| /* |
| * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the Apache License 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * https://www.openssl.org/source/license.html |
| * or in the file LICENSE in the source distribution. |
| */ |
| |
| #include <string.h> |
| #include <openssl/asn1.h> |
| #include <openssl/asn1t.h> |
| #include <openssl/core_names.h> |
| #include <openssl/core_object.h> |
| #include <openssl/rand.h> |
| #include <openssl/provider.h> |
| #include "testutil.h" |
| #include "fake_rsaprov.h" |
| #include "internal/asn1.h" |
| |
| static OSSL_FUNC_keymgmt_new_fn fake_rsa_keymgmt_new; |
| static OSSL_FUNC_keymgmt_free_fn fake_rsa_keymgmt_free; |
| static OSSL_FUNC_keymgmt_has_fn fake_rsa_keymgmt_has; |
| static OSSL_FUNC_keymgmt_query_operation_name_fn fake_rsa_keymgmt_query; |
| static OSSL_FUNC_keymgmt_import_fn fake_rsa_keymgmt_import; |
| static OSSL_FUNC_keymgmt_import_types_fn fake_rsa_keymgmt_imptypes; |
| static OSSL_FUNC_keymgmt_export_fn fake_rsa_keymgmt_export; |
| static OSSL_FUNC_keymgmt_export_types_fn fake_rsa_keymgmt_exptypes; |
| static OSSL_FUNC_keymgmt_load_fn fake_rsa_keymgmt_load; |
| |
| static int has_selection; |
| static int imptypes_selection; |
| static int exptypes_selection; |
| static int query_id; |
| static int key_deleted; |
| |
| unsigned fake_rsa_query_operation_name = 0; |
| |
| typedef struct { |
| OSSL_LIB_CTX *libctx; |
| } PROV_FAKE_RSA_CTX; |
| |
| #define PROV_FAKE_RSA_LIBCTX_OF(provctx) (((PROV_FAKE_RSA_CTX *)provctx)->libctx) |
| |
| #define FAKE_RSA_STATUS_IMPORTED 1 |
| #define FAKE_RSA_STATUS_GENERATED 2 |
| #define FAKE_RSA_STATUS_DECODED 3 |
| |
| struct fake_rsa_keydata { |
| int selection; |
| int status; |
| }; |
| |
| void fake_rsa_restore_store_state(void) |
| { |
| key_deleted = 0; |
| } |
| |
| static void *fake_rsa_keymgmt_new(void *provctx) |
| { |
| struct fake_rsa_keydata *key; |
| |
| if (!TEST_ptr(key = OPENSSL_zalloc(sizeof(struct fake_rsa_keydata)))) |
| return NULL; |
| |
| /* clear test globals */ |
| has_selection = 0; |
| imptypes_selection = 0; |
| exptypes_selection = 0; |
| query_id = 0; |
| |
| return key; |
| } |
| |
| static void fake_rsa_keymgmt_free(void *keydata) |
| { |
| OPENSSL_free(keydata); |
| } |
| |
| static int fake_rsa_keymgmt_has(const void *key, int selection) |
| { |
| /* record global for checking */ |
| has_selection = selection; |
| |
| return 1; |
| } |
| |
| |
| static const char *fake_rsa_keymgmt_query(int id) |
| { |
| /* record global for checking */ |
| query_id = id; |
| |
| return fake_rsa_query_operation_name ? NULL: "RSA"; |
| } |
| |
| static int fake_rsa_keymgmt_import(void *keydata, int selection, |
| const OSSL_PARAM *p) |
| { |
| struct fake_rsa_keydata *fake_rsa_key = keydata; |
| |
| /* key was imported */ |
| fake_rsa_key->status = FAKE_RSA_STATUS_IMPORTED; |
| |
| return 1; |
| } |
| |
| static unsigned char fake_rsa_n[] = |
| "\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F" |
| "\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5" |
| "\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93" |
| "\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1" |
| "\xF5"; |
| |
| static unsigned char fake_rsa_e[] = "\x11"; |
| |
| static unsigned char fake_rsa_d[] = |
| "\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44" |
| "\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64" |
| "\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9" |
| "\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51"; |
| |
| static unsigned char fake_rsa_p[] = |
| "\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5" |
| "\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12" |
| "\x0D"; |
| |
| static unsigned char fake_rsa_q[] = |
| "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" |
| "\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D" |
| "\x89"; |
| |
| static unsigned char fake_rsa_dmp1[] = |
| "\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF" |
| "\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05"; |
| |
| static unsigned char fake_rsa_dmq1[] = |
| "\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99" |
| "\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D" |
| "\x51"; |
| |
| static unsigned char fake_rsa_iqmp[] = |
| "\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8" |
| "\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26"; |
| |
| OSSL_PARAM *fake_rsa_key_params(int priv) |
| { |
| if (priv) { |
| OSSL_PARAM params[] = { |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n, |
| sizeof(fake_rsa_n) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e, |
| sizeof(fake_rsa_e) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, fake_rsa_d, |
| sizeof(fake_rsa_d) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, fake_rsa_p, |
| sizeof(fake_rsa_p) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, fake_rsa_q, |
