openssl/test/fake_rsaprov.c

691 lines
21 KiB
C
Raw Normal View History

/*
* Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
* https://www.openssl.org/source/license.html
* or in the file LICENSE in the source distribution.
*/
#include <string.h>
#include <openssl/core_names.h>
#include <openssl/core_object.h>
#include <openssl/rand.h>
#include <openssl/provider.h>
#include "testutil.h"
#include "fake_rsaprov.h"
static OSSL_FUNC_keymgmt_new_fn fake_rsa_keymgmt_new;
static OSSL_FUNC_keymgmt_free_fn fake_rsa_keymgmt_free;
static OSSL_FUNC_keymgmt_has_fn fake_rsa_keymgmt_has;
static OSSL_FUNC_keymgmt_query_operation_name_fn fake_rsa_keymgmt_query;
static OSSL_FUNC_keymgmt_import_fn fake_rsa_keymgmt_import;
static OSSL_FUNC_keymgmt_import_types_fn fake_rsa_keymgmt_imptypes;
static OSSL_FUNC_keymgmt_export_fn fake_rsa_keymgmt_export;
static OSSL_FUNC_keymgmt_export_types_fn fake_rsa_keymgmt_exptypes;
static OSSL_FUNC_keymgmt_load_fn fake_rsa_keymgmt_load;
static int has_selection;
static int imptypes_selection;
static int exptypes_selection;
static int query_id;
struct fake_rsa_keydata {
int selection;
int status;
};
static void *fake_rsa_keymgmt_new(void *provctx)
{
struct fake_rsa_keydata *key;
if (!TEST_ptr(key = OPENSSL_zalloc(sizeof(struct fake_rsa_keydata))))
return NULL;
/* clear test globals */
has_selection = 0;
imptypes_selection = 0;
exptypes_selection = 0;
query_id = 0;
return key;
}
static void fake_rsa_keymgmt_free(void *keydata)
{
OPENSSL_free(keydata);
}
static int fake_rsa_keymgmt_has(const void *key, int selection)
{
/* record global for checking */
has_selection = selection;
return 1;
}
static const char *fake_rsa_keymgmt_query(int id)
{
/* record global for checking */
query_id = id;
return "RSA";
}
static int fake_rsa_keymgmt_import(void *keydata, int selection,
const OSSL_PARAM *p)
{
struct fake_rsa_keydata *fake_rsa_key = keydata;
/* key was imported */
fake_rsa_key->status = 1;
return 1;
}
static unsigned char fake_rsa_n[] =
"\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F"
"\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5"
"\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93"
"\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1"
"\xF5";
static unsigned char fake_rsa_e[] = "\x11";
static unsigned char fake_rsa_d[] =
"\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44"
"\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64"
"\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9"
"\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51";
static unsigned char fake_rsa_p[] =
"\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5"
"\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12"
"\x0D";
static unsigned char fake_rsa_q[] =
"\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
"\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D"
"\x89";
static unsigned char fake_rsa_dmp1[] =
"\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF"
"\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05";
static unsigned char fake_rsa_dmq1[] =
"\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99"
"\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D"
"\x51";
static unsigned char fake_rsa_iqmp[] =
"\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8"
"\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26";
OSSL_PARAM *fake_rsa_key_params(int priv)
{
if (priv) {
OSSL_PARAM params[] = {
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n,
sizeof(fake_rsa_n) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e,
