xref: /btstack/test/mesh/mesh_message_test.py (revision 1b464e99afd70ddaf6b75be1ba7cc563a5f5dfd8)
1#!/usr/bin/env python3
2# BlueKitchen GmbH (c) 2019
3
4# pip3 install pycryptodomex
5
6from mesh_crypto import *
7
8# S1('test') = b73cefbd641ef2ea598c2b6efb62f79c
9s1_input  = b'test'
10s1_actual = s1(s1_input)
11
12s1_expected = bytes.fromhex('b73cefbd641ef2ea598c2b6efb62f79c')
13if s1_actual != s1_expected:
14    print("s1: expected " + s1_expected.hex + ", but got " + s1_actual.hex())
15
16# K1(3216d1509884b533248541792b877f98, 2ba14ffa0df84a2831938d57d276cab4, 5a09d60797eeb4478aada59db3352a0d) = f6ed15a8934afbe7d83e8dcb57fcf5d7
17k1_n        = bytes.fromhex("3216d1509884b533248541792b877f98")
18k1_salt     = bytes.fromhex("2ba14ffa0df84a2831938d57d276cab4")
19k1_p        = bytes.fromhex("5a09d60797eeb4478aada59db3352a0d")
20k1_actual = k1(k1_n, k1_salt, k1_p)
21
22k1_expected = bytes.fromhex("f6ed15a8934afbe7d83e8dcb57fcf5d7")
23if k1_actual != k1_expected:
24    print("k1: expected " + k1_expected.hex() + ", but got " + k1_actual.hex())
25
26# k2 test
27k2_n                       = bytes.fromhex('7dd7364cd842ad18c17c2b820c84c3d6')
28k2_p                       = bytes.fromhex('00')
29(k2_nid, k2_encryption_key, k2_privacy_key) = k2(k2_n, k2_p)
30
31k2_nid_expected            = 0x68
32k2_encryption_key_expected = bytes.fromhex('0953fa93e7caac9638f58820220a398e')
33k2_privacy_key_expected    = bytes.fromhex('8b84eedec100067d670971dd2aa700cf')
34if k2_nid_expected != k2_nid:
35    print("k2: nid expected " + hex(k2_nid_expected) + ", but got " + hex(k2_nid))
36if k2_encryption_key_expected != k2_encryption_key:
37    print("k2: encryption key expected " + k2_encryption_key_expected.hex() + ", but got " + k2_encryption_key.hex())
38if k2_privacy_key_expected != k2_privacy_key:
39    print("k2: privacy key expected " + k2_privacy_key_expected.hex() + ", but got " + k2_privacy_key.hex())
40
41# k3 test
42k3_n = bytes.fromhex('f7a2a44f8e8a8029064f173ddc1e2b00')
43k3_actual = k3(k3_n)
44
45k3_expected = bytes.fromhex('ff046958233db014')
46if k3_actual != k3_expected:
47    print("k3: expected " + k3_expected.hex() + ", but got " + k3_actual.hex())
48
49# k4 test
50k4_n = bytes.fromhex('3216d1509884b533248541792b877f98')
51k4_actual = k4(k4_n)
52
53k4_expected = 0x38
54if k4_actual != k4_expected:
55    print("k4: expected " + hex(k4_expected) + ", but got " + hex(k4_actual))
56
57# aes-ccm-encrypt test
58message_1_network_nonce     = bytes.fromhex('00800000011201000012345678')
59message_1_network_plaintext = bytes.fromhex('fffd' + '034b50057e400000010000')
60message_1_encryption_key    = bytes.fromhex('0953fa93e7caac9638f58820220a398e')
61(message_1_ciphertext, message_1_mic) = aes_ccm_encrypt(message_1_encryption_key, message_1_network_nonce, message_1_network_plaintext, b'', 8)
62
63message_1_ciphertext_expected = bytes.fromhex('b5e5bfdacbaf6cb7fb6bff871f')
64message_1_mic_expected        = bytes.fromhex('035444ce83a670df')
65if message_1_ciphertext_expected != message_1_ciphertext:
66    print("aes_ccm_encrypt: ciphertext expected " + hex(message_1_ciphertext_expected) + ", but got " + hex(message_1_ciphertext))
67if message_1_mic_expected != message_1_mic:
68    print("aes_ccm_encrypt: encryption key expected " + message_1_mic_expected.hex() + ", but got " + message_1_mic.hex())
69
70# aes-ccm-decrypt test
71message_1_network_nonce       = bytes.fromhex('00800000011201000012345678')
72message_1_ciphertext_expected = bytes.fromhex('b5e5bfdacbaf6cb7fb6bff871f')
73message_1_mic_expected        = bytes.fromhex('035444ce83a670df')
74message_1_plaintext_decrypted = aes_ccm_decrypt(message_1_encryption_key, message_1_network_nonce, message_1_ciphertext_expected, b'', 8, message_1_mic_expected)
75
76message_1_network_plaintext   = bytes.fromhex('fffd' + '034b50057e400000010000')
77if message_1_plaintext_decrypted == None:
78    print("aes_ccm_decrypt: digest validation failed")
79elif message_1_network_plaintext != message_1_plaintext_decrypted:
80    print("aes_ccm: plaintext expected " + hex(message_1_network_plaintext) + ", but got " + hex(message_1_plaintext_decrypted))
81
82# aes128 encrypt
83aes_key = bytes(16)
84aes_n   = bytes(16)
85aes_actual = aes128(aes_key, aes_n)
86
87aes_expected = bytes.fromhex('66E94BD4EF8A2C3B884CFA59CA342B2E')
88if aes_expected != aes_actual:
89    print("aes128: expected " + aes_expected.hex() + ", but got " + aes_actual.hex())
90
91# network PECB
92iv_index = bytes.fromhex('12345678')
93privacy_key = bytes.fromhex('8b84eedec100067d670971dd2aa700cf')
94message_1_network_pdu = bytes.fromhex('68eca487516765b5e5bfdacbaf6cb7fb6bff871f035444ce83a670df')
95privacy_random = message_1_network_pdu[7:14]
96message_1_pecb = network_pecb(privacy_random, iv_index, privacy_key)
97
98message_1_pecb_expected = bytes.fromhex('6ca487507564')
99if message_1_pecb_expected != message_1_pecb:
100    print("network_pecb: expected " + message_1_pecb_expected.hex() + ", but got " + message_1_pecb.hex())
101
102# message 1
103iv_index                 = bytes.fromhex('12345678')
104privacy_key              = bytes.fromhex('8b84eedec100067d670971dd2aa700cf')
105message_1_network_pdu    = bytes.fromhex('68eca487516765b5e5bfdacbaf6cb7fb6bff871f035444ce83a670df')
106message_1_encryption_key = bytes.fromhex('0953fa93e7caac9638f58820220a398e')
107message_1_decrypted      = network_decrypt(message_1_network_pdu, iv_index, message_1_encryption_key, privacy_key)
108
109message_1_decrypted_expected = bytes.fromhex('68800000011201fffd034b50057e400000010000')
110if message_1_decrypted_expected != message_1_decrypted:
111    print("network_pdu: encrypt expected " + message_1_decrypted_expected.hex() + ", but got " + message_1_decrypted.hex())
112
113# message x decrypt
114iv_index                 = bytes.fromhex('00000001')
115privacy_key              = bytes.fromhex('035efaafbbd84f898b95190cc3cac36b')
116encryption_key           = bytes.fromhex('9ba46b86afbe8b7f0b63db597372babe')
117message_1_network_pdu    = bytes.fromhex('B10000520D001C000155555555555555555555555555555555')
118message_1_encrypted      = network_encrypt(message_1_network_pdu, iv_index, encryption_key, privacy_key)
119
120message_1_expected       = bytes.fromhex('b12a7492504b03fa604d6d2f298ad31233fe1d568175b2f1104e23380b')
121if message_1_expected != message_1_encrypted:
122    print("network_pdu: decrypt expected " + message_1_expected.hex() + ", but got " + message_1_encrypted.hex())
123