os/ossrv/ssl/tsrc/crypto_test/src/evp_test.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* Written by Ben Laurie, 2001 */
sl@0
     2
/*
sl@0
     3
 * Copyright (c) 2001 The OpenSSL Project.  All rights reserved.
sl@0
     4
 *
sl@0
     5
 * Redistribution and use in source and binary forms, with or without
sl@0
     6
 * modification, are permitted provided that the following conditions
sl@0
     7
 * are met:
sl@0
     8
 *
sl@0
     9
 * 1. Redistributions of source code must retain the above copyright
sl@0
    10
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    11
 *
sl@0
    12
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    13
 *    notice, this list of conditions and the following disclaimer in
sl@0
    14
 *    the documentation and/or other materials provided with the
sl@0
    15
 *    distribution.
sl@0
    16
 *
sl@0
    17
 * 3. All advertising materials mentioning features or use of this
sl@0
    18
 *    software must display the following acknowledgment:
sl@0
    19
 *    "This product includes software developed by the OpenSSL Project
sl@0
    20
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
    21
 *
sl@0
    22
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    23
 *    endorse or promote products derived from this software without
sl@0
    24
 *    prior written permission. For written permission, please contact
sl@0
    25
 *    openssl-core@openssl.org.
sl@0
    26
 *
sl@0
    27
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    28
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    29
 *    permission of the OpenSSL Project.
sl@0
    30
 *
sl@0
    31
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    32
 *    acknowledgment:
sl@0
    33
 *    "This product includes software developed by the OpenSSL Project
sl@0
    34
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
    35
 *
sl@0
    36
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    37
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    38
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    39
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    40
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    41
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    42
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    43
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    44
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
    45
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
    46
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
    47
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
    48
 */
sl@0
    49
/*
sl@0
    50
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
sl@0
    51
 */
sl@0
    52
#include <stdio.h>
sl@0
    53
#include <string.h>
sl@0
    54
sl@0
    55
#ifndef SYMBIAN
sl@0
    56
#include "../e_os.h"
sl@0
    57
#else
sl@0
    58
#include "e_os.h"
sl@0
    59
#endif
sl@0
    60
sl@0
    61
#include <openssl/opensslconf.h>
sl@0
    62
#include <openssl/evp.h>
sl@0
    63
#ifndef OPENSSL_NO_ENGINE
sl@0
    64
#include <openssl/engine.h>
sl@0
    65
#endif
sl@0
    66
#include <openssl/err.h>
sl@0
    67
#include <openssl/conf.h>
sl@0
    68
#ifdef SYMBIAN
sl@0
    69
#ifdef stdin
sl@0
    70
#undef stdin
sl@0
    71
#endif
sl@0
    72
#ifdef stdout
sl@0
    73
#undef stdout
sl@0
    74
#endif
sl@0
    75
#ifdef stderr
sl@0
    76
#undef stderr
sl@0
    77
#endif
sl@0
    78
sl@0
    79
#define stdin fp_stdin
sl@0
    80
#define stdout fp_stdout
sl@0
    81
#define stderr fp_stderr
sl@0
    82
sl@0
    83
extern FILE *fp_stdout;
sl@0
    84
extern FILE *fp_stderr;
sl@0
    85
#endif
sl@0
    86
sl@0
    87
static void hexdump(FILE *f,const char *title,const unsigned char *s,int l)
sl@0
    88
    {
sl@0
    89
    int n=0;
sl@0
    90
sl@0
    91
    fprintf(f,"%s",title);
sl@0
    92
    for( ; n < l ; ++n)
sl@0
    93
	{
sl@0
    94
	if((n%16) == 0)
sl@0
    95
	    fprintf(f,"\n%04x",n);
sl@0
    96
	fprintf(f," %02x",s[n]);
sl@0
    97
	}
sl@0
    98
    fprintf(f,"\n");
sl@0
    99
    }
sl@0
   100
sl@0
   101
static int convert(unsigned char *s)
sl@0
   102
    {
sl@0
   103
    unsigned char *d;
sl@0
   104
sl@0
   105
    for(d=s ; (*s)&&(*s!='\r') ; s+=2,++d)
sl@0
   106
	{
sl@0
   107
	unsigned int n;
sl@0
   108
sl@0
   109
	if(!s[1])
sl@0
   110
	    {
sl@0
   111
	    fprintf(stderr,"Odd number of hex digits!");
sl@0
   112
	    return 4;
sl@0
   113
	    //EXIT(4);
sl@0
   114
	    }
sl@0
   115
	sscanf((char *)s,"%2x",&n);
sl@0
   116
	*d=(unsigned char)n;
sl@0
   117
	}
sl@0
   118
    return s-d;
sl@0
   119
    }
sl@0
   120
sl@0
   121
static char *sstrsep(char **string, const char *delim)
sl@0
   122
    {
sl@0
   123
    char isdelim[256];
sl@0
   124
    char *token = *string;
sl@0
   125
sl@0
   126
    if (**string == 0)
sl@0
   127
        return NULL;
sl@0
   128
sl@0
   129
    memset(isdelim, 0, 256);
sl@0
   130
    isdelim[0] = 1;
sl@0
   131
sl@0
   132
    while (*delim)
sl@0
   133
        {
sl@0
   134
        isdelim[(unsigned char)(*delim)] = 1;
sl@0
   135
        delim++;
sl@0
   136
        }
sl@0
   137
sl@0
   138
    while (!isdelim[(unsigned char)(**string)])
sl@0
   139
        {
sl@0
   140
        (*string)++;
sl@0
   141
        }
sl@0
   142
sl@0
   143
    if (**string)
sl@0
   144
        {
sl@0
   145
        **string = 0;
sl@0
   146
        (*string)++;
sl@0
   147
        }
sl@0
   148
sl@0
   149
    return token;
sl@0
   150
    }
sl@0
   151
sl@0
   152
static unsigned char *ustrsep(char **p,const char *sep)
sl@0
   153
    { return (unsigned char *)sstrsep(p,sep); }
sl@0
   154
sl@0
   155
static int test1_exit(int ec)
sl@0
   156
	{
sl@0
   157
	
sl@0
   158
	return(0);		/* To keep some compilers quiet */
sl@0
   159
	}
sl@0
   160
sl@0
   161
static void test1(const EVP_CIPHER *c,const unsigned char *key,int kn,
sl@0
   162
		  const unsigned char *iv,int in,
sl@0
   163
		  const unsigned char *plaintext,int pn,
