コード例 #1
0
ファイル: xts_128_enc_perf.c プロジェクト: 01org/isa-l_crypto
int main(void)
{
	int i;

	unsigned char key1[16], key2[16], tinit[16];
	unsigned char *pt, *ct;

	printf("aes_xts_128_enc_perf:\n");

	pt = malloc(TEST_LEN);
	ct = malloc(TEST_LEN);

	if (NULL == pt || NULL == ct) {
		printf("malloc of testsize failed\n");
		return -1;
	}

	mk_rand_data(key1, key2, tinit, pt, TEST_LEN);
	XTS_AES_128_enc(key2, key1, tinit, TEST_LEN, pt, ct);

	struct perf start, stop;

	perf_start(&start);

	for (i = 0; i < TEST_LOOPS; i++) {
		XTS_AES_128_enc(key2, key1, tinit, TEST_LEN, pt, ct);
	}

	perf_stop(&stop);

	printf("aes_xts_128_enc" TEST_TYPE_STR ": ");
	perf_print(stop, start, (long long)TEST_LEN * i);

	return 0;
}
コード例 #2
0
int main(void)
{

	// Temporary array for the calculated vectors
	uint8_t *ct_test;
	uint8_t *pt_test;

	int i, j;

	// --- Encryption test ---

	// Loop over the vectors
	for (i = 0; i < NVEC; i++) {

		// Allocate space for the calculated ciphertext
		ct_test = malloc(vlist[i].ptlen);
		if (ct_test == NULL) {
			fprintf(stderr, "Can't allocate ciphertext memory\n");
			return -1;
		}

		XTS_AES_128_enc(vlist[i].key2, vlist[i].key1, vlist[i].TW,
				vlist[i].ptlen, vlist[i].PTX, ct_test);

		// Carry out comparison of the calculated ciphertext with 
		// the reference
		for (j = 0; j < vlist[i].ptlen; j++) {

			if (ct_test[j] != vlist[i].CTX[j]) {
				// Vectors 1-10 and 15-19 are for the 128 bit code
				printf("\nXTS_AES_128_enc: Vector %d: ",
				       i < 9 ? i + 1 : i + 6);

				printf("failed at byte %d! \n", j);
				return -1;
			}
		}
		printf(".");
	}

	// --- Decryption test ---

	// Loop over the vectors
	for (i = 0; i < NVEC; i++) {

		// Allocate space for the calculated ciphertext
		pt_test = malloc(vlist[i].ptlen);
		if (pt_test == NULL) {
			fprintf(stderr, "Can't allocate plaintext memory\n");
			return -1;
		}

		XTS_AES_128_dec(vlist[i].key2, vlist[i].key1, vlist[i].TW,
				vlist[i].ptlen, vlist[i].CTX, pt_test);

		for (j = 0; j < vlist[i].ptlen; j++) {

			if (pt_test[j] != vlist[i].PTX[j]) {
				// Carry out comparison of the calculated ciphertext with 
				// the reference
				printf("\nXTS_AES_128_enc: Vector %d: ",
				       i < 9 ? i + 1 : i + 6);

				printf(" failed at byte %d! \n", j);
				return -1;
			}
		}
		printf(".");
	}
	printf("Pass\n");

	return 0;
}
コード例 #3
0
int main(void)
{
	int i;

	unsigned char key1[16], key2[16], tinit[16];
	unsigned char *pt, *ct, *refct;
	struct perf start, stop;
	unsigned char keyssl[32];	/* SSL takes both keys together */

	/* Initialise our cipher context, which can use same input vectors */
	EVP_CIPHER_CTX *ctx;
	ctx = EVP_CIPHER_CTX_new();

	printf("aes_xts_128_enc_perf:\n");

	pt = malloc(TEST_LEN);
	ct = malloc(TEST_LEN);
	refct = malloc(TEST_LEN);

	if (NULL == pt || NULL == ct || NULL == refct) {
		printf("malloc of testsize failed\n");
		return -1;
	}

	xts128_mk_rand_data(key1, key2, tinit, pt, TEST_LEN);

	/* Set up key for the SSL engine */
	for (i = 0; i < 16; i++) {
		keyssl[i] = key1[i];
		keyssl[i + 16] = key2[i];
	}

