[Cryptech-Commits] [core/cipher/aes_speed] branch master updated: Adding testcase that tests the mangling of aes operations by switching from encipher to decipher mid-operation.

git at cryptech.is git at cryptech.is
Wed Oct 3 07:02:31 UTC 2018


This is an automated email from the git hooks/post-receive script.

joachim at secworks.se pushed a commit to branch master
in repository core/cipher/aes_speed.

The following commit(s) were added to refs/heads/master by this push:
     new 01d3fb3  Adding testcase that tests the mangling of aes operations by switching from encipher to decipher mid-operation.
01d3fb3 is described below

commit 01d3fb3564043b032764deb1739c199ee867b77f
Author: Joachim Strömbergson <joachim at secworks.se>
AuthorDate: Wed Oct 3 09:01:20 2018 +0200

    Adding testcase that tests the mangling of aes operations by switching from encipher to decipher mid-operation.
---
 src/tb/tb_aes.v | 59 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 59 insertions(+)

diff --git a/src/tb/tb_aes.v b/src/tb/tb_aes.v
index 35fc1d9..84be6a8 100644
--- a/src/tb/tb_aes.v
+++ b/src/tb/tb_aes.v
@@ -428,6 +428,59 @@ module tb_aes();
   endtask // ecb_mode_single_block_test
 
 
+  //----------------------------------------------------------------
+  // single_block_mangle_test()
+  //
+  // Perform single block test, but try to mangle the operation
+  // by changing from encryption to decryption mid-processing.
+  // This should cause errors unless changes to config during
+  // processing.
+  //----------------------------------------------------------------
+  task single_block_mangle_test(input [7 : 0]  tc_number,
+                               input [255 : 0] key,
+                               input [127 : 0] block,
+                               input [127 : 0] expected);
+    begin
+      $display("*** TC %0d mangle test started.", tc_number);
+      tc_ctr = tc_ctr + 1;
+
+      init_key(key, AES_128_BIT_KEY);
+      write_block(block);
+      dump_dut_state();
+
+      // Set that we want to encipher and start processing.
+      $display("*** Staring encipher operation");
+      write_word(ADDR_CONFIG, (8'h00 + (AES_128_BIT_KEY << 1) + AES_ENCIPHER));
+      write_word(ADDR_CTRL, 8'h02);
+
+      // Wait a number of cycles and then switch from encipher to decipher.
+      #(10 * CLK_PERIOD);
+      $display("*** Switching to decipher operation");
+      write_word(ADDR_CONFIG, (8'h00 + (AES_128_BIT_KEY << 1) + AES_DECIPHER));
+
+      wait_ready();
+      $display("*** Ready has been set!");
+      dump_dut_state();
+      read_result();
+
+      if (result_data == expected)
+        begin
+          $display("*** TC %0d successful.", tc_number);
+          $display("");
+        end
+      else
+        begin
+          $display("*** ERROR: TC %0d NOT successful.", tc_number);
+          $display("Expected: 0x%032x", expected);
+          $display("Got:      0x%032x", result_data);
+          $display("");
+
+          error_ctr = error_ctr + 1;
+        end
+    end
+  endtask // ecb_mode_single_block_test
+
+
   //----------------------------------------------------------------
   // aes_test()
   //
@@ -527,6 +580,12 @@ module tb_aes();
 
       ecb_mode_single_block_test(8'h17, AES_DECIPHER, nist_aes256_key, AES_256_BIT_KEY,
                                  nist_ecb_256_enc_expected3, nist_plaintext3);
+
+
+      $display("Block processing mangling test");
+      $display("------------------------------");
+      single_block_mangle_test(8'h18, nist_aes128_key, nist_plaintext0,
+                               nist_ecb_128_enc_expected0);
     end
   endtask // aes_test
 

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the Commits mailing list