xref: /btstack/test/crypto/aes_cmac_test.c (revision bdcc259dd8c0aa29488a4188724cdce95d77c19a)
1*bdcc259dSMatthias Ringwald 
2*bdcc259dSMatthias Ringwald #include <stdio.h>
3*bdcc259dSMatthias Ringwald #include <string.h>
4*bdcc259dSMatthias Ringwald #include "aes_cmac.h"
5*bdcc259dSMatthias Ringwald 
6*bdcc259dSMatthias Ringwald // #include "btstack_util.h"
7*bdcc259dSMatthias Ringwald 
8*bdcc259dSMatthias Ringwald typedef uint8_t sm_key24_t[3];
9*bdcc259dSMatthias Ringwald typedef uint8_t sm_key56_t[7];
10*bdcc259dSMatthias Ringwald typedef uint8_t sm_key256_t[32];
11*bdcc259dSMatthias Ringwald 
12*bdcc259dSMatthias Ringwald static const char * key_string      = "2b7e1516 28aed2a6 abf71588 09cf4f3c";
13*bdcc259dSMatthias Ringwald static const char * k0_string       = "7df76b0c 1ab899b3 3e42f047 b91b546f";
14*bdcc259dSMatthias Ringwald static const char * k1_string       = "fbeed618 35713366 7c85e08f 7236a8de";
15*bdcc259dSMatthias Ringwald static const char * k2_string       = "f7ddac30 6ae266cc f90bc11e e46d513b";
16*bdcc259dSMatthias Ringwald 
17*bdcc259dSMatthias Ringwald static const char * m0_string       = "";
18*bdcc259dSMatthias Ringwald static const char * cmac_m0_string  = "bb1d6929 e9593728 7fa37d12 9b756746";
19*bdcc259dSMatthias Ringwald static const char * m16_string       = "6bc1bee2 2e409f96 e93d7e11 7393172a";
20*bdcc259dSMatthias Ringwald static const char * cmac_m16_string  = "070a16b4 6b4d4144 f79bdd9d d04a287c";
21*bdcc259dSMatthias Ringwald static const char * m40_string       = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411";
22*bdcc259dSMatthias Ringwald static const char * cmac_m40_string  = "dfa66747 de9ae630 30ca3261 1497c827";
23*bdcc259dSMatthias Ringwald static const char * m64_string       = "6bc1bee2 2e409f96 e93d7e11 7393172a ae2d8a57 1e03ac9c 9eb76fac 45af8e51 30c81c46 a35ce411 e5fbc119 1a0a52ef f69f2445 df4f9b17 ad2b417b e66c3710";
24*bdcc259dSMatthias Ringwald static const char * cmac_m64_string  = "51f0bebf 7e3b9d92 fc497417 79363cfe";
25*bdcc259dSMatthias Ringwald 
26*bdcc259dSMatthias Ringwald // f4
27*bdcc259dSMatthias Ringwald static const char * f4_u_string 	= "20b003d2 f297be2c 5e2c83a7 e9f9a5b9 eff49111 acf4fddb cc030148 0e359de6";
28*bdcc259dSMatthias Ringwald static const char * f4_v_string 	= "55188b3d 32f6bb9a 900afcfb eed4e72a 59cb9ac2 f19d7cfb 6b4fdd49 f47fc5fd";
29*bdcc259dSMatthias Ringwald static const char * f4_x_string 	= "d5cb8454 d177733e ffffb2ec 712baeab";
30*bdcc259dSMatthias Ringwald static const char * f4_z_string 	= "00";
31*bdcc259dSMatthias Ringwald static const char * f4_cmac_string 	= "f2c916f1 07a9bd1c f1eda1be a974872d";
32*bdcc259dSMatthias Ringwald 
