diff options
Diffstat (limited to 'openaes/test/vt_aes.c')
-rw-r--r-- | openaes/test/vt_aes.c | 405 |
1 files changed, 405 insertions, 0 deletions
diff --git a/openaes/test/vt_aes.c b/openaes/test/vt_aes.c new file mode 100644 index 000000000..1ba755e42 --- /dev/null +++ b/openaes/test/vt_aes.c @@ -0,0 +1,405 @@ +/* + * --------------------------------------------------------------------------- + * OpenAES License + * --------------------------------------------------------------------------- + * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are met: + * + * - Redistributions of source code must retain the above copyright notice, + * this list of conditions and the following disclaimer. + * - Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE + * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + * --------------------------------------------------------------------------- + */ + +#include <stdio.h> +#include <stdlib.h> +#include <string.h> + +#define OAES_DEBUG 1 +#include "oaes_lib.h" + +static int _is_step = 1; + +static int step_cb( + const uint8_t state[OAES_BLOCK_SIZE], + const char * step_name, + int step_count, + void * user_data ) +{ + size_t _buf_len; + char * _buf; + + + if( NULL == state ) + return 1; + + oaes_sprintf( NULL, &_buf_len, state, OAES_BLOCK_SIZE ); + _buf = (char *) calloc( _buf_len, sizeof( char ) ); + + if( _buf ) + { + oaes_sprintf( _buf, &_buf_len, state, OAES_BLOCK_SIZE ); + printf( "round[%2d].%-7s --> %s", step_count, step_name, _buf ); + free( _buf ); + } + + if( 1 == _is_step && '\n' != getchar( ) ) + _is_step = 0; + + return 0; +} + +static int to_binary(uint8_t * buf, size_t * buf_len, const char * data) +{ + size_t _i, _buf_len_in; + + if( NULL == buf_len ) + return 1; + + if( NULL == data ) + return 1; + + _buf_len_in = *buf_len; + *buf_len = strlen( data ) / 2; + + if( NULL == buf ) + return 0; + + if( *buf_len > _buf_len_in ) + return 1; + + memset( buf, 0, strlen( data ) / 2 ); + + // lookup ascii table + for( _i = 0; _i < strlen( data ); _i++ ) + { + // 0-9 + if( data[_i] >= 0x30 && data[_i] <= 0x39 ) + buf[_i / 2] += ( data[_i] - 0x30 ) << ( 4 * ( ( _i + 1 ) % 2 ) ) ; + // a-f + else if( data[_i] >= 0x41 && data[_i] <= 0x46 ) + buf[_i / 2] += ( data[_i] - 0x37 ) << ( 4 * ( ( _i + 1 ) % 2 ) ); + // A-F + else if( data[_i] >= 0x61 && data[_i] <= 0x66 ) + buf[_i / 2] += ( data[_i] - 0x57 ) << ( 4 * ( ( _i + 1 ) % 2 ) ); + // invalid character + else + return 1; + } + + return 0; +} + +static void usage(const char * exe_name) +{ + if( NULL == exe_name ) + return; + + printf( + "Usage:\n" + " %s [-step] [-ecb] [[-key < 128 | 192 | 256 | key_data >] [-bin] <text>\n", + exe_name + ); +} + +int main(int argc, char** argv) +{ + size_t _i; + OAES_CTX * ctx = NULL; + uint8_t *_encbuf, *_decbuf, *_key_data = NULL, *_bin_data = NULL; + size_t _encbuf_len, _decbuf_len, _buf_len; + size_t _key_data_len = 0, _bin_data_len = 0; + char *_buf; + short _is_ecb = 0, _is_bin = 0; + char * _text = NULL, * _key_text = NULL; + int _key_len = 128; + + if( argc < 2 ) + { + usage( argv[0] ); + return EXIT_FAILURE; + } + + for( _i = 1; _i < argc; _i++ ) + { + int _found = 0; + + if( 0 == strcmp( argv[_i], "-nostep" ) ) + { + _found = 1; + _is_step = 0; + } + + if( 0 == strcmp( argv[_i], "-ecb" ) ) + { + _found = 1; + _is_ecb = 1; + } + + if( 0 == strcmp( argv[_i], "-bin" ) ) + { + _found = 1; + _is_bin = 1; + } + + if( 0 == strcmp( argv[_i], "-key" ) ) + { + _found = 1; + _i++; // len + if( _i >= argc ) + { + printf("Error: No value specified for '-%s'.\n", + "key"); + usage( argv[0] ); + return EXIT_FAILURE; + } + _key_len = atoi( argv[_i] ); + switch( _key_len ) + { + case 128: + case 192: + case 256: + break; + default: + _key_text = argv[_i]; + if( to_binary( NULL, &_key_data_len, _key_text ) ) + { + printf( "Error: Invalid value [%s] specified for '-%s'.\n", + argv[_i], "key" ); + return EXIT_FAILURE; + } + switch( _key_data_len ) + { + case 16: + case 24: + case 32: + break; + default: + printf("Error: key_data [%s] specified for '-%s' has an invalid " + "size.\n", argv[_i], "key"); + usage( argv[0] ); + return EXIT_FAILURE; + } + } + } + + if( 0 == _found ) + { + if( _text ) + { + printf("Error: Invalid option '%s'.\n", argv[_i]); + usage( argv[0] ); + return EXIT_FAILURE; + } + else + { + _text = argv[_i]; + if( _is_bin && to_binary( NULL, &_bin_data_len, _text ) ) + { + printf( "Error: Invalid value [%s] specified for '-%s'.\n", + argv[_i], "bin" ); + return EXIT_FAILURE; + } + } + } + } + + if( NULL == _text ) + { + usage( argv[0] ); + return EXIT_FAILURE; + } + + if( _is_step ) + printf( "\nEnabling step mode, press Return to step.\n\n" ); + + if( _is_bin ) + { + _bin_data = (uint8_t *) calloc(_bin_data_len, sizeof(uint8_t)); + if( NULL == _bin_data ) + { + printf( "Error: Failed to allocate memory.