1*0Sstevel@tonic-gate /*
2*0Sstevel@tonic-gate * CDDL HEADER START
3*0Sstevel@tonic-gate *
4*0Sstevel@tonic-gate * The contents of this file are subject to the terms of the
5*0Sstevel@tonic-gate * Common Development and Distribution License, Version 1.0 only
6*0Sstevel@tonic-gate * (the "License"). You may not use this file except in compliance
7*0Sstevel@tonic-gate * with the License.
8*0Sstevel@tonic-gate *
9*0Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10*0Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
11*0Sstevel@tonic-gate * See the License for the specific language governing permissions
12*0Sstevel@tonic-gate * and limitations under the License.
13*0Sstevel@tonic-gate *
14*0Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
15*0Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16*0Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
17*0Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
18*0Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
19*0Sstevel@tonic-gate *
20*0Sstevel@tonic-gate * CDDL HEADER END
21*0Sstevel@tonic-gate */
22*0Sstevel@tonic-gate /*
23*0Sstevel@tonic-gate * Copyright 2002-2003 Sun Microsystems, Inc. All rights reserved.
24*0Sstevel@tonic-gate * Use is subject to license terms.
25*0Sstevel@tonic-gate */
26*0Sstevel@tonic-gate
27*0Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI"
28*0Sstevel@tonic-gate
29*0Sstevel@tonic-gate /*
30*0Sstevel@tonic-gate * AES tests as defined by FIPS 197.
31*0Sstevel@tonic-gate *
32*0Sstevel@tonic-gate * Encrypts plain text with the defined key and verifies that the result
33*0Sstevel@tonic-gate * is the expected cipher. Then decrypts the cipher and verifies that the
34*0Sstevel@tonic-gate * result is the original plain text. One test is run for each AES128,
35*0Sstevel@tonic-gate * AES192 and AES256.
36*0Sstevel@tonic-gate */
37*0Sstevel@tonic-gate
38*0Sstevel@tonic-gate #include <stdio.h>
39*0Sstevel@tonic-gate #include <strings.h>
40*0Sstevel@tonic-gate
41*0Sstevel@tonic-gate #include "aes.h"
42*0Sstevel@tonic-gate #include "cmn_test.h"
43*0Sstevel@tonic-gate #include "aes_test.h"
44*0Sstevel@tonic-gate
45*0Sstevel@tonic-gate typedef struct test_data {
46*0Sstevel@tonic-gate char key[AES_256_KEY_SIZE * 2];
47*0Sstevel@tonic-gate char plain[AES_BLOCK_SIZE * 2];
48*0Sstevel@tonic-gate char cipher[AES_BLOCK_SIZE * 2];
49*0Sstevel@tonic-gate uint32_t keysize;
50*0Sstevel@tonic-gate } test_data_t;
51*0Sstevel@tonic-gate
52*0Sstevel@tonic-gate static test_data_t td[] = {
53*0Sstevel@tonic-gate { "000102030405060708090a0b0c0d0e0f",
54*0Sstevel@tonic-gate "00112233445566778899aabbccddeeff",
55*0Sstevel@tonic-gate "69c4e0d86a7b0430d8cdb78070b4c55a", AES_128_KEY_SIZE },
56*0Sstevel@tonic-gate { "000102030405060708090a0b0c0d0e0f1011121314151617",
57*0Sstevel@tonic-gate "00112233445566778899aabbccddeeff",
58*0Sstevel@tonic-gate "dda97ca4864cdfe06eaf70a0ec0d7191", AES_192_KEY_SIZE },
59*0Sstevel@tonic-gate { "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f",
60*0Sstevel@tonic-gate "00112233445566778899aabbccddeeff",
61*0Sstevel@tonic-gate "8ea2b7ca516745bfeafc49904b496089", AES_256_KEY_SIZE }
62*0Sstevel@tonic-gate };
63*0Sstevel@tonic-gate
64*0Sstevel@tonic-gate int
aestest(void)65*0Sstevel@tonic-gate aestest(void)
66*0Sstevel@tonic-gate {
67*0Sstevel@tonic-gate void *ah;
68*0Sstevel@tonic-gate
69*0Sstevel@tonic-gate unsigned char key[AES_256_KEY_SIZE];
70*0Sstevel@tonic-gate unsigned char plain[AES_BLOCK_SIZE];
71*0Sstevel@tonic-gate unsigned char cipher[AES_BLOCK_SIZE];
72*0Sstevel@tonic-gate unsigned char work[AES_BLOCK_SIZE];
73*0Sstevel@tonic-gate
74*0Sstevel@tonic-gate int fail;
75*0Sstevel@tonic-gate int num;
76*0Sstevel@tonic-gate int i;
77*0Sstevel@tonic-gate
78*0Sstevel@tonic-gate if (aes_init(&ah) != 0) {
79*0Sstevel@tonic-gate (void) printf("Error initializing AES\n");
80*0Sstevel@tonic-gate return (-1);
81*0Sstevel@tonic-gate }
82*0Sstevel@tonic-gate
83*0Sstevel@tonic-gate num = sizeof (td) / sizeof (test_data_t);
84*0Sstevel@tonic-gate for (i = 0; i < num; i++) {
85*0Sstevel@tonic-gate fail = 0;
86*0Sstevel@tonic-gate
87*0Sstevel@tonic-gate (void) printf("Test #%d [AES%d] ", i, td[i].keysize * 8);
88*0Sstevel@tonic-gate getxdata(key, td[i].key, td[i].keysize);
89*0Sstevel@tonic-gate aes_key(ah, key, td[i].keysize);
90*0Sstevel@tonic-gate
91*0Sstevel@tonic-gate getxdata(plain, td[i].plain, AES_BLOCK_SIZE);
92*0Sstevel@tonic-gate
93*0Sstevel@tonic-gate getxdata(cipher, td[i].cipher, AES_BLOCK_SIZE);
94*0Sstevel@tonic-gate
95*0Sstevel@tonic-gate bcopy(plain, work, AES_BLOCK_SIZE);
96*0Sstevel@tonic-gate aes_encrypt(ah, work);
97*0Sstevel@tonic-gate
98*0Sstevel@tonic-gate if (bcmp(work, cipher, AES_BLOCK_SIZE) != 0) {
99*0Sstevel@tonic-gate (void) printf("FAILED [Encrypt]");
100*0Sstevel@tonic-gate fail++;
101*0Sstevel@tonic-gate }
102*0Sstevel@tonic-gate aes_decrypt(ah, work);
103*0Sstevel@tonic-gate if (bcmp(work, plain, AES_BLOCK_SIZE) != 0) {
104*0Sstevel@tonic-gate (void) printf("FAILED [Decrypt]");
105*0Sstevel@tonic-gate fail++;
106*0Sstevel@tonic-gate }
107*0Sstevel@tonic-gate if (fail == 0)
108*0Sstevel@tonic-gate (void) printf("PASSED");
109*0Sstevel@tonic-gate (void) printf("\n");
110*0Sstevel@tonic-gate }
111*0Sstevel@tonic-gate
112*0Sstevel@tonic-gate aes_fini(ah);
113*0Sstevel@tonic-gate
114*0Sstevel@tonic-gate return (fail);
115*0Sstevel@tonic-gate }
116