test-aes.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945
  1. /*
  2. * Test program for AES
  3. * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/crypto.h"
  11. #include "crypto/aes_wrap.h"
  12. #define BLOCK_SIZE 16
  13. static void test_aes_perf(void)
  14. {
  15. #if 0 /* this did not seem to work with new compiler?! */
  16. #ifdef __i386__
  17. #define rdtscll(val) \
  18. __asm__ __volatile__("rdtsc" : "=A" (val))
  19. const int num_iters = 10;
  20. int i;
  21. unsigned int start, end;
  22. u8 key[16], pt[16], ct[16];
  23. void *ctx;
  24. printf("keySetupEnc:");
  25. for (i = 0; i < num_iters; i++) {
  26. rdtscll(start);
  27. ctx = aes_encrypt_init(key, 16);
  28. rdtscll(end);
  29. aes_encrypt_deinit(ctx);
  30. printf(" %d", end - start);
  31. }
  32. printf("\n");
  33. printf("Encrypt:");
  34. ctx = aes_encrypt_init(key, 16);
  35. for (i = 0; i < num_iters; i++) {
  36. rdtscll(start);
  37. aes_encrypt(ctx, pt, ct);
  38. rdtscll(end);
  39. printf(" %d", end - start);
  40. }
  41. aes_encrypt_deinit(ctx);
  42. printf("\n");
  43. #endif /* __i386__ */
  44. #endif
  45. }
  46. static int test_cbc(void)
  47. {
  48. struct cbc_test_vector {
  49. u8 key[16];
  50. u8 iv[16];
  51. u8 plain[32];
  52. u8 cipher[32];
  53. size_t len;
  54. } vectors[] = {
  55. {
  56. { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b,
  57. 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06 },
  58. { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30,
  59. 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41 },
  60. "Single block msg",
  61. { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8,
  62. 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a },
  63. 16
  64. },
  65. {
  66. { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
  67. 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a },
  68. { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28,
  69. 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58 },
  70. { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  71. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  72. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  73. 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f },
  74. { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a,
  75. 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a,
  76. 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9,
  77. 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1 },
  78. 32
  79. }
  80. };
  81. int ret = 0;
  82. u8 *buf;
  83. unsigned int i;
  84. for (i = 0; i < ARRAY_SIZE(vectors); i++) {
  85. struct cbc_test_vector *tv = &vectors[i];
  86. buf = malloc(tv->len);
  87. if (buf == NULL) {
  88. ret++;
  89. break;
  90. }
  91. memcpy(buf, tv->plain, tv->len);
  92. if (aes_128_cbc_encrypt(tv->key, tv->iv, buf, tv->len) ||
  93. memcmp(buf, tv->cipher, tv->len) != 0) {
  94. printf("AES-CBC encrypt %d failed\n", i);
  95. ret++;
  96. }
  97. memcpy(buf, tv->cipher, tv->len);
  98. if (aes_128_cbc_decrypt(tv->key, tv->iv, buf, tv->len) ||
  99. memcmp(buf, tv->plain, tv->len) != 0) {
  100. printf("AES-CBC decrypt %d failed\n", i);
  101. ret++;
  102. }
  103. free(buf);
  104. }
  105. return ret;
  106. }
  107. /*
  108. * GCM test vectors from
  109. * http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/gcm-spec.pdf
  110. */
  111. struct gcm_test_vector {
  112. char *k;
  113. char *p;
  114. char *aad;
  115. char *iv;
  116. char *c;
