⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rijndael.c

📁 IBM的Linux上的PKCS#11实现
💻 C
📖 第 1 页 / 共 3 页
字号:
        return rc;}int do_AES_KAT_256_CBC(void){        int                     i, j, k;        CK_RV                   rc;        CK_BYTE                 pt[AES_BLOCK_SIZE],				old_ct[AES_BLOCK_SIZE],                                ct[32], // larger to acct for trailing ciphertext                                final_pt[AES_BLOCK_SIZE],				cv[AES_BLOCK_SIZE],				iv[AES_BLOCK_SIZE];        CK_BYTE                 key[AES_KEY_SIZE_256];        CK_ULONG                pt_len = AES_BLOCK_SIZE;        CK_ULONG                ct_len = AES_BLOCK_SIZE;        CK_ULONG                key_size = AES_KEY_SIZE_256;        CK_OBJECT_CLASS         class = CKO_SECRET_KEY;        CK_KEY_TYPE             key_type = CKK_AES;        CK_UTF8CHAR             label[] = "AES secret key object";        CK_BBOOL                true = TRUE;        CK_ATTRIBUTE            template[] = {                {CKA_CLASS,     &class,         sizeof(class)},                {CKA_KEY_TYPE,  &key_type,      sizeof(key_type)},                {CKA_TOKEN,     &true,          sizeof(true)},                {CKA_LABEL,     label,          sizeof(label)-1},                {CKA_ENCRYPT,   &true,          sizeof(true)},                {CKA_VALUE,     key,            sizeof(key)},                {CKA_VALUE_LEN, &key_size,      sizeof(key_size)}        };        CK_OBJECT_HANDLE        h_key;        CK_MECHANISM            mech;        memset( key, 0, sizeof(key) );        memset( pt, 0, sizeof(pt) );        memset( ct, 0, sizeof(ct) );        memset( cv, 0, sizeof(cv) );        memset( final_pt, 0, sizeof(final_pt) );	memset( iv, 0, sizeof(iv) );        if( (rc = funcs->C_CreateObject(sess, template, 7, &h_key)) != CKR_OK) {                OC_ERR_MSG("C_CreateObject #1", rc);                goto done;        }        mech.mechanism = CKM_AES_CBC;        mech.ulParameterLen = sizeof(iv);        mech.pParameter = iv;        for( i=0; i<400; i++) {                if(i==399)                        memcpy(final_pt, pt, sizeof(final_pt));                for( j=0; j<10000; j++) {			for( k=0; k<sizeof(pt); k++)				pt[k] ^= cv[k];			                        memcpy(old_ct, ct+16, sizeof(old_ct));                        rc = funcs->C_EncryptInit(sess, &mech, h_key);                        if (rc != CKR_OK) {                                OC_ERR_MSG("   C_EncryptInit #1", rc);                                goto done;                        }                        rc = funcs->C_Encrypt(sess, pt, pt_len, ct+16, &ct_len);                        if (rc != CKR_OK) {                                OC_ERR_MSG("   C_Encrypt #1", rc);                                goto done;                        }			memcpy(ct, old_ct, 16);			memcpy(pt, old_ct, sizeof(pt));			memcpy(cv, ct+16, sizeof(cv));                        /* After the final encrypt, we need to keep the                         * plain text pure */                        if(i == 399 && j == 9999)                                goto print_done;                }                for( k=0; k<sizeof(ct); k++)                        key[k] ^= ct[k];                if( (rc = funcs->C_DestroyObject(sess, h_key)) != CKR_OK) {                        OC_ERR_MSG("C_DestroyObject", rc);                        goto done;                }                if( (rc = funcs->C_CreateObject(sess, template, 7, &h_key)) != CKR_OK) {                        OC_ERR_MSG("C_CreateObject #2", rc);                        goto done;                }                /* One status tick */                if(!(i%5)) {                        printf(".");                        fflush(stdout);                }        }print_done:        printf("\n");        for( i=0; i<sizeof(key); i++) {                if(key[i] != KAT_256_CBC_KEY[i]) {                        printf("%s:%d Error: key data does not match known "                                "key data at byte %d.