/* $OpenBSD: aestest.c,v 1.5 2021/12/13 16:56:49 deraadt Exp $ */ /* * Copyright (c) 2002 Markus Friedl. All rights reserved. * Copyright (c) 2008 Damien Miller. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ /* * Test kernel AES implementation with test vectors provided by * Dr Brian Gladman: http://fp.gladman.plus.com/AES/ */ #include #include #include #include #include #include #include #include static int docrypt(const unsigned char *key, size_t klen, const unsigned char *in, unsigned char *out, size_t len, int do_encrypt) { AES_CTX ctx; int error = 0; memset(&ctx, 0, sizeof(ctx)); error = AES_Setkey(&ctx, key, klen); if (error) return -1; if (do_encrypt) AES_Encrypt(&ctx, in, out); else AES_Decrypt(&ctx, in, out); return 0; } static int match(unsigned char *a, unsigned char *b, size_t len) { size_t i; if (memcmp(a, b, len) == 0) return (1); warnx("decrypt/plaintext mismatch"); for (i = 0; i < len; i++) printf("%2.2x", a[i]); printf("\n"); for (i = 0; i < len; i++) printf("%2.2x", b[i]); printf("\n"); return (0); } /* * Match expected substring at start of line. If sequence is match, return * a pointer to the first character in the string past the sequence and and * following whitespace. * returns NULL is the start of the line does not match. */ static const char * startswith(const char *line, const char *startswith) { size_t len = strlen(startswith); if (strncmp(line, startswith, len) != 0) return NULL; line = line + len; while (isspace((unsigned char)*line)) line++; return line; } /* Read a hex string and convert to bytes */ static void parsehex(const char *hex, u_char **s, u_int *lenp) { u_char *ret, v; u_int i, len; char c; len = i = 0; ret = NULL; v = 0; while ((c = *(hex++)) != '\0') { if (strchr(" \t\r\n", c) != NULL) continue; if (c >= '0' && c <= '9') v |= c - '0'; else if (c >= 'a' && c <= 'f') v |= 10 + (c - 'a'); else if (c >= 'A' && c <= 'F') v |= 10 + c - 'A'; else errx(1, "%s: invalid character \"%c\" in hex string", __func__, c); switch (++i) { case 1: v <<= 4; break; case 2: if ((ret = realloc(ret, ++len)) == NULL) errx(1, "realloc(%u)", len); ret[len - 1] = v; v = 0; i = 0; } } if (i != 0) errx(1, "%s: odd number of characters in hex string", __func__); *lenp = len; *s = ret; } static int do_tests(const char *filename, int test_num, u_char *key, u_int keylen, u_char *plaintext, u_char *ciphertext, u_int textlen) { char result[32]; int fail = 0; /* Encrypt test */ if (docrypt(key, keylen, plaintext, result, textlen, 1) < 0) { warnx("encryption failed"); fail++; } else if (!match(result, ciphertext, textlen)) { fail++; } else printf("OK encrypt test vector %s %u\n", filename, test_num); /* Decrypt test */ if (docrypt(key, keylen, ciphertext, result, textlen, 0) < 0) { warnx("decryption failed"); fail++; } else if (!match(result, plaintext, textlen)) { fail++; } else printf("OK decrypt test vector %s %u\n", filename, test_num); return fail; } static int run_file(const char *filename) { FILE *tv; char buf[1024], *eol; const char *cp, *errstr; int lnum = 0, fail = 0; u_char *key, *plaintext, *ciphertext; u_int keylen, textlen, tmp; int blocksize, keysize, test; if ((tv = fopen(filename, "r")) == NULL) err(1, "fopen(\"%s\")", filename); keylen = textlen = tmp = 0; key = ciphertext = plaintext = NULL; blocksize = keysize = test = -1; while ((fgets(buf, sizeof(buf), tv)) != NULL) { lnum++; eol = buf + strlen(buf) - 1; if (*eol != '\n') errx(1, "line %d: too long", lnum); if (eol > buf && *(eol - 1) == '\r') eol--; *eol = '\0'; if ((cp = startswith(buf, "BLOCKSIZE=")) != NULL) { if (blocksize != -1) errx(1, "line %d: blocksize already set", lnum); blocksize = (int)strtonum(cp, 128, 128, &errstr); if (errstr) errx(1, "line %d: blocksize is %s: \"%s\"", lnum, errstr, cp); } else if ((cp = startswith(buf, "KEYSIZE=")) != NULL) { if (keysize != -1) errx(1, "line %d: keysize already set", lnum); keysize = (int)strtonum(cp, 128, 256, &errstr); if (errstr) errx(1, "line %d: keysize is %s: \"%s\"", lnum, errstr, cp); if (keysize != 128 && keysize != 256) errx(1, "line %d: XXX only 128 or 256 " "bit keys for now (keysize = %d)", lnum, keysize); } else if ((cp = startswith(buf, "PT=")) != NULL) { if (plaintext != NULL) free(plaintext); parsehex(cp, &plaintext, &tmp); if (tmp * 8 != (u_int)blocksize) errx(1, "line %d: plaintext len %u != " "blocklen %d", lnum, tmp, blocksize); if (textlen != 0) { if (textlen != tmp) errx(1, "line %d: plaintext len %u != " "ciphertext len %d", lnum, tmp, textlen); } else textlen = tmp; } else if ((cp = startswith(buf, "CT=")) != NULL) { if (ciphertext != NULL) free(ciphertext); parsehex(cp, &ciphertext, &tmp); if (tmp * 8 != (u_int)blocksize) errx(1, "line %d: ciphertext len %u != " "blocklen %d", lnum, tmp, blocksize); if (textlen != 0) { if (textlen != tmp) errx(1, "line %d: ciphertext len %u != " "plaintext len %d", lnum, tmp, textlen); } else textlen = tmp; } else if ((cp = startswith(buf, "KEY=")) != NULL) { if (key != NULL) free(key); parsehex(cp, &key, &keylen); if (keylen * 8 != (u_int)keysize) errx(1, "line %d: ciphertext len %u != " "blocklen %d", lnum, tmp, textlen); } else if ((cp = startswith(buf, "TEST=")) != NULL) { if (plaintext == NULL || ciphertext == NULL || key == NULL || blocksize == -1 || keysize == -1) { if (test != -1) errx(1, "line %d: new test before " "parameters", lnum); goto parsetest; } /* do the tests */ fail += do_tests(filename, test, key, keylen, plaintext, ciphertext, textlen); parsetest: test = (int)strtonum(cp, 0, 65536, &errstr); if (errstr) errx(1, "line %d: test is %s: \"%s\"", lnum, errstr, cp); } else { /* don't care */ continue; } } fclose(tv); return fail; } int main(int argc, char **argv) { int fail = 0, i; if (argc < 2) errx(1, "usage: aestest [test-vector-file]"); for (i = 1; i < argc; i++) fail += run_file(argv[1]); return fail > 0 ? 1 : 0; }