forked from linux-rdma/perftest
-
Notifications
You must be signed in to change notification settings - Fork 0
/
gen_data_enc_key.c
122 lines (92 loc) · 2.33 KB
/
gen_data_enc_key.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
#include <openssl/conf.h>
#include <openssl/evp.h>
#include <openssl/err.h>
#include <string.h>
#include <stdio.h>
#include <time.h>
#include <stdlib.h>
/*
This program generates a data encryption key that
is used to encrypt data that is sent in perftest applications
*/
void handleErrors(void)
{
ERR_print_errors_fp(stderr);
abort();
}
int encrypt(unsigned char *plaintext, int plaintext_len, unsigned char *kek,
unsigned char *iv, unsigned char *ciphertext)
{
EVP_CIPHER_CTX *ctx;
int len;
int ciphertext_len;
/* Create and initialise the context */
if (!(ctx = EVP_CIPHER_CTX_new()))
handleErrors();
EVP_CIPHER_CTX_set_flags(ctx, EVP_CIPHER_CTX_FLAG_WRAP_ALLOW);
if (1 != EVP_EncryptInit_ex(ctx, EVP_aes_128_wrap(), NULL, kek, iv))
handleErrors();
if (1 !=
EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len))
handleErrors();
ciphertext_len = len;
if (1 != EVP_EncryptFinal_ex(ctx, ciphertext + len, &len))
handleErrors();
ciphertext_len += len;
/* Clean up */
EVP_CIPHER_CTX_free(ctx);
return ciphertext_len;
}
int main (int argc , char** argv)
{
if(argc != 3){
fprintf(stderr, "The application should get 3 parameters");
exit(1);
}
/* A 128 bit kek */
unsigned char kek[16] = {};
/* A 64 bit IV */
unsigned char iv[8] = {0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6};
unsigned char dek[32] = {};
unsigned char ciphertext[128] = {};
int ciphertext_len;
char * line = NULL;
size_t len = 0;
ssize_t read;
int index = 0;
char* eptr;
int i;
FILE* kek_file = NULL;
FILE* dek_file = NULL;
srand(time(NULL));
//random
for(i = 0; i < 32; i++){
dek[i]=(rand()%256);
}
kek_file = fopen(argv[1] , "r");
if(kek_file == NULL){
fprintf(stderr, "Couldn't open key encryption key file");
exit(1);
}
while((read = getline(&line, &len, kek_file)) != -1) {
if(index >= sizeof(kek)) {
fprintf(stderr, "Invalid key encryption key file\n");
fclose(kek_file);
exit(1);
}
kek[index] = strtol(line, &eptr, 16);
index++;
}
fclose(kek_file);
ciphertext_len =
encrypt(dek, sizeof(dek), kek, iv, ciphertext);
dek_file = fopen(argv[2] , "w");
if(dek_file == NULL){
fprintf(stderr, "Couldn't open data encryption key file\n");
exit(1);
}
for(i = 0; i < ciphertext_len; i++)
fprintf(dek_file, "0x%02x\n", ciphertext[i]);
fclose(dek_file);
return 0;
}