Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

Revision 0823ddc56e9aaa1de6c4f57bb45457d5eeca404d authored by Matt Caswell on 11 June 2015, 14:20:22 UTC, committed by Matt Caswell on 11 June 2015, 14:20:22 UTC
Prepare for 0.9.8zg release
Reviewed-by: Stephen Henson <steve@openssl.org>
1 parent ad65679
  • Files
  • Changes
  • 3477106
  • /
  • fips
  • /
  • aes
  • /
  • fips_aesavs.c
Raw File
Cook and download a directory from the Software Heritage Vault

You have requested the cooking of the directory with identifier None into a standard tar.gz archive.

Are you sure you want to continue ?

Download a directory from the Software Heritage Vault

You have requested the download of the directory with identifier None as a standard tar.gz archive.

Are you sure you want to continue ?

Cook and download a revision from the Software Heritage Vault

You have requested the cooking of the history heading to revision with identifier swh:1:rev:0823ddc56e9aaa1de6c4f57bb45457d5eeca404d into a bare git archive.

Are you sure you want to continue ?

Download a revision from the Software Heritage Vault

You have requested the download of the history heading to revision with identifier swh:1:rev:0823ddc56e9aaa1de6c4f57bb45457d5eeca404d as a bare git archive.

Are you sure you want to continue ?

Invalid Email !

The provided email is not well-formed.

Download link has expired

The requested archive is no longer available for download from the Software Heritage Vault.

Do you want to cook it again ?

Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • content
revision badge
swh:1:rev:0823ddc56e9aaa1de6c4f57bb45457d5eeca404d
content badge Iframe embedding
swh:1:cnt:9b03afc2adad381acb54a8a6bdbc4d804174dfc8
fips_aesavs.c
/* ====================================================================
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 *
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in
 *    the documentation and/or other materials provided with the
 *    distribution.
 *
 * 3. All advertising materials mentioning features or use of this
 *    software must display the following acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 *
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 *    endorse or promote products derived from this software without
 *    prior written permission. For written permission, please contact
 *    openssl-core@openssl.org.
 *
 * 5. Products derived from this software may not be called "OpenSSL"
 *    nor may "OpenSSL" appear in their names without prior written
 *    permission of the OpenSSL Project.
 *
 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 *
 */
/* --------------------------------------------
  NIST AES Algorithm Validation Suite
  Test Program

  Donated to OpenSSL by:
  V-ONE Corporation
  20250 Century Blvd, Suite 300
  Germantown, MD 20874
  U.S.A.
  ----------------------------------------------*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <assert.h>
#include <ctype.h>
#include <openssl/aes.h>
#include <openssl/evp.h>
#include <openssl/bn.h>

#include <openssl/err.h>
#include "e_os.h"

#ifndef OPENSSL_FIPS

int main(int argc, char *argv[])
{
    printf("No FIPS AES support\n");
    return (0);
}

#else

# include <openssl/fips.h>
# include "fips_utl.h"

# define AES_BLOCK_SIZE 16

# define VERBOSE 0

/* ---------------------------------------------*/

static int AESTest(EVP_CIPHER_CTX *ctx,
                   char *amode, int akeysz, unsigned char *aKey,
                   unsigned char *iVec,
                   /* 0 = decrypt, 1 = encrypt */
                   int dir,
                   unsigned char *plaintext, unsigned char *ciphertext,
                   int len)
{
    const EVP_CIPHER *cipher = NULL;

    if (strcasecmp(amode, "CBC") == 0) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_cbc();
            break;

        case 192:
            cipher = EVP_aes_192_cbc();
            break;

        case 256:
            cipher = EVP_aes_256_cbc();
            break;
        }

    } else if (strcasecmp(amode, "ECB") == 0) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_ecb();
            break;

        case 192:
            cipher = EVP_aes_192_ecb();
            break;

        case 256:
            cipher = EVP_aes_256_ecb();
            break;
        }
    } else if (strcasecmp(amode, "CFB128") == 0) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_cfb128();
            break;

        case 192:
            cipher = EVP_aes_192_cfb128();
            break;

        case 256:
            cipher = EVP_aes_256_cfb128();
            break;
        }

    } else if (strncasecmp(amode, "OFB", 3) == 0) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_ofb();
            break;

        case 192:
            cipher = EVP_aes_192_ofb();
            break;

        case 256:
            cipher = EVP_aes_256_ofb();
            break;
        }
    } else if (!strcasecmp(amode, "CFB1")) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_cfb1();
            break;

        case 192:
            cipher = EVP_aes_192_cfb1();
            break;

        case 256:
            cipher = EVP_aes_256_cfb1();
            break;
        }
    } else if (!strcasecmp(amode, "CFB8")) {
        switch (akeysz) {
        case 128:
            cipher = EVP_aes_128_cfb8();
            break;

        case 192:
            cipher = EVP_aes_192_cfb8();
            break;

        case 256:
            cipher = EVP_aes_256_cfb8();
            break;
        }
    } else {
        printf("Unknown mode: %s\n", amode);
        return 0;
    }
    if (!cipher) {
        printf("Invalid key size: %d\n", akeysz);
        return 0;
    }
    if (EVP_CipherInit_ex(ctx, cipher, NULL, aKey, iVec, dir) <= 0)
        return 0;
    if (!strcasecmp(amode, "CFB1"))
        M_EVP_CIPHER_CTX_set_flags(ctx, EVP_CIPH_FLAG_LENGTH_BITS);
    if (dir)
        EVP_Cipher(ctx, ciphertext, plaintext, len);
    else
        EVP_Cipher(ctx, plaintext, ciphertext, len);
    return 1;
}

/* ---------------------------------------------*/
char *t_tag[2] = { "PLAINTEXT", "CIPHERTEXT" };
char *t_mode[6] = { "CBC", "ECB", "OFB", "CFB1", "CFB8", "CFB128" };
enum Mode { CBC, ECB, OFB, CFB1, CFB8, CFB128 };
enum XCrypt { XDECRYPT, XENCRYPT };

/*=============================*/
/*  Monte Carlo Tests          */
/* ---------------------------*/

/*
 * #define gb(a,b) (((a)[(b)/8] >> ((b)%8))&1)
 */
/*
 * #define sb(a,b,v) ((a)[(b)/8]=((a)[(b)/8]&~(1 << ((b)%8)))|(!!(v) <<
 * ((b)%8)))
 */

# define gb(a,b) (((a)[(b)/8] >> (7-(b)%8))&1)
# define sb(a,b,v) ((a)[(b)/8]=((a)[(b)/8]&~(1 << (7-(b)%8)))|(!!(v) << (7-(b)%8)))

static int do_mct(char *amode,
                  int akeysz, unsigned char *aKey, unsigned char *iVec,
                  int dir, unsigned char *text, int len, FILE *rfp)
{
    int ret = 0;
    unsigned char key[101][32];
    unsigned char iv[101][AES_BLOCK_SIZE];
    unsigned char ptext[1001][32];
    unsigned char ctext[1001][32];
    unsigned char ciphertext[64 + 4];
    int i, j, n, n1, n2;
    int imode = 0, nkeysz = akeysz / 8;
    EVP_CIPHER_CTX ctx;
    EVP_CIPHER_CTX_init(&ctx);

    if (len > 32) {
        printf("\n>>>> Length exceeds 32 for %s %d <<<<\n\n", amode, akeysz);
        return -1;
    }
    for (imode = 0; imode < 6; ++imode)
        if (strcmp(amode, t_mode[imode]) == 0)
            break;
    if (imode == 6) {
        printf("Unrecognized mode: %s\n", amode);
        return -1;
    }

