/************************************************************************
File name: zuc.c
Version: V1.1
Date: Oct 28,2016
Description: This code provide the implement of ZUC algorithm,which consist of three parts:key 
stream generation,confidentiality algorithm
and integrity algorithm.
Function List:
1.AddMod // calculate a+b mod 2^31-1
2.PowMod // calculate x*2^k mod 2^31-1
3.L1 // linear transformation L1:X^(X<<< 2)^(X<<<10)^(X<<<18)^(X<<<24)
4.L2 // linear transformation L2:X^(X<<< 8)^(X<<<14)^(X<<<22)^(X<<<30)
5.BitValue // test if the value of M at the position i equals 0
6.GetWord // get a 32bit word ki from bit strings k[i],k[i+1]...,
// namely ki=k[i]||k[i+1]||…||k[i+31]
7.LFSRWithInitMode // Initialisation mode,refresh the current state of LFSR
8.LFSRWithWorkMode // working mode,refresh the current state of LFSR
9.BR // Bit Reconstruction
10.F // nonlinear function
11.ZUC_Init // Initialisation process of ZUC
12.ZUC_Work // working stage of ZUC
13.ZUC_GenKeyStream // generate key stream
14.ZUC_Confidentiality // the ZUC-based condifentiality algorithm
15.ZUC_Integrity // the ZUC-based integrity algorithm
**************************************************************************/
#include "zuc.h"
/************************************************************
Function: AddMod
Description: calculate a+b mod 2^31-1
Calls:
Called By: LFSRWithInitMode
Input: a,b: unsigned int(32bit)
Output:
Return: c, c=a+b mod 2^31-1
Others:
************************************************************/
unsigned int AddMod(unsigned int a, unsigned int b)
{
 unsigned int c = a + b;
 if(c >> 31)
 {
 c= (c & 0x7fffffff) + 1;
 }
 return c;
}
/************************************************************
Function: PowMod
Description: calculate x*2^k mod 2^31-1
Calls: Called By: LFSRWithInitMode
Input: x: input
 k: exponential
Output:
Return: x*2^k mod 2^31-1
Others:
************************************************************/
unsigned int PowMod(unsigned int x, unsigned int k)
{
 return (((x << k) | (x >> (31-k))) & 0x7fffffff);
}
/************************************************************
Function: L1
Description: linear transformation L1
Calls:
Called By: F
Input: X: input
Output:
Return: X^(X<<< 2)^(X<<<10)^(X<<<18)^(X<<<24)
Others:
************************************************************/
unsigned int L1(unsigned int X)
{
 return X ^ ZUC_rotl32(X, 2) ^ ZUC_rotl32(X, 10) ^ ZUC_rotl32(X, 18) ^ ZUC_rotl32(X, 24);
}
/************************************************************
Function: L2
Description: linear transformation L2
Calls:
Called By: F
Input: X: input
Output:
Return: X^(X<<< 8)^(X<<<14)^(X<<<22)^(X<<<30)
Others:
************************************************************/
unsigned int L2(unsigned int X)
{
 return X ^ ZUC_rotl32(X, 8) ^ ZUC_rotl32(X, 14) ^ ZUC_rotl32(X, 22) ^ ZUC_rotl32(X, 30);
}
/************************************************************
