_to_c_format(k1_encrypted_64[1])}}}}},\n'
|
||||
header_content += (
|
||||
f'\t.k1_encrypted = {{{{{key_to_c_format(k1_encrypted_64[0])}}}, '
|
||||
f'{{{key_to_c_format(k1_encrypted_64[1])}}}}},\n'
|
||||
)
|
||||
header_content += f'\t.plaintext_data = {{{key_to_c_format(bytes(range(1, 129)))}}},\n'
|
||||
header_content += ' .xts_test_data = {\n'
|
||||
|
||||
for data_size, flash_address, ciphertext in xts_test_data_xts_aes_256:
|
||||
header_content += f' {{.data_size = {data_size}, .data_offset = 0x{flash_address:x}, .ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n'
|
||||
header_content += ' }\n};\n'
|
||||
header_content += '''
|
||||
header_content += (
|
||||
f'\t\t{{.data_size = {data_size}, '
|
||||
f'.data_offset = 0x{flash_address:x}, '
|
||||
f'.ciphertext = {{{key_to_c_format(ciphertext)}}}}},\n'
|
||||
)
|
||||
header_content += '\t}\n};\n\n'
|
||||
|
||||
header_content += """
|
||||
test_data_aes_mode_t test_data_ecdsa = {
|
||||
.init_key = { %s },
|
||||
.k2_info = { %s },
|
||||
@@ -204,8 +233,14 @@ test_data_aes_mode_t test_data_ecdsa = {
|
||||
.puby = { %s }
|
||||
}
|
||||
};\n
|
||||
''' % (key_to_c_format(init_key), key_to_c_format(k2_info), key_to_c_format(k1_encrypted_32[0]), key_to_c_format(pubx),key_to_c_format(puby))
|
||||
header_content += '''
|
||||
""" % (
|
||||
key_to_c_format(init_key),
|
||||
key_to_c_format(k2_info),
|
||||
key_to_c_format(k1_encrypted_32[0]),
|
||||
key_to_c_format(pubx),
|
||||
key_to_c_format(puby),
|
||||
)
|
||||
header_content += """
|
||||
test_data_ecdh0_mode_t test_data_ecdh0 = {
|
||||
.plaintext_data = { %s },
|
||||
.k1 = {
|
||||
@@ -218,7 +253,13 @@ test_data_ecdh0_mode_t test_data_ecdh0 = {
|
||||
}
|
||||
};\n
|
||||
|
||||
''' % (key_to_c_format(bytes(range(1, 129))), key_to_c_format(k1), key_to_c_format(k1), key_to_c_format(k1_G_0), key_to_c_format(k1_G_1))
|
||||
""" % (
|
||||
key_to_c_format(bytes(range(1, 129))),
|
||||
key_to_c_format(k1),
|
||||
key_to_c_format(k1),
|
||||
key_to_c_format(k1_G_0),
|
||||
key_to_c_format(k1_G_1),
|
||||
)
|
||||
|
||||
file.write(header_content)
|
||||
|
||||
@@ -254,4 +295,16 @@ pubx, puby = generate_ecdsa_256_key_and_pub_key('k1.bin')
|
||||
|
||||
k1_G_0, k1_G_1 = generate_k1_G('k1.bin')
|
||||
|
||||
