123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337 |
- /*
- * Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #include <stdio.h>
- #include <string.h>
- #include <openssl/evp.h>
- #include <openssl/bio.h>
- #include <openssl/rand.h>
- #include "testutil.h"
- #define ENCRYPT 1
- #define DECRYPT 0
- #define DATA_SIZE 1024
- #define MAX_IV 32
- #define BUF_SIZE (DATA_SIZE + MAX_IV)
- static const unsigned char KEY[] = {
- 0x51, 0x50, 0xd1, 0x77, 0x2f, 0x50, 0x83, 0x4a,
- 0x50, 0x3e, 0x06, 0x9a, 0x97, 0x3f, 0xbd, 0x7c,
- 0xe6, 0x1c, 0x43, 0x2b, 0x72, 0x0b, 0x19, 0xd1,
- 0x8e, 0xc8, 0xd8, 0x4b, 0xdc, 0x63, 0x15, 0x1b
- };
- static const unsigned char IV[] = {
- 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
- 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
- 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
- 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08
- };
- static int do_bio_cipher(const EVP_CIPHER* cipher, const unsigned char* key,
- const unsigned char* iv)
- {
- BIO *b, *mem;
- static unsigned char inp[BUF_SIZE] = { 0 };
- unsigned char out[BUF_SIZE], ref[BUF_SIZE];
- int i, lref, len;
- /* Fill buffer with non-zero data so that over steps can be detected */
- if (!TEST_int_gt(RAND_bytes(inp, DATA_SIZE), 0))
- return 0;
- /* Encrypt tests */
- /* reference output for single-chunk operation */
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT)))
- goto err;
- mem = BIO_new_mem_buf(inp, DATA_SIZE);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- lref = BIO_read(b, ref, sizeof(ref));
- BIO_free_all(b);
- /* perform split operations and compare to reference */
- for (i = 1; i < lref; i++) {
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) {
- TEST_info("Split encrypt failed @ operation %d", i);
- goto err;
- }
- mem = BIO_new_mem_buf(inp, DATA_SIZE);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- memset(out, 0, sizeof(out));
- out[i] = ~ref[i];
- len = BIO_read(b, out, i);
- /* check for overstep */
- if (!TEST_uchar_eq(out[i], (unsigned char)~ref[i])) {
- TEST_info("Encrypt overstep check failed @ operation %d", i);
- goto err;
- }
- len += BIO_read(b, out + len, sizeof(out) - len);
- BIO_free_all(b);
- if (!TEST_mem_eq(out, len, ref, lref)) {
- TEST_info("Encrypt compare failed @ operation %d", i);
- return 0;
- }
- }
- /* perform small-chunk operations and compare to reference */
- for (i = 1; i < lref / 2; i++) {
- int delta;
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, ENCRYPT))) {
- TEST_info("Small chunk encrypt failed @ operation %d", i);
- goto err;
- }
- mem = BIO_new_mem_buf(inp, DATA_SIZE);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- memset(out, 0, sizeof(out));
- for (len = 0; (delta = BIO_read(b, out + len, i)); ) {
- len += delta;
- }
- BIO_free_all(b);
- if (!TEST_mem_eq(out, len, ref, lref)) {
- TEST_info("Small chunk encrypt compare failed @ operation %d", i);
- return 0;
- }
- }
- /* Decrypt tests */
- /* reference output for single-chunk operation */
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT)))
- goto err;
- /* Use original reference output as input */
- mem = BIO_new_mem_buf(ref, lref);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- #if 0
- /*
- * This is wrong to do, it always fails, and incorrectly ends up
- * calling `EVP_CipherFinal()` and setting ctx->finished = 1, ...
- * all of which are unwanted. But just deleting this is less
- * instructive to future readers of the code. Don't call BIO_flush
- * until you're done either reading or writing and want to finalise
- * the state.
- */
- (void)BIO_flush(b);
- #endif
- memset(out, 0, sizeof(out));
- len = BIO_read(b, out, sizeof(out));
- BIO_free_all(b);
- if (!TEST_mem_eq(inp, DATA_SIZE, out, len))
- return 0;
- /* perform split operations and compare to reference */
- for (i = 1; i < lref; i++) {
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) {
- TEST_info("Split decrypt failed @ operation %d", i);
- goto err;
- }
- mem = BIO_new_mem_buf(ref, lref);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- memset(out, 0, sizeof(out));
- out[i] = ~ref[i];
- len = BIO_read(b, out, i);
- /* check for overstep */
- if (!TEST_uchar_eq(out[i], (unsigned char)~ref[i])) {
- TEST_info("Decrypt overstep check failed @ operation %d", i);
- goto err;
- }
- len += BIO_read(b, out + len, sizeof(out) - len);
- BIO_free_all(b);