Function: BitValue
Description: test if the value of M at the position i equals 0
Calls:
Called By: ZUC_Integrity
Input: M: message
 i: the position i
Output:
Return: 0:the value of M at the position i equals 0
 1:the value of M at the position i equals 1
Others:
************************************************************/
unsigned char BitValue(unsigned int M[], unsigned int i)
{
 int j, k;
 j = i >> 5;
 k = i & 0x1f;
 if (M[j] & (0x1 << (31-k)))
 return 1;
 else
 return 0;
}
/************************************************************
Function: GetWord
Description: get a 32bit word ki from bit strings k[i],k[i+1]...,namely 
ki=k[i]||k[i+1]||…||k[i+31]
Calls:
Called By: ZUC_Integrity
Input: k[]:
 i: the position i
Output:
Return: ki=k[i]||k[i+1]||…||k[i+31]
Others:
************************************************************/
unsigned int GetWord(unsigned int k[], unsigned int i) //获取字串中的从第i个比特
值开始的字
{
 int j, m;
 unsigned int word;
 j = i >> 5;
 m = i & 0x1f;
 if(m == 0)
 word = k[j];
 else
 word = (k[j] << m) | (k[j+1] >> (32 - m));
 return word;
}
/************************************************************
Function: LFSRWithInitMode
Description: Initialisation mode,refresh the current state of LFSR
Calls: AddMod,PowMod
Called By: ZUC_Init
Input: LFSR_S:current state of LFSR
 u:u=W>>1
Output: Null
Return: Null
Others:
************************************************************/
void LFSRWithInitMode(unsigned int LFSR_S[],unsigned int u)
{
 unsigned int v = LFSR_S[0],i;
 v = AddMod(v, PowMod(LFSR_S[15], 15));
 v = AddMod(v, PowMod(LFSR_S[13], 17));
 v = AddMod(v, PowMod(LFSR_S[10], 21));
 v = AddMod(v, PowMod(LFSR_S[4] , 20));
 v = AddMod(v, PowMod(LFSR_S[0] , 8));
 for(i=0;i<15;i++)
 {
 LFSR_S[i]=LFSR_S[i+1];
 }
 LFSR_S[15]=AddMod(v, u);
 if (!LFSR_S[15])
 {
 LFSR_S[15] = 0x7fffffff;
 }
};
/************************************************************
Function: LFSRWithWorkMode
Description: working mode,refresh the current state of LFSR
Calls: AddMod,PowMod
Called By: ZUC_Work
Input: LFSR_S:current state of LFSR
Output: Null
Return: Null
Others:
************************************************************/
void LFSRWithWorkMode(unsigned int LFSR_S[])
{
 unsigned int v = LFSR_S[0],i;
 v = AddMod(v, PowMod(LFSR_S[15], 15));
 v = AddMod(v, PowMod(LFSR_S[13], 17));
 v = AddMod(v, PowMod(LFSR_S[10], 21));
 v = AddMod(v, PowMod(LFSR_S[4] , 20));
 v = AddMod(v, PowMod(LFSR_S[0] , 8));
 for(i=0;i<15;i++)
 {
 LFSR_S[i]=LFSR_S[i+1];
 }
 LFSR_S[15]=v;
 if (!LFSR_S[15])
 {
 LFSR_S[15] = 0x7fffffff;
 }
};
/************************************************************
Function: BR
Description: Bit Reconstruction
Calls:
Called By: ZUC_Init,ZUC_Work
Input: LFSR_S:current state of LFSR
Output: BR_X[]:achieve X0,X1,X2,X3
Return: Null
Others:
************************************************************/
void BR(unsigned int LFSR_S[],unsigned int BR_X[])
