diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-03 22:36:04 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-06-03 22:36:04 +0300 |
commit | 1bd0b66128ab1b2b2cd6476fd378a6e304a769be (patch) | |
tree | 59c00603bbc4580df27c603a9ce2dc6ab4882def /test/aes256ofb_decrypt_block.c | |
parent | examples: no more FIPS-style one-line blocks (diff) | |
download | aes-tools-1bd0b66128ab1b2b2cd6476fd378a6e304a769be.tar.gz aes-tools-1bd0b66128ab1b2b2cd6476fd378a6e304a769be.zip |
add OFB mode
Diffstat (limited to '')
-rw-r--r-- | test/aes256ofb_decrypt_block.c | 56 |
1 files changed, 56 insertions, 0 deletions
diff --git a/test/aes256ofb_decrypt_block.c b/test/aes256ofb_decrypt_block.c new file mode 100644 index 0000000..45dcd7b --- /dev/null +++ b/test/aes256ofb_decrypt_block.c @@ -0,0 +1,56 @@ +/** + * \file + * \author Egor Tensin <Egor.Tensin@gmail.com> + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include <aesni/all.h> + +#include <stdio.h> +#include <stdlib.h> + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock256 key; + __declspec(align(16)) Aes256KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block256(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 256-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes256_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&cipher, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + plain = aes256cfb_decrypt(cipher, &key_schedule, iv); + iv = _mm_xor_si128(cipher, plain); + print_aes_block128(&plain); + } + + return 0; +} |