| /* Written by Ben Laurie, 2001 */ |
| /* |
| * Copyright (c) 2001 The OpenSSL Project. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * 3. All advertising materials mentioning features or use of this |
| * software must display the following acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" |
| * |
| * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
| * endorse or promote products derived from this software without |
| * prior written permission. For written permission, please contact |
| * openssl-core@openssl.org. |
| * |
| * 5. Products derived from this software may not be called "OpenSSL" |
| * nor may "OpenSSL" appear in their names without prior written |
| * permission of the OpenSSL Project. |
| * |
| * 6. Redistributions of any form whatsoever must retain the following |
| * acknowledgment: |
| * "This product includes software developed by the OpenSSL Project |
| * for use in the OpenSSL Toolkit (http://www.openssl.org/)" |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
| * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
| * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
| * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
| * OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include <stdio.h> |
| #include <string.h> |
| |
| #include "../e_os.h" |
| |
| #include <openssl/opensslconf.h> |
| #include <openssl/evp.h> |
| #ifndef OPENSSL_NO_ENGINE |
| #include <openssl/engine.h> |
| #endif |
| #include <openssl/err.h> |
| #include <openssl/conf.h> |
| |
| static void hexdump(FILE *f,const char *title,const unsigned char *s,int l) |
| { |
| int n=0; |
| |
| fprintf(f,"%s",title); |
| for( ; n < l ; ++n) |
| { |
| if((n%16) == 0) |
| fprintf(f,"\n%04x",n); |
| fprintf(f," %02x",s[n]); |
| } |
| fprintf(f,"\n"); |
| } |
| |
| static int convert(unsigned char *s) |
| { |
| unsigned char *d; |
| |
| for(d=s ; *s ; s+=2,++d) |
| { |
| unsigned int n; |
| |
| if(!s[1]) |
| { |
| fprintf(stderr,"Odd number of hex digits!"); |
| EXIT(4); |
| } |
| sscanf((char *)s,"%2x",&n); |
| *d=(unsigned char)n; |
| } |
| return s-d; |
| } |
| |
| static char *sstrsep(char **string, const char *delim) |
| { |
| char isdelim[256]; |
| char *token = *string; |
| |
| if (**string == 0) |
| return NULL; |
| |
| memset(isdelim, 0, 256); |
| isdelim[0] = 1; |
| |
| while (*delim) |
| { |
| isdelim[(unsigned char)(*delim)] = 1; |
| delim++; |
| } |
| |
| while (!isdelim[(unsigned char)(**string)]) |
| { |
| (*string)++; |
| } |
| |
| if (**string) |
| { |
| **string = 0; |
| (*string)++; |
| } |
| |
| return token; |
| } |
| |
| static unsigned char *ustrsep(char **p,const char *sep) |
| { return (unsigned char *)sstrsep(p,sep); } |
| |
| static int test1_exit(int ec) |
| { |
| EXIT(ec); |
| return(0); /* To keep some compilers quiet */ |
| } |
| |
| static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn, |
| const unsigned char *iv,int in, |
| const unsigned char *plaintext,int pn, |
| const unsigned char *ciphertext,int cn, |
| int encdec) |
| { |
| EVP_CIPHER_CTX ctx; |
| unsigned char out[4096]; |
| int outl,outl2; |
| |
| printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), |
| (encdec == 1 ? "(encrypt)" : (encdec == 0 ? "(decrypt)" : "(encrypt/decrypt)"))); |
| hexdump(stdout,"Key",key,kn); |
| if(in) |
| hexdump(stdout,"IV",iv,in); |
| hexdump(stdout,"Plaintext",plaintext,pn); |
| hexdump(stdout,"Ciphertext",ciphertext,cn); |
| |
| if(kn != c->key_len) |
| { |
