summaryrefslogtreecommitdiffstats
path: root/openaes/test/vt_aes.c
diff options
context:
space:
mode:
authorDees_Troy <dees_troy@teamw.in>2013-05-04 14:39:56 +0200
committerDees_Troy <dees_troy@yahoo.com>2013-06-22 23:16:55 +0200
commit83bd483f3db1df4b69c1612030e1a1be05b303ad (patch)
treed5c7b468b831244bfcd90aadda98b9d359d0d280 /openaes/test/vt_aes.c
parentFix building of updater binary (diff)
downloadandroid_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.gz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.bz2
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.lz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.xz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.zst
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.zip
Diffstat (limited to 'openaes/test/vt_aes.c')
-rw-r--r--openaes/test/vt_aes.c405
1 files changed, 405 insertions, 0 deletions
diff --git a/openaes/test/vt_aes.c b/openaes/test/vt_aes.c
new file mode 100644
index 000000000..1ba755e42
--- /dev/null
+++ b/openaes/test/vt_aes.c
@@ -0,0 +1,405 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#define OAES_DEBUG 1
+#include "oaes_lib.h"
+
+static int _is_step = 1;
+
+static int step_cb(
+ const uint8_t state[OAES_BLOCK_SIZE],
+ const char * step_name,
+ int step_count,
+ void * user_data )
+{
+ size_t _buf_len;
+ char * _buf;
+
+
+ if( NULL == state )
+ return 1;
+
+ oaes_sprintf( NULL, &_buf_len, state, OAES_BLOCK_SIZE );
+ _buf = (char *) calloc( _buf_len, sizeof( char ) );
+
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, state, OAES_BLOCK_SIZE );
+ printf( "round[%2d].%-7s --> %s", step_count, step_name, _buf );
+ free( _buf );
+ }
+
+ if( 1 == _is_step && '\n' != getchar( ) )
+ _is_step = 0;
+
+ return 0;
+}
+
+static int to_binary(uint8_t * buf, size_t * buf_len, const char * data)
+{
+ size_t _i, _buf_len_in;
+
+ if( NULL == buf_len )
+ return 1;
+
+ if( NULL == data )
+ return 1;
+
+ _buf_len_in = *buf_len;
+ *buf_len = strlen( data ) / 2;
+
+ if( NULL == buf )
+ return 0;
+
+ if( *buf_len > _buf_len_in )
+ return 1;
+
+ memset( buf, 0, strlen( data ) / 2 );
+
+ // lookup ascii table
+ for( _i = 0; _i < strlen( data ); _i++ )
+ {
+ // 0-9
+ if( data[_i] >= 0x30 && data[_i] <= 0x39 )
+ buf[_i / 2] += ( data[_i] - 0x30 ) << ( 4 * ( ( _i + 1 ) % 2 ) ) ;
+ // a-f
+ else if( data[_i] >= 0x41 && data[_i] <= 0x46 )
+ buf[_i / 2] += ( data[_i] - 0x37 ) << ( 4 * ( ( _i + 1 ) % 2 ) );
+ // A-F
+ else if( data[_i] >= 0x61 && data[_i] <= 0x66 )
+ buf[_i / 2] += ( data[_i] - 0x57 ) << ( 4 * ( ( _i + 1 ) % 2 ) );
+ // invalid character
+ else
+ return 1;
+ }
+
+ return 0;
+}
+
+static void usage(const char * exe_name)
+{
+ if( NULL == exe_name )
+ return;
+
+ printf(
+ "Usage:\n"
+ " %s [-step] [-ecb] [[-key < 128 | 192 | 256 | key_data >] [-bin] <text>\n",
+ exe_name
+ );
+}
+
+int main(int argc, char** argv)
+{
+ size_t _i;
+ OAES_CTX * ctx = NULL;
+ uint8_t *_encbuf, *_decbuf, *_key_data = NULL, *_bin_data = NULL;
+ size_t _encbuf_len, _decbuf_len, _buf_len;
+ size_t _key_data_len = 0, _bin_data_len = 0;
+ char *_buf;
+ short _is_ecb = 0, _is_bin = 0;
+ char * _text = NULL, * _key_text = NULL;
+ int _key_len = 128;
+
+ if( argc < 2 )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ for( _i = 1; _i < argc; _i++ )
+ {
+ int _found = 0;
+
+ if( 0 == strcmp( argv[_i], "-nostep" ) )
+ {
+ _found = 1;
+ _is_step = 0;
+ }
+
+ if( 0 == strcmp( argv[_i], "-ecb" ) )
+ {
+ _found = 1;
+ _is_ecb = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-bin" ) )
+ {
+ _found = 1;
+ _is_bin = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-key" ) )
+ {
+ _found = 1;
+ _i++; // len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ _key_len = atoi( argv[_i] );
+ switch( _key_len )
+ {
+ case 128:
+ case 192:
+ case 256:
+ break;
+ default:
+ _key_text = argv[_i];
+ if( to_binary( NULL, &_key_data_len, _key_text ) )
+ {