  117. char *t;
  118. };
  119. static const struct gcm_test_vector gcm_tests[] = {
  120. {
  121. /* Test Case 1 */
  122. "00000000000000000000000000000000",
  123. "",
  124. "",
  125. "000000000000000000000000",
  126. "",
  127. "58e2fccefa7e3061367f1d57a4e7455a"
  128. },
  129. {
  130. /* Test Case 2 */
  131. "00000000000000000000000000000000",
  132. "00000000000000000000000000000000",
  133. "",
  134. "000000000000000000000000",
  135. "0388dace60b6a392f328c2b971b2fe78",
  136. "ab6e47d42cec13bdf53a67b21257bddf"
  137. },
  138. {
  139. /* Test Case 3 */
  140. "feffe9928665731c6d6a8f9467308308",
  141. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
  142. "",
  143. "cafebabefacedbaddecaf888",
  144. "42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091473f5985",
  145. "4d5c2af327cd64a62cf35abd2ba6fab4"
  146. },
  147. {
  148. /* Test Case 4 */
  149. "feffe9928665731c6d6a8f9467308308",
  150. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  151. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  152. "cafebabefacedbaddecaf888",
  153. "42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091",
  154. "5bc94fbc3221a5db94fae95ae7121a47"
  155. },
  156. {
  157. /* Test Case 5 */
  158. "feffe9928665731c6d6a8f9467308308",
  159. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  160. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  161. "cafebabefacedbad",
  162. "61353b4c2806934a777ff51fa22a4755699b2a714fcdc6f83766e5f97b6c742373806900e49f24b22b097544d4896b424989b5e1ebac0f07c23f4598",
  163. "3612d2e79e3b0785561be14aaca2fccb"
  164. },
  165. {
  166. /* Test Case 6 */
  167. "feffe9928665731c6d6a8f9467308308",
  168. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  169. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  170. "9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
  171. "8ce24998625615b603a033aca13fb894be9112a5c3a211a8ba262a3cca7e2ca701e4a9a4fba43c90ccdcb281d48c7c6fd62875d2aca417034c34aee5",
  172. "619cc5aefffe0bfa462af43c1699d050"
  173. },
  174. {
  175. /* Test Case 7 */
  176. "000000000000000000000000000000000000000000000000",
  177. "",
  178. "",
  179. "000000000000000000000000",
  180. "",
  181. "cd33b28ac773f74ba00ed1f312572435"
  182. },
  183. {
  184. /* Test Case 8 */
  185. "000000000000000000000000000000000000000000000000",
  186. "00000000000000000000000000000000",
  187. "",
  188. "000000000000000000000000",
  189. "98e7247c07f0fe411c267e4384b0f600",
  190. "2ff58d80033927ab8ef4d4587514f0fb"
  191. },
  192. {
  193. /* Test Case 9 */
  194. "feffe9928665731c6d6a8f9467308308feffe9928665731c",
  195. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
  196. "",
  197. "cafebabefacedbaddecaf888",
  198. "3980ca0b3c00e841eb06fac4872a2757859e1ceaa6efd984628593b40ca1e19c7d773d00c144c525ac619d18c84a3f4718e2448b2fe324d9ccda2710acade256",
  199. "9924a7c8587336bfb118024db8674a14"
  200. },
  201. {
  202. /* Test Case 10 */
  203. "feffe9928665731c6d6a8f9467308308feffe9928665731c",
  204. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  205. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  206. "cafebabefacedbaddecaf888",
  207. "3980ca0b3c00e841eb06fac4872a2757859e1ceaa6efd984628593b40ca1e19c7d773d00c144c525ac619d18c84a3f4718e2448b2fe324d9ccda2710",
  208. "2519498e80f1478f37ba55bd6d27618c"
  209. },
  210. {
  211. /* Test Case 11 */
  212. "feffe9928665731c6d6a8f9467308308feffe9928665731c",
  213. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  214. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  215. "cafebabefacedbad",
  216. "0f10f599ae14a154ed24b36e25324db8c566632ef2bbb34f8347280fc4507057fddc29df9a471f75c66541d4d4dad1c9e93a19a58e8b473fa0f062f7",
  217. "65dcc57fcf623a24094fcca40d3533f8"
  218. },
  219. {
  220. /* Test Case 12 */
  221. "feffe9928665731c6d6a8f9467308308feffe9928665731c",
  222. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  223. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  224. "9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
  225. "d27e88681ce3243c4830165a8fdcf9ff1de9a1d8e6b447ef6ef7b79828666e4581e79012af34ddd9e2f037589b292db3e67c036745fa22e7e9b7373b",
  226. "dcf566ff291c25bbb8568fc3d376a6d9"
  227. },
  228. {
  229. /* Test Case 13 */
  230. "0000000000000000000000000000000000000000000000000000000000000000",
  231. "",
  232. "",
  233. "000000000000000000000000",
  234. "",
  235. "530f8afbc74536b9a963b4f1c4cb738b"
  236. },
  237. {
  238. /* Test Case 14 */
  239. "0000000000000000000000000000000000000000000000000000000000000000",
  240. "00000000000000000000000000000000",
  241. "",
  242. "000000000000000000000000",
  243. "cea7403d4d606b6e074ec5d3baf39d18",
  244. "d0d1c8a799996bf0265b98b5d48ab919"
  245. },
  246. {
  247. /* Test Case 15 */
  248. "feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
  249. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255",
  250. "",
  251. "cafebabefacedbaddecaf888",
  252. "522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662898015ad",
  253. "b094dac5d93471bdec1a502270e3cc6c"
  254. },
  255. {
  256. /* Test Case 16 */
  257. "feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
  258. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  259. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  260. "cafebabefacedbaddecaf888",
  261. "522dc1f099567d07f47f37a32a84427d643a8cdcbfe5c0c97598a2bd2555d1aa8cb08e48590dbb3da7b08b1056828838c5f61e6393ba7a0abcc9f662",
  262. "76fc6ece0f4e1768cddf8853bb2d551b"
  263. },
  264. {
  265. /* Test Case 17 */
  266. "feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
  267. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  268. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  269. "cafebabefacedbad",
  270. "c3762df1ca787d32ae47c13bf19844cbaf1ae14d0b976afac52ff7d79bba9de0feb582d33934a4f0954cc2363bc73f7862ac430e64abe499f47c9b1f",
  271. "3a337dbf46a792c45e454913fe2ea8f2"
  272. },
  273. {
  274. /* Test Case 18 */
  275. "feffe9928665731c6d6a8f9467308308feffe9928665731c6d6a8f9467308308",
  276. "d9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39",
  277. "feedfacedeadbeeffeedfacedeadbeefabaddad2",
  278. "9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b",
  279. "5a8def2f0c9e53f1f75d7853659e2a20eeb2b22aafde6419a058ab4f6f746bf40fc0c3b780f244452da3ebf1c5d82cdea2418997200ef82e44ae7e3f",
  280. "a44a8266ee1c8eb0c8b5d4cf5ae9f19a"
  281. }
  282. };
  283. static int test_gcm(void)
  284. {
  285. int ret = 0;
  286. int i;
  287. u8 k[32], aad[32], iv[64], t[16], tag[16];
  288. u8 p[64], c[64], tmp[64];
  289. size_t k_len, p_len, aad_len, iv_len;
  290. for (i = 0; i < ARRAY_SIZE(gcm_tests); i++) {
  291. const struct gcm_test_vector *tc = &gcm_tests[i];
  292. k_len = os_strlen(tc->k) / 2;
  293. if (hexstr2bin(tc->k, k, k_len)) {
  294. printf("Invalid GCM test vector %d (k)\n", i);
  295. ret++;
  296. continue;
  297. }
  298. p_len = os_strlen(tc->p) / 2;
  299. if (hexstr2bin(tc->p, p, p_len)) {