sizeof(fake_rsa_e) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, fake_rsa_d,
sizeof(fake_rsa_d) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, fake_rsa_p,
sizeof(fake_rsa_p) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, fake_rsa_q,
sizeof(fake_rsa_q) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, fake_rsa_dmp1,
sizeof(fake_rsa_dmp1) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, fake_rsa_dmq1,
sizeof(fake_rsa_dmq1) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, fake_rsa_iqmp,
sizeof(fake_rsa_iqmp) -1),
OSSL_PARAM_END
};
return OSSL_PARAM_dup(params);
} else {
OSSL_PARAM params[] = {
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n,
sizeof(fake_rsa_n) -1),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e,
sizeof(fake_rsa_e) -1),
OSSL_PARAM_END
};
return OSSL_PARAM_dup(params);
}
}
static int fake_rsa_keymgmt_export(void *keydata, int selection,
OSSL_CALLBACK *param_callback, void *cbarg)
{
OSSL_PARAM *params = NULL;
int ret;
if (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY)
return 0;
if (!TEST_ptr(params = fake_rsa_key_params(0)))
return 0;
ret = param_callback(params, cbarg);
OSSL_PARAM_free(params);
return ret;
}
static const OSSL_PARAM fake_rsa_import_key_types[] = {
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, NULL, 0),
OSSL_PARAM_END
};
static const OSSL_PARAM *fake_rsa_keymgmt_imptypes(int selection)
{
/* record global for checking */
imptypes_selection = selection;
return fake_rsa_import_key_types;
}
static const OSSL_PARAM fake_rsa_export_key_types[] = {
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0),
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0),
OSSL_PARAM_END
};
static const OSSL_PARAM *fake_rsa_keymgmt_exptypes(int selection)
{
/* record global for checking */
exptypes_selection = selection;
return fake_rsa_export_key_types;
}
static void *fake_rsa_keymgmt_load(const void *reference, size_t reference_sz)
{
struct fake_rsa_keydata *key = NULL;
if (reference_sz != sizeof(*key))
return NULL;
key = *(struct fake_rsa_keydata **)reference;
if (key->status != 1)
return NULL;
/* detach the reference */
*(struct fake_rsa_keydata **)reference = NULL;
return key;
}
static void *fake_rsa_gen_init(void *provctx, int selection,
const OSSL_PARAM params[])
{
unsigned char *gctx = NULL;
if (!TEST_ptr(gctx = OPENSSL_malloc(1)))
return NULL;
*gctx = 1;
return gctx;
}
static void *fake_rsa_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg)
{
unsigned char *gctx = genctx;
static const unsigned char inited[] = { 1 };
struct fake_rsa_keydata *keydata;
if (!TEST_ptr(gctx)
|| !TEST_mem_eq(gctx, sizeof(*gctx), inited, sizeof(inited)))
return NULL;
if (!TEST_ptr(keydata = fake_rsa_keymgmt_new(NULL)))
return NULL;
keydata->status = 2;
return keydata;
}
static void fake_rsa_gen_cleanup(void *genctx)
{
OPENSSL_free(genctx);
}
static const OSSL_DISPATCH fake_rsa_keymgmt_funcs[] = {
{ OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))fake_rsa_keymgmt_new },
{ OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))fake_rsa_keymgmt_free} ,
{ OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))fake_rsa_keymgmt_has },
{ OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME,
(void (*)(void))fake_rsa_keymgmt_query },
{ OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))fake_rsa_keymgmt_import },
{ OSSL_FUNC_KEYMGMT_IMPORT_TYPES,
(void (*)(void))fake_rsa_keymgmt_imptypes },
{ OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))fake_rsa_keymgmt_export },
{ OSSL_FUNC_KEYMGMT_EXPORT_TYPES,
