code
stringlengths
49
1.37M
repo_name
stringclasses
117 values
path
stringlengths
17
73
from
stringclasses
1 value
#include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "crypto/poly1305.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_mac_newctx_fn poly1305_new; static OSSL_FUNC_mac_dupctx_fn poly1305_dup; static OSSL_FUNC_mac_freectx_fn poly1305_free; static OSSL_FUNC_mac_gettable_params_fn poly1305_gettable_params; static OSSL_FUNC_mac_get_params_fn poly1305_get_params; static OSSL_FUNC_mac_settable_ctx_params_fn poly1305_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn poly1305_set_ctx_params; static OSSL_FUNC_mac_init_fn poly1305_init; static OSSL_FUNC_mac_update_fn poly1305_update; static OSSL_FUNC_mac_final_fn poly1305_final; struct poly1305_data_st { void *provctx; int updated; POLY1305 poly1305; }; static void *poly1305_new(void *provctx) { struct poly1305_data_st *ctx; if (!ossl_prov_is_running()) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx != NULL) ctx->provctx = provctx; return ctx; } static void poly1305_free(void *vmacctx) { OPENSSL_free(vmacctx); } static void *poly1305_dup(void *vsrc) { struct poly1305_data_st *src = vsrc; struct poly1305_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = OPENSSL_malloc(sizeof(*dst)); if (dst == NULL) return NULL; *dst = *src; return dst; } static size_t poly1305_size(void) { return POLY1305_DIGEST_SIZE; } static int poly1305_setkey(struct poly1305_data_st *ctx, const unsigned char *key, size_t keylen) { if (keylen != POLY1305_KEY_SIZE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } Poly1305_Init(&ctx->poly1305, key); ctx->updated = 0; return 1; } static int poly1305_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct poly1305_data_st *ctx = vmacctx; if (!ossl_prov_is_running() || !poly1305_set_ctx_params(ctx, params)) return 0; if (key != NULL) return poly1305_setkey(ctx, key, keylen); return ctx->updated == 0; } static int poly1305_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct poly1305_data_st *ctx = vmacctx; ctx->updated = 1; if (datalen == 0) return 1; Poly1305_Update(&ctx->poly1305, data, datalen); return 1; } static int poly1305_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct poly1305_data_st *ctx = vmacctx; if (!ossl_prov_is_running()) return 0; ctx->updated = 1; Poly1305_Final(&ctx->poly1305, out); *outl = poly1305_size(); return 1; } static const OSSL_PARAM known_gettable_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *poly1305_gettable_params(void *provctx) { return known_gettable_params; } static int poly1305_get_params(OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, poly1305_size()); return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *poly1305_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } static int poly1305_set_ctx_params(void *vmacctx, const OSSL_PARAM *params) { struct poly1305_data_st *ctx = vmacctx; const OSSL_PARAM *p; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !poly1305_setkey(ctx, p->data, p->data_size)) return 0; return 1; } const OSSL_DISPATCH ossl_poly1305_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))poly1305_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))poly1305_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))poly1305_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))poly1305_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))poly1305_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))poly1305_final }, { OSSL_FUNC_MAC_GETTABLE_PARAMS, (void (*)(void))poly1305_gettable_params }, { OSSL_FUNC_MAC_GET_PARAMS, (void (*)(void))poly1305_get_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))poly1305_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))poly1305_set_ctx_params }, OSSL_DISPATCH_END };
macs
openssl/providers/implementations/macs/poly1305_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/cmac.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" static OSSL_FUNC_mac_newctx_fn cmac_new; static OSSL_FUNC_mac_dupctx_fn cmac_dup; static OSSL_FUNC_mac_freectx_fn cmac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn cmac_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn cmac_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn cmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn cmac_set_ctx_params; static OSSL_FUNC_mac_init_fn cmac_init; static OSSL_FUNC_mac_update_fn cmac_update; static OSSL_FUNC_mac_final_fn cmac_final; struct cmac_data_st { void *provctx; CMAC_CTX *ctx; PROV_CIPHER cipher; }; static void *cmac_new(void *provctx) { struct cmac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; if ((macctx = OPENSSL_zalloc(sizeof(*macctx))) == NULL || (macctx->ctx = CMAC_CTX_new()) == NULL) { OPENSSL_free(macctx); macctx = NULL; } else { macctx->provctx = provctx; } return macctx; } static void cmac_free(void *vmacctx) { struct cmac_data_st *macctx = vmacctx; if (macctx != NULL) { CMAC_CTX_free(macctx->ctx); ossl_prov_cipher_reset(&macctx->cipher); OPENSSL_free(macctx); } } static void *cmac_dup(void *vsrc) { struct cmac_data_st *src = vsrc; struct cmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = cmac_new(src->provctx); if (dst == NULL) return NULL; if (!CMAC_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_cipher_copy(&dst->cipher, &src->cipher)) { cmac_free(dst); return NULL; } return dst; } static size_t cmac_size(void *vmacctx) { struct cmac_data_st *macctx = vmacctx; const EVP_CIPHER_CTX *cipherctx = CMAC_CTX_get0_cipher_ctx(macctx->ctx); if (EVP_CIPHER_CTX_get0_cipher(cipherctx) == NULL) return 0; return EVP_CIPHER_CTX_get_block_size(cipherctx); } static int cmac_setkey(struct cmac_data_st *macctx, const unsigned char *key, size_t keylen) { int rv = CMAC_Init(macctx->ctx, key, keylen, ossl_prov_cipher_cipher(&macctx->cipher), ossl_prov_cipher_engine(&macctx->cipher)); ossl_prov_cipher_reset(&macctx->cipher); return rv; } static int cmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct cmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !cmac_set_ctx_params(macctx, params)) return 0; if (key != NULL) return cmac_setkey(macctx, key, keylen); return CMAC_Init(macctx->ctx, NULL, 0, NULL, NULL); } static int cmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct cmac_data_st *macctx = vmacctx; return CMAC_Update(macctx->ctx, data, datalen); } static int cmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct cmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running()) return 0; return CMAC_Final(macctx->ctx, out, outl); } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *cmac_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int cmac_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, cmac_size(vmacctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, cmac_size(vmacctx))) return 0; return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *cmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } static int cmac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct cmac_data_st *macctx = vmacctx; OSSL_LIB_CTX *ctx = PROV_LIBCTX_OF(macctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CIPHER)) != NULL) { if (!ossl_prov_cipher_load_from_params(&macctx->cipher, params, ctx)) return 0; if (EVP_CIPHER_get_mode(ossl_prov_cipher_cipher(&macctx->cipher)) != EVP_CIPH_CBC_MODE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return 0; } } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; return cmac_setkey(macctx, p->data, p->data_size); } return 1; } const OSSL_DISPATCH ossl_cmac_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))cmac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))cmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))cmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))cmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))cmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))cmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))cmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))cmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))cmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))cmac_set_ctx_params }, OSSL_DISPATCH_END };
macs
openssl/providers/implementations/macs/cmac_prov.c
openssl
#include <stdlib.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" static OSSL_FUNC_mac_newctx_fn gmac_new; static OSSL_FUNC_mac_dupctx_fn gmac_dup; static OSSL_FUNC_mac_freectx_fn gmac_free; static OSSL_FUNC_mac_gettable_params_fn gmac_gettable_params; static OSSL_FUNC_mac_get_params_fn gmac_get_params; static OSSL_FUNC_mac_settable_ctx_params_fn gmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn gmac_set_ctx_params; static OSSL_FUNC_mac_init_fn gmac_init; static OSSL_FUNC_mac_update_fn gmac_update; static OSSL_FUNC_mac_final_fn gmac_final; struct gmac_data_st { void *provctx; EVP_CIPHER_CTX *ctx; PROV_CIPHER cipher; }; static void gmac_free(void *vmacctx) { struct gmac_data_st *macctx = vmacctx; if (macctx != NULL) { EVP_CIPHER_CTX_free(macctx->ctx); ossl_prov_cipher_reset(&macctx->cipher); OPENSSL_free(macctx); } } static void *gmac_new(void *provctx) { struct gmac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; if ((macctx = OPENSSL_zalloc(sizeof(*macctx))) == NULL || (macctx->ctx = EVP_CIPHER_CTX_new()) == NULL) { gmac_free(macctx); return NULL; } macctx->provctx = provctx; return macctx; } static void *gmac_dup(void *vsrc) { struct gmac_data_st *src = vsrc; struct gmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = gmac_new(src->provctx); if (dst == NULL) return NULL; if (!EVP_CIPHER_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_cipher_copy(&dst->cipher, &src->cipher)) { gmac_free(dst); return NULL; } return dst; } static size_t gmac_size(void) { return EVP_GCM_TLS_TAG_LEN; } static int gmac_setkey(struct gmac_data_st *macctx, const unsigned char *key, size_t keylen) { EVP_CIPHER_CTX *ctx = macctx->ctx; if (keylen != (size_t)EVP_CIPHER_CTX_get_key_length(ctx)) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (!EVP_EncryptInit_ex(ctx, NULL, NULL, key, NULL)) return 0; return 1; } static int gmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct gmac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !gmac_set_ctx_params(macctx, params)) return 0; if (key != NULL) return gmac_setkey(macctx, key, keylen); return EVP_EncryptInit_ex(macctx->ctx, NULL, NULL, NULL, NULL); } static int gmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct gmac_data_st *macctx = vmacctx; EVP_CIPHER_CTX *ctx = macctx->ctx; int outlen; if (datalen == 0) return 1; while (datalen > INT_MAX) { if (!EVP_EncryptUpdate(ctx, NULL, &outlen, data, INT_MAX)) return 0; data += INT_MAX; datalen -= INT_MAX; } return EVP_EncryptUpdate(ctx, NULL, &outlen, data, datalen); } static int gmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; struct gmac_data_st *macctx = vmacctx; int hlen = 0; if (!ossl_prov_is_running()) return 0; if (!EVP_EncryptFinal_ex(macctx->ctx, out, &hlen)) return 0; hlen = gmac_size(); params[0] = OSSL_PARAM_construct_octet_string(OSSL_CIPHER_PARAM_AEAD_TAG, out, (size_t)hlen); if (!EVP_CIPHER_CTX_get_params(macctx->ctx, params)) return 0; *outl = hlen; return 1; } static const OSSL_PARAM known_gettable_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *gmac_gettable_params(void *provctx) { return known_gettable_params; } static int gmac_get_params(OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL) return OSSL_PARAM_set_size_t(p, gmac_size()); return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_CIPHER, NULL, 0), OSSL_PARAM_utf8_string(OSSL_MAC_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_IV, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *gmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } static int gmac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct gmac_data_st *macctx = vmacctx; EVP_CIPHER_CTX *ctx = macctx->ctx; OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(macctx->provctx); const OSSL_PARAM *p; if (params == NULL) return 1; if (ctx == NULL) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CIPHER)) != NULL) { if (!ossl_prov_cipher_load_from_params(&macctx->cipher, params, provctx)) return 0; if (EVP_CIPHER_get_mode(ossl_prov_cipher_cipher(&macctx->cipher)) != EVP_CIPH_GCM_MODE) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_MODE); return 0; } if (!EVP_EncryptInit_ex(ctx, ossl_prov_cipher_cipher(&macctx->cipher), ossl_prov_cipher_engine(&macctx->cipher), NULL, NULL)) return 0; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL) if (p->data_type != OSSL_PARAM_OCTET_STRING || !gmac_setkey(macctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_IV)) != NULL) { if (p->data_type != OSSL_PARAM_OCTET_STRING) return 0; if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, p->data_size, NULL) <= 0 || !EVP_EncryptInit_ex(ctx, NULL, NULL, NULL, p->data)) return 0; } return 1; } const OSSL_DISPATCH ossl_gmac_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))gmac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))gmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))gmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))gmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))gmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))gmac_final }, { OSSL_FUNC_MAC_GETTABLE_PARAMS, (void (*)(void))gmac_gettable_params }, { OSSL_FUNC_MAC_GET_PARAMS, (void (*)(void))gmac_get_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))gmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))gmac_set_ctx_params }, OSSL_DISPATCH_END };
macs
openssl/providers/implementations/macs/gmac_prov.c
openssl
#include <stdlib.h> #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/implementations.h" #include "prov/provider_ctx.h" #include "prov/provider_util.h" #include "prov/providercommon.h" #include "internal/cryptlib.h" static OSSL_FUNC_mac_newctx_fn kmac128_new; static OSSL_FUNC_mac_newctx_fn kmac256_new; static OSSL_FUNC_mac_dupctx_fn kmac_dup; static OSSL_FUNC_mac_freectx_fn kmac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn kmac_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn kmac_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn kmac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn kmac_set_ctx_params; static OSSL_FUNC_mac_init_fn kmac_init; static OSSL_FUNC_mac_update_fn kmac_update; static OSSL_FUNC_mac_final_fn kmac_final; #define KMAC_MAX_BLOCKSIZE ((1600 - 128 * 2) / 8) #define KMAC_MAX_OUTPUT_LEN (0xFFFFFF / 8) #define KMAC_MAX_ENCODED_HEADER_LEN (1 + 3) #define KMAC_MAX_CUSTOM 512 #define KMAC_MAX_CUSTOM_ENCODED (KMAC_MAX_CUSTOM + KMAC_MAX_ENCODED_HEADER_LEN) #define KMAC_MAX_KEY 512 #define KMAC_MIN_KEY 4 #define KMAC_MAX_KEY_ENCODED (KMAC_MAX_BLOCKSIZE * 4) static const unsigned char kmac_string[] = { 0x01, 0x20, 0x4B, 0x4D, 0x41, 0x43 }; #define KMAC_FLAG_XOF_MODE 1 struct kmac_data_st { void *provctx; EVP_MD_CTX *ctx; PROV_DIGEST digest; size_t out_len; size_t key_len; size_t custom_len; int xof_mode; unsigned char key[KMAC_MAX_KEY_ENCODED]; unsigned char custom[KMAC_MAX_CUSTOM_ENCODED]; }; static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len); static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, size_t bits); static int bytepad(unsigned char *out, size_t *out_len, const unsigned char *in1, size_t in1_len, const unsigned char *in2, size_t in2_len, size_t w); static int kmac_bytepad_encode_key(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len, size_t w); static void kmac_free(void *vmacctx) { struct kmac_data_st *kctx = vmacctx; if (kctx != NULL) { EVP_MD_CTX_free(kctx->ctx); ossl_prov_digest_reset(&kctx->digest); OPENSSL_cleanse(kctx->key, kctx->key_len); OPENSSL_cleanse(kctx->custom, kctx->custom_len); OPENSSL_free(kctx); } } static struct kmac_data_st *kmac_new(void *provctx) { struct kmac_data_st *kctx; if (!ossl_prov_is_running()) return NULL; if ((kctx = OPENSSL_zalloc(sizeof(*kctx))) == NULL || (kctx->ctx = EVP_MD_CTX_new()) == NULL) { kmac_free(kctx); return NULL; } kctx->provctx = provctx; return kctx; } static void *kmac_fetch_new(void *provctx, const OSSL_PARAM *params) { struct kmac_data_st *kctx = kmac_new(provctx); if (kctx == NULL) return 0; if (!ossl_prov_digest_load_from_params(&kctx->digest, params, PROV_LIBCTX_OF(provctx))) { kmac_free(kctx); return 0; } kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); return kctx; } static void *kmac128_new(void *provctx) { static const OSSL_PARAM kmac128_params[] = { OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC128, sizeof(OSSL_DIGEST_NAME_KECCAK_KMAC128)), OSSL_PARAM_END }; return kmac_fetch_new(provctx, kmac128_params); } static void *kmac256_new(void *provctx) { static const OSSL_PARAM kmac256_params[] = { OSSL_PARAM_utf8_string("digest", OSSL_DIGEST_NAME_KECCAK_KMAC256, sizeof(OSSL_DIGEST_NAME_KECCAK_KMAC256)), OSSL_PARAM_END }; return kmac_fetch_new(provctx, kmac256_params); } static void *kmac_dup(void *vsrc) { struct kmac_data_st *src = vsrc; struct kmac_data_st *dst; if (!ossl_prov_is_running()) return NULL; dst = kmac_new(src->provctx); if (dst == NULL) return NULL; if (!EVP_MD_CTX_copy(dst->ctx, src->ctx) || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { kmac_free(dst); return NULL; } dst->out_len = src->out_len; dst->key_len = src->key_len; dst->custom_len = src->custom_len; dst->xof_mode = src->xof_mode; memcpy(dst->key, src->key, src->key_len); memcpy(dst->custom, src->custom, dst->custom_len); return dst; } static int kmac_setkey(struct kmac_data_st *kctx, const unsigned char *key, size_t keylen) { const EVP_MD *digest = ossl_prov_digest_md(&kctx->digest); int w = EVP_MD_get_block_size(digest); if (keylen < KMAC_MIN_KEY || keylen > KMAC_MAX_KEY) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } if (w <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH); return 0; } if (!kmac_bytepad_encode_key(kctx->key, sizeof(kctx->key), &kctx->key_len, key, keylen, (size_t)w)) return 0; return 1; } static int kmac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct kmac_data_st *kctx = vmacctx; EVP_MD_CTX *ctx = kctx->ctx; unsigned char *out; size_t out_len, block_len; int res, t; if (!ossl_prov_is_running() || !kmac_set_ctx_params(kctx, params)) return 0; if (key != NULL) { if (!kmac_setkey(kctx, key, keylen)) return 0; } else if (kctx->key_len == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } if (!EVP_DigestInit_ex(kctx->ctx, ossl_prov_digest_md(&kctx->digest), NULL)) return 0; t = EVP_MD_get_block_size(ossl_prov_digest_md(&kctx->digest)); if (t <= 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_LENGTH); return 0; } block_len = t; if (kctx->custom_len == 0) { const OSSL_PARAM cparams[] = { OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, "", 0), OSSL_PARAM_END }; (void)kmac_set_ctx_params(kctx, cparams); } if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), kctx->custom, kctx->custom_len, block_len)) { ERR_raise(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR); return 0; } out = OPENSSL_malloc(out_len); if (out == NULL) return 0; res = bytepad(out, NULL, kmac_string, sizeof(kmac_string), kctx->custom, kctx->custom_len, block_len) && EVP_DigestUpdate(ctx, out, out_len) && EVP_DigestUpdate(ctx, kctx->key, kctx->key_len); OPENSSL_free(out); return res; } static int kmac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct kmac_data_st *kctx = vmacctx; return EVP_DigestUpdate(kctx->ctx, data, datalen); } static int kmac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct kmac_data_st *kctx = vmacctx; EVP_MD_CTX *ctx = kctx->ctx; size_t lbits, len; unsigned char encoded_outlen[KMAC_MAX_ENCODED_HEADER_LEN]; int ok; if (!ossl_prov_is_running()) return 0; lbits = (kctx->xof_mode ? 0 : (kctx->out_len * 8)); ok = right_encode(encoded_outlen, sizeof(encoded_outlen), &len, lbits) && EVP_DigestUpdate(ctx, encoded_outlen, len) && EVP_DigestFinalXOF(ctx, out, kctx->out_len); *outl = kctx->out_len; return ok; } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *kmac_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int kmac_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { struct kmac_data_st *kctx = vmacctx; OSSL_PARAM *p; int sz; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, kctx->out_len)) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL) { sz = EVP_MD_block_size(ossl_prov_digest_md(&kctx->digest)); if (!OSSL_PARAM_set_int(p, sz)) return 0; } return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_int(OSSL_MAC_PARAM_XOF, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *kmac_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_settable_ctx_params; } static int kmac_set_ctx_params(void *vmacctx, const OSSL_PARAM *params) { struct kmac_data_st *kctx = vmacctx; const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_XOF)) != NULL && !OSSL_PARAM_get_int(p, &kctx->xof_mode)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SIZE)) != NULL) { size_t sz = 0; if (!OSSL_PARAM_get_size_t(p, &sz)) return 0; if (sz > KMAC_MAX_OUTPUT_LEN) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_OUTPUT_LENGTH); return 0; } kctx->out_len = sz; } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !kmac_setkey(kctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CUSTOM)) != NULL) { if (p->data_size > KMAC_MAX_CUSTOM) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CUSTOM_LENGTH); return 0; } if (!encode_string(kctx->custom, sizeof(kctx->custom), &kctx->custom_len, p->data, p->data_size)) return 0; } return 1; } static unsigned int get_encode_size(size_t bits) { unsigned int cnt = 0, sz = sizeof(size_t); while (bits && (cnt < sz)) { ++cnt; bits >>= 8; } if (cnt == 0) cnt = 1; return cnt; } static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, size_t bits) { unsigned int len = get_encode_size(bits); int i; if (len >= out_max_len) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); return 0; } for (i = len - 1; i >= 0; --i) { out[i] = (unsigned char)(bits & 0xFF); bits >>= 8; } out[len] = (unsigned char)len; *out_len = len + 1; return 1; } static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len) { if (in == NULL) { *out_len = 0; } else { size_t i, bits, len, sz; bits = 8 * in_len; len = get_encode_size(bits); sz = 1 + len + in_len; if (sz > out_max_len) { ERR_raise(ERR_LIB_PROV, PROV_R_LENGTH_TOO_LARGE); return 0; } out[0] = (unsigned char)len; for (i = len; i > 0; --i) { out[i] = (bits & 0xFF); bits >>= 8; } memcpy(out + len + 1, in, in_len); *out_len = sz; } return 1; } static int bytepad(unsigned char *out, size_t *out_len, const unsigned char *in1, size_t in1_len, const unsigned char *in2, size_t in2_len, size_t w) { int len; unsigned char *p = out; int sz = w; if (out == NULL) { if (out_len == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PASSED_NULL_PARAMETER); return 0; } sz = 2 + in1_len + (in2 != NULL ? in2_len : 0); *out_len = (sz + w - 1) / w * w; return 1; } if (!ossl_assert(w <= 255)) return 0; *p++ = 1; *p++ = (unsigned char)w; memcpy(p, in1, in1_len); p += in1_len; if (in2 != NULL && in2_len > 0) { memcpy(p, in2, in2_len); p += in2_len; } len = p - out; sz = (len + w - 1) / w * w; if (sz != len) memset(p, 0, sz - len); if (out_len != NULL) *out_len = sz; return 1; } static int kmac_bytepad_encode_key(unsigned char *out, size_t out_max_len, size_t *out_len, const unsigned char *in, size_t in_len, size_t w) { unsigned char tmp[KMAC_MAX_KEY + KMAC_MAX_ENCODED_HEADER_LEN]; size_t tmp_len; if (!encode_string(tmp, sizeof(tmp), &tmp_len, in, in_len)) return 0; if (!bytepad(NULL, out_len, tmp, tmp_len, NULL, 0, w)) return 0; if (!ossl_assert(*out_len <= out_max_len)) return 0; return bytepad(out, NULL, tmp, tmp_len, NULL, 0, w); } const OSSL_DISPATCH ossl_kmac128_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))kmac128_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))kmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))kmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))kmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))kmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))kmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))kmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))kmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))kmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))kmac_set_ctx_params }, OSSL_DISPATCH_END }; const OSSL_DISPATCH ossl_kmac256_functions[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))kmac256_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))kmac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))kmac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))kmac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))kmac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))kmac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))kmac_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))kmac_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))kmac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))kmac_set_ctx_params }, OSSL_DISPATCH_END };
macs
openssl/providers/implementations/macs/kmac_prov.c
openssl
#define BLAKE2_CTX BLAKE2S_CTX #define BLAKE2_PARAM BLAKE2S_PARAM #define BLAKE2_KEYBYTES BLAKE2S_KEYBYTES #define BLAKE2_OUTBYTES BLAKE2S_OUTBYTES #define BLAKE2_PERSONALBYTES BLAKE2S_PERSONALBYTES #define BLAKE2_SALTBYTES BLAKE2S_SALTBYTES #define BLAKE2_BLOCKBYTES BLAKE2S_BLOCKBYTES #define BLAKE2_PARAM_INIT ossl_blake2s_param_init #define BLAKE2_INIT_KEY ossl_blake2s_init_key #define BLAKE2_UPDATE ossl_blake2s_update #define BLAKE2_FINAL ossl_blake2s_final #define BLAKE2_PARAM_SET_DIGEST_LENGTH ossl_blake2s_param_set_digest_length #define BLAKE2_PARAM_SET_KEY_LENGTH ossl_blake2s_param_set_key_length #define BLAKE2_PARAM_SET_PERSONAL ossl_blake2s_param_set_personal #define BLAKE2_PARAM_SET_SALT ossl_blake2s_param_set_salt #define BLAKE2_FUNCTIONS ossl_blake2smac_functions #include "blake2_mac_impl.c"
macs
openssl/providers/implementations/macs/blake2s_mac.c
openssl
#define BLAKE2_CTX BLAKE2B_CTX #define BLAKE2_PARAM BLAKE2B_PARAM #define BLAKE2_KEYBYTES BLAKE2B_KEYBYTES #define BLAKE2_OUTBYTES BLAKE2B_OUTBYTES #define BLAKE2_PERSONALBYTES BLAKE2B_PERSONALBYTES #define BLAKE2_SALTBYTES BLAKE2B_SALTBYTES #define BLAKE2_BLOCKBYTES BLAKE2B_BLOCKBYTES #define BLAKE2_PARAM_INIT ossl_blake2b_param_init #define BLAKE2_INIT_KEY ossl_blake2b_init_key #define BLAKE2_UPDATE ossl_blake2b_update #define BLAKE2_FINAL ossl_blake2b_final #define BLAKE2_PARAM_SET_DIGEST_LENGTH ossl_blake2b_param_set_digest_length #define BLAKE2_PARAM_SET_KEY_LENGTH ossl_blake2b_param_set_key_length #define BLAKE2_PARAM_SET_PERSONAL ossl_blake2b_param_set_personal #define BLAKE2_PARAM_SET_SALT ossl_blake2b_param_set_salt #define BLAKE2_FUNCTIONS ossl_blake2bmac_functions #include "blake2_mac_impl.c"
macs
openssl/providers/implementations/macs/blake2b_mac.c
openssl
#include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/proverr.h> #include "prov/blake2.h" #include "internal/cryptlib.h" #include "prov/implementations.h" #include "prov/providercommon.h" static OSSL_FUNC_mac_newctx_fn blake2_mac_new; static OSSL_FUNC_mac_dupctx_fn blake2_mac_dup; static OSSL_FUNC_mac_freectx_fn blake2_mac_free; static OSSL_FUNC_mac_gettable_ctx_params_fn blake2_gettable_ctx_params; static OSSL_FUNC_mac_get_ctx_params_fn blake2_get_ctx_params; static OSSL_FUNC_mac_settable_ctx_params_fn blake2_mac_settable_ctx_params; static OSSL_FUNC_mac_set_ctx_params_fn blake2_mac_set_ctx_params; static OSSL_FUNC_mac_init_fn blake2_mac_init; static OSSL_FUNC_mac_update_fn blake2_mac_update; static OSSL_FUNC_mac_final_fn blake2_mac_final; struct blake2_mac_data_st { BLAKE2_CTX ctx; BLAKE2_PARAM params; unsigned char key[BLAKE2_KEYBYTES]; }; static void *blake2_mac_new(void *unused_provctx) { struct blake2_mac_data_st *macctx; if (!ossl_prov_is_running()) return NULL; macctx = OPENSSL_zalloc(sizeof(*macctx)); if (macctx != NULL) { BLAKE2_PARAM_INIT(&macctx->params); } return macctx; } static void *blake2_mac_dup(void *vsrc) { struct blake2_mac_data_st *dst; struct blake2_mac_data_st *src = vsrc; if (!ossl_prov_is_running()) return NULL; dst = OPENSSL_zalloc(sizeof(*dst)); if (dst == NULL) return NULL; *dst = *src; return dst; } static void blake2_mac_free(void *vmacctx) { struct blake2_mac_data_st *macctx = vmacctx; if (macctx != NULL) { OPENSSL_cleanse(macctx->key, sizeof(macctx->key)); OPENSSL_free(macctx); } } static size_t blake2_mac_size(void *vmacctx) { struct blake2_mac_data_st *macctx = vmacctx; return macctx->params.digest_length; } static int blake2_setkey(struct blake2_mac_data_st *macctx, const unsigned char *key, size_t keylen) { if (keylen > BLAKE2_KEYBYTES || keylen == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH); return 0; } memcpy(macctx->key, key, keylen); if (keylen < BLAKE2_KEYBYTES) memset(macctx->key + keylen, 0, BLAKE2_KEYBYTES - keylen); BLAKE2_PARAM_SET_KEY_LENGTH(&macctx->params, (uint8_t)keylen); return 1; } static int blake2_mac_init(void *vmacctx, const unsigned char *key, size_t keylen, const OSSL_PARAM params[]) { struct blake2_mac_data_st *macctx = vmacctx; if (!ossl_prov_is_running() || !blake2_mac_set_ctx_params(macctx, params)) return 0; if (key != NULL) { if (!blake2_setkey(macctx, key, keylen)) return 0; } else if (macctx->params.key_length == 0) { ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET); return 0; } return BLAKE2_INIT_KEY(&macctx->ctx, &macctx->params, macctx->key); } static int blake2_mac_update(void *vmacctx, const unsigned char *data, size_t datalen) { struct blake2_mac_data_st *macctx = vmacctx; if (datalen == 0) return 1; return BLAKE2_UPDATE(&macctx->ctx, data, datalen); } static int blake2_mac_final(void *vmacctx, unsigned char *out, size_t *outl, size_t outsize) { struct blake2_mac_data_st *macctx = vmacctx; if (!ossl_prov_is_running()) return 0; *outl = blake2_mac_size(macctx); return BLAKE2_FINAL(out, &macctx->ctx); } static const OSSL_PARAM known_gettable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_size_t(OSSL_MAC_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *blake2_gettable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_gettable_ctx_params; } static int blake2_get_ctx_params(void *vmacctx, OSSL_PARAM params[]) { OSSL_PARAM *p; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, blake2_mac_size(vmacctx))) return 0; if ((p = OSSL_PARAM_locate(params, OSSL_MAC_PARAM_BLOCK_SIZE)) != NULL && !OSSL_PARAM_set_size_t(p, BLAKE2_BLOCKBYTES)) return 0; return 1; } static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_size_t(OSSL_MAC_PARAM_SIZE, NULL), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_KEY, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_CUSTOM, NULL, 0), OSSL_PARAM_octet_string(OSSL_MAC_PARAM_SALT, NULL, 0), OSSL_PARAM_END }; static const OSSL_PARAM *blake2_mac_settable_ctx_params( ossl_unused void *ctx, ossl_unused void *p_ctx) { return known_settable_ctx_params; } static int blake2_mac_set_ctx_params(void *vmacctx, const OSSL_PARAM params[]) { struct blake2_mac_data_st *macctx = vmacctx; const OSSL_PARAM *p; if (params == NULL) return 1; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SIZE)) != NULL) { size_t size; if (!OSSL_PARAM_get_size_t(p, &size) || size < 1 || size > BLAKE2_OUTBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_NOT_XOF_OR_INVALID_LENGTH); return 0; } BLAKE2_PARAM_SET_DIGEST_LENGTH(&macctx->params, (uint8_t)size); } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_KEY)) != NULL && !blake2_setkey(macctx, p->data, p->data_size)) return 0; if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_CUSTOM)) != NULL) { if (p->data_size > BLAKE2_PERSONALBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CUSTOM_LENGTH); return 0; } BLAKE2_PARAM_SET_PERSONAL(&macctx->params, p->data, p->data_size); } if ((p = OSSL_PARAM_locate_const(params, OSSL_MAC_PARAM_SALT)) != NULL) { if (p->data_size > BLAKE2_SALTBYTES) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_SALT_LENGTH); return 0; } BLAKE2_PARAM_SET_SALT(&macctx->params, p->data, p->data_size); } return 1; } const OSSL_DISPATCH BLAKE2_FUNCTIONS[] = { { OSSL_FUNC_MAC_NEWCTX, (void (*)(void))blake2_mac_new }, { OSSL_FUNC_MAC_DUPCTX, (void (*)(void))blake2_mac_dup }, { OSSL_FUNC_MAC_FREECTX, (void (*)(void))blake2_mac_free }, { OSSL_FUNC_MAC_INIT, (void (*)(void))blake2_mac_init }, { OSSL_FUNC_MAC_UPDATE, (void (*)(void))blake2_mac_update }, { OSSL_FUNC_MAC_FINAL, (void (*)(void))blake2_mac_final }, { OSSL_FUNC_MAC_GETTABLE_CTX_PARAMS, (void (*)(void))blake2_gettable_ctx_params }, { OSSL_FUNC_MAC_GET_CTX_PARAMS, (void (*)(void))blake2_get_ctx_params }, { OSSL_FUNC_MAC_SETTABLE_CTX_PARAMS, (void (*)(void))blake2_mac_settable_ctx_params }, { OSSL_FUNC_MAC_SET_CTX_PARAMS, (void (*)(void))blake2_mac_set_ctx_params }, OSSL_DISPATCH_END };
macs
openssl/providers/implementations/macs/blake2_mac_impl.c
openssl
#include <openssl/store.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/err.h> #include <openssl/params.h> #include <openssl/decoder.h> #include <openssl/proverr.h> #include <openssl/store.h> #include "internal/cryptlib.h" #include "internal/o_dir.h" #include "crypto/decoder.h" #include "crypto/ctype.h" #include "prov/implementations.h" #include "prov/bio.h" #include "file_store_local.h" #ifdef __CYGWIN__ # include <windows.h> #endif #include <wincrypt.h> enum { STATE_IDLE, STATE_READ, STATE_EOF, }; struct winstore_ctx_st { void *provctx; char *propq; unsigned char *subject; size_t subject_len; HCERTSTORE win_store; const CERT_CONTEXT *win_ctx; int state; OSSL_DECODER_CTX *dctx; }; static void winstore_win_reset(struct winstore_ctx_st *ctx) { if (ctx->win_ctx != NULL) { CertFreeCertificateContext(ctx->win_ctx); ctx->win_ctx = NULL; } ctx->state = STATE_IDLE; } static void winstore_win_advance(struct winstore_ctx_st *ctx) { CERT_NAME_BLOB name = {0}; if (ctx->state == STATE_EOF) return; name.cbData = ctx->subject_len; name.pbData = ctx->subject; ctx->win_ctx = (name.cbData == 0 ? NULL : CertFindCertificateInStore(ctx->win_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0, CERT_FIND_SUBJECT_NAME, &name, ctx->win_ctx)); ctx->state = (ctx->win_ctx == NULL) ? STATE_EOF : STATE_READ; } static void *winstore_open(void *provctx, const char *uri) { struct winstore_ctx_st *ctx = NULL; if (!HAS_CASE_PREFIX(uri, "org.openssl.winstore:")) return NULL; ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->provctx = provctx; ctx->win_store = CertOpenSystemStoreW(0, L"ROOT"); if (ctx->win_store == NULL) { OPENSSL_free(ctx); return NULL; } winstore_win_reset(ctx); return ctx; } static void *winstore_attach(void *provctx, OSSL_CORE_BIO *cin) { return NULL; } static const OSSL_PARAM *winstore_settable_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_octet_string(OSSL_STORE_PARAM_SUBJECT, NULL, 0), OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int winstore_set_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { struct winstore_ctx_st *ctx = loaderctx; const OSSL_PARAM *p; int do_reset = 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_PROPERTIES); if (p != NULL) { do_reset = 1; OPENSSL_free(ctx->propq); ctx->propq = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->propq, 0)) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_SUBJECT); if (p != NULL) { const unsigned char *der = NULL; size_t der_len = 0; if (!OSSL_PARAM_get_octet_string_ptr(p, (const void **)&der, &der_len)) return 0; do_reset = 1; OPENSSL_free(ctx->subject); ctx->subject = OPENSSL_malloc(der_len); if (ctx->subject == NULL) { ctx->subject_len = 0; return 0; } ctx->subject_len = der_len; memcpy(ctx->subject, der, der_len); } if (do_reset) { winstore_win_reset(ctx); winstore_win_advance(ctx); } return 1; } struct load_data_st { OSSL_CALLBACK *object_cb; void *object_cbarg; }; static int load_construct(OSSL_DECODER_INSTANCE *decoder_inst, const OSSL_PARAM *params, void *construct_data) { struct load_data_st *data = construct_data; return data->object_cb(params, data->object_cbarg); } static void load_cleanup(void *construct_data) { } static int setup_decoder(struct winstore_ctx_st *ctx) { OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(ctx->provctx); const OSSL_ALGORITHM *to_algo = NULL; if (ctx->dctx != NULL) return 1; ctx->dctx = OSSL_DECODER_CTX_new(); if (ctx->dctx == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); return 0; } if (!OSSL_DECODER_CTX_set_input_type(ctx->dctx, "DER")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_input_structure(ctx->dctx, "Certificate")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } for (to_algo = ossl_any_to_obj_algorithm; to_algo->algorithm_names != NULL; to_algo++) { OSSL_DECODER *to_obj = NULL; OSSL_DECODER_INSTANCE *to_obj_inst = NULL; to_obj = ossl_decoder_from_algorithm(0, to_algo, NULL); if (to_obj != NULL) to_obj_inst = ossl_decoder_instance_new(to_obj, ctx->provctx); OSSL_DECODER_free(to_obj); if (to_obj_inst == NULL) goto err; if (!ossl_decoder_ctx_add_decoder_inst(ctx->dctx, to_obj_inst)) { ossl_decoder_instance_free(to_obj_inst); ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } if (!OSSL_DECODER_CTX_add_extra(ctx->dctx, libctx, ctx->propq)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_construct(ctx->dctx, load_construct)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_cleanup(ctx->dctx, load_cleanup)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } return 1; err: OSSL_DECODER_CTX_free(ctx->dctx); ctx->dctx = NULL; return 0; } static int winstore_load_using(struct winstore_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg, const void *der, size_t der_len) { struct load_data_st data; const unsigned char *der_ = der; size_t der_len_ = der_len; if (setup_decoder(ctx) == 0) return 0; data.object_cb = object_cb; data.object_cbarg = object_cbarg; OSSL_DECODER_CTX_set_construct_data(ctx->dctx, &data); OSSL_DECODER_CTX_set_passphrase_cb(ctx->dctx, pw_cb, pw_cbarg); if (OSSL_DECODER_from_data(ctx->dctx, &der_, &der_len_) == 0) return 0; return 1; } static int winstore_load(void *loaderctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { int ret = 0; struct winstore_ctx_st *ctx = loaderctx; if (ctx->state != STATE_READ) return 0; ret = winstore_load_using(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg, ctx->win_ctx->pbCertEncoded, ctx->win_ctx->cbCertEncoded); if (ret == 1) winstore_win_advance(ctx); return ret; } static int winstore_eof(void *loaderctx) { struct winstore_ctx_st *ctx = loaderctx; return ctx->state != STATE_READ; } static int winstore_close(void *loaderctx) { struct winstore_ctx_st *ctx = loaderctx; winstore_win_reset(ctx); CertCloseStore(ctx->win_store, 0); OSSL_DECODER_CTX_free(ctx->dctx); OPENSSL_free(ctx->propq); OPENSSL_free(ctx->subject); OPENSSL_free(ctx); return 1; } const OSSL_DISPATCH ossl_winstore_store_functions[] = { { OSSL_FUNC_STORE_OPEN, (void (*)(void))winstore_open }, { OSSL_FUNC_STORE_ATTACH, (void (*)(void))winstore_attach }, { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS, (void (*)(void))winstore_settable_ctx_params }, { OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))winstore_set_ctx_params }, { OSSL_FUNC_STORE_LOAD, (void (*)(void))winstore_load }, { OSSL_FUNC_STORE_EOF, (void (*)(void))winstore_eof }, { OSSL_FUNC_STORE_CLOSE, (void (*)(void))winstore_close }, OSSL_DISPATCH_END, };
storemgmt
openssl/providers/implementations/storemgmt/winstore_store.c
openssl
#include <string.h> #include <sys/stat.h> #include <ctype.h> #include <assert.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/err.h> #include <openssl/params.h> #include <openssl/decoder.h> #include <openssl/proverr.h> #include <openssl/store.h> #include "internal/cryptlib.h" #include "internal/o_dir.h" #include "crypto/decoder.h" #include "crypto/ctype.h" #include "prov/implementations.h" #include "prov/bio.h" #include "file_store_local.h" DEFINE_STACK_OF(OSSL_STORE_INFO) #ifdef _WIN32 # define stat _stat #endif #ifndef S_ISDIR # define S_ISDIR(a) (((a) & S_IFMT) == S_IFDIR) #endif static OSSL_FUNC_store_open_fn file_open; static OSSL_FUNC_store_attach_fn file_attach; static OSSL_FUNC_store_settable_ctx_params_fn file_settable_ctx_params; static OSSL_FUNC_store_set_ctx_params_fn file_set_ctx_params; static OSSL_FUNC_store_load_fn file_load; static OSSL_FUNC_store_eof_fn file_eof; static OSSL_FUNC_store_close_fn file_close; struct file_ctx_st { void *provctx; char *uri; enum { IS_FILE = 0, IS_DIR } type; union { struct { BIO *file; OSSL_DECODER_CTX *decoderctx; char *input_type; char *propq; } file; struct { OPENSSL_DIR_CTX *ctx; int end_reached; char search_name[9]; const char *last_entry; int last_errno; } dir; } _; int expected_type; }; static void free_file_ctx(struct file_ctx_st *ctx) { if (ctx == NULL) return; OPENSSL_free(ctx->uri); if (ctx->type != IS_DIR) { OSSL_DECODER_CTX_free(ctx->_.file.decoderctx); OPENSSL_free(ctx->_.file.propq); OPENSSL_free(ctx->_.file.input_type); } OPENSSL_free(ctx); } static struct file_ctx_st *new_file_ctx(int type, const char *uri, void *provctx) { struct file_ctx_st *ctx = NULL; if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) != NULL && (uri == NULL || (ctx->uri = OPENSSL_strdup(uri)) != NULL)) { ctx->type = type; ctx->provctx = provctx; return ctx; } free_file_ctx(ctx); return NULL; } static OSSL_DECODER_CONSTRUCT file_load_construct; static OSSL_DECODER_CLEANUP file_load_cleanup; static struct file_ctx_st *file_open_stream(BIO *source, const char *uri, void *provctx) { struct file_ctx_st *ctx; if ((ctx = new_file_ctx(IS_FILE, uri, provctx)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB); goto err; } ctx->_.file.file = source; return ctx; err: free_file_ctx(ctx); return NULL; } static void *file_open_dir(const char *path, const char *uri, void *provctx) { struct file_ctx_st *ctx; if ((ctx = new_file_ctx(IS_DIR, uri, provctx)) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_PROV_LIB); return NULL; } ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, path); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL) { if (ctx->_.dir.last_errno != 0) { ERR_raise_data(ERR_LIB_SYS, ctx->_.dir.last_errno, "Calling OPENSSL_DIR_read(\"%s\")", path); goto err; } ctx->_.dir.end_reached = 1; } return ctx; err: file_close(ctx); return NULL; } static void *file_open(void *provctx, const char *uri) { struct file_ctx_st *ctx = NULL; struct stat st; struct { const char *path; unsigned int check_absolute:1; } path_data[2]; size_t path_data_n = 0, i; const char *path, *p = uri, *q; BIO *bio; ERR_set_mark(); path_data[path_data_n].check_absolute = 0; path_data[path_data_n++].path = uri; if (CHECK_AND_SKIP_CASE_PREFIX(p, "file:")) { q = p; if (CHECK_AND_SKIP_CASE_PREFIX(q, " path_data_n--; if (CHECK_AND_SKIP_CASE_PREFIX(q, "localhost/") || CHECK_AND_SKIP_CASE_PREFIX(q, "/")) { p = q - 1; } else { ERR_clear_last_mark(); ERR_raise(ERR_LIB_PROV, PROV_R_URI_AUTHORITY_UNSUPPORTED); return NULL; } } path_data[path_data_n].check_absolute = 1; #ifdef _WIN32 if (p[0] == '/' && p[2] == ':' && p[3] == '/') { char c = tolower(p[1]); if (c >= 'a' && c <= 'z') { p++; path_data[path_data_n].check_absolute = 0; } } #endif path_data[path_data_n++].path = p; } for (i = 0, path = NULL; path == NULL && i < path_data_n; i++) { if (path_data[i].check_absolute && path_data[i].path[0] != '/') { ERR_clear_last_mark(); ERR_raise_data(ERR_LIB_PROV, PROV_R_PATH_MUST_BE_ABSOLUTE, "Given path=%s", path_data[i].path); return NULL; } if (stat(path_data[i].path, &st) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling stat(%s)", path_data[i].path); } else { path = path_data[i].path; } } if (path == NULL) { ERR_clear_last_mark(); return NULL; } ERR_pop_to_mark(); if (S_ISDIR(st.st_mode)) ctx = file_open_dir(path, uri, provctx); else if ((bio = BIO_new_file(path, "rb")) == NULL || (ctx = file_open_stream(bio, uri, provctx)) == NULL) BIO_free_all(bio); return ctx; } void *file_attach(void *provctx, OSSL_CORE_BIO *cin) { struct file_ctx_st *ctx; BIO *new_bio = ossl_bio_new_from_core_bio(provctx, cin); if (new_bio == NULL) return NULL; ctx = file_open_stream(new_bio, NULL, provctx); if (ctx == NULL) BIO_free(new_bio); return ctx; } static const OSSL_PARAM *file_settable_ctx_params(void *provctx) { static const OSSL_PARAM known_settable_ctx_params[] = { OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_PROPERTIES, NULL, 0), OSSL_PARAM_int(OSSL_STORE_PARAM_EXPECT, NULL), OSSL_PARAM_octet_string(OSSL_STORE_PARAM_SUBJECT, NULL, 0), OSSL_PARAM_utf8_string(OSSL_STORE_PARAM_INPUT_TYPE, NULL, 0), OSSL_PARAM_END }; return known_settable_ctx_params; } static int file_set_ctx_params(void *loaderctx, const OSSL_PARAM params[]) { struct file_ctx_st *ctx = loaderctx; const OSSL_PARAM *p; if (params == NULL) return 1; if (ctx->type != IS_DIR) { p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_PROPERTIES); if (p != NULL) { OPENSSL_free(ctx->_.file.propq); ctx->_.file.propq = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->_.file.propq, 0)) return 0; } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_INPUT_TYPE); if (p != NULL) { OPENSSL_free(ctx->_.file.input_type); ctx->_.file.input_type = NULL; if (!OSSL_PARAM_get_utf8_string(p, &ctx->_.file.input_type, 0)) return 0; } } p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_EXPECT); if (p != NULL && !OSSL_PARAM_get_int(p, &ctx->expected_type)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_STORE_PARAM_SUBJECT); if (p != NULL) { const unsigned char *der = NULL; size_t der_len = 0; X509_NAME *x509_name; unsigned long hash; int ok; if (ctx->type != IS_DIR) { ERR_raise(ERR_LIB_PROV, PROV_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES); return 0; } if (!OSSL_PARAM_get_octet_string_ptr(p, (const void **)&der, &der_len) || (x509_name = d2i_X509_NAME(NULL, &der, der_len)) == NULL) return 0; hash = X509_NAME_hash_ex(x509_name, ossl_prov_ctx_get0_libctx(ctx->provctx), NULL, &ok); BIO_snprintf(ctx->_.dir.search_name, sizeof(ctx->_.dir.search_name), "%08lx", hash); X509_NAME_free(x509_name); if (ok == 0) return 0; } return 1; } struct file_load_data_st { OSSL_CALLBACK *object_cb; void *object_cbarg; }; static int file_load_construct(OSSL_DECODER_INSTANCE *decoder_inst, const OSSL_PARAM *params, void *construct_data) { struct file_load_data_st *data = construct_data; return data->object_cb(params, data->object_cbarg); } void file_load_cleanup(void *construct_data) { } static int file_setup_decoders(struct file_ctx_st *ctx) { OSSL_LIB_CTX *libctx = ossl_prov_ctx_get0_libctx(ctx->provctx); const OSSL_ALGORITHM *to_algo = NULL; int ok = 0; if (ctx->_.file.decoderctx == NULL) { if ((ctx->_.file.decoderctx = OSSL_DECODER_CTX_new()) == NULL) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_input_type(ctx->_.file.decoderctx, ctx->_.file.input_type)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } switch (ctx->expected_type) { case OSSL_STORE_INFO_CERT: if (!OSSL_DECODER_CTX_set_input_structure(ctx->_.file.decoderctx, "Certificate")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } break; case OSSL_STORE_INFO_CRL: if (!OSSL_DECODER_CTX_set_input_structure(ctx->_.file.decoderctx, "CertificateList")) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } break; default: break; } for (to_algo = ossl_any_to_obj_algorithm; to_algo->algorithm_names != NULL; to_algo++) { OSSL_DECODER *to_obj = NULL; OSSL_DECODER_INSTANCE *to_obj_inst = NULL; to_obj = ossl_decoder_from_algorithm(0, to_algo, NULL); if (to_obj != NULL) to_obj_inst = ossl_decoder_instance_new(to_obj, ctx->provctx); OSSL_DECODER_free(to_obj); if (to_obj_inst == NULL) goto err; if (!ossl_decoder_ctx_add_decoder_inst(ctx->_.file.decoderctx, to_obj_inst)) { ossl_decoder_instance_free(to_obj_inst); ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } if (!OSSL_DECODER_CTX_add_extra(ctx->_.file.decoderctx, libctx, ctx->_.file.propq)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } if (!OSSL_DECODER_CTX_set_construct(ctx->_.file.decoderctx, file_load_construct) || !OSSL_DECODER_CTX_set_cleanup(ctx->_.file.decoderctx, file_load_cleanup)) { ERR_raise(ERR_LIB_PROV, ERR_R_OSSL_DECODER_LIB); goto err; } } ok = 1; err: return ok; } static int file_load_file(struct file_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { struct file_load_data_st data; int ret, err; if (!file_setup_decoders(ctx)) return 0; data.object_cb = object_cb; data.object_cbarg = object_cbarg; OSSL_DECODER_CTX_set_construct_data(ctx->_.file.decoderctx, &data); OSSL_DECODER_CTX_set_passphrase_cb(ctx->_.file.decoderctx, pw_cb, pw_cbarg); ERR_set_mark(); ret = OSSL_DECODER_from_bio(ctx->_.file.decoderctx, ctx->_.file.file); if (BIO_eof(ctx->_.file.file) && ((err = ERR_peek_last_error()) != 0) && ERR_GET_LIB(err) == ERR_LIB_OSSL_DECODER && ERR_GET_REASON(err) == ERR_R_UNSUPPORTED) ERR_pop_to_mark(); else ERR_clear_last_mark(); return ret; } static char *file_name_to_uri(struct file_ctx_st *ctx, const char *name) { char *data = NULL; assert(name != NULL); { const char *pathsep = ossl_ends_with_dirsep(ctx->uri) ? "" : "/"; long calculated_length = strlen(ctx->uri) + strlen(pathsep) + strlen(name) + 1 ; data = OPENSSL_zalloc(calculated_length); if (data == NULL) return NULL; OPENSSL_strlcat(data, ctx->uri, calculated_length); OPENSSL_strlcat(data, pathsep, calculated_length); OPENSSL_strlcat(data, name, calculated_length); } return data; } static int file_name_check(struct file_ctx_st *ctx, const char *name) { const char *p = NULL; size_t len = strlen(ctx->_.dir.search_name); if (ctx->_.dir.search_name[0] == '\0') return 1; if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CERT && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; if (OPENSSL_strncasecmp(name, ctx->_.dir.search_name, len) != 0 || name[len] != '.') return 0; p = &name[len + 1]; if (*p == 'r') { p++; if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; } else if (ctx->expected_type == OSSL_STORE_INFO_CRL) { return 0; } if (!isdigit((unsigned char)*p)) return 0; while (isdigit((unsigned char)*p)) p++; #ifdef __VMS if (*p == ';') for (p++; *p != '\0'; p++) if (!ossl_isdigit((unsigned char)*p)) break; #endif return *p == '\0'; } static int file_load_dir_entry(struct file_ctx_st *ctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { static const int object_type = OSSL_OBJECT_NAME; OSSL_PARAM object[] = { OSSL_PARAM_int(OSSL_OBJECT_PARAM_TYPE, (int *)&object_type), OSSL_PARAM_utf8_string(OSSL_OBJECT_PARAM_DATA, NULL, 0), OSSL_PARAM_END }; char *newname = NULL; int ok; do { if (ctx->_.dir.last_entry == NULL) { if (!ctx->_.dir.end_reached) { assert(ctx->_.dir.last_errno != 0); ERR_raise(ERR_LIB_SYS, ctx->_.dir.last_errno); } return 0; } if (ctx->_.dir.last_entry[0] != '.' && file_name_check(ctx, ctx->_.dir.last_entry)) { if ((newname = file_name_to_uri(ctx, ctx->_.dir.last_entry)) == NULL) return 0; } ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, ctx->uri); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL && ctx->_.dir.last_errno == 0) ctx->_.dir.end_reached = 1; } while (newname == NULL); object[1].data = newname; object[1].data_size = strlen(newname); ok = object_cb(object, object_cbarg); OPENSSL_free(newname); return ok; } static int file_load(void *loaderctx, OSSL_CALLBACK *object_cb, void *object_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_FILE: return file_load_file(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg); case IS_DIR: return file_load_dir_entry(ctx, object_cb, object_cbarg, pw_cb, pw_cbarg); default: break; } assert(0); return 0; } static int file_eof(void *loaderctx) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_DIR: return ctx->_.dir.end_reached; case IS_FILE: return !BIO_pending(ctx->_.file.file) && BIO_eof(ctx->_.file.file); } assert(0); return 1; } static int file_close_dir(struct file_ctx_st *ctx) { if (ctx->_.dir.ctx != NULL) OPENSSL_DIR_end(&ctx->_.dir.ctx); free_file_ctx(ctx); return 1; } static int file_close_stream(struct file_ctx_st *ctx) { BIO_free(ctx->_.file.file); ctx->_.file.file = NULL; free_file_ctx(ctx); return 1; } static int file_close(void *loaderctx) { struct file_ctx_st *ctx = loaderctx; switch (ctx->type) { case IS_DIR: return file_close_dir(ctx); case IS_FILE: return file_close_stream(ctx); } assert(0); return 1; } const OSSL_DISPATCH ossl_file_store_functions[] = { { OSSL_FUNC_STORE_OPEN, (void (*)(void))file_open }, { OSSL_FUNC_STORE_ATTACH, (void (*)(void))file_attach }, { OSSL_FUNC_STORE_SETTABLE_CTX_PARAMS, (void (*)(void))file_settable_ctx_params }, { OSSL_FUNC_STORE_SET_CTX_PARAMS, (void (*)(void))file_set_ctx_params }, { OSSL_FUNC_STORE_LOAD, (void (*)(void))file_load }, { OSSL_FUNC_STORE_EOF, (void (*)(void))file_eof }, { OSSL_FUNC_STORE_CLOSE, (void (*)(void))file_close }, OSSL_DISPATCH_END, };
storemgmt
openssl/providers/implementations/storemgmt/file_store.c
openssl
#include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/core_object.h> #include <openssl/bio.h> #include <openssl/buffer.h> #include <openssl/err.h> #include <openssl/asn1err.h> #include <openssl/params.h> #include "internal/asn1.h" #include "crypto/pem.h" #include "prov/bio.h" #include "file_store_local.h" static OSSL_FUNC_decoder_newctx_fn any2obj_newctx; static OSSL_FUNC_decoder_freectx_fn any2obj_freectx; static void *any2obj_newctx(void *provctx) { return provctx; } static void any2obj_freectx(void *vctx) { } static int any2obj_decode_final(void *provctx, int objtype, BUF_MEM *mem, OSSL_CALLBACK *data_cb, void *data_cbarg) { int ok = 1; if (mem != NULL) { OSSL_PARAM params[3]; params[0] = OSSL_PARAM_construct_int(OSSL_OBJECT_PARAM_TYPE, &objtype); params[1] = OSSL_PARAM_construct_octet_string(OSSL_OBJECT_PARAM_DATA, mem->data, mem->length); params[2] = OSSL_PARAM_construct_end(); ok = data_cb(params, data_cbarg); BUF_MEM_free(mem); } return ok; } static OSSL_FUNC_decoder_decode_fn der2obj_decode; static int der2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; int ok; if (in == NULL) return 0; ERR_set_mark(); ok = (asn1_d2i_read_bio(in, &mem) >= 0); ERR_pop_to_mark(); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } BIO_free(in); return any2obj_decode_final(provctx, OSSL_OBJECT_UNKNOWN, mem, data_cb, data_cbarg); } static OSSL_FUNC_decoder_decode_fn msblob2obj_decode; static int msblob2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; size_t mem_len = 0, mem_want; const unsigned char *p; unsigned int bitlen, magic; int isdss = -1; int ispub = -1; int ok = 0; if (in == NULL) goto err; mem_want = 16; if ((mem = BUF_MEM_new()) == NULL || !BUF_MEM_grow(mem, mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[0], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); if (!ok) goto next; ERR_set_mark(); p = (unsigned char *)&mem->data[0]; ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; ERR_pop_to_mark(); if (!ok) goto next; ok = 0; mem_want = ossl_blob_length(bitlen, isdss, ispub); if (!BUF_MEM_grow(mem, mem_len + mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[mem_len], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); next: BIO_free(in); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } return any2obj_decode_final(provctx, OSSL_OBJECT_PKEY, mem, data_cb, data_cbarg); err: BIO_free(in); BUF_MEM_free(mem); return 0; } static OSSL_FUNC_decoder_decode_fn pvk2obj_decode; static int pvk2obj_decode(void *provctx, OSSL_CORE_BIO *cin, int selection, OSSL_CALLBACK *data_cb, void *data_cbarg, OSSL_PASSPHRASE_CALLBACK *pw_cb, void *pw_cbarg) { BIO *in = ossl_bio_new_from_core_bio(provctx, cin); BUF_MEM *mem = NULL; size_t mem_len = 0, mem_want; const unsigned char *p; unsigned int saltlen, keylen; int ok = 0; if (in == NULL) goto err; mem_want = 24; if ((mem = BUF_MEM_new()) == NULL || !BUF_MEM_grow(mem, mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[0], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); if (!ok) goto next; ERR_set_mark(); p = (unsigned char *)&mem->data[0]; ok = ossl_do_PVK_header(&p, 24, 0, &saltlen, &keylen) > 0; ERR_pop_to_mark(); if (!ok) goto next; ok = 0; mem_want = saltlen + keylen; if (!BUF_MEM_grow(mem, mem_len + mem_want)) { ERR_raise(ERR_LIB_PEM, ERR_R_BUF_LIB); goto err; } ERR_set_mark(); ok = BIO_read(in, &mem->data[mem_len], mem_want) == (int)mem_want; mem_len += mem_want; ERR_pop_to_mark(); next: BIO_free(in); if (!ok && mem != NULL) { BUF_MEM_free(mem); mem = NULL; } return any2obj_decode_final(provctx, OSSL_OBJECT_PKEY, mem, data_cb, data_cbarg); err: BIO_free(in); BUF_MEM_free(mem); return 0; } #define MAKE_DECODER(fromtype, objtype) \ static const OSSL_DISPATCH fromtype##_to_obj_decoder_functions[] = { \ { OSSL_FUNC_DECODER_NEWCTX, (void (*)(void))any2obj_newctx }, \ { OSSL_FUNC_DECODER_FREECTX, (void (*)(void))any2obj_freectx }, \ { OSSL_FUNC_DECODER_DECODE, (void (*)(void))fromtype##2obj_decode }, \ OSSL_DISPATCH_END \ } MAKE_DECODER(der, OSSL_OBJECT_UNKNOWN); MAKE_DECODER(msblob, OSSL_OBJECT_PKEY); MAKE_DECODER(pvk, OSSL_OBJECT_PKEY); const OSSL_ALGORITHM ossl_any_to_obj_algorithm[] = { { "obj", "input=DER", der_to_obj_decoder_functions }, { "obj", "input=MSBLOB", msblob_to_obj_decoder_functions }, { "obj", "input=PVK", pvk_to_obj_decoder_functions }, { NULL, } };
storemgmt
openssl/providers/implementations/storemgmt/file_store_any2obj.c
openssl
#include <openssl/crypto.h> #include "prov/digestcommon.h" #include "prov/implementations.h" typedef struct { unsigned char nothing; } NULLMD_CTX; static int null_init(NULLMD_CTX *ctx) { return 1; } static int null_update(NULLMD_CTX *ctx, const void *data, size_t datalen) { return 1; } static int null_final(unsigned char *md, NULLMD_CTX *ctx) { return 1; } #undef PROV_FUNC_DIGEST_FINAL #define PROV_FUNC_DIGEST_FINAL(name, dgstsize, fin) \ static OSSL_FUNC_digest_final_fn name##_internal_final; \ static int name##_internal_final(void *ctx, unsigned char *out, size_t *outl, \ size_t outsz) \ { \ if (ossl_prov_is_running() && fin(out, ctx)) { \ *outl = dgstsize; \ return 1; \ } \ return 0; \ } IMPLEMENT_digest_functions(nullmd, NULLMD_CTX, 0, 0, 0, null_init, null_update, null_final)
digests
openssl/providers/implementations/digests/null_prov.c
openssl
#include <openssl/crypto.h> #include <openssl/core_names.h> #include <openssl/proverr.h> #include <openssl/err.h> #include "prov/blake2.h" #include "prov/digestcommon.h" #include "prov/implementations.h" #define IMPLEMENT_BLAKE_functions(variant, VARIANT, variantsize) \ static const OSSL_PARAM known_blake##variant##_ctx_params[] = { \ {OSSL_DIGEST_PARAM_SIZE, OSSL_PARAM_UNSIGNED_INTEGER, NULL, 0, 0}, \ OSSL_PARAM_END \ }; \ \ const OSSL_PARAM *ossl_blake##variant##_gettable_ctx_params(ossl_unused void *ctx, \ ossl_unused void *pctx) \ { \ return known_blake##variant##_ctx_params; \ } \ \ const OSSL_PARAM *ossl_blake##variant##_settable_ctx_params(ossl_unused void *ctx, \ ossl_unused void *pctx) \ { \ return known_blake##variant##_ctx_params; \ } \ \ int ossl_blake##variant##_get_ctx_params(void *vctx, OSSL_PARAM params[]) \ { \ struct blake##variant##_md_data_st *mdctx = vctx; \ OSSL_PARAM *p; \ \ BLAKE##VARIANT##_CTX *ctx = &mdctx->ctx; \ \ if (ctx == NULL) \ return 0; \ if (params == NULL) \ return 1; \ \ p = OSSL_PARAM_locate(params, OSSL_DIGEST_PARAM_SIZE); \ if (p != NULL \ && !OSSL_PARAM_set_uint(p, (unsigned int)mdctx->params.digest_length)) { \ ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); \ return 0; \ } \ \ return 1; \ } \ \ int ossl_blake##variant##_set_ctx_params(void *vctx, const OSSL_PARAM params[]) \ { \ size_t size; \ struct blake##variant##_md_data_st *mdctx = vctx; \ const OSSL_PARAM *p; \ \ BLAKE##VARIANT##_CTX *ctx = &mdctx->ctx; \ \ if (ctx == NULL) \ return 0; \ if (params == NULL) \ return 1; \ \ p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_SIZE); \ if (p != NULL) { \ if (!OSSL_PARAM_get_size_t(p, &size)) { \ ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); \ return 0; \ } \ if (size < 1 || size > BLAKE##VARIANT##_OUTBYTES) { \ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_SIZE); \ return 0; \ } \ ossl_blake##variant##_param_set_digest_length(&mdctx->params, (uint8_t)size); \ } \ \ return 1; \ } \ \ static int ossl_blake##variantsize##_init(void *ctx) \ { \ struct blake##variant##_md_data_st *mdctx = ctx; \ uint8_t digest_length = mdctx->params.digest_length; \ \ ossl_blake##variant##_param_init(&mdctx->params); \ if (digest_length != 0) \ mdctx->params.digest_length = digest_length; \ return ossl_blake##variant##_init(&mdctx->ctx, &mdctx->params); \ } \ \ static OSSL_FUNC_digest_init_fn blake##variantsize##_internal_init; \ static OSSL_FUNC_digest_newctx_fn blake##variantsize##_newctx; \ static OSSL_FUNC_digest_freectx_fn blake##variantsize##_freectx; \ static OSSL_FUNC_digest_dupctx_fn blake##variantsize##_dupctx; \ static OSSL_FUNC_digest_final_fn blake##variantsize##_internal_final; \ static OSSL_FUNC_digest_get_params_fn blake##variantsize##_get_params; \ \ static int blake##variantsize##_internal_init(void *ctx, const OSSL_PARAM params[]) \ { \ return ossl_prov_is_running() && ossl_blake##variant##_set_ctx_params(ctx, params) \ && ossl_blake##variantsize##_init(ctx); \ } \ \ static void *blake##variantsize##_newctx(void *prov_ctx) \ { \ struct blake##variant##_md_data_st *ctx; \ \ ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx)) : NULL; \ return ctx; \ } \ \ static void blake##variantsize##_freectx(void *vctx) \ { \ struct blake##variant##_md_data_st *ctx; \ \ ctx = (struct blake##variant##_md_data_st *)vctx; \ OPENSSL_clear_free(ctx, sizeof(*ctx)); \ } \ \ static void *blake##variantsize##_dupctx(void *ctx) \ { \ struct blake##variant##_md_data_st *in, *ret; \ \ in = (struct blake##variant##_md_data_st *)ctx; \ ret = ossl_prov_is_running()? OPENSSL_malloc(sizeof(*ret)) : NULL; \ if (ret != NULL) \ *ret = *in; \ return ret; \ } \ \ static int blake##variantsize##_internal_final(void *ctx, unsigned char *out, \ size_t *outl, size_t outsz) \ { \ struct blake##variant##_md_data_st *b_ctx; \ \ b_ctx = (struct blake##variant##_md_data_st *)ctx; \ \ if (!ossl_prov_is_running()) \ return 0; \ \ *outl = b_ctx->ctx.outlen; \ \ if (outsz == 0) \ return 1; \ \ if (outsz < *outl) { \ ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_DIGEST_SIZE); \ return 0; \ } \ \ return ossl_blake##variant##_final(out, ctx); \ } \ \ static int blake##variantsize##_get_params(OSSL_PARAM params[]) \ { \ return ossl_digest_default_get_params(params, BLAKE##VARIANT##_BLOCKBYTES, BLAKE##VARIANT##_OUTBYTES, 0); \ } \ \ const OSSL_DISPATCH ossl_blake##variantsize##_functions[] = { \ {OSSL_FUNC_DIGEST_NEWCTX, (void (*)(void))blake##variantsize##_newctx}, \ {OSSL_FUNC_DIGEST_UPDATE, (void (*)(void))ossl_blake##variant##_update}, \ {OSSL_FUNC_DIGEST_FINAL, (void (*)(void))blake##variantsize##_internal_final}, \ {OSSL_FUNC_DIGEST_FREECTX, (void (*)(void))blake##variantsize##_freectx}, \ {OSSL_FUNC_DIGEST_DUPCTX, (void (*)(void))blake##variantsize##_dupctx}, \ {OSSL_FUNC_DIGEST_GET_PARAMS, (void (*)(void))blake##variantsize##_get_params}, \ {OSSL_FUNC_DIGEST_GETTABLE_PARAMS, \ (void (*)(void))ossl_digest_default_gettable_params}, \ {OSSL_FUNC_DIGEST_INIT, (void (*)(void))blake##variantsize##_internal_init}, \ {OSSL_FUNC_DIGEST_GETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_blake##variant##_gettable_ctx_params}, \ {OSSL_FUNC_DIGEST_SETTABLE_CTX_PARAMS, \ (void (*)(void))ossl_blake##variant##_settable_ctx_params}, \ {OSSL_FUNC_DIGEST_GET_CTX_PARAMS, \ (void (*)(void))ossl_blake##variant##_get_ctx_params}, \ {OSSL_FUNC_DIGEST_SET_CTX_PARAMS, \ (void (*)(void))ossl_blake##variant##_set_ctx_params}, \ {0, NULL} \ }; IMPLEMENT_BLAKE_functions(2s, 2S, 2s256) IMPLEMENT_BLAKE_functions(2b, 2B, 2b512)
digests
openssl/providers/implementations/digests/blake2_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/md2.h> #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(md2, MD2_CTX, MD2_BLOCK, MD2_DIGEST_LENGTH, 0, MD2_Init, MD2_Update, MD2_Final)
digests
openssl/providers/implementations/digests/md2_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/whrlpool.h> #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(wp, WHIRLPOOL_CTX, WHIRLPOOL_BBLOCK / 8, WHIRLPOOL_DIGEST_LENGTH, 0, WHIRLPOOL_Init, WHIRLPOOL_Update, WHIRLPOOL_Final)
digests
openssl/providers/implementations/digests/wp_prov.c
openssl
#include <assert.h> #include <string.h> #include <openssl/crypto.h> #include "blake2_impl.h" #include "prov/blake2.h" static const uint32_t blake2s_IV[8] = { 0x6A09E667U, 0xBB67AE85U, 0x3C6EF372U, 0xA54FF53AU, 0x510E527FU, 0x9B05688CU, 0x1F83D9ABU, 0x5BE0CD19U }; static const uint8_t blake2s_sigma[10][16] = { { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } , { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } , { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 } , { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 } , { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 } , { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 } , { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 } , { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 } , { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 } , { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13 , 0 } , }; static ossl_inline void blake2s_set_lastblock(BLAKE2S_CTX *S) { S->f[0] = -1; } static ossl_inline void blake2s_init0(BLAKE2S_CTX *S) { int i; memset(S, 0, sizeof(BLAKE2S_CTX)); for (i = 0; i < 8; ++i) { S->h[i] = blake2s_IV[i]; } } static void blake2s_init_param(BLAKE2S_CTX *S, const BLAKE2S_PARAM *P) { size_t i; const uint8_t *p = (const uint8_t *)(P); blake2s_init0(S); S->outlen = P->digest_length; assert(sizeof(BLAKE2S_PARAM) == 32); for (i = 0; i < 8; ++i) { S->h[i] ^= load32(&p[i*4]); } } void ossl_blake2s_param_init(BLAKE2S_PARAM *P) { P->digest_length = BLAKE2S_DIGEST_LENGTH; P->key_length = 0; P->fanout = 1; P->depth = 1; store32(P->leaf_length, 0); store48(P->node_offset, 0); P->node_depth = 0; P->inner_length = 0; memset(P->salt, 0, sizeof(P->salt)); memset(P->personal, 0, sizeof(P->personal)); } void ossl_blake2s_param_set_digest_length(BLAKE2S_PARAM *P, uint8_t outlen) { P->digest_length = outlen; } void ossl_blake2s_param_set_key_length(BLAKE2S_PARAM *P, uint8_t keylen) { P->key_length = keylen; } void ossl_blake2s_param_set_personal(BLAKE2S_PARAM *P, const uint8_t *personal, size_t len) { memcpy(P->personal, personal, len); memset(P->personal + len, 0, BLAKE2S_PERSONALBYTES - len); } void ossl_blake2s_param_set_salt(BLAKE2S_PARAM *P, const uint8_t *salt, size_t len) { memcpy(P->salt, salt, len); memset(P->salt + len, 0, BLAKE2S_SALTBYTES - len);} int ossl_blake2s_init(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P) { blake2s_init_param(c, P); return 1; } int ossl_blake2s_init_key(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P, const void *key) { blake2s_init_param(c, P); { uint8_t block[BLAKE2S_BLOCKBYTES] = {0}; memcpy(block, key, P->key_length); ossl_blake2s_update(c, block, BLAKE2S_BLOCKBYTES); OPENSSL_cleanse(block, BLAKE2S_BLOCKBYTES); } return 1; } static void blake2s_compress(BLAKE2S_CTX *S, const uint8_t *blocks, size_t len) { uint32_t m[16]; uint32_t v[16]; size_t i; size_t increment; assert(len < BLAKE2S_BLOCKBYTES || len % BLAKE2S_BLOCKBYTES == 0); increment = len < BLAKE2S_BLOCKBYTES ? len : BLAKE2S_BLOCKBYTES; for (i = 0; i < 8; ++i) { v[i] = S->h[i]; } do { for (i = 0; i < 16; ++i) { m[i] = load32(blocks + i * sizeof(m[i])); } S->t[0] += increment; S->t[1] += (S->t[0] < increment); v[ 8] = blake2s_IV[0]; v[ 9] = blake2s_IV[1]; v[10] = blake2s_IV[2]; v[11] = blake2s_IV[3]; v[12] = S->t[0] ^ blake2s_IV[4]; v[13] = S->t[1] ^ blake2s_IV[5]; v[14] = S->f[0] ^ blake2s_IV[6]; v[15] = S->f[1] ^ blake2s_IV[7]; #define G(r,i,a,b,c,d) \ do { \ a = a + b + m[blake2s_sigma[r][2*i+0]]; \ d = rotr32(d ^ a, 16); \ c = c + d; \ b = rotr32(b ^ c, 12); \ a = a + b + m[blake2s_sigma[r][2*i+1]]; \ d = rotr32(d ^ a, 8); \ c = c + d; \ b = rotr32(b ^ c, 7); \ } while (0) #define ROUND(r) \ do { \ G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ G(r,2,v[ 2],v[ 6],v[10],v[14]); \ G(r,3,v[ 3],v[ 7],v[11],v[15]); \ G(r,4,v[ 0],v[ 5],v[10],v[15]); \ G(r,5,v[ 1],v[ 6],v[11],v[12]); \ G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ } while (0) #if defined(OPENSSL_SMALL_FOOTPRINT) for (i = 0; i < 10; i++) { ROUND(i); } #else ROUND(0); ROUND(1); ROUND(2); ROUND(3); ROUND(4); ROUND(5); ROUND(6); ROUND(7); ROUND(8); ROUND(9); #endif for (i = 0; i < 8; ++i) { S->h[i] = v[i] ^= v[i + 8] ^ S->h[i]; } #undef G #undef ROUND blocks += increment; len -= increment; } while (len); } int ossl_blake2s_update(BLAKE2S_CTX *c, const void *data, size_t datalen) { const uint8_t *in = data; size_t fill; fill = sizeof(c->buf) - c->buflen; if (datalen > fill) { if (c->buflen) { memcpy(c->buf + c->buflen, in, fill); blake2s_compress(c, c->buf, BLAKE2S_BLOCKBYTES); c->buflen = 0; in += fill; datalen -= fill; } if (datalen > BLAKE2S_BLOCKBYTES) { size_t stashlen = datalen % BLAKE2S_BLOCKBYTES; stashlen = stashlen ? stashlen : BLAKE2S_BLOCKBYTES; datalen -= stashlen; blake2s_compress(c, in, datalen); in += datalen; datalen = stashlen; } } assert(datalen <= BLAKE2S_BLOCKBYTES); memcpy(c->buf + c->buflen, in, datalen); c->buflen += datalen; return 1; } int ossl_blake2s_final(unsigned char *md, BLAKE2S_CTX *c) { uint8_t outbuffer[BLAKE2S_OUTBYTES] = {0}; uint8_t *target = outbuffer; int iter = (c->outlen + 3) / 4; int i; if ((c->outlen % sizeof(c->h[0])) == 0) target = md; blake2s_set_lastblock(c); memset(c->buf + c->buflen, 0, sizeof(c->buf) - c->buflen); blake2s_compress(c, c->buf, c->buflen); for (i = 0; i < iter; ++i) store32(target + sizeof(c->h[i]) * i, c->h[i]); if (target != md) { memcpy(md, target, c->outlen); OPENSSL_cleanse(target, sizeof(outbuffer)); } OPENSSL_cleanse(c, sizeof(BLAKE2S_CTX)); return 1; }
digests
openssl/providers/implementations/digests/blake2s_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/params.h> #include <openssl/mdc2.h> #include <openssl/core_names.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "prov/digestcommon.h" #include "prov/implementations.h" static OSSL_FUNC_digest_set_ctx_params_fn mdc2_set_ctx_params; static OSSL_FUNC_digest_settable_ctx_params_fn mdc2_settable_ctx_params; static const OSSL_PARAM known_mdc2_settable_ctx_params[] = { OSSL_PARAM_uint(OSSL_DIGEST_PARAM_PAD_TYPE, NULL), OSSL_PARAM_END }; static const OSSL_PARAM *mdc2_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_mdc2_settable_ctx_params; } static int mdc2_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; MDC2_CTX *ctx = (MDC2_CTX *)vctx; if (ctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_PAD_TYPE); if (p != NULL && !OSSL_PARAM_get_uint(p, &ctx->pad_type)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } return 1; } IMPLEMENT_digest_functions_with_settable_ctx( mdc2, MDC2_CTX, MDC2_BLOCK, MDC2_DIGEST_LENGTH, 0, MDC2_Init, MDC2_Update, MDC2_Final, mdc2_settable_ctx_params, mdc2_set_ctx_params)
digests
openssl/providers/implementations/digests/mdc2_prov.c
openssl
#include <assert.h> #include <string.h> #include <openssl/crypto.h> #include "internal/numbers.h" #include "blake2_impl.h" #include "prov/blake2.h" static const uint64_t blake2b_IV[8] = { 0x6a09e667f3bcc908ULL, 0xbb67ae8584caa73bULL, 0x3c6ef372fe94f82bULL, 0xa54ff53a5f1d36f1ULL, 0x510e527fade682d1ULL, 0x9b05688c2b3e6c1fULL, 0x1f83d9abfb41bd6bULL, 0x5be0cd19137e2179ULL }; static const uint8_t blake2b_sigma[12][16] = { { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } , { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } , { 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 } , { 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 } , { 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 } , { 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 } , { 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 } , { 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 } , { 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 } , { 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13 , 0 } , { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } , { 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } }; static ossl_inline void blake2b_set_lastblock(BLAKE2B_CTX *S) { S->f[0] = -1; } static ossl_inline void blake2b_init0(BLAKE2B_CTX *S) { int i; memset(S, 0, sizeof(BLAKE2B_CTX)); for (i = 0; i < 8; ++i) { S->h[i] = blake2b_IV[i]; } } static void blake2b_init_param(BLAKE2B_CTX *S, const BLAKE2B_PARAM *P) { size_t i; const uint8_t *p = (const uint8_t *)(P); blake2b_init0(S); S->outlen = P->digest_length; assert(sizeof(BLAKE2B_PARAM) == 64); for (i = 0; i < 8; ++i) { S->h[i] ^= load64(p + sizeof(S->h[i]) * i); } } void ossl_blake2b_param_init(BLAKE2B_PARAM *P) { P->digest_length = BLAKE2B_DIGEST_LENGTH; P->key_length = 0; P->fanout = 1; P->depth = 1; store32(P->leaf_length, 0); store64(P->node_offset, 0); P->node_depth = 0; P->inner_length = 0; memset(P->reserved, 0, sizeof(P->reserved)); memset(P->salt, 0, sizeof(P->salt)); memset(P->personal, 0, sizeof(P->personal)); } void ossl_blake2b_param_set_digest_length(BLAKE2B_PARAM *P, uint8_t outlen) { P->digest_length = outlen; } void ossl_blake2b_param_set_key_length(BLAKE2B_PARAM *P, uint8_t keylen) { P->key_length = keylen; } void ossl_blake2b_param_set_personal(BLAKE2B_PARAM *P, const uint8_t *personal, size_t len) { memcpy(P->personal, personal, len); memset(P->personal + len, 0, BLAKE2B_PERSONALBYTES - len); } void ossl_blake2b_param_set_salt(BLAKE2B_PARAM *P, const uint8_t *salt, size_t len) { memcpy(P->salt, salt, len); memset(P->salt + len, 0, BLAKE2B_SALTBYTES - len); } int ossl_blake2b_init(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P) { blake2b_init_param(c, P); return 1; } int ossl_blake2b_init_key(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P, const void *key) { blake2b_init_param(c, P); { uint8_t block[BLAKE2B_BLOCKBYTES] = {0}; memcpy(block, key, P->key_length); ossl_blake2b_update(c, block, BLAKE2B_BLOCKBYTES); OPENSSL_cleanse(block, BLAKE2B_BLOCKBYTES); } return 1; } static void blake2b_compress(BLAKE2B_CTX *S, const uint8_t *blocks, size_t len) { uint64_t m[16]; uint64_t v[16]; int i; size_t increment; assert(len < BLAKE2B_BLOCKBYTES || len % BLAKE2B_BLOCKBYTES == 0); increment = len < BLAKE2B_BLOCKBYTES ? len : BLAKE2B_BLOCKBYTES; for (i = 0; i < 8; ++i) { v[i] = S->h[i]; } do { for (i = 0; i < 16; ++i) { m[i] = load64(blocks + i * sizeof(m[i])); } S->t[0] += increment; S->t[1] += (S->t[0] < increment); v[8] = blake2b_IV[0]; v[9] = blake2b_IV[1]; v[10] = blake2b_IV[2]; v[11] = blake2b_IV[3]; v[12] = S->t[0] ^ blake2b_IV[4]; v[13] = S->t[1] ^ blake2b_IV[5]; v[14] = S->f[0] ^ blake2b_IV[6]; v[15] = S->f[1] ^ blake2b_IV[7]; #define G(r,i,a,b,c,d) \ do { \ a = a + b + m[blake2b_sigma[r][2*i+0]]; \ d = rotr64(d ^ a, 32); \ c = c + d; \ b = rotr64(b ^ c, 24); \ a = a + b + m[blake2b_sigma[r][2*i+1]]; \ d = rotr64(d ^ a, 16); \ c = c + d; \ b = rotr64(b ^ c, 63); \ } while (0) #define ROUND(r) \ do { \ G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ G(r,2,v[ 2],v[ 6],v[10],v[14]); \ G(r,3,v[ 3],v[ 7],v[11],v[15]); \ G(r,4,v[ 0],v[ 5],v[10],v[15]); \ G(r,5,v[ 1],v[ 6],v[11],v[12]); \ G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ } while (0) #if defined(OPENSSL_SMALL_FOOTPRINT) for (i = 0; i < 12; i++) { ROUND(i); } #else ROUND(0); ROUND(1); ROUND(2); ROUND(3); ROUND(4); ROUND(5); ROUND(6); ROUND(7); ROUND(8); ROUND(9); ROUND(10); ROUND(11); #endif for (i = 0; i < 8; ++i) { S->h[i] = v[i] ^= v[i + 8] ^ S->h[i]; } #undef G #undef ROUND blocks += increment; len -= increment; } while (len); } int ossl_blake2b_update(BLAKE2B_CTX *c, const void *data, size_t datalen) { const uint8_t *in = data; size_t fill; fill = sizeof(c->buf) - c->buflen; if (datalen > fill) { if (c->buflen) { memcpy(c->buf + c->buflen, in, fill); blake2b_compress(c, c->buf, BLAKE2B_BLOCKBYTES); c->buflen = 0; in += fill; datalen -= fill; } if (datalen > BLAKE2B_BLOCKBYTES) { size_t stashlen = datalen % BLAKE2B_BLOCKBYTES; stashlen = stashlen ? stashlen : BLAKE2B_BLOCKBYTES; datalen -= stashlen; blake2b_compress(c, in, datalen); in += datalen; datalen = stashlen; } } assert(datalen <= BLAKE2B_BLOCKBYTES); memcpy(c->buf + c->buflen, in, datalen); c->buflen += datalen; return 1; } int ossl_blake2b_final(unsigned char *md, BLAKE2B_CTX *c) { uint8_t outbuffer[BLAKE2B_OUTBYTES] = {0}; uint8_t *target = outbuffer; int iter = (c->outlen + 7) / 8; int i; if ((c->outlen % sizeof(c->h[0])) == 0) target = md; blake2b_set_lastblock(c); memset(c->buf + c->buflen, 0, sizeof(c->buf) - c->buflen); blake2b_compress(c, c->buf, c->buflen); for (i = 0; i < iter; ++i) store64(target + sizeof(c->h[i]) * i, c->h[i]); if (target != md) { memcpy(md, target, c->outlen); OPENSSL_cleanse(target, sizeof(outbuffer)); } OPENSSL_cleanse(c, sizeof(BLAKE2B_CTX)); return 1; }
digests
openssl/providers/implementations/digests/blake2b_prov.c
openssl
#include <openssl/err.h> #include <openssl/proverr.h> #include "prov/digestcommon.h" int ossl_digest_default_get_params(OSSL_PARAM params[], size_t blksz, size_t paramsz, unsigned long flags) { OSSL_PARAM *p = NULL; p = OSSL_PARAM_locate(params, OSSL_DIGEST_PARAM_BLOCK_SIZE); if (p != NULL && !OSSL_PARAM_set_size_t(p, blksz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_DIGEST_PARAM_SIZE); if (p != NULL && !OSSL_PARAM_set_size_t(p, paramsz)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_DIGEST_PARAM_XOF); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_DIGEST_FLAG_XOF) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } p = OSSL_PARAM_locate(params, OSSL_DIGEST_PARAM_ALGID_ABSENT); if (p != NULL && !OSSL_PARAM_set_int(p, (flags & PROV_DIGEST_FLAG_ALGID_ABSENT) != 0)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_SET_PARAMETER); return 0; } return 1; } static const OSSL_PARAM digest_default_known_gettable_params[] = { OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_BLOCK_SIZE, NULL), OSSL_PARAM_size_t(OSSL_DIGEST_PARAM_SIZE, NULL), OSSL_PARAM_int(OSSL_DIGEST_PARAM_XOF, NULL), OSSL_PARAM_int(OSSL_DIGEST_PARAM_ALGID_ABSENT, NULL), OSSL_PARAM_END }; const OSSL_PARAM *ossl_digest_default_gettable_params(void *provctx) { return digest_default_known_gettable_params; }
digests
openssl/providers/implementations/digests/digestcommon.c
openssl
#include <openssl/crypto.h> #include "internal/sm3.h" #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(sm3, SM3_CTX, SM3_CBLOCK, SM3_DIGEST_LENGTH, 0, ossl_sm3_init, ossl_sm3_update, ossl_sm3_final)
digests
openssl/providers/implementations/digests/sm3_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/md5.h> #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(md5, MD5_CTX, MD5_CBLOCK, MD5_DIGEST_LENGTH, 0, MD5_Init, MD5_Update, MD5_Final)
digests
openssl/providers/implementations/digests/md5_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/core_dispatch.h> #include <openssl/evp.h> #include <openssl/sha.h> #include <openssl/params.h> #include <openssl/core_names.h> #include "prov/digestcommon.h" #include "prov/implementations.h" #include "crypto/sha.h" #define SHA2_FLAGS PROV_DIGEST_FLAG_ALGID_ABSENT static OSSL_FUNC_digest_set_ctx_params_fn sha1_set_ctx_params; static OSSL_FUNC_digest_settable_ctx_params_fn sha1_settable_ctx_params; static const OSSL_PARAM known_sha1_settable_ctx_params[] = { {OSSL_DIGEST_PARAM_SSL3_MS, OSSL_PARAM_OCTET_STRING, NULL, 0, 0}, OSSL_PARAM_END }; static const OSSL_PARAM *sha1_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_sha1_settable_ctx_params; } static int sha1_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; SHA_CTX *ctx = (SHA_CTX *)vctx; if (ctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_SSL3_MS); if (p != NULL && p->data_type == OSSL_PARAM_OCTET_STRING) return ossl_sha1_ctrl(ctx, EVP_CTRL_SSL3_MASTER_SECRET, p->data_size, p->data); return 1; } IMPLEMENT_digest_functions_with_settable_ctx( sha1, SHA_CTX, SHA_CBLOCK, SHA_DIGEST_LENGTH, SHA2_FLAGS, SHA1_Init, SHA1_Update, SHA1_Final, sha1_settable_ctx_params, sha1_set_ctx_params) IMPLEMENT_digest_functions(sha224, SHA256_CTX, SHA256_CBLOCK, SHA224_DIGEST_LENGTH, SHA2_FLAGS, SHA224_Init, SHA224_Update, SHA224_Final) IMPLEMENT_digest_functions(sha256, SHA256_CTX, SHA256_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS, SHA256_Init, SHA256_Update, SHA256_Final) #ifndef FIPS_MODULE IMPLEMENT_digest_functions(sha256_192, SHA256_CTX, SHA256_CBLOCK, SHA256_192_DIGEST_LENGTH, SHA2_FLAGS, ossl_sha256_192_init, SHA256_Update, SHA256_Final) #endif IMPLEMENT_digest_functions(sha384, SHA512_CTX, SHA512_CBLOCK, SHA384_DIGEST_LENGTH, SHA2_FLAGS, SHA384_Init, SHA384_Update, SHA384_Final) IMPLEMENT_digest_functions(sha512, SHA512_CTX, SHA512_CBLOCK, SHA512_DIGEST_LENGTH, SHA2_FLAGS, SHA512_Init, SHA512_Update, SHA512_Final) IMPLEMENT_digest_functions(sha512_224, SHA512_CTX, SHA512_CBLOCK, SHA224_DIGEST_LENGTH, SHA2_FLAGS, sha512_224_init, SHA512_Update, SHA512_Final) IMPLEMENT_digest_functions(sha512_256, SHA512_CTX, SHA512_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS, sha512_256_init, SHA512_Update, SHA512_Final)
digests
openssl/providers/implementations/digests/sha2_prov.c
openssl
#include "internal/deprecated.h" #include <string.h> #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/params.h> #include <openssl/core_names.h> #include "prov/md5_sha1.h" #include "prov/digestcommon.h" #include "prov/implementations.h" static OSSL_FUNC_digest_set_ctx_params_fn md5_sha1_set_ctx_params; static OSSL_FUNC_digest_settable_ctx_params_fn md5_sha1_settable_ctx_params; static const OSSL_PARAM known_md5_sha1_settable_ctx_params[] = { {OSSL_DIGEST_PARAM_SSL3_MS, OSSL_PARAM_OCTET_STRING, NULL, 0, 0}, OSSL_PARAM_END }; static const OSSL_PARAM *md5_sha1_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_md5_sha1_settable_ctx_params; } static int md5_sha1_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; MD5_SHA1_CTX *ctx = (MD5_SHA1_CTX *)vctx; if (ctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_SSL3_MS); if (p != NULL && p->data_type == OSSL_PARAM_OCTET_STRING) return ossl_md5_sha1_ctrl(ctx, EVP_CTRL_SSL3_MASTER_SECRET, p->data_size, p->data); return 1; } IMPLEMENT_digest_functions_with_settable_ctx( md5_sha1, MD5_SHA1_CTX, MD5_SHA1_CBLOCK, MD5_SHA1_DIGEST_LENGTH, 0, ossl_md5_sha1_init, ossl_md5_sha1_update, ossl_md5_sha1_final, md5_sha1_settable_ctx_params, md5_sha1_set_ctx_params)
digests
openssl/providers/implementations/digests/md5_sha1_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/ripemd.h> #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(ripemd160, RIPEMD160_CTX, RIPEMD160_CBLOCK, RIPEMD160_DIGEST_LENGTH, 0, RIPEMD160_Init, RIPEMD160_Update, RIPEMD160_Final)
digests
openssl/providers/implementations/digests/ripemd_prov.c
openssl
