xref: /aosp_15_r20/external/libsrtp2/crypto/test/aes_calc.c (revision 90e502c7aef8d77d0622bb67d75435c6190cfc1a)
1*90e502c7SAndroid Build Coastguard Worker /*
2*90e502c7SAndroid Build Coastguard Worker  * aes_calc.c
3*90e502c7SAndroid Build Coastguard Worker  *
4*90e502c7SAndroid Build Coastguard Worker  * A simple AES calculator for generating AES encryption values
5*90e502c7SAndroid Build Coastguard Worker  *
6*90e502c7SAndroid Build Coastguard Worker  * David A. McGrew
7*90e502c7SAndroid Build Coastguard Worker  * Cisco Systems, Inc.
8*90e502c7SAndroid Build Coastguard Worker  */
9*90e502c7SAndroid Build Coastguard Worker 
10*90e502c7SAndroid Build Coastguard Worker /*
11*90e502c7SAndroid Build Coastguard Worker  *
12*90e502c7SAndroid Build Coastguard Worker  * Copyright (c) 2001-2017, Cisco Systems, Inc.
13*90e502c7SAndroid Build Coastguard Worker  * All rights reserved.
14*90e502c7SAndroid Build Coastguard Worker  *
15*90e502c7SAndroid Build Coastguard Worker  * Redistribution and use in source and binary forms, with or without
16*90e502c7SAndroid Build Coastguard Worker  * modification, are permitted provided that the following conditions
17*90e502c7SAndroid Build Coastguard Worker  * are met:
18*90e502c7SAndroid Build Coastguard Worker  *
19*90e502c7SAndroid Build Coastguard Worker  *   Redistributions of source code must retain the above copyright
20*90e502c7SAndroid Build Coastguard Worker  *   notice, this list of conditions and the following disclaimer.
21*90e502c7SAndroid Build Coastguard Worker  *
22*90e502c7SAndroid Build Coastguard Worker  *   Redistributions in binary form must reproduce the above
23*90e502c7SAndroid Build Coastguard Worker  *   copyright notice, this list of conditions and the following
24*90e502c7SAndroid Build Coastguard Worker  *   disclaimer in the documentation and/or other materials provided
25*90e502c7SAndroid Build Coastguard Worker  *   with the distribution.
26*90e502c7SAndroid Build Coastguard Worker  *
27*90e502c7SAndroid Build Coastguard Worker  *   Neither the name of the Cisco Systems, Inc. nor the names of its
28*90e502c7SAndroid Build Coastguard Worker  *   contributors may be used to endorse or promote products derived
29*90e502c7SAndroid Build Coastguard Worker  *   from this software without specific prior written permission.
30*90e502c7SAndroid Build Coastguard Worker  *
31*90e502c7SAndroid Build Coastguard Worker  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
32*90e502c7SAndroid Build Coastguard Worker  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
33*90e502c7SAndroid Build Coastguard Worker  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
34*90e502c7SAndroid Build Coastguard Worker  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
35*90e502c7SAndroid Build Coastguard Worker  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
36*90e502c7SAndroid Build Coastguard Worker  * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
37*90e502c7SAndroid Build Coastguard Worker  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
38*90e502c7SAndroid Build Coastguard Worker  * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
39*90e502c7SAndroid Build Coastguard Worker  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
40*90e502c7SAndroid Build Coastguard Worker  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
41*90e502c7SAndroid Build Coastguard Worker  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
42*90e502c7SAndroid Build Coastguard Worker  * OF THE POSSIBILITY OF SUCH DAMAGE.
