2 * Copyright 2021-2023 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 * https://www.openssl.org/source/license.html
8 * or in the file LICENSE in the source distribution.
12 #include <openssl/core_names.h>
13 #include <openssl/core_object.h>
14 #include <openssl/rand.h>
15 #include <openssl/provider.h>
17 #include "fake_rsaprov.h"
19 static OSSL_FUNC_keymgmt_new_fn fake_rsa_keymgmt_new
;
20 static OSSL_FUNC_keymgmt_free_fn fake_rsa_keymgmt_free
;
21 static OSSL_FUNC_keymgmt_has_fn fake_rsa_keymgmt_has
;
22 static OSSL_FUNC_keymgmt_query_operation_name_fn fake_rsa_keymgmt_query
;
23 static OSSL_FUNC_keymgmt_import_fn fake_rsa_keymgmt_import
;
24 static OSSL_FUNC_keymgmt_import_types_fn fake_rsa_keymgmt_imptypes
;
25 static OSSL_FUNC_keymgmt_export_fn fake_rsa_keymgmt_export
;
26 static OSSL_FUNC_keymgmt_export_types_fn fake_rsa_keymgmt_exptypes
;
27 static OSSL_FUNC_keymgmt_load_fn fake_rsa_keymgmt_load
;
29 static int has_selection
;
30 static int imptypes_selection
;
31 static int exptypes_selection
;
33 static int key_deleted
;
35 struct fake_rsa_keydata
{
40 void fake_rsa_restore_store_state(void)
45 static void *fake_rsa_keymgmt_new(void *provctx
)
47 struct fake_rsa_keydata
*key
;
49 if (!TEST_ptr(key
= OPENSSL_zalloc(sizeof(struct fake_rsa_keydata
))))
52 /* clear test globals */
54 imptypes_selection
= 0;
55 exptypes_selection
= 0;
61 static void fake_rsa_keymgmt_free(void *keydata
)
63 OPENSSL_free(keydata
);
66 static int fake_rsa_keymgmt_has(const void *key
, int selection
)
68 /* record global for checking */
69 has_selection
= selection
;
75 static const char *fake_rsa_keymgmt_query(int id
)
77 /* record global for checking */
83 static int fake_rsa_keymgmt_import(void *keydata
, int selection
,
86 struct fake_rsa_keydata
*fake_rsa_key
= keydata
;
88 /* key was imported */
89 fake_rsa_key
->status
= 1;
94 static unsigned char fake_rsa_n
[] =
95 "\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F"
96 "\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5"
97 "\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93"
98 "\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1"
101 static unsigned char fake_rsa_e
[] = "\x11";
103 static unsigned char fake_rsa_d
[] =
104 "\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44"
105 "\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64"
106 "\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9"
107 "\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51";
109 static unsigned char fake_rsa_p
[] =
110 "\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5"
111 "\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12"
114 static unsigned char fake_rsa_q
[] =
115 "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9"
116 "\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D"
119 static unsigned char fake_rsa_dmp1
[] =
120 "\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF"
121 "\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05";
123 static unsigned char fake_rsa_dmq1
[] =
124 "\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99"
125 "\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D"
128 static unsigned char fake_rsa_iqmp
[] =
129 "\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8"