#include <string.h> #include <openssl/core_names.h> #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/params.h> #include <openssl/err.h> #include <openssl/proverr.h> #include "internal/sha3.h" #include "prov/digestcommon.h" #include "prov/implementations.h" #define SHA3_FLAGS PROV_DIGEST_FLAG_ALGID_ABSENT #define SHAKE_FLAGS PROV_DIGEST_FLAG_XOF #define KMAC_FLAGS PROV_DIGEST_FLAG_XOF static OSSL_FUNC_digest_init_fn keccak_init; static OSSL_FUNC_digest_init_fn keccak_init_params; static OSSL_FUNC_digest_update_fn keccak_update; static OSSL_FUNC_digest_final_fn keccak_final; static OSSL_FUNC_digest_freectx_fn keccak_freectx; static OSSL_FUNC_digest_dupctx_fn keccak_dupctx; static OSSL_FUNC_digest_squeeze_fn shake_squeeze; static OSSL_FUNC_digest_set_ctx_params_fn shake_set_ctx_params; static OSSL_FUNC_digest_settable_ctx_params_fn shake_settable_ctx_params; static sha3_absorb_fn generic_sha3_absorb; static sha3_final_fn generic_sha3_final; static sha3_squeeze_fn generic_sha3_squeeze; #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) && defined(KECCAK1600_ASM) # include "s390x_arch.h" # define S390_SHA3 1 # define S390_SHA3_CAPABLE(name) \ ((OPENSSL_s390xcap_P.kimd[0] & S390X_CAPBIT(S390X_##name)) && \ (OPENSSL_s390xcap_P.klmd[0] & S390X_CAPBIT(S390X_##name))) #endif static int keccak_init(void *vctx, ossl_unused const OSSL_PARAM params[]) { if (!ossl_prov_is_running()) return 0; ossl_sha3_reset((KECCAK1600_CTX *)vctx); return 1; } static int keccak_init_params(void *vctx, const OSSL_PARAM params[]) { return keccak_init(vctx, NULL) && shake_set_ctx_params(vctx, params); } static int keccak_update(void *vctx, const unsigned char *inp, size_t len) { KECCAK1600_CTX *ctx = vctx; const size_t bsz = ctx->block_size; size_t num, rem; if (len == 0) return 1; if ((num = ctx->bufsz) != 0) { rem = bsz - num; if (len < rem) { memcpy(ctx->buf + num, inp, len); ctx->bufsz += len; return 1; } memcpy(ctx->buf + num, inp, rem); inp += rem; len -= rem; ctx->meth.absorb(ctx, ctx->buf, bsz); ctx->bufsz = 0; } rem = ctx->meth.absorb(ctx, inp, len); if (rem) { memcpy(ctx->buf, inp + len - rem, rem); ctx->bufsz = rem; } return 1; } static int keccak_final(void *vctx, unsigned char *out, size_t *outl, size_t outlen) { int ret = 1; KECCAK1600_CTX *ctx = vctx; if (!ossl_prov_is_running()) return 0; if (outlen > 0) ret = ctx->meth.final(ctx, out, ctx->md_size); *outl = ctx->md_size; return ret; } static int shake_squeeze(void *vctx, unsigned char *out, size_t *outl, size_t outlen) { int ret = 1; KECCAK1600_CTX *ctx = vctx; if (!ossl_prov_is_running()) return 0; if (ctx->meth.squeeze == NULL) return 0; if (outlen > 0) ret = ctx->meth.squeeze(ctx, out, outlen); *outl = outlen; return ret; } static size_t generic_sha3_absorb(void *vctx, const void *inp, size_t len) { KECCAK1600_CTX *ctx = vctx; if (!(ctx->xof_state == XOF_STATE_INIT || ctx->xof_state == XOF_STATE_ABSORB)) return 0; ctx->xof_state = XOF_STATE_ABSORB; return SHA3_absorb(ctx->A, inp, len, ctx->block_size); } static int generic_sha3_final(void *vctx, unsigned char *out, size_t outlen) { return ossl_sha3_final((KECCAK1600_CTX *)vctx, out, outlen); } static int generic_sha3_squeeze(void *vctx, unsigned char *out, size_t outlen) { return ossl_sha3_squeeze((KECCAK1600_CTX *)vctx, out, outlen); } static PROV_SHA3_METHOD sha3_generic_md = { generic_sha3_absorb, generic_sha3_final, NULL }; static PROV_SHA3_METHOD shake_generic_md = { generic_sha3_absorb, generic_sha3_final, generic_sha3_squeeze }; #if defined(S390_SHA3) static sha3_absorb_fn s390x_sha3_absorb; static sha3_final_fn s390x_sha3_final; static sha3_final_fn s390x_shake_final; static size_t s390x_sha3_absorb(void *vctx, const void *inp, size_t len) { KECCAK1600_CTX *ctx = vctx; size_t rem = len % ctx->block_size; if (!(ctx->xof_state == XOF_STATE_INIT || ctx->xof_state == XOF_STATE_ABSORB)) return 0; ctx->xof_state = XOF_STATE_ABSORB; s390x_kimd(inp, len - rem, ctx->pad, ctx->A); return rem; } static int s390x_sha3_final(void *vctx, unsigned char *out, size_t outlen) { KECCAK1600_CTX *ctx = vctx; if (!ossl_prov_is_running()) return 0; if (!(ctx->xof_state == XOF_STATE_INIT || ctx->xof_state == XOF_STATE_ABSORB)) return 0; ctx->xof_state = XOF_STATE_FINAL; s390x_klmd(ctx->buf, ctx->bufsz, NULL, 0, ctx->pad, ctx->A); memcpy(out, ctx->A, outlen); return 1; } static int s390x_shake_final(void *vctx, unsigned char *out, size_t outlen) { KECCAK1600_CTX *ctx = vctx; if (!ossl_prov_is_running()) return 0; if (!(ctx->xof_state == XOF_STATE_INIT || ctx->xof_state == XOF_STATE_ABSORB)) return 0; ctx->xof_state = XOF_STATE_FINAL; s390x_klmd(ctx->buf, ctx->bufsz, out, outlen, ctx->pad, ctx->A); return 1; } static int s390x_shake_squeeze(void *vctx, unsigned char *out, size_t outlen) { KECCAK1600_CTX *ctx = vctx; size_t len; if (!ossl_prov_is_running()) return 0; if (ctx->xof_state == XOF_STATE_FINAL) return 0; if (ctx->xof_state != XOF_STATE_SQUEEZE) { ctx->xof_state = XOF_STATE_SQUEEZE; s390x_klmd(ctx->buf, ctx->bufsz, out, outlen, ctx->pad, ctx->A); ctx->bufsz = outlen % ctx->block_size; return 1; } ctx->xof_state = XOF_STATE_SQUEEZE; if (ctx->bufsz != 0) { len = ctx->block_size - ctx->bufsz; if (outlen < len) len = outlen; memcpy(out, (char *)ctx->A + ctx->bufsz, len); out += len; outlen -= len; ctx->bufsz += len; if (ctx->bufsz == ctx->block_size) ctx->bufsz = 0; } if (outlen == 0) return 1; s390x_klmd(NULL, 0, out, outlen, ctx->pad | S390X_KLMD_PS, ctx->A); ctx->bufsz = outlen % ctx->block_size; return 1; } static int s390x_keccakc_final(void *vctx, unsigned char *out, size_t outlen, int padding) { KECCAK1600_CTX *ctx = vctx; size_t bsz = ctx->block_size; size_t num = ctx->bufsz; size_t needed = outlen; if (!ossl_prov_is_running()) return 0; if (!(ctx->xof_state == XOF_STATE_INIT || ctx->xof_state == XOF_STATE_ABSORB)) return 0; ctx->xof_state = XOF_STATE_FINAL; if (outlen == 0) return 1; memset(ctx->buf + num, 0, bsz - num); ctx->buf[num] = padding; ctx->buf[bsz - 1] |= 0x80; s390x_kimd(ctx->buf, bsz, ctx->pad, ctx->A); num = needed > bsz ? bsz : needed; memcpy(out, ctx->A, num); needed -= num; if (needed > 0) s390x_klmd(NULL, 0, out + bsz, needed, ctx->pad | S390X_KLMD_PS, ctx->A); return 1; } static int s390x_keccak_final(void *vctx, unsigned char *out, size_t outlen) { return s390x_keccakc_final(vctx, out, outlen, 0x01); } static int s390x_kmac_final(void *vctx, unsigned char *out, size_t outlen) { return s390x_keccakc_final(vctx, out, outlen, 0x04); } static int s390x_keccakc_squeeze(void *vctx, unsigned char *out, size_t outlen, int padding) { KECCAK1600_CTX *ctx = vctx; size_t len; if (!ossl_prov_is_running()) return 0; if (ctx->xof_state == XOF_STATE_FINAL) return 0; if (ctx->xof_state != XOF_STATE_SQUEEZE) { len = ctx->block_size - ctx->bufsz; memset(ctx->buf + ctx->bufsz, 0, len); ctx->buf[ctx->bufsz] = padding; ctx->buf[ctx->block_size - 1] |= 0x80; s390x_kimd(ctx->buf, ctx->block_size, ctx->pad, ctx->A); ctx->bufsz = 0; } if (ctx->bufsz != 0 || ctx->xof_state != XOF_STATE_SQUEEZE) { len = ctx->block_size - ctx->bufsz; if (outlen < len) len = outlen; memcpy(out, (char *)ctx->A + ctx->bufsz, len); out += len; outlen -= len; ctx->bufsz += len; if (ctx->bufsz == ctx->block_size) ctx->bufsz = 0; } ctx->xof_state = XOF_STATE_SQUEEZE; if (outlen == 0) return 1; s390x_klmd(NULL, 0, out, outlen, ctx->pad | S390X_KLMD_PS, ctx->A); ctx->bufsz = outlen % ctx->block_size; return 1; } static int s390x_keccak_squeeze(void *vctx, unsigned char *out, size_t outlen) { return s390x_keccakc_squeeze(vctx, out, outlen, 0x01); } static int s390x_kmac_squeeze(void *vctx, unsigned char *out, size_t outlen) { return s390x_keccakc_squeeze(vctx, out, outlen, 0x04); } static PROV_SHA3_METHOD sha3_s390x_md = { s390x_sha3_absorb, s390x_sha3_final, NULL, }; static PROV_SHA3_METHOD keccak_s390x_md = { s390x_sha3_absorb, s390x_keccak_final, s390x_keccak_squeeze, }; static PROV_SHA3_METHOD shake_s390x_md = { s390x_sha3_absorb, s390x_shake_final, s390x_shake_squeeze, }; static PROV_SHA3_METHOD kmac_s390x_md = { s390x_sha3_absorb, s390x_kmac_final, s390x_kmac_squeeze, }; # define SHAKE_SET_MD(uname, typ) \ if (S390_SHA3_CAPABLE(uname)) { \ ctx->pad = S390X_##uname; \ ctx->meth = typ##_s390x_md; \ } else { \ ctx->meth = shake_generic_md; \ } # define SHA3_SET_MD(uname, typ) \ if (S390_SHA3_CAPABLE(uname)) { \ ctx->pad = S390X_##uname; \ ctx->meth = typ##_s390x_md; \ } else { \ ctx->meth = sha3_generic_md; \ } # define KMAC_SET_MD(bitlen) \ if (S390_SHA3_CAPABLE(SHAKE_##bitlen)) { \ ctx->pad = S390X_SHAKE_##bitlen; \ ctx->meth = kmac_s390x_md; \ } else { \ ctx->meth = sha3_generic_md; \ } #elif defined(__aarch64__) && defined(KECCAK1600_ASM) # include "arm_arch.h" static sha3_absorb_fn armsha3_sha3_absorb; size_t SHA3_absorb_cext(uint64_t A[5][5], const unsigned char *inp, size_t len, size_t r); static size_t armsha3_sha3_absorb(void *vctx, const void *inp, size_t len) { KECCAK1600_CTX *ctx = vctx; return SHA3_absorb_cext(ctx->A, inp, len, ctx->block_size); } static PROV_SHA3_METHOD sha3_ARMSHA3_md = { armsha3_sha3_absorb, generic_sha3_final }; static PROV_SHA3_METHOD shake_ARMSHA3_md = { armsha3_sha3_absorb, generic_sha3_final, generic_sha3_squeeze }; # define SHAKE_SET_MD(uname, typ) \ if (OPENSSL_armcap_P & ARMV8_HAVE_SHA3_AND_WORTH_USING) { \ ctx->meth = shake_ARMSHA3_md; \ } else { \ ctx->meth = shake_generic_md; \ } # define SHA3_SET_MD(uname, typ) \ if (OPENSSL_armcap_P & ARMV8_HAVE_SHA3_AND_WORTH_USING) { \ ctx->meth = sha3_ARMSHA3_md; \ } else { \ ctx->meth = sha3_generic_md; \ } # define KMAC_SET_MD(bitlen) \ if (OPENSSL_armcap_P & ARMV8_HAVE_SHA3_AND_WORTH_USING) { \ ctx->meth = sha3_ARMSHA3_md; \ } else { \ ctx->meth = sha3_generic_md; \ } #else # define SHA3_SET_MD(uname, typ) ctx->meth = sha3_generic_md; # define KMAC_SET_MD(bitlen) ctx->meth = sha3_generic_md; # define SHAKE_SET_MD(uname, typ) ctx->meth = shake_generic_md; #endif #define SHA3_newctx(typ, uname, name, bitlen, pad) \ static OSSL_FUNC_digest_newctx_fn name##_newctx; \ static void *name##_newctx(void *provctx) \ { \ KECCAK1600_CTX *ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx)) \ : NULL; \ \ if (ctx == NULL) \ return NULL; \ ossl_sha3_init(ctx, pad, bitlen); \ SHA3_SET_MD(uname, typ) \ return ctx; \ } #define SHAKE_newctx(typ, uname, name, bitlen, pad) \ static OSSL_FUNC_digest_newctx_fn name##_newctx; \ static void *name##_newctx(void *provctx) \ { \ KECCAK1600_CTX *ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx))\ : NULL; \ \ if (ctx == NULL) \ return NULL; \ ossl_sha3_init(ctx, pad, bitlen); \ SHAKE_SET_MD(uname, typ) \ return ctx; \ } #define KMAC_newctx(uname, bitlen, pad) \ static OSSL_FUNC_digest_newctx_fn uname##_newctx; \ static void *uname##_newctx(void *provctx) \ { \ KECCAK1600_CTX *ctx = ossl_prov_is_running() ? OPENSSL_zalloc(sizeof(*ctx)) \ : NULL; \ \ if (ctx == NULL) \ return NULL; \ ossl_keccak_kmac_init(ctx, pad, bitlen); \ KMAC_SET_MD(bitlen) \ return ctx; \ } #define PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags) \ PROV_FUNC_DIGEST_GET_PARAM(name, blksize, dgstsize, flags) \ const OSSL_DISPATCH ossl_##name##_functions[] = { \ { OSSL_FUNC_DIGEST_NEWCTX, (void (*)(void))name##_newctx }, \ { OSSL_FUNC_DIGEST_UPDATE, (void (*)(void))keccak_update }, \ { OSSL_FUNC_DIGEST_FINAL, (void (*)(void))keccak_final }, \ { OSSL_FUNC_DIGEST_FREECTX, (void (*)(void))keccak_freectx }, \ { OSSL_FUNC_DIGEST_DUPCTX, (void (*)(void))keccak_dupctx }, \ PROV_DISPATCH_FUNC_DIGEST_GET_PARAMS(name) #define PROV_FUNC_SHA3_DIGEST(name, bitlen, blksize, dgstsize, flags) \ PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags), \ { OSSL_FUNC_DIGEST_INIT, (void (*)(void))keccak_init }, \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END #define PROV_FUNC_SHAKE_DIGEST(name, bitlen, blksize, dgstsize, flags) \ PROV_FUNC_SHA3_DIGEST_COMMON(name, bitlen, blksize, dgstsize, flags), \ { OSSL_FUNC_DIGEST_SQUEEZE, (void (*)(void))shake_squeeze }, \ { OSSL_FUNC_DIGEST_INIT, (void (*)(void))keccak_init_params }, \ { OSSL_FUNC_DIGEST_SET_CTX_PARAMS, (void (*)(void))shake_set_ctx_params }, \ { OSSL_FUNC_DIGEST_SETTABLE_CTX_PARAMS, \ (void (*)(void))shake_settable_ctx_params }, \ PROV_DISPATCH_FUNC_DIGEST_CONSTRUCT_END static void keccak_freectx(void *vctx) { KECCAK1600_CTX *ctx = (KECCAK1600_CTX *)vctx; OPENSSL_clear_free(ctx, sizeof(*ctx)); } static void *keccak_dupctx(void *ctx) { KECCAK1600_CTX *in = (KECCAK1600_CTX *)ctx; KECCAK1600_CTX *ret = ossl_prov_is_running() ? OPENSSL_malloc(sizeof(*ret)) : NULL; if (ret != NULL) *ret = *in; return ret; } static const OSSL_PARAM known_shake_settable_ctx_params[] = { {OSSL_DIGEST_PARAM_XOFLEN, OSSL_PARAM_UNSIGNED_INTEGER, NULL, 0, 0}, OSSL_PARAM_END }; static const OSSL_PARAM *shake_settable_ctx_params(ossl_unused void *ctx, ossl_unused void *provctx) { return known_shake_settable_ctx_params; } static int shake_set_ctx_params(void *vctx, const OSSL_PARAM params[]) { const OSSL_PARAM *p; KECCAK1600_CTX *ctx = (KECCAK1600_CTX *)vctx; if (ctx == NULL) return 0; if (params == NULL) return 1; p = OSSL_PARAM_locate_const(params, OSSL_DIGEST_PARAM_XOFLEN); if (p != NULL && !OSSL_PARAM_get_size_t(p, &ctx->md_size)) { ERR_raise(ERR_LIB_PROV, PROV_R_FAILED_TO_GET_PARAMETER); return 0; } return 1; } #define IMPLEMENT_SHA3_functions(bitlen) \ SHA3_newctx(sha3, SHA3_##bitlen, sha3_##bitlen, bitlen, '\x06') \ PROV_FUNC_SHA3_DIGEST(sha3_##bitlen, bitlen, \ SHA3_BLOCKSIZE(bitlen), SHA3_MDSIZE(bitlen), \ SHA3_FLAGS) #define IMPLEMENT_KECCAK_functions(bitlen) \ SHA3_newctx(keccak, KECCAK_##bitlen, keccak_##bitlen, bitlen, '\x01') \ PROV_FUNC_SHA3_DIGEST(keccak_##bitlen, bitlen, \ SHA3_BLOCKSIZE(bitlen), SHA3_MDSIZE(bitlen), \ SHA3_FLAGS) #define IMPLEMENT_SHAKE_functions(bitlen) \ SHAKE_newctx(shake, SHAKE_##bitlen, shake_##bitlen, bitlen, '\x1f') \ PROV_FUNC_SHAKE_DIGEST(shake_##bitlen, bitlen, \ SHA3_BLOCKSIZE(bitlen), SHA3_MDSIZE(bitlen), \ SHAKE_FLAGS) #define IMPLEMENT_KMAC_functions(bitlen) \ KMAC_newctx(keccak_kmac_##bitlen, bitlen, '\x04') \ PROV_FUNC_SHAKE_DIGEST(keccak_kmac_##bitlen, bitlen, \ SHA3_BLOCKSIZE(bitlen), KMAC_MDSIZE(bitlen), \ KMAC_FLAGS) IMPLEMENT_SHA3_functions(224) IMPLEMENT_SHA3_functions(256) IMPLEMENT_SHA3_functions(384) IMPLEMENT_SHA3_functions(512) IMPLEMENT_KECCAK_functions(224) IMPLEMENT_KECCAK_functions(256) IMPLEMENT_KECCAK_functions(384) IMPLEMENT_KECCAK_functions(512) IMPLEMENT_SHAKE_functions(128) IMPLEMENT_SHAKE_functions(256) IMPLEMENT_KMAC_functions(128) IMPLEMENT_KMAC_functions(256)
digests
openssl/providers/implementations/digests/sha3_prov.c
openssl
#include "internal/deprecated.h" #include <openssl/crypto.h> #include <openssl/md4.h> #include "prov/digestcommon.h" #include "prov/implementations.h" IMPLEMENT_digest_functions(md4, MD4_CTX, MD4_CBLOCK, MD4_DIGEST_LENGTH, 0, MD4_Init, MD4_Update, MD4_Final)
digests
openssl/providers/implementations/digests/md4_prov.c
openssl
#include <stdlib.h> #include "prov/provider_ctx.h" #include "prov/bio.h" PROV_CTX *ossl_prov_ctx_new(void) { return OPENSSL_zalloc(sizeof(PROV_CTX)); } void ossl_prov_ctx_free(PROV_CTX *ctx) { OPENSSL_free(ctx); } void ossl_prov_ctx_set0_libctx(PROV_CTX *ctx, OSSL_LIB_CTX *libctx) { if (ctx != NULL) ctx->libctx = libctx; } void ossl_prov_ctx_set0_handle(PROV_CTX *ctx, const OSSL_CORE_HANDLE *handle) { if (ctx != NULL) ctx->handle = handle; } void ossl_prov_ctx_set0_core_bio_method(PROV_CTX *ctx, BIO_METHOD *corebiometh) { if (ctx != NULL) ctx->corebiometh = corebiometh; } OSSL_LIB_CTX *ossl_prov_ctx_get0_libctx(PROV_CTX *ctx) { if (ctx == NULL) return NULL; return ctx->libctx; } const OSSL_CORE_HANDLE *ossl_prov_ctx_get0_handle(PROV_CTX *ctx) { if (ctx == NULL) return NULL; return ctx->handle; } BIO_METHOD *ossl_prov_ctx_get0_core_bio_method(PROV_CTX *ctx) { if (ctx == NULL) return NULL; return ctx->corebiometh; }
common
openssl/providers/common/provider_ctx.c
openssl
#include "internal/deprecated.h" #include <openssl/rsa.h> #include <openssl/dsa.h> #include <openssl/dh.h> #include <openssl/ec.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/proverr.h> #include <openssl/core_names.h> #include <openssl/obj_mac.h> #include "prov/securitycheck.h" int ossl_rsa_check_key(OSSL_LIB_CTX *ctx, const RSA *rsa, int operation) { int protect = 0; switch (operation) { case EVP_PKEY_OP_SIGN: protect = 1; case EVP_PKEY_OP_VERIFY: break; case EVP_PKEY_OP_ENCAPSULATE: case EVP_PKEY_OP_ENCRYPT: protect = 1; case EVP_PKEY_OP_VERIFYRECOVER: case EVP_PKEY_OP_DECAPSULATE: case EVP_PKEY_OP_DECRYPT: if (RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK) == RSA_FLAG_TYPE_RSASSAPSS) { ERR_raise_data(ERR_LIB_PROV, PROV_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE, "operation: %d", operation); return 0; } break; default: ERR_raise_data(ERR_LIB_PROV, ERR_R_INTERNAL_ERROR, "invalid operation: %d", operation); return 0; } #if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) { int sz = RSA_bits(rsa); if (protect ? (sz < 2048) : (sz < 1024)) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_KEY_LENGTH, "operation: %d", operation); return 0; } } #else (void)protect; #endif return 1; } #ifndef OPENSSL_NO_EC int ossl_ec_check_key(OSSL_LIB_CTX *ctx, const EC_KEY *ec, int protect) { # if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) { int nid, strength; const char *curve_name; const EC_GROUP *group = EC_KEY_get0_group(ec); if (group == NULL) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_CURVE, "No group"); return 0; } nid = EC_GROUP_get_curve_name(group); if (nid == NID_undef) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_CURVE, "Explicit curves are not allowed in fips mode"); return 0; } curve_name = EC_curve_nid2nist(nid); if (curve_name == NULL) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_CURVE, "Curve %s is not approved in FIPS mode", curve_name); return 0; } strength = EC_GROUP_order_bits(group) / 2; if (strength < 80) { ERR_raise(ERR_LIB_PROV, PROV_R_INVALID_CURVE); return 0; } if (protect && strength < 112) { ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_CURVE, "Curve %s cannot be used for signing", curve_name); return 0; } } # endif return 1; } #endif #ifndef OPENSSL_NO_DSA int ossl_dsa_check_key(OSSL_LIB_CTX *ctx, const DSA *dsa, int sign) { # if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) { size_t L, N; const BIGNUM *p, *q; if (dsa == NULL) return 0; p = DSA_get0_p(dsa); q = DSA_get0_q(dsa); if (p == NULL || q == NULL) return 0; L = BN_num_bits(p); N = BN_num_bits(q); if (!sign) { if (L < 512 || N < 160) return 0; if (L < 2048 || N < 224) return 1; } if (L == 2048 && (N == 224 || N == 256)) return 1; return (L == 3072 && N == 256); } # endif return 1; } #endif #ifndef OPENSSL_NO_DH int ossl_dh_check_key(OSSL_LIB_CTX *ctx, const DH *dh) { # if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) { size_t L, N; const BIGNUM *p, *q; if (dh == NULL) return 0; p = DH_get0_p(dh); q = DH_get0_q(dh); if (p == NULL || q == NULL) return 0; L = BN_num_bits(p); if (L < 2048) return 0; if (DH_get_nid(dh)) return 1; N = BN_num_bits(q); return (L == 2048 && (N == 224 || N == 256)); } # endif return 1; } #endif int ossl_digest_get_approved_nid_with_sha1(OSSL_LIB_CTX *ctx, const EVP_MD *md, int sha1_allowed) { int mdnid = ossl_digest_get_approved_nid(md); # if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) { if (mdnid == NID_undef || (mdnid == NID_sha1 && !sha1_allowed)) mdnid = -1; } # endif return mdnid; } int ossl_digest_is_allowed(OSSL_LIB_CTX *ctx, const EVP_MD *md) { # if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) return ossl_digest_get_approved_nid(md) != NID_undef; # endif return 1; }
common
openssl/providers/common/securitycheck.c
openssl
#include "internal/deprecated.h" #include <openssl/objects.h> #include <openssl/core_names.h> #include <openssl/evp.h> #include <openssl/core.h> #include "prov/securitycheck.h" #include "internal/nelem.h" int ossl_digest_md_to_nid(const EVP_MD *md, const OSSL_ITEM *it, size_t it_len) { size_t i; if (md == NULL) return NID_undef; for (i = 0; i < it_len; i++) if (EVP_MD_is_a(md, it[i].ptr)) return (int)it[i].id; return NID_undef; } int ossl_digest_get_approved_nid(const EVP_MD *md) { static const OSSL_ITEM name_to_nid[] = { { NID_sha1, OSSL_DIGEST_NAME_SHA1 }, { NID_sha224, OSSL_DIGEST_NAME_SHA2_224 }, { NID_sha256, OSSL_DIGEST_NAME_SHA2_256 }, { NID_sha384, OSSL_DIGEST_NAME_SHA2_384 }, { NID_sha512, OSSL_DIGEST_NAME_SHA2_512 }, { NID_sha512_224, OSSL_DIGEST_NAME_SHA2_512_224 }, { NID_sha512_256, OSSL_DIGEST_NAME_SHA2_512_256 }, { NID_sha3_224, OSSL_DIGEST_NAME_SHA3_224 }, { NID_sha3_256, OSSL_DIGEST_NAME_SHA3_256 }, { NID_sha3_384, OSSL_DIGEST_NAME_SHA3_384 }, { NID_sha3_512, OSSL_DIGEST_NAME_SHA3_512 }, }; return ossl_digest_md_to_nid(md, name_to_nid, OSSL_NELEM(name_to_nid)); }
common
openssl/providers/common/digest_to_nid.c
openssl
#include "internal/deprecated.h" #include <openssl/rsa.h> #include <openssl/core.h> #include <openssl/core_names.h> #include <openssl/obj_mac.h> #include "prov/securitycheck.h" #include "internal/nelem.h" int ossl_securitycheck_enabled(OSSL_LIB_CTX *libctx) { return 0; } int ossl_tls1_prf_ems_check_enabled(OSSL_LIB_CTX *libctx) { return 0; } int ossl_digest_rsa_sign_get_md_nid(OSSL_LIB_CTX *ctx, const EVP_MD *md, ossl_unused int sha1_allowed) { int mdnid; static const OSSL_ITEM name_to_nid[] = { { NID_md5, OSSL_DIGEST_NAME_MD5 }, { NID_md5_sha1, OSSL_DIGEST_NAME_MD5_SHA1 }, { NID_md2, OSSL_DIGEST_NAME_MD2 }, { NID_md4, OSSL_DIGEST_NAME_MD4 }, { NID_mdc2, OSSL_DIGEST_NAME_MDC2 }, { NID_ripemd160, OSSL_DIGEST_NAME_RIPEMD160 }, }; mdnid = ossl_digest_get_approved_nid_with_sha1(ctx, md, 1); if (mdnid == NID_undef) mdnid = ossl_digest_md_to_nid(md, name_to_nid, OSSL_NELEM(name_to_nid)); return mdnid; }
common
openssl/providers/common/securitycheck_default.c
openssl
#include <openssl/core_dispatch.h> #include "prov/seeding.h" #include "prov/providercommon.h" static OSSL_FUNC_get_entropy_fn *c_get_entropy = NULL; static OSSL_FUNC_get_user_entropy_fn *c_get_user_entropy = NULL; static OSSL_FUNC_cleanup_entropy_fn *c_cleanup_entropy = NULL; static OSSL_FUNC_cleanup_user_entropy_fn *c_cleanup_user_entropy = NULL; static OSSL_FUNC_get_nonce_fn *c_get_nonce = NULL; static OSSL_FUNC_get_user_nonce_fn *c_get_user_nonce = NULL; static OSSL_FUNC_cleanup_nonce_fn *c_cleanup_nonce = NULL; static OSSL_FUNC_cleanup_user_nonce_fn *c_cleanup_user_nonce = NULL; #ifdef FIPS_MODULE # define CORE_HANDLE(provctx) \ FIPS_get_core_handle(ossl_prov_ctx_get0_libctx(provctx)) #else # define CORE_HANDLE(provctx) ossl_prov_ctx_get0_handle(provctx) #endif int ossl_prov_seeding_from_dispatch(const OSSL_DISPATCH *fns) { for (; fns->function_id != 0; fns++) { #define set_func(c, f) \ do { if (c == NULL) c = f; else if (c != f) return 0; } while (0) switch (fns->function_id) { case OSSL_FUNC_GET_ENTROPY: set_func(c_get_entropy, OSSL_FUNC_get_entropy(fns)); break; case OSSL_FUNC_GET_USER_ENTROPY: set_func(c_get_user_entropy, OSSL_FUNC_get_user_entropy(fns)); break; case OSSL_FUNC_CLEANUP_ENTROPY: set_func(c_cleanup_entropy, OSSL_FUNC_cleanup_entropy(fns)); break; case OSSL_FUNC_CLEANUP_USER_ENTROPY: set_func(c_cleanup_user_entropy, OSSL_FUNC_cleanup_user_entropy(fns)); break; case OSSL_FUNC_GET_NONCE: set_func(c_get_nonce, OSSL_FUNC_get_nonce(fns)); break; case OSSL_FUNC_GET_USER_NONCE: set_func(c_get_user_nonce, OSSL_FUNC_get_user_nonce(fns)); break; case OSSL_FUNC_CLEANUP_NONCE: set_func(c_cleanup_nonce, OSSL_FUNC_cleanup_nonce(fns)); break; case OSSL_FUNC_CLEANUP_USER_NONCE: set_func(c_cleanup_user_nonce, OSSL_FUNC_cleanup_user_nonce(fns)); break; } #undef set_func } return 1; } size_t ossl_prov_get_entropy(PROV_CTX *prov_ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) { const OSSL_CORE_HANDLE *handle = CORE_HANDLE(prov_ctx); if (c_get_user_entropy != NULL) return c_get_user_entropy(handle, pout, entropy, min_len, max_len); if (c_get_entropy != NULL) return c_get_entropy(handle, pout, entropy, min_len, max_len); return 0; } void ossl_prov_cleanup_entropy(PROV_CTX *prov_ctx, unsigned char *buf, size_t len) { const OSSL_CORE_HANDLE *handle = CORE_HANDLE(prov_ctx); if (c_cleanup_user_entropy != NULL) c_cleanup_user_entropy(handle, buf, len); else if (c_cleanup_entropy != NULL) c_cleanup_entropy(handle, buf, len); } size_t ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) { const OSSL_CORE_HANDLE *handle = CORE_HANDLE(prov_ctx); if (c_get_user_nonce != NULL) return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); if (c_get_nonce != NULL) return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); return 0; } void ossl_prov_cleanup_nonce(PROV_CTX *prov_ctx, unsigned char *buf, size_t len) { const OSSL_CORE_HANDLE *handle = CORE_HANDLE(prov_ctx); if (c_cleanup_user_nonce != NULL) c_cleanup_user_nonce(handle, buf, len); else if (c_cleanup_nonce != NULL) c_cleanup_nonce(handle, buf, len); }
common
openssl/providers/common/provider_seeding.c
openssl
#include <assert.h> #include <string.h> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> #include <openssl/prov_ssl.h> #include <openssl/params.h> #include "internal/nelem.h" #include "internal/tlsgroups.h" #include "prov/providercommon.h" #include "internal/e_os.h" #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) typedef struct tls_group_constants_st { unsigned int group_id; unsigned int secbits; int mintls; int maxtls; int mindtls; int maxdtls; } TLS_GROUP_CONSTANTS; static const TLS_GROUP_CONSTANTS group_list[] = { { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0 }, { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0 }, { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0 }, { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION }, { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0 }, { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0 }, { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1 }, { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1 }, }; #define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \ { \ OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \ tlsname, \ sizeof(tlsname)), \ OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \ realname, \ sizeof(realname)), \ OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \ algorithm, \ sizeof(algorithm)), \ OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \ (unsigned int *)&group_list[idx].group_id), \ OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \ (unsigned int *)&group_list[idx].secbits), \ OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \ (unsigned int *)&group_list[idx].mintls), \ OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \ (unsigned int *)&group_list[idx].maxtls), \ OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \ (unsigned int *)&group_list[idx].mindtls), \ OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \ (unsigned int *)&group_list[idx].maxdtls), \ OSSL_PARAM_END \ } static const OSSL_PARAM param_group_list[][10] = { # ifndef OPENSSL_NO_EC # ifndef OPENSSL_NO_EC2M TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0), TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), # endif # ifndef FIPS_MODULE TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1), # endif # ifndef OPENSSL_NO_EC2M TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2), TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), # endif # ifndef FIPS_MODULE TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3), TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4), # endif # ifndef OPENSSL_NO_EC2M TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5), TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6), TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), # endif # ifndef FIPS_MODULE TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7), # endif # ifndef OPENSSL_NO_EC2M TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8), TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9), TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10), TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11), TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12), TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13), TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), # endif # ifndef FIPS_MODULE TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14), TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15), TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16), TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17), # endif TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18), TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), # ifndef FIPS_MODULE TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19), # endif TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20), TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), # ifndef FIPS_MODULE TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21), # endif TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22), TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23), TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24), TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), # ifndef FIPS_MODULE TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25), TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26), TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27), # endif TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28), TLS_GROUP_ENTRY("x448", "X448", "X448", 29), # ifndef FIPS_MODULE TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30), TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31), TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32), # endif # endif # ifndef OPENSSL_NO_DH TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33), TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34), TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35), TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36), TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37), # endif }; #endif static int tls_group_capability(OSSL_CALLBACK *cb, void *arg) { #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) size_t i; for (i = 0; i < OSSL_NELEM(param_group_list); i++) if (!cb(param_group_list[i], arg)) return 0; #endif return 1; } int ossl_prov_get_capabilities(void *provctx, const char *capability, OSSL_CALLBACK *cb, void *arg) { if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0) return tls_group_capability(cb, arg); return 0; }
common
openssl/providers/common/capabilities.c
openssl
#include <openssl/err.h> #include <openssl/proverr.h> #include "include/prov/proverr.h" #ifndef OPENSSL_NO_ERR static const ERR_STRING_DATA PROV_str_reasons[] = { {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ADDITIONAL_INPUT_TOO_LONG), "additional input too long"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ALGORITHM_MISMATCH), "algorithm mismatch"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ALREADY_INSTANTIATED), "already instantiated"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_DECRYPT), "bad decrypt"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_ENCODING), "bad encoding"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_LENGTH), "bad length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BAD_TLS_CLIENT_VERSION), "bad tls client version"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_BN_ERROR), "bn error"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_CIPHER_OPERATION_FAILED), "cipher operation failed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_DERIVATION_FUNCTION_INIT_FAILED), "derivation function init failed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_DIGEST_NOT_ALLOWED), "digest not allowed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_EMS_NOT_ENABLED), "ems not enabled"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ENTROPY_SOURCE_STRENGTH_TOO_WEAK), "entropy source strength too weak"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ERROR_INSTANTIATING_DRBG), "error instantiating drbg"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ERROR_RETRIEVING_ENTROPY), "error retrieving entropy"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ERROR_RETRIEVING_NONCE), "error retrieving nonce"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_DURING_DERIVATION), "failed during derivation"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_CREATE_LOCK), "failed to create lock"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_DECRYPT), "failed to decrypt"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GENERATE_KEY), "failed to generate key"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_GET_PARAMETER), "failed to get parameter"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_SET_PARAMETER), "failed to set parameter"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FAILED_TO_SIGN), "failed to sign"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FIPS_MODULE_CONDITIONAL_ERROR), "fips module conditional error"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FIPS_MODULE_ENTERING_ERROR_STATE), "fips module entering error state"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_FIPS_MODULE_IN_ERROR_STATE), "fips module in error state"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_GENERATE_ERROR), "generate error"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_ILLEGAL_OR_UNSUPPORTED_PADDING_MODE), "illegal or unsupported padding mode"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INDICATOR_INTEGRITY_FAILURE), "indicator integrity failure"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INSUFFICIENT_DRBG_STRENGTH), "insufficient drbg strength"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_AAD), "invalid aad"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_AEAD), "invalid aead"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CONFIG_DATA), "invalid config data"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CONSTANT_LENGTH), "invalid constant length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CURVE), "invalid curve"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_CUSTOM_LENGTH), "invalid custom length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DATA), "invalid data"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DIGEST), "invalid digest"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DIGEST_LENGTH), "invalid digest length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_DIGEST_SIZE), "invalid digest size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_INPUT_LENGTH), "invalid input length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_ITERATION_COUNT), "invalid iteration count"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_IV_LENGTH), "invalid iv length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KDF), "invalid kdf"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY), "invalid key"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_KEY_LENGTH), "invalid key length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MAC), "invalid mac"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MEMORY_SIZE), "invalid memory size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MGF1_MD), "invalid mgf1 md"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_MODE), "invalid mode"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_OUTPUT_LENGTH), "invalid output length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_PADDING_MODE), "invalid padding mode"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_PUBINFO), "invalid pubinfo"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SALT_LENGTH), "invalid salt length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SEED_LENGTH), "invalid seed length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_SIGNATURE_SIZE), "invalid signature size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_STATE), "invalid state"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAG), "invalid tag"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_TAG_LENGTH), "invalid tag length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_THREAD_POOL_SIZE), "invalid thread pool size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_UKM_LENGTH), "invalid ukm length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_INVALID_X931_DIGEST), "invalid x931 digest"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_IN_ERROR_STATE), "in error state"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_KEY_SETUP_FAILED), "key setup failed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_KEY_SIZE_TOO_SMALL), "key size too small"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_LENGTH_TOO_LARGE), "length too large"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISMATCHING_DOMAIN_PARAMETERS), "mismatching domain parameters"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CEK_ALG), "missing cek alg"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CIPHER), "missing cipher"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CONFIG_DATA), "missing config data"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_CONSTANT), "missing constant"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_KEY), "missing key"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MAC), "missing mac"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_MESSAGE_DIGEST), "missing message digest"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_OID), "missing OID"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_PASS), "missing pass"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SALT), "missing salt"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SECRET), "missing secret"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SEED), "missing seed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_SESSION_ID), "missing session id"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_TYPE), "missing type"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MISSING_XCGHASH), "missing xcghash"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_MODULE_INTEGRITY_FAILURE), "module integrity failure"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_A_PRIVATE_KEY), "not a private key"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_A_PUBLIC_KEY), "not a public key"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_INSTANTIATED), "not instantiated"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_PARAMETERS), "not parameters"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_SUPPORTED), "not supported"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NOT_XOF_OR_INVALID_LENGTH), "not xof or invalid length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NO_KEY_SET), "no key set"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_NO_PARAMETERS_SET), "no parameters set"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_OPERATION_NOT_SUPPORTED_FOR_THIS_KEYTYPE), "operation not supported for this keytype"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_OUTPUT_BUFFER_TOO_SMALL), "output buffer too small"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PARENT_CANNOT_GENERATE_RANDOM_NUMBERS), "parent cannot generate random numbers"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PARENT_CANNOT_SUPPLY_ENTROPY_SEED), "parent cannot supply entropy seed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PARENT_LOCKING_NOT_ENABLED), "parent locking not enabled"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PARENT_STRENGTH_TOO_WEAK), "parent strength too weak"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PATH_MUST_BE_ABSOLUTE), "path must be absolute"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PERSONALISATION_STRING_TOO_LONG), "personalisation string too long"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_PSS_SALTLEN_TOO_SMALL), "pss saltlen too small"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_REQUEST_TOO_LARGE_FOR_DRBG), "request too large for drbg"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_REQUIRE_CTR_MODE_CIPHER), "require ctr mode cipher"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_RESEED_ERROR), "reseed error"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES), "search only supported for directories"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_SEED_SOURCES_MUST_NOT_HAVE_A_PARENT), "seed sources must not have a parent"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_SELF_TEST_KAT_FAILURE), "self test kat failure"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_SELF_TEST_POST_FAILURE), "self test post failure"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOT_NEEDED), "tag not needed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TAG_NOT_SET), "tag not set"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_TOO_MANY_RECORDS), "too many records"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_FIND_CIPHERS), "unable to find ciphers"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_GET_PARENT_STRENGTH), "unable to get parent strength"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_GET_PASSPHRASE), "unable to get passphrase"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_INITIALISE_CIPHERS), "unable to initialise ciphers"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOAD_SHA256), "unable to load sha256"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_LOCK_PARENT), "unable to lock parent"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNABLE_TO_RESEED), "unable to reseed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_CEK_ALG), "unsupported cek alg"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_KEY_SIZE), "unsupported key size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_MAC_TYPE), "unsupported mac type"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_UNSUPPORTED_NUMBER_OF_ROUNDS), "unsupported number of rounds"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_URI_AUTHORITY_UNSUPPORTED), "uri authority unsupported"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_VALUE_ERROR), "value error"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_FINAL_BLOCK_LENGTH), "wrong final block length"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_WRONG_OUTPUT_BUFFER_SIZE), "wrong output buffer size"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XOF_DIGESTS_NOT_ALLOWED), "xof digests not allowed"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DATA_UNIT_IS_TOO_LARGE), "xts data unit is too large"}, {ERR_PACK(ERR_LIB_PROV, 0, PROV_R_XTS_DUPLICATED_KEYS), "xts duplicated keys"}, {0, NULL} }; #endif int ossl_err_load_PROV_strings(void) { #ifndef OPENSSL_NO_ERR if (ERR_reason_error_string(PROV_str_reasons[0].error) == NULL) ERR_load_strings_const(PROV_str_reasons); #endif return 1; }
common
openssl/providers/common/provider_err.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <openssl/evp.h> #include <openssl/core_names.h> #include <openssl/err.h> #include <openssl/proverr.h> #ifndef FIPS_MODULE # include <openssl/engine.h> # include "crypto/evp.h" #endif #include "prov/provider_util.h" void ossl_prov_cipher_reset(PROV_CIPHER *pc) { EVP_CIPHER_free(pc->alloc_cipher); pc->alloc_cipher = NULL; pc->cipher = NULL; #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) ENGINE_finish(pc->engine); #endif pc->engine = NULL; } int ossl_prov_cipher_copy(PROV_CIPHER *dst, const PROV_CIPHER *src) { if (src->alloc_cipher != NULL && !EVP_CIPHER_up_ref(src->alloc_cipher)) return 0; #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) if (src->engine != NULL && !ENGINE_init(src->engine)) { EVP_CIPHER_free(src->alloc_cipher); return 0; } #endif dst->engine = src->engine; dst->cipher = src->cipher; dst->alloc_cipher = src->alloc_cipher; return 1; } static int load_common(const OSSL_PARAM params[], const char **propquery, ENGINE **engine) { const OSSL_PARAM *p; *propquery = NULL; p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_PROPERTIES); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; *propquery = p->data; } #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) ENGINE_finish(*engine); #endif *engine = NULL; #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_ENGINE); if (p != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; *engine = ENGINE_by_id(p->data); if (*engine == NULL) return 0; if (!ENGINE_init(*engine)) { ENGINE_free(*engine); *engine = NULL; return 0; } ENGINE_free(*engine); } #endif return 1; } int ossl_prov_cipher_load_from_params(PROV_CIPHER *pc, const OSSL_PARAM params[], OSSL_LIB_CTX *ctx) { const OSSL_PARAM *p; const char *propquery; if (params == NULL) return 1; if (!load_common(params, &propquery, &pc->engine)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_CIPHER); if (p == NULL) return 1; if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; EVP_CIPHER_free(pc->alloc_cipher); ERR_set_mark(); pc->cipher = pc->alloc_cipher = EVP_CIPHER_fetch(ctx, p->data, propquery); #ifndef FIPS_MODULE if (pc->cipher == NULL) { const EVP_CIPHER *cipher; cipher = EVP_get_cipherbyname(p->data); if (cipher != NULL && cipher->origin != EVP_ORIG_GLOBAL) pc->cipher = cipher; } #endif if (pc->cipher != NULL) ERR_pop_to_mark(); else ERR_clear_last_mark(); return pc->cipher != NULL; } const EVP_CIPHER *ossl_prov_cipher_cipher(const PROV_CIPHER *pc) { return pc->cipher; } ENGINE *ossl_prov_cipher_engine(const PROV_CIPHER *pc) { return pc->engine; } void ossl_prov_digest_reset(PROV_DIGEST *pd) { EVP_MD_free(pd->alloc_md); pd->alloc_md = NULL; pd->md = NULL; #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) ENGINE_finish(pd->engine); #endif pd->engine = NULL; } int ossl_prov_digest_copy(PROV_DIGEST *dst, const PROV_DIGEST *src) { if (src->alloc_md != NULL && !EVP_MD_up_ref(src->alloc_md)) return 0; #if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_ENGINE) if (src->engine != NULL && !ENGINE_init(src->engine)) { EVP_MD_free(src->alloc_md); return 0; } #endif dst->engine = src->engine; dst->md = src->md; dst->alloc_md = src->alloc_md; return 1; } const EVP_MD *ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) { EVP_MD_free(pd->alloc_md); pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); return pd->md; } int ossl_prov_digest_load_from_params(PROV_DIGEST *pd, const OSSL_PARAM params[], OSSL_LIB_CTX *ctx) { const OSSL_PARAM *p; const char *propquery; if (params == NULL) return 1; if (!load_common(params, &propquery, &pd->engine)) return 0; p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_DIGEST); if (p == NULL) return 1; if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; ERR_set_mark(); ossl_prov_digest_fetch(pd, ctx, p->data, propquery); #ifndef FIPS_MODULE if (pd->md == NULL) { const EVP_MD *md; md = EVP_get_digestbyname(p->data); if (md != NULL && md->origin != EVP_ORIG_GLOBAL) pd->md = md; } #endif if (pd->md != NULL) ERR_pop_to_mark(); else ERR_clear_last_mark(); return pd->md != NULL; } const EVP_MD *ossl_prov_digest_md(const PROV_DIGEST *pd) { return pd->md; } ENGINE *ossl_prov_digest_engine(const PROV_DIGEST *pd) { return pd->engine; } int ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) { const OSSL_PARAM *p; OSSL_PARAM mac_params[6], *mp = mac_params; if (params != NULL) { if (mdname == NULL) { if ((p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_DIGEST)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; mdname = p->data; } } if (ciphername == NULL) { if ((p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_CIPHER)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; ciphername = p->data; } } if (engine == NULL) { if ((p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_ENGINE)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; engine = p->data; } } } if (mdname != NULL) *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, (char *)mdname, 0); if (ciphername != NULL) *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, (char *)ciphername, 0); if (properties != NULL) *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_PROPERTIES, (char *)properties, 0); #if !defined(OPENSSL_NO_ENGINE) && !defined(FIPS_MODULE) if (engine != NULL) *mp++ = OSSL_PARAM_construct_utf8_string(OSSL_ALG_PARAM_ENGINE, (char *) engine, 0); #endif if (key != NULL) *mp++ = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, (unsigned char *)key, keylen); *mp = OSSL_PARAM_construct_end(); return EVP_MAC_CTX_set_params(macctx, mac_params); } int ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) { const OSSL_PARAM *p; const char *properties = NULL; if (macname == NULL && (p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_MAC)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; macname = p->data; } if ((p = OSSL_PARAM_locate_const(params, OSSL_ALG_PARAM_PROPERTIES)) != NULL) { if (p->data_type != OSSL_PARAM_UTF8_STRING) return 0; properties = p->data; } if (macname != NULL) { EVP_MAC *mac = EVP_MAC_fetch(libctx, macname, properties); EVP_MAC_CTX_free(*macctx); *macctx = mac == NULL ? NULL : EVP_MAC_CTX_new(mac); EVP_MAC_free(mac); if (*macctx == NULL) return 0; } if (*macctx == NULL) return 1; if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, properties, NULL, 0)) return 1; EVP_MAC_CTX_free(*macctx); *macctx = NULL; return 0; } void ossl_prov_cache_exported_algorithms(const OSSL_ALGORITHM_CAPABLE *in, OSSL_ALGORITHM *out) { int i, j; if (out[0].algorithm_names == NULL) { for (i = j = 0; in[i].alg.algorithm_names != NULL; ++i) { if (in[i].capable == NULL || in[i].capable()) out[j++] = in[i].alg; } out[j++] = in[i].alg; } } int ossl_prov_memdup(const void *src, size_t src_len, unsigned char **dest, size_t *dest_len) { if (src != NULL) { if ((*dest = OPENSSL_memdup(src, src_len)) == NULL) return 0; *dest_len = src_len; } else { *dest = NULL; *dest_len = 0; } return 1; }
common
openssl/providers/common/provider_util.c
openssl
#include "internal/deprecated.h" #include <openssl/rsa.h> #include <openssl/dsa.h> #include <openssl/dh.h> #include <openssl/ec.h> #include <openssl/err.h> #include <openssl/proverr.h> #include <openssl/core_names.h> #include <openssl/obj_mac.h> #include "prov/securitycheck.h" #include "prov/fipscommon.h" int ossl_securitycheck_enabled(OSSL_LIB_CTX *libctx) { #if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) return FIPS_security_check_enabled(libctx); #else return 0; #endif } int ossl_tls1_prf_ems_check_enabled(OSSL_LIB_CTX *libctx) { return FIPS_tls_prf_ems_check(libctx); } int ossl_digest_rsa_sign_get_md_nid(OSSL_LIB_CTX *ctx, const EVP_MD *md, int sha1_allowed) { #if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) if (ossl_securitycheck_enabled(ctx)) return ossl_digest_get_approved_nid_with_sha1(ctx, md, sha1_allowed); #endif return ossl_digest_get_approved_nid(md); }
common
openssl/providers/common/securitycheck_fips.c
openssl
#include <assert.h> #include <openssl/core_dispatch.h> #include "internal/cryptlib.h" #include "prov/bio.h" static OSSL_FUNC_BIO_new_file_fn *c_bio_new_file = NULL; static OSSL_FUNC_BIO_new_membuf_fn *c_bio_new_membuf = NULL; static OSSL_FUNC_BIO_read_ex_fn *c_bio_read_ex = NULL; static OSSL_FUNC_BIO_write_ex_fn *c_bio_write_ex = NULL; static OSSL_FUNC_BIO_gets_fn *c_bio_gets = NULL; static OSSL_FUNC_BIO_puts_fn *c_bio_puts = NULL; static OSSL_FUNC_BIO_ctrl_fn *c_bio_ctrl = NULL; static OSSL_FUNC_BIO_up_ref_fn *c_bio_up_ref = NULL; static OSSL_FUNC_BIO_free_fn *c_bio_free = NULL; static OSSL_FUNC_BIO_vprintf_fn *c_bio_vprintf = NULL; int ossl_prov_bio_from_dispatch(const OSSL_DISPATCH *fns) { for (; fns->function_id != 0; fns++) { switch (fns->function_id) { case OSSL_FUNC_BIO_NEW_FILE: if (c_bio_new_file == NULL) c_bio_new_file = OSSL_FUNC_BIO_new_file(fns); break; case OSSL_FUNC_BIO_NEW_MEMBUF: if (c_bio_new_membuf == NULL) c_bio_new_membuf = OSSL_FUNC_BIO_new_membuf(fns); break; case OSSL_FUNC_BIO_READ_EX: if (c_bio_read_ex == NULL) c_bio_read_ex = OSSL_FUNC_BIO_read_ex(fns); break; case OSSL_FUNC_BIO_WRITE_EX: if (c_bio_write_ex == NULL) c_bio_write_ex = OSSL_FUNC_BIO_write_ex(fns); break; case OSSL_FUNC_BIO_GETS: if (c_bio_gets == NULL) c_bio_gets = OSSL_FUNC_BIO_gets(fns); break; case OSSL_FUNC_BIO_PUTS: if (c_bio_puts == NULL) c_bio_puts = OSSL_FUNC_BIO_puts(fns); break; case OSSL_FUNC_BIO_CTRL: if (c_bio_ctrl == NULL) c_bio_ctrl = OSSL_FUNC_BIO_ctrl(fns); break; case OSSL_FUNC_BIO_UP_REF: if (c_bio_up_ref == NULL) c_bio_up_ref = OSSL_FUNC_BIO_up_ref(fns); break; case OSSL_FUNC_BIO_FREE: if (c_bio_free == NULL) c_bio_free = OSSL_FUNC_BIO_free(fns); break; case OSSL_FUNC_BIO_VPRINTF: if (c_bio_vprintf == NULL) c_bio_vprintf = OSSL_FUNC_BIO_vprintf(fns); break; } } return 1; } OSSL_CORE_BIO *ossl_prov_bio_new_file(const char *filename, const char *mode) { if (c_bio_new_file == NULL) return NULL; return c_bio_new_file(filename, mode); } OSSL_CORE_BIO *ossl_prov_bio_new_membuf(const char *filename, int len) { if (c_bio_new_membuf == NULL) return NULL; return c_bio_new_membuf(filename, len); } int ossl_prov_bio_read_ex(OSSL_CORE_BIO *bio, void *data, size_t data_len, size_t *bytes_read) { if (c_bio_read_ex == NULL) return 0; return c_bio_read_ex(bio, data, data_len, bytes_read); } int ossl_prov_bio_write_ex(OSSL_CORE_BIO *bio, const void *data, size_t data_len, size_t *written) { if (c_bio_write_ex == NULL) return 0; return c_bio_write_ex(bio, data, data_len, written); } int ossl_prov_bio_gets(OSSL_CORE_BIO *bio, char *buf, int size) { if (c_bio_gets == NULL) return -1; return c_bio_gets(bio, buf, size); } int ossl_prov_bio_puts(OSSL_CORE_BIO *bio, const char *str) { if (c_bio_puts == NULL) return -1; return c_bio_puts(bio, str); } int ossl_prov_bio_ctrl(OSSL_CORE_BIO *bio, int cmd, long num, void *ptr) { if (c_bio_ctrl == NULL) return -1; return c_bio_ctrl(bio, cmd, num, ptr); } int ossl_prov_bio_up_ref(OSSL_CORE_BIO *bio) { if (c_bio_up_ref == NULL) return 0; return c_bio_up_ref(bio); } int ossl_prov_bio_free(OSSL_CORE_BIO *bio) { if (c_bio_free == NULL) return 0; return c_bio_free(bio); } int ossl_prov_bio_vprintf(OSSL_CORE_BIO *bio, const char *format, va_list ap) { if (c_bio_vprintf == NULL) return -1; return c_bio_vprintf(bio, format, ap); } int ossl_prov_bio_printf(OSSL_CORE_BIO *bio, const char *format, ...) { va_list ap; int ret; va_start(ap, format); ret = ossl_prov_bio_vprintf(bio, format, ap); va_end(ap); return ret; } #ifndef FIPS_MODULE static int bio_core_read_ex(BIO *bio, char *data, size_t data_len, size_t *bytes_read) { return ossl_prov_bio_read_ex(BIO_get_data(bio), data, data_len, bytes_read); } static int bio_core_write_ex(BIO *bio, const char *data, size_t data_len, size_t *written) { return ossl_prov_bio_write_ex(BIO_get_data(bio), data, data_len, written); } static long bio_core_ctrl(BIO *bio, int cmd, long num, void *ptr) { return ossl_prov_bio_ctrl(BIO_get_data(bio), cmd, num, ptr); } static int bio_core_gets(BIO *bio, char *buf, int size) { return ossl_prov_bio_gets(BIO_get_data(bio), buf, size); } static int bio_core_puts(BIO *bio, const char *str) { return ossl_prov_bio_puts(BIO_get_data(bio), str); } static int bio_core_new(BIO *bio) { BIO_set_init(bio, 1); return 1; } static int bio_core_free(BIO *bio) { BIO_set_init(bio, 0); ossl_prov_bio_free(BIO_get_data(bio)); return 1; } BIO_METHOD *ossl_bio_prov_init_bio_method(void) { BIO_METHOD *corebiometh = NULL; corebiometh = BIO_meth_new(BIO_TYPE_CORE_TO_PROV, "BIO to Core filter"); if (corebiometh == NULL || !BIO_meth_set_write_ex(corebiometh, bio_core_write_ex) || !BIO_meth_set_read_ex(corebiometh, bio_core_read_ex) || !BIO_meth_set_puts(corebiometh, bio_core_puts) || !BIO_meth_set_gets(corebiometh, bio_core_gets) || !BIO_meth_set_ctrl(corebiometh, bio_core_ctrl) || !BIO_meth_set_create(corebiometh, bio_core_new) || !BIO_meth_set_destroy(corebiometh, bio_core_free)) { BIO_meth_free(corebiometh); return NULL; } return corebiometh; } BIO *ossl_bio_new_from_core_bio(PROV_CTX *provctx, OSSL_CORE_BIO *corebio) { BIO *outbio; BIO_METHOD *corebiometh = ossl_prov_ctx_get0_core_bio_method(provctx); if (corebiometh == NULL) return NULL; if ((outbio = BIO_new(corebiometh)) == NULL) return NULL; if (!ossl_prov_bio_up_ref(corebio)) { BIO_free(outbio); return NULL; } BIO_set_data(outbio, corebio); return outbio; } #endif
common
openssl/providers/common/bio_prov.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_ec.h" #define ossl_der_oid_id_ecdsa_with_sha1 ossl_der_oid_ecdsa_with_SHA1 #define ossl_der_oid_id_ecdsa_with_sha224 ossl_der_oid_ecdsa_with_SHA224 #define ossl_der_oid_id_ecdsa_with_sha256 ossl_der_oid_ecdsa_with_SHA256 #define ossl_der_oid_id_ecdsa_with_sha384 ossl_der_oid_ecdsa_with_SHA384 #define ossl_der_oid_id_ecdsa_with_sha512 ossl_der_oid_ecdsa_with_SHA512 #define MD_CASE(name) \ case NID_##name: \ precompiled = ossl_der_oid_id_ecdsa_with_##name; \ precompiled_sz = sizeof(ossl_der_oid_id_ecdsa_with_##name); \ break; int ossl_DER_w_algorithmIdentifier_ECDSA_with_MD(WPACKET *pkt, int cont, EC_KEY *ec, int mdnid) { const unsigned char *precompiled = NULL; size_t precompiled_sz = 0; switch (mdnid) { MD_CASE(sha1); MD_CASE(sha224); MD_CASE(sha256); MD_CASE(sha384); MD_CASE(sha512); MD_CASE(sha3_224); MD_CASE(sha3_256); MD_CASE(sha3_384); MD_CASE(sha3_512); default: return 0; } return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, precompiled, precompiled_sz) && ossl_DER_w_end_sequence(pkt, cont); }
der
openssl/providers/common/der/der_ec_sig.c
openssl
#include "internal/deprecated.h" #include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_dsa.h" int ossl_DER_w_algorithmIdentifier_DSA(WPACKET *pkt, int tag, DSA *dsa) { return ossl_DER_w_begin_sequence(pkt, tag) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_dsa, sizeof(ossl_der_oid_id_dsa)) && ossl_DER_w_end_sequence(pkt, tag); }
der
openssl/providers/common/der/der_dsa_key.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_rsa.h" #include "prov/der_digests.h" #define ossl_der_oid_sha3_224WithRSAEncryption \ ossl_der_oid_id_rsassa_pkcs1_v1_5_with_sha3_224 #define ossl_der_oid_sha3_256WithRSAEncryption \ ossl_der_oid_id_rsassa_pkcs1_v1_5_with_sha3_256 #define ossl_der_oid_sha3_384WithRSAEncryption \ ossl_der_oid_id_rsassa_pkcs1_v1_5_with_sha3_384 #define ossl_der_oid_sha3_512WithRSAEncryption \ ossl_der_oid_id_rsassa_pkcs1_v1_5_with_sha3_512 #define ossl_der_oid_mdc2WithRSAEncryption \ ossl_der_oid_mdc2WithRSASignature #define MD_with_RSA_CASE(name, var) \ case NID_##name: \ var = ossl_der_oid_##name##WithRSAEncryption; \ var##_sz = sizeof(ossl_der_oid_##name##WithRSAEncryption); \ break; int ossl_DER_w_algorithmIdentifier_MDWithRSAEncryption(WPACKET *pkt, int tag, int mdnid) { const unsigned char *precompiled = NULL; size_t precompiled_sz = 0; switch (mdnid) { #ifndef FIPS_MODULE MD_with_RSA_CASE(md2, precompiled); MD_with_RSA_CASE(md5, precompiled); MD_with_RSA_CASE(md4, precompiled); MD_with_RSA_CASE(ripemd160, precompiled); MD_with_RSA_CASE(mdc2, precompiled); #endif MD_with_RSA_CASE(sha1, precompiled); MD_with_RSA_CASE(sha224, precompiled); MD_with_RSA_CASE(sha256, precompiled); MD_with_RSA_CASE(sha384, precompiled); MD_with_RSA_CASE(sha512, precompiled); MD_with_RSA_CASE(sha512_224, precompiled); MD_with_RSA_CASE(sha512_256, precompiled); MD_with_RSA_CASE(sha3_224, precompiled); MD_with_RSA_CASE(sha3_256, precompiled); MD_with_RSA_CASE(sha3_384, precompiled); MD_with_RSA_CASE(sha3_512, precompiled); default: return -1; } return ossl_DER_w_begin_sequence(pkt, tag) && ossl_DER_w_null(pkt, -1) && ossl_DER_w_precompiled(pkt, -1, precompiled, precompiled_sz) && ossl_DER_w_end_sequence(pkt, tag); }
der
openssl/providers/common/der/der_rsa_sig.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_ec.h" int ossl_DER_w_algorithmIdentifier_EC(WPACKET *pkt, int cont, EC_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_ecPublicKey, sizeof(ossl_der_oid_id_ecPublicKey)) && ossl_DER_w_end_sequence(pkt, cont); }
der
openssl/providers/common/der/der_ec_key.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_ec.h" #include "prov/der_sm2.h" int ossl_DER_w_algorithmIdentifier_SM2(WPACKET *pkt, int cont, EC_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_ecPublicKey, sizeof(ossl_der_oid_id_ecPublicKey)) && ossl_DER_w_end_sequence(pkt, cont); }
der
openssl/providers/common/der/der_sm2_key.c
openssl
#include "internal/deprecated.h" #include <openssl/obj_mac.h> #include "internal/cryptlib.h" #include "prov/der_rsa.h" #include "prov/der_digests.h" #define DER_V_NULL DER_P_NULL, 0 #define DER_SZ_NULL 2 #define DER_AID_V_sha1Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha1 + DER_SZ_NULL, \ DER_OID_V_id_sha1, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha1Identifier[]; const unsigned char ossl_der_aid_sha1Identifier[] = { DER_AID_V_sha1Identifier }; #define DER_AID_SZ_sha1Identifier sizeof(ossl_der_aid_sha1Identifier) #define DER_AID_V_sha224Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha224 + DER_SZ_NULL, \ DER_OID_V_id_sha224, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha224Identifier[]; const unsigned char ossl_der_aid_sha224Identifier[] = { DER_AID_V_sha224Identifier }; #define DER_AID_SZ_sha224Identifier sizeof(ossl_der_aid_sha224Identifier) #define DER_AID_V_sha256Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha256 + DER_SZ_NULL, \ DER_OID_V_id_sha256, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha256Identifier[]; const unsigned char ossl_der_aid_sha256Identifier[] = { DER_AID_V_sha256Identifier }; #define DER_AID_SZ_sha256Identifier sizeof(ossl_der_aid_sha256Identifier) #define DER_AID_V_sha384Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha384 + DER_SZ_NULL, \ DER_OID_V_id_sha384, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha384Identifier[]; const unsigned char ossl_der_aid_sha384Identifier[] = { DER_AID_V_sha384Identifier }; #define DER_AID_SZ_sha384Identifier sizeof(ossl_der_aid_sha384Identifier) #define DER_AID_V_sha512Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha512 + DER_SZ_NULL, \ DER_OID_V_id_sha512, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha512Identifier[]; const unsigned char ossl_der_aid_sha512Identifier[] = { DER_AID_V_sha512Identifier }; #define DER_AID_SZ_sha512Identifier sizeof(ossl_der_aid_sha512Identifier) #define DER_AID_V_sha512_224Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha512_224 + DER_SZ_NULL, \ DER_OID_V_id_sha512_224, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha512_224Identifier[]; const unsigned char ossl_der_aid_sha512_224Identifier[] = { DER_AID_V_sha512_224Identifier }; #define DER_AID_SZ_sha512_224Identifier sizeof(ossl_der_aid_sha512_224Identifier) #define DER_AID_V_sha512_256Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_sha512_256 + DER_SZ_NULL, \ DER_OID_V_id_sha512_256, \ DER_V_NULL extern const unsigned char ossl_der_aid_sha512_256Identifier[]; const unsigned char ossl_der_aid_sha512_256Identifier[] = { DER_AID_V_sha512_256Identifier }; #define DER_AID_SZ_sha512_256Identifier sizeof(ossl_der_aid_sha512_256Identifier) #if 0 #define DER_AID_V_mgf1SHA1Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha1Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha1Identifier static const unsigned char der_aid_mgf1SHA1Identifier[] = { DER_AID_V_mgf1SHA1Identifier }; #define DER_AID_SZ_mgf1SHA1Identifier sizeof(der_aid_mgf1SHA1Identifier) #endif #define DER_AID_V_mgf1SHA224Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha224Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha224Identifier static const unsigned char der_aid_mgf1SHA224Identifier[] = { DER_AID_V_mgf1SHA224Identifier }; #define DER_AID_SZ_mgf1SHA224Identifier sizeof(der_aid_mgf1SHA224Identifier) #define DER_AID_V_mgf1SHA256Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha256Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha256Identifier static const unsigned char der_aid_mgf1SHA256Identifier[] = { DER_AID_V_mgf1SHA256Identifier }; #define DER_AID_SZ_mgf1SHA256Identifier sizeof(der_aid_mgf1SHA256Identifier) #define DER_AID_V_mgf1SHA384Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha384Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha384Identifier static const unsigned char der_aid_mgf1SHA384Identifier[] = { DER_AID_V_mgf1SHA384Identifier }; #define DER_AID_SZ_mgf1SHA384Identifier sizeof(der_aid_mgf1SHA384Identifier) #define DER_AID_V_mgf1SHA512Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha512Identifier static const unsigned char der_aid_mgf1SHA512Identifier[] = { DER_AID_V_mgf1SHA512Identifier }; #define DER_AID_SZ_mgf1SHA512Identifier sizeof(der_aid_mgf1SHA512Identifier) #define DER_AID_V_mgf1SHA512_224Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512_224Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha512_224Identifier static const unsigned char der_aid_mgf1SHA512_224Identifier[] = { DER_AID_V_mgf1SHA512_224Identifier }; #define DER_AID_SZ_mgf1SHA512_224Identifier sizeof(der_aid_mgf1SHA512_224Identifier) #define DER_AID_V_mgf1SHA512_256Identifier \ DER_P_SEQUENCE|DER_F_CONSTRUCTED, \ DER_OID_SZ_id_mgf1 + DER_AID_SZ_sha512_256Identifier, \ DER_OID_V_id_mgf1, \ DER_AID_V_sha512_256Identifier static const unsigned char der_aid_mgf1SHA512_256Identifier[] = { DER_AID_V_mgf1SHA512_256Identifier }; #define DER_AID_SZ_mgf1SHA512_256Identifier sizeof(der_aid_mgf1SHA512_256Identifier) #define MGF1_SHA_CASE(bits, var) \ case NID_sha##bits: \ var = der_aid_mgf1SHA##bits##Identifier; \ var##_sz = sizeof(der_aid_mgf1SHA##bits##Identifier); \ break; static int DER_w_MaskGenAlgorithm(WPACKET *pkt, int tag, const RSA_PSS_PARAMS_30 *pss) { if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); const unsigned char *maskgenalg = NULL; size_t maskgenalg_sz = 0; switch (maskgenhashalg_nid) { case NID_sha1: break; MGF1_SHA_CASE(224, maskgenalg); MGF1_SHA_CASE(256, maskgenalg); MGF1_SHA_CASE(384, maskgenalg); MGF1_SHA_CASE(512, maskgenalg); MGF1_SHA_CASE(512_224, maskgenalg); MGF1_SHA_CASE(512_256, maskgenalg); default: return 0; } if (maskgenalg == NULL) return 1; return ossl_DER_w_precompiled(pkt, tag, maskgenalg, maskgenalg_sz); } return 0; } #define OAEP_PSS_MD_CASE(name, var) \ case NID_##name: \ var = ossl_der_aid_##name##Identifier; \ var##_sz = sizeof(ossl_der_aid_##name##Identifier); \ break; int ossl_DER_w_RSASSA_PSS_params(WPACKET *pkt, int tag, const RSA_PSS_PARAMS_30 *pss) { int hashalg_nid, default_hashalg_nid; int saltlen, default_saltlen; int trailerfield, default_trailerfield; const unsigned char *hashalg = NULL; size_t hashalg_sz = 0; if (!ossl_assert(pss != NULL && !ossl_rsa_pss_params_30_is_unrestricted(pss))) return 0; hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); saltlen = ossl_rsa_pss_params_30_saltlen(pss); trailerfield = ossl_rsa_pss_params_30_trailerfield(pss); if (saltlen < 0) { ERR_raise(ERR_LIB_RSA, RSA_R_INVALID_SALT_LENGTH); return 0; } if (trailerfield != 1) { ERR_raise(ERR_LIB_RSA, RSA_R_INVALID_TRAILER); return 0; } default_hashalg_nid = ossl_rsa_pss_params_30_hashalg(NULL); default_saltlen = ossl_rsa_pss_params_30_saltlen(NULL); default_trailerfield = ossl_rsa_pss_params_30_trailerfield(NULL); switch (hashalg_nid) { OAEP_PSS_MD_CASE(sha1, hashalg); OAEP_PSS_MD_CASE(sha224, hashalg); OAEP_PSS_MD_CASE(sha256, hashalg); OAEP_PSS_MD_CASE(sha384, hashalg); OAEP_PSS_MD_CASE(sha512, hashalg); OAEP_PSS_MD_CASE(sha512_224, hashalg); OAEP_PSS_MD_CASE(sha512_256, hashalg); default: return 0; } return ossl_DER_w_begin_sequence(pkt, tag) && (trailerfield == default_trailerfield || ossl_DER_w_uint32(pkt, 3, (uint32_t)trailerfield)) && (saltlen == default_saltlen || ossl_DER_w_uint32(pkt, 2, (uint32_t)saltlen)) && DER_w_MaskGenAlgorithm(pkt, 1, pss) && (hashalg_nid == default_hashalg_nid || ossl_DER_w_precompiled(pkt, 0, hashalg, hashalg_sz)) && ossl_DER_w_end_sequence(pkt, tag); } #define ossl_der_oid_rsassaPss ossl_der_oid_id_RSASSA_PSS #define RSA_CASE(name, var) \ var##_nid = NID_##name; \ var##_oid = ossl_der_oid_##name; \ var##_oid_sz = sizeof(ossl_der_oid_##name); \ break; int ossl_DER_w_algorithmIdentifier_RSA_PSS(WPACKET *pkt, int tag, int rsa_type, const RSA_PSS_PARAMS_30 *pss) { int rsa_nid = NID_undef; const unsigned char *rsa_oid = NULL; size_t rsa_oid_sz = 0; switch (rsa_type) { case RSA_FLAG_TYPE_RSA: RSA_CASE(rsaEncryption, rsa); case RSA_FLAG_TYPE_RSASSAPSS: RSA_CASE(rsassaPss, rsa); } if (rsa_oid == NULL) return 0; return ossl_DER_w_begin_sequence(pkt, tag) && (rsa_nid != NID_rsassaPss || ossl_rsa_pss_params_30_is_unrestricted(pss) || ossl_DER_w_RSASSA_PSS_params(pkt, -1, pss)) && ossl_DER_w_precompiled(pkt, -1, rsa_oid, rsa_oid_sz) && ossl_DER_w_end_sequence(pkt, tag); } int ossl_DER_w_algorithmIdentifier_RSA(WPACKET *pkt, int tag, RSA *rsa) { int rsa_type = RSA_test_flags(rsa, RSA_FLAG_TYPE_MASK); RSA_PSS_PARAMS_30 *pss_params = ossl_rsa_get0_pss_params_30(rsa); return ossl_DER_w_algorithmIdentifier_RSA_PSS(pkt, tag, rsa_type, pss_params); }
der
openssl/providers/common/der/der_rsa_key.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_ecx.h" int ossl_DER_w_algorithmIdentifier_X25519(WPACKET *pkt, int cont, ECX_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_X25519, sizeof(ossl_der_oid_id_X25519)) && ossl_DER_w_end_sequence(pkt, cont); } int ossl_DER_w_algorithmIdentifier_X448(WPACKET *pkt, int cont, ECX_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_X448, sizeof(ossl_der_oid_id_X448)) && ossl_DER_w_end_sequence(pkt, cont); } int ossl_DER_w_algorithmIdentifier_ED25519(WPACKET *pkt, int cont, ECX_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_Ed25519, sizeof(ossl_der_oid_id_Ed25519)) && ossl_DER_w_end_sequence(pkt, cont); } int ossl_DER_w_algorithmIdentifier_ED448(WPACKET *pkt, int cont, ECX_KEY *ec) { return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, ossl_der_oid_id_Ed448, sizeof(ossl_der_oid_id_Ed448)) && ossl_DER_w_end_sequence(pkt, cont); }
der
openssl/providers/common/der/der_ecx_key.c
openssl
#include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_sm2.h" #define ossl_der_oid_id_sm2_with_sm3 ossl_der_oid_sm2_with_SM3 #define MD_CASE(name) \ case NID_##name: \ precompiled = ossl_der_oid_id_sm2_with_##name; \ precompiled_sz = sizeof(ossl_der_oid_id_sm2_with_##name); \ break; int ossl_DER_w_algorithmIdentifier_SM2_with_MD(WPACKET *pkt, int cont, EC_KEY *ec, int mdnid) { const unsigned char *precompiled = NULL; size_t precompiled_sz = 0; switch (mdnid) { MD_CASE(sm3); default: return 0; } return ossl_DER_w_begin_sequence(pkt, cont) && ossl_DER_w_precompiled(pkt, -1, precompiled, precompiled_sz) && ossl_DER_w_end_sequence(pkt, cont); }
der
openssl/providers/common/der/der_sm2_sig.c
openssl
#include "internal/deprecated.h" #include <openssl/obj_mac.h> #include "internal/packet.h" #include "prov/der_dsa.h" #define MD_CASE(name) \ case NID_##name: \ precompiled = ossl_der_oid_id_dsa_with_##name; \ precompiled_sz = sizeof(ossl_der_oid_id_dsa_with_##name); \ break; int ossl_DER_w_algorithmIdentifier_DSA_with_MD(WPACKET *pkt, int tag, DSA *dsa, int mdnid) { const unsigned char *precompiled = NULL; size_t precompiled_sz = 0; switch (mdnid) { MD_CASE(sha1); MD_CASE(sha224); MD_CASE(sha256); MD_CASE(sha384); MD_CASE(sha512); MD_CASE(sha3_224); MD_CASE(sha3_256); MD_CASE(sha3_384); MD_CASE(sha3_512); default: return 0; } return ossl_DER_w_begin_sequence(pkt, tag) && ossl_DER_w_precompiled(pkt, -1, precompiled, precompiled_sz) && ossl_DER_w_end_sequence(pkt, tag); }
der
openssl/providers/common/der/der_dsa_sig.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #ifdef _WIN32 # ifndef _WIN32_WINNT # define _WIN32_WINNT 0x0400 # endif # include <windows.h> # include <wincrypt.h> # include <stdio.h> # include <string.h> # include <stdlib.h> # include <malloc.h> # ifndef alloca # define alloca _alloca # endif # include <openssl/crypto.h> # ifndef OPENSSL_NO_CAPIENG # include <openssl/buffer.h> # include <openssl/bn.h> # include <openssl/rsa.h> # include <openssl/dsa.h> # if defined(CERT_KEY_PROV_INFO_PROP_ID) && \ defined(CERT_STORE_PROV_SYSTEM_A) && \ defined(CERT_STORE_READONLY_FLAG) # define __COMPILE_CAPIENG # endif # endif #endif #ifdef __COMPILE_CAPIENG # undef X509_EXTENSIONS # ifndef CERT_STORE_OPEN_EXISTING_FLAG # define CERT_STORE_OPEN_EXISTING_FLAG 0x00004000 # endif # ifndef CERT_STORE_CREATE_NEW_FLAG # define CERT_STORE_CREATE_NEW_FLAG 0x00002000 # endif # ifndef CERT_SYSTEM_STORE_CURRENT_USER # define CERT_SYSTEM_STORE_CURRENT_USER 0x00010000 # endif # ifndef ALG_SID_SHA_256 # define ALG_SID_SHA_256 12 # endif # ifndef ALG_SID_SHA_384 # define ALG_SID_SHA_384 13 # endif # ifndef ALG_SID_SHA_512 # define ALG_SID_SHA_512 14 # endif # ifndef CALG_SHA_256 # define CALG_SHA_256 (ALG_CLASS_HASH | ALG_TYPE_ANY | ALG_SID_SHA_256) # endif # ifndef CALG_SHA_384 # define CALG_SHA_384 (ALG_CLASS_HASH | ALG_TYPE_ANY | ALG_SID_SHA_384) # endif # ifndef CALG_SHA_512 # define CALG_SHA_512 (ALG_CLASS_HASH | ALG_TYPE_ANY | ALG_SID_SHA_512) # endif # ifndef PROV_RSA_AES # define PROV_RSA_AES 24 # endif # include <openssl/engine.h> # include <openssl/pem.h> # include <openssl/x509v3.h> # include "e_capi_err.h" # include "e_capi_err.c" static const char *engine_capi_id = "capi"; static const char *engine_capi_name = "CryptoAPI ENGINE"; typedef struct CAPI_CTX_st CAPI_CTX; typedef struct CAPI_KEY_st CAPI_KEY; static void capi_addlasterror(void); static void capi_adderror(DWORD err); static void CAPI_trace(CAPI_CTX *ctx, char *format, ...); static int capi_list_providers(CAPI_CTX *ctx, BIO *out); static int capi_list_containers(CAPI_CTX *ctx, BIO *out); int capi_list_certs(CAPI_CTX *ctx, BIO *out, char *storename); void capi_free_key(CAPI_KEY *key); static PCCERT_CONTEXT capi_find_cert(CAPI_CTX *ctx, const char *id, HCERTSTORE hstore); CAPI_KEY *capi_find_key(CAPI_CTX *ctx, const char *id); static EVP_PKEY *capi_load_privkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, void *callback_data); static int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, const RSA *rsa); static int capi_rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding); static int capi_rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding); static int capi_rsa_free(RSA *rsa); # ifndef OPENSSL_NO_DSA static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, DSA *dsa); static int capi_dsa_free(DSA *dsa); # endif static int capi_load_ssl_client_cert(ENGINE *e, SSL *ssl, STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data); static int cert_select_simple(ENGINE *e, SSL *ssl, STACK_OF(X509) *certs); # ifdef OPENSSL_CAPIENG_DIALOG static int cert_select_dialog(ENGINE *e, SSL *ssl, STACK_OF(X509) *certs); # endif void engine_load_capi_int(void); typedef PCCERT_CONTEXT(WINAPI *CERTDLG)(HCERTSTORE, HWND, LPCWSTR, LPCWSTR, DWORD, DWORD, void *); typedef HWND(WINAPI *GETCONSWIN)(void); # define CAPI_DBG_TRACE 2 # define CAPI_DBG_ERROR 1 struct CAPI_CTX_st { int debug_level; char *debug_file; DWORD keytype; LPSTR cspname; DWORD csptype; LPSTR storename; LPSTR ssl_client_store; DWORD store_flags; # define CAPI_LU_SUBSTR 1 # define CAPI_LU_FNAME 2 # define CAPI_LU_CONTNAME 3 int lookup_method; # define CAPI_DMP_SUMMARY 0x1 # define CAPI_DMP_FNAME 0x2 # define CAPI_DMP_FULL 0x4 # define CAPI_DMP_PEM 0x8 # define CAPI_DMP_PSKEY 0x10 # define CAPI_DMP_PKEYINFO 0x20 DWORD dump_flags; int (*client_cert_select) (ENGINE *e, SSL *ssl, STACK_OF(X509) *certs); CERTDLG certselectdlg; GETCONSWIN getconswindow; }; static CAPI_CTX *capi_ctx_new(void); static void capi_ctx_free(CAPI_CTX *ctx); static int capi_ctx_set_provname(CAPI_CTX *ctx, LPSTR pname, DWORD type, int check); static int capi_ctx_set_provname_idx(CAPI_CTX *ctx, int idx); # define CAPI_CMD_LIST_CERTS ENGINE_CMD_BASE # define CAPI_CMD_LOOKUP_CERT (ENGINE_CMD_BASE + 1) # define CAPI_CMD_DEBUG_LEVEL (ENGINE_CMD_BASE + 2) # define CAPI_CMD_DEBUG_FILE (ENGINE_CMD_BASE + 3) # define CAPI_CMD_KEYTYPE (ENGINE_CMD_BASE + 4) # define CAPI_CMD_LIST_CSPS (ENGINE_CMD_BASE + 5) # define CAPI_CMD_SET_CSP_IDX (ENGINE_CMD_BASE + 6) # define CAPI_CMD_SET_CSP_NAME (ENGINE_CMD_BASE + 7) # define CAPI_CMD_SET_CSP_TYPE (ENGINE_CMD_BASE + 8) # define CAPI_CMD_LIST_CONTAINERS (ENGINE_CMD_BASE + 9) # define CAPI_CMD_LIST_OPTIONS (ENGINE_CMD_BASE + 10) # define CAPI_CMD_LOOKUP_METHOD (ENGINE_CMD_BASE + 11) # define CAPI_CMD_STORE_NAME (ENGINE_CMD_BASE + 12) # define CAPI_CMD_STORE_FLAGS (ENGINE_CMD_BASE + 13) static const ENGINE_CMD_DEFN capi_cmd_defns[] = { {CAPI_CMD_LIST_CERTS, "list_certs", "List all certificates in store", ENGINE_CMD_FLAG_NO_INPUT}, {CAPI_CMD_LOOKUP_CERT, "lookup_cert", "Lookup and output certificates", ENGINE_CMD_FLAG_STRING}, {CAPI_CMD_DEBUG_LEVEL, "debug_level", "debug level (1=errors, 2=trace)", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_DEBUG_FILE, "debug_file", "debugging filename)", ENGINE_CMD_FLAG_STRING}, {CAPI_CMD_KEYTYPE, "key_type", "Key type: 1=AT_KEYEXCHANGE (default), 2=AT_SIGNATURE", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_LIST_CSPS, "list_csps", "List all CSPs", ENGINE_CMD_FLAG_NO_INPUT}, {CAPI_CMD_SET_CSP_IDX, "csp_idx", "Set CSP by index", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_SET_CSP_NAME, "csp_name", "Set CSP name, (default CSP used if not specified)", ENGINE_CMD_FLAG_STRING}, {CAPI_CMD_SET_CSP_TYPE, "csp_type", "Set CSP type, (default RSA_PROV_FULL)", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_LIST_CONTAINERS, "list_containers", "list container names", ENGINE_CMD_FLAG_NO_INPUT}, {CAPI_CMD_LIST_OPTIONS, "list_options", "Set list options (1=summary,2=friendly name, 4=full printout, 8=PEM output, 16=XXX, " "32=private key info)", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_LOOKUP_METHOD, "lookup_method", "Set key lookup method (1=substring, 2=friendlyname, 3=container name)", ENGINE_CMD_FLAG_NUMERIC}, {CAPI_CMD_STORE_NAME, "store_name", "certificate store name, default \"MY\"", ENGINE_CMD_FLAG_STRING}, {CAPI_CMD_STORE_FLAGS, "store_flags", "Certificate store flags: 1 = system store", ENGINE_CMD_FLAG_NUMERIC}, {0, NULL, NULL, 0} }; static int capi_idx = -1; static int rsa_capi_idx = -1; static int dsa_capi_idx = -1; static int cert_capi_idx = -1; static int capi_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void)) { int ret = 1; CAPI_CTX *ctx; BIO *out; LPSTR tmpstr; if (capi_idx == -1) { CAPIerr(CAPI_F_CAPI_CTRL, CAPI_R_ENGINE_NOT_INITIALIZED); return 0; } ctx = ENGINE_get_ex_data(e, capi_idx); out = BIO_new_fp(stdout, BIO_NOCLOSE); if (out == NULL) { CAPIerr(CAPI_F_CAPI_CTRL, CAPI_R_FILE_OPEN_ERROR); return 0; } switch (cmd) { case CAPI_CMD_LIST_CSPS: ret = capi_list_providers(ctx, out); break; case CAPI_CMD_LIST_CERTS: ret = capi_list_certs(ctx, out, NULL); break; case CAPI_CMD_LOOKUP_CERT: ret = capi_list_certs(ctx, out, p); break; case CAPI_CMD_LIST_CONTAINERS: ret = capi_list_containers(ctx, out); break; case CAPI_CMD_STORE_NAME: tmpstr = OPENSSL_strdup(p); if (tmpstr != NULL) { OPENSSL_free(ctx->storename); ctx->storename = tmpstr; CAPI_trace(ctx, "Setting store name to %s\n", p); } else { ret = 0; } break; case CAPI_CMD_STORE_FLAGS: if (i & 1) { ctx->store_flags |= CERT_SYSTEM_STORE_LOCAL_MACHINE; ctx->store_flags &= ~CERT_SYSTEM_STORE_CURRENT_USER; } else { ctx->store_flags |= CERT_SYSTEM_STORE_CURRENT_USER; ctx->store_flags &= ~CERT_SYSTEM_STORE_LOCAL_MACHINE; } CAPI_trace(ctx, "Setting flags to %d\n", i); break; case CAPI_CMD_DEBUG_LEVEL: ctx->debug_level = (int)i; CAPI_trace(ctx, "Setting debug level to %d\n", ctx->debug_level); break; case CAPI_CMD_DEBUG_FILE: tmpstr = OPENSSL_strdup(p); if (tmpstr != NULL) { ctx->debug_file = tmpstr; CAPI_trace(ctx, "Setting debug file to %s\n", ctx->debug_file); } else { ret = 0; } break; case CAPI_CMD_KEYTYPE: ctx->keytype = i; CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype); break; case CAPI_CMD_SET_CSP_IDX: ret = capi_ctx_set_provname_idx(ctx, i); break; case CAPI_CMD_LIST_OPTIONS: ctx->dump_flags = i; break; case CAPI_CMD_LOOKUP_METHOD: if (i < 1 || i > 3) { CAPIerr(CAPI_F_CAPI_CTRL, CAPI_R_INVALID_LOOKUP_METHOD); BIO_free(out); return 0; } ctx->lookup_method = i; break; case CAPI_CMD_SET_CSP_NAME: ret = capi_ctx_set_provname(ctx, p, ctx->csptype, 1); break; case CAPI_CMD_SET_CSP_TYPE: ctx->csptype = i; break; default: CAPIerr(CAPI_F_CAPI_CTRL, CAPI_R_UNKNOWN_COMMAND); ret = 0; } BIO_free(out); return ret; } static RSA_METHOD *capi_rsa_method = NULL; # ifndef OPENSSL_NO_DSA static DSA_METHOD *capi_dsa_method = NULL; # endif static int use_aes_csp = 0; static const WCHAR rsa_aes_cspname[] = L"Microsoft Enhanced RSA and AES Cryptographic Provider"; static const WCHAR rsa_enh_cspname[] = L"Microsoft Enhanced Cryptographic Provider v1.0"; static int capi_init(ENGINE *e) { CAPI_CTX *ctx; const RSA_METHOD *ossl_rsa_meth; # ifndef OPENSSL_NO_DSA const DSA_METHOD *ossl_dsa_meth; # endif HCRYPTPROV hprov; if (capi_idx < 0) { capi_idx = ENGINE_get_ex_new_index(0, NULL, NULL, NULL, 0); if (capi_idx < 0) { CAPIerr(CAPI_F_CAPI_INIT, ERR_R_ENGINE_LIB); goto err; } cert_capi_idx = X509_get_ex_new_index(0, NULL, NULL, NULL, 0); rsa_capi_idx = RSA_get_ex_new_index(0, NULL, NULL, NULL, 0); ossl_rsa_meth = RSA_PKCS1_OpenSSL(); if (!RSA_meth_set_pub_enc(capi_rsa_method, RSA_meth_get_pub_enc(ossl_rsa_meth)) || !RSA_meth_set_pub_dec(capi_rsa_method, RSA_meth_get_pub_dec(ossl_rsa_meth)) || !RSA_meth_set_priv_enc(capi_rsa_method, capi_rsa_priv_enc) || !RSA_meth_set_priv_dec(capi_rsa_method, capi_rsa_priv_dec) || !RSA_meth_set_mod_exp(capi_rsa_method, RSA_meth_get_mod_exp(ossl_rsa_meth)) || !RSA_meth_set_bn_mod_exp(capi_rsa_method, RSA_meth_get_bn_mod_exp(ossl_rsa_meth)) || !RSA_meth_set_finish(capi_rsa_method, capi_rsa_free) || !RSA_meth_set_sign(capi_rsa_method, capi_rsa_sign)) { CAPIerr(CAPI_F_CAPI_INIT, ERR_R_RSA_LIB); goto err; } # ifndef OPENSSL_NO_DSA dsa_capi_idx = DSA_get_ex_new_index(0, NULL, NULL, NULL, 0); ossl_dsa_meth = DSA_OpenSSL(); if (!DSA_meth_set_sign(capi_dsa_method, capi_dsa_do_sign) || !DSA_meth_set_verify(capi_dsa_method, DSA_meth_get_verify(ossl_dsa_meth)) || !DSA_meth_set_finish(capi_dsa_method, capi_dsa_free) || !DSA_meth_set_mod_exp(capi_dsa_method, DSA_meth_get_mod_exp(ossl_dsa_meth)) || !DSA_meth_set_bn_mod_exp(capi_dsa_method, DSA_meth_get_bn_mod_exp(ossl_dsa_meth))) { CAPIerr(CAPI_F_CAPI_INIT, ERR_R_DSA_LIB); goto err; } # endif } ctx = capi_ctx_new(); if (ctx == NULL) { CAPIerr(CAPI_F_CAPI_INIT, ERR_R_CAPI_LIB); goto err; } ENGINE_set_ex_data(e, capi_idx, ctx); # ifdef OPENSSL_CAPIENG_DIALOG { HMODULE cryptui = LoadLibrary(TEXT("CRYPTUI.DLL")); HMODULE kernel = GetModuleHandle(TEXT("KERNEL32.DLL")); if (cryptui) ctx->certselectdlg = (CERTDLG) GetProcAddress(cryptui, "CryptUIDlgSelectCertificateFromStore"); if (kernel) ctx->getconswindow = (GETCONSWIN) GetProcAddress(kernel, "GetConsoleWindow"); if (cryptui && !OPENSSL_isservice()) ctx->client_cert_select = cert_select_dialog; } # endif if (CryptAcquireContextW(&hprov, NULL, rsa_aes_cspname, PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { use_aes_csp = 1; CryptReleaseContext(hprov, 0); } return 1; err: return 0; } static int capi_destroy(ENGINE *e) { RSA_meth_free(capi_rsa_method); capi_rsa_method = NULL; # ifndef OPENSSL_NO_DSA DSA_meth_free(capi_dsa_method); capi_dsa_method = NULL; # endif ERR_unload_CAPI_strings(); return 1; } static int capi_finish(ENGINE *e) { CAPI_CTX *ctx; ctx = ENGINE_get_ex_data(e, capi_idx); capi_ctx_free(ctx); ENGINE_set_ex_data(e, capi_idx, NULL); return 1; } struct CAPI_KEY_st { PCCERT_CONTEXT pcert; HCRYPTPROV hprov; HCRYPTKEY key; DWORD keyspec; }; static int bind_capi(ENGINE *e) { capi_rsa_method = RSA_meth_new("CryptoAPI RSA method", 0); if (capi_rsa_method == NULL) return 0; # ifndef OPENSSL_NO_DSA capi_dsa_method = DSA_meth_new("CryptoAPI DSA method", 0); if (capi_dsa_method == NULL) goto memerr; # endif if (!ENGINE_set_id(e, engine_capi_id) || !ENGINE_set_name(e, engine_capi_name) || !ENGINE_set_flags(e, ENGINE_FLAGS_NO_REGISTER_ALL) || !ENGINE_set_init_function(e, capi_init) || !ENGINE_set_finish_function(e, capi_finish) || !ENGINE_set_destroy_function(e, capi_destroy) || !ENGINE_set_RSA(e, capi_rsa_method) # ifndef OPENSSL_NO_DSA || !ENGINE_set_DSA(e, capi_dsa_method) # endif || !ENGINE_set_load_privkey_function(e, capi_load_privkey) || !ENGINE_set_load_ssl_client_cert_function(e, capi_load_ssl_client_cert) || !ENGINE_set_cmd_defns(e, capi_cmd_defns) || !ENGINE_set_ctrl_function(e, capi_ctrl)) goto memerr; ERR_load_CAPI_strings(); return 1; memerr: RSA_meth_free(capi_rsa_method); capi_rsa_method = NULL; # ifndef OPENSSL_NO_DSA DSA_meth_free(capi_dsa_method); capi_dsa_method = NULL; # endif return 0; } # ifndef OPENSSL_NO_DYNAMIC_ENGINE static int bind_helper(ENGINE *e, const char *id) { if (id && (strcmp(id, engine_capi_id) != 0)) return 0; if (!bind_capi(e)) return 0; return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) # else static ENGINE *engine_capi(void) { ENGINE *ret = ENGINE_new(); if (ret == NULL) return NULL; if (!bind_capi(ret)) { ENGINE_free(ret); return NULL; } return ret; } void engine_load_capi_int(void) { ENGINE *toadd = engine_capi(); if (!toadd) return; ERR_set_mark(); ENGINE_add(toadd); ENGINE_free(toadd); ERR_pop_to_mark(); } # endif static int lend_tobn(BIGNUM *bn, unsigned char *bin, int binlen) { int i; for (i = 0; i < binlen / 2; i++) { unsigned char c; c = bin[i]; bin[i] = bin[binlen - i - 1]; bin[binlen - i - 1] = c; } if (!BN_bin2bn(bin, binlen, bn)) return 0; return 1; } static EVP_PKEY *capi_get_pkey(ENGINE *eng, CAPI_KEY *key) { unsigned char *pubkey = NULL; DWORD len; BLOBHEADER *bh; RSA *rkey = NULL; DSA *dkey = NULL; EVP_PKEY *ret = NULL; if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, NULL, &len)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_PUBKEY_EXPORT_LENGTH_ERROR); capi_addlasterror(); return NULL; } pubkey = OPENSSL_malloc(len); if (pubkey == NULL) goto err; if (!CryptExportKey(key->key, 0, PUBLICKEYBLOB, 0, pubkey, &len)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_PUBKEY_EXPORT_ERROR); capi_addlasterror(); goto err; } bh = (BLOBHEADER *) pubkey; if (bh->bType != PUBLICKEYBLOB) { CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_INVALID_PUBLIC_KEY_BLOB); goto err; } if (bh->aiKeyAlg == CALG_RSA_SIGN || bh->aiKeyAlg == CALG_RSA_KEYX) { RSAPUBKEY *rp; DWORD rsa_modlen; BIGNUM *e = NULL, *n = NULL; unsigned char *rsa_modulus; rp = (RSAPUBKEY *) (bh + 1); if (rp->magic != 0x31415352) { char magstr[10]; BIO_snprintf(magstr, 10, "%lx", rp->magic); CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_INVALID_RSA_PUBLIC_KEY_BLOB_MAGIC_NUMBER); ERR_add_error_data(2, "magic=0x", magstr); goto err; } rsa_modulus = (unsigned char *)(rp + 1); rkey = RSA_new_method(eng); if (!rkey) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_RSA_LIB); goto err; } e = BN_new(); n = BN_new(); if (e == NULL || n == NULL) { BN_free(e); BN_free(n); CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_BN_LIB); goto err; } RSA_set0_key(rkey, n, e, NULL); if (!BN_set_word(e, rp->pubexp)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_BN_LIB); goto err; } rsa_modlen = rp->bitlen / 8; if (!lend_tobn(n, rsa_modulus, rsa_modlen)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_BN_LIB); goto err; } RSA_set_ex_data(rkey, rsa_capi_idx, key); if ((ret = EVP_PKEY_new()) == NULL) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_EVP_LIB); goto err; } EVP_PKEY_assign_RSA(ret, rkey); rkey = NULL; # ifndef OPENSSL_NO_DSA } else if (bh->aiKeyAlg == CALG_DSS_SIGN) { DSSPUBKEY *dp; DWORD dsa_plen; unsigned char *btmp; BIGNUM *p, *q, *g, *pub_key; dp = (DSSPUBKEY *) (bh + 1); if (dp->magic != 0x31535344) { char magstr[10]; BIO_snprintf(magstr, 10, "%lx", dp->magic); CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_INVALID_DSA_PUBLIC_KEY_BLOB_MAGIC_NUMBER); ERR_add_error_data(2, "magic=0x", magstr); goto err; } dsa_plen = dp->bitlen / 8; btmp = (unsigned char *)(dp + 1); dkey = DSA_new_method(eng); if (!dkey) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_DSA_LIB); goto err; } p = BN_new(); q = BN_new(); g = BN_new(); pub_key = BN_new(); if (p == NULL || q == NULL || g == NULL || pub_key == NULL) { BN_free(p); BN_free(q); BN_free(g); BN_free(pub_key); CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_BN_LIB); goto err; } DSA_set0_pqg(dkey, p, q, g); DSA_set0_key(dkey, pub_key, NULL); if (!lend_tobn(p, btmp, dsa_plen)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_CAPI_LIB); goto err; } btmp += dsa_plen; if (!lend_tobn(q, btmp, 20)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_CAPI_LIB); goto err; } btmp += 20; if (!lend_tobn(g, btmp, dsa_plen)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_CAPI_LIB); goto err; } btmp += dsa_plen; if (!lend_tobn(pub_key, btmp, dsa_plen)) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_CAPI_LIB); goto err; } btmp += dsa_plen; DSA_set_ex_data(dkey, dsa_capi_idx, key); if ((ret = EVP_PKEY_new()) == NULL) { CAPIerr(CAPI_F_CAPI_GET_PKEY, ERR_R_EVP_LIB); goto err; } EVP_PKEY_assign_DSA(ret, dkey); dkey = NULL; # endif } else { char algstr[10]; BIO_snprintf(algstr, 10, "%ux", bh->aiKeyAlg); CAPIerr(CAPI_F_CAPI_GET_PKEY, CAPI_R_UNSUPPORTED_PUBLIC_KEY_ALGORITHM); ERR_add_error_data(2, "aiKeyAlg=0x", algstr); goto err; } err: OPENSSL_free(pubkey); if (!ret) { RSA_free(rkey); # ifndef OPENSSL_NO_DSA DSA_free(dkey); # endif } return ret; } static EVP_PKEY *capi_load_privkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, void *callback_data) { CAPI_CTX *ctx; CAPI_KEY *key; EVP_PKEY *ret; ctx = ENGINE_get_ex_data(eng, capi_idx); if (!ctx) { CAPIerr(CAPI_F_CAPI_LOAD_PRIVKEY, CAPI_R_CANT_FIND_CAPI_CONTEXT); return NULL; } key = capi_find_key(ctx, key_id); if (!key) return NULL; ret = capi_get_pkey(eng, key); if (!ret) capi_free_key(key); return ret; } int capi_rsa_priv_enc(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) { CAPIerr(CAPI_F_CAPI_RSA_PRIV_ENC, CAPI_R_FUNCTION_NOT_SUPPORTED); return -1; } int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, unsigned char *sigret, unsigned int *siglen, const RSA *rsa) { ALG_ID alg; HCRYPTHASH hash; DWORD slen; unsigned int i; int ret = -1; CAPI_KEY *capi_key; CAPI_CTX *ctx; ctx = ENGINE_get_ex_data(RSA_get0_engine(rsa), capi_idx); CAPI_trace(ctx, "Called CAPI_rsa_sign()\n"); capi_key = RSA_get_ex_data(rsa, rsa_capi_idx); if (!capi_key) { CAPIerr(CAPI_F_CAPI_RSA_SIGN, CAPI_R_CANT_GET_KEY); return -1; } switch (dtype) { case NID_sha256: alg = CALG_SHA_256; break; case NID_sha384: alg = CALG_SHA_384; break; case NID_sha512: alg = CALG_SHA_512; break; case NID_sha1: alg = CALG_SHA1; break; case NID_md5: alg = CALG_MD5; break; case NID_md5_sha1: alg = CALG_SSL3_SHAMD5; break; default: { char algstr[10]; BIO_snprintf(algstr, 10, "%x", dtype); CAPIerr(CAPI_F_CAPI_RSA_SIGN, CAPI_R_UNSUPPORTED_ALGORITHM_NID); ERR_add_error_data(2, "NID=0x", algstr); return -1; } } if (!