    memcpy(key[0], aKey, nkeysz);
    if (iVec)
        memcpy(iv[0], iVec, AES_BLOCK_SIZE);
    if (dir == XENCRYPT)
        memcpy(ptext[0], text, len);
    else
        memcpy(ctext[0], text, len);
    for (i = 0; i < 100; ++i) {
        /* printf("Iteration %d\n", i); */
        if (i > 0) {
            fprintf(rfp, "COUNT = %d\n", i);
            OutputValue("KEY", key[i], nkeysz, rfp, 0);
            if (imode != ECB)   /* ECB */
                OutputValue("IV", iv[i], AES_BLOCK_SIZE, rfp, 0);
            /* Output Ciphertext | Plaintext */
            OutputValue(t_tag[dir ^ 1], dir ? ptext[0] : ctext[0], len, rfp,
                        imode == CFB1);
        }
        for (j = 0; j < 1000; ++j) {
            switch (imode) {
            case ECB:
                if (j == 0) {   /* set up encryption */
                    ret = AESTest(&ctx, amode, akeysz, key[i], NULL,
                                  /* 0 = decrypt, 1 = encrypt */
                                  dir, ptext[j], ctext[j], len);
                    if (dir == XENCRYPT)
                        memcpy(ptext[j + 1], ctext[j], len);
                    else
                        memcpy(ctext[j + 1], ptext[j], len);
                } else {
                    if (dir == XENCRYPT) {
                        EVP_Cipher(&ctx, ctext[j], ptext[j], len);
                        memcpy(ptext[j + 1], ctext[j], len);
                    } else {
                        EVP_Cipher(&ctx, ptext[j], ctext[j], len);
                        memcpy(ctext[j + 1], ptext[j], len);
                    }
                }
                break;

            case CBC:
            case OFB:
            case CFB128:
                if (j == 0) {
                    ret = AESTest(&ctx, amode, akeysz, key[i], iv[i],
                                  /* 0 = decrypt, 1 = encrypt */
                                  dir, ptext[j], ctext[j], len);
                    if (dir == XENCRYPT)
                        memcpy(ptext[j + 1], iv[i], len);
                    else
                        memcpy(ctext[j + 1], iv[i], len);
                } else {
                    if (dir == XENCRYPT) {
                        EVP_Cipher(&ctx, ctext[j], ptext[j], len);
                        memcpy(ptext[j + 1], ctext[j - 1], len);
                    } else {
                        EVP_Cipher(&ctx, ptext[j], ctext[j], len);
                        memcpy(ctext[j + 1], ptext[j - 1], len);
                    }
                }
                break;

            case CFB8:
                if (j == 0) {
                    ret = AESTest(&ctx, amode, akeysz, key[i], iv[i],
                                  /* 0 = decrypt, 1 = encrypt */
                                  dir, ptext[j], ctext[j], len);
                } else {
                    if (dir == XENCRYPT)
                        EVP_Cipher(&ctx, ctext[j], ptext[j], len);
                    else
                        EVP_Cipher(&ctx, ptext[j], ctext[j], len);
                }
                if (dir == XENCRYPT) {
                    if (j < 16)
                        memcpy(ptext[j + 1], &iv[i][j], len);
                    else
                        memcpy(ptext[j + 1], ctext[j - 16], len);
                } else {
                    if (j < 16)
                        memcpy(ctext[j + 1], &iv[i][j], len);
                    else
                        memcpy(ctext[j + 1], ptext[j - 16], len);
                }
                break;

            case CFB1:
                if (j == 0) {
# if 0
                    /* compensate for wrong endianness of input file */
                    if (i == 0)
                        ptext[0][0] <<= 7;
# endif
                    ret = AESTest(&ctx, amode, akeysz, key[i], iv[i], dir,
                                  ptext[j], ctext[j], len);
                } else {
                    if (dir == XENCRYPT)
                        EVP_Cipher(&ctx, ctext[j], ptext[j], len);
                    else
                        EVP_Cipher(&ctx, ptext[j], ctext[j], len);

