summaryrefslogtreecommitdiffstats
path: root/openaes/test/test_encrypt.c
diff options
context:
space:
mode:
authorDees_Troy <dees_troy@teamw.in>2013-05-04 14:39:56 +0200
committerDees_Troy <dees_troy@yahoo.com>2013-06-22 23:16:55 +0200
commit83bd483f3db1df4b69c1612030e1a1be05b303ad (patch)
treed5c7b468b831244bfcd90aadda98b9d359d0d280 /openaes/test/test_encrypt.c
parentFix building of updater binary (diff)
downloadandroid_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.gz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.bz2
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.lz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.xz
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.tar.zst
android_bootable_recovery-83bd483f3db1df4b69c1612030e1a1be05b303ad.zip
Diffstat (limited to 'openaes/test/test_encrypt.c')
-rw-r--r--openaes/test/test_encrypt.c229
1 files changed, 229 insertions, 0 deletions
diff --git a/openaes/test/test_encrypt.c b/openaes/test/test_encrypt.c
new file mode 100644
index 000000000..b229f2d38
--- /dev/null
+++ b/openaes/test/test_encrypt.c
@@ -0,0 +1,229 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#include "oaes_lib.h"
+
+void usage(const char * exe_name)
+{
+ if( NULL == exe_name )
+ return;
+
+ printf(
+ "Usage:\n"
+ "\t%s [-ecb] [-key < 128 | 192 | 256 >] <text>\n",
+ exe_name
+ );
+}
+
+int main(int argc, char** argv)
+{
+ size_t _i;
+ OAES_CTX * ctx = NULL;
+ uint8_t *_encbuf, *_decbuf;
+ size_t _encbuf_len, _decbuf_len, _buf_len;
+ char *_buf;
+ short _is_ecb = 0;
+ char * _text = NULL;
+ int _key_len = 128;
+
+ if( argc < 2 )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ for( _i = 1; _i < argc; _i++ )
+ {
+ int _found = 0;
+
+ if( 0 == strcmp( argv[_i], "-ecb" ) )
+ {
+ _found = 1;
+ _is_ecb = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-key" ) )
+ {
+ _found = 1;
+ _i++; // len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ _key_len = atoi( argv[_i] );
+ switch( _key_len )
+ {
+ case 128:
+ case 192:
+ case 256:
+ break;
+ default:
+ printf("Error: Invalid value [%d] specified for '-%s'.\n",
+ _key_len, "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ }
+
+ if( 0 == _found )
+ {
+ if( _text )
+ {
+ printf("Error: Invalid option '%s'.\n", argv[_i]);
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ else
+ {
+ _text = (char *) calloc(strlen( argv[_i] ) + 1, sizeof(char));
+ if( NULL == _text )
+ {
+ printf("Error: Failed to allocate memory.\n", argv[_i]);
+ return EXIT_FAILURE;
+ }
+ strcpy( _text, argv[_i] );
+ }
+ }
+ }
+
+ if( NULL == _text )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ oaes_sprintf( NULL, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ ctx = oaes_alloc();
+ if( NULL == ctx )
+ {
+ printf("Error: Failed to initialize OAES.\n");
+ free( _text );
+ return EXIT_FAILURE;
+ }
+ if( _is_ecb )
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) )
+ printf("Error: Failed to set OAES options.\n");
+ switch( _key_len )
+ {
+ case 128:
+ if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 192:
+ if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 256:
+ if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ default:
+ break;
+ }
+
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc( _encbuf_len, sizeof(uint8_t) );
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ free( _text );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, NULL, &_decbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _decbuf = (uint8_t *) calloc( _decbuf_len, sizeof(uint8_t) );
+ if( NULL == _decbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ free( _text );
+ free( _encbuf );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) )
+ printf("Error: Decryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_free( &ctx ) )
+ printf("Error: Failed to uninitialize OAES.\n");
+
+ oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** cyphertext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof( char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n\n" );
+ free( _buf );
+
+ free( _encbuf );
+ free( _decbuf );
+ free( _text );
+
+ return (EXIT_SUCCESS);
+}