\n", __FILE__, __LINE__, i);                        rc = -1;                        goto done;                }        }        for( i=0; i<sizeof(final_pt); i++) {                if(final_pt[i] != KAT_256_CBC_PT[i]) {                        printf("%s:%d Error: Plain text does not match known "                                "plain text at byte %d.\n", __FILE__, __LINE__, i);                        rc = -1;                        goto done;                }        }        for( i=0; i<AES_BLOCK_SIZE; i++) {                if(ct[i+16] != KAT_256_CBC_CT[i]) {                        printf("%s:%d Error: Cipher text does not match known "                                "cipher text at byte %d.\n", __FILE__, __LINE__, i);                        rc = -1;                        goto done;                }        }done:        return rc;}int main(int argc, char **argv){	int 			i;	CK_RV 			rc;	CK_C_INITIALIZE_ARGS	initialize_args;		/* Set default slot to 0 */	slot_id = 0;		/* Parse the command line */	for( i = 1; i < argc; i++ ) {		if(strncmp(argv[i], "-slot", 5) == 0) {			slot_id = atoi(argv[i + 1]);			i++;			break;		}	}		printf("Using slot %d...\n\n", slot_id);		if(do_GetFunctionList())		return -1;		/* There will be no multi-threaded Cryptoki access in this app */	memset( &initialize_args, 0, sizeof(initialize_args) );		if( (rc = funcs->C_Initialize( &initialize_args )) != CKR_OK ) {		OC_ERR_MSG("C_Initialize", rc);		return;	}	/* Open a session with the token */	if( (rc = funcs->C_OpenSession(slot_id, 					(CKF_SERIAL_SESSION|CKF_RW_SESSION), 					NULL_PTR, 					NULL_PTR, 					&sess)) != CKR_OK ) {		OC_ERR_MSG("C_OpenSession #1", rc);		goto done;	}		// Login correctly	rc = funcs->C_Login(sess, CKU_USER, GOOD_USER_PIN, GOOD_USER_PIN_LEN);	if( rc != CKR_OK ) {		OC_ERR_MSG("C_Login #1", rc);		goto session_close;	}	printf("do_AES_KAT_128_ECB...\n");	rc = do_AES_KAT_128_ECB();	if(rc)		goto logout;	printf("Looks good...\n");		printf("do_AES_KAT_192_ECB...\n");	rc = do_AES_KAT_192_ECB();	if(rc)		goto logout;	printf("Looks good...\n");		printf("do_AES_KAT_256_ECB...\n");	rc = do_AES_KAT_256_ECB();	if(rc)		goto logout;	printf("Looks good...\n");		printf("do_AES_KAT_128_CBC...\n");	rc = do_AES_KAT_128_CBC();	if(rc)		goto logout;	printf("Looks good...\n");		printf("do_AES_KAT_192_CBC...\n");	rc = do_AES_KAT_192_CBC();	if(rc)		goto logout;	printf("Looks good...\n");		printf("do_AES_KAT_256_CBC...\n");	rc = do_AES_KAT_256_CBC();	if(rc)		goto logout;	printf("Rijndael tests succeeded.\n");	logout:        rc = funcs->C_Logout(sess);        if( rc != CKR_OK )                OC_ERR_MSG("C_Logout #1", rc);session_close:		/* Close the session */	if( (rc = funcs->C_CloseSession(sess)) != CKR_OK )		OC_ERR_MSG("C_CloseSession", rc);	done:	/* Call C_Finalize and dlclose the library */	return clean_up();}int clean_up(void){	int rc;	        if( (rc = funcs->C_Finalize(NULL)) != CKR_OK)		OC_ERR_MSG("C_Finalize", rc);	/* Decrement the reference count to PKCS11_API.so */	dlclose(dl_handle);		return rc;}int do_GetFunctionList(void){	char *pkcslib = "/usr/lib/pkcs11/PKCS11_API.so";	CK_RV (*func_ptr)();	int rc;	if( (dl_handle = dlopen(pkcslib, RTLD_NOW)) == NULL) {		printf("dlopen: %s\n", dlerror());		return -1;	}		func_ptr = (CK_RV (*)())dlsym(dl_handle, "C_GetFunctionList");	if(func_ptr == NULL)		return -1;	if( (rc = func_ptr(&funcs)) != CKR_OK) {		OC_ERR_MSG("C_GetFunctionList", rc);		return -1;	}	return 0;}void process_ret_code( CK_RV rc ){	switch (rc) {	 case CKR_OK:printf(" CKR_OK");break;	 case CKR_CANCEL:                           printf(" CKR_CANCEL");                           break;	 case CKR_HOST_MEMORY:                      printf(" CKR_HOST_MEMORY");                      break;	 case CKR_SLOT_ID_INVALID:                  printf(" CKR_SLOT_ID_INVALID");                  break;	 case CKR_GENERAL_ERROR:                    printf(" CKR_GENERAL_ERROR");                    break;	 case CKR_FUNCTION_FAILED:                  printf(" CKR_FUNCTION_FAILED");                  break;	 case CKR_ARGUMENTS_BAD:                    printf(" CKR_ARGUMENTS_BAD");                    break;	 case CKR_NO_EVENT:                         printf(" CKR_NO_EVENT");                         break;	 case CKR_NEED_TO_CREATE_THREADS:           printf(" CKR_NEED_TO_CREATE_THREADS");           break;	 case CKR_CANT_LOCK:                        printf(" CKR_CANT_LOCK");                        break;	 case CKR_ATTRIBUTE_READ_ONLY:              printf(" CKR_ATTRIBUTE_READ_ONLY");              break;	 case CKR_ATTRIBUTE_SENSITIVE:              printf(" CKR_ATTRIBUTE_SENSITIVE");              break;	 case CKR_ATTRIBUTE_TYPE_INVALID:           printf(" CKR_ATTRIBUTE_TYPE_INVALID");           break;	 case CKR_ATTRIBUTE_VALUE_INVALID:          printf(" CKR_ATTRIBUTE_VALUE_INVALID");          break;	 case CKR_DATA_INVALID:                     printf(" CKR_DATA_INVALID");                     break;	 case CKR_DATA_LEN_RANGE:                   printf(" CKR_DATA_LEN_RANGE");                   break;	 case CKR_DEVICE_ERROR:                     printf(" CKR_DEVICE_ERROR");                     break;	 case CKR_DEVICE_MEMORY:                    printf(" CKR_DEVICE_MEMORY");                    break;	 case CKR_DEVICE_REMOVED:                   printf(" CKR_DEVICE_REMOVED");                   break;	 case CKR_ENCRYPTED_DATA_INVALID:           printf(" CKR_ENCRYPTED_DATA_INVALID");           break;	 case CKR_ENCRYPTED_DATA_LEN_RANGE:         printf(" CKR_ENCRYPTED_DATA_LEN_RANGE");         break;	 case CKR_FUNCTION_CANCELED:                printf(" CKR_FUNCTION_CANCELED");                break;	 case CKR_FUNCTION_NOT_PARALLEL:            printf(" CKR_FUNCTION_NOT_PARALLEL");            break;	 case CKR_FUNCTION_NOT_SUPPORTED:           printf(" CKR_FUNCTION_NOT_SUPPORTED");           break;	 case CKR_KEY_HANDLE_INVALID:               printf(" CKR_KEY_HANDLE_INVALID");               break;	 case CKR_KEY_SIZE_RANGE:                   printf(" CKR_KEY_SIZE_RANGE");                   break;	 case CKR_KEY_TYPE_INCONSISTENT:            printf(" CKR_KEY_TYPE_INCONSISTENT");            break;	 case CKR_KEY_NOT_NEEDED:                   printf(" CKR_KEY_NOT_NEEDED");                   break;	 case CKR_KEY_CHANGED:                      printf(" CKR_KEY_CHANGED");                      break;	 case CKR_KEY_NEEDED:                       printf(" CKR_KEY_NEEDED");                       break;	 case CKR_KEY_INDIGESTIBLE:                 printf(" CKR_KEY_INDIGESTIBLE");                 break;	 case CKR_KEY_FUNCTION_NOT_PERMITTED:       printf(" CKR_KEY_FUNCTION_NOT_PERMITTED");       break;	 case CKR_KEY_NOT_WRAPPABLE:                printf(" CKR_KEY_NOT_WRAPPABLE");                break;	 case CKR_KEY_UNEXTRACTABLE:                printf(" CKR_KEY_UNEXTRACTABLE");                break;	 case CKR_MECHANISM_INVALID:                printf(" CKR_MECHANISM_INVALID");                break;	 case CKR_MECHANISM_PARAM_INVALID:          printf(" CKR_MECHANISM_PARAM_INVALID");          break;	 case CKR_OBJECT_HANDLE_INVALID:            printf(" CKR_OBJECT_HANDLE_INVALID");            break;	 case CKR_OPERATION_ACTIVE:                 printf(" CKR_OPERATION_ACTIVE");                 break;	 case CKR_OPERATION_NOT_INITIALIZED:        printf(" CKR_OPERATION_NOT_INITIALIZED");        break;	 case CKR_PIN_INCORRECT:                    printf(" CKR_PIN_INCORRECT");                    break;	 case CKR_PIN_INVALID:                      printf(" CKR_PIN_INVALID");                      break;	 case CKR_PIN_LEN_RANGE:                    printf(" CKR_PIN_LEN_RANGE");                    break;	 case CKR_PIN_EXPIRED:                      printf(" CKR_PIN_EXPIRED");                      break;	 case CKR_PIN_LOCKED:                       printf(" CKR_PIN_LOCKED");                       break;	 case CKR_SESSION_CLOSED:                   printf(" CKR_SESSION_CLOSED");                   break;	 case