/* This program is released under the Common Public License V1.0 * * You should have received a copy of Common Public License V1.0 along with * with this program. */ /* Copyright IBM Corp. 2010, 2011 */ #include #include #include #include #include #include #include "ica_api.h" #include "testcase.h" #define NR_RANDOM_TESTS 10000 void dump_ecb_data(unsigned char *key, unsigned int key_length, unsigned char *input_data, unsigned int data_length, unsigned char *output_data) { VV_(printf("Key \n")); dump_array(key, key_length); VV_(printf("Input Data\n")); dump_array(input_data, data_length); VV_(printf("Output Data\n")); dump_array(output_data, data_length); } int load_random_test_data(unsigned char *data, unsigned int data_length, unsigned char *key, unsigned int key_length) { int rc; rc = ica_random_number_generate(data_length, data); if (rc) { VV_(printf("ica_random_number_generate with rc = %i errnor = %i\n", rc, errno)); return rc; } rc = ica_random_number_generate(key_length, key); if (rc) { VV_(printf("ica_random_number_generate with rc = %i errnor = %i\n", rc, errno)); return rc; } return rc; } int random_des_ecb(int iteration, unsigned int data_length) { int rc = 0; unsigned int key_length = sizeof(ica_des_key_triple_t); unsigned char input_data[data_length]; unsigned char encrypt[data_length]; unsigned char decrypt[data_length]; unsigned char key[key_length]; memset(encrypt, 0x00, data_length); memset(decrypt, 0x00, data_length); load_random_test_data(input_data, data_length, key, key_length); VV_(printf("Test Parameters for iteration = %i\n", iteration)); VV_(printf("key length = %i, data length = %i\n", key_length, data_length)); rc = ica_des_ecb(input_data, encrypt, data_length, key, 1); if (rc) { VV_(printf("ica_des_ecb encrypt failed with rc = %i\n", rc)); dump_ecb_data(key, key_length, input_data, data_length, encrypt); } if (!rc) { VV_(printf("Encrypt:\n")); dump_ecb_data(key, key_length, input_data, data_length, encrypt); } if (rc) { VV_(printf("3DES ECB test exited after encryption\n")); return rc; } rc = ica_des_ecb(encrypt, decrypt, data_length, key, 0); if (rc) { VV_(printf("ica_des_ecb decrypt failed with rc = %i\n", rc)); dump_ecb_data(key, key_length, encrypt, data_length, decrypt); return rc; } if (!rc) { VV_(printf("Decrypt:\n")); dump_ecb_data(key, key_length, encrypt, data_length, decrypt); } if (memcmp(decrypt, input_data, data_length)) { VV_(printf("Decryption Result does not match the original data!\n")); VV_(printf("Original data:\n")); dump_array(input_data, data_length); VV_(printf("Decryption Result:\n")); dump_array(decrypt, data_length); rc++; return rc; } return rc; } /* * Performs ECB tests. */ int main(int argc, char **argv) { int rc = 0; int error_count = 0; int iteration; unsigned int data_length = sizeof(ica_des_vector_t); set_verbosity(argc, argv); #ifdef ICA_FIPS if (ica_fips_status() & ICA_FIPS_MODE) { printf("All DES-ECB tests skipped." " (DES not FIPS approved)\n"); return 0; } #endif /* ICA_FIPS */ for(iteration = 1; iteration <= NR_RANDOM_TESTS; iteration++) { rc = random_des_ecb(iteration, data_length); if (rc) { V_(printf("random_des_ecb failed with rc = %i\n", rc)); error_count++; goto out; } data_length += sizeof(ica_des_vector_t); } out: if (error_count) printf("%i DES-ECB tests failed.\n", error_count); else printf("All DES-ECB tests passed.\n"); return rc; }