sl@0
   164
		  const unsigned char *ciphertext,int cn,
sl@0
   165
		  int encdec)
sl@0
   166
    {
sl@0
   167
    EVP_CIPHER_CTX ctx;
sl@0
   168
#ifndef SYMBIAN    
sl@0
   169
    unsigned char out[4096];
sl@0
   170
#else
sl@0
   171
    unsigned char out[400];
sl@0
   172
#endif    
sl@0
   173
    int outl,outl2;
sl@0
   174
sl@0
   175
    fprintf(stdout,"Testing cipher %s%s\n",EVP_CIPHER_name(c),
sl@0
   176
	   (encdec == 1 ? "(encrypt)" : (encdec == 0 ? "(decrypt)" : "(encrypt/decrypt)")));
sl@0
   177
    hexdump(stdout,"Key",key,kn);
sl@0
   178
    if(in)
sl@0
   179
	hexdump(stdout,"IV",iv,in);
sl@0
   180
    hexdump(stdout,"Plaintext",plaintext,pn);
sl@0
   181
    hexdump(stdout,"Ciphertext",ciphertext,cn);
sl@0
   182
    
sl@0
   183
    if(kn != c->key_len)
sl@0
   184
	{
sl@0
   185
	fprintf(stderr,"Key length doesn't match, got %d expected %d\n",kn,
sl@0
   186
		c->key_len);
sl@0
   187
	test1_exit(5);
sl@0
   188
	}
sl@0
   189
    EVP_CIPHER_CTX_init(&ctx);
sl@0
   190
 if(errno==ENOMEM)
sl@0
   191
   {
sl@0
   192
	  return ;
sl@0
   193
	 }    
sl@0
   194
    if (encdec != 0)
sl@0
   195
        {
sl@0
   196
	if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv))
sl@0
   197
	    {
sl@0
   198
	    if(errno==ENOMEM)
sl@0
   199
     {
sl@0
   200
	    return ;
sl@0
   201
	    }    
sl@0
   202
 	    fprintf(stderr,"EncryptInit failed\n");
sl@0
   203
	    ERR_print_errors_fp(stderr);
sl@0
   204
	    if(errno==ENOMEM)
sl@0
   205
      {
sl@0
   206
	    return ;
sl@0
   207
	    }    
sl@0
   208
 
sl@0
   209
	    test1_exit(10);
sl@0
   210
	    }
sl@0
   211
	EVP_CIPHER_CTX_set_padding(&ctx,0);
sl@0
   212
sl@0
   213
	if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn))
sl@0
   214
	    {
sl@0
   215
	    if(errno==ENOMEM)
sl@0
   216
      {
sl@0
   217
	    return ;
sl@0
   218
	    }    
sl@0
   219
 	    fprintf(stderr,"Encrypt failed\n");
sl@0
   220
	    ERR_print_errors_fp(stderr);
sl@0
   221
	    if(errno==ENOMEM)
sl@0
   222
      {
sl@0
   223
	    return ;
sl@0
   224
	    }    
sl@0
   225
	    test1_exit(6);
sl@0
   226
	    }
sl@0
   227
	if(!EVP_EncryptFinal_ex(&ctx,out+outl,&outl2))
sl@0
   228
	    {
sl@0
   229
	    if(errno==ENOMEM)
sl@0
   230
      {
sl@0
   231
	    return ;
sl@0
   232
	    }    
sl@0
   233
      fprintf(stderr,"EncryptFinal failed\n");
sl@0
   234
	    ERR_print_errors_fp(stderr);
sl@0
   235
	    if(errno==ENOMEM)
sl@0
   236
      {
sl@0
   237
	    return ;
sl@0
   238
	    }    
sl@0
   239
      test1_exit(7);
sl@0
   240
	    }
sl@0
   241
sl@0
   242
	if(outl+outl2 != cn)
sl@0
   243
	    {
sl@0
   244
	    fprintf(stderr,"Ciphertext length mismatch got %d expected %d\n",
sl@0
   245
		    outl+outl2,cn);
sl@0
   246
	    test1_exit(8);
sl@0
   247
	    }
sl@0
   248
sl@0
   249
	if(memcmp(out,ciphertext,cn))
sl@0
   250
	    {
sl@0
   251
	    fprintf(stderr,"Ciphertext mismatch\n");
sl@0
   252
	    hexdump(stderr,"Got",out,cn);