| sizeof(fake_rsa_q) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, fake_rsa_dmp1, |
| sizeof(fake_rsa_dmp1) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, fake_rsa_dmq1, |
| sizeof(fake_rsa_dmq1) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, fake_rsa_iqmp, |
| sizeof(fake_rsa_iqmp) -1), |
| OSSL_PARAM_END |
| }; |
| return OSSL_PARAM_dup(params); |
| } else { |
| OSSL_PARAM params[] = { |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n, |
| sizeof(fake_rsa_n) -1), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e, |
| sizeof(fake_rsa_e) -1), |
| OSSL_PARAM_END |
| }; |
| return OSSL_PARAM_dup(params); |
| } |
| } |
| |
| static int fake_rsa_keymgmt_export(void *keydata, int selection, |
| OSSL_CALLBACK *param_callback, void *cbarg) |
| { |
| OSSL_PARAM *params = NULL; |
| int ret; |
| |
| if (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) |
| return 0; |
| |
| if (!TEST_ptr(params = fake_rsa_key_params(0))) |
| return 0; |
| |
| ret = param_callback(params, cbarg); |
| OSSL_PARAM_free(params); |
| return ret; |
| } |
| |
| static const OSSL_PARAM fake_rsa_import_key_types[] = { |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, NULL, 0), |
| OSSL_PARAM_END |
| }; |
| |
| static const OSSL_PARAM *fake_rsa_keymgmt_imptypes(int selection) |
| { |
| /* record global for checking */ |
| imptypes_selection = selection; |
| |
| return fake_rsa_import_key_types; |
| } |
| |
| static const OSSL_PARAM fake_rsa_export_key_types[] = { |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0), |
| OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0), |
| OSSL_PARAM_END |
| }; |
| |
| static const OSSL_PARAM *fake_rsa_keymgmt_exptypes(int selection) |
| { |
| /* record global for checking */ |
| exptypes_selection = selection; |
| |
| return fake_rsa_export_key_types; |
| } |
| |
| static void *fake_rsa_keymgmt_load(const void *reference, size_t reference_sz) |
| { |
| struct fake_rsa_keydata *key = NULL; |
| |
| if (reference_sz != sizeof(key)) |
| return NULL; |
| |
| key = *(struct fake_rsa_keydata **)reference; |
| if (key->status != FAKE_RSA_STATUS_IMPORTED && key->status != FAKE_RSA_STATUS_DECODED) |
| return NULL; |
| |
| /* detach the reference */ |
| *(struct fake_rsa_keydata **)reference = NULL; |
| |
| return key; |
| } |
| |
| static void *fake_rsa_gen_init(void *provctx, int selection, |
| const OSSL_PARAM params[]) |
| { |
| unsigned char *gctx = NULL; |
| |
| if (!TEST_ptr(gctx = OPENSSL_malloc(1))) |
| return NULL; |
| |
| *gctx = 1; |
| |
| return gctx; |
| } |
| |
| static void *fake_rsa_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) |
| { |
| unsigned char *gctx = genctx; |
| static const unsigned char inited[] = { 1 }; |
| struct fake_rsa_keydata *keydata; |
| |
| if (!TEST_ptr(gctx) |
| || !TEST_mem_eq(gctx, sizeof(*gctx), inited, sizeof(inited))) |
| return NULL; |
| |
| if (!TEST_ptr(keydata = fake_rsa_keymgmt_new(NULL))) |
| return NULL; |
| |
| keydata->status = FAKE_RSA_STATUS_GENERATED; |
| return keydata; |
| } |
| |
| static void fake_rsa_gen_cleanup(void *genctx) |
| { |
| OPENSSL_free(genctx); |
| } |
| |
| static const OSSL_DISPATCH fake_rsa_keymgmt_funcs[] = { |
| { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))fake_rsa_keymgmt_new }, |
| { OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))fake_rsa_keymgmt_free} , |
| { OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))fake_rsa_keymgmt_has }, |
| { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME, |
| (void (*)(void))fake_rsa_keymgmt_query }, |
| { OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))fake_rsa_keymgmt_import }, |
| { OSSL_FUNC_KEYMGMT_IMPORT_TYPES, |
| (void (*)(void))fake_rsa_keymgmt_imptypes }, |
| { OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))fake_rsa_keymgmt_export }, |
| { OSSL_FUNC_KEYMGMT_EXPORT_TYPES, |
| (void (*)(void))fake_rsa_keymgmt_exptypes }, |
| { OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))fake_rsa_keymgmt_load }, |
| { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))fake_rsa_gen_init }, |
| { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))fake_rsa_gen }, |
| { OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))fake_rsa_gen_cleanup }, |
| OSSL_DISPATCH_END |
| }; |
| |
| static const OSSL_ALGORITHM fake_rsa_keymgmt_algs[] = { |
| { "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_keymgmt_funcs, "Fake RSA Key Management" }, |
| { NULL, NULL, NULL, NULL } |
| }; |
| |
| static OSSL_FUNC_signature_newctx_fn fake_rsa_sig_newctx; |
| static OSSL_FUNC_signature_freectx_fn fake_rsa_sig_freectx; |
| static OSSL_FUNC_signature_sign_init_fn fake_rsa_sig_sign_init; |
| static OSSL_FUNC_signature_sign_fn fake_rsa_sig_sign; |
| |
| static void *fake_rsa_sig_newctx(void *provctx, const char *propq) |
| { |
| unsigned char *sigctx = OPENSSL_zalloc(1); |
| |
| TEST_ptr(sigctx); |
| |
| return sigctx; |
| } |
| |