CKR_SESSION_COUNT:                    printf(" CKR_SESSION_COUNT");                    break;	 case CKR_SESSION_HANDLE_INVALID:           printf(" CKR_SESSION_HANDLE_INVALID");           break;	 case CKR_SESSION_PARALLEL_NOT_SUPPORTED:   printf(" CKR_SESSION_PARALLEL_NOT_SUPPORTED");   break;	 case CKR_SESSION_READ_ONLY:                printf(" CKR_SESSION_READ_ONLY");                break;	 case CKR_SESSION_EXISTS:                   printf(" CKR_SESSION_EXISTS");                   break;	 case CKR_SESSION_READ_ONLY_EXISTS:         printf(" CKR_SESSION_READ_ONLY_EXISTS");         break;	 case CKR_SESSION_READ_WRITE_SO_EXISTS:     printf(" CKR_SESSION_READ_WRITE_SO_EXISTS");     break;	 case CKR_SIGNATURE_INVALID:                printf(" CKR_SIGNATURE_INVALID");                break;	 case CKR_SIGNATURE_LEN_RANGE:              printf(" CKR_SIGNATURE_LEN_RANGE");              break;	 case CKR_TEMPLATE_INCOMPLETE:              printf(" CKR_TEMPLATE_INCOMPLETE");              break;	 case CKR_TEMPLATE_INCONSISTENT:            printf(" CKR_TEMPLATE_INCONSISTENT");            break;	 case CKR_TOKEN_NOT_PRESENT:                printf(" CKR_TOKEN_NOT_PRESENT");                break;	case CKR_TOKEN_NOT_RECOGNIZED:             printf(" CKR_TOKEN_NOT_RECOGNIZED");             break;	case CKR_TOKEN_WRITE_PROTECTED:            printf(" CKR_TOKEN_WRITE_PROTECTED");            break;	case CKR_UNWRAPPING_KEY_HANDLE_INVALID:    printf(" CKR_UNWRAPPING_KEY_HANDLE_INVALID");    break;	case CKR_UNWRAPPING_KEY_SIZE_RANGE:        printf(" CKR_UNWRAPPING_KEY_SIZE_RANGE");        break;	case CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT: printf(" CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT"); break;	case CKR_USER_ALREADY_LOGGED_IN:           printf(" CKR_USER_ALREADY_LOGGED_IN");           break;	case CKR_USER_NOT_LOGGED_IN:               printf(" CKR_USER_NOT_LOGGED_IN");               break;	case CKR_USER_PIN_NOT_INITIALIZED:         printf(" CKR_USER_PIN_NOT_INITIALIZED");         break;	case CKR_USER_TYPE_INVALID:                printf(" CKR_USER_TYPE_INVALID");                break;	case CKR_USER_ANOTHER_ALREADY_LOGGED_IN:   printf(" CKR_USER_ANOTHER_ALREADY_LOGGED_IN");   break;	case CKR_USER_TOO_MANY_TYPES:              printf(" CKR_USER_TOO_MANY_TYPES");              break;	case CKR_WRAPPED_KEY_INVALID:              printf(" CKR_WRAPPED_KEY_INVALID");              break;	case CKR_WRAPPED_KEY_LEN_RANGE:            printf(" CKR_WRAPPED_KEY_LEN_RANGE");            break;	case CKR_WRAPPING_KEY_HANDLE_INVALID:      printf(" CKR_WRAPPING_KEY_HANDLE_INVALID");      break;	case CKR_WRAPPING_KEY_SIZE_RANGE:          printf(" CKR_WRAPPING_KEY_SIZE_RANGE");          break;	case CKR_WRAPPING_KEY_TYPE_INCONSISTENT:   printf(" CKR_WRAPPING_KEY_TYPE_INCONSISTENT");   break;	case CKR_RANDOM_SEED_NOT_SUPPORTED:        printf(" CKR_RANDOM_SEED_NOT_SUPPORTED");        break;	case CKR_RANDOM_NO_RNG:                    printf(" CKR_RANDOM_NO_RNG");                    break;	case CKR_BUFFER_TOO_SMALL:                 printf(" CKR_BUFFER_TOO_SMALL");                 break;	case CKR_SAVED_STATE_INVALID:              printf(" CKR_SAVED_STATE_INVALID");              break;	case CKR_INFORMATION_SENSITIVE:            printf(" CKR_INFORMATION_SENSITIVE");            break;	case CKR_STATE_UNSAVEABLE:                 printf(" CKR_STATE_UNSAVEABLE");                 break;	case CKR_CRYPTOKI_NOT_INITIALIZED:         printf(" CKR_CRYPTOKI_NOT_INITIALIZED");         break;	case CKR_CRYPTOKI_ALREADY_INITIALIZED:     printf(" CKR_CRYPTOKI_ALREADY_INITIALIZED");     break;	case CKR_MUTEX_BAD:                        printf(" CKR_MUTEX_BAD");break;	case CKR_MUTEX_NOT_LOCKED:    printf(" CKR_MUTEX_NOT_LOCKED");break;	}}void oc_err_msg( char *file, int line, char *str, CK_RV rc ){	printf("%s:%d Error: %s returned:  %d ", file, line, str, rc );	process_ret_code( rc );	printf("\n\n");}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -