2 * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include <openssl/provider.h>
13 #include <openssl/params.h>
14 #include <openssl/core_names.h>
15 #include <openssl/evp.h>
16 #include <openssl/store.h>
17 #include <openssl/ui.h>
19 #include "fake_rsaprov.h"
21 static OSSL_LIB_CTX *libctx = NULL;
22 extern int key_deleted; /* From fake_rsaprov.c */
24 /* Fetch SIGNATURE method using a libctx and propq */
25 static int fetch_sig(OSSL_LIB_CTX *ctx, const char *alg, const char *propq,
26 OSSL_PROVIDER *expected_prov)
29 EVP_SIGNATURE *sig = EVP_SIGNATURE_fetch(ctx, "RSA", propq);
35 if (!TEST_ptr(prov = EVP_SIGNATURE_get0_provider(sig)))
38 if (!TEST_ptr_eq(prov, expected_prov)) {
39 TEST_info("Fetched provider: %s, Expected provider: %s",
40 OSSL_PROVIDER_get0_name(prov),
41 OSSL_PROVIDER_get0_name(expected_prov));
47 EVP_SIGNATURE_free(sig);
52 static int test_pkey_sig(void)
54 OSSL_PROVIDER *deflt = NULL;
55 OSSL_PROVIDER *fake_rsa = NULL;
57 EVP_PKEY *pkey = NULL;
58 EVP_PKEY_CTX *ctx = NULL;
60 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
63 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
66 /* Do a direct fetch to see it works */
67 if (!TEST_true(fetch_sig(libctx, "RSA", "provider=fake-rsa", fake_rsa))
68 || !TEST_true(fetch_sig(libctx, "RSA", "?provider=fake-rsa", fake_rsa)))
71 /* Construct a pkey using precise propq to use our provider */
72 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
74 || !TEST_true(EVP_PKEY_fromdata_init(ctx))
75 || !TEST_true(EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_KEYPAIR, NULL))
79 EVP_PKEY_CTX_free(ctx);
82 /* try exercising signature_init ops a few times */
83 for (i = 0; i < 3; i++) {
87 * Create a signing context for our pkey with optional propq.
88 * The sign init should pick both keymgmt and signature from
89 * fake-rsa as the key is not exportable.
91 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pkey,
92 "?provider=default")))
96 * If this picks the wrong signature without realizing it
97 * we can get a segfault or some internal error. At least watch
98 * whether fake-rsa sign_init is exercised by calling sign.
100 if (!TEST_int_eq(EVP_PKEY_sign_init(ctx), 1))
103 if (!TEST_int_eq(EVP_PKEY_sign(ctx, NULL, &siglen, NULL, 0), 1)
104 || !TEST_size_t_eq(siglen, 256))
107 EVP_PKEY_CTX_free(ctx);
114 fake_rsa_finish(fake_rsa);
115 OSSL_PROVIDER_unload(deflt);
116 EVP_PKEY_CTX_free(ctx);
121 static int test_alternative_keygen_init(void)
123 EVP_PKEY_CTX *ctx = NULL;
124 OSSL_PROVIDER *deflt = NULL;
125 OSSL_PROVIDER *fake_rsa = NULL;
126 const OSSL_PROVIDER *provider;
127 const char *provname;
130 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
133 /* first try without the fake RSA provider loaded */
134 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA", NULL)))
137 if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0))
140 if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx)))
143 if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider)))
146 if (!TEST_str_eq(provname, "default"))
149 EVP_PKEY_CTX_free(ctx);
152 /* now load fake RSA and try again */