130 "\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26";
132 OSSL_PARAM
*fake_rsa_key_params(int priv
)
135 OSSL_PARAM params
[] = {
136 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N
, fake_rsa_n
,
137 sizeof(fake_rsa_n
) -1),
138 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E
, fake_rsa_e
,
139 sizeof(fake_rsa_e
) -1),
140 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D
, fake_rsa_d
,
141 sizeof(fake_rsa_d
) -1),
142 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1
, fake_rsa_p
,
143 sizeof(fake_rsa_p
) -1),
144 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2
, fake_rsa_q
,
145 sizeof(fake_rsa_q
) -1),
146 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1
, fake_rsa_dmp1
,
147 sizeof(fake_rsa_dmp1
) -1),
148 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2
, fake_rsa_dmq1
,
149 sizeof(fake_rsa_dmq1
) -1),
150 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1
, fake_rsa_iqmp
,
151 sizeof(fake_rsa_iqmp
) -1),
154 return OSSL_PARAM_dup(params
);
156 OSSL_PARAM params
[] = {
157 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N
, fake_rsa_n
,
158 sizeof(fake_rsa_n
) -1),
159 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E
, fake_rsa_e
,
160 sizeof(fake_rsa_e
) -1),
163 return OSSL_PARAM_dup(params
);
167 static int fake_rsa_keymgmt_export(void *keydata
, int selection
,
168 OSSL_CALLBACK
*param_callback
, void *cbarg
)
170 OSSL_PARAM
*params
= NULL
;
173 if (selection
& OSSL_KEYMGMT_SELECT_PRIVATE_KEY
)
176 if (!TEST_ptr(params
= fake_rsa_key_params(0)))
179 ret
= param_callback(params
, cbarg
);
180 OSSL_PARAM_free(params
);
184 static const OSSL_PARAM fake_rsa_import_key_types
[] = {
185 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N
, NULL
, 0),
186 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E
, NULL
, 0),
187 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_D
, NULL
, 0),
188 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR1
, NULL
, 0),
189 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_FACTOR2
, NULL
, 0),
190 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT1
, NULL
, 0),
191 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_EXPONENT2
, NULL
, 0),
192 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_COEFFICIENT1
, NULL
, 0),
196 static const OSSL_PARAM
*fake_rsa_keymgmt_imptypes(int selection
)
198 /* record global for checking */
199 imptypes_selection
= selection
;
201 return fake_rsa_import_key_types
;
204 static const OSSL_PARAM fake_rsa_export_key_types
[] = {
205 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_N
, NULL
, 0),
206 OSSL_PARAM_BN(OSSL_PKEY_PARAM_RSA_E
, NULL
, 0),
210 static const OSSL_PARAM
*fake_rsa_keymgmt_exptypes(int selection
)
212 /* record global for checking */
213 exptypes_selection
= selection
;
215 return fake_rsa_export_key_types
;
218 static void *fake_rsa_keymgmt_load(const void *reference
, size_t reference_sz
)
220 struct fake_rsa_keydata
*key
= NULL
;
222 if (reference_sz
!= sizeof(*key
))
225 key
= *(struct fake_rsa_keydata
**)reference
;
226 if (key
->status
!= 1)
229 /* detach the reference */
230 *(struct fake_rsa_keydata
**)reference
= NULL
;
235 static void *fake_rsa_gen_init(void *provctx
, int selection
,
236 const OSSL_PARAM params
[])
238 unsigned char *gctx
= NULL
;
240 if (!TEST_ptr(gctx
= OPENSSL_malloc(1)))
248 static void *fake_rsa_gen(void *genctx
, OSSL_CALLBACK
*osslcb
, void *cbarg
)
250 unsigned char *gctx
= genctx
;
251 static const unsigned char inited
[] = { 1 };
252 struct fake_rsa_keydata
*keydata
;
255 || !TEST_mem_eq(gctx
, sizeof(*gctx
), inited
, sizeof(inited
)))
258 if (!TEST_ptr(keydata
= fake_rsa_keymgmt_new(NULL
)))
265 static void fake_rsa_gen_cleanup(void *genctx
)
267 OPENSSL_free(genctx
);
270 static const OSSL_DISPATCH fake_rsa_keymgmt_funcs
[] = {
271 { OSSL_FUNC_KEYMGMT_NEW
, (void (*)(void))fake_rsa_keymgmt_new
},
272 { OSSL_FUNC_KEYMGMT_FREE
, (void (*)(void))fake_rsa_keymgmt_free
} ,
273 { OSSL_FUNC_KEYMGMT_HAS
, (void (*)(void))fake_rsa_keymgmt_has
},
274 { OSSL_FUNC_KEYMGMT_QUERY_OPERATION_NAME
,
275 (void (*)(void))fake_rsa_keymgmt_query
},
276 { OSSL_FUNC_KEYMGMT_IMPORT
, (void (*)(void))fake_rsa_keymgmt_import
},
277 { OSSL_FUNC_KEYMGMT_IMPORT_TYPES
,
278 (void (*)(void))fake_rsa_keymgmt_imptypes
},
279 { OSSL_FUNC_KEYMGMT_EXPORT
, (void (*)(void))fake_rsa_keymgmt_export
},
280 { OSSL_FUNC_KEYMGMT_EXPORT_TYPES
,
281 (void (*)(void))fake_rsa_keymgmt_exptypes
},
282 { OSSL_FUNC_KEYMGMT_LOAD
, (void (*)(void))fake_rsa_keymgmt_load
},
283 { OSSL_FUNC_KEYMGMT_GEN_INIT
, (void (*)(void))fake_rsa_gen_init
},
284 { OSSL_FUNC_KEYMGMT_GEN
, (void (*)(void))fake_rsa_gen
},
285 { OSSL_FUNC_KEYMGMT_GEN_CLEANUP
, (void (*)(void))fake_rsa_gen_cleanup
},
289 static const OSSL_ALGORITHM fake_rsa_keymgmt_algs
[] = {
290 { "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_keymgmt_funcs
, "Fake RSA Key Management" },
291 { NULL
, NULL
, NULL
, NULL
}
294 static OSSL_FUNC_signature_newctx_fn fake_rsa_sig_newctx
;
295 static OSSL_FUNC_signature_freectx_fn fake_rsa_sig_freectx
;
296 static OSSL_FUNC_signature_sign_init_fn fake_rsa_sig_sign_init
;
297 static OSSL_FUNC_signature_sign_fn fake_rsa_sig_sign
;
299 static void *fake_rsa_sig_newctx(void *provctx
, const char *propq
)
301 unsigned char *sigctx
= OPENSSL_zalloc(1);
308 static void fake_rsa_sig_freectx(void *sigctx
)
310 OPENSSL_free(sigctx
);
313 static int fake_rsa_sig_sign_init(void *ctx
, void *provkey
,
314 const OSSL_PARAM params
[])
316 unsigned char *sigctx
= ctx
;
317 struct fake_rsa_keydata
*keydata
= provkey
;
319 /* we must have a ctx */
320 if (!TEST_ptr(sigctx
))
323 /* we must have some initialized key */
324 if (!TEST_ptr(keydata
) || !TEST_int_gt(keydata
->status
, 0))
327 /* record that sign init was called */
332 static int fake_rsa_sig_sign(void *ctx
, unsigned char *sig
,
333 size_t *siglen
, size_t sigsize
,
334 const unsigned char *tbs
, size_t tbslen
)
336 unsigned char *sigctx
= ctx
;
338 /* we must have a ctx and init was called upon it */
339 if (!TEST_ptr(sigctx
) || !TEST_int_eq(*sigctx
, 1))
343 /* record that the real sign operation was called */
345 if (!TEST_int_ge(sigsize
, *siglen
))
348 /* produce a fake signature */
349 memset(sig
, 'a', *siglen
);
355 #define FAKE_DGSTSGN_SIGN 0x01
356 #define FAKE_DGSTSGN_VERIFY 0x02
357 #define FAKE_DGSTSGN_UPDATED 0x04
358 #define FAKE_DGSTSGN_FINALISED 0x08
359 #define FAKE_DGSTSGN_NO_DUP 0xA0
361 static void *fake_rsa_sig_dupctx(void *ctx
)
