1bdcc259dSMatthias Ringwald 2bdcc259dSMatthias Ringwald #include <stdio.h> 3bdcc259dSMatthias Ringwald #include <string.h> 4bdcc259dSMatthias Ringwald #include "aes_cmac.h" 5bdcc259dSMatthias Ringwald 6bdcc259dSMatthias Ringwald // #include "btstack_util.h" 7bdcc259dSMatthias Ringwald 8bdcc259dSMatthias Ringwald typedef uint8_t sm_key24_t[3]; 9bdcc259dSMatthias Ringwald typedef uint8_t sm_key56_t[7]; 10bdcc259dSMatthias Ringwald typedef uint8_t sm_key256_t[32]; 11bdcc259dSMatthias Ringwald 12bdcc259dSMatthias Ringwald static const char * key_string = "2b7e1516 28aed2a6 abf71588 09cf4f3c"; 13bdcc259dSMatthias Ringwald static const char * k0_string = "7df76b0c 1ab899b3 3e42f047 b91b546f"; 14bdcc259dSMatthias Ringwald static const char * k1_string = "fbeed618 35713366 7c85e08f 7236a8de"; 15bdcc259dSMatthias Ringwald static const char * k2_string = "f7ddac30 6ae266cc f90bc11e e46d513b"; 16bdcc259dSMatthias Ringwald 17bdcc259dSMatthias Ringwald static const char * m0_string = ""; 18bdcc259dSMatthias Ringwald static const char * cmac_m0_string = "bb1d6929 e9593728 7fa37d12 9b756746"; 19bdcc259dSMatthias Ringwald static const char * m16_string = "6bc1bee2 2e409f96 e93d7e11 7393172a"; 20bdcc259dSMatthias Ringwald static const char * cmac_m16_string = "070a16b4 6b4d4144 f79bdd9d d04a287c"; 21bdcc259dSMatthias Ringwald static const char * m40_string = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411"; 22bdcc259dSMatthias Ringwald static const char * cmac_m40_string = "dfa66747 de9ae630 30ca3261 1497c827"; 23bdcc259dSMatthias Ringwald static const char * m64_string = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411 e5fbc119 1a0a52ef f69f2445 df4f9b17 ad2b417b e66c3710"; 24bdcc259dSMatthias Ringwald static const char * cmac_m64_string = "51f0bebf 7e3b9d92 fc497417 79363cfe"; 25bdcc259dSMatthias Ringwald 26bdcc259dSMatthias Ringwald // f4 27bdcc259dSMatthias Ringwald static const char * f4_u_string = "20b003d2 f297be2c 5e2c83a7 e9f9a5b9 eff49111 acf4fddb cc030148 0e359de6"; 28bdcc259dSMatthias Ringwald static const char * f4_v_string = "55188b3d 32f6bb9a 900afcfb eed4e72a 59cb9ac2 f19d7cfb 6b4fdd49 f47fc5fd"; 29bdcc259dSMatthias Ringwald static const char * f4_x_string = "d5cb8454 d177733e ffffb2ec 712baeab"; 30bdcc259dSMatthias Ringwald static const char * f4_z_string = "00"; 31bdcc259dSMatthias Ringwald static const char * f4_cmac_string = "f2c916f1 07a9bd1c f1eda1be a974872d"; 32bdcc259dSMatthias Ringwald 33bdcc259dSMatthias Ringwald // f5 34bdcc259dSMatthias Ringwald const char * f5_w_string = "ec0234a3 57c8ad05 341010a6 0a397d9b 99796b13 b4f866f1 868d34f3 73bfa698"; 35bdcc259dSMatthias Ringwald const char * f5_t_string = "3c128f20 de883288 97624bdb 8dac6989"; 36bdcc259dSMatthias Ringwald const char * f5_n1_string = "d5cb8454 d177733e ffffb2ec 712baeab"; 37bdcc259dSMatthias Ringwald const char * f5_n2_string = "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf"; 38bdcc259dSMatthias Ringwald const char * f5_a1_string = "00561237 37bfce"; 39bdcc259dSMatthias Ringwald const char * f5_a2_string = "00a71370 2dcfc1"; 40bdcc259dSMatthias Ringwald const char * f5_cmac_string = "2965f176 a1084a02 fd3f6a20 ce636e20 69867911 69d7cd23 980522b5 94750a38"; 41bdcc259dSMatthias Ringwald 42bdcc259dSMatthias Ringwald // f6 43bdcc259dSMatthias Ringwald const char * f6_n1_string = "d5cb8454 d177733e ffffb2ec 712baeab"; 44bdcc259dSMatthias Ringwald const char * f6_n2_string = "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf"; 45bdcc259dSMatthias Ringwald const char * f6_mac_key_string = "2965f176 a1084a02 fd3f6a20 ce636e20"; 46bdcc259dSMatthias Ringwald const char * f6_r_string = "12a3343b b453bb54 08da42d2 0c2d0fc8"; 47bdcc259dSMatthias Ringwald const char * f6_io_cap_string = "010102"; 48bdcc259dSMatthias Ringwald const char * f6_a1_string = "00561237 37bfce"; 49bdcc259dSMatthias Ringwald const char * f6_a2_string = "00a71370 2dcfc1"; 50bdcc259dSMatthias Ringwald const char * f6_cmac_string = "e3c47398 9cd0e8c5 d26c0b09 da958f61"; 51bdcc259dSMatthias Ringwald 52bdcc259dSMatthias Ringwald // g2 53bdcc259dSMatthias Ringwald const char * g2_u_string = "20b003d2 f297be2c 5e2c83a7 e9f9a5b9 eff49111 acf4fddb cc030148 0e359de6"; 54bdcc259dSMatthias Ringwald const char * g2_v_string = "55188b3d 32f6bb9a 900afcfb eed4e72a 59cb9ac2 f19d7cfb 6b4fdd49 f47fc5fd"; 55bdcc259dSMatthias Ringwald const char * g2_x_string = "d5cb8454 d177733e ffffb2ec 712baeab"; 56bdcc259dSMatthias Ringwald const char * g2_y_string = "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf"; 57bdcc259dSMatthias Ringwald // const char * g2_cmac_string = "1536d18d e3d20df9 9b7044c1 2f9ed5ba"; 58bdcc259dSMatthias Ringwald const char * g2_res_string = "2f9ed5ba"; 59bdcc259dSMatthias Ringwald 60bdcc259dSMatthias Ringwald // h6 61bdcc259dSMatthias Ringwald const char * h6_key_string = "ec0234a3 57c8ad05 341010a6 0a397d9b"; 62bdcc259dSMatthias Ringwald const char * h6_key_id_string = "6c656272"; 63bdcc259dSMatthias Ringwald const char * h6_cmac_string = "2d9ae102 e76dc91c e8d3a9e2 80b16399"; 64bdcc259dSMatthias Ringwald 65*57132f12SMatthias Ringwald // h7 66*57132f12SMatthias Ringwald const char * h7_key_string = "ec0234a3 57c8ad05 341010a6 0a397d9b"; 67*57132f12SMatthias Ringwald const char * h7_cmac_string = "fb173597 c6a3c0ec d2998c2a 75a57011"; 68*57132f12SMatthias Ringwald 69*57132f12SMatthias Ringwald 70bdcc259dSMatthias Ringwald static uint32_t big_endian_read_32( const uint8_t * buffer, int pos) { 71bdcc259dSMatthias Ringwald return ((uint32_t) buffer[(pos)+3]) | (((uint32_t)buffer[(pos)+2]) << 