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash)) { CAPIerr(CAPI_F_CAPI_RSA_SIGN, CAPI_R_CANT_CREATE_HASH_OBJECT); capi_addlasterror(); return -1; } if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)m, 0)) { CAPIerr(CAPI_F_CAPI_RSA_SIGN, CAPI_R_CANT_SET_HASH_VALUE); capi_addlasterror(); goto err; } slen = RSA_size(rsa); if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, sigret, &slen)) { CAPIerr(CAPI_F_CAPI_RSA_SIGN, CAPI_R_ERROR_SIGNING_HASH); capi_addlasterror(); goto err; } else { ret = 1; for (i = 0; i < slen / 2; i++) { unsigned char c; c = sigret[i]; sigret[i] = sigret[slen - i - 1]; sigret[slen - i - 1] = c; } *siglen = slen; } err: CryptDestroyHash(hash); return ret; } int capi_rsa_priv_dec(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding) { int i; unsigned char *tmpbuf; CAPI_KEY *capi_key; CAPI_CTX *ctx; DWORD flags = 0; DWORD dlen; if (flen <= 0) return flen; ctx = ENGINE_get_ex_data(RSA_get0_engine(rsa), capi_idx); CAPI_trace(ctx, "Called capi_rsa_priv_dec()\n"); capi_key = RSA_get_ex_data(rsa, rsa_capi_idx); if (!capi_key) { CAPIerr(CAPI_F_CAPI_RSA_PRIV_DEC, CAPI_R_CANT_GET_KEY); return -1; } switch (padding) { case RSA_PKCS1_PADDING: break; #ifdef CRYPT_DECRYPT_RSA_NO_PADDING_CHECK case RSA_NO_PADDING: flags = CRYPT_DECRYPT_RSA_NO_PADDING_CHECK; break; #endif default: { char errstr[10]; BIO_snprintf(errstr, 10, "%d", padding); CAPIerr(CAPI_F_CAPI_RSA_PRIV_DEC, CAPI_R_UNSUPPORTED_PADDING); ERR_add_error_data(2, "padding=", errstr); return -1; } } if ((tmpbuf = OPENSSL_malloc(flen)) == NULL) return -1; for (i = 0; i < flen; i++) tmpbuf[flen - i - 1] = from[i]; dlen = flen; if (!CryptDecrypt(capi_key->key, 0, TRUE, flags, tmpbuf, &dlen)) { CAPIerr(CAPI_F_CAPI_RSA_PRIV_DEC, CAPI_R_DECRYPT_ERROR); capi_addlasterror(); OPENSSL_cleanse(tmpbuf, dlen); OPENSSL_free(tmpbuf); return -1; } else { memcpy(to, tmpbuf, (flen = (int)dlen)); } OPENSSL_cleanse(tmpbuf, flen); OPENSSL_free(tmpbuf); return flen; } static int capi_rsa_free(RSA *rsa) { CAPI_KEY *capi_key; capi_key = RSA_get_ex_data(rsa, rsa_capi_idx); capi_free_key(capi_key); RSA_set_ex_data(rsa, rsa_capi_idx, 0); return 1; } # ifndef OPENSSL_NO_DSA static DSA_SIG *capi_dsa_do_sign(const unsigned char *digest, int dlen, DSA *dsa) { HCRYPTHASH hash; DWORD slen; DSA_SIG *ret = NULL; CAPI_KEY *capi_key; CAPI_CTX *ctx; unsigned char csigbuf[40]; ctx = ENGINE_get_ex_data(DSA_get0_engine(dsa), capi_idx); CAPI_trace(ctx, "Called CAPI_dsa_do_sign()\n"); capi_key = DSA_get_ex_data(dsa, dsa_capi_idx); if (!capi_key) { CAPIerr(CAPI_F_CAPI_DSA_DO_SIGN, CAPI_R_CANT_GET_KEY); return NULL; } if (dlen != 20) { CAPIerr(CAPI_F_CAPI_DSA_DO_SIGN, CAPI_R_INVALID_DIGEST_LENGTH); return NULL; } if (!CryptCreateHash(capi_key->hprov, CALG_SHA1, 0, 0, &hash)) { CAPIerr(CAPI_F_CAPI_DSA_DO_SIGN, CAPI_R_CANT_CREATE_HASH_OBJECT); capi_addlasterror(); return NULL; } if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)digest, 0)) { CAPIerr(CAPI_F_CAPI_DSA_DO_SIGN, CAPI_R_CANT_SET_HASH_VALUE); capi_addlasterror(); goto err; } slen = sizeof(csigbuf); if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, csigbuf, &slen)) { CAPIerr(CAPI_F_CAPI_DSA_DO_SIGN, CAPI_R_ERROR_SIGNING_HASH); capi_addlasterror(); goto err; } else { BIGNUM *r = BN_new(), *s = BN_new(); if (r == NULL || s == NULL || !lend_tobn(r, csigbuf, 20) || !lend_tobn(s, csigbuf + 20, 20) || (ret = DSA_SIG_new()) == NULL) { BN_free(r); BN_free(s); goto err; } DSA_SIG_set0(ret, r, s); } err: OPENSSL_cleanse(csigbuf, 40); CryptDestroyHash(hash); return ret; } static int capi_dsa_free(DSA *dsa) { CAPI_KEY *capi_key; capi_key = DSA_get_ex_data(dsa, dsa_capi_idx); capi_free_key(capi_key); DSA_set_ex_data(dsa, dsa_capi_idx, 0); return 1; } # endif static void capi_vtrace(CAPI_CTX *ctx, int level, char *format, va_list argptr) { BIO *out; if (!ctx || (ctx->debug_level < level) || (!ctx->debug_file)) return; out = BIO_new_file(ctx->debug_file, "a+"); if (out == NULL) { CAPIerr(CAPI_F_CAPI_VTRACE, CAPI_R_FILE_OPEN_ERROR); return; } BIO_vprintf(out, format, argptr); BIO_free(out); } static void CAPI_trace(CAPI_CTX *ctx, char *format, ...) { va_list args; va_start(args, format); capi_vtrace(ctx, CAPI_DBG_TRACE, format, args); va_end(args); } static void capi_addlasterror(void) { capi_adderror(GetLastError()); } static void capi_adderror(DWORD err) { char errstr[10]; BIO_snprintf(errstr, 10, "%lX", err); ERR_add_error_data(2, "Error code= 0x", errstr); } static char *wide_to_asc(LPCWSTR wstr) { char *str; int len_0, sz; size_t len_1; if (!wstr) return NULL; len_1 = wcslen(wstr) + 1; if (len_1 > INT_MAX) { CAPIerr(CAPI_F_WIDE_TO_ASC, CAPI_R_FUNCTION_NOT_SUPPORTED); return NULL; } len_0 = (int)len_1; sz = WideCharToMultiByte(CP_ACP, 0, wstr, len_0, NULL, 0, NULL, NULL); if (!sz) { CAPIerr(CAPI_F_WIDE_TO_ASC, CAPI_R_WIN32_ERROR); return NULL; } str = OPENSSL_malloc(sz); if (str == NULL) return NULL; if (!WideCharToMultiByte(CP_ACP, 0, wstr, len_0, str, sz, NULL, NULL)) { OPENSSL_free(str); CAPIerr(CAPI_F_WIDE_TO_ASC, CAPI_R_WIN32_ERROR); return NULL; } return str; } static int capi_get_provname(CAPI_CTX *ctx, LPSTR *pname, DWORD *ptype, DWORD idx) { DWORD len, err; LPTSTR name; CAPI_trace(ctx, "capi_get_provname, index=%d\n", idx); if (!CryptEnumProviders(idx, NULL, 0, ptype, NULL, &len)) { err = GetLastError(); if (err == ERROR_NO_MORE_ITEMS) return 2; CAPIerr(CAPI_F_CAPI_GET_PROVNAME, CAPI_R_CRYPTENUMPROVIDERS_ERROR); capi_adderror(err); return 0; } name = OPENSSL_malloc(len); if (name == NULL) return 0; if (!CryptEnumProviders(idx, NULL, 0, ptype, name, &len)) { err = GetLastError(); OPENSSL_free(name); if (err == ERROR_NO_MORE_ITEMS) return 2; CAPIerr(CAPI_F_CAPI_GET_PROVNAME, CAPI_R_CRYPTENUMPROVIDERS_ERROR); capi_adderror(err); return 0; } if (sizeof(TCHAR) != sizeof(char)) { *pname = wide_to_asc((WCHAR *)name); OPENSSL_free(name); if (*pname == NULL) return 0; } else { *pname = (char *)name; } CAPI_trace(ctx, "capi_get_provname, returned name=%s, type=%d\n", *pname, *ptype); return 1; } static int capi_list_providers(CAPI_CTX *ctx, BIO *out) { DWORD idx, ptype; int ret; LPSTR provname = NULL; CAPI_trace(ctx, "capi_list_providers\n"); BIO_printf(out, "Available CSPs:\n"); for (idx = 0;; idx++) { ret = capi_get_provname(ctx, &provname, &ptype, idx); if (ret == 2) break; if (ret == 0) break; BIO_printf(out, "%lu. %s, type %lu\n", idx, provname, ptype); OPENSSL_free(provname); } return 1; } static int capi_list_containers(CAPI_CTX *ctx, BIO *out) { int ret = 1; HCRYPTPROV hprov; DWORD err, idx, flags, buflen = 0, clen; LPSTR cname; LPWSTR cspname = NULL; CAPI_trace(ctx, "Listing containers CSP=%s, type = %d\n", ctx->cspname, ctx->csptype); if (ctx->cspname != NULL) { if ((clen = MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1, NULL, 0))) { cspname = alloca(clen * sizeof(WCHAR)); MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1, (WCHAR *)cspname, clen); } if (cspname == NULL) { CAPIerr(CAPI_F_CAPI_LIST_CONTAINERS, ERR_R_MALLOC_FAILURE); capi_addlasterror(); return 0; } } if (!CryptAcquireContextW(&hprov, NULL, cspname, ctx->csptype, CRYPT_VERIFYCONTEXT)) { CAPIerr(CAPI_F_CAPI_LIST_CONTAINERS, CAPI_R_CRYPTACQUIRECONTEXT_ERROR); capi_addlasterror(); return 0; } if (!CryptGetProvParam(hprov, PP_ENUMCONTAINERS, NULL, &buflen, CRYPT_FIRST)) { CAPIerr(CAPI_F_CAPI_LIST_CONTAINERS, CAPI_R_ENUMCONTAINERS_ERROR); capi_addlasterror(); CryptReleaseContext(hprov, 0); return 0; } CAPI_trace(ctx, "Got max container len %d\n", buflen); if (buflen == 0) buflen = 1024; cname = OPENSSL_malloc(buflen); if (cname == NULL) goto err; for (idx = 0;; idx++) { clen = buflen; cname[0] = 0; if (idx == 0) flags = CRYPT_FIRST; else flags = 0; if (!CryptGetProvParam(hprov, PP_ENUMCONTAINERS, (BYTE *)cname, &clen, flags)) { err = GetLastError(); if (err == ERROR_NO_MORE_ITEMS) goto done; CAPIerr(CAPI_F_CAPI_LIST_CONTAINERS, CAPI_R_ENUMCONTAINERS_ERROR); capi_adderror(err); goto err; } CAPI_trace(ctx, "Container name %s, len=%d, index=%d, flags=%d\n", cname, clen, idx, flags); if (!cname[0] && (clen == buflen)) { CAPI_trace(ctx, "Enumerate bug: using workaround\n"); goto done; } BIO_printf(out, "%lu. %s\n", idx, cname); } err: ret = 0; done: OPENSSL_free(cname); CryptReleaseContext(hprov, 0); return ret; } static CRYPT_KEY_PROV_INFO *capi_get_prov_info(CAPI_CTX *ctx, PCCERT_CONTEXT cert) { DWORD len; CRYPT_KEY_PROV_INFO *pinfo; if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, NULL, &len)) return NULL; pinfo = OPENSSL_malloc(len); if (pinfo == NULL) return NULL; if (!CertGetCertificateContextProperty(cert, CERT_KEY_PROV_INFO_PROP_ID, pinfo, &len)) { CAPIerr(CAPI_F_CAPI_GET_PROV_INFO, CAPI_R_ERROR_GETTING_KEY_PROVIDER_INFO); capi_addlasterror(); OPENSSL_free(pinfo); return NULL; } return pinfo; } static void capi_dump_prov_info(CAPI_CTX *ctx, BIO *out, CRYPT_KEY_PROV_INFO *pinfo) { char *provname = NULL, *contname = NULL; if (pinfo == NULL) { BIO_printf(out, " No Private Key\n"); return; } provname = wide_to_asc(pinfo->pwszProvName); contname = wide_to_asc(pinfo->pwszContainerName); if (provname == NULL || contname == NULL) goto err; BIO_printf(out, " Private Key Info:\n"); BIO_printf(out, " Provider Name: %s, Provider Type %lu\n", provname, pinfo->dwProvType); BIO_printf(out, " Container Name: %s, Key Type %lu\n", contname, pinfo->dwKeySpec); err: OPENSSL_free(provname); OPENSSL_free(contname); } static char *capi_cert_get_fname(CAPI_CTX *ctx, PCCERT_CONTEXT cert) { LPWSTR wfname; DWORD dlen; CAPI_trace(ctx, "capi_cert_get_fname\n"); if (!CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, NULL, &dlen)) return NULL; wfname = OPENSSL_malloc(dlen); if (wfname == NULL) return NULL; if (CertGetCertificateContextProperty(cert, CERT_FRIENDLY_NAME_PROP_ID, wfname, &dlen)) { char *fname = wide_to_asc(wfname); OPENSSL_free(wfname); return fname; } CAPIerr(CAPI_F_CAPI_CERT_GET_FNAME, CAPI_R_ERROR_GETTING_FRIENDLY_NAME); capi_addlasterror(); OPENSSL_free(wfname); return NULL; } static void capi_dump_cert(CAPI_CTX *ctx, BIO *out, PCCERT_CONTEXT cert) { X509 *x; const unsigned char *p; unsigned long flags = ctx->dump_flags; if (flags & CAPI_DMP_FNAME) { char *fname; fname = capi_cert_get_fname(ctx, cert); if (fname) { BIO_printf(out, " Friendly Name \"%s\"\n", fname); OPENSSL_free(fname); } else { BIO_printf(out, " <No Friendly Name>\n"); } } p = cert->pbCertEncoded; x = d2i_X509(NULL, &p, cert->cbCertEncoded); if (!x) BIO_printf(out, " <Can't parse certificate>\n"); if (flags & CAPI_DMP_SUMMARY) { BIO_printf(out, " Subject: "); X509_NAME_print_ex(out, X509_get_subject_name(x), 0, XN_FLAG_ONELINE); BIO_printf(out, "\n Issuer: "); X509_NAME_print_ex(out, X509_get_issuer_name(x), 0, XN_FLAG_ONELINE); BIO_printf(out, "\n"); } if (flags & CAPI_DMP_FULL) X509_print_ex(out, x, XN_FLAG_ONELINE, 0); if (flags & CAPI_DMP_PKEYINFO) { CRYPT_KEY_PROV_INFO *pinfo; pinfo = capi_get_prov_info(ctx, cert); capi_dump_prov_info(ctx, out, pinfo); OPENSSL_free(pinfo); } if (flags & CAPI_DMP_PEM) PEM_write_bio_X509(out, x); X509_free(x); } static HCERTSTORE capi_open_store(CAPI_CTX *ctx, char *storename) { HCERTSTORE hstore; if (!storename) storename = ctx->storename; if (!storename) storename = "MY"; CAPI_trace(ctx, "Opening certificate store %s\n", storename); hstore = CertOpenStore(CERT_STORE_PROV_SYSTEM_A, 0, 0, ctx->store_flags, storename); if (!hstore) { CAPIerr(CAPI_F_CAPI_OPEN_STORE, CAPI_R_ERROR_OPENING_STORE); capi_addlasterror(); } return hstore; } int capi_list_certs(CAPI_CTX *ctx, BIO *out, char *id) { char *storename; int idx; int ret = 1; HCERTSTORE hstore; PCCERT_CONTEXT cert = NULL; storename = ctx->storename; if (!storename) storename = "MY"; CAPI_trace(ctx, "Listing certs for store %s\n", storename); hstore = capi_open_store(ctx, storename); if (!hstore) return 0; if (id) { cert = capi_find_cert(ctx, id, hstore); if (!cert) { ret = 0; goto err; } capi_dump_cert(ctx, out, cert); CertFreeCertificateContext(cert); } else { for (idx = 0;; idx++) { cert = CertEnumCertificatesInStore(hstore, cert); if (!cert) break; BIO_printf(out, "Certificate %d\n", idx); capi_dump_cert(ctx, out, cert); } } err: CertCloseStore(hstore, 0); return ret; } static PCCERT_CONTEXT capi_find_cert(CAPI_CTX *ctx, const char *id, HCERTSTORE hstore) { PCCERT_CONTEXT cert = NULL; char *fname = NULL; int match; switch (ctx->lookup_method) { case CAPI_LU_SUBSTR: return CertFindCertificateInStore(hstore, X509_ASN_ENCODING, 0, CERT_FIND_SUBJECT_STR_A, id, NULL); case CAPI_LU_FNAME: for (;;) { cert = CertEnumCertificatesInStore(hstore, cert); if (!cert) return NULL; fname = capi_cert_get_fname(ctx, cert); if (fname) { if (strcmp(fname, id)) match = 0; else match = 1; OPENSSL_free(fname); if (match) return cert; } } default: return NULL; } } static CAPI_KEY *capi_get_key(CAPI_CTX *ctx, const WCHAR *contname, const WCHAR *provname, DWORD ptype, DWORD keyspec) { DWORD dwFlags = 0; CAPI_KEY *key = OPENSSL_malloc(sizeof(*key)); if (key == NULL) return NULL; if (ptype == PROV_RSA_FULL && use_aes_csp && wcscmp(provname, rsa_enh_cspname) == 0) { provname = rsa_aes_cspname; ptype = PROV_RSA_AES; } if (ctx && ctx->debug_level >= CAPI_DBG_TRACE && ctx->debug_file) { char *_contname = wide_to_asc(contname); char *_provname = wide_to_asc(provname); CAPI_trace(ctx, "capi_get_key, contname=%s, provname=%s, type=%d\n", _contname, _provname, ptype); OPENSSL_free(_provname); OPENSSL_free(_contname); } if (ctx->store_flags & CERT_SYSTEM_STORE_LOCAL_MACHINE) dwFlags = CRYPT_MACHINE_KEYSET; if (!CryptAcquireContextW(&key->hprov, contname, provname, ptype, dwFlags)) { CAPIerr(CAPI_F_CAPI_GET_KEY, CAPI_R_CRYPTACQUIRECONTEXT_ERROR); capi_addlasterror(); goto err; } if (!CryptGetUserKey(key->hprov, keyspec, &key->key)) { CAPIerr(CAPI_F_CAPI_GET_KEY, CAPI_R_GETUSERKEY_ERROR); capi_addlasterror(); CryptReleaseContext(key->hprov, 0); goto err; } key->keyspec = keyspec; key->pcert = NULL; return key; err: OPENSSL_free(key); return NULL; } static CAPI_KEY *capi_get_cert_key(CAPI_CTX *ctx, PCCERT_CONTEXT cert) { CAPI_KEY *key = NULL; CRYPT_KEY_PROV_INFO *pinfo = NULL; pinfo = capi_get_prov_info(ctx, cert); if (pinfo != NULL) key = capi_get_key(ctx, pinfo->pwszContainerName, pinfo->pwszProvName, pinfo->dwProvType, pinfo->dwKeySpec); OPENSSL_free(pinfo); return key; } CAPI_KEY *capi_find_key(CAPI_CTX *ctx, const char *id) { PCCERT_CONTEXT cert; HCERTSTORE hstore; CAPI_KEY *key = NULL; switch (ctx->lookup_method) { case CAPI_LU_SUBSTR: case CAPI_LU_FNAME: hstore = capi_open_store(ctx, NULL); if (!hstore) return NULL; cert = capi_find_cert(ctx, id, hstore); if (cert) { key = capi_get_cert_key(ctx, cert); CertFreeCertificateContext(cert); } CertCloseStore(hstore, 0); break; case CAPI_LU_CONTNAME: { WCHAR *contname, *provname; DWORD len; if ((len = MultiByteToWideChar(CP_ACP, 0, id, -1, NULL, 0)) && (contname = alloca(len * sizeof(WCHAR)), MultiByteToWideChar(CP_ACP, 0, id, -1, contname, len)) && (len = MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1, NULL, 0)) && (provname = alloca(len * sizeof(WCHAR)), MultiByteToWideChar(CP_ACP, 0, ctx->cspname, -1, provname, len))) key = capi_get_key(ctx, contname, provname, ctx->csptype, ctx->keytype); } break; } return key; } void capi_free_key(CAPI_KEY *key) { if (!key) return; CryptDestroyKey(key->key); CryptReleaseContext(key->hprov, 0); if (key->pcert) CertFreeCertificateContext(key->pcert); OPENSSL_free(key); } static CAPI_CTX *capi_ctx_new(void) { CAPI_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->csptype = PROV_RSA_FULL; ctx->dump_flags = CAPI_DMP_SUMMARY | CAPI_DMP_FNAME; ctx->keytype = AT_KEYEXCHANGE; ctx->store_flags = CERT_STORE_OPEN_EXISTING_FLAG | CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER; ctx->lookup_method = CAPI_LU_SUBSTR; ctx->client_cert_select = cert_select_simple; return ctx; } static void capi_ctx_free(CAPI_CTX *ctx) { CAPI_trace(ctx, "Calling capi_ctx_free with %lx\n", ctx); if (!ctx) return; OPENSSL_free(ctx->cspname); OPENSSL_free(ctx->debug_file); OPENSSL_free(ctx->storename); OPENSSL_free(ctx->ssl_client_store); OPENSSL_free(ctx); } static int capi_ctx_set_provname(CAPI_CTX *ctx, LPSTR pname, DWORD type, int check) { LPSTR tmpcspname; CAPI_trace(ctx, "capi_ctx_set_provname, name=%s, type=%d\n", pname, type); if (check) { HCRYPTPROV hprov; LPWSTR name = NULL; DWORD len; if ((len = MultiByteToWideChar(CP_ACP, 0, pname, -1, NULL, 0))) { name = alloca(len * sizeof(WCHAR)); MultiByteToWideChar(CP_ACP, 0, pname, -1, (WCHAR *)name, len); } if (name == NULL || !CryptAcquireContextW(&hprov, NULL, name, type, CRYPT_VERIFYCONTEXT)) { CAPIerr(CAPI_F_CAPI_CTX_SET_PROVNAME, CAPI_R_CRYPTACQUIRECONTEXT_ERROR); capi_addlasterror(); return 0; } CryptReleaseContext(hprov, 0); } tmpcspname = OPENSSL_strdup(pname); if (tmpcspname == NULL) return 0; OPENSSL_free(ctx->cspname); ctx->cspname = tmpcspname; ctx->csptype = type; return 1; } static int capi_ctx_set_provname_idx(CAPI_CTX *ctx, int idx) { LPSTR pname; DWORD type; int res; if (capi_get_provname(ctx, &pname, &type, idx) != 1) return 0; res = capi_ctx_set_provname(ctx, pname, type, 0); OPENSSL_free(pname); return res; } static int cert_issuer_match(STACK_OF(X509_NAME) *ca_dn, X509 *x) { int i; X509_NAME *nm; if (sk_X509_NAME_num(ca_dn) <= 0) return 1; for (i = 0; i < sk_X509_NAME_num(ca_dn); i++) { nm = sk_X509_NAME_value(ca_dn, i); if (!X509_NAME_cmp(nm, X509_get_issuer_name(x))) return 1; } return 0; } static int capi_load_ssl_client_cert(ENGINE *e, SSL *ssl, STACK_OF(X509_NAME) *ca_dn, X509 **pcert, EVP_PKEY **pkey, STACK_OF(X509) **pother, UI_METHOD *ui_method, void *callback_data) { STACK_OF(X509) *certs = NULL; X509 *x; char *storename; const unsigned char *p; int i, client_cert_idx; HCERTSTORE hstore; PCCERT_CONTEXT cert = NULL, excert = NULL; CAPI_CTX *ctx; CAPI_KEY *key; ctx = ENGINE_get_ex_data(e, capi_idx); *pcert = NULL; *pkey = NULL; storename = ctx->ssl_client_store; if (!storename) storename = "MY"; hstore = capi_open_store(ctx, storename); if (!hstore) return 0; for (i = 0;; i++) { cert = CertEnumCertificatesInStore(hstore, cert); if (!cert) break; p = cert->pbCertEncoded; x = d2i_X509(NULL, &p, cert->cbCertEncoded); if (!x) { CAPI_trace(ctx, "Can't Parse Certificate %d\n", i); continue; } if (cert_issuer_match(ca_dn, x) && X509_check_purpose(x, X509_PURPOSE_SSL_CLIENT, 0)) { key = capi_get_cert_key(ctx, cert); if (!key) { X509_free(x); continue; } excert = CertDuplicateCertificateContext(cert); key->pcert = excert; X509_set_ex_data(x, cert_capi_idx, key); if (!certs) certs = sk_X509_new_null(); sk_X509_push(certs, x); } else { X509_free(x); } } if (cert) CertFreeCertificateContext(cert); if (hstore) CertCloseStore(hstore, 0); if (!certs) return 0; client_cert_idx = ctx->client_cert_select(e, ssl, certs); for (i = 0; i < sk_X509_num(certs); i++) { x = sk_X509_value(certs, i); if (i == client_cert_idx) *pcert = x; else { key = X509_get_ex_data(x, cert_capi_idx); capi_free_key(key); X509_free(x); } } sk_X509_free(certs); if (*pcert == NULL) return 0; key = X509_get_ex_data(*pcert, cert_capi_idx); *pkey = capi_get_pkey(e, key); X509_set_ex_data(*pcert, cert_capi_idx, NULL); return 1; } static int cert_select_simple(ENGINE *e, SSL *ssl, STACK_OF(X509) *certs) { return 0; } # ifdef OPENSSL_CAPIENG_DIALOG # ifndef CRYPTUI_SELECT_LOCATION_COLUMN # define CRYPTUI_SELECT_LOCATION_COLUMN 0x000000010 # define CRYPTUI_SELECT_INTENDEDUSE_COLUMN 0x000000004 # endif # define dlg_title L"OpenSSL Application SSL Client Certificate Selection" # define dlg_prompt L"Select a certificate to use for authentication" # define dlg_columns CRYPTUI_SELECT_LOCATION_COLUMN \ |CRYPTUI_SELECT_INTENDEDUSE_COLUMN static int cert_select_dialog(ENGINE *e, SSL *ssl, STACK_OF(X509) *certs) { X509 *x; HCERTSTORE dstore; PCCERT_CONTEXT cert; CAPI_CTX *ctx; CAPI_KEY *key; HWND hwnd; int i, idx = -1; if (sk_X509_num(certs) == 1) return 0; ctx = ENGINE_get_ex_data(e, capi_idx); dstore = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0, CERT_STORE_CREATE_NEW_FLAG, NULL); if (!dstore) { CAPIerr(CAPI_F_CERT_SELECT_DIALOG, CAPI_R_ERROR_CREATING_STORE); capi_addlasterror(); goto err; } for (i = 0; i < sk_X509_num(certs); i++) { x = sk_X509_value(certs, i); key = X509_get_ex_data(x, cert_capi_idx); if (!CertAddCertificateContextToStore(dstore, key->pcert, CERT_STORE_ADD_NEW, NULL)) { CAPIerr(CAPI_F_CERT_SELECT_DIALOG, CAPI_R_ERROR_ADDING_CERT); capi_addlasterror(); goto err; } } hwnd = GetForegroundWindow(); if (!hwnd) hwnd = GetActiveWindow(); if (!hwnd && ctx->getconswindow) hwnd = ctx->getconswindow(); cert = ctx->certselectdlg(dstore, hwnd, dlg_title, dlg_prompt, dlg_columns, 0, NULL); if (cert) { for (i = 0; i < sk_X509_num(certs); i++) { x = sk_X509_value(certs, i); key = X509_get_ex_data(x, cert_capi_idx); if (CertCompareCertificate (X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, cert->pCertInfo, key->pcert->pCertInfo)) { idx = i; break; } } } err: if (dstore) CertCloseStore(dstore, 0); return idx; } # endif #else # include <openssl/engine.h> # ifndef OPENSSL_NO_DYNAMIC_ENGINE OPENSSL_EXPORT int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns); OPENSSL_EXPORT int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns) { return 0; } IMPLEMENT_DYNAMIC_CHECK_FN() # else void engine_load_capi_int(void); void engine_load_capi_int(void) { } # endif #endif
engines
openssl/engines/e_capi.c
openssl
#include <openssl/err.h> #include "e_loader_attic_err.h" #ifndef OPENSSL_NO_ERR static ERR_STRING_DATA ATTIC_str_reasons[] = { {ERR_PACK(0, 0, ATTIC_R_AMBIGUOUS_CONTENT_TYPE), "ambiguous content type"}, {ERR_PACK(0, 0, ATTIC_R_BAD_PASSWORD_READ), "bad password read"}, {ERR_PACK(0, 0, ATTIC_R_ERROR_VERIFYING_PKCS12_MAC), "error verifying pkcs12 mac"}, {ERR_PACK(0, 0, ATTIC_R_INIT_FAILED), "init failed"}, {ERR_PACK(0, 0, ATTIC_R_PASSPHRASE_CALLBACK_ERROR), "passphrase callback error"}, {ERR_PACK(0, 0, ATTIC_R_PATH_MUST_BE_ABSOLUTE), "path must be absolute"}, {ERR_PACK(0, 0, ATTIC_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES), "search only supported for directories"}, {ERR_PACK(0, 0, ATTIC_R_UI_PROCESS_INTERRUPTED_OR_CANCELLED), "ui process interrupted or cancelled"}, {ERR_PACK(0, 0, ATTIC_R_UNSUPPORTED_CONTENT_TYPE), "unsupported content type"}, {ERR_PACK(0, 0, ATTIC_R_UNSUPPORTED_SEARCH_TYPE), "unsupported search type"}, {ERR_PACK(0, 0, ATTIC_R_URI_AUTHORITY_UNSUPPORTED), "uri authority unsupported"}, {0, NULL} }; #endif static int lib_code = 0; static int error_loaded = 0; static int ERR_load_ATTIC_strings(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); if (!error_loaded) { #ifndef OPENSSL_NO_ERR ERR_load_strings(lib_code, ATTIC_str_reasons); #endif error_loaded = 1; } return 1; } static void ERR_unload_ATTIC_strings(void) { if (error_loaded) { #ifndef OPENSSL_NO_ERR ERR_unload_strings(lib_code, ATTIC_str_reasons); #endif error_loaded = 0; } } static void ERR_ATTIC_error(int function, int reason, const char *file, int line) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); ERR_raise(lib_code, reason); ERR_set_debug(file, line, NULL); }
engines
openssl/engines/e_loader_attic_err.c
openssl
#include <openssl/err.h> #include "e_dasync_err.h" #ifndef OPENSSL_NO_ERR static ERR_STRING_DATA DASYNC_str_reasons[] = { {ERR_PACK(0, 0, DASYNC_R_INIT_FAILED), "init failed"}, {0, NULL} }; #endif static int lib_code = 0; static int error_loaded = 0; static int ERR_load_DASYNC_strings(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); if (!error_loaded) { #ifndef OPENSSL_NO_ERR ERR_load_strings(lib_code, DASYNC_str_reasons); #endif error_loaded = 1; } return 1; } static void ERR_unload_DASYNC_strings(void) { if (error_loaded) { #ifndef OPENSSL_NO_ERR ERR_unload_strings(lib_code, DASYNC_str_reasons); #endif error_loaded = 0; } } static void ERR_DASYNC_error(int function, int reason, const char *file, int line) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); ERR_raise(lib_code, reason); ERR_set_debug(file, line, NULL); }
engines
openssl/engines/e_dasync_err.c
openssl
#include <openssl/err.h> #include "e_capi_err.h" #ifndef OPENSSL_NO_ERR static ERR_STRING_DATA CAPI_str_reasons[] = { {ERR_PACK(0, 0, CAPI_R_CANT_CREATE_HASH_OBJECT), "can't create hash object"}, {ERR_PACK(0, 0, CAPI_R_CANT_FIND_CAPI_CONTEXT), "can't find capi context"}, {ERR_PACK(0, 0, CAPI_R_CANT_GET_KEY), "can't get key"}, {ERR_PACK(0, 0, CAPI_R_CANT_SET_HASH_VALUE), "can't set hash value"}, {ERR_PACK(0, 0, CAPI_R_CRYPTACQUIRECONTEXT_ERROR), "cryptacquirecontext error"}, {ERR_PACK(0, 0, CAPI_R_CRYPTENUMPROVIDERS_ERROR), "cryptenumproviders error"}, {ERR_PACK(0, 0, CAPI_R_DECRYPT_ERROR), "decrypt error"}, {ERR_PACK(0, 0, CAPI_R_ENGINE_NOT_INITIALIZED), "engine not initialized"}, {ERR_PACK(0, 0, CAPI_R_ENUMCONTAINERS_ERROR), "enumcontainers error"}, {ERR_PACK(0, 0, CAPI_R_ERROR_ADDING_CERT), "error adding cert"}, {ERR_PACK(0, 0, CAPI_R_ERROR_CREATING_STORE), "error creating store"}, {ERR_PACK(0, 0, CAPI_R_ERROR_GETTING_FRIENDLY_NAME), "error getting friendly name"}, {ERR_PACK(0, 0, CAPI_R_ERROR_GETTING_KEY_PROVIDER_INFO), "error getting key provider info"}, {ERR_PACK(0, 0, CAPI_R_ERROR_OPENING_STORE), "error opening store"}, {ERR_PACK(0, 0, CAPI_R_ERROR_SIGNING_HASH), "error signing hash"}, {ERR_PACK(0, 0, CAPI_R_FILE_OPEN_ERROR), "file open error"}, {ERR_PACK(0, 0, CAPI_R_FUNCTION_NOT_SUPPORTED), "function not supported"}, {ERR_PACK(0, 0, CAPI_R_GETUSERKEY_ERROR), "getuserkey error"}, {ERR_PACK(0, 0, CAPI_R_INVALID_DIGEST_LENGTH), "invalid digest length"}, {ERR_PACK(0, 0, CAPI_R_INVALID_DSA_PUBLIC_KEY_BLOB_MAGIC_NUMBER), "invalid dsa public key blob magic number"}, {ERR_PACK(0, 0, CAPI_R_INVALID_LOOKUP_METHOD), "invalid lookup method"}, {ERR_PACK(0, 0, CAPI_R_INVALID_PUBLIC_KEY_BLOB), "invalid public key blob"}, {ERR_PACK(0, 0, CAPI_R_INVALID_RSA_PUBLIC_KEY_BLOB_MAGIC_NUMBER), "invalid rsa public key blob magic number"}, {ERR_PACK(0, 0, CAPI_R_PUBKEY_EXPORT_ERROR), "pubkey export error"}, {ERR_PACK(0, 0, CAPI_R_PUBKEY_EXPORT_LENGTH_ERROR), "pubkey export length error"}, {ERR_PACK(0, 0, CAPI_R_UNKNOWN_COMMAND), "unknown command"}, {ERR_PACK(0, 0, CAPI_R_UNSUPPORTED_ALGORITHM_NID), "unsupported algorithm nid"}, {ERR_PACK(0, 0, CAPI_R_UNSUPPORTED_PADDING), "unsupported padding"}, {ERR_PACK(0, 0, CAPI_R_UNSUPPORTED_PUBLIC_KEY_ALGORITHM), "unsupported public key algorithm"}, {ERR_PACK(0, 0, CAPI_R_WIN32_ERROR), "win32 error"}, {0, NULL} }; #endif static int lib_code = 0; static int error_loaded = 0; static int ERR_load_CAPI_strings(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); if (!error_loaded) { #ifndef OPENSSL_NO_ERR ERR_load_strings(lib_code, CAPI_str_reasons); #endif error_loaded = 1; } return 1; } static void ERR_unload_CAPI_strings(void) { if (error_loaded) { #ifndef OPENSSL_NO_ERR ERR_unload_strings(lib_code, CAPI_str_reasons); #endif error_loaded = 0; } } static void ERR_CAPI_error(int function, int reason, const char *file, int line) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); ERR_raise(lib_code, reason); ERR_set_debug(file, line, NULL); } static int ERR_CAPI_lib(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); return lib_code; }
engines
openssl/engines/e_capi_err.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include "internal/e_os.h" #include <string.h> #include <sys/stat.h> #include <ctype.h> #include <assert.h> #include <openssl/bio.h> #include <openssl/dsa.h> #include <openssl/err.h> #include <openssl/evp.h> #include <openssl/pem.h> #include <openssl/pkcs12.h> #include <openssl/rsa.h> #include <openssl/safestack.h> #include <openssl/store.h> #include <openssl/ui.h> #include <openssl/engine.h> #include <openssl/x509.h> #include "internal/asn1.h" #include "internal/o_dir.h" #include "internal/cryptlib.h" #include "crypto/ctype.h" #include "crypto/pem.h" #include "e_loader_attic_err.c" DEFINE_STACK_OF(OSSL_STORE_INFO) #ifndef S_ISDIR # define S_ISDIR(a) (((a) & S_IFMT) == S_IFDIR) #endif static char *file_get_pass(const UI_METHOD *ui_method, char *pass, size_t maxsize, const char *desc, const char *info, void *data) { UI *ui = UI_new(); char *prompt = NULL; if (ui == NULL) { ATTICerr(0, ERR_R_UI_LIB); return NULL; } if (ui_method != NULL) UI_set_method(ui, ui_method); UI_add_user_data(ui, data); if ((prompt = UI_construct_prompt(ui, desc, info)) == NULL) { ATTICerr(0, ERR_R_UI_LIB); pass = NULL; } else if (UI_add_input_string(ui, prompt, UI_INPUT_FLAG_DEFAULT_PWD, pass, 0, maxsize - 1) <= 0) { ATTICerr(0, ERR_R_UI_LIB); pass = NULL; } else { switch (UI_process(ui)) { case -2: ATTICerr(0, ATTIC_R_UI_PROCESS_INTERRUPTED_OR_CANCELLED); pass = NULL; break; case -1: ATTICerr(0, ERR_R_UI_LIB); pass = NULL; break; default: break; } } OPENSSL_free(prompt); UI_free(ui); return pass; } struct pem_pass_data { const UI_METHOD *ui_method; void *data; const char *prompt_desc; const char *prompt_info; }; static int file_fill_pem_pass_data(struct pem_pass_data *pass_data, const char *desc, const char *info, const UI_METHOD *ui_method, void *ui_data) { if (pass_data == NULL) return 0; pass_data->ui_method = ui_method; pass_data->data = ui_data; pass_data->prompt_desc = desc; pass_data->prompt_info = info; return 1; } static int file_get_pem_pass(char *buf, int num, int w, void *data) { struct pem_pass_data *pass_data = data; char *pass = file_get_pass(pass_data->ui_method, buf, num, pass_data->prompt_desc, pass_data->prompt_info, pass_data->data); return pass == NULL ? 0 : strlen(pass); } static int check_suffix(const char *str, const char *suffix) { int str_len = strlen(str); int suffix_len = strlen(suffix) + 1; const char *p = NULL; if (suffix_len >= str_len) return -1; p = str + str_len - suffix_len; if (*p != ' ' || strcmp(p + 1, suffix) != 0) return -1; return p - str; } #define STORE_INFO_EMBEDDED -1 struct embedded_st { BUF_MEM *blob; char *pem_name; }; static struct embedded_st *get0_EMBEDDED(OSSL_STORE_INFO *info) { return OSSL_STORE_INFO_get0_data(STORE_INFO_EMBEDDED, info); } static void store_info_free(OSSL_STORE_INFO *info) { struct embedded_st *data; if (info != NULL && (data = get0_EMBEDDED(info)) != NULL) { BUF_MEM_free(data->blob); OPENSSL_free(data->pem_name); OPENSSL_free(data); } OSSL_STORE_INFO_free(info); } static OSSL_STORE_INFO *new_EMBEDDED(const char *new_pem_name, BUF_MEM *embedded) { OSSL_STORE_INFO *info = NULL; struct embedded_st *data = NULL; if ((data = OPENSSL_zalloc(sizeof(*data))) == NULL) return NULL; if ((info = OSSL_STORE_INFO_new(STORE_INFO_EMBEDDED, data)) == NULL) { ATTICerr(0, ERR_R_OSSL_STORE_LIB); OPENSSL_free(data); return NULL; } data->blob = embedded; data->pem_name = new_pem_name == NULL ? NULL : OPENSSL_strdup(new_pem_name); if (new_pem_name != NULL && data->pem_name == NULL) { store_info_free(info); info = NULL; } return info; } typedef OSSL_STORE_INFO *(*file_try_decode_fn)(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **handler_ctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq); typedef int (*file_eof_fn)(void *handler_ctx); typedef void (*file_destroy_ctx_fn)(void **handler_ctx); typedef struct file_handler_st { const char *name; file_try_decode_fn try_decode; file_eof_fn eof; file_destroy_ctx_fn destroy_ctx; int repeatable; } FILE_HANDLER; static OSSL_STORE_INFO *try_decode_PKCS12(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; STACK_OF(OSSL_STORE_INFO) *ctx = *pctx; if (ctx == NULL) { PKCS12 *p12; if (pem_name != NULL) return NULL; if ((p12 = d2i_PKCS12(NULL, &blob, len)) != NULL) { char *pass = NULL; char tpass[PEM_BUFSIZE]; EVP_PKEY *pkey = NULL; X509 *cert = NULL; STACK_OF(X509) *chain = NULL; *matchcount = 1; if (!PKCS12_mac_present(p12) || PKCS12_verify_mac(p12, "", 0) || PKCS12_verify_mac(p12, NULL, 0)) { pass = ""; } else { if ((pass = file_get_pass(ui_method, tpass, PEM_BUFSIZE, "PKCS12 import", uri, ui_data)) == NULL) { ATTICerr(0, ATTIC_R_PASSPHRASE_CALLBACK_ERROR); goto p12_end; } if (!PKCS12_verify_mac(p12, pass, strlen(pass))) { ATTICerr(0, ATTIC_R_ERROR_VERIFYING_PKCS12_MAC); goto p12_end; } } if (PKCS12_parse(p12, pass, &pkey, &cert, &chain)) { OSSL_STORE_INFO *osi_pkey = NULL; OSSL_STORE_INFO *osi_cert = NULL; OSSL_STORE_INFO *osi_ca = NULL; int ok = 1; if ((ctx = sk_OSSL_STORE_INFO_new_null()) != NULL) { if (pkey != NULL) { if ((osi_pkey = OSSL_STORE_INFO_new_PKEY(pkey)) != NULL && (pkey = NULL) == NULL && sk_OSSL_STORE_INFO_push(ctx, osi_pkey) != 0) osi_pkey = NULL; else ok = 0; } if (ok && cert != NULL) { if ((osi_cert = OSSL_STORE_INFO_new_CERT(cert)) != NULL && (cert = NULL) == NULL && sk_OSSL_STORE_INFO_push(ctx, osi_cert) != 0) osi_cert = NULL; else ok = 0; } while (ok && sk_X509_num(chain) > 0) { X509 *ca = sk_X509_value(chain, 0); if ((osi_ca = OSSL_STORE_INFO_new_CERT(ca)) != NULL && sk_X509_shift(chain) != NULL && sk_OSSL_STORE_INFO_push(ctx, osi_ca) != 0) osi_ca = NULL; else ok = 0; } } EVP_PKEY_free(pkey); X509_free(cert); OSSL_STACK_OF_X509_free(chain); store_info_free(osi_pkey); store_info_free(osi_cert); store_info_free(osi_ca); if (!ok) { sk_OSSL_STORE_INFO_pop_free(ctx, store_info_free); ctx = NULL; } *pctx = ctx; } } p12_end: PKCS12_free(p12); if (ctx == NULL) return NULL; } *matchcount = 1; store_info = sk_OSSL_STORE_INFO_shift(ctx); return store_info; } static int eof_PKCS12(void *ctx_) { STACK_OF(OSSL_STORE_INFO) *ctx = ctx_; return ctx == NULL || sk_OSSL_STORE_INFO_num(ctx) == 0; } static void destroy_ctx_PKCS12(void **pctx) { STACK_OF(OSSL_STORE_INFO) *ctx = *pctx; sk_OSSL_STORE_INFO_pop_free(ctx, store_info_free); *pctx = NULL; } static FILE_HANDLER PKCS12_handler = { "PKCS12", try_decode_PKCS12, eof_PKCS12, destroy_ctx_PKCS12, 1 }; static OSSL_STORE_INFO *try_decode_PKCS8Encrypted(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { X509_SIG *p8 = NULL; char kbuf[PEM_BUFSIZE]; char *pass = NULL; const X509_ALGOR *dalg = NULL; const ASN1_OCTET_STRING *doct = NULL; OSSL_STORE_INFO *store_info = NULL; BUF_MEM *mem = NULL; unsigned char *new_data = NULL; int new_data_len; if (pem_name != NULL) { if (strcmp(pem_name, PEM_STRING_PKCS8) != 0) return NULL; *matchcount = 1; } if ((p8 = d2i_X509_SIG(NULL, &blob, len)) == NULL) return NULL; *matchcount = 1; if ((mem = BUF_MEM_new()) == NULL) { ATTICerr(0, ERR_R_BUF_LIB); goto nop8; } if ((pass = file_get_pass(ui_method, kbuf, PEM_BUFSIZE, "PKCS8 decrypt pass phrase", uri, ui_data)) == NULL) { ATTICerr(0, ATTIC_R_BAD_PASSWORD_READ); goto nop8; } X509_SIG_get0(p8, &dalg, &doct); if (!PKCS12_pbe_crypt(dalg, pass, strlen(pass), doct->data, doct->length, &new_data, &new_data_len, 0)) goto nop8; mem->data = (char *)new_data; mem->max = mem->length = (size_t)new_data_len; X509_SIG_free(p8); p8 = NULL; store_info = new_EMBEDDED(PEM_STRING_PKCS8INF, mem); if (store_info == NULL) { ATTICerr(0, ERR_R_OSSL_STORE_LIB); goto nop8; } return store_info; nop8: X509_SIG_free(p8); BUF_MEM_free(mem); return NULL; } static FILE_HANDLER PKCS8Encrypted_handler = { "PKCS8Encrypted", try_decode_PKCS8Encrypted }; static OSSL_STORE_INFO *try_decode_PrivateKey(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; EVP_PKEY *pkey = NULL; const EVP_PKEY_ASN1_METHOD *ameth = NULL; if (pem_name != NULL) { if (strcmp(pem_name, PEM_STRING_PKCS8INF) == 0) { PKCS8_PRIV_KEY_INFO *p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &blob, len); *matchcount = 1; if (p8inf != NULL) pkey = EVP_PKCS82PKEY_ex(p8inf, libctx, propq); PKCS8_PRIV_KEY_INFO_free(p8inf); } else { int slen; int pkey_id; if ((slen = check_suffix(pem_name, "PRIVATE KEY")) > 0 && (ameth = EVP_PKEY_asn1_find_str(NULL, pem_name, slen)) != NULL && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth)) { *matchcount = 1; pkey = d2i_PrivateKey_ex(pkey_id, NULL, &blob, len, libctx, propq); } } } else { int i; #ifndef OPENSSL_NO_ENGINE ENGINE *curengine = ENGINE_get_first(); while (curengine != NULL) { ENGINE_PKEY_ASN1_METHS_PTR asn1meths = ENGINE_get_pkey_asn1_meths(curengine); if (asn1meths != NULL) { const int *nids = NULL; int nids_n = asn1meths(curengine, NULL, &nids, 0); for (i = 0; i < nids_n; i++) { EVP_PKEY_ASN1_METHOD *ameth2 = NULL; EVP_PKEY *tmp_pkey = NULL; const unsigned char *tmp_blob = blob; int pkey_id, pkey_flags; if (!asn1meths(curengine, &ameth2, NULL, nids[i]) || !EVP_PKEY_asn1_get0_info(&pkey_id, NULL, &pkey_flags, NULL, NULL, ameth2) || (pkey_flags & ASN1_PKEY_ALIAS) != 0) continue; ERR_set_mark(); tmp_pkey = d2i_PrivateKey_ex(pkey_id, NULL, &tmp_blob, len, libctx, propq); if (tmp_pkey != NULL) { if (pkey != NULL) EVP_PKEY_free(tmp_pkey); else pkey = tmp_pkey; (*matchcount)++; } ERR_pop_to_mark(); } } curengine = ENGINE_get_next(curengine); } #endif for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) { EVP_PKEY *tmp_pkey = NULL; const unsigned char *tmp_blob = blob; int pkey_id, pkey_flags; ameth = EVP_PKEY_asn1_get0(i); if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, &pkey_flags, NULL, NULL, ameth) || (pkey_flags & ASN1_PKEY_ALIAS) != 0) continue; ERR_set_mark(); tmp_pkey = d2i_PrivateKey_ex(pkey_id, NULL, &tmp_blob, len, libctx, propq); if (tmp_pkey != NULL) { if (pkey != NULL) EVP_PKEY_free(tmp_pkey); else pkey = tmp_pkey; (*matchcount)++; } ERR_pop_to_mark(); } if (*matchcount > 1) { EVP_PKEY_free(pkey); pkey = NULL; } } if (pkey == NULL) return NULL; store_info = OSSL_STORE_INFO_new_PKEY(pkey); if (store_info == NULL) EVP_PKEY_free(pkey); return store_info; } static FILE_HANDLER PrivateKey_handler = { "PrivateKey", try_decode_PrivateKey }; static OSSL_STORE_INFO *try_decode_PUBKEY(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; EVP_PKEY *pkey = NULL; if (pem_name != NULL) { if (strcmp(pem_name, PEM_STRING_PUBLIC) != 0) return NULL; *matchcount = 1; } if ((pkey = d2i_PUBKEY(NULL, &blob, len)) != NULL) { *matchcount = 1; store_info = OSSL_STORE_INFO_new_PUBKEY(pkey); } return store_info; } static FILE_HANDLER PUBKEY_handler = { "PUBKEY", try_decode_PUBKEY }; static OSSL_STORE_INFO *try_decode_params(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; EVP_PKEY *pkey = NULL; const EVP_PKEY_ASN1_METHOD *ameth = NULL; if (pem_name != NULL) { int slen; int pkey_id; if ((slen = check_suffix(pem_name, "PARAMETERS")) > 0 && (ameth = EVP_PKEY_asn1_find_str(NULL, pem_name, slen)) != NULL && EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth)) { *matchcount = 1; pkey = d2i_KeyParams(pkey_id, NULL, &blob, len); } } else { int i; for (i = 0; i < EVP_PKEY_asn1_get_count(); i++) { EVP_PKEY *tmp_pkey = NULL; const unsigned char *tmp_blob = blob; int pkey_id, pkey_flags; ameth = EVP_PKEY_asn1_get0(i); if (!EVP_PKEY_asn1_get0_info(&pkey_id, NULL, &pkey_flags, NULL, NULL, ameth) || (pkey_flags & ASN1_PKEY_ALIAS) != 0) continue; ERR_set_mark(); tmp_pkey = d2i_KeyParams(pkey_id, NULL, &tmp_blob, len); if (tmp_pkey != NULL) { if (pkey != NULL) EVP_PKEY_free(tmp_pkey); else pkey = tmp_pkey; (*matchcount)++; } ERR_pop_to_mark(); } if (*matchcount > 1) { EVP_PKEY_free(pkey); pkey = NULL; } } if (pkey == NULL) return NULL; store_info = OSSL_STORE_INFO_new_PARAMS(pkey); if (store_info == NULL) EVP_PKEY_free(pkey); return store_info; } static FILE_HANDLER params_handler = { "params", try_decode_params }; static OSSL_STORE_INFO *try_decode_X509Certificate(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; X509 *cert = NULL; int ignore_trusted = 1; if (pem_name != NULL) { if (strcmp(pem_name, PEM_STRING_X509_TRUSTED) == 0) ignore_trusted = 0; else if (strcmp(pem_name, PEM_STRING_X509_OLD) != 0 && strcmp(pem_name, PEM_STRING_X509) != 0) return NULL; *matchcount = 1; } cert = X509_new_ex(libctx, propq); if (cert == NULL) return NULL; if ((d2i_X509_AUX(&cert, &blob, len)) != NULL || (ignore_trusted && (d2i_X509(&cert, &blob, len)) != NULL)) { *matchcount = 1; store_info = OSSL_STORE_INFO_new_CERT(cert); } if (store_info == NULL) X509_free(cert); return store_info; } static FILE_HANDLER X509Certificate_handler = { "X509Certificate", try_decode_X509Certificate }; static OSSL_STORE_INFO *try_decode_X509CRL(const char *pem_name, const char *pem_header, const unsigned char *blob, size_t len, void **pctx, int *matchcount, const UI_METHOD *ui_method, void *ui_data, const char *uri, OSSL_LIB_CTX *libctx, const char *propq) { OSSL_STORE_INFO *store_info = NULL; X509_CRL *crl = NULL; if (pem_name != NULL) { if (strcmp(pem_name, PEM_STRING_X509_CRL) != 0) return NULL; *matchcount = 1; } if ((crl = d2i_X509_CRL(NULL, &blob, len)) != NULL) { *matchcount = 1; store_info = OSSL_STORE_INFO_new_CRL(crl); } if (store_info == NULL) X509_CRL_free(crl); return store_info; } static FILE_HANDLER X509CRL_handler = { "X509CRL", try_decode_X509CRL }; static const FILE_HANDLER *file_handlers[] = { &PKCS12_handler, &PKCS8Encrypted_handler, &X509Certificate_handler, &X509CRL_handler, &params_handler, &PUBKEY_handler, &PrivateKey_handler, }; struct ossl_store_loader_ctx_st { char *uri; enum { is_raw = 0, is_pem, is_dir } type; int errcnt; #define FILE_FLAG_SECMEM (1<<0) #define FILE_FLAG_ATTACHED (1<<1) unsigned int flags; union { struct { BIO *file; const FILE_HANDLER *last_handler; void *last_handler_ctx; } file; struct { OPENSSL_DIR_CTX *ctx; int end_reached; char search_name[9]; const char *last_entry; int last_errno; } dir; } _; int expected_type; OSSL_LIB_CTX *libctx; char *propq; }; static void OSSL_STORE_LOADER_CTX_free(OSSL_STORE_LOADER_CTX *ctx) { if (ctx == NULL) return; OPENSSL_free(ctx->propq); OPENSSL_free(ctx->uri); if (ctx->type != is_dir) { if (ctx->_.file.last_handler != NULL) { ctx->_.file.last_handler->destroy_ctx(&ctx->_.file.last_handler_ctx); ctx->_.file.last_handler_ctx = NULL; ctx->_.file.last_handler = NULL; } } OPENSSL_free(ctx); } static int file_find_type(OSSL_STORE_LOADER_CTX *ctx) { BIO *buff = NULL; char peekbuf[4096] = { 0, }; if ((buff = BIO_new(BIO_f_buffer())) == NULL) return 0; ctx->_.file.file = BIO_push(buff, ctx->_.file.file); if (BIO_buffer_peek(ctx->_.file.file, peekbuf, sizeof(peekbuf) - 1) > 0) { peekbuf[sizeof(peekbuf) - 1] = '\0'; if (strstr(peekbuf, "-----BEGIN ") != NULL) ctx->type = is_pem; } return 1; } static OSSL_STORE_LOADER_CTX *file_open_ex (const OSSL_STORE_LOADER *loader, const char *uri, OSSL_LIB_CTX *libctx, const char *propq, const UI_METHOD *ui_method, void *ui_data) { OSSL_STORE_LOADER_CTX *ctx = NULL; struct stat st; struct { const char *path; unsigned int check_absolute:1; } path_data[2]; size_t path_data_n = 0, i; const char *path, *p = uri, *q; path_data[path_data_n].check_absolute = 0; path_data[path_data_n++].path = uri; if (CHECK_AND_SKIP_CASE_PREFIX(p, "file:")) { q = p; if (CHECK_AND_SKIP_PREFIX(q, " path_data_n--; if (CHECK_AND_SKIP_CASE_PREFIX(q, "localhost/") || CHECK_AND_SKIP_PREFIX(q, "/")) { p = q - 1; } else { ATTICerr(0, ATTIC_R_URI_AUTHORITY_UNSUPPORTED); return NULL; } } path_data[path_data_n].check_absolute = 1; #ifdef _WIN32 if (p[0] == '/' && p[2] == ':' && p[3] == '/') { char c = tolower(p[1]); if (c >= 'a' && c <= 'z') { p++; path_data[path_data_n].check_absolute = 0; } } #endif path_data[path_data_n++].path = p; } for (i = 0, path = NULL; path == NULL && i < path_data_n; i++) { if (path_data[i].check_absolute && path_data[i].path[0] != '/') { ATTICerr(0, ATTIC_R_PATH_MUST_BE_ABSOLUTE); ERR_add_error_data(1, path_data[i].path); return NULL; } if (stat(path_data[i].path, &st) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling stat(%s)", path_data[i].path); } else { path = path_data[i].path; } } if (path == NULL) { return NULL; } ctx = OPENSSL_zalloc(sizeof(*ctx)); if (ctx == NULL) return NULL; ctx->uri = OPENSSL_strdup(uri); if (ctx->uri == NULL) goto err; if (S_ISDIR(st.st_mode)) { ctx->type = is_dir; ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, path); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL) { if (ctx->_.dir.last_errno != 0) { ERR_raise(ERR_LIB_SYS, ctx->_.dir.last_errno); goto err; } ctx->_.dir.end_reached = 1; } } else if ((ctx->_.file.file = BIO_new_file(path, "rb")) == NULL || !file_find_type(ctx)) { BIO_free_all(ctx->_.file.file); goto err; } if (propq != NULL) { ctx->propq = OPENSSL_strdup(propq); if (ctx->propq == NULL) goto err; } ctx->libctx = libctx; return ctx; err: OSSL_STORE_LOADER_CTX_free(ctx); return NULL; } static OSSL_STORE_LOADER_CTX *file_open (const OSSL_STORE_LOADER *loader, const char *uri, const UI_METHOD *ui_method, void *ui_data) { return file_open_ex(loader, uri, NULL, NULL, ui_method, ui_data); } static OSSL_STORE_LOADER_CTX *file_attach (const OSSL_STORE_LOADER *loader, BIO *bp, OSSL_LIB_CTX *libctx, const char *propq, const UI_METHOD *ui_method, void *ui_data) { OSSL_STORE_LOADER_CTX *ctx = NULL; if ((ctx = OPENSSL_zalloc(sizeof(*ctx))) == NULL || (propq != NULL && (ctx->propq = OPENSSL_strdup(propq)) == NULL)) { OSSL_STORE_LOADER_CTX_free(ctx); return NULL; } ctx->libctx = libctx; ctx->flags |= FILE_FLAG_ATTACHED; ctx->_.file.file = bp; if (!file_find_type(ctx)) { ctx->_.file.file = NULL; goto err; } return ctx; err: OSSL_STORE_LOADER_CTX_free(ctx); return NULL; } static int file_ctrl(OSSL_STORE_LOADER_CTX *ctx, int cmd, va_list args) { int ret = 1; switch (cmd) { case OSSL_STORE_C_USE_SECMEM: { int on = *(va_arg(args, int *)); switch (on) { case 0: ctx->flags &= ~FILE_FLAG_SECMEM; break; case 1: ctx->flags |= FILE_FLAG_SECMEM; break; default: ATTICerr(0, ERR_R_PASSED_INVALID_ARGUMENT); ret = 0; break; } } break; default: break; } return ret; } static int file_expect(OSSL_STORE_LOADER_CTX *ctx, int expected) { ctx->expected_type = expected; return 1; } static int file_find(OSSL_STORE_LOADER_CTX *ctx, const OSSL_STORE_SEARCH *search) { if (OSSL_STORE_SEARCH_get_type(search) == OSSL_STORE_SEARCH_BY_NAME) { unsigned long hash = 0; if (ctx == NULL) return 1; if (ctx->type != is_dir) { ATTICerr(0, ATTIC_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES); return 0; } hash = X509_NAME_hash_ex(OSSL_STORE_SEARCH_get0_name(search), NULL, NULL, NULL); BIO_snprintf(ctx->_.dir.search_name, sizeof(ctx->_.dir.search_name), "%08lx", hash); return 1; } if (ctx != NULL) ATTICerr(0, ATTIC_R_UNSUPPORTED_SEARCH_TYPE); return 0; } static OSSL_STORE_INFO *file_load_try_decode(OSSL_STORE_LOADER_CTX *ctx, const char *pem_name, const char *pem_header, unsigned char *data, size_t len, const UI_METHOD *ui_method, void *ui_data, int *matchcount) { OSSL_STORE_INFO *result = NULL; BUF_MEM *new_mem = NULL; char *new_pem_name = NULL; int t = 0; again: { size_t i = 0; void *handler_ctx = NULL; const FILE_HANDLER **matching_handlers = OPENSSL_zalloc(sizeof(*matching_handlers) * OSSL_NELEM(file_handlers)); if (matching_handlers == NULL) goto err; *matchcount = 0; for (i = 0; i < OSSL_NELEM(file_handlers); i++) { const FILE_HANDLER *handler = file_handlers[i]; int try_matchcount = 0; void *tmp_handler_ctx = NULL; OSSL_STORE_INFO *tmp_result; unsigned long err; ERR_set_mark(); tmp_result = handler->try_decode(pem_name, pem_header, data, len, &tmp_handler_ctx, &try_matchcount, ui_method, ui_data, ctx->uri, ctx->libctx, ctx->propq); err = ERR_peek_last_error(); if (ERR_GET_LIB(err) == ERR_LIB_ASN1 && ERR_GET_REASON(err) == ERR_R_NESTED_ASN1_ERROR) ERR_pop_to_mark(); else ERR_clear_last_mark(); if (try_matchcount > 0) { matching_handlers[*matchcount] = handler; if (handler_ctx) handler->destroy_ctx(&handler_ctx); handler_ctx = tmp_handler_ctx; if ((*matchcount += try_matchcount) > 1) { store_info_free(result); store_info_free(tmp_result); if (handler->destroy_ctx != NULL) handler->destroy_ctx(&handler_ctx); handler_ctx = NULL; tmp_result = NULL; result = NULL; } if (result == NULL) result = tmp_result; if (result == NULL) break; } } if (result != NULL && *matchcount == 1 && matching_handlers[0]->repeatable) { ctx->_.file.last_handler = matching_handlers[0]; ctx->_.file.last_handler_ctx = handler_ctx; } OPENSSL_free(matching_handlers); } err: OPENSSL_free(new_pem_name); BUF_MEM_free(new_mem); if (result != NULL && (t = OSSL_STORE_INFO_get_type(result)) == STORE_INFO_EMBEDDED) { struct embedded_st *embedded = get0_EMBEDDED(result); pem_name = new_pem_name = embedded->pem_name; new_mem = embedded->blob; data = (unsigned char *)new_mem->data; len = new_mem->length; embedded->pem_name = NULL; embedded->blob = NULL; store_info_free(result); result = NULL; goto again; } return result; } static OSSL_STORE_INFO *file_load_try_repeat(OSSL_STORE_LOADER_CTX *ctx, const UI_METHOD *ui_method, void *ui_data) { OSSL_STORE_INFO *result = NULL; int try_matchcount = 0; if (ctx->_.file.last_handler != NULL) { result = ctx->_.file.last_handler->try_decode(NULL, NULL, NULL, 0, &ctx->_.file.last_handler_ctx, &try_matchcount, ui_method, ui_data, ctx->uri, ctx->libctx, ctx->propq); if (result == NULL) { ctx->_.file.last_handler->destroy_ctx(&ctx->_.file.last_handler_ctx); ctx->_.file.last_handler_ctx = NULL; ctx->_.file.last_handler = NULL; } } return result; } static void pem_free_flag(void *pem_data, int secure, size_t num) { if (secure) OPENSSL_secure_clear_free(pem_data, num); else OPENSSL_free(pem_data); } static int file_read_pem(BIO *bp, char **pem_name, char **pem_header, unsigned char **data, long *len, const UI_METHOD *ui_method, void *ui_data, const char *uri, int secure) { int i = secure ? PEM_read_bio_ex(bp, pem_name, pem_header, data, len, PEM_FLAG_SECURE | PEM_FLAG_EAY_COMPATIBLE) : PEM_read_bio(bp, pem_name, pem_header, data, len); if (i <= 0) return 0; if (strlen(*pem_header) > 10) { EVP_CIPHER_INFO cipher; struct pem_pass_data pass_data; if (!PEM_get_EVP_CIPHER_INFO(*pem_header, &cipher) || !file_fill_pem_pass_data(&pass_data, "PEM pass phrase", uri, ui_method, ui_data) || !PEM_do_header(&cipher, *data, len, file_get_pem_pass, &pass_data)) { return 0; } } return 1; } static OSSL_STORE_INFO *file_try_read_msblob(BIO *bp, int *matchcount) { OSSL_STORE_INFO *result = NULL; int ispub = -1; { unsigned int magic = 0, bitlen = 0; int isdss = 0; unsigned char peekbuf[16] = { 0, }; const unsigned char *p = peekbuf; if (BIO_buffer_peek(bp, peekbuf, sizeof(peekbuf)) <= 0) return 0; if (ossl_do_blob_header(&p, sizeof(peekbuf), &magic, &bitlen, &isdss, &ispub) <= 0) return 0; } (*matchcount)++; { EVP_PKEY *tmp = ispub ? b2i_PublicKey_bio(bp) : b2i_PrivateKey_bio(bp); if (tmp == NULL || (result = OSSL_STORE_INFO_new_PKEY(tmp)) == NULL) { EVP_PKEY_free(tmp); return 0; } } return result; } static OSSL_STORE_INFO *file_try_read_PVK(BIO *bp, const UI_METHOD *ui_method, void *ui_data, const char *uri, int *matchcount) { OSSL_STORE_INFO *result = NULL; { unsigned int saltlen = 0, keylen = 0; unsigned char peekbuf[24] = { 0, }; const unsigned char *p = peekbuf; if (BIO_buffer_peek(bp, peekbuf, sizeof(peekbuf)) <= 0) return 0; if (!ossl_do_PVK_header(&p, sizeof(peekbuf), 0, &saltlen, &keylen)) return 0; } (*matchcount)++; { EVP_PKEY *tmp = NULL; struct pem_pass_data pass_data; if (!file_fill_pem_pass_data(&pass_data, "PVK pass phrase", uri, ui_method, ui_data) || (tmp = b2i_PVK_bio(bp, file_get_pem_pass, &pass_data)) == NULL || (result = OSSL_STORE_INFO_new_PKEY(tmp)) == NULL) { EVP_PKEY_free(tmp); return 0; } } return result; } static int file_read_asn1(BIO *bp, unsigned char **data, long *len) { BUF_MEM *mem = NULL; if (asn1_d2i_read_bio(bp, &mem) < 0) return 0; *data = (unsigned char *)mem->data; *len = (long)mem->length; OPENSSL_free(mem); return 1; } static int file_name_to_uri(OSSL_STORE_LOADER_CTX *ctx, const char *name, char **data) { assert(name != NULL); assert(data != NULL); { const char *pathsep = ossl_ends_with_dirsep(ctx->uri) ? "" : "/"; long calculated_length = strlen(ctx->uri) + strlen(pathsep) + strlen(name) + 1 ; *data = OPENSSL_zalloc(calculated_length); if (*data == NULL) return 0; OPENSSL_strlcat(*data, ctx->uri, calculated_length); OPENSSL_strlcat(*data, pathsep, calculated_length); OPENSSL_strlcat(*data, name, calculated_length); } return 1; } static int file_name_check(OSSL_STORE_LOADER_CTX *ctx, const char *name) { const char *p = NULL; size_t len = strlen(ctx->_.dir.search_name); if (ctx->_.dir.search_name[0] == '\0') return 1; if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CERT && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; if (OPENSSL_strncasecmp(name, ctx->_.dir.search_name, len) != 0 || name[len] != '.') return 0; p = &name[len + 1]; if (*p == 'r') { p++; if (ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_CRL) return 0; } else if (ctx->expected_type == OSSL_STORE_INFO_CRL) { return 0; } if (!isdigit((unsigned char)*p)) return 0; while (isdigit((unsigned char)*p)) p++; #ifdef __VMS if (*p == ';') for (p++; *p != '\0'; p++) if (!ossl_isdigit(*p)) break; #endif return *p == '\0'; } static int file_eof(OSSL_STORE_LOADER_CTX *ctx); static int file_error(OSSL_STORE_LOADER_CTX *ctx); static OSSL_STORE_INFO *file_load(OSSL_STORE_LOADER_CTX *ctx, const UI_METHOD *ui_method, void *ui_data) { OSSL_STORE_INFO *result = NULL; ctx->errcnt = 0; if (ctx->type == is_dir) { do { char *newname = NULL; if (ctx->_.dir.last_entry == NULL) { if (!ctx->_.dir.end_reached) { assert(ctx->_.dir.last_errno != 0); ERR_raise(ERR_LIB_SYS, ctx->_.dir.last_errno); ctx->errcnt++; } return NULL; } if (ctx->_.dir.last_entry[0] != '.' && file_name_check(ctx, ctx->_.dir.last_entry) && !file_name_to_uri(ctx, ctx->_.dir.last_entry, &newname)) return NULL; ctx->_.dir.last_entry = OPENSSL_DIR_read(&ctx->_.dir.ctx, ctx->uri); ctx->_.dir.last_errno = errno; if (ctx->_.dir.last_entry == NULL && ctx->_.dir.last_errno == 0) ctx->_.dir.end_reached = 1; if (newname != NULL && (result = OSSL_STORE_INFO_new_NAME(newname)) == NULL) { OPENSSL_free(newname); ATTICerr(0, ERR_R_OSSL_STORE_LIB); return NULL; } } while (result == NULL && !file_eof(ctx)); } else { int matchcount = -1; again: result = file_load_try_repeat(ctx, ui_method, ui_data); if (result != NULL) return result; if (file_eof(ctx)) return NULL; do { char *pem_name = NULL; char *pem_header = NULL; unsigned char *data = NULL; long len = 0; matchcount = -1; if (ctx->type == is_pem) { if (!file_read_pem(ctx->_.file.file, &pem_name, &pem_header, &data, &len, ui_method, ui_data, ctx->uri, (ctx->flags & FILE_FLAG_SECMEM) != 0)) { ctx->errcnt++; goto endloop; } } else { if ((result = file_try_read_msblob(ctx->_.file.file, &matchcount)) != NULL || (result = file_try_read_PVK(ctx->_.file.file, ui_method, ui_data, ctx->uri, &matchcount)) != NULL) goto endloop; if (!file_read_asn1(ctx->_.file.file, &data, &len)) { ctx->errcnt++; goto endloop; } } result = file_load_try_decode(ctx, pem_name, pem_header, data, len, ui_method, ui_data, &matchcount); if (result != NULL) goto endloop; if (!ossl_assert(pem_name == NULL || matchcount <= 1)) { ctx->errcnt++; goto endloop; } if (matchcount > 1) { ATTICerr(0, ATTIC_R_AMBIGUOUS_CONTENT_TYPE); } else if (matchcount == 1) { if (ERR_peek_error() == 0) { ATTICerr(0, ATTIC_R_UNSUPPORTED_CONTENT_TYPE); if (pem_name != NULL) ERR_add_error_data(3, "PEM type is '", pem_name, "'"); } } if (matchcount > 0) ctx->errcnt++; endloop: pem_free_flag(pem_name, (ctx->flags & FILE_FLAG_SECMEM) != 0, 0); pem_free_flag(pem_header, (ctx->flags & FILE_FLAG_SECMEM) != 0, 0); pem_free_flag(data, (ctx->flags & FILE_FLAG_SECMEM) != 0, len); } while (matchcount == 0 && !file_eof(ctx) && !file_error(ctx)); if (matchcount > 1) { store_info_free(result); return NULL; } if (result != NULL && ctx->expected_type != 0 && ctx->expected_type != OSSL_STORE_INFO_get_type(result)) { store_info_free(result); goto again; } } return result; } static int file_error(OSSL_STORE_LOADER_CTX *ctx) { return ctx->errcnt > 0; } static int file_eof(OSSL_STORE_LOADER_CTX *ctx) { if (ctx->type == is_dir) return ctx->_.dir.end_reached; if (ctx->_.file.last_handler != NULL && !ctx->_.file.last_handler->eof(ctx->_.file.last_handler_ctx)) return 0; return BIO_eof(ctx->_.file.file); } static int file_close(OSSL_STORE_LOADER_CTX *ctx) { if ((ctx->flags & FILE_FLAG_ATTACHED) == 0) { if (ctx->type == is_dir) OPENSSL_DIR_end(&ctx->_.dir.ctx); else BIO_free_all(ctx->_.file.file); } else { BIO *buff = ctx->_.file.file; (void)BIO_pop(ctx->_.file.file); ctx->_.file.file = NULL; BIO_free(buff); } OSSL_STORE_LOADER_CTX_free(ctx); return 1; } static const char *loader_attic_id = "loader_attic"; static const char *loader_attic_name = "'file:' loader"; static OSSL_STORE_LOADER *loader_attic = NULL; static int loader_attic_init(ENGINE *e) { return 1; } static int loader_attic_finish(ENGINE *e) { return 1; } static int loader_attic_destroy(ENGINE *e) { OSSL_STORE_LOADER *loader = OSSL_STORE_unregister_loader("file"); if (loader == NULL) return 0; ERR_unload_ATTIC_strings(); OSSL_STORE_LOADER_free(loader); return 1; } static int bind_loader_attic(ENGINE *e) { ERR_load_ATTIC_strings(); if ( (loader_attic = OSSL_STORE_LOADER_new(e, "file")) == NULL || !OSSL_STORE_LOADER_set_open_ex(loader_attic, file_open_ex) || !OSSL_STORE_LOADER_set_open(loader_attic, file_open) || !OSSL_STORE_LOADER_set_attach(loader_attic, file_attach) || !OSSL_STORE_LOADER_set_ctrl(loader_attic, file_ctrl) || !OSSL_STORE_LOADER_set_expect(loader_attic, file_expect) || !OSSL_STORE_LOADER_set_find(loader_attic, file_find) || !OSSL_STORE_LOADER_set_load(loader_attic, file_load) || !OSSL_STORE_LOADER_set_eof(loader_attic, file_eof) || !OSSL_STORE_LOADER_set_error(loader_attic, file_error) || !OSSL_STORE_LOADER_set_close(loader_attic, file_close) || !ENGINE_set_id(e, loader_attic_id) || !ENGINE_set_name(e, loader_attic_name) || !ENGINE_set_destroy_function(e, loader_attic_destroy) || !ENGINE_set_init_function(e, loader_attic_init) || !ENGINE_set_finish_function(e, loader_attic_finish) || !OSSL_STORE_register_loader(loader_attic)) { OSSL_STORE_LOADER_free(loader_attic); loader_attic = NULL; ATTICerr(0, ATTIC_R_INIT_FAILED); return 0; } return 1; } #ifdef OPENSSL_NO_DYNAMIC_ENGINE # error "Only allowed as dynamically shared object" #endif static int bind_helper(ENGINE *e, const char *id) { if (id && (strcmp(id, loader_attic_id) != 0)) return 0; if (!bind_loader_attic(e)) return 0; return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper)
engines
openssl/engines/e_loader_attic.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include "internal/deprecated.h" #include <openssl/opensslconf.h> #if defined(_WIN32) # include <windows.h> #endif #include <stdio.h> #include <string.h> #include <openssl/engine.h> #include <openssl/sha.h> #include <openssl/aes.h> #include <openssl/rsa.h> #include <openssl/evp.h> #include <openssl/async.h> #include <openssl/bn.h> #include <openssl/crypto.h> #include <openssl/ssl.h> #include <openssl/modes.h> #if defined(OPENSSL_SYS_UNIX) && defined(OPENSSL_THREADS) # undef ASYNC_POSIX # define ASYNC_POSIX # include <unistd.h> #elif defined(_WIN32) # undef ASYNC_WIN # define ASYNC_WIN #endif #include "e_dasync_err.c" static const char *engine_dasync_id = "dasync"; static const char *engine_dasync_name = "Dummy Async engine support"; static int dasync_destroy(ENGINE *e); static int dasync_init(ENGINE *e); static int dasync_finish(ENGINE *e); void engine_load_dasync_int(void); static int dasync_digests(ENGINE *e, const EVP_MD **digest, const int **nids, int nid); static void dummy_pause_job(void); static int dasync_sha1_init(EVP_MD_CTX *ctx); static int dasync_sha1_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int dasync_sha1_final(EVP_MD_CTX *ctx, unsigned char *md); static EVP_MD *_hidden_sha1_md = NULL; static const EVP_MD *dasync_sha1(void) { return _hidden_sha1_md; } static void destroy_digests(void) { EVP_MD_meth_free(_hidden_sha1_md); _hidden_sha1_md = NULL; } static int dasync_digest_nids(const int **nids) { static int digest_nids[2] = { 0, 0 }; static int pos = 0; static int init = 0; if (!init) { const EVP_MD *md; if ((md = dasync_sha1()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); digest_nids[pos] = 0; init = 1; } *nids = digest_nids; return pos; } static int dasync_pkey(ENGINE *e, EVP_PKEY_METHOD **pmeth, const int **pnids, int nid); static int dasync_rsa_init(EVP_PKEY_CTX *ctx); static void dasync_rsa_cleanup(EVP_PKEY_CTX *ctx); static int dasync_rsa_paramgen_init(EVP_PKEY_CTX *ctx); static int dasync_rsa_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); static int dasync_rsa_keygen_init(EVP_PKEY_CTX *ctx); static int dasync_rsa_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey); static int dasync_rsa_encrypt_init(EVP_PKEY_CTX *ctx); static int dasync_rsa_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen); static int dasync_rsa_decrypt_init(EVP_PKEY_CTX *ctx); static int dasync_rsa_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen); static int dasync_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2); static int dasync_rsa_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value); static EVP_PKEY_METHOD *dasync_rsa; static const EVP_PKEY_METHOD *dasync_rsa_orig; static int dasync_aes128_cbc_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); static int dasync_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int dasync_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int dasync_aes128_cbc_cleanup(EVP_CIPHER_CTX *ctx); static int dasync_aes256_ctr_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); static int dasync_aes256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int dasync_aes256_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int dasync_aes256_ctr_cleanup(EVP_CIPHER_CTX *ctx); static int dasync_aes128_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); static int dasync_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int dasync_aes128_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int dasync_aes128_cbc_hmac_sha1_cleanup(EVP_CIPHER_CTX *ctx); struct dasync_pipeline_ctx { void *inner_cipher_data; unsigned int numpipes; unsigned char **inbufs; unsigned char **outbufs; size_t *lens; unsigned char tlsaad[SSL_MAX_PIPELINES][EVP_AEAD_TLS1_AAD_LEN]; unsigned int aadctr; }; static EVP_CIPHER *_hidden_aes_128_cbc = NULL; static const EVP_CIPHER *dasync_aes_128_cbc(void) { return _hidden_aes_128_cbc; } static EVP_CIPHER *_hidden_aes_256_ctr = NULL; static const EVP_CIPHER *dasync_aes_256_ctr(void) { return _hidden_aes_256_ctr; } static EVP_CIPHER *_hidden_aes_128_cbc_hmac_sha1 = NULL; static const EVP_CIPHER *dasync_aes_128_cbc_hmac_sha1(void) { return _hidden_aes_128_cbc_hmac_sha1; } static void destroy_ciphers(void) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc); EVP_CIPHER_meth_free(_hidden_aes_256_ctr); EVP_CIPHER_meth_free(_hidden_aes_128_cbc_hmac_sha1); _hidden_aes_128_cbc = NULL; _hidden_aes_256_ctr = NULL; _hidden_aes_128_cbc_hmac_sha1 = NULL; } static int dasync_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid); static int dasync_cipher_nids[] = { NID_aes_128_cbc, NID_aes_256_ctr, NID_aes_128_cbc_hmac_sha1, 0 }; static int bind_dasync(ENGINE *e) { if ((dasync_rsa_orig = EVP_PKEY_meth_find(EVP_PKEY_RSA)) == NULL || (dasync_rsa = EVP_PKEY_meth_new(EVP_PKEY_RSA, EVP_PKEY_FLAG_AUTOARGLEN)) == NULL) return 0; EVP_PKEY_meth_set_init(dasync_rsa, dasync_rsa_init); EVP_PKEY_meth_set_cleanup(dasync_rsa, dasync_rsa_cleanup); EVP_PKEY_meth_set_paramgen(dasync_rsa, dasync_rsa_paramgen_init, dasync_rsa_paramgen); EVP_PKEY_meth_set_keygen(dasync_rsa, dasync_rsa_keygen_init, dasync_rsa_keygen); EVP_PKEY_meth_set_encrypt(dasync_rsa, dasync_rsa_encrypt_init, dasync_rsa_encrypt); EVP_PKEY_meth_set_decrypt(dasync_rsa, dasync_rsa_decrypt_init, dasync_rsa_decrypt); EVP_PKEY_meth_set_ctrl(dasync_rsa, dasync_rsa_ctrl, dasync_rsa_ctrl_str); ERR_load_DASYNC_strings(); if (!ENGINE_set_id(e, engine_dasync_id) || !ENGINE_set_name(e, engine_dasync_name) || !ENGINE_set_pkey_meths(e, dasync_pkey) || !ENGINE_set_digests(e, dasync_digests) || !ENGINE_set_ciphers(e, dasync_ciphers) || !ENGINE_set_destroy_function(e, dasync_destroy) || !ENGINE_set_init_function(e, dasync_init) || !ENGINE_set_finish_function(e, dasync_finish)) { DASYNCerr(DASYNC_F_BIND_DASYNC, DASYNC_R_INIT_FAILED); return 0; } _hidden_sha1_md = EVP_MD_meth_new(NID_sha1, NID_sha1WithRSAEncryption); if (_hidden_sha1_md == NULL || !EVP_MD_meth_set_result_size(_hidden_sha1_md, SHA_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(_hidden_sha1_md, SHA_CBLOCK) || !EVP_MD_meth_set_app_datasize(_hidden_sha1_md, sizeof(EVP_MD *) + sizeof(SHA_CTX)) || !EVP_MD_meth_set_flags(_hidden_sha1_md, EVP_MD_FLAG_DIGALGID_ABSENT) || !EVP_MD_meth_set_init(_hidden_sha1_md, dasync_sha1_init) || !EVP_MD_meth_set_update(_hidden_sha1_md, dasync_sha1_update) || !EVP_MD_meth_set_final(_hidden_sha1_md, dasync_sha1_final)) { EVP_MD_meth_free(_hidden_sha1_md); _hidden_sha1_md = NULL; } _hidden_aes_128_cbc = EVP_CIPHER_meth_new(NID_aes_128_cbc, 16 , 16 ); if (_hidden_aes_128_cbc == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_128_cbc,16) || !EVP_CIPHER_meth_set_flags(_hidden_aes_128_cbc, EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_PIPELINE | EVP_CIPH_CUSTOM_COPY) || !EVP_CIPHER_meth_set_init(_hidden_aes_128_cbc, dasync_aes128_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_128_cbc, dasync_aes128_cbc_cipher) || !EVP_CIPHER_meth_set_cleanup(_hidden_aes_128_cbc, dasync_aes128_cbc_cleanup) || !EVP_CIPHER_meth_set_ctrl(_hidden_aes_128_cbc, dasync_aes128_cbc_ctrl) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_128_cbc, sizeof(struct dasync_pipeline_ctx))) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc); _hidden_aes_128_cbc = NULL; } _hidden_aes_256_ctr = EVP_CIPHER_meth_new(NID_aes_256_ctr, 1 , 32 ); if (_hidden_aes_256_ctr == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_256_ctr,16) || !EVP_CIPHER_meth_set_flags(_hidden_aes_256_ctr, EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CTR_MODE | EVP_CIPH_FLAG_PIPELINE | EVP_CIPH_CUSTOM_COPY) || !EVP_CIPHER_meth_set_init(_hidden_aes_256_ctr, dasync_aes256_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_256_ctr, dasync_aes256_ctr_cipher) || !EVP_CIPHER_meth_set_cleanup(_hidden_aes_256_ctr, dasync_aes256_ctr_cleanup) || !EVP_CIPHER_meth_set_ctrl(_hidden_aes_256_ctr, dasync_aes256_ctr_ctrl) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_256_ctr, sizeof(struct dasync_pipeline_ctx))) { EVP_CIPHER_meth_free(_hidden_aes_256_ctr); _hidden_aes_256_ctr = NULL; } _hidden_aes_128_cbc_hmac_sha1 = EVP_CIPHER_meth_new( NID_aes_128_cbc_hmac_sha1, 16 , 16 ); if (_hidden_aes_128_cbc_hmac_sha1 == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_128_cbc_hmac_sha1,16) || !EVP_CIPHER_meth_set_flags(_hidden_aes_128_cbc_hmac_sha1, EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_FLAG_AEAD_CIPHER | EVP_CIPH_FLAG_PIPELINE | EVP_CIPH_CUSTOM_COPY) || !EVP_CIPHER_meth_set_init(_hidden_aes_128_cbc_hmac_sha1, dasync_aes128_cbc_hmac_sha1_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_128_cbc_hmac_sha1, dasync_aes128_cbc_hmac_sha1_cipher) || !EVP_CIPHER_meth_set_cleanup(_hidden_aes_128_cbc_hmac_sha1, dasync_aes128_cbc_hmac_sha1_cleanup) || !EVP_CIPHER_meth_set_ctrl(_hidden_aes_128_cbc_hmac_sha1, dasync_aes128_cbc_hmac_sha1_ctrl) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_128_cbc_hmac_sha1, sizeof(struct dasync_pipeline_ctx))) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc_hmac_sha1); _hidden_aes_128_cbc_hmac_sha1 = NULL; } return 1; } static void destroy_pkey(void) { dasync_rsa_orig = NULL; dasync_rsa = NULL; } # ifndef OPENSSL_NO_DYNAMIC_ENGINE static int bind_helper(ENGINE *e, const char *id) { if (id && (strcmp(id, engine_dasync_id) != 0)) return 0; if (!bind_dasync(e)) return 0; return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) # endif static ENGINE *engine_dasync(void) { ENGINE *ret = ENGINE_new(); if (!ret) return NULL; if (!bind_dasync(ret)) { ENGINE_free(ret); return NULL; } return ret; } void engine_load_dasync_int(void) { ENGINE *toadd = engine_dasync(); if (!toadd) return; ERR_set_mark(); ENGINE_add(toadd); ENGINE_free(toadd); ERR_pop_to_mark(); } static int dasync_init(ENGINE *e) { return 1; } static int dasync_finish(ENGINE *e) { return 1; } static int dasync_destroy(ENGINE *e) { destroy_digests(); destroy_ciphers(); destroy_pkey(); ERR_unload_DASYNC_strings(); return 1; } static int dasync_pkey(ENGINE *e, EVP_PKEY_METHOD **pmeth, const int **pnids, int nid) { static const int rnid = EVP_PKEY_RSA; if (pmeth == NULL) { *pnids = &rnid; return 1; } if (nid == EVP_PKEY_RSA) { *pmeth = dasync_rsa; return 1; } *pmeth = NULL; return 0; } static int dasync_digests(ENGINE *e, const EVP_MD **digest, const int **nids, int nid) { int ok = 1; if (!digest) { return dasync_digest_nids(nids); } switch (nid) { case NID_sha1: *digest = dasync_sha1(); break; default: ok = 0; *digest = NULL; break; } return ok; } static int dasync_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) { int ok = 1; if (cipher == NULL) { *nids = dasync_cipher_nids; return (sizeof(dasync_cipher_nids) - 1) / sizeof(dasync_cipher_nids[0]); } switch (nid) { case NID_aes_128_cbc: *cipher = dasync_aes_128_cbc(); break; case NID_aes_256_ctr: *cipher = dasync_aes_256_ctr(); break; case NID_aes_128_cbc_hmac_sha1: *cipher = dasync_aes_128_cbc_hmac_sha1(); break; default: ok = 0; *cipher = NULL; break; } return ok; } static void wait_cleanup(ASYNC_WAIT_CTX *ctx, const void *key, OSSL_ASYNC_FD readfd, void *pvwritefd) { OSSL_ASYNC_FD *pwritefd = (OSSL_ASYNC_FD *)pvwritefd; #if defined(ASYNC_WIN) CloseHandle(readfd); CloseHandle(*pwritefd); #elif defined(ASYNC_POSIX) close(readfd); close(*pwritefd); #endif OPENSSL_free(pwritefd); } #define DUMMY_CHAR 'X' static void dummy_pause_job(void) { ASYNC_JOB *job; ASYNC_WAIT_CTX *waitctx; ASYNC_callback_fn callback; void *callback_arg; OSSL_ASYNC_FD pipefds[2] = {0, 0}; OSSL_ASYNC_FD *writefd; #if defined(ASYNC_WIN) DWORD numwritten, numread; char buf = DUMMY_CHAR; #elif defined(ASYNC_POSIX) char buf = DUMMY_CHAR; #endif if ((job = ASYNC_get_current_job()) == NULL) return; waitctx = ASYNC_get_wait_ctx(job); if (ASYNC_WAIT_CTX_get_callback(waitctx, &callback, &callback_arg) && callback != NULL) { (*callback)(callback_arg); ASYNC_pause_job(); return; } if (ASYNC_WAIT_CTX_get_fd(waitctx, engine_dasync_id, &pipefds[0], (void **)&writefd)) { pipefds[1] = *writefd; } else { writefd = OPENSSL_malloc(sizeof(*writefd)); if (writefd == NULL) return; #if defined(ASYNC_WIN) if (CreatePipe(&pipefds[0], &pipefds[1], NULL, 256) == 0) { OPENSSL_free(writefd); return; } #elif defined(ASYNC_POSIX) if (pipe(pipefds) != 0) { OPENSSL_free(writefd); return; } #endif *writefd = pipefds[1]; if (!ASYNC_WAIT_CTX_set_wait_fd(waitctx, engine_dasync_id, pipefds[0], writefd, wait_cleanup)) { wait_cleanup(waitctx, engine_dasync_id, pipefds[0], writefd); return; } } #if defined(ASYNC_WIN) WriteFile(pipefds[1], &buf, 1, &numwritten, NULL); #elif defined(ASYNC_POSIX) if (write(pipefds[1], &buf, 1) < 0) return; #endif ASYNC_pause_job(); #if defined(ASYNC_WIN) ReadFile(pipefds[0], &buf, 1, &numread, NULL); #elif defined(ASYNC_POSIX) if (read(pipefds[0], &buf, 1) < 0) return; #endif } static int dasync_sha1_init(EVP_MD_CTX *ctx) { dummy_pause_job(); return EVP_MD_meth_get_init(EVP_sha1())(ctx); } static int dasync_sha1_update(EVP_MD_CTX *ctx, const void *data, size_t count) { dummy_pause_job(); return EVP_MD_meth_get_update(EVP_sha1())(ctx, data, count); } static int dasync_sha1_final(EVP_MD_CTX *ctx, unsigned char *md) { dummy_pause_job(); return EVP_MD_meth_get_final(EVP_sha1())(ctx, md); } static int dasync_cipher_ctrl_helper(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr, int aeadcapable, const EVP_CIPHER *ciph) { int ret; struct dasync_pipeline_ctx *pipe_ctx = (struct dasync_pipeline_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); if (pipe_ctx == NULL) return 0; switch (type) { case EVP_CTRL_COPY: { size_t sz = EVP_CIPHER_impl_ctx_size(ciph); void *inner_cipher_data = OPENSSL_malloc(sz); if (inner_cipher_data == NULL) return -1; memcpy(inner_cipher_data, pipe_ctx->inner_cipher_data, sz); pipe_ctx->inner_cipher_data = inner_cipher_data; } break; case EVP_CTRL_SET_PIPELINE_OUTPUT_BUFS: pipe_ctx->numpipes = arg; pipe_ctx->outbufs = (unsigned char **)ptr; break; case EVP_CTRL_SET_PIPELINE_INPUT_BUFS: pipe_ctx->numpipes = arg; pipe_ctx->inbufs = (unsigned char **)ptr; break; case EVP_CTRL_SET_PIPELINE_INPUT_LENS: pipe_ctx->numpipes = arg; pipe_ctx->lens = (size_t *)ptr; break; case EVP_CTRL_AEAD_SET_MAC_KEY: if (!aeadcapable) return -1; EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx->inner_cipher_data); ret = EVP_CIPHER_meth_get_ctrl(EVP_aes_128_cbc_hmac_sha1()) (ctx, type, arg, ptr); EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx); return ret; case EVP_CTRL_AEAD_TLS1_AAD: { unsigned char *p = ptr; unsigned int len; if (!aeadcapable || arg != EVP_AEAD_TLS1_AAD_LEN) return -1; if (pipe_ctx->aadctr >= SSL_MAX_PIPELINES) return -1; memcpy(pipe_ctx->tlsaad[pipe_ctx->aadctr], ptr, EVP_AEAD_TLS1_AAD_LEN); pipe_ctx->aadctr++; len = p[arg - 2] << 8 | p[arg - 1]; if (EVP_CIPHER_CTX_is_encrypting(ctx)) { if ((p[arg - 4] << 8 | p[arg - 3]) >= TLS1_1_VERSION) { if (len < AES_BLOCK_SIZE) return 0; len -= AES_BLOCK_SIZE; } return ((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len; } else { return SHA_DIGEST_LENGTH; } } default: return 0; } return 1; } static int dasync_cipher_init_key_helper(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc, const EVP_CIPHER *cipher) { int ret; struct dasync_pipeline_ctx *pipe_ctx = (struct dasync_pipeline_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); if (pipe_ctx->inner_cipher_data == NULL && EVP_CIPHER_impl_ctx_size(cipher) != 0) { pipe_ctx->inner_cipher_data = OPENSSL_zalloc( EVP_CIPHER_impl_ctx_size(cipher)); if (pipe_ctx->inner_cipher_data == NULL) return 0; } pipe_ctx->numpipes = 0; pipe_ctx->aadctr = 0; EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx->inner_cipher_data); ret = EVP_CIPHER_meth_get_init(cipher)(ctx, key, iv, enc); EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx); return ret; } static int dasync_cipher_helper(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl, const EVP_CIPHER *cipher) { int ret = 1; unsigned int i, pipes; struct dasync_pipeline_ctx *pipe_ctx = (struct dasync_pipeline_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); pipes = pipe_ctx->numpipes; EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx->inner_cipher_data); if (pipes == 0) { if (pipe_ctx->aadctr != 0) { if (pipe_ctx->aadctr != 1) return -1; EVP_CIPHER_meth_get_ctrl(cipher) (ctx, EVP_CTRL_AEAD_TLS1_AAD, EVP_AEAD_TLS1_AAD_LEN, pipe_ctx->tlsaad[0]); } ret = EVP_CIPHER_meth_get_do_cipher(cipher) (ctx, out, in, inl); } else { if (pipe_ctx->aadctr > 0 && pipe_ctx->aadctr != pipes) return -1; for (i = 0; i < pipes; i++) { if (pipe_ctx->aadctr > 0) { EVP_CIPHER_meth_get_ctrl(cipher) (ctx, EVP_CTRL_AEAD_TLS1_AAD, EVP_AEAD_TLS1_AAD_LEN, pipe_ctx->tlsaad[i]); } ret = ret && EVP_CIPHER_meth_get_do_cipher(cipher) (ctx, pipe_ctx->outbufs[i], pipe_ctx->inbufs[i], pipe_ctx->lens[i]); } pipe_ctx->numpipes = 0; } pipe_ctx->aadctr = 0; EVP_CIPHER_CTX_set_cipher_data(ctx, pipe_ctx); return ret; } static int dasync_cipher_cleanup_helper(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher) { struct dasync_pipeline_ctx *pipe_ctx = (struct dasync_pipeline_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); OPENSSL_clear_free(pipe_ctx->inner_cipher_data, EVP_CIPHER_impl_ctx_size(cipher)); return 1; } static int dasync_aes128_cbc_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { return dasync_cipher_ctrl_helper(ctx, type, arg, ptr, 0, EVP_aes_128_cbc()); } static int dasync_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { return dasync_cipher_init_key_helper(ctx, key, iv, enc, EVP_aes_128_cbc()); } static int dasync_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { return dasync_cipher_helper(ctx, out, in, inl, EVP_aes_128_cbc()); } static int dasync_aes128_cbc_cleanup(EVP_CIPHER_CTX *ctx) { return dasync_cipher_cleanup_helper(ctx, EVP_aes_128_cbc()); } static int dasync_aes256_ctr_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { return dasync_cipher_ctrl_helper(ctx, type, arg, ptr, 0, EVP_aes_256_ctr()); } static int dasync_aes256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { return dasync_cipher_init_key_helper(ctx, key, iv, enc, EVP_aes_256_ctr()); } static int dasync_aes256_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { return dasync_cipher_helper(ctx, out, in, inl, EVP_aes_256_ctr()); } static int dasync_aes256_ctr_cleanup(EVP_CIPHER_CTX *ctx) { return dasync_cipher_cleanup_helper(ctx, EVP_aes_256_ctr()); } static int dasync_aes128_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { return dasync_cipher_ctrl_helper(ctx, type, arg, ptr, 1, EVP_aes_128_cbc_hmac_sha1()); } static int dasync_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { return dasync_cipher_init_key_helper(ctx, key, iv, enc, EVP_aes_128_cbc_hmac_sha1()); } static int dasync_aes128_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { return dasync_cipher_helper(ctx, out, in, inl, EVP_aes_128_cbc_hmac_sha1()); } static int dasync_aes128_cbc_hmac_sha1_cleanup(EVP_CIPHER_CTX *ctx) { return dasync_cipher_cleanup_helper(ctx, EVP_aes_128_cbc_hmac_sha1()); } static int dasync_rsa_init(EVP_PKEY_CTX *ctx) { static int (*pinit)(EVP_PKEY_CTX *ctx); if (pinit == NULL) EVP_PKEY_meth_get_init(dasync_rsa_orig, &pinit); return pinit(ctx); } static void dasync_rsa_cleanup(EVP_PKEY_CTX *ctx) { static void (*pcleanup)(EVP_PKEY_CTX *ctx); if (pcleanup == NULL) EVP_PKEY_meth_get_cleanup(dasync_rsa_orig, &pcleanup); pcleanup(ctx); } static int dasync_rsa_paramgen_init(EVP_PKEY_CTX *ctx) { static int (*pparamgen_init)(EVP_PKEY_CTX *ctx); if (pparamgen_init == NULL) EVP_PKEY_meth_get_paramgen(dasync_rsa_orig, &pparamgen_init, NULL); return pparamgen_init != NULL ? pparamgen_init(ctx) : 1; } static int dasync_rsa_paramgen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) { static int (*pparamgen)(EVP_PKEY_CTX *c, EVP_PKEY *pkey); if (pparamgen == NULL) EVP_PKEY_meth_get_paramgen(dasync_rsa_orig, NULL, &pparamgen); return pparamgen != NULL ? pparamgen(ctx, pkey) : 1; } static int dasync_rsa_keygen_init(EVP_PKEY_CTX *ctx) { static int (*pkeygen_init)(EVP_PKEY_CTX *ctx); if (pkeygen_init == NULL) EVP_PKEY_meth_get_keygen(dasync_rsa_orig, &pkeygen_init, NULL); return pkeygen_init != NULL ? pkeygen_init(ctx) : 1; } static int dasync_rsa_keygen(EVP_PKEY_CTX *ctx, EVP_PKEY *pkey) { static int (*pkeygen)(EVP_PKEY_CTX *c, EVP_PKEY *pkey); if (pkeygen == NULL) EVP_PKEY_meth_get_keygen(dasync_rsa_orig, NULL, &pkeygen); return pkeygen(ctx, pkey); } static int dasync_rsa_encrypt_init(EVP_PKEY_CTX *ctx) { static int (*pencrypt_init)(EVP_PKEY_CTX *ctx); if (pencrypt_init == NULL) EVP_PKEY_meth_get_encrypt(dasync_rsa_orig, &pencrypt_init, NULL); return pencrypt_init != NULL ? pencrypt_init(ctx) : 1; } static int dasync_rsa_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { static int (*pencryptfn)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen); if (pencryptfn == NULL) EVP_PKEY_meth_get_encrypt(dasync_rsa_orig, NULL, &pencryptfn); return pencryptfn(ctx, out, outlen, in, inlen); } static int dasync_rsa_decrypt_init(EVP_PKEY_CTX *ctx) { static int (*pdecrypt_init)(EVP_PKEY_CTX *ctx); if (pdecrypt_init == NULL) EVP_PKEY_meth_get_decrypt(dasync_rsa_orig, &pdecrypt_init, NULL); return pdecrypt_init != NULL ? pdecrypt_init(ctx) : 1; } static int dasync_rsa_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) { static int (*pdecrypt)(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen); if (pdecrypt == NULL) EVP_PKEY_meth_get_decrypt(dasync_rsa_orig, NULL, &pdecrypt); return pdecrypt(ctx, out, outlen, in, inlen); } static int dasync_rsa_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) { static int (*pctrl)(EVP_PKEY_CTX *ctx, int type, int p1, void *p2); if (pctrl == NULL) EVP_PKEY_meth_get_ctrl(dasync_rsa_orig, &pctrl, NULL); return pctrl(ctx, type, p1, p2); } static int dasync_rsa_ctrl_str(EVP_PKEY_CTX *ctx, const char *type, const char *value) { static int (*pctrl_str)(EVP_PKEY_CTX *ctx, const char *type, const char *value); if (pctrl_str == NULL) EVP_PKEY_meth_get_ctrl(dasync_rsa_orig, NULL, &pctrl_str); return pctrl_str(ctx, type, value); }
engines
openssl/engines/e_dasync.c
openssl
#include <openssl/err.h> #include "e_ossltest_err.h" #ifndef OPENSSL_NO_ERR static ERR_STRING_DATA OSSLTEST_str_reasons[] = { {ERR_PACK(0, 0, OSSLTEST_R_INIT_FAILED), "init failed"}, {0, NULL} }; #endif static int lib_code = 0; static int error_loaded = 0; static int ERR_load_OSSLTEST_strings(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); if (!error_loaded) { #ifndef OPENSSL_NO_ERR ERR_load_strings(lib_code, OSSLTEST_str_reasons); #endif error_loaded = 1; } return 1; } static void ERR_unload_OSSLTEST_strings(void) { if (error_loaded) { #ifndef OPENSSL_NO_ERR ERR_unload_strings(lib_code, OSSLTEST_str_reasons); #endif error_loaded = 0; } } static void ERR_OSSLTEST_error(int function, int reason, const char *file, int line) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); ERR_raise(lib_code, reason); ERR_set_debug(file, line, NULL); }
engines
openssl/engines/e_ossltest_err.c
openssl
#include <openssl/err.h> #include "e_afalg_err.h" #ifndef OPENSSL_NO_ERR static ERR_STRING_DATA AFALG_str_reasons[] = { {ERR_PACK(0, 0, AFALG_R_EVENTFD_FAILED), "eventfd failed"}, {ERR_PACK(0, 0, AFALG_R_FAILED_TO_GET_PLATFORM_INFO), "failed to get platform info"}, {ERR_PACK(0, 0, AFALG_R_INIT_FAILED), "init failed"}, {ERR_PACK(0, 0, AFALG_R_IO_SETUP_FAILED), "io setup failed"}, {ERR_PACK(0, 0, AFALG_R_KERNEL_DOES_NOT_SUPPORT_AFALG), "kernel does not support afalg"}, {ERR_PACK(0, 0, AFALG_R_KERNEL_DOES_NOT_SUPPORT_ASYNC_AFALG), "kernel does not support async afalg"}, {ERR_PACK(0, 0, AFALG_R_KERNEL_OP_FAILED), "kernel op failed"}, {ERR_PACK(0, 0, AFALG_R_MEM_ALLOC_FAILED), "mem alloc failed"}, {ERR_PACK(0, 0, AFALG_R_SOCKET_ACCEPT_FAILED), "socket accept failed"}, {ERR_PACK(0, 0, AFALG_R_SOCKET_BIND_FAILED), "socket bind failed"}, {ERR_PACK(0, 0, AFALG_R_SOCKET_CREATE_FAILED), "socket create failed"}, {ERR_PACK(0, 0, AFALG_R_SOCKET_OPERATION_FAILED), "socket operation failed"}, {ERR_PACK(0, 0, AFALG_R_SOCKET_SET_KEY_FAILED), "socket set key failed"}, {0, NULL} }; #endif static int lib_code = 0; static int error_loaded = 0; static int ERR_load_AFALG_strings(void) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); if (!error_loaded) { #ifndef OPENSSL_NO_ERR ERR_load_strings(lib_code, AFALG_str_reasons); #endif error_loaded = 1; } return 1; } static void ERR_unload_AFALG_strings(void) { if (error_loaded) { #ifndef OPENSSL_NO_ERR ERR_unload_strings(lib_code, AFALG_str_reasons); #endif error_loaded = 0; } } static void ERR_AFALG_error(int function, int reason, const char *file, int line) { if (lib_code == 0) lib_code = ERR_get_next_error_library(); ERR_raise(lib_code, reason); ERR_set_debug(file, line, NULL); }
engines