363 unsigned char *sigctx
= ctx
;
364 unsigned char *newctx
;
366 if ((*sigctx
& FAKE_DGSTSGN_NO_DUP
) != 0)
369 if (!TEST_ptr(newctx
= OPENSSL_zalloc(1)))
376 static int fake_rsa_dgstsgnvfy_init(void *ctx
, unsigned char type
,
377 void *provkey
, const OSSL_PARAM params
[])
379 unsigned char *sigctx
= ctx
;
380 struct fake_rsa_keydata
*keydata
= provkey
;
382 /* we must have a ctx */
383 if (!TEST_ptr(sigctx
))
386 /* we must have some initialized key */
387 if (!TEST_ptr(keydata
) || !TEST_int_gt(keydata
->status
, 0))
390 /* record that sign/verify init was called */
396 p
= OSSL_PARAM_locate_const(params
, "NO_DUP");
398 if (OSSL_PARAM_get_int(p
, &dup
)) {
399 *sigctx
|= FAKE_DGSTSGN_NO_DUP
;
407 static int fake_rsa_dgstsgn_init(void *ctx
, const char *mdname
,
408 void *provkey
, const OSSL_PARAM params
[])
410 return fake_rsa_dgstsgnvfy_init(ctx
, FAKE_DGSTSGN_SIGN
, provkey
, params
);
413 static int fake_rsa_dgstvfy_init(void *ctx
, const char *mdname
,
414 void *provkey
, const OSSL_PARAM params
[])
416 return fake_rsa_dgstsgnvfy_init(ctx
, FAKE_DGSTSGN_VERIFY
, provkey
, params
);
419 static int fake_rsa_dgstsgnvfy_update(void *ctx
, const unsigned char *data
,
422 unsigned char *sigctx
= ctx
;
424 /* we must have a ctx */
425 if (!TEST_ptr(sigctx
))
428 if (*sigctx
== 0 || (*sigctx
& FAKE_DGSTSGN_FINALISED
) != 0)
431 *sigctx
|= FAKE_DGSTSGN_UPDATED
;
435 static int fake_rsa_dgstsgnvfy_final(void *ctx
, unsigned char *sig
,
436 size_t *siglen
, size_t sigsize
)
438 unsigned char *sigctx
= ctx
;
440 /* we must have a ctx */
441 if (!TEST_ptr(sigctx
))
444 if (*sigctx
== 0 || (*sigctx
& FAKE_DGSTSGN_FINALISED
) != 0)
447 if ((*sigctx
& FAKE_DGSTSGN_SIGN
) != 0 && (siglen
== NULL
))
450 if ((*sigctx
& FAKE_DGSTSGN_VERIFY
) != 0 && (siglen
!= NULL
))
453 /* this is sign op */
456 /* record that the real sign operation was called */
458 if (!TEST_int_ge(sigsize
, *siglen
))
460 /* produce a fake signature */
461 memset(sig
, 'a', *siglen
);
465 /* simulate inability to duplicate context and finalise it */
466 if ((*sigctx
& FAKE_DGSTSGN_NO_DUP
) != 0) {
467 *sigctx
|= FAKE_DGSTSGN_FINALISED
;
472 static int fake_rsa_dgstvfy_final(void *ctx
, unsigned char *sig
,
475 return fake_rsa_dgstsgnvfy_final(ctx
, sig
, NULL
, siglen
);
478 static int fake_rsa_dgstsgn(void *ctx
, unsigned char *sig
, size_t *siglen
,
479 size_t sigsize
, const unsigned char *tbs
,
482 if (!fake_rsa_dgstsgnvfy_update(ctx
, tbs
, tbslen
))
485 return fake_rsa_dgstsgnvfy_final(ctx
, sig
, siglen
, sigsize
);
488 static int fake_rsa_dgstvfy(void *ctx
, unsigned char *sig
, size_t siglen
,
489 const unsigned char *tbv
, size_t tbvlen
)
491 if (!fake_rsa_dgstsgnvfy_update(ctx
, tbv
, tbvlen
))
494 return fake_rsa_dgstvfy_final(ctx
, sig
, siglen
);
497 static const OSSL_DISPATCH fake_rsa_sig_funcs
[] = {
498 { OSSL_FUNC_SIGNATURE_NEWCTX
, (void (*)(void))fake_rsa_sig_newctx
},
499 { OSSL_FUNC_SIGNATURE_FREECTX
, (void (*)(void))fake_rsa_sig_freectx
},
500 { OSSL_FUNC_SIGNATURE_SIGN_INIT
, (void (*)(void))fake_rsa_sig_sign_init
},
501 { OSSL_FUNC_SIGNATURE_SIGN
, (void (*)(void))fake_rsa_sig_sign
},
502 { OSSL_FUNC_SIGNATURE_DUPCTX
, (void (*)(void))fake_rsa_sig_dupctx
},
503 { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT
,
504 (void (*)(void))fake_rsa_dgstsgn_init
},
505 { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE
,
506 (void (*)(void))fake_rsa_dgstsgnvfy_update
},
507 { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL
,
508 (void (*)(void))fake_rsa_dgstsgnvfy_final
},
509 { OSSL_FUNC_SIGNATURE_DIGEST_SIGN
,
510 (void (*)(void))fake_rsa_dgstsgn
},
511 { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT
,
512 (void (*)(void))fake_rsa_dgstvfy_init
},
513 { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE
,
514 (void (*)(void))fake_rsa_dgstsgnvfy_update
},
515 { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL
,
516 (void (*)(void))fake_rsa_dgstvfy_final
},
517 { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY
,
518 (void (*)(void))fake_rsa_dgstvfy
},
522 static const OSSL_ALGORITHM fake_rsa_sig_algs
[] = {
523 { "RSA:rsaEncryption", "provider=fake-rsa", fake_rsa_sig_funcs
, "Fake RSA Signature" },
524 { NULL
, NULL
, NULL
, NULL
}
527 static OSSL_FUNC_store_open_fn fake_rsa_st_open
;
528 static OSSL_FUNC_store_open_ex_fn fake_rsa_st_open_ex
;
529 static OSSL_FUNC_store_settable_ctx_params_fn fake_rsa_st_settable_ctx_params
;
530 static OSSL_FUNC_store_set_ctx_params_fn fake_rsa_st_set_ctx_params
;
531 static OSSL_FUNC_store_load_fn fake_rsa_st_load
;
532 static OSSL_FUNC_store_eof_fn fake_rsa_st_eof
;
533 static OSSL_FUNC_store_close_fn fake_rsa_st_close
;
534 static OSSL_FUNC_store_delete_fn fake_rsa_st_delete
;
536 static const char fake_rsa_scheme
[] = "fake_rsa:";
537 static const char fake_rsa_openpwtest
[] = "fake_rsa:openpwtest";
538 static const char fake_rsa_prompt
[] = "Fake Prompt Info";
540 static void *fake_rsa_st_open_ex(void *provctx
, const char *uri
,
541 const OSSL_PARAM params
[],
542 OSSL_PASSPHRASE_CALLBACK
*pw_cb
,
545 unsigned char *storectx
= NULL
;
547 /* First check whether the uri is ours */
548 if (strncmp(uri
, fake_rsa_scheme
, sizeof(fake_rsa_scheme
) - 1) != 0)
551 if (strncmp(uri
, fake_rsa_openpwtest
,
552 sizeof(fake_rsa_openpwtest
) - 1) == 0) {
553 const char *pw_check
= FAKE_PASSPHRASE
;
554 char fakepw
[sizeof(FAKE_PASSPHRASE
) + 1] = { 0 };
555 size_t fakepw_len
= 0;
556 OSSL_PARAM pw_params
[2] = {
557 OSSL_PARAM_utf8_string(OSSL_PASSPHRASE_PARAM_INFO
,
558 (void *)fake_rsa_prompt
,
559 sizeof(fake_rsa_prompt
) - 1),
567 if (!pw_cb(fakepw
, sizeof(fakepw
), &fakepw_len
, pw_params
, pw_cbarg
)) {
568 TEST_info("fake_rsa_open_ex failed passphrase callback");
571 if (strncmp(pw_check
, fakepw
, sizeof(pw_check
) - 1) != 0) {
572 TEST_info("fake_rsa_open_ex failed passphrase check");
577 storectx
= OPENSSL_zalloc(1);
578 if (!TEST_ptr(storectx
))
581 TEST_info("fake_rsa_open_ex called");
586 static void *fake_rsa_st_open(void *provctx
, const char *uri
)
588 unsigned char *storectx
= NULL
;
590 storectx
= fake_rsa_st_open_ex(provctx
, uri
, NULL
, NULL
, NULL
);
592 TEST_info("fake_rsa_open called");
597 static const OSSL_PARAM
*fake_rsa_st_settable_ctx_params(void *provctx
)
599 static const OSSL_PARAM known_settable_ctx_params
[] = {
602 return known_settable_ctx_params
;
605 static int fake_rsa_st_set_ctx_params(void *loaderctx
,
606 const OSSL_PARAM params
[])
611 static int fake_rsa_st_load(void *loaderctx
,
612 OSSL_CALLBACK