33*bdcc259dSMatthias Ringwald // f5
34*bdcc259dSMatthias Ringwald const char * f5_w_string       = "ec0234a3 57c8ad05 341010a6 0a397d9b 99796b13 b4f866f1 868d34f3 73bfa698";
35*bdcc259dSMatthias Ringwald const char * f5_t_string       = "3c128f20 de883288 97624bdb 8dac6989";
36*bdcc259dSMatthias Ringwald const char * f5_n1_string      = "d5cb8454 d177733e ffffb2ec 712baeab";
37*bdcc259dSMatthias Ringwald const char * f5_n2_string      = "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf";
38*bdcc259dSMatthias Ringwald const char * f5_a1_string      = "00561237 37bfce";
39*bdcc259dSMatthias Ringwald const char * f5_a2_string      = "00a71370 2dcfc1";
40*bdcc259dSMatthias Ringwald const char * f5_cmac_string    = "2965f176 a1084a02 fd3f6a20 ce636e20 69867911 69d7cd23 980522b5 94750a38";
41*bdcc259dSMatthias Ringwald 
42*bdcc259dSMatthias Ringwald // f6
43*bdcc259dSMatthias Ringwald const char * f6_n1_string 	 	= "d5cb8454 d177733e ffffb2ec 712baeab";
44*bdcc259dSMatthias Ringwald const char * f6_n2_string 	 	= "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf";
45*bdcc259dSMatthias Ringwald const char * f6_mac_key_string 	= "2965f176 a1084a02 fd3f6a20 ce636e20";
46*bdcc259dSMatthias Ringwald const char * f6_r_string 	 	= "12a3343b b453bb54 08da42d2 0c2d0fc8";
47*bdcc259dSMatthias Ringwald const char * f6_io_cap_string 	= "010102";
48*bdcc259dSMatthias Ringwald const char * f6_a1_string 	 	= "00561237 37bfce";
49*bdcc259dSMatthias Ringwald const char * f6_a2_string 	 	= "00a71370 2dcfc1";
50*bdcc259dSMatthias Ringwald const char * f6_cmac_string 	= "e3c47398 9cd0e8c5 d26c0b09 da958f61";
51*bdcc259dSMatthias Ringwald 
52*bdcc259dSMatthias Ringwald // g2
53*bdcc259dSMatthias Ringwald const char * g2_u_string 	 	= "20b003d2 f297be2c 5e2c83a7 e9f9a5b9 eff49111 acf4fddb cc030148 0e359de6";
54*bdcc259dSMatthias Ringwald const char * g2_v_string 	 	= "55188b3d 32f6bb9a 900afcfb eed4e72a 59cb9ac2 f19d7cfb 6b4fdd49 f47fc5fd";
55*bdcc259dSMatthias Ringwald const char * g2_x_string 	 	= "d5cb8454 d177733e ffffb2ec 712baeab";
56*bdcc259dSMatthias Ringwald const char * g2_y_string 	 	= "a6e8e7cc 25a75f6e 216583f7 ff3dc4cf";
57*bdcc259dSMatthias Ringwald // const char * g2_cmac_string 	= "1536d18d e3d20df9 9b7044c1 2f9ed5ba";
58*bdcc259dSMatthias Ringwald const char * g2_res_string 	 	= "2f9ed5ba";
59*bdcc259dSMatthias Ringwald 
60*bdcc259dSMatthias Ringwald // h6
61*bdcc259dSMatthias Ringwald const char * h6_key_string 	    = "ec0234a3 57c8ad05 341010a6 0a397d9b";
62*bdcc259dSMatthias Ringwald const char * h6_key_id_string 	= "6c656272";
63*bdcc259dSMatthias Ringwald const char * h6_cmac_string     = "2d9ae102 e76dc91c e8d3a9e2 80b16399";