{
 BR_X[0] = ((LFSR_S[15] & 0x7fff8000) << 1) | (LFSR_S[14] & 0x0000ffff);
 BR_X[1] = ((LFSR_S[11] & 0x0000ffff) << 16)| ((LFSR_S[9] & 0x7fff8000) >> 15);
 BR_X[2] = ((LFSR_S[7] & 0x0000ffff) << 16) | ((LFSR_S[5] & 0x7fff8000) >> 15);
 BR_X[3] = ((LFSR_S[2] & 0x0000ffff) << 16) | ((LFSR_S[0] & 0x7fff8000) >> 15);
}
/************************************************************
Function: F
Description: nonlinear function
Calls:
Called By: ZUC_Init,ZUC_Work
Input: BR_X[]:words X0,X1,X2,X3 from BR
 F_R[]:F_R[0]=R1,F_R[1]=R2
Output:
Return: W
Others:
************************************************************/
unsigned int F(unsigned int BR_X[],unsigned int F_R[])
{
 unsigned int W, W1, W2;
 W = (BR_X[0] ^ F_R[0]) + F_R[1];
 W1 = F_R[0] + BR_X[1];
 W2 = F_R[1] ^ BR_X[2];
 F_R[0] = L1((W1 << 16) | (W2 >> 16));
 F_R[0]= (ZUC_S0[(F_R[0] >> 24) & 0xFF]) << 24
 |(ZUC_S1[(F_R[0] >> 16) & 0xFF]) << 16
 |(ZUC_S0[(F_R[0] >> 8) & 0xFF]) << 8
 |(ZUC_S1[F_R[0] & 0xFF]);
 F_R[1] = L2((W2 << 16) | (W1 >> 16));
 F_R[1]= (ZUC_S0[(F_R[1] >> 24) & 0xFF]) << 24
 |(ZUC_S1[(F_R[1] >> 16) & 0xFF]) << 16
 |(ZUC_S0[(F_R[1] >> 8) & 0xFF]) << 8
 |(ZUC_S1[F_R[1] & 0xFF]);
 return W;
};
/************************************************************
Function: ZUC_Init
Description: Initialisation process of ZUC
Calls: ZUC_LinkToS,BR,F,LFSRWithInitMode
Called By: ZUC_GenKeyStream
Input: k:initial key
 iv:initial vector
Output: LFSR_S[]:the state of LFSR after initialisation:s0,s1,s2,..s15
 BR_X[] : the current value:X0,X1,X2,X3
 F_R[]:the current value:R1,R2,F_R[0]=R1,F_R[1]=R2
Return: Null
Others:
************************************************************/
void ZUC_Init(unsigned char k[], unsigned char iv[],unsigned int LFSR_S[],unsigned int 
BR_X[],unsigned int F_R[])
{
 unsigned char count = 32;
 int i;
 //loading key to the LFSR s0,s1,s2....s15
 printf("\ninitial state of LFSR: S[0]-S[15]\n");
 for(i=0;i<16;i++)
 {
 LFSR_S[i]=ZUC_LinkToS(k[i], ZUC_d[i], iv[i]);
 printf("%08x ", LFSR_S[i]);
 }
 F_R[0]=0x00; //R1
 F_R[1]=0x00; //R2
 while (count) //32 times
 {
 unsigned int W;
 BR( LFSR_S,BR_X); //BitReconstruction
 W = F(BR_X,F_R); //nonlinear function
 LFSRWithInitMode(LFSR_S,W >> 1);
 count--;
 }
}
/************************************************************
Function: ZUC_work
Description: working stage of ZUC
Calls: BR,F,LFSRWithWorkMode
Called By: ZUC_GenKeyStream
Input: LFSR_S[]:the state of LFSR after initialisation:s0,s1,s2,..s15
 BR_X[] : X0,X1,X2,X3
 F_R[]:R1,R2
Output: pKeyStream[]:key stream
 KeyStreamLen:the length of KeyStream,exporting 32bit for a beat
Return: Null
Others:
************************************************************/
void ZUC_Work(unsigned int LFSR_S[],unsigned int BR_X[],unsigned int F_R[], unsigned int 
pKeyStream[],int KeyStreamLen)
{
 int i = 0;
 BR(LFSR_S,BR_X);
 F(BR_X,F_R);
 LFSRWithWorkMode(LFSR_S);
 while(i < KeyStreamLen)
 {
