1 /* $NetBSD: h_aescbc.c,v 1.1 2017/04/17 03:59:37 knakahara Exp $ */
2
3 /*-
4 * Copyright (c) 2017 Internet Initiative Japan Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 #include <err.h>
30 #include <fcntl.h>
31 #include <stdio.h>
32 #include <string.h>
33 #include <unistd.h>
34
35 #include <sys/ioctl.h>
36 #include <sys/time.h>
37
38 #include <crypto/cryptodev.h>
39
40 /*
41 * Test vectors from RFC 3602
42 */
43
44 const struct {
45 size_t len;
46 size_t key_len;
47 unsigned char key[16];
48 unsigned char iv[16];
49 unsigned char plaintx[64];
50 unsigned char ciphertx[64];
51 } tests[] = {
52 /* Case #1: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key */
53 { 16, 16,
54 { 0x06, 0xa9, 0x21, 0x40, 0x36, 0xb8, 0xa1, 0x5b,
55 0x51, 0x2e, 0x03, 0xd5, 0x34, 0x12, 0x00, 0x06, },
56 { 0x3d, 0xaf, 0xba, 0x42, 0x9d, 0x9e, 0xb4, 0x30,
57 0xb4, 0x22, 0xda, 0x80, 0x2c, 0x9f, 0xac, 0x41, },
58 "Single block msg",
59 { 0xe3, 0x53, 0x77, 0x9c, 0x10, 0x79, 0xae, 0xb8,
60 0x27, 0x08, 0x94, 0x2d, 0xbe, 0x77, 0x18, 0x1a, },
61 },
62
63 /* Case #2: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key */
64 { 32, 16,
65 { 0xc2, 0x86, 0x69, 0x6d, 0x88, 0x7c, 0x9a, 0xa0,
66 0x61, 0x1b, 0xbb, 0x3e, 0x20, 0x25, 0xa4, 0x5a, },
67 { 0x56, 0x2e, 0x17, 0x99, 0x6d, 0x09, 0x3d, 0x28,
68 0xdd, 0xb3, 0xba, 0x69, 0x5a, 0x2e, 0x6f, 0x58, },
69 { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
70 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
71 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
72 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, },
73 { 0xd2, 0x96, 0xcd, 0x94, 0xc2, 0xcc, 0xcf, 0x8a,
74 0x3a, 0x86, 0x30, 0x28, 0xb5, 0xe1, 0xdc, 0x0a,
75 0x75, 0x86, 0x60, 0x2d, 0x25, 0x3c, 0xff, 0xf9,
76 0x1b, 0x82, 0x66, 0xbe, 0xa6, 0xd6, 0x1a, 0xb1, },
77 },
78
79 /* Case #3: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key */
80 { 48, 16,
81 { 0x6c, 0x3e, 0xa0, 0x47, 0x76, 0x30, 0xce, 0x21,
82 0xa2, 0xce, 0x33, 0x4a, 0xa7, 0x46, 0xc2, 0xcd, },
83 { 0xc7, 0x82, 0xdc, 0x4c, 0x09, 0x8c, 0x66, 0xcb,
84 0xd9, 0xcd, 0x27, 0xd8, 0x25, 0x68, 0x2c, 0x81, },
85 "This is a 48-byte message (exactly 3 AES blocks)",
86 { 0xd0, 0xa0, 0x2b, 0x38, 0x36, 0x45, 0x17, 0x53,
87 0xd4, 0x93, 0x66, 0x5d, 0x33, 0xf0, 0xe8, 0x86,
88 0x2d, 0xea, 0x54, 0xcd, 0xb2, 0x93, 0xab, 0xc7,
89 0x50, 0x69, 0x39, 0x27, 0x67, 0x72, 0xf8, 0xd5,
90 0x02, 0x1c, 0x19, 0x21, 0x6b, 0xad, 0x52, 0x5c,
91 0x85, 0x79, 0x69, 0x5d, 0x83, 0xba, 0x26, 0x84, },
92 },
93
94 /* Case #4: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key */
95 { 64, 16,
96 { 0x56, 0xe4, 0x7a, 0x38, 0xc5, 0x59, 0x89, 0x74,
97 0xbc, 0x46, 0x90, 0x3d, 0xba, 0x29, 0x03, 0x49, },
98 { 0x8c, 0xe8, 0x2e, 0xef, 0xbe, 0xa0, 0xda, 0x3c,
99 0x44, 0x69, 0x9e, 0xd7, 0xdb, 0x51, 0xb7, 0xd9, },
100 { 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7,
101 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf,
102 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7,
103 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
104 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7,
105 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
106 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
107 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf, },
108 { 0xc3, 0x0e, 0x32, 0xff, 0xed, 0xc0, 0x77, 0x4e,
109 0x6a, 0xff, 0x6a, 0xf0, 0x86, 0x9f, 0x71, 0xaa,
110 0x0f, 0x3a, 0xf0, 0x7a, 0x9a, 0x31, 0xa9, 0xc6,
111 0x84, 0xdb, 0x20, 0x7e, 0xb0, 0xef, 0x8e, 0x4e,
112 0x35, 0x90, 0x7a, 0xa6, 0x32, 0xc3, 0xff, 0xdf,
113 0x86, 0x8b, 0xb7, 0xb2, 0x9d, 0x3d, 0x46, 0xad,
114 0x83, 0xce, 0x9f, 0x9a, 0x10, 0x2e, 0xe9, 0x9d,
115 0x49, 0xa5, 0x3e, 0x87, 0xf4, 0xc3, 0xda, 0x55,
116 },
117 },
118 };
119
120 int
main(void)121 main(void)
122 {
123 int fd, res;
124 size_t i;
125 struct session_op cs;
126 struct crypt_op co;
127 unsigned char buf[64];
128
129 for (i = 0; i < __arraycount(tests); i++) {
130 fd = open("/dev/crypto", O_RDWR, 0);
131 if (fd < 0)
132 err(1, "open %zu", i);
133 memset(&cs, 0, sizeof(cs));
134 cs.cipher = CRYPTO_AES_CBC;
135 cs.keylen = tests[i].key_len;
136 cs.key = __UNCONST(&tests[i].key);
137 res = ioctl(fd, CIOCGSESSION, &cs);
138 if (res < 0)
139 err(1, "CIOCGSESSION %zu", i);
140
141 memset(&co, 0, sizeof(co));
142 co.ses = cs.ses;
143 co.op = COP_ENCRYPT;
144 co.len = tests[i].len;
145 co.src = __UNCONST(&tests[i].plaintx);
146 co.dst = buf;
147 co.dst_len = sizeof(buf);
148 co.iv = __UNCONST(&tests[i].iv);
149 res = ioctl(fd, CIOCCRYPT, &co);
150 if (res < 0)
151 err(1, "CIOCCRYPT %zu", i);
152
153 if (memcmp(co.dst, tests[i].ciphertx, tests[i].len)) {
154 size_t j;
155 for (j = 0; j < tests[i].len; j++)
156 printf("0x%2zu: 0x%2x 0x%2x\n", j,
157 buf[j], tests[i].ciphertx[j]);
158 errx(1, "verification failed %zu", i);
159 }
160 close(fd);
161 }
162 return 0;
163 }
164