2021-10-07 01:21:53 +08:00
|
|
|
/*
|
|
|
|
* Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
* https://www.openssl.org/source/license.html
|
|
|
|
* or in the file LICENSE in the source distribution.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <openssl/core_names.h>
|
2022-04-07 22:48:41 +08:00
|
|
|
#include <openssl/core_object.h>
|
2021-10-07 01:21:53 +08:00
|
|
|
#include <openssl/rand.h>
|
|
|
|
#include <openssl/provider.h>
|
|
|
|
#include "testutil.h"
|
|
|
|
#include "fake_rsaprov.h"
|
|
|
|
|
|
|
|
static OSSL_FUNC_keymgmt_new_fn fake_rsa_keymgmt_new;
|
|
|
|
static OSSL_FUNC_keymgmt_free_fn fake_rsa_keymgmt_free;
|
|
|
|
static OSSL_FUNC_keymgmt_has_fn fake_rsa_keymgmt_has;
|
|
|
|
static OSSL_FUNC_keymgmt_query_operation_name_fn fake_rsa_keymgmt_query;
|
|
|
|
static OSSL_FUNC_keymgmt_import_fn fake_rsa_keymgmt_import;
|
|
|
|
static OSSL_FUNC_keymgmt_import_types_fn fake_rsa_keymgmt_imptypes;
|
2022-11-12 01:18:26 +08:00
|
|
|
static OSSL_FUNC_keymgmt_export_fn fake_rsa_keymgmt_export;
|
|
|
|
static OSSL_FUNC_keymgmt_export_types_fn fake_rsa_keymgmt_exptypes;
|
2022-04-07 22:48:41 +08:00
|
|
|
static OSSL_FUNC_keymgmt_load_fn fake_rsa_keymgmt_load;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
|
|
|
static int has_selection;
|
|
|
|
static int imptypes_selection;
|
2022-11-12 01:18:26 +08:00
|
|
|
static int exptypes_selection;
|
2021-10-07 01:21:53 +08:00
|
|
|
static int query_id;
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata {
|
|
|
|
int selection;
|
|
|
|
int status;
|
|
|
|
};
|
|
|
|
|
2021-10-07 01:21:53 +08:00
|
|
|
static void *fake_rsa_keymgmt_new(void *provctx)
|
|
|
|
{
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *key;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
if (!TEST_ptr(key = OPENSSL_zalloc(sizeof(struct fake_rsa_keydata))))
|
|
|
|
return NULL;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
|
|
|
/* clear test globals */
|
|
|
|
has_selection = 0;
|
|
|
|
imptypes_selection = 0;
|
2022-11-12 01:18:26 +08:00
|
|
|
exptypes_selection = 0;
|
2021-10-07 01:21:53 +08:00
|
|
|
query_id = 0;
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
return key;
|
2021-10-07 01:21:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void fake_rsa_keymgmt_free(void *keydata)
|
|
|
|
{
|
|
|
|
OPENSSL_free(keydata);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_keymgmt_has(const void *key, int selection)
|
|
|
|
{
|
|
|
|
/* record global for checking */
|
|
|
|
has_selection = selection;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const char *fake_rsa_keymgmt_query(int id)
|
|
|
|
{
|
|
|
|
/* record global for checking */
|
|
|
|
query_id = id;
|
|
|
|
|
|
|
|
return "RSA";
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_keymgmt_import(void *keydata, int selection,
|
|
|
|
const OSSL_PARAM *p)
|
|
|
|
{
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *fake_rsa_key = keydata;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
|
|
|
/* key was imported */
|
2022-11-12 01:18:26 +08:00
|
|
|
fake_rsa_key->status = 1;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
static unsigned char fake_rsa_n[] =
|
|
|
|
"\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F"
|
|
|
|
"\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5"
|
|
|
|
"\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93"
|
|
|
|
"\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1"
|
|
|
|
"\xF5";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_e[] = "\x11";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_d[] =
