2 * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include <openssl/provider.h>
13 #include <openssl/params.h>
14 #include <openssl/core_names.h>
15 #include <openssl/evp.h>
16 #include <openssl/store.h>
18 #include "fake_rsaprov.h"
20 static OSSL_LIB_CTX *libctx = NULL;
22 /* Fetch SIGNATURE method using a libctx and propq */
23 static int fetch_sig(OSSL_LIB_CTX *ctx, const char *alg, const char *propq,
24 OSSL_PROVIDER *expected_prov)
27 EVP_SIGNATURE *sig = EVP_SIGNATURE_fetch(ctx, "RSA", propq);
33 if (!TEST_ptr(prov = EVP_SIGNATURE_get0_provider(sig)))
36 if (!TEST_ptr_eq(prov, expected_prov)) {
37 TEST_info("Fetched provider: %s, Expected provider: %s",
38 OSSL_PROVIDER_get0_name(prov),
39 OSSL_PROVIDER_get0_name(expected_prov));
45 EVP_SIGNATURE_free(sig);
50 static int test_pkey_sig(void)
52 OSSL_PROVIDER *deflt = NULL;
53 OSSL_PROVIDER *fake_rsa = NULL;
55 EVP_PKEY *pkey = NULL;
56 EVP_PKEY_CTX *ctx = NULL;
58 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
61 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
64 /* Do a direct fetch to see it works */
65 if (!TEST_true(fetch_sig(libctx, "RSA", "provider=fake-rsa", fake_rsa))
66 || !TEST_true(fetch_sig(libctx, "RSA", "?provider=fake-rsa", fake_rsa)))
69 /* Construct a pkey using precise propq to use our provider */
70 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
72 || !TEST_true(EVP_PKEY_fromdata_init(ctx))
73 || !TEST_true(EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_KEYPAIR, NULL))
77 EVP_PKEY_CTX_free(ctx);
80 /* try exercising signature_init ops a few times */
81 for (i = 0; i < 3; i++) {
85 * Create a signing context for our pkey with optional propq.
86 * The sign init should pick both keymgmt and signature from
87 * fake-rsa as the key is not exportable.
89 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pkey,
90 "?provider=default")))
94 * If this picks the wrong signature without realizing it
95 * we can get a segfault or some internal error. At least watch
96 * whether fake-rsa sign_init is is exercised by calling sign.
98 if (!TEST_int_eq(EVP_PKEY_sign_init(ctx), 1))
101 if (!TEST_int_eq(EVP_PKEY_sign(ctx, NULL, &siglen, NULL, 0), 1)
102 || !TEST_size_t_eq(siglen, 256))
105 EVP_PKEY_CTX_free(ctx);
112 fake_rsa_finish(fake_rsa);
113 OSSL_PROVIDER_unload(deflt);
114 EVP_PKEY_CTX_free(ctx);
119 static int test_alternative_keygen_init(void)
121 EVP_PKEY_CTX *ctx = NULL;
122 OSSL_PROVIDER *deflt = NULL;
123 OSSL_PROVIDER *fake_rsa = NULL;
124 const OSSL_PROVIDER *provider;
125 const char *provname;
128 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
131 /* first try without the fake RSA provider loaded */
132 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", NULL)))
135 if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0))
138 if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx)))
141 if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider)))
144 if (!TEST_str_eq(provname, "default"))
147 EVP_PKEY_CTX_free(ctx);
150 /* now load fake RSA and try again */
151 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
154 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
155 "?provider=fake-rsa")))
158 if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0))
161 if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx)))
164 if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider)))
167 if (!TEST_str_eq(provname, "fake-rsa"))
173 fake_rsa_finish(fake_rsa);
174 OSSL_PROVIDER_unload(deflt);
175 EVP_PKEY_CTX_free(ctx);
179 static int test_pkey_store(int idx)
181 OSSL_PROVIDER *deflt = NULL;
182 OSSL_PROVIDER *fake_rsa = NULL;
184 EVP_PKEY *pkey = NULL;
185 OSSL_STORE_LOADER *loader = NULL;
186 OSSL_STORE_CTX *ctx = NULL;
187 OSSL_STORE_INFO *info;
188 const char *propq = idx == 0 ? "?provider=fake-rsa"
189 : "?provider=default";
191 /* It's important to load the default provider first for this test */
192 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
195 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
198 if (!TEST_ptr(loader = OSSL_STORE_LOADER_fetch(libctx, "fake_rsa",
202 OSSL_STORE_LOADER_free(loader);
204 if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:test", libctx, propq,
205 NULL, NULL, NULL, NULL, NULL)))
208 while (!OSSL_STORE_eof(ctx)
209 && (info = OSSL_STORE_load(ctx)) != NULL
211 if (OSSL_STORE_INFO_get_type(info) == OSSL_STORE_INFO_PKEY)
212 pkey = OSSL_STORE_INFO_get1_PKEY(info);
213 OSSL_STORE_INFO_free(info);
217 if (!TEST_ptr(pkey) || !TEST_int_eq(EVP_PKEY_is_a(pkey, "RSA"), 1))
223 fake_rsa_finish(fake_rsa);
224 OSSL_PROVIDER_unload(deflt);
225 OSSL_STORE_close(ctx);
230 int setup_tests(void)
232 libctx = OSSL_LIB_CTX_new();
236 ADD_TEST(test_pkey_sig);
237 ADD_TEST(test_alternative_keygen_init);
238 ADD_ALL_TESTS(test_pkey_store, 2);
243 void cleanup_tests(void)
245 OSSL_LIB_CTX_free(libctx);