提交 52924399 编写于 作者: R Rich Salz

Convert afalgtest

Reviewed-by: NAndy Polyakov <appro@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3229)
上级 0c44545c
...@@ -27,15 +27,19 @@ ...@@ -27,15 +27,19 @@
#endif #endif
#ifndef OPENSSL_NO_AFALGENG #ifndef OPENSSL_NO_AFALGENG
/* #if 1 */
#include <string.h> #include <string.h>
#include <openssl/engine.h> #include <openssl/engine.h>
#include <openssl/evp.h> #include <openssl/evp.h>
#include <openssl/rand.h> #include <openssl/rand.h>
#include "testutil.h"
/* Use a buffer size which is not aligned to block size */ /* Use a buffer size which is not aligned to block size */
#define BUFFER_SIZE (8 * 1024) - 13 #define BUFFER_SIZE (8 * 1024) - 13
static int test_afalg_aes_128_cbc(ENGINE *e) static ENGINE *e;
static int test_afalg_aes_128_cbc(void)
{ {
EVP_CIPHER_CTX *ctx; EVP_CIPHER_CTX *ctx;
const EVP_CIPHER *cipher = EVP_aes_128_cbc(); const EVP_CIPHER *cipher = EVP_aes_128_cbc();
...@@ -48,77 +52,57 @@ static int test_afalg_aes_128_cbc(ENGINE *e) ...@@ -48,77 +52,57 @@ static int test_afalg_aes_128_cbc(ENGINE *e)
unsigned char ebuf[BUFFER_SIZE + 32]; unsigned char ebuf[BUFFER_SIZE + 32];
unsigned char dbuf[BUFFER_SIZE + 32]; unsigned char dbuf[BUFFER_SIZE + 32];
int encl, encf, decl, decf; int encl, encf, decl, decf;
unsigned int status = 0; int ret = 0;
ctx = EVP_CIPHER_CTX_new(); if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new()))
if (ctx == NULL) { return 0;
fprintf(stderr, "%s() failed to allocate ctx\n", __func__);
return 0;
}
RAND_bytes(in, BUFFER_SIZE); RAND_bytes(in, BUFFER_SIZE);
if ( !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1) if (!TEST_true(EVP_CipherInit_ex(ctx, cipher, e, key, iv, 1))
|| !EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE) || !TEST_true(EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE))
|| !EVP_CipherFinal_ex(ctx, ebuf+encl, &encf)) { || !TEST_true(EVP_CipherFinal_ex(ctx, ebuf+encl, &encf)))
fprintf(stderr, "%s() failed encryption\n", __func__);
goto end; goto end;
}
encl += encf; encl += encf;
if ( !EVP_CIPHER_CTX_reset(ctx) if (!TEST_true(EVP_CIPHER_CTX_reset(ctx))
|| !EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0) || !TEST_true(EVP_CipherInit_ex(ctx, cipher, e, key, iv, 0))
|| !EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl) || !TEST_true(EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl))
|| !EVP_CipherFinal_ex(ctx, dbuf+decl, &decf)) { || !TEST_true(EVP_CipherFinal_ex(ctx, dbuf+decl, &decf)))
fprintf(stderr, "%s() failed decryption\n", __func__);
goto end; goto end;
}
decl += decf; decl += decf;
if ( decl != BUFFER_SIZE if (!TEST_int_eq(decl, BUFFER_SIZE)
|| memcmp(dbuf, in, BUFFER_SIZE)) { || !TEST_mem_eq(dbuf, BUFFER_SIZE, in, BUFFER_SIZE))
fprintf(stderr, "%s() failed Dec(Enc(P)) != P\n", __func__);
goto end; goto end;
}
status = 1; ret = 1;
end: end:
EVP_CIPHER_CTX_free(ctx); EVP_CIPHER_CTX_free(ctx);
return status; return ret;
} }
int main(int argc, char **argv) int main(int argc, char **argv)
{ {
ENGINE *e; int ret = 0;
CRYPTO_set_mem_debug(1);
CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
ENGINE_load_builtin_engines(); ENGINE_load_builtin_engines();
# ifndef OPENSSL_NO_STATIC_ENGINE # ifndef OPENSSL_NO_STATIC_ENGINE
OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL); OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL);
# endif # endif
e = ENGINE_by_id("afalg"); setup_test();
if (e == NULL) {
/*
* A failure to load is probably a platform environment problem so we
* don't treat this as an OpenSSL test failure, i.e. we return 0
*/
fprintf(stderr,
"AFALG Test: Failed to load AFALG Engine - skipping test\n");
return 0;
}
if (test_afalg_aes_128_cbc(e) == 0) { if ((e = ENGINE_by_id("afalg")) == NULL) {
ENGINE_free(e); /* Probably a platform env issue, not a test failure. */
return 1; TEST_info("Can't load AFALG engine");
} else {
ADD_TEST(test_afalg_aes_128_cbc);
} }
ret = run_tests(argv[0]);
ENGINE_free(e); ENGINE_free(e);
printf("PASS\n"); return finish_test(ret);
return 0;
} }
#else /* OPENSSL_NO_AFALGENG */ #else /* OPENSSL_NO_AFALGENG */
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册