summaryrefslogtreecommitdiffstats
path: root/openaes/test
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--openaes/test/test_encrypt.c229
-rw-r--r--openaes/test/test_keys.c248
-rw-r--r--openaes/test/test_performance.c200
-rw-r--r--openaes/test/vt_aes.c405
4 files changed, 1082 insertions, 0 deletions
diff --git a/openaes/test/test_encrypt.c b/openaes/test/test_encrypt.c
new file mode 100644
index 000000000..b229f2d38
--- /dev/null
+++ b/openaes/test/test_encrypt.c
@@ -0,0 +1,229 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#include "oaes_lib.h"
+
+void usage(const char * exe_name)
+{
+ if( NULL == exe_name )
+ return;
+
+ printf(
+ "Usage:\n"
+ "\t%s [-ecb] [-key < 128 | 192 | 256 >] <text>\n",
+ exe_name
+ );
+}
+
+int main(int argc, char** argv)
+{
+ size_t _i;
+ OAES_CTX * ctx = NULL;
+ uint8_t *_encbuf, *_decbuf;
+ size_t _encbuf_len, _decbuf_len, _buf_len;
+ char *_buf;
+ short _is_ecb = 0;
+ char * _text = NULL;
+ int _key_len = 128;
+
+ if( argc < 2 )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ for( _i = 1; _i < argc; _i++ )
+ {
+ int _found = 0;
+
+ if( 0 == strcmp( argv[_i], "-ecb" ) )
+ {
+ _found = 1;
+ _is_ecb = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-key" ) )
+ {
+ _found = 1;
+ _i++; // len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ _key_len = atoi( argv[_i] );
+ switch( _key_len )
+ {
+ case 128:
+ case 192:
+ case 256:
+ break;
+ default:
+ printf("Error: Invalid value [%d] specified for '-%s'.\n",
+ _key_len, "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ }
+
+ if( 0 == _found )
+ {
+ if( _text )
+ {
+ printf("Error: Invalid option '%s'.\n", argv[_i]);
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ else
+ {
+ _text = (char *) calloc(strlen( argv[_i] ) + 1, sizeof(char));
+ if( NULL == _text )
+ {
+ printf("Error: Failed to allocate memory.\n", argv[_i]);
+ return EXIT_FAILURE;
+ }
+ strcpy( _text, argv[_i] );
+ }
+ }
+ }
+
+ if( NULL == _text )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ oaes_sprintf( NULL, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ ctx = oaes_alloc();
+ if( NULL == ctx )
+ {
+ printf("Error: Failed to initialize OAES.\n");
+ free( _text );
+ return EXIT_FAILURE;
+ }
+ if( _is_ecb )
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) )
+ printf("Error: Failed to set OAES options.\n");
+ switch( _key_len )
+ {
+ case 128:
+ if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 192:
+ if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 256:
+ if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ default:
+ break;
+ }
+
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc( _encbuf_len, sizeof(uint8_t) );
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ free( _text );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, NULL, &_decbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _decbuf = (uint8_t *) calloc( _decbuf_len, sizeof(uint8_t) );
+ if( NULL == _decbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ free( _text );
+ free( _encbuf );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) )
+ printf("Error: Decryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_free( &ctx ) )
+ printf("Error: Failed to uninitialize OAES.\n");
+
+ oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** cyphertext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof( char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n\n" );
+ free( _buf );
+
+ free( _encbuf );
+ free( _decbuf );
+ free( _text );
+
+ return (EXIT_SUCCESS);
+}
diff --git a/openaes/test/test_keys.c b/openaes/test/test_keys.c
new file mode 100644
index 000000000..6a8d6256d
--- /dev/null
+++ b/openaes/test/test_keys.c
@@ -0,0 +1,248 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+
+#include "oaes_lib.h"
+
+/*
+ *
+ */
+int main(int argc, char** argv) {
+
+ OAES_CTX * ctx = NULL;
+ uint8_t * _buf;
+ size_t _data_len;
+ FILE * f = NULL;
+ OAES_RET _rc;
+
+ if( NULL == ( ctx = oaes_alloc() ) )
+ {
+ printf( "Error: Initialization failed.\n" );
+ return 1;
+ }
+