write_to_c_header(init_key, k1_32, k2_info, k1_encrypted_32, test_data_xts_aes_128, k1_encrypted_64, xts_test_data_xts_aes_256, pubx, puby, k1_G_0, k1_G_1)
|
||||
write_to_c_header(
|
||||
init_key,
|
||||
k1_32,
|
||||
k2_info,
|
||||
k1_encrypted_32,
|
||||
test_data_xts_aes_128,
|
||||
k1_encrypted_64,
|
||||
xts_test_data_xts_aes_256,
|
||||
pubx,
|
||||
puby,
|
||||
k1_G_0,
|
||||
k1_G_1,
|
||||
)
|
||||
|
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* SPDX-FileCopyrightText: 2024 Espressif Systems (Shanghai) CO LTD
|
||||
* SPDX-FileCopyrightText: 2025 Espressif Systems (Shanghai) CO LTD
|
||||
*
|
||||
* SPDX-License-Identifier: Unlicense OR CC0-1.0
|
||||
*/
|
||||
@@ -35,41 +35,41 @@ typedef struct test_data_ecdh0 {
|
||||
|
||||
// For 32-byte k1 key
|
||||
test_data_aes_mode_t test_data_xts_aes_128 = {
|
||||
.init_key = { 0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93 },
|
||||
.k2_info = { 0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3 },
|
||||
.k1_encrypted = { { 0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48 }, { } },
|
||||
.init_key = { 0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00 },
|
||||
.k2_info = { 0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3 },
|
||||
.k1_encrypted = { { 0x3f, 0xe8, 0xd7, 0x74, 0x8d, 0xe4, 0xc2, 0x1c, 0x8f, 0x52, 0x5b, 0x3d, 0xa5, 0x9d, 0x43, 0x09, 0xef, 0x26, 0x76, 0x24, 0xfc, 0x3c, 0xc5, 0x3a, 0x84, 0xa2, 0x4c, 0x71, 0xf8, 0xd6, 0x8d, 0xb5 }, { } },
|
||||
.plaintext_data = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80 },
|
||||
.xts_test_data = {
|
||||
{.data_size = 32, .data_offset = 0x120000, .ciphertext = {0xe7, 0xf3, 0xb4, 0x51, 0xc6, 0x62, 0x8e, 0x25, 0x10, 0x12, 0xc2, 0x09, 0x82, 0x7b, 0x3e, 0x9a, 0x78, 0xe2, 0x00, 0x9a, 0x96, 0x02, 0x50, 0xeb, 0xff, 0xf1, 0xf8, 0x0d, 0xf6, 0xa6, 0xb8, 0xa1}},
|
||||
{.data_size = 64, .data_offset = 0x120100, .ciphertext = {0x3b, 0x54, 0xa8, 0x58, 0xe2, 0x63, 0x7a, 0xb0, 0x7c, 0xc7, 0x37, 0xd8, 0x1e, 0x89, 0x1e, 0x25, 0x39, 0x3d, 0x0d, 0x18, 0x14, 0xb3, 0x2e, 0x18, 0x15, 0xf6, 0xbd, 0xf8, 0xb6, 0x5f, 0x6b, 0x89, 0x1a, 0x0a, 0x53, 0x36, 0xf1, 0x5b, 0x1b, 0x18, 0xd3, 0xf4, 0x7b, 0xd5, 0xcd, 0x4f, 0x48, 0x7b, 0x11, 0xcf, 0xad, 0x6b, 0x79, 0x36, 0x1b, 0xda, 0x5a, 0xd3, 0x18, 0x44, 0xa0, 0xf3, 0xf2, 0xad}},
|
||||
{.data_size = 128, .data_offset = 0x120200, .ciphertext = {0x6b, 0x42, 0x10, 0x9f, 0x67, 0x72, 0x31, 0xc7, 0x8f, 0x63, 0xde, 0xc1, 0xf9, 0x84, 0x37, 0x74, 0xe5, 0x5a, 0xe4, 0x31, 0x1a, 0x2e, 0x45, 0x6b, 0xb5, 0xd4, 0xd0, 0x41, 0xe1, 0x2c, 0x0a, 0x43, 0xd9, 0x4c, 0xd5, 0x1c, 0x34, 0xc9, 0x29, 0x39, 0xc8, 0x09, 0xc3, 0xcd, 0x99, 0xaf, 0x3a, 0xe6, 0x4d, 0xae, 0xce, 0xfd, 0x0a, 0xd4, 0x8f, 0x81, 0x4c, 0x25, 0xc5, 0x5e, 0x3d, 0x82, 0x3d, 0x58, 0x55, 0xe5, 0xa4, 0xe4, 0x13, 0x2b, 0xa0, 0x04, 0x3a, 0x7a, 0x65, 0xfa, 0x7a, 0xfb, 0x28, 0x36, 0x1e, 0xfa, 0x71, 0x50, 0x80, 0xa5, 0x0c, 0xa6, 0x4e, 0x45, 0xf9, 0xd9, 0x05, 0xc1, 0x63, 0xa1, 0xf2, 0x7f, 0x54, 0x62, 0xf1, 0x5a, 0xe2, 0x5a, 0x5c, 0x06, 0x16, 0x71, 0xa9, 0x5f, 0xab, 0x7d, 0xc9, 0x85, 0x68, 0xc5, 0x3a, 0xfe, 0xc1, 0xe0, 0xc9, 0xc3, 0xd4, 0x33, 0x10, 0x89, 0x5e, 0x43}},
|
||||
{.data_size = 16, .data_offset = 0x120300, .ciphertext = {0xbe, 0xd7, 0x01, 0x8a, 0x60, 0xab, 0x0c, 0xb7, 0xb6, 0x14, 0x9e, 0x64, 0xbc, 0xca, 0xda, 0xaa}},
|
||||
{.data_size = 32, .data_offset = 0x120400, .ciphertext = {0xda, 0x84, 0x17, 0x3d, 0x4c, 0x85, 0x07, 0xe2, 0x56, 0x98, 0x69, 0x33, 0x1b, 0x9a, 0x01, 0x9e, 0x6c, 0x81, 0xd8, 0x90, 0x9e, 0x59, 0x92, 0x12, 0x6d, 0xba, 0x58, 0x09, 0x90, 0xe6, 0x50, 0x33}},
|
||||
{.data_size = 32, .data_offset = 0x160000, .ciphertext = {0x7b, 0xe2, 0xcb, 0x71, 0x0f, 0x86, 0x48, 0xef, 0x79, 0x69, 0x5f, 0x68, 0xa4, 0xf6, 0xec, 0x56, 0xb5, 0xc1, 0x09, 0xaf, 0x3e, 0x33, 0x05, 0x03, 0x16, 0x1b, 0xf2, 0x9f, 0xc2, 0x8d, 0x0c, 0xec}},
|
||||
{.data_size = 64, .data_offset = 0x160100, .ciphertext = {0x0d, 0x7d, 0x25, 0xb8, 0x85, 0x55, 0x56, 0xb4, 0xa8, 0x33, 0xf6, 0x9f, 0x0b, 0x00, 0xe7, 0x6d, 0x87, 0x06, 0xfe, 0x48, 0xdb, 0x61, 0x60, 0x59, 0x88, 0x03, 0xc0, 0x0d, 0xe4, 0xa7, 0xdc, 0xcd, 0x37, 0x3e, 0x17, 0x30, 0x04, 0xde, 0x79, 0x74, 0x7a, 0x30, 0x61, 0xf9, 0x64, 0x8b, 0x5d, 0x50, 0x84, 0xfe, 0x09, 0x5b, 0xb8, 0x9e, 0x65, 0xf9, 0x4d, 0xbc, 0x63, 0x3a, 0x4f, 0x97, 0x37, 0x8a}},
|
||||