- if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) {
- TEST_info("Decrypt compare failed @ operation %d", i);
- return 0;
- }
- }
- /* perform small-chunk operations and compare to reference */
- for (i = 1; i < lref / 2; i++) {
- int delta;
- b = BIO_new(BIO_f_cipher());
- if (!TEST_ptr(b))
- return 0;
- if (!TEST_true(BIO_set_cipher(b, cipher, key, iv, DECRYPT))) {
- TEST_info("Small chunk decrypt failed @ operation %d", i);
- goto err;
- }
- mem = BIO_new_mem_buf(ref, lref);
- if (!TEST_ptr(mem))
- goto err;
- BIO_push(b, mem);
- memset(out, 0, sizeof(out));
- for (len = 0; (delta = BIO_read(b, out + len, i)); ) {
- len += delta;
- }
- BIO_free_all(b);
- if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) {
- TEST_info("Small chunk decrypt compare failed @ operation %d", i);
- return 0;
- }
- }
- return 1;
- err:
- BIO_free_all(b);
- return 0;
- }
- static int do_test_bio_cipher(const EVP_CIPHER* cipher, int idx)
- {
- switch (idx)
- {
- case 0:
- return do_bio_cipher(cipher, KEY, NULL);
- case 1:
- return do_bio_cipher(cipher, KEY, IV);
- }
- return 0;
- }
- static int test_bio_enc_aes_128_cbc(int idx)
- {
- return do_test_bio_cipher(EVP_aes_128_cbc(), idx);
- }
- static int test_bio_enc_aes_128_ctr(int idx)
- {
- return do_test_bio_cipher(EVP_aes_128_ctr(), idx);
- }
- static int test_bio_enc_aes_256_cfb(int idx)
- {
- return do_test_bio_cipher(EVP_aes_256_cfb(), idx);
- }
- static int test_bio_enc_aes_256_ofb(int idx)
- {
- return do_test_bio_cipher(EVP_aes_256_ofb(), idx);
- }
- # ifndef OPENSSL_NO_CHACHA
- static int test_bio_enc_chacha20(int idx)
- {
- return do_test_bio_cipher(EVP_chacha20(), idx);
- }
- # ifndef OPENSSL_NO_POLY1305
- static int test_bio_enc_chacha20_poly1305(int idx)
- {
- return do_test_bio_cipher(EVP_chacha20_poly1305(), idx);
- }
- # endif
- # endif
- static int test_bio_enc_eof_read_flush(void)
- {
- /* Length chosen to ensure base64 encoding employs padding */
- const unsigned char pbuf[] = "Attack at dawn";
- unsigned char cbuf[16]; /* At least as long as pbuf */
- const EVP_CIPHER *cipher = EVP_aes_256_gcm();
- EVP_CIPHER_CTX *ctx = NULL;
- BIO *mem = NULL, *b64 = NULL, *cbio = NULL;
- unsigned char tag[16];
- size_t key_size, iv_size;
- int n, ret = 0;
- memset(tag, 0, sizeof(tag));
- if (!TEST_ptr(cipher)
- || !TEST_int_gt((key_size = EVP_CIPHER_key_length(cipher)), 0)
- || !TEST_int_gt((iv_size = EVP_CIPHER_iv_length(cipher)), 0)
- || !TEST_ptr(mem = BIO_new(BIO_s_mem()))
- || !TEST_ptr(b64 = BIO_new(BIO_f_base64()))
- || !TEST_ptr(cbio = BIO_new(BIO_f_cipher()))
- || !TEST_ptr(BIO_push(b64, mem))
- || !TEST_ptr(BIO_push(cbio, b64))
- || !TEST_int_gt(BIO_get_cipher_ctx(cbio, &ctx), 0)
- || !TEST_true(EVP_CipherInit_ex(ctx, cipher, NULL, KEY, IV, ENCRYPT))
- || !TEST_int_gt(BIO_write(cbio, pbuf, sizeof(pbuf) - 1), 0)
- || !TEST_int_gt(BIO_flush(cbio), 0)
- || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_GET_TAG,
- sizeof(tag), tag), 0))
- goto end;
- BIO_free(cbio);
- BIO_free(b64);
- b64 = cbio = NULL;
- BIO_set_mem_eof_return(mem, 0);
- BIO_set_flags(mem, BIO_FLAGS_NONCLEAR_RST);
- if (!TEST_int_gt(BIO_reset(mem), 0)
- || !TEST_ptr(b64 = BIO_new(BIO_f_base64()))
- || !TEST_ptr(cbio = BIO_new(BIO_f_cipher()))
- || !TEST_ptr(BIO_push(b64, mem))
- || !TEST_ptr(BIO_push(cbio, b64))
- || !TEST_int_gt(BIO_get_cipher_ctx(cbio, &ctx), 0)
- || !TEST_true(EVP_CipherInit_ex(ctx, cipher, NULL, KEY, IV, DECRYPT))
- || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG,
- sizeof(tag), tag), 0)
- || !TEST_int_gt((n = BIO_read(cbio, cbuf, sizeof(cbuf))), 0)
- || !TEST_true(BIO_get_cipher_status(cbio))
- /* Evaluate both and report whether either or both failed */
- || (!TEST_int_gt(BIO_flush(cbio), 0) +
- !TEST_true(BIO_get_cipher_status(cbio)))
- || !TEST_mem_eq(cbuf, n, pbuf, sizeof(pbuf) - 1))
- goto end;
- ret = 1;
- end:
- BIO_free(cbio);
- BIO_free(b64);
- BIO_free(mem);
- return ret;
- }
- int setup_tests(void)
- {
- ADD_ALL_TESTS(test_bio_enc_aes_128_cbc, 2);
- ADD_ALL_TESTS(test_bio_enc_aes_128_ctr, 2);
- ADD_ALL_TESTS(test_bio_enc_aes_256_cfb, 2);
- ADD_ALL_TESTS(test_bio_enc_aes_256_ofb, 2);
- # ifndef OPENSSL_NO_CHACHA
- ADD_ALL_TESTS(test_bio_enc_chacha20, 2);
- # ifndef OPENSSL_NO_POLY1305
- ADD_ALL_TESTS(test_bio_enc_chacha20_poly1305, 2);
- # endif
- # endif
- ADD_TEST(test_bio_enc_eof_read_flush);
- return 1;
- }
|