+ /* ************** Generate 128-bit key and export it **************
+ * ****************************************************************/
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_gen_128(ctx) ) )
+ {
+ printf( "Error: Failed to generate 128-bit key [%d].\n", _rc );
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, NULL, &_data_len) ) )
+ {
+ printf( "Error: Failed to retrieve key length [%d].\n", _rc );
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, _buf, &_data_len) ) )
+ {
+ printf("Error: Failed to export key [%d].\n", _rc);
+ free(_buf);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ f = fopen( "key_128", "wb" );
+ if( f )
+ {
+ fwrite(_buf, _data_len, sizeof(uint8_t), f);
+ fclose(f);
+ }
+ free(_buf);
+ }
+
+ /* ************** Generate 192-bit key and export it **************
+ * ****************************************************************/
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_gen_192(ctx) ) )
+ {
+ printf( "Error: Failed to generate 192-bit key [%d].\n", _rc );
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, NULL, &_data_len) ) )
+ {
+ printf( "Error: Failed to retrieve key length [%d].\n", _rc );
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, _buf, &_data_len) ) )
+ {
+ printf("Error: Failed to export key [%d].\n", _rc);
+ free(_buf);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ f = fopen("key_192", "wb");
+ if( f )
+ {
+ fwrite(_buf, _data_len, sizeof(uint8_t), f);
+ fclose(f);
+ }
+ free(_buf);
+ }
+
+ /* ************** Generate 256-bit key and export it **************
+ * ****************************************************************/
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_gen_256(ctx) ) )
+ {
+ printf("Error: Failed to generate 256-bit key [%d].\n", _rc);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, NULL, &_data_len) ) )
+ {
+ printf("Error: Failed to retrieve key length [%d].\n", _rc);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ if( OAES_RET_SUCCESS != ( _rc = oaes_key_export(ctx, _buf, &_data_len) ) )
+ {
+ printf("Error: Failed to export key [%d].\n", _rc);
+ free(_buf);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ f = fopen("key_256", "wb");
+ if( f )
+ {
+ fwrite(_buf, _data_len, sizeof(uint8_t), f);
+ fclose(f);
+ }
+ free(_buf);
+ }
+
+ /* ********************** Import 128-bit key **********************
+ * ****************************************************************/
+ f = fopen("key_128", "rb");
+ if( f )
+ {
+ fseek(f, 0L, SEEK_END);
+ _data_len = ftell(f);
+ fseek(f, 0L, SEEK_SET);
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ fread(_buf, _data_len, sizeof(uint8_t), f);
+
+ if( OAES_RET_SUCCESS !=
+ ( _rc = oaes_key_import(ctx, _buf, _data_len) ) )
+ {
+ printf( "Error: Failed to import key [%d].\n", _rc );
+ free(_buf);
+ fclose(f);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ free(_buf);
+ }
+ fclose(f);
+ }
+
+ /* ********************** Import 192-bit key **********************
+ * ****************************************************************/
+ f = fopen("key_192", "rb");
+ if( f )
+ {
+ fseek(f, 0L, SEEK_END);
+ _data_len = ftell(f);
+ fseek(f, 0L, SEEK_SET);
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ fread(_buf, _data_len, sizeof(uint8_t), f);
+
+ if( OAES_RET_SUCCESS !=
+ ( _rc = oaes_key_import(ctx, _buf, _data_len) ) )
+ {
+ printf("Error: Failed to import key [%d].\n", _rc);
+ free(_buf);
+ fclose(f);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ free(_buf);
+ }
+ fclose(f);
+ }
+
+ /* ********************** Import 256-bit key **********************
+ * ****************************************************************/
+ f = fopen("key_256", "rb");
+ if( f )
+ {
+ fseek(f, 0L, SEEK_END);
+ _data_len = ftell(f);
+ fseek(f, 0L, SEEK_SET);
+ _buf = (uint8_t *) calloc(_data_len, sizeof(uint8_t));
+ if( _buf )
+ {
+ fread(_buf, _data_len, sizeof(uint8_t), f);
+
+ if( OAES_RET_SUCCESS !=
+ ( _rc = oaes_key_import(ctx, _buf, _data_len) ) )
+ {
+ printf("Error: Failed to import key [%d].\n", _rc);
+ free(_buf);
+ fclose(f);