  300. printf("Invalid GCM test vector %d (p)\n", i);
  301. ret++;
  302. continue;
  303. }
  304. aad_len = os_strlen(tc->aad) / 2;
  305. if (hexstr2bin(tc->aad, aad, aad_len)) {
  306. printf("Invalid GCM test vector %d (aad)\n", i);
  307. ret++;
  308. continue;
  309. }
  310. iv_len = os_strlen(tc->iv) / 2;
  311. if (hexstr2bin(tc->iv, iv, iv_len)) {
  312. printf("Invalid GCM test vector %d (iv)\n", i);
  313. ret++;
  314. continue;
  315. }
  316. if (hexstr2bin(tc->c, c, p_len)) {
  317. printf("Invalid GCM test vector %d (c)\n", i);
  318. ret++;
  319. continue;
  320. }
  321. if (hexstr2bin(tc->t, t, sizeof(t))) {
  322. printf("Invalid GCM test vector %d (t)\n", i);
  323. ret++;
  324. continue;
  325. }
  326. if (aes_gcm_ae(k, k_len, iv, iv_len, p, p_len, aad, aad_len,
  327. tmp, tag) < 0) {
  328. printf("GCM-AE failed (test case %d)\n", i);
  329. ret++;
  330. continue;
  331. }
  332. if (os_memcmp(c, tmp, p_len) != 0) {
  333. printf("GCM-AE mismatch (test case %d)\n", i);
  334. ret++;
  335. }
  336. if (os_memcmp(tag, t, sizeof(tag)) != 0) {
  337. printf("GCM-AE tag mismatch (test case %d)\n", i);
  338. ret++;
  339. }
  340. if (p_len == 0) {
  341. if (aes_gmac(k, k_len, iv, iv_len, aad, aad_len, tag) <
  342. 0) {
  343. printf("GMAC failed (test case %d)\n", i);
  344. ret++;
  345. continue;
  346. }
  347. if (os_memcmp(tag, t, sizeof(tag)) != 0) {
  348. printf("GMAC tag mismatch (test case %d)\n", i);
  349. ret++;
  350. }
  351. }
  352. if (aes_gcm_ad(k, k_len, iv, iv_len, c, p_len, aad, aad_len,
  353. t, tmp) < 0) {
  354. printf("GCM-AD failed (test case %d)\n", i);
  355. ret++;
  356. continue;
  357. }
  358. if (os_memcmp(p, tmp, p_len) != 0) {
  359. printf("GCM-AD mismatch (test case %d)\n", i);
  360. ret++;
  361. }
  362. }
  363. return ret;
  364. }
  365. static int test_key_wrap(void)
  366. {
  367. unsigned int i;
  368. int ret = 0;
  369. /* RFC 3394 - Test vector 4.1 */
  370. u8 kek41[] = {
  371. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  372. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
  373. };
  374. u8 plain41[] = {
  375. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  376. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  377. };
  378. u8 crypt41[] = {
  379. 0x1F, 0xA6, 0x8B, 0x0A, 0x81, 0x12, 0xB4, 0x47,
  380. 0xAE, 0xF3, 0x4B, 0xD8, 0xFB, 0x5A, 0x7B, 0x82,
  381. 0x9D, 0x3E, 0x86, 0x23, 0x71, 0xD2, 0xCF, 0xE5
  382. };
  383. /* RFC 3394 - Test vector 4.2 */
  384. u8 kek42[] = {
  385. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  386. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  387. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17
  388. };
  389. u8 plain42[] = {
  390. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  391. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  392. };
  393. u8 crypt42[] = {
  394. 0x96, 0x77, 0x8B, 0x25, 0xAE, 0x6C, 0xA4, 0x35,
  395. 0xF9, 0x2B, 0x5B, 0x97, 0xC0, 0x50, 0xAE, 0xD2,
  396. 0x46, 0x8A, 0xB8, 0xA1, 0x7A, 0xD8, 0x4E, 0x5D
  397. };
  398. /* RFC 3394 - Test vector 4.3 */
  399. u8 kek43[] = {
  400. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  401. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  402. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  403. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  404. };
  405. u8 plain43[] = {
  406. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  407. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff
  408. };
  409. u8 crypt43[] = {
  410. 0x64, 0xE8, 0xC3, 0xF9, 0xCE, 0x0F, 0x5B, 0xA2,
  411. 0x63, 0xE9, 0x77, 0x79, 0x05, 0x81, 0x8A, 0x2A,
  412. 0x93, 0xC8, 0x19, 0x1E, 0x7D, 0x6E, 0x8A, 0xE7,
  413. };
  414. /* RFC 3394 - Test vector 4.4 */
  415. u8 kek44[] = {
  416. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  417. 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
  418. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17
  419. };
  420. u8 plain44[] = {
  421. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  422. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  423. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07
  424. };
  425. u8 crypt44[] = {
  426. 0x03, 0x1D, 0x33, 0x26, 0x4E, 0x15, 0xD3, 0x32,
  427. 0x68, 0xF2, 0x4E, 0xC2, 0x60, 0x74, 0x3E, 0xDC,
  428. 0xE1, 0xC6, 0xC7, 0xDD, 0xEE, 0x72, 0x5A, 0x93,
  429. 0x6B, 0xA8, 0x14, 0x91, 0x5C, 0x67, 0x62, 0xD2
  430. };
  431. /* RFC 3394 - Test vector 4.5 */
  432. u8 kek45[] = {
  433. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  434. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  435. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  436. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  437. };
  438. u8 plain45[] = {
  439. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  440. 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
  441. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07
  442. };
  443. u8 crypt45[] = {
  444. 0xA8, 0xF9, 0xBC, 0x16, 0x12, 0xC6, 0x8B, 0x3F,
  445. 0xF6, 0xE6, 0xF4, 0xFB, 0xE3, 0x0E, 0x71, 0xE4,
  446. 0x76, 0x9C, 0x8B, 0x80, 0xA3, 0x2C, 0xB8, 0x95,
  447. 0x8C, 0xD5, 0xD1, 0x7D, 0x6B, 0x25, 0x4D, 0xA1,
  448. };
  449. /* RFC 3394 - Test vector 4.6 */
  450. u8 kek46[] = {
  451. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  452. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F,
  453. 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
  454. 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F
  455. };
  456. u8 plain46[] = {
  457. 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
  458. 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF,
  459. 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
  460. 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E, 0x0F
  461. };
  462. u8 crypt46[] = {
  463. 0x28, 0xC9, 0xF4, 0x04, 0xC4, 0xB8, 0x10, 0xF4,
  464. 0xCB, 0xCC, 0xB3, 0x5C, 0xFB, 0x87, 0xF8, 0x26,
  465. 0x3F, 0x57, 0x86, 0xE2, 0xD8, 0x0E, 0xD3, 0x26,
  466. 0xCB, 0xC7, 0xF0, 0xE7, 0x1A, 0x99, 0xF4, 0x3B,
  467. 0xFB, 0x98, 0x8B, 0x9B, 0x7A, 0x02, 0xDD, 0x21
  468. };
  469. u8 result[40];
  470. printf("RFC 3394 - Test vector 4.1\n");
  471. if (aes_wrap(kek41, sizeof(kek41), sizeof(plain41) / 8, plain41,
  472. result)) {
  473. printf("AES-WRAP-128 reported failure\n");
  474. ret++;
  475. }
  476. if (memcmp(result, crypt41, sizeof(crypt41)) != 0) {
  477. printf("AES-WRAP-128 failed\n");
  478. ret++;
  479. }
  480. if (aes_unwrap(kek41, sizeof(kek41), sizeof(plain41) / 8, crypt41,
  481. result)) {
  482. printf("AES-UNWRAP-128 reported failure\n");
  483. ret++;
  484. }
  485. if (memcmp(result, plain41, sizeof(plain41)) != 0) {
  486. printf("AES-UNWRAP-128 failed\n");
  487. ret++;
  488. for (i = 0; i < sizeof(plain41); i++)
  489. printf(" %02x", result[i]);
  490. printf("\n");
  491. }
  492. printf("RFC 3394 - Test vector 4.2\n");
  493. if (aes_wrap(kek42, sizeof(kek42), sizeof(plain42) / 8, plain42,
  494. result)) {