{.data_size = 128, .data_offset = 0x160200, .ciphertext = {0x0d, 0x16, 0x41, 0x83, 0xdf, 0x75, 0x45, 0x2f, 0x4e, 0x34, 0x9f, 0x8a, 0x81, 0x93, 0x98, 0x88, 0xd4, 0xd5, 0x05, 0xec, 0x6c, 0x5f, 0xb0, 0xd7, 0xea, 0xdc, 0x05, 0xf2, 0xf3, 0x27, 0xe7, 0x5f, 0x6d, 0xec, 0x67, 0x17, 0x5c, 0x79, 0x4e, 0xc4, 0x4f, 0x9d, 0xa8, 0x4e, 0x16, 0x06, 0xc6, 0xf5, 0x4d, 0xae, 0xb9, 0xfc, 0x9a, 0x9c, 0x16, 0x0a, 0xf2, 0x49, 0x38, 0xeb, 0x3a, 0x6a, 0x72, 0x53, 0xb6, 0x32, 0x3b, 0xef, 0xd2, 0x18, 0x82, 0x17, 0x67, 0x72, 0xa2, 0xa1, 0xd2, 0x53, 0xf8, 0x84, 0x24, 0xda, 0x03, 0xf8, 0x34, 0xd6, 0x19, 0x3e, 0x89, 0xe4, 0x4c, 0x1a, 0x32, 0xfe, 0x99, 0x3c, 0x39, 0xf1, 0x00, 0x87, 0x26, 0x9c, 0xee, 0x36, 0xc1, 0x1b, 0x2e, 0x0e, 0x5e, 0xe7, 0xbe, 0x25, 0xa6, 0x39, 0xda, 0x56, 0xa8, 0x4a, 0x75, 0x88, 0x62, 0xf9, 0x9d, 0x06, 0x8f, 0x15, 0xfb, 0x37}},
|
||||
{.data_size = 16, .data_offset = 0x160300, .ciphertext = {0xa9, 0xad, 0x71, 0x0f, 0x78, 0xdc, 0x0a, 0x54, 0xc0, 0xaa, 0xba, 0x0b, 0xc7, 0x27, 0x92, 0xbd}},
|
||||
{.data_size = 32, .data_offset = 0x160400, .ciphertext = {0xc9, 0xf0, 0xf9, 0xf1, 0x66, 0x20, 0x13, 0xb3, 0xbf, 0xcc, 0x98, 0x85, 0x30, 0x43, 0x29, 0xd6, 0xa5, 0x16, 0x92, 0xa6, 0xae, 0x2f, 0xd8, 0x55, 0x83, 0x4c, 0xe6, 0xf3, 0x1c, 0xd4, 0xc1, 0x71}},
|
||||
}
|
||||
};
|
||||
|
||||
// For 64-byte k1 key
|
||||
test_data_aes_mode_t test_data_xts_aes_256 = {
|
||||
.init_key = {0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93},
|
||||
.k2_info = {0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3},
|
||||
.k1_encrypted = {{0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48}, {0x65, 0x9e, 0x12, 0x7f, 0xc0, 0x4a, 0xb6, 0x04, 0xa1, 0xd0, 0x38, 0x04, 0x6c, 0x8e, 0x1f, 0xc7, 0x03, 0x24, 0x3e, 0x75, 0x3c, 0x9d, 0x7a, 0xc2, 0xef, 0xd6, 0xf2, 0x60, 0x46, 0xfc, 0x07, 0x3f}},
|
||||
.init_key = {0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00},
|
||||
.k2_info = {0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3},
|
||||
.k1_encrypted = {{0x79, 0x5c, 0x35, 0x1d, 0x4f, 0x04, 0x90, 0x88, 0x9a, 0x99, 0xc3, 0x6c, 0x08, 0x21, 0x96, 0x42, 0xd6, 0x8a, 0xd6, 0x96, 0x0f, 0x3b, 0x34, 0xd1, 0x5f, 0x0a, 0xb8, 0xba, 0xf6, 0x1a, 0xb8, 0x5b}, {0x50, 0x9f, 0x98, 0xf3, 0x69, 0x5b, 0x86, 0xd6, 0x25, 0x00, 0x44, 0x9f, 0x14, 0xba, 0xb8, 0xc5, 0x38, 0x79, 0xea, 0x65, 0xcd, 0x1f, 0x5f, 0x40, 0xdf, 0xa1, 0x0b, 0x4c, 0xe6, 0x8f, 0x7e, 0x8c}},
|
||||
.plaintext_data = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80},
|
||||
.xts_test_data = {
|
||||
{.data_size = 32, .data_offset = 0x120000, .ciphertext = {0x9b, 0xd8, 0x2b, 0xc6, 0xae, 0xcc, 0x9d, 0x0c, 0x38, 0x30, 0x85, 0x6a, 0x2b, 0x22, 0x2e, 0x34, 0x9f, 0xa2, 0xcd, 0xe8, 0xec, 0xe3, 0xc4, 0x21, 0xfe, 0xbb, 0x4a, 0x55, 0xf2, 0x4a, 0xe2, 0x14}},