	/* Encrypt and compare output */
	XTS_AES_128_enc(key2, key1, tinit, TEST_LEN, pt, ct);
	openssl_aes_128_xts_enc(ctx, keyssl, tinit, TEST_LEN, pt, refct);
	if (memcmp(ct, refct, TEST_LEN)) {
		printf("ISA-L and OpenSSL results don't match\n");
		return -1;
	}

	/* Time ISA-L encryption */
	perf_start(&start);
	for (i = 0; i < TEST_LOOPS; i++)
		XTS_AES_128_enc(key2, key1, tinit, TEST_LEN, pt, ct);
	perf_stop(&stop);

	printf("aes_xts_128_enc" TEST_TYPE_STR ": ");
	perf_print(stop, start, (long long)TEST_LEN * i);

	/* Time OpenSSL encryption */
	perf_start(&start);
	for (i = 0; i < TEST_LOOPS; i++)
		openssl_aes_128_xts_enc(ctx, keyssl, tinit, TEST_LEN, pt, refct);
	perf_stop(&stop);

	printf("aes_xts_128_openssl_enc" TEST_TYPE_STR ": ");
	perf_print(stop, start, (long long)TEST_LEN * i);

	EVP_CIPHER_CTX_free(ctx);

	return 0;
}
コード例 #4
0
int main(void)
{
	int t, n;

	unsigned char key1[16], key2[16], tinit[16];
	unsigned char *pt, *ct, *dt;

	int align, size, min_size;
	unsigned char *efence_pt;
	unsigned char *efence_ct;
	unsigned char *efence_dt;

	unsigned char *origin_pt;
	unsigned char *origin_ct;
	unsigned char *origin_dt;

	unsigned char key1_exp_enc[16 * 11], key1_exp_dec[16 * 11];
	unsigned char key2_exp_tw[16 * 11];
	int i;

	printf("aes_xts_128 enc/dec rand test, %d sets of %d max: ", RANDOMS, TEST_LEN);
	pt = malloc(TEST_LEN);
	ct = malloc(TEST_LEN);
	dt = malloc(TEST_LEN);

	if (NULL == pt || NULL == ct || NULL == dt) {
		printf("malloc of testsize failed\n");
		return -1;
	}

	mk_rand_data(key1, key2, tinit, pt, TEST_LEN);
	XTS_AES_128_enc(key2, key1, tinit, TEST_LEN, pt, ct);
	XTS_AES_128_dec(key2, key1, tinit, TEST_LEN, ct, dt);

	if (memcmp(pt, dt, TEST_LEN)) {
		printf("fail\n");
		return -1;
	}
	putchar('.');

	// Do tests with random data, keys and message size
	for (t = 0; t < RANDOMS; t++) {
		n = rand() % (TEST_LEN);
		if (n < 17)
			continue;

		mk_rand_data(key1, key2, tinit, pt, n);
		XTS_AES_128_enc(key2, key1, tinit, n, pt, ct);
		XTS_AES_128_dec(key2, key1, tinit, n, ct, dt);

		if (memcmp(pt, dt, n)) {
			printf("fail rand %d, size %d\n", t, n);
			return -1;
		}
		putchar('.');
		fflush(0);
	}

	// Run tests at end of buffer for Electric Fence
	align = 1;
	min_size = 16;
	for (size = 0; size <= TEST_SIZE - min_size; size += align) {

		// Line up TEST_SIZE from end
		efence_pt = pt + TEST_LEN - TEST_SIZE + size;
		efence_ct = ct + TEST_LEN - TEST_SIZE + size;
		efence_dt = dt + TEST_LEN - TEST_SIZE + size;

		mk_rand_data(key1, key2, tinit, efence_pt, TEST_SIZE - size);
		XTS_AES_128_enc(key2, key1, tinit, TEST_SIZE - size, efence_pt, efence_ct);
		XTS_AES_128_dec(key2, key1, tinit, TEST_SIZE - size, efence_ct, efence_dt);

		if (memcmp(efence_pt, efence_dt, TEST_SIZE - size)) {
			printf("efence: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		putchar('.');
		fflush(0);
	}

	origin_pt = malloc(TEST_LEN);
	origin_ct = malloc(TEST_LEN);
	origin_dt = malloc(TEST_LEN);
	if (NULL == origin_pt || NULL == origin_ct || NULL == origin_dt) {
		printf("malloc of testsize failed\n");
		return -1;
	}
	// For data lengths from 0 to 15 bytes, the functions return without any error
	// codes, without reading or writing any data.
	for (size = TEST_SIZE - min_size + align; size <= TEST_SIZE; size += align) {

