crypto_examples.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333
  1. /*
  2. * Copyright The Mbed TLS Contributors
  3. * SPDX-License-Identifier: Apache-2.0
  4. *
  5. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  6. * not use this file except in compliance with the License.
  7. * You may obtain a copy of the License at
  8. *
  9. * http://www.apache.org/licenses/LICENSE-2.0
  10. *
  11. * Unless required by applicable law or agreed to in writing, software
  12. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  13. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  14. * See the License for the specific language governing permissions and
  15. * limitations under the License.
  16. */
  17. #include "psa/crypto.h"
  18. #include <string.h>
  19. #include <stdio.h>
  20. #include <stdlib.h>
  21. #define ASSERT(predicate) \
  22. do \
  23. { \
  24. if (!(predicate)) \
  25. { \
  26. printf("\tassertion failed at %s:%d - '%s'\r\n", \
  27. __FILE__, __LINE__, #predicate); \
  28. goto exit; \
  29. } \
  30. } while (0)
  31. #define ASSERT_STATUS(actual, expected) \
  32. do \
  33. { \
  34. if ((actual) != (expected)) \
  35. { \
  36. printf("\tassertion failed at %s:%d - " \
  37. "actual:%d expected:%d\r\n", __FILE__, __LINE__, \
  38. (psa_status_t) actual, (psa_status_t) expected); \
  39. goto exit; \
  40. } \
  41. } while (0)
  42. #if !defined(MBEDTLS_PSA_CRYPTO_C) || !defined(MBEDTLS_AES_C) || \
  43. !defined(MBEDTLS_CIPHER_MODE_CBC) || !defined(MBEDTLS_CIPHER_MODE_CTR) || \
  44. !defined(MBEDTLS_CIPHER_MODE_WITH_PADDING) || \
  45. defined(MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER)
  46. int main(void)
  47. {
  48. printf("MBEDTLS_PSA_CRYPTO_C and/or MBEDTLS_AES_C and/or "
  49. "MBEDTLS_CIPHER_MODE_CBC and/or MBEDTLS_CIPHER_MODE_CTR "
  50. "and/or MBEDTLS_CIPHER_MODE_WITH_PADDING "
  51. "not defined and/or MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER"
  52. " defined.\r\n");
  53. return 0;
  54. }
  55. #else
  56. static psa_status_t cipher_operation(psa_cipher_operation_t *operation,
  57. const uint8_t *input,
  58. size_t input_size,
  59. size_t part_size,
  60. uint8_t *output,
  61. size_t output_size,
  62. size_t *output_len)
  63. {
  64. psa_status_t status;
  65. size_t bytes_to_write = 0, bytes_written = 0, len = 0;
  66. *output_len = 0;
  67. while (bytes_written != input_size) {
  68. bytes_to_write = (input_size - bytes_written > part_size ?
  69. part_size :
  70. input_size - bytes_written);
  71. status = psa_cipher_update(operation, input + bytes_written,
  72. bytes_to_write, output + *output_len,
  73. output_size - *output_len, &len);
  74. ASSERT_STATUS(status, PSA_SUCCESS);
  75. bytes_written += bytes_to_write;
  76. *output_len += len;
  77. }
  78. status = psa_cipher_finish(operation, output + *output_len,
  79. output_size - *output_len, &len);
  80. ASSERT_STATUS(status, PSA_SUCCESS);
  81. *output_len += len;
  82. exit:
  83. return status;
  84. }
  85. static psa_status_t cipher_encrypt(psa_key_id_t key,
  86. psa_algorithm_t alg,
  87. uint8_t *iv,
  88. size_t iv_size,
  89. const uint8_t *input,
  90. size_t input_size,
  91. size_t part_size,
  92. uint8_t *output,
  93. size_t output_size,
  94. size_t *output_len)
  95. {
  96. psa_status_t status;
  97. psa_cipher_operation_t operation = PSA_CIPHER_OPERATION_INIT;
  98. size_t iv_len = 0;
  99. memset(&operation, 0, sizeof(operation));
  100. status = psa_cipher_encrypt_setup(&operation, key, alg);
  101. ASSERT_STATUS(status, PSA_SUCCESS);