|
||||
{.data_size = 64, .data_offset = 0x120100, .ciphertext = {0x1e, 0x36, 0x3f, 0xf6, 0xd6, 0x52, 0x34, 0xce, 0xc3, 0x58, 0x15, 0xa1, 0x15, 0x6f, 0x3d, 0x66, 0xa7, 0x90, 0x14, 0x71, 0xbb, 0x6d, 0x7e, 0x93, 0xf2, 0x4d, 0x5d, 0x74, 0xb2, 0xd7, 0x77, 0x32, 0x2e, 0x31, 0x16, 0x28, 0xd2, 0x10, 0x65, 0x81, 0x49, 0xc0, 0x56, 0xf0, 0x6d, 0x71, 0x5b, 0xc2, 0xf2, 0x01, 0x04, 0xbf, 0x97, 0x77, 0xe6, 0x57, 0xe5, 0xb5, 0xad, 0x73, 0xc0, 0x76, 0x91, 0xb6}},
|
||||
{.data_size = 128, .data_offset = 0x120200, .ciphertext = {0xcf, 0x7d, 0xdd, 0x69, 0x69, 0xf4, 0x3b, 0xcd, 0x65, 0x5d, 0xcf, 0xfc, 0xff, 0xd3, 0x45, 0x1c, 0x51, 0xab, 0x2e, 0x26, 0x5c, 0xdc, 0x5b, 0x5a, 0x6e, 0xbb, 0x18, 0x36, 0x55, 0xbe, 0xe7, 0x30, 0x7a, 0x07, 0x48, 0xd8, 0x1a, 0x34, 0xdc, 0xa6, 0x1e, 0xd6, 0x67, 0xa8, 0x90, 0xc3, 0xac, 0x26, 0x7a, 0x52, 0x67, 0x82, 0x71, 0xc9, 0x80, 0x8d, 0xed, 0x20, 0x83, 0x34, 0x10, 0x8e, 0xe5, 0x84, 0x81, 0xa5, 0xe2, 0x42, 0xf0, 0x53, 0xef, 0x93, 0x00, 0xfe, 0xbd, 0x74, 0x14, 0xac, 0x92, 0x37, 0x00, 0x45, 0xd5, 0x71, 0x29, 0xaf, 0x8b, 0x83, 0xe2, 0x20, 0x2e, 0xd0, 0xf6, 0xaa, 0x45, 0x9a, 0x6f, 0x59, 0xb9, 0x8d, 0xef, 0xcd, 0xb6, 0xf6, 0x25, 0x99, 0xd2, 0x32, 0x2e, 0x90, 0x8a, 0x3a, 0x5d, 0xd8, 0x3f, 0xbf, 0x84, 0x80, 0x89, 0xaa, 0x9c, 0xa8, 0x57, 0xc9, 0x1c, 0xc4, 0xaa, 0x64}},
|
||||
{.data_size = 16, .data_offset = 0x120300, .ciphertext = {0x1b, 0x7a, 0xf1, 0x35, 0x33, 0x22, 0x64, 0x74, 0x06, 0x6a, 0xc1, 0x0c, 0x39, 0xee, 0x1f, 0x9f}},
|
||||
{.data_size = 32, .data_offset = 0x120400, .ciphertext = {0x94, 0xd9, 0x01, 0x0f, 0xec, 0xcc, 0xb5, 0x22, 0x50, 0x8b, 0x8a, 0x3d, 0x01, 0x18, 0x29, 0xda, 0x53, 0x9b, 0xcf, 0x64, 0xac, 0x4f, 0x7b, 0x97, 0xf3, 0xff, 0xfd, 0x33, 0x96, 0x8a, 0xde, 0x27}},
|
||||
{.data_size = 32, .data_offset = 0x160000, .ciphertext = {0x78, 0x21, 0xf8, 0x05, 0x4c, 0x9b, 0x48, 0x5f, 0x5d, 0x2e, 0x03, 0x5a, 0xdd, 0x39, 0xa7, 0x99, 0x4c, 0x70, 0xb4, 0x37, 0x87, 0x03, 0xa2, 0xd1, 0x4b, 0x48, 0x19, 0x39, 0xc4, 0x54, 0xec, 0x30}},
|
||||
{.data_size = 64, .data_offset = 0x160100, .ciphertext = {0xfa, 0x69, 0x67, 0x90, 0x93, 0x79, 0x24, 0xc3, 0x0c, 0xd9, 0xe6, 0x97, 0x85, 0xc5, 0xc4, 0x0a, 0xa8, 0x50, 0x2b, 0xac, 0x0b, 0xa6, 0x7e, 0x4c, 0x10, 0xff, 0xde, 0x3c, 0xd3, 0x24, 0xbf, 0x8b, 0xe3, 0x2f, 0x92, 0x89, 0x9a, 0xcf, 0x33, 0xb9, 0x7f, 0x69, 0x39, 0x2c, 0x29, 0xcf, 0x7f, 0xfd, 0x0f, 0x8d, 0xff, 0x74, 0x90, 0x1c, 0xec, 0xeb, 0xec, 0xd9, 0x4b, 0xd7, 0xba, 0x1f, 0x23, 0x14}},
|
||||
{.data_size = 128, .data_offset = 0x160200, .ciphertext = {0xcc, 0x07, 0xb5, 0x64, 0xfd, 0xf1, 0xe8, 0x28, 0x52, 0x3c, 0x4b, 0x69, 0xe9, 0x59, 0x56, 0x02, 0x3a, 0xc1, 0x52, 0x34, 0xd2, 0x77, 0x14, 0x86, 0xa8, 0x1a, 0x4b, 0x3a, 0x3c, 0xd6, 0xd6, 0xf3, 0x4f, 0x00, 0x69, 0x81, 0x92, 0x38, 0x81, 0x20, 0x7f, 0x37, 0x44, 0xdf, 0x2f, 0x28, 0x33, 0x4e, 0xc6, 0x7f, 0x73, 0x52, 0xb5, 0x57, 0x6d, 0x12, 0xf7, 0xb6, 0x1f, 0xd8, 0x1a, 0xa0, 0x2e, 0xf7, 0x04, 0xa1, 0xd1, 0xee, 0x57, 0x1d, 0x6e, 0xcb, 0x9d, 0xb7, 0x9d, 0xac, 0x72, 0x59, 0x35, 0x0e, 0x4c, 0xb8, 0x16, 0x6e, 0xa9, 0x6e, 0xfd, 0xc8, 0x82, 0xc2, 0xe8, 0x6f, 0x54, 0xef, 0x3e, 0xa8, 0x17, 0xa1, 0x7f, 0x9c, 0x04, 0xdb, 0xd7, 0x3c, 0x40, 0x38, 0xd9, 0x31, 0xa5, 0x49, 0x25, 0x69, 0x3c, 0x8e, 0xaf, 0x2e, 0x02, 0x3b, 0xbe, 0x5c, 0x8a, 0x70, 0x69, 0xe1, 0x19, 0x4c, 0x1c, 0xa9}},
|
||||
{.data_size = 16, .data_offset = 0x160300, .ciphertext = {0x67, 0x24, 0x58, 0xaf, 0x4a, 0xdb, 0x6e, 0xc8, 0xcb, 0xe5, 0xa1, 0x63, 0xbd, 0xb0, 0x18, 0x47}},
|
||||
{.data_size = 32, .data_offset = 0x160400, .ciphertext = {0x66, 0xc3, 0x02, 0x76, 0xfb, 0xf3, 0x58, 0xff, 0x75, 0xa7, 0x68, 0x32, 0xd0, 0x65, 0x76, 0xfc, 0x9c, 0x15, 0x73, 0x8f, 0x16, 0xa0, 0xa7, 0x3c, 0xf0, 0x84, 0x35, 0x77, 0x97, 0xd5, 0xbb, 0xd2}},
|
||||
}
|
||||
};
|
||||
|
||||
test_data_aes_mode_t test_data_ecdsa = {
|
||||
.init_key = { 0x4d, 0x21, 0x64, 0x21, 0x8f, 0xa2, 0xe3, 0xa0, 0xab, 0x74, 0xb5, 0xab, 0x17, 0x9a, 0x5d, 0x08, 0x58, 0xf4, 0x22, 0x03, 0xbd, 0x52, 0xe7, 0x88, 0x3c, 0x22, 0x0f, 0x95, 0x89, 0x70, 0xe1, 0x93 },
|
||||
.k2_info = { 0xd8, 0xcd, 0x04, 0x45, 0xb4, 0x45, 0xc4, 0x15, 0xf6, 0x40, 0x1c, 0x7d, 0x90, 0x1b, 0x99, 0xa4, 0x79, 0x6b, 0xfb, 0x5b, 0x2a, 0x40, 0x60, 0xe1, 0xc1, 0xe1, 0x48, 0xcd, 0x46, 0x6b, 0x9b, 0x48, 0xda, 0x7a, 0x70, 0x0a, 0x78, 0x0b, 0x9d, 0xf9, 0x0e, 0xed, 0x91, 0xfc, 0xa5, 0xc2, 0x96, 0x05, 0x91, 0x76, 0xdb, 0x68, 0x84, 0x5d, 0x5e, 0x5b, 0xa6, 0xe9, 0x6b, 0x3b, 0x12, 0x50, 0x05, 0xc3 },
|
||||
.k1_encrypted = { { 0xeb, 0x83, 0x24, 0x7d, 0xf8, 0x40, 0xc9, 0x88, 0x5f, 0x5e, 0x58, 0x57, 0x25, 0xa9, 0x23, 0x4a, 0xa4, 0xc4, 0x12, 0x17, 0xf3, 0x9e, 0x1f, 0xa0, 0xa0, 0xfa, 0xd5, 0xbf, 0xb6, 0x6c, 0xb5, 0x48 }, { } },
|
||||
.init_key = { 0x3d, 0x61, 0x0f, 0xe7, 0x3b, 0x11, 0xd1, 0xac, 0x90, 0xda, 0xc8, 0xd7, 0x36, 0xa2, 0x3e, 0x5f, 0x50, 0x3d, 0xa3, 0xc4, 0x26, 0x0e, 0x9f, 0xf5, 0xf9, 0x56, 0x5a, 0x7c, 0xb2, 0x2a, 0xed, 0x00 },
|
||||
.k2_info = { 0x53, 0x1f, 0x3c, 0x3d, 0xee, 0xb9, 0xdc, 0x22, 0xb9, 0x89, 0x94, 0x60, 0x30, 0x25, 0x02, 0xf0, 0x42, 0x32, 0xfd, 0x80, 0xfe, 0xe9, 0xfc, 0x0c, 0xc8, 0x6d, 0xa6, 0xe0, 0x99, 0x3b, 0x4f, 0xdd, 0x9c, 0x9a, 0x01, 0x99, 0xe3, 0x69, 0x23, 0xb9, 0xf9, 0xe4, 0x19, 0x66, 0x0b, 0xed, 0xf3, 0x71, 0x68, 0x0a, 0x15, 0x19, 0x7c, 0x17, 0x96, 0x9d, 0xbf, 0x0b, 0xcb, 0x75, 0x2d, 0x05, 0xc1, 0xc3 },
|
||||
.k1_encrypted = { { 0x3f, 0xe8, 0xd7, 0x74, 0x8d, 0xe4, 0xc2, 0x1c, 0x8f, 0x52, 0x5b, 0x3d, 0xa5, 0x9d, 0x43, 0x09, 0xef, 0x26, 0x76, 0x24, 0xfc, 0x3c, 0xc5, 0x3a, 0x84, 0xa2, 0x4c, 0x71, 0xf8, 0xd6, 0x8d, 0xb5 }, { } },
|
||||
.ecdsa_test_data = {
|
||||
.pubx = { 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21 },
|
||||
.puby = { 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 }
|
||||
.pubx = { 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd },
|
||||
.puby = { 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 }
|
||||
}
|
||||
};
|
||||
|
||||
@@ -77,11 +77,11 @@ test_data_aes_mode_t test_data_ecdsa = {
|
||||
test_data_ecdh0_mode_t test_data_ecdh0 = {
|
||||
.plaintext_data = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f, 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57, 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f, 0x60, 0x61, 0x62, 0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6a, 0x6b, 0x6c, 0x6d, 0x6e, 0x6f, 0x70, 0x71, 0x72, 0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80 },
|
||||
.k1 = {
|
||||
{ 0x20, 0x1f, 0x1e, 0x1d, 0x1c, 0x1b, 0x1a, 0x19, 0x18, 0x17, 0x16, 0x15, 0x14, 0x13, 0x12, 0x11, 0x10, 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01 },
|
||||
{ 0x20, 0x1f, 0x1e, 0x1d, 0x1c, 0x1b, 0x1a, 0x19, 0x18, 0x17, 0x16, 0x15, 0x14, 0x13, 0x12, 0x11, 0x10, 0x0f, 0x0e, 0x0d, 0x0c, 0x0b, 0x0a, 0x09, 0x08, 0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01 },
|
||||
