1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194
|
/* This program is released under the Common Public License V1.0
*
* You should have received a copy of Common Public License V1.0 along with
* with this program.
*/
/* Copyright IBM Corp. 2010, 2011 */
#include <fcntl.h>
#include <sys/errno.h>
#include <stdio.h>
#include <string.h>
#include <strings.h>
#include <stdlib.h>
#include "ica_api.h"
#include "testcase.h"
#define NR_RANDOM_TESTS 1000
void dump_ctr_data(unsigned char *iv, unsigned int iv_length,
unsigned char *key, unsigned int key_length,
unsigned char *input_data, unsigned int data_length,
unsigned char *output_data)
{
VV_(printf("IV \n"));
dump_array(iv, iv_length);
VV_(printf("Key \n"));
dump_array(key, key_length);
VV_(printf("Input Data\n"));
dump_array(input_data, data_length);
VV_(printf("Output Data\n"));
dump_array(output_data, data_length);
}
int random_des_ctr(int iteration, unsigned int data_length, unsigned int iv_length)
{
unsigned int key_length = sizeof(ica_des_key_single_t);
if (data_length % sizeof(ica_des_vector_t))
iv_length = sizeof(ica_des_vector_t);
unsigned char iv[iv_length];
unsigned char tmp_iv[iv_length];
unsigned char key[key_length];
unsigned char input_data[data_length];
unsigned char encrypt[data_length];
unsigned char decrypt[data_length];
int rc = 0;
VV_(printf("Test Parameters for iteration = %i\n", iteration));
VV_(printf("key length = %i, data length = %i, iv length = %i\n",
key_length, data_length, iv_length));
rc = ica_random_number_generate(data_length, input_data);
if (rc) {
VV_(printf("random number generate returned rc = %i, errno = %i\n", rc, errno));
return TEST_FAIL;
}
rc = ica_random_number_generate(iv_length, iv);
if (rc) {
VV_(printf("random number generate returned rc = %i, errno = %i\n", rc, errno));
return TEST_FAIL;
}
rc = ica_random_number_generate(key_length, key);
if (rc) {
VV_(printf("random number generate returned rc = %i, errno = %i\n", rc, errno));
return TEST_FAIL;
}
memcpy(tmp_iv, iv, iv_length);
rc = ica_des_ctr(input_data, encrypt, data_length, key, tmp_iv,
32,1);
if (rc) {
VV_(printf("ica_des_ctr encrypt failed with rc = %i\n", rc));
dump_ctr_data(iv, iv_length, key, key_length, input_data,
data_length, encrypt);
return TEST_FAIL;
}
if (!rc) {
VV_(printf("Encrypt:\n"));
dump_ctr_data(iv, iv_length, key, key_length, input_data,
data_length, encrypt);
}
memcpy(tmp_iv, iv, iv_length);
rc = ica_des_ctr(encrypt, decrypt, data_length, key, tmp_iv,
32, 0);
if (rc) {
VV_(printf("ica_des_ctr decrypt failed with rc = %i\n", rc));
dump_ctr_data(iv, iv_length, key, key_length, encrypt,
data_length, decrypt);
return TEST_FAIL;
}
if (!rc) {
VV_(printf("Decrypt:\n"));
dump_ctr_data(iv, iv_length, key, key_length, encrypt,
data_length, decrypt);
}
if (memcmp(decrypt, input_data, data_length)) {
VV_(printf("Decryption Result does not match the original data!\n"));
VV_(printf("Original data:\n"));
dump_array(input_data, data_length);
VV_(printf("Decryption Result:\n"));
dump_array(decrypt, data_length);
rc++;
}
if (rc)
return TEST_FAIL;
return TEST_SUCC;
}
int main(int argc, char **argv)
{
#ifdef NO_CPACF
UNUSED(argc);
UNUSED(argv);
printf("Skipping DES-CTR test, because CPACF support disabled via config option.\n");
return TEST_SKIP;
#else
int rc = 0;
int error_count = 0;
int i = 0;
unsigned int endless = 0;
unsigned int rdata;
unsigned int data_length = 1;
unsigned int iv_length = sizeof(ica_des_key_single_t);
#ifdef ICA_FIPS
if (ica_fips_status() & ICA_FIPS_MODE) {
printf("All DES-CTR tests skipped."
" (DES not FIPS approved)\n");
return TEST_SKIP;
}
#endif /* ICA_FIPS */
if (argc > 1) {
if (strstr(argv[1], "endless"))
endless = 1;
}
set_verbosity(argc, argv);
if (endless) {
while (1) {
VV_(printf("i = %i\n", i));
rc = random_des_ctr(i, 320, 320);
if (rc) {
V_(printf("kat_des_ctr failed with rc = %i\n", rc));
return TEST_FAIL;
}
i++;
}
} else {
for (i = 1; i < NR_RANDOM_TESTS; i++) {
rc = random_des_ctr(i, data_length, iv_length);
if (rc) {
V_(printf("random_des_ctr failed with rc = %i\n", rc));
error_count++;
}
if (!(data_length % sizeof(ica_des_key_single_t))) {
/* Always when the full block size is reached use a
* counter with the same size as the data */
rc = random_des_ctr(i, data_length, data_length);
if (rc) {
V_(printf("random_des_ctr failed with rc = %i\n", rc));
error_count++;
}
}
// add a value between 1 and 8 to data_length
if (ica_random_number_generate(sizeof(rdata), (unsigned char*) &rdata)) {
printf("ica_random_number_generate failed with errnor = %i\n",
errno);
return TEST_FAIL;
}
data_length += (rdata % 8) + 1;
}
}
if (error_count) {
printf("%i DES-CTR tests failed.\n", error_count);
return TEST_FAIL;
}
printf("All DES-CTR tests passed.\n");
return TEST_SUCC;
#endif /* NO_CPACF */
}
|