|
|
|
|
"\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44"
|
|
|
|
"\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64"
|
|
|
|
"\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9"
|
|
|
|
"\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_p[] =
|
|
|
|
"\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5"
|
|
|
|
"\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12"
|
|
|
|
"\x0D";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_q[] =
|
|
|
|
"\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
|
|
|
|
"\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D"
|
|
|
|
"\x89";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_dmp1[] =
|
|
|
|
"\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF"
|
|
|
|
"\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_dmq1[] =
|
|
|
|
"\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99"
|
|
|
|
"\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D"
|
|
|
|
"\x51";
|
|
|
|
|
|
|
|
static unsigned char fake_rsa_iqmp[] =
|
|
|
|
"\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8"
|
|
|
|
"\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26";
|
|
|
|
|
|
|
|
OSSL_PARAM *fake_rsa_key_params(int priv)
|
|
|
|
{
|
|
|
|
if (priv) {
|
|
|
|
OSSL_PARAM params[] = {
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n,
|
|
|
|
sizeof(fake_rsa_n) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e,
|
|
|
|
sizeof(fake_rsa_e) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, fake_rsa_d,
|
|
|
|
sizeof(fake_rsa_d) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, fake_rsa_p,
|
|
|
|
sizeof(fake_rsa_p) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, fake_rsa_q,
|
|
|
|
sizeof(fake_rsa_q) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, fake_rsa_dmp1,
|
|
|
|
sizeof(fake_rsa_dmp1) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, fake_rsa_dmq1,
|
|
|
|
sizeof(fake_rsa_dmq1) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, fake_rsa_iqmp,
|
|
|
|
sizeof(fake_rsa_iqmp) -1),
|
|
|
|
OSSL_PARAM_END
|
|
|
|
};
|
|
|
|
return OSSL_PARAM_dup(params);
|
|
|
|
} else {
|
|
|
|
OSSL_PARAM params[] = {
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, fake_rsa_n,
|
|
|
|
sizeof(fake_rsa_n) -1),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, fake_rsa_e,
|
|
|
|
sizeof(fake_rsa_e) -1),
|
|
|
|
OSSL_PARAM_END
|
|
|
|
};
|
|
|
|
return OSSL_PARAM_dup(params);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_keymgmt_export(void *keydata, int selection,
|
|
|
|
OSSL_CALLBACK *param_callback, void *cbarg)
|
|
|
|
{
|
|
|
|
OSSL_PARAM *params = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!TEST_ptr(params = fake_rsa_key_params(0)))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = param_callback(params, cbarg);
|
|
|
|
OSSL_PARAM_free(params);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-10-07 01:21:53 +08:00
|
|
|
static const OSSL_PARAM fake_rsa_import_key_types[] = {
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1, NULL, 0),
|
|
|
|
OSSL_PARAM_END
|
|
|
|
};
|
|
|
|
|
|
|
|
static const OSSL_PARAM *fake_rsa_keymgmt_imptypes(int selection)
|
|
|
|
{
|
|
|
|
/* record global for checking */
|
|
|
|
imptypes_selection = selection;
|
|
|
|
|
|
|
|
return fake_rsa_import_key_types;
|
|
|
|
}
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
static const OSSL_PARAM fake_rsa_export_key_types[] = {
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N, NULL, 0),
|
|
|
|
OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E, NULL, 0),
|
|
|
|
OSSL_PARAM_END
|
|
|
|
};
|
|
|
|
|
|
|
|
static const OSSL_PARAM *fake_rsa_keymgmt_exptypes(int selection)
|
|
|
|
{
|
|
|
|
/* record global for checking */
|
|
|
|
exptypes_selection = selection;
|
|
|
|
|
|
|
|
return fake_rsa_export_key_types;
|
|
|
|
}
|
|
|
|
|
2022-04-07 22:48:41 +08:00
|
|
|
static void *fake_rsa_keymgmt_load(const void *reference, size_t reference_sz)
|
|
|
|
{
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *key = NULL;
|
2022-04-07 22:48:41 +08:00
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
if (reference_sz != sizeof(*key))
|
2022-04-07 22:48:41 +08:00
|
|
|
return NULL;
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
key = *(struct fake_rsa_keydata **)reference;
|
|
|
|
if (key->status != 1)
|
2022-04-07 22:48:41 +08:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
/* detach the reference */
|
2022-11-12 01:18:26 +08:00
|
|
|
*(struct fake_rsa_keydata **)reference = NULL;
|
2022-04-07 22:48:41 +08:00
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
2022-05-09 19:23:10 +08:00
|
|
|
static void *fake_rsa_gen_init(void *provctx, int selection,
|
|
|
|
const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
unsigned char *gctx = NULL;
|
|
|
|
|
|
|
|
if (!TEST_ptr(gctx = OPENSSL_malloc(1)))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*gctx = 1;
|
|
|
|
|
|
|
|
return gctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void *fake_rsa_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg)
|
|
|
|
{
|
|
|
|
unsigned char *gctx = genctx;
|
|
|
|
static const unsigned char inited[] = { 1 };
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *keydata;
|
2022-05-09 19:23:10 +08:00
|
|
|
|
|
|
|
if (!TEST_ptr(gctx)
|
|
|
|
|| !TEST_mem_eq(gctx, sizeof(*gctx), inited, sizeof(inited)))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!TEST_ptr(keydata = fake_rsa_keymgmt_new(NULL)))
|
|
|
|
return NULL;
|
|
|
|
|
2022-11-12 01:18:26 +08:00
|
|
|
keydata->status = 2;
|
2022-05-09 19:23:10 +08:00
|
|
|
return keydata;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fake_rsa_gen_cleanup(void *genctx)
|
|
|
|
{
|
|
|
|
OPENSSL_free(genctx);
|
|
|
|
}
|
|
|
|
|
2021-10-07 01:21:53 +08:00
|
|
|
static const OSSL_DISPATCH fake_rsa_keymgmt_funcs[] = {
|
|
|
|
{ OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))fake_rsa_keymgmt_new },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_FREE, (void (*)(void))fake_rsa_keymgmt_free} ,
|
|
|
|
{ OSSL_FUNC_KEYMGMT_HAS, (void (*)(void))fake_rsa_keymgmt_has },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME,
|
|
|
|
(void (*)(void))fake_rsa_keymgmt_query },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_IMPORT, (void (*)(void))fake_rsa_keymgmt_import },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_IMPORT_TYPES,
|
|
|
|
(void (*)(void))fake_rsa_keymgmt_imptypes },
|
2022-11-12 01:18:26 +08:00
|
|
|
{ OSSL_FUNC_KEYMGMT_EXPORT, (void (*)(void))fake_rsa_keymgmt_export },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_EXPORT_TYPES,
|
|
|
|
(void (*)(void))fake_rsa_keymgmt_exptypes },
|
2022-04-07 22:48:41 +08:00
|
|
|
{ OSSL_FUNC_KEYMGMT_LOAD, (void (*)(void))fake_rsa_keymgmt_load },
|
2022-05-09 19:23:10 +08:00
|
|
|
{ OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))fake_rsa_gen_init },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))fake_rsa_gen },
|
|
|
|
{ OSSL_FUNC_KEYMGMT_GEN_CLEANUP, (void (*)(void))fake_rsa_gen_cleanup },
|
2023-04-19 22:08:22 +08:00
|
|
|