153 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
156 if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
157 "?provider=fake-rsa")))
160 if (!TEST_int_gt(EVP_PKEY_keygen_init(ctx), 0))
163 if (!TEST_ptr(provider = EVP_PKEY_CTX_get0_provider(ctx)))
166 if (!TEST_ptr(provname = OSSL_PROVIDER_get0_name(provider)))
169 if (!TEST_str_eq(provname, "fake-rsa"))
175 fake_rsa_finish(fake_rsa);
176 OSSL_PROVIDER_unload(deflt);
177 EVP_PKEY_CTX_free(ctx);
181 static int test_pkey_eq(void)
183 OSSL_PROVIDER *deflt = NULL;
184 OSSL_PROVIDER *fake_rsa = NULL;
185 EVP_PKEY *pkey_fake = NULL;
186 EVP_PKEY *pkey_dflt = NULL;
187 EVP_PKEY_CTX *ctx = NULL;
188 OSSL_PARAM *params = NULL;
191 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
194 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
197 /* Construct a public key for fake-rsa */
198 if (!TEST_ptr(params = fake_rsa_key_params(0))
199 || !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
200 "provider=fake-rsa"))
201 || !TEST_true(EVP_PKEY_fromdata_init(ctx))
202 || !TEST_true(EVP_PKEY_fromdata(ctx, &pkey_fake, EVP_PKEY_PUBLIC_KEY,
204 || !TEST_ptr(pkey_fake))
207 EVP_PKEY_CTX_free(ctx);
209 OSSL_PARAM_free(params);
212 /* Construct a public key for default */
213 if (!TEST_ptr(params = fake_rsa_key_params(0))
214 || !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, "RSA",
216 || !TEST_true(EVP_PKEY_fromdata_init(ctx))
217 || !TEST_true(EVP_PKEY_fromdata(ctx, &pkey_dflt, EVP_PKEY_PUBLIC_KEY,
219 || !TEST_ptr(pkey_dflt))
222 EVP_PKEY_CTX_free(ctx);
224 OSSL_PARAM_free(params);
227 /* now test for equality */
228 if (!TEST_int_eq(EVP_PKEY_eq(pkey_fake, pkey_dflt), 1))
233 fake_rsa_finish(fake_rsa);
234 OSSL_PROVIDER_unload(deflt);
235 EVP_PKEY_CTX_free(ctx);
236 EVP_PKEY_free(pkey_fake);
237 EVP_PKEY_free(pkey_dflt);
238 OSSL_PARAM_free(params);
242 static int test_pkey_store(int idx)
244 OSSL_PROVIDER *deflt = NULL;
245 OSSL_PROVIDER *fake_rsa = NULL;
247 EVP_PKEY *pkey = NULL;
248 OSSL_STORE_LOADER *loader = NULL;
249 OSSL_STORE_CTX *ctx = NULL;
250 OSSL_STORE_INFO *info;
251 const char *propq = idx == 0 ? "?provider=fake-rsa"
252 : "?provider=default";
254 /* It's important to load the default provider first for this test */
255 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
258 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
261 if (!TEST_ptr(loader = OSSL_STORE_LOADER_fetch(libctx, "fake_rsa",
265 OSSL_STORE_LOADER_free(loader);
267 if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:test", libctx, propq,
268 NULL, NULL, NULL, NULL, NULL)))
271 while (!OSSL_STORE_eof(ctx)
272 && (info = OSSL_STORE_load(ctx)) != NULL
274 if (OSSL_STORE_INFO_get_type(info) == OSSL_STORE_INFO_PKEY)
275 pkey = OSSL_STORE_INFO_get1_PKEY(info);
276 OSSL_STORE_INFO_free(info);
280 if (!TEST_ptr(pkey) || !TEST_int_eq(EVP_PKEY_is_a(pkey, "RSA"), 1))
286 fake_rsa_finish(fake_rsa);
287 OSSL_PROVIDER_unload(deflt);
288 OSSL_STORE_close(ctx);
293 static int test_pkey_delete(void)
295 OSSL_PROVIDER *deflt = NULL;
296 OSSL_PROVIDER *fake_rsa = NULL;
298 EVP_PKEY *pkey = NULL;
299 OSSL_STORE_LOADER *loader = NULL;