openssl/engines/e_afalg_err.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <string.h> #include <openssl/opensslconf.h> #include <openssl/crypto.h> #include <openssl/engine.h> #include <openssl/evp.h> #include <openssl/aes.h> #include <openssl/rand.h> #include <openssl/err.h> #include <openssl/modes.h> #ifndef OPENSSL_NO_PADLOCKENG # undef COMPILE_PADLOCKENG # if defined(PADLOCK_ASM) # define COMPILE_PADLOCKENG # ifdef OPENSSL_NO_DYNAMIC_ENGINE static ENGINE *ENGINE_padlock(void); # endif # endif # ifdef OPENSSL_NO_DYNAMIC_ENGINE void engine_load_padlock_int(void); void engine_load_padlock_int(void) { # ifdef COMPILE_PADLOCKENG ENGINE *toadd = ENGINE_padlock(); if (!toadd) return; ERR_set_mark(); ENGINE_add(toadd); ENGINE_free(toadd); ERR_pop_to_mark(); # endif } # endif # ifdef COMPILE_PADLOCKENG static int padlock_available(void); static int padlock_init(ENGINE *e); static RAND_METHOD padlock_rand; static int padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid); static const char *padlock_id = "padlock"; static char padlock_name[100]; static int padlock_use_ace = 0; static int padlock_use_rng = 0; static int padlock_bind_helper(ENGINE *e) { padlock_available(); padlock_use_rng = 0; BIO_snprintf(padlock_name, sizeof(padlock_name), "VIA PadLock (%s, %s)", padlock_use_rng ? "RNG" : "no-RNG", padlock_use_ace ? "ACE" : "no-ACE"); if (!ENGINE_set_id(e, padlock_id) || !ENGINE_set_name(e, padlock_name) || !ENGINE_set_init_function(e, padlock_init) || (padlock_use_ace && !ENGINE_set_ciphers(e, padlock_ciphers)) || (padlock_use_rng && !ENGINE_set_RAND(e, &padlock_rand))) { return 0; } return 1; } # ifdef OPENSSL_NO_DYNAMIC_ENGINE static ENGINE *ENGINE_padlock(void) { ENGINE *eng = ENGINE_new(); if (eng == NULL) { return NULL; } if (!padlock_bind_helper(eng)) { ENGINE_free(eng); return NULL; } return eng; } # endif static int padlock_init(ENGINE *e) { return (padlock_use_rng || padlock_use_ace); } # ifndef AES_ASM static int padlock_aes_set_encrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key); static int padlock_aes_set_decrypt_key(const unsigned char *userKey, const int bits, AES_KEY *key); # define AES_ASM # define AES_set_encrypt_key padlock_aes_set_encrypt_key # define AES_set_decrypt_key padlock_aes_set_decrypt_key # include "../crypto/aes/aes_core.c" # endif # ifndef OPENSSL_NO_DYNAMIC_ENGINE static int padlock_bind_fn(ENGINE *e, const char *id) { if (id && (strcmp(id, padlock_id) != 0)) { return 0; } if (!padlock_bind_helper(e)) { return 0; } return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(padlock_bind_fn) # endif # define AES_BLOCK_SIZE 16 # define AES_KEY_SIZE_128 16 # define AES_KEY_SIZE_192 24 # define AES_KEY_SIZE_256 32 struct padlock_cipher_data { unsigned char iv[AES_BLOCK_SIZE]; union { unsigned int pad[4]; struct { int rounds:4; int dgst:1; int align:1; int ciphr:1; unsigned int keygen:1; int interm:1; unsigned int encdec:1; int ksize:2; } b; } cword; AES_KEY ks; }; unsigned int padlock_capability(void); void padlock_key_bswap(AES_KEY *key); void padlock_verify_context(struct padlock_cipher_data *ctx); void padlock_reload_key(void); void padlock_aes_block(void *out, const void *inp, struct padlock_cipher_data *ctx); int padlock_ecb_encrypt(void *out, const void *inp, struct padlock_cipher_data *ctx, size_t len); int padlock_cbc_encrypt(void *out, const void *inp, struct padlock_cipher_data *ctx, size_t len); int padlock_cfb_encrypt(void *out, const void *inp, struct padlock_cipher_data *ctx, size_t len); int padlock_ofb_encrypt(void *out, const void *inp, struct padlock_cipher_data *ctx, size_t len); int padlock_ctr32_encrypt(void *out, const void *inp, struct padlock_cipher_data *ctx, size_t len); int padlock_xstore(void *out, int edx); void padlock_sha1_oneshot(void *ctx, const void *inp, size_t len); void padlock_sha1(void *ctx, const void *inp, size_t len); void padlock_sha256_oneshot(void *ctx, const void *inp, size_t len); void padlock_sha256(void *ctx, const void *inp, size_t len); static int padlock_available(void) { unsigned int edx = padlock_capability(); padlock_use_ace = ((edx & (0x3 << 6)) == (0x3 << 6)); padlock_use_rng = ((edx & (0x3 << 2)) == (0x3 << 2)); return padlock_use_ace + padlock_use_rng; } # if defined(NID_aes_128_cfb128) && ! defined (NID_aes_128_cfb) # define NID_aes_128_cfb NID_aes_128_cfb128 # endif # if defined(NID_aes_128_ofb128) && ! defined (NID_aes_128_ofb) # define NID_aes_128_ofb NID_aes_128_ofb128 # endif # if defined(NID_aes_192_cfb128) && ! defined (NID_aes_192_cfb) # define NID_aes_192_cfb NID_aes_192_cfb128 # endif # if defined(NID_aes_192_ofb128) && ! defined (NID_aes_192_ofb) # define NID_aes_192_ofb NID_aes_192_ofb128 # endif # if defined(NID_aes_256_cfb128) && ! defined (NID_aes_256_cfb) # define NID_aes_256_cfb NID_aes_256_cfb128 # endif # if defined(NID_aes_256_ofb128) && ! defined (NID_aes_256_ofb) # define NID_aes_256_ofb NID_aes_256_ofb128 # endif static const int padlock_cipher_nids[] = { NID_aes_128_ecb, NID_aes_128_cbc, NID_aes_128_cfb, NID_aes_128_ofb, NID_aes_128_ctr, NID_aes_192_ecb, NID_aes_192_cbc, NID_aes_192_cfb, NID_aes_192_ofb, NID_aes_192_ctr, NID_aes_256_ecb, NID_aes_256_cbc, NID_aes_256_cfb, NID_aes_256_ofb, NID_aes_256_ctr }; static int padlock_cipher_nids_num = (sizeof(padlock_cipher_nids) / sizeof(padlock_cipher_nids[0])); static int padlock_aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); # define NEAREST_ALIGNED(ptr) ( (unsigned char *)(ptr) + \ ( (0x10 - ((size_t)(ptr) & 0x0F)) & 0x0F ) ) # define ALIGNED_CIPHER_DATA(ctx) ((struct padlock_cipher_data *)\ NEAREST_ALIGNED(EVP_CIPHER_CTX_get_cipher_data(ctx))) static int padlock_ecb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, const unsigned char *in_arg, size_t nbytes) { return padlock_ecb_encrypt(out_arg, in_arg, ALIGNED_CIPHER_DATA(ctx), nbytes); } static int padlock_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, const unsigned char *in_arg, size_t nbytes) { struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); int ret; memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); if ((ret = padlock_cbc_encrypt(out_arg, in_arg, cdata, nbytes))) memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); return ret; } static int padlock_cfb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, const unsigned char *in_arg, size_t nbytes) { struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); size_t chunk; if ((chunk = EVP_CIPHER_CTX_get_num(ctx))) { unsigned char *ivp = EVP_CIPHER_CTX_iv_noconst(ctx); if (chunk >= AES_BLOCK_SIZE) return 0; if (EVP_CIPHER_CTX_is_encrypting(ctx)) while (chunk < AES_BLOCK_SIZE && nbytes != 0) { ivp[chunk] = *(out_arg++) = *(in_arg++) ^ ivp[chunk]; chunk++, nbytes--; } else while (chunk < AES_BLOCK_SIZE && nbytes != 0) { unsigned char c = *(in_arg++); *(out_arg++) = c ^ ivp[chunk]; ivp[chunk++] = c, nbytes--; } EVP_CIPHER_CTX_set_num(ctx, chunk % AES_BLOCK_SIZE); } if (nbytes == 0) return 1; memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); if ((chunk = nbytes & ~(AES_BLOCK_SIZE - 1))) { if (!padlock_cfb_encrypt(out_arg, in_arg, cdata, chunk)) return 0; nbytes -= chunk; } if (nbytes) { unsigned char *ivp = cdata->iv; out_arg += chunk; in_arg += chunk; EVP_CIPHER_CTX_set_num(ctx, nbytes); if (cdata->cword.b.encdec) { cdata->cword.b.encdec = 0; padlock_reload_key(); padlock_aes_block(ivp, ivp, cdata); cdata->cword.b.encdec = 1; padlock_reload_key(); while (nbytes) { unsigned char c = *(in_arg++); *(out_arg++) = c ^ *ivp; *(ivp++) = c, nbytes--; } } else { padlock_reload_key(); padlock_aes_block(ivp, ivp, cdata); padlock_reload_key(); while (nbytes) { *ivp = *(out_arg++) = *(in_arg++) ^ *ivp; ivp++, nbytes--; } } } memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); return 1; } static int padlock_ofb_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, const unsigned char *in_arg, size_t nbytes) { struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); size_t chunk; if ((chunk = EVP_CIPHER_CTX_get_num(ctx))) { unsigned char *ivp = EVP_CIPHER_CTX_iv_noconst(ctx); if (chunk >= AES_BLOCK_SIZE) return 0; while (chunk < AES_BLOCK_SIZE && nbytes != 0) { *(out_arg++) = *(in_arg++) ^ ivp[chunk]; chunk++, nbytes--; } EVP_CIPHER_CTX_set_num(ctx, chunk % AES_BLOCK_SIZE); } if (nbytes == 0) return 1; memcpy(cdata->iv, EVP_CIPHER_CTX_iv(ctx), AES_BLOCK_SIZE); if ((chunk = nbytes & ~(AES_BLOCK_SIZE - 1))) { if (!padlock_ofb_encrypt(out_arg, in_arg, cdata, chunk)) return 0; nbytes -= chunk; } if (nbytes) { unsigned char *ivp = cdata->iv; out_arg += chunk; in_arg += chunk; EVP_CIPHER_CTX_set_num(ctx, nbytes); padlock_reload_key(); padlock_aes_block(ivp, ivp, cdata); padlock_reload_key(); while (nbytes) { *(out_arg++) = *(in_arg++) ^ *ivp; ivp++, nbytes--; } } memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), cdata->iv, AES_BLOCK_SIZE); return 1; } static void padlock_ctr32_encrypt_glue(const unsigned char *in, unsigned char *out, size_t blocks, struct padlock_cipher_data *ctx, const unsigned char *ivec) { memcpy(ctx->iv, ivec, AES_BLOCK_SIZE); padlock_ctr32_encrypt(out, in, ctx, AES_BLOCK_SIZE * blocks); } static int padlock_ctr_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out_arg, const unsigned char *in_arg, size_t nbytes) { struct padlock_cipher_data *cdata = ALIGNED_CIPHER_DATA(ctx); int n = EVP_CIPHER_CTX_get_num(ctx); unsigned int num; if (n < 0) return 0; num = (unsigned int)n; CRYPTO_ctr128_encrypt_ctr32(in_arg, out_arg, nbytes, cdata, EVP_CIPHER_CTX_iv_noconst(ctx), EVP_CIPHER_CTX_buf_noconst(ctx), &num, (ctr128_f) padlock_ctr32_encrypt_glue); EVP_CIPHER_CTX_set_num(ctx, (size_t)num); return 1; } # define EVP_CIPHER_block_size_ECB AES_BLOCK_SIZE # define EVP_CIPHER_block_size_CBC AES_BLOCK_SIZE # define EVP_CIPHER_block_size_OFB 1 # define EVP_CIPHER_block_size_CFB 1 # define EVP_CIPHER_block_size_CTR 1 # define DECLARE_AES_EVP(ksize,lmode,umode) \ static EVP_CIPHER *_hidden_aes_##ksize##_##lmode = NULL; \ static const EVP_CIPHER *padlock_aes_##ksize##_##lmode(void) \ { \ if (_hidden_aes_##ksize##_##lmode == NULL \ && ((_hidden_aes_##ksize##_##lmode = \ EVP_CIPHER_meth_new(NID_aes_##ksize##_##lmode, \ EVP_CIPHER_block_size_##umode, \ AES_KEY_SIZE_##ksize)) == NULL \ || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_##ksize##_##lmode, \ AES_BLOCK_SIZE) \ || !EVP_CIPHER_meth_set_flags(_hidden_aes_##ksize##_##lmode, \ 0 | EVP_CIPH_##umode##_MODE) \ || !EVP_CIPHER_meth_set_init(_hidden_aes_##ksize##_##lmode, \ padlock_aes_init_key) \ || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_##ksize##_##lmode, \ padlock_##lmode##_cipher) \ || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_##ksize##_##lmode, \ sizeof(struct padlock_cipher_data) + 16) \ || !EVP_CIPHER_meth_set_set_asn1_params(_hidden_aes_##ksize##_##lmode, \ EVP_CIPHER_set_asn1_iv) \ || !EVP_CIPHER_meth_set_get_asn1_params(_hidden_aes_##ksize##_##lmode, \ EVP_CIPHER_get_asn1_iv))) { \ EVP_CIPHER_meth_free(_hidden_aes_##ksize##_##lmode); \ _hidden_aes_##ksize##_##lmode = NULL; \ } \ return _hidden_aes_##ksize##_##lmode; \ } DECLARE_AES_EVP(128, ecb, ECB) DECLARE_AES_EVP(128, cbc, CBC) DECLARE_AES_EVP(128, cfb, CFB) DECLARE_AES_EVP(128, ofb, OFB) DECLARE_AES_EVP(128, ctr, CTR) DECLARE_AES_EVP(192, ecb, ECB) DECLARE_AES_EVP(192, cbc, CBC) DECLARE_AES_EVP(192, cfb, CFB) DECLARE_AES_EVP(192, ofb, OFB) DECLARE_AES_EVP(192, ctr, CTR) DECLARE_AES_EVP(256, ecb, ECB) DECLARE_AES_EVP(256, cbc, CBC) DECLARE_AES_EVP(256, cfb, CFB) DECLARE_AES_EVP(256, ofb, OFB) DECLARE_AES_EVP(256, ctr, CTR) static int padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) { if (!cipher) { *nids = padlock_cipher_nids; return padlock_cipher_nids_num; } switch (nid) { case NID_aes_128_ecb: *cipher = padlock_aes_128_ecb(); break; case NID_aes_128_cbc: *cipher = padlock_aes_128_cbc(); break; case NID_aes_128_cfb: *cipher = padlock_aes_128_cfb(); break; case NID_aes_128_ofb: *cipher = padlock_aes_128_ofb(); break; case NID_aes_128_ctr: *cipher = padlock_aes_128_ctr(); break; case NID_aes_192_ecb: *cipher = padlock_aes_192_ecb(); break; case NID_aes_192_cbc: *cipher = padlock_aes_192_cbc(); break; case NID_aes_192_cfb: *cipher = padlock_aes_192_cfb(); break; case NID_aes_192_ofb: *cipher = padlock_aes_192_ofb(); break; case NID_aes_192_ctr: *cipher = padlock_aes_192_ctr(); break; case NID_aes_256_ecb: *cipher = padlock_aes_256_ecb(); break; case NID_aes_256_cbc: *cipher = padlock_aes_256_cbc(); break; case NID_aes_256_cfb: *cipher = padlock_aes_256_cfb(); break; case NID_aes_256_ofb: *cipher = padlock_aes_256_ofb(); break; case NID_aes_256_ctr: *cipher = padlock_aes_256_ctr(); break; default: *cipher = NULL; return 0; } return 1; } static int padlock_aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { struct padlock_cipher_data *cdata; int key_len = EVP_CIPHER_CTX_get_key_length(ctx) * 8; unsigned long mode = EVP_CIPHER_CTX_get_mode(ctx); if (key == NULL) return 0; cdata = ALIGNED_CIPHER_DATA(ctx); memset(cdata, 0, sizeof(*cdata)); if (mode == EVP_CIPH_OFB_MODE || mode == EVP_CIPH_CTR_MODE) cdata->cword.b.encdec = 0; else cdata->cword.b.encdec = (EVP_CIPHER_CTX_is_encrypting(ctx) == 0); cdata->cword.b.rounds = 10 + (key_len - 128) / 32; cdata->cword.b.ksize = (key_len - 128) / 64; switch (key_len) { case 128: memcpy(cdata->ks.rd_key, key, AES_KEY_SIZE_128); cdata->cword.b.keygen = 0; break; case 192: case 256: if ((mode == EVP_CIPH_ECB_MODE || mode == EVP_CIPH_CBC_MODE) && !enc) AES_set_decrypt_key(key, key_len, &cdata->ks); else AES_set_encrypt_key(key, key_len, &cdata->ks); padlock_key_bswap(&cdata->ks); cdata->cword.b.keygen = 1; break; default: return 0; } padlock_reload_key(); return 1; } static int padlock_rand_bytes(unsigned char *output, int count) { unsigned int eax, buf; while (count >= 8) { eax = padlock_xstore(output, 0); if (!(eax & (1 << 6))) return 0; if (eax & (0x1F << 10)) return 0; if ((eax & 0x1F) == 0) continue; if ((eax & 0x1F) != 8) return 0; output += 8; count -= 8; } while (count > 0) { eax = padlock_xstore(&buf, 3); if (!(eax & (1 << 6))) return 0; if (eax & (0x1F << 10)) return 0; if ((eax & 0x1F) == 0) continue; if ((eax & 0x1F) != 1) return 0; *output++ = (unsigned char)buf; count--; } OPENSSL_cleanse(&buf, sizeof(buf)); return 1; } static int padlock_rand_status(void) { return 1; } static RAND_METHOD padlock_rand = { NULL, padlock_rand_bytes, NULL, NULL, padlock_rand_bytes, padlock_rand_status, }; # endif #endif #if defined(OPENSSL_NO_PADLOCKENG) || !defined(COMPILE_PADLOCKENG) # ifndef OPENSSL_NO_DYNAMIC_ENGINE OPENSSL_EXPORT int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns); OPENSSL_EXPORT int bind_engine(ENGINE *e, const char *id, const dynamic_fns *fns) { return 0; } IMPLEMENT_DYNAMIC_CHECK_FN() # endif #endif
engines
openssl/engines/e_padlock.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include "internal/e_os.h" #include <string.h> #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #include <sys/ioctl.h> #include <unistd.h> #include <assert.h> #include <openssl/conf.h> #include <openssl/evp.h> #include <openssl/err.h> #include <openssl/engine.h> #include <openssl/objects.h> #include "crypto/cryptodev.h" #include "internal/nelem.h" #if CRYPTO_ALGORITHM_MIN < CRYPTO_ALGORITHM_MAX # define CHECK_BSD_STYLE_MACROS #endif #define engine_devcrypto_id "devcrypto" #ifdef CIOCGSESSION2 typedef struct session2_op session_op_t; #else typedef struct session_op session_op_t; #endif static int cfd = -1; #define DEVCRYPTO_REQUIRE_ACCELERATED 0 #define DEVCRYPTO_USE_SOFTWARE 1 #define DEVCRYPTO_REJECT_SOFTWARE 2 #define DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS DEVCRYPTO_REJECT_SOFTWARE static int use_softdrivers = DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS; struct driver_info_st { enum devcrypto_status_t { DEVCRYPTO_STATUS_FAILURE = -3, DEVCRYPTO_STATUS_NO_CIOCCPHASH = -2, DEVCRYPTO_STATUS_NO_CIOCGSESSION = -1, DEVCRYPTO_STATUS_UNKNOWN = 0, DEVCRYPTO_STATUS_USABLE = 1 } status; enum devcrypto_accelerated_t { DEVCRYPTO_NOT_ACCELERATED = -1, DEVCRYPTO_ACCELERATION_UNKNOWN = 0, DEVCRYPTO_ACCELERATED = 1 } accelerated; char *driver_name; }; #ifdef OPENSSL_NO_DYNAMIC_ENGINE void engine_load_devcrypto_int(void); #endif static int clean_devcrypto_session(session_op_t *sess) { if (ioctl(cfd, CIOCFSESSION, &sess->ses) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } memset(sess, 0, sizeof(*sess)); return 1; } struct cipher_ctx { session_op_t sess; int op; unsigned long mode; unsigned char partial[EVP_MAX_BLOCK_LENGTH]; unsigned int blocksize, num; }; static const struct cipher_data_st { int nid; int blocksize; int keylen; int ivlen; int flags; int devcryptoid; } cipher_data[] = { #ifndef OPENSSL_NO_DES { NID_des_cbc, 8, 8, 8, EVP_CIPH_CBC_MODE, CRYPTO_DES_CBC }, { NID_des_ede3_cbc, 8, 24, 8, EVP_CIPH_CBC_MODE, CRYPTO_3DES_CBC }, #endif #ifndef OPENSSL_NO_BF { NID_bf_cbc, 8, 16, 8, EVP_CIPH_CBC_MODE, CRYPTO_BLF_CBC }, #endif #ifndef OPENSSL_NO_CAST { NID_cast5_cbc, 8, 16, 8, EVP_CIPH_CBC_MODE, CRYPTO_CAST_CBC }, #endif { NID_aes_128_cbc, 16, 128 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC }, { NID_aes_192_cbc, 16, 192 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC }, { NID_aes_256_cbc, 16, 256 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_AES_CBC }, #ifndef OPENSSL_NO_RC4 { NID_rc4, 1, 16, 0, EVP_CIPH_STREAM_CIPHER, CRYPTO_ARC4 }, #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_AES_CTR) { NID_aes_128_ctr, 16, 128 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR }, { NID_aes_192_ctr, 16, 192 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR }, { NID_aes_256_ctr, 16, 256 / 8, 16, EVP_CIPH_CTR_MODE, CRYPTO_AES_CTR }, #endif #if 0 { NID_aes_128_xts, 16, 128 / 8 * 2, 16, EVP_CIPH_XTS_MODE, CRYPTO_AES_XTS }, { NID_aes_256_xts, 16, 256 / 8 * 2, 16, EVP_CIPH_XTS_MODE, CRYPTO_AES_XTS }, #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_AES_ECB) { NID_aes_128_ecb, 16, 128 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB }, { NID_aes_192_ecb, 16, 192 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB }, { NID_aes_256_ecb, 16, 256 / 8, 0, EVP_CIPH_ECB_MODE, CRYPTO_AES_ECB }, #endif #if 0 { NID_aes_128_gcm, 16, 128 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM }, { NID_aes_192_gcm, 16, 192 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM }, { NID_aes_256_gcm, 16, 256 / 8, 16, EVP_CIPH_GCM_MODE, CRYPTO_AES_GCM }, #endif #ifndef OPENSSL_NO_CAMELLIA { NID_camellia_128_cbc, 16, 128 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_CAMELLIA_CBC }, { NID_camellia_192_cbc, 16, 192 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_CAMELLIA_CBC }, { NID_camellia_256_cbc, 16, 256 / 8, 16, EVP_CIPH_CBC_MODE, CRYPTO_CAMELLIA_CBC }, #endif }; static size_t find_cipher_data_index(int nid) { size_t i; for (i = 0; i < OSSL_NELEM(cipher_data); i++) if (nid == cipher_data[i].nid) return i; return (size_t)-1; } static size_t get_cipher_data_index(int nid) { size_t i = find_cipher_data_index(nid); if (i != (size_t)-1) return i; assert("Code that never should be reached" == NULL); return -1; } static const struct cipher_data_st *get_cipher_data(int nid) { return &cipher_data[get_cipher_data_index(nid)]; } static int cipher_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { struct cipher_ctx *cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); const struct cipher_data_st *cipher_d = get_cipher_data(EVP_CIPHER_CTX_get_nid(ctx)); int ret; if (cipher_ctx->sess.ses != 0 && clean_devcrypto_session(&cipher_ctx->sess) == 0) return 0; cipher_ctx->sess.cipher = cipher_d->devcryptoid; cipher_ctx->sess.keylen = cipher_d->keylen; cipher_ctx->sess.key = (void *)key; cipher_ctx->op = enc ? COP_ENCRYPT : COP_DECRYPT; cipher_ctx->mode = cipher_d->flags & EVP_CIPH_MODE; cipher_ctx->blocksize = cipher_d->blocksize; #ifdef CIOCGSESSION2 cipher_ctx->sess.crid = (use_softdrivers == DEVCRYPTO_USE_SOFTWARE) ? CRYPTO_FLAG_SOFTWARE | CRYPTO_FLAG_HARDWARE : CRYPTO_FLAG_HARDWARE; ret = ioctl(cfd, CIOCGSESSION2, &cipher_ctx->sess); #else ret = ioctl(cfd, CIOCGSESSION, &cipher_ctx->sess); #endif if (ret < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } return 1; } static int cipher_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { struct cipher_ctx *cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); struct crypt_op cryp; unsigned char *iv = EVP_CIPHER_CTX_iv_noconst(ctx); #if !defined(COP_FLAG_WRITE_IV) unsigned char saved_iv[EVP_MAX_IV_LENGTH]; const unsigned char *ivptr; size_t nblocks, ivlen; #endif memset(&cryp, 0, sizeof(cryp)); cryp.ses = cipher_ctx->sess.ses; cryp.len = inl; cryp.src = (void *)in; cryp.dst = (void *)out; cryp.iv = (void *)iv; cryp.op = cipher_ctx->op; #if !defined(COP_FLAG_WRITE_IV) cryp.flags = 0; ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); if (ivlen > 0) switch (cipher_ctx->mode) { case EVP_CIPH_CBC_MODE: assert(inl >= ivlen); if (!EVP_CIPHER_CTX_is_encrypting(ctx)) { ivptr = in + inl - ivlen; memcpy(saved_iv, ivptr, ivlen); } break; case EVP_CIPH_CTR_MODE: break; default: return 0; } #else cryp.flags = COP_FLAG_WRITE_IV; #endif if (ioctl(cfd, CIOCCRYPT, &cryp) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } #if !defined(COP_FLAG_WRITE_IV) if (ivlen > 0) switch (cipher_ctx->mode) { case EVP_CIPH_CBC_MODE: assert(inl >= ivlen); if (EVP_CIPHER_CTX_is_encrypting(ctx)) ivptr = out + inl - ivlen; else ivptr = saved_iv; memcpy(iv, ivptr, ivlen); break; case EVP_CIPH_CTR_MODE: nblocks = (inl + cipher_ctx->blocksize - 1) / cipher_ctx->blocksize; do { ivlen--; nblocks += iv[ivlen]; iv[ivlen] = (uint8_t) nblocks; nblocks >>= 8; } while (ivlen); break; default: return 0; } #endif return 1; } static int ctr_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { struct cipher_ctx *cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); size_t nblocks, len; while (cipher_ctx->num && inl) { (*out++) = *(in++) ^ cipher_ctx->partial[cipher_ctx->num]; --inl; cipher_ctx->num = (cipher_ctx->num + 1) % cipher_ctx->blocksize; } if (inl > cipher_ctx->blocksize) { nblocks = inl/cipher_ctx->blocksize; len = nblocks * cipher_ctx->blocksize; if (cipher_do_cipher(ctx, out, in, len) < 1) return 0; inl -= len; out += len; in += len; } if (inl) { memset(cipher_ctx->partial, 0, cipher_ctx->blocksize); if (cipher_do_cipher(ctx, cipher_ctx->partial, cipher_ctx->partial, cipher_ctx->blocksize) < 1) return 0; while (inl--) { out[cipher_ctx->num] = in[cipher_ctx->num] ^ cipher_ctx->partial[cipher_ctx->num]; cipher_ctx->num++; } } return 1; } static int cipher_ctrl(EVP_CIPHER_CTX *ctx, int type, int p1, void* p2) { struct cipher_ctx *cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); EVP_CIPHER_CTX *to_ctx = (EVP_CIPHER_CTX *)p2; struct cipher_ctx *to_cipher_ctx; switch (type) { case EVP_CTRL_COPY: if (cipher_ctx == NULL) return 1; to_cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(to_ctx); memset(&to_cipher_ctx->sess, 0, sizeof(to_cipher_ctx->sess)); return cipher_init(to_ctx, (void *)cipher_ctx->sess.key, EVP_CIPHER_CTX_iv(ctx), (cipher_ctx->op == COP_ENCRYPT)); case EVP_CTRL_INIT: memset(&cipher_ctx->sess, 0, sizeof(cipher_ctx->sess)); return 1; default: break; } return -1; } static int cipher_cleanup(EVP_CIPHER_CTX *ctx) { struct cipher_ctx *cipher_ctx = (struct cipher_ctx *)EVP_CIPHER_CTX_get_cipher_data(ctx); return clean_devcrypto_session(&cipher_ctx->sess); } static int known_cipher_nids[OSSL_NELEM(cipher_data)]; static int known_cipher_nids_amount = -1; static EVP_CIPHER *known_cipher_methods[OSSL_NELEM(cipher_data)] = { NULL, }; static int selected_ciphers[OSSL_NELEM(cipher_data)]; static struct driver_info_st cipher_driver_info[OSSL_NELEM(cipher_data)]; static int devcrypto_test_cipher(size_t cipher_data_index) { return (cipher_driver_info[cipher_data_index].status == DEVCRYPTO_STATUS_USABLE && selected_ciphers[cipher_data_index] == 1 && (cipher_driver_info[cipher_data_index].accelerated == DEVCRYPTO_ACCELERATED || use_softdrivers == DEVCRYPTO_USE_SOFTWARE || (cipher_driver_info[cipher_data_index].accelerated != DEVCRYPTO_NOT_ACCELERATED && use_softdrivers == DEVCRYPTO_REJECT_SOFTWARE))); } static void prepare_cipher_methods(void) { size_t i; session_op_t sess; unsigned long cipher_mode; #ifdef CIOCGSESSION2 struct crypt_find_op fop; enum devcrypto_accelerated_t accelerated; #elif defined(CIOCGSESSINFO) struct session_info_op siop; #endif memset(&cipher_driver_info, 0, sizeof(cipher_driver_info)); memset(&sess, 0, sizeof(sess)); sess.key = (void *)"01234567890123456789012345678901234567890123456789"; for (i = 0, known_cipher_nids_amount = 0; i < OSSL_NELEM(cipher_data); i++) { selected_ciphers[i] = 1; sess.cipher = cipher_data[i].devcryptoid; sess.keylen = cipher_data[i].keylen; #ifdef CIOCGSESSION2 sess.crid = CRYPTO_FLAG_HARDWARE; if (ioctl(cfd, CIOCGSESSION2, &sess) == 0) { accelerated = DEVCRYPTO_ACCELERATED; } else { sess.crid = CRYPTO_FLAG_SOFTWARE; if (ioctl(cfd, CIOCGSESSION2, &sess) < 0) { cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; continue; } accelerated = DEVCRYPTO_NOT_ACCELERATED; } #else if (ioctl(cfd, CIOCGSESSION, &sess) < 0) { cipher_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; continue; } #endif cipher_mode = cipher_data[i].flags & EVP_CIPH_MODE; if ((known_cipher_methods[i] = EVP_CIPHER_meth_new(cipher_data[i].nid, cipher_mode == EVP_CIPH_CTR_MODE ? 1 : cipher_data[i].blocksize, cipher_data[i].keylen)) == NULL || !EVP_CIPHER_meth_set_iv_length(known_cipher_methods[i], cipher_data[i].ivlen) || !EVP_CIPHER_meth_set_flags(known_cipher_methods[i], cipher_data[i].flags | EVP_CIPH_CUSTOM_COPY | EVP_CIPH_CTRL_INIT | EVP_CIPH_FLAG_DEFAULT_ASN1) || !EVP_CIPHER_meth_set_init(known_cipher_methods[i], cipher_init) || !EVP_CIPHER_meth_set_do_cipher(known_cipher_methods[i], cipher_mode == EVP_CIPH_CTR_MODE ? ctr_do_cipher : cipher_do_cipher) || !EVP_CIPHER_meth_set_ctrl(known_cipher_methods[i], cipher_ctrl) || !EVP_CIPHER_meth_set_cleanup(known_cipher_methods[i], cipher_cleanup) || !EVP_CIPHER_meth_set_impl_ctx_size(known_cipher_methods[i], sizeof(struct cipher_ctx))) { cipher_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; EVP_CIPHER_meth_free(known_cipher_methods[i]); known_cipher_methods[i] = NULL; } else { cipher_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; #ifdef CIOCGSESSION2 cipher_driver_info[i].accelerated = accelerated; fop.crid = sess.crid; if (ioctl(cfd, CIOCFINDDEV, &fop) == 0) { cipher_driver_info[i].driver_name = OPENSSL_strndup(fop.name, sizeof(fop.name)); } #elif defined(CIOCGSESSINFO) siop.ses = sess.ses; if (ioctl(cfd, CIOCGSESSINFO, &siop) < 0) { cipher_driver_info[i].accelerated = DEVCRYPTO_ACCELERATION_UNKNOWN; } else { cipher_driver_info[i].driver_name = OPENSSL_strndup(siop.cipher_info.cra_driver_name, CRYPTODEV_MAX_ALG_NAME); if (!(siop.flags & SIOP_FLAG_KERNEL_DRIVER_ONLY)) cipher_driver_info[i].accelerated = DEVCRYPTO_NOT_ACCELERATED; else cipher_driver_info[i].accelerated = DEVCRYPTO_ACCELERATED; } #endif } ioctl(cfd, CIOCFSESSION, &sess.ses); if (devcrypto_test_cipher(i)) { known_cipher_nids[known_cipher_nids_amount++] = cipher_data[i].nid; } } } static void rebuild_known_cipher_nids(ENGINE *e) { size_t i; for (i = 0, known_cipher_nids_amount = 0; i < OSSL_NELEM(cipher_data); i++) { if (devcrypto_test_cipher(i)) known_cipher_nids[known_cipher_nids_amount++] = cipher_data[i].nid; } ENGINE_unregister_ciphers(e); ENGINE_register_ciphers(e); } static const EVP_CIPHER *get_cipher_method(int nid) { size_t i = get_cipher_data_index(nid); if (i == (size_t)-1) return NULL; return known_cipher_methods[i]; } static int get_cipher_nids(const int **nids) { *nids = known_cipher_nids; return known_cipher_nids_amount; } static void destroy_cipher_method(int nid) { size_t i = get_cipher_data_index(nid); EVP_CIPHER_meth_free(known_cipher_methods[i]); known_cipher_methods[i] = NULL; } static void destroy_all_cipher_methods(void) { size_t i; for (i = 0; i < OSSL_NELEM(cipher_data); i++) { destroy_cipher_method(cipher_data[i].nid); OPENSSL_free(cipher_driver_info[i].driver_name); cipher_driver_info[i].driver_name = NULL; } } static int devcrypto_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) { if (cipher == NULL) return get_cipher_nids(nids); *cipher = get_cipher_method(nid); return *cipher != NULL; } static void devcrypto_select_all_ciphers(int *cipher_list) { size_t i; for (i = 0; i < OSSL_NELEM(cipher_data); i++) cipher_list[i] = 1; } static int cryptodev_select_cipher_cb(const char *str, int len, void *usr) { int *cipher_list = (int *)usr; char *name; const EVP_CIPHER *EVP; size_t i; if (len == 0) return 1; if (usr == NULL || (name = OPENSSL_strndup(str, len)) == NULL) return 0; EVP = EVP_get_cipherbyname(name); if (EVP == NULL) fprintf(stderr, "devcrypto: unknown cipher %s\n", name); else if ((i = find_cipher_data_index(EVP_CIPHER_get_nid(EVP))) != (size_t)-1) cipher_list[i] = 1; else fprintf(stderr, "devcrypto: cipher %s not available\n", name); OPENSSL_free(name); return 1; } static void dump_cipher_info(void) { size_t i; const char *name; fprintf (stderr, "Information about ciphers supported by the /dev/crypto" " engine:\n"); #ifndef CIOCGSESSINFO fprintf(stderr, "CIOCGSESSINFO (session info call) unavailable\n"); #endif for (i = 0; i < OSSL_NELEM(cipher_data); i++) { name = OBJ_nid2sn(cipher_data[i].nid); fprintf (stderr, "Cipher %s, NID=%d, /dev/crypto info: id=%d, ", name ? name : "unknown", cipher_data[i].nid, cipher_data[i].devcryptoid); if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCGSESSION) { fprintf (stderr, "CIOCGSESSION (session open call) failed\n"); continue; } fprintf (stderr, "driver=%s ", cipher_driver_info[i].driver_name ? cipher_driver_info[i].driver_name : "unknown"); if (cipher_driver_info[i].accelerated == DEVCRYPTO_ACCELERATED) fprintf(stderr, "(hw accelerated)"); else if (cipher_driver_info[i].accelerated == DEVCRYPTO_NOT_ACCELERATED) fprintf(stderr, "(software)"); else fprintf(stderr, "(acceleration status unknown)"); if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) fprintf (stderr, ". Cipher setup failed"); fprintf(stderr, "\n"); } fprintf(stderr, "\n"); } #if defined(CIOCCPHASH) && defined(COP_FLAG_UPDATE) && defined(COP_FLAG_FINAL) #define IMPLEMENT_DIGEST struct digest_ctx { session_op_t sess; int init_called; unsigned char digest_res[HASH_MAX_LEN]; }; static const struct digest_data_st { int nid; int blocksize; int digestlen; int devcryptoid; } digest_data[] = { #ifndef OPENSSL_NO_MD5 { NID_md5, 64, 16, CRYPTO_MD5 }, #endif { NID_sha1, SHA_CBLOCK, 20, CRYPTO_SHA1 }, #ifndef OPENSSL_NO_RMD160 # if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_RIPEMD160) { NID_ripemd160, 64, 20, CRYPTO_RIPEMD160 }, # endif #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_224) { NID_sha224, SHA256_CBLOCK, 224 / 8, CRYPTO_SHA2_224 }, #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_256) { NID_sha256, SHA256_CBLOCK, 256 / 8, CRYPTO_SHA2_256 }, #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_384) { NID_sha384, SHA512_CBLOCK, 384 / 8, CRYPTO_SHA2_384 }, #endif #if !defined(CHECK_BSD_STYLE_MACROS) || defined(CRYPTO_SHA2_512) { NID_sha512, SHA512_CBLOCK, 512 / 8, CRYPTO_SHA2_512 }, #endif }; static size_t find_digest_data_index(int nid) { size_t i; for (i = 0; i < OSSL_NELEM(digest_data); i++) if (nid == digest_data[i].nid) return i; return (size_t)-1; } static size_t get_digest_data_index(int nid) { size_t i = find_digest_data_index(nid); if (i != (size_t)-1) return i; assert("Code that never should be reached" == NULL); return -1; } static const struct digest_data_st *get_digest_data(int nid) { return &digest_data[get_digest_data_index(nid)]; } static int digest_init(EVP_MD_CTX *ctx) { struct digest_ctx *digest_ctx = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx); const struct digest_data_st *digest_d = get_digest_data(EVP_MD_CTX_get_type(ctx)); digest_ctx->init_called = 1; memset(&digest_ctx->sess, 0, sizeof(digest_ctx->sess)); digest_ctx->sess.mac = digest_d->devcryptoid; if (ioctl(cfd, CIOCGSESSION, &digest_ctx->sess) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } return 1; } static int digest_op(struct digest_ctx *ctx, const void *src, size_t srclen, void *res, unsigned int flags) { struct crypt_op cryp; memset(&cryp, 0, sizeof(cryp)); cryp.ses = ctx->sess.ses; cryp.len = srclen; cryp.src = (void *)src; cryp.dst = NULL; cryp.mac = res; cryp.flags = flags; return ioctl(cfd, CIOCCRYPT, &cryp); } static int digest_update(EVP_MD_CTX *ctx, const void *data, size_t count) { struct digest_ctx *digest_ctx = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx); if (count == 0) return 1; if (digest_ctx == NULL) return 0; if (EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT)) { if (digest_op(digest_ctx, data, count, digest_ctx->digest_res, 0) >= 0) return 1; } else if (digest_op(digest_ctx, data, count, NULL, COP_FLAG_UPDATE) >= 0) { return 1; } ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } static int digest_final(EVP_MD_CTX *ctx, unsigned char *md) { struct digest_ctx *digest_ctx = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx); if (md == NULL || digest_ctx == NULL) return 0; if (EVP_MD_CTX_test_flags(ctx, EVP_MD_CTX_FLAG_ONESHOT)) { memcpy(md, digest_ctx->digest_res, EVP_MD_CTX_get_size(ctx)); } else if (digest_op(digest_ctx, NULL, 0, md, COP_FLAG_FINAL) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } return 1; } static int digest_copy(EVP_MD_CTX *to, const EVP_MD_CTX *from) { struct digest_ctx *digest_from = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(from); struct digest_ctx *digest_to = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(to); struct cphash_op cphash; if (digest_from == NULL || digest_from->init_called != 1) return 1; if (!digest_init(to)) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } cphash.src_ses = digest_from->sess.ses; cphash.dst_ses = digest_to->sess.ses; if (ioctl(cfd, CIOCCPHASH, &cphash) < 0) { ERR_raise_data(ERR_LIB_SYS, errno, "calling ioctl()"); return 0; } return 1; } static int digest_cleanup(EVP_MD_CTX *ctx) { struct digest_ctx *digest_ctx = (struct digest_ctx *)EVP_MD_CTX_get0_md_data(ctx); if (digest_ctx == NULL) return 1; return clean_devcrypto_session(&digest_ctx->sess); } static int known_digest_nids[OSSL_NELEM(digest_data)]; static int known_digest_nids_amount = -1; static EVP_MD *known_digest_methods[OSSL_NELEM(digest_data)] = { NULL, }; static int selected_digests[OSSL_NELEM(digest_data)]; static struct driver_info_st digest_driver_info[OSSL_NELEM(digest_data)]; static int devcrypto_test_digest(size_t digest_data_index) { return (digest_driver_info[digest_data_index].status == DEVCRYPTO_STATUS_USABLE && selected_digests[digest_data_index] == 1 && (digest_driver_info[digest_data_index].accelerated == DEVCRYPTO_ACCELERATED || use_softdrivers == DEVCRYPTO_USE_SOFTWARE || (digest_driver_info[digest_data_index].accelerated != DEVCRYPTO_NOT_ACCELERATED && use_softdrivers == DEVCRYPTO_REJECT_SOFTWARE))); } static void rebuild_known_digest_nids(ENGINE *e) { size_t i; for (i = 0, known_digest_nids_amount = 0; i < OSSL_NELEM(digest_data); i++) { if (devcrypto_test_digest(i)) known_digest_nids[known_digest_nids_amount++] = digest_data[i].nid; } ENGINE_unregister_digests(e); ENGINE_register_digests(e); } static void prepare_digest_methods(void) { size_t i; session_op_t sess1, sess2; #ifdef CIOCGSESSINFO struct session_info_op siop; #endif struct cphash_op cphash; memset(&digest_driver_info, 0, sizeof(digest_driver_info)); memset(&sess1, 0, sizeof(sess1)); memset(&sess2, 0, sizeof(sess2)); for (i = 0, known_digest_nids_amount = 0; i < OSSL_NELEM(digest_data); i++) { selected_digests[i] = 1; sess1.mac = digest_data[i].devcryptoid; sess2.ses = 0; if (ioctl(cfd, CIOCGSESSION, &sess1) < 0) { digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCGSESSION; goto finish; } #ifdef CIOCGSESSINFO siop.ses = sess1.ses; if (ioctl(cfd, CIOCGSESSINFO, &siop) < 0) { digest_driver_info[i].accelerated = DEVCRYPTO_ACCELERATION_UNKNOWN; } else { digest_driver_info[i].driver_name = OPENSSL_strndup(siop.hash_info.cra_driver_name, CRYPTODEV_MAX_ALG_NAME); if (siop.flags & SIOP_FLAG_KERNEL_DRIVER_ONLY) digest_driver_info[i].accelerated = DEVCRYPTO_ACCELERATED; else digest_driver_info[i].accelerated = DEVCRYPTO_NOT_ACCELERATED; } #endif sess2.mac = sess1.mac; if (ioctl(cfd, CIOCGSESSION, &sess2) < 0) { digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; goto finish; } cphash.src_ses = sess1.ses; cphash.dst_ses = sess2.ses; if (ioctl(cfd, CIOCCPHASH, &cphash) < 0) { digest_driver_info[i].status = DEVCRYPTO_STATUS_NO_CIOCCPHASH; goto finish; } if ((known_digest_methods[i] = EVP_MD_meth_new(digest_data[i].nid, NID_undef)) == NULL || !EVP_MD_meth_set_input_blocksize(known_digest_methods[i], digest_data[i].blocksize) || !EVP_MD_meth_set_result_size(known_digest_methods[i], digest_data[i].digestlen) || !EVP_MD_meth_set_init(known_digest_methods[i], digest_init) || !EVP_MD_meth_set_update(known_digest_methods[i], digest_update) || !EVP_MD_meth_set_final(known_digest_methods[i], digest_final) || !EVP_MD_meth_set_copy(known_digest_methods[i], digest_copy) || !EVP_MD_meth_set_cleanup(known_digest_methods[i], digest_cleanup) || !EVP_MD_meth_set_app_datasize(known_digest_methods[i], sizeof(struct digest_ctx))) { digest_driver_info[i].status = DEVCRYPTO_STATUS_FAILURE; EVP_MD_meth_free(known_digest_methods[i]); known_digest_methods[i] = NULL; goto finish; } digest_driver_info[i].status = DEVCRYPTO_STATUS_USABLE; finish: ioctl(cfd, CIOCFSESSION, &sess1.ses); if (sess2.ses != 0) ioctl(cfd, CIOCFSESSION, &sess2.ses); if (devcrypto_test_digest(i)) known_digest_nids[known_digest_nids_amount++] = digest_data[i].nid; } } static const EVP_MD *get_digest_method(int nid) { size_t i = get_digest_data_index(nid); if (i == (size_t)-1) return NULL; return known_digest_methods[i]; } static int get_digest_nids(const int **nids) { *nids = known_digest_nids; return known_digest_nids_amount; } static void destroy_digest_method(int nid) { size_t i = get_digest_data_index(nid); EVP_MD_meth_free(known_digest_methods[i]); known_digest_methods[i] = NULL; } static void destroy_all_digest_methods(void) { size_t i; for (i = 0; i < OSSL_NELEM(digest_data); i++) { destroy_digest_method(digest_data[i].nid); OPENSSL_free(digest_driver_info[i].driver_name); digest_driver_info[i].driver_name = NULL; } } static int devcrypto_digests(ENGINE *e, const EVP_MD **digest, const int **nids, int nid) { if (digest == NULL) return get_digest_nids(nids); *digest = get_digest_method(nid); return *digest != NULL; } static void devcrypto_select_all_digests(int *digest_list) { size_t i; for (i = 0; i < OSSL_NELEM(digest_data); i++) digest_list[i] = 1; } static int cryptodev_select_digest_cb(const char *str, int len, void *usr) { int *digest_list = (int *)usr; char *name; const EVP_MD *EVP; size_t i; if (len == 0) return 1; if (usr == NULL || (name = OPENSSL_strndup(str, len)) == NULL) return 0; EVP = EVP_get_digestbyname(name); if (EVP == NULL) fprintf(stderr, "devcrypto: unknown digest %s\n", name); else if ((i = find_digest_data_index(EVP_MD_get_type(EVP))) != (size_t)-1) digest_list[i] = 1; else fprintf(stderr, "devcrypto: digest %s not available\n", name); OPENSSL_free(name); return 1; } static void dump_digest_info(void) { size_t i; const char *name; fprintf (stderr, "Information about digests supported by the /dev/crypto" " engine:\n"); #ifndef CIOCGSESSINFO fprintf(stderr, "CIOCGSESSINFO (session info call) unavailable\n"); #endif for (i = 0; i < OSSL_NELEM(digest_data); i++) { name = OBJ_nid2sn(digest_data[i].nid); fprintf (stderr, "Digest %s, NID=%d, /dev/crypto info: id=%d, driver=%s", name ? name : "unknown", digest_data[i].nid, digest_data[i].devcryptoid, digest_driver_info[i].driver_name ? digest_driver_info[i].driver_name : "unknown"); if (digest_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCGSESSION) { fprintf (stderr, ". CIOCGSESSION (session open) failed\n"); continue; } if (digest_driver_info[i].accelerated == DEVCRYPTO_ACCELERATED) fprintf(stderr, " (hw accelerated)"); else if (digest_driver_info[i].accelerated == DEVCRYPTO_NOT_ACCELERATED) fprintf(stderr, " (software)"); else fprintf(stderr, " (acceleration status unknown)"); if (cipher_driver_info[i].status == DEVCRYPTO_STATUS_FAILURE) fprintf (stderr, ". Cipher setup failed\n"); else if (digest_driver_info[i].status == DEVCRYPTO_STATUS_NO_CIOCCPHASH) fprintf(stderr, ", CIOCCPHASH failed\n"); else fprintf(stderr, ", CIOCCPHASH capable\n"); } fprintf(stderr, "\n"); } #endif #define DEVCRYPTO_CMD_USE_SOFTDRIVERS ENGINE_CMD_BASE #define DEVCRYPTO_CMD_CIPHERS (ENGINE_CMD_BASE + 1) #define DEVCRYPTO_CMD_DIGESTS (ENGINE_CMD_BASE + 2) #define DEVCRYPTO_CMD_DUMP_INFO (ENGINE_CMD_BASE + 3) static const ENGINE_CMD_DEFN devcrypto_cmds[] = { #if defined(CIOCGSESSINFO) || defined(CIOCGSESSION2) {DEVCRYPTO_CMD_USE_SOFTDRIVERS, "USE_SOFTDRIVERS", "specifies whether to use software (not accelerated) drivers (" OPENSSL_MSTR(DEVCRYPTO_REQUIRE_ACCELERATED) "=use only accelerated drivers, " OPENSSL_MSTR(DEVCRYPTO_USE_SOFTWARE) "=allow all drivers, " OPENSSL_MSTR(DEVCRYPTO_REJECT_SOFTWARE) "=use if acceleration can't be determined) [default=" OPENSSL_MSTR(DEVCRYPTO_DEFAULT_USE_SOFTDRIVERS) "]", ENGINE_CMD_FLAG_NUMERIC}, #endif {DEVCRYPTO_CMD_CIPHERS, "CIPHERS", "either ALL, NONE, or a comma-separated list of ciphers to enable [default=ALL]", ENGINE_CMD_FLAG_STRING}, #ifdef IMPLEMENT_DIGEST {DEVCRYPTO_CMD_DIGESTS, "DIGESTS", "either ALL, NONE, or a comma-separated list of digests to enable [default=ALL]", ENGINE_CMD_FLAG_STRING}, #endif {DEVCRYPTO_CMD_DUMP_INFO, "DUMP_INFO", "dump info about each algorithm to stderr; use 'openssl engine -pre DUMP_INFO devcrypto'", ENGINE_CMD_FLAG_NO_INPUT}, {0, NULL, NULL, 0} }; static int devcrypto_ctrl(ENGINE *e, int cmd, long i, void *p, void (*f) (void)) { int *new_list; switch (cmd) { #if defined(CIOCGSESSINFO) || defined(CIOCGSESSION2) case DEVCRYPTO_CMD_USE_SOFTDRIVERS: switch (i) { case DEVCRYPTO_REQUIRE_ACCELERATED: case DEVCRYPTO_USE_SOFTWARE: case DEVCRYPTO_REJECT_SOFTWARE: break; default: fprintf(stderr, "devcrypto: invalid value (%ld) for USE_SOFTDRIVERS\n", i); return 0; } if (use_softdrivers == i) return 1; use_softdrivers = i; #ifdef IMPLEMENT_DIGEST rebuild_known_digest_nids(e); #endif rebuild_known_cipher_nids(e); return 1; #endif case DEVCRYPTO_CMD_CIPHERS: if (p == NULL) return 1; if (OPENSSL_strcasecmp((const char *)p, "ALL") == 0) { devcrypto_select_all_ciphers(selected_ciphers); } else if (OPENSSL_strcasecmp((const char*)p, "NONE") == 0) { memset(selected_ciphers, 0, sizeof(selected_ciphers)); } else { new_list=OPENSSL_zalloc(sizeof(selected_ciphers)); if (!CONF_parse_list(p, ',', 1, cryptodev_select_cipher_cb, new_list)) { OPENSSL_free(new_list); return 0; } memcpy(selected_ciphers, new_list, sizeof(selected_ciphers)); OPENSSL_free(new_list); } rebuild_known_cipher_nids(e); return 1; #ifdef IMPLEMENT_DIGEST case DEVCRYPTO_CMD_DIGESTS: if (p == NULL) return 1; if (OPENSSL_strcasecmp((const char *)p, "ALL") == 0) { devcrypto_select_all_digests(selected_digests); } else if (OPENSSL_strcasecmp((const char*)p, "NONE") == 0) { memset(selected_digests, 0, sizeof(selected_digests)); } else { new_list=OPENSSL_zalloc(sizeof(selected_digests)); if (!CONF_parse_list(p, ',', 1, cryptodev_select_digest_cb, new_list)) { OPENSSL_free(new_list); return 0; } memcpy(selected_digests, new_list, sizeof(selected_digests)); OPENSSL_free(new_list); } rebuild_known_digest_nids(e); return 1; #endif case DEVCRYPTO_CMD_DUMP_INFO: dump_cipher_info(); #ifdef IMPLEMENT_DIGEST dump_digest_info(); #endif return 1; default: break; } return 0; } static int open_devcrypto(void) { int fd; if (cfd >= 0) return 1; if ((fd = open("/dev/crypto", O_RDWR, 0)) < 0) { #ifndef ENGINE_DEVCRYPTO_DEBUG if (errno != ENOENT && errno != ENXIO) #endif fprintf(stderr, "Could not open /dev/crypto: %s\n", strerror(errno)); return 0; } #ifdef CRIOGET if (ioctl(fd, CRIOGET, &cfd) < 0) { fprintf(stderr, "Could not create crypto fd: %s\n", strerror(errno)); close(fd); cfd = -1; return 0; } close(fd); #else cfd = fd; #endif return 1; } static int close_devcrypto(void) { int ret; if (cfd < 0) return 1; ret = close(cfd); cfd = -1; if (ret != 0) { fprintf(stderr, "Error closing /dev/crypto: %s\n", strerror(errno)); return 0; } return 1; } static int devcrypto_unload(ENGINE *e) { destroy_all_cipher_methods(); #ifdef IMPLEMENT_DIGEST destroy_all_digest_methods(); #endif close_devcrypto(); return 1; } static int bind_devcrypto(ENGINE *e) { if (!ENGINE_set_id(e, engine_devcrypto_id) || !ENGINE_set_name(e, "/dev/crypto engine") || !ENGINE_set_destroy_function(e, devcrypto_unload) || !ENGINE_set_cmd_defns(e, devcrypto_cmds) || !ENGINE_set_ctrl_function(e, devcrypto_ctrl)) return 0; prepare_cipher_methods(); #ifdef IMPLEMENT_DIGEST prepare_digest_methods(); #endif return (ENGINE_set_ciphers(e, devcrypto_ciphers) #ifdef IMPLEMENT_DIGEST && ENGINE_set_digests(e, devcrypto_digests) #endif #if 0 && ENGINE_set_RSA(e, devcrypto_rsa) # ifndef OPENSSL_NO_DSA && ENGINE_set_DSA(e, devcrypto_dsa) # endif # ifndef OPENSSL_NO_DH && ENGINE_set_DH(e, devcrypto_dh) # endif # ifndef OPENSSL_NO_EC && ENGINE_set_EC(e, devcrypto_ec) # endif #endif ); } #ifdef OPENSSL_NO_DYNAMIC_ENGINE void engine_load_devcrypto_int(void) { ENGINE *e = NULL; if (!open_devcrypto()) return; if ((e = ENGINE_new()) == NULL || !bind_devcrypto(e)) { close_devcrypto(); ENGINE_free(e); return; } ERR_set_mark(); ENGINE_add(e); ENGINE_free(e); ERR_pop_to_mark(); } #else static int bind_helper(ENGINE *e, const char *id) { if ((id && (strcmp(id, engine_devcrypto_id) != 0)) || !open_devcrypto()) return 0; if (!bind_devcrypto(e)) { close_devcrypto(); return 0; } return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) #endif
engines
openssl/engines/e_devcrypto.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #ifndef _GNU_SOURCE # define _GNU_SOURCE #endif #include <stdio.h> #include <string.h> #include <unistd.h> #include <openssl/engine.h> #include <openssl/async.h> #include <openssl/err.h> #include "internal/nelem.h" #include <sys/socket.h> #include <linux/version.h> #define K_MAJ 4 #define K_MIN1 1 #define K_MIN2 0 #if LINUX_VERSION_CODE < KERNEL_VERSION(K_MAJ, K_MIN1, K_MIN2) || \ !defined(AF_ALG) # ifndef PEDANTIC # warning "AFALG ENGINE requires Kernel Headers >= 4.1.0" # warning "Skipping Compilation of AFALG engine" # endif void engine_load_afalg_int(void); void engine_load_afalg_int(void) { } #else # include <linux/if_alg.h> # include <fcntl.h> # include <sys/utsname.h> # include <linux/aio_abi.h> # include <sys/syscall.h> # include <errno.h> # include "e_afalg.h" # include "e_afalg_err.c" # ifndef SOL_ALG # define SOL_ALG 279 # endif # ifdef ALG_ZERO_COPY # ifndef SPLICE_F_GIFT # define SPLICE_F_GIFT (0x08) # endif # endif # define ALG_AES_IV_LEN 16 # define ALG_IV_LEN(len) (sizeof(struct af_alg_iv) + (len)) # define ALG_OP_TYPE unsigned int # define ALG_OP_LEN (sizeof(ALG_OP_TYPE)) # ifdef OPENSSL_NO_DYNAMIC_ENGINE void engine_load_afalg_int(void); # endif static int afalg_init_aio(afalg_aio *aio); static int afalg_fin_cipher_aio(afalg_aio *ptr, int sfd, unsigned char *buf, size_t len); static int afalg_create_sk(afalg_ctx *actx, const char *ciphertype, const char *ciphername); static int afalg_destroy(ENGINE *e); static int afalg_init(ENGINE *e); static int afalg_finish(ENGINE *e); static const EVP_CIPHER *afalg_aes_cbc(int nid); static cbc_handles *get_cipher_handle(int nid); static int afalg_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid); static int afalg_cipher_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int afalg_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int afalg_cipher_cleanup(EVP_CIPHER_CTX *ctx); static int afalg_chk_platform(void); static const char *engine_afalg_id = "afalg"; static const char *engine_afalg_name = "AFALG engine support"; static int afalg_cipher_nids[] = { NID_aes_128_cbc, NID_aes_192_cbc, NID_aes_256_cbc, }; static cbc_handles cbc_handle[] = {{AES_KEY_SIZE_128, NULL}, {AES_KEY_SIZE_192, NULL}, {AES_KEY_SIZE_256, NULL}}; static ossl_inline int io_setup(unsigned n, aio_context_t *ctx) { return syscall(__NR_io_setup, n, ctx); } static ossl_inline int eventfd(int n) { return syscall(__NR_eventfd2, n, 0); } static ossl_inline int io_destroy(aio_context_t ctx) { return syscall(__NR_io_destroy, ctx); } static ossl_inline int io_read(aio_context_t ctx, long n, struct iocb **iocb) { return syscall(__NR_io_submit, ctx, n, iocb); } struct __timespec32 { __kernel_long_t tv_sec; __kernel_long_t tv_nsec; }; static ossl_inline int io_getevents(aio_context_t ctx, long min, long max, struct io_event *events, struct timespec *timeout) { #if defined(__NR_io_pgetevents_time64) if (sizeof(*timeout) != sizeof(struct __timespec32)) { int ret = syscall(__NR_io_pgetevents_time64, ctx, min, max, events, timeout, NULL); if (ret == 0 || errno != ENOSYS) return ret; } #endif #if defined(__NR_io_getevents) if (sizeof(*timeout) == sizeof(struct __timespec32)) return syscall(__NR_io_getevents, ctx, min, max, events, timeout); else { if (timeout && timeout->tv_sec == (long)timeout->tv_sec) { struct __timespec32 ts32; ts32.tv_sec = (__kernel_long_t) timeout->tv_sec; ts32.tv_nsec = (__kernel_long_t) timeout->tv_nsec; return syscall(__NR_io_getevents, ctx, min, max, events, ts32); } else { return syscall(__NR_io_getevents, ctx, min, max, events, NULL); } } #endif errno = ENOSYS; return -1; } static void afalg_waitfd_cleanup(ASYNC_WAIT_CTX *ctx, const void *key, OSSL_ASYNC_FD waitfd, void *custom) { close(waitfd); } static int afalg_setup_async_event_notification(afalg_aio *aio) { ASYNC_JOB *job; ASYNC_WAIT_CTX *waitctx; void *custom = NULL; int ret; if ((job = ASYNC_get_current_job()) != NULL) { waitctx = ASYNC_get_wait_ctx(job); if (waitctx == NULL) { ALG_WARN("%s(%d): ASYNC_get_wait_ctx error", __FILE__, __LINE__); return 0; } ret = ASYNC_WAIT_CTX_get_fd(waitctx, engine_afalg_id, &aio->efd, &custom); if (ret == 0) { aio->efd = eventfd(0); if (aio->efd == -1) { ALG_PERR("%s(%d): Failed to get eventfd : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_SETUP_ASYNC_EVENT_NOTIFICATION, AFALG_R_EVENTFD_FAILED); return 0; } ret = ASYNC_WAIT_CTX_set_wait_fd(waitctx, engine_afalg_id, aio->efd, custom, afalg_waitfd_cleanup); if (ret == 0) { ALG_WARN("%s(%d): Failed to set wait fd", __FILE__, __LINE__); close(aio->efd); return 0; } if (fcntl(aio->efd, F_SETFL, O_NONBLOCK) != 0) { ALG_WARN("%s(%d): Failed to set event fd as NONBLOCKING", __FILE__, __LINE__); } } aio->mode = MODE_ASYNC; } else { aio->efd = eventfd(0); if (aio->efd == -1) { ALG_PERR("%s(%d): Failed to get eventfd : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_SETUP_ASYNC_EVENT_NOTIFICATION, AFALG_R_EVENTFD_FAILED); return 0; } aio->mode = MODE_SYNC; } return 1; } static int afalg_init_aio(afalg_aio *aio) { int r = -1; aio->aio_ctx = 0; r = io_setup(MAX_INFLIGHTS, &aio->aio_ctx); if (r < 0) { ALG_PERR("%s(%d): io_setup error : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_INIT_AIO, AFALG_R_IO_SETUP_FAILED); return 0; } memset(aio->cbt, 0, sizeof(aio->cbt)); aio->efd = -1; aio->mode = MODE_UNINIT; return 1; } static int afalg_fin_cipher_aio(afalg_aio *aio, int sfd, unsigned char *buf, size_t len) { int r; int retry = 0; unsigned int done = 0; struct iocb *cb; struct timespec timeout; struct io_event events[MAX_INFLIGHTS]; u_int64_t eval = 0; timeout.tv_sec = 0; timeout.tv_nsec = 0; if (aio->mode == MODE_UNINIT) { r = afalg_setup_async_event_notification(aio); if (r == 0) return 0; } cb = &(aio->cbt[0 % MAX_INFLIGHTS]); memset(cb, '\0', sizeof(*cb)); cb->aio_fildes = sfd; cb->aio_lio_opcode = IOCB_CMD_PREAD; cb->aio_buf = (size_t)buf; cb->aio_offset = 0; cb->aio_data = 0; cb->aio_nbytes = len; cb->aio_flags = IOCB_FLAG_RESFD; cb->aio_resfd = aio->efd; r = io_read(aio->aio_ctx, 1, &cb); if (r < 0) { ALG_PWARN("%s(%d): io_read failed : ", __FILE__, __LINE__); return 0; } do { ASYNC_pause_job(); r = read(aio->efd, &eval, sizeof(eval)); if (r < 0) { if (errno == EAGAIN || errno == EWOULDBLOCK) continue; ALG_PERR("%s(%d): read failed for event fd : ", __FILE__, __LINE__); return 0; } else if (r == 0 || eval <= 0) { ALG_WARN("%s(%d): eventfd read %d bytes, eval = %lu\n", __FILE__, __LINE__, r, eval); } if (eval > 0) { #ifdef OSSL_SANITIZE_MEMORY memset(events, 0, sizeof(events)); #endif r = io_getevents(aio->aio_ctx, 1, MAX_INFLIGHTS, events, &timeout); if (r > 0) { if (events[0].res < 0) { if (events[0].res == -EBUSY && retry++ < 3) { r = io_read(aio->aio_ctx, 1, &cb); if (r < 0) { ALG_PERR("%s(%d): retry %d for io_read failed : ", __FILE__, __LINE__, retry); return 0; } continue; } else { char strbuf[32]; long long int op_ret = events[0].res; ALG_WARN ("%s(%d): Crypto Operation failed with code %lld\n", __FILE__, __LINE__, events[0].res); BIO_snprintf(strbuf, sizeof(strbuf), "%lld", op_ret); switch (events[0].res) { case -ENOMEM: AFALGerr(0, AFALG_R_KERNEL_OP_FAILED); ERR_add_error_data(3, "-ENOMEM ( code ", strbuf, " )"); break; default: AFALGerr(0, AFALG_R_KERNEL_OP_FAILED); ERR_add_error_data(2, "code ", strbuf); break; } return 0; } } done = 1; } else if (r < 0) { ALG_PERR("%s(%d): io_getevents failed : ", __FILE__, __LINE__); return 0; } else { ALG_WARN("%s(%d): io_geteventd read 0 bytes\n", __FILE__, __LINE__); } } } while (!done); return 1; } static ossl_inline void afalg_set_op_sk(struct cmsghdr *cmsg, const ALG_OP_TYPE op) { cmsg->cmsg_level = SOL_ALG; cmsg->cmsg_type = ALG_SET_OP; cmsg->cmsg_len = CMSG_LEN(ALG_OP_LEN); memcpy(CMSG_DATA(cmsg), &op, ALG_OP_LEN); } static void afalg_set_iv_sk(struct cmsghdr *cmsg, const unsigned char *iv, const unsigned int len) { struct af_alg_iv *aiv; cmsg->cmsg_level = SOL_ALG; cmsg->cmsg_type = ALG_SET_IV; cmsg->cmsg_len = CMSG_LEN(ALG_IV_LEN(len)); aiv = (struct af_alg_iv *)CMSG_DATA(cmsg); aiv->ivlen = len; memcpy(aiv->iv, iv, len); } static ossl_inline int afalg_set_key(afalg_ctx *actx, const unsigned char *key, const int klen) { int ret; ret = setsockopt(actx->bfd, SOL_ALG, ALG_SET_KEY, key, klen); if (ret < 0) { ALG_PERR("%s(%d): Failed to set socket option : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_SET_KEY, AFALG_R_SOCKET_SET_KEY_FAILED); return 0; } return 1; } static int afalg_create_sk(afalg_ctx *actx, const char *ciphertype, const char *ciphername) { struct sockaddr_alg sa; int r = -1; actx->bfd = actx->sfd = -1; memset(&sa, 0, sizeof(sa)); sa.salg_family = AF_ALG; OPENSSL_strlcpy((char *) sa.salg_type, ciphertype, sizeof(sa.salg_type)); OPENSSL_strlcpy((char *) sa.salg_name, ciphername, sizeof(sa.salg_name)); actx->bfd = socket(AF_ALG, SOCK_SEQPACKET, 0); if (actx->bfd == -1) { ALG_PERR("%s(%d): Failed to open socket : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_CREATE_SK, AFALG_R_SOCKET_CREATE_FAILED); goto err; } r = bind(actx->bfd, (struct sockaddr *)&sa, sizeof(sa)); if (r < 0) { ALG_PERR("%s(%d): Failed to bind socket : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_CREATE_SK, AFALG_R_SOCKET_BIND_FAILED); goto err; } actx->sfd = accept(actx->bfd, NULL, 0); if (actx->sfd < 0) { ALG_PERR("%s(%d): Socket Accept Failed : ", __FILE__, __LINE__); AFALGerr(AFALG_F_AFALG_CREATE_SK, AFALG_R_SOCKET_ACCEPT_FAILED); goto err; } return 1; err: if (actx->bfd >= 0) close(actx->bfd); if (actx->sfd >= 0) close(actx->sfd); actx->bfd = actx->sfd = -1; return 0; } static int afalg_start_cipher_sk(afalg_ctx *actx, const unsigned char *in, size_t inl, const unsigned char *iv, unsigned int enc) { struct msghdr msg; struct cmsghdr *cmsg; struct iovec iov; ssize_t sbytes; # ifdef ALG_ZERO_COPY int ret; # endif char cbuf[CMSG_SPACE(ALG_IV_LEN(ALG_AES_IV_LEN)) + CMSG_SPACE(ALG_OP_LEN)]; memset(&msg, 0, sizeof(msg)); memset(cbuf, 0, sizeof(cbuf)); msg.msg_control = cbuf; msg.msg_controllen = sizeof(cbuf); cmsg = CMSG_FIRSTHDR(&msg); afalg_set_op_sk(cmsg, enc); cmsg = CMSG_NXTHDR(&msg, cmsg); afalg_set_iv_sk(cmsg, iv, ALG_AES_IV_LEN); iov.iov_base = (unsigned char *)in; iov.iov_len = inl; msg.msg_flags = MSG_MORE; # ifdef ALG_ZERO_COPY msg.msg_iovlen = 0; msg.msg_iov = NULL; sbytes = sendmsg(actx->sfd, &msg, 0); if (sbytes < 0) { ALG_PERR("%s(%d): sendmsg failed for zero copy cipher operation : ", __FILE__, __LINE__); return 0; } ret = vmsplice(actx->zc_pipe[1], &iov, 1, SPLICE_F_GIFT); if (ret < 0) { ALG_PERR("%s(%d): vmsplice failed : ", __FILE__, __LINE__); return 0; } ret = splice(actx->zc_pipe[0], NULL, actx->sfd, NULL, inl, 0); if (ret < 0) { ALG_PERR("%s(%d): splice failed : ", __FILE__, __LINE__); return 0; } # else msg.msg_iovlen = 1; msg.msg_iov = &iov; sbytes = sendmsg(actx->sfd, &msg, 0); if (sbytes < 0) { ALG_PERR("%s(%d): sendmsg failed for cipher operation : ", __FILE__, __LINE__); return 0; } if (sbytes != (ssize_t) inl) { ALG_WARN("Cipher operation send bytes %zd != inlen %zd\n", sbytes, inl); return 0; } # endif return 1; } static int afalg_cipher_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { int ciphertype; int ret, len; afalg_ctx *actx; const char *ciphername; if (ctx == NULL || key == NULL) { ALG_WARN("%s(%d): Null Parameter\n", __FILE__, __LINE__); return 0; } if (EVP_CIPHER_CTX_get0_cipher(ctx) == NULL) { ALG_WARN("%s(%d): Cipher object NULL\n", __FILE__, __LINE__); return 0; } actx = EVP_CIPHER_CTX_get_cipher_data(ctx); if (actx == NULL) { ALG_WARN("%s(%d): Cipher data NULL\n", __FILE__, __LINE__); return 0; } ciphertype = EVP_CIPHER_CTX_get_nid(ctx); switch (ciphertype) { case NID_aes_128_cbc: case NID_aes_192_cbc: case NID_aes_256_cbc: ciphername = "cbc(aes)"; break; default: ALG_WARN("%s(%d): Unsupported Cipher type %d\n", __FILE__, __LINE__, ciphertype); return 0; } if (ALG_AES_IV_LEN != EVP_CIPHER_CTX_get_iv_length(ctx)) { ALG_WARN("%s(%d): Unsupported IV length :%d\n", __FILE__, __LINE__, EVP_CIPHER_CTX_get_iv_length(ctx)); return 0; } ret = afalg_create_sk(actx, "skcipher", ciphername); if (ret < 1) return 0; if ((len = EVP_CIPHER_CTX_get_key_length(ctx)) <= 0) goto err; ret = afalg_set_key(actx, key, len); if (ret < 1) goto err; if (afalg_init_aio(&actx->aio) == 0) goto err; # ifdef ALG_ZERO_COPY pipe(actx->zc_pipe); # endif actx->init_done = MAGIC_INIT_NUM; return 1; err: close(actx->sfd); close(actx->bfd); return 0; } static int afalg_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { afalg_ctx *actx; int ret; char nxtiv[ALG_AES_IV_LEN] = { 0 }; if (ctx == NULL || out == NULL || in == NULL) { ALG_WARN("NULL parameter passed to function %s(%d)\n", __FILE__, __LINE__); return 0; } actx = (afalg_ctx *) EVP_CIPHER_CTX_get_cipher_data(ctx); if (actx == NULL || actx->init_done != MAGIC_INIT_NUM) { ALG_WARN("%s afalg ctx passed\n", ctx == NULL ? "NULL" : "Uninitialised"); return 0; } if (EVP_CIPHER_CTX_is_encrypting(ctx) == 0) { memcpy(nxtiv, in + (inl - ALG_AES_IV_LEN), ALG_AES_IV_LEN); } ret = afalg_start_cipher_sk(actx, (unsigned char *)in, inl, EVP_CIPHER_CTX_iv(ctx), EVP_CIPHER_CTX_is_encrypting(ctx)); if (ret < 1) { return 0; } ret = afalg_fin_cipher_aio(&actx->aio, actx->sfd, out, inl); if (ret < 1) return 0; if (EVP_CIPHER_CTX_is_encrypting(ctx)) { memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), out + (inl - ALG_AES_IV_LEN), ALG_AES_IV_LEN); } else { memcpy(EVP_CIPHER_CTX_iv_noconst(ctx), nxtiv, ALG_AES_IV_LEN); } return 1; } static int afalg_cipher_cleanup(EVP_CIPHER_CTX *ctx) { afalg_ctx *actx; if (ctx == NULL) { ALG_WARN("NULL parameter passed to function %s(%d)\n", __FILE__, __LINE__); return 0; } actx = (afalg_ctx *) EVP_CIPHER_CTX_get_cipher_data(ctx); if (actx == NULL || actx->init_done != MAGIC_INIT_NUM) return 1; close(actx->sfd); close(actx->bfd); # ifdef ALG_ZERO_COPY close(actx->zc_pipe[0]); close(actx->zc_pipe[1]); # endif if (actx->aio.mode == MODE_SYNC) close(actx->aio.efd); io_destroy(actx->aio.aio_ctx); return 1; } static cbc_handles *get_cipher_handle(int nid) { switch (nid) { case NID_aes_128_cbc: return &cbc_handle[AES_CBC_128]; case NID_aes_192_cbc: return &cbc_handle[AES_CBC_192]; case NID_aes_256_cbc: return &cbc_handle[AES_CBC_256]; default: return NULL; } } static const EVP_CIPHER *afalg_aes_cbc(int nid) { cbc_handles *cipher_handle = get_cipher_handle(nid); if (cipher_handle == NULL) return NULL; if (cipher_handle->_hidden == NULL && ((cipher_handle->_hidden = EVP_CIPHER_meth_new(nid, AES_BLOCK_SIZE, cipher_handle->key_size)) == NULL || !EVP_CIPHER_meth_set_iv_length(cipher_handle->_hidden, AES_IV_LEN) || !EVP_CIPHER_meth_set_flags(cipher_handle->_hidden, EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1) || !EVP_CIPHER_meth_set_init(cipher_handle->_hidden, afalg_cipher_init) || !EVP_CIPHER_meth_set_do_cipher(cipher_handle->_hidden, afalg_do_cipher) || !EVP_CIPHER_meth_set_cleanup(cipher_handle->_hidden, afalg_cipher_cleanup) || !EVP_CIPHER_meth_set_impl_ctx_size(cipher_handle->_hidden, sizeof(afalg_ctx)))) { EVP_CIPHER_meth_free(cipher_handle->_hidden); cipher_handle->_hidden= NULL; } return cipher_handle->_hidden; } static int afalg_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) { int r = 1; if (cipher == NULL) { *nids = afalg_cipher_nids; return (sizeof(afalg_cipher_nids) / sizeof(afalg_cipher_nids[0])); } switch (nid) { case NID_aes_128_cbc: case NID_aes_192_cbc: case NID_aes_256_cbc: *cipher = afalg_aes_cbc(nid); break; default: *cipher = NULL; r = 0; } return r; } static int bind_afalg(ENGINE *e) { unsigned short i; ERR_load_AFALG_strings(); if (!ENGINE_set_id(e, engine_afalg_id) || !ENGINE_set_name(e, engine_afalg_name) || !ENGINE_set_destroy_function(e, afalg_destroy) || !ENGINE_set_init_function(e, afalg_init) || !ENGINE_set_finish_function(e, afalg_finish)) { AFALGerr(AFALG_F_BIND_AFALG, AFALG_R_INIT_FAILED); return 0; } for (i = 0; i < OSSL_NELEM(afalg_cipher_nids); i++) { if (afalg_aes_cbc(afalg_cipher_nids[i]) == NULL) { AFALGerr(AFALG_F_BIND_AFALG, AFALG_R_INIT_FAILED); return 0; } } if (!ENGINE_set_ciphers(e, afalg_ciphers)) { AFALGerr(AFALG_F_BIND_AFALG, AFALG_R_INIT_FAILED); return 0; } return 1; } # ifndef OPENSSL_NO_DYNAMIC_ENGINE static int bind_helper(ENGINE *e, const char *id) { if (id && (strcmp(id, engine_afalg_id) != 0)) return 0; if (!afalg_chk_platform()) return 0; if (!bind_afalg(e)) { afalg_destroy(e); return 0; } return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) # endif static int afalg_chk_platform(void) { int ret; int i; int kver[3] = { -1, -1, -1 }; int sock; char *str; struct utsname ut; ret = uname(&ut); if (ret != 0) { AFALGerr(AFALG_F_AFALG_CHK_PLATFORM, AFALG_R_FAILED_TO_GET_PLATFORM_INFO); return 0; } str = strtok(ut.release, "."); for (i = 0; i < 3 && str != NULL; i++) { kver[i] = atoi(str); str = strtok(NULL, "."); } if (KERNEL_VERSION(kver[0], kver[1], kver[2]) < KERNEL_VERSION(K_MAJ, K_MIN1, K_MIN2)) { ALG_ERR("ASYNC AFALG not supported this kernel(%d.%d.%d)\n", kver[0], kver[1], kver[2]); ALG_ERR("ASYNC AFALG requires kernel version %d.%d.%d or later\n", K_MAJ, K_MIN1, K_MIN2); AFALGerr(AFALG_F_AFALG_CHK_PLATFORM, AFALG_R_KERNEL_DOES_NOT_SUPPORT_ASYNC_AFALG); return 0; } sock = socket(AF_ALG, SOCK_SEQPACKET, 0); if (sock == -1) { AFALGerr(AFALG_F_AFALG_CHK_PLATFORM, AFALG_R_SOCKET_CREATE_FAILED); return 0; } close(sock); return 1; } # ifdef OPENSSL_NO_DYNAMIC_ENGINE static ENGINE *engine_afalg(void) { ENGINE *ret = ENGINE_new(); if (ret == NULL) return NULL; if (!bind_afalg(ret)) { ENGINE_free(ret); return NULL; } return ret; } void engine_load_afalg_int(void) { ENGINE *toadd; if (!afalg_chk_platform()) return; toadd = engine_afalg(); if (toadd == NULL) return; ERR_set_mark(); ENGINE_add(toadd); ENGINE_free(toadd); ERR_pop_to_mark(); } # endif static int afalg_init(ENGINE *e) { return 1; } static int afalg_finish(ENGINE *e) { return 1; } static int free_cbc(void) { short unsigned int i; for (i = 0; i < OSSL_NELEM(afalg_cipher_nids); i++) { EVP_CIPHER_meth_free(cbc_handle[i]._hidden); cbc_handle[i]._hidden = NULL; } return 1; } static int afalg_destroy(ENGINE *e) { ERR_unload_AFALG_strings(); free_cbc(); return 1; } #endif
engines
openssl/engines/e_afalg.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include "internal/deprecated.h" #include <stdio.h> #include <string.h> #include "internal/common.h" #include <openssl/engine.h> #include <openssl/sha.h> #include <openssl/md5.h> #include <openssl/rsa.h> #include <openssl/evp.h> #include <openssl/modes.h> #include <openssl/aes.h> #include <openssl/rand.h> #include <openssl/crypto.h> #include <openssl/pem.h> #include <crypto/evp.h> #include "e_ossltest_err.c" static const char *engine_ossltest_id = "ossltest"; static const char *engine_ossltest_name = "OpenSSL Test engine support"; static int ossltest_destroy(ENGINE *e); static int ossltest_init(ENGINE *e); static int ossltest_finish(ENGINE *e); void ENGINE_load_ossltest(void); static int ossltest_digests(ENGINE *e, const EVP_MD **digest, const int **nids, int nid); static const RAND_METHOD *ossltest_rand_method(void); static int digest_md5_init(EVP_MD_CTX *ctx); static int digest_md5_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md); static EVP_MD *_hidden_md5_md = NULL; static const EVP_MD *digest_md5(void) { if (_hidden_md5_md == NULL) { EVP_MD *md; if ((md = EVP_MD_meth_new(NID_md5, NID_md5WithRSAEncryption)) == NULL || !EVP_MD_meth_set_result_size(md, MD5_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(md, MD5_CBLOCK) || !EVP_MD_meth_set_app_datasize(md, sizeof(EVP_MD *) + sizeof(MD5_CTX)) || !EVP_MD_meth_set_flags(md, 0) || !EVP_MD_meth_set_init(md, digest_md5_init) || !EVP_MD_meth_set_update(md, digest_md5_update) || !EVP_MD_meth_set_final(md, digest_md5_final)) { EVP_MD_meth_free(md); md = NULL; } _hidden_md5_md = md; } return _hidden_md5_md; } static int digest_sha1_init(EVP_MD_CTX *ctx); static int digest_sha1_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int digest_sha1_final(EVP_MD_CTX *ctx, unsigned char *md); static EVP_MD *_hidden_sha1_md = NULL; static const EVP_MD *digest_sha1(void) { if (_hidden_sha1_md == NULL) { EVP_MD *md; if ((md = EVP_MD_meth_new(NID_sha1, NID_sha1WithRSAEncryption)) == NULL || !EVP_MD_meth_set_result_size(md, SHA_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(md, SHA_CBLOCK) || !EVP_MD_meth_set_app_datasize(md, sizeof(EVP_MD *) + sizeof(SHA_CTX)) || !EVP_MD_meth_set_flags(md, EVP_MD_FLAG_DIGALGID_ABSENT) || !EVP_MD_meth_set_init(md, digest_sha1_init) || !EVP_MD_meth_set_update(md, digest_sha1_update) || !EVP_MD_meth_set_final(md, digest_sha1_final)) { EVP_MD_meth_free(md); md = NULL; } _hidden_sha1_md = md; } return _hidden_sha1_md; } static int digest_sha256_init(EVP_MD_CTX *ctx); static int digest_sha256_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int digest_sha256_final(EVP_MD_CTX *ctx, unsigned char *md); static EVP_MD *_hidden_sha256_md = NULL; static const EVP_MD *digest_sha256(void) { if (_hidden_sha256_md == NULL) { EVP_MD *md; if ((md = EVP_MD_meth_new(NID_sha256, NID_sha256WithRSAEncryption)) == NULL || !EVP_MD_meth_set_result_size(md, SHA256_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(md, SHA256_CBLOCK) || !EVP_MD_meth_set_app_datasize(md, sizeof(EVP_MD *) + sizeof(SHA256_CTX)) || !EVP_MD_meth_set_flags(md, EVP_MD_FLAG_DIGALGID_ABSENT) || !EVP_MD_meth_set_init(md, digest_sha256_init) || !EVP_MD_meth_set_update(md, digest_sha256_update) || !EVP_MD_meth_set_final(md, digest_sha256_final)) { EVP_MD_meth_free(md); md = NULL; } _hidden_sha256_md = md; } return _hidden_sha256_md; } static int digest_sha384_init(EVP_MD_CTX *ctx); static int digest_sha384_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int digest_sha384_final(EVP_MD_CTX *ctx, unsigned char *md); static int digest_sha512_init(EVP_MD_CTX *ctx); static int digest_sha512_update(EVP_MD_CTX *ctx, const void *data, size_t count); static int digest_sha512_final(EVP_MD_CTX *ctx, unsigned char *md); static EVP_MD *_hidden_sha384_md = NULL; static const EVP_MD *digest_sha384(void) { if (_hidden_sha384_md == NULL) { EVP_MD *md; if ((md = EVP_MD_meth_new(NID_sha384, NID_sha384WithRSAEncryption)) == NULL || !EVP_MD_meth_set_result_size(md, SHA384_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(md, SHA512_CBLOCK) || !EVP_MD_meth_set_app_datasize(md, sizeof(EVP_MD *) + sizeof(SHA512_CTX)) || !EVP_MD_meth_set_flags(md, EVP_MD_FLAG_DIGALGID_ABSENT) || !EVP_MD_meth_set_init(md, digest_sha384_init) || !EVP_MD_meth_set_update(md, digest_sha384_update) || !EVP_MD_meth_set_final(md, digest_sha384_final)) { EVP_MD_meth_free(md); md = NULL; } _hidden_sha384_md = md; } return _hidden_sha384_md; } static EVP_MD *_hidden_sha512_md = NULL; static const EVP_MD *digest_sha512(void) { if (_hidden_sha512_md == NULL) { EVP_MD *md; if ((md = EVP_MD_meth_new(NID_sha512, NID_sha512WithRSAEncryption)) == NULL || !EVP_MD_meth_set_result_size(md, SHA512_DIGEST_LENGTH) || !EVP_MD_meth_set_input_blocksize(md, SHA512_CBLOCK) || !EVP_MD_meth_set_app_datasize(md, sizeof(EVP_MD *) + sizeof(SHA512_CTX)) || !EVP_MD_meth_set_flags(md, EVP_MD_FLAG_DIGALGID_ABSENT) || !EVP_MD_meth_set_init(md, digest_sha512_init) || !EVP_MD_meth_set_update(md, digest_sha512_update) || !EVP_MD_meth_set_final(md, digest_sha512_final)) { EVP_MD_meth_free(md); md = NULL; } _hidden_sha512_md = md; } return _hidden_sha512_md; } static void destroy_digests(void) { EVP_MD_meth_free(_hidden_md5_md); _hidden_md5_md = NULL; EVP_MD_meth_free(_hidden_sha1_md); _hidden_sha1_md = NULL; EVP_MD_meth_free(_hidden_sha256_md); _hidden_sha256_md = NULL; EVP_MD_meth_free(_hidden_sha384_md); _hidden_sha384_md = NULL; EVP_MD_meth_free(_hidden_sha512_md); _hidden_sha512_md = NULL; } static int ossltest_digest_nids(const int **nids) { static int digest_nids[6] = { 0, 0, 0, 0, 0, 0 }; static int pos = 0; static int init = 0; if (!init) { const EVP_MD *md; if ((md = digest_md5()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); if ((md = digest_sha1()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); if ((md = digest_sha256()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); if ((md = digest_sha384()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); if ((md = digest_sha512()) != NULL) digest_nids[pos++] = EVP_MD_get_type(md); digest_nids[pos] = 0; init = 1; } *nids = digest_nids; return pos; } static int ossltest_ciphers(ENGINE *, const EVP_CIPHER **, const int **, int); static int ossltest_cipher_nids[] = { NID_aes_128_cbc, NID_aes_128_gcm, NID_aes_128_cbc_hmac_sha1, 0 }; static int ossltest_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int ossltest_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int ossltest_aes128_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int ossltest_aes128_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int ossltest_aes128_gcm_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); static int ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); static int ossltest_aes128_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl); static int ossltest_aes128_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr); typedef struct { size_t payload_length; unsigned int tls_ver; } EVP_AES_HMAC_SHA1; static EVP_CIPHER *_hidden_aes_128_cbc = NULL; static const EVP_CIPHER *ossltest_aes_128_cbc(void) { if (_hidden_aes_128_cbc == NULL && ((_hidden_aes_128_cbc = EVP_CIPHER_meth_new(NID_aes_128_cbc, 16 , 16 )) == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_128_cbc,16) || !EVP_CIPHER_meth_set_flags(_hidden_aes_128_cbc, EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CBC_MODE) || !EVP_CIPHER_meth_set_init(_hidden_aes_128_cbc, ossltest_aes128_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_128_cbc, ossltest_aes128_cbc_cipher) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_128_cbc, EVP_CIPHER_impl_ctx_size(EVP_aes_128_cbc())))) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc); _hidden_aes_128_cbc = NULL; } return _hidden_aes_128_cbc; } static EVP_CIPHER *_hidden_aes_128_gcm = NULL; #define AES_GCM_FLAGS (EVP_CIPH_FLAG_DEFAULT_ASN1 \ | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \ | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT \ | EVP_CIPH_CUSTOM_COPY |EVP_CIPH_FLAG_AEAD_CIPHER \ | EVP_CIPH_GCM_MODE) static const EVP_CIPHER *ossltest_aes_128_gcm(void) { if (_hidden_aes_128_gcm == NULL && ((_hidden_aes_128_gcm = EVP_CIPHER_meth_new(NID_aes_128_gcm, 1 , 16 )) == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_128_gcm,12) || !EVP_CIPHER_meth_set_flags(_hidden_aes_128_gcm, AES_GCM_FLAGS) || !EVP_CIPHER_meth_set_init(_hidden_aes_128_gcm, ossltest_aes128_gcm_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_128_gcm, ossltest_aes128_gcm_cipher) || !EVP_CIPHER_meth_set_ctrl(_hidden_aes_128_gcm, ossltest_aes128_gcm_ctrl) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_128_gcm, EVP_CIPHER_impl_ctx_size(EVP_aes_128_gcm())))) { EVP_CIPHER_meth_free(_hidden_aes_128_gcm); _hidden_aes_128_gcm = NULL; } return _hidden_aes_128_gcm; } static EVP_CIPHER *_hidden_aes_128_cbc_hmac_sha1 = NULL; static const EVP_CIPHER *ossltest_aes_128_cbc_hmac_sha1(void) { if (_hidden_aes_128_cbc_hmac_sha1 == NULL && ((_hidden_aes_128_cbc_hmac_sha1 = EVP_CIPHER_meth_new(NID_aes_128_cbc_hmac_sha1, 16 , 16 )) == NULL || !EVP_CIPHER_meth_set_iv_length(_hidden_aes_128_cbc_hmac_sha1,16) || !EVP_CIPHER_meth_set_flags(_hidden_aes_128_cbc_hmac_sha1, EVP_CIPH_CBC_MODE | EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_FLAG_AEAD_CIPHER) || !EVP_CIPHER_meth_set_init(_hidden_aes_128_cbc_hmac_sha1, ossltest_aes128_cbc_hmac_sha1_init_key) || !EVP_CIPHER_meth_set_do_cipher(_hidden_aes_128_cbc_hmac_sha1, ossltest_aes128_cbc_hmac_sha1_cipher) || !EVP_CIPHER_meth_set_ctrl(_hidden_aes_128_cbc_hmac_sha1, ossltest_aes128_cbc_hmac_sha1_ctrl) || !EVP_CIPHER_meth_set_set_asn1_params(_hidden_aes_128_cbc_hmac_sha1, EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_set_asn1_iv) || !EVP_CIPHER_meth_set_get_asn1_params(_hidden_aes_128_cbc_hmac_sha1, EVP_CIPH_FLAG_DEFAULT_ASN1 ? NULL : EVP_CIPHER_get_asn1_iv) || !EVP_CIPHER_meth_set_impl_ctx_size(_hidden_aes_128_cbc_hmac_sha1, sizeof(EVP_AES_HMAC_SHA1)))) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc_hmac_sha1); _hidden_aes_128_cbc_hmac_sha1 = NULL; } return _hidden_aes_128_cbc_hmac_sha1; } static void destroy_ciphers(void) { EVP_CIPHER_meth_free(_hidden_aes_128_cbc); EVP_CIPHER_meth_free(_hidden_aes_128_gcm); EVP_CIPHER_meth_free(_hidden_aes_128_cbc_hmac_sha1); _hidden_aes_128_cbc = NULL; _hidden_aes_128_gcm = NULL; _hidden_aes_128_cbc_hmac_sha1 = NULL; } static EVP_PKEY *load_key(ENGINE *eng, const char *key_id, int pub, UI_METHOD *ui_method, void *ui_data) { BIO *in; EVP_PKEY *key; if (!CHECK_AND_SKIP_CASE_PREFIX(key_id, "ot:")) return NULL; fprintf(stderr, "[ossltest]Loading %s key %s\n", pub ? "Public" : "Private", key_id); in = BIO_new_file(key_id, "r"); if (!in) return NULL; if (pub) key = PEM_read_bio_PUBKEY(in, NULL, 0, NULL); else key = PEM_read_bio_PrivateKey(in, NULL, 0, NULL); BIO_free(in); return key; } static EVP_PKEY *ossltest_load_privkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, void *ui_data) { return load_key(eng, key_id, 0, ui_method, ui_data); } static EVP_PKEY *ossltest_load_pubkey(ENGINE *eng, const char *key_id, UI_METHOD *ui_method, void *ui_data) { return load_key(eng, key_id, 1, ui_method, ui_data); } static int bind_ossltest(ENGINE *e) { ERR_load_OSSLTEST_strings(); if (!ENGINE_set_id(e, engine_ossltest_id) || !ENGINE_set_name(e, engine_ossltest_name) || !ENGINE_set_digests(e, ossltest_digests) || !ENGINE_set_ciphers(e, ossltest_ciphers) || !ENGINE_set_RAND(e, ossltest_rand_method()) || !ENGINE_set_destroy_function(e, ossltest_destroy) || !ENGINE_set_load_privkey_function(e, ossltest_load_privkey) || !ENGINE_set_load_pubkey_function(e, ossltest_load_pubkey) || !ENGINE_set_init_function(e, ossltest_init) || !ENGINE_set_finish_function(e, ossltest_finish)) { OSSLTESTerr(OSSLTEST_F_BIND_OSSLTEST, OSSLTEST_R_INIT_FAILED); return 0; } return 1; } #ifndef OPENSSL_NO_DYNAMIC_ENGINE static int bind_helper(ENGINE *e, const char *id) { if (id && (strcmp(id, engine_ossltest_id) != 0)) return 0; if (!bind_ossltest(e)) return 0; return 1; } IMPLEMENT_DYNAMIC_CHECK_FN() IMPLEMENT_DYNAMIC_BIND_FN(bind_helper) #endif static ENGINE *engine_ossltest(void) { ENGINE *ret = ENGINE_new(); if (ret == NULL) return NULL; if (!bind_ossltest(ret)) { ENGINE_free(ret); return NULL; } return ret; } void ENGINE_load_ossltest(void) { ENGINE *toadd = engine_ossltest(); if (!toadd) return; ENGINE_add(toadd); ENGINE_free(toadd); ERR_clear_error(); } static int ossltest_init(ENGINE *e) { return 1; } static int ossltest_finish(ENGINE *e) { return 1; } static int ossltest_destroy(ENGINE *e) { destroy_digests(); destroy_ciphers(); ERR_unload_OSSLTEST_strings(); return 1; } static int ossltest_digests(ENGINE *e, const EVP_MD **digest, const int **nids, int nid) { int ok = 1; if (!digest) { return ossltest_digest_nids(nids); } switch (nid) { case NID_md5: *digest = digest_md5(); break; case NID_sha1: *digest = digest_sha1(); break; case NID_sha256: *digest = digest_sha256(); break; case NID_sha384: *digest = digest_sha384(); break; case NID_sha512: *digest = digest_sha512(); break; default: ok = 0; *digest = NULL; break; } return ok; } static int ossltest_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) { int ok = 1; if (!cipher) { *nids = ossltest_cipher_nids; return (sizeof(ossltest_cipher_nids) - 1) / sizeof(ossltest_cipher_nids[0]); } switch (nid) { case NID_aes_128_cbc: *cipher = ossltest_aes_128_cbc(); break; case NID_aes_128_gcm: *cipher = ossltest_aes_128_gcm(); break; case NID_aes_128_cbc_hmac_sha1: *cipher = ossltest_aes_128_cbc_hmac_sha1(); break; default: ok = 0; *cipher = NULL; break; } return ok; } static void fill_known_data(unsigned char *md, unsigned int len) { unsigned int i; for (i=0; i<len; i++) { md[i] = (unsigned char)(i & 0xff); } } static int digest_md5_init(EVP_MD_CTX *ctx) { return EVP_MD_meth_get_init(EVP_md5())(ctx); } static int digest_md5_update(EVP_MD_CTX *ctx, const void *data, size_t count) { return EVP_MD_meth_get_update(EVP_md5())(ctx, data, count); } static int digest_md5_final(EVP_MD_CTX *ctx, unsigned char *md) { int ret = EVP_MD_meth_get_final(EVP_md5())(ctx, md); if (ret > 0) { fill_known_data(md, MD5_DIGEST_LENGTH); } return ret; } static int digest_sha1_init(EVP_MD_CTX *ctx) { return EVP_MD_meth_get_init(EVP_sha1())(ctx); } static int digest_sha1_update(EVP_MD_CTX *ctx, const void *data, size_t count) { return EVP_MD_meth_get_update(EVP_sha1())(ctx, data, count); } static int digest_sha1_final(EVP_MD_CTX *ctx, unsigned char *md) { int ret = EVP_MD_meth_get_final(EVP_sha1())(ctx, md); if (ret > 0) { fill_known_data(md, SHA_DIGEST_LENGTH); } return ret; } static int digest_sha256_init(EVP_MD_CTX *ctx) { return EVP_MD_meth_get_init(EVP_sha256())(ctx); } static int digest_sha256_update(EVP_MD_CTX *ctx, const void *data, size_t count) { return EVP_MD_meth_get_update(EVP_sha256())(ctx, data, count); } static int digest_sha256_final(EVP_MD_CTX *ctx, unsigned char *md) { int ret = EVP_MD_meth_get_final(EVP_sha256())(ctx, md); if (ret > 0) { fill_known_data(md, SHA256_DIGEST_LENGTH); } return ret; } static int digest_sha384_init(EVP_MD_CTX *ctx) { return EVP_MD_meth_get_init(EVP_sha384())(ctx); } static int digest_sha384_update(EVP_MD_CTX *ctx, const void *data, size_t count) { return EVP_MD_meth_get_update(EVP_sha384())(ctx, data, count); } static int digest_sha384_final(EVP_MD_CTX *ctx, unsigned char *md) { int ret = EVP_MD_meth_get_final(EVP_sha384())(ctx, md); if (ret > 0) { fill_known_data(md, SHA384_DIGEST_LENGTH); } return ret; } static int digest_sha512_init(EVP_MD_CTX *ctx) { return EVP_MD_meth_get_init(EVP_sha512())(ctx); } static int digest_sha512_update(EVP_MD_CTX *ctx, const void *data, size_t count) { return EVP_MD_meth_get_update(EVP_sha512())(ctx, data, count); } static int digest_sha512_final(EVP_MD_CTX *ctx, unsigned char *md) { int ret = EVP_MD_meth_get_final(EVP_sha512())(ctx, md); if (ret > 0) { fill_known_data(md, SHA512_DIGEST_LENGTH); } return ret; } static int ossltest_aes128_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { return EVP_CIPHER_meth_get_init(EVP_aes_128_cbc()) (ctx, key, iv, enc); } static int ossltest_aes128_cbc_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { unsigned char *tmpbuf; int ret; tmpbuf = OPENSSL_malloc(inl); if (tmpbuf == NULL && inl > 0) return -1; if (tmpbuf != NULL) memcpy(tmpbuf, in, inl); ret = EVP_CIPHER_meth_get_do_cipher(EVP_aes_128_cbc())(ctx, out, in, inl); if (tmpbuf != NULL) memcpy(out, tmpbuf, inl); OPENSSL_free(tmpbuf); return ret; } static int ossltest_aes128_gcm_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) { return EVP_CIPHER_meth_get_init(EVP_aes_128_gcm()) (ctx, key, iv, enc); } static int ossltest_aes128_gcm_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t inl) { unsigned char *tmpbuf = OPENSSL_malloc(inl); if (tmpbuf == NULL && inl > 0) return -1; if (tmpbuf != NULL) memcpy(tmpbuf, in, inl); EVP_CIPHER_meth_get_do_cipher(EVP_aes_128_gcm())(ctx, out, in, inl); if (tmpbuf != NULL && out != NULL) memcpy(out, tmpbuf, inl); OPENSSL_free(tmpbuf); return inl; } static int ossltest_aes128_gcm_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { int ret = EVP_CIPHER_meth_get_ctrl(EVP_aes_128_gcm())(ctx, type, arg, ptr); if (ret <= 0) return ret; switch (type) { case EVP_CTRL_AEAD_GET_TAG: memset(ptr, 0, EVP_GCM_TLS_TAG_LEN); break; default: break; } return 1; } #define NO_PAYLOAD_LENGTH ((size_t)-1) # define data(ctx) ((EVP_AES_HMAC_SHA1 *)EVP_CIPHER_CTX_get_cipher_data(ctx)) static int ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) { EVP_AES_HMAC_SHA1 *key = data(ctx); key->payload_length = NO_PAYLOAD_LENGTH; return 1; } static int ossltest_aes128_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { EVP_AES_HMAC_SHA1 *key = data(ctx); unsigned int l; size_t plen = key->payload_length; key->payload_length = NO_PAYLOAD_LENGTH; if (len % AES_BLOCK_SIZE) return 0; if (EVP_CIPHER_CTX_is_encrypting(ctx)) { if (plen == NO_PAYLOAD_LENGTH) plen = len; else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)) return 0; memmove(out, in, plen); if (plen != len) { fill_known_data(out + plen, SHA_DIGEST_LENGTH); plen += SHA_DIGEST_LENGTH; for (l = len - plen - 1; plen < len; plen++) out[plen] = l; } } else { memmove(out, in, len); if (plen != NO_PAYLOAD_LENGTH) { unsigned int maxpad, pad; if (key->tls_ver >= TLS1_1_VERSION) { if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1)) return 0; in += AES_BLOCK_SIZE; out += AES_BLOCK_SIZE; len -= AES_BLOCK_SIZE; } else if (len < (SHA_DIGEST_LENGTH + 1)) return 0; pad = out[len - 1]; maxpad = len - (SHA_DIGEST_LENGTH + 1); if (pad > maxpad) return 0; for (plen = len - pad - 1; plen < len; plen++) if (out[plen] != pad) return 0; } } return 1; } static int ossltest_aes128_cbc_hmac_sha1_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *ptr) { EVP_AES_HMAC_SHA1 *key = data(ctx); switch (type) { case EVP_CTRL_AEAD_SET_MAC_KEY: return 1; case EVP_CTRL_AEAD_TLS1_AAD: { unsigned char *p = ptr; unsigned int len; if (arg != EVP_AEAD_TLS1_AAD_LEN) return -1; len = p[arg - 2] << 8 | p[arg - 1]; key->tls_ver = p[arg - 4] << 8 | p[arg - 3]; if (EVP_CIPHER_CTX_is_encrypting(ctx)) { key->payload_length = len; if (key->tls_ver >= TLS1_1_VERSION) { if (len < AES_BLOCK_SIZE) return 0; len -= AES_BLOCK_SIZE; p[arg - 2] = len >> 8; p[arg - 1] = len; } return (int)(((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE) - len); } else { key->payload_length = arg; return SHA_DIGEST_LENGTH; } } default: return -1; } } static int ossltest_rand_bytes(unsigned char *buf, int num) { unsigned char val = 1; while (--num >= 0) *buf++ = val++; return 1; } static int ossltest_rand_status(void) { return 1; } static const RAND_METHOD *ossltest_rand_method(void) { static RAND_METHOD osslt_rand_meth = { NULL, ossltest_rand_bytes, NULL, NULL, ossltest_rand_bytes, ossltest_rand_status }; return &osslt_rand_meth; }
engines
openssl/engines/e_ossltest.c
openssl
