| /* |
| * Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| #include <stdio.h> |
| #include <string.h> |
| #include <openssl/evp.h> |
| #include <openssl/bio.h> |
| #include <openssl/rand.h> |
| |
| #include "testutil.h" |
| |
| #define ENCRYPT 1 |
| #define DECRYPT 0 |
| |
| #define DATA_SIZE 1024 |
| #define MAX_IV 32 |
| #define BUF_SIZE (DATA_SIZE + MAX_IV) |
| |
| static const unsigned char KEY[] = { |
| 0x51, 0x50, 0xd1, 0x77, 0x2f, 0x50, 0x83, 0x4a, |
| 0x50, 0x3e, 0x06, 0x9a, 0x97, 0x3f, 0xbd, 0x7c, |
| 0xe6, 0x1c, 0x43, 0x2b, 0x72, 0x0b, 0x19, 0xd1, |
| 0x8e, 0xc8, 0xd8, 0x4b, 0xdc, 0x63, 0x15, 0x1b |
| }; |
| |
| static const unsigned char IV[] = { |
| 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, |
| 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, |
| 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, |
| 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08 |
| }; |
| |
| static int do_bio_cipher(const EVP_CIPHER *cipher, const unsigned char *key, |
| const unsigned char *iv) |
| { |
| BIO *b, *mem; |
| static unsigned char inp[BUF_SIZE] = { 0 }; |
| unsigned char out[BUF_SIZE], ref[BUF_SIZE]; |
| int i, lref, len, tmplen; |
| |
| /* Fill buffer with non-zero data so that over steps can be detected */ |
| if (!TEST_int_gt(RAND_bytes(inp, DATA_SIZE), 0)) |
| return 0; |
| |
| /* Encrypt tests */ |
| |
| /* reference output for single-chunk operation */ |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) |
| goto err; |
| mem = BIO_new_mem_buf(inp, DATA_SIZE); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| lref = BIO_read(b, ref, sizeof(ref)); |
| BIO_free_all(b); |
| |
| /* perform split operations and compare to reference */ |
| for (i = 1; i < lref; i++) { |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { |
| TEST_info("Split encrypt failed @ operation %d", i); |
| goto err; |
| } |
| mem = BIO_new_mem_buf(inp, DATA_SIZE); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| memset(out, 0, sizeof(out)); |
| out[i] = ~ref[i]; |
| tmplen = BIO_read(b, out, i); |
| if (tmplen < 0) |
| goto err; |
| len = tmplen; |
| /* check for overstep */ |
| if (!TEST_uchar_eq(out[i], (unsigned char)~ref[i])) { |
| TEST_info("Encrypt overstep check failed @ operation %d", i); |
| goto err; |
| } |
| tmplen = BIO_read(b, out + len, sizeof(out) - len); |
| if (tmplen < 0) |
| goto err; |
| len += tmplen; |
| |
| BIO_free_all(b); |
| |
| if (!TEST_mem_eq(out, len, ref, lref)) { |
| TEST_info("Encrypt compare failed @ operation %d", i); |
| return 0; |
| } |
| } |
| |
| /* perform small-chunk operations and compare to reference */ |
| for (i = 1; i < lref / 2; i++) { |
| int delta; |
| |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) { |
| TEST_info("Small chunk encrypt failed @ operation %d", i); |
| goto err; |
| } |
| mem = BIO_new_mem_buf(inp, DATA_SIZE); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| memset(out, 0, sizeof(out)); |
| for (len = 0; (delta = BIO_read(b, out + len, i));) { |
| len += delta; |
| } |
| BIO_free_all(b); |
| |
| if (!TEST_mem_eq(out, len, ref, lref)) { |
| TEST_info("Small chunk encrypt compare failed @ operation %d", i); |