OSSL_DISPATCH_END
|
2021-10-07 01:21:53 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const OSSL_ALGORITHM fake_rsa_keymgmt_algs[] = {
|
|
|
|
{ "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_keymgmt_funcs, "Fake RSA Key Management" },
|
|
|
|
{ NULL, NULL, NULL, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
static OSSL_FUNC_signature_newctx_fn fake_rsa_sig_newctx;
|
|
|
|
static OSSL_FUNC_signature_freectx_fn fake_rsa_sig_freectx;
|
|
|
|
static OSSL_FUNC_signature_sign_init_fn fake_rsa_sig_sign_init;
|
|
|
|
static OSSL_FUNC_signature_sign_fn fake_rsa_sig_sign;
|
|
|
|
|
|
|
|
static void *fake_rsa_sig_newctx(void *provctx, const char *propq)
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = OPENSSL_zalloc(1);
|
|
|
|
|
|
|
|
TEST_ptr(sigctx);
|
|
|
|
|
|
|
|
return sigctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void fake_rsa_sig_freectx(void *sigctx)
|
|
|
|
{
|
|
|
|
OPENSSL_free(sigctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_sig_sign_init(void *ctx, void *provkey,
|
|
|
|
const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *keydata = provkey;
|
2021-10-07 01:21:53 +08:00
|
|
|
|
|
|
|
/* we must have a ctx */
|
|
|
|
if (!TEST_ptr(sigctx))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* we must have some initialized key */
|
2022-11-12 01:18:26 +08:00
|
|
|
if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0))
|
2021-10-07 01:21:53 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* record that sign init was called */
|
|
|
|
*sigctx = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_sig_sign(void *ctx, unsigned char *sig,
|
|
|
|
size_t *siglen, size_t sigsize,
|
|
|
|
const unsigned char *tbs, size_t tbslen)
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
|
|
|
|
|
|
|
/* we must have a ctx and init was called upon it */
|
|
|
|
if (!TEST_ptr(sigctx) || !TEST_int_eq(*sigctx, 1))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
*siglen = 256;
|
|
|
|
/* record that the real sign operation was called */
|
|
|
|
if (sig != NULL) {
|
|
|
|
if (!TEST_int_ge(sigsize, *siglen))
|
|
|
|
return 0;
|
|
|
|
*sigctx = 2;
|
|
|
|
/* produce a fake signature */
|
|
|
|
memset(sig, 'a', *siglen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2023-03-07 07:38:00 +08:00
|
|
|
#define FAKE_DGSTSGN_SIGN 0x01
|
|
|
|
#define FAKE_DGSTSGN_VERIFY 0x02
|
|
|
|
#define FAKE_DGSTSGN_UPDATED 0x04
|
|
|
|
#define FAKE_DGSTSGN_FINALISED 0x08
|
|
|
|
#define FAKE_DGSTSGN_NO_DUP 0xA0
|
|
|
|
|
|
|
|
static void *fake_rsa_sig_dupctx(void *ctx)
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
|
|
|
unsigned char *newctx;
|
|
|
|
|
|
|
|
if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!TEST_ptr(newctx = OPENSSL_zalloc(1)))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*newctx = *sigctx;
|
|
|
|
return newctx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstsgnvfy_init(void *ctx, unsigned char type,
|
|
|
|
void *provkey, const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
|
|
|
struct fake_rsa_keydata *keydata = provkey;
|
|
|
|
|
|
|
|
/* we must have a ctx */
|
|
|
|
if (!TEST_ptr(sigctx))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* we must have some initialized key */
|
|
|
|
if (!TEST_ptr(keydata) || !TEST_int_gt(keydata->status, 0))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* record that sign/verify init was called */
|
|
|
|
*sigctx = type;
|
|
|
|
|
|
|
|
if (params) {
|
|
|
|
const OSSL_PARAM *p;
|
|
|
|
int dup;
|
|
|
|
p = OSSL_PARAM_locate_const(params, "NO_DUP");
|
|
|
|
if (p != NULL) {
|
|
|
|
if (OSSL_PARAM_get_int(p, &dup)) {
|
|
|
|
*sigctx |= FAKE_DGSTSGN_NO_DUP;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstsgn_init(void *ctx, const char *mdname,
|
|
|
|
void *provkey, const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_SIGN, provkey, params);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstvfy_init(void *ctx, const char *mdname,
|
|
|
|
void *provkey, const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
return fake_rsa_dgstsgnvfy_init(ctx, FAKE_DGSTSGN_VERIFY, provkey, params);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstsgnvfy_update(void *ctx, const unsigned char *data,
|
|
|
|
size_t datalen)
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
|
|
|
|
|
|
|
/* we must have a ctx */
|
|
|
|
if (!TEST_ptr(sigctx))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
*sigctx |= FAKE_DGSTSGN_UPDATED;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstsgnvfy_final(void *ctx, unsigned char *sig,
|
|
|
|
size_t *siglen, size_t sigsize)
|
|
|
|
{
|
|
|
|
unsigned char *sigctx = ctx;
|
|
|
|
|
|
|
|
/* we must have a ctx */
|
|
|
|
if (!TEST_ptr(sigctx))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (*sigctx == 0 || (*sigctx & FAKE_DGSTSGN_FINALISED) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if ((*sigctx & FAKE_DGSTSGN_SIGN) != 0 && (siglen == NULL))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if ((*sigctx & FAKE_DGSTSGN_VERIFY) != 0 && (siglen != NULL))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* this is sign op */
|
|
|
|
if (siglen) {
|
|
|
|
*siglen = 256;
|
|
|
|
/* record that the real sign operation was called */
|
|
|
|
if (sig != NULL) {
|
|
|
|
if (!TEST_int_ge(sigsize, *siglen))
|
|
|
|
return 0;
|
|
|
|
/* produce a fake signature */
|
|
|
|
memset(sig, 'a', *siglen);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* simulate inability to duplicate context and finalise it */
|
|
|
|
if ((*sigctx & FAKE_DGSTSGN_NO_DUP) != 0) {
|
|
|
|
*sigctx |= FAKE_DGSTSGN_FINALISED;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstvfy_final(void *ctx, unsigned char *sig,
|
|
|
|
size_t siglen)
|
|
|
|
{
|
|
|
|
return fake_rsa_dgstsgnvfy_final(ctx, sig, NULL, siglen);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstsgn(void *ctx, unsigned char *sig, size_t *siglen,
|
|
|
|
size_t sigsize, const unsigned char *tbs,
|
|
|
|
size_t tbslen)
|
|
|
|
{
|
|
|
|
if (!fake_rsa_dgstsgnvfy_update(ctx, tbs, tbslen))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return fake_rsa_dgstsgnvfy_final(ctx, sig, siglen, sigsize);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_dgstvfy(void *ctx, unsigned char *sig, size_t siglen,
|
|
|
|
const unsigned char *tbv, size_t tbvlen)
|
|
|
|
{
|
|
|
|
if (!fake_rsa_dgstsgnvfy_update(ctx, tbv, tbvlen))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return fake_rsa_dgstvfy_final(ctx, sig, siglen);
|
|
|
|
}
|
|
|
|
|
2021-10-07 01:21:53 +08:00
|
|
|
static const OSSL_DISPATCH fake_rsa_sig_funcs[] = {
|
|
|
|
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))fake_rsa_sig_newctx },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))fake_rsa_sig_freectx },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))fake_rsa_sig_sign_init },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))fake_rsa_sig_sign },
|
2023-03-07 07:38:00 +08:00
|
|
|
{ OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))fake_rsa_sig_dupctx },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,
|
|
|
|
