| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  | /*
 | 
					
						
							| 
									
										
										
										
											2021-02-18 22:57:13 +08:00
										 |  |  |  * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  |  * | 
					
						
							| 
									
										
										
										
											2018-12-06 20:05:25 +08:00
										 |  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  |  * this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  |  * in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  |  * https://www.openssl.org/source/license.html
 | 
					
						
							|  |  |  |  */ | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-08-22 20:35:43 +08:00
										 |  |  | #include "internal/nelem.h"
 | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  | #include "testutil.h"
 | 
					
						
							| 
									
										
										
										
											2019-09-28 06:45:40 +08:00
										 |  |  | #include "../ssl/ssl_local.h"
 | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-02-01 23:15:10 +08:00
										 |  |  | static int cipher_enabled(const SSL_CIPHER *ciph) | 
					
						
							|  |  |  | { | 
					
						
							|  |  |  |     /*
 | 
					
						
							|  |  |  |      * ssl_cipher_get_overhead() actually works with AEAD ciphers even if the | 
					
						
							|  |  |  |      * underlying implementation is not present. | 
					
						
							|  |  |  |      */ | 
					
						
							|  |  |  |     if ((ciph->algorithm_mac & SSL_AEAD) != 0) | 
					
						
							|  |  |  |         return 1; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (ciph->algorithm_enc != SSL_eNULL | 
					
						
							|  |  |  |             && EVP_get_cipherbynid(SSL_CIPHER_get_cipher_nid(ciph)) == NULL) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     if (EVP_get_digestbynid(SSL_CIPHER_get_digest_nid(ciph)) == NULL) | 
					
						
							|  |  |  |         return 0; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return 1; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  | static int cipher_overhead(void) | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  | { | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  |     int ret = 1, i, n = ssl3_num_ciphers(); | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  |     const SSL_CIPHER *ciph; | 
					
						
							|  |  |  |     size_t mac, in, blk, ex; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     for (i = 0; i < n; i++) { | 
					
						
							|  |  |  |         ciph = ssl3_get_cipher(i); | 
					
						
							|  |  |  |         if (!ciph->min_dtls) | 
					
						
							|  |  |  |             continue; | 
					
						
							| 
									
										
										
										
											2021-02-01 23:15:10 +08:00
										 |  |  |         if (!cipher_enabled(ciph)) { | 
					
						
							|  |  |  |             TEST_skip("Skipping disabled cipher %s", ciph->name); | 
					
						
							|  |  |  |             continue; | 
					
						
							|  |  |  |         } | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  |         if (!TEST_true(ssl_cipher_get_overhead(ciph, &mac, &in, &blk, &ex))) { | 
					
						
							|  |  |  |             TEST_info("Failed getting %s", ciph->name); | 
					
						
							|  |  |  |             ret = 0; | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  |         } else { | 
					
						
							| 
									
										
										
										
											2017-04-18 22:47:11 +08:00
										 |  |  |             TEST_info("Cipher %s: %zu %zu %zu %zu", | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  |                       ciph->name, mac, in, blk, ex); | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  |         } | 
					
						
							|  |  |  |     } | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  |     return ret; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-07-18 09:48:27 +08:00
										 |  |  | int setup_tests(void) | 
					
						
							| 
									
										
										
										
											2017-04-19 02:50:00 +08:00
										 |  |  | { | 
					
						
							|  |  |  |     ADD_TEST(cipher_overhead); | 
					
						
							| 
									
										
										
										
											2017-07-18 09:48:27 +08:00
										 |  |  |     return 1; | 
					
						
							| 
									
										
										
										
											2016-10-06 18:44:29 +08:00
										 |  |  | } |