| return 0; |
| } |
| } |
| |
| /* Decrypt tests */ |
| |
| /* reference output for single-chunk operation */ |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) |
| goto err; |
| /* Use original reference output as input */ |
| mem = BIO_new_mem_buf(ref, lref); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| #if 0 |
| /* |
| * This is wrong to do, it always fails, and incorrectly ends up |
| * calling `EVP_CipherFinal()` and setting ctx->finished = 1, ... |
| * all of which are unwanted. But just deleting this is less |
| * instructive to future readers of the code. Don't call BIO_flush |
| * until you're done either reading or writing and want to finalise |
| * the state. |
| */ |
| (void)BIO_flush(b); |
| #endif |
| memset(out, 0, sizeof(out)); |
| len = BIO_read(b, out, sizeof(out)); |
| BIO_free_all(b); |
| |
| if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) |
| return 0; |
| |
| /* perform split operations and compare to reference */ |
| for (i = 1; i < lref; i++) { |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { |
| TEST_info("Split decrypt failed @ operation %d", i); |
| goto err; |
| } |
| mem = BIO_new_mem_buf(ref, lref); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| memset(out, 0, sizeof(out)); |
| out[i] = ~ref[i]; |
| len = BIO_read(b, out, i); |
| /* check for overstep */ |
| if (!TEST_uchar_eq(out[i], (unsigned char)~ref[i])) { |
| TEST_info("Decrypt overstep check failed @ operation %d", i); |
| goto err; |
| } |
| len += BIO_read(b, out + len, sizeof(out) - len); |
| BIO_free_all(b); |
| |
| if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) { |
| TEST_info("Decrypt compare failed @ operation %d", i); |
| return 0; |
| } |
| } |
| |
| /* perform small-chunk operations and compare to reference */ |
| for (i = 1; i < lref / 2; i++) { |
| int delta; |
| |
| b = BIO_new(BIO_f_cipher()); |
| if (!TEST_ptr(b)) |
| return 0; |
| if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) { |
| TEST_info("Small chunk decrypt failed @ operation %d", i); |
| goto err; |
| } |
| mem = BIO_new_mem_buf(ref, lref); |
| if (!TEST_ptr(mem)) |
| goto err; |
| BIO_push(b, mem); |
| memset(out, 0, sizeof(out)); |
| for (len = 0; (delta = BIO_read(b, out + len, i));) { |
| len += delta; |
| } |
| BIO_free_all(b); |
| |
| if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) { |
| TEST_info("Small chunk decrypt compare failed @ operation %d", i); |
| return 0; |
| } |
| } |
| |
| return 1; |
| |
| err: |
| BIO_free_all(b); |
| return 0; |
| } |
| |
| static int do_test_bio_cipher(const EVP_CIPHER *cipher, int idx) |
| { |
| switch (idx) { |
| case 0: |
| return do_bio_cipher(cipher, KEY, NULL); |
| case 1: |
| return do_bio_cipher(cipher, KEY, IV); |
| } |
| return 0; |
| } |
| |
| static int test_bio_enc_aes_128_cbc(int idx) |
| { |
| return do_test_bio_cipher(EVP_aes_128_cbc(), idx); |
| } |
| |
| static int test_bio_enc_aes_128_ctr(int idx) |
| { |
| return do_test_bio_cipher(EVP_aes_128_ctr(), idx); |
| } |
| |
| static int test_bio_enc_aes_256_cfb(int idx) |
| { |
| return do_test_bio_cipher(EVP_aes_256_cfb(), idx); |