| static void fake_rsa_sig_freectx(void *sigctx) |
| { |
| OPENSSL_free(sigctx); |
| } |
| |
| static int fake_rsa_sig_sign_init(void *ctx, void *provkey, |
| const OSSL_PARAM params[]) |
| { |
| unsigned char *sigctx = ctx; |
| struct fake_rsa_keydata *keydata = provkey; |
| |
| /* we must have a ctx */ |
| if (!TEST_ptr(sigctx)) |
| return 0; |
| |
| /* we must have some initialized key */ |
| if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0)) |
| return 0; |
| |
| /* record that sign init was called */ |
| *sigctx = 1; |
| return 1; |
| } |
| |
| static int fake_rsa_sig_sign(void *ctx, unsigned char *sig, |
| size_t *siglen, size_t sigsize, |
| const unsigned char *tbs, size_t tbslen) |
| { |
| unsigned char *sigctx = ctx; |
| |
| /* we must have a ctx and init was called upon it */ |
| if (!TEST_ptr(sigctx) || !TEST_int_eq(*sigctx, 1)) |
| return 0; |
| |
| *siglen = 256; |
| /* record that the real sign operation was called */ |
| if (sig != NULL) { |
| if (!TEST_size_t_ge(sigsize, *siglen)) |
| return 0; |
| *sigctx = 2; |
| /* produce a fake signature */ |
| memset(sig, 'a', *siglen); |
| } |
| |
| return 1; |
| } |
| |
| #define FAKE_DGSTSGN_SIGN 0x01 |
| #define FAKE_DGSTSGN_VERIFY 0x02 |
| #define FAKE_DGSTSGN_UPDATED 0x04 |
| #define FAKE_DGSTSGN_FINALISED 0x08 |
| #define FAKE_DGSTSGN_NO_DUP 0xA0 |
| |
| static void *fake_rsa_sig_dupctx(void *ctx) |
| { |
| unsigned char *sigctx = ctx; |
| unsigned char *newctx; |
| |
| if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0) |
| return NULL; |
| |
| if (!TEST_ptr(newctx = OPENSSL_zalloc(1))) |
| return NULL; |
| |
| *newctx = *sigctx; |
| return newctx; |
| } |
| |
| static int fake_rsa_dgstsgnvfy_init(void *ctx, unsigned char type, |
| void *provkey, const OSSL_PARAM params[]) |
| { |
| unsigned char *sigctx = ctx; |
| struct fake_rsa_keydata *keydata = provkey; |
| |
| /* we must have a ctx */ |
| if (!TEST_ptr(sigctx)) |
| return 0; |
| |
| /* we must have some initialized key */ |
| if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0)) |
| return 0; |
| |
| /* record that sign/verify init was called */ |
| *sigctx = type; |
| |
| if (params) { |
| const OSSL_PARAM *p; |
| int dup; |
| p = OSSL_PARAM_locate_const(params, "NO_DUP"); |
| if (p != NULL) { |
| if (OSSL_PARAM_get_int(p, &dup)) { |
| *sigctx |= FAKE_DGSTSGN_NO_DUP; |
| } |
| } |
| } |
| |
| return 1; |
| } |
| |
| static int fake_rsa_dgstsgn_init(void *ctx, const char *mdname, |
| void *provkey, const OSSL_PARAM params[]) |
| { |
| return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_SIGN, provkey, params); |
| } |
| |
| static int fake_rsa_dgstvfy_init(void *ctx, const char *mdname, |
| void *provkey, const OSSL_PARAM params[]) |
| { |
| return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_VERIFY, provkey, params); |
| } |
| |
| static int fake_rsa_dgstsgnvfy_update(void *ctx, const unsigned char *data, |
| size_t datalen) |
| { |
| unsigned char *sigctx = ctx; |
| |
| /* we must have a ctx */ |
| if (!TEST_ptr(sigctx)) |
| return 0; |
| |
| if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0) |
| return 0; |
| |
| *sigctx |= FAKE_DGSTSGN_UPDATED; |
| return 1; |
| } |
| |
| static int fake_rsa_dgstsgnvfy_final(void *ctx, unsigned char *sig, |
| size_t *siglen, size_t sigsize) |
| { |
| unsigned char *sigctx = ctx; |
| |
| /* we must have a ctx */ |
| if (!TEST_ptr(sigctx)) |
| return 0; |
| |
| if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0) |
| return 0; |
| |
| if ((*sigctx & FAKE_DGSTSGN_SIGN) != 0 && (siglen == NULL)) |
| return 0; |
| |
| if ((*sigctx & FAKE_DGSTSGN_VERIFY) != 0 && (siglen != NULL)) |
| return 0; |
| |
| /* this is sign op */ |
| if (siglen) { |
| *siglen = 256; |
| /* record that the real sign operation was called */ |
| if (sig != NULL) { |
| if (!TEST_size_t_ge(sigsize, *siglen)) |
| return 0; |
| /* produce a fake signature */ |
| memset(sig, 'a', *siglen); |
| } |
| } |
| |
| /* simulate inability to duplicate context and finalise it */ |
| if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0) { |
| *sigctx |= FAKE_DGSTSGN_FINALISED; |
| } |
| return 1; |
| } |
| |
| static int fake_rsa_dgstvfy_final(void *ctx, unsigned char *sig, |
| size_t siglen) |
| { |
| return fake_rsa_dgstsgnvfy_final(ctx, sig, NULL, siglen); |
| } |
| |
| static int fake_rsa_dgstsgn(void *ctx, unsigned char *sig, size_t *siglen, |
| size_t sigsize, const unsigned char *tbs, |
| size_t tbslen) |
| { |
| if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen)) |
| return 0; |
| |
| return fake_rsa_dgstsgnvfy_final(ctx, sig, siglen, sigsize); |
| } |
| |
| static int fake_rsa_dgstvfy(void *ctx, unsigned char *sig, size_t siglen, |
| const unsigned char *tbv, size_t tbvlen) |
| { |
| if (!fake_rsa_dgstsgnvfy_update(ctx, tbv, tbvlen)) |
| return 0; |
| |
| return fake_rsa_dgstvfy_final(ctx, sig, siglen); |
| } |
| |
| static const OSSL_DISPATCH fake_rsa_sig_funcs[] = { |
| { OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))fake_rsa_sig_newctx }, |
| { OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))fake_rsa_sig_freectx }, |
| { OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))fake_rsa_sig_sign_init }, |
| { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))fake_rsa_sig_sign }, |
| { OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))fake_rsa_sig_dupctx }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT, |
| (void (*)(void))fake_rsa_dgstsgn_init }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE, |
| (void (*)(void))fake_rsa_dgstsgnvfy_update }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL, |
| (void (*)(void))fake_rsa_dgstsgnvfy_final }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_SIGN, |
| (void (*)(void))fake_rsa_dgstsgn }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT, |
| (void (*)(void))fake_rsa_dgstvfy_init }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE, |
| (void (*)(void))fake_rsa_dgstsgnvfy_update }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL, |
| (void (*)(void))fake_rsa_dgstvfy_final }, |
| { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY, |
| (void (*)(void))fake_rsa_dgstvfy }, |
| OSSL_DISPATCH_END |
| }; |
| |
| static const OSSL_ALGORITHM fake_rsa_sig_algs[] = { |
| { "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_sig_funcs, "Fake RSA Signature" }, |
| { NULL, NULL, NULL, NULL } |
| }; |
| |
| static OSSL_FUNC_store_open_fn fake_rsa_st_open; |
| static OSSL_FUNC_store_open_ex_fn fake_rsa_st_open_ex; |
| static OSSL_FUNC_store_settable_ctx_params_fn fake_rsa_st_settable_ctx_params; |
| static OSSL_FUNC_store_set_ctx_params_fn fake_rsa_st_set_ctx_params; |
| static OSSL_FUNC_store_load_fn fake_rsa_st_load; |
| static OSSL_FUNC_store_eof_fn fake_rsa_st_eof; |
| static OSSL_FUNC_store_close_fn fake_rsa_st_close; |
| static OSSL_FUNC_store_delete_fn fake_rsa_st_delete; |
| |
| static const char fake_rsa_scheme[] = "fake_rsa:"; |
| static const char fake_rsa_openpwtest[] = "fake_rsa:openpwtest"; |
| static const char fake_rsa_prompt[] = "Fake Prompt Info"; |
| |
| static void *fake_rsa_st_open_ex(void *provctx, const char *uri, |
| const OSSL_PARAM params[], |
| OSSL_PASSPHRASE_CALLBACK *pw_cb, |
| void *pw_cbarg) |
| { |
| unsigned char *storectx = NULL; |
| |
| /* First check whether the uri is ours */ |
| if (strncmp(uri, fake_rsa_scheme, sizeof(fake_rsa_scheme) - 1) != 0) |
| return NULL; |
| |
| if (strncmp(uri, fake_rsa_openpwtest, |
| sizeof(fake_rsa_openpwtest) - 1) == 0) { |
| const char *pw_check = FAKE_PASSPHRASE; |
| char fakepw[sizeof(FAKE_PASSPHRASE) + 1] = { 0 }; |
| size_t fakepw_len = 0; |
| OSSL_PARAM pw_params[2] = { |
| OSSL_PARAM_utf8_string(OSSL_PASSPHRASE_PARAM_INFO, |
| (void *)fake_rsa_prompt, |
| sizeof(fake_rsa_prompt) - 1), |
| OSSL_PARAM_END, |
| }; |
| |
| if (pw_cb == NULL) { |
| return NULL; |
| } |
| |
| if (!pw_cb(fakepw, sizeof(fakepw), &fakepw_len, pw_params, pw_cbarg)) { |
| TEST_info("fake_rsa_open_ex failed passphrase callback"); |
| return NULL; |
| } |
| if (strncmp(pw_check, fakepw, sizeof(pw_check) - 1) != 0) { |
| TEST_info("fake_rsa_open_ex failed passphrase check"); |
| return NULL; |
| } |
| } |
| |
| storectx = OPENSSL_zalloc(1); |
| if (!TEST_ptr(storectx)) |
| return NULL; |
| |
| TEST_info("fake_rsa_open_ex called"); |
| |
| return storectx; |
| } |
| |
| static void *fake_rsa_st_open(void *provctx, const char *uri) |
| { |
| unsigned char *storectx = NULL; |
| |
| storectx = fake_rsa_st_open_ex(provctx, uri, NULL, NULL, NULL); |
| |
| TEST_info("fake_rsa_open called"); |
| |
| return storectx; |
| } |
| |
| static const OSSL_PARAM *fake_rsa_st_settable_ctx_params(void *provctx) |
| { |
| static const OSSL_PARAM known_settable_ctx_params[] = { |
| OSSL_PARAM_END |
| }; |
| return known_settable_ctx_params; |
| } |
| |
| static int fake_rsa_st_set_ctx_params(void *loaderctx, |
| const OSSL_PARAM params[]) |
| { |
| return 1; |
| } |
| |
| static int fake_rsa_st_load(void *loaderctx, |
| OSSL_CALLBACK *object_cb, void *object_cbarg, |
| OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) |
| { |
| unsigned char *storectx = loaderctx; |
| OSSL_PARAM params[4]; |
| int object_type = OSSL_OBJECT_PKEY; |
| struct fake_rsa_keydata *key = NULL; |
| int rv = 0; |
| |
| switch (*storectx) { |
| case 0: |
| if (key_deleted == 1) { |
| *storectx = 1; |
| break; |
| } |
| |
| /* Construct a new key using our keymgmt functions */ |
| if (!TEST_ptr(key = fake_rsa_keymgmt_new(NULL))) |
| break; |
| if (!TEST_int_gt(fake_rsa_keymgmt_import(key, 0, NULL), 0)) |
| break; |
| params[0] = |
| OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &object_type); |
| params[1] = |
| OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE, |
| "RSA", 0); |
| /* The address of the key becomes the octet string */ |
| params[2] = |
| OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE, |
| &key, sizeof(key)); |
| params[3] = OSSL_PARAM_construct_end(); |
| rv = object_cb(params, object_cbarg); |
| *storectx = 1; |
| break; |
| |
| case 2: |
| TEST_info("fake_rsa_load() called in error state"); |
| break; |
| |
| default: |
| TEST_info("fake_rsa_load() called in eof state"); |
| break; |
| } |
| |
| TEST_info("fake_rsa_load called - rv: %d", rv); |
| |
| if (rv == 0 && key_deleted == 0) { |
| fake_rsa_keymgmt_free(key); |
| *storectx = 2; |
| } |
| return rv; |
| } |
| |
| static int fake_rsa_st_delete(void *loaderctx, const char *uri, |
| const OSSL_PARAM params[], |
| OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) |
| { |
| key_deleted = 1; |
| return 1; |
| } |
| |
| static int fake_rsa_st_eof(void *loaderctx) |
| { |
| unsigned char *storectx = loaderctx; |
| |
| /* just one key for now in the fake_rsa store */ |
| return *storectx != 0; |
| } |
| |
| static int fake_rsa_st_close(void *loaderctx) |
| { |
| OPENSSL_free(loaderctx); |
| return 1; |
| } |
| |
| static const OSSL_DISPATCH fake_rsa_store_funcs[] = { |
| { OSSL_FUNC_STORE_OPEN, (void (*)(void))fake_rsa_st_open }, |
| { OSSL_FUNC_STORE_OPEN_EX, (void (*)(void))fake_rsa_st_open_ex }, |
| { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS, |
| (void (*)(void))fake_rsa_st_settable_ctx_params }, |
| { OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))fake_rsa_st_set_ctx_params }, |
| { OSSL_FUNC_STORE_LOAD, (void (*)(void))fake_rsa_st_load }, |
| { OSSL_FUNC_STORE_EOF, (void (*)(void))fake_rsa_st_eof }, |
| { OSSL_FUNC_STORE_CLOSE, (void (*)(void))fake_rsa_st_close }, |
| { OSSL_FUNC_STORE_DELETE, (void (*)(void))fake_rsa_st_delete }, |
| OSSL_DISPATCH_END, |
| }; |
| |
| static const OSSL_ALGORITHM fake_rsa_store_algs[] = { |
| { "fake_rsa", "provider=fake-rsa", fake_rsa_store_funcs }, |
| { NULL, NULL, NULL } |
| }; |
| |
| struct der2key_ctx_st; /* Forward declaration */ |
| typedef int check_key_fn(void *, struct der2key_ctx_st *ctx); |
| typedef void adjust_key_fn(void *, struct der2key_ctx_st *ctx); |
| typedef void free_key_fn(void *); |
| typedef void *d2i_PKCS8_fn(void **, const unsigned char **, long, |
| struct der2key_ctx_st *); |
| struct keytype_desc_st { |
| const char *keytype_name; |
| const OSSL_DISPATCH *fns; /* Keymgmt (to pilfer functions from) */ |
| |
| /* The input structure name */ |
| const char *structure_name; |
| |
| /* |
| * The EVP_PKEY_xxx type macro. Should be zero for type specific |
| * structures, non-zero when the outermost structure is PKCS#8 or |
| * SubjectPublicKeyInfo. This determines which of the function |
| * pointers below will be used. |
| */ |
| int evp_type; |
| |
| /* The selection mask for OSSL_FUNC_decoder_does_selection() */ |
| int selection_mask; |
| |
| /* For type specific decoders, we use the corresponding d2i */ |
| d2i_of_void *d2i_private_key; /* From type-specific DER */ |
| d2i_of_void *d2i_public_key; /* From type-specific DER */ |
| d2i_of_void *d2i_key_params; /* From type-specific DER */ |
| d2i_PKCS8_fn *d2i_PKCS8; /* Wrapped in a PrivateKeyInfo */ |
| d2i_of_void *d2i_PUBKEY; /* Wrapped in a SubjectPublicKeyInfo */ |
| |
| /* |
| * For any key, we may need to check that the key meets expectations. |
| * This is useful when the same functions can decode several variants |
| * of a key. |
| */ |
| check_key_fn *check_key; |
| |
| /* |
| * For any key, we may need to make provider specific adjustments, such |
| * as ensure the key carries the correct library context. |
| */ |
| adjust_key_fn *adjust_key; |
| /* {type}_free() */ |
| free_key_fn *free_key; |
| }; |
| |
| /* |
| * Start blatant code steal. Alternative: Open up d2i_X509_PUBKEY_INTERNAL |
| * as per https://github.com/openssl/openssl/issues/16697 (TBD) |
| * Code from openssl/crypto/x509/x_pubkey.c as |
| * ossl_d2i_X509_PUBKEY_INTERNAL is presently not public |
| */ |
| struct X509_pubkey_st { |
| X509_ALGOR *algor; |
| ASN1_BIT_STRING *public_key; |
| |
| EVP_PKEY *pkey; |
| |
| /* extra data for the callback, used by d2i_PUBKEY_ex */ |
| OSSL_LIB_CTX *libctx; |
| char *propq; |
| }; |
| |
| ASN1_SEQUENCE(X509_PUBKEY_INTERNAL) = { |
| ASN1_SIMPLE(X509_PUBKEY, algor, X509_ALGOR), |
| ASN1_SIMPLE(X509_PUBKEY, public_key, ASN1_BIT_STRING) |
| } static_ASN1_SEQUENCE_END_name(X509_PUBKEY, X509_PUBKEY_INTERNAL) |
| |
| static X509_PUBKEY *fake_rsa_d2i_X509_PUBKEY_INTERNAL(const unsigned char **pp, |
| long len, OSSL_LIB_CTX *libctx) |
| { |
| X509_PUBKEY *xpub = OPENSSL_zalloc(sizeof(*xpub)); |
| |
| if (xpub == NULL) |
| return NULL; |
| return (X509_PUBKEY *)ASN1_item_d2i_ex((ASN1_VALUE **)&xpub, pp, len, |
| ASN1_ITEM_rptr(X509_PUBKEY_INTERNAL), |
| libctx, NULL); |
| } |
| /* end steal https://github.com/openssl/openssl/issues/16697 */ |
| |
| /* |
| * Context used for DER to key decoding. |
| */ |
| struct der2key_ctx_st { |
| PROV_FAKE_RSA_CTX *provctx; |
| struct keytype_desc_st *desc; |