300 OSSL_STORE_CTX *ctx = NULL;
301 OSSL_STORE_INFO *info;
302 const char *propq = "?provider=fake-rsa";
304 /* It's important to load the default provider first for this test */
305 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
308 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
311 if (!TEST_ptr(loader = OSSL_STORE_LOADER_fetch(libctx, "fake_rsa",
315 OSSL_STORE_LOADER_free(loader);
317 /* First iteration: load key, check it, delete it */
318 if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:test", libctx, propq,
319 NULL, NULL, NULL, NULL, NULL)))
322 while (!OSSL_STORE_eof(ctx)
323 && (info = OSSL_STORE_load(ctx)) != NULL
325 if (OSSL_STORE_INFO_get_type(info) == OSSL_STORE_INFO_PKEY)
326 pkey = OSSL_STORE_INFO_get1_PKEY(info);
327 OSSL_STORE_INFO_free(info);
331 if (!TEST_ptr(pkey) || !TEST_int_eq(EVP_PKEY_is_a(pkey, "RSA"), 1))
336 if (!TEST_int_eq(OSSL_STORE_delete("fake_rsa:test", libctx, propq,
337 NULL, NULL, NULL), 1))
339 if (!TEST_int_eq(OSSL_STORE_close(ctx), 1))
342 /* Second iteration: load key should fail */
343 if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:test", libctx, propq,
344 NULL, NULL, NULL, NULL, NULL)))
347 while (!OSSL_STORE_eof(ctx)) {
348 info = OSSL_STORE_load(ctx);
349 if (!TEST_ptr_null(info))
356 fake_rsa_finish(fake_rsa);
357 OSSL_PROVIDER_unload(deflt);
358 OSSL_STORE_close(ctx);
359 fake_rsa_restore_store_state();
363 static int fake_pw_read_string(UI *ui, UI_STRING *uis)
365 const char *passphrase = FAKE_PASSPHRASE;
367 if (UI_get_string_type(uis) == UIT_PROMPT) {
368 UI_set_result(ui, uis, passphrase);
375 static int test_pkey_store_open_ex(void)
377 OSSL_PROVIDER *deflt = NULL;
378 OSSL_PROVIDER *fake_rsa = NULL;
380 EVP_PKEY *pkey = NULL;
381 OSSL_STORE_LOADER *loader = NULL;
382 OSSL_STORE_CTX *ctx = NULL;
383 const char *propq = "?provider=fake-rsa";
384 UI_METHOD *ui_method = NULL;
386 /* It's important to load the default provider first for this test */
387 if (!TEST_ptr(deflt = OSSL_PROVIDER_load(libctx, "default")))
390 if (!TEST_ptr(fake_rsa = fake_rsa_start(libctx)))
393 if (!TEST_ptr(loader = OSSL_STORE_LOADER_fetch(libctx, "fake_rsa",
397 OSSL_STORE_LOADER_free(loader);
399 if (!TEST_ptr(ui_method= UI_create_method("PW Callbacks")))
402 if (UI_method_set_reader(ui_method, fake_pw_read_string))
405 if (!TEST_ptr(ctx = OSSL_STORE_open_ex("fake_rsa:openpwtest", libctx, propq,
406 ui_method, NULL, NULL, NULL, NULL)))
409 /* retry w/o ui_method to ensure we actually enter pw checks and fail */
410 OSSL_STORE_close(ctx);
411 if (!TEST_ptr_null(ctx = OSSL_STORE_open_ex("fake_rsa:openpwtest", libctx,
412 propq, NULL, NULL, NULL, NULL,
419 UI_destroy_method(ui_method);
420 fake_rsa_finish(fake_rsa);
421 OSSL_PROVIDER_unload(deflt);
422 OSSL_STORE_close(ctx);
427 int setup_tests(void)
429 libctx = OSSL_LIB_CTX_new();
433 ADD_TEST(test_pkey_sig);
434 ADD_TEST(test_alternative_keygen_init);
435 ADD_TEST(test_pkey_eq);
436 ADD_ALL_TESTS(test_pkey_store, 2);
437 ADD_TEST(test_pkey_delete);
438 ADD_TEST(test_pkey_store_open_ex);
443 void cleanup_tests(void)
445 OSSL_LIB_CTX_free(libctx);