From 21b736e980709dad61c1412e22ec26265bfe4f0e Mon Sep 17 00:00:00 2001 From: Egor Tensin Date: Thu, 4 Jun 2015 03:18:34 +0300 Subject: add CTR mode --- test/CMakeLists.txt | 3 +++ test/aes128ctr_decrypt_block.c | 54 +++++++++++++++++++++++++++++++++++++++++ test/aes128ctr_encrypt_block.c | 54 +++++++++++++++++++++++++++++++++++++++++ test/aes192ctr_decrypt_block.c | 55 ++++++++++++++++++++++++++++++++++++++++++ test/aes192ctr_encrypt_block.c | 55 ++++++++++++++++++++++++++++++++++++++++++ test/aes256ctr_decrypt_block.c | 55 ++++++++++++++++++++++++++++++++++++++++++ test/aes256ctr_encrypt_block.c | 55 ++++++++++++++++++++++++++++++++++++++++++ 7 files changed, 331 insertions(+) create mode 100644 test/aes128ctr_decrypt_block.c create mode 100644 test/aes128ctr_encrypt_block.c create mode 100644 test/aes192ctr_decrypt_block.c create mode 100644 test/aes192ctr_encrypt_block.c create mode 100644 test/aes256ctr_decrypt_block.c create mode 100644 test/aes256ctr_encrypt_block.c (limited to 'test') diff --git a/test/CMakeLists.txt b/test/CMakeLists.txt index 2057b8f..f4460f0 100644 --- a/test/CMakeLists.txt +++ b/test/CMakeLists.txt @@ -12,11 +12,14 @@ test(aes128ecb) test(aes128cbc) test(aes128cfb) test(aes128ofb) +test(aes128ctr) test(aes192ecb) test(aes192cbc) test(aes192cfb) test(aes192ofb) +test(aes192ctr) test(aes256ecb) test(aes256cbc) test(aes256cfb) test(aes256ofb) +test(aes256ctr) diff --git a/test/aes128ctr_decrypt_block.c b/test/aes128ctr_decrypt_block.c new file mode 100644 index 0000000..313e5d9 --- /dev/null +++ b/test/aes128ctr_decrypt_block.c @@ -0,0 +1,54 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, key, cipher, iv; + __declspec(align(16)) Aes128KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block128(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes128_expand_key_schedule(key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&cipher, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + plain = aes128ctr_decrypt(cipher, &key_schedule, iv, i - 3); + print_aes_block128(&plain); + } + + return 0; +} diff --git a/test/aes128ctr_encrypt_block.c b/test/aes128ctr_encrypt_block.c new file mode 100644 index 0000000..e5372c2 --- /dev/null +++ b/test/aes128ctr_encrypt_block.c @@ -0,0 +1,54 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [PLAIN...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, key, cipher, iv; + __declspec(align(16)) Aes128KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block128(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes128_expand_key_schedule(key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&plain, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + cipher = aes128ctr_encrypt(plain, &key_schedule, iv, i - 3); + print_aes_block128(&cipher); + } + + return 0; +} diff --git a/test/aes192ctr_decrypt_block.c b/test/aes192ctr_decrypt_block.c new file mode 100644 index 0000000..01258ea --- /dev/null +++ b/test/aes192ctr_decrypt_block.c @@ -0,0 +1,55 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock192 key; + __declspec(align(16)) Aes192KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block192(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 192-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes192_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&cipher, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + plain = aes192ctr_decrypt(cipher, &key_schedule, iv, i - 3); + print_aes_block128(&plain); + } + + return 0; +} diff --git a/test/aes192ctr_encrypt_block.c b/test/aes192ctr_encrypt_block.c new file mode 100644 index 0000000..9a29005 --- /dev/null +++ b/test/aes192ctr_encrypt_block.c @@ -0,0 +1,55 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [PLAIN...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock192 key; + __declspec(align(16)) Aes192KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block192(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 192-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes192_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&plain, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + cipher = aes192ctr_encrypt(plain, &key_schedule, iv, i - 3); + print_aes_block128(&cipher); + } + + return 0; +} diff --git a/test/aes256ctr_decrypt_block.c b/test/aes256ctr_decrypt_block.c new file mode 100644 index 0000000..db7ae5c --- /dev/null +++ b/test/aes256ctr_decrypt_block.c @@ -0,0 +1,55 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [CIPHER...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock256 key; + __declspec(align(16)) Aes256KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block256(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 256-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes256_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&cipher, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + plain = aes256ctr_decrypt(cipher, &key_schedule, iv, i - 3); + print_aes_block128(&plain); + } + + return 0; +} diff --git a/test/aes256ctr_encrypt_block.c b/test/aes256ctr_encrypt_block.c new file mode 100644 index 0000000..d812a86 --- /dev/null +++ b/test/aes256ctr_encrypt_block.c @@ -0,0 +1,55 @@ +/** + * \file + * \author Egor Tensin + * \date 2015 + * \copyright This file is licensed under the terms of the MIT License. + * See LICENSE.txt for details. + */ + +#include + +#include +#include + +static void exit_with_usage(const char* argv0) +{ + printf("Usage: %s KEY INIT_VECTOR [PLAIN...]\n", argv0); + exit(EXIT_FAILURE); +} + +int main(int argc, char** argv) +{ + __declspec(align(16)) AesBlock128 plain, cipher, iv; + __declspec(align(16)) AesBlock256 key; + __declspec(align(16)) Aes256KeySchedule key_schedule; + + if (argc < 3) + exit_with_usage(argv[0]); + + if (parse_aes_block256(&key, argv[1]) != 0) + { + fprintf(stderr, "Invalid 256-bit AES block '%s'\n", argv[1]); + exit_with_usage(argv[0]); + } + + if (parse_aes_block128(&iv, argv[2]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[2]); + exit_with_usage(argv[0]); + } + + aes256_expand_key_schedule(&key, &key_schedule); + + for (int i = 3; i < argc; ++i) + { + if (parse_aes_block128(&plain, argv[i]) != 0) + { + fprintf(stderr, "Invalid 128-bit AES block '%s'\n", argv[i]); + continue; + } + cipher = aes256ctr_encrypt(plain, &key_schedule, iv, i - 3); + print_aes_block128(&cipher); + } + + return 0; +} -- cgit v1.2.3