summaryrefslogtreecommitdiffstats
path: root/examples/cipher.c
diff options
context:
space:
mode:
Diffstat (limited to 'examples/cipher.c')
-rw-r--r--examples/cipher.c230
1 files changed, 0 insertions, 230 deletions
diff --git a/examples/cipher.c b/examples/cipher.c
deleted file mode 100644
index 52b4996f4a6..00000000000
--- a/examples/cipher.c
+++ /dev/null
@@ -1,230 +0,0 @@
-/*
- * Demo on how to use /dev/crypto device for ciphering.
- *
- * Placed under public domain.
- *
- */
-#include <stdint.h>
-#include <stdio.h>
-#include <string.h>
-#include <unistd.h>
-#include <fcntl.h>
-
-#include <sys/ioctl.h>
-#include "../cryptodev.h"
-
-#define DATA_SIZE 4096
-#define BLOCK_SIZE 16
-#define KEY_SIZE 16
-
-static int
-test_crypto(int cfd)
-{
- uint8_t plaintext[DATA_SIZE];
- uint8_t ciphertext[DATA_SIZE];
- uint8_t iv[BLOCK_SIZE];
- uint8_t key[KEY_SIZE];
-
- struct session_op sess;
- struct crypt_op cryp;
-
- memset(&sess, 0, sizeof(sess));
- memset(&cryp, 0, sizeof(cryp));
-
- memset(plaintext, 0x15, sizeof(plaintext));
- memset(key, 0x33, sizeof(key));
- memset(iv, 0x03, sizeof(iv));
-
- /* Get crypto session for AES128 */
- sess.cipher = CRYPTO_AES_CBC;
- sess.keylen = KEY_SIZE;
- sess.key = key;
- if (ioctl(cfd, CIOCGSESSION, &sess)) {
- perror("ioctl(CIOCGSESSION)");
- return 1;
- }
-
- /* Encrypt data.in to data.encrypted */
- cryp.ses = sess.ses;
- cryp.len = sizeof(plaintext);
- cryp.src = plaintext;
- cryp.dst = ciphertext;
- cryp.iv = iv;
- cryp.op = COP_ENCRYPT;
- if (ioctl(cfd, CIOCCRYPT, &cryp)) {
- perror("ioctl(CIOCCRYPT)");
- return 1;
- }
-
- if (ioctl(cfd, CIOCGSESSION, &sess)) {
- perror("ioctl(CIOCGSESSION)");
- return 1;
- }
-
- /* Decrypt data.encrypted to data.decrypted */
- cryp.ses = sess.ses;
- cryp.len = sizeof(plaintext);
- cryp.src = ciphertext;
- cryp.dst = ciphertext;
- cryp.iv = iv;
- cryp.op = COP_DECRYPT;
- if (ioctl(cfd, CIOCCRYPT, &cryp)) {
- perror("ioctl(CIOCCRYPT)");
- return 1;
- }
-
- /* Verify the result */
- if (memcmp(plaintext, ciphertext, sizeof(plaintext)) != 0) {
- fprintf(stderr,
- "FAIL: Decrypted data are different from the input data.\n");
- return 1;
- } else
- printf("Test passed\n");
-
- /* Finish crypto session */
- if (ioctl(cfd, CIOCFSESSION, &sess.ses)) {
- perror("ioctl(CIOCFSESSION)");
- return 1;
- }
-
- return 0;
-}
-
-static int test_aes(int cfd)
-{
- uint8_t plaintext1[BLOCK_SIZE];
- uint8_t ciphertext1[BLOCK_SIZE] = { 0xdf, 0x55, 0x6a, 0x33, 0x43, 0x8d, 0xb8, 0x7b, 0xc4, 0x1b, 0x17, 0x52, 0xc5, 0x5e, 0x5e, 0x49 };
- uint8_t iv1[BLOCK_SIZE];
- uint8_t key1[KEY_SIZE] = { 0xff, 0xff, 0xc0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
- uint8_t plaintext2[BLOCK_SIZE] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xc0, 0x00 };
- uint8_t ciphertext2[BLOCK_SIZE] = { 0xb7, 0x97, 0x2b, 0x39, 0x41, 0xc4, 0x4b, 0x90, 0xaf, 0xa7, 0xb2, 0x64, 0xbf, 0xba, 0x73, 0x87 };
- uint8_t iv2[BLOCK_SIZE];
- uint8_t key2[KEY_SIZE];
-
- struct session_op sess;
- struct crypt_op cryp;
-
- memset(&sess, 0, sizeof(sess));
- memset(&cryp, 0, sizeof(cryp));
-
- memset(plaintext1, 0x0, sizeof(plaintext1));
- memset(iv1, 0x0, sizeof(iv1));
-
- /* Get crypto session for AES128 */
- sess.cipher = CRYPTO_AES_CBC;
- sess.keylen = KEY_SIZE;
- sess.key = key1;
- if (ioctl(cfd, CIOCGSESSION, &sess)) {
- perror("ioctl(CIOCGSESSION)");
- return 1;
- }
-
- /* Encrypt data.in to data.encrypted */
- cryp.ses = sess.ses;
- cryp.len = sizeof(plaintext1);
- cryp.src = plaintext1;
- cryp.dst = plaintext1;
- cryp.iv = iv1;
- cryp.op = COP_ENCRYPT;
- if (ioctl(cfd, CIOCCRYPT, &cryp)) {
- perror("ioctl(CIOCCRYPT)");
- return 1;
- }
-
- /* Verify the result */
- if (memcmp(plaintext1, ciphertext1, sizeof(plaintext1)) != 0) {
- fprintf(stderr,
- "FAIL: Decrypted data are different from the input data.\n");
- return 1;
- }
-
- /* Test 2 */
-
- memset(key2, 0x0, sizeof(key2));
- memset(iv2, 0x0, sizeof(iv2));
-
- /* Get crypto session for AES128 */
- sess.cipher = CRYPTO_AES_CBC;
- sess.keylen = KEY_SIZE;
- sess.key = key2;
- if (ioctl(cfd, CIOCGSESSION, &sess)) {
- perror("ioctl(CIOCGSESSION)");
- return 1;
- }
-
- /* Encrypt data.in to data.encrypted */
- cryp.ses = sess.ses;
- cryp.len = sizeof(plaintext2);
- cryp.src = plaintext2;
- cryp.dst = plaintext2;
- cryp.iv = iv2;
- cryp.op = COP_ENCRYPT;
- if (ioctl(cfd, CIOCCRYPT, &cryp)) {
- perror("ioctl(CIOCCRYPT)");
- return 1;
- }
-
- /* Verify the result */
- if (memcmp(plaintext2, ciphertext2, sizeof(plaintext2)) != 0) {
- fprintf(stderr,
- "FAIL: Decrypted data are different from the input data.\n");
- return 1;
- }
-
- printf("AES Test passed\n");
-
- /* Finish crypto session */
- if (ioctl(cfd, CIOCFSESSION, &sess.ses)) {
- perror("ioctl(CIOCFSESSION)");
- return 1;
- }
-
- return 0;
-}
-
-int
-main()
-{
- int fd = -1, cfd = -1;
-
- /* Open the crypto device */
- fd = open("/dev/crypto", O_RDWR, 0);
- if (fd < 0) {
- perror("open(/dev/crypto)");
- return 1;
- }
-
- /* Clone file descriptor */
- if (ioctl(fd, CRIOGET, &cfd)) {
- perror("ioctl(CRIOGET)");
- return 1;
- }
-
- /* Set close-on-exec (not really neede here) */
- if (fcntl(cfd, F_SETFD, 1) == -1) {
- perror("fcntl(F_SETFD)");
- return 1;
- }
-
- /* Run the test itself */
- if (test_aes(cfd))
- return 1;
-
- if (test_crypto(cfd))
- return 1;
-
- /* Close cloned descriptor */
- if (close(cfd)) {
- perror("close(cfd)");
- return 1;
- }
-
- /* Close the original descriptor */
- if (close(fd)) {
- perror("close(fd)");
- return 1;
- }
-
- return 0;
-}
-