aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/test/aes256ctr_decrypt_block.c
diff options
context:
space:
mode:
authorEgor Tensin <Egor.Tensin@gmail.com>2015-06-04 03:18:34 +0300
committerEgor Tensin <Egor.Tensin@gmail.com>2015-06-04 03:18:34 +0300
commit21b736e980709dad61c1412e22ec26265bfe4f0e (patch)
tree0a29fafff6a9b6c5a31d39c39480dca5084bbcb0 /test/aes256ctr_decrypt_block.c
parentadd BE-to-LE conversion functions (diff)
downloadaes-tools-21b736e980709dad61c1412e22ec26265bfe4f0e.tar.gz
aes-tools-21b736e980709dad61c1412e22ec26265bfe4f0e.zip
add CTR mode
Diffstat (limited to '')
-rw-r--r--test/aes256ctr_decrypt_block.c55
1 files changed, 55 insertions, 0 deletions
diff --git a/test/aes256ctr_decrypt_block.c b/test/aes256ctr_decrypt_block.c
new file mode 100644
index 0000000..db7ae5c
--- /dev/null
+++ b/test/aes256ctr_decrypt_block.c
@@ -0,0 +1,55 @@
+/**
+ * \file
+ * \author Egor Tensin <Egor.Tensin@gmail.com>
+ * \date 2015
+ * \copyright This file is licensed under the terms of the MIT License.
+ * See LICENSE.txt for details.
+ */
+
+#include <aesni/all.h>
+
+#include <stdio.h>
+#include <stdlib.h>
+
+static void exit_with_usage(const char* argv0)
+{
+ printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0);
+ exit(EXIT_FAILURE);
+}
+
+int main(int argc, char** argv)
+{
+ __declspec(align(16)) AesBlock128 plain, cipher, iv;
+ __declspec(align(16)) AesBlock256 key;
+ __declspec(align(16)) Aes256KeySchedule key_schedule;
+
+ if (argc < 3)
+ exit_with_usage(argv[0]);
+
+ if (parse_aes_block256(&key, argv[1]) != 0)
+ {
+ fprintf(stderr, "Invalid 256-bit AES block '%s'\n", argv[1]);
+ exit_with_usage(argv[0]);
+ }
+
+ if (parse_aes_block128(&iv, argv[2]) != 0)
+ {
+ fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]);
+ exit_with_usage(argv[0]);
+ }
+
+ aes256_expand_key_schedule(&key, &key_schedule);
+
+ for (int i = 3; i < argc; ++i)
+ {
+ if (parse_aes_block128(&cipher, argv[i]) != 0)
+ {
+ fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]);
+ continue;
+ }
+ plain = aes256ctr_decrypt(cipher, &key_schedule, iv, i - 3);
+ print_aes_block128(&plain);
+ }
+
+ return 0;
+}