diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-03 21:32:49 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-03 21:32:49 +0300 |
commit | 1dd052e86fa45a215b68152977e0c7888eba9bf4 (patch) | |
tree | 3f1f65fe4daaf8a2d87791319579c4fb2fdbcf42 /test/aes192cfb_decrypt_block.c | |
parent | implement CBC wrappers in C (diff) | |
download | aes-tools-1dd052e86fa45a215b68152977e0c7888eba9bf4.tar.gz aes-tools-1dd052e86fa45a215b68152977e0c7888eba9bf4.zip |
add CFB mode
Diffstat (limited to 'test/aes192cfb_decrypt_block.c')
-rw-r--r-- | test/aes192cfb_decrypt_block.c | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/test/aes192cfb_decrypt_block.c b/test/aes192cfb_decrypt_block.c new file mode 100644 index 0000000..55db87e --- /dev/null +++ b/test/aes192cfb_decrypt_block.c @@ -0,0 +1,56 @@ +/** + * \file + * \author Egor Tensin <Egor.Tensin@gmail.com> + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include <aesni/all.h> + +#include <stdio.h> +#include <stdlib.h> + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock192 key; + __declspec(align(16)) Aes192KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block192(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 192-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes192_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&cipher, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + plain = aes192cfb_decrypt(cipher, &key_schedule, iv); + iv = cipher; + print_aes_block128(&plain); + } + + return 0; +} |