| /* The selection that is passed to fake_rsa_der2key_decode() */ |
| int selection; |
| /* Flag used to signal that a failure is fatal */ |
| unsigned int flag_fatal : 1; |
| }; |
| |
| static int fake_rsa_read_der(PROV_FAKE_RSA_CTX *provctx, OSSL_CORE_BIO *cin, |
| unsigned char **data, long *len) |
| { |
| BUF_MEM *mem = NULL; |
| BIO *in = BIO_new_from_core_bio(provctx->libctx, cin); |
| int ok = (asn1_d2i_read_bio(in, &mem) >= 0); |
| |
| if (ok) { |
| *data = (unsigned char *)mem->data; |
| *len = (long)mem->length; |
| OPENSSL_free(mem); |
| } |
| BIO_free(in); |
| return ok; |
| } |
| |
| typedef void *key_from_pkcs8_t(const PKCS8_PRIV_KEY_INFO *p8inf, |
| OSSL_LIB_CTX *libctx, const char *propq); |
| static void *fake_rsa_der2key_decode_p8(const unsigned char **input_der, |
| long input_der_len, struct der2key_ctx_st *ctx, |
| key_from_pkcs8_t *key_from_pkcs8) |
| { |
| PKCS8_PRIV_KEY_INFO *p8inf = NULL; |
| const X509_ALGOR *alg = NULL; |
| void *key = NULL; |
| |
| if ((p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, input_der, input_der_len)) != NULL |
| && PKCS8_pkey_get0(NULL, NULL, NULL, &alg, p8inf) |
| && OBJ_obj2nid(alg->algorithm) == ctx->desc->evp_type) |
| key = key_from_pkcs8(p8inf, PROV_FAKE_RSA_LIBCTX_OF(ctx->provctx), NULL); |
| PKCS8_PRIV_KEY_INFO_free(p8inf); |
| |
| return key; |
| } |
| |
| static struct fake_rsa_keydata *fake_rsa_d2i_PUBKEY(struct fake_rsa_keydata **a, |
| const unsigned char **pp, long length) |
| { |
| struct fake_rsa_keydata *key = NULL; |
| X509_PUBKEY *xpk; |
| |
| xpk = fake_rsa_d2i_X509_PUBKEY_INTERNAL(pp, length, NULL); |
| if (xpk == NULL) |
| goto err_exit; |
| |
| key = fake_rsa_keymgmt_new(NULL); |
| if (key == NULL) |
| goto err_exit; |
| |
| key->status = FAKE_RSA_STATUS_DECODED; |
| |
| if (a != NULL) { |
| fake_rsa_keymgmt_free(*a); |
| *a = key; |
| } |
| |
| err_exit: |
| X509_PUBKEY_free(xpk); |
| return key; |
| } |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| static OSSL_FUNC_decoder_freectx_fn der2key_freectx; |
| static OSSL_FUNC_decoder_decode_fn fake_rsa_der2key_decode; |
| static OSSL_FUNC_decoder_export_object_fn der2key_export_object; |
| |
| static struct der2key_ctx_st * |
| der2key_newctx(void *provctx, struct keytype_desc_st *desc, const char *tls_name) |
| { |
| struct der2key_ctx_st *ctx = OPENSSL_zalloc(sizeof(*ctx)); |
| |
| if (ctx != NULL) { |
| ctx->provctx = provctx; |
| ctx->desc = desc; |
| if (desc->evp_type == 0) |
| ctx->desc->evp_type = OBJ_sn2nid(tls_name); |
| } |
| return ctx; |
| } |
| |
| static void der2key_freectx(void *vctx) |
| { |
| struct der2key_ctx_st *ctx = vctx; |
| |
| OPENSSL_free(ctx); |
| } |
| |
| static int der2key_check_selection(int selection, |
| const struct keytype_desc_st *desc) |
| { |
| /* |
| * The selections are kinda sorta "levels", i.e. each selection given |
| * here is assumed to include those following. |
| */ |
| int checks[] = { |
| OSSL_KEYMGMT_SELECT_PRIVATE_KEY, |
| OSSL_KEYMGMT_SELECT_PUBLIC_KEY, |
| OSSL_KEYMGMT_SELECT_ALL_PARAMETERS |
| }; |
| size_t i; |
| |
| /* The decoder implementations made here support guessing */ |
| if (selection == 0) |
| return 1; |
| |
| for (i = 0; i < OSSL_NELEM(checks); i++) { |
| int check1 = (selection & checks[i]) != 0; |
| int check2 = (desc->selection_mask & checks[i]) != 0; |
| |
| /* |
| * If the caller asked for the currently checked bit(s), return |
| * whether the decoder description says it's supported. |
| */ |
| if (check1) |
| return check2; |
| } |
| |
| /* This should be dead code, but just to be safe... */ |
| return 0; |
| } |
| |
| static int fake_rsa_der2key_decode(void *vctx, OSSL_CORE_BIO *cin, int selection, |
| OSSL_CALLBACK *data_cb, void *data_cbarg, |
| OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) |
| { |
| struct der2key_ctx_st *ctx = vctx; |
| unsigned char *der = NULL; |
| const unsigned char *derp; |
| long der_len = 0; |
| void *key = NULL; |
| int ok = 0; |
| |
| ctx->selection = selection; |
| /* |
| * The caller is allowed to specify 0 as a selection mark, to have the |
| * structure and key type guessed. For type-specific structures, this |
| * is not recommended, as some structures are very similar. |
| * Note that 0 isn't the same as OSSL_KEYMGMT_SELECT_ALL, as the latter |
| * signifies a private key structure, where everything else is assumed |
| * to be present as well. |
| */ |
| if (selection == 0) |
| selection = ctx->desc->selection_mask; |
| if ((selection & ctx->desc->selection_mask) == 0) { |
| ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_INVALID_ARGUMENT); |
| return 0; |
| } |
| |
| ok = fake_rsa_read_der(ctx->provctx, cin, &der, &der_len); |
| if (!ok) |
| goto next; |
| |
| ok = 0; /* Assume that we fail */ |
| |
| if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { |
| derp = der; |
| if (ctx->desc->d2i_PKCS8 != NULL) { |
| key = ctx->desc->d2i_PKCS8(NULL, &derp, der_len, ctx); |
| if (ctx->flag_fatal) |
| goto end; |
| } else if (ctx->desc->d2i_private_key != NULL) { |
| key = ctx->desc->d2i_private_key(NULL, &derp, der_len); |
| } |
| if (key == NULL && ctx->selection != 0) |
| goto next; |
| } |
| if (key == NULL && (selection & OSSL_KEYMGMT_SELECT_PUBLIC_KEY) != 0) { |
| derp = der; |
| if (ctx->desc->d2i_PUBKEY != NULL) |
| key = ctx->desc->d2i_PUBKEY(NULL, &derp, der_len); |
| else |
| key = ctx->desc->d2i_public_key(NULL, &derp, der_len); |
| if (key == NULL && ctx->selection != 0) |
| goto next; |
| } |
| if (key == NULL && (selection & OSSL_KEYMGMT_SELECT_ALL_PARAMETERS) != 0) { |
| derp = der; |
| if (ctx->desc->d2i_key_params != NULL) |
| key = ctx->desc->d2i_key_params(NULL, &derp, der_len); |
| if (key == NULL && ctx->selection != 0) |
| goto next; |
| } |
| |
| /* |
| * Last minute check to see if this was the correct type of key. This |
| * should never lead to a fatal error, i.e. the decoding itself was |
| * correct, it was just an unexpected key type. This is generally for |
| * classes of key types that have subtle variants, like RSA-PSS keys as |
| * opposed to plain RSA keys. |
| */ |
| if (key != NULL |
| && ctx->desc->check_key != NULL |
| && !ctx->desc->check_key(key, ctx)) { |
| ctx->desc->free_key(key); |
| key = NULL; |
| } |
| |
| if (key != NULL && ctx->desc->adjust_key != NULL) |
| ctx->desc->adjust_key(key, ctx); |
| |
| next: |
| /* |
| * Indicated that we successfully decoded something, or not at all. |
| * Ending up "empty handed" is not an error. |
| */ |
| ok = 1; |
| |
| /* |
| * We free memory here so it's not held up during the callback, because |
| * we know the process is recursive and the allocated chunks of memory |
| * add up. |
| */ |
| OPENSSL_free(der); |
| der = NULL; |
| |
| if (key != NULL) { |
| OSSL_PARAM params[4]; |
| int object_type = OSSL_OBJECT_PKEY; |
| |
| params[0] = |
| OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &object_type); |
| params[1] = |
| OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE, |
| (char *)ctx->desc->keytype_name, |
| 0); |
| /* The address of the key becomes the octet string */ |
| params[2] = |
| OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE, |
| &key, sizeof(key)); |
| params[3] = OSSL_PARAM_construct_end(); |
| |
| ok = data_cb(params, data_cbarg); |
| } |
| |
| end: |
| ctx->desc->free_key(key); |
| OPENSSL_free(der); |
| |
| return ok; |
| } |
| |
| static OSSL_FUNC_keymgmt_export_fn * |
| fake_rsa_prov_get_keymgmt_export(const OSSL_DISPATCH *fns) |
| { |
| /* Pilfer the keymgmt dispatch table */ |
| for (; fns->function_id != 0; fns++) |
| if (fns->function_id == OSSL_FUNC_KEYMGMT_EXPORT) |
| return OSSL_FUNC_keymgmt_export(fns); |
| |
| return NULL; |
| } |
| |
| static int der2key_export_object(void *vctx, |
| const void *reference, size_t reference_sz, |
| OSSL_CALLBACK *export_cb, void *export_cbarg) |
| { |
| struct der2key_ctx_st *ctx = vctx; |
| OSSL_FUNC_keymgmt_export_fn *export = fake_rsa_prov_get_keymgmt_export(ctx->desc->fns); |
| void *keydata; |
| |
| if (reference_sz == sizeof(keydata) && export != NULL) { |
| /* The contents of the reference is the address to our object */ |
| keydata = *(void **)reference; |
| |
| return export(keydata, ctx->selection, export_cb, export_cbarg); |
| } |
| return 0; |
| } |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| static struct fake_rsa_keydata *fake_rsa_key_from_pkcs8(const PKCS8_PRIV_KEY_INFO *p8inf, |
| OSSL_LIB_CTX *libctx, const char *propq) |
| { |
| struct fake_rsa_keydata *key = fake_rsa_keymgmt_new(NULL); |
| |
| if (key) |
| key->status = FAKE_RSA_STATUS_DECODED; |
| return key; |
| } |
| |
| #define rsa_evp_type EVP_PKEY_RSA |
| |
| static void *fake_rsa_d2i_PKCS8(void **key, const unsigned char **der, long der_len, |
| struct der2key_ctx_st *ctx) |
| { |
| return fake_rsa_der2key_decode_p8(der, der_len, ctx, |
| (key_from_pkcs8_t *)fake_rsa_key_from_pkcs8); |
| } |
| |
| static void fake_rsa_key_adjust(void *key, struct der2key_ctx_st *ctx) |
| { |
| } |
| |
| /* ---------------------------------------------------------------------- */ |
| |
| #define DO_PrivateKeyInfo(keytype) \ |
| "PrivateKeyInfo", keytype##_evp_type, \ |
| (OSSL_KEYMGMT_SELECT_PRIVATE_KEY), \ |
| NULL, \ |
| NULL, \ |
| NULL, \ |
| fake_rsa_d2i_PKCS8, \ |
| NULL, \ |
| NULL, \ |
| fake_rsa_key_adjust, \ |
| (free_key_fn *)fake_rsa_keymgmt_free |
| |
| #define DO_SubjectPublicKeyInfo(keytype) \ |
| "SubjectPublicKeyInfo", keytype##_evp_type, \ |
| (OSSL_KEYMGMT_SELECT_PUBLIC_KEY), \ |
| NULL, \ |
| NULL, \ |
| NULL, \ |
| NULL, \ |
| (d2i_of_void *)fake_rsa_d2i_PUBKEY, \ |
| NULL, \ |
| fake_rsa_key_adjust, \ |
| (free_key_fn *)fake_rsa_keymgmt_free |
| |
| /* |
| * MAKE_DECODER is the single driver for creating OSSL_DISPATCH tables. |
| * It takes the following arguments: |
| * |
| * keytype_name The implementation key type as a string. |
| * keytype The implementation key type. This must correspond exactly |