\n" ); + return EXIT_FAILURE; + } + if( to_binary( _bin_data, &_bin_data_len, _text ) ) + { + printf( "Error: Could not load data [%s].\n", _text); + free( _bin_data ); + return EXIT_FAILURE; + } + } + else + { + oaes_sprintf( NULL, &_buf_len, (const uint8_t *)_text, strlen(_text)); + _buf = (char *) calloc(_buf_len, sizeof(char)); + printf( "\n***** plaintext *****\n" ); + if( _buf ) + { + oaes_sprintf( _buf, &_buf_len, + (const uint8_t *)_text, strlen( _text ) ); + printf( "%s", _buf ); + } + printf( "\n**********************\n" ); + free( _buf ); + } + + ctx = oaes_alloc(); + if( NULL == ctx ) + { + printf("Error: Failed to initialize OAES.\n"); + if( _bin_data ) + free( _bin_data ); + return EXIT_FAILURE; + } + if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_STEP_ON, step_cb ) ) + printf("Error: Failed to set OAES options.\n"); + if( _is_ecb ) + if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) ) + printf("Error: Failed to set OAES options.\n"); + + if( _key_text ) + { + _key_data = (uint8_t *) calloc(_key_data_len, sizeof(uint8_t)); + if( NULL == _key_data ) + { + printf( "Error: Failed to allocate memory.\n" ); + if( _bin_data ) + free( _bin_data ); + return EXIT_FAILURE; + } + if( to_binary( _key_data, &_key_data_len, _key_text ) ) + { + printf( "Error: Could not load key [%s].\n", _key_text); + free( _key_data ); + return EXIT_FAILURE; + } + oaes_key_import_data( ctx, _key_data, _key_data_len ); + } + else + switch( _key_len ) + { + case 128: + if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) ) + printf("Error: Failed to generate OAES %d bit key.\n", _key_len); + break; + case 192: + if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) ) + printf("Error: Failed to generate OAES %d bit key.\n", _key_len); + break; + case 256: + if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) ) + printf("Error: Failed to generate OAES %d bit key.\n", _key_len); + break; + default: + break; + } + + if( _bin_data ) + { + if( OAES_RET_SUCCESS != oaes_encrypt( ctx, + _bin_data, _bin_data_len, NULL, &_encbuf_len ) ) + printf("Error: Failed to retrieve required buffer size for encryption.\n"); + _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t)); + if( NULL == _encbuf ) + { + printf( "Error: Failed to allocate memory.\n" ); + if( _key_data ) + free( _key_data ); + free( _bin_data ); + return EXIT_FAILURE; + } + printf( "\n" ); + if( OAES_RET_SUCCESS != oaes_encrypt( ctx, + _bin_data, _bin_data_len, _encbuf, &_encbuf_len ) ) + printf("Error: Encryption failed.\n"); + printf( "\n**********************\n\n" ); + } + else + { + if( OAES_RET_SUCCESS != oaes_encrypt( ctx, + (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) ) + printf("Error: Failed to retrieve required buffer size for encryption.\n"); + _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t)); + if( NULL == _encbuf ) + { + printf( "Error: Failed to allocate memory.\n" ); + if( _key_data ) + free( _key_data ); + return EXIT_FAILURE; + } + printf( "\n" ); + if( OAES_RET_SUCCESS != oaes_encrypt( ctx, + (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) ) + printf("Error: Encryption failed.\n"); + printf( "\n**********************\n\n" ); + } + + if( OAES_RET_SUCCESS != oaes_decrypt( ctx, + _encbuf, _encbuf_len, NULL, &_decbuf_len ) ) + printf("Error: Failed to retrieve required buffer size for encryption.\n"); + _decbuf = (uint8_t *) calloc(_decbuf_len, sizeof(uint8_t)); + if( NULL == _decbuf ) + { + printf( "Error: Failed to allocate memory.\n" ); + if( _key_data ) + free( _key_data ); + if( _bin_data ) + free( _bin_data ); + free( _encbuf ); + return EXIT_FAILURE; + } + if( OAES_RET_SUCCESS != oaes_decrypt( ctx, + _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) ) + printf("Error: Decryption failed.\n"); + + if( OAES_RET_SUCCESS != oaes_free( &ctx ) ) + printf("Error: Failed to uninitialize OAES.\n"); + + oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len ); + _buf = (char *) calloc(_buf_len, sizeof(char)); + printf( "\n***** cyphertext *****\n" ); + if( _buf ) + { + oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len ); + printf( "%s", _buf ); + } + printf( "\n**********************\n" ); + free( _buf ); + + oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len ); + _buf = (char *) calloc(_buf_len, sizeof(char)); + printf( "\n***** plaintext *****\n" ); + if( _buf ) + { + oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len ); + printf( "%s", _buf ); + } + printf( "\n**********************\n\n" ); + free( _buf ); + + free( _encbuf ); + free( _decbuf ); + if( _key_data ) + free( _key_data ); + if( _bin_data ) + free( _bin_data ); + + return (EXIT_SUCCESS); +} |