*object_cb
, void *object_cbarg
,
613 OSSL_PASSPHRASE_CALLBACK
*pw_cb
, void *pw_cbarg
)
615 unsigned char *storectx
= loaderctx
;
616 OSSL_PARAM params
[4];
617 int object_type
= OSSL_OBJECT_PKEY
;
618 struct fake_rsa_keydata
*key
= NULL
;
623 if (key_deleted
== 1) {
628 /* Construct a new key using our keymgmt functions */
629 if (!TEST_ptr(key
= fake_rsa_keymgmt_new(NULL
)))
631 if (!TEST_int_gt(fake_rsa_keymgmt_import(key
, 0, NULL
), 0))
634 OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE
, &object_type
);
636 OSSL_PARAM_construct_utf8_string(OSSL_OBJECT_PARAM_DATA_TYPE
,
638 /* The address of the key becomes the octet string */
640 OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_REFERENCE
,
642 params
[3] = OSSL_PARAM_construct_end();
643 rv
= object_cb(params
, object_cbarg
);
648 TEST_info("fake_rsa_load() called in error state");
652 TEST_info("fake_rsa_load() called in eof state");
656 TEST_info("fake_rsa_load called - rv: %d", rv
);
658 if (rv
== 0 && key_deleted
== 0) {
659 fake_rsa_keymgmt_free(key
);
665 static int fake_rsa_st_delete(void *loaderctx
, const char *uri
,
666 const OSSL_PARAM params
[],
667 OSSL_PASSPHRASE_CALLBACK
*pw_cb
, void *pw_cbarg
)
673 static int fake_rsa_st_eof(void *loaderctx
)
675 unsigned char *storectx
= loaderctx
;
677 /* just one key for now in the fake_rsa store */
678 return *storectx
!= 0;
681 static int fake_rsa_st_close(void *loaderctx
)
683 OPENSSL_free(loaderctx
);
687 static const OSSL_DISPATCH fake_rsa_store_funcs
[] = {
688 { OSSL_FUNC_STORE_OPEN
, (void (*)(void))fake_rsa_st_open
},
689 { OSSL_FUNC_STORE_OPEN_EX
, (void (*)(void))fake_rsa_st_open_ex
},
690 { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS
,
691 (void (*)(void))fake_rsa_st_settable_ctx_params
},
692 { OSSL_FUNC_STORE_SET_CTX_PARAMS
, (void (*)(void))fake_rsa_st_set_ctx_params
},
693 { OSSL_FUNC_STORE_LOAD
, (void (*)(void))fake_rsa_st_load
},
694 { OSSL_FUNC_STORE_EOF
, (void (*)(void))fake_rsa_st_eof
},
695 { OSSL_FUNC_STORE_CLOSE
, (void (*)(void))fake_rsa_st_close
},
696 { OSSL_FUNC_STORE_DELETE
, (void (*)(void))fake_rsa_st_delete
},
700 static const OSSL_ALGORITHM fake_rsa_store_algs
[] = {
701 { "fake_rsa", "provider=fake-rsa", fake_rsa_store_funcs
},
705 static const OSSL_ALGORITHM
*fake_rsa_query(void *provctx
,
710 switch (operation_id
) {
711 case OSSL_OP_SIGNATURE
:
712 return fake_rsa_sig_algs
;
714 case OSSL_OP_KEYMGMT
:
715 return fake_rsa_keymgmt_algs
;
718 return fake_rsa_store_algs
;
723 /* Functions we provide to the core */
724 static const OSSL_DISPATCH fake_rsa_method
[] = {
725 { OSSL_FUNC_PROVIDER_TEARDOWN
, (void (*)(void))OSSL_LIB_CTX_free
},
726 { OSSL_FUNC_PROVIDER_QUERY_OPERATION
, (void (*)(void))fake_rsa_query
},
730 static int fake_rsa_provider_init(const OSSL_CORE_HANDLE
*handle
,
731 const OSSL_DISPATCH
*in
,
732 const OSSL_DISPATCH
**out
, void **provctx
)
734 if (!TEST_ptr(*provctx
= OSSL_LIB_CTX_new()))
736 *out
= fake_rsa_method
;
740 OSSL_PROVIDER
*fake_rsa_start(OSSL_LIB_CTX
*libctx
)
744 if (!TEST_true(OSSL_PROVIDER_add_builtin(libctx
, "fake-rsa",
745 fake_rsa_provider_init
))
746 || !TEST_ptr(p
= OSSL_PROVIDER_try_load(libctx
, "fake-rsa", 1)))
752 void fake_rsa_finish(OSSL_PROVIDER
*p
)
754 OSSL_PROVIDER_unload(p
);