sl@0
   253
	    hexdump(stderr,"Expected",ciphertext,cn);
sl@0
   254
	    test1_exit(9);
sl@0
   255
	    }
sl@0
   256
	}
sl@0
   257
sl@0
   258
    if (encdec <= 0)
sl@0
   259
        {
sl@0
   260
	if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv))
sl@0
   261
	    {
sl@0
   262
	    if(errno==ENOMEM)
sl@0
   263
      {
sl@0
   264
	    return ;
sl@0
   265
	    }    
sl@0
   266
	    fprintf(stderr,"DecryptInit failed\n");
sl@0
   267
	    ERR_print_errors_fp(stderr);
sl@0
   268
	    if(errno==ENOMEM)
sl@0
   269
      {
sl@0
   270
	    return ;
sl@0
   271
	    }    
sl@0
   272
	    test1_exit(11);
sl@0
   273
	    }
sl@0
   274
	EVP_CIPHER_CTX_set_padding(&ctx,0);
sl@0
   275
   if(errno==ENOMEM)
sl@0
   276
   {
sl@0
   277
	    return ;
sl@0
   278
   }    
sl@0
   279
sl@0
   280
sl@0
   281
	if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn))
sl@0
   282
	    {
sl@0
   283
	    if(errno==ENOMEM)
sl@0
   284
      {
sl@0
   285
	    return ;
sl@0
   286
	    }    
sl@0
   287
      fprintf(stderr,"Decrypt failed\n");
sl@0
   288
	    ERR_print_errors_fp(stderr);
sl@0
   289
	    if(errno==ENOMEM)
sl@0
   290
      {
sl@0
   291
	    return ;
sl@0
   292
	    }    
sl@0
   293
	    test1_exit(6);
sl@0
   294
	    }
sl@0
   295
	if(!EVP_DecryptFinal_ex(&ctx,out+outl,&outl2))
sl@0
   296
	    {
sl@0
   297
	    if(errno==ENOMEM)
sl@0
   298
      {
sl@0
   299
	    return ;
sl@0
   300
	    }    
sl@0
   301
      fprintf(stderr,"DecryptFinal failed\n");
sl@0
   302
	    ERR_print_errors_fp(stderr);
sl@0
   303
	    if(errno==ENOMEM)
sl@0
   304
      {
sl@0
   305
	    return ;
sl@0
   306
	    }    
sl@0
   307
	    test1_exit(7);
sl@0
   308
	    }
sl@0
   309
sl@0
   310
	if(outl+outl2 != cn)
sl@0
   311
	    {
sl@0
   312
	    fprintf(stderr,"Plaintext length mismatch got %d expected %d\n",
sl@0
   313
		    outl+outl2,cn);
sl@0
   314
	    test1_exit(8);
sl@0
   315
	    }
sl@0
   316
sl@0
   317
	if(memcmp(out,plaintext,cn))
sl@0
   318
	    {
sl@0
   319
	    fprintf(stderr,"Plaintext mismatch\n");
sl@0
   320
	    hexdump(stderr,"Got",out,cn);
sl@0
   321
	    hexdump(stderr,"Expected",plaintext,cn);
sl@0
   322
	    test1_exit(9);
sl@0
   323
	    }
sl@0
   324
	}
sl@0
   325
sl@0
   326
    EVP_CIPHER_CTX_cleanup(&ctx);
sl@0
   327
	    if(errno==ENOMEM)
sl@0
   328
      {
sl@0
   329
	    return ;
sl@0
   330
	    }    
sl@0
   331
sl@0
   332
    fprintf(stdout,"Test Case passed!\n");
sl@0
   333
    
sl@0
   334
    }
sl@0
   335
sl@0
   336
static int test_cipher(const char *cipher,const unsigned char *key,int kn,
sl@0
   337
		       const unsigned char *iv,int in,
sl@0
   338
		       const unsigned char *plaintext,int pn,
sl@0
   339
		       const unsigned char *ciphertext,int cn,
sl@0
   340
		       int encdec)
sl@0
   341
    {
sl@0
   342
    const EVP_CIPHER *c;
sl@0
   343
sl@0
   344
    c=EVP_get_cipherbyname(cipher);
sl@0
   345
   if(c==NULL&&errno==ENOMEM)
sl@0
   346