43*90e502c7SAndroid Build Coastguard Worker  *
44*90e502c7SAndroid Build Coastguard Worker  */
45*90e502c7SAndroid Build Coastguard Worker 
46*90e502c7SAndroid Build Coastguard Worker /*
47*90e502c7SAndroid Build Coastguard Worker 
48*90e502c7SAndroid Build Coastguard Worker  Example usage (with first NIST FIPS 197 test case):
49*90e502c7SAndroid Build Coastguard Worker 
50*90e502c7SAndroid Build Coastguard Worker  [sh]$ test/aes_calc 000102030405060708090a0b0c0d0e0f \
51*90e502c7SAndroid Build Coastguard Worker        00112233445566778899aabbccddeeff -v
52*90e502c7SAndroid Build Coastguard Worker 
53*90e502c7SAndroid Build Coastguard Worker  plaintext:      00112233445566778899aabbccddeeff
54*90e502c7SAndroid Build Coastguard Worker  key:            000102030405060708090a0b0c0d0e0f
55*90e502c7SAndroid Build Coastguard Worker  ciphertext:     69c4e0d86a7b0430d8cdb78070b4c55a
56*90e502c7SAndroid Build Coastguard Worker 
57*90e502c7SAndroid Build Coastguard Worker  */
58*90e502c7SAndroid Build Coastguard Worker 
59*90e502c7SAndroid Build Coastguard Worker #ifdef HAVE_CONFIG_H
60*90e502c7SAndroid Build Coastguard Worker #include <config.h>
61*90e502c7SAndroid Build Coastguard Worker #endif
62*90e502c7SAndroid Build Coastguard Worker 
63*90e502c7SAndroid Build Coastguard Worker #include "aes.h"
64*90e502c7SAndroid Build Coastguard Worker #include <stdio.h>
65*90e502c7SAndroid Build Coastguard Worker #include <string.h>
66*90e502c7SAndroid Build Coastguard Worker #include "util.h"
67*90e502c7SAndroid Build Coastguard Worker 
usage(char * prog_name)68*90e502c7SAndroid Build Coastguard Worker void usage(char *prog_name)
69*90e502c7SAndroid Build Coastguard Worker {
70*90e502c7SAndroid Build Coastguard Worker     printf("usage: %s <key> <plaintext> [-v]\n", prog_name);
71*90e502c7SAndroid Build Coastguard Worker     exit(255);
72*90e502c7SAndroid Build Coastguard Worker }
73*90e502c7SAndroid Build Coastguard Worker 
74*90e502c7SAndroid Build Coastguard Worker #define AES_MAX_KEY_LEN 32
75*90e502c7SAndroid Build Coastguard Worker 
main(int argc,char * argv[])76*90e502c7SAndroid Build Coastguard Worker int main(int argc, char *argv[])
77*90e502c7SAndroid Build Coastguard Worker {
78*90e502c7SAndroid Build Coastguard Worker     v128_t data;
79*90e502c7SAndroid Build Coastguard Worker     uint8_t key[AES_MAX_KEY_LEN];
80*90e502c7SAndroid Build Coastguard Worker     srtp_aes_expanded_key_t exp_key;
81*90e502c7SAndroid Build Coastguard Worker     int key_len, len;
82*90e502c7SAndroid Build Coastguard Worker     int verbose = 0;
83*90e502c7SAndroid Build Coastguard Worker     srtp_err_status_t status;
84*90e502c7SAndroid Build Coastguard Worker 
85*90e502c7SAndroid Build Coastguard Worker     if (argc == 3) {
86*90e502c7SAndroid Build Coastguard Worker         /* we're not in verbose mode */
87*90e502c7SAndroid Build Coastguard Worker         verbose = 0;
88*90e502c7SAndroid Build Coastguard Worker     } else if (argc == 4) {
89*90e502c7SAndroid Build Coastguard Worker         if (strncmp(argv[3], "-v", 2) == 0) {
90*90e502c7SAndroid Build Coastguard Worker             /* we're in verbose mode */
91*90e502c7SAndroid Build Coastguard Worker             verbose = 1;
92*90e502c7SAndroid Build Coastguard Worker         } else {
93*90e502c7SAndroid Build Coastguard Worker             /* unrecognized flag, complain and exit */
94*90e502c7SAndroid Build Coastguard Worker             usage(argv[0]);
95*90e502c7SAndroid Build Coastguard Worker         }
96*90e502c7SAndroid Build Coastguard Worker     } else {
97*90e502c7SAndroid Build Coastguard Worker         /* we've been fed the wrong number of arguments - compain and exit */
98*90e502c7SAndroid Build Coastguard Worker         usage(argv[0]);
99*90e502c7SAndroid Build Coastguard Worker     }
100*90e502c7SAndroid Build Coastguard Worker 
101*90e502c7SAndroid Build Coastguard Worker     /* read in key, checking length */
102*90e502c7SAndroid Build Coastguard Worker     if (strlen(argv[1]) > AES_MAX_KEY_LEN * 2) {
103*90e502c7SAndroid Build Coastguard Worker         fprintf(stderr, "error: too many digits in key "
104*90e502c7SAndroid Build Coastguard Worker                         "(should be at most %d hexadecimal digits, found %u)\n",