		// Line up TEST_SIZE from end
		efence_pt = pt + TEST_LEN - TEST_SIZE + size;
		efence_ct = ct + TEST_LEN - TEST_SIZE + size;
		efence_dt = dt + TEST_LEN - TEST_SIZE + size;

		mk_rand_data(key1, key2, tinit, efence_pt, TEST_SIZE - size);
		memcpy(efence_ct, efence_pt, TEST_SIZE - size);
		memcpy(efence_dt, efence_pt, TEST_SIZE - size);
		memcpy(origin_pt, efence_pt, TEST_SIZE - size);
		memcpy(origin_ct, efence_ct, TEST_SIZE - size);
		memcpy(origin_dt, efence_dt, TEST_SIZE - size);

		XTS_AES_128_enc(key2, key1, tinit, TEST_SIZE - size, efence_pt, efence_ct);
		XTS_AES_128_dec(key2, key1, tinit, TEST_SIZE - size, efence_ct, efence_dt);

		if (memcmp(efence_pt, origin_pt, TEST_SIZE - size)) {
			printf("efence_pt: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		if (memcmp(efence_ct, origin_ct, TEST_SIZE - size)) {
			printf("efence_ct: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		if (memcmp(efence_dt, origin_dt, TEST_SIZE - size)) {
			printf("efence_dt: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		putchar('.');
		fflush(0);
	}

	for (i = 0; i < 16 * 11; i++) {
		key2_exp_tw[i] = rand();
	}

	for (size = 0; size <= TEST_SIZE - min_size; size += align) {

		// Line up TEST_SIZE from end
		efence_pt = pt + TEST_LEN - TEST_SIZE + size;
		efence_ct = ct + TEST_LEN - TEST_SIZE + size;
		efence_dt = dt + TEST_LEN - TEST_SIZE + size;

		mk_rand_data(key1, key2, tinit, efence_pt, TEST_SIZE - size);
		aes_keyexp_128(key1, key1_exp_enc, key1_exp_dec);

		XTS_AES_128_enc_expanded_key(key2_exp_tw, key1_exp_enc, tinit,
					     TEST_SIZE - size, efence_pt, efence_ct);
		XTS_AES_128_dec_expanded_key(key2_exp_tw, key1_exp_dec, tinit,
					     TEST_SIZE - size, efence_ct, efence_dt);

		if (memcmp(efence_pt, efence_dt, TEST_SIZE - size)) {
			printf("efence_expanded_key: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		putchar('.');
		fflush(0);
	}

	// For data lengths from 0 to 15 bytes, the functions return without any error
	// codes, without reading or writing any data.
	for (size = TEST_SIZE - min_size + align; size <= TEST_SIZE; size += align) {

		// Line up TEST_SIZE from end
		efence_pt = pt + TEST_LEN - TEST_SIZE + size;
		efence_ct = ct + TEST_LEN - TEST_SIZE + size;
		efence_dt = dt + TEST_LEN - TEST_SIZE + size;

		mk_rand_data(key1, key2, tinit, efence_pt, TEST_SIZE - size);
		memcpy(efence_ct, efence_pt, TEST_SIZE - size);
		memcpy(efence_dt, efence_pt, TEST_SIZE - size);
		memcpy(origin_pt, efence_pt, TEST_SIZE - size);
		memcpy(origin_ct, efence_ct, TEST_SIZE - size);
		memcpy(origin_dt, efence_dt, TEST_SIZE - size);

		aes_keyexp_128(key1, key1_exp_enc, key1_exp_dec);

		XTS_AES_128_enc_expanded_key(key2_exp_tw, key1_exp_enc, tinit,
					     TEST_SIZE - size, efence_pt, efence_ct);
		XTS_AES_128_dec_expanded_key(key2_exp_tw, key1_exp_dec, tinit,
					     TEST_SIZE - size, efence_ct, efence_dt);

		if (memcmp(efence_pt, origin_pt, TEST_SIZE - size)) {
			printf("efence_expanded_key for pt: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		if (memcmp(efence_ct, origin_ct, TEST_SIZE - size)) {
			printf("efence_expanded_key for ct: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		if (memcmp(efence_dt, origin_dt, TEST_SIZE - size)) {
			printf("efence_expanded_key for dt: fail size %d\n", TEST_SIZE - size);
			return -1;
		}
		putchar('.');
		fflush(0);
	}

	printf("Pass\n");

	return 0;
}