1 /* engines/e_ossltest.c */
3 * Written by Matt Caswell (matt@openssl.org) for the OpenSSL project.
5 /* ====================================================================
6 * Copyright (c) 2015 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
55 * This is the OSSLTEST engine. It provides deliberately crippled digest
56 * implementations for test purposes. It is highly insecure and must NOT be
57 * used for any purpose except testing
63 #include <openssl/engine.h>
64 #include <openssl/sha.h>
65 #include <openssl/md5.h>
66 #include <openssl/rsa.h>
67 #include <openssl/evp.h>
68 #include <openssl/modes.h>
69 #include <openssl/aes.h>
71 #define OSSLTEST_LIB_NAME "OSSLTEST"
72 #include "e_ossltest_err.c"
74 /* Engine Id and Name */
75 static const char *engine_ossltest_id = "ossltest";
76 static const char *engine_ossltest_name = "OpenSSL Test engine support";
79 /* Engine Lifetime functions */
80 static int ossltest_destroy(ENGINE *e);
81 static int ossltest_init(ENGINE *e);
82 static int ossltest_finish(ENGINE *e);
83 void ENGINE_load_ossltest(void);
87 static int ossltest_digests(ENGINE *e, const EVP_MD **digest,
88 const int **nids, int nid);
90 static int ossltest_digest_nids[] = {
91 NID_md5, NID_sha1, NID_sha256, NID_sha384, NID_sha512, 0
95 static int digest_md5_init(EVP_MD_CTX *ctx);
96 static int digest_md5_update(EVP_MD_CTX *ctx, const void *data,
98 static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md);
100 static const EVP_MD digest_md5 = {
102 NID_md5WithRSAEncryption,
112 sizeof(EVP_MD *) + sizeof(MD5_CTX),
116 static int digest_sha1_init(EVP_MD_CTX *ctx);
117 static int digest_sha1_update(EVP_MD_CTX *ctx, const void *data,
119 static int digest_sha1_final(EVP_MD_CTX *ctx, unsigned char *md);
121 static const EVP_MD digest_sha1 = {
123 NID_sha1WithRSAEncryption,
125 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
131 EVP_PKEY_NULL_method,
133 sizeof(EVP_MD *) + sizeof(SHA_CTX),
137 static int digest_sha256_init(EVP_MD_CTX *ctx);
138 static int digest_sha256_update(EVP_MD_CTX *ctx, const void *data,
140 static int digest_sha256_final(EVP_MD_CTX *ctx, unsigned char *md);
142 static const EVP_MD digest_sha256 = {
144 NID_sha256WithRSAEncryption,
145 SHA256_DIGEST_LENGTH,
146 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
148 digest_sha256_update,
152 EVP_PKEY_NULL_method,
154 sizeof(EVP_MD *) + sizeof(SHA256_CTX),
158 static int digest_sha384_init(EVP_MD_CTX *ctx);
159 static int digest_sha512_init(EVP_MD_CTX *ctx);
160 static int digest_sha512_update(EVP_MD_CTX *ctx, const void *data,
162 static int digest_sha384_final(EVP_MD_CTX *ctx, unsigned char *md);
163 static int digest_sha512_final(EVP_MD_CTX *ctx, unsigned char *md);
165 static const EVP_MD digest_sha384 = {
167 NID_sha384WithRSAEncryption,
168 SHA384_DIGEST_LENGTH,
169 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
171 digest_sha512_update,
175 EVP_PKEY_NULL_method,
177 sizeof(EVP_MD *) + sizeof(SHA512_CTX),
180 static const EVP_MD digest_sha512 = {
182 NID_sha512WithRSAEncryption,
183 SHA512_DIGEST_LENGTH,
184 EVP_MD_FLAG_PKEY_METHOD_SIGNATURE | EVP_MD_FLAG_DIGALGID_ABSENT,
186 digest_sha512_update,
190 EVP_PKEY_NULL_method,
192 sizeof(EVP_MD *) + sizeof(SHA512_CTX),
196 static int ossltest_ciphers(ENGINE *, const EVP_CIPHER **,
199 static int ossltest_cipher_nids[] = {
205 int ossltest_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
206 const unsigned char *iv, int enc);
207 int ossltest_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
208 const unsigned char *in, size_t inl);
210 static const EVP_CIPHER ossltest_aes_128_cbc = { \
215 EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CBC_MODE,
216 ossltest_aes128_init_key,
217 ossltest_aes128_cbc_cipher,
219 0, /* We don't know the size of cipher_data at compile time */
224 static int bind_ossltest(ENGINE *e)
226 /* Ensure the ossltest error handling is set up */
227 ERR_load_OSSLTEST_strings();
229 if (!ENGINE_set_id(e, engine_ossltest_id)
230 || !ENGINE_set_name(e, engine_ossltest_name)
231 || !ENGINE_set_digests(e, ossltest_digests)
232 || !ENGINE_set_ciphers(e, ossltest_ciphers)
233 || !ENGINE_set_destroy_function(e, ossltest_destroy)
234 || !ENGINE_set_init_function(e, ossltest_init)
235 || !ENGINE_set_finish_function(e, ossltest_finish)) {
236 OSSLTESTerr(OSSLTEST_F_BIND_OSSLTEST, OSSLTEST_R_INIT_FAILED);
243 #ifndef OPENSSL_NO_DYNAMIC_ENGINE
244 static int bind_helper(ENGINE *e, const char *id)
246 if (id && (strcmp(id, engine_ossltest_id) != 0))
248 if (!bind_ossltest(e))
253 IMPLEMENT_DYNAMIC_CHECK_FN()
254 IMPLEMENT_DYNAMIC_BIND_FN(bind_helper)
257 static ENGINE *engine_ossltest(void)