 BR( LFSR_S,BR_X);
 pKeyStream[i] = F(BR_X,F_R) ^ BR_X[3];
 LFSRWithWorkMode(LFSR_S);
 i++;
 }
}
/****************************************************************
Function: ZUC_GenKeyStream
Description: generate key stream
Calls: ZUC_Init,ZUC_Work
Called By: ZUC_SelfCheck
Input: k[] //initial key,128bit
 iv[] //initial iv,128bit
 KeyStreamLen //the byte length of KeyStream,exporting 32bit for a beat
Output: KeyStream[] // key strem to be outputed
Return: null
Others:
****************************************************************/
void ZUC_GenKeyStream(unsigned char k[], unsigned char iv[],unsigned int KeyStream[], int 
KeyStreamLen)
{
 unsigned int LFSR_S[16]; //LFSR state s0,s1,s2,...s15
 unsigned int BR_X[4]; //Bit Reconstruction X0,X1,X2,X3
 unsigned int F_R[2]; //R1,R2,variables of nonlinear function F
 int i;
 //Initialisation
 ZUC_Init(k, iv,LFSR_S,BR_X,F_R);
 printf("\nstate of LFSR after executing initialization: S[0]-S[15]\n");
 for(i=0;i<16;i++)
 {
 printf("%08x ", LFSR_S[i]);
 }
 printf("\ninternal state of Finite State Machine:\n");
 printf("R1=%08x\n", F_R[0]);
 printf("R2=%08x\n", F_R[1]);
 //Working
 ZUC_Work(LFSR_S,BR_X,F_R, KeyStream,KeyStreamLen);
}
/****************************************************************
Function: ZUC_Confidentiality
Description: the ZUC-based condifentiality algorithm
Calls: ZUC_GenKeyStream
Called By: ZUC_SelfCheck
Input: CK[] //initial key,128bit,uesed to gain the key of ZUC KeyStream 
generation algorithm
 COUNT //128bit
 BEARER //5bit,bearing layer identification,
 DIRECTION //1bit
 IBS[] //input bit stream,
 LENGTH //the bit length of IBS
Output: OBS[] //output bit stream,
Return: null
Others:
****************************************************************/
void ZUC_Confidentiality(unsigned char CK[], unsigned int COUNT, unsigned char BEARER,unsigned 
char DIRECTION,unsigned int IBS[],int LENGTH,unsigned int OBS[])
{
 unsigned int *k;
 int L,i,t;
 unsigned char iv[16];
 //generate vector iv1,iv2,...iv15
 iv[0] = (unsigned char)(COUNT >> 24);
 iv[1] = (unsigned char)((COUNT >> 16) & 0xff);
 iv[2] = (unsigned char)((COUNT >> 8) & 0xff);
 iv[3] = (unsigned char)(COUNT & 0xff);
 iv[4] = (((BEARER << 3) | (DIRECTION << 2)) & 0xfc);
 iv[5] = 0x00;
 iv[6] = 0x00;
 iv[7] = 0x00;
 iv[8] = iv[0];
 iv[9] = iv[1];
 iv[10] = iv[2];
 iv[11] = iv[3];
 iv[12] = iv[4];
 iv[13] = iv[5];
 iv[14] = iv[6];
 iv[15] = iv[7];
 //L,the length of key stream,taking 32bit as a unit
 L = (LENGTH + 31) / 32;
 k=malloc(sizeof(unsigned int)*L);
 //generate key stream k
 ZUC_GenKeyStream(CK, iv, k, L); //generate key stream
 //OBS=IBS^k
 for(i = 0; i < L; i++)
 {
 OBS[i] = IBS[i] ^ k[i];
 }
 t = LENGTH % 32;
 if(t)
 {
 OBS[L-1] = ((OBS[L-1] >> (32-t)) << (32-t));
 }
 free(k);
}
/****************************************************************
Function: ZUC_Integrity
Description: the ZUC-based integrity algorithm
Calls: ZUC_GenKeyStream,BitValue,GetWord
Called By: ZUC_SelfCheck
Input: IK[] //integrity key,128bit,uesed to gain the key of ZUC KeyStream 
generation algorithm
 COUNT //128bit
 BEARER //5bit,bearing layer identification,
 DIRECTION //1bit
 M[] //message
 LENGTH //the bit length of M
Output:
Return: MAC //message authentication code
Others:
****************************************************************/
unsigned int ZUC_Integrity(unsigned char IK[],unsigned int COUNT,unsigned char BEARER,unsigned 
char DIRECTION,unsigned int M[],int LENGTH)
{
 unsigned int *k, ki,MAC;
 int L,i;
 unsigned char iv[16];
 unsigned int T = 0;
 //generate vector iv1,iv2,...iv15
 iv[0] = (unsigned char)(COUNT >> 24);
 iv[1] = (unsigned char)((COUNT >> 16) & 0xff);
 iv[2] = (unsigned char)((COUNT >> 8) & 0xff);
 iv[3] = (unsigned char)(COUNT & 0xff);
 iv[4] = BEARER << 3;
 iv[5] = 0x00;
 iv[6] = 0x00;
 iv[7] = 0x00;
 iv[8] = iv[0] ^ (DIRECTION << 7);
 iv[9] = iv[1];
 iv[10] = iv[2];
 iv[11] = iv[3];
 iv[12] = iv[4];
 iv[13] = iv[5];
 iv[14] = iv[6]^ (DIRECTION << 7);
 iv[15] = iv[7];
 //L,the length of key stream,taking 32bit as a unit
 L = (LENGTH + 31) / 32 + 2;
 k=malloc(sizeof(unsigned int)*L);
 //generate key stream k
 ZUC_GenKeyStream(IK, iv, k, L);
 //T=T^ki
 for (i = 0; i < LENGTH; i++)
 {
 if(BitValue(M, i))
 {
 ki = GetWord(k, i);
 T = T ^ ki;
 }
 }
 //T=T^kLENGTH
 ki = GetWord(k, LENGTH);
 T = T ^ ki;
 //MAC=T^k(32*(L-1))
 ki = GetWord(k, 32 * (L - 1));
 MAC = T ^ ki;
 free(k);
 return MAC;
}
/****************************************************************
Function: ZUC_SelfCheck
Description: Self-check with standard data
Calls: ZUC_GenKeyStream,ZUC_Confidentiality,ZUC_Integrity
Called By:
Input:
Output:
Return: 0:success
 1:error
Others:
****************************************************************/
int ZUC_SelfCheck()
{
 int i;
 /**************** KeyStream generation validation data ***************************/
 // (all 0)
 /* unsigned char 
k[16]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
 unsigned char 
iv[16]={0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
 unsigned int Std_Keystream[2]={0x27bede74,0x018082da};*/
 //(all 1)
 /*unsigned char 
k[16]={0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff};
 unsigned char 
iv[16]={0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff};
 unsigned int Std_Keystream[2]={0x0657cfa0,0x7096398b};*/
 //(random)
 unsigned char 
k[16]={0x3d,0x4c,0x4b,0xe9,0x6a,0x82,0xfd,0xae,0xb5,0x8f,0x64,0x1d,0xb1,0x7b,0x45,0x5b};
 unsigned char 
iv[16]={0x84,0x31,0x9a,0xa8,0xde,0x69,0x15,0xca,0x1f,0x6b,0xda,0x6b,0xfb,0xd8,0xc7,0x66};
 unsigned int Std_Keystream[2]={0x14f1c272,0x3279c419};
 int KeystreamLen=2;//the length of key stream
 unsigned int Keystream[2];
 /******************* Confidentiality validation data ***************************/
 unsigned char key[16] = 
{0x17,0x3d,0x14,0xba,0x50,0x03,0x73,0x1d,0x7a,0x60,0x04,0x94,0x70,0xf0,0x0a,0x29};
 unsigned int COUNT=0x66035492;
 unsigned char BEARER=0x0f;
 unsigned char DIRECTION=0x00;
 unsigned int plain[7] = 
{0x6cf65340,0x735552ab,0x0c9752fa,0x6f9025fe,0x0bd675d9,0x005875b2,0x00000000};
 unsigned int Std_cipher[7] = 
{0xa6c85fc6,0x6afb8533,0xaafc2518,0xdfe78494,0x0ee1e4b0,0x30238cc8,0x00000000};
 int plainlen = 0xc1;
 unsigned int cipher[7];
 //2
 //unsigned char key[16] = 
{0xe5,0xbd,0x3e,0xa0,0xeb,0x55,0xad,0xe8,0x66,0xc6,0xac,0x58,0xbd,0x54,0x30,0x2a};
 //unsigned int COUNT=0x00056823;
 //unsigned char BEARER=0x18;
 //unsigned char DIRECTION=0x01;
 //unsigned int plain[25] = 
{0x14a8ef69,0x3d678507,0xbbe7270a,0x7f67ff50,0x06c3525b,0x9807e467,0xc4e56000,
 // 
0xba338f5d,0x42955903,0x67518222,0x46c80d3b,0x38f07f4b,0xe2d8ff58,0x05f51322,0x29bde93b,0xbb
dcaf38,
 // 
0x2bf1ee97,0x2fbf9977,0xbada8945,0x847a2a6c,0x9ad34a66,0x7554e04d,0x1f7fa2c3,0x3241bd8f,0x01
ba220d};
 //unsigned int Std_cipher[25] = 
{0x131d43e0,0xdea1be5c,0x5a1bfd97,0x1d852cbf,0x712d7b4f,0x57961fea,0x3208afa8,
 // 
0xbca433f4,0x56ad09c7,0x417e58bc,0x69cf8866,0xd1353f74,0x865e8078,0x1d202dfb,0x3ecff7fc,0xbc
3b190f,
 // 
0xe82a204e,0xd0e350fc,0x0f6f2613,0xb2f2bca6,0xdf5a473a,0x57a4a00d,0x985ebad8,0x80d6f238,0x64
a07b01};
 //int plainlen = 0x0320;
 //unsigned int cipher[25];
 //3
 //unsigned char key[16] = 
{0xe1,0x3f,0xed,0x21,0xb4,0x6e,0x4e,0x7e,0xc3,0x12,0x53,0xb2,0xbb,0x17,0xb3,0xe0};
 //unsigned int COUNT=0x2738cdaa;
 //unsigned char BEARER=0x1a;
 //unsigned char DIRECTION=0x00;
 //unsigned int plain[126] = 
{0x8d74e20d,0x54894e06,0xd3cb13cb,0x3933065e,0x8674be62,0xadb1c72b,0x3a646965,
 // 
0xab63cb7b,0x7854dfdc,0x27e84929,0xf49c64b8,0x72a490b1,0x3f957b64,0x827e71f4,0x1fbd4269,0xa4
2c97f8,
 // 
0x24537027,0xf86e9f4a,0xd82d1df4,0x51690fdd,0x98b6d03f,0x3a0ebe3a,0x312d6b84,0x0ba5a182,0x0b
2a2c97,
 // 
0x09c090d2,0x45ed267c,0xf845ae41,0xfa975d33,0x33ac3009,0xfd40eba9,0xeb5b8857,0x14b768b6,0x97
138baf,
 // 
0x21380eca,0x49f644d4,0x8689e421,0x5760b906,0x739f0d2b,0x3f091133,0xca15d981,0xcbe401ba,0xf7
2d05ac,
 // 
0xe05cccb2,0xd297f4ef,0x6a5f58d9,0x1246cfa7,0x7215b892,0xab441d52,0x78452795,0xccb7f5d7,0x90
57a1c4,
 // 
0xf77f80d4,0x6db2033c,0xb79bedf8,0xe60551ce,0x10c667f6,0x2a97abaf,0xabbcd677,0x2018df96,0xa2
82ea73,
 // 
0x7ce2cb33,0x1211f60d,0x5354ce78,0xf9918d9c,0x206ca042,0xc9b62387,0xdd709604,0xa50af16d,0x8d
35a890,
 // 
0x6be484cf,0x2e74a928,0x99403643,0x53249b27,0xb4c9ae29,0xeddfc7da,0x6418791a,0x4e7baa06,0x60
fa6451,
 // 
0x1f2d685c,0xc3a5ff70,0xe0d2b742,0x92e3b8a0,0xcd6b04b1,0xc790b8ea,0xd2703708,0x540dea2f,0xc0
9c3da7,
 // 
0x70f65449,0xe84d817a,0x4f551055,0xe19ab850,0x18a0028b,0x71a144d9,0x6791e9a3,0x57793350,0x4e
ee0060,
 // 
0x340c69d2,0x74e1bf9d,0x805dcbcc,0x1a6faa97,0x6800b6ff,0x2b671dc4,0x63652fa8,0xa33ee509,0x74
c1c21b,
 // 
0xe01eabb2,0x16743026,0x9d72ee51,0x1c9dde30,0x797c9a25,0xd86ce74f,0x5b961be5,0xfdfb6807,0x81
4039e7,
 // 
0x137636bd,0x1d7fa9e0,0x9efd2007,0x505906a5,0xac45dfde,0xed7757bb,0xee745749,0xc2963335,0x0b
ee0ea6,
 // 0xf409df45,0x80160000};
 //unsigned int Std_cipher[126] = 
{0x94eaa4aa,0x30a57137,0xddf09b97,0xb25618a2,0x0a13e2f1,0x0fa5bf81,0x61a879cc,
 // 
0x2ae797a6,0xb4cf2d9d,0xf31debb9,0x905ccfec,0x97de605d,0x21c61ab8,0x531b7f3c,0x9da5f039,0x31
f8a064,
 // 
0x2de48211,0xf5f52ffe,0xa10f392a,0x04766998,0x5da454a2,0x8f080961,0xa6c2b62d,0xaa17f33c,0xd6
0a4971,
 // 
0xf48d2d90,0x9394a55f,0x48117ace,0x43d708e6,0xb77d3dc4,0x6d8bc017,0xd4d1abb7,0x7b7428c0,0x42
b06f2f,
 // 
0x99d8d07c,0x9879d996,0x00127a31,0x985f1099,0xbbd7d6c1,0x519ede8f,0x5eeb4a61,0x0b349ac0,0x1e
a23506,
 // 
0x91756bd1,0x05c974a5,0x3eddb35d,0x1d4100b0,0x12e522ab,0x41f4c5f2,0xfde76b59,0xcb8b96d8,0x85
cfe408,
 // 
0x0d1328a0,0xd636cc0e,0xdc05800b,0x76acca8f,0xef672084,0xd1f52a8b,0xbd8e0993,0x320992c7,0xff
bae17c,
 // 
0x408441e0,0xee883fc8,0xa8b05e22,0xf5ff7f8d,0x1b48c74c,0x468c467a,0x028f09fd,0x7ce91109,0xa5
70a2d5,
 // 
0xc4d5f4fa,0x18c5dd3e,0x4562afe2,0x4ef77190,0x1f59af64,0x5898acef,0x088abae0,0x7e92d52e,0xb2
de5504,
 // 
0x5bb1b7c4,0x164ef2d7,0xa6cac15e,0xeb926d7e,0xa2f08b66,0xe1f759f3,0xaee44614,0x725aa3c7,0x48
2b3084,
 // 
0x4c143ff8,0x5b53f1e5,0x83c50125,0x7dddd096,0xb81268da,0xa303f172,0x34c23335,0x41f0bb8e,0x19
0648c5,
 // 
0x807c866d,0x71932286,0x09adb948,0x686f7de2,0x94a802cc,0x38f7fe52,0x08f5ea31,0x96d0167b,0x9b
dd02f0,
 // 
0xd2a5221c,0xa508f893,0xaf5c4b4b,0xb9f4f520,0xfd84289b,0x3dbe7e61,0x497a7e2a,0x584037ea,0x63
7b6981,
 // 
0x127174af,0x57b471df,0x4b2768fd,0x79c1540f,0xb3edf2ea,0x22cb69be,0xc0cf8d93,0x3d9c6fdd,0x64
5e8505,
 // 0x91cca3d6,0x2c0cc000};
 //int plainlen = 0x0fb3;
 //unsigned int cipher[126];
 /******************* Integrity validation data ***************************/
 //1
 unsigned char IK[16] = 
{0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00};
 unsigned int counter=0x00000000;
 unsigned char bear=0x00;
 unsigned char direc=0x00;
 unsigned int message[1] = {0x00000000};
 int length = 1;
 unsigned int Std_MAC=0xc8a9595e;
 //2
 //unsigned char IK[16] = 
{0xc9,0xe6,0xce,0xc4,0x60,0x7c,0x72,0xdb,0x00,0x0a,0xef,0xa8,0x83,0x85,0xab,0x0a};
 //unsigned int counter=0xa94059da;
 //unsigned char bear=0x0a;
 //unsigned char direc=0x01;
 //unsigned int message[19] = 
{0x983b41d4,0x7d780c9e,0x1ad11d7e,0xb70391b1,0xde0b35da,0x2dc62f83,0xe7b78d63,
 // 
0x06ca0ea0,0x7e941b7b,0xe91348f9,0xfcb170e2,0x217fecd9,0x7f9f68ad,0xb16e5d7d,0x21e569d2,0x80
ed775c,
 // 0xebde3f40,0x93c53881,0x00000000};
 //int length = 0x0241;
 //unsigned int Std_MAC=0xfae8ff0b;
 //3
 /* unsigned char IK[16] = 
{0x6b,0x8b,0x08,0xee,0x79,0xe0,0xb5,0x98,0x2d,0x6d,0x12,0x8e,0xa9,0xf2,0x20,0xcb};
 unsigned int counter=0x561eb2dd;
 unsigned char bear=0x1c;
 unsigned char direc=0x00;
 unsigned int message[178] = 
{0x5bad7247,0x10ba1c56,0xd5a315f8,0xd40f6e09,0x3780be8e,0x8de07b69,0x92432018,
 