| fprintf(stderr,"Key length doesn't match, got %d expected %lu\n",kn, |
| (unsigned long)c->key_len); |
| test1_exit(5); |
| } |
| EVP_CIPHER_CTX_init(&ctx); |
| if (encdec != 0) |
| { |
| if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv)) |
| { |
| fprintf(stderr,"EncryptInit failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(10); |
| } |
| EVP_CIPHER_CTX_set_padding(&ctx,0); |
| |
| if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn)) |
| { |
| fprintf(stderr,"Encrypt failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(6); |
| } |
| if(!EVP_EncryptFinal_ex(&ctx,out+outl,&outl2)) |
| { |
| fprintf(stderr,"EncryptFinal failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(7); |
| } |
| |
| if(outl+outl2 != cn) |
| { |
| fprintf(stderr,"Ciphertext length mismatch got %d expected %d\n", |
| outl+outl2,cn); |
| test1_exit(8); |
| } |
| |
| if(memcmp(out,ciphertext,cn)) |
| { |
| fprintf(stderr,"Ciphertext mismatch\n"); |
| hexdump(stderr,"Got",out,cn); |
| hexdump(stderr,"Expected",ciphertext,cn); |
| test1_exit(9); |
| } |
| } |
| |
| if (encdec <= 0) |
| { |
| if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv)) |
| { |
| fprintf(stderr,"DecryptInit failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(11); |
| } |
| EVP_CIPHER_CTX_set_padding(&ctx,0); |
| |
| if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) |
| { |
| fprintf(stderr,"Decrypt failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(6); |
| } |
| if(!EVP_DecryptFinal_ex(&ctx,out+outl,&outl2)) |
| { |
| fprintf(stderr,"DecryptFinal failed\n"); |
| ERR_print_errors_fp(stderr); |
| test1_exit(7); |
| } |
| |
| if(outl+outl2 != pn) |
| { |
| fprintf(stderr,"Plaintext length mismatch got %d expected %d\n", |
| outl+outl2,pn); |
| test1_exit(8); |
| } |
| |
| if(memcmp(out,plaintext,pn)) |
| { |
| fprintf(stderr,"Plaintext mismatch\n"); |
| hexdump(stderr,"Got",out,pn); |
| hexdump(stderr,"Expected",plaintext,pn); |
| test1_exit(9); |
| } |
| } |
| |
| EVP_CIPHER_CTX_cleanup(&ctx); |
| |
| printf("\n"); |
| } |
| |
| static int test_cipher(const char *cipher,const unsigned char *key,int kn, |
| const unsigned char *iv,int in, |
| const unsigned char *plaintext,int pn, |
| const unsigned char *ciphertext,int cn, |
| int encdec) |
| { |
| const EVP_CIPHER *c; |
| |
| c=EVP_get_cipherbyname(cipher); |
| if(!c) |
| return 0; |
| |
| test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); |
| |
| return 1; |
| } |
| |
| static int test_digest(const char *digest, |
| const unsigned char *plaintext,int pn, |
| const unsigned char *ciphertext, unsigned int cn) |
| { |
| const EVP_MD *d; |
| EVP_MD_CTX ctx; |
| unsigned char md[EVP_MAX_MD_SIZE]; |
| unsigned int mdn; |
| |
| d=EVP_get_digestbyname(digest); |
| if(!d) |
| return 0; |
| |
| printf("Testing digest %s\n",EVP_MD_name(d)); |
| hexdump(stdout,"Plaintext",plaintext,pn); |
| hexdump(stdout,"Digest",ciphertext,cn); |
| |
| EVP_MD_CTX_init(&ctx); |
| if(!EVP_DigestInit_ex(&ctx,d, NULL)) |
| { |
| fprintf(stderr,"DigestInit failed\n"); |
| ERR_print_errors_fp(stderr); |
| EXIT(100); |
| } |
| if(!EVP_DigestUpdate(&ctx,plaintext,pn)) |
| { |
| fprintf(stderr,"DigestUpdate failed\n"); |
| ERR_print_errors_fp(stderr); |
| EXIT(101); |
| } |
| if(!EVP_DigestFinal_ex(&ctx,md,&mdn)) |
| { |
| fprintf(stderr,"DigestFinal failed\n"); |
| ERR_print_errors_fp(stderr); |
| EXIT(101); |
| } |
| EVP_MD_CTX_cleanup(&ctx); |
| |
| if(mdn != cn) |
| { |
| fprintf(stderr,"Digest length mismatch, got %d expected %d\n",mdn,cn); |
