diff options
Diffstat (limited to 'openssl-1.1.0h/test/afalgtest.c')
| -rw-r--r-- | openssl-1.1.0h/test/afalgtest.c | 133 | 
1 files changed, 133 insertions, 0 deletions
| diff --git a/openssl-1.1.0h/test/afalgtest.c b/openssl-1.1.0h/test/afalgtest.c new file mode 100644 index 0000000..e6e02f0 --- /dev/null +++ b/openssl-1.1.0h/test/afalgtest.c @@ -0,0 +1,133 @@ +/* + * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License").  You may not use + * this file except in compliance with the License.  You can obtain a copy + * in the file LICENSE in the source distribution or at + * https://www.openssl.org/source/license.html + */ + +#include <stdio.h> +#include <openssl/opensslconf.h> + +#ifndef OPENSSL_NO_AFALGENG +# include <linux/version.h> +# define K_MAJ   4 +# define K_MIN1  1 +# define K_MIN2  0 +# if LINUX_VERSION_CODE < KERNEL_VERSION(K_MAJ, K_MIN1, K_MIN2) +/* + * If we get here then it looks like there is a mismatch between the linux + * headers and the actual kernel version, so we have tried to compile with + * afalg support, but then skipped it in e_afalg.c. As far as this test is + * concerned we behave as if we had been configured without support + */ +#  define OPENSSL_NO_AFALGENG +# endif +#endif + +#ifndef OPENSSL_NO_AFALGENG +#include <string.h> +#include <openssl/engine.h> +#include <openssl/evp.h> +#include <openssl/rand.h> + +/* Use a buffer size which is not aligned to block size */ +#define BUFFER_SIZE     (8 * 1024) - 13 + +static int test_afalg_aes_128_cbc(ENGINE *e) +{ +    EVP_CIPHER_CTX *ctx; +    const EVP_CIPHER *cipher = EVP_aes_128_cbc(); +    unsigned char key[] = "\x5F\x4D\xCC\x3B\x5A\xA7\x65\xD6\ +                           \x1D\x83\x27\xDE\xB8\x82\xCF\x99"; +    unsigned char iv[] = "\x2B\x95\x99\x0A\x91\x51\x37\x4A\ +                          \xBD\x8F\xF8\xC5\xA7\xA0\xFE\x08"; + +    unsigned char in[BUFFER_SIZE]; +    unsigned char ebuf[BUFFER_SIZE + 32]; +    unsigned char dbuf[BUFFER_SIZE + 32]; +    int encl, encf, decl, decf; +    unsigned int status = 0; + +    ctx = EVP_CIPHER_CTX_new(); +    if (ctx == NULL) { +        fprintf(stderr, "%s() failed to allocate ctx\n", __func__); +        return 0; +    } +    RAND_bytes(in, BUFFER_SIZE); + +    if (       !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1) +            || !EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE) +            || !EVP_CipherFinal_ex(ctx, ebuf+encl, &encf)) { +        fprintf(stderr, "%s() failed encryption\n", __func__); +        goto end; +    } +    encl += encf; + +    if (       !EVP_CIPHER_CTX_reset(ctx) +            || !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0) +            || !EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl) +            || !EVP_CipherFinal_ex(ctx, dbuf+decl, &decf)) { +        fprintf(stderr, "%s() failed decryption\n", __func__); +        goto end; +    } +    decl += decf; + +    if (       decl != BUFFER_SIZE +            || memcmp(dbuf, in, BUFFER_SIZE)) { +        fprintf(stderr, "%s() failed Dec(Enc(P)) != P\n", __func__); +        goto end; +    } + +    status = 1; + + end: +    EVP_CIPHER_CTX_free(ctx); +    return status; +} + +int main(int argc, char **argv) +{ +    ENGINE *e; + +    CRYPTO_set_mem_debug(1); +    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); + +    ENGINE_load_builtin_engines(); + +# ifndef OPENSSL_NO_STATIC_ENGINE +    OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL); +# endif + +    e = ENGINE_by_id("afalg"); +    if (e == NULL) { +        /* +         * A failure to load is probably a platform environment problem so we +         * don't treat this as an OpenSSL test failure, i.e. we return 0 +         */ +        fprintf(stderr, +                "AFALG Test: Failed to load AFALG Engine - skipping test\n"); +        return 0; +    } + +    if (test_afalg_aes_128_cbc(e) == 0) { +        ENGINE_free(e); +        return 1; +    } + +    ENGINE_free(e); +    printf("PASS\n"); +    return 0; +} + +#else  /* OPENSSL_NO_AFALGENG */ + +int main(int argc, char **argv) +{ +    fprintf(stderr, "AFALG not supported - skipping AFALG tests\n"); +    printf("PASS\n"); +    return 0; +} + +#endif | 
