From: Tomas Mraz Date: Fri, 20 May 2022 14:31:33 +0000 (+0200) Subject: Test the default key length of the Blowfish ciphers X-Git-Tag: openssl-3.2.0-alpha1~2630 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=091e60c42c5d2a194936da7f4de3ce82527b27a3;p=thirdparty%2Fopenssl.git Test the default key length of the Blowfish ciphers Reviewed-by: Matt Caswell Reviewed-by: Richard Levitte (Merged from https://github.com/openssl/openssl/pull/18362) --- diff --git a/test/evp_extra_test.c b/test/evp_extra_test.c index c44b60ce3cb..48b01cf72a2 100644 --- a/test/evp_extra_test.c +++ b/test/evp_extra_test.c @@ -3267,6 +3267,31 @@ err: } #endif +#ifndef OPENSSL_NO_BF +static int test_evp_bf_default_keylen(int idx) +{ + int ret = 0; + static const char *algos[4] = { + "bf-ecb", "bf-cbc", "bf-cfb", "bf-ofb" + }; + int ivlen[4] = { 0, 8, 8, 8 }; + EVP_CIPHER *cipher = NULL; + + if (lgcyprov == NULL) + return TEST_skip("Test requires legacy provider to be loaded"); + + if (!TEST_ptr(cipher = EVP_CIPHER_fetch(testctx, algos[idx], testpropq)) + || !TEST_int_eq(EVP_CIPHER_get_key_length(cipher), 16) + || !TEST_int_eq(EVP_CIPHER_get_iv_length(cipher), ivlen[idx])) + goto err; + + ret = 1; +err: + EVP_CIPHER_free(cipher); + return ret; +} +#endif + #ifndef OPENSSL_NO_EC static int ecpub_nids[] = { NID_brainpoolP256r1, NID_X9_62_prime256v1, @@ -4557,6 +4582,9 @@ int setup_tests(void) ADD_ALL_TESTS(test_evp_iv_aes, 12); #ifndef OPENSSL_NO_DES ADD_ALL_TESTS(test_evp_iv_des, 6); +#endif +#ifndef OPENSSL_NO_BF + ADD_ALL_TESTS(test_evp_bf_default_keylen, 4); #endif ADD_TEST(test_EVP_rsa_pss_with_keygen_bits); ADD_TEST(test_EVP_rsa_pss_set_saltlen);