Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HIL RSA tests #1414

Merged
merged 2 commits into from
Apr 10, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 2 additions & 3 deletions esp-hal/src/rsa/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -23,11 +23,10 @@
//! ### Initialization
//! ```no_run
//! let peripherals = Peripherals::take();
//! let mut system = peripherals.SYSTEM.split();
//!
//! let mut rsa = Rsa::new(peripherals.RSA);
//! let mut rsa = Rsa::new(peripherals.RSA, None);
//! ```
//!
//!
//! ### Async (modular exponentiation)
//! ```no_run
//! #[embassy_executor::task]
Expand Down
8 changes: 4 additions & 4 deletions examples/src/bin/rsa.rs
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ fn mod_exp_example(rsa: &mut Rsa<esp_hal::Blocking>) {
}

fn multiplication_example(rsa: &mut Rsa<esp_hal::Blocking>) {
let mut out = [0_u32; U1024::LIMBS];
let mut outbuf = [0_u32; U1024::LIMBS];

let operand_a = BIGNUM_1.as_words();
let operand_b = BIGNUM_2.as_words();
Expand All @@ -158,14 +158,14 @@ fn multiplication_example(rsa: &mut Rsa<esp_hal::Blocking>) {
{
let mut rsamulti = RsaMultiplication::<operand_sizes::Op512, esp_hal::Blocking>::new(rsa);
rsamulti.start_multiplication(operand_a, operand_b);
rsamulti.read_results(&mut out);
rsamulti.read_results(&mut outbuf);
}
#[cfg(not(feature = "esp32"))]
{
let mut rsamulti =
RsaMultiplication::<operand_sizes::Op512, esp_hal::Blocking>::new(rsa, operand_a);
rsamulti.start_multiplication(operand_b);
rsamulti.read_results(&mut out);
rsamulti.read_results(&mut outbuf);
}

let post_hw_mul = cycles();
Expand All @@ -180,6 +180,6 @@ fn multiplication_example(rsa: &mut Rsa<esp_hal::Blocking>) {
"it took {} cycles for sw multiplication",
post_sw_mul - pre_sw_mul
);
assert_eq!(U1024::from_words(out), sw_out.1.concat(&sw_out.0));
assert_eq!(U1024::from_words(outbuf), sw_out.1.concat(&sw_out.0));
println!("multiplication done");
}
6 changes: 6 additions & 0 deletions hil-test/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,10 @@ harness = false
name = "spi_full_duplex"
harness = false

[[test]]
name = "rsa"
harness = false

[[test]]
name = "uart"
harness = false
Expand Down Expand Up @@ -44,6 +48,8 @@ cfg-if = "1"
embassy-executor = { version = "0.5.0", default-features = false, features = ["executor-thread", "arch-riscv32"] }
# Add the `embedded-test/defmt` feature for more verbose testing
embedded-test = { git = "https://github.com/probe-rs/embedded-test", rev = "b67dec33992f5bd79d414a0e70220dc4142278cf", default-features = false }
crypto-bigint = { version = "0.5.5", default-features = false }
nb = "1.1.0"

[features]
default = ["async", "embassy", "embassy-time-timg0"]
Expand Down
165 changes: 165 additions & 0 deletions hil-test/tests/rsa.rs
Original file line number Diff line number Diff line change
@@ -0,0 +1,165 @@
//! RSA Test

//% CHIPS: esp32 esp32c3 esp32c6 esp32h2 esp32s2 esp32s3

#![no_std]
#![no_main]

use crypto_bigint::{Uint, U1024, U512};
use defmt_rtt as _;
use esp_backtrace as _;
use esp_hal::{
peripherals::Peripherals,
prelude::*,
rsa::{
operand_sizes,
Rsa,
RsaModularExponentiation,
RsaModularMultiplication,
RsaMultiplication,
},
Blocking,
};
const BIGNUM_1: U512 = Uint::from_be_hex(
"c7f61058f96db3bd87dbab08ab03b4f7f2f864eac249144adea6a65f97803b719d8ca980b7b3c0389c1c7c6\
7dc353c5e0ec11f5fc8ce7f6073796cc8f73fa878",
);
const BIGNUM_2: U512 = Uint::from_be_hex(
"1763db3344e97be15d04de4868badb12a38046bb793f7630d87cf100aa1c759afac15a01f3c4c83ec2d2f66\
6bd22f71c3c1f075ec0e2cb0cb29994d091b73f51",
);
const BIGNUM_3: U512 = Uint::from_be_hex(
"6b6bb3d2b6cbeb45a769eaa0384e611e1b89b0c9b45a045aca1c5fd6e8785b38df7118cf5dd45b9b63d293b\
67aeafa9ba25feb8712f188cb139b7d9b9af1c361",
);

struct Context<'a> {
rsa: Rsa<'a, Blocking>,
}

impl Context<'_> {
pub fn init() -> Self {
let peripherals = Peripherals::take();
let mut rsa = Rsa::new(peripherals.RSA, None);
nb::block!(rsa.ready()).unwrap();