                }
                if (dir == XENCRYPT) {
                    if (j < 128)
                        sb(ptext[j + 1], 0, gb(iv[i], j));
                    else
                        sb(ptext[j + 1], 0, gb(ctext[j - 128], 0));
                } else {
                    if (j < 128)
                        sb(ctext[j + 1], 0, gb(iv[i], j));
                    else
                        sb(ctext[j + 1], 0, gb(ptext[j - 128], 0));
                }
                break;
            }
        }
        --j;                    /* reset to last of range */
        /* Output Ciphertext | Plaintext */
        OutputValue(t_tag[dir], dir ? ctext[j] : ptext[j], len, rfp,
                    imode == CFB1);
        fprintf(rfp, "\n");     /* add separator */

        /* Compute next KEY */
        if (dir == XENCRYPT) {
            if (imode == CFB8) {
                /* ct = CT[j-15] || CT[j-14] || ... || CT[j] */
                for (n1 = 0, n2 = nkeysz - 1; n1 < nkeysz; ++n1, --n2)
                    ciphertext[n1] = ctext[j - n2][0];
            } else if (imode == CFB1) {
                for (n1 = 0, n2 = akeysz - 1; n1 < akeysz; ++n1, --n2)
                    sb(ciphertext, n1, gb(ctext[j - n2], 0));
            } else
                switch (akeysz) {
                case 128:
                    memcpy(ciphertext, ctext[j], 16);
                    break;
                case 192:
                    memcpy(ciphertext, ctext[j - 1] + 8, 8);
                    memcpy(ciphertext + 8, ctext[j], 16);
                    break;
                case 256:
                    memcpy(ciphertext, ctext[j - 1], 16);
                    memcpy(ciphertext + 16, ctext[j], 16);
                    break;
                }
        } else {
            if (imode == CFB8) {
                /* ct = CT[j-15] || CT[j-14] || ... || CT[j] */
                for (n1 = 0, n2 = nkeysz - 1; n1 < nkeysz; ++n1, --n2)
                    ciphertext[n1] = ptext[j - n2][0];
            } else if (imode == CFB1) {
                for (n1 = 0, n2 = akeysz - 1; n1 < akeysz; ++n1, --n2)
                    sb(ciphertext, n1, gb(ptext[j - n2], 0));
            } else
                switch (akeysz) {
                case 128:
                    memcpy(ciphertext, ptext[j], 16);
                    break;
                case 192:
                    memcpy(ciphertext, ptext[j - 1] + 8, 8);
                    memcpy(ciphertext + 8, ptext[j], 16);
                    break;
                case 256:
                    memcpy(ciphertext, ptext[j - 1], 16);
                    memcpy(ciphertext + 16, ptext[j], 16);
                    break;
                }
        }
        /* Compute next key: Key[i+1] = Key[i] xor ct */
        for (n = 0; n < nkeysz; ++n)
            key[i + 1][n] = key[i][n] ^ ciphertext[n];

        /* Compute next IV and text */
        if (dir == XENCRYPT) {
            switch (imode) {
            case ECB:
                memcpy(ptext[0], ctext[j], AES_BLOCK_SIZE);
                break;
            case CBC:
            case OFB:
            case CFB128:
                memcpy(iv[i + 1], ctext[j], AES_BLOCK_SIZE);
                memcpy(ptext[0], ctext[j - 1], AES_BLOCK_SIZE);
                break;
            case CFB8:
                /* IV[i+1] = ct */
                for (n1 = 0, n2 = 15; n1 < 16; ++n1, --n2)
                    iv[i + 1][n1] = ctext[j - n2][0];
                ptext[0][0] = ctext[j - 16][0];
                break;
            case CFB1:
                for (n1 = 0, n2 = 127; n1 < 128; ++n1, --n2)
                    sb(iv[i + 1], n1, gb(ctext[j - n2], 0));
                ptext[0][0] = ctext[j - 128][0] & 0x80;
                break;
            }
        } else {
            switch (imode) {
            case ECB:
                memcpy(ctext[0], ptext[j], AES_BLOCK_SIZE);
                break;
            case CBC:
            case OFB:
            case CFB128:
                memcpy(iv[i + 1], ptext[j], AES_BLOCK_SIZE);
                memcpy(ctext[0], ptext[j - 1], AES_BLOCK_SIZE);
                break;
            case CFB8:
                for (n1 = 0, n2 = 15; n1 < 16; ++n1, --n2)
                    iv[i + 1][n1] = ptext[j - n2][0];
                ctext[0][0] = ptext[j - 16][0];
                break;
            case CFB1:
                for (n1 = 0, n2 = 127; n1 < 128; ++n1, --n2)
                    sb(iv[i + 1], n1, gb(ptext[j - n2], 0));
                ctext[0][0] = ptext[j - 128][0] & 0x80;
                break;
            }
        }
    }