8) | (((uint32_t)buffer[(pos)+1]) << 16) | (((uint32_t) buffer[pos]) << 24); 72bdcc259dSMatthias Ringwald } 73bdcc259dSMatthias Ringwald 74bdcc259dSMatthias Ringwald static void big_endian_store_32(uint8_t *buffer, uint16_t pos, uint32_t value){ 75bdcc259dSMatthias Ringwald buffer[pos++] = value >> 24; 76bdcc259dSMatthias Ringwald buffer[pos++] = value >> 16; 77bdcc259dSMatthias Ringwald buffer[pos++] = value >> 8; 78bdcc259dSMatthias Ringwald buffer[pos++] = value; 79bdcc259dSMatthias Ringwald } 80bdcc259dSMatthias Ringwald 81bdcc259dSMatthias Ringwald static void hexdump2(void *data, int size){ 82bdcc259dSMatthias Ringwald if (size <= 0) return; 83bdcc259dSMatthias Ringwald int i; 84bdcc259dSMatthias Ringwald for (i=0; i<size;i++){ 85bdcc259dSMatthias Ringwald printf("%02X ", ((uint8_t *)data)[i]); 86bdcc259dSMatthias Ringwald } 87bdcc259dSMatthias Ringwald printf("\n"); 88bdcc259dSMatthias Ringwald } 89bdcc259dSMatthias Ringwald 90bdcc259dSMatthias Ringwald static int nibble_for_char(char c){ 91bdcc259dSMatthias Ringwald if (c >= '0' && c <= '9') return c - '0'; 92bdcc259dSMatthias Ringwald if (c >= 'a' && c <= 'f') return c - 'a' + 10; 93bdcc259dSMatthias Ringwald if (c >= 'A' && c <= 'F') return c - 'A' + 10; 94bdcc259dSMatthias Ringwald return -1; 95bdcc259dSMatthias Ringwald } 96bdcc259dSMatthias Ringwald 97bdcc259dSMatthias Ringwald static int parse_hex(uint8_t * buffer, const char * hex_string){ 98bdcc259dSMatthias Ringwald int len = 0; 99bdcc259dSMatthias Ringwald while (*hex_string){ 100bdcc259dSMatthias Ringwald if (*hex_string == ' '){ 101bdcc259dSMatthias Ringwald hex_string++; 102bdcc259dSMatthias Ringwald continue; 103bdcc259dSMatthias Ringwald } 104bdcc259dSMatthias Ringwald int high_nibble = nibble_for_char(*hex_string++); 105bdcc259dSMatthias Ringwald int low_nibble = nibble_for_char(*hex_string++); 106bdcc259dSMatthias Ringwald *buffer++ = (high_nibble << 4) | low_nibble; 107bdcc259dSMatthias Ringwald len++; 108bdcc259dSMatthias Ringwald } 109bdcc259dSMatthias Ringwald return len; 110bdcc259dSMatthias Ringwald } 111bdcc259dSMatthias Ringwald 112bdcc259dSMatthias Ringwald #define LOG_KEY(NAME) { printf("%16s: ", #NAME); hexdump2(NAME, 16); } 113bdcc259dSMatthias Ringwald #define PARSE_KEY(NAME) { parse_hex(NAME, NAME##_string); LOG_KEY(NAME); } 114bdcc259dSMatthias Ringwald #define VALIDATE_KEY(NAME) { LOG_KEY(NAME); sm_key_t test; parse_hex(test, NAME##_string); if (memcmp(NAME, test, 16)){ printf("Error calculating key\n"); } } 115bdcc259dSMatthias Ringwald #define VALIDATE_MESSAGE(NAME) validate_message(#NAME, NAME##_string, cmac_##NAME##_string) 116bdcc259dSMatthias Ringwald 117bdcc259dSMatthias Ringwald 118bdcc259dSMatthias Ringwald static void validate_message(const char * name, const char * message_string, const char * cmac_string){ 119bdcc259dSMatthias Ringwald 120bdcc259dSMatthias Ringwald uint8_t m[128]; 121bdcc259dSMatthias Ringwald int len = parse_hex(m, message_string); 122bdcc259dSMatthias Ringwald 123bdcc259dSMatthias Ringwald sm_key_t cmac; 124bdcc259dSMatthias Ringwald parse_hex(cmac, cmac_string); 125bdcc259dSMatthias Ringwald 126bdcc259dSMatthias Ringwald printf("-- verify message %s, len %u:\nm: %s\ncmac: %s\n", name, len, message_string, cmac_string); 127bdcc259dSMatthias Ringwald 128bdcc259dSMatthias Ringwald sm_key_t key; 129bdcc259dSMatthias Ringwald parse_hex(key, key_string); 130bdcc259dSMatthias Ringwald 131bdcc259dSMatthias Ringwald sm_key_t cmac_test; 132bdcc259dSMatthias Ringwald aes_cmac(cmac_test, key, m, len); 133bdcc259dSMatthias Ringwald 134bdcc259dSMatthias Ringwald LOG_KEY(cmac_test); 135bdcc259dSMatthias Ringwald 136bdcc259dSMatthias Ringwald if (memcmp(cmac_test, cmac, 16)){ 137bdcc259dSMatthias Ringwald printf("CMAC incorrect!\n"); 138bdcc259dSMatthias Ringwald } else { 139bdcc259dSMatthias Ringwald printf("CMAC correct!\n"); 140bdcc259dSMatthias Ringwald } 141bdcc259dSMatthias Ringwald } 142bdcc259dSMatthias Ringwald 143bdcc259dSMatthias Ringwald static void f4(sm_key_t res, const sm_key256_t u, const sm_key256_t v, const sm_key_t x, uint8_t z){ 144bdcc259dSMatthias Ringwald uint8_t buffer[65]; 145bdcc259dSMatthias Ringwald memcpy(buffer, u, 32); 146bdcc259dSMatthias Ringwald memcpy(buffer+32, v, 32); 147bdcc259dSMatthias Ringwald buffer[64] = z; 148bdcc259dSMatthias Ringwald // hexdump2(buffer, sizeof(buffer)); 149bdcc259dSMatthias Ringwald aes_cmac(res, x, buffer, sizeof(buffer)); 150bdcc259dSMatthias Ringwald } 151bdcc259dSMatthias Ringwald 152bdcc259dSMatthias Ringwald const sm_key_t f5_salt = { 0x6C ,0x88, 0x83, 0x91, 0xAA, 0xF5, 0xA5, 0x38, 0x60, 0x37, 0x0B, 0xDB, 0x5A, 0x60, 0x83, 0xBE}; 153bdcc259dSMatthias Ringwald const uint8_t f5_key_id[] = { 0x62, 0x74, 0x6c, 0x65 }; 154bdcc259dSMatthias Ringwald const uint8_t f5_length[] = { 0x01, 0x00}; 155bdcc259dSMatthias Ringwald static void f5(sm_key256_t res, const sm_key256_t w, const sm_key_t n1, const sm_key_t n2, const sm_key56_t a1, const sm_key56_t a2){ 156bdcc259dSMatthias Ringwald // T = AES-CMACSAL_T(W) 157bdcc259dSMatthias Ringwald sm_key_t t; 158bdcc259dSMatthias Ringwald aes_cmac(t, f5_salt, w, 32); 159bdcc259dSMatthias Ringwald // f5(W, N1, N2, A1, A2) = AES-CMACT (Counter = 0 || keyID || N1 || N2|| A1|| A2 || Length = 256) -- this is the MacKey 160bdcc259dSMatthias Ringwald uint8_t buffer[53]; 161bdcc259dSMatthias Ringwald buffer[0] = 0; 162bdcc259dSMatthias Ringwald memcpy(buffer+01, f5_key_id, 4); 163bdcc259dSMatthias Ringwald memcpy(buffer+05, n1, 16); 164bdcc259dSMatthias Ringwald