{ 0x8e, 0xb5, 0x60, 0xaf, 0x8c, 0x8b, 0xa4, 0x8c, 0x0d, 0x0d, 0x57, 0x74, 0xad, 0xab, 0x7b, 0x5e, 0x72, 0x75, 0x7b, 0x84, 0x4e, 0x83, 0x89, 0x0f, 0x7b, 0xc6, 0xd6, 0x85, 0xed, 0xf3, 0x74, 0xc8 },
|
||||
{ 0x8e, 0xb5, 0x60, 0xaf, 0x8c, 0x8b, 0xa4, 0x8c, 0x0d, 0x0d, 0x57, 0x74, 0xad, 0xab, 0x7b, 0x5e, 0x72, 0x75, 0x7b, 0x84, 0x4e, 0x83, 0x89, 0x0f, 0x7b, 0xc6, 0xd6, 0x85, 0xed, 0xf3, 0x74, 0xc8 },
|
||||
},
|
||||
.k1_G = {
|
||||
{ 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21, 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 },
|
||||
{ 0x8f, 0xc2, 0x37, 0x2e, 0x36, 0x77, 0x8f, 0xc7, 0x59, 0x18, 0xec, 0x39, 0x23, 0x16, 0x6b, 0x0b, 0x4f, 0xf8, 0x19, 0xa8, 0x9f, 0xd9, 0xf7, 0x59, 0x4d, 0x8a, 0x2d, 0x16, 0xd5, 0x84, 0xe1, 0x21, 0xf1, 0x8b, 0x1e, 0x2d, 0x7e, 0xc4, 0x8b, 0xf8, 0xe3, 0xc9, 0xb1, 0x54, 0xa4, 0x65, 0xed, 0x7d, 0xbc, 0x56, 0x1a, 0x66, 0xcd, 0x43, 0x10, 0x2e, 0x46, 0x2a, 0x3f, 0xfe, 0xdb, 0x9a, 0x28, 0xf9 },
|
||||
{ 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd, 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 },
|
||||
{ 0x50, 0xbe, 0xd3, 0xae, 0x26, 0x29, 0x43, 0x71, 0xba, 0xd0, 0xda, 0x24, 0xe9, 0x17, 0x5b, 0xd8, 0x0f, 0xe3, 0x77, 0x81, 0x2c, 0x62, 0x98, 0x53, 0x78, 0x3c, 0x9c, 0x14, 0x3a, 0x31, 0xa6, 0xbd, 0x6c, 0xf7, 0x5d, 0x68, 0xd3, 0xb0, 0x45, 0xc5, 0xdb, 0xdc, 0xf6, 0x9a, 0xf0, 0x3b, 0x0a, 0x47, 0x18, 0xf5, 0x51, 0x92, 0xdb, 0x22, 0x03, 0xc2, 0x10, 0xa8, 0x24, 0x09, 0xff, 0x9d, 0x9c, 0x94 },
|
||||
}
|
||||
};
|
||||
|
@@ -311,7 +311,7 @@ TEST_GROUP(key_manager);
|
||||
TEST_SETUP(key_manager)
|
||||
{
|
||||
test_utils_record_free_mem();
|
||||
TEST_ESP_OK(test_utils_set_leak_level(700, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
|
||||
TEST_ESP_OK(test_utils_set_leak_level(800, ESP_LEAK_TYPE_CRITICAL, ESP_COMP_LEAK_GENERAL));
|
||||
}
|
||||
|
||||
TEST_TEAR_DOWN(key_manager)
|
||||
@@ -368,6 +368,7 @@ TEST_GROUP_RUNNER(key_manager)
|
||||
RUN_TEST_CASE(key_manager, ecdsa_key_ecdh0_deployment);
|
||||
RUN_TEST_CASE(key_manager, ecdsa_key_random_deployment);
|
||||
#if CONFIG_CRYPTO_TEST_APP_ENABLE_FPGA_TESTS
|
||||
// This tests expects Flash encryption to be enabled as the test compares the decrypted flash data with the plaintext data
|
||||
RUN_TEST_CASE(key_manager, xts_key_random_deployment);
|
||||
#endif
|
||||
|
||||
|
Reference in New Issue
Block a user