  102. status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len);
  103. ASSERT_STATUS(status, PSA_SUCCESS);
  104. status = cipher_operation(&operation, input, input_size, part_size,
  105. output, output_size, output_len);
  106. ASSERT_STATUS(status, PSA_SUCCESS);
  107. exit:
  108. psa_cipher_abort(&operation);
  109. return status;
  110. }
  111. static psa_status_t cipher_decrypt(psa_key_id_t key,
  112. psa_algorithm_t alg,
  113. const uint8_t *iv,
  114. size_t iv_size,
  115. const uint8_t *input,
  116. size_t input_size,
  117. size_t part_size,
  118. uint8_t *output,
  119. size_t output_size,
  120. size_t *output_len)
  121. {
  122. psa_status_t status;
  123. psa_cipher_operation_t operation = PSA_CIPHER_OPERATION_INIT;
  124. memset(&operation, 0, sizeof(operation));
  125. status = psa_cipher_decrypt_setup(&operation, key, alg);
  126. ASSERT_STATUS(status, PSA_SUCCESS);
  127. status = psa_cipher_set_iv(&operation, iv, iv_size);
  128. ASSERT_STATUS(status, PSA_SUCCESS);
  129. status = cipher_operation(&operation, input, input_size, part_size,
  130. output, output_size, output_len);
  131. ASSERT_STATUS(status, PSA_SUCCESS);
  132. exit:
  133. psa_cipher_abort(&operation);
  134. return status;
  135. }
  136. static psa_status_t
  137. cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block(void)
  138. {
  139. enum {
  140. block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES),
  141. key_bits = 256,
  142. part_size = block_size,
  143. };
  144. const psa_algorithm_t alg = PSA_ALG_CBC_NO_PADDING;
  145. psa_status_t status;
  146. psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
  147. psa_key_id_t key = 0;
  148. size_t output_len = 0;
  149. uint8_t iv[block_size];
  150. uint8_t input[block_size];
  151. uint8_t encrypt[block_size];
  152. uint8_t decrypt[block_size];
  153. status = psa_generate_random(input, sizeof(input));
  154. ASSERT_STATUS(status, PSA_SUCCESS);
  155. psa_set_key_usage_flags(&attributes,
  156. PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT);
  157. psa_set_key_algorithm(&attributes, alg);
  158. psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
  159. psa_set_key_bits(&attributes, key_bits);
  160. status = psa_generate_key(&attributes, &key);
  161. ASSERT_STATUS(status, PSA_SUCCESS);
  162. status = cipher_encrypt(key, alg, iv, sizeof(iv),
  163. input, sizeof(input), part_size,
  164. encrypt, sizeof(encrypt), &output_len);
  165. ASSERT_STATUS(status, PSA_SUCCESS);
  166. status = cipher_decrypt(key, alg, iv, sizeof(iv),
  167. encrypt, output_len, part_size,
  168. decrypt, sizeof(decrypt), &output_len);
  169. ASSERT_STATUS(status, PSA_SUCCESS);
  170. status = memcmp(input, decrypt, sizeof(input));
  171. ASSERT_STATUS(status, PSA_SUCCESS);
  172. exit:
  173. psa_destroy_key(key);
  174. return status;
  175. }
  176. static psa_status_t cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi(void)
  177. {
  178. enum {
  179. block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES),
  180. key_bits = 256,
  181. input_size = 100,
  182. part_size = 10,
  183. };
  184. const psa_algorithm_t alg = PSA_ALG_CBC_PKCS7;
  185. psa_status_t status;
  186. psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
  187. psa_key_id_t key = 0;
  188. size_t output_len = 0;
  189. uint8_t iv[block_size], input[input_size],
  190. encrypt[input_size + block_size], decrypt[input_size + block_size];
  191. status = psa_generate_random(input, sizeof(input));