+ oaes_free(&ctx);
+ return 1;
+ }
+
+ free(_buf);
+ }
+ fclose(f);
+ }
+
+ oaes_free(&ctx);
+
+ return (EXIT_SUCCESS);
+}
diff --git a/openaes/test/test_performance.c b/openaes/test/test_performance.c
new file mode 100644
index 000000000..a005c58c4
--- /dev/null
+++ b/openaes/test/test_performance.c
@@ -0,0 +1,200 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <time.h>
+
+#include "oaes_lib.h"
+
+void usage(const char * exe_name)
+{
+ if( NULL == exe_name )
+ return;
+
+ printf(
+ "Usage:\n"
+ "\t%s [-ecb] [-key < 128 | 192 | 256 >] [-data <data_len>]\n",
+ exe_name
+ );
+}
+
+/*
+ *
+ */
+int main(int argc, char** argv) {
+
+ size_t _i, _j;
+ time_t _time_start, _time_end;
+ OAES_CTX * ctx = NULL;
+ uint8_t *_encbuf, *_decbuf;
+ size_t _encbuf_len, _decbuf_len;
+ uint8_t _buf[1024 * 1024];
+ short _is_ecb = 0;
+ int _key_len = 128;
+ size_t _data_len = 64;
+
+ for( _i = 1; _i < argc; _i++ )
+ {
+ int _found = 0;
+
+ if( 0 == strcmp( argv[_i], "-ecb" ) )
+ {
+ _found = 1;
+ _is_ecb = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-key" ) )
+ {
+ _found = 1;
+ _i++; // key_len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "key");
+ usage( argv[0] );
+ return 1;
+ }
+ _key_len = atoi( argv[_i] );
+ switch( _key_len )
+ {
+ case 128:
+ case 192:
+ case 256:
+ break;
+ default:
+ printf("Error: Invalid value [%d] specified for '-%s'.\n",
+ _key_len, "key");
+ usage( argv[0] );
+ return 1;
+ }
+ }
+
+ if( 0 == strcmp( argv[_i], "-data" ) )
+ {
+ _found = 1;
+ _i++; // data_len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "data");
+ usage( argv[0] );
+ return 1;
+ }
+ _data_len = atoi( argv[_i] );
+ }
+
+ if( 0 == _found )
+ {
+ printf("Error: Invalid option '%s'.\n", argv[_i]);
+ usage( argv[0] );
+ return 1;
+ }
+ }
+
+ // generate random test data
+ time( &_time_start );
+ srand( _time_start );
+ for( _i = 0; _i < 1024 * 1024; _i++ )
+ _buf[_i] = rand();
+
+ ctx = oaes_alloc();
+ if( NULL == ctx )
+ {
+ printf("Error: Failed to initialize OAES.\n");
+ return EXIT_FAILURE;
+ }
+ if( _is_ecb )
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) )
+ printf("Error: Failed to set OAES options.\n");
+ switch( _key_len )
+ {
+ case 128:
+ if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 192:
+ if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 256:
+ if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ default:
+ break;
+ }
+
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_buf, 1024 * 1024, NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc( _encbuf_len, sizeof( char ) );
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ return EXIT_FAILURE;
+ }
+
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, NULL, &_decbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _decbuf = (uint8_t *) calloc( _decbuf_len, sizeof( char ) );
+ if( NULL == _decbuf )
+ {
+ free( _encbuf );
+ printf( "Error: Failed to allocate memory.\n" );
+ return EXIT_FAILURE;
+ }
+
+ time( &_time_start );
+
+ for( _i = 0; _i < _data_len; _i++ )
+ {
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_buf, 1024 * 1024, _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) )
+ printf("Error: Decryption failed.\n");
+ }
+
+ time( &_time_end );
+ printf( "Test encrypt and decrypt:\n\ttime: %lld seconds\n\tdata: %ld MB"
+ "\n\tkey: %d bits\n\tmode: %s\n",
+ _time_end - _time_start, _data_len,
+ _key_len, _is_ecb? "EBC" : "CBC" );
+ free( _encbuf );
+ free( _decbuf );
+ if( OAES_RET_SUCCESS != oaes_free( &ctx ) )
+ printf("Error: Failed to uninitialize OAES.\n");
+
+ return (EXIT_SUCCESS);
+}
diff --git a/openaes/test/vt_aes.c b/openaes/test/vt_aes.c
new file mode 100644
index 000000000..1ba755e42
--- /dev/null
+++ b/openaes/test/vt_aes.c
@@ -0,0 +1,405 @@
+/*
+ * ---------------------------------------------------------------------------
+ * OpenAES License
+ * ---------------------------------------------------------------------------
+ * Copyright (c) 2012, Nabil S. Al Ramli, www.nalramli.com
