📄 aesgav.c
字号:
/*
---------------------------------------------------------------------------
Copyright (c) 1998-2006, Brian Gladman, Worcester, UK. All rights reserved.
LICENSE TERMS
The free distribution and use of this software in both source and binary
form is allowed (with or without changes) provided that:
1. distributions of this source code include the above copyright
notice, this list of conditions and the following disclaimer;
2. distributions in binary form include the above copyright
notice, this list of conditions and the following disclaimer
in the documentation and/or other associated materials;
3. the copyright holder's name is not used to endorse products
built using this software without specific written permission.
ALTERNATIVELY, provided that this notice is retained in full, this product
may be distributed under the terms of the GNU General Public License (GPL),
in which case the provisions of the GPL apply INSTEAD OF those given above.
DISCLAIMER
This software is provided 'as is' with no explicit or implied warranties
in respect of its properties, including, but not limited to, correctness
and/or fitness for purpose.
---------------------------------------------------------------------------
Issue 16/04/2007
*/
// AES Algorithm Test - Generate local test files for KAT and Monte Carlo
// tests and optionally compare these files with a reference set of test
// files
//
// usage: aes_gav /t:[knec] /b:[45678] /k:[45678] [/c]
//
// where:
//
// each of the symbols in square brakets can be used in any combination so
// that:
//
// /t:[knec] selects the tests to be used
// /b:[45678] selects the block lengths to be used (in 32-bit words)
// /k:[45678] selects the key lengths to be used (in 32-bit words)
// /c selects the comparison of output and reference file(s)
// and:
// k: generate ECB Known Answer Test files
// n: generate ECB Known Answer Test files (new)
// e: generate ECB Monte Carlo Test files
// c: generate CBC Monte Carlo Test files
//
// The reference files have a ".txt" extension while those generated use
// ".txt" if in a different directory or ".dat" otherwise. The directory
// paths for files are set below. Note that, when compared with the NIST
// test vector sequences, this code implements one additional (all zero)
// test vector as the first vector in each set (test 0).
#if defined( DLL_IMPORT ) && defined( DYNAMIC_LINK )
#include <windows.h>
#endif
#if defined( __cplusplus )
# include "aescpp.h"
#else
# include "aes.h"
#endif
#include "aesaux.h"
#include "aestst.h"
#if defined(USE_DLL)
fn_ptrs fn;
#endif
// Outputs a test vector file header
void header(FILE *outf, const int type, const unsigned long blen, const unsigned long klen)
{ char buf[32];
unsigned char dummy;
fprintf(outf, "==============================================");
fprintf(outf, "\nAuthor: Dr B R Gladman (brg@gladman.me.uk)");
fprintf(outf, "\nTest: %s", (type < 6 ? "ECB " : "CBC "));
switch(type)
{
case 0: fprintf(outf, "Variable Key Known Answer Tests"); break;
case 2: fprintf(outf, "Variable Key Known Answer Tests"); break;
case 1: fprintf(outf, "Variable Text Known Answer Tests"); break;
case 3: fprintf(outf, "Variable Text Known Answer Tests"); break;
case 4:
case 6: fprintf(outf, "Monte Carlo (Encryption) Tests"); break;
case 5:
case 7: fprintf(outf, "Monte Carlo (Decryption) Tests"); break;
}
fprintf(outf, "\nAlgorithm: Extended Rijndael (an AES Superset)\nFilename: %s",
file_name(buf, 32, type, blen, klen));
fprintf(outf, "\n==============================================\n");
block_out(block_len, &dummy, outf, 8 * blen);
block_out(key_len, &dummy, outf, 8 * klen);
fprintf(outf, "\n");
}
// Test of Electronic Code Book (ECB) mode with Fixed Key and Variable Text
void ecb_vt(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j;
unsigned char pt[32], ct[32], key[32], dummy;
block_clear(key, klen); // all zero key
block_out(key_val, key, outf, klen); // output key value
f_enc_key(alg, key, klen); // set key value
for(j = 0; j <= 8 * blen; ++j) // test vectors include
{ // an all zero one
block_out(test_no, &dummy, outf, j); // output test number
block_clear(pt, blen); // set all zero plain text
if(j) // set bit (j-1) if j <> 0
*(pt + (j - 1) / 8) = 0x80 >> (j - 1) % 8;
block_out(pt_val, pt, outf, blen); // output plaintext
do_enc(alg, pt , ct, 1); // do encryption
block_out(ct_val, ct, outf, blen); // output ciphertext
}
}
// Test of Electronic Code Book (ECB) mode with Fixed Text and Variable Key
void ecb_vk(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j;
unsigned char pt[32], ct[32], key[32], dummy;
block_clear(pt, blen); // all zero plaintext
block_out(pt_val, pt, outf, blen); // output plaintext