  192. ASSERT_STATUS(status, PSA_SUCCESS);
  193. psa_set_key_usage_flags(&attributes,
  194. PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT);
  195. psa_set_key_algorithm(&attributes, alg);
  196. psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
  197. psa_set_key_bits(&attributes, key_bits);
  198. status = psa_generate_key(&attributes, &key);
  199. ASSERT_STATUS(status, PSA_SUCCESS);
  200. status = cipher_encrypt(key, alg, iv, sizeof(iv),
  201. input, sizeof(input), part_size,
  202. encrypt, sizeof(encrypt), &output_len);
  203. ASSERT_STATUS(status, PSA_SUCCESS);
  204. status = cipher_decrypt(key, alg, iv, sizeof(iv),
  205. encrypt, output_len, part_size,
  206. decrypt, sizeof(decrypt), &output_len);
  207. ASSERT_STATUS(status, PSA_SUCCESS);
  208. status = memcmp(input, decrypt, sizeof(input));
  209. ASSERT_STATUS(status, PSA_SUCCESS);
  210. exit:
  211. psa_destroy_key(key);
  212. return status;
  213. }
  214. static psa_status_t cipher_example_encrypt_decrypt_aes_ctr_multi(void)
  215. {
  216. enum {
  217. block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES),
  218. key_bits = 256,
  219. input_size = 100,
  220. part_size = 10,
  221. };
  222. const psa_algorithm_t alg = PSA_ALG_CTR;
  223. psa_status_t status;
  224. psa_key_attributes_t attributes = PSA_KEY_ATTRIBUTES_INIT;
  225. psa_key_id_t key = 0;
  226. size_t output_len = 0;
  227. uint8_t iv[block_size], input[input_size], encrypt[input_size],
  228. decrypt[input_size];
  229. status = psa_generate_random(input, sizeof(input));
  230. ASSERT_STATUS(status, PSA_SUCCESS);
  231. psa_set_key_usage_flags(&attributes,
  232. PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT);
  233. psa_set_key_algorithm(&attributes, alg);
  234. psa_set_key_type(&attributes, PSA_KEY_TYPE_AES);
  235. psa_set_key_bits(&attributes, key_bits);
  236. status = psa_generate_key(&attributes, &key);
  237. ASSERT_STATUS(status, PSA_SUCCESS);
  238. status = cipher_encrypt(key, alg, iv, sizeof(iv),
  239. input, sizeof(input), part_size,
  240. encrypt, sizeof(encrypt), &output_len);
  241. ASSERT_STATUS(status, PSA_SUCCESS);
  242. status = cipher_decrypt(key, alg, iv, sizeof(iv),
  243. encrypt, output_len, part_size,
  244. decrypt, sizeof(decrypt), &output_len);
  245. ASSERT_STATUS(status, PSA_SUCCESS);
  246. status = memcmp(input, decrypt, sizeof(input));
  247. ASSERT_STATUS(status, PSA_SUCCESS);
  248. exit:
  249. psa_destroy_key(key);
  250. return status;
  251. }
  252. static void cipher_examples(void)
  253. {
  254. psa_status_t status;
  255. printf("cipher encrypt/decrypt AES CBC no padding:\r\n");
  256. status = cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block();
  257. if (status == PSA_SUCCESS) {
  258. printf("\tsuccess!\r\n");
  259. }
  260. printf("cipher encrypt/decrypt AES CBC PKCS7 multipart:\r\n");
  261. status = cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi();
  262. if (status == PSA_SUCCESS) {
  263. printf("\tsuccess!\r\n");
  264. }
  265. printf("cipher encrypt/decrypt AES CTR multipart:\r\n");
  266. status = cipher_example_encrypt_decrypt_aes_ctr_multi();
  267. if (status == PSA_SUCCESS) {
  268. printf("\tsuccess!\r\n");
  269. }
  270. }
  271. int main(void)
  272. {
  273. ASSERT(psa_crypto_init() == PSA_SUCCESS);
  274. cipher_examples();
  275. exit:
  276. mbedtls_psa_crypto_free();
  277. return 0;
  278. }
  279. #endif /* MBEDTLS_PSA_CRYPTO_C && MBEDTLS_AES_C && MBEDTLS_CIPHER_MODE_CBC &&
  280. MBEDTLS_CIPHER_MODE_CTR && MBEDTLS_CIPHER_MODE_WITH_PADDING */