/* ==================================================================== * Copyright (c) 2014 - 2018 The GmSSL Project. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * "This product includes software developed by the GmSSL Project. * (http://gmssl.org/)" * * 4. The name "GmSSL Project" must not be used to endorse or promote * products derived from this software without prior written * permission. For written permission, please contact * guanzhi1980@gmail.com. * * 5. Products derived from this software may not be called "GmSSL" * nor may "GmSSL" appear in their names without prior written * permission of the GmSSL Project. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * "This product includes software developed by the GmSSL Project * (http://gmssl.org/)" * * THIS SOFTWARE IS PROVIDED BY THE GmSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE GmSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== */ #include #include #include #include "../e_os.h" #ifdef OPENSSL_NO_ZUC int main(int argc, char **argv) { printf("NO ZUC support\n"); return 0; } #else # include # include /* static int zuc_128eea3_test1(void) { unsigned char ck[] = { 0x17,0x3d,0x14,0xba,0x50,0x03,0x73,0x1d,0x7a,0x60,0x04,0x94,0x70,0xf0,0x0a,0x29, }; uint32_t count = 0x66035492; uint8_t bearer = 0x0f; uint8_t direction = 0; uint32_t length = c1; unsigned char ibs[] = { 0x6cf65340, 735552ab, } static int zuc_eia3_test1(void) { unsigned char key[16] = {0}; uint32_t count = 0; uint32_t bearer = 0; int direction = 0; uint32_t m[1] = {0}; uint32_t mac1 = 0xc8a9595e; uint32_t mac2 = 0; eia3(key, count, bearer, direction, m, sizeof(m), &mac2); if (mac1 != mac2) { return 0; } return 1; } static int zuc_eia3_test2(int verbose) { unsigned char key[16] = { 0xc9, 0xe6, 0xce, 0xc4, 0x60, 0x7c, 0x72, 0xdb, 0x00, 0x0a, 0xef, 0xa8, 0x83, 0x85, 0xab, 0x0a, }; uint32_t count = 0xa94059da; uint32_t bearer = 0x0a; int direction = 1; int length = 241; uint32_t m[] = { 0x01, }; uint32_t mac1; uint32_t mac2; eia3(key, count, bearer, direction, m, sizeof(m), &mac2); if (mac1 != mac2) { return 0; } return 1; } */ int main(int argc, char **argv) { int err = 0; int i; unsigned char key[][16] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}, {0x3d,0x4c,0x4b,0xe9,0x6a,0x82,0xfd,0xae,0xb5,0x8f,0x64,0x1d,0xb1,0x7b,0x45,0x5b}, }; unsigned char iv[][16] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}, {0x84,0x31,0x9a,0xa8,0xde,0x69,0x15,0xca,0x1f,0x6b,0xda,0x6b,0xfb,0xd8,0xc7,0x66}, }; uint32_t ciphertext[][2] = { {0x27bede74, 0x018082da}, {0x0657cfa0, 0x7096398b}, {0x14f1c272, 0x3279c419}, }; for (i = 0; i < 3; i++) { ZUC_KEY zuc = {{0}}; uint32_t buf[3] = {0}; ZUC_set_key(&zuc, key[i], iv[i]); ZUC_generate_keystream(&zuc, 2, buf); printf("%08x %08x\n", buf[0], buf[1]); printf("%08x %08x\n", ciphertext[i][0], ciphertext[i][1]); if (buf[0] != ciphertext[i][0] || buf[1] != ciphertext[i][1]) { fprintf(stderr, "error generating ZUC key stream on test vector %d\n", i); err++; } else { fprintf(stderr, "ZUC test vector %d success\n", i); } } return err; } #if 0 int zuc256test(int argc, char **argv) { int err = 0; int i; unsigned char key[][32] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff} }; unsigned char iv[][23] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff} }; uint32_t ciphertext[][20] = { {0x58d03ad6,0x2e032ce2,0xdafc683a,0x39bdcb03,0x52a2bc67, 0xf1b7de74,0x163ce3a1,0x01ef5558,0x9639d75b,0x95fa681b, 0x7f090df7,0x56391ccc,0x903b7612,0x744d544c,0x17bc3fad, 0x8b163b08,0x21787c0b,0x97775bb8,0x4943c6bb,0xe8ad8afd}, {0x3356cbae,0xd1a1c18b,0x6baa4ffe,0x343f777c,0x9e15128f, 0x251ab65b,0x949f7b26,0xef7157f2,0x96dd2fa9,0xdf95e3ee, 0x7a5be02e,0xc32ba585,0x505af316,0xc2f9ded2,0x7cdbd935, 0xe441ce11,0x15fd0a80,0xbb7aef67,0x68989416,0xb8fac8c2} }; for (i = 0; i < 3; i++) { ZUC_KEY zuc = {{0}}; uint32_t buf[3] = {0}; ZUC_set_key(&zuc, key[i], iv[i]); ZUC_generate_keystream(&zuc, 2, buf); printf("%08x %08x\n", buf[0], buf[1]); printf("%08x %08x\n", ciphertext[i][0], ciphertext[i][1]); if (buf[0] != ciphertext[i][0] || buf[1] != ciphertext[i][1]) { fprintf(stderr, "error generating ZUC key stream on test vector %d\n", i); err++; } else { fprintf(stderr, "ZUC test vector %d success\n", i); } } return err; } int zuc256mactest(void) { unsigned char key[][32] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff} }; unsigned char iv[][23] = { {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}, {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff} }; unsigned char msg[][] = { /* 400 zero bits */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, /* 4000 one bits */ {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff}, /* 400 zero bits */ {0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, 0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00}, /* 4000 one bits */ {0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff, 0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff} }; unsigned int msg_num[] = { 1, 10, 1, 10 }; unsigned int tag32[] = { 0x9b972a74, 0x8754f5cf, 0x1f3079b4, 0x5c7c8b88 }; unsigned int tag64[][2] = { {0x673e5499,0x0034d38c}, {0x130dc225,0xe72240cc}, {0x8c71394d,0x39957725}, {0xea1dee54,0x4bb6223b} }; unsigned int tag128[][4] = { {0xd85e54bb,0xcb960096,0x7084c952,0xa1654b26}, 0xdf1e8307,0xb31cc62b,0xeca1ac6f,0x8190c22f}, 0xa35bb274,0xb567c48b,0x28319f11,0x1af34fbd}, 0x3a83b554,0xbe408ca5,0x494124ed,0x9d473205} }; ZUC_KEY zuc = {{0}}; unsigned int mac32[1] = {0}; unsigned int mac64[2] = {0}; unsigned int mac128[4] = {0}; for (i = 0; i < sizeof(key)/sizeof(key[0]); i++) { ZUC_set_key(&zuc, key[i], iv[i]); ZUC_generate_keystream(&zuc, 2, buf); } } #endif #endif