Context { rsa }
}
}

const fn compute_r(modulus: &U512) -> U512 {
let mut d = [0_u32; U512::LIMBS * 2 + 1];
d[d.len() - 1] = 1;
let d = Uint::from_words(d);
d.const_rem(&modulus.resize()).0.resize()
}

const fn compute_mprime(modulus: &U512) -> u32 {
let m_inv = modulus.inv_mod2k(32).to_words()[0];
(-1 * m_inv as i64 % 4294967296) as u32
}

#[embedded_test::tests]
mod tests {
use defmt::assert_eq;

use super::*;

#[init]
fn init() -> Context<'static> {
Context::init()
}

#[test]
fn test_modular_exponentiation(mut ctx: Context<'static>) {
const EXPECTED_OUTPUT: [u32; U512::LIMBS] = [
1601059419, 3994655875, 2600857657, 1530060852, 64828275, 4221878473, 2751381085,
1938128086, 625895085, 2087010412, 2133352910, 101578249, 3798099415, 3357588690,
2065243474, 330914193,
];

#[cfg(not(feature = "esp32"))]
{
ctx.rsa.enable_disable_constant_time_acceleration(true);
ctx.rsa.enable_disable_search_acceleration(true);
}
let mut outbuf = [0_u32; U512::LIMBS];
let mut mod_exp = RsaModularExponentiation::<operand_sizes::Op512, esp_hal::Blocking>::new(
&mut ctx.rsa,
BIGNUM_2.as_words(),
BIGNUM_3.as_words(),
compute_mprime(&BIGNUM_3),
);
let r = compute_r(&BIGNUM_3);
let base = &BIGNUM_1.as_words();
mod_exp.start_exponentiation(&base, r.as_words());
mod_exp.read_results(&mut outbuf);
assert_eq!(EXPECTED_OUTPUT, outbuf);
}

#[test]
fn test_modular_multiplication(mut ctx: Context<'static>) {
const EXPECTED_OUTPUT: [u32; U512::LIMBS] = [
1868256644, 833470784, 4187374062, 2684021027, 191862388, 1279046003, 1929899870,
4209598061, 3830489207, 1317083344, 2666864448, 3701382766, 3232598924, 2904609522,
747558855, 479377985,
];

let mut outbuf = [0_u32; U512::LIMBS];
let mut mod_multi =
RsaModularMultiplication::<operand_sizes::Op512, esp_hal::Blocking>::new(
&mut ctx.rsa,
#[cfg(not(feature = "esp32"))]
BIGNUM_1.as_words(),
#[cfg(not(feature = "esp32"))]
BIGNUM_2.as_words(),
BIGNUM_3.as_words(),
compute_mprime(&BIGNUM_3),
);
let r = compute_r(&BIGNUM_3);
#[cfg(feature = "esp32")]
{
mod_multi.start_step1(BIGNUM_1.as_words(), r.as_words());
mod_multi.start_step2(BIGNUM_2.as_words());
}
#[cfg(not(feature = "esp32"))]
{
mod_multi.start_modular_multiplication(r.as_words());
}
mod_multi.read_results(&mut outbuf);
assert_eq!(EXPECTED_OUTPUT, outbuf);
}

#[test]
fn test_multiplication(mut ctx: Context<'static>) {
const EXPECTED_OUTPUT: [u32; U1024::LIMBS] = [
1264702968, 3552243420, 2602501218, 498422249, 2431753435, 2307424767, 349202767,
2269697177, 1525551459, 3623276361, 3146383138, 191420847, 4252021895, 9176459,
301757643, 4220806186, 434407318, 3722444851, 1850128766, 928651940, 107896699,
563405838, 1834067613, 1289630401, 3145128058, 3300293535, 3077505758, 1926648662,
1264151247, 3626086486, 3701894076, 306518743,
];
let mut outbuf = [0_u32; U1024::LIMBS];

let operand_a = BIGNUM_1.as_words();
let operand_b = BIGNUM_2.as_words();

#[cfg(feature = "esp32")]
{
let mut rsamulti =
RsaMultiplication::<operand_sizes::Op512, esp_hal::Blocking>::new(ctx.rsa);
rsamulti.start_multiplication(operand_a, operand_b);
rsamulti.read_results(&mut outbuf);
}
#[cfg(not(feature = "esp32"))]
{
let mut rsamulti = RsaMultiplication::<operand_sizes::Op512, esp_hal::Blocking>::new(
&mut ctx.rsa,
operand_a,
);
rsamulti.start_multiplication(operand_b);
rsamulti.read_results(&mut outbuf);
}
assert_eq!(EXPECTED_OUTPUT, outbuf)
}
}
Loading