| * to our existing keymgmt keytype names... in other words, |
| * there must exist an ossl_##keytype##_keymgmt_functions. |
| * type The type name for the set of functions that implement the |
| * decoder for the key type. This isn't necessarily the same |
| * as keytype. For example, the key types ed25519, ed448, |
| * x25519 and x448 are all handled by the same functions with |
| * the common type name ecx. |
| * kind The kind of support to implement. This translates into |
| * the DO_##kind macros above, to populate the keytype_desc_st |
| * structure. |
| */ |
| #define MAKE_DECODER(keytype_name, keytype, type, kind) \ |
| static struct keytype_desc_st kind##_##keytype##_desc = \ |
| { keytype_name, fake_rsa_keymgmt_funcs, \ |
| DO_##kind(keytype) }; \ |
| \ |
| static OSSL_FUNC_decoder_newctx_fn kind##_der2##keytype##_newctx; \ |
| \ |
| static void *kind##_der2##keytype##_newctx(void *provctx) \ |
| { \ |
| return der2key_newctx(provctx, &kind##_##keytype##_desc, keytype_name);\ |
| } \ |
| static int kind##_der2##keytype##_does_selection(void *provctx, \ |
| int selection) \ |
| { \ |
| return der2key_check_selection(selection, \ |
| &kind##_##keytype##_desc); \ |
| } \ |
| static const OSSL_DISPATCH \ |
| fake_rsa_##kind##_der_to_##keytype##_decoder_functions[] = { \ |
| { OSSL_FUNC_DECODER_NEWCTX, \ |
| (void (*)(void))kind##_der2##keytype##_newctx }, \ |
| { OSSL_FUNC_DECODER_FREECTX, \ |
| (void (*)(void))der2key_freectx }, \ |
| { OSSL_FUNC_DECODER_DOES_SELECTION, \ |
| (void (*)(void))kind##_der2##keytype##_does_selection }, \ |
| { OSSL_FUNC_DECODER_DECODE, \ |
| (void (*)(void))fake_rsa_der2key_decode }, \ |
| { OSSL_FUNC_DECODER_EXPORT_OBJECT, \ |
| (void (*)(void))der2key_export_object }, \ |
| OSSL_DISPATCH_END \ |
| } |
| |
| MAKE_DECODER("RSA", rsa, rsa, PrivateKeyInfo); |
| MAKE_DECODER("RSA", rsa, rsa, SubjectPublicKeyInfo); |
| |
| static const OSSL_ALGORITHM fake_rsa_decoder_algs[] = { |
| #define DECODER_PROVIDER "fake-rsa" |
| #define DECODER_STRUCTURE_SubjectPublicKeyInfo "SubjectPublicKeyInfo" |
| #define DECODER_STRUCTURE_PrivateKeyInfo "PrivateKeyInfo" |
| |
| /* Arguments are prefixed with '_' to avoid build breaks on certain platforms */ |
| /* |
| * Obviously this is not FIPS approved, but in order to test in conjunction |
| * with the FIPS provider we pretend that it is. |
| */ |
| |
| #define DECODER(_name, _input, _output) \ |
| { _name, \ |
| "provider=" DECODER_PROVIDER ",fips=yes,input=" #_input, \ |
| (fake_rsa_##_input##_to_##_output##_decoder_functions) \ |
| } |
| #define DECODER_w_structure(_name, _input, _structure, _output) \ |
| { _name, \ |
| "provider=" DECODER_PROVIDER ",fips=yes,input=" #_input \ |
| ",structure=" DECODER_STRUCTURE_##_structure, \ |
| (fake_rsa_##_structure##_##_input##_to_##_output##_decoder_functions) \ |
| } |
| |
| DECODER_w_structure("RSA:rsaEncryption", der, PrivateKeyInfo, rsa), |
| DECODER_w_structure("RSA:rsaEncryption", der, SubjectPublicKeyInfo, rsa), |
| #undef DECODER_PROVIDER |
| { NULL, NULL, NULL } |
| }; |
| |
| static const OSSL_ALGORITHM *fake_rsa_query(void *provctx, |
| int operation_id, |
| int *no_cache) |
| { |
| *no_cache = 0; |
| switch (operation_id) { |
| case OSSL_OP_SIGNATURE: |
| return fake_rsa_sig_algs; |
| |
| case OSSL_OP_KEYMGMT: |
| return fake_rsa_keymgmt_algs; |
| |
| case OSSL_OP_STORE: |
| return fake_rsa_store_algs; |
| |
| case OSSL_OP_DECODER: |
| return fake_rsa_decoder_algs; |
| } |
| return NULL; |
| } |
| |
| static void fake_rsa_prov_teardown(void *provctx) |
| { |
| PROV_FAKE_RSA_CTX *pctx = (PROV_FAKE_RSA_CTX *)provctx; |
| |
| OSSL_LIB_CTX_free(pctx->libctx); |
| OPENSSL_free(pctx); |
| } |
| |
| /* Functions we provide to the core */ |
| static const OSSL_DISPATCH fake_rsa_method[] = { |
| { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))fake_rsa_prov_teardown }, |
| { OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))fake_rsa_query }, |
| OSSL_DISPATCH_END |
| }; |
| |
| static int fake_rsa_provider_init(const OSSL_CORE_HANDLE *handle, |
| const OSSL_DISPATCH *in, |
| const OSSL_DISPATCH **out, void **provctx) |
| { |
| OSSL_LIB_CTX *libctx; |
| PROV_FAKE_RSA_CTX *prov_ctx; |
| |
| if (!TEST_ptr(libctx = OSSL_LIB_CTX_new_from_dispatch(handle, in))) |
| return 0; |
| |
| if (!TEST_ptr(prov_ctx = OPENSSL_malloc(sizeof(*prov_ctx)))) { |
| OSSL_LIB_CTX_free(libctx); |
| return 0; |
| } |
| |
| prov_ctx->libctx = libctx; |
| |
| *provctx = prov_ctx; |
| *out = fake_rsa_method; |
| return 1; |
| } |
| |
| OSSL_PROVIDER *fake_rsa_start(OSSL_LIB_CTX *libctx) |
| { |
| OSSL_PROVIDER *p; |
| |
| if (!TEST_true(OSSL_PROVIDER_add_builtin(libctx, "fake-rsa", |
| fake_rsa_provider_init)) |
| || !TEST_ptr(p = OSSL_PROVIDER_try_load(libctx, "fake-rsa", 1))) |
| return NULL; |
| |
| return p; |
| } |
| |
| void fake_rsa_finish(OSSL_PROVIDER *p) |
| { |
| OSSL_PROVIDER_unload(p); |
| } |