/* * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ #include #include #include #include #include #include #include #include "testutil.h" #include "fake_rsaprov.h" static OSSL_LIB_CTX *libctx = NULL; /* Fetch SIGNATURE method using a libctx and propq */ static int fetch_sig(OSSL_LIB_CTX *ctx, const char *alg, const char *propq, OSSL_PROVIDER *expected_prov) { OSSL_PROVIDER *prov; EVP_SIGNATURE *sig = EVP_SIGNATURE_fetch(ctx, "RSA", propq); int ret = 0; if (!TEST_ptr(sig)) return 0; if (!TEST_ptr(prov = EVP_SIGNATURE_get0_provider(sig))) goto end; if (!TEST_ptr_eq(prov, expected_prov)) { TEST_info("Fetched provider: %s, Expected provider: %s", OSSL_PROVIDER_get0_name(prov), OSSL_PROVIDER_get0_name(expected_prov)); goto end; } ret = 1; end: EVP_SIGNATURE_free(sig); return ret; } static int test_pkey_sig(void) { OSSL_PROVIDER *deflt = NULL; OSSL_PROVIDER *fake_rsa = NULL; int i, ret = 0; EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *ctx = NULL; if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx))) return 0; if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default"))) goto end; /* Do a direct fetch to see it works */ if (!TEST_true(fetch_sig(libctx, "RSA", "provider=fake-rsa", fake_rsa)) || !TEST_true(fetch_sig(libctx, "RSA", "?provider=fake-rsa", fake_rsa))) goto end; /* Construct a pkey using precise propq to use our provider */ if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", "provider=fake-rsa")) || !TEST_true(EVP_PKEY_fromdata_init(ctx)) || !TEST_true(EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_KEYPAIR, NULL)) || !TEST_ptr(pkey)) goto end; EVP_PKEY_CTX_free(ctx); ctx = NULL; /* try exercising signature_init ops a few times */ for (i = 0; i < 3; i++) { size_t siglen; /* * Create a signing context for our pkey with optional propq. * The sign init should pick both keymgmt and signature from * fake-rsa as the key is not exportable. */ if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pkey, "?provider=default"))) goto end; /* * If this picks the wrong signature without realizing it * we can get a segfault or some internal error. At least watch * whether fake-rsa sign_init is is exercised by calling sign. */ if (!TEST_int_eq(EVP_PKEY_sign_init(ctx), 1)) goto end; if (!TEST_int_eq(EVP_PKEY_sign(ctx, NULL, &siglen, NULL, 0), 1) || !TEST_size_t_eq(siglen, 256)) goto end; EVP_PKEY_CTX_free(ctx); ctx = NULL; } ret = 1; end: fake_rsa_finish(fake_rsa); OSSL_PROVIDER_unload(deflt); EVP_PKEY_CTX_free(ctx); EVP_PKEY_free(pkey); return ret; } static int test_alternative_keygen_init(void) { EVP_PKEY_CTX *ctx = NULL; OSSL_PROVIDER *deflt = NULL; OSSL_PROVIDER *fake_rsa = NULL; const OSSL_PROVIDER *provider; const char *provname; int ret = 0; if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default"))) goto end; /* first try without the fake RSA provider loaded */ if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", NULL))) goto end; if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0)) goto end; if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx))) goto end; if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider))) goto end; if (!TEST_str_eq(provname, "default")) goto end; EVP_PKEY_CTX_free(ctx); ctx = NULL; /* now load fake RSA and try again */ if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx))) return 0; if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", "?provider=fake-rsa"))) goto end; if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0)) goto end; if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx))) goto end; if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider))) goto end; if (!TEST_str_eq(provname, "fake-rsa")) goto end; ret = 1; end: fake_rsa_finish(fake_rsa); OSSL_PROVIDER_unload(deflt); EVP_PKEY_CTX_free(ctx); return ret; } static int test_pkey_store(int idx) { OSSL_PROVIDER *deflt = NULL; OSSL_PROVIDER *fake_rsa = NULL; int ret = 0; EVP_PKEY *pkey = NULL; OSSL_STORE_LOADER *loader = NULL; OSSL_STORE_CTX *ctx = NULL; OSSL_STORE_INFO *info; const char *propq = idx == 0 ? "?provider=fake-rsa" : "?provider=default"; /* It's important to load the default provider first for this test */ if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default"))) goto end; if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx))) goto end; if (!TEST_ptr(loader = OSSL_STORE_LOADER_fetch(libctx, "fake_rsa", propq))) goto end; OSSL_STORE_LOADER_free(loader); if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:test", libctx, propq, NULL, NULL, NULL, NULL, NULL))) goto end; while (!OSSL_STORE_eof(ctx) && (info = OSSL_STORE_load(ctx)) != NULL && pkey == NULL) { if (OSSL_STORE_INFO_get_type(info) == OSSL_STORE_INFO_PKEY) pkey = OSSL_STORE_INFO_get1_PKEY(info); OSSL_STORE_INFO_free(info); info = NULL; } if (!TEST_ptr(pkey) || !TEST_int_eq(EVP_PKEY_is_a(pkey, "RSA"), 1)) goto end; ret = 1; end: fake_rsa_finish(fake_rsa); OSSL_PROVIDER_unload(deflt); OSSL_STORE_close(ctx); EVP_PKEY_free(pkey); return ret; } int setup_tests(void) { libctx = OSSL_LIB_CTX_new(); if (libctx == NULL) return 0; ADD_TEST(test_pkey_sig); ADD_TEST(test_alternative_keygen_init); ADD_ALL_TESTS(test_pkey_store, 2); return 1; } void cleanup_tests(void) { OSSL_LIB_CTX_free(libctx); }