(void (*)(void))fake_rsa_dgstsgn_init },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE,
|
|
|
|
(void (*)(void))fake_rsa_dgstsgnvfy_update },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL,
|
|
|
|
(void (*)(void))fake_rsa_dgstsgnvfy_final },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_SIGN,
|
|
|
|
(void (*)(void))fake_rsa_dgstsgn },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,
|
|
|
|
(void (*)(void))fake_rsa_dgstvfy_init },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE,
|
|
|
|
(void (*)(void))fake_rsa_dgstsgnvfy_update },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL,
|
|
|
|
(void (*)(void))fake_rsa_dgstvfy_final },
|
|
|
|
{ OSSL_FUNC_SIGNATURE_DIGEST_VERIFY,
|
|
|
|
(void (*)(void))fake_rsa_dgstvfy },
|
2023-04-19 22:08:22 +08:00
|
|
|
OSSL_DISPATCH_END
|
2021-10-07 01:21:53 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const OSSL_ALGORITHM fake_rsa_sig_algs[] = {
|
|
|
|
{ "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_sig_funcs, "Fake RSA Signature" },
|
|
|
|
{ NULL, NULL, NULL, NULL }
|
|
|
|
};
|
|
|
|
|
2022-04-07 22:48:41 +08:00
|
|
|
static OSSL_FUNC_store_open_fn fake_rsa_st_open;
|
|
|
|
static OSSL_FUNC_store_settable_ctx_params_fn fake_rsa_st_settable_ctx_params;
|
|
|
|
static OSSL_FUNC_store_set_ctx_params_fn fake_rsa_st_set_ctx_params;
|
|
|
|
static OSSL_FUNC_store_load_fn fake_rsa_st_load;
|
|
|
|
static OSSL_FUNC_store_eof_fn fake_rsa_st_eof;
|
|
|
|
static OSSL_FUNC_store_close_fn fake_rsa_st_close;
|
|
|
|
|
|
|
|
static const char fake_rsa_scheme[] = "fake_rsa:";
|
|
|
|
|
|
|
|
static void *fake_rsa_st_open(void *provctx, const char *uri)
|
|
|
|
{
|
|
|
|
unsigned char *storectx = NULL;
|
|
|
|
|
|
|
|
/* First check whether the uri is ours */
|
|
|
|
if (strncmp(uri, fake_rsa_scheme, sizeof(fake_rsa_scheme) - 1) != 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
storectx = OPENSSL_zalloc(1);
|
2022-06-29 09:23:27 +08:00
|
|
|
if (!TEST_ptr(storectx))
|
|
|
|
return NULL;
|
2022-04-07 22:48:41 +08:00
|
|
|
|
|
|
|
TEST_info("fake_rsa_open called");
|
|
|
|
|
|
|
|
return storectx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const OSSL_PARAM *fake_rsa_st_settable_ctx_params(void *provctx)
|
|
|
|
{
|
|
|
|
static const OSSL_PARAM known_settable_ctx_params[] = {
|
|
|
|
OSSL_PARAM_END
|
|
|
|
};
|
|
|
|
return known_settable_ctx_params;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_st_set_ctx_params(void *loaderctx,
|
|
|
|
const OSSL_PARAM params[])
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_st_load(void *loaderctx,
|
|
|
|
OSSL_CALLBACK *object_cb, void *object_cbarg,
|
|
|
|
OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg)
|
|
|
|
{
|
|
|
|
unsigned char *storectx = loaderctx;
|
|
|
|
OSSL_PARAM params[4];
|
|
|
|
int object_type = OSSL_OBJECT_PKEY;
|
2022-11-12 01:18:26 +08:00
|
|
|
struct fake_rsa_keydata *key = NULL;
|
2022-04-07 22:48:41 +08:00
|
|
|
int rv = 0;
|
|
|
|
|
|
|
|
switch (*storectx) {
|
|
|
|
case 0:
|
|
|
|
/* Construct a new key using our keymgmt functions */
|
|
|
|
if (!TEST_ptr(key = fake_rsa_keymgmt_new(NULL)))
|
|
|
|
break;
|
|
|
|
if (!TEST_int_gt(fake_rsa_keymgmt_import(key, 0, NULL), 0))
|
|
|
|
break;
|
|
|
|
params[0] =
|
|
|
|
OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &object_type);
|
|
|
|
params[1] =
|
|
|
|
OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE,
|
|
|
|
"RSA", 0);
|
|
|
|
/* The address of the key becomes the octet string */
|
|
|
|
params[2] =
|
|
|
|
OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE,
|
2022-11-12 01:18:26 +08:00
|
|
|
&key, sizeof(*key));
|
2022-04-07 22:48:41 +08:00
|
|
|
params[3] = OSSL_PARAM_construct_end();
|
|
|
|
rv = object_cb(params, object_cbarg);
|
|
|
|
*storectx = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 2:
|
|
|
|
TEST_info("fake_rsa_load() called in error state");
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
TEST_info("fake_rsa_load() called in eof state");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_info("fake_rsa_load called - rv: %d", rv);
|
|
|
|
|
|
|
|
if (rv == 0) {
|
|
|
|
fake_rsa_keymgmt_free(key);
|
|
|
|
*storectx = 2;
|
|
|
|
}
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_st_eof(void *loaderctx)
|
|
|
|
{
|
|
|
|
unsigned char *storectx = loaderctx;
|
|
|
|
|
|
|
|
/* just one key for now in the fake_rsa store */
|
|
|
|
return *storectx != 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int fake_rsa_st_close(void *loaderctx)
|
|
|
|
{
|
|
|
|
OPENSSL_free(loaderctx);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const OSSL_DISPATCH fake_rsa_store_funcs[] = {
|
|
|
|
{ OSSL_FUNC_STORE_OPEN, (void (*)(void))fake_rsa_st_open },
|
|
|
|
{ OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS,
|
|
|
|
(void (*)(void))fake_rsa_st_settable_ctx_params },
|
|
|
|
{ OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))fake_rsa_st_set_ctx_params },
|
|
|
|
{ OSSL_FUNC_STORE_LOAD, (void (*)(void))fake_rsa_st_load },
|
|
|
|
{ OSSL_FUNC_STORE_EOF, (void (*)(void))fake_rsa_st_eof },
|
|
|
|
{ OSSL_FUNC_STORE_CLOSE, (void (*)(void))fake_rsa_st_close },
|
2023-04-19 22:08:22 +08:00
|
|
|
OSSL_DISPATCH_END,
|
2022-04-07 22:48:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const OSSL_ALGORITHM fake_rsa_store_algs[] = {
|
|
|
|
{ "fake_rsa", "provider=fake-rsa", fake_rsa_store_funcs },
|
|
|
|
{ NULL, NULL, NULL }
|
|
|
|
};
|
|
|
|
|
2021-10-07 01:21:53 +08:00
|
|
|
static const OSSL_ALGORITHM *fake_rsa_query(void *provctx,
|
|
|
|
int operation_id,
|
|
|
|
int *no_cache)
|
|
|
|
{
|
|
|
|
*no_cache = 0;
|
|
|
|
switch (operation_id) {
|
|
|
|
case OSSL_OP_SIGNATURE:
|
|
|
|
return fake_rsa_sig_algs;
|
|
|
|
|
|
|
|
case OSSL_OP_KEYMGMT:
|
|
|
|
return fake_rsa_keymgmt_algs;
|
2022-04-07 22:48:41 +08:00
|
|
|
|
|
|
|
case OSSL_OP_STORE:
|
|
|
|
return fake_rsa_store_algs;
|
2021-10-07 01:21:53 +08:00
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Functions we provide to the core */
|
|
|
|
static const OSSL_DISPATCH fake_rsa_method[] = {
|
|
|
|
{ OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))OSSL_LIB_CTX_free },
|
|
|
|
{ OSSL_FUNC_PROVIDER_QUERY_OPERATION, (void (*)(void))fake_rsa_query },
|
2023-04-19 22:08:22 +08:00
|
|
|
OSSL_DISPATCH_END
|
2021-10-07 01:21:53 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int fake_rsa_provider_init(const OSSL_CORE_HANDLE *handle,
|
|
|
|
const OSSL_DISPATCH *in,
|
|
|
|
const OSSL_DISPATCH **out, void **provctx)
|
|
|
|
{
|
|
|
|
if (!TEST_ptr(*provctx = OSSL_LIB_CTX_new()))
|
|
|
|
return 0;
|
|
|
|
*out = fake_rsa_method;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
OSSL_PROVIDER *fake_rsa_start(OSSL_LIB_CTX *libctx)
|
|
|
|
{
|
|
|
|
OSSL_PROVIDER *p;
|
|
|
|
|
|
|
|
if (!TEST_true(OSSL_PROVIDER_add_builtin(libctx, "fake-rsa",
|
|
|
|
fake_rsa_provider_init))
|
|
|
|
|| !TEST_ptr(p = OSSL_PROVIDER_try_load(libctx, "fake-rsa", 1)))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
void fake_rsa_finish(OSSL_PROVIDER *p)
|
|
|
|
{
|
|
|
|
OSSL_PROVIDER_unload(p);
|
|
|
|
}
|