  495. printf("AES-WRAP-192 reported failure\n");
  496. ret++;
  497. }
  498. if (memcmp(result, crypt42, sizeof(crypt42)) != 0) {
  499. printf("AES-WRAP-192 failed\n");
  500. ret++;
  501. }
  502. if (aes_unwrap(kek42, sizeof(kek42), sizeof(plain42) / 8, crypt42,
  503. result)) {
  504. printf("AES-UNWRAP-192 reported failure\n");
  505. ret++;
  506. }
  507. if (memcmp(result, plain42, sizeof(plain42)) != 0) {
  508. printf("AES-UNWRAP-192 failed\n");
  509. ret++;
  510. for (i = 0; i < sizeof(plain42); i++)
  511. printf(" %02x", result[i]);
  512. printf("\n");
  513. }
  514. printf("RFC 3394 - Test vector 4.3\n");
  515. if (aes_wrap(kek43, sizeof(kek43), sizeof(plain43) / 8, plain43,
  516. result)) {
  517. printf("AES-WRAP-256 reported failure\n");
  518. ret++;
  519. }
  520. if (memcmp(result, crypt43, sizeof(crypt43)) != 0) {
  521. printf("AES-WRAP-256 failed\n");
  522. ret++;
  523. }
  524. if (aes_unwrap(kek43, sizeof(kek43), sizeof(plain43) / 8, crypt43,
  525. result)) {
  526. printf("AES-UNWRAP-256 reported failure\n");
  527. ret++;
  528. }
  529. if (memcmp(result, plain43, sizeof(plain43)) != 0) {
  530. printf("AES-UNWRAP-256 failed\n");
  531. ret++;
  532. for (i = 0; i < sizeof(plain43); i++)
  533. printf(" %02x", result[i]);
  534. printf("\n");
  535. }
  536. printf("RFC 3394 - Test vector 4.4\n");
  537. if (aes_wrap(kek44, sizeof(kek44), sizeof(plain44) / 8, plain44,
  538. result)) {
  539. printf("AES-WRAP-192 reported failure\n");
  540. ret++;
  541. }
  542. if (memcmp(result, crypt44, sizeof(crypt44)) != 0) {
  543. printf("AES-WRAP-192 failed\n");
  544. ret++;
  545. }
  546. if (aes_unwrap(kek44, sizeof(kek44), sizeof(plain44) / 8, crypt44,
  547. result)) {
  548. printf("AES-UNWRAP-192 reported failure\n");
  549. ret++;
  550. }
  551. if (memcmp(result, plain44, sizeof(plain44)) != 0) {
  552. printf("AES-UNWRAP-192 failed\n");
  553. ret++;
  554. for (i = 0; i < sizeof(plain44); i++)
  555. printf(" %02x", result[i]);
  556. printf("\n");
  557. }
  558. printf("RFC 3394 - Test vector 4.5\n");
  559. if (aes_wrap(kek45, sizeof(kek45), sizeof(plain45) / 8, plain45,
  560. result)) {
  561. printf("AES-WRAP-256 reported failure\n");
  562. ret++;
  563. }
  564. if (memcmp(result, crypt45, sizeof(crypt45)) != 0) {
  565. printf("AES-WRAP-256 failed\n");
  566. ret++;
  567. for (i = 0; i < sizeof(crypt45); i++)
  568. printf(" %02x", result[i]);
  569. printf("\n");
  570. }
  571. if (aes_unwrap(kek45, sizeof(kek45), sizeof(plain45) / 8, crypt45,
  572. result)) {
  573. printf("AES-UNWRAP-256 reported failure\n");
  574. ret++;
  575. }
  576. if (memcmp(result, plain45, sizeof(plain45)) != 0) {
  577. printf("AES-UNWRAP-256 failed\n");
  578. ret++;
  579. for (i = 0; i < sizeof(plain45); i++)
  580. printf(" %02x", result[i]);
  581. printf("\n");
  582. }
  583. printf("RFC 3394 - Test vector 4.6\n");
  584. if (aes_wrap(kek46, sizeof(kek46), sizeof(plain46) / 8, plain46,
  585. result)) {
  586. printf("AES-WRAP-256 reported failure\n");
  587. ret++;
  588. }
  589. if (memcmp(result, crypt46, sizeof(crypt46)) != 0) {
  590. printf("AES-WRAP-256 failed\n");
  591. ret++;
  592. }
  593. if (aes_unwrap(kek46, sizeof(kek46), sizeof(plain46) / 8, crypt46,
  594. result)) {
  595. printf("AES-UNWRAP-256 reported failure\n");
  596. ret++;
  597. }
  598. if (memcmp(result, plain46, sizeof(plain46)) != 0) {
  599. printf("AES-UNWRAP-256 failed\n");
  600. ret++;
  601. for (i = 0; i < sizeof(plain46); i++)