| EXIT(102); |
| } |
| |
| if(memcmp(md,ciphertext,cn)) |
| { |
| fprintf(stderr,"Digest mismatch\n"); |
| hexdump(stderr,"Got",md,cn); |
| hexdump(stderr,"Expected",ciphertext,cn); |
| EXIT(103); |
| } |
| |
| printf("\n"); |
| |
| EVP_MD_CTX_cleanup(&ctx); |
| |
| return 1; |
| } |
| |
| int main(int argc,char **argv) |
| { |
| const char *szTestFile; |
| FILE *f; |
| |
| if(argc != 2) |
| { |
| fprintf(stderr,"%s <test file>\n",argv[0]); |
| EXIT(1); |
| } |
| CRYPTO_malloc_debug_init(); |
| CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL); |
| CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); |
| |
| szTestFile=argv[1]; |
| |
| f=fopen(szTestFile,"r"); |
| if(!f) |
| { |
| perror(szTestFile); |
| EXIT(2); |
| } |
| |
| /* Load up the software EVP_CIPHER and EVP_MD definitions */ |
| OpenSSL_add_all_ciphers(); |
| OpenSSL_add_all_digests(); |
| #ifndef OPENSSL_NO_ENGINE |
| /* Load all compiled-in ENGINEs */ |
| ENGINE_load_builtin_engines(); |
| #endif |
| #if 0 |
| OPENSSL_config(); |
| #endif |
| #ifndef OPENSSL_NO_ENGINE |
| /* Register all available ENGINE implementations of ciphers and digests. |
| * This could perhaps be changed to "ENGINE_register_all_complete()"? */ |
| ENGINE_register_all_ciphers(); |
| ENGINE_register_all_digests(); |
| /* If we add command-line options, this statement should be switchable. |
| * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if |
| * they weren't already initialised. */ |
| /* ENGINE_set_cipher_flags(ENGINE_CIPHER_FLAG_NOINIT); */ |
| #endif |
| |
| for( ; ; ) |
| { |
| char line[4096]; |
| char *p; |
| char *cipher; |
| unsigned char *iv,*key,*plaintext,*ciphertext; |
| int encdec; |
| int kn,in,pn,cn; |
| |
| if(!fgets((char *)line,sizeof line,f)) |
| break; |
| if(line[0] == '#' || line[0] == '\n') |
| continue; |
| p=line; |
| cipher=sstrsep(&p,":"); |
| key=ustrsep(&p,":"); |
| iv=ustrsep(&p,":"); |
| plaintext=ustrsep(&p,":"); |
| ciphertext=ustrsep(&p,":"); |
| if (p[-1] == '\n') { |
| p[-1] = '\0'; |
| encdec = -1; |
| } else { |
| encdec = atoi(sstrsep(&p,"\n")); |
| } |
| |
| |
| kn=convert(key); |
| in=convert(iv); |
| pn=convert(plaintext); |
| cn=convert(ciphertext); |
| |
| if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) |
| && !test_digest(cipher,plaintext,pn,ciphertext,cn)) |
| { |
| #ifdef OPENSSL_NO_AES |
| if (strstr(cipher, "AES") == cipher) |
| { |
| fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); |
| continue; |
| } |
| #endif |
| #ifdef OPENSSL_NO_DES |
| if (strstr(cipher, "DES") == cipher) |
| { |
| fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); |
| continue; |
| } |
| #endif |
| #ifdef OPENSSL_NO_RC4 |
| if (strstr(cipher, "RC4") == cipher) |
| { |
| fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); |
| continue; |
| } |
| #endif |
| #ifdef OPENSSL_NO_CAMELLIA |
| if (strstr(cipher, "CAMELLIA") == cipher) |
| { |
| fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); |
| continue; |
| } |
| #endif |
| #ifdef OPENSSL_NO_SEED |
| if (strstr(cipher, "SEED") == cipher) |
| { |
| fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); |
| continue; |
| } |
| #endif |
| fprintf(stderr,"Can't find %s\n",cipher); |
| EXIT(3); |
| } |
| } |
| fclose(f); |
| |
| #ifndef OPENSSL_NO_ENGINE |
| ENGINE_cleanup(); |
| #endif |
| EVP_cleanup(); |
| CRYPTO_cleanup_all_ex_data(); |
| ERR_remove_thread_state(NULL); |
| ERR_free_strings(); |
| CRYPTO_mem_leaks_fp(stderr); |
| |
| return 0; |
| } |