| } |
| |
| static int test_bio_enc_aes_256_ofb(int idx) |
| { |
| return do_test_bio_cipher(EVP_aes_256_ofb(), idx); |
| } |
| |
| #ifndef OPENSSL_NO_CHACHA |
| static int test_bio_enc_chacha20(int idx) |
| { |
| return do_test_bio_cipher(EVP_chacha20(), idx); |
| } |
| |
| #ifndef OPENSSL_NO_POLY1305 |
| static int test_bio_enc_chacha20_poly1305(int idx) |
| { |
| return do_test_bio_cipher(EVP_chacha20_poly1305(), idx); |
| } |
| #endif |
| #endif |
| |
| static int test_bio_enc_eof_read_flush(void) |
| { |
| /* Length chosen to ensure base64 encoding employs padding */ |
| const unsigned char pbuf[] = "Attack at dawn"; |
| unsigned char cbuf[16]; /* At least as long as pbuf */ |
| const EVP_CIPHER *cipher = EVP_aes_256_gcm(); |
| EVP_CIPHER_CTX *ctx = NULL; |
| BIO *mem = NULL, *b64 = NULL, *cbio = NULL; |
| unsigned char tag[16]; |
| int key_size, iv_size; |
| int n, ret = 0; |
| |
| memset(tag, 0, sizeof(tag)); |
| if (!TEST_ptr(cipher) |
| || !TEST_int_gt((key_size = EVP_CIPHER_key_length(cipher)), 0) |
| || !TEST_int_gt((iv_size = EVP_CIPHER_iv_length(cipher)), 0) |
| || !TEST_ptr(mem = BIO_new(BIO_s_mem())) |
| || !TEST_ptr(b64 = BIO_new(BIO_f_base64())) |
| || !TEST_ptr(cbio = BIO_new(BIO_f_cipher())) |
| || !TEST_ptr(BIO_push(b64, mem)) |
| || !TEST_ptr(BIO_push(cbio, b64)) |
| || !TEST_int_gt(BIO_get_cipher_ctx(cbio, &ctx), 0) |
| || !TEST_true(EVP_CipherInit_ex(ctx, cipher, NULL, KEY, IV, ENCRYPT)) |
| || !TEST_int_gt(BIO_write(cbio, pbuf, sizeof(pbuf) - 1), 0) |
| || !TEST_int_gt(BIO_flush(cbio), 0) |
| || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG, |
| sizeof(tag), tag), |
| 0)) |
| goto end; |
| BIO_free(cbio); |
| BIO_free(b64); |
| b64 = cbio = NULL; |
| |
| BIO_set_mem_eof_return(mem, 0); |
| BIO_set_flags(mem, BIO_FLAGS_NONCLEAR_RST); |
| if (!TEST_int_gt(BIO_reset(mem), 0) |
| || !TEST_ptr(b64 = BIO_new(BIO_f_base64())) |
| || !TEST_ptr(cbio = BIO_new(BIO_f_cipher())) |
| || !TEST_ptr(BIO_push(b64, mem)) |
| || !TEST_ptr(BIO_push(cbio, b64)) |
| || !TEST_int_gt(BIO_get_cipher_ctx(cbio, &ctx), 0) |
| || !TEST_true(EVP_CipherInit_ex(ctx, cipher, NULL, KEY, IV, DECRYPT)) |
| || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, |
| sizeof(tag), tag), |
| 0) |
| || !TEST_int_gt((n = BIO_read(cbio, cbuf, sizeof(cbuf))), 0) |
| || !TEST_true(BIO_get_cipher_status(cbio)) |
| /* Evaluate both and report whether either or both failed */ |
| || (!TEST_int_gt(BIO_flush(cbio), 0) + !TEST_true(BIO_get_cipher_status(cbio))) |
| || !TEST_mem_eq(cbuf, n, pbuf, sizeof(pbuf) - 1)) |
| goto end; |
| |
| ret = 1; |
| |
| end: |
| BIO_free(cbio); |
| BIO_free(b64); |
| BIO_free(mem); |
| return ret; |
| } |
| |
| int setup_tests(void) |
| { |
| ADD_ALL_TESTS(test_bio_enc_aes_128_cbc, 2); |
| ADD_ALL_TESTS(test_bio_enc_aes_128_ctr, 2); |
| ADD_ALL_TESTS(test_bio_enc_aes_256_cfb, 2); |
| ADD_ALL_TESTS(test_bio_enc_aes_256_ofb, 2); |
| #ifndef OPENSSL_NO_CHACHA |
| ADD_ALL_TESTS(test_bio_enc_chacha20, 2); |
| #ifndef OPENSSL_NO_POLY1305 |
| ADD_ALL_TESTS(test_bio_enc_chacha20_poly1305, 2); |
| #endif |
| #endif |
| ADD_TEST(test_bio_enc_eof_read_flush); |
| return 1; |
| } |