for(j = 0; j <= 8 * klen; ++j) // 129, 193 or 257 tests
{
block_out(test_no, &dummy, outf, j); // output test number
block_clear(key, klen); // set all zero key
if(j) // set bit (j-1) if j <> 0
*(key + (j - 1) / 8) = 0x80 >> (j - 1) % 8;
block_out(key_val, key, outf, klen); // output key value
f_enc_key(alg, key, klen); // set key value
do_enc(alg, pt , ct, 1); // alg.encrypt
block_out(ct_val, ct, outf, blen); // output ciphertext
}
}
// Test of Electronic Code Book (ECB) mode with Fixed Key and Variable Text
void ecb_vtn(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j;
unsigned char pt[32], ct[32], key[32], *bp, dummy;
block_clear(key, klen); // all zero key
block_out(key_val, key, outf, klen); // output key value
f_enc_key(alg, key, klen); // set key value
block_clear(pt, blen); // set all zero plain text
for(j = 0; j < 16 * blen; ++j)
{
block_out(test_no, &dummy, outf, j); // output test number
block_out(pt_val, pt, outf, blen); // output plaintext
do_enc(alg, pt , ct, 1); // do encryption
block_out(ct_val, ct, outf, blen); // output ciphertext
bp = pt + blen - 1 - j / 8;
if(j < 8 * blen)
*bp |= (*bp << 1) | 1;
else
*(bp + blen) = *(bp + blen) << 1;
}
}
// Test of Electronic Code Book (ECB) mode with Fixed Text and Variable Key
void ecb_vkn(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j;
unsigned char pt[32], ct[32], key[32], *bp, dummy;
block_clear(pt, blen); // all zero plaintext
block_out(pt_val, pt, outf, blen); // output plaintext
block_clear(key, klen);
for(j = 0; j < 16 * klen; ++j)
{
block_out(test_no, &dummy, outf, j); // output test number
block_out(key_val, key, outf, klen); // output key value
f_enc_key(alg, key, klen); // set key value
do_enc(alg, pt , ct, 1); // alg.encrypt
block_out(ct_val, ct, outf, blen); // output ciphertext
bp = key + klen - 1 - j / 8;
if(j < 8 * klen)
*bp |= (*bp << 1) | 1;
else
*(bp + klen) = *(bp + klen) << 1;
}
}
// Monte Carlo Encryption Test of Electronic Code Book (ECB) mode
void ecb_me(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j, k;
unsigned char pt[32], ct[64], key[32], dummy;
block_clear(pt, blen); // clear initial plaintext
block_clear(key, klen); // and key blocks
block_copy(ct + blen, pt, blen); // put plaintext in upper half
// of double length buffer
for(j = 0; j < 400; j++) // 400 Monte Carlo tests
{
block_out(test_no, &dummy, outf, j); // output test number
block_out(key_val, key, outf, klen); // output key
block_out(pt_val, pt, outf, blen); // output plaintext
f_enc_key(alg, key, klen); // set the key
for(k = 0; k < 5000; ++k) // 10000 encryptions alternating
{ // upper and lower blocks in ct
do_enc(alg, ct + blen, ct, 1);
do_enc(alg, ct, ct + blen, 1);
}
// compile next key as defined by NIST
block_xor(key, ct + 2 * blen - klen, klen);
block_out(ct_val, ct + blen, outf, blen); // output ciphertext
block_copy(pt, ct + blen, blen); // copy cipertext as next plaintext
}
}
// Monte Carlo Decryption Test of Electronic Code Book (ECB) mode
void ecb_md(FILE *outf, f_dctx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j, k;
unsigned char pt[32], ct[64], key[32], dummy;
block_clear(pt, blen); // clear initial plaintext and key
block_clear(key, klen);
block_copy(ct + blen, pt, blen); // copy plaintext into upper half
// of double length ciphertext block
for(j = 0; j < 400; j++) // 400 Monte Carlo tests
{
block_out(test_no, &dummy, outf, j); // output test number
block_out(key_val, key, outf, klen); // output key
block_out(ct_val, pt, outf, blen); // output plaintext
f_dec_key(alg, key, klen); // set key
for(k = 0; k < 5000; ++k) // 10000 decryptions alternating
{ // upper and lower blocks in ct
do_dec(alg, ct + blen, ct, 1);
do_dec(alg, ct, ct + blen, 1);
}
// compile next key as defined by NIST
block_xor(key, ct + 2 * blen - klen, klen);
block_out(pt_val, ct + blen, outf, blen); // output ciphertext
block_copy(pt, ct + blen, blen); // set ciphertext as next plaintext
}
}
// Monte Carlo Encryption Test of Cipher Block Chaining (CBC) mode
void cbc_me(FILE *outf, f_ectx alg[1], const unsigned long blen, const unsigned long klen)
{ unsigned long j, k;
unsigned char ct[64], key[32], dummy;
block_clear(key, klen); // clear key: KEY[0]
block_clear(ct, 2 * blen); // clear ct: PT[0], ct + blen: IV[0]
for(j = 0; j < 400; j++) // 400 Monte Carlo tests
{
block_out(test_no, &dummy, outf, j); // output test number
block_out(key_val, key, outf, klen); // output key
block_out(iv_val, ct + blen, outf, blen); // output initialisation vector
block_out(pt_val, ct, outf, blen); // output plaintext
f_enc_key(alg, key, klen); // set key
for(k = 0; k < 5000; ++k) // 10000 encryptions, two at a time
{
block_xor(ct, ct + blen, blen); // do CBC chaining
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -