| /* |
| * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the OpenSSL license (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| #include <stdio.h> |
| #include <openssl/opensslconf.h> |
| |
| #ifndef OPENSSL_NO_AFALGENG |
| # include <linux/version.h> |
| # define K_MAJ 4 |
| # define K_MIN1 1 |
| # define K_MIN2 0 |
| # if LINUX_VERSION_CODE <= KERNEL_VERSION(K_MAJ, K_MIN1, K_MIN2) |
| /* |
| * If we get here then it looks like there is a mismatch between the linux |
| * headers and the actual kernel version, so we have tried to compile with |
| * afalg support, but then skipped it in e_afalg.c. As far as this test is |
| * concerned we behave as if we had been configured without support |
| */ |
| # define OPENSSL_NO_AFALGENG |
| # endif |
| #endif |
| |
| #ifndef OPENSSL_NO_AFALGENG |
| #include <string.h> |
| #include <openssl/engine.h> |
| #include <openssl/evp.h> |
| #include <openssl/rand.h> |
| |
| /* Use a buffer size which is not aligned to block size */ |
| #define BUFFER_SIZE (8 * 1024) - 13 |
| |
| static int test_afalg_aes_128_cbc(ENGINE *e) |
| { |
| EVP_CIPHER_CTX *ctx; |
| const EVP_CIPHER *cipher = EVP_aes_128_cbc(); |
| unsigned char key[] = "\x5F\x4D\xCC\x3B\x5A\xA7\x65\xD6\ |
| \x1D\x83\x27\xDE\xB8\x82\xCF\x99"; |
| unsigned char iv[] = "\x2B\x95\x99\x0A\x91\x51\x37\x4A\ |
| \xBD\x8F\xF8\xC5\xA7\xA0\xFE\x08"; |
| |
| unsigned char in[BUFFER_SIZE]; |
| unsigned char ebuf[BUFFER_SIZE + 32]; |
| unsigned char dbuf[BUFFER_SIZE + 32]; |
| int encl, encf, decl, decf; |
| unsigned int status = 0; |
| |
| ctx = EVP_CIPHER_CTX_new(); |
| if (ctx == NULL) { |
| fprintf(stderr, "%s() failed to allocate ctx\n", __func__); |
| return 0; |
| } |
| RAND_bytes(in, BUFFER_SIZE); |
| |
| if ( !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1) |
| || !EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE) |
| || !EVP_CipherFinal_ex(ctx, ebuf+encl, &encf)) { |
| fprintf(stderr, "%s() failed encryption\n", __func__); |
| goto end; |
| } |
| encl += encf; |
| |
| if ( !EVP_CIPHER_CTX_reset(ctx) |
| || !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0) |
| || !EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl) |
| || !EVP_CipherFinal_ex(ctx, dbuf+decl, &decf)) { |
| fprintf(stderr, "%s() failed decryption\n", __func__); |
| goto end; |
| } |
| decl += decf; |
| |
| if ( decl != BUFFER_SIZE |
| || memcmp(dbuf, in, BUFFER_SIZE)) { |
| fprintf(stderr, "%s() failed Dec(Enc(P)) != P\n", __func__); |
| goto end; |
| } |
| |
| status = 1; |
| |
| end: |
| EVP_CIPHER_CTX_free(ctx); |
| return status; |
| } |
| |
| int main(int argc, char **argv) |
| { |
| ENGINE *e; |
| |
| CRYPTO_set_mem_debug(1); |
| CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); |
| |
| ENGINE_load_builtin_engines(); |
| |
| # ifndef OPENSSL_NO_STATIC_ENGINE |
| OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL); |
| # endif |
| |
| e = ENGINE_by_id("afalg"); |
| if (e == NULL) { |
| /* |
| * A failure to load is probably a platform environment problem so we |
| * don't treat this as an OpenSSL test failure, i.e. we return 0 |
| */ |
| fprintf(stderr, |
| "AFALG Test: Failed to load AFALG Engine - skipping test\n"); |
| return 0; |
| } |
| |
| if (test_afalg_aes_128_cbc(e) == 0) { |
| ENGINE_free(e); |
| return 1; |
| } |
| |
| ENGINE_free(e); |
| printf("PASS\n"); |
| return 0; |
| } |
| |
| #else /* OPENSSL_NO_AFALGENG */ |
| |
| int main(int argc, char **argv) |
| { |
| fprintf(stderr, "AFALG not supported - skipping AFALG tests\n"); |
| printf("PASS\n"); |
| return 0; |
| } |
| |
| #endif |