  602. printf(" %02x", result[i]);
  603. printf("\n");
  604. }
  605. return ret;
  606. }
  607. static int test_nist_key_wrap_ae(const char *fname)
  608. {
  609. FILE *f;
  610. int ret = 0;
  611. char buf[15000], *pos, *pos2;
  612. u8 bin[2000], k[32], p[1024], c[1024 + 8], result[1024 + 8];
  613. size_t bin_len, k_len = 0, p_len = 0, c_len = 0;
  614. int ok = 0;
  615. printf("NIST KW AE tests from %s\n", fname);
  616. f = fopen(fname, "r");
  617. if (f == NULL) {
  618. printf("%s does not exist - cannot validate test vectors\n",
  619. fname);
  620. return 1;
  621. }
  622. while (fgets(buf, sizeof(buf), f)) {
  623. if (buf[0] == '#')
  624. continue;
  625. pos = os_strchr(buf, '=');
  626. if (pos == NULL)
  627. continue;
  628. pos2 = pos - 1;
  629. while (pos2 >= buf && *pos2 == ' ')
  630. *pos2-- = '\0';
  631. *pos++ = '\0';
  632. while (*pos == ' ')
  633. *pos++ = '\0';
  634. pos2 = os_strchr(pos, '\r');
  635. if (!pos2)
  636. pos2 = os_strchr(pos, '\n');
  637. if (pos2)
  638. *pos2 = '\0';
  639. else
  640. pos2 = pos + os_strlen(pos);
  641. if (buf[0] == '[') {
  642. printf("%s = %s\n", buf, pos);
  643. continue;
  644. }
  645. if (os_strcmp(buf, "COUNT") == 0) {
  646. printf("Test %s - ", pos);
  647. continue;
  648. }
  649. bin_len = os_strlen(pos);
  650. if (bin_len > sizeof(bin) * 2) {
  651. printf("Too long binary data (%s)\n", buf);
  652. return 1;
  653. }
  654. if (bin_len & 0x01) {
  655. printf("Odd number of hexstring values (%s)\n",
  656. buf);
  657. return 1;
  658. }
  659. bin_len /= 2;
  660. if (hexstr2bin(pos, bin, bin_len) < 0) {
  661. printf("Invalid hex string '%s' (%s)\n", pos, buf);
  662. return 1;
  663. }
  664. if (os_strcmp(buf, "K") == 0) {
  665. if (bin_len > sizeof(k)) {
  666. printf("Too long K (%u)\n", (unsigned) bin_len);
  667. return 1;
  668. }
  669. os_memcpy(k, bin, bin_len);
  670. k_len = bin_len;
  671. continue;
  672. }
  673. if (os_strcmp(buf, "P") == 0) {
  674. if (bin_len > sizeof(p)) {
  675. printf("Too long P (%u)\n", (unsigned) bin_len);
  676. return 1;
  677. }
  678. os_memcpy(p, bin, bin_len);
  679. p_len = bin_len;
  680. continue;
  681. }
  682. if (os_strcmp(buf, "C") != 0) {
  683. printf("Unexpected field '%s'\n", buf);
  684. continue;
  685. }
  686. if (bin_len > sizeof(c)) {
  687. printf("Too long C (%u)\n", (unsigned) bin_len);
  688. return 1;
  689. }
  690. os_memcpy(c, bin, bin_len);
  691. c_len = bin_len;
  692. if (p_len % 8 != 0 || c_len % 8 != 0 || c_len - p_len != 8) {
  693. printf("invalid parameter length (p_len=%u c_len=%u)\n",
  694. (unsigned) p_len, (unsigned) c_len);
  695. continue;
  696. }
  697. if (aes_wrap(k, k_len, p_len / 8, p, result)) {
  698. printf("aes_wrap() failed\n");
  699. ret++;
  700. continue;
  701. }
  702. if (os_memcmp(c, result, c_len) == 0) {
  703. printf("OK\n");
  704. ok++;
  705. } else {
  706. printf("FAIL\n");
  707. ret++;
  708. }
  709. }
  710. fclose(f);
  711. if (ret)
  712. printf("Test case failed\n");
  713. else
  714. printf("%d test vectors OK\n", ok);
  715. return ret;
  716. }
  717. static int test_nist_key_wrap_ad(const char *fname)
  718. {
  719. FILE *f;
  720. int ret = 0;
  721. char buf[15000], *pos, *pos2;
  722. u8 bin[2000], k[32], p[1024], c[1024 + 8], result[1024 + 8];
  723. size_t bin_len, k_len = 0, p_len = 0, c_len = 0;
  724. int ok = 0;
  725. int fail;
  726. printf("NIST KW AD tests from %s\n", fname);
  727. f = fopen(fname, "r");
  728. if (f == NULL) {
  729. printf("%s does not exist - cannot validate test vectors\n",
  730. fname);
  731. return 1;
  732. }
  733. while (fgets(buf, sizeof(buf), f)) {
  734. if (buf[0] == '#')
  735. continue;
  736. fail = 0;
  737. pos = os_strchr(buf, '=');
  738. if (pos == NULL) {
  739. if (os_strncmp(buf, "FAIL", 4) == 0) {
  740. fail = 1;
  741. goto skip_val_parse;
  742. }
  743. continue;
  744. }
  745. pos2 = pos - 1;
  746. while (pos2 >= buf && *pos2 == ' ')
  747. *pos2-- = '\0';
  748. *pos++ = '\0';
  749. while (*pos == ' ')
  750. *pos++ = '\0';
  751. pos2 = os_strchr(pos, '\r');
  752. if (!pos2)
  753. pos2 = os_strchr(pos, '\n');
  754. if (pos2)
  755. *pos2 = '\0';
  756. else
  757. pos2 = pos + os_strlen(pos);
  758. if (buf[0] == '[') {
  759. printf("%s = %s\n", buf, pos);
  760. continue;
  761. }
  762. if (os_strcmp(buf, "COUNT") == 0) {
  763. printf("Test %s - ", pos);
  764. continue;
  765. }
  766. bin_len = os_strlen(pos);
  767. if (bin_len > sizeof(bin) * 2) {
  768. printf("Too long binary data (%s)\n", buf);
  769. return 1;
  770. }
  771. if (bin_len & 0x01) {
  772. printf("Odd number of hexstring values (%s)\n",
  773. buf);
  774. return 1;
  775. }
  776. bin_len /= 2;
  777. if (hexstr2bin(pos, bin, bin_len) < 0) {
  778. printf("Invalid hex string '%s' (%s)\n", pos, buf);
  779. return 1;
  780. }
  781. if (os_strcmp(buf, "K") == 0) {
  782. if (bin_len > sizeof(k)) {
  783. printf("Too long K (%u)\n", (unsigned) bin_len);
  784. return 1;
  785. }
  786. os_memcpy(k, bin, bin_len);
  787. k_len = bin_len;
  788. continue;
  789. }
  790. if (os_strcmp(buf, "C") == 0) {
  791. if (bin_len > sizeof(c)) {
  792. printf("Too long C (%u)\n", (unsigned) bin_len);
  793. return 1;
  794. }
  795. os_memcpy(c, bin, bin_len);
  796. c_len = bin_len;
  797. continue;
  798. }
  799. skip_val_parse:
  800. if (!fail) {
  801. if (os_strcmp(buf, "P") != 0) {
  802. printf("Unexpected field '%s'\n", buf);
  803. continue;
  804. }
  805. if (bin_len > sizeof(p)) {
  806. printf("Too long P (%u)\n", (unsigned) bin_len);
  807. return 1;
  808. }
  809. os_memcpy(p, bin, bin_len);
  810. p_len = bin_len;
  811. if (p_len % 8 != 0 || c_len % 8 != 0 ||
  812. c_len - p_len != 8) {
  813. printf("invalid parameter length (p_len=%u c_len=%u)\n",
  814. (unsigned) p_len, (unsigned) c_len);
  815. continue;
  816. }
  817. }
  818. if (aes_unwrap(k, k_len, (c_len / 8) - 1, c, result)) {
  819. if (fail) {
  820. printf("OK (fail reported)\n");
  821. ok++;
  822. continue;
  823. }
  824. printf("aes_unwrap() failed\n");
  825. ret++;
  826. continue;
  827. }
  828. if (fail) {
  829. printf("FAIL (mismatch not reported)\n");
  830. ret++;
  831. } else if (os_memcmp(p, result, p_len) == 0) {
  832. printf("OK\n");
  833. ok++;
  834. } else {
  835. printf("FAIL\n");
  836. ret++;
  837. }
  838. }
  839. fclose(f);
  840. if (ret)
  841. printf("Test case failed\n");
  842. else
  843. printf("%d test vectors OK\n", ok);
  844. return ret;
  845. }
  846. int main(int argc, char *argv[])
  847. {
  848. int ret = 0;
  849. if (argc >= 3 && os_strcmp(argv[1], "NIST-KW-AE") == 0)
  850. ret += test_nist_key_wrap_ae(argv[2]);
  851. else if (argc >= 3 && os_strcmp(argv[1], "NIST-KW-AD") == 0)
  852. ret += test_nist_key_wrap_ad(argv[2]);
  853. ret += test_key_wrap();
  854. test_aes_perf();
  855. ret += test_cbc();
  856. ret += test_gcm();
  857. if (ret)
  858. printf("FAILED!\n");
  859. return ret;
  860. }