0xe08ed96a,0x5734af8b,0xad8a575d,0x3a1f162f,0x85045cc7,0x70925571,0xd9f5b94e,0x454a77c1,0x6e
72936b,
 
0xf016ae15,0x7499f054,0x3b5d52ca,0xa6dbeab6,0x97d2bb73,0xe41b8075,0xdce79b4b,0x86044f66,0x1d
4485a5,
 
0x43dd7860,0x6e0419e8,0x059859d3,0xcb2b67ce,0x0977603f,0x81ff839e,0x33185954,0x4cfbc8d0,0x0f
ef1a4c,
 
0x8510fb54,0x7d6b06c6,0x11ef44f1,0xbce107cf,0xa45a06aa,0xb360152b,0x28dc1ebe,0x6f7fe09b,0x05
16f9a5,
 
0xb02a1bd8,0x4bb0181e,0x2e89e19b,0xd8125930,0xd178682f,0x3862dc51,0xb636f04e,0x720c47c3,0xce
51ad70,
 
0xd94b9b22,0x55fbae90,0x6549f499,0xf8c6d399,0x47ed5e5d,0xf8e2def1,0x13253e7b,0x08d0a76b,0x6b
fc68c8,
 
0x12f375c7,0x9b8fe5fd,0x85976aa6,0xd46b4a23,0x39d8ae51,0x47f680fb,0xe70f978b,0x38effd7b,0x2f
7866a2,
 
0x2554e193,0xa94e98a6,0x8b74bd25,0xbb2b3f5f,0xb0a5fd59,0x887f9ab6,0x8159b717,0x8d5b7b67,0x7c
b546bf,
 
0x41eadca2,0x16fc1085,0x0128f8bd,0xef5c8d89,0xf96afa4f,0xa8b54885,0x565ed838,0xa950fee5,0xf1
c3b0a4,
 
0xf6fb71e5,0x4dfd169e,0x82cecc72,0x66c850e6,0x7c5ef0ba,0x960f5214,0x060e71eb,0x172a75fc,0x14
86835c,
 
0xbea65344,0x65b055c9,0x6a72e410,0x52241823,0x25d83041,0x4b40214d,0xaa8091d2,0xe0fb010a,0xe1
5c6de9,
 
0x0850973b,0xdf1e423b,0xe148a237,0xb87a0c9f,0x34d4b476,0x05b803d7,0x43a86a90,0x399a4af3,0x96
d3a120,
 
0x0a62f3d9,0x507962e8,0xe5bee6d3,0xda2bb3f7,0x237664ac,0x7a292823,0x900bc635,0x03b29e80,0xd6
3f6067,
 
0xbf8e1716,0xac25beba,0x350deb62,0xa99fe031,0x85eb4f69,0x937ecd38,0x7941fda5,0x44ba67db,0x09
117749,
 
0x38b01827,0xbcc69c92,0xb3f772a9,0xd2859ef0,0x03398b1f,0x6bbad7b5,0x74f7989a,0x1d10b2df,0x79
8e0dbf,
 
0x30d65874,0x64d24878,0xcd00c0ea,0xee8a1a0c,0xc753a279,0x79e11b41,0xdb1de3d5,0x038afaf4,0x9f
5c682c,
 
0x3748d8a3,0xa9ec54e6,0xa371275f,0x1683510f,0x8e4f9093,0x8f9ab6e1,0x34c2cfdf,0x4841cba8,0x8e
0cff2b,
 
0x0bcc8e6a,0xdcb71109,0xb5198fec,0xf1bb7e5c,0x531aca50,0xa56a8a3b,0x6de59862,0xd41fa113,0xd9
cd9578,
 
0x08f08571,0xd9a4bb79,0x2af271f6,0xcc6dbb8d,0xc7ec36e3,0x6be1ed30,0x8164c31c,0x7c0afc54,0x1c
000000};
 int length = 0x1626;
 unsigned int Std_MAC=0x0ca12792;*/
 unsigned int MAC;
 /**************** KeyStream generation testing ***************************/
 ZUC_GenKeyStream(k,iv,Keystream,KeystreamLen);
 for(i=0;i<KeystreamLen;i++)
 {
 printf("%s","z = ");
 printf("%08x\n", Keystream[i]);
 }
 if (memcmp(Keystream,Std_Keystream,KeystreamLen*8))
 return 1;
 /**************** Confidentialitym testing ***************************/
 printf("\n****************confidentiality validation******************");
 ZUC_Confidentiality(key,COUNT,BEARER,DIRECTION,plain,plainlen,cipher);
 printf("\nIBS:\n");
 for(i = 0; i <(plainlen + 31) / 32; i++)
 {
 printf("%08x ", plain[i]);
 }
 printf("\nOBS:\n");
 for(i = 0; i < (plainlen + 31) / 32; i++)
 {
 printf("%08x ", cipher[i]);
 }
 if (memcmp(cipher,Std_cipher,(plainlen + 31) / 32))
 return 1;
 /**************** Integrity testing ***************************/
 printf("\n\n****************Integrity validation****************");
 MAC=ZUC_Integrity(IK,counter,bear,direc,message,length);
 printf("\nMAC = %08x ",MAC);
 if (MAC!=Std_MAC)
 return 1;
 return 0;
}