#include "internal/deprecated.h" #include <stdio.h> #include <string.h> #include "internal/nelem.h" #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/bn.h> #include "testutil.h" #include <openssl/rsa.h> #define SetKey \ RSA_set0_key(key, \ BN_bin2bn(n, sizeof(n)-1, NULL), \ BN_bin2bn(e, sizeof(e)-1, NULL), \ BN_bin2bn(d, sizeof(d)-1, NULL)); \ RSA_set0_factors(key, \ BN_bin2bn(p, sizeof(p)-1, NULL), \ BN_bin2bn(q, sizeof(q)-1, NULL)); \ RSA_set0_crt_params(key, \ BN_bin2bn(dmp1, sizeof(dmp1)-1, NULL), \ BN_bin2bn(dmq1, sizeof(dmq1)-1, NULL), \ BN_bin2bn(iqmp, sizeof(iqmp)-1, NULL)); \ if (c != NULL) \ memcpy(c, ctext_ex, sizeof(ctext_ex) - 1); \ return sizeof(ctext_ex) - 1; static int key1(RSA *key, unsigned char *c) { static unsigned char n[] = "\x00\xAA\x36\xAB\xCE\x88\xAC\xFD\xFF\x55\x52\x3C\x7F\xC4\x52\x3F" "\x90\xEF\xA0\x0D\xF3\x77\x4A\x25\x9F\x2E\x62\xB4\xC5\xD9\x9C\xB5" "\xAD\xB3\x00\xA0\x28\x5E\x53\x01\x93\x0E\x0C\x70\xFB\x68\x76\x93" "\x9C\xE6\x16\xCE\x62\x4A\x11\xE0\x08\x6D\x34\x1E\xBC\xAC\xA0\xA1" "\xF5"; static unsigned char e[] = "\x11"; static unsigned char d[] = "\x0A\x03\x37\x48\x62\x64\x87\x69\x5F\x5F\x30\xBC\x38\xB9\x8B\x44" "\xC2\xCD\x2D\xFF\x43\x40\x98\xCD\x20\xD8\xA1\x38\xD0\x90\xBF\x64" "\x79\x7C\x3F\xA7\xA2\xCD\xCB\x3C\xD1\xE0\xBD\xBA\x26\x54\xB4\xF9" "\xDF\x8E\x8A\xE5\x9D\x73\x3D\x9F\x33\xB3\x01\x62\x4A\xFD\x1D\x51"; static unsigned char p[] = "\x00\xD8\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5" "\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x12" "\x0D"; static unsigned char q[] = "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" "\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D" "\x89"; static unsigned char dmp1[] = "\x59\x0B\x95\x72\xA2\xC2\xA9\xC4\x06\x05\x9D\xC2\xAB\x2F\x1D\xAF" "\xEB\x7E\x8B\x4F\x10\xA7\x54\x9E\x8E\xED\xF5\xB4\xFC\xE0\x9E\x05"; static unsigned char dmq1[] = "\x00\x8E\x3C\x05\x21\xFE\x15\xE0\xEA\x06\xA3\x6F\xF0\xF1\x0C\x99" "\x52\xC3\x5B\x7A\x75\x14\xFD\x32\x38\xB8\x0A\xAD\x52\x98\x62\x8D" "\x51"; static unsigned char iqmp[] = "\x36\x3F\xF7\x18\x9D\xA8\xE9\x0B\x1D\x34\x1F\x71\xD0\x9B\x76\xA8" "\xA9\x43\xE1\x1D\x10\xB2\x4D\x24\x9F\x2D\xEA\xFE\xF8\x0C\x18\x26"; static unsigned char ctext_ex[] = "\x1b\x8f\x05\xf9\xca\x1a\x79\x52\x6e\x53\xf3\xcc\x51\x4f\xdb\x89" "\x2b\xfb\x91\x93\x23\x1e\x78\xb9\x92\xe6\x8d\x50\xa4\x80\xcb\x52" "\x33\x89\x5c\x74\x95\x8d\x5d\x02\xab\x8c\x0f\xd0\x40\xeb\x58\x44" "\xb0\x05\xc3\x9e\xd8\x27\x4a\x9d\xbf\xa8\x06\x71\x40\x94\x39\xd2"; SetKey; } static int key2(RSA *key, unsigned char *c) { static unsigned char n[] = "\x00\xA3\x07\x9A\x90\xDF\x0D\xFD\x72\xAC\x09\x0C\xCC\x2A\x78\xB8" "\x74\x13\x13\x3E\x40\x75\x9C\x98\xFA\xF8\x20\x4F\x35\x8A\x0B\x26" "\x3C\x67\x70\xE7\x83\xA9\x3B\x69\x71\xB7\x37\x79\xD2\x71\x7B\xE8" "\x34\x77\xCF"; static unsigned char e[] = "\x3"; static unsigned char d[] = "\x6C\xAF\xBC\x60\x94\xB3\xFE\x4C\x72\xB0\xB3\x32\xC6\xFB\x25\xA2" "\xB7\x62\x29\x80\x4E\x68\x65\xFC\xA4\x5A\x74\xDF\x0F\x8F\xB8\x41" "\x3B\x52\xC0\xD0\xE5\x3D\x9B\x59\x0F\xF1\x9B\xE7\x9F\x49\xDD\x21" "\xE5\xEB"; static unsigned char p[] = "\x00\xCF\x20\x35\x02\x8B\x9D\x86\x98\x40\xB4\x16\x66\xB4\x2E\x92" "\xEA\x0D\xA3\xB4\x32\x04\xB5\xCF\xCE\x91"; static unsigned char q[] = "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" "\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5F"; static unsigned char dmp1[] = "\x00\x8A\x15\x78\xAC\x5D\x13\xAF\x10\x2B\x22\xB9\x99\xCD\x74\x61" "\xF1\x5E\x6D\x22\xCC\x03\x23\xDF\xDF\x0B"; static unsigned char dmq1[] = "\x00\x86\x55\x21\x4A\xC5\x4D\x8D\x4E\xCD\x61\x77\xF1\xC7\x36\x90" "\xCE\x2A\x48\x2C\x8B\x05\x99\xCB\xE0\x3F"; static unsigned char iqmp[] = "\x00\x83\xEF\xEF\xB8\xA9\xA4\x0D\x1D\xB6\xED\x98\xAD\x84\xED\x13" "\x35\xDC\xC1\x08\xF3\x22\xD0\x57\xCF\x8D"; static unsigned char ctext_ex[] = "\x14\xbd\xdd\x28\xc9\x83\x35\x19\x23\x80\xe8\xe5\x49\xb1\x58\x2a" "\x8b\x40\xb4\x48\x6d\x03\xa6\xa5\x31\x1f\x1f\xd5\xf0\xa1\x80\xe4" "\x17\x53\x03\x29\xa9\x34\x90\x74\xb1\x52\x13\x54\x29\x08\x24\x52" "\x62\x51"; SetKey; } static int key3(RSA *key, unsigned char *c) { static unsigned char n[] = "\x00\xBB\xF8\x2F\x09\x06\x82\xCE\x9C\x23\x38\xAC\x2B\x9D\xA8\x71" "\xF7\x36\x8D\x07\xEE\xD4\x10\x43\xA4\x40\xD6\xB6\xF0\x74\x54\xF5" "\x1F\xB8\xDF\xBA\xAF\x03\x5C\x02\xAB\x61\xEA\x48\xCE\xEB\x6F\xCD" "\x48\x76\xED\x52\x0D\x60\xE1\xEC\x46\x19\x71\x9D\x8A\x5B\x8B\x80" "\x7F\xAF\xB8\xE0\xA3\xDF\xC7\x37\x72\x3E\xE6\xB4\xB7\xD9\x3A\x25" "\x84\xEE\x6A\x64\x9D\x06\x09\x53\x74\x88\x34\xB2\x45\x45\x98\x39" "\x4E\xE0\xAA\xB1\x2D\x7B\x61\xA5\x1F\x52\x7A\x9A\x41\xF6\xC1\x68" "\x7F\xE2\x53\x72\x98\xCA\x2A\x8F\x59\x46\xF8\xE5\xFD\x09\x1D\xBD" "\xCB"; static unsigned char e[] = "\x11"; static unsigned char d[] = "\x00\xA5\xDA\xFC\x53\x41\xFA\xF2\x89\xC4\xB9\x88\xDB\x30\xC1\xCD" "\xF8\x3F\x31\x25\x1E\x06\x68\xB4\x27\x84\x81\x38\x01\x57\x96\x41" "\xB2\x94\x10\xB3\xC7\x99\x8D\x6B\xC4\x65\x74\x5E\x5C\x39\x26\x69" "\xD6\x87\x0D\xA2\xC0\x82\xA9\x39\xE3\x7F\xDC\xB8\x2E\xC9\x3E\xDA" "\xC9\x7F\xF3\xAD\x59\x50\xAC\xCF\xBC\x11\x1C\x76\xF1\xA9\x52\x94" "\x44\xE5\x6A\xAF\x68\xC5\x6C\x09\x2C\xD3\x8D\xC3\xBE\xF5\xD2\x0A" "\x93\x99\x26\xED\x4F\x74\xA1\x3E\xDD\xFB\xE1\xA1\xCE\xCC\x48\x94" "\xAF\x94\x28\xC2\xB7\xB8\x88\x3F\xE4\x46\x3A\x4B\xC8\x5B\x1C\xB3" "\xC1"; static unsigned char p[] = "\x00\xEE\xCF\xAE\x81\xB1\xB9\xB3\xC9\x08\x81\x0B\x10\xA1\xB5\x60" "\x01\x99\xEB\x9F\x44\xAE\xF4\xFD\xA4\x93\xB8\x1A\x9E\x3D\x84\xF6" "\x32\x12\x4E\xF0\x23\x6E\x5D\x1E\x3B\x7E\x28\xFA\xE7\xAA\x04\x0A" "\x2D\x5B\x25\x21\x76\x45\x9D\x1F\x39\x75\x41\xBA\x2A\x58\xFB\x65" "\x99"; static unsigned char q[] = "\x00\xC9\x7F\xB1\xF0\x27\xF4\x53\xF6\x34\x12\x33\xEA\xAA\xD1\xD9" "\x35\x3F\x6C\x42\xD0\x88\x66\xB1\xD0\x5A\x0F\x20\x35\x02\x8B\x9D" "\x86\x98\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5" "\xCF\xCE\x33\x52\x52\x4D\x04\x16\xA5\xA4\x41\xE7\x00\xAF\x46\x15" "\x03"; static unsigned char dmp1[] = "\x54\x49\x4C\xA6\x3E\xBA\x03\x37\xE4\xE2\x40\x23\xFC\xD6\x9A\x5A" "\xEB\x07\xDD\xDC\x01\x83\xA4\xD0\xAC\x9B\x54\xB0\x51\xF2\xB1\x3E" "\xD9\x49\x09\x75\xEA\xB7\x74\x14\xFF\x59\xC1\xF7\x69\x2E\x9A\x2E" "\x20\x2B\x38\xFC\x91\x0A\x47\x41\x74\xAD\xC9\x3C\x1F\x67\xC9\x81"; static unsigned char dmq1[] = "\x47\x1E\x02\x90\xFF\x0A\xF0\x75\x03\x51\xB7\xF8\x78\x86\x4C\xA9" "\x61\xAD\xBD\x3A\x8A\x7E\x99\x1C\x5C\x05\x56\xA9\x4C\x31\x46\xA7" "\xF9\x80\x3F\x8F\x6F\x8A\xE3\x42\xE9\x31\xFD\x8A\xE4\x7A\x22\x0D" "\x1B\x99\xA4\x95\x84\x98\x07\xFE\x39\xF9\x24\x5A\x98\x36\xDA\x3D"; static unsigned char iqmp[] = "\x00\xB0\x6C\x4F\xDA\xBB\x63\x01\x19\x8D\x26\x5B\xDB\xAE\x94\x23" "\xB3\x80\xF2\x71\xF7\x34\x53\x88\x50\x93\x07\x7F\xCD\x39\xE2\x11" "\x9F\xC9\x86\x32\x15\x4F\x58\x83\xB1\x67\xA9\x67\xBF\x40\x2B\x4E" "\x9E\x2E\x0F\x96\x56\xE6\x98\xEA\x36\x66\xED\xFB\x25\x79\x80\x39" "\xF7"; static unsigned char ctext_ex[] = "\xb8\x24\x6b\x56\xa6\xed\x58\x81\xae\xb5\x85\xd9\xa2\x5b\x2a\xd7" "\x90\xc4\x17\xe0\x80\x68\x1b\xf1\xac\x2b\xc3\xde\xb6\x9d\x8b\xce" "\xf0\xc4\x36\x6f\xec\x40\x0a\xf0\x52\xa7\x2e\x9b\x0e\xff\xb5\xb3" "\xf2\xf1\x92\xdb\xea\xca\x03\xc1\x27\x40\x05\x71\x13\xbf\x1f\x06" "\x69\xac\x22\xe9\xf3\xa7\x85\x2e\x3c\x15\xd9\x13\xca\xb0\xb8\x86" "\x3a\x95\xc9\x92\x94\xce\x86\x74\x21\x49\x54\x61\x03\x46\xf4\xd4" "\x74\xb2\x6f\x7c\x48\xb4\x2e\xe6\x8e\x1f\x57\x2a\x1f\xc4\x02\x6a" "\xc4\x56\xb4\xf5\x9f\x7b\x62\x1e\xa1\xb9\xd8\x8f\x64\x20\x2f\xb1"; SetKey; } static int rsa_setkey(RSA** key, unsigned char *ctext, int idx) { int clen = 0; *key = RSA_new(); if (*key != NULL) switch (idx) { case 0: clen = key1(*key, ctext); break; case 1: clen = key2(*key, ctext); break; case 2: clen = key3(*key, ctext); break; } return clen; } static int test_rsa_simple(int idx, int en_pad_type, int de_pad_type, int success, unsigned char *ctext_ex, int *clen, RSA **retkey) { int ret = 0; RSA *key; unsigned char ptext[256]; unsigned char ctext[256]; static unsigned char ptext_ex[] = "\x54\x85\x9b\x34\x2c\x49\xea\x2a"; int plen; int clentmp = 0; int num; plen = sizeof(ptext_ex) - 1; clentmp = rsa_setkey(&key, ctext_ex, idx); if (clen != NULL) *clen = clentmp; num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); if (!TEST_int_eq(num, clentmp)) goto err; num = RSA_private_decrypt(num, ctext, ptext, key, de_pad_type); if (success) { if (!TEST_int_gt(num, 0) || !TEST_mem_eq(ptext, num, ptext_ex, plen)) goto err; } else { if (!TEST_int_lt(num, 0)) goto err; } ret = 1; if (retkey != NULL) { *retkey = key; key = NULL; } err: RSA_free(key); return ret; } static int test_rsa_pkcs1(int idx) { return test_rsa_simple(idx, RSA_PKCS1_PADDING, RSA_PKCS1_PADDING, 1, NULL, NULL, NULL); } static int test_rsa_oaep(int idx) { int ret = 0; RSA *key = NULL; unsigned char ptext[256]; static unsigned char ptext_ex[] = "\x54\x85\x9b\x34\x2c\x49\xea\x2a"; unsigned char ctext_ex[256]; int plen; int clen = 0; int num; int n; if (!test_rsa_simple(idx, RSA_PKCS1_OAEP_PADDING, RSA_PKCS1_OAEP_PADDING, 1, ctext_ex, &clen, &key)) goto err; plen = sizeof(ptext_ex) - 1; num = RSA_private_decrypt(clen, ctext_ex, ptext, key, RSA_PKCS1_OAEP_PADDING); if (num <= 0 || !TEST_mem_eq(ptext, num, ptext_ex, plen)) goto err; for (n = 0; n < clen; ++n) { ctext_ex[n] ^= 1; num = RSA_private_decrypt(clen, ctext_ex, ptext, key, RSA_PKCS1_OAEP_PADDING); if (!TEST_int_le(num, 0)) goto err; ctext_ex[n] ^= 1; } for (n = -1; n < clen; ++n) { num = RSA_private_decrypt(n, ctext_ex, ptext, key, RSA_PKCS1_OAEP_PADDING); if (!TEST_int_le(num, 0)) goto err; } ret = 1; err: RSA_free(key); return ret; } static const struct { int bits; unsigned int r; } rsa_security_bits_cases[] = { { 2048, 112 }, { 3072, 128 }, { 4096, 152 }, { 6144, 176 }, { 8192, 200 }, { 7680, 192 }, { 15360, 256 }, { 256, 40 }, { 512, 56 }, { 1024, 80 }, { 8888, 208 }, { 2468, 120 }, { 13456, 248 }, { 15359, 256 }, { 15361, 264 }, { 7679, 192 }, { 7681, 200 }, }; static int test_rsa_security_bit(int n) { static const unsigned char vals[8] = { 0x80, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40 }; RSA *key = RSA_new(); const int bits = rsa_security_bits_cases[n].bits; const int result = rsa_security_bits_cases[n].r; const int bytes = (bits + 7) / 8; int r = 0; unsigned char num[2000]; if (!TEST_ptr(key) || !TEST_int_le(bytes, (int)sizeof(num))) goto err; memset(num, vals[bits % 8], bytes); if (TEST_true(RSA_set0_key(key, BN_bin2bn(num, bytes, NULL), BN_bin2bn(num, bytes, NULL), NULL)) && TEST_uint_eq(RSA_security_bits(key), result)) r = 1; err: RSA_free(key); return r; } static int test_EVP_rsa_legacy_key(void) { int ret; size_t buflen = 384; size_t msglen = 64; unsigned char sigbuf[384]; unsigned char msgbuf[64]; BIGNUM *p; BIGNUM *q; BIGNUM *n; BIGNUM *d; BIGNUM *e; RSA *rsa; const EVP_MD *md; EVP_MD_CTX *ctx = NULL; EVP_PKEY *pkey = NULL; unsigned char n_data[] = { 0x00, 0xc7, 0x28, 0x7a, 0x28, 0x91, 0x51, 0xa5, 0xe8, 0x3c, 0x45, 0xcf, 0x1d, 0xa9, 0x69, 0x7a, 0x0d, 0xdb, 0xdd, 0x8f, 0xe2, 0xde, 0x85, 0xdd, 0x85, 0x6d, 0x8f, 0x78, 0x20, 0xd6, 0xe, 0xe5, 0x06, 0xcb, 0x9c, 0xd6, 0xd3, 0xca, 0xef, 0x1d, 0x80, 0xd3, 0x18, 0x23, 0x91, 0x5c, 0xe5, 0xc8, 0x44, 0x37, 0x56, 0x1b, 0x68, 0x7f, 0x08, 0xa3, 0x1c, 0xf6, 0xe8, 0x11, 0x38, 0x0f, 0x2e, 0xad, 0xb1, 0x89, 0x8b, 0x08, 0xe8, 0x35, 0xaf, 0x3b, 0xfe, 0x37, 0x8d, 0x21, 0xd5, 0x3f, 0x1f, 0x4b, 0x01, 0x30, 0xd8, 0xd0, 0x24, 0xf7, 0xab, 0x57, 0xad, 0xac, 0xbc, 0x53, 0x6d, 0x84, 0x8e, 0xa1, 0xb2, 0x5b, 0x8e, 0xe7, 0xb3, 0xac, 0xfc, 0x60, 0x22, 0x10, 0x1e, 0x99, 0xfa, 0xa0, 0x60, 0x00, 0x69, 0x5f, 0x8e, 0xca, 0x6d, 0x9c, 0xee, 0x5e, 0x84, 0x4e, 0x53, 0x83, 0x42, 0x76, 0x4d, 0xb8, 0xc1, 0xeb, 0x4e, 0x3d, 0xc3, 0xce, 0xac, 0x79, 0xbb, 0x29, 0x5d, 0x92, 0x33, 0x6e, 0xcf, 0x8f, 0x5a, 0xf0, 0xb3, 0xb5, 0xdc, 0xd5, 0xa3, 0xaf, 0x40, 0x4b, 0x0f, 0x05, 0xac, 0x46, 0x53, 0x2d, 0x5f, 0x20, 0x96, 0x42, 0xa8, 0x47, 0x61, 0x54, 0x05, 0x2c, 0x8a, 0x26, 0x5d, 0x92, 0x1d, 0x01, 0x2a, 0x27, 0x8a, 0xfc, 0x64, 0x24, 0x5c, 0x34, 0xde, 0x92, 0xc6, 0x82, 0xea, 0x4d, 0xe2, 0x52, 0xe5, 0xad, 0x62, 0x00, 0xc6, 0xc8, 0xe9, 0x0c, 0x22, 0xf0, 0x9e, 0xbe, 0xdc, 0x51, 0x58, 0xad, 0x3b, 0xba, 0x2e, 0x45, 0x65, 0xcc, 0x5b, 0x55, 0x46, 0x67, 0x18, 0x4a, 0x80, 0x67, 0x5b, 0x84, 0x7f, 0x13, 0x37, 0x45, 0xd8, 0x03, 0xc6, 0x22, 0xc3, 0x4a, 0x46, 0x6b, 0xde, 0x50, 0xbf, 0x16, 0x0a, 0x23, 0x0b, 0xaa, 0x50, 0x54, 0xf6, 0x20, 0x83, 0x74, 0x33, 0x97, 0x2e, 0xf2, 0x8e, 0x7e, 0x13 }; unsigned char e_data[] = { 0x01, 0x00, 0x01 }; unsigned char d_data[] = { 0x09, 0x2d, 0xcb, 0xe7, 0x87, 0xbf, 0x10, 0x1a, 0xf2, 0x80, 0x33, 0x2a, 0x06, 0x4f, 0x56, 0xb1, 0x41, 0xd3, 0x65, 0xd8, 0xca, 0x71, 0xb8, 0x02, 0x78, 0xc8, 0xb6, 0x7c, 0x28, 0xf4, 0x6c, 0xe8, 0xd1, 0xc4, 0x92, 0x40, 0x23, 0xa7, 0xbe, 0x9f, 0xdb, 0xda, 0xce, 0x74, 0xda, 0x27, 0xbb, 0x01, 0xad, 0xdd, 0x39, 0x99, 0x28, 0xd5, 0xb0, 0x92, 0xda, 0xac, 0x5a, 0x72, 0xcf, 0x7c, 0x52, 0xc4, 0x0e, 0x77, 0x4a, 0x7b, 0x4d, 0x52, 0x1c, 0xbd, 0x3c, 0x39, 0x34, 0x78, 0x7c, 0x16, 0xc8, 0xa1, 0xae, 0xeb, 0x27, 0x38, 0xb4, 0xf3, 0x80, 0x30, 0x80, 0x78, 0x13, 0x8e, 0x46, 0x20, 0x3e, 0xc2, 0x96, 0x26, 0xb1, 0x76, 0x1e, 0x00, 0x69, 0xbb, 0xd8, 0x2b, 0x58, 0xe4, 0x6c, 0xb4, 0xd0, 0x00, 0x0b, 0x47, 0xec, 0xfb, 0x7d, 0x52, 0x9d, 0x27, 0x92, 0xe6, 0x95, 0x73, 0xa0, 0x39, 0x37, 0xcd, 0x1f, 0x60, 0x13, 0x1c, 0x87, 0x9d, 0xa7, 0x91, 0x90, 0xf9, 0x36, 0xc5, 0xfa, 0x3f, 0xf9, 0x7f, 0x50, 0xf8, 0xb3, 0x54, 0x65, 0xff, 0x6f, 0xa6, 0x22, 0xcc, 0x4a, 0x1e, 0x49, 0x3f, 0x07, 0xc6, 0xf2, 0x65, 0x73, 0x13, 0x1b, 0x2d, 0xb6, 0x15, 0xff, 0xcd, 0x9a, 0x1c, 0xea, 0xef, 0x58, 0x56, 0x91, 0x2d, 0x47, 0x81, 0x56, 0x0d, 0xc3, 0xb0, 0x47, 0x58, 0x8d, 0x05, 0x7d, 0x5b, 0xc0, 0x22, 0xa4, 0xf0, 0x2e, 0x70, 0x36, 0x01, 0x89, 0xa1, 0x71, 0xed, 0x76, 0xe9, 0x8d, 0xf5, 0x49, 0xaf, 0x11, 0xbe, 0xe4, 0xd4, 0x48, 0x92, 0xb6, 0x5b, 0xc2, 0x04, 0xd4, 0x0c, 0x5c, 0x8b, 0xe3, 0xfa, 0x29, 0x63, 0x86, 0xb4, 0x10, 0xad, 0x32, 0x07, 0x85, 0xe2, 0x43, 0x76, 0x16, 0x90, 0xab, 0xdf, 0xb3, 0x36, 0x0a, 0xc4, 0x49, 0x7b, 0x95, 0x48, 0x50, 0x72, 0x8f, 0x7d, 0xf4, 0xfa, 0x60, 0xc1 }; unsigned char p_data[] = { 0x00, 0xed, 0xf7, 0xa7, 0x00, 0x5a, 0xbb, 0xd1, 0x52, 0x65, 0x9b, 0xec, 0xfe, 0x27, 0x8b, 0xe2, 0xbe, 0x40, 0x8c, 0x2f, 0x6f, 0xb4, 0x26, 0xb2, 0xbe, 0x45, 0x4b, 0x3b, 0x5a, 0xaa, 0xc6, 0xaa, 0xfa, 0xc1, 0x3a, 0xa9, 0xa1, 0xba, 0xb7, 0x86, 0x1a, 0x98, 0x15, 0x5f, 0x5c, 0x1c, 0x57, 0x78, 0x78, 0x6a, 0x13, 0xc2, 0x40, 0x7d, 0x07, 0x87, 0x47, 0xc6, 0x96, 0xd5, 0x92, 0xc9, 0x65, 0x2c, 0xfe, 0xbb, 0xe0, 0xd6, 0x76, 0x25, 0x5a, 0xa3, 0xdf, 0x97, 0x4b, 0x64, 0xfd, 0x3b, 0x2b, 0xbc, 0xfb, 0x80, 0xad, 0x3b, 0x7d, 0x1f, 0x48, 0x56, 0x27, 0xf7, 0x2f, 0x8e, 0x92, 0x07, 0xa8, 0x9f, 0xbc, 0x5a, 0xce, 0xfa, 0xd5, 0x67, 0xad, 0xf4, 0xbf, 0xe0, 0xc9, 0x3e, 0x8e, 0xb5, 0x90, 0x58, 0x54, 0x92, 0x9f, 0xda, 0x36, 0xc0, 0x0d, 0x57, 0xfe, 0x6c, 0x23, 0x63, 0x8b, 0xd1, 0x1e, 0x4f, 0xd3 }; unsigned char q_data[] = { 0x00, 0xd6, 0x3f, 0xf5, 0xee, 0xff, 0x4d, 0x7d, 0x8c, 0x1a, 0x85, 0x5d, 0x3c, 0x4f, 0x9d, 0xdf, 0xc7, 0x68, 0x27, 0x7f, 0xe4, 0x4f, 0x4f, 0xd7, 0xa2, 0x3b, 0xcd, 0x4a, 0x34, 0xd8, 0x55, 0x4a, 0x3e, 0x8e, 0xb3, 0xa8, 0xe9, 0x8a, 0xc5, 0x94, 0xd1, 0x09, 0x32, 0x4b, 0x79, 0x8d, 0x7b, 0x03, 0x0b, 0x5d, 0xca, 0x91, 0x41, 0xbc, 0x82, 0xc3, 0x89, 0x67, 0x4d, 0x03, 0x68, 0x03, 0x2d, 0x0e, 0x4e, 0x97, 0x6c, 0xf6, 0x3e, 0x1f, 0xf4, 0x50, 0x06, 0x5d, 0x05, 0x22, 0xf2, 0xf8, 0xf2, 0xde, 0xad, 0x2e, 0x9d, 0xc3, 0x97, 0x1b, 0xc3, 0x75, 0xe7, 0x86, 0xde, 0xc5, 0x11, 0x89, 0xed, 0x6a, 0x13, 0x14, 0x23, 0x4b, 0x98, 0x81, 0xf7, 0xd4, 0x1c, 0xee, 0x30, 0x92, 0x85, 0x20, 0x4f, 0x35, 0x02, 0xfa, 0xda, 0x14, 0x77, 0xfa, 0x08, 0x34, 0x60, 0xc7, 0x93, 0x72, 0xdc, 0xc4, 0x18, 0x70, 0xc1 }; memset(msgbuf, 0xef, 64); ret = (TEST_ptr((p = BN_bin2bn(p_data, sizeof(p_data), NULL))) && TEST_ptr((q = BN_bin2bn(q_data, sizeof(q_data), NULL))) && TEST_ptr((n = BN_bin2bn(n_data, sizeof(n_data), NULL))) && TEST_ptr((d = BN_bin2bn(d_data, sizeof(d_data), NULL))) && TEST_ptr((e = BN_bin2bn(e_data, sizeof(e_data), NULL))) && TEST_ptr((rsa = RSA_new())) && TEST_ptr((md = EVP_sha256())) && TEST_ptr((ctx = EVP_MD_CTX_new())) && TEST_ptr((pkey = EVP_PKEY_new())) && TEST_true(RSA_set0_factors(rsa, p, q)) && TEST_true(RSA_set0_key(rsa, n, e, d)) && TEST_true(EVP_PKEY_assign_RSA(pkey, rsa)) && TEST_true(EVP_DigestSignInit(ctx, NULL, md, NULL, pkey)) && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen))); EVP_MD_CTX_free(ctx); EVP_PKEY_free(pkey); return ret; } static RSA *load_key(int priv) { RSA *rsa = NULL; BIGNUM *pn = NULL, *pe = NULL, *pd= NULL; static const unsigned char n[] = { 0x00, 0xbe, 0x24, 0x14, 0xf2, 0x39, 0xde, 0x19, 0xb3, 0xd7, 0x86, 0x1e, 0xf8, 0xd3, 0x97, 0x9f, 0x78, 0x28, 0x4c, 0xbf, 0xef, 0x03, 0x29, 0xc5, 0xeb, 0x97, 0x18, 0xdb, 0xa5, 0x17, 0x07, 0x57, 0x96, 0xe2, 0x45, 0x91, 0x2b, 0xd2, 0x9e, 0x28, 0x61, 0xa7, 0x8f, 0x39, 0xaa, 0xde, 0x94, 0x6d, 0x2b, 0x39, 0xde, 0xbe, 0xcf, 0xd7, 0x29, 0x16, 0x3a, 0x1a, 0x86, 0x2f, 0xff, 0x7a, 0x2f, 0x12, 0xc4, 0x8a, 0x32, 0x06, 0x6f, 0x40, 0x42, 0x37, 0xaa, 0x5f, 0xaf, 0x40, 0x77, 0xa5, 0x73, 0x09, 0xbf, 0xc5, 0x85, 0x79, 0xc0, 0x38, 0xd6, 0xb7, 0x2f, 0x77, 0xf0, 0x5a, 0xaf, 0xaf, 0xc3, 0x63, 0x4b, 0xea, 0xa2, 0x0c, 0x27, 0xcd, 0x7c, 0x77, 0xf4, 0x29, 0x5a, 0x69, 0xbd, 0xfe, 0x17, 0xb6, 0xc5, 0xd7, 0xc0, 0x40, 0xf9, 0x29, 0x46, 0x1f, 0xc0, 0x4b, 0xcf, 0x4e, 0x8f, 0x74, 0xd9, 0xc8, 0xd0, 0xde, 0x9c, 0x48, 0x57, 0xcc, 0x30, 0xbc, 0x06, 0x47, 0x4a, 0x8e, 0x40, 0x8a, 0xa1, 0x2a, 0x09, 0x8d, 0xe8, 0x41, 0x3d, 0x21, 0x52, 0xdc, 0x9c, 0xa9, 0x43, 0x63, 0x01, 0x44, 0xb3, 0xec, 0x22, 0x06, 0x29, 0xf6, 0xd8, 0xf6, 0x6b, 0xc3, 0x36, 0x25, 0xb0, 0x9b, 0xdb, 0x9a, 0x22, 0x51, 0x13, 0x42, 0xbd, 0x28, 0x0b, 0xd8, 0x5e, 0xac, 0xc7, 0x71, 0x6e, 0x78, 0xfc, 0xf4, 0x1d, 0x74, 0x9b, 0x1a, 0x19, 0x13, 0x56, 0x04, 0xb4, 0x33, 0x4e, 0xed, 0x54, 0x59, 0x7f, 0x71, 0x5d, 0x24, 0x18, 0x91, 0x51, 0x20, 0x39, 0x78, 0x4e, 0x33, 0x73, 0x96, 0xa8, 0x12, 0x2f, 0xff, 0x48, 0xc2, 0x11, 0x33, 0x95, 0xe5, 0xcc, 0x1a, 0xe2, 0x39, 0xd5, 0x57, 0x44, 0x51, 0x59, 0xd1, 0x35, 0x62, 0x16, 0x22, 0xf5, 0x52, 0x3d, 0xe0, 0x9b, 0x2d, 0x33, 0x34, 0x75, 0x13, 0x7d, 0x62, 0x70, 0x53, 0x31 }; static const unsigned char e[] = { 0x01, 0x00, 0x01 }; static const unsigned char d[] = { 0x0b, 0xd3, 0x07, 0x7a, 0xb0, 0x0c, 0xb2, 0xe3, 0x5d, 0x49, 0x7f, 0xe0, 0xf4, 0x5b, 0x21, 0x31, 0x96, 0x2b, 0x7e, 0x32, 0xdf, 0x5a, 0xec, 0x5e, 0x10, 0x14, 0x9d, 0x99, 0xaa, 0xd8, 0xc3, 0xfa, 0x9c, 0x0e, 0x0c, 0x96, 0xe9, 0xa3, 0x58, 0x62, 0x68, 0xca, 0xba, 0x50, 0xc9, 0x04, 0x58, 0xd4, 0xe3, 0xa5, 0x99, 0x8f, 0x08, 0x2b, 0xcb, 0xe0, 0x1f, 0x84, 0xc5, 0x64, 0xbd, 0x48, 0xe2, 0xc1, 0x56, 0x51, 0x01, 0xb7, 0x8e, 0xca, 0xe3, 0x66, 0x70, 0xea, 0x7f, 0x8f, 0x45, 0x3a, 0xa6, 0x02, 0x3f, 0x16, 0xc3, 0xad, 0x57, 0x97, 0x8a, 0x37, 0x2d, 0x6d, 0xb4, 0xfd, 0x08, 0x98, 0x95, 0x72, 0xeb, 0xd7, 0xa9, 0x9a, 0xfa, 0xcf, 0x55, 0x10, 0x19, 0xf7, 0x7f, 0x7c, 0x8f, 0x49, 0xf3, 0x1d, 0xc2, 0xf2, 0xd7, 0xb3, 0x8a, 0xfc, 0x9b, 0x76, 0x40, 0x5c, 0xa7, 0x2f, 0x7a, 0x8a, 0x3d, 0xdf, 0xbc, 0x52, 0x69, 0x99, 0xf8, 0x4b, 0x7a, 0xbf, 0x11, 0x5d, 0x31, 0x41, 0x5f, 0xa3, 0xb9, 0x74, 0xaf, 0xe4, 0x08, 0x19, 0x9f, 0x88, 0xca, 0xfb, 0x8e, 0xab, 0xa4, 0x00, 0x31, 0xc9, 0xf1, 0x77, 0xe9, 0xe3, 0xf1, 0x98, 0xd9, 0x04, 0x08, 0x0c, 0x38, 0x35, 0x4b, 0xcc, 0xab, 0x22, 0xdf, 0x84, 0xea, 0xe4, 0x2e, 0x57, 0xa5, 0xc1, 0x91, 0x0c, 0x34, 0x3b, 0x88, 0xbc, 0x14, 0xee, 0x6e, 0xe3, 0xf0, 0xe0, 0xdc, 0xae, 0xd6, 0x0c, 0x9b, 0xa0, 0x6d, 0xb6, 0x92, 0x6c, 0x7e, 0x05, 0x46, 0x02, 0xbc, 0x23, 0xbc, 0x65, 0xe6, 0x62, 0x04, 0x19, 0xe6, 0x98, 0x67, 0x2d, 0x15, 0x0a, 0xc4, 0xea, 0xb5, 0x62, 0xa0, 0x54, 0xed, 0x07, 0x45, 0x3e, 0x21, 0x93, 0x3e, 0x22, 0xd0, 0xc3, 0xca, 0x37, 0x3c, 0xea, 0x90, 0xdd, 0xa6, 0xb1, 0x6c, 0x76, 0xce, 0x5a, 0xe1, 0xc2, 0x80, 0x1f, 0x32, 0x21 }; if (!TEST_ptr(rsa = RSA_new())) return NULL; pn = BN_bin2bn(n, sizeof(n), NULL); pe = BN_bin2bn(e, sizeof(e), NULL); if (priv) pd = BN_bin2bn(d, sizeof(d), NULL); if (!TEST_false(pn == NULL || pe == NULL || (priv && pd == NULL) || !RSA_set0_key(rsa, pn, pe, pd))) { BN_free(pn); BN_free(pe); BN_free(pd); RSA_free(rsa); rsa = NULL; } return rsa; } static int test_rsa_saos(void) { int ret = 0; unsigned int siglen = 0; RSA *rsa_priv = NULL, *rsa_pub = NULL; static const unsigned char in[256] = { 0 }; unsigned char sig[256]; unsigned int inlen = sizeof(in) - RSA_PKCS1_PADDING_SIZE - 3; static const unsigned char sig_mismatch[256] = { 0x5f, 0x64, 0xab, 0xd3, 0x86, 0xdf, 0x6e, 0x91, 0xa8, 0xdb, 0x9d, 0x36, 0x7a, 0x15, 0xe5, 0x75, 0xe4, 0x27, 0xdf, 0xeb, 0x8d, 0xaf, 0xb0, 0x60, 0xec, 0x36, 0x8b, 0x00, 0x36, 0xb4, 0x61, 0x38, 0xfe, 0xfa, 0x49, 0x55, 0xcf, 0xb7, 0xff, 0xeb, 0x25, 0xa5, 0x41, 0x1e, 0xaa, 0x74, 0x3d, 0x57, 0xed, 0x5c, 0x4a, 0x01, 0x9e, 0xb2, 0x50, 0xbc, 0x50, 0x15, 0xd5, 0x97, 0x93, 0x91, 0x97, 0xa3, 0xff, 0x67, 0x2a, 0xe9, 0x04, 0xdd, 0x31, 0x6f, 0x4b, 0x44, 0x4f, 0x04, 0xa0, 0x48, 0x6a, 0xc1, 0x8d, 0xc2, 0xf3, 0xf7, 0xc4, 0x8c, 0x29, 0xcb, 0x2c, 0x04, 0x8f, 0x30, 0x71, 0xbb, 0x5b, 0xf9, 0xf9, 0x1b, 0xe8, 0xf0, 0xe8, 0xd1, 0xcf, 0x73, 0xf6, 0x02, 0x45, 0x6f, 0x53, 0x25, 0x1e, 0x74, 0x94, 0x6e, 0xf4, 0x0d, 0x36, 0x6c, 0xa3, 0xae, 0x8f, 0x94, 0x05, 0xa9, 0xe9, 0x65, 0x26, 0x7f, 0x07, 0xc5, 0x7e, 0xab, 0xd9, 0xe9, 0x09, 0x2d, 0x19, 0x8c, 0x6a, 0xcc, 0xd5, 0x62, 0x04, 0xb4, 0x9b, 0xaf, 0x99, 0x6a, 0x7a, 0x7b, 0xef, 0x01, 0x9b, 0xc1, 0x46, 0x59, 0x88, 0xee, 0x8b, 0xd7, 0xe5, 0x35, 0xad, 0x4c, 0xb2, 0x0d, 0x93, 0xdd, 0x0e, 0x50, 0x36, 0x2b, 0x7b, 0x42, 0x9b, 0x59, 0x95, 0xe7, 0xe1, 0x36, 0x50, 0x87, 0x7c, 0xac, 0x47, 0x13, 0x9b, 0xa7, 0x36, 0xdf, 0x8a, 0xd7, 0xee, 0x7d, 0x2e, 0xa6, 0xbb, 0x31, 0x32, 0xed, 0x39, 0x77, 0xf2, 0x41, 0xf9, 0x2d, 0x29, 0xfc, 0x6d, 0x32, 0x8e, 0x35, 0x99, 0x38, 0x8b, 0xd9, 0xc6, 0x77, 0x09, 0xe3, 0xe3, 0x06, 0x98, 0xe1, 0x96, 0xe9, 0x23, 0x11, 0xeb, 0x09, 0xa2, 0x6b, 0x21, 0x52, 0x67, 0x94, 0x15, 0x72, 0x7e, 0xdd, 0x66, 0x1c, 0xe7, 0xdb, 0x0e, 0x71, 0x5d, 0x95, 0x9d, 0xf8, 0x8e, 0x65, 0x97, 0x2f, 0x1a, 0x86 }; static const unsigned char no_octet_sig[256] = { 0x78, 0xaf, 0x3e, 0xd1, 0xbc, 0x99, 0xb3, 0x19, 0xa8, 0xaa, 0x64, 0x56, 0x60, 0x95, 0xa0, 0x81, 0xd8, 0xb4, 0xe1, 0x9c, 0xf8, 0x94, 0xfa, 0x31, 0xb5, 0xde, 0x90, 0x75, 0xa7, 0xdb, 0xd4, 0x7e, 0xda, 0x62, 0xde, 0x16, 0x78, 0x4f, 0x9b, 0xc2, 0xa4, 0xd4, 0x5c, 0x17, 0x4f, 0x2d, 0xf2, 0x84, 0x5b, 0x5d, 0x00, 0xa0, 0xcf, 0xda, 0x3f, 0xbc, 0x40, 0xb4, 0x4e, 0xcb, 0x18, 0xeb, 0x4b, 0x0f, 0xce, 0x95, 0x3a, 0x5a, 0x9c, 0x49, 0xb4, 0x63, 0xd4, 0xde, 0xfb, 0xe2, 0xa8, 0xf3, 0x97, 0x52, 0x36, 0x3e, 0xc0, 0xab, 0xc8, 0x1c, 0xef, 0xdd, 0xf4, 0x37, 0xbc, 0xf3, 0xc3, 0x67, 0xf6, 0xc0, 0x6e, 0x75, 0xa6, 0xf3, 0x7e, 0x37, 0x96, 0xf2, 0xbb, 0x25, 0x3a, 0xa0, 0xa8, 0x8e, 0xce, 0xa0, 0xce, 0x0f, 0x22, 0x2d, 0x9c, 0x30, 0x0d, 0x20, 0x36, 0xc6, 0x9d, 0x36, 0x5d, 0x5b, 0x3e, 0xbc, 0x7c, 0x55, 0x95, 0xb4, 0x69, 0x19, 0x27, 0xf6, 0x63, 0x78, 0x21, 0x2d, 0xcf, 0x51, 0xb0, 0x46, 0x44, 0x02, 0x29, 0x93, 0xa5, 0x1b, 0xda, 0x21, 0xb3, 0x74, 0xf6, 0x4e, 0xd0, 0xdb, 0x3d, 0x59, 0xfd, 0xd7, 0x88, 0xd0, 0x2f, 0x84, 0xf6, 0xb1, 0xaa, 0xce, 0x3e, 0xa0, 0xdc, 0x1a, 0xd0, 0xe3, 0x5f, 0x3c, 0xda, 0x96, 0xee, 0xce, 0xf9, 0x75, 0xcf, 0x8d, 0xf3, 0x03, 0x28, 0xa7, 0x39, 0xbd, 0x95, 0xaa, 0x73, 0xbe, 0xa5, 0x5f, 0x84, 0x33, 0x07, 0x49, 0xbf, 0x03, 0xf8, 0x4b, 0x46, 0xbf, 0x38, 0xd4, 0x9b, 0x14, 0xa7, 0x01, 0xb7, 0x1f, 0x12, 0x08, 0x01, 0xed, 0xcd, 0x34, 0xf5, 0xb4, 0x06, 0x47, 0xe0, 0x53, 0x1c, 0x7c, 0x3f, 0xb5, 0x30, 0x59, 0xbb, 0xe3, 0xd6, 0x7c, 0x41, 0xcc, 0xd2, 0x11, 0x73, 0x03, 0x77, 0x7f, 0x5f, 0xad, 0x4a, 0x54, 0xdf, 0x17, 0x94, 0x97, 0x5c, 0x16 }; if (!TEST_ptr(rsa_priv = load_key(1))) goto err; if (!TEST_ptr(rsa_pub = load_key(0))) goto err; if (!TEST_int_ge((int)sizeof(sig), RSA_size(rsa_priv))) goto err; if (!TEST_true(RSA_sign_ASN1_OCTET_STRING(0, in, inlen, sig, &siglen, rsa_priv))) goto err; if (!TEST_true(RSA_verify_ASN1_OCTET_STRING(0, in, inlen, sig, siglen, rsa_pub))) goto err; if (!TEST_false(RSA_sign_ASN1_OCTET_STRING(0, in, inlen + 1, sig, &siglen, rsa_priv))) goto err; if (!TEST_false(RSA_sign_ASN1_OCTET_STRING(0, in, inlen, sig, &siglen, rsa_pub))) goto err; if (!TEST_false(RSA_verify_ASN1_OCTET_STRING(0, in, inlen, sig, siglen - 1, rsa_pub))) goto err; if (!TEST_false(RSA_verify_ASN1_OCTET_STRING(0, in, inlen, (unsigned char *)no_octet_sig, (unsigned int)sizeof(no_octet_sig), rsa_pub))) goto err; if (!TEST_false(RSA_verify_ASN1_OCTET_STRING(0, in, inlen, (unsigned char *)sig_mismatch, (unsigned int)sizeof(sig_mismatch), rsa_pub))) goto err; sig[0]++; if (!TEST_false(RSA_verify_ASN1_OCTET_STRING(0, in, inlen, sig, siglen, rsa_pub))) goto err; sig[0]--; ret = 1; err: RSA_free(rsa_priv); RSA_free(rsa_pub); return ret; } int setup_tests(void) { ADD_ALL_TESTS(test_rsa_pkcs1, 3); ADD_ALL_TESTS(test_rsa_oaep, 3); ADD_ALL_TESTS(test_rsa_security_bit, OSSL_NELEM(rsa_security_bits_cases)); ADD_TEST(test_rsa_saos); ADD_TEST(test_EVP_rsa_legacy_key); return 1; }
test
openssl/test/rsa_test.c
openssl
#include "helpers/cmp_testlib.h" #include <openssl/x509_vfy.h> typedef struct test_fixture { const char *test_case_name; OSSL_CMP_CTX *ctx; } OSSL_CMP_CTX_TEST_FIXTURE; static void tear_down(OSSL_CMP_CTX_TEST_FIXTURE *fixture) { if (fixture != NULL) OSSL_CMP_CTX_free(fixture->ctx); OPENSSL_free(fixture); } static OSSL_CMP_CTX_TEST_FIXTURE *set_up(const char *const test_case_name) { OSSL_CMP_CTX_TEST_FIXTURE *fixture; if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture)))) return NULL; if (!TEST_ptr(fixture->ctx = OSSL_CMP_CTX_new(NULL, NULL))) { tear_down(fixture); return NULL; } fixture->test_case_name = test_case_name; return fixture; } static STACK_OF(X509) *sk_X509_new_1(void) { STACK_OF(X509) *sk = sk_X509_new_null(); X509 *x = X509_new(); if (x == NULL || !sk_X509_push(sk, x)) { sk_X509_free(sk); X509_free(x); sk = NULL; } return sk; } static void sk_X509_pop_X509_free(STACK_OF(X509) *sk) { OSSL_STACK_OF_X509_free(sk); } static int execute_CTX_reinit_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->ctx; ASN1_OCTET_STRING *bytes = NULL; STACK_OF(X509) *certs = NULL; X509 *cert = X509_new(); int res = 0; ctx->status = 1; ctx->failInfoCode = 1; if (!ossl_cmp_ctx_set0_statusString(ctx, sk_ASN1_UTF8STRING_new_null()) || !ossl_cmp_ctx_set0_newCert(ctx, X509_new()) || !TEST_ptr(certs = sk_X509_new_1()) || !ossl_cmp_ctx_set1_newChain(ctx, certs) || !ossl_cmp_ctx_set1_caPubs(ctx, certs) || !ossl_cmp_ctx_set1_extraCertsIn(ctx, certs) || !ossl_cmp_ctx_set1_validatedSrvCert(ctx, cert) || !TEST_ptr(bytes = ASN1_OCTET_STRING_new()) || !OSSL_CMP_CTX_set1_transactionID(ctx, bytes) || !OSSL_CMP_CTX_set1_senderNonce(ctx, bytes) || !ossl_cmp_ctx_set1_recipNonce(ctx, bytes)) goto err; if (!TEST_true(OSSL_CMP_CTX_reinit(ctx))) goto err; if (!TEST_true(ctx->status == -1 && ctx->failInfoCode == -1 && ctx->statusString == NULL && ctx->newCert == NULL && ctx->newChain == NULL && ctx->caPubs == NULL && ctx->extraCertsIn == NULL && ctx->validatedSrvCert == NULL && ctx->transactionID == NULL && ctx->senderNonce == NULL && ctx->recipNonce == NULL)) goto err; res = 1; err: X509_free(cert); sk_X509_pop_X509_free(certs); ASN1_OCTET_STRING_free(bytes); return res; } static int test_CTX_libctx_propq(void) { OSSL_LIB_CTX *libctx = OSSL_LIB_CTX_new(); const char *propq = "?provider=legacy"; OSSL_CMP_CTX *cmpctx = OSSL_CMP_CTX_new(libctx, propq); int res = TEST_ptr(libctx) && TEST_ptr(cmpctx) && TEST_ptr_eq(libctx, OSSL_CMP_CTX_get0_libctx(cmpctx)) && TEST_str_eq(propq, OSSL_CMP_CTX_get0_propq(cmpctx)); OSSL_CMP_CTX_free(cmpctx); OSSL_LIB_CTX_free(libctx); return res; } static int test_CTX_reinit(void) { SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); EXECUTE_TEST(execute_CTX_reinit_test, tear_down); return result; } #if !defined(OPENSSL_NO_ERR) && !defined(OPENSSL_NO_AUTOERRINIT) static int msg_total_size = 0; static int msg_total_size_log_cb(const char *func, const char *file, int line, OSSL_CMP_severity level, const char *msg) { msg_total_size += strlen(msg); TEST_note("total=%d len=%zu msg='%s'\n", msg_total_size, strlen(msg), msg); return 1; } # define STR64 "This is a 64 bytes looooooooooooooooooooooooooooooooong string.\n" # define STR509 STR64 STR64 STR64 STR64 STR64 STR64 STR64 \ "This is a 61 bytes loooooooooooooooooooooooooooooong string.\n" static const char *const max_str_literal = STR509; # define STR_SEP "<SEP>" static int execute_CTX_print_errors_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->ctx; int base_err_msg_size, expected_size; int res = 1; if (!TEST_true(OSSL_CMP_CTX_set_log_cb(ctx, NULL))) res = 0; if (!TEST_true(ctx->log_cb == NULL)) res = 0; # ifndef OPENSSL_NO_STDIO ERR_raise(ERR_LIB_CMP, CMP_R_MULTIPLE_SAN_SOURCES); OSSL_CMP_CTX_print_errors(ctx); # endif if (!TEST_true(OSSL_CMP_CTX_set_log_cb(ctx, msg_total_size_log_cb))) res = 0; if (!TEST_true(ctx->log_cb == msg_total_size_log_cb)) { res = 0; } else { ERR_raise(ERR_LIB_CMP, CMP_R_INVALID_ARGS); base_err_msg_size = strlen("INVALID_ARGS"); ERR_raise(ERR_LIB_CMP, CMP_R_NULL_ARGUMENT); base_err_msg_size += strlen("NULL_ARGUMENT"); expected_size = base_err_msg_size; ossl_cmp_add_error_data("data1"); expected_size += strlen(":" "data1"); ossl_cmp_add_error_data("data2"); expected_size += strlen(" : " "data2"); ossl_cmp_add_error_line("new line"); expected_size += strlen("\n" "new line"); OSSL_CMP_CTX_print_errors(ctx); if (!TEST_int_eq(msg_total_size, expected_size)) res = 0; ERR_raise(ERR_LIB_CMP, CMP_R_INVALID_ARGS); base_err_msg_size = strlen("INVALID_ARGS") + strlen(":"); expected_size = base_err_msg_size; while (expected_size < 4096) { ERR_add_error_txt(STR_SEP, max_str_literal); expected_size += strlen(STR_SEP) + strlen(max_str_literal); } expected_size += base_err_msg_size - 2 * strlen(STR_SEP); msg_total_size = 0; OSSL_CMP_CTX_print_errors(ctx); if (!TEST_int_eq(msg_total_size, expected_size)) res = 0; } return res; } static int test_CTX_print_errors(void) { SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); EXECUTE_TEST(execute_CTX_print_errors_test, tear_down); return result; } #endif static int execute_CTX_reqExtensions_have_SAN_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->ctx; const int len = 16; unsigned char str[16 ]; ASN1_OCTET_STRING *data = NULL; X509_EXTENSION *ext = NULL; X509_EXTENSIONS *exts = NULL; int res = 0; if (!TEST_false(OSSL_CMP_CTX_reqExtensions_have_SAN(ctx))) return 0; if (!TEST_int_eq(1, RAND_bytes(str, len)) || !TEST_ptr(data = ASN1_OCTET_STRING_new()) || !TEST_true(ASN1_OCTET_STRING_set(data, str, len))) goto err; ext = X509_EXTENSION_create_by_NID(NULL, NID_subject_alt_name, 0, data); if (!TEST_ptr(ext) || !TEST_ptr(exts = sk_X509_EXTENSION_new_null()) || !TEST_true(sk_X509_EXTENSION_push(exts, ext)) || !TEST_true(OSSL_CMP_CTX_set0_reqExtensions(ctx, exts))) { X509_EXTENSION_free(ext); sk_X509_EXTENSION_free(exts); goto err; } if (TEST_int_eq(OSSL_CMP_CTX_reqExtensions_have_SAN(ctx), 1)) { ext = sk_X509_EXTENSION_pop(exts); res = TEST_false(OSSL_CMP_CTX_reqExtensions_have_SAN(ctx)); X509_EXTENSION_free(ext); } err: ASN1_OCTET_STRING_free(data); return res; } static int test_CTX_reqExtensions_have_SAN(void) { SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); EXECUTE_TEST(execute_CTX_reqExtensions_have_SAN_test, tear_down); return result; } static int test_log_line; static int test_log_cb_res = 0; static int test_log_cb(const char *func, const char *file, int line, OSSL_CMP_severity level, const char *msg) { test_log_cb_res = #ifndef PEDANTIC (TEST_str_eq(func, "execute_cmp_ctx_log_cb_test") || TEST_str_eq(func, "(unknown function)")) && #endif (TEST_str_eq(file, OPENSSL_FILE) || TEST_str_eq(file, "(no file)")) && (TEST_int_eq(line, test_log_line) || TEST_int_eq(line, 0)) && (TEST_int_eq(level, OSSL_CMP_LOG_INFO) || TEST_int_eq(level, -1)) && TEST_str_eq(msg, "ok"); return 1; } static int execute_cmp_ctx_log_cb_test(OSSL_CMP_CTX_TEST_FIXTURE *fixture) { int res = 1; OSSL_CMP_CTX *ctx = fixture->ctx; OSSL_TRACE(ALL, "this general trace message is not shown by default\n"); OSSL_CMP_log_open(); OSSL_CMP_log_open(); if (!TEST_true(OSSL_CMP_CTX_set_log_cb(ctx, NULL))) { res = 0; } else { ossl_cmp_err(ctx, "this should be printed as CMP error message"); ossl_cmp_warn(ctx, "this should be printed as CMP warning message"); ossl_cmp_debug(ctx, "this should not be printed"); TEST_true(OSSL_CMP_CTX_set_log_verbosity(ctx, OSSL_CMP_LOG_DEBUG)); ossl_cmp_debug(ctx, "this should be printed as CMP debug message"); TEST_true(OSSL_CMP_CTX_set_log_verbosity(ctx, OSSL_CMP_LOG_INFO)); } if (!TEST_true(OSSL_CMP_CTX_set_log_cb(ctx, test_log_cb))) { res = 0; } else { test_log_line = OPENSSL_LINE + 1; ossl_cmp_log2(INFO, ctx, "%s%c", "o", 'k'); if (!TEST_int_eq(test_log_cb_res, 1)) res = 0; OSSL_CMP_CTX_set_log_verbosity(ctx, OSSL_CMP_LOG_ERR); test_log_cb_res = -1; test_log_line = OPENSSL_LINE + 1; ossl_cmp_log2(INFO, ctx, "%s%c", "o", 'k'); if (!TEST_int_eq(test_log_cb_res, -1)) res = 0; } OSSL_CMP_log_close(); OSSL_CMP_log_close(); return res; } static int test_cmp_ctx_log_cb(void) { SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); EXECUTE_TEST(execute_cmp_ctx_log_cb_test, tear_down); return result; } #ifndef OPENSSL_NO_HTTP static BIO *test_http_cb(BIO *bio, void *arg, int use_ssl, int detail) { return NULL; } #endif static OSSL_CMP_MSG *test_transfer_cb(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *req) { return NULL; } static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, const char **txt) { return 0; } typedef OSSL_CMP_CTX CMP_CTX; #define OSSL_CMP_CTX 1 #define ossl_cmp_ctx 0 #define set 0 #define set0 0 #define set1 1 #define get 0 #define get0 0 #define get1 1 #define DEFINE_SET_GET_BASE_TEST(PREFIX, SETN, GETN, DUP, FIELD, TYPE, ERR, \ DEFAULT, NEW, FREE) \ static int \ execute_CTX_##SETN##_##GETN##_##FIELD(OSSL_CMP_CTX_TEST_FIXTURE *fixture) \ { \ CMP_CTX *ctx = fixture->ctx; \ int (*set_fn)(CMP_CTX *ctx, TYPE) = \ (int (*)(CMP_CTX *ctx, TYPE))PREFIX##_##SETN##_##FIELD; \ \ TYPE (*get_fn)(const CMP_CTX *ctx) = OSSL_CMP_CTX_##GETN##_##FIELD; \ TYPE val1_to_free = NEW; \ TYPE val1 = val1_to_free; \ TYPE val1_read = 0; \ TYPE val2_to_free = NEW; \ TYPE val2 = val2_to_free; \ TYPE val2_read = 0; \ TYPE val3_read = 0; \ int res = 1; \ \ if (!TEST_int_eq(ERR_peek_error(), 0)) \ res = 0; \ if (PREFIX == 1) { \ if ((*set_fn)(NULL, val1) || ERR_peek_error() == 0) { \ TEST_error("setter did not return error on ctx == NULL"); \ res = 0; \ } \ } \ ERR_clear_error(); \ \ if ((*get_fn)(NULL) != ERR || ERR_peek_error() == 0) { \ TEST_error("getter did not return error on ctx == NULL"); \ res = 0; \ } \ ERR_clear_error(); \ \ val1_read = (*get_fn)(ctx); \ if (!DEFAULT(val1_read)) { \ TEST_error("did not get default value"); \ res = 0; \ } \ if (!(*set_fn)(ctx, val1)) { \ TEST_error("setting first value failed"); \ res = 0; \ } \ if (SETN == 0) \ val1_to_free = 0; \ \ if (GETN == 1) \ FREE(val1_read); \ val1_read = (*get_fn)(ctx); \ if (SETN == 0) { \ if (val1_read != val1) { \ TEST_error("set/get first value did not match"); \ res = 0; \ } \ } else { \ if (DUP && val1_read == val1) { \ TEST_error("first set did not dup the value"); \ val1_read = 0; \ res = 0; \ } \ if (DEFAULT(val1_read)) { \ TEST_error("first set had no effect"); \ res = 0; \ } \ } \ \ if (!(*set_fn)(ctx, val2)) { \ TEST_error("setting second value failed"); \ res = 0; \ } \ if (SETN == 0) \ val2_to_free = 0; \ \ val2_read = (*get_fn)(ctx); \ if (DEFAULT(val2_read)) { \ TEST_error("second set reset the value"); \ res = 0; \ } \ if (SETN == 0 && GETN == 0) { \ if (val2_read != val2) { \ TEST_error("set/get second value did not match"); \ res = 0; \ } \ } else { \ if (DUP && val2_read == val2) { \ TEST_error("second set did not dup the value"); \ val2_read = 0; \ res = 0; \ } \ if (val2 == val1) { \ TEST_error("second value is same as first value"); \ res = 0; \ } \ if (GETN == 1 && val2_read == val1_read) { \ \ TEST_error("second get returned same as first get"); \ res = 0; \ } \ } \ \ val3_read = (*get_fn)(ctx); \ if (DEFAULT(val3_read)) { \ TEST_error("third set reset the value"); \ res = 0; \ } \ if (GETN == 0) { \ if (val3_read != val2_read) { \ TEST_error("third get gave different value"); \ res = 0; \ } \ } else { \ if (DUP && val3_read == val2_read) { \ TEST_error("third get did not create a new dup"); \ val3_read = 0; \ res = 0; \ } \ } \ \ \ if (!TEST_int_eq(ERR_peek_error(), 0)) \ res = 0; \ \ FREE(val1_to_free); \ FREE(val2_to_free); \ if (GETN == 1) { \ FREE(val1_read); \ FREE(val2_read); \ FREE(val3_read); \ } \ return TEST_true(res); \ } \ \ static int test_CTX_##SETN##_##GETN##_##FIELD(void) \ { \ SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); \ EXECUTE_TEST(execute_CTX_##SETN##_##GETN##_##FIELD, tear_down); \ return result; \ } static char *char_new(void) { return OPENSSL_strdup("test"); } static void char_free(char *val) { OPENSSL_free(val); } #define EMPTY_SK_X509(x) ((x) == NULL || sk_X509_num(x) == 0) static X509_STORE *X509_STORE_new_1(void) { X509_STORE *store = X509_STORE_new(); if (store != NULL) X509_VERIFY_PARAM_set_flags(X509_STORE_get0_param(store), 1); return store; } #define DEFAULT_STORE(x) \ ((x) == NULL || X509_VERIFY_PARAM_get_flags(X509_STORE_get0_param(x)) == 0) #define IS_NEG(x) ((x) < 0) #define IS_0(x) ((x) == 0) #define DROP(x) (void)(x) #define RET_IF_NULL_ARG(ctx, ret) \ if (ctx == NULL) { \ ERR_raise(ERR_LIB_CMP, CMP_R_NULL_ARGUMENT); \ return ret; \ } #define DEFINE_SET_GET_TEST(OSSL_CMP, CTX, N, M, DUP, FIELD, TYPE) \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP##_##CTX, set##N, get##M, DUP, FIELD, \ TYPE *, NULL, IS_0, TYPE##_new(), TYPE##_free) #define DEFINE_SET_GET_SK_TEST_DEFAULT(OSSL_CMP, CTX, N, M, FIELD, ELEM_TYPE, \ DEFAULT, NEW, FREE) \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP##_##CTX, set##N, get##M, 1, FIELD, \ STACK_OF(ELEM_TYPE)*, NULL, DEFAULT, NEW, FREE) #define DEFINE_SET_GET_SK_TEST(OSSL_CMP, CTX, N, M, FIELD, T) \ DEFINE_SET_GET_SK_TEST_DEFAULT(OSSL_CMP, CTX, N, M, FIELD, T, \ IS_0, sk_##T##_new_null(), sk_##T##_free) #define DEFINE_SET_GET_SK_X509_TEST(OSSL_CMP, CTX, N, M, FNAME) \ DEFINE_SET_GET_SK_TEST_DEFAULT(OSSL_CMP, CTX, N, M, FNAME, X509, \ EMPTY_SK_X509, \ sk_X509_new_1(), sk_X509_pop_X509_free) #define DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, N, M, DUP, FIELD, TYPE, \ DEFAULT) \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP##_##CTX, set##N, get##M, DUP, FIELD, \ TYPE *, NULL, DEFAULT, TYPE##_new(), TYPE##_free) #define DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, N, DUP, FIELD, TYPE, DEFAULT) \ static TYPE *OSSL_CMP_CTX_get0_##FIELD(const CMP_CTX *ctx) \ { \ RET_IF_NULL_ARG(ctx, NULL); \ return (TYPE *)ctx->FIELD; \ } \ DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, N, 0, DUP, FIELD, TYPE, DEFAULT) #define DEFINE_SET_TEST(OSSL_CMP, CTX, N, DUP, FIELD, TYPE) \ DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, N, DUP, FIELD, TYPE, IS_0) #define DEFINE_SET_SK_TEST(OSSL_CMP, CTX, N, FIELD, TYPE) \ static STACK_OF(TYPE) *OSSL_CMP_CTX_get0_##FIELD(const CMP_CTX *ctx) \ { \ RET_IF_NULL_ARG(ctx, NULL); \ return ctx->FIELD; \ } \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP##_##CTX, set##N, get0, 1, FIELD, \ STACK_OF(TYPE)*, NULL, IS_0, \ sk_##TYPE##_new_null(), sk_##TYPE##_free) #ifndef OPENSSL_NO_HTTP typedef OSSL_HTTP_bio_cb_t OSSL_CMP_http_cb_t; #endif #define DEFINE_SET_CB_TEST(FIELD) \ static OSSL_CMP_##FIELD##_t OSSL_CMP_CTX_get_##FIELD(const CMP_CTX *ctx) \ { \ RET_IF_NULL_ARG(ctx, NULL); \ return ctx->FIELD; \ } \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP_CTX, set, get, 0, FIELD, \ OSSL_CMP_##FIELD##_t, NULL, IS_0, \ test_##FIELD, DROP) #define DEFINE_SET_GET_P_VOID_TEST(FIELD) \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP_CTX, set, get, 0, FIELD, void *, \ NULL, IS_0, ((void *)1), DROP) #define DEFINE_SET_GET_INT_TEST_DEFAULT(OSSL_CMP, CTX, FIELD, DEFAULT) \ DEFINE_SET_GET_BASE_TEST(OSSL_CMP##_##CTX, set, get, 0, FIELD, int, -1, \ DEFAULT, 1, DROP) #define DEFINE_SET_GET_INT_TEST(OSSL_CMP, CTX, FIELD) \ DEFINE_SET_GET_INT_TEST_DEFAULT(OSSL_CMP, CTX, FIELD, IS_NEG) #define DEFINE_SET_INT_TEST(FIELD) \ static int OSSL_CMP_CTX_get_##FIELD(const CMP_CTX *ctx) \ { \ RET_IF_NULL_ARG(ctx, -1); \ return ctx->FIELD; \ } \ DEFINE_SET_GET_INT_TEST_DEFAULT(OSSL_CMP, CTX, FIELD, IS_0) #define DEFINE_SET_GET_ARG_FN(SETN, GETN, FIELD, ARG, T) \ static int OSSL_CMP_CTX_##SETN##_##FIELD##_##ARG(CMP_CTX *ctx, T val) \ { \ return OSSL_CMP_CTX_##SETN##_##FIELD(ctx, ARG, val); \ } \ \ static T OSSL_CMP_CTX_##GETN##_##FIELD##_##ARG(const CMP_CTX *ctx) \ { \ return OSSL_CMP_CTX_##GETN##_##FIELD(ctx, ARG); \ } #define DEFINE_SET_GET1_STR_FN(SETN, FIELD) \ static int OSSL_CMP_CTX_##SETN##_##FIELD##_str(CMP_CTX *ctx, char *val)\ { \ return OSSL_CMP_CTX_##SETN##_##FIELD(ctx, (unsigned char *)val, \ strlen(val)); \ } \ \ static char *OSSL_CMP_CTX_get1_##FIELD##_str(const CMP_CTX *ctx) \ { \ const ASN1_OCTET_STRING *bytes = NULL; \ \ RET_IF_NULL_ARG(ctx, NULL); \ bytes = ctx->FIELD; \ return bytes == NULL ? NULL : \ OPENSSL_strndup((char *)bytes->data, bytes->length); \ } #define push 0 #define push0 0 #define push1 1 #define DEFINE_PUSH_BASE_TEST(PUSHN, DUP, FIELD, ELEM, TYPE, T, \ DEFAULT, NEW, FREE) \ static TYPE sk_top_##FIELD(const CMP_CTX *ctx) \ { \ return sk_##T##_value(ctx->FIELD, sk_##T##_num(ctx->FIELD) - 1); \ } \ \ static int execute_CTX_##PUSHN##_##ELEM(OSSL_CMP_CTX_TEST_FIXTURE *fixture) \ { \ CMP_CTX *ctx = fixture->ctx; \ int (*push_fn)(CMP_CTX *ctx, TYPE) = \ (int (*)(CMP_CTX *ctx, TYPE))OSSL_CMP_CTX_##PUSHN##_##ELEM; \ \ int n_elem = sk_##T##_num(ctx->FIELD); \ STACK_OF(TYPE) field_read; \ TYPE val1_to_free = NEW; \ TYPE val1 = val1_to_free; \ TYPE val1_read = 0; \ TYPE val2_to_free = NEW; \ TYPE val2 = val2_to_free; \ TYPE val2_read = 0; \ int res = 1; \ \ if (!TEST_int_eq(ERR_peek_error(), 0)) \ res = 0; \ if ((*push_fn)(NULL, val1) || ERR_peek_error() == 0) { \ TEST_error("pusher did not return error on ctx == NULL"); \ res = 0; \ } \ ERR_clear_error(); \ \ if (n_elem < 0) \ n_elem = 0; \ field_read = ctx->FIELD; \ if (!DEFAULT(field_read)) { \ TEST_error("did not get default value for stack field"); \ res = 0; \ } \ if (!(*push_fn)(ctx, val1)) { \ TEST_error("pushing first value failed"); \ res = 0; \ } \ if (PUSHN == 0) \ val1_to_free = 0; \ \ if (sk_##T##_num(ctx->FIELD) != ++n_elem) { \ TEST_error("pushing first value did not increment number"); \ res = 0; \ } \ val1_read = sk_top_##FIELD(ctx); \ if (PUSHN == 0) { \ if (val1_read != val1) { \ TEST_error("push/sk_top first value did not match"); \ res = 0; \ } \ } else { \ if (DUP && val1_read == val1) { \ TEST_error("first push did not dup the value"); \ res = 0; \ } \ } \ \ if (!(*push_fn)(ctx, val2)) { \ TEST_error("pushing second value failed"); \ res = 0; \ } \ if (PUSHN == 0) \ val2_to_free = 0; \ \ if (sk_##T##_num(ctx->FIELD) != ++n_elem) { \ TEST_error("pushing second value did not increment number"); \ res = 0; \ } \ val2_read = sk_top_##FIELD(ctx); \ if (PUSHN == 0) { \ if (val2_read != val2) { \ TEST_error("push/sk_top second value did not match"); \ res = 0; \ } \ } else { \ if (DUP && val2_read == val2) { \ TEST_error("second push did not dup the value"); \ res = 0; \ } \ if (val2 == val1) { \ TEST_error("second value is same as first value"); \ res = 0; \ } \ } \ \ \ if (!TEST_int_eq(ERR_peek_error(), 0)) \ res = 0; \ \ FREE(val1_to_free); \ FREE(val2_to_free); \ return TEST_true(res); \ } \ \ static int test_CTX_##PUSHN##_##ELEM(void) \ { \ SETUP_TEST_FIXTURE(OSSL_CMP_CTX_TEST_FIXTURE, set_up); \ EXECUTE_TEST(execute_CTX_##PUSHN##_##ELEM, tear_down); \ return result; \ } \ #define DEFINE_PUSH_TEST(N, DUP, FIELD, ELEM, TYPE) \ DEFINE_PUSH_BASE_TEST(push##N, DUP, FIELD, ELEM, TYPE *, TYPE, \ IS_0, TYPE##_new(), TYPE##_free) void cleanup_tests(void) { return; } DEFINE_SET_GET_ARG_FN(set, get, option, 35, int) DEFINE_SET_GET_BASE_TEST(OSSL_CMP_CTX, set, get, 0, option_35, int, -1, IS_0, \ 1 , DROP) DEFINE_SET_CB_TEST(log_cb) DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, serverPath, char, IS_0) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, server, char) DEFINE_SET_INT_TEST(serverPort) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, proxy, char) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, no_proxy, char) #ifndef OPENSSL_NO_HTTP DEFINE_SET_CB_TEST(http_cb) DEFINE_SET_GET_P_VOID_TEST(http_cb_arg) #endif DEFINE_SET_CB_TEST(transfer_cb) DEFINE_SET_GET_P_VOID_TEST(transfer_cb_arg) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, srvCert, X509) DEFINE_SET_GET_TEST(ossl_cmp, ctx, 1, 0, 0, validatedSrvCert, X509) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, expected_sender, X509_NAME) DEFINE_SET_GET_BASE_TEST(OSSL_CMP_CTX, set0, get0, 0, trusted, X509_STORE *, NULL, DEFAULT_STORE, X509_STORE_new_1(), X509_STORE_free) DEFINE_SET_GET_SK_X509_TEST(OSSL_CMP, CTX, 1, 0, untrusted) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, cert, X509) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, pkey, EVP_PKEY) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, recipient, X509_NAME) DEFINE_PUSH_TEST(0, 0, geninfo_ITAVs, geninfo_ITAV, OSSL_CMP_ITAV) DEFINE_SET_SK_TEST(OSSL_CMP, CTX, 1, extraCertsOut, X509) DEFINE_SET_GET_ARG_FN(set0, get0, newPkey, 1, EVP_PKEY *) DEFINE_SET_GET_TEST(OSSL_CMP, CTX, 0, 0, 0, newPkey_1, EVP_PKEY) DEFINE_SET_GET_ARG_FN(set0, get0, newPkey, 0, EVP_PKEY *) DEFINE_SET_GET_TEST(OSSL_CMP, CTX, 0, 0, 0, newPkey_0, EVP_PKEY) DEFINE_SET_GET1_STR_FN(set1, referenceValue) DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, referenceValue_str, char, IS_0) DEFINE_SET_GET1_STR_FN(set1, secretValue) DEFINE_SET_GET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, 1, secretValue_str, char, IS_0) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, issuer, X509_NAME) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, subjectName, X509_NAME) #ifdef ISSUE_9504_RESOLVED DEFINE_PUSH_TEST(1, 1, subjectAltNames, subjectAltName, GENERAL_NAME) #endif DEFINE_SET_SK_TEST(OSSL_CMP, CTX, 0, reqExtensions, X509_EXTENSION) DEFINE_PUSH_TEST(0, 0, policies, policy, POLICYINFO) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 0, oldCert, X509) #ifdef ISSUE_9504_RESOLVED DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, p10CSR, X509_REQ) #endif DEFINE_PUSH_TEST(0, 0, genm_ITAVs, genm_ITAV, OSSL_CMP_ITAV) DEFINE_SET_CB_TEST(certConf_cb) DEFINE_SET_GET_P_VOID_TEST(certConf_cb_arg) DEFINE_SET_GET_INT_TEST(ossl_cmp, ctx, status) DEFINE_SET_GET_SK_TEST(ossl_cmp, ctx, 0, 0, statusString, ASN1_UTF8STRING) DEFINE_SET_GET_INT_TEST(ossl_cmp, ctx, failInfoCode) DEFINE_SET_GET_TEST(ossl_cmp, ctx, 0, 0, 0, newCert, X509) DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, newChain) DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, caPubs) DEFINE_SET_GET_SK_X509_TEST(ossl_cmp, ctx, 1, 1, extraCertsIn) DEFINE_SET_TEST_DEFAULT(OSSL_CMP, CTX, 1, 1, transactionID, ASN1_OCTET_STRING, IS_0) DEFINE_SET_TEST(OSSL_CMP, CTX, 1, 1, senderNonce, ASN1_OCTET_STRING) DEFINE_SET_TEST(ossl_cmp, ctx, 1, 1, recipNonce, ASN1_OCTET_STRING) int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } ADD_TEST(test_CTX_libctx_propq); ADD_TEST(test_CTX_reinit); ADD_TEST(test_CTX_set_get_option_35); ADD_TEST(test_CTX_set_get_log_cb); ADD_TEST(test_cmp_ctx_log_cb); #if !defined(OPENSSL_NO_ERR) && !defined(OPENSSL_NO_AUTOERRINIT) ADD_TEST(test_CTX_print_errors); #endif ADD_TEST(test_CTX_set1_get0_serverPath); ADD_TEST(test_CTX_set1_get0_server); ADD_TEST(test_CTX_set_get_serverPort); ADD_TEST(test_CTX_set1_get0_proxy); ADD_TEST(test_CTX_set1_get0_no_proxy); #ifndef OPENSSL_NO_HTTP ADD_TEST(test_CTX_set_get_http_cb); ADD_TEST(test_CTX_set_get_http_cb_arg); #endif ADD_TEST(test_CTX_set_get_transfer_cb); ADD_TEST(test_CTX_set_get_transfer_cb_arg); ADD_TEST(test_CTX_set1_get0_srvCert); ADD_TEST(test_CTX_set1_get0_validatedSrvCert); ADD_TEST(test_CTX_set1_get0_expected_sender); ADD_TEST(test_CTX_set0_get0_trusted); ADD_TEST(test_CTX_set1_get0_untrusted); ADD_TEST(test_CTX_set1_get0_cert); ADD_TEST(test_CTX_set1_get0_pkey); ADD_TEST(test_CTX_set1_get1_referenceValue_str); ADD_TEST(test_CTX_set1_get1_secretValue_str); ADD_TEST(test_CTX_set1_get0_recipient); ADD_TEST(test_CTX_push0_geninfo_ITAV); ADD_TEST(test_CTX_set1_get0_extraCertsOut); ADD_TEST(test_CTX_set0_get0_newPkey_1); ADD_TEST(test_CTX_set0_get0_newPkey_0); ADD_TEST(test_CTX_set1_get0_issuer); ADD_TEST(test_CTX_set1_get0_subjectName); #ifdef ISSUE_9504_RESOLVED ADD_TEST(test_CTX_push1_subjectAltName); #endif ADD_TEST(test_CTX_set0_get0_reqExtensions); ADD_TEST(test_CTX_reqExtensions_have_SAN); ADD_TEST(test_CTX_push0_policy); ADD_TEST(test_CTX_set1_get0_oldCert); #ifdef ISSUE_9504_RESOLVED ADD_TEST(test_CTX_set1_get0_p10CSR); #endif ADD_TEST(test_CTX_push0_genm_ITAV); ADD_TEST(test_CTX_set_get_certConf_cb); ADD_TEST(test_CTX_set_get_certConf_cb_arg); ADD_TEST(test_CTX_set_get_status); ADD_TEST(test_CTX_set0_get0_statusString); ADD_TEST(test_CTX_set_get_failInfoCode); ADD_TEST(test_CTX_set0_get0_newCert); ADD_TEST(test_CTX_set1_get1_newChain); ADD_TEST(test_CTX_set1_get1_caPubs); ADD_TEST(test_CTX_set1_get1_extraCertsIn); ADD_TEST(test_CTX_set1_get0_transactionID); ADD_TEST(test_CTX_set1_get0_senderNonce); ADD_TEST(test_CTX_set1_get0_recipNonce); return 1; }
test
openssl/test/cmp_ctx_test.c
openssl
#include "internal/packet.h" #include "internal/quic_wire.h" #include "internal/quic_wire_pkt.h" #include "testutil.h" struct encode_test_case { int (*serializer)(WPACKET *pkt); const unsigned char *expect_buf; size_t expect_buf_len; int (*deserializer)(PACKET *pkt, ossl_ssize_t fail); }; static int encode_case_1_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_padding(pkt, 3), 1)) return 0; return 1; } static int encode_case_1_dec(PACKET *pkt, ossl_ssize_t fail) { if (fail >= 0) return 1; if (!TEST_int_eq(ossl_quic_wire_decode_padding(pkt), 3)) return 0; return 1; } static const unsigned char encode_case_1_expect[] = { 0, 0, 0 }; static int encode_case_2_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_ping(pkt), 1)) return 0; return 1; } static int encode_case_2_dec(PACKET *pkt, ossl_ssize_t fail) { if (!TEST_int_eq(ossl_quic_wire_decode_frame_ping(pkt), fail < 0)) return 0; return 1; } static const unsigned char encode_case_2_expect[] = { 0x01 }; static const OSSL_QUIC_ACK_RANGE encode_case_3_ranges[] = { { 20, 30 }, { 0, 10 } }; static const OSSL_QUIC_FRAME_ACK encode_case_3_f = { (OSSL_QUIC_ACK_RANGE *)encode_case_3_ranges, OSSL_NELEM(encode_case_3_ranges), { OSSL_TIME_MS }, 60, 70, 80, 1 }; static int encode_case_3_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_ack(pkt, 3, &encode_case_3_f), 1)) return 0; return 1; } static int encode_case_3_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_ACK_RANGE ranges[4] = {0}; OSSL_QUIC_FRAME_ACK f = {0}; uint64_t total_ranges = 0, peek_total_ranges = 0; int ret; f.ack_ranges = ranges; f.num_ack_ranges = OSSL_NELEM(ranges); ret = ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &peek_total_ranges); if (fail < 0 && !TEST_int_eq(ret, 1)) return 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges), fail < 0)) return 0; if (ret == 1 && !TEST_uint64_t_eq(peek_total_ranges, 2)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges)) return 0; if (!TEST_uint64_t_le(f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE), SIZE_MAX) || !TEST_uint64_t_le(encode_case_3_f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE), SIZE_MAX)) return 0; if (!TEST_mem_eq(f.ack_ranges, (size_t)f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE), encode_case_3_f.ack_ranges, (size_t)encode_case_3_f.num_ack_ranges * sizeof(OSSL_QUIC_ACK_RANGE))) return 0; if (!TEST_uint64_t_eq(ossl_time2ticks(f.delay_time), ossl_time2ticks(encode_case_3_f.delay_time))) return 0; if (!TEST_true(f.ecn_present)) return 0; if (!TEST_uint64_t_eq(f.ect0, encode_case_3_f.ect0)) return 0; if (!TEST_uint64_t_eq(f.ect1, encode_case_3_f.ect1)) return 0; if (!TEST_uint64_t_eq(f.ecnce, encode_case_3_f.ecnce)) return 0; return 1; } static const unsigned char encode_case_3_expect[] = { 0x03, 0x1E, 0x40, 0x7d, 1, 10, 8, 10, 0x3c, 0x40, 0x46, 0x40, 0x50, }; static const OSSL_QUIC_FRAME_RESET_STREAM encode_case_4_f = { 0x1234, 0x9781, 0x11717 }; static int encode_case_4_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_reset_stream(pkt, &encode_case_4_f), 1)) return 0; return 1; } static int encode_case_4_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_RESET_STREAM f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_reset_stream(pkt, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_mem_eq(&f, sizeof(f), &encode_case_4_f, sizeof(encode_case_4_f))) return 0; return 1; } static const unsigned char encode_case_4_expect[] = { 0x04, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81, 0x80, 0x01, 0x17, 0x17, }; static const OSSL_QUIC_FRAME_STOP_SENDING encode_case_5_f = { 0x1234, 0x9781 }; static int encode_case_5_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_stop_sending(pkt, &encode_case_5_f), 1)) return 0; return 1; } static int encode_case_5_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_STOP_SENDING f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_stop_sending(pkt, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_mem_eq(&f, sizeof(f), &encode_case_5_f, sizeof(encode_case_5_f))) return 0; return 1; } static const unsigned char encode_case_5_expect[] = { 0x05, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81 }; static const unsigned char encode_case_6_data[] = { 93, 18, 17, 102, 33 }; static const OSSL_QUIC_FRAME_CRYPTO encode_case_6_f = { 0x1234, sizeof(encode_case_6_data), encode_case_6_data }; static int encode_case_6_enc(WPACKET *pkt) { if (!TEST_ptr(ossl_quic_wire_encode_frame_crypto(pkt, &encode_case_6_f))) return 0; return 1; } static int encode_case_6_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_CRYPTO f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_crypto(pkt, 0, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(f.offset, 0x1234)) return 0; if (!TEST_uint64_t_le(f.len, SIZE_MAX)) return 0; if (!TEST_mem_eq(f.data, (size_t)f.len, encode_case_6_data, sizeof(encode_case_6_data))) return 0; return 1; } static const unsigned char encode_case_6_expect[] = { 0x06, 0x52, 0x34, 0x05, 93, 18, 17, 102, 33 }; static const unsigned char encode_case_7_token[] = { 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a }; static int encode_case_7_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_token(pkt, encode_case_7_token, sizeof(encode_case_7_token)), 1)) return 0; return 1; } static int encode_case_7_dec(PACKET *pkt, ossl_ssize_t fail) { const unsigned char *token = NULL; size_t token_len = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_mem_eq(token, token_len, encode_case_7_token, sizeof(encode_case_7_token))) return 0; return 1; } static const unsigned char encode_case_7_expect[] = { 0x07, 0x10, 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a }; static const unsigned char encode_case_8_data[] = { 0xde, 0x06, 0xcb, 0x76, 0x5d }; static const OSSL_QUIC_FRAME_STREAM encode_case_8_f = { 0x1234, 0, 5, encode_case_8_data, 0, 0 }; static int encode_case_8_enc(WPACKET *pkt) { if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt, &encode_case_8_f))) return 0; return 1; } static int encode_case_8_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_STREAM f = {0}; if (fail >= 3) return 1; if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_le(f.len, SIZE_MAX)) return 0; if (!TEST_mem_eq(f.data, (size_t)f.len, encode_case_8_data, sizeof(encode_case_8_data))) return 0; if (!TEST_uint64_t_eq(f.stream_id, 0x1234)) return 0; if (!TEST_uint64_t_eq(f.offset, 0)) return 0; if (!TEST_int_eq(f.has_explicit_len, 0)) return 0; if (!TEST_int_eq(f.is_fin, 0)) return 0; return 1; } static const unsigned char encode_case_8_expect[] = { 0x08, 0x52, 0x34, 0xde, 0x06, 0xcb, 0x76, 0x5d }; static const unsigned char encode_case_9_data[] = { 0xde, 0x06, 0xcb, 0x76, 0x5d }; static const OSSL_QUIC_FRAME_STREAM encode_case_9_f = { 0x1234, 0x39, 5, encode_case_9_data, 1, 1 }; static int encode_case_9_enc(WPACKET *pkt) { if (!TEST_ptr(ossl_quic_wire_encode_frame_stream(pkt, &encode_case_9_f))) return 0; return 1; } static int encode_case_9_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_STREAM f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream(pkt, 0, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_le(f.len, SIZE_MAX)) return 0; if (!TEST_mem_eq(f.data, (size_t)f.len, encode_case_9_data, sizeof(encode_case_9_data))) return 0; if (!TEST_uint64_t_eq(f.stream_id, 0x1234)) return 0; if (!TEST_uint64_t_eq(f.offset, 0x39)) return 0; if (!TEST_int_eq(f.has_explicit_len, 1)) return 0; if (!TEST_int_eq(f.is_fin, 1)) return 0; return 1; } static const unsigned char encode_case_9_expect[] = { 0x0f, 0x52, 0x34, 0x39, 0x05, 0xde, 0x06, 0xcb, 0x76, 0x5d }; static int encode_case_10_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_data(pkt, 0x1234), 1)) return 0; return 1; } static int encode_case_10_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t max_data = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_data(pkt, &max_data), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(max_data, 0x1234)) return 0; return 1; } static const unsigned char encode_case_10_expect[] = { 0x10, 0x52, 0x34, }; static int encode_case_11_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_stream_data(pkt, 0x1234, 0x9781), 1)) return 0; return 1; } static int encode_case_11_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t stream_id = 0, max_data = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_stream_data(pkt, &stream_id, &max_data), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(stream_id, 0x1234)) return 0; if (!TEST_uint64_t_eq(max_data, 0x9781)) return 0; return 1; } static const unsigned char encode_case_11_expect[] = { 0x11, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81, }; static int encode_case_12_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 0, 0x1234), 1)) return 0; if (!TEST_int_eq(ossl_quic_wire_encode_frame_max_streams(pkt, 1, 0x9781), 1)) return 0; return 1; } static int encode_case_12_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t max_streams_1 = 0, max_streams_2 = 0, frame_type_1 = 0, frame_type_2 = 0; int is_minimal = 1, success_if; success_if = (fail < 0 || fail >= 1); if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1, &is_minimal), success_if)) return 0; if (!TEST_true(!success_if || is_minimal)) return 0; success_if = (fail < 0 || fail >= 3); if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams_1), success_if)) return 0; success_if = (fail < 0 || fail >= 4); if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2, &is_minimal), success_if)) return 0; if (!TEST_true(!success_if || is_minimal)) return 0; success_if = (fail < 0); if (!TEST_int_eq(ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams_2), success_if)) return 0; if ((fail < 0 || fail >= 3) && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI)) return 0; if ((fail < 0 || fail >= 3) && !TEST_uint64_t_eq(max_streams_1, 0x1234)) return 0; if ((fail < 0 || fail >= 8) && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI)) return 0; if ((fail < 0 || fail >= 8) && !TEST_uint64_t_eq(max_streams_2, 0x9781)) return 0; return 1; } static const unsigned char encode_case_12_expect[] = { 0x12, 0x52, 0x34, 0x13, 0x80, 0x00, 0x97, 0x81, }; static int encode_case_13_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_data_blocked(pkt, 0x1234), 1)) return 0; return 1; } static int encode_case_13_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t max_data = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_data_blocked(pkt, &max_data), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(max_data, 0x1234)) return 0; return 1; } static const unsigned char encode_case_13_expect[] = { 0x14, 0x52, 0x34, }; static int encode_case_14_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_stream_data_blocked(pkt, 0x1234, 0x9781), 1)) return 0; return 1; } static int encode_case_14_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t stream_id = 0, max_data = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_stream_data_blocked(pkt, &stream_id, &max_data), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(stream_id, 0x1234)) return 0; if (!TEST_uint64_t_eq(max_data, 0x9781)) return 0; return 1; } static const unsigned char encode_case_14_expect[] = { 0x15, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81, }; static int encode_case_15_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 0, 0x1234), 1)) return 0; if (!TEST_int_eq(ossl_quic_wire_encode_frame_streams_blocked(pkt, 1, 0x9781), 1)) return 0; return 1; } static int encode_case_15_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t max_streams_1 = 0, max_streams_2 = 0, frame_type_1 = 0, frame_type_2 = 0; int is_minimal = 1, success_if; success_if = (fail < 0 || fail >= 1); if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_1, &is_minimal), success_if)) return 0; if (!TEST_true(!success_if || is_minimal)) return 0; success_if = (fail < 0 || fail >= 3); if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_streams_1), success_if)) return 0; success_if = (fail < 0 || fail >= 4); if (!TEST_int_eq(ossl_quic_wire_peek_frame_header(pkt, &frame_type_2, &is_minimal), success_if)) return 0; if (!TEST_true(!success_if || is_minimal)) return 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_streams_2), fail < 0 || fail >= 8)) return 0; if ((fail < 0 || fail >= 1) && !TEST_uint64_t_eq(frame_type_1, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI)) return 0; if ((fail < 0 || fail >= 3) && !TEST_uint64_t_eq(max_streams_1, 0x1234)) return 0; if ((fail < 0 || fail >= 4) && !TEST_uint64_t_eq(frame_type_2, OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI)) return 0; if ((fail < 0 || fail >= 8) && !TEST_uint64_t_eq(max_streams_2, 0x9781)) return 0; return 1; } static const unsigned char encode_case_15_expect[] = { 0x16, 0x52, 0x34, 0x17, 0x80, 0x00, 0x97, 0x81, }; static const unsigned char encode_case_16_conn_id[] = { 0x33, 0x44, 0x55, 0x66 }; static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16_f = { 0x9781, 0x1234, { 0x4, {0x33, 0x44, 0x55, 0x66} }, { { 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a } } }; static int encode_case_16_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt, &encode_case_16_f), 1)) return 0; return 1; } static int encode_case_16_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_NEW_CONN_ID f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(f.seq_num, 0x9781)) return 0; if (!TEST_uint64_t_eq(f.retire_prior_to, 0x1234)) return 0; if (!TEST_uint64_t_eq(f.conn_id.id_len, sizeof(encode_case_16_conn_id))) return 0; if (!TEST_mem_eq(f.conn_id.id, f.conn_id.id_len, encode_case_16_conn_id, sizeof(encode_case_16_conn_id))) return 0; if (!TEST_mem_eq(f.stateless_reset.token, sizeof(f.stateless_reset.token), encode_case_16_f.stateless_reset.token, sizeof(encode_case_16_f.stateless_reset.token))) return 0; return 1; } static const unsigned char encode_case_16_expect[] = { 0x18, 0x80, 0x00, 0x97, 0x81, 0x52, 0x34, 0x04, 0x33, 0x44, 0x55, 0x66, 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a }; static const OSSL_QUIC_FRAME_NEW_CONN_ID encode_case_16b_f = { 0x1234, 0x9781, { 0x4, {0x33, 0x44, 0x55, 0x66} }, { { 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a } } }; static int encode_case_16b_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_new_conn_id(pkt, &encode_case_16b_f), 1)) return 0; return 1; } static int encode_case_16b_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_NEW_CONN_ID f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_new_conn_id(pkt, &f), 0)) return 0; if (!TEST_true(PACKET_forward(pkt, PACKET_remaining(pkt)))) return 0; return 1; } static const unsigned char encode_case_16b_expect[] = { 0x18, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81, 0x04, 0x33, 0x44, 0x55, 0x66, 0xde, 0x06, 0xcb, 0x76, 0x5d, 0xb1, 0xa7, 0x71, 0x78, 0x09, 0xbb, 0xe8, 0x50, 0x19, 0x12, 0x9a }; static int encode_case_17_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_retire_conn_id(pkt, 0x1234), 1)) return 0; return 1; } static int encode_case_17_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t seq_num = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(seq_num, 0x1234)) return 0; return 1; } static const unsigned char encode_case_17_expect[] = { 0x19, 0x52, 0x34, }; static const uint64_t encode_case_18_data = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL; static int encode_case_18_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_challenge(pkt, encode_case_18_data), 1)) return 0; return 1; } static int encode_case_18_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t challenge = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_challenge(pkt, &challenge), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(challenge, encode_case_18_data)) return 0; return 1; } static const unsigned char encode_case_18_expect[] = { 0x1A, 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, }; static const uint64_t encode_case_19_data = (((uint64_t)0x5f4b12)<<40) | (uint64_t)0x731834UL; static int encode_case_19_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_path_response(pkt, encode_case_19_data), 1)) return 0; return 1; } static int encode_case_19_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t challenge = 0; if (!TEST_int_eq(ossl_quic_wire_decode_frame_path_response(pkt, &challenge), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_uint64_t_eq(challenge, encode_case_19_data)) return 0; return 1; } static const unsigned char encode_case_19_expect[] = { 0x1B, 0x5f, 0x4b, 0x12, 0x00, 0x00, 0x73, 0x18, 0x34, }; static const char encode_case_20_reason[] = { 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65 }; static const OSSL_QUIC_FRAME_CONN_CLOSE encode_case_20_f = { 0, 0x1234, 0x9781, (char *)encode_case_20_reason, sizeof(encode_case_20_reason) }; static int encode_case_20_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_conn_close(pkt, &encode_case_20_f), 1)) return 0; return 1; } static int encode_case_20_dec(PACKET *pkt, ossl_ssize_t fail) { OSSL_QUIC_FRAME_CONN_CLOSE f = {0}; if (!TEST_int_eq(ossl_quic_wire_decode_frame_conn_close(pkt, &f), fail < 0)) return 0; if (fail >= 0) return 1; if (!TEST_int_eq(f.is_app, 0)) return 0; if (!TEST_uint64_t_eq(f.error_code, 0x1234)) return 0; if (!TEST_uint64_t_eq(f.frame_type, 0x9781)) return 0; if (!TEST_size_t_eq(f.reason_len, 18)) return 0; if (!TEST_mem_eq(f.reason, f.reason_len, encode_case_20_f.reason, encode_case_20_f.reason_len)) return 0; return 1; } static const unsigned char encode_case_20_expect[] = { 0x1C, 0x52, 0x34, 0x80, 0x00, 0x97, 0x81, 0x12, 0x72, 0x65, 0x61, 0x73, 0x6f, 0x6e, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x63, 0x6c, 0x6f, 0x73, 0x75, 0x72, 0x65 }; static int encode_case_21_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_frame_handshake_done(pkt), 1)) return 0; return 1; } static int encode_case_21_dec(PACKET *pkt, ossl_ssize_t fail) { if (!TEST_int_eq(ossl_quic_wire_decode_frame_handshake_done(pkt), fail < 0)) return 0; return 1; } static const unsigned char encode_case_21_expect[] = { 0x1E }; static const unsigned char encode_case_22_data[] = {0x55,0x77,0x32,0x46,0x99}; static int encode_case_22_enc(WPACKET *pkt) { unsigned char *p; if (!TEST_ptr(ossl_quic_wire_encode_transport_param_bytes(pkt, 0x1234, encode_case_22_data, sizeof(encode_case_22_data)))) return 0; if (!TEST_ptr(p = ossl_quic_wire_encode_transport_param_bytes(pkt, 0x9781, NULL, 2))) return 0; p[0] = 0x33; p[1] = 0x44; return 1; } static int encode_case_22_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t id = 0; size_t len = 0; const unsigned char *p; static const unsigned char data[] = {0x33, 0x44}; if (!TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id), fail < 0 || fail >= 2)) return 0; if ((fail < 0 || fail >= 2) && !TEST_uint64_t_eq(id, 0x1234)) return 0; id = 0; p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len); if (fail < 0 || fail >= 8) { if (!TEST_ptr(p)) return 0; } else { if (!TEST_ptr_null(p)) return 0; } if ((fail < 0 || fail >= 8) && !TEST_uint64_t_eq(id, 0x1234)) return 0; if ((fail < 0 || fail >= 8) && !TEST_mem_eq(p, len, encode_case_22_data, sizeof(encode_case_22_data))) return 0; if ((fail < 0 || fail >= 8) && !TEST_int_eq(ossl_quic_wire_peek_transport_param(pkt, &id), fail < 0 || fail >= 12)) return 0; if ((fail < 0 || fail >= 12) && !TEST_uint64_t_eq(id, 0x9781)) return 0; id = 0; p = ossl_quic_wire_decode_transport_param_bytes(pkt, &id, &len); if (fail < 0 || fail >= 15) { if (!TEST_ptr(p)) return 0; } else { if (!TEST_ptr_null(p)) return 0; } if ((fail < 0 || fail >= 15) && !TEST_uint64_t_eq(id, 0x9781)) return 0; if ((fail < 0 || fail >= 15) && !TEST_mem_eq(p, len, data, sizeof(data))) return 0; return 1; } static const unsigned char encode_case_22_expect[] = { 0x52, 0x34, 0x05, 0x55, 0x77, 0x32, 0x46, 0x99, 0x80, 0x00, 0x97, 0x81, 0x02, 0x33, 0x44 }; static int encode_case_23_enc(WPACKET *pkt) { if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x1234, 0x9781), 1)) return 0; if (!TEST_int_eq(ossl_quic_wire_encode_transport_param_int(pkt, 0x2233, 0x4545), 1)) return 0; return 1; } static int encode_case_23_dec(PACKET *pkt, ossl_ssize_t fail) { uint64_t id = 0, value = 0; if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt, &id, &value), fail < 0 || fail >= 7)) return 0; if ((fail < 0 || fail >= 7) && !TEST_uint64_t_eq(id, 0x1234)) return 0; if ((fail < 0 || fail >= 7) && !TEST_uint64_t_eq(value, 0x9781)) return 0; if (!TEST_int_eq(ossl_quic_wire_decode_transport_param_int(pkt, &id, &value), fail < 0 || fail >= 14)) return 0; if ((fail < 0 || fail >= 14) && !TEST_uint64_t_eq(id, 0x2233)) return 0; if ((fail < 0 || fail >= 14) && !TEST_uint64_t_eq(value, 0x4545)) return 0; return 1; } static const unsigned char encode_case_23_expect[] = { 0x52, 0x34, 0x04, 0x80, 0x00, 0x97, 0x81, 0x62, 0x33, 0x04, 0x80, 0x00, 0x45, 0x45, }; #define ENCODE_CASE(n) \ { \ encode_case_##n##_enc, \ encode_case_##n##_expect, \ OSSL_NELEM(encode_case_##n##_expect), \ encode_case_##n##_dec \ }, static const struct encode_test_case encode_cases[] = { ENCODE_CASE(1) ENCODE_CASE(2) ENCODE_CASE(3) ENCODE_CASE(4) ENCODE_CASE(5) ENCODE_CASE(6) ENCODE_CASE(7) ENCODE_CASE(8) ENCODE_CASE(9) ENCODE_CASE(10) ENCODE_CASE(11) ENCODE_CASE(12) ENCODE_CASE(13) ENCODE_CASE(14) ENCODE_CASE(15) ENCODE_CASE(16) ENCODE_CASE(16b) ENCODE_CASE(17) ENCODE_CASE(18) ENCODE_CASE(19) ENCODE_CASE(20) ENCODE_CASE(21) ENCODE_CASE(22) ENCODE_CASE(23) }; static int test_wire_encode(int idx) { int testresult = 0; WPACKET wpkt; PACKET pkt; BUF_MEM *buf = NULL; size_t written; const struct encode_test_case *c = &encode_cases[idx]; int have_wpkt = 0; size_t i; if (!TEST_ptr(buf = BUF_MEM_new())) goto err; if (!TEST_int_eq(WPACKET_init(&wpkt, buf), 1)) goto err; have_wpkt = 1; if (!TEST_int_eq(c->serializer(&wpkt), 1)) goto err; if (!TEST_int_eq(WPACKET_get_total_written(&wpkt, &written), 1)) goto err; if (!TEST_mem_eq(buf->data, written, c->expect_buf, c->expect_buf_len)) goto err; if (!TEST_int_eq(PACKET_buf_init(&pkt, (unsigned char *)buf->data, written), 1)) goto err; if (!TEST_int_eq(c->deserializer(&pkt, -1), 1)) goto err; if (!TEST_false(PACKET_remaining(&pkt))) goto err; for (i = 0; i < c->expect_buf_len; ++i) { PACKET pkt2; if (!TEST_int_eq(PACKET_buf_init(&pkt2, (unsigned char *)c->expect_buf, i), 1)) goto err; if (!TEST_int_eq(c->deserializer(&pkt2, i), 1)) goto err; } testresult = 1; err: if (have_wpkt) WPACKET_finish(&wpkt); BUF_MEM_free(buf); return testresult; } struct ack_test_case { const unsigned char *input_buf; size_t input_buf_len; int (*deserializer)(PACKET *pkt); int expect_fail; }; static const unsigned char ack_case_1_input[] = { 0x02, 0x08, 0x01, 0x00, 0x09, }; static const unsigned char ack_case_2_input[] = { 0x02, 0x08, 0x01, 0x00, 0x08, }; static const unsigned char ack_case_3_input[] = { 0x02, 0x08, 0x01, 0x01, 0x01, 0x05, 0x01, }; static const unsigned char ack_case_4_input[] = { 0x02, 0x08, 0x01, 0x01, 0x01, 0x04, 0x01, }; static const unsigned char ack_case_5_input[] = { 0x02, 0x08, 0x01, 0x01, 0x01, 0x04, 0x02, }; static const unsigned char ack_case_6_input[] = { 0x02, 0x08, 0x01, 0x02, 0x01, 0x01, 0x02, 0x00, 0x01, }; static const unsigned char ack_case_7_input[] = { 0x02, 0x08, 0x01, 0x02, 0x01, 0x01, 0x02, 0x00, 0x00, }; static int ack_generic_decode(PACKET *pkt) { OSSL_QUIC_ACK_RANGE ranges[8] = {0}; OSSL_QUIC_FRAME_ACK f = {0}; uint64_t total_ranges = 0, peek_total_ranges = 0; int r; size_t i; f.ack_ranges = ranges; f.num_ack_ranges = OSSL_NELEM(ranges); if (!TEST_int_eq(ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &peek_total_ranges), 1)) return 0; r = ossl_quic_wire_decode_frame_ack(pkt, 3, &f, &total_ranges); if (r == 0) return 0; if (!TEST_uint64_t_eq(total_ranges, peek_total_ranges)) return 0; for (i = 0; i < f.num_ack_ranges; ++i) { if (!TEST_uint64_t_le(f.ack_ranges[i].start, f.ack_ranges[i].end)) return 0; if (!TEST_uint64_t_lt(f.ack_ranges[i].end, 1000)) return 0; } return 1; } #define ACK_CASE(n, expect_fail, dec) \ { \ ack_case_##n##_input, \ sizeof(ack_case_##n##_input), \ (dec), \ (expect_fail) \ }, static const struct ack_test_case ack_cases[] = { ACK_CASE(1, 1, ack_generic_decode) ACK_CASE(2, 0, ack_generic_decode) ACK_CASE(3, 1, ack_generic_decode) ACK_CASE(4, 0, ack_generic_decode) ACK_CASE(5, 1, ack_generic_decode) ACK_CASE(6, 1, ack_generic_decode) ACK_CASE(7, 0, ack_generic_decode) }; static int test_wire_ack(int idx) { int testresult = 0, r; PACKET pkt; const struct ack_test_case *c = &ack_cases[idx]; if (!TEST_int_eq(PACKET_buf_init(&pkt, (unsigned char *)c->input_buf, c->input_buf_len), 1)) goto err; r = c->deserializer(&pkt); if (c->expect_fail) { if (!TEST_int_eq(r, 0)) goto err; } else { if (!TEST_int_eq(r, 1)) goto err; if (!TEST_false(PACKET_remaining(&pkt))) goto err; } testresult = 1; err: return testresult; } struct pn_test { QUIC_PN pn, tx_largest_acked, rx_largest_pn; char expected_len; unsigned char expected_bytes[4]; }; static const struct pn_test pn_tests[] = { { 0xac5c02, 0xabe8b3, 0xabe8b3, 2, {0x5c,0x02} }, { 0xace8fe, 0xabe8b3, 0xabe8b3, 3, {0xac,0xe8,0xfe} }, { 0xa82f9b32, 0xa82f30ea, 0xa82f30ea, 2, {0x9b,0x32} }, { 1, 0, 0, 1, {0x01} }, { 256, 255, 255, 1, {0x00} }, { 257, 255, 255, 1, {0x01} }, { 256, 128, 128, 1, {0x00} }, { 256, 127, 127, 2, {0x01,0x00} }, { 65536, 32768, 32768, 2, {0x00,0x00} }, { 65537, 32769, 32769, 2, {0x00,0x01} }, { 65536, 32767, 32767, 3, {0x01,0x00,0x00} }, { 65537, 32768, 32768, 3, {0x01,0x00,0x01} }, { 16777216, 8388608, 8388608, 3, {0x00,0x00,0x00} }, { 16777217, 8388609, 8388609, 3, {0x00,0x00,0x01} }, { 16777216, 8388607, 8388607, 4, {0x01,0x00,0x00,0x00} }, { 16777217, 8388608, 8388608, 4, {0x01,0x00,0x00,0x01} }, { 4294967296, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x00} }, { 4294967297, 2147483648, 2147483648, 4, {0x00,0x00,0x00,0x01} }, }; static int test_wire_pkt_hdr_pn(int tidx) { int testresult = 0; const struct pn_test *t = &pn_tests[tidx]; unsigned char buf[4]; int pn_len; QUIC_PN res_pn; pn_len = ossl_quic_wire_determine_pn_len(t->pn, t->tx_largest_acked); if (!TEST_int_eq(pn_len, (int)t->expected_len)) goto err; if (!TEST_true(ossl_quic_wire_encode_pkt_hdr_pn(t->pn, buf, pn_len))) goto err; if (!TEST_mem_eq(t->expected_bytes, t->expected_len, buf, pn_len)) goto err; if (!TEST_true(ossl_quic_wire_decode_pkt_hdr_pn(buf, pn_len, t->rx_largest_pn, &res_pn))) goto err; if (!TEST_uint64_t_eq(res_pn, t->pn)) goto err; testresult = 1; err: return testresult; } static const QUIC_CONN_ID retry_orig_dcid = { 8, { 0x83, 0x94, 0xc8, 0xf0, 0x3e, 0x51, 0x57, 0x08 } }; static const unsigned char retry_encoded[] = { 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x08, 0xf0, 0x67, 0xa5, 0x50, 0x2a, 0x42, 0x62, 0xb5, 0x74, 0x6f, 0x6b, 0x65, 0x6e, 0x04, 0xa2, 0x65, 0xba, 0x2e, 0xff, 0x4d, 0x82, 0x90, 0x58, 0xfb, 0x3f, 0x0f, 0x24, 0x96, 0xba }; static int test_wire_retry_integrity_tag(void) { int testresult = 0; PACKET pkt = {0}; QUIC_PKT_HDR hdr = {0}; unsigned char got_tag[QUIC_RETRY_INTEGRITY_TAG_LEN] = {0}; if (!TEST_true(PACKET_buf_init(&pkt, retry_encoded, sizeof(retry_encoded)))) goto err; if (!TEST_true(ossl_quic_wire_decode_pkt_hdr(&pkt, 0, 0, 0, &hdr, NULL))) goto err; if (!TEST_int_eq(hdr.type, QUIC_PKT_TYPE_RETRY)) goto err; if (!TEST_true(ossl_quic_calculate_retry_integrity_tag(NULL, NULL, &hdr, &retry_orig_dcid, got_tag))) goto err; if (!TEST_mem_eq(got_tag, sizeof(got_tag), retry_encoded + sizeof(retry_encoded) - QUIC_RETRY_INTEGRITY_TAG_LEN, QUIC_RETRY_INTEGRITY_TAG_LEN)) goto err; if (!TEST_true(ossl_quic_validate_retry_integrity_tag(NULL, NULL, &hdr, &retry_orig_dcid))) goto err; testresult = 1; err: return testresult; } static const unsigned char non_minimal_1[] = { 0x40, 0x00, }; static const unsigned char non_minimal_2[] = { 0x40, 0x3F, }; static const unsigned char non_minimal_3[] = { 0x80, 0x00, 0x00, 0x00, }; static const unsigned char non_minimal_4[] = { 0x80, 0x00, 0x3F, 0xFF, }; static const unsigned char non_minimal_5[] = { 0xC0, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static const unsigned char non_minimal_6[] = { 0xC0, 0x00, 0x00, 0x00, 0x3F, 0xFF, 0xFF, 0xFF }; static const unsigned char *const non_minimal[] = { non_minimal_1, non_minimal_2, non_minimal_3, non_minimal_4, non_minimal_5, non_minimal_6, }; static const size_t non_minimal_len[] = { OSSL_NELEM(non_minimal_1), OSSL_NELEM(non_minimal_2), OSSL_NELEM(non_minimal_3), OSSL_NELEM(non_minimal_4), OSSL_NELEM(non_minimal_5), OSSL_NELEM(non_minimal_6), }; static int test_wire_minimal(int idx) { int testresult = 0; int is_minimal; uint64_t frame_type; PACKET pkt; if (!TEST_true(PACKET_buf_init(&pkt, non_minimal[idx], non_minimal_len[idx]))) goto err; if (!TEST_true(ossl_quic_wire_peek_frame_header(&pkt, &frame_type, &is_minimal))) goto err; if (!TEST_false(is_minimal)) goto err; testresult = 1; err: return testresult; } int setup_tests(void) { ADD_ALL_TESTS(test_wire_encode, OSSL_NELEM(encode_cases)); ADD_ALL_TESTS(test_wire_ack, OSSL_NELEM(ack_cases)); ADD_ALL_TESTS(test_wire_pkt_hdr_pn, OSSL_NELEM(pn_tests)); ADD_TEST(test_wire_retry_integrity_tag); ADD_ALL_TESTS(test_wire_minimal, OSSL_NELEM(non_minimal_len)); return 1; }
test
openssl/test/quic_wire_test.c
openssl
#include <stdio.h> #include <openssl/ec.h> #include <openssl/evp.h> #include <openssl/err.h> int main(int argc, char *argv[]) { EVP_PKEY_CTX *pctx = NULL; pctx = EVP_PKEY_CTX_new_from_name(NULL, "NO_SUCH_ALGORITHM", NULL); EVP_PKEY_CTX_free(pctx); return 0; }
test
openssl/test/evp_pkey_ctx_new_from_name.c
openssl
#include <stdio.h> #include <string.h> #include <openssl/asn1.h> #include "testutil.h" static int test_string_tbl(void) { const ASN1_STRING_TABLE *tmp = NULL; int nid = 12345678, nid2 = 87654321, rv = 0, ret = 0; tmp = ASN1_STRING_TABLE_get(nid); if (!TEST_ptr_null(tmp)) { TEST_info("asn1 string table: ASN1_STRING_TABLE_get non-exist nid"); goto out; } ret = ASN1_STRING_TABLE_add(nid, -1, -1, MBSTRING_ASC, 0); if (!TEST_true(ret)) { TEST_info("asn1 string table: add NID(%d) failed", nid); goto out; } ret = ASN1_STRING_TABLE_add(nid2, -1, -1, MBSTRING_ASC, 0); if (!TEST_true(ret)) { TEST_info("asn1 string table: add NID(%d) failed", nid2); goto out; } tmp = ASN1_STRING_TABLE_get(nid); if (!TEST_ptr(tmp)) { TEST_info("asn1 string table: get NID(%d) failed", nid); goto out; } tmp = ASN1_STRING_TABLE_get(nid2); if (!TEST_ptr(tmp)) { TEST_info("asn1 string table: get NID(%d) failed", nid2); goto out; } ASN1_STRING_TABLE_cleanup(); tmp = ASN1_STRING_TABLE_get(nid); if (!TEST_ptr_null(tmp)) { TEST_info("asn1 string table: get NID(%d) failed", nid); goto out; } tmp = ASN1_STRING_TABLE_get(nid2); if (!TEST_ptr_null(tmp)) { TEST_info("asn1 string table: get NID(%d) failed", nid2); goto out; } rv = 1; out: return rv; } int setup_tests(void) { ADD_TEST(test_string_tbl); return 1; }
test
openssl/test/asn1_string_table_test.c
openssl
#include <string.h> #include <openssl/core_dispatch.h> #include <openssl/evp.h> #include <openssl/pem.h> #include <openssl/rsa.h> #include <openssl/x509.h> #include <openssl/core_names.h> #include <openssl/params.h> #include <openssl/param_build.h> #include <openssl/encoder.h> #include <openssl/decoder.h> #include "internal/cryptlib.h" #include "crypto/pem.h" #include "crypto/evp.h" #include "helpers/predefined_dhparams.h" #include "testutil.h" #ifdef STATIC_LEGACY OSSL_provider_init_fn ossl_legacy_provider_init; #endif #define TEST_FL_ptr(a) test_ptr(file, line, #a, a) #define TEST_FL_mem_eq(a, m, b, n) test_mem_eq(file, line, #a, #b, a, m, b, n) #define TEST_FL_strn_eq(a, b, n) test_strn_eq(file, line, #a, #b, a, n, b, n) #define TEST_FL_strn2_eq(a, m, b, n) test_strn_eq(file, line, #a, #b, a, m, b, n) #define TEST_FL_int_eq(a, b) test_int_eq(file, line, #a, #b, a, b) #define TEST_FL_int_ge(a, b) test_int_ge(file, line, #a, #b, a, b) #define TEST_FL_int_gt(a, b) test_int_gt(file, line, #a, #b, a, b) #define TEST_FL_long_gt(a, b) test_long_gt(file, line, #a, #b, a, b) #define TEST_FL_true(a) test_true(file, line, #a, (a) != 0) #if defined(OPENSSL_NO_DH) && defined(OPENSSL_NO_DSA) && defined(OPENSSL_NO_EC) # define OPENSSL_NO_KEYPARAMS #endif static int default_libctx = 1; static int is_fips = 0; static int is_fips_3_0_0 = 0; static OSSL_LIB_CTX *testctx = NULL; static OSSL_LIB_CTX *keyctx = NULL; static char *testpropq = NULL; static OSSL_PROVIDER *nullprov = NULL; static OSSL_PROVIDER *deflprov = NULL; static OSSL_PROVIDER *keyprov = NULL; #ifndef OPENSSL_NO_EC static BN_CTX *bnctx = NULL; static OSSL_PARAM_BLD *bld_prime_nc = NULL; static OSSL_PARAM_BLD *bld_prime = NULL; static OSSL_PARAM *ec_explicit_prime_params_nc = NULL; static OSSL_PARAM *ec_explicit_prime_params_explicit = NULL; # ifndef OPENSSL_NO_EC2M static OSSL_PARAM_BLD *bld_tri_nc = NULL; static OSSL_PARAM_BLD *bld_tri = NULL; static OSSL_PARAM *ec_explicit_tri_params_nc = NULL; static OSSL_PARAM *ec_explicit_tri_params_explicit = NULL; # endif #endif #ifndef OPENSSL_NO_KEYPARAMS static EVP_PKEY *make_template(const char *type, OSSL_PARAM *genparams) { EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *ctx = NULL; # ifndef OPENSSL_NO_DH if (strcmp(type, "DH") == 0) return get_dh512(keyctx); if (strcmp(type, "X9.42 DH") == 0) return get_dhx512(keyctx); # endif (void)((ctx = EVP_PKEY_CTX_new_from_name(keyctx, type, testpropq)) != NULL && EVP_PKEY_paramgen_init(ctx) > 0 && (genparams == NULL || EVP_PKEY_CTX_set_params(ctx, genparams) > 0) && EVP_PKEY_generate(ctx, &pkey) > 0); EVP_PKEY_CTX_free(ctx); return pkey; } #endif #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC) static EVP_PKEY *make_key(const char *type, EVP_PKEY *template, OSSL_PARAM *genparams) { EVP_PKEY *pkey = NULL; EVP_PKEY_CTX *ctx = template != NULL ? EVP_PKEY_CTX_new_from_pkey(keyctx, template, testpropq) : EVP_PKEY_CTX_new_from_name(keyctx, type, testpropq); (void)(ctx != NULL && EVP_PKEY_keygen_init(ctx) > 0 && (genparams == NULL || EVP_PKEY_CTX_set_params(ctx, genparams) > 0) && EVP_PKEY_keygen(ctx, &pkey) > 0); EVP_PKEY_CTX_free(ctx); return pkey; } #endif typedef int (encoder)(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher); typedef int (decoder)(const char *file, const int line, void **object, void *encoded, long encoded_len, const char *input_type, const char *structure_type, const char *keytype, int selection, const char *pass); typedef int (tester)(const char *file, const int line, const void *data1, size_t data1_len, const void *data2, size_t data2_len); typedef int (checker)(const char *file, const int line, const char *type, const void *data, size_t data_len); typedef void (dumper)(const char *label, const void *data, size_t data_len); #define FLAG_DECODE_WITH_TYPE 0x0001 #define FLAG_FAIL_IF_FIPS 0x0002 static int test_encode_decode(const char *file, const int line, const char *type, EVP_PKEY *pkey, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher, encoder *encode_cb, decoder *decode_cb, tester *test_cb, checker *check_cb, dumper *dump_cb, int flags) { void *encoded = NULL; long encoded_len = 0; EVP_PKEY *pkey2 = NULL; EVP_PKEY *pkey3 = NULL; void *encoded2 = NULL; long encoded2_len = 0; int ok = 0; if (!TEST_true(encode_cb(file, line, &encoded, &encoded_len, pkey, selection, output_type, output_structure, pass, pcipher))) goto end; if ((flags & FLAG_FAIL_IF_FIPS) != 0 && is_fips && !is_fips_3_0_0) { if (TEST_false(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, output_type, output_structure, (flags & FLAG_DECODE_WITH_TYPE ? type : NULL), selection, pass))) ok = 1; goto end; } if (!TEST_true(check_cb(file, line, type, encoded, encoded_len)) || !TEST_true(decode_cb(file, line, (void **)&pkey2, encoded, encoded_len, output_type, output_structure, (flags & FLAG_DECODE_WITH_TYPE ? type : NULL), selection, pass)) || ((output_structure == NULL || strcmp(output_structure, "type-specific") != 0) && !TEST_true(decode_cb(file, line, (void **)&pkey3, encoded, encoded_len, output_type, output_structure, (flags & FLAG_DECODE_WITH_TYPE ? type : NULL), 0, pass))) || !TEST_true(encode_cb(file, line, &encoded2, &encoded2_len, pkey2, selection, output_type, output_structure, pass, pcipher))) goto end; if (selection == OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) { if (!TEST_int_eq(EVP_PKEY_parameters_eq(pkey, pkey2), 1) || (pkey3 != NULL && !TEST_int_eq(EVP_PKEY_parameters_eq(pkey, pkey3), 1))) goto end; } else { if (!TEST_int_eq(EVP_PKEY_eq(pkey, pkey2), 1) || (pkey3 != NULL && !TEST_int_eq(EVP_PKEY_eq(pkey, pkey3), 1))) goto end; } if ((pass == NULL && pcipher == NULL) && !test_cb(file, line, encoded, encoded_len, encoded2, encoded2_len)) goto end; ok = 1; end: if (!ok) { if (encoded != NULL && encoded_len != 0) dump_cb("|pkey| encoded", encoded, encoded_len); if (encoded2 != NULL && encoded2_len != 0) dump_cb("|pkey2| encoded", encoded2, encoded2_len); } OPENSSL_free(encoded); OPENSSL_free(encoded2); EVP_PKEY_free(pkey2); EVP_PKEY_free(pkey3); return ok; } static int encode_EVP_PKEY_prov(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher) { EVP_PKEY *pkey = object; OSSL_ENCODER_CTX *ectx = NULL; BIO *mem_ser = NULL; BUF_MEM *mem_buf = NULL; const unsigned char *upass = (const unsigned char *)pass; int ok = 0; if (!TEST_FL_ptr(ectx = OSSL_ENCODER_CTX_new_for_pkey(pkey, selection, output_type, output_structure, testpropq)) || !TEST_FL_int_gt(OSSL_ENCODER_CTX_get_num_encoders(ectx), 0) || (pass != NULL && !TEST_FL_true(OSSL_ENCODER_CTX_set_passphrase(ectx, upass, strlen(pass)))) || (pcipher != NULL && !TEST_FL_true(OSSL_ENCODER_CTX_set_cipher(ectx, pcipher, NULL))) || !TEST_FL_ptr(mem_ser = BIO_new(BIO_s_mem())) || !TEST_FL_true(OSSL_ENCODER_to_bio(ectx, mem_ser)) || !TEST_FL_true(BIO_get_mem_ptr(mem_ser, &mem_buf) > 0) || !TEST_FL_ptr(*encoded = mem_buf->data) || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) goto end; mem_buf->data = NULL; mem_buf->length = 0; ok = 1; end: BIO_free(mem_ser); OSSL_ENCODER_CTX_free(ectx); return ok; } static int decode_EVP_PKEY_prov(const char *file, const int line, void **object, void *encoded, long encoded_len, const char *input_type, const char *structure_type, const char *keytype, int selection, const char *pass) { EVP_PKEY *pkey = NULL, *testpkey = NULL; OSSL_DECODER_CTX *dctx = NULL; BIO *encoded_bio = NULL; const unsigned char *upass = (const unsigned char *)pass; int ok = 0; int i; const char *badtype; if (strcmp(input_type, "DER") == 0) badtype = "PEM"; else badtype = "DER"; if (!TEST_FL_ptr(encoded_bio = BIO_new_mem_buf(encoded, encoded_len))) goto end; for (i = 0; i < 3; i++) { const char *testtype = (i == 0) ? input_type : ((i == 1) ? NULL : badtype); if (!TEST_FL_ptr(dctx = OSSL_DECODER_CTX_new_for_pkey(&testpkey, testtype, structure_type, keytype, selection, testctx, testpropq)) || (pass != NULL && !OSSL_DECODER_CTX_set_passphrase(dctx, upass, strlen(pass))) || !TEST_FL_int_gt(BIO_reset(encoded_bio), 0) || !TEST_FL_int_eq(OSSL_DECODER_from_bio(dctx, encoded_bio), (i == 2) ? 0 : 1)) goto end; OSSL_DECODER_CTX_free(dctx); dctx = NULL; if (i == 0) { pkey = testpkey; testpkey = NULL; } else if (i == 1) { if (selection == OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS) { if (!TEST_FL_int_eq(EVP_PKEY_parameters_eq(pkey, testpkey), 1)) goto end; } else { if (!TEST_FL_int_eq(EVP_PKEY_eq(pkey, testpkey), 1)) goto end; } } } ok = 1; *object = pkey; pkey = NULL; end: EVP_PKEY_free(pkey); EVP_PKEY_free(testpkey); BIO_free(encoded_bio); OSSL_DECODER_CTX_free(dctx); return ok; } static int encode_EVP_PKEY_legacy_PEM(const char *file, const int line, void **encoded, long *encoded_len, void *object, ossl_unused int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, const char *pcipher) { EVP_PKEY *pkey = object; EVP_CIPHER *cipher = NULL; BIO *mem_ser = NULL; BUF_MEM *mem_buf = NULL; const unsigned char *upass = (const unsigned char *)pass; size_t passlen = 0; int ok = 0; if (pcipher != NULL && pass != NULL) { passlen = strlen(pass); if (!TEST_FL_ptr(cipher = EVP_CIPHER_fetch(testctx, pcipher, testpropq))) goto end; } if (!TEST_FL_ptr(mem_ser = BIO_new(BIO_s_mem())) || !TEST_FL_true(PEM_write_bio_PrivateKey_traditional(mem_ser, pkey, cipher, upass, passlen, NULL, NULL)) || !TEST_FL_true(BIO_get_mem_ptr(mem_ser, &mem_buf) > 0) || !TEST_FL_ptr(*encoded = mem_buf->data) || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) goto end; mem_buf->data = NULL; mem_buf->length = 0; ok = 1; end: BIO_free(mem_ser); EVP_CIPHER_free(cipher); return ok; } static int encode_EVP_PKEY_MSBLOB(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, ossl_unused const char *pass, ossl_unused const char *pcipher) { EVP_PKEY *pkey = object; BIO *mem_ser = NULL; BUF_MEM *mem_buf = NULL; int ok = 0; if (!TEST_FL_ptr(mem_ser = BIO_new(BIO_s_mem()))) goto end; if ((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0) { if (!TEST_FL_int_ge(i2b_PrivateKey_bio(mem_ser, pkey), 0)) goto end; } else { if (!TEST_FL_int_ge(i2b_PublicKey_bio(mem_ser, pkey), 0)) goto end; } if (!TEST_FL_true(BIO_get_mem_ptr(mem_ser, &mem_buf) > 0) || !TEST_FL_ptr(*encoded = mem_buf->data) || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) goto end; mem_buf->data = NULL; mem_buf->length = 0; ok = 1; end: BIO_free(mem_ser); return ok; } static pem_password_cb pass_pw; static int pass_pw(char *buf, int size, int rwflag, void *userdata) { OPENSSL_strlcpy(buf, userdata, size); return strlen(userdata); } static int encode_EVP_PKEY_PVK(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, ossl_unused const char *pcipher) { EVP_PKEY *pkey = object; BIO *mem_ser = NULL; BUF_MEM *mem_buf = NULL; int enc = (pass != NULL); int ok = 0; if (!TEST_FL_true(ossl_assert((selection & OSSL_KEYMGMT_SELECT_PRIVATE_KEY) != 0)) || !TEST_FL_ptr(mem_ser = BIO_new(BIO_s_mem())) || !TEST_FL_int_ge(i2b_PVK_bio_ex(mem_ser, pkey, enc, pass_pw, (void *)pass, testctx, testpropq), 0) || !TEST_FL_true(BIO_get_mem_ptr(mem_ser, &mem_buf) > 0) || !TEST_FL_ptr(*encoded = mem_buf->data) || !TEST_FL_long_gt(*encoded_len = mem_buf->length, 0)) goto end; mem_buf->data = NULL; mem_buf->length = 0; ok = 1; end: BIO_free(mem_ser); return ok; } static int test_text(const char *file, const int line, const void *data1, size_t data1_len, const void *data2, size_t data2_len) { return TEST_FL_strn2_eq(data1, data1_len, data2, data2_len); } static int test_mem(const char *file, const int line, const void *data1, size_t data1_len, const void *data2, size_t data2_len) { return TEST_FL_mem_eq(data1, data1_len, data2, data2_len); } static void collect_name(const char *name, void *arg) { char **namelist = arg; char *new_namelist; size_t space; space = strlen(name); if (*namelist != NULL) space += strlen(*namelist) + 2 ; space++; new_namelist = OPENSSL_realloc(*namelist, space); if (new_namelist == NULL) return; if (*namelist != NULL) { strcat(new_namelist, ", "); strcat(new_namelist, name); } else { strcpy(new_namelist, name); } *namelist = new_namelist; } static void dump_der(const char *label, const void *data, size_t data_len) { test_output_memory(label, data, data_len); } static void dump_pem(const char *label, const void *data, size_t data_len) { test_output_string(label, data, data_len - 1); } static int check_unprotected_PKCS8_DER(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; PKCS8_PRIV_KEY_INFO *p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &datap, data_len); int ok = 0; if (TEST_FL_ptr(p8inf)) { EVP_PKEY *pkey = EVP_PKCS82PKEY_ex(p8inf, testctx, testpropq); char *namelist = NULL; if (TEST_FL_ptr(pkey)) { if (!(ok = TEST_FL_true(EVP_PKEY_is_a(pkey, type)))) { EVP_PKEY_type_names_do_all(pkey, collect_name, &namelist); if (namelist != NULL) TEST_note("%s isn't any of %s", type, namelist); OPENSSL_free(namelist); } ok = ok && TEST_FL_true(evp_pkey_is_provided(pkey)); EVP_PKEY_free(pkey); } } PKCS8_PRIV_KEY_INFO_free(p8inf); return ok; } static int test_unprotected_via_DER(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS, "DER", "PrivateKeyInfo", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_mem, check_unprotected_PKCS8_DER, dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); } static int check_unprotected_PKCS8_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static const char expected_pem_header[] = "-----BEGIN " PEM_STRING_PKCS8INF "-----"; return TEST_FL_strn_eq(data, expected_pem_header, sizeof(expected_pem_header) - 1); } static int test_unprotected_via_PEM(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS, "PEM", "PrivateKeyInfo", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_text, check_unprotected_PKCS8_PEM, dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); } #ifndef OPENSSL_NO_KEYPARAMS static int check_params_DER(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; int ok = 0; int itype = NID_undef; EVP_PKEY *pkey = NULL; if (strcmp(type, "DH") == 0) itype = EVP_PKEY_DH; else if (strcmp(type, "X9.42 DH") == 0) itype = EVP_PKEY_DHX; else if (strcmp(type, "DSA") == 0) itype = EVP_PKEY_DSA; else if (strcmp(type, "EC") == 0) itype = EVP_PKEY_EC; if (itype != NID_undef) { pkey = d2i_KeyParams(itype, NULL, &datap, data_len); ok = (pkey != NULL); EVP_PKEY_free(pkey); } return ok; } static int check_params_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static char expected_pem_header[80]; return TEST_FL_int_gt(BIO_snprintf(expected_pem_header, sizeof(expected_pem_header), "-----BEGIN %s PARAMETERS-----", type), 0) && TEST_FL_strn_eq(data, expected_pem_header, strlen(expected_pem_header)); } static int test_params_via_DER(const char *type, EVP_PKEY *key) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "DER", "type-specific", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_mem, check_params_DER, dump_der, FLAG_DECODE_WITH_TYPE); } static int test_params_via_PEM(const char *type, EVP_PKEY *key) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PEM", "type-specific", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_text, check_params_PEM, dump_pem, 0); } #endif static int check_unprotected_legacy_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static char expected_pem_header[80]; return TEST_FL_int_gt(BIO_snprintf(expected_pem_header, sizeof(expected_pem_header), "-----BEGIN %s PRIVATE KEY-----", type), 0) && TEST_FL_strn_eq(data, expected_pem_header, strlen(expected_pem_header)); } static int test_unprotected_via_legacy_PEM(const char *type, EVP_PKEY *key) { if (!default_libctx || is_fips) return TEST_skip("Test not available if using a non-default library context or FIPS provider"); return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PEM", "type-specific", NULL, NULL, encode_EVP_PKEY_legacy_PEM, decode_EVP_PKEY_prov, test_text, check_unprotected_legacy_PEM, dump_pem, 0); } static int check_MSBLOB(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; EVP_PKEY *pkey = b2i_PrivateKey(&datap, data_len); int ok = TEST_FL_ptr(pkey); EVP_PKEY_free(pkey); return ok; } static int test_unprotected_via_MSBLOB(const char *type, EVP_PKEY *key) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "MSBLOB", NULL, NULL, NULL, encode_EVP_PKEY_MSBLOB, decode_EVP_PKEY_prov, test_mem, check_MSBLOB, dump_der, 0); } static int check_PVK(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *in = data; unsigned int saltlen = 0, keylen = 0; int ok = ossl_do_PVK_header(&in, data_len, 0, &saltlen, &keylen); return ok; } static int test_unprotected_via_PVK(const char *type, EVP_PKEY *key) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PVK", NULL, NULL, NULL, encode_EVP_PKEY_PVK, decode_EVP_PKEY_prov, test_mem, check_PVK, dump_der, 0); } static const char *pass_cipher = "AES-256-CBC"; static const char *pass = "the holy handgrenade of antioch"; static int check_protected_PKCS8_DER(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; X509_SIG *p8 = d2i_X509_SIG(NULL, &datap, data_len); int ok = TEST_FL_ptr(p8); X509_SIG_free(p8); return ok; } static int test_protected_via_DER(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "DER", "EncryptedPrivateKeyInfo", pass, pass_cipher, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_mem, check_protected_PKCS8_DER, dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); } static int check_protected_PKCS8_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static const char expected_pem_header[] = "-----BEGIN " PEM_STRING_PKCS8 "-----"; return TEST_FL_strn_eq(data, expected_pem_header, sizeof(expected_pem_header) - 1); } static int test_protected_via_PEM(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PEM", "EncryptedPrivateKeyInfo", pass, pass_cipher, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_text, check_protected_PKCS8_PEM, dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); } static int check_protected_legacy_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static char expected_pem_header[80]; return TEST_FL_int_gt(BIO_snprintf(expected_pem_header, sizeof(expected_pem_header), "-----BEGIN %s PRIVATE KEY-----", type), 0) && TEST_FL_strn_eq(data, expected_pem_header, strlen(expected_pem_header)) && TEST_FL_ptr(strstr(data, "\nDEK-Info: ")); } static int test_protected_via_legacy_PEM(const char *type, EVP_PKEY *key) { if (!default_libctx || is_fips) return TEST_skip("Test not available if using a non-default library context or FIPS provider"); return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PEM", "type-specific", pass, pass_cipher, encode_EVP_PKEY_legacy_PEM, decode_EVP_PKEY_prov, test_text, check_protected_legacy_PEM, dump_pem, 0); } #ifndef OPENSSL_NO_RC4 static int test_protected_via_PVK(const char *type, EVP_PKEY *key) { int ret = 0; OSSL_PROVIDER *lgcyprov = OSSL_PROVIDER_load(testctx, "legacy"); if (lgcyprov == NULL) return TEST_skip("Legacy provider not available"); ret = test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_KEYPAIR | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "PVK", NULL, pass, NULL, encode_EVP_PKEY_PVK, decode_EVP_PKEY_prov, test_mem, check_PVK, dump_der, 0); OSSL_PROVIDER_unload(lgcyprov); return ret; } #endif static int check_public_DER(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; EVP_PKEY *pkey = d2i_PUBKEY_ex(NULL, &datap, data_len, testctx, testpropq); int ok = (TEST_FL_ptr(pkey) && TEST_FL_true(EVP_PKEY_is_a(pkey, type))); EVP_PKEY_free(pkey); return ok; } static int test_public_via_DER(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_PUBLIC_KEY | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS, "DER", "SubjectPublicKeyInfo", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_mem, check_public_DER, dump_der, fips ? 0 : FLAG_FAIL_IF_FIPS); } static int check_public_PEM(const char *file, const int line, const char *type, const void *data, size_t data_len) { static const char expected_pem_header[] = "-----BEGIN " PEM_STRING_PUBLIC "-----"; return TEST_FL_strn_eq(data, expected_pem_header, sizeof(expected_pem_header) - 1); } static int test_public_via_PEM(const char *type, EVP_PKEY *key, int fips) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_PUBLIC_KEY | OSSL_KEYMGMT_SELECT_ALL_PARAMETERS, "PEM", "SubjectPublicKeyInfo", NULL, NULL, encode_EVP_PKEY_prov, decode_EVP_PKEY_prov, test_text, check_public_PEM, dump_pem, fips ? 0 : FLAG_FAIL_IF_FIPS); } static int check_public_MSBLOB(const char *file, const int line, const char *type, const void *data, size_t data_len) { const unsigned char *datap = data; EVP_PKEY *pkey = b2i_PublicKey(&datap, data_len); int ok = TEST_FL_ptr(pkey); EVP_PKEY_free(pkey); return ok; } static int test_public_via_MSBLOB(const char *type, EVP_PKEY *key) { return test_encode_decode(__FILE__, __LINE__, type, key, OSSL_KEYMGMT_SELECT_PUBLIC_KEY | OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS, "MSBLOB", NULL, NULL, NULL, encode_EVP_PKEY_MSBLOB, decode_EVP_PKEY_prov, test_mem, check_public_MSBLOB, dump_der, 0); } #define KEYS(KEYTYPE) \ static EVP_PKEY *key_##KEYTYPE = NULL #define MAKE_KEYS(KEYTYPE, KEYTYPEstr, params) \ ok = ok \ && TEST_ptr(key_##KEYTYPE = make_key(KEYTYPEstr, NULL, params)) #define FREE_KEYS(KEYTYPE) \ EVP_PKEY_free(key_##KEYTYPE); \ #define DOMAIN_KEYS(KEYTYPE) \ static EVP_PKEY *template_##KEYTYPE = NULL; \ static EVP_PKEY *key_##KEYTYPE = NULL #define MAKE_DOMAIN_KEYS(KEYTYPE, KEYTYPEstr, params) \ ok = ok \ && TEST_ptr(template_##KEYTYPE = \ make_template(KEYTYPEstr, params)) \ && TEST_ptr(key_##KEYTYPE = \ make_key(KEYTYPEstr, template_##KEYTYPE, NULL)) #define FREE_DOMAIN_KEYS(KEYTYPE) \ EVP_PKEY_free(template_##KEYTYPE); \ EVP_PKEY_free(key_##KEYTYPE) #define IMPLEMENT_TEST_SUITE(KEYTYPE, KEYTYPEstr, fips) \ static int test_unprotected_##KEYTYPE##_via_DER(void) \ { \ return test_unprotected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ } \ static int test_unprotected_##KEYTYPE##_via_PEM(void) \ { \ return test_unprotected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ } \ static int test_protected_##KEYTYPE##_via_DER(void) \ { \ return test_protected_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ } \ static int test_protected_##KEYTYPE##_via_PEM(void) \ { \ return test_protected_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ } \ static int test_public_##KEYTYPE##_via_DER(void) \ { \ return test_public_via_DER(KEYTYPEstr, key_##KEYTYPE, fips); \ } \ static int test_public_##KEYTYPE##_via_PEM(void) \ { \ return test_public_via_PEM(KEYTYPEstr, key_##KEYTYPE, fips); \ } #define ADD_TEST_SUITE(KEYTYPE) \ ADD_TEST(test_unprotected_##KEYTYPE##_via_DER); \ ADD_TEST(test_unprotected_##KEYTYPE##_via_PEM); \ ADD_TEST(test_protected_##KEYTYPE##_via_DER); \ ADD_TEST(test_protected_##KEYTYPE##_via_PEM); \ ADD_TEST(test_public_##KEYTYPE##_via_DER); \ ADD_TEST(test_public_##KEYTYPE##_via_PEM) #define IMPLEMENT_TEST_SUITE_PARAMS(KEYTYPE, KEYTYPEstr) \ static int test_params_##KEYTYPE##_via_DER(void) \ { \ return test_params_via_DER(KEYTYPEstr, key_##KEYTYPE); \ } \ static int test_params_##KEYTYPE##_via_PEM(void) \ { \ return test_params_via_PEM(KEYTYPEstr, key_##KEYTYPE); \ } #define ADD_TEST_SUITE_PARAMS(KEYTYPE) \ ADD_TEST(test_params_##KEYTYPE##_via_DER); \ ADD_TEST(test_params_##KEYTYPE##_via_PEM) #define IMPLEMENT_TEST_SUITE_LEGACY(KEYTYPE, KEYTYPEstr) \ static int test_unprotected_##KEYTYPE##_via_legacy_PEM(void) \ { \ return \ test_unprotected_via_legacy_PEM(KEYTYPEstr, key_##KEYTYPE); \ } \ static int test_protected_##KEYTYPE##_via_legacy_PEM(void) \ { \ return \ test_protected_via_legacy_PEM(KEYTYPEstr, key_##KEYTYPE); \ } #define ADD_TEST_SUITE_LEGACY(KEYTYPE) \ ADD_TEST(test_unprotected_##KEYTYPE##_via_legacy_PEM); \ ADD_TEST(test_protected_##KEYTYPE##_via_legacy_PEM) #define IMPLEMENT_TEST_SUITE_MSBLOB(KEYTYPE, KEYTYPEstr) \ static int test_unprotected_##KEYTYPE##_via_MSBLOB(void) \ { \ return test_unprotected_via_MSBLOB(KEYTYPEstr, key_##KEYTYPE); \ } \ static int test_public_##KEYTYPE##_via_MSBLOB(void) \ { \ return test_public_via_MSBLOB(KEYTYPEstr, key_##KEYTYPE); \ } #define ADD_TEST_SUITE_MSBLOB(KEYTYPE) \ ADD_TEST(test_unprotected_##KEYTYPE##_via_MSBLOB); \ ADD_TEST(test_public_##KEYTYPE##_via_MSBLOB) #define IMPLEMENT_TEST_SUITE_UNPROTECTED_PVK(KEYTYPE, KEYTYPEstr) \ static int test_unprotected_##KEYTYPE##_via_PVK(void) \ { \ return test_unprotected_via_PVK(KEYTYPEstr, key_##KEYTYPE); \ } # define ADD_TEST_SUITE_UNPROTECTED_PVK(KEYTYPE) \ ADD_TEST(test_unprotected_##KEYTYPE##_via_PVK) #ifndef OPENSSL_NO_RC4 # define IMPLEMENT_TEST_SUITE_PROTECTED_PVK(KEYTYPE, KEYTYPEstr) \ static int test_protected_##KEYTYPE##_via_PVK(void) \ { \ return test_protected_via_PVK(KEYTYPEstr, key_##KEYTYPE); \ } # define ADD_TEST_SUITE_PROTECTED_PVK(KEYTYPE) \ ADD_TEST(test_protected_##KEYTYPE##_via_PVK) #endif #ifndef OPENSSL_NO_DH DOMAIN_KEYS(DH); IMPLEMENT_TEST_SUITE(DH, "DH", 1) IMPLEMENT_TEST_SUITE_PARAMS(DH, "DH") DOMAIN_KEYS(DHX); IMPLEMENT_TEST_SUITE(DHX, "X9.42 DH", 1) IMPLEMENT_TEST_SUITE_PARAMS(DHX, "X9.42 DH") #endif #ifndef OPENSSL_NO_DSA DOMAIN_KEYS(DSA); IMPLEMENT_TEST_SUITE(DSA, "DSA", 1) IMPLEMENT_TEST_SUITE_PARAMS(DSA, "DSA") IMPLEMENT_TEST_SUITE_LEGACY(DSA, "DSA") IMPLEMENT_TEST_SUITE_MSBLOB(DSA, "DSA") IMPLEMENT_TEST_SUITE_UNPROTECTED_PVK(DSA, "DSA") # ifndef OPENSSL_NO_RC4 IMPLEMENT_TEST_SUITE_PROTECTED_PVK(DSA, "DSA") # endif #endif #ifndef OPENSSL_NO_EC DOMAIN_KEYS(EC); IMPLEMENT_TEST_SUITE(EC, "EC", 1) IMPLEMENT_TEST_SUITE_PARAMS(EC, "EC") IMPLEMENT_TEST_SUITE_LEGACY(EC, "EC") DOMAIN_KEYS(ECExplicitPrimeNamedCurve); IMPLEMENT_TEST_SUITE(ECExplicitPrimeNamedCurve, "EC", 1) IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitPrimeNamedCurve, "EC") DOMAIN_KEYS(ECExplicitPrime2G); IMPLEMENT_TEST_SUITE(ECExplicitPrime2G, "EC", 0) IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitPrime2G, "EC") # ifndef OPENSSL_NO_EC2M DOMAIN_KEYS(ECExplicitTriNamedCurve); IMPLEMENT_TEST_SUITE(ECExplicitTriNamedCurve, "EC", 1) IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitTriNamedCurve, "EC") DOMAIN_KEYS(ECExplicitTri2G); IMPLEMENT_TEST_SUITE(ECExplicitTri2G, "EC", 0) IMPLEMENT_TEST_SUITE_LEGACY(ECExplicitTri2G, "EC") # endif KEYS(ED25519); IMPLEMENT_TEST_SUITE(ED25519, "ED25519", 1) KEYS(ED448); IMPLEMENT_TEST_SUITE(ED448, "ED448", 1) KEYS(X25519); IMPLEMENT_TEST_SUITE(X25519, "X25519", 1) KEYS(X448); IMPLEMENT_TEST_SUITE(X448, "X448", 1) #endif KEYS(RSA); IMPLEMENT_TEST_SUITE(RSA, "RSA", 1) IMPLEMENT_TEST_SUITE_LEGACY(RSA, "RSA") KEYS(RSA_PSS); IMPLEMENT_TEST_SUITE(RSA_PSS, "RSA-PSS", 1) IMPLEMENT_TEST_SUITE_MSBLOB(RSA, "RSA") IMPLEMENT_TEST_SUITE_UNPROTECTED_PVK(RSA, "RSA") #ifndef OPENSSL_NO_RC4 IMPLEMENT_TEST_SUITE_PROTECTED_PVK(RSA, "RSA") #endif #ifndef OPENSSL_NO_EC static int do_create_ec_explicit_prime_params(OSSL_PARAM_BLD *bld, const unsigned char *gen, size_t gen_len) { BIGNUM *a, *b, *prime, *order; static const unsigned char prime_data[] = { 0x00, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; static const unsigned char a_data[] = { 0x00, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfc }; static const unsigned char b_data[] = { 0x5a, 0xc6, 0x35, 0xd8, 0xaa, 0x3a, 0x93, 0xe7, 0xb3, 0xeb, 0xbd, 0x55, 0x76, 0x98, 0x86, 0xbc, 0x65, 0x1d, 0x06, 0xb0, 0xcc, 0x53, 0xb0, 0xf6, 0x3b, 0xce, 0x3c, 0x3e, 0x27, 0xd2, 0x60, 0x4b }; static const unsigned char seed[] = { 0xc4, 0x9d, 0x36, 0x08, 0x86, 0xe7, 0x04, 0x93, 0x6a, 0x66, 0x78, 0xe1, 0x13, 0x9d, 0x26, 0xb7, 0x81, 0x9f, 0x7e, 0x90 }; static const unsigned char order_data[] = { 0x00, 0xff, 0xff, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xbc, 0xe6, 0xfa, 0xad, 0xa7, 0x17, 0x9e, 0x84, 0xf3, 0xb9, 0xca, 0xc2, 0xfc, 0x63, 0x25, 0x51 }; return TEST_ptr(a = BN_CTX_get(bnctx)) && TEST_ptr(b = BN_CTX_get(bnctx)) && TEST_ptr(prime = BN_CTX_get(bnctx)) && TEST_ptr(order = BN_CTX_get(bnctx)) && TEST_ptr(BN_bin2bn(prime_data, sizeof(prime_data), prime)) && TEST_ptr(BN_bin2bn(a_data, sizeof(a_data), a)) && TEST_ptr(BN_bin2bn(b_data, sizeof(b_data), b)) && TEST_ptr(BN_bin2bn(order_data, sizeof(order_data), order)) && TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_EC_FIELD_TYPE, SN_X9_62_prime_field, 0)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_P, prime)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_A, a)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_B, b)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_ORDER, order)) && TEST_true(OSSL_PARAM_BLD_push_octet_string(bld, OSSL_PKEY_PARAM_EC_GENERATOR, gen, gen_len)) && TEST_true(OSSL_PARAM_BLD_push_octet_string(bld, OSSL_PKEY_PARAM_EC_SEED, seed, sizeof(seed))) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_COFACTOR, BN_value_one())); } static int create_ec_explicit_prime_params_namedcurve(OSSL_PARAM_BLD *bld) { static const unsigned char prime256v1_gen[] = { 0x04, 0x6b, 0x17, 0xd1, 0xf2, 0xe1, 0x2c, 0x42, 0x47, 0xf8, 0xbc, 0xe6, 0xe5, 0x63, 0xa4, 0x40, 0xf2, 0x77, 0x03, 0x7d, 0x81, 0x2d, 0xeb, 0x33, 0xa0, 0xf4, 0xa1, 0x39, 0x45, 0xd8, 0x98, 0xc2, 0x96, 0x4f, 0xe3, 0x42, 0xe2, 0xfe, 0x1a, 0x7f, 0x9b, 0x8e, 0xe7, 0xeb, 0x4a, 0x7c, 0x0f, 0x9e, 0x16, 0x2b, 0xce, 0x33, 0x57, 0x6b, 0x31, 0x5e, 0xce, 0xcb, 0xb6, 0x40, 0x68, 0x37, 0xbf, 0x51, 0xf5 }; return do_create_ec_explicit_prime_params(bld, prime256v1_gen, sizeof(prime256v1_gen)); } static int create_ec_explicit_prime_params(OSSL_PARAM_BLD *bld) { static const unsigned char prime256v1_gen2[] = { 0x04, 0xe4, 0x97, 0x08, 0xbe, 0x7d, 0xfa, 0xa2, 0x9a, 0xa3, 0x12, 0x6f, 0xe4, 0xe7, 0xd0, 0x25, 0xe3, 0x4a, 0xc1, 0x03, 0x15, 0x8c, 0xd9, 0x33, 0xc6, 0x97, 0x42, 0xf5, 0xdc, 0x97, 0xb9, 0xd7, 0x31, 0xe9, 0x7d, 0x74, 0x3d, 0x67, 0x6a, 0x3b, 0x21, 0x08, 0x9c, 0x31, 0x73, 0xf8, 0xc1, 0x27, 0xc9, 0xd2, 0xa0, 0xa0, 0x83, 0x66, 0xe0, 0xc9, 0xda, 0xa8, 0xc6, 0x56, 0x2b, 0x94, 0xb1, 0xae, 0x55 }; return do_create_ec_explicit_prime_params(bld, prime256v1_gen2, sizeof(prime256v1_gen2)); } # ifndef OPENSSL_NO_EC2M static int do_create_ec_explicit_trinomial_params(OSSL_PARAM_BLD *bld, const unsigned char *gen, size_t gen_len) { BIGNUM *a, *b, *poly, *order, *cofactor; static const unsigned char poly_data[] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, }; static const unsigned char a_data[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }; static const unsigned char b_data[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01 }; static const unsigned char order_data[] = { 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x06, 0x9D, 0x5B, 0xB9, 0x15, 0xBC, 0xD4, 0x6E, 0xFB, 0x1A, 0xD5, 0xF1, 0x73, 0xAB, 0xDF }; static const unsigned char cofactor_data[]= { 0x4 }; return TEST_ptr(a = BN_CTX_get(bnctx)) && TEST_ptr(b = BN_CTX_get(bnctx)) && TEST_ptr(poly = BN_CTX_get(bnctx)) && TEST_ptr(order = BN_CTX_get(bnctx)) && TEST_ptr(cofactor = BN_CTX_get(bnctx)) && TEST_ptr(BN_bin2bn(poly_data, sizeof(poly_data), poly)) && TEST_ptr(BN_bin2bn(a_data, sizeof(a_data), a)) && TEST_ptr(BN_bin2bn(b_data, sizeof(b_data), b)) && TEST_ptr(BN_bin2bn(order_data, sizeof(order_data), order)) && TEST_ptr(BN_bin2bn(cofactor_data, sizeof(cofactor_data), cofactor)) && TEST_true(OSSL_PARAM_BLD_push_utf8_string(bld, OSSL_PKEY_PARAM_EC_FIELD_TYPE, SN_X9_62_characteristic_two_field, 0)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_P, poly)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_A, a)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_B, b)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_ORDER, order)) && TEST_true(OSSL_PARAM_BLD_push_octet_string(bld, OSSL_PKEY_PARAM_EC_GENERATOR, gen, gen_len)) && TEST_true(OSSL_PARAM_BLD_push_BN(bld, OSSL_PKEY_PARAM_EC_COFACTOR, cofactor)); } static int create_ec_explicit_trinomial_params_namedcurve(OSSL_PARAM_BLD *bld) { static const unsigned char gen[] = { 0x04, 0x01, 0x72, 0x32, 0xBA, 0x85, 0x3A, 0x7E, 0x73, 0x1A, 0xF1, 0x29, 0xF2, 0x2F, 0xF4, 0x14, 0x95, 0x63, 0xA4, 0x19, 0xC2, 0x6B, 0xF5, 0x0A, 0x4C, 0x9D, 0x6E, 0xEF, 0xAD, 0x61, 0x26, 0x01, 0xDB, 0x53, 0x7D, 0xEC, 0xE8, 0x19, 0xB7, 0xF7, 0x0F, 0x55, 0x5A, 0x67, 0xC4, 0x27, 0xA8, 0xCD, 0x9B, 0xF1, 0x8A, 0xEB, 0x9B, 0x56, 0xE0, 0xC1, 0x10, 0x56, 0xFA, 0xE6, 0xA3 }; return do_create_ec_explicit_trinomial_params(bld, gen, sizeof(gen)); } static int create_ec_explicit_trinomial_params(OSSL_PARAM_BLD *bld) { static const unsigned char gen2[] = { 0x04, 0x00, 0xd7, 0xba, 0xd0, 0x26, 0x6c, 0x31, 0x6a, 0x78, 0x76, 0x01, 0xd1, 0x32, 0x4b, 0x8f, 0x30, 0x29, 0x2d, 0x78, 0x30, 0xca, 0x43, 0xaa, 0xf0, 0xa2, 0x5a, 0xd4, 0x0f, 0xb3, 0xf4, 0x00, 0x85, 0x4b, 0x1b, 0x8d, 0x50, 0x10, 0xa5, 0x1c, 0x80, 0xf7, 0x86, 0x40, 0x62, 0x4c, 0x87, 0xd1, 0x26, 0x7a, 0x9c, 0x5c, 0xe9, 0x82, 0x29, 0xd1, 0x67, 0x70, 0x41, 0xea, 0xcb }; return do_create_ec_explicit_trinomial_params(bld, gen2, sizeof(gen2)); } # endif #endif typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_CONTEXT, OPT_RSA_FILE, OPT_RSA_PSS_FILE, OPT_CONFIG_FILE, OPT_PROVIDER_NAME, OPT_TEST_ENUM } OPTION_CHOICE; const OPTIONS *test_get_options(void) { static const OPTIONS options[] = { OPT_TEST_OPTIONS_DEFAULT_USAGE, { "context", OPT_CONTEXT, '-', "Explicitly use a non-default library context" }, { "rsa", OPT_RSA_FILE, '<', "PEM format RSA key file to encode/decode" }, { "pss", OPT_RSA_PSS_FILE, '<', "PEM format RSA-PSS key file to encode/decode" }, { "config", OPT_CONFIG_FILE, '<', "The configuration file to use for the library context" }, { "provider", OPT_PROVIDER_NAME, 's', "The provider to load (The default value is 'default')" }, { NULL } }; return options; } int setup_tests(void) { const char *rsa_file = NULL; const char *rsa_pss_file = NULL; const char *prov_name = "default"; char *config_file = NULL; int ok = 1; #ifndef OPENSSL_NO_DSA static size_t qbits = 160; static size_t pbits = 1024; OSSL_PARAM DSA_params[] = { OSSL_PARAM_size_t("pbits", &pbits), OSSL_PARAM_size_t("qbits", &qbits), OSSL_PARAM_END }; #endif #ifndef OPENSSL_NO_EC static char groupname[] = "prime256v1"; OSSL_PARAM EC_params[] = { OSSL_PARAM_utf8_string("group", groupname, sizeof(groupname) - 1), OSSL_PARAM_END }; #endif OPTION_CHOICE o; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_CONTEXT: default_libctx = 0; break; case OPT_PROVIDER_NAME: prov_name = opt_arg(); break; case OPT_CONFIG_FILE: config_file = opt_arg(); break; case OPT_RSA_FILE: rsa_file = opt_arg(); break; case OPT_RSA_PSS_FILE: rsa_pss_file = opt_arg(); break; case OPT_TEST_CASES: break; default: return 0; } } if (strcmp(prov_name, "fips") == 0) is_fips = 1; if (default_libctx) { if (!test_get_libctx(NULL, NULL, config_file, &deflprov, prov_name)) return 0; } else { if (!test_get_libctx(&testctx, &nullprov, config_file, &deflprov, prov_name)) return 0; } is_fips_3_0_0 = fips_provider_version_eq(testctx, 3, 0, 0); if (is_fips_3_0_0 < 0) return 0; #ifdef STATIC_LEGACY if (!OSSL_PROVIDER_add_builtin(testctx, "legacy", ossl_legacy_provider_init)) return 0; #endif if (!TEST_ptr(keyctx = OSSL_LIB_CTX_new())) return 0; if (!TEST_ptr(keyprov = OSSL_PROVIDER_load(keyctx, "default"))) return 0; #ifndef OPENSSL_NO_EC if (!TEST_ptr(bnctx = BN_CTX_new_ex(testctx)) || !TEST_ptr(bld_prime_nc = OSSL_PARAM_BLD_new()) || !TEST_ptr(bld_prime = OSSL_PARAM_BLD_new()) || !create_ec_explicit_prime_params_namedcurve(bld_prime_nc) || !create_ec_explicit_prime_params(bld_prime) || !TEST_ptr(ec_explicit_prime_params_nc = OSSL_PARAM_BLD_to_param(bld_prime_nc)) || !TEST_ptr(ec_explicit_prime_params_explicit = OSSL_PARAM_BLD_to_param(bld_prime)) # ifndef OPENSSL_NO_EC2M || !TEST_ptr(bld_tri_nc = OSSL_PARAM_BLD_new()) || !TEST_ptr(bld_tri = OSSL_PARAM_BLD_new()) || !create_ec_explicit_trinomial_params_namedcurve(bld_tri_nc) || !create_ec_explicit_trinomial_params(bld_tri) || !TEST_ptr(ec_explicit_tri_params_nc = OSSL_PARAM_BLD_to_param(bld_tri_nc)) || !TEST_ptr(ec_explicit_tri_params_explicit = OSSL_PARAM_BLD_to_param(bld_tri)) # endif ) return 0; #endif TEST_info("Generating keys..."); #ifndef OPENSSL_NO_DH TEST_info("Generating DH keys..."); MAKE_DOMAIN_KEYS(DH, "DH", NULL); MAKE_DOMAIN_KEYS(DHX, "X9.42 DH", NULL); #endif #ifndef OPENSSL_NO_DSA TEST_info("Generating DSA keys..."); MAKE_DOMAIN_KEYS(DSA, "DSA", DSA_params); #endif #ifndef OPENSSL_NO_EC TEST_info("Generating EC keys..."); MAKE_DOMAIN_KEYS(EC, "EC", EC_params); MAKE_DOMAIN_KEYS(ECExplicitPrimeNamedCurve, "EC", ec_explicit_prime_params_nc); MAKE_DOMAIN_KEYS(ECExplicitPrime2G, "EC", ec_explicit_prime_params_explicit); # ifndef OPENSSL_NO_EC2M MAKE_DOMAIN_KEYS(ECExplicitTriNamedCurve, "EC", ec_explicit_tri_params_nc); MAKE_DOMAIN_KEYS(ECExplicitTri2G, "EC", ec_explicit_tri_params_explicit); # endif MAKE_KEYS(ED25519, "ED25519", NULL); MAKE_KEYS(ED448, "ED448", NULL); MAKE_KEYS(X25519, "X25519", NULL); MAKE_KEYS(X448, "X448", NULL); #endif TEST_info("Loading RSA key..."); ok = ok && TEST_ptr(key_RSA = load_pkey_pem(rsa_file, keyctx)); TEST_info("Loading RSA_PSS key..."); ok = ok && TEST_ptr(key_RSA_PSS = load_pkey_pem(rsa_pss_file, keyctx)); TEST_info("Generating keys done"); if (ok) { #ifndef OPENSSL_NO_DH ADD_TEST_SUITE(DH); ADD_TEST_SUITE_PARAMS(DH); ADD_TEST_SUITE(DHX); ADD_TEST_SUITE_PARAMS(DHX); #endif #ifndef OPENSSL_NO_DSA ADD_TEST_SUITE(DSA); ADD_TEST_SUITE_PARAMS(DSA); ADD_TEST_SUITE_LEGACY(DSA); ADD_TEST_SUITE_MSBLOB(DSA); ADD_TEST_SUITE_UNPROTECTED_PVK(DSA); # ifndef OPENSSL_NO_RC4 ADD_TEST_SUITE_PROTECTED_PVK(DSA); # endif #endif #ifndef OPENSSL_NO_EC ADD_TEST_SUITE(EC); ADD_TEST_SUITE_PARAMS(EC); ADD_TEST_SUITE_LEGACY(EC); ADD_TEST_SUITE(ECExplicitPrimeNamedCurve); ADD_TEST_SUITE_LEGACY(ECExplicitPrimeNamedCurve); ADD_TEST_SUITE(ECExplicitPrime2G); ADD_TEST_SUITE_LEGACY(ECExplicitPrime2G); # ifndef OPENSSL_NO_EC2M ADD_TEST_SUITE(ECExplicitTriNamedCurve); ADD_TEST_SUITE_LEGACY(ECExplicitTriNamedCurve); ADD_TEST_SUITE(ECExplicitTri2G); ADD_TEST_SUITE_LEGACY(ECExplicitTri2G); # endif ADD_TEST_SUITE(ED25519); ADD_TEST_SUITE(ED448); ADD_TEST_SUITE(X25519); ADD_TEST_SUITE(X448); #endif ADD_TEST_SUITE(RSA); ADD_TEST_SUITE_LEGACY(RSA); ADD_TEST_SUITE(RSA_PSS); ADD_TEST_SUITE_MSBLOB(RSA); ADD_TEST_SUITE_UNPROTECTED_PVK(RSA); # ifndef OPENSSL_NO_RC4 ADD_TEST_SUITE_PROTECTED_PVK(RSA); # endif } return 1; } void cleanup_tests(void) { #ifndef OPENSSL_NO_EC OSSL_PARAM_free(ec_explicit_prime_params_nc); OSSL_PARAM_free(ec_explicit_prime_params_explicit); OSSL_PARAM_BLD_free(bld_prime_nc); OSSL_PARAM_BLD_free(bld_prime); # ifndef OPENSSL_NO_EC2M OSSL_PARAM_free(ec_explicit_tri_params_nc); OSSL_PARAM_free(ec_explicit_tri_params_explicit); OSSL_PARAM_BLD_free(bld_tri_nc); OSSL_PARAM_BLD_free(bld_tri); # endif BN_CTX_free(bnctx); #endif #ifndef OPENSSL_NO_DH FREE_DOMAIN_KEYS(DH); FREE_DOMAIN_KEYS(DHX); #endif #ifndef OPENSSL_NO_DSA FREE_DOMAIN_KEYS(DSA); #endif #ifndef OPENSSL_NO_EC FREE_DOMAIN_KEYS(EC); FREE_DOMAIN_KEYS(ECExplicitPrimeNamedCurve); FREE_DOMAIN_KEYS(ECExplicitPrime2G); # ifndef OPENSSL_NO_EC2M FREE_DOMAIN_KEYS(ECExplicitTriNamedCurve); FREE_DOMAIN_KEYS(ECExplicitTri2G); # endif FREE_KEYS(ED25519); FREE_KEYS(ED448); FREE_KEYS(X25519); FREE_KEYS(X448); #endif FREE_KEYS(RSA); FREE_KEYS(RSA_PSS); OSSL_PROVIDER_unload(nullprov); OSSL_PROVIDER_unload(deflprov); OSSL_PROVIDER_unload(keyprov); OSSL_LIB_CTX_free(testctx); OSSL_LIB_CTX_free(keyctx); }
test
openssl/test/endecode_test.c
openssl
#include <stdio.h> #include <string.h> #include <openssl/rand.h> #include <openssl/asn1.h> #include <openssl/asn1t.h> #include <openssl/obj_mac.h> #include "internal/numbers.h" #include "testutil.h" #ifdef __GNUC__ # pragma GCC diagnostic ignored "-Wunused-function" #endif #ifdef __clang__ # pragma clang diagnostic ignored "-Wunused-function" #endif static unsigned char t_invalid_zero[] = { 0x30, 0x02, 0x02, 0x00 }; #ifndef OPENSSL_NO_DEPRECATED_3_0 typedef struct { long test_long; } ASN1_LONG_DATA; ASN1_SEQUENCE(ASN1_LONG_DATA) = { ASN1_EMBED(ASN1_LONG_DATA, test_long, LONG), } static_ASN1_SEQUENCE_END(ASN1_LONG_DATA) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_LONG_DATA) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_LONG_DATA) static int test_long(void) { const unsigned char *p = t_invalid_zero; ASN1_LONG_DATA *dectst = d2i_ASN1_LONG_DATA(NULL, &p, sizeof(t_invalid_zero)); if (dectst == NULL) return 0; ASN1_LONG_DATA_free(dectst); return 1; } #endif typedef struct { int32_t test_int32; } ASN1_INT32_DATA; ASN1_SEQUENCE(ASN1_INT32_DATA) = { ASN1_EMBED(ASN1_INT32_DATA, test_int32, INT32), } static_ASN1_SEQUENCE_END(ASN1_INT32_DATA) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_INT32_DATA) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_INT32_DATA) static int test_int32(void) { const unsigned char *p = t_invalid_zero; ASN1_INT32_DATA *dectst = d2i_ASN1_INT32_DATA(NULL, &p, sizeof(t_invalid_zero)); if (dectst == NULL) return 0; ASN1_INT32_DATA_free(dectst); return 1; } typedef struct { uint32_t test_uint32; } ASN1_UINT32_DATA; ASN1_SEQUENCE(ASN1_UINT32_DATA) = { ASN1_EMBED(ASN1_UINT32_DATA, test_uint32, UINT32), } static_ASN1_SEQUENCE_END(ASN1_UINT32_DATA) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_UINT32_DATA) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_UINT32_DATA) static int test_uint32(void) { const unsigned char *p = t_invalid_zero; ASN1_UINT32_DATA *dectst = d2i_ASN1_UINT32_DATA(NULL, &p, sizeof(t_invalid_zero)); if (dectst == NULL) return 0; ASN1_UINT32_DATA_free(dectst); return 1; } typedef struct { int64_t test_int64; } ASN1_INT64_DATA; ASN1_SEQUENCE(ASN1_INT64_DATA) = { ASN1_EMBED(ASN1_INT64_DATA, test_int64, INT64), } static_ASN1_SEQUENCE_END(ASN1_INT64_DATA) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_INT64_DATA) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_INT64_DATA) static int test_int64(void) { const unsigned char *p = t_invalid_zero; ASN1_INT64_DATA *dectst = d2i_ASN1_INT64_DATA(NULL, &p, sizeof(t_invalid_zero)); if (dectst == NULL) return 0; ASN1_INT64_DATA_free(dectst); return 1; } typedef struct { uint64_t test_uint64; } ASN1_UINT64_DATA; ASN1_SEQUENCE(ASN1_UINT64_DATA) = { ASN1_EMBED(ASN1_UINT64_DATA, test_uint64, UINT64), } static_ASN1_SEQUENCE_END(ASN1_UINT64_DATA) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(ASN1_UINT64_DATA) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(ASN1_UINT64_DATA) static int test_uint64(void) { const unsigned char *p = t_invalid_zero; ASN1_UINT64_DATA *dectst = d2i_ASN1_UINT64_DATA(NULL, &p, sizeof(t_invalid_zero)); if (dectst == NULL) return 0; ASN1_UINT64_DATA_free(dectst); return 1; } static int test_gentime(void) { const unsigned char der[] = { 0x18, 0x0d, 0x31, 0x36, 0x31, 0x32, 0x30, 0x38, 0x31, 0x39, 0x33, 0x34, 0x30, 0x30, 0x5a, }; const unsigned char *p; int der_len, rc = 1; ASN1_GENERALIZEDTIME *gentime; p = der; der_len = sizeof(der); gentime = d2i_ASN1_GENERALIZEDTIME(NULL, &p, der_len); if (!TEST_ptr_null(gentime)) rc = 0; ASN1_GENERALIZEDTIME_free(gentime); return rc; } static int test_utctime(void) { const unsigned char der[] = { 0x17, 0x0b, 0x30, 0x32, 0x30, 0x35, 0x31, 0x30, 0x34, 0x37, 0x30, 0x30, 0x5a, }; const unsigned char *p; int der_len, rc = 1; ASN1_UTCTIME *utctime; p = der; der_len = sizeof(der); utctime = d2i_ASN1_UTCTIME(NULL, &p, der_len); if (!TEST_ptr_null(utctime)) rc = 0; ASN1_UTCTIME_free(utctime); return rc; } typedef struct { ASN1_STRING *invalidDirString; } INVALIDTEMPLATE; ASN1_SEQUENCE(INVALIDTEMPLATE) = { ASN1_IMP(INVALIDTEMPLATE, invalidDirString, DIRECTORYSTRING, 12) } static_ASN1_SEQUENCE_END(INVALIDTEMPLATE) IMPLEMENT_STATIC_ASN1_ENCODE_FUNCTIONS(INVALIDTEMPLATE) IMPLEMENT_STATIC_ASN1_ALLOC_FUNCTIONS(INVALIDTEMPLATE) static unsigned char t_invalid_template[] = { 0x30, 0x03, 0x0c, 0x01, 0x41 }; static int test_invalid_template(void) { const unsigned char *p = t_invalid_template; INVALIDTEMPLATE *tmp = d2i_INVALIDTEMPLATE(NULL, &p, sizeof(t_invalid_template)); if (TEST_ptr_null(tmp)) return 1; INVALIDTEMPLATE_free(tmp); return 0; } static int test_reuse_asn1_object(void) { static unsigned char cn_der[] = { 0x06, 0x03, 0x55, 0x04, 0x06 }; static unsigned char oid_der[] = { 0x06, 0x06, 0x2a, 0x03, 0x04, 0x05, 0x06, 0x07 }; int ret = 0; ASN1_OBJECT *obj; unsigned char const *p = oid_der; if (!TEST_ptr(obj = ASN1_OBJECT_create(NID_undef, cn_der, sizeof(cn_der), "C", "countryName"))) goto err; if (!TEST_ptr(d2i_ASN1_OBJECT(&obj, &p, sizeof(oid_der)))) goto err; ret = 1; err: ASN1_OBJECT_free(obj); return ret; } int setup_tests(void) { #ifndef OPENSSL_NO_DEPRECATED_3_0 ADD_TEST(test_long); #endif ADD_TEST(test_int32); ADD_TEST(test_uint32); ADD_TEST(test_int64); ADD_TEST(test_uint64); ADD_TEST(test_gentime); ADD_TEST(test_utctime); ADD_TEST(test_invalid_template); ADD_TEST(test_reuse_asn1_object); return 1; }
test
openssl/test/asn1_decode_test.c
openssl
#include <stdio.h> #include <string.h> #include <openssl/opensslconf.h> #include <openssl/err.h> #include <openssl/e_os2.h> #include <openssl/ssl.h> #include <openssl/ssl3.h> #include <openssl/tls1.h> #include "internal/nelem.h" #include "testutil.h" typedef struct cipher_id_name { int id; const char *name; } CIPHER_ID_NAME; static CIPHER_ID_NAME cipher_names[] = { {0x0000, "TLS_NULL_WITH_NULL_NULL"}, {0x0001, "TLS_RSA_WITH_NULL_MD5"}, {0x0002, "TLS_RSA_WITH_NULL_SHA"}, {0x0003, "TLS_RSA_EXPORT_WITH_RC4_40_MD5"}, {0x0004, "TLS_RSA_WITH_RC4_128_MD5"}, {0x0005, "TLS_RSA_WITH_RC4_128_SHA"}, {0x0006, "TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5"}, {0x0007, "TLS_RSA_WITH_IDEA_CBC_SHA"}, {0x0008, "TLS_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x0009, "TLS_RSA_WITH_DES_CBC_SHA"}, {0x000A, "TLS_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x000B, "TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA"}, {0x000C, "TLS_DH_DSS_WITH_DES_CBC_SHA"}, {0x000D, "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"}, {0x000E, "TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x000F, "TLS_DH_RSA_WITH_DES_CBC_SHA"}, {0x0010, "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x0011, "TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA"}, {0x0012, "TLS_DHE_DSS_WITH_DES_CBC_SHA"}, {0x0013, "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"}, {0x0014, "TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA"}, {0x0015, "TLS_DHE_RSA_WITH_DES_CBC_SHA"}, {0x0016, "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"}, {0x0017, "TLS_DH_anon_EXPORT_WITH_RC4_40_MD5"}, {0x0018, "TLS_DH_anon_WITH_RC4_128_MD5"}, {0x0019, "TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA"}, {0x001A, "TLS_DH_anon_WITH_DES_CBC_SHA"}, {0x001B, "TLS_DH_anon_WITH_3DES_EDE_CBC_SHA"}, {0x001D, "SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA"}, {0x001E, "SSL_FORTEZZA_KEA_WITH_RC4_128_SHA"}, {0x001F, "TLS_KRB5_WITH_3DES_EDE_CBC_SHA"}, {0x0020, "TLS_KRB5_WITH_RC4_128_SHA"}, {0x0021, "TLS_KRB5_WITH_IDEA_CBC_SHA"}, {0x0022, "TLS_KRB5_WITH_DES_CBC_MD5"}, {0x0023, "TLS_KRB5_WITH_3DES_EDE_CBC_MD5"}, {0x0024, "TLS_KRB5_WITH_RC4_128_MD5"}, {0x0025, "TLS_KRB5_WITH_IDEA_CBC_MD5"}, {0x0026, "TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA"}, {0x0027, "TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA"}, {0x0028, "TLS_KRB5_EXPORT_WITH_RC4_40_SHA"}, {0x0029, "TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5"}, {0x002A, "TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5"}, {0x002B, "TLS_KRB5_EXPORT_WITH_RC4_40_MD5"}, {0x002C, "TLS_PSK_WITH_NULL_SHA"}, {0x002D, "TLS_DHE_PSK_WITH_NULL_SHA"}, {0x002E, "TLS_RSA_PSK_WITH_NULL_SHA"}, {0x002F, "TLS_RSA_WITH_AES_128_CBC_SHA"}, {0x0030, "TLS_DH_DSS_WITH_AES_128_CBC_SHA"}, {0x0031, "TLS_DH_RSA_WITH_AES_128_CBC_SHA"}, {0x0032, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"}, {0x0033, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"}, {0x0034, "TLS_DH_anon_WITH_AES_128_CBC_SHA"}, {0x0035, "TLS_RSA_WITH_AES_256_CBC_SHA"}, {0x0036, "TLS_DH_DSS_WITH_AES_256_CBC_SHA"}, {0x0037, "TLS_DH_RSA_WITH_AES_256_CBC_SHA"}, {0x0038, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"}, {0x0039, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"}, {0x003A, "TLS_DH_anon_WITH_AES_256_CBC_SHA"}, {0x003B, "TLS_RSA_WITH_NULL_SHA256"}, {0x003C, "TLS_RSA_WITH_AES_128_CBC_SHA256"}, {0x003D, "TLS_RSA_WITH_AES_256_CBC_SHA256"}, {0x003E, "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"}, {0x003F, "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"}, {0x0040, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"}, {0x0041, "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0042, "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA"}, {0x0043, "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0044, "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"}, {0x0045, "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"}, {0x0046, "TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA"}, {0x0067, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"}, {0x0068, "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"}, {0x0069, "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"}, {0x006A, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"}, {0x006B, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"}, {0x006C, "TLS_DH_anon_WITH_AES_128_CBC_SHA256"}, {0x006D, "TLS_DH_anon_WITH_AES_256_CBC_SHA256"}, {0x0084, "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0085, "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA"}, {0x0086, "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0087, "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"}, {0x0088, "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"}, {0x0089, "TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA"}, {0x008A, "TLS_PSK_WITH_RC4_128_SHA"}, {0x008B, "TLS_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x008C, "TLS_PSK_WITH_AES_128_CBC_SHA"}, {0x008D, "TLS_PSK_WITH_AES_256_CBC_SHA"}, {0x008E, "TLS_DHE_PSK_WITH_RC4_128_SHA"}, {0x008F, "TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x0090, "TLS_DHE_PSK_WITH_AES_128_CBC_SHA"}, {0x0091, "TLS_DHE_PSK_WITH_AES_256_CBC_SHA"}, {0x0092, "TLS_RSA_PSK_WITH_RC4_128_SHA"}, {0x0093, "TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA"}, {0x0094, "TLS_RSA_PSK_WITH_AES_128_CBC_SHA"}, {0x0095, "TLS_RSA_PSK_WITH_AES_256_CBC_SHA"}, {0x0096, "TLS_RSA_WITH_SEED_CBC_SHA"}, {0x0097, "TLS_DH_DSS_WITH_SEED_CBC_SHA"}, {0x0098, "TLS_DH_RSA_WITH_SEED_CBC_SHA"}, {0x0099, "TLS_DHE_DSS_WITH_SEED_CBC_SHA"}, {0x009A, "TLS_DHE_RSA_WITH_SEED_CBC_SHA"}, {0x009B, "TLS_DH_anon_WITH_SEED_CBC_SHA"}, {0x009C, "TLS_RSA_WITH_AES_128_GCM_SHA256"}, {0x009D, "TLS_RSA_WITH_AES_256_GCM_SHA384"}, {0x009E, "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"}, {0x009F, "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"}, {0x00A0, "TLS_DH_RSA_WITH_AES_128_GCM_SHA256"}, {0x00A1, "TLS_DH_RSA_WITH_AES_256_GCM_SHA384"}, {0x00A2, "TLS_DHE_DSS_WITH_AES_128_GCM_SHA256"}, {0x00A3, "TLS_DHE_DSS_WITH_AES_256_GCM_SHA384"}, {0x00A4, "TLS_DH_DSS_WITH_AES_128_GCM_SHA256"}, {0x00A5, "TLS_DH_DSS_WITH_AES_256_GCM_SHA384"}, {0x00A6, "TLS_DH_anon_WITH_AES_128_GCM_SHA256"}, {0x00A7, "TLS_DH_anon_WITH_AES_256_GCM_SHA384"}, {0x00A8, "TLS_PSK_WITH_AES_128_GCM_SHA256"}, {0x00A9, "TLS_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AA, "TLS_DHE_PSK_WITH_AES_128_GCM_SHA256"}, {0x00AB, "TLS_DHE_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AC, "TLS_RSA_PSK_WITH_AES_128_GCM_SHA256"}, {0x00AD, "TLS_RSA_PSK_WITH_AES_256_GCM_SHA384"}, {0x00AE, "TLS_PSK_WITH_AES_128_CBC_SHA256"}, {0x00AF, "TLS_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B0, "TLS_PSK_WITH_NULL_SHA256"}, {0x00B1, "TLS_PSK_WITH_NULL_SHA384"}, {0x00B2, "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"}, {0x00B3, "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B4, "TLS_DHE_PSK_WITH_NULL_SHA256"}, {0x00B5, "TLS_DHE_PSK_WITH_NULL_SHA384"}, {0x00B6, "TLS_RSA_PSK_WITH_AES_128_CBC_SHA256"}, {0x00B7, "TLS_RSA_PSK_WITH_AES_256_CBC_SHA384"}, {0x00B8, "TLS_RSA_PSK_WITH_NULL_SHA256"}, {0x00B9, "TLS_RSA_PSK_WITH_NULL_SHA384"}, {0x00BA, "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BB, "TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BC, "TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BD, "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BE, "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00BF, "TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256"}, {0x00C0, "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C1, "TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C2, "TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C3, "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C4, "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00C5, "TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256"}, {0x00FF, "TLS_EMPTY_RENEGOTIATION_INFO_SCSV"}, {0x5600, "TLS_FALLBACK_SCSV"}, {0xC001, "TLS_ECDH_ECDSA_WITH_NULL_SHA"}, {0xC002, "TLS_ECDH_ECDSA_WITH_RC4_128_SHA"}, {0xC003, "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"}, {0xC004, "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"}, {0xC005, "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"}, {0xC006, "TLS_ECDHE_ECDSA_WITH_NULL_SHA"}, {0xC007, "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA"}, {0xC008, "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"}, {0xC009, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"}, {0xC00A, "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"}, {0xC00B, "TLS_ECDH_RSA_WITH_NULL_SHA"}, {0xC00C, "TLS_ECDH_RSA_WITH_RC4_128_SHA"}, {0xC00D, "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC00E, "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"}, {0xC00F, "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"}, {0xC010, "TLS_ECDHE_RSA_WITH_NULL_SHA"}, {0xC011, "TLS_ECDHE_RSA_WITH_RC4_128_SHA"}, {0xC012, "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC013, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"}, {0xC014, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"}, {0xC015, "TLS_ECDH_anon_WITH_NULL_SHA"}, {0xC016, "TLS_ECDH_anon_WITH_RC4_128_SHA"}, {0xC017, "TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA"}, {0xC018, "TLS_ECDH_anon_WITH_AES_128_CBC_SHA"}, {0xC019, "TLS_ECDH_anon_WITH_AES_256_CBC_SHA"}, {0xC01A, "TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA"}, {0xC01B, "TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA"}, {0xC01C, "TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA"}, {0xC01D, "TLS_SRP_SHA_WITH_AES_128_CBC_SHA"}, {0xC01E, "TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA"}, {0xC01F, "TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA"}, {0xC020, "TLS_SRP_SHA_WITH_AES_256_CBC_SHA"}, {0xC021, "TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA"}, {0xC022, "TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA"}, {0xC023, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"}, {0xC024, "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"}, {0xC025, "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"}, {0xC026, "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"}, {0xC027, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"}, {0xC028, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"}, {0xC029, "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"}, {0xC02A, "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"}, {0xC02B, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"}, {0xC02C, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"}, {0xC02D, "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"}, {0xC02E, "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"}, {0xC02F, "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"}, {0xC030, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"}, {0xC031, "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"}, {0xC032, "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"}, {0xC033, "TLS_ECDHE_PSK_WITH_RC4_128_SHA"}, {0xC034, "TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA"}, {0xC035, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA"}, {0xC036, "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA"}, {0xC037, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256"}, {0xC038, "TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384"}, {0xC039, "TLS_ECDHE_PSK_WITH_NULL_SHA"}, {0xC03A, "TLS_ECDHE_PSK_WITH_NULL_SHA256"}, {0xC03B, "TLS_ECDHE_PSK_WITH_NULL_SHA384"}, {0xC03C, "TLS_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC03D, "TLS_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC03E, "TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256"}, {0xC03F, "TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384"}, {0xC040, "TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC041, "TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC042, "TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256"}, {0xC043, "TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384"}, {0xC044, "TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC045, "TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC046, "TLS_DH_anon_WITH_ARIA_128_CBC_SHA256"}, {0xC047, "TLS_DH_anon_WITH_ARIA_256_CBC_SHA384"}, {0xC048, "TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256"}, {0xC049, "TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04A, "TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04B, "TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04C, "TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04D, "TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC04E, "TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256"}, {0xC04F, "TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384"}, {0xC050, "TLS_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC051, "TLS_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC052, "TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC053, "TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC054, "TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC055, "TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC056, "TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256"}, {0xC057, "TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384"}, {0xC058, "TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256"}, {0xC059, "TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384"}, {0xC05A, "TLS_DH_anon_WITH_ARIA_128_GCM_SHA256"}, {0xC05B, "TLS_DH_anon_WITH_ARIA_256_GCM_SHA384"}, {0xC05C, "TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256"}, {0xC05D, "TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384"}, {0xC05E, "TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256"}, {0xC05F, "TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384"}, {0xC060, "TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC061, "TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC062, "TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256"}, {0xC063, "TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384"}, {0xC064, "TLS_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC065, "TLS_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC066, "TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC067, "TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC068, "TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC069, "TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC06A, "TLS_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06B, "TLS_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC06C, "TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06D, "TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC06E, "TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256"}, {0xC06F, "TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384"}, {0xC070, "TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256"}, {0xC071, "TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384"}, {0xC072, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC073, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC074, "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC075, "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC076, "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC077, "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC078, "TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC079, "TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC07A, "TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07B, "TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC07C, "TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07D, "TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC07E, "TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC07F, "TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC080, "TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC081, "TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC082, "TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC083, "TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC084, "TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC085, "TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC086, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC087, "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC088, "TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC089, "TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08A, "TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08B, "TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08C, "TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08D, "TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC08E, "TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC08F, "TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC090, "TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC091, "TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC092, "TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256"}, {0xC093, "TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384"}, {0xC094, "TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC095, "TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC096, "TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC097, "TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC098, "TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC099, "TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC09A, "TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256"}, {0xC09B, "TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384"}, {0xC09C, "TLS_RSA_WITH_AES_128_CCM"}, {0xC09D, "TLS_RSA_WITH_AES_256_CCM"}, {0xC09E, "TLS_DHE_RSA_WITH_AES_128_CCM"}, {0xC09F, "TLS_DHE_RSA_WITH_AES_256_CCM"}, {0xC0A0, "TLS_RSA_WITH_AES_128_CCM_8"}, {0xC0A1, "TLS_RSA_WITH_AES_256_CCM_8"}, {0xC0A2, "TLS_DHE_RSA_WITH_AES_128_CCM_8"}, {0xC0A3, "TLS_DHE_RSA_WITH_AES_256_CCM_8"}, {0xC0A4, "TLS_PSK_WITH_AES_128_CCM"}, {0xC0A5, "TLS_PSK_WITH_AES_256_CCM"}, {0xC0A6, "TLS_DHE_PSK_WITH_AES_128_CCM"}, {0xC0A7, "TLS_DHE_PSK_WITH_AES_256_CCM"}, {0xC0A8, "TLS_PSK_WITH_AES_128_CCM_8"}, {0xC0A9, "TLS_PSK_WITH_AES_256_CCM_8"}, {0xC0AA, "TLS_PSK_DHE_WITH_AES_128_CCM_8"}, {0xC0AB, "TLS_PSK_DHE_WITH_AES_256_CCM_8"}, {0xC0AC, "TLS_ECDHE_ECDSA_WITH_AES_128_CCM"}, {0xC0AD, "TLS_ECDHE_ECDSA_WITH_AES_256_CCM"}, {0xC0AE, "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8"}, {0xC0AF, "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8"}, {0xCCA8, "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCA9, "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAA, "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAB, "TLS_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAC, "TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAD, "TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0xCCAE, "TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256"}, {0x1301, "TLS_AES_128_GCM_SHA256"}, {0x1302, "TLS_AES_256_GCM_SHA384"}, {0x1303, "TLS_CHACHA20_POLY1305_SHA256"}, {0x1304, "TLS_AES_128_CCM_SHA256"}, {0x1305, "TLS_AES_128_CCM_8_SHA256"}, {0xFEFE, "SSL_RSA_FIPS_WITH_DES_CBC_SHA"}, {0xFEFF, "SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA"}, }; static const char *get_std_name_by_id(int id) { size_t i; for (i = 0; i < OSSL_NELEM(cipher_names); i++) if (cipher_names[i].id == id) return cipher_names[i].name; return NULL; } static int test_cipher_name(void) { SSL_CTX *ctx = NULL; SSL *ssl = NULL; const SSL_CIPHER *c; STACK_OF(SSL_CIPHER) *sk = NULL; const char *ciphers = "ALL:eNULL", *p, *q, *r; int i, id = 0, ret = 0; p = SSL_CIPHER_standard_name(NULL); if (!TEST_str_eq(p, "(NONE)")) { TEST_info("test_cipher_name(std) failed: NULL input doesn't return \"(NONE)\"\n"); goto err; } p = OPENSSL_cipher_name(NULL); if (!TEST_str_eq(p, "(NONE)")) { TEST_info("test_cipher_name(ossl) failed: NULL input doesn't return \"(NONE)\"\n"); goto err; } p = OPENSSL_cipher_name("This is not a valid cipher"); if (!TEST_str_eq(p, "(NONE)")) { TEST_info("test_cipher_name(ossl) failed: invalid input doesn't return \"(NONE)\"\n"); goto err; } ctx = SSL_CTX_new(TLS_server_method()); if (ctx == NULL) { TEST_info("test_cipher_name failed: internal error\n"); goto err; } if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { TEST_info("test_cipher_name failed: internal error\n"); goto err; } ssl = SSL_new(ctx); if (ssl == NULL) { TEST_info("test_cipher_name failed: internal error\n"); goto err; } sk = SSL_get_ciphers(ssl); if (sk == NULL) { TEST_info("test_cipher_name failed: internal error\n"); goto err; } for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) { c = sk_SSL_CIPHER_value(sk, i); id = SSL_CIPHER_get_id(c) & 0xFFFF; if ((id == 0xC102) || (id == 0xFF85) ||(id == 0xFF87)) continue; p = SSL_CIPHER_standard_name(c); q = get_std_name_by_id(id); if (!TEST_ptr(p)) { TEST_info("test_cipher_name failed: expected %s, got NULL, cipher %x\n", q, id); goto err; } if (!TEST_str_eq(p, q)) { TEST_info("test_cipher_name(std) failed: expected %s, got %s, cipher %x\n", q, p, id); goto err; } q = SSL_CIPHER_get_name(c); r = OPENSSL_cipher_name(p); if (!TEST_str_eq(r, q)) { TEST_info("test_cipher_name(ossl) failed: expected %s, got %s, cipher %x\n", q, r, id); goto err; } } ret = 1; err: SSL_CTX_free(ctx); SSL_free(ssl); return ret; } int setup_tests(void) { ADD_TEST(test_cipher_name); return 1; }
test
openssl/test/ciphername_test.c
openssl
#include <openssl/crypto.h> #include "testutil.h" #include "internal/e_os.h" static int test_sec_mem(void) { #ifndef OPENSSL_NO_SECURE_MEMORY int testresult = 0; char *p = NULL, *q = NULL, *r = NULL, *s = NULL; TEST_info("Secure memory is implemented."); s = OPENSSL_secure_malloc(20); if (!TEST_ptr(s) || !TEST_false(CRYPTO_secure_allocated(s))) goto end; r = OPENSSL_secure_malloc(20); if (!TEST_ptr(r) || !TEST_true(CRYPTO_secure_malloc_init(4096, 32)) || !TEST_false(CRYPTO_secure_allocated(r))) goto end; p = OPENSSL_secure_malloc(20); if (!TEST_ptr(p) || !TEST_true(CRYPTO_secure_allocated(p)) || !TEST_size_t_eq(CRYPTO_secure_used(), 32)) goto end; q = OPENSSL_malloc(20); if (!TEST_ptr(q)) goto end; if (!TEST_false(CRYPTO_secure_allocated(q))) goto end; OPENSSL_secure_clear_free(s, 20); s = OPENSSL_secure_malloc(20); if (!TEST_ptr(s) || !TEST_true(CRYPTO_secure_allocated(s)) || !TEST_size_t_eq(CRYPTO_secure_used(), 64)) goto end; OPENSSL_secure_clear_free(p, 20); p = NULL; if (!TEST_size_t_eq(CRYPTO_secure_used(), 32)) goto end; OPENSSL_free(q); q = NULL; if (!TEST_false(CRYPTO_secure_malloc_done()) || !TEST_true(CRYPTO_secure_malloc_initialized())) goto end; OPENSSL_secure_free(s); s = NULL; if (!TEST_size_t_eq(CRYPTO_secure_used(), 0) || !TEST_true(CRYPTO_secure_malloc_done()) || !TEST_false(CRYPTO_secure_malloc_initialized())) goto end; TEST_info("Possible infinite loop: allocate more than available"); if (!TEST_true(CRYPTO_secure_malloc_init(32768, 16))) goto end; TEST_ptr_null(OPENSSL_secure_malloc((size_t)-1)); TEST_true(CRYPTO_secure_malloc_done()); if (TEST_false(CRYPTO_secure_malloc_init(16, 16)) && !TEST_false(CRYPTO_secure_malloc_initialized())) { TEST_true(CRYPTO_secure_malloc_done()); goto end; } # if 0 if (sizeof(size_t) > 4) { TEST_info("Possible infinite loop: 1<<31 limit"); if (TEST_true(CRYPTO_secure_malloc_init((size_t)1<<34, 1<<4) != 0)) TEST_true(CRYPTO_secure_malloc_done()); } # endif testresult = 1; end: OPENSSL_secure_free(p); OPENSSL_free(q); OPENSSL_secure_free(r); OPENSSL_secure_free(s); return testresult; #else TEST_info("Secure memory is *not* implemented."); return TEST_false(CRYPTO_secure_malloc_init(4096, 32)); #endif } static int test_sec_mem_clear(void) { #ifndef OPENSSL_NO_SECURE_MEMORY const int size = 64; unsigned char *p = NULL; int i, res = 0; if (!TEST_true(CRYPTO_secure_malloc_init(4096, 32)) || !TEST_ptr(p = OPENSSL_secure_malloc(size))) goto err; for (i = 0; i < size; i++) if (!TEST_uchar_eq(p[i], 0)) goto err; for (i = 0; i < size; i++) p[i] = (unsigned char)(i + ' ' + 1); OPENSSL_secure_free(p); for (i = sizeof(void *) * 2; i < size; i++) if (!TEST_uchar_eq(p[i], 0)) return 0; res = 1; p = NULL; err: OPENSSL_secure_free(p); CRYPTO_secure_malloc_done(); return res; #else return 1; #endif } int setup_tests(void) { ADD_TEST(test_sec_mem); ADD_TEST(test_sec_mem_clear); return 1; }
test
openssl/test/secmemtest.c
openssl
#include <string.h> #include <openssl/opensslconf.h> #include "testutil.h" #ifndef OPENSSL_NO_SM4 # include "crypto/sm4.h" static int test_sm4_ecb(void) { static const uint8_t k[SM4_BLOCK_SIZE] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }; static const uint8_t input[SM4_BLOCK_SIZE] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef, 0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10 }; static const uint8_t expected[SM4_BLOCK_SIZE] = { 0x68, 0x1e, 0xdf, 0x34, 0xd2, 0x06, 0x96, 0x5e, 0x86, 0xb3, 0xe9, 0x4f, 0x53, 0x6e, 0x42, 0x46 }; static const uint8_t expected_iter[SM4_BLOCK_SIZE] = { 0x59, 0x52, 0x98, 0xc7, 0xc6, 0xfd, 0x27, 0x1f, 0x04, 0x02, 0xf8, 0x04, 0xc3, 0x3d, 0x3f, 0x66 }; int i; SM4_KEY key; uint8_t block[SM4_BLOCK_SIZE]; ossl_sm4_set_key(k, &key); memcpy(block, input, SM4_BLOCK_SIZE); ossl_sm4_encrypt(block, block, &key); if (!TEST_mem_eq(block, SM4_BLOCK_SIZE, expected, SM4_BLOCK_SIZE)) return 0; for (i = 0; i != 999999; ++i) ossl_sm4_encrypt(block, block, &key); if (!TEST_mem_eq(block, SM4_BLOCK_SIZE, expected_iter, SM4_BLOCK_SIZE)) return 0; for (i = 0; i != 1000000; ++i) ossl_sm4_decrypt(block, block, &key); if (!TEST_mem_eq(block, SM4_BLOCK_SIZE, input, SM4_BLOCK_SIZE)) return 0; return 1; } #endif int setup_tests(void) { #ifndef OPENSSL_NO_SM4 ADD_TEST(test_sm4_ecb); #endif return 1; }
test
openssl/test/sm4_internal_test.c
openssl
#include "internal/packet.h" #include "internal/quic_cfq.h" #include "internal/quic_wire.h" #include "testutil.h" static const unsigned char ref_buf[] = { 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19 }; static const uint32_t ref_priority[] = { 90, 80, 70, 60, 95, 40, 94, 20, 10, 0 }; static const uint32_t ref_pn_space[] = { QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_HANDSHAKE, QUIC_PN_SPACE_HANDSHAKE, QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_INITIAL, QUIC_PN_SPACE_APP, QUIC_PN_SPACE_APP, }; static const uint64_t ref_frame_type[] = { OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID, OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID, }; static const uint32_t expect[QUIC_PN_SPACE_NUM][11] = { { 4, 6, 0, 3, 5, 7, UINT32_MAX }, { 1, 2, UINT32_MAX }, { 8, 9, UINT32_MAX }, }; static QUIC_CFQ_ITEM *items[QUIC_PN_SPACE_NUM][10]; static unsigned char *g_free; static size_t g_free_len; static void free_cb(unsigned char *buf, size_t buf_len, void *arg) { g_free = buf; g_free_len = buf_len; } static int check(QUIC_CFQ *cfq) { int testresult = 0; QUIC_CFQ_ITEM *item; size_t i; uint32_t pn_space; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) for (i = 0, item = ossl_quic_cfq_get_priority_head(cfq, pn_space);; ++i, item = ossl_quic_cfq_item_get_priority_next(item, pn_space)) { if (expect[pn_space][i] == UINT32_MAX) { if (!TEST_ptr_null(item)) goto err; break; } items[pn_space][i] = item; if (!TEST_ptr(item) || !TEST_ptr_eq(ossl_quic_cfq_item_get_encoded(item), ref_buf + expect[pn_space][i]) || !TEST_int_eq(ossl_quic_cfq_item_get_pn_space(item), pn_space) || !TEST_int_eq(ossl_quic_cfq_item_get_state(item), QUIC_CFQ_STATE_NEW)) goto err; } testresult = 1; err: return testresult; } static int test_cfq(void) { int testresult = 0; QUIC_CFQ *cfq = NULL; QUIC_CFQ_ITEM *item, *inext; size_t i; uint32_t pn_space; if (!TEST_ptr(cfq = ossl_quic_cfq_new())) goto err; g_free = NULL; g_free_len = 0; for (i = 0; i < OSSL_NELEM(ref_buf); ++i) { if (!TEST_ptr(item = ossl_quic_cfq_add_frame(cfq, ref_priority[i], ref_pn_space[i], ref_frame_type[i], 0, ref_buf + i, 1, free_cb, NULL)) || !TEST_int_eq(ossl_quic_cfq_item_get_state(item), QUIC_CFQ_STATE_NEW) || !TEST_uint_eq(ossl_quic_cfq_item_get_pn_space(item), ref_pn_space[i]) || !TEST_uint64_t_eq(ossl_quic_cfq_item_get_frame_type(item), ref_frame_type[i]) || !TEST_ptr_eq(ossl_quic_cfq_item_get_encoded(item), ref_buf + i) || !TEST_size_t_eq(ossl_quic_cfq_item_get_encoded_len(item), 1)) goto err; } if (!check(cfq)) goto err; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) for (item = ossl_quic_cfq_get_priority_head(cfq, pn_space); item != NULL; item = inext) { inext = ossl_quic_cfq_item_get_priority_next(item, pn_space); ossl_quic_cfq_mark_tx(cfq, item); } for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) if (!TEST_ptr_null(ossl_quic_cfq_get_priority_head(cfq, pn_space))) goto err; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) for (i = 0; i < OSSL_NELEM(items[0]); ++i) if (items[pn_space][i] != NULL) ossl_quic_cfq_mark_lost(cfq, items[pn_space][i], UINT32_MAX); if (!check(cfq)) goto err; for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) for (i = 0; i < OSSL_NELEM(items[0]); ++i) if (items[pn_space][i] != NULL) ossl_quic_cfq_release(cfq, items[pn_space][i]); for (pn_space = QUIC_PN_SPACE_INITIAL; pn_space < QUIC_PN_SPACE_NUM; ++pn_space) if (!TEST_ptr_null(ossl_quic_cfq_get_priority_head(cfq, pn_space))) goto err; testresult = 1; err: ossl_quic_cfq_free(cfq); return testresult; } int setup_tests(void) { ADD_TEST(test_cfq); return 1; }
test
openssl/test/quic_cfq_test.c
openssl
#include "testutil.h" #include <openssl/ssl.h> #include "internal/quic_ackm.h" #include "internal/quic_cc.h" static OSSL_TIME fake_time = {0}; #define TIME_BASE (ossl_ticks2time(123 * OSSL_TIME_SECOND)) static OSSL_TIME fake_now(void *arg) { return fake_time; } struct pkt_info { OSSL_ACKM_TX_PKT *pkt; int lost, acked, discarded; }; static void on_lost(void *arg) { struct pkt_info *info = arg; ++info->lost; } static void on_acked(void *arg) { struct pkt_info *info = arg; ++info->acked; } static void on_discarded(void *arg) { struct pkt_info *info = arg; ++info->discarded; } struct helper { OSSL_ACKM *ackm; struct pkt_info *pkts; size_t num_pkts; OSSL_CC_DATA *ccdata; OSSL_STATM statm; int have_statm; }; static void helper_destroy(struct helper *h) { size_t i; if (h->ackm != NULL) { ossl_ackm_free(h->ackm); h->ackm = NULL; } if (h->ccdata != NULL) { ossl_cc_dummy_method.free(h->ccdata); h->ccdata = NULL; } if (h->have_statm) { ossl_statm_destroy(&h->statm); h->have_statm = 0; } if (h->pkts != NULL) { for (i = 0; i < h->num_pkts; ++i) { OPENSSL_free(h->pkts[i].pkt); h->pkts[i].pkt = NULL; } OPENSSL_free(h->pkts); h->pkts = NULL; } } static int helper_init(struct helper *h, size_t num_pkts) { int rc = 0; memset(h, 0, sizeof(*h)); fake_time = TIME_BASE; if (!TEST_int_eq(ossl_statm_init(&h->statm), 1)) goto err; h->have_statm = 1; h->ccdata = ossl_cc_dummy_method.new(fake_now, NULL); if (!TEST_ptr(h->ccdata)) goto err; h->ackm = ossl_ackm_new(fake_now, NULL, &h->statm, &ossl_cc_dummy_method, h->ccdata); if (!TEST_ptr(h->ackm)) goto err; h->num_pkts = num_pkts; if (num_pkts > 0) { h->pkts = OPENSSL_zalloc(sizeof(struct pkt_info) * num_pkts); if (!TEST_ptr(h->pkts)) goto err; } else { h->pkts = NULL; } rc = 1; err: if (rc == 0) helper_destroy(h); return rc; } static const QUIC_PN linear_20[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 }; static const QUIC_PN high_linear_20[] = { 1000, 1001, 1002, 1003, 1004, 1005, 1006, 1007, 1008, 1009, 1010, 1011, 1012, 1013, 1014, 1015, 1016, 1017, 1018, 1019 }; struct tx_ack_test_case { const QUIC_PN *pn_table; size_t pn_table_len; const OSSL_QUIC_ACK_RANGE *ack_ranges; size_t num_ack_ranges; const char *expect_ack; }; #define DEFINE_TX_ACK_CASE(n, pntable) \ static const struct tx_ack_test_case tx_ack_case_##n = { \ (pntable), OSSL_NELEM(pntable), \ tx_ack_range_##n, OSSL_NELEM(tx_ack_range_##n), \ tx_ack_expect_##n \ } static const OSSL_QUIC_ACK_RANGE tx_ack_range_1[] = { { 0, 10 }, }; static const char tx_ack_expect_1[] = { 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(1, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_2[] = { { 5, 10 }, { 0, 5 } }; static const char tx_ack_expect_2[] = { 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(2, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_3[] = { { 6, 10 }, { 0, 5 } }; static const char tx_ack_expect_3[] = { 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(3, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_4[] = { { 7, 10 }, { 0, 5 } }; static const char tx_ack_expect_4[] = { 1, 1, 1, 1, 1, 1, 2, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(4, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_5[] = { { 7, 10 }, { 0, 4 } }; static const char tx_ack_expect_5[] = { 1, 1, 1, 1, 1, 2, 2, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(5, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_6[] = { { 0, 20 }, }; static const char tx_ack_expect_6[] = { 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 }; DEFINE_TX_ACK_CASE(6, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_7[] = { { 0, 30 }, }; static const char tx_ack_expect_7[] = { 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 }; DEFINE_TX_ACK_CASE(7, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_8[] = { { 21, 30 }, }; static const char tx_ack_expect_8[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(8, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_9[] = { { 0, 999 }, }; static const char tx_ack_expect_9[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(9, high_linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_10[] = { { 0, 0 }, }; static const char tx_ack_expect_10[] = { 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(10, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_11[] = { { 3, 3 }, }; static const char tx_ack_expect_11[] = { 2, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(11, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_12[] = { { 19, 19 }, }; static const char tx_ack_expect_12[] = { 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 0, 0, 1 }; DEFINE_TX_ACK_CASE(12, linear_20); static const OSSL_QUIC_ACK_RANGE tx_ack_range_13[] = { { 1008, 1008 }, { 1004, 1005 }, { 1001, 1002 } }; static const char tx_ack_expect_13[] = { 2, 1, 1, 2, 1, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; DEFINE_TX_ACK_CASE(13, high_linear_20); static const struct tx_ack_test_case *const tx_ack_cases[] = { &tx_ack_case_1, &tx_ack_case_2, &tx_ack_case_3, &tx_ack_case_4, &tx_ack_case_5, &tx_ack_case_6, &tx_ack_case_7, &tx_ack_case_8, &tx_ack_case_9, &tx_ack_case_10, &tx_ack_case_11, &tx_ack_case_12, &tx_ack_case_13, }; enum { MODE_ACK, MODE_DISCARD, MODE_PTO, MODE_NUM }; static int test_probe_counts(const OSSL_ACKM_PROBE_INFO *p, uint32_t anti_deadlock_handshake, uint32_t anti_deadlock_initial, uint32_t pto_initial, uint32_t pto_handshake, uint32_t pto_app) { if (!TEST_uint_eq(p->anti_deadlock_handshake, anti_deadlock_handshake)) return 0; if (!TEST_uint_eq(p->anti_deadlock_initial, anti_deadlock_initial)) return 0; if (!TEST_uint_eq(p->pto[QUIC_PN_SPACE_INITIAL], pto_initial)) return 0; if (!TEST_uint_eq(p->pto[QUIC_PN_SPACE_HANDSHAKE], pto_handshake)) return 0; if (!TEST_uint_eq(p->pto[QUIC_PN_SPACE_APP], pto_app)) return 0; return 1; } static void on_loss_detection_deadline_callback(OSSL_TIME deadline, void *arg) { *(OSSL_TIME *)arg = deadline; } static int test_tx_ack_case_actual(int tidx, int space, int mode) { int testresult = 0; struct helper h; size_t i; OSSL_ACKM_TX_PKT *tx; const struct tx_ack_test_case *c = tx_ack_cases[tidx]; OSSL_QUIC_FRAME_ACK ack = {0}; OSSL_TIME loss_detection_deadline = ossl_time_zero(); if (mode == MODE_DISCARD && space == QUIC_PN_SPACE_APP) { TEST_skip("skipping test for app space"); return 1; } if (!TEST_int_eq(helper_init(&h, c->pn_table_len), 1)) goto err; ossl_ackm_set_loss_detection_deadline_callback(h.ackm, on_loss_detection_deadline_callback, &loss_detection_deadline); for (i = 0; i < c->pn_table_len; ++i) { h.pkts[i].pkt = tx = OPENSSL_zalloc(sizeof(*tx)); if (!TEST_ptr(tx)) goto err; tx->pkt_num = c->pn_table[i]; tx->pkt_space = space; tx->is_inflight = 1; tx->is_ack_eliciting = 1; tx->num_bytes = 123; tx->largest_acked = QUIC_PN_INVALID; tx->on_lost = on_lost; tx->on_acked = on_acked; tx->on_discarded = on_discarded; tx->cb_arg = &h.pkts[i]; tx->time = fake_time; if (!TEST_int_eq(ossl_ackm_on_tx_packet(h.ackm, tx), 1)) goto err; } if (mode == MODE_DISCARD) { if (!TEST_int_eq(ossl_ackm_on_pkt_space_discarded(h.ackm, space), 1)) goto err; for (i = 0; i < c->pn_table_len; ++i) { if (!TEST_int_eq(h.pkts[i].acked, 0)) goto err; if (!TEST_int_eq(h.pkts[i].lost, 0)) goto err; if (!TEST_int_eq(h.pkts[i].discarded, 1)) goto err; } } else if (mode == MODE_ACK) { ack.ack_ranges = (OSSL_QUIC_ACK_RANGE *)c->ack_ranges; ack.num_ack_ranges = c->num_ack_ranges; if (!TEST_int_eq(ossl_ackm_on_rx_ack_frame(h.ackm, &ack, space, fake_time), 1)) goto err; for (i = 0; i < c->pn_table_len; ++i) { if (!TEST_int_eq(h.pkts[i].acked, (c->expect_ack[i] & 1) != 0 ? 1 : 0)) goto err; if (!TEST_int_eq(h.pkts[i].lost, (c->expect_ack[i] & 2) != 0 ? 1 : 0)) goto err; if (!TEST_int_eq(h.pkts[i].discarded, (c->expect_ack[i] & 4) != 0 ? 1 : 0)) goto err; } } else if (mode == MODE_PTO) { OSSL_TIME deadline = ossl_ackm_get_loss_detection_deadline(h.ackm); OSSL_ACKM_PROBE_INFO probe; if (!TEST_int_eq(ossl_time_compare(deadline, loss_detection_deadline), 0)) goto err; if (!TEST_int_gt(ossl_time_compare(deadline, fake_time), 0)) goto err; probe = *ossl_ackm_get0_probe_request(h.ackm); if (!TEST_int_eq(test_probe_counts(&probe, 0, 0, 0, 0, 0), 1)) goto err; if (space == QUIC_PN_SPACE_APP) if (!TEST_int_eq(ossl_ackm_on_handshake_confirmed(h.ackm), 1)) goto err; fake_time = ossl_time_add(deadline, ossl_ticks2time(1)); if (!TEST_int_eq(ossl_ackm_on_timeout(h.ackm), 1)) goto err; for (i = 0; i < 3; ++i) { probe = *ossl_ackm_get0_probe_request(h.ackm); if (i > 0) memset(ossl_ackm_get0_probe_request(h.ackm), 0, sizeof(probe)); if (i == 2) { if (!TEST_int_eq(test_probe_counts(&probe, 0, 0, 0, 0, 0), 1)) goto err; } else { if (!TEST_int_eq(test_probe_counts(&probe, 0, 0, space == QUIC_PN_SPACE_INITIAL, space == QUIC_PN_SPACE_HANDSHAKE, space == QUIC_PN_SPACE_APP), 1)) goto err; } } } else goto err; testresult = 1; err: helper_destroy(&h); return testresult; } enum { TX_ACK_TIME_OP_END, TX_ACK_TIME_OP_PKT, TX_ACK_TIME_OP_ACK, TX_ACK_TIME_OP_EXPECT }; struct tx_ack_time_op { int kind; uint64_t time_advance; QUIC_PN pn; size_t num_pn; const char *expect; }; #define TX_OP_PKT(advance, pn, num_pn) \ { TX_ACK_TIME_OP_PKT, (advance) * OSSL_TIME_MS, (pn), (num_pn), NULL }, #define TX_OP_ACK(advance, pn, num_pn) \ { TX_ACK_TIME_OP_ACK, (advance) * OSSL_TIME_MS, (pn), (num_pn), NULL }, #define TX_OP_EXPECT(expect) \ { TX_ACK_TIME_OP_EXPECT, 0, 0, 0, (expect) }, #define TX_OP_END { TX_ACK_TIME_OP_END } static const char tx_ack_time_script_1_expect[] = { 2, 1 }; static const struct tx_ack_time_op tx_ack_time_script_1[] = { TX_OP_PKT ( 0, 0, 1) TX_OP_PKT (3600000, 1, 1) TX_OP_ACK ( 1000, 1, 1) TX_OP_EXPECT(tx_ack_time_script_1_expect) TX_OP_END }; static const struct tx_ack_time_op *const tx_ack_time_scripts[] = { tx_ack_time_script_1, }; static int test_tx_ack_time_script(int tidx) { int testresult = 0; struct helper h; OSSL_ACKM_TX_PKT *tx = NULL; OSSL_QUIC_FRAME_ACK ack = {0}; OSSL_QUIC_ACK_RANGE ack_range = {0}; size_t i, num_pkts = 0, pkt_idx = 0; const struct tx_ack_time_op *script = tx_ack_time_scripts[tidx], *s; for (s = script; s->kind != TX_ACK_TIME_OP_END; ++s) if (s->kind == TX_ACK_TIME_OP_PKT) num_pkts += s->num_pn; if (!TEST_int_eq(helper_init(&h, num_pkts), 1)) goto err; for (i = 0; i < num_pkts; ++i) { h.pkts[i].pkt = tx = OPENSSL_zalloc(sizeof(*tx)); if (!TEST_ptr(tx)) goto err; } for (s = script; s->kind != TX_ACK_TIME_OP_END; ++s) switch (s->kind) { case TX_ACK_TIME_OP_PKT: for (i = 0; i < s->num_pn; ++i) { tx = h.pkts[pkt_idx + i].pkt; tx->pkt_num = s->pn + i; tx->pkt_space = QUIC_PN_SPACE_INITIAL; tx->num_bytes = 123; tx->largest_acked = QUIC_PN_INVALID; tx->is_inflight = 1; tx->is_ack_eliciting = 1; tx->on_lost = on_lost; tx->on_acked = on_acked; tx->on_discarded = on_discarded; tx->cb_arg = &h.pkts[pkt_idx + i]; fake_time = ossl_time_add(fake_time, ossl_ticks2time(s->time_advance)); tx->time = fake_time; if (!TEST_int_eq(ossl_ackm_on_tx_packet(h.ackm, tx), 1)) goto err; } pkt_idx += s->num_pn; break; case TX_ACK_TIME_OP_ACK: ack.ack_ranges = &ack_range; ack.num_ack_ranges = 1; ack_range.start = s->pn; ack_range.end = s->pn + s->num_pn; fake_time = ossl_time_add(fake_time, ossl_ticks2time(s->time_advance)); if (!TEST_int_eq(ossl_ackm_on_rx_ack_frame(h.ackm, &ack, QUIC_PN_SPACE_INITIAL, fake_time), 1)) goto err; break; case TX_ACK_TIME_OP_EXPECT: for (i = 0; i < num_pkts; ++i) { if (!TEST_int_eq(h.pkts[i].acked, (s->expect[i] & 1) != 0 ? 1 : 0)) goto err; if (!TEST_int_eq(h.pkts[i].lost, (s->expect[i] & 2) != 0 ? 1 : 0)) goto err; if (!TEST_int_eq(h.pkts[i].discarded, (s->expect[i] & 4) != 0 ? 1 : 0)) goto err; } break; } testresult = 1; err: helper_destroy(&h); return testresult; } enum { RX_OPK_END, RX_OPK_PKT, RX_OPK_CHECK_UNPROC, RX_OPK_CHECK_PROC, RX_OPK_CHECK_STATE, RX_OPK_CHECK_ACKS, RX_OPK_TX, RX_OPK_RX_ACK, RX_OPK_SKIP_IF_PN_SPACE }; struct rx_test_op { int kind; uint64_t time_advance; QUIC_PN pn; size_t num_pn; char expect_desired; char expect_deadline; const OSSL_QUIC_ACK_RANGE *ack_ranges; size_t num_ack_ranges; QUIC_PN largest_acked; }; #define RX_OP_PKT(advance, pn, num_pn) \ { \ RX_OPK_PKT, (advance) * OSSL_TIME_MS, (pn), (num_pn), \ 0, 0, NULL, 0, 0 \ }, #define RX_OP_CHECK_UNPROC(advance, pn, num_pn) \ { \ RX_OPK_CHECK_UNPROC, (advance) * OSSL_TIME_MS, (pn), (num_pn),\ 0, 0, NULL, 0, 0 \ }, #define RX_OP_CHECK_PROC(advance, pn, num_pn) \ { \ RX_OPK_CHECK_PROC, (advance) * OSSL_TIME_MS, (pn), (num_pn), \ 0, 0, NULL, 0, 0 \ }, #define RX_OP_CHECK_STATE(advance, expect_desired, expect_deadline) \ { \ RX_OPK_CHECK_STATE, (advance) * OSSL_TIME_MS, 0, 0, \ (expect_desired), (expect_deadline), NULL, 0, 0 \ }, #define RX_OP_CHECK_ACKS(advance, ack_ranges) \ { \ RX_OPK_CHECK_ACKS, (advance) * OSSL_TIME_MS, 0, 0, \ 0, 0, (ack_ranges), OSSL_NELEM(ack_ranges), 0 \ }, #define RX_OP_CHECK_NO_ACKS(advance) \ { \ RX_OPK_CHECK_ACKS, (advance) * OSSL_TIME_MS, 0, 0, \ 0, 0, NULL, 0, 0 \ }, #define RX_OP_TX(advance, pn, largest_acked) \ { \ RX_OPK_TX, (advance) * OSSL_TIME_MS, (pn), 1, \ 0, 0, NULL, 0, (largest_acked) \ }, #define RX_OP_RX_ACK(advance, pn, num_pn) \ { \ RX_OPK_RX_ACK, (advance) * OSSL_TIME_MS, (pn), (num_pn), \ 0, 0, NULL, 0, 0 \ }, #define RX_OP_SKIP_IF_PN_SPACE(pn_space) \ { \ RX_OPK_SKIP_IF_PN_SPACE, 0, (pn_space), 0, \ 0, 0, NULL, 0, 0 \ }, #define RX_OP_END \ { RX_OPK_END } static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_1a[] = { { 0, 1 } }; static const struct rx_test_op rx_script_1[] = { RX_OP_CHECK_STATE (0, 0, 0) RX_OP_CHECK_PROC (0, 0, 3) RX_OP_PKT (0, 0, 2) RX_OP_CHECK_UNPROC (0, 0, 2) RX_OP_CHECK_PROC (0, 2, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_1a) RX_OP_TX (0, 0, 1) RX_OP_CHECK_ACKS (0, rx_ack_ranges_1a) RX_OP_RX_ACK (0, 0, 1) RX_OP_CHECK_NO_ACKS (0) RX_OP_CHECK_UNPROC (0, 0, 2) RX_OP_CHECK_PROC (0, 2, 1) RX_OP_END }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_2a[] = { { 0, 0 } }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_2b[] = { { 0, 2 } }; static const struct rx_test_op rx_script_2[] = { RX_OP_SKIP_IF_PN_SPACE(QUIC_PN_SPACE_INITIAL) RX_OP_SKIP_IF_PN_SPACE(QUIC_PN_SPACE_HANDSHAKE) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_CHECK_PROC (0, 0, 3) RX_OP_PKT (0, 0, 1) RX_OP_CHECK_UNPROC (0, 0, 1) RX_OP_CHECK_PROC (0, 1, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_2a) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_PKT (0, 1, 1) RX_OP_CHECK_UNPROC (0, 0, 2) RX_OP_CHECK_PROC (0, 2, 1) RX_OP_CHECK_STATE (0, 0, 1) RX_OP_PKT (0, 2, 1) RX_OP_CHECK_UNPROC (0, 0, 3) RX_OP_CHECK_PROC (0, 3, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_2b) RX_OP_TX (0, 0, 2) RX_OP_CHECK_ACKS (0, rx_ack_ranges_2b) RX_OP_RX_ACK (0, 0, 1) RX_OP_CHECK_NO_ACKS (0) RX_OP_CHECK_UNPROC (0, 0, 3) RX_OP_CHECK_PROC (0, 3, 1) RX_OP_END }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_3a[] = { { 0, 0 } }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_3b[] = { { 0, 10 } }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_3c[] = { { 6, 10 } }; static const struct rx_test_op rx_script_3[] = { RX_OP_CHECK_STATE (0, 0, 0) RX_OP_CHECK_PROC (0, 0, 11) RX_OP_PKT (0, 0, 1) RX_OP_CHECK_UNPROC (0, 0, 1) RX_OP_CHECK_PROC (0, 1, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_3a) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_PKT (0, 1, 10) RX_OP_CHECK_UNPROC (0, 0, 11) RX_OP_CHECK_PROC (0, 11, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_3b) RX_OP_TX (0, 0, QUIC_PN_INVALID) RX_OP_RX_ACK (0, 0, 1) RX_OP_TX (0, 1, 5) RX_OP_CHECK_ACKS (0, rx_ack_ranges_3b) RX_OP_RX_ACK (0, 1, 1) RX_OP_CHECK_ACKS (0, rx_ack_ranges_3c) RX_OP_CHECK_UNPROC (0, 0, 11) RX_OP_CHECK_PROC (0, 11, 1) RX_OP_TX (0, 2, 10) RX_OP_CHECK_ACKS (0, rx_ack_ranges_3c) RX_OP_RX_ACK (0, 2, 1) RX_OP_CHECK_NO_ACKS (0) RX_OP_CHECK_UNPROC (0, 0, 11) RX_OP_CHECK_PROC (0, 11, 1) RX_OP_END }; static const OSSL_QUIC_ACK_RANGE rx_ack_ranges_4a[] = { { 0, 1 } }; static const struct rx_test_op rx_script_4[] = { RX_OP_SKIP_IF_PN_SPACE(QUIC_PN_SPACE_APP) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_CHECK_PROC (0, 0, 3) RX_OP_PKT (0, 0, 1) RX_OP_CHECK_UNPROC (0, 0, 1) RX_OP_CHECK_PROC (0, 1, 1) RX_OP_CHECK_STATE (0, 1, 0) RX_OP_CHECK_ACKS (0, rx_ack_ranges_2a) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_PKT (0, 1, 1) RX_OP_CHECK_UNPROC (0, 0, 2) RX_OP_CHECK_PROC (0, 2, 1) RX_OP_CHECK_STATE (0, 1, 1) RX_OP_CHECK_ACKS (0, rx_ack_ranges_4a) RX_OP_CHECK_STATE (0, 0, 0) RX_OP_TX (0, 0, 1) RX_OP_CHECK_ACKS (0, rx_ack_ranges_4a) RX_OP_RX_ACK (0, 0, 1) RX_OP_CHECK_NO_ACKS (0) RX_OP_CHECK_UNPROC (0, 0, 2) RX_OP_CHECK_PROC (0, 2, 1) RX_OP_END }; static const struct rx_test_op *const rx_test_scripts[] = { rx_script_1, rx_script_2, rx_script_3, rx_script_4 }; static void on_ack_deadline_callback(OSSL_TIME deadline, int pkt_space, void *arg) { ((OSSL_TIME *)arg)[pkt_space] = deadline; } static int test_rx_ack_actual(int tidx, int space) { int testresult = 0; struct helper h; const struct rx_test_op *script = rx_test_scripts[tidx], *s; size_t i, num_tx = 0, txi = 0; const OSSL_QUIC_FRAME_ACK *ack; OSSL_QUIC_FRAME_ACK rx_ack = {0}; OSSL_QUIC_ACK_RANGE rx_ack_range = {0}; struct pkt_info *pkts = NULL; OSSL_ACKM_TX_PKT *txs = NULL, *tx; OSSL_TIME ack_deadline[QUIC_PN_SPACE_NUM]; size_t opn = 0; for (i = 0; i < QUIC_PN_SPACE_NUM; ++i) ack_deadline[i] = ossl_time_infinite(); if (!TEST_int_eq(helper_init(&h, 0), 1)) goto err; ossl_ackm_set_ack_deadline_callback(h.ackm, on_ack_deadline_callback, ack_deadline); for (s = script; s->kind != RX_OPK_END; ++s) if (s->kind == RX_OPK_TX) num_tx += s->num_pn; txs = OPENSSL_zalloc(sizeof(*txs) * num_tx); if (!TEST_ptr(txs)) goto err; pkts = OPENSSL_zalloc(sizeof(*pkts) * num_tx); if (!TEST_ptr(pkts)) goto err; for (s = script; s->kind != RX_OPK_END; ++s, ++opn) { fake_time = ossl_time_add(fake_time, ossl_ticks2time(s->time_advance)); switch (s->kind) { case RX_OPK_PKT: for (i = 0; i < s->num_pn; ++i) { OSSL_ACKM_RX_PKT pkt = {0}; pkt.pkt_num = s->pn + i; pkt.time = fake_time; pkt.pkt_space = space; pkt.is_ack_eliciting = 1; if (!TEST_int_eq(ossl_ackm_is_rx_pn_processable(h.ackm, pkt.pkt_num, pkt.pkt_space), 1)) goto err; if (!TEST_int_eq(ossl_ackm_on_rx_packet(h.ackm, &pkt), 1)) goto err; } break; case RX_OPK_CHECK_UNPROC: case RX_OPK_CHECK_PROC: for (i = 0; i < s->num_pn; ++i) if (!TEST_int_eq(ossl_ackm_is_rx_pn_processable(h.ackm, s->pn + i, space), (s->kind == RX_OPK_CHECK_PROC))) goto err; break; case RX_OPK_CHECK_STATE: if (!TEST_int_eq(ossl_ackm_is_ack_desired(h.ackm, space), s->expect_desired)) goto err; if (!TEST_int_eq(!ossl_time_is_infinite(ossl_ackm_get_ack_deadline(h.ackm, space)) && !ossl_time_is_zero(ossl_ackm_get_ack_deadline(h.ackm, space)), s->expect_deadline)) goto err; for (i = 0; i < QUIC_PN_SPACE_NUM; ++i) { if (i != (size_t)space && !TEST_true(ossl_time_is_infinite(ossl_ackm_get_ack_deadline(h.ackm, i)))) goto err; if (!TEST_int_eq(ossl_time_compare(ossl_ackm_get_ack_deadline(h.ackm, i), ack_deadline[i]), 0)) goto err; } break; case RX_OPK_CHECK_ACKS: ack = ossl_ackm_get_ack_frame(h.ackm, space); if (!TEST_ptr(ack)) goto err; if (!TEST_size_t_eq(ack->num_ack_ranges, s->num_ack_ranges)) goto err; for (i = 0; i < ack->num_ack_ranges; ++i) { if (!TEST_uint64_t_eq(ack->ack_ranges[i].start, s->ack_ranges[i].start)) goto err; if (!TEST_uint64_t_eq(ack->ack_ranges[i].end, s->ack_ranges[i].end)) goto err; } break; case RX_OPK_TX: pkts[txi].pkt = tx = &txs[txi]; tx->pkt_num = s->pn; tx->pkt_space = space; tx->num_bytes = 123; tx->largest_acked = s->largest_acked; tx->is_inflight = 1; tx->is_ack_eliciting = 1; tx->on_lost = on_lost; tx->on_acked = on_acked; tx->on_discarded = on_discarded; tx->cb_arg = &pkts[txi]; tx->time = fake_time; if (!TEST_int_eq(ossl_ackm_on_tx_packet(h.ackm, tx), 1)) goto err; ++txi; break; case RX_OPK_RX_ACK: rx_ack.ack_ranges = &rx_ack_range; rx_ack.num_ack_ranges = 1; rx_ack_range.start = s->pn; rx_ack_range.end = s->pn + s->num_pn - 1; if (!TEST_int_eq(ossl_ackm_on_rx_ack_frame(h.ackm, &rx_ack, space, fake_time), 1)) goto err; break; case RX_OPK_SKIP_IF_PN_SPACE: if (space == (int)s->pn) { testresult = 1; goto err; } break; default: goto err; } } testresult = 1; err: if (!testresult) TEST_error("error in ACKM RX script %d, op %zu", tidx + 1, opn + 1); helper_destroy(&h); OPENSSL_free(pkts); OPENSSL_free(txs); return testresult; } static int test_tx_ack_case(int idx) { int tidx, space; tidx = idx % OSSL_NELEM(tx_ack_cases); idx /= OSSL_NELEM(tx_ack_cases); space = idx % QUIC_PN_SPACE_NUM; idx /= QUIC_PN_SPACE_NUM; return test_tx_ack_case_actual(tidx, space, idx); } static int test_rx_ack(int idx) { int tidx; tidx = idx % OSSL_NELEM(rx_test_scripts); idx /= OSSL_NELEM(rx_test_scripts); return test_rx_ack_actual(tidx, idx); } int setup_tests(void) { ADD_ALL_TESTS(test_tx_ack_case, OSSL_NELEM(tx_ack_cases) * MODE_NUM * QUIC_PN_SPACE_NUM); ADD_ALL_TESTS(test_tx_ack_time_script, OSSL_NELEM(tx_ack_time_scripts)); ADD_ALL_TESTS(test_rx_ack, OSSL_NELEM(rx_test_scripts) * QUIC_PN_SPACE_NUM); return 1; }