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * - Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * - Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ * ---------------------------------------------------------------------------
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+
+#define OAES_DEBUG 1
+#include "oaes_lib.h"
+
+static int _is_step = 1;
+
+static int step_cb(
+ const uint8_t state[OAES_BLOCK_SIZE],
+ const char * step_name,
+ int step_count,
+ void * user_data )
+{
+ size_t _buf_len;
+ char * _buf;
+
+
+ if( NULL == state )
+ return 1;
+
+ oaes_sprintf( NULL, &_buf_len, state, OAES_BLOCK_SIZE );
+ _buf = (char *) calloc( _buf_len, sizeof( char ) );
+
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, state, OAES_BLOCK_SIZE );
+ printf( "round[%2d].%-7s --> %s", step_count, step_name, _buf );
+ free( _buf );
+ }
+
+ if( 1 == _is_step && '\n' != getchar( ) )
+ _is_step = 0;
+
+ return 0;
+}
+
+static int to_binary(uint8_t * buf, size_t * buf_len, const char * data)
+{
+ size_t _i, _buf_len_in;
+
+ if( NULL == buf_len )
+ return 1;
+
+ if( NULL == data )
+ return 1;
+
+ _buf_len_in = *buf_len;
+ *buf_len = strlen( data ) / 2;
+
+ if( NULL == buf )
+ return 0;
+
+ if( *buf_len > _buf_len_in )
+ return 1;
+
+ memset( buf, 0, strlen( data ) / 2 );
+
+ // lookup ascii table
+ for( _i = 0; _i < strlen( data ); _i++ )
+ {
+ // 0-9
+ if( data[_i] >= 0x30 && data[_i] <= 0x39 )
+ buf[_i / 2] += ( data[_i] - 0x30 ) << ( 4 * ( ( _i + 1 ) % 2 ) ) ;
+ // a-f
+ else if( data[_i] >= 0x41 && data[_i] <= 0x46 )
+ buf[_i / 2] += ( data[_i] - 0x37 ) << ( 4 * ( ( _i + 1 ) % 2 ) );
+ // A-F
+ else if( data[_i] >= 0x61 && data[_i] <= 0x66 )
+ buf[_i / 2] += ( data[_i] - 0x57 ) << ( 4 * ( ( _i + 1 ) % 2 ) );
+ // invalid character
+ else
+ return 1;
+ }
+
+ return 0;
+}
+
+static void usage(const char * exe_name)
+{
+ if( NULL == exe_name )
+ return;
+
+ printf(
+ "Usage:\n"
+ " %s [-step] [-ecb] [[-key < 128 | 192 | 256 | key_data >] [-bin] <text>\n",
+ exe_name
+ );
+}
+
+int main(int argc, char** argv)
+{
+ size_t _i;
+ OAES_CTX * ctx = NULL;
+ uint8_t *_encbuf, *_decbuf, *_key_data = NULL, *_bin_data = NULL;
+ size_t _encbuf_len, _decbuf_len, _buf_len;
+ size_t _key_data_len = 0, _bin_data_len = 0;
+ char *_buf;
+ short _is_ecb = 0, _is_bin = 0;
+ char * _text = NULL, * _key_text = NULL;
+ int _key_len = 128;
+
+ if( argc < 2 )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ for( _i = 1; _i < argc; _i++ )
+ {
+ int _found = 0;
+
+ if( 0 == strcmp( argv[_i], "-nostep" ) )
+ {
+ _found = 1;
+ _is_step = 0;
+ }
+
+ if( 0 == strcmp( argv[_i], "-ecb" ) )
+ {
+ _found = 1;
+ _is_ecb = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-bin" ) )
+ {
+ _found = 1;
+ _is_bin = 1;
+ }
+
+ if( 0 == strcmp( argv[_i], "-key" ) )
+ {
+ _found = 1;
+ _i++; // len
+ if( _i >= argc )
+ {
+ printf("Error: No value specified for '-%s'.\n",
+ "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ _key_len = atoi( argv[_i] );
+ switch( _key_len )
+ {
+ case 128:
+ case 192:
+ case 256:
+ break;
+ default:
+ _key_text = argv[_i];
+ if( to_binary( NULL, &_key_data_len, _key_text ) )
+ {
+ printf( "Error: Invalid value [%s] specified for '-%s'.\n",
+ argv[_i], "key" );
+ return EXIT_FAILURE;
+ }
+ switch( _key_data_len )
+ {
+ case 16:
+ case 24:
+ case 32:
+ break;
+ default:
+ printf("Error: key_data [%s] specified for '-%s' has an invalid "
+ "size.\n", argv[_i], "key");
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ }
+ }
+
+ if( 0 == _found )
+ {
+ if( _text )
+ {
+ printf("Error: Invalid option '%s'.\n", argv[_i]);
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+ else
+ {
+ _text = argv[_i];
+ if( _is_bin && to_binary( NULL, &_bin_data_len, _text ) )
+ {
+ printf( "Error: Invalid value [%s] specified for '-%s'.\n",
+ argv[_i], "bin" );
+ return EXIT_FAILURE;
+ }
+ }
+ }
+ }
+
+ if( NULL == _text )
+ {
+ usage( argv[0] );
+ return EXIT_FAILURE;
+ }
+
+ if( _is_step )
+ printf( "\nEnabling step mode, press Return to step.\n\n" );
+
+ if( _is_bin )
+ {
+ _bin_data = (uint8_t *) calloc(_bin_data_len, sizeof(uint8_t));