+ printf( "Error: Invalid value [%s] specified for '-%s'.\n",
+ argv[_i], "key" );
+ return EXIT_FAILURE;
+ }
+ switch( _key_data_len )
+ {
+ case 16:
+ case 24:
+ case 32:
+ break;
+ default:
+ printf("Error: key_data [%s] specified for '-%s' has an invalid "
+ "size.\n", argv[_i], "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ }
+ }
+
+ if( 0 == _found )
+ {
+ if( _text )
+ {
+ printf("Error: Invalid option '%s'.\n", argv[_i]);
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ else
+ {
+ _text = argv[_i];
+ if( _is_bin && to_binary( NULL, &_bin_data_len, _text ) )
+ {
+ printf( "Error: Invalid value [%s] specified for '-%s'.\n",
+ argv[_i], "bin" );
+ return EXIT_FAILURE;
+ }
+ }
+ }
+ }
+
+ if( NULL == _text )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ if( _is_step )
+ printf( "\nEnabling step mode, press Return to step.\n\n" );
+
+ if( _is_bin )
+ {
+ _bin_data = (uint8_t *) calloc(_bin_data_len, sizeof(uint8_t));
+ if( NULL == _bin_data )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ return EXIT_FAILURE;
+ }
+ if( to_binary( _bin_data, &_bin_data_len, _text ) )
+ {
+ printf( "Error: Could not load data [%s].\n", _text);
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ }
+ else
+ {
+ oaes_sprintf( NULL, &_buf_len, (const uint8_t *)_text, strlen(_text));
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+ }
+
+ ctx = oaes_alloc();
+ if( NULL == ctx )
+ {
+ printf("Error: Failed to initialize OAES.\n");
+ if( _bin_data )
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_STEP_ON, step_cb ) )
+ printf("Error: Failed to set OAES options.\n");
+ if( _is_ecb )
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) )
+ printf("Error: Failed to set OAES options.\n");
+
+ if( _key_text )
+ {
+ _key_data = (uint8_t *) calloc(_key_data_len, sizeof(uint8_t));
+ if( NULL == _key_data )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _bin_data )
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ if( to_binary( _key_data, &_key_data_len, _key_text ) )
+ {
+ printf( "Error: Could not load key [%s].\n", _key_text);
+ free( _key_data );
+ return EXIT_FAILURE;
+ }
+ oaes_key_import_data( ctx, _key_data, _key_data_len );
+ }
+ else
+ switch( _key_len )
+ {
+ case 128:
+ if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 192:
+ if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 256:
+ if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ default:
+ break;
+ }
+
+ if( _bin_data )
+ {
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ _bin_data, _bin_data_len, NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t));
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ printf( "\n" );
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ _bin_data, _bin_data_len, _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+ printf( "\n**********************\n\n" );
+ }
+ else
+ {
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t));
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ return EXIT_FAILURE;
+ }
+ printf( "\n" );
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+ printf( "\n**********************\n\n" );
+ }
+
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, NULL, &_decbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _decbuf = (uint8_t *) calloc(_decbuf_len, sizeof(uint8_t));
+ if( NULL == _decbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ if( _bin_data )
+ free( _bin_data );
+ free( _encbuf );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) )
+ printf("Error: Decryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_free( &ctx ) )
+ printf("Error: Failed to uninitialize OAES.\n");
+
+ oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** cyphertext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n\n" );
+ free( _buf );
+
+ free( _encbuf );
+ free( _decbuf );
+ if( _key_data )
+ free( _key_data );
+ if( _bin_data )
+ free( _bin_data );
+
+ return (EXIT_SUCCESS);
+}