231 lines
6.5 KiB
C
231 lines
6.5 KiB
C
/* Copyright (c) (2016,2017,2019) Apple Inc. All rights reserved.
|
||
*
|
||
* corecrypto is licensed under Apple Inc.’s Internal Use License Agreement (which
|
||
* is contained in the License.txt file distributed with corecrypto) and only to
|
||
* people who accept that license. IMPORTANT: Any license rights granted to you by
|
||
* Apple Inc. (if any) are limited to internal use within your organization only on
|
||
* devices and computers you own or control, for the sole purpose of verifying the
|
||
* security characteristics and correct functioning of the Apple Software. You may
|
||
* not, directly or indirectly, redistribute the Apple Software or any portions thereof.
|
||
*/
|
||
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h>
|
||
#include <zlib.h>
|
||
#include <corecrypto/ccaes.h>
|
||
#include "thermalCrypto.h"
|
||
#include <Accelerate/ClockServices.h>
|
||
|
||
// extern void ccdigest_update(const struct ccdigest_info *di, ccdigest_ctx_t ctx, size_t len, const char *data);
|
||
|
||
typedef struct
|
||
{
|
||
const struct ccmode_cbc *cbc;
|
||
void *key;
|
||
void *iv;
|
||
size_t nblocks;
|
||
char *dataIn;
|
||
char *dataOut;
|
||
} Parameters;
|
||
|
||
void BlockCBC(Parameters *parameters);
|
||
|
||
// this templtae works for both encrypt and decrypt
|
||
void BlockCBC(Parameters *parameters)
|
||
{
|
||
cccbc_update(parameters->cbc, (cccbc_ctx *) parameters->key, (cccbc_iv *) parameters->iv, parameters->nblocks, parameters->dataIn, (void*) parameters->dataOut);
|
||
}
|
||
|
||
|
||
static void Driver(unsigned int iterations, void *parameters)
|
||
{
|
||
uint8_t tmp_iv[16];
|
||
Parameters *p = (Parameters *) parameters;
|
||
memcpy(tmp_iv, p->iv, 16);
|
||
while (iterations--) {
|
||
memcpy(p->iv, tmp_iv, 16);
|
||
BlockCBC(p);
|
||
}
|
||
}
|
||
|
||
extern uint32_t single_test;
|
||
|
||
void thermalAES_CBC(uint32_t ITERATIONS, uint32_t data_size)
|
||
{
|
||
|
||
|
||
char *dataIn, *dataEncrypted, *dataDecrypted;
|
||
uint32_t i;
|
||
double TotalETime = 0;
|
||
double TotalDTime = 0;
|
||
uint32_t NUM_BLOCKS = data_size/16;
|
||
if ((NUM_BLOCKS*16)!=data_size) {
|
||
data_size = 16*NUM_BLOCKS;
|
||
fprintf(stderr,"warning : adjusted data_size to %d\n", data_size);
|
||
}
|
||
|
||
const struct ccmode_cbc *encrypt = ccaes_cbc_encrypt_mode();
|
||
const struct ccmode_cbc *decrypt = ccaes_cbc_decrypt_mode();
|
||
unsigned int keyLen=16;
|
||
uint8_t gkey[32];
|
||
|
||
if (!single_test)
|
||
for (i=0;i<32;i++) gkey[i] = (uint8_t)arc4random();
|
||
|
||
cccbc_ctx_decl(encrypt->size, ekey);
|
||
cccbc_iv_decl(encrypt->block_size, eiv);
|
||
cccbc_init(encrypt, ekey, keyLen, (const uint8_t *) gkey);
|
||
cccbc_set_iv(encrypt, eiv, NULL);
|
||
|
||
cccbc_ctx_decl(decrypt->size, dkey);
|
||
cccbc_iv_decl(decrypt->block_size, div);
|
||
cccbc_init(decrypt, dkey, keyLen, (const uint8_t *) gkey);
|
||
cccbc_set_iv(decrypt, div, NULL);
|
||
|
||
|
||
if (!(dataIn = calloc(data_size, 1))) {
|
||
fprintf(stderr,"error : calloc dataIn %d \n", data_size);
|
||
exit(1);
|
||
}
|
||
if (!(dataEncrypted = calloc(data_size, 1))) {
|
||
fprintf(stderr,"error : calloc dataEncrypted %d \n", data_size);
|
||
exit(1);
|
||
}
|
||
if (!(dataDecrypted = calloc(data_size, 1))) {
|
||
fprintf(stderr,"error : calloc dataDecrypted %d \n", data_size);
|
||
exit(1);
|
||
}
|
||
|
||
if (!single_test) {
|
||
for (i=0;i<data_size;i++) {
|
||
dataIn[i] = (char)arc4random();
|
||
dataEncrypted[i] = dataDecrypted[i] = 0;
|
||
}
|
||
|
||
// Encrypted
|
||
{
|
||