test
openssl/test/quic_ackm_test.c
openssl
#include <stdio.h> #include <stdlib.h> #include <openssl/core.h> #include "simpledynamic.h" static int test_load(const char *path, const char *symbol) { #ifdef SD_INIT SD sd = SD_INIT; SD_SYM sym; int ret; if (!sd_load(path, &sd, SD_MODULE)) return 0; ret = symbol == NULL || sd_sym(sd, symbol, &sym); if (!sd_close(sd)) ret = 0; return ret; #else fprintf(stderr, "No dynamic loader\n"); return 0; #endif } int main(int argc, char *argv[]) { const char *m, *s; if (argc != 2 && argc != 3) { fprintf(stderr, "Usage: %s sharedobject [ entrypoint ]\n", argv[0]); return 1; } m = argv[1]; s = argc == 3 ? argv[2] : NULL; return test_load(m, s) ? 0 : 1; }
test
openssl/test/moduleloadtest.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <stdio.h> #include <string.h> #include <stdlib.h> #include <ctype.h> #include <openssl/evp.h> #include <openssl/pem.h> #include <openssl/err.h> #include <openssl/provider.h> #include <openssl/x509v3.h> #include <openssl/pkcs12.h> #include <openssl/kdf.h> #include <openssl/params.h> #include <openssl/core_names.h> #include <openssl/fips_names.h> #include <openssl/thread.h> #include "internal/numbers.h" #include "internal/nelem.h" #include "crypto/evp.h" #include "testutil.h" typedef struct evp_test_buffer_st EVP_TEST_BUFFER; DEFINE_STACK_OF(EVP_TEST_BUFFER) #define AAD_NUM 4 typedef struct evp_test_method_st EVP_TEST_METHOD; typedef struct evp_test_st { STANZA s; char *name; int skip; const EVP_TEST_METHOD *meth; const char *err, *aux_err; char *expected_err; char *reason; void *data; } EVP_TEST; struct evp_test_method_st { const char *name; int (*init) (EVP_TEST *t, const char *alg); void (*cleanup) (EVP_TEST *t); int (*parse) (EVP_TEST *t, const char *name, const char *value); int (*run_test) (EVP_TEST *t); }; typedef struct key_list_st { char *name; EVP_PKEY *key; struct key_list_st *next; } KEY_LIST; typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_CONFIG_FILE, OPT_IN_PLACE, OPT_PROVIDER_NAME, OPT_PROV_PROPQUERY, OPT_TEST_ENUM } OPTION_CHOICE; static OSSL_PROVIDER *prov_null = NULL; static OSSL_PROVIDER *libprov = NULL; static OSSL_LIB_CTX *libctx = NULL; static KEY_LIST *private_keys; static KEY_LIST *public_keys; static int find_key(EVP_PKEY **ppk, const char *name, KEY_LIST *lst); static int parse_bin(const char *value, unsigned char **buf, size_t *buflen); static int is_digest_disabled(const char *name); static int is_pkey_disabled(const char *name); static int is_mac_disabled(const char *name); static int is_cipher_disabled(const char *name); static int is_kdf_disabled(const char *name); static int memory_err_compare(EVP_TEST *t, const char *err, const void *expected, size_t expected_len, const void *got, size_t got_len) { int r; if (t->expected_err != NULL && strcmp(t->expected_err, err) == 0) r = !TEST_mem_ne(expected, expected_len, got, got_len); else r = TEST_mem_eq(expected, expected_len, got, got_len); if (!r) t->err = err; return r; } static int process_mode_in_place; static const char *propquery = NULL; static int evp_test_process_mode(char *mode) { if (strcmp(mode, "in_place") == 0) return 1; else if (strcmp(mode, "both") == 0) return 0; return -1; } struct evp_test_buffer_st { unsigned char *buf; size_t buflen; size_t count; int count_set; }; static void evp_test_buffer_free(EVP_TEST_BUFFER *db) { if (db != NULL) { OPENSSL_free(db->buf); OPENSSL_free(db); } } static int evp_test_buffer_append(const char *value, STACK_OF(EVP_TEST_BUFFER) **sk) { EVP_TEST_BUFFER *db = NULL; if (!TEST_ptr(db = OPENSSL_malloc(sizeof(*db)))) goto err; if (!parse_bin(value, &db->buf, &db->buflen)) goto err; db->count = 1; db->count_set = 0; if (*sk == NULL && !TEST_ptr(*sk = sk_EVP_TEST_BUFFER_new_null())) goto err; if (!sk_EVP_TEST_BUFFER_push(*sk, db)) goto err; return 1; err: evp_test_buffer_free(db); return 0; } static int evp_test_buffer_ncopy(const char *value, STACK_OF(EVP_TEST_BUFFER) *sk) { EVP_TEST_BUFFER *db; unsigned char *tbuf, *p; size_t tbuflen; int ncopy = atoi(value); int i; if (ncopy <= 0) return 0; if (sk == NULL || sk_EVP_TEST_BUFFER_num(sk) == 0) return 0; db = sk_EVP_TEST_BUFFER_value(sk, sk_EVP_TEST_BUFFER_num(sk) - 1); tbuflen = db->buflen * ncopy; if (!TEST_ptr(tbuf = OPENSSL_malloc(tbuflen))) return 0; for (i = 0, p = tbuf; i < ncopy; i++, p += db->buflen) memcpy(p, db->buf, db->buflen); OPENSSL_free(db->buf); db->buf = tbuf; db->buflen = tbuflen; return 1; } static int evp_test_buffer_set_count(const char *value, STACK_OF(EVP_TEST_BUFFER) *sk) { EVP_TEST_BUFFER *db; int count = atoi(value); if (count <= 0) return 0; if (sk == NULL || sk_EVP_TEST_BUFFER_num(sk) == 0) return 0; db = sk_EVP_TEST_BUFFER_value(sk, sk_EVP_TEST_BUFFER_num(sk) - 1); if (db->count_set != 0) return 0; db->count = (size_t)count; db->count_set = 1; return 1; } static int evp_test_buffer_do(STACK_OF(EVP_TEST_BUFFER) *sk, int (*fn)(void *ctx, const unsigned char *buf, size_t buflen), void *ctx) { int i; for (i = 0; i < sk_EVP_TEST_BUFFER_num(sk); i++) { EVP_TEST_BUFFER *tb = sk_EVP_TEST_BUFFER_value(sk, i); size_t j; for (j = 0; j < tb->count; j++) { if (fn(ctx, tb->buf, tb->buflen) <= 0) return 0; } } return 1; } static unsigned char* unescape(const char *input, size_t input_len, size_t *out_len) { unsigned char *ret, *p; size_t i; if (input_len == 0) { *out_len = 0; return OPENSSL_zalloc(1); } if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) return NULL; for (i = 0; i < input_len; i++) { if (*input == '\\') { if (i == input_len - 1 || *++input != 'n') { TEST_error("Bad escape sequence in file"); goto err; } *p++ = '\n'; i++; input++; } else { *p++ = *input++; } } *out_len = p - ret; return ret; err: OPENSSL_free(ret); return NULL; } static int parse_bin(const char *value, unsigned char **buf, size_t *buflen) { long len; if (strcmp(value, "NULL") == 0) { *buf = NULL; *buflen = 0; return 1; } if (*value == '\0') { *buf = OPENSSL_malloc(1); if (*buf == NULL) return 0; **buf = 0; *buflen = 0; return 1; } if (value[0] == '"') { size_t vlen = strlen(++value); if (vlen == 0 || value[vlen - 1] != '"') return 0; vlen--; *buf = unescape(value, vlen, buflen); return *buf == NULL ? 0 : 1; } if (!TEST_ptr(*buf = OPENSSL_hexstr2buf(value, &len))) { TEST_info("Can't convert %s", value); TEST_openssl_errors(); return -1; } *buflen = len; return 1; } typedef struct digest_data_st { const EVP_MD *digest; EVP_MD *fetched_digest; STACK_OF(EVP_TEST_BUFFER) *input; unsigned char *output; size_t output_len; int pad_type; int xof; size_t digest_size; } DIGEST_DATA; static int digest_test_init(EVP_TEST *t, const char *alg) { DIGEST_DATA *mdat; const EVP_MD *digest; EVP_MD *fetched_digest; if (is_digest_disabled(alg)) { TEST_info("skipping, '%s' is disabled", alg); t->skip = 1; return 1; } if ((digest = fetched_digest = EVP_MD_fetch(libctx, alg, propquery)) == NULL && (digest = EVP_get_digestbyname(alg)) == NULL) return 0; if (!TEST_ptr(mdat = OPENSSL_zalloc(sizeof(*mdat)))) return 0; t->data = mdat; mdat->digest = digest; mdat->fetched_digest = fetched_digest; mdat->pad_type = 0; mdat->xof = 0; if (fetched_digest != NULL) TEST_info("%s is fetched", alg); return 1; } static void digest_test_cleanup(EVP_TEST *t) { DIGEST_DATA *mdat = t->data; sk_EVP_TEST_BUFFER_pop_free(mdat->input, evp_test_buffer_free); OPENSSL_free(mdat->output); EVP_MD_free(mdat->fetched_digest); } static int digest_test_parse(EVP_TEST *t, const char *keyword, const char *value) { DIGEST_DATA *mdata = t->data; if (strcmp(keyword, "Input") == 0) return evp_test_buffer_append(value, &mdata->input); if (strcmp(keyword, "Output") == 0) return parse_bin(value, &mdata->output, &mdata->output_len); if (strcmp(keyword, "Count") == 0) return evp_test_buffer_set_count(value, mdata->input); if (strcmp(keyword, "Ncopy") == 0) return evp_test_buffer_ncopy(value, mdata->input); if (strcmp(keyword, "Padding") == 0) return (mdata->pad_type = atoi(value)) > 0; if (strcmp(keyword, "XOF") == 0) return (mdata->xof = atoi(value)) > 0; if (strcmp(keyword, "OutputSize") == 0) { int sz; sz = atoi(value); if (sz < 0) return -1; mdata->digest_size = sz; return 1; } return 0; } static int digest_update_fn(void *ctx, const unsigned char *buf, size_t buflen) { return EVP_DigestUpdate(ctx, buf, buflen); } static int test_duplicate_md_ctx(EVP_TEST *t, EVP_MD_CTX *mctx) { char dont[] = "touch"; if (!TEST_ptr(mctx)) return 0; if (!EVP_DigestFinalXOF(mctx, (unsigned char *)dont, 0)) { EVP_MD_CTX_free(mctx); t->err = "DIGESTFINALXOF_ERROR"; return 0; } if (!TEST_str_eq(dont, "touch")) { EVP_MD_CTX_free(mctx); t->err = "DIGESTFINALXOF_ERROR"; return 0; } EVP_MD_CTX_free(mctx); return 1; } static int digest_test_run(EVP_TEST *t) { DIGEST_DATA *expected = t->data; EVP_TEST_BUFFER *inbuf; EVP_MD_CTX *mctx; unsigned char *got = NULL; unsigned int got_len; size_t size = 0; int xof = 0; OSSL_PARAM params[4], *p = &params[0]; t->err = "TEST_FAILURE"; if (!TEST_ptr(mctx = EVP_MD_CTX_new())) goto err; got = OPENSSL_malloc(expected->output_len > EVP_MAX_MD_SIZE ? expected->output_len : EVP_MAX_MD_SIZE); if (!TEST_ptr(got)) goto err; if (expected->xof > 0) { xof |= 1; *p++ = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_XOFLEN, &expected->output_len); } if (expected->digest_size > 0) { *p++ = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &expected->digest_size); } if (expected->pad_type > 0) *p++ = OSSL_PARAM_construct_int(OSSL_DIGEST_PARAM_PAD_TYPE, &expected->pad_type); *p++ = OSSL_PARAM_construct_end(); if (!EVP_DigestInit_ex2(mctx, expected->digest, params)) { t->err = "DIGESTINIT_ERROR"; goto err; } if (!evp_test_buffer_do(expected->input, digest_update_fn, mctx)) { t->err = "DIGESTUPDATE_ERROR"; goto err; } xof |= (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0; if (xof) { EVP_MD_CTX *mctx_cpy; if (!TEST_ptr(mctx_cpy = EVP_MD_CTX_new())) { goto err; } if (!TEST_true(EVP_MD_CTX_copy(mctx_cpy, mctx))) { EVP_MD_CTX_free(mctx_cpy); goto err; } else if (!test_duplicate_md_ctx(t, mctx_cpy)) { goto err; } if (!test_duplicate_md_ctx(t, EVP_MD_CTX_dup(mctx))) goto err; got_len = expected->output_len; if (!EVP_DigestFinalXOF(mctx, got, got_len)) { t->err = "DIGESTFINALXOF_ERROR"; goto err; } } else { if (!EVP_DigestFinal(mctx, got, &got_len)) { t->err = "DIGESTFINAL_ERROR"; goto err; } } if (!TEST_int_eq(expected->output_len, got_len)) { t->err = "DIGEST_LENGTH_MISMATCH"; goto err; } if (!memory_err_compare(t, "DIGEST_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; if (sk_EVP_TEST_BUFFER_num(expected->input) == 1 && !xof && !TEST_ptr(inbuf = sk_EVP_TEST_BUFFER_value(expected->input, 0)) && !inbuf->count_set) { OPENSSL_cleanse(got, got_len); if (!TEST_true(EVP_Q_digest(libctx, EVP_MD_get0_name(expected->fetched_digest), NULL, inbuf->buf, inbuf->buflen, got, &size)) || !TEST_mem_eq(got, size, expected->output, expected->output_len)) { t->err = "EVP_Q_digest failed"; goto err; } } err: OPENSSL_free(got); EVP_MD_CTX_free(mctx); return 1; } static const EVP_TEST_METHOD digest_test_method = { "Digest", digest_test_init, digest_test_cleanup, digest_test_parse, digest_test_run }; typedef struct cipher_data_st { const EVP_CIPHER *cipher; EVP_CIPHER *fetched_cipher; int enc; int aead; unsigned char *key; size_t key_len; size_t key_bits; unsigned char *iv; unsigned char *next_iv; unsigned int rounds; size_t iv_len; unsigned char *plaintext; size_t plaintext_len; unsigned char *ciphertext; size_t ciphertext_len; unsigned char *aad[AAD_NUM]; size_t aad_len[AAD_NUM]; int tls_aad; int tls_version; unsigned char *tag; const char *cts_mode; size_t tag_len; int tag_late; unsigned char *mac_key; size_t mac_key_len; const char *xts_standard; } CIPHER_DATA; static int cipher_test_init(EVP_TEST *t, const char *alg) { const EVP_CIPHER *cipher; EVP_CIPHER *fetched_cipher; CIPHER_DATA *cdat; int m; if (is_cipher_disabled(alg)) { t->skip = 1; TEST_info("skipping, '%s' is disabled", alg); return 1; } ERR_set_mark(); if ((cipher = fetched_cipher = EVP_CIPHER_fetch(libctx, alg, propquery)) == NULL && (cipher = EVP_get_cipherbyname(alg)) == NULL) { if (strstr(alg, "HMAC") != NULL) { ERR_pop_to_mark(); t->skip = 1; TEST_info("skipping, '%s' is not available", alg); return 1; } ERR_clear_last_mark(); return 0; } ERR_clear_last_mark(); if (!TEST_ptr(cdat = OPENSSL_zalloc(sizeof(*cdat)))) return 0; cdat->cipher = cipher; cdat->fetched_cipher = fetched_cipher; cdat->enc = -1; m = EVP_CIPHER_get_mode(cipher); if (EVP_CIPHER_get_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) cdat->aead = m != 0 ? m : -1; else cdat->aead = 0; t->data = cdat; if (fetched_cipher != NULL) TEST_info("%s is fetched", alg); return 1; } static void cipher_test_cleanup(EVP_TEST *t) { int i; CIPHER_DATA *cdat = t->data; OPENSSL_free(cdat->key); OPENSSL_free(cdat->iv); OPENSSL_free(cdat->next_iv); OPENSSL_free(cdat->ciphertext); OPENSSL_free(cdat->plaintext); for (i = 0; i < AAD_NUM; i++) OPENSSL_free(cdat->aad[i]); OPENSSL_free(cdat->tag); OPENSSL_free(cdat->mac_key); EVP_CIPHER_free(cdat->fetched_cipher); } static int cipher_test_parse(EVP_TEST *t, const char *keyword, const char *value) { CIPHER_DATA *cdat = t->data; int i; if (strcmp(keyword, "Key") == 0) return parse_bin(value, &cdat->key, &cdat->key_len); if (strcmp(keyword, "Rounds") == 0) { i = atoi(value); if (i < 0) return -1; cdat->rounds = (unsigned int)i; return 1; } if (strcmp(keyword, "IV") == 0) return parse_bin(value, &cdat->iv, &cdat->iv_len); if (strcmp(keyword, "NextIV") == 0) return parse_bin(value, &cdat->next_iv, &cdat->iv_len); if (strcmp(keyword, "Plaintext") == 0) return parse_bin(value, &cdat->plaintext, &cdat->plaintext_len); if (strcmp(keyword, "Ciphertext") == 0) return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); if (strcmp(keyword, "KeyBits") == 0) { i = atoi(value); if (i < 0) return -1; cdat->key_bits = (size_t)i; return 1; } if (cdat->aead) { int tls_aad = 0; if (strcmp(keyword, "TLSAAD") == 0) cdat->tls_aad = tls_aad = 1; if (strcmp(keyword, "AAD") == 0 || tls_aad) { for (i = 0; i < AAD_NUM; i++) { if (cdat->aad[i] == NULL) return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]); } return -1; } if (strcmp(keyword, "Tag") == 0) return parse_bin(value, &cdat->tag, &cdat->tag_len); if (strcmp(keyword, "SetTagLate") == 0) { if (strcmp(value, "TRUE") == 0) cdat->tag_late = 1; else if (strcmp(value, "FALSE") == 0) cdat->tag_late = 0; else return -1; return 1; } if (strcmp(keyword, "MACKey") == 0) return parse_bin(value, &cdat->mac_key, &cdat->mac_key_len); if (strcmp(keyword, "TLSVersion") == 0) { char *endptr; cdat->tls_version = (int)strtol(value, &endptr, 0); return value[0] != '\0' && endptr[0] == '\0'; } } if (strcmp(keyword, "Operation") == 0) { if (strcmp(value, "ENCRYPT") == 0) cdat->enc = 1; else if (strcmp(value, "DECRYPT") == 0) cdat->enc = 0; else return -1; return 1; } if (strcmp(keyword, "CTSMode") == 0) { cdat->cts_mode = value; return 1; } if (strcmp(keyword, "XTSStandard") == 0) { cdat->xts_standard = value; return 1; } return 0; } static int cipher_test_enc(EVP_TEST *t, int enc, size_t out_misalign, size_t inp_misalign, int frag, int in_place) { CIPHER_DATA *expected = t->data; unsigned char *in, *expected_out, *tmp = NULL; size_t in_len, out_len, donelen = 0; int ok = 0, tmplen, chunklen, tmpflen, i; EVP_CIPHER_CTX *ctx_base = NULL; EVP_CIPHER_CTX *ctx = NULL, *duped; int fips_dupctx_supported = fips_provider_version_ge(libctx, 3, 2, 0); t->err = "TEST_FAILURE"; if (!TEST_ptr(ctx_base = EVP_CIPHER_CTX_new())) goto err; if (!TEST_ptr(ctx = EVP_CIPHER_CTX_new())) goto err; EVP_CIPHER_CTX_set_flags(ctx_base, EVP_CIPHER_CTX_FLAG_WRAP_ALLOW); if (enc) { in = expected->plaintext; in_len = expected->plaintext_len; expected_out = expected->ciphertext; out_len = expected->ciphertext_len; } else { in = expected->ciphertext; in_len = expected->ciphertext_len; expected_out = expected->plaintext; out_len = expected->plaintext_len; } if (in_place == 1) { tmp = OPENSSL_malloc(out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH); if (!tmp) goto err; in = memcpy(tmp + out_misalign, in, in_len); } else { inp_misalign += 16 - ((out_misalign + in_len) & 15); tmp = OPENSSL_malloc(out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH + inp_misalign + in_len); if (!tmp) goto err; in = memcpy(tmp + out_misalign + in_len + 2 * EVP_MAX_BLOCK_LENGTH + inp_misalign, in, in_len); } if (!EVP_CipherInit_ex(ctx_base, expected->cipher, NULL, NULL, NULL, enc)) { t->err = "CIPHERINIT_ERROR"; goto err; } if (expected->cts_mode != NULL) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_CIPHER_PARAM_CTS_MODE, (char *)expected->cts_mode, 0); params[1] = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_set_params(ctx_base, params)) { t->err = "INVALID_CTS_MODE"; goto err; } } if (expected->iv) { if (expected->aead) { if (EVP_CIPHER_CTX_ctrl(ctx_base, EVP_CTRL_AEAD_SET_IVLEN, expected->iv_len, 0) <= 0) { t->err = "INVALID_IV_LENGTH"; goto err; } } else if (expected->iv_len != (size_t)EVP_CIPHER_CTX_get_iv_length(ctx_base)) { t->err = "INVALID_IV_LENGTH"; goto err; } } if (expected->aead && !expected->tls_aad) { unsigned char *tag; if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) { t->err = "TAG_LENGTH_SET_ERROR"; tag = NULL; } else { t->err = "TAG_SET_ERROR"; tag = expected->tag; } if (tag || expected->aead != EVP_CIPH_GCM_MODE) { if (EVP_CIPHER_CTX_ctrl(ctx_base, EVP_CTRL_AEAD_SET_TAG, expected->tag_len, tag) <= 0) goto err; } } if (expected->rounds > 0) { int rounds = (int)expected->rounds; if (EVP_CIPHER_CTX_ctrl(ctx_base, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL) <= 0) { t->err = "INVALID_ROUNDS"; goto err; } } if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) { t->err = "INVALID_KEY_LENGTH"; goto err; } if (expected->key_bits > 0) { int bits = (int)expected->key_bits; if (EVP_CIPHER_CTX_ctrl(ctx_base, EVP_CTRL_SET_RC2_KEY_BITS, bits, NULL) <= 0) { t->err = "INVALID KEY BITS"; goto err; } } if (!EVP_CipherInit_ex(ctx_base, NULL, NULL, expected->key, expected->iv, -1)) { t->err = "KEY_SET_ERROR"; goto err; } if (expected->iv != NULL) { unsigned char iv[128]; if (!TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx_base, iv, sizeof(iv))) || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 && !TEST_mem_eq(expected->iv, expected->iv_len, iv, expected->iv_len))) { t->err = "INVALID_IV"; goto err; } } ERR_set_mark(); if (!EVP_CIPHER_CTX_copy(ctx, ctx_base)) { if (fips_dupctx_supported) { TEST_info("Doing a copy of Cipher %s Fails!\n", EVP_CIPHER_get0_name(expected->cipher)); ERR_print_errors_fp(stderr); goto err; } else { TEST_info("Allowing copy fail as an old fips provider is in use."); } EVP_CIPHER_CTX_free(ctx); ctx = ctx_base; } else { EVP_CIPHER_CTX_free(ctx_base); ctx_base = NULL; } duped = EVP_CIPHER_CTX_dup(ctx); if (duped != NULL) { EVP_CIPHER_CTX_free(ctx); ctx = duped; } else { if (fips_dupctx_supported) { TEST_info("Doing a dup of Cipher %s Fails!\n", EVP_CIPHER_get0_name(expected->cipher)); ERR_print_errors_fp(stderr); goto err; } else { TEST_info("Allowing dup fail as an old fips provider is in use."); } } ERR_pop_to_mark(); if (expected->mac_key != NULL && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_MAC_KEY, (int)expected->mac_key_len, (void *)expected->mac_key) <= 0) { t->err = "SET_MAC_KEY_ERROR"; goto err; } if (expected->tls_version) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_TLS_VERSION, &expected->tls_version); params[1] = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_set_params(ctx, params)) { t->err = "SET_TLS_VERSION_ERROR"; goto err; } } if (expected->aead == EVP_CIPH_CCM_MODE) { if (!EVP_CipherUpdate(ctx, NULL, &tmplen, NULL, out_len)) { t->err = "CCM_PLAINTEXT_LENGTH_SET_ERROR"; goto err; } } if (expected->aad[0] != NULL && !expected->tls_aad) { t->err = "AAD_SET_ERROR"; if (!frag) { for (i = 0; expected->aad[i] != NULL; i++) { if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], expected->aad_len[i])) goto err; } } else { for (i = 0; expected->aad[i] != NULL; i++) { if (expected->aad_len[i] > 0) { if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 1)) goto err; donelen++; } if (expected->aad_len[i] > 2) { if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i] + donelen, expected->aad_len[i] - 2)) goto err; donelen += expected->aad_len[i] - 2; } if (expected->aad_len[i] > 1 && !EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i] + donelen, 1)) goto err; } } } if (expected->tls_aad) { OSSL_PARAM params[2]; char *tls_aad; if ((tls_aad = OPENSSL_memdup(expected->aad[0], expected->aad_len[0])) == NULL) goto err; params[0] = OSSL_PARAM_construct_octet_string(OSSL_CIPHER_PARAM_AEAD_TLS1_AAD, tls_aad, expected->aad_len[0]); params[1] = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_set_params(ctx, params)) { OPENSSL_free(tls_aad); t->err = "TLS1_AAD_ERROR"; goto err; } OPENSSL_free(tls_aad); } else if (!enc && (expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late)) { if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, expected->tag_len, expected->tag) <= 0) { t->err = "TAG_SET_ERROR"; goto err; } } if (expected->xts_standard != NULL) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_CIPHER_PARAM_XTS_STANDARD, (char *)expected->xts_standard, 0); params[1] = OSSL_PARAM_construct_end(); if (!EVP_CIPHER_CTX_set_params(ctx, params)) { t->err = "SET_XTS_STANDARD_ERROR"; goto err; } } EVP_CIPHER_CTX_set_padding(ctx, 0); t->err = "CIPHERUPDATE_ERROR"; tmplen = 0; if (!frag) { if (!EVP_CipherUpdate(ctx, tmp + out_misalign, &tmplen, in, in_len)) goto err; } else { if (in_len > 0) { if (!EVP_CipherUpdate(ctx, tmp + out_misalign, &chunklen, in, 1)) goto err; tmplen += chunklen; in++; in_len--; } if (in_len > 1) { if (!EVP_CipherUpdate(ctx, tmp + out_misalign + tmplen, &chunklen, in, in_len - 1)) goto err; tmplen += chunklen; in += in_len - 1; in_len = 1; } if (in_len > 0) { if (!EVP_CipherUpdate(ctx, tmp + out_misalign + tmplen, &chunklen, in, 1)) goto err; tmplen += chunklen; } } if (!EVP_CipherFinal_ex(ctx, tmp + out_misalign + tmplen, &tmpflen)) { t->err = "CIPHERFINAL_ERROR"; goto err; } if (!enc && expected->tls_aad) { if (expected->tls_version >= TLS1_1_VERSION && (EVP_CIPHER_is_a(expected->cipher, "AES-128-CBC-HMAC-SHA1") || EVP_CIPHER_is_a(expected->cipher, "AES-256-CBC-HMAC-SHA1"))) { tmplen -= expected->iv_len; expected_out += expected->iv_len; out_misalign += expected->iv_len; } if ((int)out_len > tmplen + tmpflen) out_len = tmplen + tmpflen; } if (!memory_err_compare(t, "VALUE_MISMATCH", expected_out, out_len, tmp + out_misalign, tmplen + tmpflen)) goto err; if (enc && expected->aead && !expected->tls_aad) { unsigned char rtag[16]; if (!TEST_size_t_le(expected->tag_len, sizeof(rtag))) { t->err = "TAG_LENGTH_INTERNAL_ERROR"; goto err; } if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, expected->tag_len, rtag) <= 0) { t->err = "TAG_RETRIEVE_ERROR"; goto err; } if (!memory_err_compare(t, "TAG_VALUE_MISMATCH", expected->tag, expected->tag_len, rtag, expected->tag_len)) goto err; } if (expected->next_iv != NULL) { unsigned char iv[128]; if (!TEST_true(EVP_CIPHER_CTX_get_updated_iv(ctx, iv, sizeof(iv))) || ((EVP_CIPHER_get_flags(expected->cipher) & EVP_CIPH_CUSTOM_IV) == 0 && !TEST_mem_eq(expected->next_iv, expected->iv_len, iv, expected->iv_len))) { t->err = "INVALID_NEXT_IV"; goto err; } } t->err = NULL; ok = 1; err: OPENSSL_free(tmp); if (ctx != ctx_base) EVP_CIPHER_CTX_free(ctx_base); EVP_CIPHER_CTX_free(ctx); return ok; } static int cipher_test_valid_fragmentation(CIPHER_DATA *cdat) { return (cdat->aead == EVP_CIPH_CCM_MODE || cdat->aead == EVP_CIPH_CBC_MODE || (cdat->aead == -1 && EVP_CIPHER_get_mode(cdat->cipher) == EVP_CIPH_STREAM_CIPHER) || ((EVP_CIPHER_get_flags(cdat->cipher) & EVP_CIPH_FLAG_CTS) != 0) || EVP_CIPHER_get_mode(cdat->cipher) == EVP_CIPH_SIV_MODE || EVP_CIPHER_get_mode(cdat->cipher) == EVP_CIPH_GCM_SIV_MODE || EVP_CIPHER_get_mode(cdat->cipher) == EVP_CIPH_XTS_MODE || EVP_CIPHER_get_mode(cdat->cipher) == EVP_CIPH_WRAP_MODE) ? 0 : 1; } static int cipher_test_run(EVP_TEST *t) { CIPHER_DATA *cdat = t->data; int rv, frag, fragmax, in_place; size_t out_misalign, inp_misalign; TEST_info("RUNNING TEST FOR CIPHER %s\n", EVP_CIPHER_get0_name(cdat->cipher)); if (!cdat->key) { t->err = "NO_KEY"; return 0; } if (!cdat->iv && EVP_CIPHER_get_iv_length(cdat->cipher) > 0) { if (EVP_CIPHER_get_mode(cdat->cipher) != EVP_CIPH_WRAP_MODE) { t->err = "NO_IV"; return 0; } } if (cdat->aead && cdat->tag == NULL && !cdat->tls_aad) { t->err = "NO_TAG"; return 0; } fragmax = (cipher_test_valid_fragmentation(cdat) == 0) ? 0 : 1; for (in_place = 1; in_place >= 0; in_place--) { static char aux_err[64]; t->aux_err = aux_err; if (process_mode_in_place == 1 && in_place == 0) break; for (frag = 0; frag <= fragmax; frag++) { for (out_misalign = 0; out_misalign <= 1; out_misalign++) { for (inp_misalign = 0; inp_misalign <= 1; inp_misalign++) { if (inp_misalign == 1 && in_place == 1) break; if (in_place == 1) { BIO_snprintf(aux_err, sizeof(aux_err), "%s in-place, %sfragmented", out_misalign ? "misaligned" : "aligned", frag ? "" : "not "); } else { BIO_snprintf(aux_err, sizeof(aux_err), "%s output and %s input, %sfragmented", out_misalign ? "misaligned" : "aligned", inp_misalign ? "misaligned" : "aligned", frag ? "" : "not "); } if (cdat->enc) { rv = cipher_test_enc(t, 1, out_misalign, inp_misalign, frag, in_place); if (rv != 1) { if (rv < 0) return 0; return 1; } } if (cdat->enc != 1) { rv = cipher_test_enc(t, 0, out_misalign, inp_misalign, frag, in_place); if (rv != 1) { if (rv < 0) return 0; return 1; } } } } } } t->aux_err = NULL; return 1; } static const EVP_TEST_METHOD cipher_test_method = { "Cipher", cipher_test_init, cipher_test_cleanup, cipher_test_parse, cipher_test_run }; typedef struct mac_data_st { char *mac_name; EVP_MAC *mac; int type; char *alg; unsigned char *key; size_t key_len; unsigned char *iv; size_t iv_len; unsigned char *input; size_t input_len; unsigned char *output; size_t output_len; unsigned char *custom; size_t custom_len; unsigned char *salt; size_t salt_len; int xof; int no_reinit; STACK_OF(OPENSSL_STRING) *controls; int output_size; int block_size; } MAC_DATA; static int mac_test_init(EVP_TEST *t, const char *alg) { EVP_MAC *mac = NULL; int type = NID_undef; MAC_DATA *mdat; if (is_mac_disabled(alg)) { TEST_info("skipping, '%s' is disabled", alg); t->skip = 1; return 1; } if ((mac = EVP_MAC_fetch(libctx, alg, propquery)) == NULL) { size_t sz = strlen(alg); static const char epilogue[] = " by EVP_PKEY"; if (sz >= sizeof(epilogue) && strcmp(alg + sz - (sizeof(epilogue) - 1), epilogue) == 0) sz -= sizeof(epilogue) - 1; if (strncmp(alg, "HMAC", sz) == 0) type = EVP_PKEY_HMAC; else if (strncmp(alg, "CMAC", sz) == 0) type = EVP_PKEY_CMAC; else if (strncmp(alg, "Poly1305", sz) == 0) type = EVP_PKEY_POLY1305; else if (strncmp(alg, "SipHash", sz) == 0) type = EVP_PKEY_SIPHASH; else return 0; } if (!TEST_ptr(mdat = OPENSSL_zalloc(sizeof(*mdat)))) return 0; mdat->type = type; if (!TEST_ptr(mdat->mac_name = OPENSSL_strdup(alg))) { OPENSSL_free(mdat); return 0; } mdat->mac = mac; if (!TEST_ptr(mdat->controls = sk_OPENSSL_STRING_new_null())) { OPENSSL_free(mdat->mac_name); OPENSSL_free(mdat); return 0; } mdat->output_size = mdat->block_size = -1; t->data = mdat; return 1; } static void openssl_free(char *m) { OPENSSL_free(m); } static void mac_test_cleanup(EVP_TEST *t) { MAC_DATA *mdat = t->data; EVP_MAC_free(mdat->mac); OPENSSL_free(mdat->mac_name); sk_OPENSSL_STRING_pop_free(mdat->controls, openssl_free); OPENSSL_free(mdat->alg); OPENSSL_free(mdat->key); OPENSSL_free(mdat->iv); OPENSSL_free(mdat->custom); OPENSSL_free(mdat->salt); OPENSSL_free(mdat->input); OPENSSL_free(mdat->output); } static int mac_test_parse(EVP_TEST *t, const char *keyword, const char *value) { MAC_DATA *mdata = t->data; if (strcmp(keyword, "Key") == 0) return parse_bin(value, &mdata->key, &mdata->key_len); if (strcmp(keyword, "IV") == 0) return parse_bin(value, &mdata->iv, &mdata->iv_len); if (strcmp(keyword, "Custom") == 0) return parse_bin(value, &mdata->custom, &mdata->custom_len); if (strcmp(keyword, "Salt") == 0) return parse_bin(value, &mdata->salt, &mdata->salt_len); if (strcmp(keyword, "Algorithm") == 0) { mdata->alg = OPENSSL_strdup(value); if (mdata->alg == NULL) return -1; return 1; } if (strcmp(keyword, "Input") == 0) return parse_bin(value, &mdata->input, &mdata->input_len); if (strcmp(keyword, "Output") == 0) return parse_bin(value, &mdata->output, &mdata->output_len); if (strcmp(keyword, "XOF") == 0) return mdata->xof = 1; if (strcmp(keyword, "NoReinit") == 0) return mdata->no_reinit = 1; if (strcmp(keyword, "Ctrl") == 0) { char *data = OPENSSL_strdup(value); if (data == NULL) return -1; return sk_OPENSSL_STRING_push(mdata->controls, data) != 0; } if (strcmp(keyword, "OutputSize") == 0) { mdata->output_size = atoi(value); if (mdata->output_size < 0) return -1; return 1; } if (strcmp(keyword, "BlockSize") == 0) { mdata->block_size = atoi(value); if (mdata->block_size < 0) return -1; return 1; } return 0; } static int mac_test_ctrl_pkey(EVP_TEST *t, EVP_PKEY_CTX *pctx, const char *value) { int rv = 0; char *p, *tmpval; if (!TEST_ptr(tmpval = OPENSSL_strdup(value))) return 0; p = strchr(tmpval, ':'); if (p != NULL) { *p++ = '\0'; rv = EVP_PKEY_CTX_ctrl_str(pctx, tmpval, p); } if (rv == -2) t->err = "PKEY_CTRL_INVALID"; else if (rv <= 0) t->err = "PKEY_CTRL_ERROR"; else rv = 1; OPENSSL_free(tmpval); return rv > 0; } static int mac_test_run_pkey(EVP_TEST *t) { MAC_DATA *expected = t->data; EVP_MD_CTX *mctx = NULL; EVP_PKEY_CTX *pctx = NULL, *genctx = NULL; EVP_PKEY *key = NULL; const char *mdname = NULL; EVP_CIPHER *cipher = NULL; unsigned char *got = NULL; size_t got_len; int i; if (expected->xof) return 1; if (expected->alg == NULL) TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type)); else TEST_info("Trying the EVP_PKEY %s test with %s", OBJ_nid2sn(expected->type), expected->alg); if (expected->type == EVP_PKEY_CMAC) { #ifdef OPENSSL_NO_DEPRECATED_3_0 TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); t->skip = 1; t->err = NULL; goto err; #else OSSL_LIB_CTX *tmpctx; if (expected->alg != NULL && is_cipher_disabled(expected->alg)) { TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg); t->skip = 1; t->err = NULL; goto err; } if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, propquery))) { t->err = "MAC_KEY_CREATE_ERROR"; goto err; } tmpctx = OSSL_LIB_CTX_set0_default(libctx); key = EVP_PKEY_new_CMAC_key(NULL, expected->key, expected->key_len, cipher); OSSL_LIB_CTX_set0_default(tmpctx); #endif } else { key = EVP_PKEY_new_raw_private_key_ex(libctx, OBJ_nid2sn(expected->type), NULL, expected->key, expected->key_len); } if (key == NULL) { t->err = "MAC_KEY_CREATE_ERROR"; goto err; } if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) { if (is_digest_disabled(expected->alg)) { TEST_info("skipping, HMAC '%s' is disabled", expected->alg); t->skip = 1; t->err = NULL; goto err; } mdname = expected->alg; } if (!TEST_ptr(mctx = EVP_MD_CTX_new())) { t->err = "INTERNAL_ERROR"; goto err; } if (!EVP_DigestSignInit_ex(mctx, &pctx, mdname, libctx, NULL, key, NULL)) { t->err = "DIGESTSIGNINIT_ERROR"; goto err; } for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) if (!mac_test_ctrl_pkey(t, pctx, sk_OPENSSL_STRING_value(expected->controls, i))) { t->err = "EVPPKEYCTXCTRL_ERROR"; goto err; } if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { t->err = "DIGESTSIGNUPDATE_ERROR"; goto err; } if (!EVP_DigestSignFinal(mctx, NULL, &got_len)) { t->err = "DIGESTSIGNFINAL_LENGTH_ERROR"; goto err; } if (!TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "TEST_FAILURE"; goto err; } if (!EVP_DigestSignFinal(mctx, got, &got_len) || !memory_err_compare(t, "TEST_MAC_ERR", expected->output, expected->output_len, got, got_len)) { t->err = "TEST_MAC_ERR"; goto err; } t->err = NULL; err: EVP_CIPHER_free(cipher); EVP_MD_CTX_free(mctx); OPENSSL_free(got); EVP_PKEY_CTX_free(genctx); EVP_PKEY_free(key); return 1; } static int mac_test_run_mac(EVP_TEST *t) { MAC_DATA *expected = t->data; EVP_MAC_CTX *ctx = NULL; unsigned char *got = NULL; size_t got_len = 0, size = 0; size_t size_before_init = 0, size_after_init, size_val = 0; int i, block_size = -1, output_size = -1; OSSL_PARAM params[21], sizes[3], *psizes = sizes; size_t params_n = 0; size_t params_n_allocstart = 0; const OSSL_PARAM *defined_params = EVP_MAC_settable_ctx_params(expected->mac); int xof; int reinit = 1; if (expected->alg == NULL) TEST_info("Trying the EVP_MAC %s test", expected->mac_name); else TEST_info("Trying the EVP_MAC %s test with %s", expected->mac_name, expected->alg); if (expected->alg != NULL) { int skip = 0; if (OSSL_PARAM_locate_const(defined_params, OSSL_MAC_PARAM_CIPHER) != NULL) { if (is_cipher_disabled(expected->alg)) skip = 1; else params[params_n++] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_CIPHER, expected->alg, 0); } else if (OSSL_PARAM_locate_const(defined_params, OSSL_MAC_PARAM_DIGEST) != NULL) { if (is_digest_disabled(expected->alg)) skip = 1; else params[params_n++] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, expected->alg, 0); } else { t->err = "MAC_BAD_PARAMS"; goto err; } if (skip) { TEST_info("skipping, algorithm '%s' is disabled", expected->alg); t->skip = 1; t->err = NULL; goto err; } } if (expected->custom != NULL) params[params_n++] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_CUSTOM, expected->custom, expected->custom_len); if (expected->salt != NULL) params[params_n++] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_SALT, expected->salt, expected->salt_len); if (expected->iv != NULL) params[params_n++] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_IV, expected->iv, expected->iv_len); if (params_n + sk_OPENSSL_STRING_num(expected->controls) >= OSSL_NELEM(params)) { t->err = "MAC_TOO_MANY_PARAMETERS"; goto err; } params_n_allocstart = params_n; for (i = 0; i < sk_OPENSSL_STRING_num(expected->controls); i++) { char *tmpkey, *tmpval; char *value = sk_OPENSSL_STRING_value(expected->controls, i); if (!TEST_ptr(tmpkey = OPENSSL_strdup(value))) { t->err = "MAC_PARAM_ERROR"; goto err; } tmpval = strchr(tmpkey, ':'); if (tmpval != NULL) *tmpval++ = '\0'; if (tmpval == NULL || !OSSL_PARAM_allocate_from_text(&params[params_n], defined_params, tmpkey, tmpval, strlen(tmpval), NULL)) { OPENSSL_free(tmpkey); t->err = "MAC_PARAM_ERROR"; goto err; } params_n++; if (strcmp(tmpkey, "size") == 0) size_val = (size_t)strtoul(tmpval, NULL, 0); OPENSSL_free(tmpkey); } params[params_n] = OSSL_PARAM_construct_end(); if ((ctx = EVP_MAC_CTX_new(expected->mac)) == NULL) { t->err = "MAC_CREATE_ERROR"; goto err; } if (fips_provider_version_gt(libctx, 3, 2, 0)) size_before_init = EVP_MAC_CTX_get_mac_size(ctx); if (!EVP_MAC_init(ctx, expected->key, expected->key_len, params)) { t->err = "MAC_INIT_ERROR"; goto err; } size_after_init = EVP_MAC_CTX_get_mac_size(ctx); if (!TEST_false(size_before_init == 0 && size_after_init == 0)) { t->err = "MAC SIZE not set"; goto err; } if (size_before_init != 0) { if (size_val == 0 && !TEST_size_t_eq(size_before_init, size_after_init)) { t->err = "MAC SIZE check failed"; goto err; } if (size_val != 0 && !TEST_size_t_eq(size_val, size_after_init)) { t->err = "MAC SIZE check failed"; goto err; } } if (expected->output_size >= 0) *psizes++ = OSSL_PARAM_construct_int(OSSL_MAC_PARAM_SIZE, &output_size); if (expected->block_size >= 0) *psizes++ = OSSL_PARAM_construct_int(OSSL_MAC_PARAM_BLOCK_SIZE, &block_size); if (psizes != sizes) { *psizes = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_MAC_CTX_get_params(ctx, sizes))) { t->err = "INTERNAL_ERROR"; goto err; } if (expected->output_size >= 0 && !TEST_int_eq(output_size, expected->output_size)) { t->err = "TEST_FAILURE"; goto err; } if (expected->block_size >= 0 && !TEST_int_eq(block_size, expected->block_size)) { t->err = "TEST_FAILURE"; goto err; } } retry: if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { t->err = "MAC_UPDATE_ERROR"; goto err; } xof = expected->xof; if (xof) { if (!TEST_ptr(got = OPENSSL_malloc(expected->output_len))) { t->err = "TEST_FAILURE"; goto err; } if (!EVP_MAC_finalXOF(ctx, got, expected->output_len) || !memory_err_compare(t, "TEST_MAC_ERR", expected->output, expected->output_len, got, expected->output_len)) { t->err = "MAC_FINAL_ERROR"; goto err; } } else { if (!EVP_MAC_final(ctx, NULL, &got_len, 0)) { t->err = "MAC_FINAL_LENGTH_ERROR"; goto err; } if (!TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "TEST_FAILURE"; goto err; } if (!EVP_MAC_final(ctx, got, &got_len, got_len) || !memory_err_compare(t, "TEST_MAC_ERR", expected->output, expected->output_len, got, got_len)) { t->err = "TEST_MAC_ERR"; goto err; } } if (reinit-- && fips_provider_version_gt(libctx, 3, 0, 0)) { OSSL_PARAM ivparams[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; int ret; if (expected->iv != NULL) { ivparams[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_IV, expected->iv, expected->iv_len); ivparams[1] = OSSL_PARAM_construct_end(); } ERR_set_mark(); ret = EVP_MAC_init(ctx, NULL, 0, ivparams); if (expected->no_reinit) { if (ret) { ERR_clear_last_mark(); t->err = "MAC_REINIT_SHOULD_FAIL"; goto err; } } else if (ret) { ERR_clear_last_mark(); OPENSSL_free(got); got = NULL; goto retry; } else { ERR_clear_last_mark(); t->err = "MAC_REINIT_ERROR"; goto err; } ERR_pop_to_mark(); } t->err = NULL; if (!xof) { OPENSSL_cleanse(got, got_len); if (!TEST_true(EVP_Q_mac(libctx, expected->mac_name, NULL, expected->alg, params, expected->key, expected->key_len, expected->input, expected->input_len, got, got_len, &size)) || !TEST_mem_eq(got, size, expected->output, expected->output_len)) { t->err = "EVP_Q_mac failed"; goto err; } } err: while (params_n-- > params_n_allocstart) { OPENSSL_free(params[params_n].data); } EVP_MAC_CTX_free(ctx); OPENSSL_free(got); return 1; } static int mac_test_run(EVP_TEST *t) { MAC_DATA *expected = t->data; if (expected->mac != NULL) return mac_test_run_mac(t); return mac_test_run_pkey(t); } static const EVP_TEST_METHOD mac_test_method = { "MAC", mac_test_init, mac_test_cleanup, mac_test_parse, mac_test_run }; typedef struct pkey_data_st { EVP_PKEY_CTX *ctx; int (*keyop) (EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen); unsigned char *input; size_t input_len; unsigned char *output; size_t output_len; } PKEY_DATA; static int pkey_test_init(EVP_TEST *t, const char *name, int use_public, int (*keyopinit) (EVP_PKEY_CTX *ctx), int (*keyop)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, const unsigned char *tbs, size_t tbslen)) { PKEY_DATA *kdata; EVP_PKEY *pkey = NULL; int rv = 0; if (use_public) rv = find_key(&pkey, name, public_keys); if (rv == 0) rv = find_key(&pkey, name, private_keys); if (rv == 0 || pkey == NULL) { TEST_info("skipping, key '%s' is disabled", name); t->skip = 1; return 1; } if (!TEST_ptr(kdata = OPENSSL_zalloc(sizeof(*kdata)))) { EVP_PKEY_free(pkey); return 0; } kdata->keyop = keyop; if (!TEST_ptr(kdata->ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pkey, propquery))) { EVP_PKEY_free(pkey); OPENSSL_free(kdata); return 0; } if (keyopinit(kdata->ctx) <= 0) t->err = "KEYOP_INIT_ERROR"; t->data = kdata; return 1; } static void pkey_test_cleanup(EVP_TEST *t) { PKEY_DATA *kdata = t->data; OPENSSL_free(kdata->input); OPENSSL_free(kdata->output); EVP_PKEY_CTX_free(kdata->ctx); } static int pkey_test_ctrl(EVP_TEST *t, EVP_PKEY_CTX *pctx, const char *value) { int rv = 0; char *p, *tmpval; if (!TEST_ptr(tmpval = OPENSSL_strdup(value))) return 0; p = strchr(tmpval, ':'); if (p != NULL) { *p++ = '\0'; rv = EVP_PKEY_CTX_ctrl_str(pctx, tmpval, p); } if (rv == -2) { t->err = "PKEY_CTRL_INVALID"; rv = 1; } else if (p != NULL && rv <= 0) { if (is_digest_disabled(p) || is_cipher_disabled(p)) { TEST_info("skipping, '%s' is disabled", p); t->skip = 1; rv = 1; } else { t->err = "PKEY_CTRL_ERROR"; rv = 1; } } OPENSSL_free(tmpval); return rv > 0; } static int pkey_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PKEY_DATA *kdata = t->data; if (strcmp(keyword, "Input") == 0) return parse_bin(value, &kdata->input, &kdata->input_len); if (strcmp(keyword, "Output") == 0) return parse_bin(value, &kdata->output, &kdata->output_len); if (strcmp(keyword, "Ctrl") == 0) return pkey_test_ctrl(t, kdata->ctx, value); return 0; } static int pkey_test_run(EVP_TEST *t) { PKEY_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len; EVP_PKEY_CTX *copy = NULL; if (expected->keyop(expected->ctx, NULL, &got_len, expected->input, expected->input_len) <= 0 || !TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "KEYOP_LENGTH_ERROR"; goto err; } if (expected->keyop(expected->ctx, got, &got_len, expected->input, expected->input_len) <= 0) { t->err = "KEYOP_ERROR"; goto err; } if (!memory_err_compare(t, "KEYOP_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; OPENSSL_free(got); got = NULL; if (!TEST_ptr(copy = EVP_PKEY_CTX_dup(expected->ctx))) { t->err = "INTERNAL_ERROR"; goto err; } if (expected->keyop(copy, NULL, &got_len, expected->input, expected->input_len) <= 0 || !TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "KEYOP_LENGTH_ERROR"; goto err; } if (expected->keyop(copy, got, &got_len, expected->input, expected->input_len) <= 0) { t->err = "KEYOP_ERROR"; goto err; } if (!memory_err_compare(t, "KEYOP_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; err: OPENSSL_free(got); EVP_PKEY_CTX_free(copy); return 1; } static int sign_test_init(EVP_TEST *t, const char *name) { return pkey_test_init(t, name, 0, EVP_PKEY_sign_init, EVP_PKEY_sign); } static const EVP_TEST_METHOD psign_test_method = { "Sign", sign_test_init, pkey_test_cleanup, pkey_test_parse, pkey_test_run }; static int verify_recover_test_init(EVP_TEST *t, const char *name) { return pkey_test_init(t, name, 1, EVP_PKEY_verify_recover_init, EVP_PKEY_verify_recover); } static const EVP_TEST_METHOD pverify_recover_test_method = { "VerifyRecover", verify_recover_test_init, pkey_test_cleanup, pkey_test_parse, pkey_test_run }; static int decrypt_test_init(EVP_TEST *t, const char *name) { return pkey_test_init(t, name, 0, EVP_PKEY_decrypt_init, EVP_PKEY_decrypt); } static const EVP_TEST_METHOD pdecrypt_test_method = { "Decrypt", decrypt_test_init, pkey_test_cleanup, pkey_test_parse, pkey_test_run }; static int verify_test_init(EVP_TEST *t, const char *name) { return pkey_test_init(t, name, 1, EVP_PKEY_verify_init, 0); } static int verify_test_run(EVP_TEST *t) { PKEY_DATA *kdata = t->data; if (EVP_PKEY_verify(kdata->ctx, kdata->output, kdata->output_len, kdata->input, kdata->input_len) <= 0) t->err = "VERIFY_ERROR"; return 1; } static const EVP_TEST_METHOD pverify_test_method = { "Verify", verify_test_init, pkey_test_cleanup, pkey_test_parse, verify_test_run }; static int pderive_test_init(EVP_TEST *t, const char *name) { return pkey_test_init(t, name, 0, EVP_PKEY_derive_init, 0); } static int pderive_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PKEY_DATA *kdata = t->data; int validate = 0; if (strcmp(keyword, "PeerKeyValidate") == 0) validate = 1; if (validate || strcmp(keyword, "PeerKey") == 0) { EVP_PKEY *peer; if (find_key(&peer, value, public_keys) == 0) return -1; if (EVP_PKEY_derive_set_peer_ex(kdata->ctx, peer, validate) <= 0) { t->err = "DERIVE_SET_PEER_ERROR"; return 1; } t->err = NULL; return 1; } if (strcmp(keyword, "SharedSecret") == 0) return parse_bin(value, &kdata->output, &kdata->output_len); if (strcmp(keyword, "Ctrl") == 0) return pkey_test_ctrl(t, kdata->ctx, value); if (strcmp(keyword, "KDFType") == 0) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_EXCHANGE_PARAM_KDF_TYPE, (char *)value, 0); params[1] = OSSL_PARAM_construct_end(); if (EVP_PKEY_CTX_set_params(kdata->ctx, params) == 0) return -1; return 1; } if (strcmp(keyword, "KDFDigest") == 0) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_EXCHANGE_PARAM_KDF_DIGEST, (char *)value, 0); params[1] = OSSL_PARAM_construct_end(); if (EVP_PKEY_CTX_set_params(kdata->ctx, params) == 0) return -1; return 1; } if (strcmp(keyword, "CEKAlg") == 0) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_CEK_ALG, (char *)value, 0); params[1] = OSSL_PARAM_construct_end(); if (EVP_PKEY_CTX_set_params(kdata->ctx, params) == 0) return -1; return 1; } if (strcmp(keyword, "KDFOutlen") == 0) { OSSL_PARAM params[2]; char *endptr; size_t outlen = (size_t)strtoul(value, &endptr, 0); if (endptr[0] != '\0') return -1; params[0] = OSSL_PARAM_construct_size_t(OSSL_EXCHANGE_PARAM_KDF_OUTLEN, &outlen); params[1] = OSSL_PARAM_construct_end(); if (EVP_PKEY_CTX_set_params(kdata->ctx, params) == 0) return -1; return 1; } return 0; } static int pderive_test_run(EVP_TEST *t) { EVP_PKEY_CTX *dctx = NULL; PKEY_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len; if (!TEST_ptr(dctx = EVP_PKEY_CTX_dup(expected->ctx))) { t->err = "DERIVE_ERROR"; goto err; } if (EVP_PKEY_derive(dctx, NULL, &got_len) <= 0 || !TEST_size_t_ne(got_len, 0)) { t->err = "DERIVE_ERROR"; goto err; } if (!TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "DERIVE_ERROR"; goto err; } if (EVP_PKEY_derive(dctx, got, &got_len) <= 0) { t->err = "DERIVE_ERROR"; goto err; } if (!memory_err_compare(t, "SHARED_SECRET_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; err: OPENSSL_free(got); EVP_PKEY_CTX_free(dctx); return 1; } static const EVP_TEST_METHOD pderive_test_method = { "Derive", pderive_test_init, pkey_test_cleanup, pderive_test_parse, pderive_test_run }; typedef enum pbe_type_enum { PBE_TYPE_INVALID = 0, PBE_TYPE_SCRYPT, PBE_TYPE_PBKDF2, PBE_TYPE_PKCS12 } PBE_TYPE; typedef struct pbe_data_st { PBE_TYPE pbe_type; uint64_t N, r, p, maxmem; int id, iter; const EVP_MD *md; unsigned char *pass; size_t pass_len; unsigned char *salt; size_t salt_len; unsigned char *key; size_t key_len; } PBE_DATA; #ifndef OPENSSL_NO_SCRYPT static int parse_uint64(const char *value, uint64_t *pr) { const char *p = value; if (!TEST_true(*p)) { TEST_info("Invalid empty integer value"); return -1; } for (*pr = 0; *p; ) { if (*pr > UINT64_MAX / 10) { TEST_error("Integer overflow in string %s", value); return -1; } *pr *= 10; if (!TEST_true(isdigit((unsigned char)*p))) { TEST_error("Invalid character in string %s", value); return -1; } *pr += *p - '0'; p++; } return 1; } static int scrypt_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PBE_DATA *pdata = t->data; if (strcmp(keyword, "N") == 0) return parse_uint64(value, &pdata->N); if (strcmp(keyword, "p") == 0) return parse_uint64(value, &pdata->p); if (strcmp(keyword, "r") == 0) return parse_uint64(value, &pdata->r); if (strcmp(keyword, "maxmem") == 0) return parse_uint64(value, &pdata->maxmem); return 0; } #endif static int pbkdf2_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PBE_DATA *pdata = t->data; if (strcmp(keyword, "iter") == 0) { pdata->iter = atoi(value); if (pdata->iter <= 0) return -1; return 1; } if (strcmp(keyword, "MD") == 0) { pdata->md = EVP_get_digestbyname(value); if (pdata->md == NULL) return -1; return 1; } return 0; } static int pkcs12_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PBE_DATA *pdata = t->data; if (strcmp(keyword, "id") == 0) { pdata->id = atoi(value); if (pdata->id <= 0) return -1; return 1; } return pbkdf2_test_parse(t, keyword, value); } static int pbe_test_init(EVP_TEST *t, const char *alg) { PBE_DATA *pdat; PBE_TYPE pbe_type = PBE_TYPE_INVALID; if (is_kdf_disabled(alg)) { TEST_info("skipping, '%s' is disabled", alg); t->skip = 1; return 1; } if (strcmp(alg, "scrypt") == 0) { pbe_type = PBE_TYPE_SCRYPT; } else if (strcmp(alg, "pbkdf2") == 0) { pbe_type = PBE_TYPE_PBKDF2; } else if (strcmp(alg, "pkcs12") == 0) { pbe_type = PBE_TYPE_PKCS12; } else { TEST_error("Unknown pbe algorithm %s", alg); return 0; } if (!TEST_ptr(pdat = OPENSSL_zalloc(sizeof(*pdat)))) return 0; pdat->pbe_type = pbe_type; t->data = pdat; return 1; } static void pbe_test_cleanup(EVP_TEST *t) { PBE_DATA *pdat = t->data; OPENSSL_free(pdat->pass); OPENSSL_free(pdat->salt); OPENSSL_free(pdat->key); } static int pbe_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PBE_DATA *pdata = t->data; if (strcmp(keyword, "Password") == 0) return parse_bin(value, &pdata->pass, &pdata->pass_len); if (strcmp(keyword, "Salt") == 0) return parse_bin(value, &pdata->salt, &pdata->salt_len); if (strcmp(keyword, "Key") == 0) return parse_bin(value, &pdata->key, &pdata->key_len); if (pdata->pbe_type == PBE_TYPE_PBKDF2) return pbkdf2_test_parse(t, keyword, value); else if (pdata->pbe_type == PBE_TYPE_PKCS12) return pkcs12_test_parse(t, keyword, value); #ifndef OPENSSL_NO_SCRYPT else if (pdata->pbe_type == PBE_TYPE_SCRYPT) return scrypt_test_parse(t, keyword, value); #endif return 0; } static int pbe_test_run(EVP_TEST *t) { PBE_DATA *expected = t->data; unsigned char *key; EVP_MD *fetched_digest = NULL; OSSL_LIB_CTX *save_libctx; save_libctx = OSSL_LIB_CTX_set0_default(libctx); if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) { t->err = "INTERNAL_ERROR"; goto err; } if (expected->pbe_type == PBE_TYPE_PBKDF2) { if (PKCS5_PBKDF2_HMAC((char *)expected->pass, expected->pass_len, expected->salt, expected->salt_len, expected->iter, expected->md, expected->key_len, key) == 0) { t->err = "PBKDF2_ERROR"; goto err; } #ifndef OPENSSL_NO_SCRYPT } else if (expected->pbe_type == PBE_TYPE_SCRYPT) { if (EVP_PBE_scrypt((const char *)expected->pass, expected->pass_len, expected->salt, expected->salt_len, expected->N, expected->r, expected->p, expected->maxmem, key, expected->key_len) == 0) { t->err = "SCRYPT_ERROR"; goto err; } #endif } else if (expected->pbe_type == PBE_TYPE_PKCS12) { fetched_digest = EVP_MD_fetch(libctx, EVP_MD_get0_name(expected->md), propquery); if (fetched_digest == NULL) { t->err = "PKCS12_ERROR"; goto err; } if (PKCS12_key_gen_uni(expected->pass, expected->pass_len, expected->salt, expected->salt_len, expected->id, expected->iter, expected->key_len, key, fetched_digest) == 0) { t->err = "PKCS12_ERROR"; goto err; } } if (!memory_err_compare(t, "KEY_MISMATCH", expected->key, expected->key_len, key, expected->key_len)) goto err; t->err = NULL; err: EVP_MD_free(fetched_digest); OPENSSL_free(key); OSSL_LIB_CTX_set0_default(save_libctx); return 1; } static const EVP_TEST_METHOD pbe_test_method = { "PBE", pbe_test_init, pbe_test_cleanup, pbe_test_parse, pbe_test_run }; typedef enum { BASE64_CANONICAL_ENCODING = 0, BASE64_VALID_ENCODING = 1, BASE64_INVALID_ENCODING = 2 } base64_encoding_type; typedef struct encode_data_st { unsigned char *input; size_t input_len; unsigned char *output; size_t output_len; base64_encoding_type encoding; } ENCODE_DATA; static int encode_test_init(EVP_TEST *t, const char *encoding) { ENCODE_DATA *edata; if (!TEST_ptr(edata = OPENSSL_zalloc(sizeof(*edata)))) return 0; if (strcmp(encoding, "canonical") == 0) { edata->encoding = BASE64_CANONICAL_ENCODING; } else if (strcmp(encoding, "valid") == 0) { edata->encoding = BASE64_VALID_ENCODING; } else if (strcmp(encoding, "invalid") == 0) { edata->encoding = BASE64_INVALID_ENCODING; if (!TEST_ptr(t->expected_err = OPENSSL_strdup("DECODE_ERROR"))) goto err; } else { TEST_error("Bad encoding: %s." " Should be one of {canonical, valid, invalid}", encoding); goto err; } t->data = edata; return 1; err: OPENSSL_free(edata); return 0; } static void encode_test_cleanup(EVP_TEST *t) { ENCODE_DATA *edata = t->data; OPENSSL_free(edata->input); OPENSSL_free(edata->output); memset(edata, 0, sizeof(*edata)); } static int encode_test_parse(EVP_TEST *t, const char *keyword, const char *value) { ENCODE_DATA *edata = t->data; if (strcmp(keyword, "Input") == 0) return parse_bin(value, &edata->input, &edata->input_len); if (strcmp(keyword, "Output") == 0) return parse_bin(value, &edata->output, &edata->output_len); return 0; } static int encode_test_run(EVP_TEST *t) { ENCODE_DATA *expected = t->data; unsigned char *encode_out = NULL, *decode_out = NULL; int output_len, chunk_len; EVP_ENCODE_CTX *decode_ctx = NULL, *encode_ctx = NULL; if (!TEST_ptr(decode_ctx = EVP_ENCODE_CTX_new())) { t->err = "INTERNAL_ERROR"; goto err; } if (expected->encoding == BASE64_CANONICAL_ENCODING) { if (!TEST_ptr(encode_ctx = EVP_ENCODE_CTX_new()) || !TEST_ptr(encode_out = OPENSSL_malloc(EVP_ENCODE_LENGTH(expected->input_len)))) goto err; EVP_EncodeInit(encode_ctx); if (!TEST_true(EVP_EncodeUpdate(encode_ctx, encode_out, &chunk_len, expected->input, expected->input_len))) goto err; output_len = chunk_len; EVP_EncodeFinal(encode_ctx, encode_out + chunk_len, &chunk_len); output_len += chunk_len; if (!memory_err_compare(t, "BAD_ENCODING", expected->output, expected->output_len, encode_out, output_len)) goto err; } if (!TEST_ptr(decode_out = OPENSSL_malloc(EVP_DECODE_LENGTH(expected->output_len)))) goto err; EVP_DecodeInit(decode_ctx); if (EVP_DecodeUpdate(decode_ctx, decode_out, &chunk_len, expected->output, expected->output_len) < 0) { t->err = "DECODE_ERROR"; goto err; } output_len = chunk_len; if (EVP_DecodeFinal(decode_ctx, decode_out + chunk_len, &chunk_len) != 1) { t->err = "DECODE_ERROR"; goto err; } output_len += chunk_len; if (expected->encoding != BASE64_INVALID_ENCODING && !memory_err_compare(t, "BAD_DECODING", expected->input, expected->input_len, decode_out, output_len)) { t->err = "BAD_DECODING"; goto err; } t->err = NULL; err: OPENSSL_free(encode_out); OPENSSL_free(decode_out); EVP_ENCODE_CTX_free(decode_ctx); EVP_ENCODE_CTX_free(encode_ctx); return 1; } static const EVP_TEST_METHOD encode_test_method = { "Encoding", encode_test_init, encode_test_cleanup, encode_test_parse, encode_test_run, }; #define MAX_RAND_REPEATS 15 typedef struct rand_data_pass_st { unsigned char *entropy; unsigned char *reseed_entropy; unsigned char *nonce; unsigned char *pers; unsigned char *reseed_addin; unsigned char *addinA; unsigned char *addinB; unsigned char *pr_entropyA; unsigned char *pr_entropyB; unsigned char *output; size_t entropy_len, nonce_len, pers_len, addinA_len, addinB_len, pr_entropyA_len, pr_entropyB_len, output_len, reseed_entropy_len, reseed_addin_len; } RAND_DATA_PASS; typedef struct rand_data_st { EVP_RAND_CTX *ctx; EVP_RAND_CTX *parent; int n; int prediction_resistance; int use_df; unsigned int generate_bits; char *cipher; char *digest; RAND_DATA_PASS data[MAX_RAND_REPEATS]; } RAND_DATA; static int rand_test_init(EVP_TEST *t, const char *name) { RAND_DATA *rdata; EVP_RAND *rand; OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; unsigned int strength = 256; if (!TEST_ptr(rdata = OPENSSL_zalloc(sizeof(*rdata)))) return 0; rand = EVP_RAND_fetch(libctx, "TEST-RAND", "-fips"); if (rand == NULL) goto err; rdata->parent = EVP_RAND_CTX_new(rand, NULL); EVP_RAND_free(rand); if (rdata->parent == NULL) goto err; *params = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_STRENGTH, &strength); if (!EVP_RAND_CTX_set_params(rdata->parent, params)) goto err; rand = EVP_RAND_fetch(libctx, name, propquery); if (rand == NULL) goto err; rdata->ctx = EVP_RAND_CTX_new(rand, rdata->parent); EVP_RAND_free(rand); if (rdata->ctx == NULL) goto err; rdata->n = -1; t->data = rdata; return 1; err: EVP_RAND_CTX_free(rdata->parent); OPENSSL_free(rdata); return 0; } static void rand_test_cleanup(EVP_TEST *t) { RAND_DATA *rdata = t->data; int i; OPENSSL_free(rdata->cipher); OPENSSL_free(rdata->digest); for (i = 0; i <= rdata->n; i++) { OPENSSL_free(rdata->data[i].entropy); OPENSSL_free(rdata->data[i].reseed_entropy); OPENSSL_free(rdata->data[i].nonce); OPENSSL_free(rdata->data[i].pers); OPENSSL_free(rdata->data[i].reseed_addin); OPENSSL_free(rdata->data[i].addinA); OPENSSL_free(rdata->data[i].addinB); OPENSSL_free(rdata->data[i].pr_entropyA); OPENSSL_free(rdata->data[i].pr_entropyB); OPENSSL_free(rdata->data[i].output); } EVP_RAND_CTX_free(rdata->ctx); EVP_RAND_CTX_free(rdata->parent); } static int rand_test_parse(EVP_TEST *t, const char *keyword, const char *value) { RAND_DATA *rdata = t->data; RAND_DATA_PASS *item; const char *p; int n; if ((p = strchr(keyword, '.')) != NULL) { n = atoi(++p); if (n >= MAX_RAND_REPEATS) return 0; if (n > rdata->n) rdata->n = n; item = rdata->data + n; if (HAS_PREFIX(keyword, "Entropy.")) return parse_bin(value, &item->entropy, &item->entropy_len); if (HAS_PREFIX(keyword, "ReseedEntropy.")) return parse_bin(value, &item->reseed_entropy, &item->reseed_entropy_len); if (HAS_PREFIX(keyword, "Nonce.")) return parse_bin(value, &item->nonce, &item->nonce_len); if (HAS_PREFIX(keyword, "PersonalisationString.")) return parse_bin(value, &item->pers, &item->pers_len); if (HAS_PREFIX(keyword, "ReseedAdditionalInput.")) return parse_bin(value, &item->reseed_addin, &item->reseed_addin_len); if (HAS_PREFIX(keyword, "AdditionalInputA.")) return parse_bin(value, &item->addinA, &item->addinA_len); if (HAS_PREFIX(keyword, "AdditionalInputB.")) return parse_bin(value, &item->addinB, &item->addinB_len); if (HAS_PREFIX(keyword, "EntropyPredictionResistanceA.")) return parse_bin(value, &item->pr_entropyA, &item->pr_entropyA_len); if (HAS_PREFIX(keyword, "EntropyPredictionResistanceB.")) return parse_bin(value, &item->pr_entropyB, &item->pr_entropyB_len); if (HAS_PREFIX(keyword, "Output.")) return parse_bin(value, &item->output, &item->output_len); } else { if (strcmp(keyword, "Cipher") == 0) return TEST_ptr(rdata->cipher = OPENSSL_strdup(value)); if (strcmp(keyword, "Digest") == 0) return TEST_ptr(rdata->digest = OPENSSL_strdup(value)); if (strcmp(keyword, "DerivationFunction") == 0) { rdata->use_df = atoi(value) != 0; return 1; } if (strcmp(keyword, "GenerateBits") == 0) { if ((n = atoi(value)) <= 0 || n % 8 != 0) return 0; rdata->generate_bits = (unsigned int)n; return 1; } if (strcmp(keyword, "PredictionResistance") == 0) { rdata->prediction_resistance = atoi(value) != 0; return 1; } } return 0; } static int rand_test_run(EVP_TEST *t) { RAND_DATA *expected = t->data; RAND_DATA_PASS *item; unsigned char *got; size_t got_len = expected->generate_bits / 8; OSSL_PARAM params[5], *p = params; int i = -1, ret = 0; unsigned int strength; unsigned char *z; if (!TEST_ptr(got = OPENSSL_malloc(got_len))) return 0; *p++ = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_USE_DF, &expected->use_df); if (expected->cipher != NULL) *p++ = OSSL_PARAM_construct_utf8_string(OSSL_DRBG_PARAM_CIPHER, expected->cipher, 0); if (expected->digest != NULL) *p++ = OSSL_PARAM_construct_utf8_string(OSSL_DRBG_PARAM_DIGEST, expected->digest, 0); *p++ = OSSL_PARAM_construct_utf8_string(OSSL_DRBG_PARAM_MAC, "HMAC", 0); *p = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_RAND_CTX_set_params(expected->ctx, params))) goto err; strength = EVP_RAND_get_strength(expected->ctx); for (i = 0; i <= expected->n; i++) { item = expected->data + i; p = params; z = item->entropy != NULL ? item->entropy : (unsigned char *)""; *p++ = OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, z, item->entropy_len); z = item->nonce != NULL ? item->nonce : (unsigned char *)""; *p++ = OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_NONCE, z, item->nonce_len); *p = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_RAND_instantiate(expected->parent, strength, 0, NULL, 0, params))) goto err; z = item->pers != NULL ? item->pers : (unsigned char *)""; if (!TEST_true(EVP_RAND_instantiate (expected->ctx, strength, expected->prediction_resistance, z, item->pers_len, NULL))) goto err; if (item->reseed_entropy != NULL) { params[0] = OSSL_PARAM_construct_octet_string (OSSL_RAND_PARAM_TEST_ENTROPY, item->reseed_entropy, item->reseed_entropy_len); params[1] = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) goto err; if (!TEST_true(EVP_RAND_reseed (expected->ctx, expected->prediction_resistance, NULL, 0, item->reseed_addin, item->reseed_addin_len))) goto err; } if (item->pr_entropyA != NULL) { params[0] = OSSL_PARAM_construct_octet_string (OSSL_RAND_PARAM_TEST_ENTROPY, item->pr_entropyA, item->pr_entropyA_len); params[1] = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) goto err; } if (!TEST_true(EVP_RAND_generate (expected->ctx, got, got_len, strength, expected->prediction_resistance, item->addinA, item->addinA_len))) goto err; if (item->pr_entropyB != NULL) { params[0] = OSSL_PARAM_construct_octet_string (OSSL_RAND_PARAM_TEST_ENTROPY, item->pr_entropyB, item->pr_entropyB_len); params[1] = OSSL_PARAM_construct_end(); if (!TEST_true(EVP_RAND_CTX_set_params(expected->parent, params))) goto err; } if (!TEST_true(EVP_RAND_generate (expected->ctx, got, got_len, strength, expected->prediction_resistance, item->addinB, item->addinB_len))) goto err; if (!TEST_mem_eq(got, got_len, item->output, item->output_len)) goto err; if (!TEST_true(EVP_RAND_uninstantiate(expected->ctx)) || !TEST_true(EVP_RAND_uninstantiate(expected->parent)) || !TEST_true(EVP_RAND_verify_zeroization(expected->ctx)) || !TEST_int_eq(EVP_RAND_get_state(expected->ctx), EVP_RAND_STATE_UNINITIALISED)) goto err; } t->err = NULL; ret = 1; err: if (ret == 0 && i >= 0) TEST_info("Error in test case %d of %d\n", i, expected->n + 1); OPENSSL_free(got); return ret; } static const EVP_TEST_METHOD rand_test_method = { "RAND", rand_test_init, rand_test_cleanup, rand_test_parse, rand_test_run }; typedef struct kdf_data_st { EVP_KDF_CTX *ctx; unsigned char *output; size_t output_len; OSSL_PARAM params[20]; OSSL_PARAM *p; } KDF_DATA; static int kdf_test_init(EVP_TEST *t, const char *name) { KDF_DATA *kdata; EVP_KDF *kdf; if (is_kdf_disabled(name)) { TEST_info("skipping, '%s' is disabled", name); t->skip = 1; return 1; } if (!TEST_ptr(kdata = OPENSSL_zalloc(sizeof(*kdata)))) return 0; kdata->p = kdata->params; *kdata->p = OSSL_PARAM_construct_end(); kdf = EVP_KDF_fetch(libctx, name, propquery); if (kdf == NULL) { OPENSSL_free(kdata); return 0; } kdata->ctx = EVP_KDF_CTX_new(kdf); EVP_KDF_free(kdf); if (kdata->ctx == NULL) { OPENSSL_free(kdata); return 0; } t->data = kdata; return 1; } static void kdf_test_cleanup(EVP_TEST *t) { KDF_DATA *kdata = t->data; OSSL_PARAM *p; for (p = kdata->params; p->key != NULL; p++) OPENSSL_free(p->data); OPENSSL_free(kdata->output); EVP_KDF_CTX_free(kdata->ctx); } static int kdf_test_ctrl(EVP_TEST *t, EVP_KDF_CTX *kctx, const char *value) { KDF_DATA *kdata = t->data; int rv; char *p, *name; const OSSL_PARAM *defs = EVP_KDF_settable_ctx_params(EVP_KDF_CTX_kdf(kctx)); if (!TEST_ptr(name = OPENSSL_strdup(value))) return 0; p = strchr(name, ':'); if (p == NULL) p = ""; else *p++ = '\0'; if (strcmp(name, "r") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'r' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "lanes") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'lanes' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "iter") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'iter' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "memcost") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'memcost' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "secret") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'secret' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "pass") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'pass' is unsupported"); t->skip = 1; goto end; } if (strcmp(name, "ad") == 0 && OSSL_PARAM_locate_const(defs, name) == NULL) { TEST_info("skipping, setting 'ad' is unsupported"); t->skip = 1; goto end; } rv = OSSL_PARAM_allocate_from_text(kdata->p, defs, name, p, strlen(p), NULL); *++kdata->p = OSSL_PARAM_construct_end(); if (!rv) { t->err = "KDF_PARAM_ERROR"; OPENSSL_free(name); return 0; } if (strcmp(name, "digest") == 0) { if (is_digest_disabled(p)) { TEST_info("skipping, '%s' is disabled", p); t->skip = 1; } goto end; } if ((strcmp(name, "cipher") == 0 || strcmp(name, "cekalg") == 0) && is_cipher_disabled(p)) { TEST_info("skipping, '%s' is disabled", p); t->skip = 1; goto end; } if ((strcmp(name, "mac") == 0) && is_mac_disabled(p)) { TEST_info("skipping, '%s' is disabled", p); t->skip = 1; } end: OPENSSL_free(name); return 1; } static int kdf_test_parse(EVP_TEST *t, const char *keyword, const char *value) { KDF_DATA *kdata = t->data; if (strcmp(keyword, "Output") == 0) return parse_bin(value, &kdata->output, &kdata->output_len); if (HAS_PREFIX(keyword, "Ctrl")) return kdf_test_ctrl(t, kdata->ctx, value); return 0; } static int kdf_test_run(EVP_TEST *t) { KDF_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len = expected->output_len; EVP_KDF_CTX *ctx; if (!EVP_KDF_CTX_set_params(expected->ctx, expected->params)) { t->err = "KDF_CTRL_ERROR"; return 1; } if (!TEST_ptr(got = OPENSSL_malloc(got_len == 0 ? 1 : got_len))) { t->err = "INTERNAL_ERROR"; goto err; } if (fips_provider_version_gt(libctx, 3, 0, 0) && (ctx = EVP_KDF_CTX_dup(expected->ctx)) != NULL) { EVP_KDF_CTX_free(expected->ctx); expected->ctx = ctx; } if (EVP_KDF_derive(expected->ctx, got, got_len, NULL) <= 0) { t->err = "KDF_DERIVE_ERROR"; goto err; } if (!memory_err_compare(t, "KDF_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; err: OPENSSL_free(got); return 1; } static const EVP_TEST_METHOD kdf_test_method = { "KDF", kdf_test_init, kdf_test_cleanup, kdf_test_parse, kdf_test_run }; typedef struct pkey_kdf_data_st { EVP_PKEY_CTX *ctx; unsigned char *output; size_t output_len; } PKEY_KDF_DATA; static int pkey_kdf_test_init(EVP_TEST *t, const char *name) { PKEY_KDF_DATA *kdata = NULL; if (is_kdf_disabled(name)) { TEST_info("skipping, '%s' is disabled", name); t->skip = 1; return 1; } if (!TEST_ptr(kdata = OPENSSL_zalloc(sizeof(*kdata)))) return 0; kdata->ctx = EVP_PKEY_CTX_new_from_name(libctx, name, propquery); if (kdata->ctx == NULL || EVP_PKEY_derive_init(kdata->ctx) <= 0) goto err; t->data = kdata; return 1; err: EVP_PKEY_CTX_free(kdata->ctx); OPENSSL_free(kdata); return 0; } static void pkey_kdf_test_cleanup(EVP_TEST *t) { PKEY_KDF_DATA *kdata = t->data; OPENSSL_free(kdata->output); EVP_PKEY_CTX_free(kdata->ctx); } static int pkey_kdf_test_parse(EVP_TEST *t, const char *keyword, const char *value) { PKEY_KDF_DATA *kdata = t->data; if (strcmp(keyword, "Output") == 0) return parse_bin(value, &kdata->output, &kdata->output_len); if (HAS_PREFIX(keyword, "Ctrl")) return pkey_test_ctrl(t, kdata->ctx, value); return 0; } static int pkey_kdf_test_run(EVP_TEST *t) { PKEY_KDF_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len = 0; if (fips_provider_version_eq(libctx, 3, 0, 0)) { got_len = expected->output_len; } else { if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) { t->err = "INTERNAL_ERROR"; goto err; } if (got_len == SIZE_MAX || got_len == 0) got_len = expected->output_len; else got_len = expected->output_len * 2; } if (!TEST_ptr(got = OPENSSL_malloc(got_len == 0 ? 1 : got_len))) { t->err = "INTERNAL_ERROR"; goto err; } if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) { t->err = "KDF_DERIVE_ERROR"; goto err; } if (!TEST_mem_eq(expected->output, expected->output_len, got, got_len)) { t->err = "KDF_MISMATCH"; goto err; } t->err = NULL; err: OPENSSL_free(got); return 1; } static const EVP_TEST_METHOD pkey_kdf_test_method = { "PKEYKDF", pkey_kdf_test_init, pkey_kdf_test_cleanup, pkey_kdf_test_parse, pkey_kdf_test_run }; typedef struct keypair_test_data_st { EVP_PKEY *privk; EVP_PKEY *pubk; } KEYPAIR_TEST_DATA; static int keypair_test_init(EVP_TEST *t, const char *pair) { KEYPAIR_TEST_DATA *data; int rv = 0; EVP_PKEY *pk = NULL, *pubk = NULL; char *pub, *priv = NULL; if (!TEST_ptr(priv = OPENSSL_strdup(pair)) || !TEST_ptr(pub = strchr(priv, ':'))) { t->err = "PARSING_ERROR"; goto end; } *pub++ = '\0'; if (!TEST_true(find_key(&pk, priv, private_keys))) { TEST_info("Can't find private key: %s", priv); t->err = "MISSING_PRIVATE_KEY"; goto end; } if (!TEST_true(find_key(&pubk, pub, public_keys))) { TEST_info("Can't find public key: %s", pub); t->err = "MISSING_PUBLIC_KEY"; goto end; } if (pk == NULL && pubk == NULL) { t->skip = 1; rv = 1; goto end; } if (!TEST_ptr(data = OPENSSL_malloc(sizeof(*data)))) goto end; data->privk = pk; data->pubk = pubk; t->data = data; rv = 1; t->err = NULL; end: OPENSSL_free(priv); return rv; } static void keypair_test_cleanup(EVP_TEST *t) { OPENSSL_free(t->data); t->data = NULL; } static int void_test_parse(EVP_TEST *t, const char *keyword, const char *value) { return 0; } static int keypair_test_run(EVP_TEST *t) { int rv = 0; const KEYPAIR_TEST_DATA *pair = t->data; if (pair->privk == NULL || pair->pubk == NULL) { t->err = "KEYPAIR_TYPE_MISMATCH"; rv = 1; goto end; } if ((rv = EVP_PKEY_eq(pair->privk, pair->pubk)) != 1) { if (0 == rv) { t->err = "KEYPAIR_MISMATCH"; } else if (-1 == rv) { t->err = "KEYPAIR_TYPE_MISMATCH"; } else if (-2 == rv) { t->err = "UNSUPPORTED_KEY_COMPARISON"; } else { TEST_error("Unexpected error in key comparison"); rv = 0; goto end; } rv = 1; goto end; } rv = 1; t->err = NULL; end: return rv; } static const EVP_TEST_METHOD keypair_test_method = { "PrivPubKeyPair", keypair_test_init, keypair_test_cleanup, void_test_parse, keypair_test_run }; typedef struct keygen_test_data_st { EVP_PKEY_CTX *genctx; char *keyname; } KEYGEN_TEST_DATA; static int keygen_test_init(EVP_TEST *t, const char *alg) { KEYGEN_TEST_DATA *data; EVP_PKEY_CTX *genctx; int nid = OBJ_sn2nid(alg); if (nid == NID_undef) { nid = OBJ_ln2nid(alg); if (nid == NID_undef) return 0; } if (is_pkey_disabled(alg)) { t->skip = 1; return 1; } if (!TEST_ptr(genctx = EVP_PKEY_CTX_new_from_name(libctx, alg, propquery))) goto err; if (EVP_PKEY_keygen_init(genctx) <= 0) { t->err = "KEYGEN_INIT_ERROR"; goto err; } if (!TEST_ptr(data = OPENSSL_malloc(sizeof(*data)))) goto err; data->genctx = genctx; data->keyname = NULL; t->data = data; t->err = NULL; return 1; err: EVP_PKEY_CTX_free(genctx); return 0; } static void keygen_test_cleanup(EVP_TEST *t) { KEYGEN_TEST_DATA *keygen = t->data; EVP_PKEY_CTX_free(keygen->genctx); OPENSSL_free(keygen->keyname); OPENSSL_free(t->data); t->data = NULL; } static int keygen_test_parse(EVP_TEST *t, const char *keyword, const char *value) { KEYGEN_TEST_DATA *keygen = t->data; if (strcmp(keyword, "KeyName") == 0) return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); if (strcmp(keyword, "Ctrl") == 0) return pkey_test_ctrl(t, keygen->genctx, value); return 0; } static int keygen_test_run(EVP_TEST *t) { KEYGEN_TEST_DATA *keygen = t->data; EVP_PKEY *pkey = NULL; int rv = 1; if (EVP_PKEY_keygen(keygen->genctx, &pkey) <= 0) { t->err = "KEYGEN_GENERATE_ERROR"; goto err; } if (!evp_pkey_is_provided(pkey)) { TEST_info("Warning: legacy key generated %s", keygen->keyname); goto err; } if (keygen->keyname != NULL) { KEY_LIST *key; rv = 0; if (find_key(NULL, keygen->keyname, private_keys)) { TEST_info("Duplicate key %s", keygen->keyname); goto err; } if (!TEST_ptr(key = OPENSSL_malloc(sizeof(*key)))) goto err; key->name = keygen->keyname; keygen->keyname = NULL; key->key = pkey; key->next = private_keys; private_keys = key; rv = 1; } else { EVP_PKEY_free(pkey); } t->err = NULL; err: return rv; } static const EVP_TEST_METHOD keygen_test_method = { "KeyGen", keygen_test_init, keygen_test_cleanup, keygen_test_parse, keygen_test_run, }; typedef struct { int is_verify; int is_oneshot; const EVP_MD *md; EVP_MD_CTX *ctx; EVP_PKEY_CTX *pctx; STACK_OF(EVP_TEST_BUFFER) *input; unsigned char *osin; size_t osin_len; unsigned char *output; size_t output_len; const char *nonce_type; } DIGESTSIGN_DATA; static int digestsigver_test_init(EVP_TEST *t, const char *alg, int is_verify, int is_oneshot) { const EVP_MD *md = NULL; DIGESTSIGN_DATA *mdat; if (strcmp(alg, "NULL") != 0) { if (is_digest_disabled(alg)) { t->skip = 1; return 1; } md = EVP_get_digestbyname(alg); if (md == NULL) return 0; } if (!TEST_ptr(mdat = OPENSSL_zalloc(sizeof(*mdat)))) return 0; mdat->md = md; if (!TEST_ptr(mdat->ctx = EVP_MD_CTX_new())) { OPENSSL_free(mdat); return 0; } mdat->is_verify = is_verify; mdat->is_oneshot = is_oneshot; t->data = mdat; return 1; } static int digestsign_test_init(EVP_TEST *t, const char *alg) { return digestsigver_test_init(t, alg, 0, 0); } static void digestsigver_test_cleanup(EVP_TEST *t) { DIGESTSIGN_DATA *mdata = t->data; EVP_MD_CTX_free(mdata->ctx); sk_EVP_TEST_BUFFER_pop_free(mdata->input, evp_test_buffer_free); OPENSSL_free(mdata->osin); OPENSSL_free(mdata->output); OPENSSL_free(mdata); t->data = NULL; } static int digestsigver_test_parse(EVP_TEST *t, const char *keyword, const char *value) { DIGESTSIGN_DATA *mdata = t->data; if (strcmp(keyword, "Key") == 0) { EVP_PKEY *pkey = NULL; int rv = 0; const char *name = mdata->md == NULL ? NULL : EVP_MD_get0_name(mdata->md); if (mdata->is_verify) rv = find_key(&pkey, value, public_keys); if (rv == 0) rv = find_key(&pkey, value, private_keys); if (rv == 0 || pkey == NULL) { t->skip = 1; return 1; } if (mdata->is_verify) { if (!EVP_DigestVerifyInit_ex(mdata->ctx, &mdata->pctx, name, libctx, NULL, pkey, NULL)) t->err = "DIGESTVERIFYINIT_ERROR"; return 1; } if (!EVP_DigestSignInit_ex(mdata->ctx, &mdata->pctx, name, libctx, NULL, pkey, NULL)) t->err = "DIGESTSIGNINIT_ERROR"; return 1; } if (strcmp(keyword, "Input") == 0) { if (mdata->is_oneshot) return parse_bin(value, &mdata->osin, &mdata->osin_len); return evp_test_buffer_append(value, &mdata->input); } if (strcmp(keyword, "Output") == 0) return parse_bin(value, &mdata->output, &mdata->output_len); if (!mdata->is_oneshot) { if (strcmp(keyword, "Count") == 0) return evp_test_buffer_set_count(value, mdata->input); if (strcmp(keyword, "Ncopy") == 0) return evp_test_buffer_ncopy(value, mdata->input); } if (strcmp(keyword, "Ctrl") == 0) { if (mdata->pctx == NULL) return -1; return pkey_test_ctrl(t, mdata->pctx, value); } if (strcmp(keyword, "NonceType") == 0) { if (strcmp(value, "deterministic") == 0) { OSSL_PARAM params[2]; unsigned int nonce_type = 1; params[0] = OSSL_PARAM_construct_uint(OSSL_SIGNATURE_PARAM_NONCE_TYPE, &nonce_type); params[1] = OSSL_PARAM_construct_end(); if (!EVP_PKEY_CTX_set_params(mdata->pctx, params)) t->err = "EVP_PKEY_CTX_set_params_ERROR"; else if (!EVP_PKEY_CTX_get_params(mdata->pctx, params)) t->err = "EVP_PKEY_CTX_get_params_ERROR"; else if (!OSSL_PARAM_modified(&params[0])) t->err = "nonce_type_not_modified_ERROR"; else if (nonce_type != 1) t->err = "nonce_type_value_ERROR"; } return 1; } return 0; } static int digestsign_update_fn(void *ctx, const unsigned char *buf, size_t buflen) { return EVP_DigestSignUpdate(ctx, buf, buflen); } static int digestsign_test_run(EVP_TEST *t) { DIGESTSIGN_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len; if (!evp_test_buffer_do(expected->input, digestsign_update_fn, expected->ctx)) { t->err = "DIGESTUPDATE_ERROR"; goto err; } if (!EVP_DigestSignFinal(expected->ctx, NULL, &got_len)) { t->err = "DIGESTSIGNFINAL_LENGTH_ERROR"; goto err; } if (!TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "MALLOC_FAILURE"; goto err; } got_len *= 2; if (!EVP_DigestSignFinal(expected->ctx, got, &got_len)) { t->err = "DIGESTSIGNFINAL_ERROR"; goto err; } if (!memory_err_compare(t, "SIGNATURE_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; err: OPENSSL_free(got); return 1; } static const EVP_TEST_METHOD digestsign_test_method = { "DigestSign", digestsign_test_init, digestsigver_test_cleanup, digestsigver_test_parse, digestsign_test_run }; static int digestverify_test_init(EVP_TEST *t, const char *alg) { return digestsigver_test_init(t, alg, 1, 0); } static int digestverify_update_fn(void *ctx, const unsigned char *buf, size_t buflen) { return EVP_DigestVerifyUpdate(ctx, buf, buflen); } static int digestverify_test_run(EVP_TEST *t) { DIGESTSIGN_DATA *mdata = t->data; if (!evp_test_buffer_do(mdata->input, digestverify_update_fn, mdata->ctx)) { t->err = "DIGESTUPDATE_ERROR"; return 1; } if (EVP_DigestVerifyFinal(mdata->ctx, mdata->output, mdata->output_len) <= 0) t->err = "VERIFY_ERROR"; return 1; } static const EVP_TEST_METHOD digestverify_test_method = { "DigestVerify", digestverify_test_init, digestsigver_test_cleanup, digestsigver_test_parse, digestverify_test_run }; static int oneshot_digestsign_test_init(EVP_TEST *t, const char *alg) { return digestsigver_test_init(t, alg, 0, 1); } static int oneshot_digestsign_test_run(EVP_TEST *t) { DIGESTSIGN_DATA *expected = t->data; unsigned char *got = NULL; size_t got_len; if (!EVP_DigestSign(expected->ctx, NULL, &got_len, expected->osin, expected->osin_len)) { t->err = "DIGESTSIGN_LENGTH_ERROR"; goto err; } if (!TEST_ptr(got = OPENSSL_malloc(got_len))) { t->err = "MALLOC_FAILURE"; goto err; } got_len *= 2; if (!EVP_DigestSign(expected->ctx, got, &got_len, expected->osin, expected->osin_len)) { t->err = "DIGESTSIGN_ERROR"; goto err; } if (!memory_err_compare(t, "SIGNATURE_MISMATCH", expected->output, expected->output_len, got, got_len)) goto err; t->err = NULL; err: OPENSSL_free(got); return 1; } static const EVP_TEST_METHOD oneshot_digestsign_test_method = { "OneShotDigestSign", oneshot_digestsign_test_init, digestsigver_test_cleanup, digestsigver_test_parse, oneshot_digestsign_test_run }; static int oneshot_digestverify_test_init(EVP_TEST *t, const char *alg) { return digestsigver_test_init(t, alg, 1, 1); } static int oneshot_digestverify_test_run(EVP_TEST *t) { DIGESTSIGN_DATA *mdata = t->data; if (EVP_DigestVerify(mdata->ctx, mdata->output, mdata->output_len, mdata->osin, mdata->osin_len) <= 0) t->err = "VERIFY_ERROR"; return 1; } static const EVP_TEST_METHOD oneshot_digestverify_test_method = { "OneShotDigestVerify", oneshot_digestverify_test_init, digestsigver_test_cleanup, digestsigver_test_parse, oneshot_digestverify_test_run }; static const EVP_TEST_METHOD *evp_test_list[] = { &rand_test_method, &cipher_test_method, &digest_test_method, &digestsign_test_method, &digestverify_test_method, &encode_test_method, &kdf_test_method, &pkey_kdf_test_method, &keypair_test_method, &keygen_test_method, &mac_test_method, &oneshot_digestsign_test_method, &oneshot_digestverify_test_method, &pbe_test_method, &pdecrypt_test_method, &pderive_test_method, &psign_test_method, &pverify_recover_test_method, &pverify_test_method, NULL }; static const EVP_TEST_METHOD *find_test(const char *name) { const EVP_TEST_METHOD **tt; for (tt = evp_test_list; *tt; tt++) { if (strcmp(name, (*tt)->name) == 0) return *tt; } return NULL; } static void clear_test(EVP_TEST *t) { test_clearstanza(&t->s); ERR_clear_error(); if (t->data != NULL) { if (t->meth != NULL) t->meth->cleanup(t); OPENSSL_free(t->data); t->data = NULL; } OPENSSL_free(t->expected_err); t->expected_err = NULL; OPENSSL_free(t->reason); t->reason = NULL; t->err = NULL; t->skip = 0; t->meth = NULL; #if !defined(OPENSSL_NO_DEFAULT_THREAD_POOL) OSSL_set_max_threads(libctx, 0); #endif } static int check_test_error(EVP_TEST *t) { unsigned long err; const char *reason; if (t->err == NULL && t->expected_err == NULL) return 1; if (t->err != NULL && t->expected_err == NULL) { if (t->aux_err != NULL) { TEST_info("%s:%d: Source of above error (%s); unexpected error %s", t->s.test_file, t->s.start, t->aux_err, t->err); } else { TEST_info("%s:%d: Source of above error; unexpected error %s", t->s.test_file, t->s.start, t->err); } return 0; } if (t->err == NULL && t->expected_err != NULL) { TEST_info("%s:%d: Succeeded but was expecting %s", t->s.test_file, t->s.start, t->expected_err); return 0; } if (strcmp(t->err, t->expected_err) != 0) { TEST_info("%s:%d: Expected %s got %s", t->s.test_file, t->s.start, t->expected_err, t->err); return 0; } if (t->reason == NULL) return 1; if (t->reason == NULL) { TEST_info("%s:%d: Test is missing function or reason code", t->s.test_file, t->s.start); return 0; } err = ERR_peek_error(); if (err == 0) { TEST_info("%s:%d: Expected error \"%s\" not set", t->s.test_file, t->s.start, t->reason); return 0; } reason = ERR_reason_error_string(err); if (reason == NULL) { TEST_info("%s:%d: Expected error \"%s\", no strings available." " Assuming ok.", t->s.test_file, t->s.start, t->reason); return 1; } if (strcmp(reason, t->reason) == 0) return 1; TEST_info("%s:%d: Expected error \"%s\", got \"%s\"", t->s.test_file, t->s.start, t->reason, reason); return 0; } static int run_test(EVP_TEST *t) { if (t->meth == NULL) return 1; t->s.numtests++; if (t->skip) { t->s.numskip++; } else { if (t->err == NULL && t->meth->run_test(t) != 1) { TEST_info("%s:%d %s error", t->s.test_file, t->s.start, t->meth->name); return 0; } if (!check_test_error(t)) { TEST_openssl_errors(); t->s.errors++; } } return 1; } static int find_key(EVP_PKEY **ppk, const char *name, KEY_LIST *lst) { for (; lst != NULL; lst = lst->next) { if (strcmp(lst->name, name) == 0) { if (ppk != NULL) *ppk = lst->key; return 1; } } return 0; } static void free_key_list(KEY_LIST *lst) { while (lst != NULL) { KEY_LIST *next = lst->next; EVP_PKEY_free(lst->key); OPENSSL_free(lst->name); OPENSSL_free(lst); lst = next; } } static int key_unsupported(void) { long err = ERR_peek_last_error(); int lib = ERR_GET_LIB(err); long reason = ERR_GET_REASON(err); if ((lib == ERR_LIB_EVP && reason == EVP_R_UNSUPPORTED_ALGORITHM) || (lib == ERR_LIB_EVP && reason == EVP_R_DECODE_ERROR) || reason == ERR_R_UNSUPPORTED) { ERR_clear_error(); return 1; } #ifndef OPENSSL_NO_EC if (lib == ERR_LIB_EC && (reason == EC_R_UNKNOWN_GROUP || reason == EC_R_INVALID_CURVE)) { ERR_clear_error(); return 1; } #endif return 0; } static char *take_value(PAIR *pp) { char *p = pp->value; pp->value = NULL; return p; } #if !defined(OPENSSL_NO_FIPS_SECURITYCHECKS) static int securitycheck_enabled(void) { static int enabled = -1; if (enabled == -1) { if (OSSL_PROVIDER_available(libctx, "fips")) { OSSL_PARAM params[2]; OSSL_PROVIDER *prov = NULL; int check = 1; prov = OSSL_PROVIDER_load(libctx, "fips"); if (prov != NULL) { params[0] = OSSL_PARAM_construct_int(OSSL_PROV_PARAM_SECURITY_CHECKS, &check); params[1] = OSSL_PARAM_construct_end(); OSSL_PROVIDER_get_params(prov, params); OSSL_PROVIDER_unload(prov); } enabled = check; return enabled; } enabled = 0; } return enabled; } #endif static int prov_available(char *providers) { char *p; int more = 1; while (more) { for (; isspace((unsigned char)(*providers)); providers++) continue; if (*providers == '\0') break; for (p = providers; *p != '\0' && !isspace((unsigned char)(*p)); p++) continue; if (*p == '\0') more = 0; else *p = '\0'; if (OSSL_PROVIDER_available(libctx, providers)) return 1; } return 0; } static int parse(EVP_TEST *t) { KEY_LIST *key, **klist; EVP_PKEY *pkey; PAIR *pp; int i, j, skipped = 0; top: do { if (BIO_eof(t->s.fp)) return EOF; clear_test(t); if (!test_readstanza(&t->s)) return 0; } while (t->s.numpairs == 0); pp = &t->s.pairs[0]; klist = NULL; pkey = NULL; start: if (strcmp(pp->key, "PrivateKey") == 0) { pkey = PEM_read_bio_PrivateKey_ex(t->s.key, NULL, 0, NULL, libctx, NULL); if (pkey == NULL && !key_unsupported()) { EVP_PKEY_free(pkey); TEST_info("Can't read private key %s", pp->value); TEST_openssl_errors(); return 0; } klist = &private_keys; } else if (strcmp(pp->key, "PublicKey") == 0) { pkey = PEM_read_bio_PUBKEY_ex(t->s.key, NULL, 0, NULL, libctx, NULL); if (pkey == NULL && !key_unsupported()) { EVP_PKEY_free(pkey); TEST_info("Can't read public key %s", pp->value); TEST_openssl_errors(); return 0; } klist = &public_keys; } else if (strcmp(pp->key, "PrivateKeyRaw") == 0 || strcmp(pp->key, "PublicKeyRaw") == 0) { char *strnid = NULL, *keydata = NULL; unsigned char *keybin; size_t keylen; int nid; if (strcmp(pp->key, "PrivateKeyRaw") == 0) klist = &private_keys; else klist = &public_keys; strnid = strchr(pp->value, ':'); if (strnid != NULL) { *strnid++ = '\0'; keydata = strchr(strnid, ':'); if (keydata != NULL) *keydata++ = '\0'; } if (keydata == NULL) { TEST_info("Failed to parse %s value", pp->key); return 0; } nid = OBJ_txt2nid(strnid); if (nid == NID_undef) { TEST_info("Unrecognised algorithm NID"); return 0; } if (!parse_bin(keydata, &keybin, &keylen)) { TEST_info("Failed to create binary key"); return 0; } if (klist == &private_keys) pkey = EVP_PKEY_new_raw_private_key_ex(libctx, strnid, NULL, keybin, keylen); else pkey = EVP_PKEY_new_raw_public_key_ex(libctx, strnid, NULL, keybin, keylen); if (pkey == NULL && !key_unsupported()) { TEST_info("Can't read %s data", pp->key); OPENSSL_free(keybin); TEST_openssl_errors(); return 0; } OPENSSL_free(keybin); } else if (strcmp(pp->key, "Availablein") == 0) { if (!prov_available(pp->value)) { TEST_info("skipping, '%s' provider not available: %s:%d", pp->value, t->s.test_file, t->s.start); t->skip = 1; return 0; } skipped++; pp++; goto start; } else if (strcmp(pp->key, "FIPSversion") == 0) { if (prov_available("fips")) { j = fips_provider_version_match(libctx, pp->value); if (j < 0) { TEST_info("Line %d: error matching FIPS versions\n", t->s.curr); return 0; } else if (j == 0) { TEST_info("skipping, FIPS provider incompatible version: %s:%d", t->s.test_file, t->s.start); t->skip = 1; return 0; } } skipped++; pp++; goto start; } if (klist != NULL) { if (find_key(NULL, pp->value, *klist)) { TEST_info("Duplicate key %s", pp->value); return 0; } if (!TEST_ptr(key = OPENSSL_malloc(sizeof(*key)))) return 0; key->name = take_value(pp); key->key = pkey; key->next = *klist; *klist = key; if ((t->s.numpairs - skipped) != 1) TEST_info("Line %d: missing blank line\n", t->s.curr); goto top; } if (!TEST_ptr(t->meth = find_test(pp->key))) return 0; if (!t->meth->init(t, pp->value)) { TEST_error("unknown %s: %s\n", pp->key, pp->value); return 0; } if (t->skip == 1) { return 0; } for (pp++, i = 1; i < (t->s.numpairs - skipped); pp++, i++) { if (strcmp(pp->key, "Securitycheck") == 0) { #if defined(OPENSSL_NO_FIPS_SECURITYCHECKS) #else if (!securitycheck_enabled()) #endif { TEST_info("skipping, Securitycheck is disabled: %s:%d", t->s.test_file, t->s.start); t->skip = 1; return 0; } } else if (strcmp(pp->key, "Availablein") == 0) { TEST_info("Line %d: 'Availablein' should be the first option", t->s.curr); return 0; } else if (strcmp(pp->key, "Result") == 0) { if (t->expected_err != NULL) { TEST_info("Line %d: multiple result lines", t->s.curr); return 0; } t->expected_err = take_value(pp); } else if (strcmp(pp->key, "Function") == 0) { } else if (strcmp(pp->key, "Reason") == 0) { if (t->reason != NULL) { TEST_info("Line %d: multiple reason lines", t->s.curr); return 0; } t->reason = take_value(pp); } else if (strcmp(pp->key, "Threads") == 0) { if (OSSL_set_max_threads(libctx, atoi(pp->value)) == 0) { TEST_info("skipping, '%s' threads not available: %s:%d", pp->value, t->s.test_file, t->s.start); t->skip = 1; } } else { int rv = t->meth->parse(t, pp->key, pp->value); if (rv == 0) { TEST_info("Line %d: unknown keyword %s", t->s.curr, pp->key); return 0; } if (rv < 0) { TEST_info("Line %d: error processing keyword %s = %s\n", t->s.curr, pp->key, pp->value); return 0; } if (t->skip) return 0; } } return 1; } static int run_file_tests(int i) { EVP_TEST *t; const char *testfile = test_get_argument(i); int c; if (!TEST_ptr(t = OPENSSL_zalloc(sizeof(*t)))) return 0; if (!test_start_file(&t->s, testfile)) { OPENSSL_free(t); return 0; } while (!BIO_eof(t->s.fp)) { c = parse(t); if (t->skip) { t->s.numskip++; continue; } if (c == 0 || !run_test(t)) { t->s.errors++; break; } } test_end_file(&t->s); clear_test(t); free_key_list(public_keys); free_key_list(private_keys); BIO_free(t->s.key); c = t->s.errors; OPENSSL_free(t); return c == 0; } const OPTIONS *test_get_options(void) { static const OPTIONS test_options[] = { OPT_TEST_OPTIONS_WITH_EXTRA_USAGE("[file...]\n"), { "config", OPT_CONFIG_FILE, '<', "The configuration file to use for the libctx" }, { "process", OPT_IN_PLACE, 's', "Mode for data processing by cipher tests [in_place/both], both by default"}, { "provider", OPT_PROVIDER_NAME, 's', "The provider to load (when no configuration file, the default value is 'default')" }, { "propquery", OPT_PROV_PROPQUERY, 's', "Property query used when fetching algorithms" }, { OPT_HELP_STR, 1, '-', "file\tFile to run tests on.\n" }, { NULL } }; return test_options; } int setup_tests(void) { size_t n; char *config_file = NULL; char *provider_name = NULL; OPTION_CHOICE o; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_CONFIG_FILE: config_file = opt_arg(); break; case OPT_IN_PLACE: if ((process_mode_in_place = evp_test_process_mode(opt_arg())) == -1) return 0; break; case OPT_PROVIDER_NAME: provider_name = opt_arg(); break; case OPT_PROV_PROPQUERY: propquery = opt_arg(); break; case OPT_TEST_CASES: break; default: case OPT_ERR: return 0; } } if (config_file == NULL && provider_name == NULL) provider_name = "default"; if (!test_get_libctx(&libctx, &prov_null, config_file, &libprov, provider_name)) return 0; n = test_get_argument_count(); if (n == 0) return 0; ADD_ALL_TESTS(run_file_tests, n); return 1; } void cleanup_tests(void) { OSSL_PROVIDER_unload(libprov); OSSL_PROVIDER_unload(prov_null); OSSL_LIB_CTX_free(libctx); } static int is_digest_disabled(const char *name) { #ifdef OPENSSL_NO_BLAKE2 if (HAS_CASE_PREFIX(name, "BLAKE")) return 1; #endif #ifdef OPENSSL_NO_MD2 if (OPENSSL_strcasecmp(name, "MD2") == 0) return 1; #endif #ifdef OPENSSL_NO_MDC2 if (OPENSSL_strcasecmp(name, "MDC2") == 0) return 1; #endif #ifdef OPENSSL_NO_MD4 if (OPENSSL_strcasecmp(name, "MD4") == 0) return 1; #endif #ifdef OPENSSL_NO_MD5 if (OPENSSL_strcasecmp(name, "MD5") == 0) return 1; #endif #ifdef OPENSSL_NO_RMD160 if (OPENSSL_strcasecmp(name, "RIPEMD160") == 0) return 1; #endif #ifdef OPENSSL_NO_SM3 if (OPENSSL_strcasecmp(name, "SM3") == 0) return 1; #endif #ifdef OPENSSL_NO_WHIRLPOOL if (OPENSSL_strcasecmp(name, "WHIRLPOOL") == 0) return 1; #endif return 0; } static int is_pkey_disabled(const char *name) { #ifdef OPENSSL_NO_EC if (HAS_CASE_PREFIX(name, "EC")) return 1; #endif #ifdef OPENSSL_NO_DH if (HAS_CASE_PREFIX(name, "DH")) return 1; #endif #ifdef OPENSSL_NO_DSA if (HAS_CASE_PREFIX(name, "DSA")) return 1; #endif return 0; } static int is_mac_disabled(const char *name) { #ifdef OPENSSL_NO_BLAKE2 if (HAS_CASE_PREFIX(name, "BLAKE2BMAC") || HAS_CASE_PREFIX(name, "BLAKE2SMAC")) return 1; #endif #ifdef OPENSSL_NO_CMAC if (HAS_CASE_PREFIX(name, "CMAC")) return 1; #endif #ifdef OPENSSL_NO_POLY1305 if (HAS_CASE_PREFIX(name, "Poly1305")) return 1; #endif #ifdef OPENSSL_NO_SIPHASH if (HAS_CASE_PREFIX(name, "SipHash")) return 1; #endif return 0; } static int is_kdf_disabled(const char *name) { #ifdef OPENSSL_NO_SCRYPT if (HAS_CASE_SUFFIX(name, "SCRYPT")) return 1; #endif #ifdef OPENSSL_NO_ARGON2 if (HAS_CASE_SUFFIX(name, "ARGON2")) return 1; #endif return 0; } static int is_cipher_disabled(const char *name) { #ifdef OPENSSL_NO_ARIA if (HAS_CASE_PREFIX(name, "ARIA")) return 1; #endif #ifdef OPENSSL_NO_BF if (HAS_CASE_PREFIX(name, "BF")) return 1; #endif #ifdef OPENSSL_NO_CAMELLIA if (HAS_CASE_PREFIX(name, "CAMELLIA")) return 1; #endif #ifdef OPENSSL_NO_CAST if (HAS_CASE_PREFIX(name, "CAST")) return 1; #endif #ifdef OPENSSL_NO_CHACHA if (HAS_CASE_PREFIX(name, "CHACHA")) return 1; #endif #ifdef OPENSSL_NO_POLY1305 if (HAS_CASE_SUFFIX(name, "Poly1305")) return 1; #endif #ifdef OPENSSL_NO_DES if (HAS_CASE_PREFIX(name, "DES")) return 1; if (HAS_CASE_SUFFIX(name, "3DESwrap")) return 1; #endif #ifdef OPENSSL_NO_OCB if (HAS_CASE_SUFFIX(name, "OCB")) return 1; #endif #ifdef OPENSSL_NO_IDEA if (HAS_CASE_PREFIX(name, "IDEA")) return 1; #endif #ifdef OPENSSL_NO_RC2 if (HAS_CASE_PREFIX(name, "RC2")) return 1; #endif #ifdef OPENSSL_NO_RC4 if (HAS_CASE_PREFIX(name, "RC4")) return 1; #endif #ifdef OPENSSL_NO_RC5 if (HAS_CASE_PREFIX(name, "RC5")) return 1; #endif #ifdef OPENSSL_NO_SEED if (HAS_CASE_PREFIX(name, "SEED")) return 1; #endif #ifdef OPENSSL_NO_SIV if (HAS_CASE_SUFFIX(name, "SIV")) return 1; #endif #ifdef OPENSSL_NO_SM4 if (HAS_CASE_PREFIX(name, "SM4")) return 1; #endif return 0; }
