1/* $NetBSD: h_aescbc.c,v 1.1 2017/04/17 03:59:37 knakahara Exp $ */
2
3/*-
4 * Copyright (c) 2017 Internet Initiative Japan Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 *    notice, this list of conditions and the following disclaimer in the
14 *    documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29#include <err.h>
30#include <fcntl.h>
31#include <stdio.h>
32#include <string.h>
33#include <unistd.h>
34
35#include <sys/ioctl.h>
36#include <sys/time.h>
37
38#include <crypto/cryptodev.h>
39
40/*
41 * Test vectors from RFC 3602
42 */
43
44const struct {
45	size_t len;
46	size_t key_len;
47	unsigned char key[16];
48	unsigned char iv[16];
49	unsigned char plaintx[64];
50	unsigned char ciphertx[64];
51} tests[] = {
52	/* Case #1: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key */
53	{ 16, 16,
54	  { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b,
55	    0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06, },
56	  { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30,
57	    0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41, },
58	  "Single block msg",
59	  { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8,
60	    0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a, },
61	},
62
63	/* Case #2: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key */
64	{ 32, 16,
65	  { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
66	    0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a, },
67	  { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28,
68	    0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58, },
69	  { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
70	    0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
71            0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
72	    0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, },
73	  { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a,
74	    0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a,
75	    0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9,
76	    0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1, },
77	},
78
79	/* Case #3: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key */
80	{ 48, 16,
81	  { 0x6c, 0x3e, 0xa0, 0x47, 0x76, 0x30, 0xce, 0x21,
82	    0xa2, 0xce, 0x33, 0x4a, 0xa7, 0x46, 0xc2, 0xcd, },
83	  { 0xc7, 0x82, 0xdc, 0x4c, 0x09, 0x8c, 0x66, 0xcb,
84	    0xd9, 0xcd, 0x27, 0xd8, 0x25, 0x68, 0x2c, 0x81, },
85	  "This is a 48-byte message (exactly 3 AES blocks)",
86	  { 0xd0, 0xa0, 0x2b, 0x38, 0x36, 0x45, 0x17, 0x53,
87	    0xd4, 0x93, 0x66, 0x5d, 0x33, 0xf0, 0xe8, 0x86,
88	    0x2d, 0xea, 0x54, 0xcd, 0xb2, 0x93, 0xab, 0xc7,
89	    0x50, 0x69, 0x39, 0x27, 0x67, 0x72, 0xf8, 0xd5,
90	    0x02, 0x1c, 0x19, 0x21, 0x6b, 0xad, 0x52, 0x5c,
91	    0x85, 0x79, 0x69, 0x5d, 0x83, 0xba, 0x26, 0x84, },
92	},
93
94	/* Case #4: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key */
95	{ 64, 16,
96	  { 0x56, 0xe4, 0x7a, 0x38, 0xc5, 0x59, 0x89, 0x74,
97	    0xbc, 0x46, 0x90, 0x3d, 0xba, 0x29, 0x03, 0x49, },
98	  { 0x8c, 0xe8, 0x2e, 0xef, 0xbe, 0xa0, 0xda, 0x3c,
99	    0x44, 0x69, 0x9e, 0xd7, 0xdb, 0x51, 0xb7, 0xd9, },
100	  { 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7,
101	    0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf,
102	    0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7,
103	    0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
104	    0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7,
105	    0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
106	    0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
107	    0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, },
108	  { 0xc3, 0x0e, 0x32, 0xff, 0xed, 0xc0, 0x77, 0x4e,
109	    0x6a, 0xff, 0x6a, 0xf0, 0x86, 0x9f, 0x71, 0xaa,
110	    0x0f, 0x3a, 0xf0, 0x7a, 0x9a, 0x31, 0xa9, 0xc6,
111	    0x84, 0xdb, 0x20, 0x7e, 0xb0, 0xef, 0x8e, 0x4e,
112	    0x35, 0x90, 0x7a, 0xa6, 0x32, 0xc3, 0xff, 0xdf,
113	    0x86, 0x8b, 0xb7, 0xb2, 0x9d, 0x3d, 0x46, 0xad,
114	    0x83, 0xce, 0x9f, 0x9a, 0x10, 0x2e, 0xe9, 0x9d,
115	    0x49, 0xa5, 0x3e, 0x87, 0xf4, 0xc3, 0xda, 0x55,
116	  },
117	},
118};
119
120int
121main(void)
122{
123	int fd, res;
124	size_t i;
125	struct session_op cs;
126	struct crypt_op co;
127	unsigned char buf[64];
128
129	for (i = 0; i < __arraycount(tests); i++) {
130		fd = open("/dev/crypto", O_RDWR, 0);
131		if (fd < 0)
132			err(1, "open %zu", i);
133		memset(&cs, 0, sizeof(cs));
134		cs.cipher = CRYPTO_AES_CBC;
135		cs.keylen = tests[i].key_len;
136		cs.key = __UNCONST(&tests[i].key);
137		res = ioctl(fd, CIOCGSESSION, &cs);
138		if (res < 0)
139			err(1, "CIOCGSESSION %zu", i);
140
141		memset(&co, 0, sizeof(co));
142		co.ses = cs.ses;
143		co.op = COP_ENCRYPT;
144		co.len = tests[i].len;
145		co.src = __UNCONST(&tests[i].plaintx);
146		co.dst = buf;
147		co.dst_len = sizeof(buf);
148		co.iv = __UNCONST(&tests[i].iv);
149		res = ioctl(fd, CIOCCRYPT, &co);
150		if (res < 0)
151			err(1, "CIOCCRYPT %zu", i);
152
153		if (memcmp(co.dst, tests[i].ciphertx, tests[i].len)) {
154			size_t j;
155			for (j = 0; j < tests[i].len; j++)
156				printf("0x%2zu:  0x%2x    0x%2x\n", j,
157					buf[j], tests[i].ciphertx[j]);
158			errx(1, "verification failed %zu", i);
159		}
160		close(fd);
161	}
162	return 0;
163}
164