memcpy(buffer+21, n2, 16); 165bdcc259dSMatthias Ringwald memcpy(buffer+37, a1, 7); 166bdcc259dSMatthias Ringwald memcpy(buffer+44, a2, 7); 167bdcc259dSMatthias Ringwald memcpy(buffer+51, f5_length, 2); 168bdcc259dSMatthias Ringwald // hexdump2(buffer, sizeof(buffer)); 169bdcc259dSMatthias Ringwald aes_cmac(res, t, buffer, sizeof(buffer)); 170bdcc259dSMatthias Ringwald // hexdump2(res, 16); 171bdcc259dSMatthias Ringwald // || AES-CMACT (Counter = 1 || keyID || N1 || N2|| A1|| A2 || Length = 256) -- this is the LTK 172bdcc259dSMatthias Ringwald buffer[0] = 1; 173bdcc259dSMatthias Ringwald // hexdump2(buffer, sizeof(buffer)); 174bdcc259dSMatthias Ringwald aes_cmac(res+16, t, buffer, sizeof(buffer)); 175bdcc259dSMatthias Ringwald // hexdump2(res+16, 16); 176bdcc259dSMatthias Ringwald } 177bdcc259dSMatthias Ringwald 178bdcc259dSMatthias Ringwald // f6(W, N1, N2, R, IOcap, A1, A2) = AES-CMACW (N1 || N2 || R || IOcap || A1 || A2 179bdcc259dSMatthias Ringwald // - W is 128 bits 180bdcc259dSMatthias Ringwald // - N1 is 128 bits 181bdcc259dSMatthias Ringwald // - N2 is 128 bits 182bdcc259dSMatthias Ringwald // - R is 128 bits 183bdcc259dSMatthias Ringwald // - IOcap is 24 bits 184bdcc259dSMatthias Ringwald // - A1 is 56 bits 185bdcc259dSMatthias Ringwald // - A2 is 56 bits 186bdcc259dSMatthias Ringwald static void f6(sm_key_t res, const sm_key_t w, const sm_key_t n1, const sm_key_t n2, const sm_key_t r, const sm_key24_t io_cap, const sm_key56_t a1, const sm_key56_t a2){ 187bdcc259dSMatthias Ringwald uint8_t buffer[65]; 188bdcc259dSMatthias Ringwald memcpy(buffer, n1, 16); 189bdcc259dSMatthias Ringwald memcpy(buffer+16, n2, 16); 190bdcc259dSMatthias Ringwald memcpy(buffer+32, r, 16); 191bdcc259dSMatthias Ringwald memcpy(buffer+48, io_cap, 3); 192bdcc259dSMatthias Ringwald memcpy(buffer+51, a1, 7); 193bdcc259dSMatthias Ringwald memcpy(buffer+58, a2, 7); 194bdcc259dSMatthias Ringwald aes_cmac(res, w, buffer,sizeof(buffer)); 195bdcc259dSMatthias Ringwald } 196bdcc259dSMatthias Ringwald 197bdcc259dSMatthias Ringwald // g2(U, V, X, Y) = AES-CMACX(U || V || Y) mod 2^32 198bdcc259dSMatthias Ringwald // - U is 256 bits 199bdcc259dSMatthias Ringwald // - V is 256 bits 200bdcc259dSMatthias Ringwald // - X is 128 bits 201bdcc259dSMatthias Ringwald // - Y is 128 bits 202bdcc259dSMatthias Ringwald static uint32_t g2(const sm_key256_t u, const sm_key256_t v, const sm_key_t x, const sm_key_t y){ 203bdcc259dSMatthias Ringwald uint8_t buffer[80]; 204bdcc259dSMatthias Ringwald memcpy(buffer, u, 32); 205bdcc259dSMatthias Ringwald memcpy(buffer+32, v, 32); 206bdcc259dSMatthias Ringwald memcpy(buffer+64, y, 16); 207bdcc259dSMatthias Ringwald sm_key_t cmac; 208bdcc259dSMatthias Ringwald aes_cmac(cmac, x, buffer, sizeof(buffer)); 209bdcc259dSMatthias Ringwald