2 //gcc openssl_evp.c pixmap_io.o -o openssl_evp -I /usr/include/openssl/ -lcrypto -O3 -std=c99
5 #include <openssl/conf.h>
6 #include <openssl/evp.h>
7 #include <openssl/err.h>
8 #include <openssl/ssl.h>
9 #include <openssl/bio.h>
12 #include "pixmap_io.h"
14 typedef unsigned char uchar;
21 struct timeval tstart;
22 gettimeofday(&tstart,0);
23 return( (double) (tstart.tv_sec + tstart.tv_usec*1e-6) );
26 double TimeStop(double t)
30 gettimeofday(&tend,0);
31 t = (double) (tend.tv_sec + tend.tv_usec*1e-6) - t;
36 void handleErrors(void)
38 ERR_print_errors_fp(stderr);
43 int encrypt(unsigned char *plaintext, int plaintext_len, unsigned char *key,
44 unsigned char *iv, unsigned char *ciphertext, int ctr)
52 /* Create and initialise the context */
53 if(!(ctx = EVP_CIPHER_CTX_new())) handleErrors();
55 /* Initialise the encryption operation. IMPORTANT - ensure you use a key
56 * and IV size appropriate for your cipher
57 * In this example we are using 256 bit AES (i.e. a 256 bit key). The
58 * IV size for *most* modes is the same as the block size. For AES this
64 if(1 != EVP_EncryptInit_ex(ctx, EVP_aes_128_ctr(), NULL, key, iv))
68 if(1 != EVP_EncryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv))
71 // int cipherBlockSize = EVP_CIPHER_CTX_block_size(ctx);
72 // printf("INFO(evp_encrypt): block size: %d\n", cipherBlockSize);
75 /* Provide the message to be encrypted, and obtain the encrypted output.
76 * EVP_EncryptUpdate can be called multiple times if necessary
79 if(1 != EVP_EncryptUpdate(ctx, ciphertext, &len, plaintext, plaintext_len))
89 /* Finalise the encryption. Further ciphertext bytes may be written at
92 if(1 != EVP_EncryptFinal_ex(ctx, ciphertext + len, &len)) handleErrors();
93 ciphertext_len += len;
96 EVP_CIPHER_CTX_free(ctx);
98 return ciphertext_len;
101 int decrypt(unsigned char *ciphertext, int ciphertext_len, unsigned char *key,
102 unsigned char *iv, unsigned char *plaintext, int ctr)
110 /* Create and initialise the context */
111 if(!(ctx = EVP_CIPHER_CTX_new())) handleErrors();
113 /* Initialise the decryption operation. IMPORTANT - ensure you use a key
114 * and IV size appropriate for your cipher
115 * In this example we are using 256 bit AES (i.e. a 256 bit key). The
116 * IV size for *most* modes is the same as the block size. For AES this
123 if(1 != EVP_DecryptInit_ex(ctx, EVP_aes_128_ctr(), NULL, key, iv))
127 if(1 != EVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv))
130 /* Provide the message to be decrypted, and obtain the plaintext output.
131 * EVP_DecryptUpdate can be called multiple times if necessary
135 if(1 != EVP_DecryptUpdate(ctx, plaintext, &len, ciphertext, ciphertext_len))
139 /* Finalise the decryption. Further plaintext bytes may be written at
142 if(1 != EVP_DecryptFinal_ex(ctx, plaintext + len, &len)) handleErrors();
143 plaintext_len += len;
146 EVP_CIPHER_CTX_free(ctx);
148 return plaintext_len;
152 int main (int argc, char** argv)
154 /* Set up the key and iv. Do I need to say to not hard code these in a
155 * real application? :-)
162 for(int i=1; i<argc; i++){
163 if(strncmp(argv[i],"nb",2)==0) nb_test = atoi(&(argv[i][2])); //nb of test
164 if(strncmp(argv[i],"ctr",3)==0) ctr = atoi(&(argv[i][3])); //CTR ? 1 otherwise CBC like
165 if(strncmp(argv[i],"sizebuf",7)==0) size_buf = atoi(&(argv[i][7])); //SIZE of the buffer
166 if(strncmp(argv[i],"lena",4)==0) lena = atoi(&(argv[i][4])); //Use Lena or buffer
169 printf("nb times %d\n",nb_test);
170 printf("ctr %d\n",ctr);
171 printf("lena %d\n",lena);
172 printf("size_buf %d\n",size_buf);
179 // unsigned char *key = (unsigned char *)"01234567890123456789012345678901";
180 unsigned char *key = (unsigned char *)"0123456789012345";
183 unsigned char *iv = (unsigned char *)"0123456789012345";
185 /* Message to be encrypted */
187 /* Buffer for ciphertext. Ensure the buffer is long enough for the
188 * ciphertext which may be longer than the plaintext, dependant on the
194 uchar *data_R, *data_G, *data_B;
200 load_RGB_pixmap("lena.ppm", &width, &height, &data_R, &data_G, &data_B);
201 imsize=width*height*3;
202 // load_RGB_pixmap("No_ecb_mode_picture.ppm", &width, &height, &data_R, &data_G, &data_B);
205 width=height=size_buf;
207 buffer=malloc(imsize*sizeof(uchar));
208 for(int i=0;i<imsize;i++) {
215 int oneD=width*height;
216 uchar *plaintext = malloc(imsize);
218 for(int i=0;i<oneD;i++) {
219 plaintext[i]=data_R[i];
220 plaintext[oneD+i]=data_G[i];
221 plaintext[2*oneD+i]=data_B[i];
226 for(int i=0;i<oneD;i++) {
227 plaintext[i]=buffer[i];
233 uchar *ciphertext = malloc(imsize);
235 /* Buffer for the decrypted text */
236 uchar *decryptedtext = malloc(imsize);
238 int decryptedtext_len, ciphertext_len;
240 /* Initialise the library */
241 /* ERR_load_crypto_strings();
242 OpenSSL_add_all_algorithms();
243 OPENSSL_config(NULL);
246 double t=TimeStart();
249 /* Encrypt the plaintext */
254 for(i=0;i<nb_test;i++)
256 ciphertext_len = encrypt (plaintext, imsize, key, iv,
262 printf("Time encrypt %f\n",time);
265 for(int i=0;i<oneD;i++) {
266 data_R[i]=ciphertext[i];
267 data_G[i]=ciphertext[oneD+i];
268 data_B[i]=ciphertext[2*oneD+i];
270 store_RGB_pixmap("lena2.ppm", data_R, data_G, data_B, width, height);
278 for(int i=0;i<nb_test;i++)
280 /* Decrypt the ciphertext */
281 decryptedtext_len = decrypt(ciphertext, ciphertext_len, key, iv,
287 printf("Time decrypt %f\n",time);
290 for(int i=0;i<oneD;i++) {
291 data_R[i]=decryptedtext[i];
292 data_G[i]=decryptedtext[oneD+i];
293 data_B[i]=decryptedtext[2*oneD+i];
295 store_RGB_pixmap("lena3.ppm", data_R, data_G, data_B, width, height);
299 for(int i=0;i<imsize;i++) {
300 //cout<<(int)buffer[i]<<endl;
301 if(buffer[i]!=decryptedtext[i]) {
305 printf("RESULT CORRECT: %d\n",equal);