    return ret;
}

/*================================================*/
/* ---------------------------
  # Config info for v-one
  # AESVS MMT test data for ECB
  # State : Encrypt and Decrypt
  # Key Length : 256
  # Fri Aug 30 04:07:22 PM
  ----------------------------*/

static int proc_file(char *rqfile, char *rspfile)
{
    char afn[256], rfn[256];
    FILE *afp = NULL, *rfp = NULL;
    char ibuf[2048];
    char tbuf[2048];
    int ilen, len, ret = 0;
    char algo[8] = "";
    char amode[8] = "";
    char atest[8] = "";
    int akeysz = 0;
    unsigned char iVec[20], aKey[40];
    int dir = -1, err = 0, step = 0;
    unsigned char plaintext[2048];
    unsigned char ciphertext[2048];
    char *rp;
    EVP_CIPHER_CTX ctx;
    EVP_CIPHER_CTX_init(&ctx);

    if (!rqfile || !(*rqfile)) {
        printf("No req file\n");
        return -1;
    }
    strcpy(afn, rqfile);

    if ((afp = fopen(afn, "r")) == NULL) {
        printf("Cannot open file: %s, %s\n", afn, strerror(errno));
        return -1;
    }
    if (!rspfile) {
        strcpy(rfn, afn);
        rp = strstr(rfn, "req/");
# ifdef OPENSSL_SYS_WIN32
        if (!rp)
            rp = strstr(rfn, "req\\");
# endif
        assert(rp);
        memcpy(rp, "rsp", 3);
        rp = strstr(rfn, ".req");
        memcpy(rp, ".rsp", 4);
        rspfile = rfn;
    }
    if ((rfp = fopen(rspfile, "w")) == NULL) {
        printf("Cannot open file: %s, %s\n", rfn, strerror(errno));
        fclose(afp);
        afp = NULL;
        return -1;
    }
    while (!err && (fgets(ibuf, sizeof(ibuf), afp)) != NULL) {
        tidy_line(tbuf, ibuf);
        ilen = strlen(ibuf);
        /*      printf("step=%d ibuf=%s",step,ibuf); */
        switch (step) {
        case 0:                /* read preamble */
            if (ibuf[0] == '\n') { /* end of preamble */
                if ((*algo == '\0') || (*amode == '\0') || (akeysz == 0)) {
                    printf("Missing Algorithm, Mode or KeySize (%s/%s/%d)\n",
                           algo, amode, akeysz);
                    err = 1;
                } else {
                    fputs(ibuf, rfp);
                    ++step;
                }
            } else if (ibuf[0] != '#') {
                printf("Invalid preamble item: %s\n", ibuf);
                err = 1;
            } else {            /* process preamble */
                char *xp, *pp = ibuf + 2;
                int n;
                if (akeysz) {   /* insert current time & date */
                    time_t rtim = time(0);
                    fprintf(rfp, "# %s", ctime(&rtim));
                } else {
                    fputs(ibuf, rfp);
                    if (strncmp(pp, "AESVS ", 6) == 0) {
                        strcpy(algo, "AES");
                        /* get test type */
                        pp += 6;
                        xp = strchr(pp, ' ');
                        n = xp - pp;
                        strncpy(atest, pp, n);
                        atest[n] = '\0';
                        /* get mode */
                        xp = strrchr(pp, ' '); /* get mode" */
                        n = strlen(xp + 1) - 1;
                        strncpy(amode, xp + 1, n);
                        amode[n] = '\0';
                        /* amode[3] = '\0'; */
                        if (VERBOSE)
                            printf("Test = %s, Mode = %s\n", atest, amode);
                    } else if (strncasecmp(pp, "Key Length : ", 13) == 0) {
                        akeysz = atoi(pp + 13);
                        if (VERBOSE)
                            printf("Key size = %d\n", akeysz);
                    }
                }
            }
            break;

        case 1:                /* [ENCRYPT] | [DECRYPT] */
            if (ibuf[0] == '[') {
                fputs(ibuf, rfp);
                ++step;
                if (strncasecmp(ibuf, "[ENCRYPT]", 9) == 0)
                    dir = 1;
                else if (strncasecmp(ibuf, "[DECRYPT]", 9) == 0)
                    dir = 0;
                else {
                    printf("Invalid keyword: %s\n", ibuf);
                    err = 1;
                }
                break;
            } else if (dir == -1) {
                err = 1;
                printf("Missing ENCRYPT/DECRYPT keyword\n");
                break;
            } else
                step = 2;

        case 2:                /* KEY = xxxx */
            fputs(ibuf, rfp);
            if (*ibuf == '\n')
                break;
            if (!strncasecmp(ibuf, "COUNT = ", 8))
                break;

            if (strncasecmp(ibuf, "KEY = ", 6) != 0) {
                printf("Missing KEY\n");
                err = 1;
            } else {
                len = hex2bin((char *)ibuf + 6, aKey);
                if (len < 0) {
                    printf("Invalid KEY\n");
                    err = 1;
                    break;
                }
                PrintValue("KEY", aKey, len);
                if (strcmp(amode, "ECB") == 0) {
                    memset(iVec, 0, sizeof(iVec));
                    step = (dir) ? 4 : 5; /* no ivec for ECB */
                } else
                    ++step;
            }
            break;

        case 3:                /* IV = xxxx */
            fputs(ibuf, rfp);
            if (strncasecmp(ibuf, "IV = ", 5) != 0) {
                printf("Missing IV\n");
                err = 1;
            } else {
                len = hex2bin((char *)ibuf + 5, iVec);
                if (len < 0) {
                    printf("Invalid IV\n");
                    err = 1;
                    break;
                }
                PrintValue("IV", iVec, len);
                step = (dir) ? 4 : 5;
            }
            break;

        case 4:                /* PLAINTEXT = xxxx */
            fputs(ibuf, rfp);
            if (strncasecmp(ibuf, "PLAINTEXT = ", 12) != 0) {
                printf("Missing PLAINTEXT\n");
                err = 1;
            } else {
                int nn = strlen(ibuf + 12);
                if (!strcmp(amode, "CFB1"))
                    len = bint2bin(ibuf + 12, nn - 1, plaintext);
                else
                    len = hex2bin(ibuf + 12, plaintext);
                if (len < 0) {
                    printf("Invalid PLAINTEXT: %s", ibuf + 12);
                    err = 1;
                    break;
                }
                if (len >= (int)sizeof(plaintext)) {
                    printf("Buffer overflow\n");
                }
                PrintValue("PLAINTEXT", (unsigned char *)plaintext, len);
                if (strcmp(atest, "MCT") == 0) { /* Monte Carlo Test */
                    if (do_mct(amode, akeysz, aKey, iVec,
                               dir, (unsigned char *)plaintext, len, rfp) < 0)
                        EXIT(1);
                } else {
                    ret = AESTest(&ctx, amode, akeysz, aKey, iVec,
                                  /* 0 = decrypt, 1 = encrypt */
                                  dir, plaintext, ciphertext, len);
                    OutputValue("CIPHERTEXT", ciphertext, len, rfp,
                                !strcmp(amode, "CFB1"));
                }
                step = 6;
            }
            break;