259 ENGINE *ret = ENGINE_new();
262 if (!bind_ossltest(ret)) {
269 void ENGINE_load_ossltest(void)
271 /* Copied from eng_[openssl|dyn].c */
272 ENGINE *toadd = engine_ossltest();
281 static int ossltest_init(ENGINE *e)
287 static int ossltest_finish(ENGINE *e)
293 static int ossltest_destroy(ENGINE *e)
295 ERR_unload_OSSLTEST_strings();
299 static int ossltest_digests(ENGINE *e, const EVP_MD **digest,
300 const int **nids, int nid)
304 /* We are returning a list of supported nids */
305 *nids = ossltest_digest_nids;
306 return (sizeof(ossltest_digest_nids) -
307 1) / sizeof(ossltest_digest_nids[0]);
309 /* We are being asked for a specific digest */
312 *digest = &digest_md5;
315 *digest = &digest_sha1;
318 *digest = &digest_sha256;
321 *digest = &digest_sha384;
324 *digest = &digest_sha512;
334 static int ossltest_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
335 const int **nids, int nid)
339 /* We are returning a list of supported nids */
340 *nids = ossltest_cipher_nids;
341 return (sizeof(ossltest_cipher_nids) - 1)
342 / sizeof(ossltest_cipher_nids[0]);
344 /* We are being asked for a specific cipher */
346 case NID_aes_128_cbc:
347 *cipher = &ossltest_aes_128_cbc;
357 static void fill_known_data(unsigned char *md, unsigned int len)
361 for (i=0; i<len; i++) {
362 md[i] = (unsigned char)(i & 0xff);
367 * MD5 implementation. We go through the motions of doing MD5 by deferring to
368 * the standard implementation. Then we overwrite the result with a will defined
369 * value, so that all "MD5" digests using the test engine always end up with
373 #define data(ctx) ((MD5_CTX *)(ctx)->md_data)
374 static int digest_md5_init(EVP_MD_CTX *ctx)
376 return MD5_Init(data(ctx));
379 static int digest_md5_update(EVP_MD_CTX *ctx, const void *data,
382 return MD5_Update(data(ctx), data, (size_t)count);
385 static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md)
388 ret = MD5_Final(md, data(ctx));
391 fill_known_data(md, MD5_DIGEST_LENGTH);
397 * SHA1 implementation.
400 #define data(ctx) ((SHA_CTX *)(ctx)->md_data)
401 static int digest_sha1_init(EVP_MD_CTX *ctx)
403 return SHA1_Init(data(ctx));
406 static int digest_sha1_update(EVP_MD_CTX *ctx, const void *data,
409 return SHA1_Update(data(ctx), data, (size_t)count);
412 static int digest_sha1_final(EVP_MD_CTX *ctx, unsigned char *md)
415 ret = SHA1_Final(md, data(ctx));
418 fill_known_data(md, SHA_DIGEST_LENGTH);
424 * SHA256 implementation.
427 #define data(ctx) ((SHA256_CTX *)(ctx)->md_data)
428 static int digest_sha256_init(EVP_MD_CTX *ctx)
430 return SHA256_Init(data(ctx));
433 static int digest_sha256_update(EVP_MD_CTX *ctx, const void *data,
436 return SHA256_Update(data(ctx), data, (size_t)count);
439 static int digest_sha256_final(EVP_MD_CTX *ctx, unsigned char *md)
442 ret = SHA256_Final(md, data(ctx));
445 fill_known_data(md, SHA256_DIGEST_LENGTH);
451 * SHA384/512 implementation.
454 #define data(ctx) ((SHA512_CTX *)(ctx)->md_data)
455 static int digest_sha384_init(EVP_MD_CTX *ctx)
457 return SHA384_Init(data(ctx));
460 static int digest_sha512_init(EVP_MD_CTX *ctx)
462 return SHA512_Init(data(ctx));
465 static int digest_sha512_update(EVP_MD_CTX *ctx, const void *data,
468 return SHA512_Update(data(ctx), data, (size_t)count);
471 static int digest_sha384_final(EVP_MD_CTX *ctx, unsigned char *md)
474 /* Actually uses SHA512_Final! */
475 ret = SHA512_Final(md, data(ctx));
478 fill_known_data(md, SHA384_DIGEST_LENGTH);
483 static int digest_sha512_final(EVP_MD_CTX *ctx, unsigned char *md)
486 ret = SHA512_Final(md, data(ctx));
489 fill_known_data(md, SHA512_DIGEST_LENGTH);
495 * AES128 Implementation
498 int ossltest_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key,
499 const unsigned char *iv, int enc)
501 if (ctx->cipher_data == NULL) {
503 * Normally cipher_data is allocated automatically for an engine but
504 * we don't know the ctx_size as compile time so we have to do it at
507 ctx->cipher_data = OPENSSL_zalloc(EVP_aes_128_cbc()->ctx_size);
508 if (!ctx->cipher_data) {
509 OSSLTESTerr(OSSLTEST_F_OSSLTEST_AES128_INIT_KEY,
510 ERR_R_MALLOC_FAILURE);
514 return EVP_aes_128_cbc()->init(ctx, key, iv, enc);
517 int ossltest_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out,
518 const unsigned char *in, size_t inl)
520 unsigned char *tmpbuf;
523 tmpbuf = OPENSSL_malloc(inl);
527 /* Remember what we were asked to encrypt */
528 memcpy(tmpbuf, in, inl);
530 /* Go through the motions of encrypting it */
531 ret = EVP_aes_128_cbc()->do_cipher(ctx, out, in, inl);
533 /* Throw it all away and just use the plaintext as the output */
534 memcpy(out, tmpbuf, inl);
535 OPENSSL_free(tmpbuf);