   {
sl@0
   347
	    return 0;
sl@0
   348
	 }  
sl@0
   349
    if(!c)
sl@0
   350
	 return 0;
sl@0
   351
sl@0
   352
    test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
sl@0
   353
sl@0
   354
    return 1;
sl@0
   355
    }
sl@0
   356
sl@0
   357
static int test_digest(const char *digest,
sl@0
   358
		       const unsigned char *plaintext,int pn,
sl@0
   359
		       const unsigned char *ciphertext, unsigned int cn)
sl@0
   360
    {
sl@0
   361
    const EVP_MD *d;
sl@0
   362
    EVP_MD_CTX ctx;
sl@0
   363
    unsigned char md[EVP_MAX_MD_SIZE];
sl@0
   364
    unsigned int mdn;
sl@0
   365
sl@0
   366
    d=EVP_get_digestbyname(digest);
sl@0
   367
    	if(d==0&&errno==ENOMEM)
sl@0
   368
  {
sl@0
   369
	    return 0;
sl@0
   370
	}  
sl@0
   371
sl@0
   372
    if(!d)
sl@0
   373
	return 0;
sl@0
   374
sl@0
   375
    fprintf(stdout,"Testing digest %s\n",EVP_MD_name(d));
sl@0
   376
    hexdump(stdout,"Plaintext",plaintext,pn);
sl@0
   377
    hexdump(stdout,"Digest",ciphertext,cn);
sl@0
   378
sl@0
   379
    EVP_MD_CTX_init(&ctx);
sl@0
   380
   if(errno==ENOMEM)
sl@0
   381
   {
sl@0
   382
	    return 0;
sl@0
   383
	 }  
sl@0
   384
sl@0
   385
    if(!EVP_DigestInit_ex(&ctx,d, NULL))
sl@0
   386
	{
sl@0
   387
		if(errno==ENOMEM)
sl@0
   388
  {
sl@0
   389
	    return 0;
sl@0
   390
	}  
sl@0
   391
	
sl@0
   392
	fprintf(stderr,"DigestInit failed\n");
sl@0
   393
	ERR_print_errors_fp(stderr);
sl@0
   394
	return 100;
sl@0
   395
	//EXIT(100);
sl@0
   396
	}
sl@0
   397
    if(!EVP_DigestUpdate(&ctx,plaintext,pn))
sl@0
   398
	{
sl@0
   399
		if(errno==ENOMEM)
sl@0
   400
  {
sl@0
   401
	    return 0;
sl@0
   402
	}  
sl@0
   403
	
sl@0
   404
	fprintf(stderr,"DigestUpdate failed\n");
sl@0
   405
	ERR_print_errors_fp(stderr);
sl@0
   406
  if(errno==ENOMEM)
sl@0
   407
  {
sl@0
   408
	    return 0;
sl@0
   409
	}  
sl@0
   410
sl@0
   411
	return 101;
sl@0
   412
	//EXIT(101);
sl@0
   413
	}
sl@0
   414
    if(!EVP_DigestFinal_ex(&ctx,md,&mdn))
sl@0
   415
	{
sl@0
   416
		if(errno==ENOMEM)
sl@0
   417
  {
sl@0
   418
	    return 0;
sl@0
   419
	}  
sl@0
   420
	fprintf(stderr,"DigestFinal failed\n");
sl@0
   421
	ERR_print_errors_fp(stderr);
sl@0
   422
  if(errno==ENOMEM)
sl@0
   423
  {
sl@0
   424
	    return 0;
sl@0
   425
	}  
sl@0
   426
sl@0
   427
	return 101;
sl@0
   428
	//EXIT(101);
sl@0
   429
	}
sl@0
   430
    EVP_MD_CTX_cleanup(&ctx);
sl@0
   431
	if(errno==ENOMEM)
sl@0
   432
  {
sl@0
   433
	    return 0;
sl@0
   434
	}  
sl@0
   435
sl@0
   436
    if(mdn != cn)
sl@0
   437
	{
sl@0
   438
	fprintf(stderr,"Digest length mismatch, got %d expected %d\n",mdn,cn);
sl@0
   439
	return 102;
sl@0
   440
	//EXIT(102);
sl@0
   441
	}
sl@0
   442
sl@0
   443
    if(memcmp(md,ciphertext,cn))
sl@0
   444
	{
sl@0
   445
	fprintf(stderr,"Digest mismatch\n");
sl@0
   446
	hexdump(stderr,"Got",md,cn);
sl@0
   447
	hexdump(stderr,"Expected",ciphertext,cn);
sl@0
   448
	return 103;
sl@0
   449
		//EXIT(103);
sl@0
   450
	}
sl@0
   451
sl@0
   452
    fprintf(stdout,"done\n");
sl@0
   453
    
sl@0
   454
    EVP_MD_CTX_cleanup(&ctx);
sl@0
   455
	if(errno==ENOMEM)
sl@0
   456
  {
sl@0
   457
	    return 0;
sl@0
   458
	}  
sl@0
   459
sl@0
   460
    return 1;
sl@0
   461
    }
sl@0
   462
#ifndef SYMBIAN
sl@0
   463
int main(int argc,char **argv)
sl@0
   464
#else
sl@0
   465
int evp_main(int argc,char **argv)
sl@0
   466
#endif
sl@0
   467
    {
sl@0
   468
    const char *szTestFile;
sl@0
   469
    FILE *f;
sl@0
   470
    if(argc != 2)
sl@0
   471
	{
sl@0
   472
	fprintf(stderr,"%s <test file>\n",argv[0]);
sl@0
   473
	return 1;
sl@0
   474
	//EXIT(1);
sl@0
   475
	}
sl@0
   476
	
sl@0
   477
    /*CRYPTO_malloc_debug_init();
sl@0
   478
    if(errno==ENOMEM)
sl@0
   479
   {
sl@0
   480
	  return 1;
sl@0
   481
	 }
sl@0
   482
    CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
sl@0
   483
     if(errno==ENOMEM)
sl@0
   484
   {
sl@0
   485
	  return 1;
sl@0
   486
	 }
sl@0
   487
    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
sl@0
   488
     if(errno==ENOMEM)
sl@0
   489
   {
sl@0
   490
	  return 1;
sl@0
   491
	 }*/
sl@0
   492
sl@0
   493
    szTestFile=argv[1];
sl@0
   494
sl@0
   495
    f=fopen(szTestFile,"r");
sl@0
   496
    if(!f)
sl@0
   497
	{
sl@0
   498
		 if(errno==ENOMEM)
sl@0
   499
   {
sl@0
   500
	  return 1;
sl@0
   501
	 }
sl@0
   502
	fprintf(stderr,"Couldn't open file");
sl@0
   503
	//perror(szTestFile);
sl@0
   504
	return 1;
sl@0
   505
	//EXIT(2);
sl@0
   506
	}
sl@0
   507
    fprintf(stderr,"Opened file sucessfully\n");
sl@0
   508
    /* Load up the software EVP_CIPHER and EVP_MD definitions */
sl@0
   509
    OpenSSL_add_all_ciphers();
sl@0
   510
     if(errno==ENOMEM)
sl@0
   511
   {
sl@0
   512
	  return 1;
sl@0
   513
	 }
sl@0
   514
    fprintf(stderr,"OpenSSL_add_all_ciphers(): done\n");
sl@0
   515
    OpenSSL_add_all_digests();
sl@0
   516
     if(errno==ENOMEM)
sl@0
   517
   {
sl@0
   518
	  return 1;
sl@0
   519
	 }
sl@0
   520
    fprintf(stderr,"OpenSSL_add_all_digests() : done\n");
sl@0
   521
#ifndef OPENSSL_NO_ENGINE
sl@0
   522
    /* Load all compiled-in ENGINEs */
sl@0
   523
    ENGINE_load_builtin_engines();
sl@0
   524
     if(errno==ENOMEM)
sl@0
   525
   {
sl@0
   526
	  return 1;
sl@0
   527
	 }
sl@0
   528
#endif
sl@0
   529
#if 0
sl@0
   530
    OPENSSL_config();
sl@0
   531
#endif
sl@0
   532
#ifndef OPENSSL_NO_ENGINE
sl@0
   533
    /* Register all available ENGINE implementations of ciphers and digests.
sl@0
   534
     * This could perhaps be changed to "ENGINE_register_all_complete()"? */
sl@0
   535
    ENGINE_register_all_ciphers();
sl@0
   536
     if(errno==ENOMEM)
sl@0
   537
   {
sl@0
   538
	  return 1;
sl@0
   539
	 }
sl@0
   540
    ENGINE_register_all_digests();
sl@0
   541
     if(errno==ENOMEM)
sl@0
   542
   {
sl@0
   543
	  return 1;
sl@0
   544
	 }
sl@0
   545
    /* If we add command-line options, this statement should be switchable.