64*bdcc259dSMatthias Ringwald 
65*bdcc259dSMatthias Ringwald static uint32_t big_endian_read_32( const uint8_t * buffer, int pos) {
66*bdcc259dSMatthias Ringwald     return ((uint32_t) buffer[(pos)+3]) | (((uint32_t)buffer[(pos)+2]) << 8) | (((uint32_t)buffer[(pos)+1]) << 16) | (((uint32_t) buffer[pos]) << 24);
67*bdcc259dSMatthias Ringwald }
68*bdcc259dSMatthias Ringwald 
69*bdcc259dSMatthias Ringwald static void big_endian_store_32(uint8_t *buffer, uint16_t pos, uint32_t value){
70*bdcc259dSMatthias Ringwald     buffer[pos++] = value >> 24;
71*bdcc259dSMatthias Ringwald     buffer[pos++] = value >> 16;
72*bdcc259dSMatthias Ringwald     buffer[pos++] = value >> 8;
73*bdcc259dSMatthias Ringwald     buffer[pos++] = value;
74*bdcc259dSMatthias Ringwald }
75*bdcc259dSMatthias Ringwald 
76*bdcc259dSMatthias Ringwald static void hexdump2(void *data, int size){
77*bdcc259dSMatthias Ringwald     if (size <= 0) return;
78*bdcc259dSMatthias Ringwald     int i;
79*bdcc259dSMatthias Ringwald     for (i=0; i<size;i++){
80*bdcc259dSMatthias Ringwald         printf("%02X ", ((uint8_t *)data)[i]);
81*bdcc259dSMatthias Ringwald     }
82*bdcc259dSMatthias Ringwald     printf("\n");
83*bdcc259dSMatthias Ringwald }
84*bdcc259dSMatthias Ringwald 
85*bdcc259dSMatthias Ringwald static int nibble_for_char(char c){
86*bdcc259dSMatthias Ringwald     if (c >= '0' && c <= '9') return c - '0';
87*bdcc259dSMatthias Ringwald     if (c >= 'a' && c <= 'f') return c - 'a' + 10;
88*bdcc259dSMatthias Ringwald     if (c >= 'A' && c <= 'F') return c - 'A' + 10;
89*bdcc259dSMatthias Ringwald     return -1;
90*bdcc259dSMatthias Ringwald }
91*bdcc259dSMatthias Ringwald 
92*bdcc259dSMatthias Ringwald static int parse_hex(uint8_t * buffer, const char * hex_string){
93*bdcc259dSMatthias Ringwald 	int len = 0;
94*bdcc259dSMatthias Ringwald 	while (*hex_string){
95*bdcc259dSMatthias Ringwald 		if (*hex_string == ' '){
96*bdcc259dSMatthias Ringwald 			hex_string++;
97*bdcc259dSMatthias Ringwald 			continue;
98*bdcc259dSMatthias Ringwald 		}
99*bdcc259dSMatthias Ringwald 		int high_nibble = nibble_for_char(*hex_string++);
100*bdcc259dSMatthias Ringwald 		int low_nibble = nibble_for_char(*hex_string++);
101*bdcc259dSMatthias Ringwald 		*buffer++ = (high_nibble << 4) | low_nibble;
102*bdcc259dSMatthias Ringwald 		len++;
103*bdcc259dSMatthias Ringwald 	}
104*bdcc259dSMatthias Ringwald 	return len;
105*bdcc259dSMatthias Ringwald }
106*bdcc259dSMatthias Ringwald 
107*bdcc259dSMatthias Ringwald #define LOG_KEY(NAME) { printf("%16s: ", #NAME); hexdump2(NAME, 16); }
108*bdcc259dSMatthias Ringwald #define PARSE_KEY(NAME) { parse_hex(NAME, NAME##_string); LOG_KEY(NAME); }
109*bdcc259dSMatthias Ringwald #define VALIDATE_KEY(NAME) { LOG_KEY(NAME); sm_key_t test; parse_hex(test, NAME##_string); if (memcmp(NAME, test, 16)){ printf("Error calculating key\n"); } }
110*bdcc259dSMatthias Ringwald #define VALIDATE_MESSAGE(NAME) validate_message(#NAME, NAME##_string, cmac_##NAME##_string)
111*bdcc259dSMatthias Ringwald 
112*bdcc259dSMatthias Ringwald 
113*bdcc259dSMatthias Ringwald static void validate_message(const char * name, const char * message_string, const char * cmac_string){
114*bdcc259dSMatthias Ringwald 
115*bdcc259dSMatthias Ringwald 	uint8_t m[128];
116*bdcc259dSMatthias Ringwald 	int len = parse_hex(m, message_string);
117*bdcc259dSMatthias Ringwald 
118*bdcc259dSMatthias Ringwald 	sm_key_t cmac;
119*bdcc259dSMatthias Ringwald 	parse_hex(cmac, cmac_string);
120*bdcc259dSMatthias Ringwald 
121*bdcc259dSMatthias Ringwald 	printf("-- verify message %s, len %u:\nm:    %s\ncmac: %s\n", name, len, message_string, cmac_string);
122*bdcc259dSMatthias Ringwald 
123*bdcc259dSMatthias Ringwald 	sm_key_t key;
124*bdcc259dSMatthias Ringwald 	parse_hex(key, key_string);
125*bdcc259dSMatthias Ringwald 
126*bdcc259dSMatthias Ringwald 	sm_key_t cmac_test;
127*bdcc259dSMatthias Ringwald 	aes_cmac(cmac_test, key, m, len);
128*bdcc259dSMatthias Ringwald 
129*bdcc259dSMatthias Ringwald 	LOG_KEY(cmac_test);
130*bdcc259dSMatthias Ringwald 
131*bdcc259dSMatthias Ringwald 	if (memcmp(cmac_test, cmac, 16)){
132*bdcc259dSMatthias Ringwald 		printf("CMAC incorrect!\n");
133*bdcc259dSMatthias Ringwald 	} else {
134*bdcc259dSMatthias Ringwald 		printf("CMAC correct!\n");
135*bdcc259dSMatthias Ringwald 	}
136*bdcc259dSMatthias Ringwald }
137*bdcc259dSMatthias Ringwald 
138*bdcc259dSMatthias Ringwald static void f4(sm_key_t res, const sm_key256_t u, const sm_key256_t v, const sm_key_t x, uint8_t z){
139*bdcc259dSMatthias Ringwald 	uint8_t buffer[65];
140*bdcc259dSMatthias Ringwald 	memcpy(buffer, u, 32);
141*bdcc259dSMatthias Ringwald 	memcpy(buffer+32, v, 32);
142*bdcc259dSMatthias Ringwald 	buffer[64] = z;
143*bdcc259dSMatthias Ringwald 	// hexdump2(buffer, sizeof(buffer));
144*bdcc259dSMatthias Ringwald 	aes_cmac(res, x, buffer, sizeof(buffer));
145*bdcc259dSMatthias Ringwald }
146*bdcc259dSMatthias Ringwald 
147*bdcc259dSMatthias Ringwald const sm_key_t f5_salt = { 0x6C ,0x88, 0x83, 0x91, 0xAA, 0xF5, 0xA5, 0x38, 0x60, 0x37, 0x0B, 0xDB, 0x5A, 0x60, 0x83, 0xBE};
148*bdcc259dSMatthias Ringwald const uint8_t f5_key_id[] = { 0x62, 0x74, 0x6c, 0x65 };
149*bdcc259dSMatthias Ringwald const uint8_t f5_length[] = { 0x01, 0x00};
150*bdcc259dSMatthias Ringwald static void f5(sm_key256_t res, const sm_key256_t w, const sm_key_t n1, const sm_key_t n2, const sm_key56_t a1, const sm_key56_t a2){
151*bdcc259dSMatthias Ringwald 	// T = AES-CMACSAL_T(W)
152*bdcc259dSMatthias Ringwald 	sm_key_t t;
153*bdcc259dSMatthias Ringwald 	aes_cmac(t, f5_salt, w, 32);
154*bdcc259dSMatthias Ringwald 	// f5(W, N1, N2, A1, A2) = AES-CMACT (Counter = 0 || keyID || N1 || N2|| A1|| A2 || Length = 256) -- this is the MacKey
155*bdcc259dSMatthias Ringwald 	uint8_t buffer[53];
156*bdcc259dSMatthias Ringwald 	buffer[0] = 0;
157*bdcc259dSMatthias Ringwald 	memcpy(buffer+01, f5_key_id, 4);
158*bdcc259dSMatthias Ringwald 	memcpy(buffer+05, n1, 16);
159*bdcc259dSMatthias Ringwald 	memcpy(buffer+21, n2, 16);
160*bdcc259dSMatthias Ringwald 	memcpy(buffer+37, a1, 7);
161*bdcc259dSMatthias Ringwald 	memcpy(buffer+44, a2, 7);
162*bdcc259dSMatthias Ringwald 	memcpy(buffer+51, f5_length, 2);
163*bdcc259dSMatthias Ringwald 	// hexdump2(buffer, sizeof(buffer));
164*bdcc259dSMatthias Ringwald 	aes_cmac(res, t, buffer, sizeof(buffer));
165*bdcc259dSMatthias Ringwald 	// hexdump2(res, 16);
166*bdcc259dSMatthias Ringwald 	//           			|| AES-CMACT (Counter = 1 || keyID || N1 || N2|| A1|| A2 || Length = 256) -- this is the LTK
167*bdcc259dSMatthias Ringwald 	buffer[0] = 1;
168*bdcc259dSMatthias Ringwald 	// hexdump2(buffer, sizeof(buffer));
169*bdcc259dSMatthias Ringwald 	aes_cmac(res+16, t, buffer, sizeof(buffer));
170*bdcc259dSMatthias Ringwald 	// hexdump2(res+16, 16);
171*bdcc259dSMatthias Ringwald }
172*bdcc259dSMatthias Ringwald 
173*bdcc259dSMatthias Ringwald // f6(W, N1, N2, R, IOcap, A1, A2) = AES-CMACW (N1 || N2 || R || IOcap || A1 || A2
174*bdcc259dSMatthias Ringwald // - W is 128 bits
175*bdcc259dSMatthias Ringwald // - N1 is 128 bits
176*bdcc259dSMatthias Ringwald // - N2 is 128 bits
177*bdcc259dSMatthias Ringwald // - R is 128 bits
178*bdcc259dSMatthias Ringwald // - IOcap is 24 bits
179*bdcc259dSMatthias Ringwald // - A1 is 56 bits
180*bdcc259dSMatthias Ringwald // - A2 is 56 bits
181*bdcc259dSMatthias Ringwald static void f6(sm_key_t res, const sm_key_t w, const sm_key_t n1, const sm_key_t n2, const sm_key_t r, const sm_key24_t io_cap, const sm_key56_t a1, const sm_key56_t a2){
182*bdcc259dSMatthias Ringwald 	uint8_t buffer[65];
183*bdcc259dSMatthias Ringwald 	memcpy(buffer, n1, 16);
184*bdcc259dSMatthias Ringwald 	memcpy(buffer+16, n2, 16);
185*bdcc259dSMatthias Ringwald 	memcpy(buffer+32, r, 16);
186*bdcc259dSMatthias Ringwald 	memcpy(buffer+48, io_cap, 3);
187*bdcc259dSMatthias Ringwald 	memcpy(buffer+51, a1, 7);
188*bdcc259dSMatthias Ringwald 	memcpy(buffer+58, a2, 7);
189*bdcc259dSMatthias Ringwald 	aes_cmac(res, w, buffer,sizeof(buffer));
190*bdcc259dSMatthias Ringwald }
191*bdcc259dSMatthias Ringwald 
192*bdcc259dSMatthias Ringwald // g2(U, V, X, Y) = AES-CMACX(U || V || Y) mod 2^32
193*bdcc259dSMatthias Ringwald // - U is 256 bits
194*bdcc259dSMatthias Ringwald // - V is 256 bits
195*bdcc259dSMatthias Ringwald // - X is 128 bits
196*bdcc259dSMatthias Ringwald // - Y is 128 bits
197*bdcc259dSMatthias Ringwald static uint32_t g2(const sm_key256_t u, const sm_key256_t v, const sm_key_t x, const sm_key_t y){
198*bdcc259dSMatthias Ringwald 	uint8_t buffer[80];
199*bdcc259dSMatthias Ringwald 	memcpy(buffer, u, 32);
200*bdcc259dSMatthias Ringwald 	memcpy(buffer+32, v, 32);
201*bdcc259dSMatthias Ringwald 	memcpy(buffer+64, y, 16);
202*bdcc259dSMatthias Ringwald 	sm_key_t cmac;
203*bdcc259dSMatthias Ringwald 	aes_cmac(cmac, x, buffer, sizeof(buffer));
204*bdcc259dSMatthias Ringwald 	return big_endian_read_32(cmac, 12);
205*bdcc259dSMatthias Ringwald }
206*bdcc259dSMatthias Ringwald 
207*bdcc259dSMatthias Ringwald // h6(W, keyID) = AES-CMACW(keyID)
208*bdcc259dSMatthias Ringwald // - W is 128 bits
209*bdcc259dSMatthias Ringwald // - keyID is 32 bits
210*bdcc259dSMatthias Ringwald static void h6(sm_key_t res, const sm_key_t w, const uint32_t key_id){
211*bdcc259dSMatthias Ringwald 	uint8_t key_id_buffer[4];
212*bdcc259dSMatthias Ringwald 	big_endian_store_32(key_id_buffer, 0, key_id);
213*bdcc259dSMatthias Ringwald 	aes_cmac(res, w, key_id_buffer, 4);
214*bdcc259dSMatthias Ringwald }
215*bdcc259dSMatthias Ringwald 
216*bdcc259dSMatthias Ringwald int main(void){
217*bdcc259dSMatthias Ringwald 	sm_key_t key, k0, k1, k2, zero;
218*bdcc259dSMatthias Ringwald 	memset(zero, 0, 16);
219*bdcc259dSMatthias Ringwald 	PARSE_KEY(key);
220*bdcc259dSMatthias Ringwald 
221*bdcc259dSMatthias Ringwald 	// validate subkey k0,k1,k2 generation
222*bdcc259dSMatthias Ringwald 	aes128_calc_cyphertext(key, zero, k0);
223*bdcc259dSMatthias Ringwald 	VALIDATE_KEY(k0);
224*bdcc259dSMatthias Ringwald 	aes_cmac_calc_subkeys(k0, k1, k2);
225*bdcc259dSMatthias Ringwald 	VALIDATE_KEY(k1);
226*bdcc259dSMatthias Ringwald 	VALIDATE_KEY(k2);
227*bdcc259dSMatthias Ringwald 
228*bdcc259dSMatthias Ringwald 	// validate AES_CMAC for some messages
229*bdcc259dSMatthias Ringwald 	VALIDATE_MESSAGE(m0);
230*bdcc259dSMatthias Ringwald 	VALIDATE_MESSAGE(m16);
231*bdcc259dSMatthias Ringwald 	VALIDATE_MESSAGE(m40);
232*bdcc259dSMatthias Ringwald 	VALIDATE_MESSAGE(m64);
233*bdcc259dSMatthias Ringwald 
234*bdcc259dSMatthias Ringwald 	// validate f4
235*bdcc259dSMatthias Ringwald 	printf("-- verify f4\n");
236*bdcc259dSMatthias Ringwald 	sm_key_t f4_x, f4_cmac, f4_cmac_test;
237*bdcc259dSMatthias Ringwald 	sm_key256_t f4_u, f4_v;
238*bdcc259dSMatthias Ringwald 	uint8_t f4_z;
239*bdcc259dSMatthias Ringwald 	parse_hex(f4_cmac, f4_cmac_string);
240*bdcc259dSMatthias Ringwald 	parse_hex(f4_u, f4_u_string);
241*bdcc259dSMatthias Ringwald 	parse_hex(f4_v, f4_v_string);
242*bdcc259dSMatthias Ringwald 	parse_hex(f4_x, f4_x_string);
243*bdcc259dSMatthias Ringwald 	parse_hex(&f4_z, f4_z_string);
244*bdcc259dSMatthias Ringwald 	f4(f4_cmac_test, f4_u, f4_v, f4_x, f4_z);
245*bdcc259dSMatthias Ringwald 	if (memcmp(f4_cmac_test, f4_cmac, 16)){
246*bdcc259dSMatthias Ringwald 		printf("CMAC incorrect!\n");
247*bdcc259dSMatthias Ringwald 	} else {
248*bdcc259dSMatthias Ringwald 		printf("CMAC correct!\n");
249*bdcc259dSMatthias Ringwald 	}
250*bdcc259dSMatthias Ringwald 
251*bdcc259dSMatthias Ringwald 	// valdiate f5
252*bdcc259dSMatthias Ringwald 	printf("-- verify f5\n");
253*bdcc259dSMatthias Ringwald 	sm_key_t f5_cmac, f5_mackey, f5_n1, f5_n2;
254*bdcc259dSMatthias Ringwald 	sm_key56_t f5_a1, f5_a2;
255*bdcc259dSMatthias Ringwald 	sm_key256_t f5_w, f5_res;
256*bdcc259dSMatthias Ringwald 	uint8_t f5_z;
257*bdcc259dSMatthias Ringwald 	parse_hex(f5_w, f5_w_string);
258*bdcc259dSMatthias Ringwald 	parse_hex(f5_n1, f5_n1_string);
259*bdcc259dSMatthias Ringwald 	parse_hex(f5_n2, f5_n2_string);
260*bdcc259dSMatthias Ringwald 	parse_hex(f5_a1, f5_a1_string);
261*bdcc259dSMatthias Ringwald 	parse_hex(f5_a2, f5_a2_string);
262*bdcc259dSMatthias Ringwald 	f5(f5_res, f5_w, f5_n1, f5_n2, f5_a1, f5_a2);
263*bdcc259dSMatthias Ringwald 	printf("MacKey:");
264*bdcc259dSMatthias Ringwald 	hexdump2(f5_res, 16);
265*bdcc259dSMatthias Ringwald 	printf("LTK:   ");
266*bdcc259dSMatthias Ringwald 	hexdump2(f5_res+16, 16);
267*bdcc259dSMatthias Ringwald 	parse_hex(f5_cmac, f5_cmac_string);
268*bdcc259dSMatthias Ringwald 	if (memcmp(f5_res, f5_cmac, 16)){
269*bdcc259dSMatthias Ringwald 		printf("CMAC incorrect!\n");
270*bdcc259dSMatthias Ringwald 	} else {
271*bdcc259dSMatthias Ringwald 		printf("CMAC correct!\n");
272*bdcc259dSMatthias Ringwald 	}
273*bdcc259dSMatthias Ringwald 
274*bdcc259dSMatthias Ringwald 	// validate f6
275*bdcc259dSMatthias Ringwald 	printf("-- verify f6\n");
276*bdcc259dSMatthias Ringwald 	sm_key_t f6_cmac, f6_mac_key, f6_n1, f6_n2, f6_r, f6_res;
277*bdcc259dSMatthias Ringwald 	sm_key24_t f6_io_cap;
278*bdcc259dSMatthias Ringwald 	sm_key56_t f6_a1, f6_a2;
279*bdcc259dSMatthias Ringwald 	uint8_t f6_z;
280*bdcc259dSMatthias Ringwald 	parse_hex(f6_n1, f6_n1_string);
281*bdcc259dSMatthias Ringwald 	parse_hex(f6_n2, f6_n2_string);
282*bdcc259dSMatthias Ringwald 	parse_hex(f6_a1, f6_a1_string);
283*bdcc259dSMatthias Ringwald 	parse_hex(f6_a2, f6_a2_string);
284*bdcc259dSMatthias Ringwald 	parse_hex(f6_mac_key, f6_mac_key_string);
285*bdcc259dSMatthias Ringwald 	parse_hex(f6_r, f6_r_string);
286*bdcc259dSMatthias Ringwald 	parse_hex(f6_io_cap, f6_io_cap_string);
287*bdcc259dSMatthias Ringwald 	f6(f6_res, f6_mac_key, f6_n1, f6_n2, f6_r, f6_io_cap, f6_a1, f6_a2);
288*bdcc259dSMatthias Ringwald 	hexdump2(f6_res, 16);
289*bdcc259dSMatthias Ringwald 	parse_hex(f6_cmac, f6_cmac_string);
290*bdcc259dSMatthias Ringwald 	if (memcmp(f6_res, f6_cmac, 16)){
291*bdcc259dSMatthias Ringwald 		printf("CMAC incorrect!\n");
292*bdcc259dSMatthias Ringwald 	} else {
293*bdcc259dSMatthias Ringwald 		printf("CMAC correct!\n");
294*bdcc259dSMatthias Ringwald 	}
295*bdcc259dSMatthias Ringwald 
296*bdcc259dSMatthias Ringwald 	// validate g2
297*bdcc259dSMatthias Ringwald 	printf("-- verify g2\n");
298*bdcc259dSMatthias Ringwald 	sm_key_t g2_cmac, g2_x, g2_y;
299*bdcc259dSMatthias Ringwald 	sm_key256_t g2_u, g2_v;
300*bdcc259dSMatthias Ringwald 	parse_hex(g2_x, g2_x_string);
301*bdcc259dSMatthias Ringwald 	parse_hex(g2_y, g2_y_string);
302*bdcc259dSMatthias Ringwald 	parse_hex(g2_u, g2_u_string);
303*bdcc259dSMatthias Ringwald 	parse_hex(g2_v, g2_v_string);
304*bdcc259dSMatthias Ringwald 	uint32_t g2_test = g2(g2_u, g2_v, g2_x, g2_y);
305*bdcc259dSMatthias Ringwald 	printf("%08x\n", g2_test);
306*bdcc259dSMatthias Ringwald 	uint8_t g2_res_buffer[4];
307*bdcc259dSMatthias Ringwald 	parse_hex(g2_res_buffer, g2_res_string);
308*bdcc259dSMatthias Ringwald 	uint32_t g2_res = big_endian_read_32(g2_res_buffer, 0);
309*bdcc259dSMatthias Ringwald 	if (g2_test != g2_res){
310*bdcc259dSMatthias Ringwald 		printf("G2 incorrect!\n");
311*bdcc259dSMatthias Ringwald 	} else {
312*bdcc259dSMatthias Ringwald 		printf("G2 correct!\n");
313*bdcc259dSMatthias Ringwald 	}
314*bdcc259dSMatthias Ringwald 
315*bdcc259dSMatthias Ringwald 	// validate h6
316*bdcc259dSMatthias Ringwald 	printf("-- verify h6\n");
317*bdcc259dSMatthias Ringwald 	sm_key_t h6_key, h6_res, h6_cmac;
318*bdcc259dSMatthias Ringwald 	uint8_t h6_key_id_buffer[4];
319*bdcc259dSMatthias Ringwald 	parse_hex(h6_key, h6_key_string);
320*bdcc259dSMatthias Ringwald 	parse_hex(h6_key_id_buffer, h6_key_id_string);
321*bdcc259dSMatthias Ringwald 	parse_hex(h6_cmac, h6_cmac_string);
322*bdcc259dSMatthias Ringwald 	uint32_t h6_key_id = big_endian_read_32(h6_key_id_buffer, 0);
323*bdcc259dSMatthias Ringwald 	h6(h6_res, h6_key, h6_key_id);
324*bdcc259dSMatthias Ringwald 	hexdump2(h6_res, 16);
325*bdcc259dSMatthias Ringwald 	if (memcmp(h6_res, h6_cmac, 16)){
326*bdcc259dSMatthias Ringwald 		printf("CMAC incorrect!\n");
327*bdcc259dSMatthias Ringwald 	} else {
328*bdcc259dSMatthias Ringwald 		printf("CMAC correct!\n");
329*bdcc259dSMatthias Ringwald 	}
330*bdcc259dSMatthias Ringwald }
331