4e7991b497
Instead of referencing the return size from the OSSL_PARAM structure, make the size a field within the structure. Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9135)
88 lines
2.4 KiB
C
88 lines
2.4 KiB
C
/*
|
|
* Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <string.h>
|
|
#include <openssl/provider.h>
|
|
#include <openssl/params.h>
|
|
#include <openssl/ossl_typ.h>
|
|
#include <openssl/core_names.h>
|
|
#include "internal/nelem.h"
|
|
#include "testutil.h"
|
|
|
|
#if defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_MDC2)
|
|
# define OPENSSL_NO_MDC2
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_MDC2
|
|
# include <openssl/evp.h>
|
|
# include <openssl/mdc2.h>
|
|
|
|
# ifdef CHARSET_EBCDIC
|
|
# include <openssl/ebcdic.h>
|
|
# endif
|
|
|
|
static unsigned char pad1[16] = {
|
|
0x42, 0xE5, 0x0C, 0xD2, 0x24, 0xBA, 0xCE, 0xBA,
|
|
0x76, 0x0B, 0xDD, 0x2B, 0xD4, 0x09, 0x28, 0x1A
|
|
};
|
|
|
|
static unsigned char pad2[16] = {
|
|
0x2E, 0x46, 0x79, 0xB5, 0xAD, 0xD9, 0xCA, 0x75,
|
|
0x35, 0xD8, 0x7A, 0xFE, 0xAB, 0x33, 0xBE, 0xE2
|
|
};
|
|
|
|
static int test_mdc2(void)
|
|
{
|
|
int testresult = 0, pad_type = 2;
|
|
unsigned char md[MDC2_DIGEST_LENGTH];
|
|
EVP_MD_CTX *c;
|
|
static char text[] = "Now is the time for all ";
|
|
size_t tlen = strlen(text), i = 0;
|
|
OSSL_PROVIDER *prov = NULL;
|
|
OSSL_PARAM params[2];
|
|
|
|
params[i++] = OSSL_PARAM_construct_int(OSSL_DIGEST_PARAM_PAD_TYPE,
|
|
&pad_type),
|
|
params[i++] = OSSL_PARAM_construct_end();
|
|
|
|
prov = OSSL_PROVIDER_load(NULL, "legacy");
|
|
# ifdef CHARSET_EBCDIC
|
|
ebcdic2ascii(text, text, tlen);
|
|
# endif
|
|
|
|
c = EVP_MD_CTX_new();
|
|
if (!TEST_ptr(c)
|
|
|| !TEST_true(EVP_DigestInit_ex(c, EVP_mdc2(), NULL))
|
|
|| !TEST_true(EVP_DigestUpdate(c, (unsigned char *)text, tlen))
|
|
|| !TEST_true(EVP_DigestFinal_ex(c, &(md[0]), NULL))
|
|
|| !TEST_mem_eq(md, MDC2_DIGEST_LENGTH, pad1, MDC2_DIGEST_LENGTH)
|
|
|| !TEST_true(EVP_DigestInit_ex(c, EVP_mdc2(), NULL)))
|
|
goto end;
|
|
|
|
if (!TEST_int_gt(EVP_MD_CTX_set_params(c, params), 0)
|
|
|| !TEST_true(EVP_DigestUpdate(c, (unsigned char *)text, tlen))
|
|
|| !TEST_true(EVP_DigestFinal_ex(c, &(md[0]), NULL))
|
|
|| !TEST_mem_eq(md, MDC2_DIGEST_LENGTH, pad2, MDC2_DIGEST_LENGTH))
|
|
goto end;
|
|
|
|
testresult = 1;
|
|
end:
|
|
EVP_MD_CTX_free(c);
|
|
OSSL_PROVIDER_unload(prov);
|
|
return testresult;
|
|
}
|
|
#endif
|
|
|
|
int setup_tests(void)
|
|
{
|
|
#ifndef OPENSSL_NO_MDC2
|
|
ADD_TEST(test_mdc2);
|
|
#endif
|
|
return 1;
|
|
}
|