+ if( NULL == _bin_data )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ return EXIT_FAILURE;
+ }
+ if( to_binary( _bin_data, &_bin_data_len, _text ) )
+ {
+ printf( "Error: Could not load data [%s].\n", _text);
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ }
+ else
+ {
+ oaes_sprintf( NULL, &_buf_len, (const uint8_t *)_text, strlen(_text));
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len,
+ (const uint8_t *)_text, strlen( _text ) );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+ }
+
+ ctx = oaes_alloc();
+ if( NULL == ctx )
+ {
+ printf("Error: Failed to initialize OAES.\n");
+ if( _bin_data )
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_STEP_ON, step_cb ) )
+ printf("Error: Failed to set OAES options.\n");
+ if( _is_ecb )
+ if( OAES_RET_SUCCESS != oaes_set_option( ctx, OAES_OPTION_ECB, NULL ) )
+ printf("Error: Failed to set OAES options.\n");
+
+ if( _key_text )
+ {
+ _key_data = (uint8_t *) calloc(_key_data_len, sizeof(uint8_t));
+ if( NULL == _key_data )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _bin_data )
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ if( to_binary( _key_data, &_key_data_len, _key_text ) )
+ {
+ printf( "Error: Could not load key [%s].\n", _key_text);
+ free( _key_data );
+ return EXIT_FAILURE;
+ }
+ oaes_key_import_data( ctx, _key_data, _key_data_len );
+ }
+ else
+ switch( _key_len )
+ {
+ case 128:
+ if( OAES_RET_SUCCESS != oaes_key_gen_128(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 192:
+ if( OAES_RET_SUCCESS != oaes_key_gen_192(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ case 256:
+ if( OAES_RET_SUCCESS != oaes_key_gen_256(ctx) )
+ printf("Error: Failed to generate OAES %d bit key.\n", _key_len);
+ break;
+ default:
+ break;
+ }
+
+ if( _bin_data )
+ {
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ _bin_data, _bin_data_len, NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t));
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ free( _bin_data );
+ return EXIT_FAILURE;
+ }
+ printf( "\n" );
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ _bin_data, _bin_data_len, _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+ printf( "\n**********************\n\n" );
+ }
+ else
+ {
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), NULL, &_encbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _encbuf = (uint8_t *) calloc(_encbuf_len, sizeof(uint8_t));
+ if( NULL == _encbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ return EXIT_FAILURE;
+ }
+ printf( "\n" );
+ if( OAES_RET_SUCCESS != oaes_encrypt( ctx,
+ (const uint8_t *)_text, strlen( _text ), _encbuf, &_encbuf_len ) )
+ printf("Error: Encryption failed.\n");
+ printf( "\n**********************\n\n" );
+ }
+
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, NULL, &_decbuf_len ) )
+ printf("Error: Failed to retrieve required buffer size for encryption.\n");
+ _decbuf = (uint8_t *) calloc(_decbuf_len, sizeof(uint8_t));
+ if( NULL == _decbuf )
+ {
+ printf( "Error: Failed to allocate memory.\n" );
+ if( _key_data )
+ free( _key_data );
+ if( _bin_data )
+ free( _bin_data );
+ free( _encbuf );
+ return EXIT_FAILURE;
+ }
+ if( OAES_RET_SUCCESS != oaes_decrypt( ctx,
+ _encbuf, _encbuf_len, _decbuf, &_decbuf_len ) )
+ printf("Error: Decryption failed.\n");
+
+ if( OAES_RET_SUCCESS != oaes_free( &ctx ) )
+ printf("Error: Failed to uninitialize OAES.\n");
+
+ oaes_sprintf( NULL, &_buf_len, _encbuf, _encbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** cyphertext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _encbuf, _encbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n" );
+ free( _buf );
+
+ oaes_sprintf( NULL, &_buf_len, _decbuf, _decbuf_len );
+ _buf = (char *) calloc(_buf_len, sizeof(char));
+ printf( "\n***** plaintext *****\n" );
+ if( _buf )
+ {
+ oaes_sprintf( _buf, &_buf_len, _decbuf, _decbuf_len );
+ printf( "%s", _buf );
+ }
+ printf( "\n**********************\n\n" );
+ free( _buf );
+
+ free( _encbuf );
+ free( _decbuf );
+ if( _key_data )
+ free( _key_data );
+ if( _bin_data )
+ free( _bin_data );
+
+ return (EXIT_SUCCESS);
+}