(void (*)(void))fake_rsa_keymgmt_exptypes },
{ OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))fake_rsa_keymgmt_load },
{ OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))fake_rsa_gen_init },
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))fake_rsa_gen },
{ OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))fake_rsa_gen_cleanup },
OSSL_DISPATCH_END
};
static const OSSL_ALGORITHM fake_rsa_keymgmt_algs[] = {
{ "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_keymgmt_funcs, "Fake RSA Key Management" },
{ NULL, NULL, NULL, NULL }
};
static OSSL_FUNC_signature_newctx_fn fake_rsa_sig_newctx;
static OSSL_FUNC_signature_freectx_fn fake_rsa_sig_freectx;
static OSSL_FUNC_signature_sign_init_fn fake_rsa_sig_sign_init;
static OSSL_FUNC_signature_sign_fn fake_rsa_sig_sign;
static void *fake_rsa_sig_newctx(void *provctx, const char *propq)
{
unsigned char *sigctx = OPENSSL_zalloc(1);
TEST_ptr(sigctx);
return sigctx;
}
static void fake_rsa_sig_freectx(void *sigctx)
{
OPENSSL_free(sigctx);
}
static int fake_rsa_sig_sign_init(void *ctx, void *provkey,
const OSSL_PARAM params[])
{
unsigned char *sigctx = ctx;
struct fake_rsa_keydata *keydata = provkey;
/* we must have a ctx */
if (!TEST_ptr(sigctx))
return 0;
/* we must have some initialized key */
if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0))
return 0;
/* record that sign init was called */
*sigctx = 1;
return 1;
}
static int fake_rsa_sig_sign(void *ctx, unsigned char *sig,
size_t *siglen, size_t sigsize,
const unsigned char *tbs, size_t tbslen)
{
unsigned char *sigctx = ctx;
/* we must have a ctx and init was called upon it */
if (!TEST_ptr(sigctx) || !TEST_int_eq(*sigctx, 1))
return 0;
*siglen = 256;
/* record that the real sign operation was called */
if (sig != NULL) {
if (!TEST_int_ge(sigsize, *siglen))
return 0;
*sigctx = 2;
/* produce a fake signature */
memset(sig, 'a', *siglen);
}
return 1;
}
#define FAKE_DGSTSGN_SIGN 0x01
#define FAKE_DGSTSGN_VERIFY 0x02
#define FAKE_DGSTSGN_UPDATED 0x04
#define FAKE_DGSTSGN_FINALISED 0x08
#define FAKE_DGSTSGN_NO_DUP 0xA0
static void *fake_rsa_sig_dupctx(void *ctx)
{
unsigned char *sigctx = ctx;
unsigned char *newctx;
if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0)
return NULL;
if (!TEST_ptr(newctx = OPENSSL_zalloc(1)))
return NULL;
*newctx = *sigctx;
return newctx;
}
static int fake_rsa_dgstsgnvfy_init(void *ctx, unsigned char type,
void *provkey, const OSSL_PARAM params[])
{
unsigned char *sigctx = ctx;
struct fake_rsa_keydata *keydata = provkey;
/* we must have a ctx */
if (!TEST_ptr(sigctx))
return 0;
/* we must have some initialized key */
if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0))
return 0;
/* record that sign/verify init was called */
*sigctx = type;
if (params) {
const OSSL_PARAM *p;
int dup;
p = OSSL_PARAM_locate_const(params, "NO_DUP");
if (p != NULL) {
if (OSSL_PARAM_get_int(p, &dup)) {
*sigctx |= FAKE_DGSTSGN_NO_DUP;
}
}
}
return 1;
}
static int fake_rsa_dgstsgn_init(void *ctx, const char *mdname,
void *provkey, const OSSL_PARAM params[])
{
return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_SIGN, provkey, params);
}
static int fake_rsa_dgstvfy_init(void *ctx, const char *mdname,
void *provkey, const OSSL_PARAM params[])
{
return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_VERIFY, provkey, params);
}
static int fake_rsa_dgstsgnvfy_update(void *ctx, const unsigned char *data,
size_t datalen)
{
unsigned char *sigctx = ctx;
/* we must have a ctx */
if (!TEST_ptr(sigctx))
return 0;
if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0)