105*90e502c7SAndroid Build Coastguard Worker                 AES_MAX_KEY_LEN * 2, (unsigned)strlen(argv[1]));
106*90e502c7SAndroid Build Coastguard Worker         exit(1);
107*90e502c7SAndroid Build Coastguard Worker     }
108*90e502c7SAndroid Build Coastguard Worker     len = hex_string_to_octet_string((char *)key, argv[1], AES_MAX_KEY_LEN * 2);
109*90e502c7SAndroid Build Coastguard Worker     /* check that hex string is the right length */
110*90e502c7SAndroid Build Coastguard Worker     if (len != 32 && len != 48 && len != 64) {
111*90e502c7SAndroid Build Coastguard Worker         fprintf(stderr, "error: bad number of digits in key "
112*90e502c7SAndroid Build Coastguard Worker                         "(should be 32/48/64 hexadecimal digits, found %d)\n",
113*90e502c7SAndroid Build Coastguard Worker                 len);
114*90e502c7SAndroid Build Coastguard Worker         exit(1);
115*90e502c7SAndroid Build Coastguard Worker     }
116*90e502c7SAndroid Build Coastguard Worker     key_len = len / 2;
117*90e502c7SAndroid Build Coastguard Worker 
118*90e502c7SAndroid Build Coastguard Worker     /* read in plaintext, checking length */
119*90e502c7SAndroid Build Coastguard Worker     if (strlen(argv[2]) > 16 * 2) {
120*90e502c7SAndroid Build Coastguard Worker         fprintf(stderr, "error: too many digits in plaintext "
121*90e502c7SAndroid Build Coastguard Worker                         "(should be %d hexadecimal digits, found %u)\n",
122*90e502c7SAndroid Build Coastguard Worker                 16 * 2, (unsigned)strlen(argv[2]));
123*90e502c7SAndroid Build Coastguard Worker         exit(1);
124*90e502c7SAndroid Build Coastguard Worker     }
125*90e502c7SAndroid Build Coastguard Worker     len = hex_string_to_octet_string((char *)(&data), argv[2], 16 * 2);
126*90e502c7SAndroid Build Coastguard Worker     /* check that hex string is the right length */
127*90e502c7SAndroid Build Coastguard Worker     if (len < 16 * 2) {
128*90e502c7SAndroid Build Coastguard Worker         fprintf(stderr, "error: too few digits in plaintext "
129*90e502c7SAndroid Build Coastguard Worker                         "(should be %d hexadecimal digits, found %d)\n",
130*90e502c7SAndroid Build Coastguard Worker                 16 * 2, len);
131*90e502c7SAndroid Build Coastguard Worker         exit(1);
132*90e502c7SAndroid Build Coastguard Worker     }
133*90e502c7SAndroid Build Coastguard Worker 
134*90e502c7SAndroid Build Coastguard Worker     if (verbose) {
135*90e502c7SAndroid Build Coastguard Worker         /* print out plaintext */
136*90e502c7SAndroid Build Coastguard Worker         printf("plaintext:\t%s\n",
137*90e502c7SAndroid Build Coastguard Worker                octet_string_hex_string((uint8_t *)&data, 16));
138*90e502c7SAndroid Build Coastguard Worker     }
139*90e502c7SAndroid Build Coastguard Worker 
140*90e502c7SAndroid Build Coastguard Worker     /* encrypt plaintext */
141*90e502c7SAndroid Build Coastguard Worker     status = srtp_aes_expand_encryption_key(key, key_len, &exp_key);
142*90e502c7SAndroid Build Coastguard Worker     if (status) {
143*90e502c7SAndroid Build Coastguard Worker         fprintf(stderr, "error: AES key expansion failed.\n");
144*90e502c7SAndroid Build Coastguard Worker         exit(1);
145*90e502c7SAndroid Build Coastguard Worker     }
146*90e502c7SAndroid Build Coastguard Worker 
147*90e502c7SAndroid Build Coastguard Worker     srtp_aes_encrypt(&data, &exp_key);
148*90e502c7SAndroid Build Coastguard Worker 
149*90e502c7SAndroid Build Coastguard Worker     /* write ciphertext to output */
150*90e502c7SAndroid Build Coastguard Worker     if (verbose) {
151*90e502c7SAndroid Build Coastguard Worker         printf("key:\t\t%s\n", octet_string_hex_string(key, key_len));
152*90e502c7SAndroid Build Coastguard Worker         printf("ciphertext:\t");
153*90e502c7SAndroid Build Coastguard Worker     }
154*90e502c7SAndroid Build Coastguard Worker     printf("%s\n", v128_hex_string(&data));
155*90e502c7SAndroid Build Coastguard Worker 
156*90e502c7SAndroid Build Coastguard Worker     return 0;
157*90e502c7SAndroid Build Coastguard Worker }
158