return big_endian_read_32(cmac, 12); 210bdcc259dSMatthias Ringwald } 211bdcc259dSMatthias Ringwald 212*57132f12SMatthias Ringwald // h6(W, keyID) = AES-CMAC_W(keyID) 213bdcc259dSMatthias Ringwald // - W is 128 bits 214bdcc259dSMatthias Ringwald // - keyID is 32 bits 215bdcc259dSMatthias Ringwald static void h6(sm_key_t res, const sm_key_t w, const uint32_t key_id){ 216bdcc259dSMatthias Ringwald uint8_t key_id_buffer[4]; 217bdcc259dSMatthias Ringwald big_endian_store_32(key_id_buffer, 0, key_id); 218bdcc259dSMatthias Ringwald aes_cmac(res, w, key_id_buffer, 4); 219bdcc259dSMatthias Ringwald } 220bdcc259dSMatthias Ringwald 221*57132f12SMatthias Ringwald // h7(SALT, W) = AES-CMAC_SALT(W) 222*57132f12SMatthias Ringwald // - SALT is 128 bit 223*57132f12SMatthias Ringwald // - W is 128 bits 224*57132f12SMatthias Ringwald static void h7(sm_key_t res, const sm_key_t salt, const sm_key_t w){ 225*57132f12SMatthias Ringwald uint8_t key_id_buffer[4]; 226*57132f12SMatthias Ringwald aes_cmac(res, salt, w, 16); 227*57132f12SMatthias Ringwald } 228*57132f12SMatthias Ringwald 229bdcc259dSMatthias Ringwald int main(void){ 230bdcc259dSMatthias Ringwald sm_key_t key, k0, k1, k2, zero; 231bdcc259dSMatthias Ringwald memset(zero, 0, 16); 232bdcc259dSMatthias Ringwald PARSE_KEY(key); 233bdcc259dSMatthias Ringwald 234bdcc259dSMatthias Ringwald // validate subkey k0,k1,k2 generation 235bdcc259dSMatthias Ringwald aes128_calc_cyphertext(key, zero, k0); 236bdcc259dSMatthias Ringwald VALIDATE_KEY(k0); 237bdcc259dSMatthias Ringwald aes_cmac_calc_subkeys(k0, k1, k2); 238bdcc259dSMatthias Ringwald VALIDATE_KEY(k1); 239bdcc259dSMatthias Ringwald VALIDATE_KEY(k2); 240bdcc259dSMatthias Ringwald 241bdcc259dSMatthias Ringwald // validate AES_CMAC for some messages 242bdcc259dSMatthias Ringwald VALIDATE_MESSAGE(m0); 243bdcc259dSMatthias Ringwald VALIDATE_MESSAGE(m16); 244bdcc259dSMatthias Ringwald VALIDATE_MESSAGE(m40); 245bdcc259dSMatthias Ringwald VALIDATE_MESSAGE(m64); 246bdcc259dSMatthias Ringwald 247bdcc259dSMatthias Ringwald // validate f4 248bdcc259dSMatthias Ringwald printf("-- verify f4\n"); 249bdcc259dSMatthias Ringwald sm_key_t f4_x, f4_cmac, f4_cmac_test; 250bdcc259dSMatthias Ringwald sm_key256_t f4_u, f4_v; 251bdcc259dSMatthias Ringwald uint8_t f4_z; 252bdcc259dSMatthias Ringwald parse_hex(f4_cmac, f4_cmac_string); 253bdcc259dSMatthias Ringwald parse_hex(f4_u, f4_u_string); 254bdcc259dSMatthias Ringwald parse_hex(f4_v, f4_v_string); 255bdcc259dSMatthias Ringwald parse_hex(f4_x, f4_x_string); 256bdcc259dSMatthias Ringwald parse_hex(&f4_z, f4_z_string); 257bdcc259dSMatthias Ringwald f4(f4_cmac_test, f4_u, f4_v, f4_x, f4_z); 258bdcc259dSMatthias Ringwald if (memcmp(f4_cmac_test, f4_cmac, 16)){ 259bdcc259dSMatthias Ringwald printf("CMAC incorrect!