| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. | 
|  | 3 | * | 
|  | 4 | * Licensed under the OpenSSL license (the "License").  You may not use | 
|  | 5 | * this file except in compliance with the License.  You can obtain a copy | 
|  | 6 | * in the file LICENSE in the source distribution or at | 
|  | 7 | * https://www.openssl.org/source/license.html | 
|  | 8 | */ | 
|  | 9 |  | 
|  | 10 | #include <stdio.h> | 
|  | 11 | #include <openssl/opensslconf.h> | 
|  | 12 |  | 
|  | 13 | #include <string.h> | 
|  | 14 | #include <openssl/engine.h> | 
|  | 15 | #include <openssl/evp.h> | 
|  | 16 | #include <openssl/rand.h> | 
|  | 17 | #include "testutil.h" | 
|  | 18 |  | 
|  | 19 | /* Use a buffer size which is not aligned to block size */ | 
|  | 20 | #define BUFFER_SIZE     17 | 
|  | 21 |  | 
|  | 22 | #ifndef OPENSSL_NO_ENGINE | 
|  | 23 | static ENGINE *e; | 
|  | 24 |  | 
|  | 25 | static int test_afalg_aes_cbc(int keysize_idx) | 
|  | 26 | { | 
|  | 27 | EVP_CIPHER_CTX *ctx; | 
|  | 28 | const EVP_CIPHER *cipher; | 
|  | 29 | unsigned char key[] = "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" | 
|  | 30 | "\x51\x2e\x03\xd5\x34\x12\x00\x06" | 
|  | 31 | "\x06\xa9\x21\x40\x36\xb8\xa1\x5b" | 
|  | 32 | "\x51\x2e\x03\xd5\x34\x12\x00\x06"; | 
|  | 33 | unsigned char iv[] = "\x3d\xaf\xba\x42\x9d\x9e\xb4\x30" | 
|  | 34 | "\xb4\x22\xda\x80\x2c\x9f\xac\x41"; | 
|  | 35 | /* input = "Single block msg\n"  17Bytes*/ | 
|  | 36 | unsigned char in[BUFFER_SIZE] = "\x53\x69\x6e\x67\x6c\x65\x20\x62" | 
|  | 37 | "\x6c\x6f\x63\x6b\x20\x6d\x73\x67\x0a"; | 
|  | 38 | unsigned char ebuf[BUFFER_SIZE + 32]; | 
|  | 39 | unsigned char dbuf[BUFFER_SIZE + 32]; | 
|  | 40 | unsigned char encresult_128[] = "\xe3\x53\x77\x9c\x10\x79\xae\xb8" | 
|  | 41 | "\x27\x08\x94\x2d\xbe\x77\x18\x1a\x2d"; | 
|  | 42 | unsigned char encresult_192[] = "\xf7\xe4\x26\xd1\xd5\x4f\x8f\x39" | 
|  | 43 | "\xb1\x9e\xe0\xdf\x61\xb9\xc2\x55\xeb"; | 
|  | 44 | unsigned char encresult_256[] = "\xa0\x76\x85\xfd\xc1\x65\x71\x9d" | 
|  | 45 | "\xc7\xe9\x13\x6e\xae\x55\x49\xb4\x13"; | 
|  | 46 | unsigned char *enc_result = NULL; | 
|  | 47 |  | 
|  | 48 | int encl, encf, decl, decf; | 
|  | 49 | int ret = 0; | 
|  | 50 |  | 
|  | 51 | switch (keysize_idx) { | 
|  | 52 | case 0: | 
|  | 53 | cipher = EVP_aes_128_cbc(); | 
|  | 54 | enc_result = &encresult_128[0]; | 
|  | 55 | break; | 
|  | 56 | case 1: | 
|  | 57 | cipher = EVP_aes_192_cbc(); | 
|  | 58 | enc_result = &encresult_192[0]; | 
|  | 59 | break; | 
|  | 60 | case 2: | 
|  | 61 | cipher = EVP_aes_256_cbc(); | 
|  | 62 | enc_result = &encresult_256[0]; | 
|  | 63 | break; | 
|  | 64 | default: | 
|  | 65 | cipher = NULL; | 
|  | 66 | } | 
|  | 67 | if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) | 
|  | 68 | return 0; | 
|  | 69 |  | 
|  | 70 | if (!TEST_true(EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1)) | 
|  | 71 | || !TEST_true(EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE)) | 
|  | 72 | || !TEST_true(EVP_CipherFinal_ex(ctx, ebuf+encl, &encf))) | 
|  | 73 | goto end; | 
|  | 74 | encl += encf; | 
|  | 75 |  | 
|  | 76 | if (!TEST_mem_eq(enc_result, BUFFER_SIZE, ebuf, BUFFER_SIZE)) | 
|  | 77 | goto end; | 
|  | 78 |  | 
|  | 79 | if (!TEST_true(EVP_CIPHER_CTX_reset(ctx)) | 
|  | 80 | || !TEST_true(EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0)) | 
|  | 81 | || !TEST_true(EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl)) | 
|  | 82 | || !TEST_true(EVP_CipherFinal_ex(ctx, dbuf+decl, &decf))) | 
|  | 83 | goto end; | 
|  | 84 | decl += decf; | 
|  | 85 |  | 
|  | 86 | if (!TEST_int_eq(decl, BUFFER_SIZE) | 
|  | 87 | || !TEST_mem_eq(dbuf, BUFFER_SIZE, in, BUFFER_SIZE)) | 
|  | 88 | goto end; | 
|  | 89 |  | 
|  | 90 | ret = 1; | 
|  | 91 |  | 
|  | 92 | end: | 
|  | 93 | EVP_CIPHER_CTX_free(ctx); | 
|  | 94 | return ret; | 
|  | 95 | } | 
|  | 96 |  | 
|  | 97 | static int test_pr16743(void) | 
|  | 98 | { | 
|  | 99 | int ret = 0; | 
|  | 100 | const EVP_CIPHER * cipher; | 
|  | 101 | EVP_CIPHER_CTX *ctx; | 
|  | 102 |  | 
|  | 103 | if (!TEST_true(ENGINE_init(e))) | 
|  | 104 | return 0; | 
|  | 105 | cipher = ENGINE_get_cipher(e, NID_aes_128_cbc); | 
|  | 106 | ctx = EVP_CIPHER_CTX_new(); | 
|  | 107 | if (cipher != NULL && ctx != NULL) | 
|  | 108 | ret = EVP_EncryptInit_ex(ctx, cipher, e, NULL, NULL); | 
|  | 109 | TEST_true(ret); | 
|  | 110 | EVP_CIPHER_CTX_free(ctx); | 
|  | 111 | ENGINE_finish(e); | 
|  | 112 | return ret; | 
|  | 113 | } | 
|  | 114 |  | 
|  | 115 | int global_init(void) | 
|  | 116 | { | 
|  | 117 | ENGINE_load_builtin_engines(); | 
|  | 118 | # ifndef OPENSSL_NO_STATIC_ENGINE | 
|  | 119 | OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL); | 
|  | 120 | # endif | 
|  | 121 | return 1; | 
|  | 122 | } | 
|  | 123 | #endif | 
|  | 124 |  | 
|  | 125 | int setup_tests(void) | 
|  | 126 | { | 
|  | 127 | #ifndef OPENSSL_NO_ENGINE | 
|  | 128 | if ((e = ENGINE_by_id("afalg")) == NULL) { | 
|  | 129 | /* Probably a platform env issue, not a test failure. */ | 
|  | 130 | TEST_info("Can't load AFALG engine"); | 
|  | 131 | } else { | 
|  | 132 | ADD_ALL_TESTS(test_afalg_aes_cbc, 3); | 
|  | 133 | ADD_TEST(test_pr16743); | 
|  | 134 | } | 
|  | 135 | #endif | 
|  | 136 |  | 
|  | 137 | return 1; | 
|  | 138 | } | 
|  | 139 |  | 
|  | 140 | #ifndef OPENSSL_NO_ENGINE | 
|  | 141 | void cleanup_tests(void) | 
|  | 142 | { | 
|  | 143 | ENGINE_free(e); | 
|  | 144 | } | 
|  | 145 | #endif |