summaryrefslogtreecommitdiff
path: root/usr/src/test/crypto-tests/tests/modes/aes/ccm/aes_ccm.c
blob: f498cbe2e6441d50ca1eb4154fd1a784d12c81d0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
/*
 * This file and its contents are supplied under the terms of the
 * Common Development and Distribution License ("CDDL"), version 1.0.
 * You may only use this file in accordance with the terms of version
 * 1.0 of the CDDL.
 *
 * A full copy of the text of the CDDL should have accompanied this
 * source.  A copy of the CDDL is also available via the Internet at
 * http://www.illumos.org/license/CDDL.
 */

/*
 * Copyright 2015 Nexenta Systems, Inc.  All rights reserved.
 * Copyright 2019 Joyent, Inc.
 */

#include <aes/aes_impl.h>
#include <strings.h>
#include <stdio.h>
#include <sys/debug.h>
#include "cryptotest.h"
#include "aes_ccm.h"

/*
 * Size of param (in 8-byte chunks for alignment) large enough for both
 * CK_CCM_PARAMS and CK_AES_CCM_PARAMS.
 */
#define	PARAM_SIZE_64 8

static size_t updatelens[] = {
	1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
	CTEST_UPDATELEN_WHOLE, CTEST_UPDATELEN_END
};

int
main(void)
{
	int errs = 0;
	int i;
	uint8_t N[1024];
	uint64_t param[PARAM_SIZE_64];

	cryptotest_t args = {
		.out = N,
		.outlen = sizeof (N),
		.mechname = SUN_CKM_AES_CCM,
		.updatelens = updatelens
	};

	args.key = CCM_KEY1;
	args.keylen = sizeof (CCM_KEY1);
	for (i = 0; i < 12; i++) {
		bzero(param, sizeof (param));
		ccm_init_params(param, DATALEN[i] - AUTHLEN[i], NONCE[i],
		    NONCELEN[i], CCM_DATA1, AUTHLEN[i], MACLEN[i]);

		args.param = param;
		args.plen = ccm_param_len();

		VERIFY3U(args.plen, <=, sizeof (param));

		args.in = CCM_DATA1 + AUTHLEN[i];
		args.inlen = DATALEN[i] - AUTHLEN[i];

		errs += run_test(&args, RES[i] + AUTHLEN[i],
		    RESLEN[i] - AUTHLEN[i], ENCR_FG);
		(void) fprintf(stderr, "----------\n");
	}

	args.key = CCM_KEY2;
	args.keylen = sizeof (CCM_KEY2);
	for (i = 12; i < 24; i++) {
		bzero(param, sizeof (param));
		ccm_init_params(param, DATALEN[i] - AUTHLEN[i], NONCE[i],
		    NONCELEN[i], DATA_2[i-12], AUTHLEN[i], MACLEN[i]);

		args.param = param;
		args.plen = ccm_param_len();

		VERIFY3U(args.plen, <=, sizeof (param));

		args.in = DATA_2[i-12] + AUTHLEN[i];
		args.inlen = DATALEN[i] - AUTHLEN[i];

		errs += run_test(&args, RES[i] + AUTHLEN[i],
		    RESLEN[i] - AUTHLEN[i], ENCR_FG);
		(void) fprintf(stderr, "----------\n");
	}

	(void) fprintf(stderr, "\t\t\t=== decrypt ===\n----------\n\n");

	args.key = CCM_KEY1;
	args.keylen = sizeof (CCM_KEY1);
	for (i = 0; i < 12; i++) {
		bzero(param, sizeof (param));
		ccm_init_params(param, RESLEN[i] - AUTHLEN[i], NONCE[i],
		    NONCELEN[i], CCM_DATA1, AUTHLEN[i], MACLEN[i]);

		args.param = param;
		args.plen = ccm_param_len();

		VERIFY3U(args.plen, <=, sizeof (param));

		args.in = RES[i] + AUTHLEN[i];
		args.inlen = RESLEN[i] - AUTHLEN[i];

		errs += run_test(&args, CCM_DATA1 + AUTHLEN[i],
		    DATALEN[i] - AUTHLEN[i], DECR_FG);
		(void) fprintf(stderr, "----------\n");
	}

	args.key = CCM_KEY2;
	args.keylen = sizeof (CCM_KEY2);
	for (i = 12; i < 24; i++) {
		bzero(param, sizeof (param));
		ccm_init_params(param, RESLEN[i] - AUTHLEN[i], NONCE[i],
		    NONCELEN[i], DATA_2[i-12], AUTHLEN[i], MACLEN[i]);

		args.param = param;
		args.plen = ccm_param_len();

		VERIFY3U(args.plen, <=, sizeof (param));

		args.in = RES[i] + AUTHLEN[i];
		args.inlen = RESLEN[i] - AUTHLEN[i];

		errs += run_test(&args, DATA_2[i-12] + AUTHLEN[i],
		    DATALEN[i] - AUTHLEN[i], ENCR_FG);
		(void) fprintf(stderr, "----------\n");
	}

	if (errs != 0)
		(void) fprintf(stderr, "%d tests failed\n", errs);

	return (errs);
}