\n"); 260bdcc259dSMatthias Ringwald } else { 261bdcc259dSMatthias Ringwald printf("CMAC correct!\n"); 262bdcc259dSMatthias Ringwald } 263bdcc259dSMatthias Ringwald 264bdcc259dSMatthias Ringwald // valdiate f5 265bdcc259dSMatthias Ringwald printf("-- verify f5\n"); 266bdcc259dSMatthias Ringwald sm_key_t f5_cmac, f5_mackey, f5_n1, f5_n2; 267bdcc259dSMatthias Ringwald sm_key56_t f5_a1, f5_a2; 268bdcc259dSMatthias Ringwald sm_key256_t f5_w, f5_res; 269bdcc259dSMatthias Ringwald uint8_t f5_z; 270bdcc259dSMatthias Ringwald parse_hex(f5_w, f5_w_string); 271bdcc259dSMatthias Ringwald parse_hex(f5_n1, f5_n1_string); 272bdcc259dSMatthias Ringwald parse_hex(f5_n2, f5_n2_string); 273bdcc259dSMatthias Ringwald parse_hex(f5_a1, f5_a1_string); 274bdcc259dSMatthias Ringwald parse_hex(f5_a2, f5_a2_string); 275bdcc259dSMatthias Ringwald f5(f5_res, f5_w, f5_n1, f5_n2, f5_a1, f5_a2); 276bdcc259dSMatthias Ringwald printf("MacKey:"); 277bdcc259dSMatthias Ringwald hexdump2(f5_res, 16); 278bdcc259dSMatthias Ringwald printf("LTK: "); 279bdcc259dSMatthias Ringwald hexdump2(f5_res+16, 16); 280bdcc259dSMatthias Ringwald parse_hex(f5_cmac, f5_cmac_string); 281bdcc259dSMatthias Ringwald if (memcmp(f5_res, f5_cmac, 16)){ 282bdcc259dSMatthias Ringwald printf("CMAC incorrect!\n"); 283bdcc259dSMatthias Ringwald } else { 284bdcc259dSMatthias Ringwald printf("CMAC correct!\n"); 285bdcc259dSMatthias Ringwald } 286bdcc259dSMatthias Ringwald 287bdcc259dSMatthias Ringwald // validate f6 288bdcc259dSMatthias Ringwald printf("-- verify f6\n"); 289bdcc259dSMatthias Ringwald sm_key_t f6_cmac, f6_mac_key, f6_n1, f6_n2, f6_r, f6_res; 290bdcc259dSMatthias Ringwald sm_key24_t f6_io_cap; 291bdcc259dSMatthias Ringwald sm_key56_t f6_a1, f6_a2; 292bdcc259dSMatthias Ringwald uint8_t f6_z; 293bdcc259dSMatthias Ringwald parse_hex(f6_n1, f6_n1_string); 294bdcc259dSMatthias Ringwald parse_hex(f6_n2, f6_n2_string); 295bdcc259dSMatthias Ringwald parse_hex(f6_a1, f6_a1_string); 296bdcc259dSMatthias Ringwald parse_hex(f6_a2, f6_a2_string); 297bdcc259dSMatthias Ringwald parse_hex(f6_mac_key, f6_mac_key_string); 298bdcc259dSMatthias Ringwald parse_hex(f6_r, f6_r_string); 299bdcc259dSMatthias Ringwald parse_hex(f6_io_cap, f6_io_cap_string); 300bdcc259dSMatthias Ringwald f6(f6_res, f6_mac_key, f6_n1, f6_n2, f6_r, f6_io_cap, f6_a1, f6_a2); 301bdcc259dSMatthias Ringwald hexdump2(f6_res, 16); 302bdcc259dSMatthias Ringwald parse_hex(f6_cmac, f6_cmac_string); 303bdcc259dSMatthias Ringwald if (memcmp(f6_res, f6_cmac, 16)){ 304bdcc259dSMatthias Ringwald printf("CMAC incorrect!\n"); 305bdcc259dSMatthias Ringwald } else { 306bdcc259dSMatthias Ringwald printf("CMAC correct!