        case 5:                /* CIPHERTEXT = xxxx */
            fputs(ibuf, rfp);
            if (strncasecmp(ibuf, "CIPHERTEXT = ", 13) != 0) {
                printf("Missing KEY\n");
                err = 1;
            } else {
                if (!strcmp(amode, "CFB1"))
                    len =
                        bint2bin(ibuf + 13, strlen(ibuf + 13) - 1,
                                 ciphertext);
                else
                    len = hex2bin(ibuf + 13, ciphertext);
                if (len < 0) {
                    printf("Invalid CIPHERTEXT\n");
                    err = 1;
                    break;
                }

                PrintValue("CIPHERTEXT", ciphertext, len);
                if (strcmp(atest, "MCT") == 0) { /* Monte Carlo Test */
                    do_mct(amode, akeysz, aKey, iVec,
                           dir, ciphertext, len, rfp);
                } else {
                    ret = AESTest(&ctx, amode, akeysz, aKey, iVec,
                                  /* 0 = decrypt, 1 = encrypt */
                                  dir, plaintext, ciphertext, len);
                    OutputValue("PLAINTEXT", (unsigned char *)plaintext, len,
                                rfp, !strcmp(amode, "CFB1"));
                }
                step = 6;
            }
            break;

        case 6:
            if (ibuf[0] != '\n') {
                err = 1;
                printf("Missing terminator\n");
            } else if (strcmp(atest, "MCT") != 0) { /* MCT already added
                                                     * terminating nl */
                fputs(ibuf, rfp);
            }
            step = 1;
            break;
        }
    }
    if (rfp)
        fclose(rfp);
    if (afp)
        fclose(afp);
    return err;
}

/* -------------------------------------------------
  Processes either a single file or
  a set of files whose names are passed in a file.
  A single file is specified as:
    aes_test -f xxx.req
  A set of files is specified as:
    aes_test -d xxxxx.xxx
  The default is: -d req.txt
--------------------------------------------------*/
int main(int argc, char **argv)
{
    char *rqlist = "req.txt", *rspfile = NULL;
    FILE *fp = NULL;
    char fn[250] = "", rfn[256] = "";
    int f_opt = 0, d_opt = 1;

# ifdef OPENSSL_FIPS
    if (!FIPS_mode_set(1)) {
        do_print_errors();
        EXIT(1);
    }
# endif
    if (argc > 1) {
        if (strcasecmp(argv[1], "-d") == 0) {
            d_opt = 1;
        } else if (strcasecmp(argv[1], "-f") == 0) {
            f_opt = 1;
            d_opt = 0;
        } else {
            printf("Invalid parameter: %s\n", argv[1]);
            return 0;
        }
        if (argc < 3) {
            printf("Missing parameter\n");
            return 0;
        }
        if (d_opt)
            rqlist = argv[2];
        else {
            strcpy(fn, argv[2]);
            rspfile = argv[3];
        }
    }
    if (d_opt) {                /* list of files (directory) */
        if (!(fp = fopen(rqlist, "r"))) {
            printf("Cannot open req list file\n");
            return -1;
        }
        while (fgets(fn, sizeof(fn), fp)) {
            strtok(fn, "\r\n");
            strcpy(rfn, fn);
            if (VERBOSE)
                printf("Processing: %s\n", rfn);
            if (proc_file(rfn, rspfile)) {
                printf(">>> Processing failed for: %s <<<\n", rfn);
                EXIT(1);
            }
        }
        fclose(fp);
    } else {                    /* single file */

        if (VERBOSE)
            printf("Processing: %s\n", fn);
        if (proc_file(fn, rspfile)) {
            printf(">>> Processing failed for: %s <<<\n", fn);
        }
    }
    EXIT(0);
    return 0;
}

#endif
The diff you're trying to view is too large. Only the first 1000 changed files have been loaded.
Showing with 0 additions and 0 deletions (0 / 0 diffs computed)
swh spinner

Computing file changes ...

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top