corecrypto/corecrypto_thermal/aes_ctr.c

215 lines
6.1 KiB
C
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/* Copyright (c) (2016,2017,2019) Apple Inc. All rights reserved.
*
* corecrypto is licensed under Apple Inc.s Internal Use License Agreement (which
* is contained in the License.txt file distributed with corecrypto) and only to
* people who accept that license. IMPORTANT: Any license rights granted to you by
* Apple Inc. (if any) are limited to internal use within your organization only on
* devices and computers you own or control, for the sole purpose of verifying the
* security characteristics and correct functioning of the Apple Software. You may
* not, directly or indirectly, redistribute the Apple Software or any portions thereof.
*/
#include <stdio.h>
#include <stdlib.h>
#include <corecrypto/ccaes.h>
#include "thermalCrypto.h"
#include <Accelerate/ClockServices.h>
// extern void ccdigest_update(const struct ccdigest_info *di, ccdigest_ctx_t ctx, size_t len, const void *data);
typedef struct
{
const struct ccmode_ctr *ctr;
void *key;
size_t len;
const void *dataIn;
void *dataOut;
} Parameters;
void BlockCTR(const Parameters *parameters);
// this templtae works for both encrypt and decrypt
void BlockCTR(const Parameters *parameters)
{
parameters->ctr->ctr((ccctr_ctx *)parameters->key, parameters->len, parameters->dataIn, parameters->dataOut);
}
static void Driver(unsigned int iterations, void *parameters)
{
Parameters *p = (Parameters *) parameters;
while (iterations--) {
BlockCTR(p);
}
}
extern uint32_t single_test;
void thermalAES_CTR(uint32_t ITERATIONS, uint32_t data_size)
{
char *dataIn, *dataEncrypted, *dataDecrypted;
uint32_t i;
double TotalETime = 0;
double TotalDTime = 0;
uint32_t NUM_BLOCKS = data_size/16;
if ((NUM_BLOCKS*16)!=data_size) {
data_size = 16*NUM_BLOCKS;
fprintf(stderr,"warning : adjusted data_size to %d\n", data_size);
}
const struct ccmode_ctr *encrypt = ccaes_ctr_crypt_mode();
const struct ccmode_ctr *decrypt = ccaes_ctr_crypt_mode();
unsigned int keyLen=16;
uint8_t gkey[32];
if (!single_test)
for (i=0;i<32;i++) gkey[i] = (uint8_t)arc4random();
ccctr_ctx_decl(encrypt->size, ekey);
encrypt->init(encrypt, ekey, keyLen, (const uint8_t *) gkey, "66E69A111892584FB5ED52070383EDBF");
ccctr_ctx_decl(decrypt->size, dkey);
decrypt->init(decrypt, dkey, keyLen, (const uint8_t *) gkey, "66E69A111892584FB5ED52070383EDBF");
if (!(dataIn = calloc(data_size, 1))) {
fprintf(stderr,"error : calloc dataIn %d \n", data_size);
exit(1);
}
if (!(dataEncrypted = calloc(data_size, 1))) {
fprintf(stderr,"error : calloc dataEncrypted %d \n", data_size);
exit(1);
}
if (!(dataDecrypted = calloc(data_size, 1))) {
fprintf(stderr,"error : calloc dataDecrypted %d \n", data_size);
exit(1);
}
if (!single_test) {
for (i=0;i<data_size;i++) {
dataIn[i] = (char)arc4random();
dataEncrypted[i] = dataDecrypted[i] = 0;
}
// Encrypted
{
Parameters parameters =
{
.ctr = encrypt,
.key = ekey,
.len = data_size,
.dataIn = dataIn,
.dataOut = dataEncrypted,
};
TotalETime += MeasureNetTimeInCPUCycles(Driver, ITERATIONS, &parameters, 1);
}
}
// Decrypted
{
Parameters parameters =
{
.ctr = decrypt,
.key = dkey,
.len = data_size,
.dataIn = dataEncrypted,
.dataOut = dataDecrypted,
};
TotalDTime += MeasureNetTimeInCPUCycles(Driver, ITERATIONS, &parameters, 1);
}
if (!single_test) {
for (i=0;i<data_size;i++) if (dataIn[i]!=dataDecrypted[i]) {
fprintf(stderr, "error at i = %d, %6d %6d %6d\n", i, dataIn[i], dataEncrypted[i], dataDecrypted[i]);
break;
}
}
printf(" aes-ctr : %.2f/%.2f\n", (TotalETime/data_size), (TotalDTime/data_size));
free(dataIn);
free(dataEncrypted);
free(dataDecrypted);
}
#include <zlib.h>
/*
function that tests corner cases (various number of input blocks) with known constants in the key and data
*/
#define Dsize 4096
#define nBlocks (Dsize/16)
uint32_t validate_ctr_checksum[] = { 0xecffb7ba, 0x01b271df, 0xbc1f1137 };
void validateAES_CTR(void);
void validateAES_CTR(void)
{
unsigned char dataIn[Dsize], dataEncrypted[Dsize], dataDecrypted[Dsize];
size_t i, j;
const struct ccmode_ctr *encrypt = ccaes_ctr_crypt_mode();
const struct ccmode_ctr *decrypt = ccaes_ctr_crypt_mode();
ccctr_ctx_decl(encrypt->size, ekey);
ccctr_ctx_decl(decrypt->size, dkey);
unsigned int keyLen;
uint8_t gkey[32];
for (i=0;i<32;i++) gkey[i] = (uint8_t)i;
for (i=0;i<Dsize;i++) dataIn[i] = (unsigned char)i;
bzero(dataEncrypted,Dsize);
bzero(dataDecrypted,Dsize);
for (keyLen=16;keyLen<=32;keyLen+=8) { /* aes-128/aes-192/aes-224 */
encrypt->init(encrypt, ekey, keyLen, (const uint8_t *) gkey, "66E69A111892584FB5ED52070383EDBF");
decrypt->init(decrypt, dkey, keyLen, (const uint8_t *) gkey, "66E69A111892584FB5ED52070383EDBF");
/* encrypt in nblocks of 1,2,...,10,(256-55) */
j=0;
for (i=1;i<=10;i++) {
encrypt->ctr(ekey, i<<4, &dataIn[j], &dataEncrypted[j]);
j+=(i<<4);
}
i = (4096-j)>>4;
encrypt->ctr(ekey, i<<4, &dataIn[j], &dataEncrypted[j]);
/* decrypt in nblocks of 1,2,...,10,(256-55) */
j=0;
for (i=1;i<=10;i++) {
decrypt->ctr(dkey, i<<4, &dataEncrypted[j], &dataDecrypted[j]);
j+=(i<<4);
}
i = (4096-j)>>4;
decrypt->ctr(dkey, i<<4, &dataEncrypted[j], &dataDecrypted[j]);
/* check whether dataIn == dataDecrypted */
for (i=0;i<Dsize;i++) {
if (dataIn[i] != dataDecrypted[i]) {
fprintf(stderr, "error : CTR mode AES-%d error (mismatched at byte %zu\n", keyLen*8, i);
exit(1);
}
}
/* check crc32 of encrypted data */
uint32_t checksum = (uint32_t) (crc32(0, dataEncrypted, Dsize) ^ adler32(0, dataEncrypted, Dsize));
if (checksum!=validate_ctr_checksum[keyLen/8-2]) {
fprintf(stderr, "error : encrypted data checksum (crc32^adler32) failed\n");
exit(2);
}
}
fprintf(stderr, "AES-CTR validated\n");
}