\n"); 307bdcc259dSMatthias Ringwald } 308bdcc259dSMatthias Ringwald 309bdcc259dSMatthias Ringwald // validate g2 310bdcc259dSMatthias Ringwald printf("-- verify g2\n"); 311bdcc259dSMatthias Ringwald sm_key_t g2_cmac, g2_x, g2_y; 312bdcc259dSMatthias Ringwald sm_key256_t g2_u, g2_v; 313bdcc259dSMatthias Ringwald parse_hex(g2_x, g2_x_string); 314bdcc259dSMatthias Ringwald parse_hex(g2_y, g2_y_string); 315bdcc259dSMatthias Ringwald parse_hex(g2_u, g2_u_string); 316bdcc259dSMatthias Ringwald parse_hex(g2_v, g2_v_string); 317bdcc259dSMatthias Ringwald uint32_t g2_test = g2(g2_u, g2_v, g2_x, g2_y); 318bdcc259dSMatthias Ringwald printf("%08x\n", g2_test); 319bdcc259dSMatthias Ringwald uint8_t g2_res_buffer[4]; 320bdcc259dSMatthias Ringwald parse_hex(g2_res_buffer, g2_res_string); 321bdcc259dSMatthias Ringwald uint32_t g2_res = big_endian_read_32(g2_res_buffer, 0); 322bdcc259dSMatthias Ringwald if (g2_test != g2_res){ 323bdcc259dSMatthias Ringwald printf("G2 incorrect!\n"); 324bdcc259dSMatthias Ringwald } else { 325bdcc259dSMatthias Ringwald printf("G2 correct!\n"); 326bdcc259dSMatthias Ringwald } 327bdcc259dSMatthias Ringwald 328bdcc259dSMatthias Ringwald // validate h6 329bdcc259dSMatthias Ringwald printf("-- verify h6\n"); 330bdcc259dSMatthias Ringwald sm_key_t h6_key, h6_res, h6_cmac; 331bdcc259dSMatthias Ringwald uint8_t h6_key_id_buffer[4]; 332bdcc259dSMatthias Ringwald parse_hex(h6_key, h6_key_string); 333bdcc259dSMatthias Ringwald parse_hex(h6_key_id_buffer, h6_key_id_string); 334bdcc259dSMatthias Ringwald parse_hex(h6_cmac, h6_cmac_string); 335bdcc259dSMatthias Ringwald uint32_t h6_key_id = big_endian_read_32(h6_key_id_buffer, 0); 336bdcc259dSMatthias Ringwald h6(h6_res, h6_key, h6_key_id); 337bdcc259dSMatthias Ringwald hexdump2(h6_res, 16); 338bdcc259dSMatthias Ringwald if (memcmp(h6_res, h6_cmac, 16)){ 339bdcc259dSMatthias Ringwald printf("CMAC incorrect!\n"); 340bdcc259dSMatthias Ringwald } else { 341bdcc259dSMatthias Ringwald printf("CMAC correct!\n"); 342bdcc259dSMatthias Ringwald } 343*57132f12SMatthias Ringwald 344*57132f12SMatthias Ringwald // validate h7 345*57132f12SMatthias Ringwald printf("-- verify h7\n"); 346*57132f12SMatthias Ringwald sm_key_t h7_key, h7_res, h7_cmac; 347*57132f12SMatthias Ringwald const uint8_t salt[16] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x74, 0x6D, 0x70, 0x31 }; // "tmp1" 348*57132f12SMatthias Ringwald parse_hex(h7_key, h7_key_string); 349*57132f12SMatthias Ringwald parse_hex(h7_cmac, h7_cmac_string); 350*57132f12SMatthias Ringwald h7(h7_res, salt, h7_key); 351*57132f12SMatthias Ringwald hexdump2(h7_res, 16); 352*57132f12SMatthias Ringwald if (memcmp(h7_res, h7_cmac, 16)){ 353*57132f12SMatthias Ringwald printf("CMAC incorrect!\n"); 354*57132f12SMatthias Ringwald } else { 355*57132f12SMatthias Ringwald printf("CMAC correct!\n"); 356*57132f12SMatthias Ringwald } 357bdcc259dSMatthias Ringwald } 358