return 0;
*sigctx |= FAKE_DGSTSGN_UPDATED;
return 1;
}
static int fake_rsa_dgstsgnvfy_final(void *ctx, unsigned char *sig,
size_t *siglen, size_t sigsize)
{
unsigned char *sigctx = ctx;
/* we must have a ctx */
if (!TEST_ptr(sigctx))
return 0;
if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0)
return 0;
if ((*sigctx & FAKE_DGSTSGN_SIGN) != 0 && (siglen == NULL))
return 0;
if ((*sigctx & FAKE_DGSTSGN_VERIFY) != 0 && (siglen != NULL))
return 0;
/* this is sign op */
if (siglen) {
*siglen = 256;
/* record that the real sign operation was called */
if (sig != NULL) {
if (!TEST_int_ge(sigsize, *siglen))
return 0;
/* produce a fake signature */
memset(sig, 'a', *siglen);
}
}
/* simulate inability to duplicate context and finalise it */
if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0) {
*sigctx |= FAKE_DGSTSGN_FINALISED;
}
return 1;
}
static int fake_rsa_dgstvfy_final(void *ctx, unsigned char *sig,
size_t siglen)
{
return fake_rsa_dgstsgnvfy_final(ctx, sig, NULL, siglen);
}
static int fake_rsa_dgstsgn(void *ctx, unsigned char *sig, size_t *siglen,
size_t sigsize, const unsigned char *tbs,
size_t tbslen)
{
if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen))
return 0;
return fake_rsa_dgstsgnvfy_final(ctx, sig, siglen, sigsize);
}
static int fake_rsa_dgstvfy(void *ctx, unsigned char *sig, size_t siglen,
const unsigned char *tbv, size_t tbvlen)
{
if (!fake_rsa_dgstsgnvfy_update(ctx, tbv, tbvlen))
return 0;
return fake_rsa_dgstvfy_final(ctx, sig, siglen);
}
static const OSSL_DISPATCH fake_rsa_sig_funcs[] = {
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))fake_rsa_sig_newctx },
{ OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))fake_rsa_sig_freectx },
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))fake_rsa_sig_sign_init },
{ OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))fake_rsa_sig_sign },
{ OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))fake_rsa_sig_dupctx },
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,
(void (*)(void))fake_rsa_dgstsgn_init },
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE,
(void (*)(void))fake_rsa_dgstsgnvfy_update },
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL,
(void (*)(void))fake_rsa_dgstsgnvfy_final },
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN,
(void (*)(void))fake_rsa_dgstsgn },
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,
(void (*)(void))fake_rsa_dgstvfy_init },
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE,
(void (*)(void))fake_rsa_dgstsgnvfy_update },
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL,
(void (*)(void))fake_rsa_dgstvfy_final },
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY,
(void (*)(void))fake_rsa_dgstvfy },
OSSL_DISPATCH_END
};
static const OSSL_ALGORITHM fake_rsa_sig_algs[] = {
{ "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_sig_funcs, "Fake RSA Signature" },
{ NULL, NULL, NULL, NULL }
};
static OSSL_FUNC_store_open_fn fake_rsa_st_open;
static OSSL_FUNC_store_settable_ctx_params_fn fake_rsa_st_settable_ctx_params;
static OSSL_FUNC_store_set_ctx_params_fn fake_rsa_st_set_ctx_params;
static OSSL_FUNC_store_load_fn fake_rsa_st_load;
static OSSL_FUNC_store_eof_fn fake_rsa_st_eof;
static OSSL_FUNC_store_close_fn fake_rsa_st_close;
static const char fake_rsa_scheme[] = "fake_rsa:";
static void *fake_rsa_st_open(void *provctx, const char *uri)
{
unsigned char *storectx = NULL;
/* First check whether the uri is ours */
if (strncmp(uri, fake_rsa_scheme, sizeof(fake_rsa_scheme) - 1) != 0)
return NULL;