Parameters parameters =
|
||
{
|
||
.cbc = encrypt,
|
||
.key = ekey,
|
||
.iv = eiv,
|
||
.nblocks = data_size/16,
|
||
.dataIn = dataIn,
|
||
.dataOut = dataEncrypted,
|
||
};
|
||
TotalETime += MeasureNetTimeInCPUCycles(Driver, ITERATIONS, ¶meters, 1);
|
||
|
||
}
|
||
}
|
||
|
||
// Decrypted
|
||
{
|
||
Parameters parameters =
|
||
{
|
||
.cbc = decrypt,
|
||
.key = dkey,
|
||
.iv = div,
|
||
.nblocks = data_size/16,
|
||
.dataIn = dataEncrypted,
|
||
.dataOut = dataDecrypted,
|
||
};
|
||
TotalDTime += MeasureNetTimeInCPUCycles(Driver, ITERATIONS, ¶meters, 1);
|
||
|
||
}
|
||
|
||
if (!single_test) {
|
||
for (i=16;i<data_size;i++) if (dataIn[i]!=dataDecrypted[i]) {
|
||
fprintf(stderr,"error at i = %d, %6d %6d %6d\n", i, dataIn[i], dataEncrypted[i], dataDecrypted[i]);
|
||
break;
|
||
}
|
||
}
|
||
|
||
printf(" aes-cbc : %.2f/%.2f\n", (TotalETime/data_size),(TotalDTime/data_size));
|
||
|
||
|
||
free(dataIn);
|
||
free(dataEncrypted);
|
||
free(dataDecrypted);
|
||
|
||
}
|
||
|
||
|
||
|
||
|
||
/*
|
||
function that tests corner cases (various number of input blocks) with known constants in the key and data
|
||
*/
|
||
#define Dsize 4096
|
||
#define nBlocks (Dsize/16)
|
||
|
||
uint32_t validate_cbc_checksum[] = { 0x613a6baa, 0x19240197, 0x2b175e41 };
|
||
|
||
void validateAES_CBC(void);
|
||
|
||
void validateAES_CBC(void)
|
||
{
|
||
|
||
|
||
unsigned char dataIn[Dsize], dataEncrypted[Dsize], dataDecrypted[Dsize];
|
||
size_t i, j;
|
||
|
||
const struct ccmode_cbc *encrypt = ccaes_cbc_encrypt_mode();
|
||
const struct ccmode_cbc *decrypt = ccaes_cbc_decrypt_mode();
|
||
cccbc_ctx_decl(encrypt->size, ekey);
|
||
cccbc_iv_decl(encrypt->block_size, eiv);
|
||
|
||
cccbc_ctx_decl(decrypt->size, dkey);
|
||
cccbc_iv_decl(decrypt->block_size, div);
|
||
|
||
unsigned int keyLen;
|
||
uint8_t gkey[32];
|
||
for (i=0;i<32;i++) gkey[i] = (uint8_t)i;
|
||
for (i=0;i<Dsize;i++) dataIn[i] = (unsigned char)i;
|
||
bzero(dataEncrypted,Dsize);
|
||
bzero(dataDecrypted,Dsize);
|
||
|
||
for (keyLen=16;keyLen<=32;keyLen+=8) { /* aes-128/aes-192/aes-224 */
|
||
|
||
cccbc_init(encrypt, ekey, keyLen, (const uint8_t *) gkey);
|
||
cccbc_set_iv(encrypt, eiv, NULL);
|
||
|
||
cccbc_init(decrypt, dkey, keyLen, (const uint8_t *) gkey);
|
||
cccbc_set_iv(decrypt, div, NULL);
|
||
|
||
/* encrypt in nblocks of 1,2,...,10,(256-55) */
|
||
j=0;
|
||
for (i=1;i<=10;i++) {
|
||
cccbc_update(encrypt, ekey, (cccbc_iv *) eiv, i, &dataIn[j], &dataEncrypted[j]);
|
||
j+=(i<<4);
|
||
}
|
||
i = (4096-j)>>4;
|
||
cccbc_update(encrypt, ekey, (cccbc_iv *) eiv, i, &dataIn[j], &dataEncrypted[j]);
|
||
|
||
/* decrypt in nblocks of 1,2,...,10,(256-55) */
|
||
j=0;
|
||
for (i=1;i<=10;i++) {
|
||
cccbc_update(decrypt, dkey, (cccbc_iv *) div, i, &dataEncrypted[j], &dataDecrypted[j]);
|
||
j+=(i<<4);
|
||
}
|
||
i = (4096-j)>>4;
|
||
cccbc_update(decrypt, dkey, (cccbc_iv *) div, i, &dataEncrypted[j], &dataDecrypted[j]);
|
||
|
||
/* check whether dataIn == dataDecrypted */
|
||
for (i=0;i<Dsize;i++) {
|
||
if (dataIn[i] != dataDecrypted[i]) {
|
||
fprintf(stderr, "error : CBC mode AES-%d error (mismatched at byte %zu\n", keyLen*8, i);
|
||
exit(1);
|
||
}
|
||
}
|
||
|
||
/* check crc32 of encrypted data */
|
||
uint32_t checksum = (uint32_t) (crc32(0, dataEncrypted, Dsize) ^ adler32(0, dataEncrypted, Dsize));
|
||
if (checksum!=validate_cbc_checksum[keyLen/8-2]) {
|
||
fprintf(stderr, "error : encrypted data checksum (crc32^adler32) failed\n");
|
||
exit(2);
|
||
}
|
||
}
|
||
fprintf(stderr, "AES-CBC validated\n");
|
||
}
|