sl@0
   546
     * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
sl@0
   547
     * they weren't already initialised. */
sl@0
   548
    /* ENGINE_set_cipher_flags(ENGINE_CIPHER_FLAG_NOINIT); */
sl@0
   549
#endif
sl@0
   550
sl@0
   551
    for( ; ; )
sl@0
   552
	{
sl@0
   553
#ifndef SYMBIAN		
sl@0
   554
	char line[4096];
sl@0
   555
#else
sl@0
   556
  char line[400];
sl@0
   557
#endif	
sl@0
   558
	char *p;
sl@0
   559
	char *cipher;
sl@0
   560
	unsigned char *iv,*key,*plaintext,*ciphertext;
sl@0
   561
	int encdec;
sl@0
   562
	int kn,in,pn,cn;
sl@0
   563
sl@0
   564
	if(!fgets((char *)line,sizeof line,f))
sl@0
   565
	    break;
sl@0
   566
	if(line[0] == '#' || line[0] == '\n'||line[0] == '\r')
sl@0
   567
	    continue;
sl@0
   568
	
sl@0
   569
	p=line;
sl@0
   570
	cipher=sstrsep(&p,":");	
sl@0
   571
	key=ustrsep(&p,":");
sl@0
   572
	iv=ustrsep(&p,":");
sl@0
   573
	plaintext=ustrsep(&p,":");
sl@0
   574
	ciphertext=ustrsep(&p,":");
sl@0
   575
	if (p[-1] == '\n') {
sl@0
   576
	    p[-1] = '\0';
sl@0
   577
	    encdec = -1;
sl@0
   578
	} else {
sl@0
   579
	    encdec = atoi(sstrsep(&p,"\n"));
sl@0
   580
	}
sl@0
   581
	      
sl@0
   582
    	kn=convert(key);
sl@0
   583
	
sl@0
   584
	in=convert(iv);
sl@0
   585
	pn=convert(plaintext);
sl@0
   586
	cn=convert(ciphertext);
sl@0
   587
    	if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
sl@0
   588
	   && !test_digest(cipher,plaintext,pn,ciphertext,cn))
sl@0
   589
	    {
sl@0
   590
 if(errno==ENOMEM)
sl@0
   591
   {
sl@0
   592
	  return 1;
sl@0
   593
	 }	    	
sl@0
   594
#ifdef OPENSSL_NO_AES
sl@0
   595
	    if (strstr(cipher, "AES") == cipher)
sl@0
   596
		{
sl@0
   597
		fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); 
sl@0
   598
		continue;
sl@0
   599
		}
sl@0
   600
#endif
sl@0
   601
#ifdef OPENSSL_NO_DES
sl@0
   602
	    if (strstr(cipher, "DES") == cipher)
sl@0
   603
		{
sl@0
   604
		fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); 
sl@0
   605
		continue;
sl@0
   606
		}
sl@0
   607
#endif
sl@0
   608
#ifdef OPENSSL_NO_RC4
sl@0
   609
	    if (strstr(cipher, "RC4") == cipher)
sl@0
   610
		{
sl@0
   611
		fprintf(stdout, "Cipher disabled, skipping %s\n", cipher); 
sl@0
   612
		continue;
sl@0
   613
		}
sl@0
   614
#endif
sl@0
   615
	    fprintf(stderr,"Can't find %s\n",cipher);
sl@0
   616
	    return 3;
sl@0
   617
	    //EXIT(3);
sl@0
   618
	    }
sl@0
   619
	}
sl@0
   620
sl@0
   621
#ifndef OPENSSL_NO_ENGINE
sl@0
   622
    ENGINE_cleanup();
sl@0
   623
    if(errno==ENOMEM)
sl@0
   624
   {
sl@0
   625
	  return 1;
sl@0
   626
	 }
sl@0
   627
#endif
sl@0
   628
    EVP_cleanup();
sl@0
   629
    if(errno==ENOMEM)
sl@0
   630
   {
sl@0
   631
	  return 1;
sl@0
   632
	 }
sl@0
   633
    CRYPTO_cleanup_all_ex_data();
sl@0
   634
   if(errno==ENOMEM)
sl@0
   635
   {
sl@0
   636
	  return 1;
sl@0
   637
	 }    
sl@0
   638
    ERR_remove_state(0);
sl@0
   639
     if(errno==ENOMEM)
sl@0
   640
   {
sl@0
   641
	  return 1;
sl@0
   642
	 }
sl@0
   643
    ERR_free_strings();
sl@0
   644
   if(errno==ENOMEM)
sl@0
   645
   {
sl@0
   646
	  return 1;
sl@0
   647
	 }    
sl@0
   648
    CRYPTO_mem_leaks_fp(stderr);
sl@0
   649
     if(errno==ENOMEM)
sl@0
   650
   {
sl@0
   651
	  return 1;
sl@0
   652
	 }
sl@0
   653
    fprintf(stderr,"*************END OF THE TEST CASE\n************");
sl@0
   654
    
sl@0
   655
    return 0;
sl@0
   656
    }