mirror of
https://github.com/openssl/openssl.git
synced 2024-11-21 01:15:20 +08:00
440e5d805f
Reviewed-by: Richard Levitte <levitte@openssl.org>
129 lines
3.4 KiB
C
129 lines
3.4 KiB
C
/*
|
|
* Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#ifndef OPENSSL_NO_AFALGENG
|
|
# include <linux/version.h>
|
|
# define K_MAJ 4
|
|
# define K_MIN1 1
|
|
# define K_MIN2 0
|
|
# if LINUX_VERSION_CODE <= KERNEL_VERSION(K_MAJ, K_MIN1, K_MIN2)
|
|
/*
|
|
* If we get here then it looks like there is a mismatch between the linux
|
|
* headers and the actual kernel version, so we have tried to compile with
|
|
* afalg support, but then skipped it in e_afalg.c. As far as this test is
|
|
* concerned we behave as if we had been configured without support
|
|
*/
|
|
# define OPENSSL_NO_AFALGENG
|
|
# endif
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_AFALGENG
|
|
#include <string.h>
|
|
#include <openssl/engine.h>
|
|
#include <openssl/evp.h>
|
|
#include <openssl/rand.h>
|
|
|
|
/* Use a buffer size which is not aligned to block size */
|
|
#define BUFFER_SIZE (8 * 1024) - 13
|
|
|
|
static int test_afalg_aes_128_cbc(ENGINE *e)
|
|
{
|
|
EVP_CIPHER_CTX *ctx;
|
|
const EVP_CIPHER *cipher = EVP_aes_128_cbc();
|
|
unsigned char key[] = "\x5F\x4D\xCC\x3B\x5A\xA7\x65\xD6\
|
|
\x1D\x83\x27\xDE\xB8\x82\xCF\x99";
|
|
unsigned char iv[] = "\x2B\x95\x99\x0A\x91\x51\x37\x4A\
|
|
\xBD\x8F\xF8\xC5\xA7\xA0\xFE\x08";
|
|
|
|
unsigned char in[BUFFER_SIZE];
|
|
unsigned char ebuf[BUFFER_SIZE + 32];
|
|
unsigned char dbuf[BUFFER_SIZE + 32];
|
|
int encl, encf, decl, decf;
|
|
unsigned int status = 0;
|
|
|
|
ctx = EVP_CIPHER_CTX_new();
|
|
if (ctx == NULL) {
|
|
fprintf(stderr, "%s() failed to allocate ctx\n", __func__);
|
|
return 0;
|
|
}
|
|
RAND_bytes(in, BUFFER_SIZE);
|
|
|
|
if ( !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1)
|
|
|| !EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE)
|
|
|| !EVP_CipherFinal_ex(ctx, ebuf+encl, &encf)) {
|
|
fprintf(stderr, "%s() failed encryption\n", __func__);
|
|
goto end;
|
|
}
|
|
encl += encf;
|
|
|
|
if ( !EVP_CIPHER_CTX_reset(ctx)
|
|
|| !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0)
|
|
|| !EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl)
|
|
|| !EVP_CipherFinal_ex(ctx, dbuf+decl, &decf)) {
|
|
fprintf(stderr, "%s() failed decryption\n", __func__);
|
|
goto end;
|
|
}
|
|
decl += decf;
|
|
|
|
if ( decl != BUFFER_SIZE
|
|
|| memcmp(dbuf, in, BUFFER_SIZE)) {
|
|
fprintf(stderr, "%s() failed Dec(Enc(P)) != P\n", __func__);
|
|
goto end;
|
|
}
|
|
|
|
status = 1;
|
|
|
|
end:
|
|
EVP_CIPHER_CTX_free(ctx);
|
|
return status;
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
ENGINE *e;
|
|
|
|
CRYPTO_set_mem_debug(1);
|
|
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
|
|
|
|
ENGINE_load_builtin_engines();
|
|
|
|
# ifndef OPENSSL_NO_STATIC_ENGINE
|
|
OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL);
|
|
# endif
|
|
|
|
e = ENGINE_by_id("afalg");
|
|
if (e == NULL) {
|
|
fprintf(stderr, "AFALG Test: Failed to load AFALG Engine\n");
|
|
return 1;
|
|
}
|
|
|
|
if (test_afalg_aes_128_cbc(e) == 0) {
|
|
ENGINE_free(e);
|
|
return 1;
|
|
}
|
|
|
|
ENGINE_free(e);
|
|
printf("PASS\n");
|
|
return 0;
|
|
}
|
|
|
|
#else /* OPENSSL_NO_AFALGENG */
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
fprintf(stderr, "AFALG not supported - skipping AFALG tests\n");
|
|
printf("PASS\n");
|
|
return 0;
|
|
}
|
|
|
|
#endif
|