storectx = OPENSSL_zalloc(1);
if (!TEST_ptr(storectx))
return NULL;
TEST_info("fake_rsa_open called");
return storectx;
}
static const OSSL_PARAM *fake_rsa_st_settable_ctx_params(void *provctx)
{
static const OSSL_PARAM known_settable_ctx_params[] = {
OSSL_PARAM_END
};
return known_settable_ctx_params;
}
static int fake_rsa_st_set_ctx_params(void *loaderctx,
const OSSL_PARAM params[])
{
return 1;
}
static int fake_rsa_st_load(void *loaderctx,
OSSL_CALLBACK *object_cb, void *object_cbarg,
OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg)
{
unsigned char *storectx = loaderctx;
OSSL_PARAM params[4];
int object_type = OSSL_OBJECT_PKEY;
struct fake_rsa_keydata *key = NULL;
int rv = 0;
switch (*storectx) {
case 0:
/* Construct a new key using our keymgmt functions */
if (!TEST_ptr(key = fake_rsa_keymgmt_new(NULL)))
break;
if (!TEST_int_gt(fake_rsa_keymgmt_import(key, 0, NULL), 0))
break;
params[0] =
OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &object_type);
params[1] =
OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE,
"RSA", 0);
/* The address of the key becomes the octet string */
params[2] =
OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE,
&key, sizeof(*key));
params[3] = OSSL_PARAM_construct_end();
rv = object_cb(params, object_cbarg);
*storectx = 1;
break;
case 2:
TEST_info("fake_rsa_load() called in error state");
break;
default:
TEST_info("fake_rsa_load() called in eof state");
break;
}
TEST_info("fake_rsa_load called - rv: %d", rv);
if (rv == 0) {
fake_rsa_keymgmt_free(key);
*storectx = 2;
}
return rv;
}
static int fake_rsa_st_eof(void *loaderctx)
{
unsigned char *storectx = loaderctx;
/* just one key for now in the fake_rsa store */
return *storectx != 0;
}
static int fake_rsa_st_close(void *loaderctx)
{
OPENSSL_free(loaderctx);
return 1;
}
static const OSSL_DISPATCH fake_rsa_store_funcs[] = {
{ OSSL_FUNC_STORE_OPEN, (void (*)(void))fake_rsa_st_open },
{ OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS,
(void (*)(void))fake_rsa_st_settable_ctx_params },
{ OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))fake_rsa_st_set_ctx_params },
{ OSSL_FUNC_STORE_LOAD, (void (*)(void))fake_rsa_st_load },
{ OSSL_FUNC_STORE_EOF, (void (*)(void))fake_rsa_st_eof },
{ OSSL_FUNC_STORE_CLOSE, (void (*)(void))fake_rsa_st_close },
OSSL_DISPATCH_END,
};
static const OSSL_ALGORITHM fake_rsa_store_algs[] = {
{ "fake_rsa", "provider=fake-rsa", fake_rsa_store_funcs },
{ NULL, NULL, NULL }
};
static const OSSL_ALGORITHM *fake_rsa_query(void *provctx,
int operation_id,
int *no_cache)
{
*no_cache = 0;
switch (operation_id) {
case OSSL_OP_SIGNATURE:
return fake_rsa_sig_algs;
case OSSL_OP_KEYMGMT:
return fake_rsa_keymgmt_algs;
case OSSL_OP_STORE:
return fake_rsa_store_algs;
}
return NULL;
}
/* Functions we provide to the core */
static const OSSL_DISPATCH fake_rsa_method[] = {
{ OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))OSSL_LIB_CTX_free },
{ OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))fake_rsa_query },
OSSL_DISPATCH_END
};
static int fake_rsa_provider_init(const OSSL_CORE_HANDLE *handle,
const OSSL_DISPATCH *in,
const OSSL_DISPATCH **out, void **provctx)
{
if (!TEST_ptr(*provctx = OSSL_LIB_CTX_new()))
return 0;
*out = fake_rsa_method;
return 1;
}
OSSL_PROVIDER *fake_rsa_start(OSSL_LIB_CTX *libctx)
{
OSSL_PROVIDER *p;
if (!TEST_true(OSSL_PROVIDER_add_builtin(libctx, "fake-rsa",
fake_rsa_provider_init))
|| !TEST_ptr(p = OSSL_PROVIDER_try_load(libctx, "fake-rsa", 1)))
return NULL;
return p;
}
void fake_rsa_finish(OSSL_PROVIDER *p)
{
OSSL_PROVIDER_unload(p);
}