|
@@ -1346,6 +1346,72 @@ static int test_EVP_PKEY_CTX_get_set_params(void)
|
|
|
}
|
|
|
#endif
|
|
|
|
|
|
+#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
|
|
|
+static int test_decrypt_null_chunks(void)
|
|
|
+{
|
|
|
+ EVP_CIPHER_CTX* ctx = NULL;
|
|
|
+ const unsigned char key[32] = {
|
|
|
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b,
|
|
|
+ 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
|
|
+ 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1
|
|
|
+ };
|
|
|
+ unsigned char iv[12] = {
|
|
|
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b
|
|
|
+ };
|
|
|
+ unsigned char msg[] = "It was the best of times, it was the worst of times";
|
|
|
+ unsigned char ciphertext[80];
|
|
|
+ unsigned char plaintext[80];
|
|
|
+ /* We initialise tmp to a non zero value on purpose */
|
|
|
+ int ctlen, ptlen, tmp = 99;
|
|
|
+ int ret = 0;
|
|
|
+ const int enc_offset = 10, dec_offset = 20;
|
|
|
+
|
|
|
+ if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())
|
|
|
+ || !TEST_true(EVP_EncryptInit_ex(ctx, EVP_chacha20_poly1305(), NULL,
|
|
|
+ key, iv))
|
|
|
+ || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg,
|
|
|
+ enc_offset))
|
|
|
+ /* Deliberate add a zero length update */
|
|
|
+ || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp, NULL,
|
|
|
+ 0))
|
|
|
+ || !TEST_int_eq(tmp, 0)
|
|
|
+ || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp,
|
|
|
+ msg + enc_offset,
|
|
|
+ sizeof(msg) - enc_offset))
|
|
|
+ || !TEST_int_eq(ctlen += tmp, sizeof(msg))
|
|
|
+ || !TEST_true(EVP_EncryptFinal(ctx, ciphertext + ctlen, &tmp))
|
|
|
+ || !TEST_int_eq(tmp, 0))
|
|
|
+ goto err;
|
|
|
+
|
|
|
+ /* Deliberately initialise tmp to a non zero value */
|
|
|
+ tmp = 99;
|
|
|
+ if (!TEST_true(EVP_DecryptInit_ex(ctx, EVP_chacha20_poly1305(), NULL, key,
|
|
|
+ iv))
|
|
|
+ || !TEST_true(EVP_DecryptUpdate(ctx, plaintext, &ptlen, ciphertext,
|
|
|
+ dec_offset))
|
|
|
+ /*
|
|
|
+ * Deliberately add a zero length update. We also deliberately do
|
|
|
+ * this at a different offset than for encryption.
|
|
|
+ */
|
|
|
+ || !TEST_true(EVP_DecryptUpdate(ctx, plaintext + ptlen, &tmp, NULL,
|
|
|
+ 0))
|
|
|
+ || !TEST_int_eq(tmp, 0)
|
|
|
+ || !TEST_true(EVP_DecryptUpdate(ctx, plaintext + ptlen, &tmp,
|
|
|
+ ciphertext + dec_offset,
|
|
|
+ ctlen - dec_offset))
|
|
|
+ || !TEST_int_eq(ptlen += tmp, sizeof(msg))
|
|
|
+ || !TEST_true(EVP_DecryptFinal(ctx, plaintext + ptlen, &tmp))
|
|
|
+ || !TEST_int_eq(tmp, 0)
|
|
|
+ || !TEST_mem_eq(msg, sizeof(msg), plaintext, ptlen))
|
|
|
+ goto err;
|
|
|
+
|
|
|
+ ret = 1;
|
|
|
+ err:
|
|
|
+ EVP_CIPHER_CTX_free(ctx);
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+#endif /* !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305) */
|
|
|
+
|
|
|
int setup_tests(void)
|
|
|
{
|
|
|
ADD_ALL_TESTS(test_EVP_DigestSignInit, 4);
|
|
@@ -1377,6 +1443,9 @@ int setup_tests(void)
|
|
|
#endif
|
|
|
#ifndef OPENSSL_NO_DSA
|
|
|
ADD_TEST(test_EVP_PKEY_CTX_get_set_params);
|
|
|
+#endif
|
|
|
+#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
|
|
|
+ ADD_TEST(test_decrypt_null_chunks);
|
|
|
#endif
|
|
|
return 1;
|
|
|
}
|