test
openssl/test/evp_test.c
openssl
#include <openssl/bio.h> #include "internal/e_os.h" #include "internal/sockets.h" #include "internal/bio_tfo.h" #include "testutil.h" #if defined(OPENSSL_SYS_LINUX) # define GOOD_OS 1 #elif defined(__FreeBSD__) # define GOOD_OS 1 #elif defined(OPENSSL_SYS_MACOSX) # define GOOD_OS 1 #else # ifdef GOOD_OS # undef GOOD_OS # endif #endif #if !defined(OPENSSL_NO_TFO) && defined(GOOD_OS) # define SOCKET_DATA "FooBar" # define SOCKET_DATA_LEN sizeof(SOCKET_DATA) static int test_bio_tfo(int idx) { BIO *cbio = NULL; BIO *abio = NULL; BIO *sbio = NULL; int ret = 0; int sockerr = 0; const char *port; int server_tfo = 0; int client_tfo = 0; size_t bytes; char read_buffer[20]; switch (idx) { default: case 0: break; case 1: case 2: server_tfo = 1; client_tfo = 1; break; case 3: client_tfo = 1; break; case 4: server_tfo = 1; break; } if (!TEST_ptr(abio = BIO_new_accept("localhost:0")) || !TEST_true(BIO_set_nbio_accept(abio, 1)) || !TEST_true(BIO_set_tfo_accept(abio, server_tfo)) || !TEST_int_gt(BIO_do_accept(abio), 0) || !TEST_ptr(port = BIO_get_accept_port(abio))) { sockerr = get_last_socket_error(); goto err; } if (!TEST_ptr(cbio = BIO_new_connect("localhost")) || !TEST_long_gt(BIO_set_conn_port(cbio, port), 0) || !TEST_long_gt(BIO_set_nbio(cbio, 1), 0) || !TEST_long_gt(BIO_set_tfo(cbio, client_tfo), 0)) { sockerr = get_last_socket_error(); goto err; } if (BIO_do_accept(abio) <= 0) { if (!BIO_should_retry(abio)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: failed without EAGAIN\n"); goto err; } } else { sbio = BIO_pop(abio); BIO_printf(bio_err, "Error: accepted unknown connection\n"); goto err; } if (BIO_do_connect(cbio) <= 0) { sockerr = get_last_socket_error(); if (sockerr == EOPNOTSUPP) { BIO_printf(bio_err, "Skip: TFO not enabled/supported for client\n"); goto success; } else if (sockerr != EINPROGRESS) { BIO_printf(bio_err, "Error: failed without EINPROGRESSn"); goto err; } } if (!TEST_int_ge(BIO_wait(abio, time(NULL) + 2, 0), 0)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket wait failed\n"); goto err; } if (BIO_do_accept(abio) <= 0) { if (!BIO_should_retry(abio)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: failed without EAGAIN\n"); goto err; } } else { if (idx == 0) BIO_printf(bio_err, "Success: non-TFO connection accepted without data\n"); else if (idx == 1) BIO_printf(bio_err, "Ignore: connection accepted before data, possibly no TFO cookie, or TFO may not be enabled\n"); else if (idx == 4) BIO_printf(bio_err, "Success: connection accepted before data, client TFO is disabled\n"); else BIO_printf(bio_err, "Warning: connection accepted before data, TFO may not be enabled\n"); sbio = BIO_pop(abio); goto success; } if (!TEST_true(BIO_write_ex(cbio, SOCKET_DATA, SOCKET_DATA_LEN, &bytes))) { sockerr = get_last_socket_error(); goto err; } if (!TEST_int_ge(BIO_wait(abio, time(NULL) + 2, 0), 0)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket wait failed\n"); goto err; } if (BIO_do_accept(abio) <= 0) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket not accepted\n"); goto err; } BIO_printf(bio_err, "Success: Server accepted socket after write\n"); if (!TEST_ptr(sbio = BIO_pop(abio)) || !TEST_true(BIO_read_ex(sbio, read_buffer, sizeof(read_buffer), &bytes)) || !TEST_size_t_eq(bytes, SOCKET_DATA_LEN) || !TEST_strn_eq(read_buffer, SOCKET_DATA, SOCKET_DATA_LEN)) { sockerr = get_last_socket_error(); goto err; } success: sockerr = 0; ret = 1; err: if (sockerr != 0) { const char *errstr = strerror(sockerr); if (errstr != NULL) BIO_printf(bio_err, "last errno: %d=%s\n", sockerr, errstr); } BIO_free(cbio); BIO_free(abio); BIO_free(sbio); return ret; } static int test_fd_tfo(int idx) { struct sockaddr_storage sstorage; socklen_t slen; struct addrinfo *ai = NULL; struct addrinfo hints; int ret = 0; int cfd = -1; int afd = -1; int sfd = -1; BIO_ADDR *baddr = NULL; char read_buffer[20]; int bytes_read; int server_flags = BIO_SOCK_NONBLOCK; int client_flags = BIO_SOCK_NONBLOCK; int sockerr = 0; unsigned short port; void *addr; size_t addrlen; switch (idx) { default: case 0: break; case 1: case 2: server_flags |= BIO_SOCK_TFO; client_flags |= BIO_SOCK_TFO; break; case 3: client_flags |= BIO_SOCK_TFO; break; case 4: server_flags |= BIO_SOCK_TFO; break; } memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; if (!TEST_int_eq(getaddrinfo(NULL, "0", &hints, &ai), 0)) goto err; switch (ai->ai_family) { case AF_INET: port = ((struct sockaddr_in *)ai->ai_addr)->sin_port; addr = &((struct sockaddr_in *)ai->ai_addr)->sin_addr; addrlen = sizeof(((struct sockaddr_in *)ai->ai_addr)->sin_addr); BIO_printf(bio_err, "Using IPv4\n"); break; case AF_INET6: port = ((struct sockaddr_in6 *)ai->ai_addr)->sin6_port; addr = &((struct sockaddr_in6 *)ai->ai_addr)->sin6_addr; addrlen = sizeof(((struct sockaddr_in6 *)ai->ai_addr)->sin6_addr); BIO_printf(bio_err, "Using IPv6\n"); break; default: BIO_printf(bio_err, "Unknown address family %d\n", ai->ai_family); goto err; } if (!TEST_ptr(baddr = BIO_ADDR_new()) || !TEST_true(BIO_ADDR_rawmake(baddr, ai->ai_family, addr, addrlen, port))) goto err; if (!TEST_int_ge(afd = BIO_socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol, 0), 0) || !TEST_true(BIO_listen(afd, baddr, server_flags))) goto err; slen = sizeof(sstorage); if (!TEST_int_ge(getsockname(afd, (struct sockaddr *)&sstorage, &slen), 0)) goto err; switch (sstorage.ss_family) { case AF_INET: port = ((struct sockaddr_in *)&sstorage)->sin_port; addr = &((struct sockaddr_in *)&sstorage)->sin_addr; addrlen = sizeof(((struct sockaddr_in *)&sstorage)->sin_addr); break; case AF_INET6: port = ((struct sockaddr_in6 *)&sstorage)->sin6_port; addr = &((struct sockaddr_in6 *)&sstorage)->sin6_addr; addrlen = sizeof(((struct sockaddr_in6 *)&sstorage)->sin6_addr); break; default: goto err; } if(!TEST_true(BIO_ADDR_rawmake(baddr, sstorage.ss_family, addr, addrlen, port))) goto err; if (!TEST_int_ge(cfd = BIO_socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol, 0), 0)) goto err; sfd = BIO_accept_ex(afd, NULL, 0); if (sfd == -1) { sockerr = get_last_socket_error(); if (sockerr != EAGAIN) { BIO_printf(bio_err, "Error: failed without EAGAIN\n"); goto err; } } else { BIO_printf(bio_err, "Error: accepted unknown connection\n"); goto err; } if (!BIO_connect(cfd, baddr, client_flags)) { sockerr = get_last_socket_error(); if (sockerr == EOPNOTSUPP) { BIO_printf(bio_err, "Skip: TFO not enabled/supported for client\n"); goto success; } else { if (sockerr != EINPROGRESS) { BIO_printf(bio_err, "Error: failed without EINPROGRESS\n"); goto err; } } } if (!TEST_int_ge(BIO_socket_wait(afd, 1, time(NULL) + 2), 0)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket wait failed\n"); goto err; } sfd = BIO_accept_ex(afd, NULL, 0); if (sfd == -1) { sockerr = get_last_socket_error(); if (sockerr != EAGAIN) { BIO_printf(bio_err, "Error: failed without EAGAIN\n"); goto err; } } else { if (idx == 0) BIO_printf(bio_err, "Success: non-TFO connection accepted without data\n"); else if (idx == 1) BIO_printf(bio_err, "Ignore: connection accepted before data, possibly no TFO cookie, or TFO may not be enabled\n"); else if (idx == 4) BIO_printf(bio_err, "Success: connection accepted before data, client TFO is disabled\n"); else BIO_printf(bio_err, "Warning: connection accepted before data, TFO may not be enabled\n"); goto success; } #ifdef OSSL_TFO_SENDTO if (!TEST_int_ge(sendto(cfd, SOCKET_DATA, SOCKET_DATA_LEN, OSSL_TFO_SENDTO, (struct sockaddr *)&sstorage, slen), 0)) { sockerr = get_last_socket_error(); goto err; } #else if (!TEST_int_ge(writesocket(cfd, SOCKET_DATA, SOCKET_DATA_LEN), 0)) { sockerr = get_last_socket_error(); goto err; } #endif if (!TEST_int_ge(BIO_socket_wait(afd, 1, time(NULL) + 2), 0)) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket wait failed\n"); goto err; } sfd = BIO_accept_ex(afd, NULL, 0); if (sfd == -1) { sockerr = get_last_socket_error(); BIO_printf(bio_err, "Error: socket not accepted\n"); goto err; } BIO_printf(bio_err, "Success: Server accepted socket after write\n"); bytes_read = readsocket(sfd, read_buffer, sizeof(read_buffer)); if (!TEST_int_eq(bytes_read, SOCKET_DATA_LEN) || !TEST_strn_eq(read_buffer, SOCKET_DATA, SOCKET_DATA_LEN)) { sockerr = get_last_socket_error(); goto err; } success: sockerr = 0; ret = 1; err: if (sockerr != 0) { const char *errstr = strerror(sockerr); if (errstr != NULL) BIO_printf(bio_err, "last errno: %d=%s\n", sockerr, errstr); } if (ai != NULL) freeaddrinfo(ai); BIO_ADDR_free(baddr); BIO_closesocket(cfd); BIO_closesocket(sfd); BIO_closesocket(afd); return ret; } #endif int setup_tests(void) { #if !defined(OPENSSL_NO_TFO) && defined(GOOD_OS) ADD_ALL_TESTS(test_bio_tfo, 5); ADD_ALL_TESTS(test_fd_tfo, 5); #endif return 1; }
test
openssl/test/bio_tfo_test.c
openssl
#include "internal/nelem.h" #include "testutil.h" #include "../ssl/ssl_local.h" static int cipher_enabled(const SSL_CIPHER *ciph) { if ((ciph->algorithm_mac & SSL_AEAD) != 0) return 1; if (ciph->algorithm_enc != SSL_eNULL && EVP_get_cipherbynid(SSL_CIPHER_get_cipher_nid(ciph)) == NULL) return 0; if (EVP_get_digestbynid(SSL_CIPHER_get_digest_nid(ciph)) == NULL) return 0; return 1; } static int cipher_overhead(void) { int ret = 1, i, n = ssl3_num_ciphers(); const SSL_CIPHER *ciph; size_t mac, in, blk, ex; for (i = 0; i < n; i++) { ciph = ssl3_get_cipher(i); if (!ciph->min_dtls) continue; if (!cipher_enabled(ciph)) { TEST_skip("Skipping disabled cipher %s", ciph->name); continue; } if (!TEST_true(ssl_cipher_get_overhead(ciph, &mac, &in, &blk, &ex))) { TEST_info("Failed getting %s", ciph->name); ret = 0; } else { TEST_info("Cipher %s: %zu %zu %zu %zu", ciph->name, mac, in, blk, ex); } } return ret; } int setup_tests(void) { ADD_TEST(cipher_overhead); return 1; }
test
openssl/test/cipher_overhead_test.c
openssl
#include <string.h> #include <openssl/bio.h> #include <openssl/crypto.h> #include "testutil.h" #if defined(__has_feature) # if __has_feature(address_sanitizer) # define __SANITIZE_ADDRESS__ 1 # endif #endif #if !defined(__SANITIZE_ADDRESS__) || defined(_MSC_VER) # undef __SANITIZE_ADDRESS__ # define __SANITIZE_ADDRESS__ 0 #endif int main(int argc, char *argv[]) { #if __SANITIZE_ADDRESS__ int exitcode = EXIT_SUCCESS; #else int exitcode = EXIT_FAILURE; #endif char *lost; lost = OPENSSL_malloc(3); if (!TEST_ptr(lost)) return EXIT_FAILURE; strcpy(lost, "ab"); if (argv[1] && strcmp(argv[1], "freeit") == 0) { OPENSSL_free(lost); exitcode = EXIT_SUCCESS; } lost = NULL; return exitcode; }
test
openssl/test/memleaktest.c
openssl
#include "helpers/cmp_testlib.h" typedef struct test_fixture { const char *test_case_name; int pkistatus; const char *str; const char *text; int pkifailure; } CMP_STATUS_TEST_FIXTURE; static CMP_STATUS_TEST_FIXTURE *set_up(const char *const test_case_name) { CMP_STATUS_TEST_FIXTURE *fixture; if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture)))) return NULL; fixture->test_case_name = test_case_name; return fixture; } static void tear_down(CMP_STATUS_TEST_FIXTURE *fixture) { OPENSSL_free(fixture); } static int execute_PKISI_test(CMP_STATUS_TEST_FIXTURE *fixture) { OSSL_CMP_PKISI *si = NULL; int status; ASN1_UTF8STRING *statusString = NULL; int res = 0, i; if (!TEST_ptr(si = OSSL_CMP_STATUSINFO_new(fixture->pkistatus, fixture->pkifailure, fixture->text))) goto end; status = ossl_cmp_pkisi_get_status(si); if (!TEST_int_eq(fixture->pkistatus, status) || !TEST_str_eq(fixture->str, ossl_cmp_PKIStatus_to_string(status))) goto end; if (!TEST_ptr(statusString = sk_ASN1_UTF8STRING_value(ossl_cmp_pkisi_get0_statusString(si), 0)) || !TEST_mem_eq(fixture->text, strlen(fixture->text), (char *)statusString->data, statusString->length)) goto end; if (!TEST_int_eq(fixture->pkifailure, ossl_cmp_pkisi_get_pkifailureinfo(si))) goto end; for (i = 0; i <= OSSL_CMP_PKIFAILUREINFO_MAX; i++) if (!TEST_int_eq((fixture->pkifailure >> i) & 1, ossl_cmp_pkisi_check_pkifailureinfo(si, i))) goto end; res = 1; end: OSSL_CMP_PKISI_free(si); return res; } static int test_PKISI(void) { SETUP_TEST_FIXTURE(CMP_STATUS_TEST_FIXTURE, set_up); fixture->pkistatus = OSSL_CMP_PKISTATUS_revocationNotification; fixture->str = "PKIStatus: revocation notification - a revocation of the cert has occurred"; fixture->text = "this is an additional text describing the failure"; fixture->pkifailure = OSSL_CMP_CTX_FAILINFO_unsupportedVersion | OSSL_CMP_CTX_FAILINFO_badDataFormat; EXECUTE_TEST(execute_PKISI_test, tear_down); return result; } void cleanup_tests(void) { return; } int setup_tests(void) { ADD_TEST(test_PKISI); return 1; }
test
openssl/test/cmp_status_test.c
openssl
#if !defined(__DJGPP__) # if defined(__STDC_VERSION__) # if __STDC_VERSION__ >= 199901L # include <complex.h> # endif # endif # include <openssl/rsa.h> #endif #include <stdlib.h> int main(int argc, char *argv[]) { return EXIT_SUCCESS; }
test
openssl/test/rsa_complex.c
openssl
#include <stddef.h> #include <openssl/provider.h> #include "testutil.h" static int test_default_libctx(void) { OSSL_LIB_CTX *ctx = NULL; char *path = "./some/path"; const char *retrieved_path = NULL; int ok; ok = TEST_true(OSSL_PROVIDER_set_default_search_path(ctx, path)) && TEST_ptr(retrieved_path = OSSL_PROVIDER_get0_default_search_path(ctx)) && TEST_str_eq(path, retrieved_path); return ok; } static int test_explicit_libctx(void) { OSSL_LIB_CTX *ctx = NULL; char *def_libctx_path = "./some/path"; char *path = "./another/location"; const char *retrieved_defctx_path = NULL; const char *retrieved_path = NULL; int ok; ok = TEST_true(OSSL_PROVIDER_set_default_search_path(NULL, def_libctx_path)) && TEST_ptr(ctx = OSSL_LIB_CTX_new()) && TEST_true(OSSL_PROVIDER_set_default_search_path(ctx, path)) && TEST_ptr(retrieved_defctx_path = OSSL_PROVIDER_get0_default_search_path(NULL)) && TEST_str_eq(def_libctx_path, retrieved_defctx_path) && TEST_ptr(retrieved_path = OSSL_PROVIDER_get0_default_search_path(ctx)) && TEST_str_eq(path, retrieved_path) && TEST_str_ne(retrieved_path, retrieved_defctx_path); OSSL_LIB_CTX_free(ctx); return ok; } int setup_tests(void) { ADD_TEST(test_default_libctx); ADD_TEST(test_explicit_libctx); return 1; }
test
openssl/test/provider_default_search_path_test.c
openssl
#include <string.h> #include <stdio.h> #include <openssl/opensslconf.h> #include <openssl/err.h> #include <openssl/e_os2.h> #include <openssl/ssl.h> #include <openssl/ssl3.h> #include <openssl/tls1.h> #include "internal/nelem.h" #include "testutil.h" static SSL_CTX *ctx; static SSL *s; static int test_empty(void) { STACK_OF(SSL_CIPHER) *sk = NULL, *scsv = NULL; const unsigned char bytes[] = {0x00}; int ret = 0; if (!TEST_int_eq(SSL_bytes_to_cipher_list(s, bytes, 0, 0, &sk, &scsv), 0) || !TEST_ptr_null(sk) || !TEST_ptr_null(scsv)) goto err; ret = 1; err: sk_SSL_CIPHER_free(sk); sk_SSL_CIPHER_free(scsv); return ret; } static int test_unsupported(void) { STACK_OF(SSL_CIPHER) *sk, *scsv; const unsigned char bytes[] = {0xc0, 0x0f, 0x00, 0x2f, 0x01, 0x00}; int ret = 0; if (!TEST_true(SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), 0, &sk, &scsv)) || !TEST_ptr(sk) || !TEST_int_eq(sk_SSL_CIPHER_num(sk), 1) || !TEST_ptr(scsv) || !TEST_int_eq(sk_SSL_CIPHER_num(scsv), 0) || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 0)), "AES128-SHA")) goto err; ret = 1; err: sk_SSL_CIPHER_free(sk); sk_SSL_CIPHER_free(scsv); return ret; } static int test_v2(void) { STACK_OF(SSL_CIPHER) *sk, *scsv; const unsigned char bytes[] = {0x00, 0x00, 0x35, 0x01, 0x00, 0x80, 0x00, 0x00, 0x33}; int ret = 0; if (!TEST_true(SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), 1, &sk, &scsv)) || !TEST_ptr(sk) || !TEST_int_eq(sk_SSL_CIPHER_num(sk), 2) || !TEST_ptr(scsv) || !TEST_int_eq(sk_SSL_CIPHER_num(scsv), 0)) goto err; if (strcmp(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 0)), "AES256-SHA") != 0 || strcmp(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 1)), "DHE-RSA-AES128-SHA") != 0) goto err; ret = 1; err: sk_SSL_CIPHER_free(sk); sk_SSL_CIPHER_free(scsv); return ret; } static int test_v3(void) { STACK_OF(SSL_CIPHER) *sk = NULL, *scsv = NULL; const unsigned char bytes[] = {0x00, 0x2f, 0x00, 0x33, 0x00, 0x9f, 0x00, 0xff, 0x56, 0x00}; int ret = 0; if (!SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), 0, &sk, &scsv) || !TEST_ptr(sk) || !TEST_int_eq(sk_SSL_CIPHER_num(sk), 3) || !TEST_ptr(scsv) || !TEST_int_eq(sk_SSL_CIPHER_num(scsv), 2) || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 0)), "AES128-SHA") || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 1)), "DHE-RSA-AES128-SHA") || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(sk, 2)), "DHE-RSA-AES256-GCM-SHA384") || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(scsv, 0)), "TLS_EMPTY_RENEGOTIATION_INFO_SCSV") || !TEST_str_eq(SSL_CIPHER_get_name(sk_SSL_CIPHER_value(scsv, 1)), "TLS_FALLBACK_SCSV")) goto err; ret = 1; err: sk_SSL_CIPHER_free(sk); sk_SSL_CIPHER_free(scsv); return ret; } int setup_tests(void) { if (!TEST_ptr(ctx = SSL_CTX_new(TLS_server_method())) || !TEST_ptr(s = SSL_new(ctx))) return 0; ADD_TEST(test_empty); ADD_TEST(test_unsupported); ADD_TEST(test_v2); ADD_TEST(test_v3); return 1; } void cleanup_tests(void) { SSL_free(s); SSL_CTX_free(ctx); }
test
openssl/test/cipherbytes_test.c
openssl
#include <stddef.h> #include <openssl/crypto.h> #include "internal/provider.h" #include "testutil.h" extern OSSL_provider_init_fn PROVIDER_INIT_FUNCTION_NAME; static char buf[256]; static OSSL_PARAM greeting_request[] = { { "greeting", OSSL_PARAM_UTF8_STRING, buf, sizeof(buf), 0 }, { NULL, 0, NULL, 0, 0 } }; static int test_provider(OSSL_PROVIDER *prov, const char *expected_greeting) { const char *greeting = NULL; int ret = 0; ret = TEST_true(ossl_provider_activate(prov, 1, 0)) && TEST_true(ossl_provider_get_params(prov, greeting_request)) && TEST_ptr(greeting = greeting_request[0].data) && TEST_size_t_gt(greeting_request[0].data_size, 0) && TEST_str_eq(greeting, expected_greeting) && TEST_true(ossl_provider_deactivate(prov, 1)); TEST_info("Got this greeting: %s\n", greeting); ossl_provider_free(prov); return ret; } static const char *expected_greeting1(const char *name) { static char expected_greeting[256] = ""; BIO_snprintf(expected_greeting, sizeof(expected_greeting), "Hello OpenSSL %.20s, greetings from %s!", OPENSSL_VERSION_STR, name); return expected_greeting; } static int test_builtin_provider(void) { const char *name = "p_test_builtin"; OSSL_PROVIDER *prov = NULL; int ret; EVP_set_default_properties(NULL, "fips=yes"); ret = TEST_ptr(prov = ossl_provider_new(NULL, name, PROVIDER_INIT_FUNCTION_NAME, NULL, 0)) && test_provider(prov, expected_greeting1(name)); EVP_set_default_properties(NULL, ""); return ret; } #ifndef NO_PROVIDER_MODULE static int test_loaded_provider(void) { const char *name = "p_test"; OSSL_PROVIDER *prov = NULL; return TEST_ptr(prov = ossl_provider_new(NULL, name, NULL, NULL, 0)) && test_provider(prov, expected_greeting1(name)); } # ifndef OPENSSL_NO_AUTOLOAD_CONFIG static int test_configured_provider(void) { const char *name = "p_test_configured"; OSSL_PROVIDER *prov = NULL; const char *expected_greeting = "Hello OpenSSL, greetings from Test Provider"; return TEST_ptr(prov = ossl_provider_find(NULL, name, 0)) && test_provider(prov, expected_greeting); } # endif #endif static int test_cache_flushes(void) { OSSL_LIB_CTX *ctx; OSSL_PROVIDER *prov = NULL; EVP_MD *md = NULL; int ret = 0; if (!TEST_ptr(ctx = OSSL_LIB_CTX_new()) || !TEST_ptr(prov = OSSL_PROVIDER_load(ctx, "default")) || !TEST_true(OSSL_PROVIDER_available(ctx, "default")) || !TEST_ptr(md = EVP_MD_fetch(ctx, "SHA256", NULL))) goto err; EVP_MD_free(md); md = NULL; OSSL_PROVIDER_unload(prov); prov = NULL; if (!TEST_false(OSSL_PROVIDER_available(ctx, "default"))) goto err; if (!TEST_ptr_null(md = EVP_MD_fetch(ctx, "SHA256", NULL))) { const char *provname = OSSL_PROVIDER_get0_name(EVP_MD_get0_provider(md)); if (OSSL_PROVIDER_available(NULL, provname)) TEST_info("%s provider is available\n", provname); else TEST_info("%s provider is not available\n", provname); } ret = 1; err: OSSL_PROVIDER_unload(prov); EVP_MD_free(md); OSSL_LIB_CTX_free(ctx); return ret; } int setup_tests(void) { ADD_TEST(test_builtin_provider); #ifndef NO_PROVIDER_MODULE ADD_TEST(test_loaded_provider); # ifndef OPENSSL_NO_AUTOLOAD_CONFIG ADD_TEST(test_configured_provider); # endif #endif ADD_TEST(test_cache_flushes); return 1; }
test
openssl/test/provider_internal_test.c
openssl
#include <openssl/http.h> #include <openssl/pem.h> #include <openssl/x509v3.h> #include <string.h> #include "testutil.h" static const ASN1_ITEM *x509_it = NULL; static X509 *x509 = NULL; #define RPATH "/path/result.crt" typedef struct { BIO *out; const char *content_type; const char *txt; char version; int keep_alive; } server_args; static int mock_http_server(BIO *in, BIO *out, char version, int keep_alive, const char *content_type, const char *txt, ASN1_VALUE *rsp, const ASN1_ITEM *it) { const char *req, *path; long count = BIO_get_mem_data(in, (unsigned char **)&req); const char *hdr = (char *)req; int len; int is_get = count >= 4 && CHECK_AND_SKIP_PREFIX(hdr, "GET "); if (!is_get && !(TEST_true(count >= 5 && CHECK_AND_SKIP_PREFIX(hdr, "POST ")))) return 0; path = hdr; hdr = strchr(hdr, ' '); if (hdr == NULL) return 0; len = strlen("HTTP/1."); if (!TEST_strn_eq(++hdr, "HTTP/1.", len)) return 0; hdr += len; if (!TEST_char_le('0', *hdr) || !TEST_char_le(*hdr++, '1')) return 0; if (!TEST_char_eq(*hdr++, '\r') || !TEST_char_eq(*hdr++, '\n')) return 0; count -= (hdr - req); if (count < 0 || out == NULL) return 0; if (!HAS_PREFIX(path, RPATH)) { if (!is_get) return 0; return BIO_printf(out, "HTTP/1.%c 301 Moved Permanently\r\n" "Location: %s\r\n\r\n", version, RPATH) > 0; } if (BIO_printf(out, "HTTP/1.%c 200 OK\r\n", version) <= 0) return 0; if ((version == '0') == keep_alive) if (BIO_printf(out, "Connection: %s\r\n", version == '0' ? "keep-alive" : "close") <= 0) return 0; if (is_get) { if (txt != NULL) len = strlen(txt); else if ((len = ASN1_item_i2d(rsp, NULL, it)) <= 0) return 0; if (BIO_printf(out, "Content-Type: %s\r\n" "Content-Length: %d\r\n\r\n", content_type, len) <= 0) return 0; if (txt != NULL) return BIO_puts(out, txt); return ASN1_item_i2d_bio(it, out, rsp); } else { if (CHECK_AND_SKIP_PREFIX(hdr, "Connection: ")) { hdr = strstr(hdr, "\r\n"); if (hdr == NULL) return 0; hdr += 2; } return BIO_write(out, hdr, count) == count; } } static long http_bio_cb_ex(BIO *bio, int oper, const char *argp, size_t len, int cmd, long argl, int ret, size_t *processed) { server_args *args = (server_args *)BIO_get_callback_arg(bio); if (oper == (BIO_CB_CTRL | BIO_CB_RETURN) && cmd == BIO_CTRL_FLUSH) ret = mock_http_server(bio, args->out, args->version, args->keep_alive, args->content_type, args->txt, (ASN1_VALUE *)x509, x509_it); return ret; } #define text1 "test\n" #define text2 "more\n" #define REAL_SERVER_URL "http: #define DOCTYPE_HTML "<!DOCTYPE html>\n" static int test_http_method(int do_get, int do_txt) { BIO *wbio = BIO_new(BIO_s_mem()); BIO *rbio = BIO_new(BIO_s_mem()); server_args mock_args = { NULL, NULL, NULL, '0', 0 }; BIO *req, *rsp; STACK_OF(CONF_VALUE) *headers = NULL; const char *content_type; int res = 0; int real_server = do_txt && 0; if (do_txt) { content_type = "text/plain"; req = BIO_new(BIO_s_mem()); if (req == NULL || BIO_puts(req, text1) != sizeof(text1) - 1 || BIO_puts(req, text2) != sizeof(text2) - 1) { BIO_free(req); req = NULL; } mock_args.txt = text1; } else { content_type = "application/x-x509-ca-cert"; req = ASN1_item_i2d_mem_bio(x509_it, (ASN1_VALUE *)x509); mock_args.txt = NULL; } if (wbio == NULL || rbio == NULL || req == NULL) goto err; mock_args.out = rbio; mock_args.content_type = content_type; BIO_set_callback_ex(wbio, http_bio_cb_ex); BIO_set_callback_arg(wbio, (char *)&mock_args); rsp = do_get ? OSSL_HTTP_get(real_server ? REAL_SERVER_URL : do_txt ? RPATH : "/will-be-redirected", NULL , NULL , real_server ? NULL : wbio, real_server ? NULL : rbio, NULL , NULL , 0 , headers, real_server ? "text/html; charset=utf-8": content_type, !do_txt , OSSL_HTTP_DEFAULT_MAX_RESP_LEN, 0 ) : OSSL_HTTP_transfer(NULL, NULL , NULL , RPATH, 0 ,NULL , NULL , wbio, rbio, NULL , NULL , 0 , headers, content_type, req, content_type, !do_txt , OSSL_HTTP_DEFAULT_MAX_RESP_LEN, 0 , 0 ); if (rsp != NULL) { if (do_get && real_server) { char rtext[sizeof(DOCTYPE_HTML)]; res = TEST_int_eq(BIO_gets(rsp, rtext, sizeof(rtext)), sizeof(DOCTYPE_HTML) - 1) && TEST_str_eq(rtext, DOCTYPE_HTML); } else if (do_txt) { char rtext[sizeof(text1) + 1 ]; res = TEST_int_eq(BIO_gets(rsp, rtext, sizeof(rtext)), sizeof(text1) - 1) && TEST_str_eq(rtext, text1); } else { X509 *rcert = d2i_X509_bio(rsp, NULL); res = TEST_ptr(rcert) && TEST_int_eq(X509_cmp(x509, rcert), 0); X509_free(rcert); } BIO_free(rsp); } err: BIO_free(req); BIO_free(wbio); BIO_free(rbio); sk_CONF_VALUE_pop_free(headers, X509V3_conf_free); return res; } static int test_http_keep_alive(char version, int keep_alive, int kept_alive) { BIO *wbio = BIO_new(BIO_s_mem()); BIO *rbio = BIO_new(BIO_s_mem()); BIO *rsp; const char *const content_type = "application/x-x509-ca-cert"; server_args mock_args = { NULL, NULL, NULL, '0', 0 }; OSSL_HTTP_REQ_CTX *rctx = NULL; int i, res = 0; if (wbio == NULL || rbio == NULL) goto err; mock_args.out = rbio; mock_args.content_type = content_type; mock_args.version = version; mock_args.keep_alive = kept_alive; BIO_set_callback_ex(wbio, http_bio_cb_ex); BIO_set_callback_arg(wbio, (char *)&mock_args); for (res = 1, i = 1; res && i <= 2; i++) { rsp = OSSL_HTTP_transfer(&rctx, NULL , NULL , RPATH, 0 , NULL , NULL , wbio, rbio, NULL , NULL, 0 , NULL , NULL , NULL , content_type, 0 , 0 , 0 , keep_alive); if (keep_alive == 2 && kept_alive == 0) res = res && TEST_ptr_null(rsp) && TEST_int_eq(OSSL_HTTP_is_alive(rctx), 0); else res = res && TEST_ptr(rsp) && TEST_int_eq(OSSL_HTTP_is_alive(rctx), keep_alive > 0); BIO_free(rsp); (void)BIO_reset(rbio); keep_alive = 0; } OSSL_HTTP_close(rctx, res); err: BIO_free(wbio); BIO_free(rbio); return res; } static int test_http_url_ok(const char *url, int exp_ssl, const char *exp_host, const char *exp_port, const char *exp_path) { char *user, *host, *port, *path, *query, *frag; int exp_num, num, ssl; int res; if (!TEST_int_eq(sscanf(exp_port, "%d", &exp_num), 1)) return 0; res = TEST_true(OSSL_HTTP_parse_url(url, &ssl, &user, &host, &port, &num, &path, &query, &frag)) && TEST_str_eq(host, exp_host) && TEST_str_eq(port, exp_port) && TEST_int_eq(num, exp_num) && TEST_str_eq(path, exp_path) && TEST_int_eq(ssl, exp_ssl); if (res && *user != '\0') res = TEST_str_eq(user, "user:pass"); if (res && *frag != '\0') res = TEST_str_eq(frag, "fr"); if (res && *query != '\0') res = TEST_str_eq(query, "q"); OPENSSL_free(user); OPENSSL_free(host); OPENSSL_free(port); OPENSSL_free(path); OPENSSL_free(query); OPENSSL_free(frag); return res; } static int test_http_url_path_query_ok(const char *url, const char *exp_path_qu) { char *host, *path; int res; res = TEST_true(OSSL_HTTP_parse_url(url, NULL, NULL, &host, NULL, NULL, &path, NULL, NULL)) && TEST_str_eq(host, "host") && TEST_str_eq(path, exp_path_qu); OPENSSL_free(host); OPENSSL_free(path); return res; } static int test_http_url_dns(void) { return test_http_url_ok("host:65535/path", 0, "host", "65535", "/path"); } static int test_http_url_path_query(void) { return test_http_url_path_query_ok("http: && test_http_url_path_query_ok("http: && test_http_url_path_query_ok("http: } static int test_http_url_userinfo_query_fragment(void) { return test_http_url_ok("user:pass@host/p?q#fr", 0, "host", "80", "/p"); } static int test_http_url_ipv4(void) { return test_http_url_ok("https: } static int test_http_url_ipv6(void) { return test_http_url_ok("http: } static int test_http_url_invalid(const char *url) { char *host = "1", *port = "1", *path = "1"; int num = 1, ssl = 1; int res; res = TEST_false(OSSL_HTTP_parse_url(url, &ssl, NULL, &host, &port, &num, &path, NULL, NULL)) && TEST_ptr_null(host) && TEST_ptr_null(port) && TEST_ptr_null(path); if (!res) { OPENSSL_free(host); OPENSSL_free(port); OPENSSL_free(path); } return res; } static int test_http_url_invalid_prefix(void) { return test_http_url_invalid("htttps: } static int test_http_url_invalid_port(void) { return test_http_url_invalid("https: && test_http_url_invalid("https: } static int test_http_url_invalid_path(void) { return test_http_url_invalid("https: } static int test_http_get_txt(void) { return test_http_method(1 , 1); } static int test_http_post_txt(void) { return test_http_method(0 , 1); } static int test_http_get_x509(void) { return test_http_method(1 , 0); } static int test_http_post_x509(void) { return test_http_method(0 , 0); } static int test_http_keep_alive_0_no_no(void) { return test_http_keep_alive('0', 0, 0); } static int test_http_keep_alive_1_no_no(void) { return test_http_keep_alive('1', 0, 0); } static int test_http_keep_alive_0_prefer_yes(void) { return test_http_keep_alive('0', 1, 1); } static int test_http_keep_alive_1_prefer_yes(void) { return test_http_keep_alive('1', 1, 1); } static int test_http_keep_alive_0_require_yes(void) { return test_http_keep_alive('0', 2, 1); } static int test_http_keep_alive_1_require_yes(void) { return test_http_keep_alive('1', 2, 1); } static int test_http_keep_alive_0_require_no(void) { return test_http_keep_alive('0', 2, 0); } static int test_http_keep_alive_1_require_no(void) { return test_http_keep_alive('1', 2, 0); } static int test_http_resp_hdr_limit(size_t limit) { BIO *wbio = BIO_new(BIO_s_mem()); BIO *rbio = BIO_new(BIO_s_mem()); BIO *mem = NULL; server_args mock_args = { NULL, NULL, NULL, '0', 0 }; int res = 0; OSSL_HTTP_REQ_CTX *rctx = NULL; if (TEST_ptr(wbio) == 0 || TEST_ptr(rbio) == 0) goto err; mock_args.txt = text1; mock_args.content_type = "text/plain"; mock_args.version = '1'; mock_args.out = rbio; BIO_set_callback_ex(wbio, http_bio_cb_ex); BIO_set_callback_arg(wbio, (char *)&mock_args); rctx = OSSL_HTTP_REQ_CTX_new(wbio, rbio, 8192); if (TEST_ptr(rctx) == 0) goto err; if (!TEST_true(OSSL_HTTP_REQ_CTX_set_request_line(rctx, 0 , NULL, NULL, RPATH))) goto err; OSSL_HTTP_REQ_CTX_set_max_response_hdr_lines(rctx, limit); mem = OSSL_HTTP_REQ_CTX_exchange(rctx); if (limit == 1) res = TEST_ptr_null(mem); else res = TEST_ptr(mem); err: BIO_free(wbio); BIO_free(rbio); OSSL_HTTP_REQ_CTX_free(rctx); return res; } static int test_hdr_resp_hdr_limit_none(void) { return test_http_resp_hdr_limit(0); } static int test_hdr_resp_hdr_limit_short(void) { return (test_http_resp_hdr_limit(1)); } static int test_hdr_resp_hdr_limit_256(void) { return test_http_resp_hdr_limit(256); } void cleanup_tests(void) { X509_free(x509); } OPT_TEST_DECLARE_USAGE("cert.pem\n") int setup_tests(void) { if (!test_skip_common_options()) return 0; x509_it = ASN1_ITEM_rptr(X509); if (!TEST_ptr((x509 = load_cert_pem(test_get_argument(0), NULL)))) return 0; ADD_TEST(test_http_url_dns); ADD_TEST(test_http_url_path_query); ADD_TEST(test_http_url_userinfo_query_fragment); ADD_TEST(test_http_url_ipv4); ADD_TEST(test_http_url_ipv6); ADD_TEST(test_http_url_invalid_prefix); ADD_TEST(test_http_url_invalid_port); ADD_TEST(test_http_url_invalid_path); ADD_TEST(test_http_get_txt); ADD_TEST(test_http_post_txt); ADD_TEST(test_http_get_x509); ADD_TEST(test_http_post_x509); ADD_TEST(test_http_keep_alive_0_no_no); ADD_TEST(test_http_keep_alive_1_no_no); ADD_TEST(test_http_keep_alive_0_prefer_yes); ADD_TEST(test_http_keep_alive_1_prefer_yes); ADD_TEST(test_http_keep_alive_0_require_yes); ADD_TEST(test_http_keep_alive_1_require_yes); ADD_TEST(test_http_keep_alive_0_require_no); ADD_TEST(test_http_keep_alive_1_require_no); ADD_TEST(test_hdr_resp_hdr_limit_none); ADD_TEST(test_hdr_resp_hdr_limit_short); ADD_TEST(test_hdr_resp_hdr_limit_256); return 1; }
test
openssl/test/http_test.c
openssl
#include "helpers/cmp_testlib.h" #include "cmp_mock_srv.h" static const char *server_key_f; static const char *server_cert_f; static const char *client_key_f; static const char *client_cert_f; static const char *pkcs10_f; typedef struct test_fixture { const char *test_case_name; OSSL_CMP_CTX *cmp_ctx; OSSL_CMP_SRV_CTX *srv_ctx; int req_type; int expected; STACK_OF(X509) *caPubs; } CMP_SES_TEST_FIXTURE; static OSSL_LIB_CTX *libctx = NULL; static OSSL_PROVIDER *default_null_provider = NULL, *provider = NULL; static EVP_PKEY *server_key = NULL; static X509 *server_cert = NULL; static EVP_PKEY *client_key = NULL; static X509 *client_cert = NULL; static unsigned char ref[CMP_TEST_REFVALUE_LENGTH]; static void tear_down(CMP_SES_TEST_FIXTURE *fixture) { OSSL_CMP_CTX_free(fixture->cmp_ctx); ossl_cmp_mock_srv_free(fixture->srv_ctx); sk_X509_free(fixture->caPubs); OPENSSL_free(fixture); } static CMP_SES_TEST_FIXTURE *set_up(const char *const test_case_name) { CMP_SES_TEST_FIXTURE *fixture; OSSL_CMP_CTX *srv_cmp_ctx = NULL; OSSL_CMP_CTX *ctx = NULL; if (!TEST_ptr(fixture = OPENSSL_zalloc(sizeof(*fixture)))) return NULL; fixture->test_case_name = test_case_name; if (!TEST_ptr(fixture->srv_ctx = ossl_cmp_mock_srv_new(libctx, NULL)) || !OSSL_CMP_SRV_CTX_set_accept_unprotected(fixture->srv_ctx, 1) || !ossl_cmp_mock_srv_set1_refCert(fixture->srv_ctx, client_cert) || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert) || (srv_cmp_ctx = OSSL_CMP_SRV_CTX_get0_cmp_ctx(fixture->srv_ctx)) == NULL || !OSSL_CMP_CTX_set1_cert(srv_cmp_ctx, server_cert) || !OSSL_CMP_CTX_set1_pkey(srv_cmp_ctx, server_key)) goto err; if (!TEST_ptr(fixture->cmp_ctx = ctx = OSSL_CMP_CTX_new(libctx, NULL)) || !OSSL_CMP_CTX_set_log_cb(fixture->cmp_ctx, print_to_bio_out) || !OSSL_CMP_CTX_set_transfer_cb(ctx, OSSL_CMP_CTX_server_perform) || !OSSL_CMP_CTX_set_transfer_cb_arg(ctx, fixture->srv_ctx) || !OSSL_CMP_CTX_set_option(ctx, OSSL_CMP_OPT_UNPROTECTED_SEND, 1) || !OSSL_CMP_CTX_set_option(ctx, OSSL_CMP_OPT_UNPROTECTED_ERRORS, 1) || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert) || !OSSL_CMP_CTX_set1_pkey(ctx, client_key) || !OSSL_CMP_CTX_set1_srvCert(ctx, server_cert) || !OSSL_CMP_CTX_set1_referenceValue(ctx, ref, sizeof(ref))) goto err; fixture->req_type = -1; return fixture; err: tear_down(fixture); return NULL; } static int execute_exec_RR_ses_test(CMP_SES_TEST_FIXTURE *fixt) { return TEST_int_eq(OSSL_CMP_CTX_get_status(fixt->cmp_ctx), OSSL_CMP_PKISTATUS_unspecified) && TEST_int_eq(OSSL_CMP_exec_RR_ses(fixt->cmp_ctx), fixt->expected == OSSL_CMP_PKISTATUS_accepted) && TEST_int_eq(OSSL_CMP_CTX_get_status(fixt->cmp_ctx), fixt->expected); } static int execute_exec_GENM_ses_test_single(CMP_SES_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->cmp_ctx; ASN1_OBJECT *type = OBJ_txt2obj("1.3.6.1.5.5.7.4.2", 1); OSSL_CMP_ITAV *itav = OSSL_CMP_ITAV_create(type, NULL); STACK_OF(OSSL_CMP_ITAV) *itavs; OSSL_CMP_CTX_push0_genm_ITAV(ctx, itav); itavs = OSSL_CMP_exec_GENM_ses(ctx); sk_OSSL_CMP_ITAV_pop_free(itavs, OSSL_CMP_ITAV_free); return TEST_int_eq(OSSL_CMP_CTX_get_status(ctx), fixture->expected) && fixture->expected == OSSL_CMP_PKISTATUS_accepted ? TEST_ptr(itavs) : TEST_ptr_null(itavs); } static int execute_exec_GENM_ses_test(CMP_SES_TEST_FIXTURE *fixture) { return execute_exec_GENM_ses_test_single(fixture) && OSSL_CMP_CTX_reinit(fixture->cmp_ctx) && execute_exec_GENM_ses_test_single(fixture); } static int execute_exec_certrequest_ses_test(CMP_SES_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->cmp_ctx; X509 *res = OSSL_CMP_exec_certreq(ctx, fixture->req_type, NULL); int status = OSSL_CMP_CTX_get_status(ctx); OSSL_CMP_CTX_print_errors(ctx); if (!TEST_int_eq(status, fixture->expected) && !(fixture->expected == OSSL_CMP_PKISTATUS_waiting && TEST_int_eq(status, OSSL_CMP_PKISTATUS_trans))) return 0; if (fixture->expected != OSSL_CMP_PKISTATUS_accepted) return TEST_ptr_null(res); if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0)) return 0; if (fixture->caPubs != NULL) { STACK_OF(X509) *caPubs = OSSL_CMP_CTX_get1_caPubs(fixture->cmp_ctx); int ret = TEST_int_eq(STACK_OF_X509_cmp(fixture->caPubs, caPubs), 0); OSSL_STACK_OF_X509_free(caPubs); return ret; } return 1; } static int test_exec_RR_ses(int request_error) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); if (request_error) OSSL_CMP_CTX_set1_oldCert(fixture->cmp_ctx, NULL); fixture->expected = request_error ? OSSL_CMP_PKISTATUS_request : OSSL_CMP_PKISTATUS_accepted; EXECUTE_TEST(execute_exec_RR_ses_test, tear_down); return result; } static int test_exec_RR_ses_ok(void) { return test_exec_RR_ses(0); } static int test_exec_RR_ses_request_error(void) { return test_exec_RR_ses(1); } static int test_exec_RR_ses_receive_error(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); ossl_cmp_mock_srv_set_statusInfo(fixture->srv_ctx, OSSL_CMP_PKISTATUS_rejection, OSSL_CMP_CTX_FAILINFO_signerNotTrusted, "test string"); ossl_cmp_mock_srv_set_sendError(fixture->srv_ctx, OSSL_CMP_PKIBODY_RR); fixture->expected = OSSL_CMP_PKISTATUS_rejection; EXECUTE_TEST(execute_exec_RR_ses_test, tear_down); return result; } static int test_exec_IR_ses(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->req_type = OSSL_CMP_PKIBODY_IR; fixture->expected = OSSL_CMP_PKISTATUS_accepted; fixture->caPubs = sk_X509_new_null(); sk_X509_push(fixture->caPubs, server_cert); sk_X509_push(fixture->caPubs, server_cert); ossl_cmp_mock_srv_set1_caPubsOut(fixture->srv_ctx, fixture->caPubs); EXECUTE_TEST(execute_exec_certrequest_ses_test, tear_down); return result; } static int test_exec_REQ_ses_poll(int req_type, int check_after, int poll_count, int total_timeout, int expect) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->req_type = req_type; fixture->expected = expect; ossl_cmp_mock_srv_set_checkAfterTime(fixture->srv_ctx, check_after); ossl_cmp_mock_srv_set_pollCount(fixture->srv_ctx, poll_count); OSSL_CMP_CTX_set_option(fixture->cmp_ctx, OSSL_CMP_OPT_TOTAL_TIMEOUT, total_timeout); if (req_type == OSSL_CMP_PKIBODY_IR) { EXECUTE_TEST(execute_exec_certrequest_ses_test, tear_down); } else if (req_type == OSSL_CMP_PKIBODY_GENM) { EXECUTE_TEST(execute_exec_GENM_ses_test, tear_down); } return result; } static int checkAfter = 1; static int test_exec_IR_ses_poll_ok(void) { return test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_IR, checkAfter, 2, 0, OSSL_CMP_PKISTATUS_accepted); } static int test_exec_IR_ses_poll_no_timeout(void) { return test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_IR, checkAfter, 2 , checkAfter + 4, OSSL_CMP_PKISTATUS_accepted); } static int test_exec_IR_ses_poll_total_timeout(void) { return !test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_IR, checkAfter + 1, 3 , checkAfter + 6, OSSL_CMP_PKISTATUS_waiting); } static int test_exec_CR_ses(int implicit_confirm, int granted, int reject) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->req_type = OSSL_CMP_PKIBODY_CR; OSSL_CMP_CTX_set_option(fixture->cmp_ctx, OSSL_CMP_OPT_IMPLICIT_CONFIRM, implicit_confirm); OSSL_CMP_SRV_CTX_set_grant_implicit_confirm(fixture->srv_ctx, granted); ossl_cmp_mock_srv_set_sendError(fixture->srv_ctx, reject ? OSSL_CMP_PKIBODY_CERTCONF : -1); fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection : OSSL_CMP_PKISTATUS_accepted; EXECUTE_TEST(execute_exec_certrequest_ses_test, tear_down); return result; } static int test_exec_CR_ses_explicit_confirm(void) { return test_exec_CR_ses(0, 0, 0) && test_exec_CR_ses(0, 0, 1 ); } static int test_exec_CR_ses_implicit_confirm(void) { return test_exec_CR_ses(1, 0, 0) && test_exec_CR_ses(1, 1 , 0); } static int test_exec_KUR_ses(int transfer_error, int pubkey, int raverified) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->req_type = OSSL_CMP_PKIBODY_KUR; if (transfer_error) OSSL_CMP_CTX_set_transfer_cb_arg(fixture->cmp_ctx, NULL); if (pubkey) { EVP_PKEY *key = raverified ? server_key : client_key; EVP_PKEY_up_ref(key); OSSL_CMP_CTX_set0_newPkey(fixture->cmp_ctx, 0 , key); OSSL_CMP_SRV_CTX_set_accept_raverified(fixture->srv_ctx, 1); } if (pubkey || raverified) OSSL_CMP_CTX_set_option(fixture->cmp_ctx, OSSL_CMP_OPT_POPO_METHOD, OSSL_CRMF_POPO_RAVERIFIED); fixture->expected = transfer_error ? OSSL_CMP_PKISTATUS_trans : raverified ? OSSL_CMP_PKISTATUS_rejection : OSSL_CMP_PKISTATUS_accepted; EXECUTE_TEST(execute_exec_certrequest_ses_test, tear_down); return result; } static int test_exec_KUR_ses_ok(void) { return test_exec_KUR_ses(0, 0, 0); } static int test_exec_KUR_ses_transfer_error(void) { return test_exec_KUR_ses(1, 0, 0); } static int test_exec_KUR_ses_wrong_popo(void) { #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION return test_exec_KUR_ses(0, 0, 1); #else return 1; #endif } static int test_exec_KUR_ses_pub(void) { return test_exec_KUR_ses(0, 1, 0); } static int test_exec_KUR_ses_wrong_pub(void) { return test_exec_KUR_ses(0, 1, 1); } static int test_certConf_cb(OSSL_CMP_CTX *ctx, X509 *cert, int fail_info, const char **txt) { int *reject = OSSL_CMP_CTX_get_certConf_cb_arg(ctx); if (*reject) { *txt = "not to my taste"; fail_info = OSSL_CMP_PKIFAILUREINFO_badCertTemplate; } return fail_info; } static int test_exec_P10CR_ses(int reject) { OSSL_CMP_CTX *ctx; X509_REQ *csr = NULL; SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->req_type = OSSL_CMP_PKIBODY_P10CR; fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection : OSSL_CMP_PKISTATUS_accepted; ctx = fixture->cmp_ctx; if (!TEST_ptr(csr = load_csr_der(pkcs10_f, libctx)) || !TEST_true(OSSL_CMP_CTX_set1_p10CSR(ctx, csr)) || !TEST_true(OSSL_CMP_CTX_set_certConf_cb(ctx, test_certConf_cb)) || !TEST_true(OSSL_CMP_CTX_set_certConf_cb_arg(ctx, &reject))) { tear_down(fixture); fixture = NULL; } X509_REQ_free(csr); EXECUTE_TEST(execute_exec_certrequest_ses_test, tear_down); return result; } static int test_exec_P10CR_ses_ok(void) { return test_exec_P10CR_ses(0); } static int test_exec_P10CR_ses_reject(void) { return test_exec_P10CR_ses(1); } static int execute_try_certreq_poll_test(CMP_SES_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->cmp_ctx; int check_after; const int CHECK_AFTER = 0; const int TYPE = OSSL_CMP_PKIBODY_KUR; ossl_cmp_mock_srv_set_pollCount(fixture->srv_ctx, 3); ossl_cmp_mock_srv_set_checkAfterTime(fixture->srv_ctx, CHECK_AFTER); return TEST_int_eq(-1, OSSL_CMP_try_certreq(ctx, TYPE, NULL, &check_after)) && check_after == CHECK_AFTER && TEST_ptr_eq(OSSL_CMP_CTX_get0_newCert(ctx), NULL) && TEST_int_eq(-1, OSSL_CMP_try_certreq(ctx, TYPE, NULL, &check_after)) && check_after == CHECK_AFTER && TEST_ptr_eq(OSSL_CMP_CTX_get0_newCert(ctx), NULL) && TEST_int_eq(fixture->expected, OSSL_CMP_try_certreq(ctx, TYPE, NULL, NULL)) && TEST_int_eq(0, X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert)); } static int test_try_certreq_poll(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->expected = 1; EXECUTE_TEST(execute_try_certreq_poll_test, tear_down); return result; } static int execute_try_certreq_poll_abort_test(CMP_SES_TEST_FIXTURE *fixture) { OSSL_CMP_CTX *ctx = fixture->cmp_ctx; int check_after; const int CHECK_AFTER = 99; const int TYPE = OSSL_CMP_PKIBODY_CR; ossl_cmp_mock_srv_set_pollCount(fixture->srv_ctx, 3); ossl_cmp_mock_srv_set_checkAfterTime(fixture->srv_ctx, CHECK_AFTER); return TEST_int_eq(-1, OSSL_CMP_try_certreq(ctx, TYPE, NULL, &check_after)) && check_after == CHECK_AFTER && TEST_ptr_eq(OSSL_CMP_CTX_get0_newCert(ctx), NULL) && TEST_int_eq(fixture->expected, OSSL_CMP_try_certreq(ctx, -1 , NULL, NULL)) && TEST_ptr_eq(OSSL_CMP_CTX_get0_newCert(fixture->cmp_ctx), NULL); } static int test_try_certreq_poll_abort(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->expected = 1; EXECUTE_TEST(execute_try_certreq_poll_abort_test, tear_down); return result; } static int test_exec_GENM_ses_poll_ok(void) { return test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_GENM, checkAfter, 2, 0, OSSL_CMP_PKISTATUS_accepted); } static int test_exec_GENM_ses_poll_no_timeout(void) { return test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_GENM, checkAfter, 1 , checkAfter + 1, OSSL_CMP_PKISTATUS_accepted); } static int test_exec_GENM_ses_poll_total_timeout(void) { return test_exec_REQ_ses_poll(OSSL_CMP_PKIBODY_GENM, checkAfter + 1, 3 , checkAfter + 2, OSSL_CMP_PKISTATUS_waiting); } static int test_exec_GENM_ses(int transfer_error, int total_timeout, int expect) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); if (transfer_error) OSSL_CMP_CTX_set_transfer_cb_arg(fixture->cmp_ctx, NULL); fixture->cmp_ctx->total_timeout = total_timeout; fixture->expected = expect; EXECUTE_TEST(execute_exec_GENM_ses_test, tear_down); return result; } static int test_exec_GENM_ses_ok(void) { return test_exec_GENM_ses(0, 0, OSSL_CMP_PKISTATUS_accepted); } static int test_exec_GENM_ses_transfer_error(void) { return test_exec_GENM_ses(1, 0, OSSL_CMP_PKISTATUS_trans); } static int test_exec_GENM_ses_total_timeout(void) { return test_exec_GENM_ses(0, -1, OSSL_CMP_PKISTATUS_trans); } static int execute_exchange_certConf_test(CMP_SES_TEST_FIXTURE *fixture) { int res = ossl_cmp_exchange_certConf(fixture->cmp_ctx, OSSL_CMP_CERTREQID, OSSL_CMP_PKIFAILUREINFO_addInfoNotAvailable, "abcdefg"); return TEST_int_eq(fixture->expected, res); } static int execute_exchange_error_test(CMP_SES_TEST_FIXTURE *fixture) { int res = ossl_cmp_exchange_error(fixture->cmp_ctx, OSSL_CMP_PKISTATUS_rejection, 1 << OSSL_CMP_PKIFAILUREINFO_unsupportedVersion, "foo_status", 999, "foo_details"); return TEST_int_eq(fixture->expected, res); } static int test_exchange_certConf(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->expected = 0; if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) { tear_down(fixture); fixture = NULL; } EXECUTE_TEST(execute_exchange_certConf_test, tear_down); return result; } static int test_exchange_error(void) { SETUP_TEST_FIXTURE(CMP_SES_TEST_FIXTURE, set_up); fixture->expected = 1; EXECUTE_TEST(execute_exchange_error_test, tear_down); return result; } void cleanup_tests(void) { X509_free(server_cert); EVP_PKEY_free(server_key); X509_free(client_cert); EVP_PKEY_free(client_key); OSSL_PROVIDER_unload(default_null_provider); OSSL_PROVIDER_unload(provider); OSSL_LIB_CTX_free(libctx); return; } #define USAGE "server.key server.crt client.key client.crt client.csr module_name [module_conf_file]\n" OPT_TEST_DECLARE_USAGE(USAGE) int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(server_key_f = test_get_argument(0)) || !TEST_ptr(server_cert_f = test_get_argument(1)) || !TEST_ptr(client_key_f = test_get_argument(2)) || !TEST_ptr(client_cert_f = test_get_argument(3)) || !TEST_ptr(pkcs10_f = test_get_argument(4))) { TEST_error("usage: cmp_client_test %s", USAGE); return 0; } if (!test_arg_libctx(&libctx, &default_null_provider, &provider, 5, USAGE)) return 0; if (!TEST_ptr(server_key = load_pkey_pem(server_key_f, libctx)) || !TEST_ptr(server_cert = load_cert_pem(server_cert_f, libctx)) || !TEST_ptr(client_key = load_pkey_pem(client_key_f, libctx)) || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx)) || !TEST_int_eq(1, RAND_bytes_ex(libctx, ref, sizeof(ref), 0))) { cleanup_tests(); return 0; } ADD_TEST(test_exec_RR_ses_ok); ADD_TEST(test_exec_RR_ses_request_error); ADD_TEST(test_exec_RR_ses_receive_error); ADD_TEST(test_exec_CR_ses_explicit_confirm); ADD_TEST(test_exec_CR_ses_implicit_confirm); ADD_TEST(test_exec_IR_ses); ADD_TEST(test_exec_IR_ses_poll_ok); ADD_TEST(test_exec_IR_ses_poll_no_timeout); ADD_TEST(test_exec_IR_ses_poll_total_timeout); ADD_TEST(test_exec_KUR_ses_ok); ADD_TEST(test_exec_KUR_ses_transfer_error); ADD_TEST(test_exec_KUR_ses_wrong_popo); ADD_TEST(test_exec_KUR_ses_pub); ADD_TEST(test_exec_KUR_ses_wrong_pub); ADD_TEST(test_exec_P10CR_ses_ok); ADD_TEST(test_exec_P10CR_ses_reject); ADD_TEST(test_try_certreq_poll); ADD_TEST(test_try_certreq_poll_abort); ADD_TEST(test_exec_GENM_ses_ok); ADD_TEST(test_exec_GENM_ses_transfer_error); ADD_TEST(test_exec_GENM_ses_total_timeout); ADD_TEST(test_exec_GENM_ses_poll_ok); ADD_TEST(test_exec_GENM_ses_poll_no_timeout); ADD_TEST(test_exec_GENM_ses_poll_total_timeout); ADD_TEST(test_exchange_certConf); ADD_TEST(test_exchange_error); return 1; }
test
openssl/test/cmp_client_test.c
openssl
#include <string.h> #include "testutil.h" #include <openssl/evp.h> #include <openssl/x509.h> #include <openssl/rc4.h> #include <openssl/md5.h> #include <openssl/configuration.h> #include <openssl/provider.h> #if !defined OPENSSL_NO_RC4 && !defined OPENSSL_NO_MD5 \ || !defined OPENSSL_NO_DES && !defined OPENSSL_NO_SHA1 static const char pbe_password[] = "MyVoiceIsMyPassport"; static unsigned char pbe_salt[] = { 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, }; static const int pbe_iter = 1000; static unsigned char pbe_plaintext[] = { 0x57, 0x65, 0x20, 0x61, 0x72, 0x65, 0x20, 0x61, 0x6c, 0x6c, 0x20, 0x6d, 0x61, 0x64, 0x65, 0x20, 0x6f, 0x66, 0x20, 0x73, 0x74, 0x61, 0x72, 0x73, }; #endif #if !defined OPENSSL_NO_RC4 && !defined OPENSSL_NO_MD5 static const unsigned char pbe_ciphertext_rc4_md5[] = { 0x21, 0x90, 0xfa, 0xee, 0x95, 0x66, 0x59, 0x45, 0xfa, 0x1e, 0x9f, 0xe2, 0x25, 0xd2, 0xf9, 0x71, 0x94, 0xe4, 0x3d, 0xc9, 0x7c, 0xb0, 0x07, 0x23, }; #endif #if !defined OPENSSL_NO_DES && !defined OPENSSL_NO_SHA1 static const unsigned char pbe_ciphertext_des_sha1[] = { 0xce, 0x4b, 0xb0, 0x0a, 0x7b, 0x48, 0xd7, 0xe3, 0x9a, 0x9f, 0x46, 0xd6, 0x41, 0x42, 0x4b, 0x44, 0x36, 0x45, 0x5f, 0x60, 0x8f, 0x3c, 0xd0, 0x55, 0xd0, 0x8d, 0xa9, 0xab, 0x78, 0x5b, 0x63, 0xaf, }; #endif #if !defined OPENSSL_NO_RC4 && !defined OPENSSL_NO_MD5 \ || !defined OPENSSL_NO_DES && !defined OPENSSL_NO_SHA1 static int test_pkcs5_pbe(const EVP_CIPHER *cipher, const EVP_MD *md, const unsigned char *exp, const int exp_len) { int ret = 0; EVP_CIPHER_CTX *ctx; X509_ALGOR *algor = NULL; int i, outlen; unsigned char out[32]; ctx = EVP_CIPHER_CTX_new(); if (!TEST_ptr(ctx)) goto err; algor = X509_ALGOR_new(); if (!TEST_ptr(algor)) goto err; if (!TEST_true(PKCS5_pbe_set0_algor(algor, EVP_CIPHER_nid(cipher), pbe_iter, pbe_salt, sizeof(pbe_salt))) || !TEST_true(PKCS5_PBE_keyivgen(ctx, pbe_password, strlen(pbe_password), algor->parameter, cipher, md, 1)) || !TEST_true(EVP_CipherUpdate(ctx, out, &i, pbe_plaintext, sizeof(pbe_plaintext)))) goto err; outlen = i; if (!TEST_true(EVP_CipherFinal_ex(ctx, out + i, &i))) goto err; outlen += i; if (!TEST_mem_eq(out, outlen, exp, exp_len)) goto err; if (!TEST_true(PKCS5_PBE_keyivgen(ctx, pbe_password, strlen(pbe_password), algor->parameter, cipher, md, 0)) || !TEST_true(EVP_CipherUpdate(ctx, out, &i, exp, exp_len))) goto err; outlen = i; if (!TEST_true(EVP_CipherFinal_ex(ctx, out + i, &i))) goto err; if (!TEST_mem_eq(out, outlen, pbe_plaintext, sizeof(pbe_plaintext))) goto err; ret = 1; err: EVP_CIPHER_CTX_free(ctx); X509_ALGOR_free(algor); return ret; } #endif #if !defined OPENSSL_NO_RC4 && !defined OPENSSL_NO_MD5 static int test_pkcs5_pbe_rc4_md5(void) { return test_pkcs5_pbe(EVP_rc4(), EVP_md5(), pbe_ciphertext_rc4_md5, sizeof(pbe_ciphertext_rc4_md5)); } #endif #if !defined OPENSSL_NO_DES && !defined OPENSSL_NO_SHA1 static int test_pkcs5_pbe_des_sha1(void) { return test_pkcs5_pbe(EVP_des_cbc(), EVP_sha1(), pbe_ciphertext_des_sha1, sizeof(pbe_ciphertext_des_sha1)); } #endif #ifdef OPENSSL_NO_AUTOLOAD_CONFIG static OSSL_PROVIDER *legacy, *dflt; #endif int setup_tests(void) { #ifdef OPENSSL_NO_AUTOLOAD_CONFIG legacy = OSSL_PROVIDER_load(NULL, "legacy"); dflt = OSSL_PROVIDER_load(NULL, "default"); if (!TEST_ptr(legacy) || !TEST_ptr(dflt)) { cleanup_tests(); return -1; } #endif #if !defined OPENSSL_NO_RC4 && !defined OPENSSL_NO_MD5 ADD_TEST(test_pkcs5_pbe_rc4_md5); #endif #if !defined OPENSSL_NO_DES && !defined OPENSSL_NO_SHA1 ADD_TEST(test_pkcs5_pbe_des_sha1); #endif return 1; } #ifdef OPENSSL_NO_AUTOLOAD_CONFIG void cleanup_tests(void) { OSSL_PROVIDER_unload(legacy); OSSL_PROVIDER_unload(dflt); legacy = dflt = NULL; } #endif
test
openssl/test/pbetest.c
openssl
#define OPENSSL_SUPPRESS_DEPRECATED #include <string.h> #include "internal/nelem.h" #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include <openssl/obj_mac.h> #include <openssl/evp.h> #include <openssl/aes.h> #include "../crypto/rand/rand_local.h" #include "../include/crypto/rand.h" #include "../include/crypto/evp.h" #include "../providers/implementations/rands/drbg_local.h" #include "../crypto/evp/evp_local.h" #if defined(_WIN32) # include <windows.h> #endif #if defined(__TANDEM) # if defined(OPENSSL_TANDEM_FLOSS) # include <floss.h(floss_fork)> # endif #endif #if defined(OPENSSL_SYS_UNIX) # include <sys/types.h> # include <sys/wait.h> # include <unistd.h> #endif #include "testutil.h" static int gen_bytes(EVP_RAND_CTX *drbg, unsigned char *buf, int num) { #ifndef OPENSSL_NO_DEPRECATED_3_0 const RAND_METHOD *meth = RAND_get_rand_method(); if (meth != NULL && meth != RAND_OpenSSL()) { if (meth->bytes != NULL) return meth->bytes(buf, num); return -1; } #endif if (drbg != NULL) return EVP_RAND_generate(drbg, buf, num, 0, 0, NULL, 0); return 0; } static int rand_bytes(unsigned char *buf, int num) { return gen_bytes(RAND_get0_public(NULL), buf, num); } static int rand_priv_bytes(unsigned char *buf, int num) { return gen_bytes(RAND_get0_private(NULL), buf, num); } #define RANDOM_SIZE 16 static int state(EVP_RAND_CTX *drbg) { return EVP_RAND_get_state(drbg); } static unsigned int query_rand_uint(EVP_RAND_CTX *drbg, const char *name) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; unsigned int n; *params = OSSL_PARAM_construct_uint(name, &n); if (EVP_RAND_CTX_get_params(drbg, params)) return n; return 0; } #define DRBG_UINT(name) \ static unsigned int name(EVP_RAND_CTX *drbg) \ { \ return query_rand_uint(drbg, #name); \ } DRBG_UINT(reseed_counter) static PROV_DRBG *prov_rand(EVP_RAND_CTX *drbg) { return (PROV_DRBG *)drbg->algctx; } static void set_reseed_counter(EVP_RAND_CTX *drbg, unsigned int n) { PROV_DRBG *p = prov_rand(drbg); p->reseed_counter = n; } static void inc_reseed_counter(EVP_RAND_CTX *drbg) { set_reseed_counter(drbg, reseed_counter(drbg) + 1); } static time_t reseed_time(EVP_RAND_CTX *drbg) { OSSL_PARAM params[2] = { OSSL_PARAM_END, OSSL_PARAM_END }; time_t t; *params = OSSL_PARAM_construct_time_t(OSSL_DRBG_PARAM_RESEED_TIME, &t); if (EVP_RAND_CTX_get_params(drbg, params)) return t; return 0; } static int using_fips_rng(void) { EVP_RAND_CTX *primary = RAND_get0_primary(NULL); const OSSL_PROVIDER *prov; const char *name; if (!TEST_ptr(primary)) return 0; prov = EVP_RAND_get0_provider(EVP_RAND_CTX_get0_rand(primary)); if (!TEST_ptr(prov)) return 0; name = OSSL_PROVIDER_get0_name(prov); return strcmp(name, "OpenSSL FIPS Provider") == 0; } static int disable_crngt(EVP_RAND_CTX *drbg) { return 1; } static int test_drbg_reseed(int expect_success, EVP_RAND_CTX *primary, EVP_RAND_CTX *public, EVP_RAND_CTX *private, unsigned char *public_random, unsigned char *private_random, int expect_primary_reseed, int expect_public_reseed, int expect_private_reseed, time_t reseed_when ) { time_t before_reseed, after_reseed; int expected_state = (expect_success ? DRBG_READY : DRBG_ERROR); unsigned int primary_reseed, public_reseed, private_reseed; unsigned char dummy[RANDOM_SIZE]; if (public_random == NULL) public_random = dummy; if (private_random == NULL) private_random = dummy; if (!TEST_int_ne(primary_reseed = reseed_counter(primary), 0) || !TEST_int_ne(public_reseed = reseed_counter(public), 0) || !TEST_int_ne(private_reseed = reseed_counter(private), 0)) return 0; if (reseed_when == 0) reseed_when = time(NULL); before_reseed = expect_primary_reseed == 1 ? reseed_when : 0; if (!TEST_int_eq(rand_bytes((unsigned char*)public_random, RANDOM_SIZE), expect_success) || !TEST_int_eq(rand_priv_bytes((unsigned char*) private_random, RANDOM_SIZE), expect_success)) return 0; after_reseed = time(NULL); if (!TEST_int_eq(state(primary), expected_state) || !TEST_int_eq(state(public), expected_state) || !TEST_int_eq(state(private), expected_state)) return 0; if (expect_primary_reseed >= 0) { if (!TEST_int_ge(reseed_counter(primary), primary_reseed)) return 0; } if (expect_public_reseed >= 0) { if (!TEST_int_ge(reseed_counter(public), public_reseed) || !TEST_uint_ge(reseed_counter(public), reseed_counter(primary))) return 0; } if (expect_private_reseed >= 0) { if (!TEST_int_ge(reseed_counter(private), private_reseed) || !TEST_uint_ge(reseed_counter(private), reseed_counter(primary))) return 0; } if (expect_success == 1) { if (!TEST_time_t_le(before_reseed, reseed_time(primary)) || !TEST_time_t_le(reseed_time(primary), after_reseed)) return 0; if (!TEST_time_t_ge(reseed_time(public), reseed_time(primary)) || !TEST_time_t_ge(reseed_time(private), reseed_time(primary))) return 0; } else { ERR_clear_error(); } return 1; } #if defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_RAND_SEED_EGD) #define DRBG_FORK_COUNT 9 #define DRBG_FORK_RESULT_COUNT (2 * (DRBG_FORK_COUNT + 1)) typedef struct drbg_fork_result_st { unsigned char random[RANDOM_SIZE]; int pindex; pid_t pid; int private; char name[10]; } drbg_fork_result; static int compare_drbg_fork_result(const void *left, const void *right) { int result; const drbg_fork_result *l = left; const drbg_fork_result *r = right; result = l->private - r->private; if (result == 0) result = memcmp(l->random, r->random, RANDOM_SIZE); if (result == 0) result = l->pindex - r->pindex; return result; } static int compare_rand_chunk(const void *left, const void *right) { return memcmp(left, right, 2); } static int test_drbg_reseed_in_child(EVP_RAND_CTX *primary, EVP_RAND_CTX *public, EVP_RAND_CTX *private, drbg_fork_result result[2]) { int rv = 0, status; int fd[2]; pid_t pid; unsigned char random[2 * RANDOM_SIZE]; if (!TEST_int_ge(pipe(fd), 0)) return 0; if (!TEST_int_ge(pid = fork(), 0)) { close(fd[0]); close(fd[1]); return 0; } else if (pid > 0) { close(fd[1]); if (TEST_int_eq(waitpid(pid, &status, 0), pid) && TEST_int_eq(status, 0) && TEST_true(read(fd[0], &random[0], sizeof(random)) == sizeof(random))) { result[0].pid = pid; result[0].private = 0; memcpy(result[0].random, &random[0], RANDOM_SIZE); result[1].pid = pid; result[1].private = 1; memcpy(result[1].random, &random[RANDOM_SIZE], RANDOM_SIZE); rv = 1; } close(fd[0]); return rv; } else { close(fd[0]); if (TEST_true(test_drbg_reseed(1, primary, public, private, &random[0], &random[RANDOM_SIZE], 1, 1, 1, 0)) && TEST_true(write(fd[1], random, sizeof(random)) == sizeof(random))) { rv = 1; } close(fd[1]); exit(rv == 0); } } static int test_rand_reseed_on_fork(EVP_RAND_CTX *primary, EVP_RAND_CTX *public, EVP_RAND_CTX *private) { unsigned int i; pid_t pid = getpid(); int verbose = (getenv("V") != NULL); int success = 1; int duplicate[2] = {0, 0}; unsigned char random[2 * RANDOM_SIZE]; unsigned char sample[DRBG_FORK_RESULT_COUNT * RANDOM_SIZE]; unsigned char *psample = &sample[0]; drbg_fork_result result[DRBG_FORK_RESULT_COUNT]; drbg_fork_result *presult = &result[2]; memset(&result, 0, sizeof(result)); for (i = 1 ; i <= DRBG_FORK_COUNT ; ++i) { presult[0].pindex = presult[1].pindex = i; sprintf(presult[0].name, "child %d", i); strcpy(presult[1].name, presult[0].name); if (!TEST_true(test_drbg_reseed_in_child(primary, public, private, presult))) return 0; presult += 2; } if (!TEST_true(test_drbg_reseed(1, primary, public, private, &random[0], &random[RANDOM_SIZE], 0, 0, 0, 0))) return 0; strcpy(result[0].name, "parent"); strcpy(result[1].name, "parent"); result[0].pid = pid; result[0].private = 0; memcpy(result[0].random, &random[0], RANDOM_SIZE); result[1].pid = pid; result[1].private = 1; memcpy(result[1].random, &random[RANDOM_SIZE], RANDOM_SIZE); for (i = 0 ; i < DRBG_FORK_RESULT_COUNT ; ++i) { memcpy(psample, &result[i].random[0], RANDOM_SIZE); psample += RANDOM_SIZE; } qsort(result, DRBG_FORK_RESULT_COUNT, sizeof(drbg_fork_result), compare_drbg_fork_result); for (i = 1 ; i < DRBG_FORK_RESULT_COUNT ; ++i) { if (result[i].random[0] == result[i-1].random[0]) { ++duplicate[result[i].private]; } } if (duplicate[0] >= DRBG_FORK_COUNT - 1) { TEST_note("ERROR: %d duplicate prefixes in public random output", duplicate[0]); success = 0; } if (duplicate[1] >= DRBG_FORK_COUNT - 1) { TEST_note("ERROR: %d duplicate prefixes in private random output", duplicate[1]); success = 0; } duplicate[0] = 0; qsort(sample, sizeof(sample)/2, 2, compare_rand_chunk); for (i = 2, psample = sample + 2 ; i < sizeof(sample) ; i += 2, psample += 2) { if (compare_rand_chunk(psample - 2, psample) == 0) ++duplicate[0]; } if (duplicate[0] >= DRBG_FORK_COUNT - 1) { TEST_note("ERROR: %d duplicate chunks in random output", duplicate[0]); success = 0; } if (verbose || !success) { for (i = 0 ; i < DRBG_FORK_RESULT_COUNT ; ++i) { char *rand_hex = OPENSSL_buf2hexstr(result[i].random, RANDOM_SIZE); TEST_note(" random: %s, pid: %d (%s, %s)", rand_hex, result[i].pid, result[i].name, result[i].private ? "private" : "public" ); OPENSSL_free(rand_hex); } } return success; } static int test_rand_fork_safety(int i) { int success = 1; unsigned char random[1]; EVP_RAND_CTX *primary, *public, *private; if (!TEST_ptr(primary = RAND_get0_primary(NULL)) || !TEST_ptr(public = RAND_get0_public(NULL)) || !TEST_ptr(private = RAND_get0_private(NULL))) return 0; if (!TEST_true(test_rand_reseed_on_fork(primary, public, private))) success = 0; if (!TEST_int_gt(RAND_bytes(random, 1), 0) || !TEST_int_gt(RAND_priv_bytes(random, 1), 0)) success = 0; return success; } #endif static int test_rand_reseed(void) { EVP_RAND_CTX *primary, *public, *private; unsigned char rand_add_buf[256]; int rv = 0; time_t before_reseed; if (using_fips_rng()) return TEST_skip("CRNGT cannot be disabled"); #ifndef OPENSSL_NO_DEPRECATED_3_0 if (!TEST_ptr_eq(RAND_get_rand_method(), RAND_OpenSSL())) return 0; #endif if (!TEST_ptr(primary = RAND_get0_primary(NULL)) || !TEST_ptr(public = RAND_get0_public(NULL)) || !TEST_ptr(private = RAND_get0_private(NULL))) return 0; if (!TEST_ptr_ne(public, private) || !TEST_ptr_ne(public, primary) || !TEST_ptr_ne(private, primary) || !TEST_ptr_eq(prov_rand(public)->parent, prov_rand(primary)) || !TEST_ptr_eq(prov_rand(private)->parent, prov_rand(primary))) return 0; if (!TEST_true(disable_crngt(primary))) return 0; EVP_RAND_uninstantiate(primary); EVP_RAND_uninstantiate(private); EVP_RAND_uninstantiate(public); if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 1, 1, 1, 0))) goto error; if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 0, 0, 0, 0))) goto error; inc_reseed_counter(primary); if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 0, 1, 1, 0))) goto error; inc_reseed_counter(primary); inc_reseed_counter(private); if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 0, 1, 0, 0))) goto error; inc_reseed_counter(primary); inc_reseed_counter(public); if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 0, 0, 1, 0))) goto error; memset(rand_add_buf, 'r', sizeof(rand_add_buf)); before_reseed = time(NULL); RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); if (!TEST_true(test_drbg_reseed(1, primary, public, private, NULL, NULL, 1, 1, 1, before_reseed))) goto error; rv = 1; error: return rv; } #if defined(OPENSSL_THREADS) static int multi_thread_rand_bytes_succeeded = 1; static int multi_thread_rand_priv_bytes_succeeded = 1; static int set_reseed_time_interval(EVP_RAND_CTX *drbg, int t) { OSSL_PARAM params[2]; params[0] = OSSL_PARAM_construct_int(OSSL_DRBG_PARAM_RESEED_TIME_INTERVAL, &t); params[1] = OSSL_PARAM_construct_end(); return EVP_RAND_CTX_set_params(drbg, params); } static void run_multi_thread_test(void) { unsigned char buf[256]; time_t start = time(NULL); EVP_RAND_CTX *public = NULL, *private = NULL; if (!TEST_ptr(public = RAND_get0_public(NULL)) || !TEST_ptr(private = RAND_get0_private(NULL)) || !TEST_true(set_reseed_time_interval(private, 1)) || !TEST_true(set_reseed_time_interval(public, 1))) { multi_thread_rand_bytes_succeeded = 0; return; } do { if (rand_bytes(buf, sizeof(buf)) <= 0) multi_thread_rand_bytes_succeeded = 0; if (rand_priv_bytes(buf, sizeof(buf)) <= 0) multi_thread_rand_priv_bytes_succeeded = 0; } while (time(NULL) - start < 5); } # if defined(OPENSSL_SYS_WINDOWS) typedef HANDLE thread_t; static DWORD WINAPI thread_run(LPVOID arg) { run_multi_thread_test(); OPENSSL_thread_stop(); return 0; } static int run_thread(thread_t *t) { *t = CreateThread(NULL, 0, thread_run, NULL, 0, NULL); return *t != NULL; } static int wait_for_thread(thread_t thread) { return WaitForSingleObject(thread, INFINITE) == 0; } # else typedef pthread_t thread_t; static void *thread_run(void *arg) { run_multi_thread_test(); OPENSSL_thread_stop(); return NULL; } static int run_thread(thread_t *t) { return pthread_create(t, NULL, thread_run, NULL) == 0; } static int wait_for_thread(thread_t thread) { return pthread_join(thread, NULL) == 0; } # endif # define THREADS 3 static int test_multi_thread(void) { thread_t t[THREADS]; int i; for (i = 0; i < THREADS; i++) run_thread(&t[i]); run_multi_thread_test(); for (i = 0; i < THREADS; i++) wait_for_thread(t[i]); if (!TEST_true(multi_thread_rand_bytes_succeeded)) return 0; if (!TEST_true(multi_thread_rand_priv_bytes_succeeded)) return 0; return 1; } #endif static EVP_RAND_CTX *new_drbg(EVP_RAND_CTX *parent) { OSSL_PARAM params[2]; EVP_RAND *rand = NULL; EVP_RAND_CTX *drbg = NULL; params[0] = OSSL_PARAM_construct_utf8_string(OSSL_DRBG_PARAM_CIPHER, "AES-256-CTR", 0); params[1] = OSSL_PARAM_construct_end(); if (!TEST_ptr(rand = EVP_RAND_fetch(NULL, "CTR-DRBG", NULL)) || !TEST_ptr(drbg = EVP_RAND_CTX_new(rand, parent)) || !TEST_true(EVP_RAND_CTX_set_params(drbg, params))) { EVP_RAND_CTX_free(drbg); drbg = NULL; } EVP_RAND_free(rand); return drbg; } static int test_rand_prediction_resistance(void) { EVP_RAND_CTX *x = NULL, *y = NULL, *z = NULL; unsigned char buf1[51], buf2[sizeof(buf1)]; int ret = 0, xreseed, yreseed, zreseed; if (using_fips_rng()) return TEST_skip("CRNGT cannot be disabled"); if (!TEST_ptr(x = new_drbg(NULL)) || !TEST_true(disable_crngt(x)) || !TEST_true(EVP_RAND_instantiate(x, 0, 0, NULL, 0, NULL)) || !TEST_ptr(y = new_drbg(x)) || !TEST_true(EVP_RAND_instantiate(y, 0, 0, NULL, 0, NULL)) || !TEST_ptr(z = new_drbg(y)) || !TEST_true(EVP_RAND_instantiate(z, 0, 0, NULL, 0, NULL))) goto err; inc_reseed_counter(y); xreseed = reseed_counter(x); yreseed = reseed_counter(y); zreseed = reseed_counter(z); if (!TEST_true(EVP_RAND_reseed(z, 0, NULL, 0, NULL, 0)) || !TEST_int_eq(reseed_counter(x), xreseed) || !TEST_int_eq(reseed_counter(y), yreseed) || !TEST_int_gt(reseed_counter(z), zreseed)) goto err; zreseed = reseed_counter(z); if (!TEST_true(EVP_RAND_reseed(z, 1, NULL, 0, NULL, 0)) || !TEST_int_gt(reseed_counter(x), xreseed) || !TEST_int_gt(reseed_counter(y), yreseed) || !TEST_int_gt(reseed_counter(z), zreseed)) goto err; inc_reseed_counter(y); xreseed = reseed_counter(x); yreseed = reseed_counter(y); zreseed = reseed_counter(z); if (!TEST_true(EVP_RAND_generate(z, buf1, sizeof(buf1), 0, 0, NULL, 0)) || !TEST_int_eq(reseed_counter(x), xreseed) || !TEST_int_eq(reseed_counter(y), yreseed) || !TEST_int_gt(reseed_counter(z), zreseed)) goto err; zreseed = reseed_counter(z); if (!TEST_true(EVP_RAND_generate(z, buf2, sizeof(buf2), 0, 1, NULL, 0)) || !TEST_int_gt(reseed_counter(x), xreseed) || !TEST_int_gt(reseed_counter(y), yreseed) || !TEST_int_gt(reseed_counter(z), zreseed) || !TEST_mem_ne(buf1, sizeof(buf1), buf2, sizeof(buf2))) goto err; inc_reseed_counter(y); xreseed = reseed_counter(x); yreseed = reseed_counter(y); zreseed = reseed_counter(z); if (!TEST_true(EVP_RAND_reseed(z, 0, NULL, 0, NULL, 0)) || !TEST_int_eq(reseed_counter(x), xreseed) || !TEST_int_eq(reseed_counter(y), yreseed) || !TEST_int_gt(reseed_counter(z), zreseed)) goto err; ret = 1; err: EVP_RAND_CTX_free(z); EVP_RAND_CTX_free(y); EVP_RAND_CTX_free(x); return ret; } int setup_tests(void) { ADD_TEST(test_rand_reseed); #if defined(OPENSSL_SYS_UNIX) && !defined(OPENSSL_RAND_SEED_EGD) ADD_ALL_TESTS(test_rand_fork_safety, RANDOM_SIZE); #endif ADD_TEST(test_rand_prediction_resistance); #if defined(OPENSSL_THREADS) ADD_TEST(test_multi_thread); #endif return 1; }
test
openssl/test/drbgtest.c
openssl
#include <string.h> #include <stdarg.h> #include <openssl/bio.h> #include <openssl/safestack.h> #include "opt.h" static BIO *bio_in = NULL; static BIO *bio_out = NULL; static BIO *bio_err = NULL; static size_t amount = 0; static BIO **chain = NULL; typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_AMOUNT, OPT_INDENT, OPT_PREFIX } OPTION_CHOICE; static const OPTIONS options[] = { { "n", OPT_AMOUNT, 'p', "Amount of BIO_f_prefix() filters" }, { "i", OPT_INDENT, 's', "Indentation in form '[idx:]indent'" }, { "p", OPT_PREFIX, 's', "Prefix in form '[idx:]prefix'" }, { NULL } }; int opt_printf_stderr(const char *fmt, ...) { va_list ap; int ret; va_start(ap, fmt); ret = BIO_vprintf(bio_err, fmt, ap); va_end(ap); return ret; } static int run_pipe(void) { char buf[4096]; while (!BIO_eof(bio_in)) { size_t bytes_in; size_t bytes_out; if (!BIO_read_ex(bio_in, buf, sizeof(buf), &bytes_in)) return 0; bytes_out = 0; while (bytes_out < bytes_in) { size_t bytes; if (!BIO_write_ex(chain[amount - 1], buf, bytes_in, &bytes)) return 0; bytes_out += bytes; } } return 1; } static int setup_bio_chain(const char *progname) { BIO *next = NULL; size_t n = amount; chain = OPENSSL_zalloc(sizeof(*chain) * n); if (chain != NULL) { size_t i; next = bio_out; BIO_up_ref(next); for (i = 0; n > 0; i++, n--) { BIO *curr = BIO_new(BIO_f_prefix()); if (curr == NULL) goto err; chain[i] = BIO_push(curr, next); if (chain[i] == NULL) goto err; next = chain[i]; } } return chain != NULL; err: BIO_free_all(next); OPENSSL_free(chain); return 0; } static void cleanup(void) { if (chain != NULL) { BIO_free_all(chain[amount - 1]); OPENSSL_free(chain); } BIO_free_all(bio_in); BIO_free_all(bio_out); BIO_free_all(bio_err); } static int setup(void) { OPTION_CHOICE o; char *arg; char *colon; char *endptr; size_t idx, indent; const char *progname = opt_getprog(); bio_in = BIO_new_fp(stdin, BIO_NOCLOSE | BIO_FP_TEXT); bio_out = BIO_new_fp(stdout, BIO_NOCLOSE | BIO_FP_TEXT); bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT); #ifdef __VMS bio_out = BIO_push(BIO_new(BIO_f_linebuffer()), bio_out); bio_err = BIO_push(BIO_new(BIO_f_linebuffer()), bio_err); #endif OPENSSL_assert(bio_in != NULL); OPENSSL_assert(bio_out != NULL); OPENSSL_assert(bio_err != NULL); while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_AMOUNT: arg = opt_arg(); amount = strtoul(arg, &endptr, 10); if (endptr[0] != '\0') { BIO_printf(bio_err, "%s: -n argument isn't a decimal number: %s", progname, arg); return 0; } if (amount < 1) { BIO_printf(bio_err, "%s: must set up at least one filter", progname); return 0; } if (!setup_bio_chain(progname)) { BIO_printf(bio_err, "%s: failed setting up filter chain", progname); return 0; } break; case OPT_INDENT: if (chain == NULL) { BIO_printf(bio_err, "%s: -i given before -n", progname); return 0; } arg = opt_arg(); colon = strchr(arg, ':'); idx = 0; if (colon != NULL) { idx = strtoul(arg, &endptr, 10); if (endptr[0] != ':') { BIO_printf(bio_err, "%s: -i index isn't a decimal number: %s", progname, arg); return 0; } colon++; } else { colon = arg; } indent = strtoul(colon, &endptr, 10); if (endptr[0] != '\0') { BIO_printf(bio_err, "%s: -i value isn't a decimal number: %s", progname, arg); return 0; } if (idx >= amount) { BIO_printf(bio_err, "%s: index (%zu) not within range 0..%zu", progname, idx, amount - 1); return 0; } if (BIO_set_indent(chain[idx], (long)indent) <= 0) { BIO_printf(bio_err, "%s: failed setting indentation: %s", progname, arg); return 0; } break; case OPT_PREFIX: if (chain == NULL) { BIO_printf(bio_err, "%s: -p given before -n", progname); return 0; } arg = opt_arg(); colon = strchr(arg, ':'); idx = 0; if (colon != NULL) { idx = strtoul(arg, &endptr, 10); if (endptr[0] != ':') { BIO_printf(bio_err, "%s: -p index isn't a decimal number: %s", progname, arg); return 0; } colon++; } else { colon = arg; } if (idx >= amount) { BIO_printf(bio_err, "%s: index (%zu) not within range 0..%zu", progname, idx, amount - 1); return 0; } if (BIO_set_prefix(chain[idx], colon) <= 0) { BIO_printf(bio_err, "%s: failed setting prefix: %s", progname, arg); return 0; } break; default: case OPT_ERR: return 0; } } return 1; } int main(int argc, char **argv) { int rv = EXIT_SUCCESS; opt_init(argc, argv, options); rv = (setup() && run_pipe()) ? EXIT_SUCCESS : EXIT_FAILURE; cleanup(); return rv; }
test
openssl/test/bio_prefix_text.c
openssl
#include <openssl/trace.h> #include "testutil.h" static int test_trace_categories(void) { int cat_num; for (cat_num = -1; cat_num <= OSSL_TRACE_CATEGORY_NUM + 1; ++cat_num) { const char *cat_name = OSSL_trace_get_category_name(cat_num); int is_cat_name_eq = 0; int ret_cat_num; int expected_ret; switch (cat_num) { #define CASE(name) \ case OSSL_TRACE_CATEGORY_##name: \ is_cat_name_eq = TEST_str_eq(cat_name, #name); \ break CASE(ALL); CASE(TRACE); CASE(INIT); CASE(TLS); CASE(TLS_CIPHER); CASE(CONF); CASE(ENGINE_TABLE); CASE(ENGINE_REF_COUNT); CASE(PKCS5V2); CASE(PKCS12_KEYGEN); CASE(PKCS12_DECRYPT); CASE(X509V3_POLICY); CASE(BN_CTX); CASE(CMP); CASE(STORE); CASE(DECODER); CASE(ENCODER); CASE(REF_COUNT); CASE(HTTP); #undef CASE default: is_cat_name_eq = TEST_ptr_null(cat_name); break; } if (!TEST_true(is_cat_name_eq)) return 0; ret_cat_num = OSSL_trace_get_category_num(cat_name); expected_ret = cat_name != NULL ? cat_num : -1; if (!TEST_int_eq(expected_ret, ret_cat_num)) return 0; } return 1; } #ifndef OPENSSL_NO_TRACE # define OSSL_START "xyz-" # define OSSL_HELLO "Hello World\n" # define OSSL_STR80 "1234567890123456789012345678901234567890123456789012345678901234567890123456789\n" # define OSSL_STR81 (OSSL_STR80"x") # define OSSL_CTRL "A\xfe\nB" # define OSSL_MASKED "A \nB" # define OSSL_BYE "Good Bye Universe\n" # define OSSL_END "-abc" # define trace_string(text, full, str) \ OSSL_trace_string(trc_out, text, full, (unsigned char *)(str), strlen(str)) static int put_trace_output(void) { int res = 1; OSSL_TRACE_BEGIN(HTTP) { res = TEST_int_eq(BIO_printf(trc_out, OSSL_HELLO), strlen(OSSL_HELLO)); res += TEST_int_eq(trace_string(0, 0, OSSL_STR80), strlen(OSSL_STR80)); res += TEST_int_eq(trace_string(0, 0, OSSL_STR81), strlen(OSSL_STR80)); res += TEST_int_eq(trace_string(1, 1, OSSL_CTRL), strlen(OSSL_CTRL)); res += TEST_int_eq(trace_string(0, 1, OSSL_MASKED), strlen(OSSL_MASKED) + 1); res += TEST_int_eq(BIO_printf(trc_out, OSSL_BYE), strlen(OSSL_BYE)); res = res == 6; } OSSL_TRACE_END(HTTP); return res; } static int test_trace_channel(void) { static const char expected[] = OSSL_START"\n" OSSL_HELLO OSSL_STR80 "[len 81 limited to 80]: "OSSL_STR80 OSSL_CTRL OSSL_MASKED"\n" OSSL_BYE OSSL_END"\n"; static const size_t expected_len = sizeof(expected) - 1; BIO *bio = NULL; char *p_buf = NULL; long len = 0; int ret = 0; bio = BIO_new(BIO_s_mem()); if (!TEST_ptr(bio)) goto end; if (!TEST_int_eq(OSSL_trace_set_channel(OSSL_TRACE_CATEGORY_HTTP, bio), 1)) { BIO_free(bio); goto end; } if (!TEST_true(OSSL_trace_enabled(OSSL_TRACE_CATEGORY_HTTP))) goto end; if (!TEST_int_eq(OSSL_trace_set_prefix(OSSL_TRACE_CATEGORY_HTTP, OSSL_START), 1)) goto end; if (!TEST_int_eq(OSSL_trace_set_suffix(OSSL_TRACE_CATEGORY_HTTP, OSSL_END), 1)) goto end; ret = put_trace_output(); len = BIO_get_mem_data(bio, &p_buf); if (!TEST_strn2_eq(p_buf, len, expected, expected_len)) ret = 0; ret = TEST_int_eq(OSSL_trace_set_channel(OSSL_TRACE_CATEGORY_HTTP, NULL), 1) && ret; end: return ret; } static int trace_cb_failure; static int trace_cb_called; static size_t trace_cb(const char *buffer, size_t count, int category, int cmd, void *data) { trace_cb_called = 1; if (!TEST_true(category == OSSL_TRACE_CATEGORY_TRACE)) trace_cb_failure = 1; return count; } static int test_trace_callback(void) { int ret = 0; if (!TEST_true(OSSL_trace_set_callback(OSSL_TRACE_CATEGORY_TRACE, trace_cb, NULL))) goto end; put_trace_output(); if (!TEST_false(trace_cb_failure) || !TEST_true(trace_cb_called)) goto end; ret = 1; end: return ret; } #endif OPT_TEST_DECLARE_USAGE("\n") int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } ADD_TEST(test_trace_categories); #ifndef OPENSSL_NO_TRACE ADD_TEST(test_trace_channel); ADD_TEST(test_trace_callback); #endif return 1; } void cleanup_tests(void) { }
test
openssl/test/trace_api_test.c
openssl
#include <assert.h> #include <errno.h> #include <stdio.h> #include <string.h> #ifdef __TANDEM # include <strings.h> #endif #include <ctype.h> #include <openssl/bn.h> #include <openssl/crypto.h> #include <openssl/err.h> #include <openssl/rand.h> #include "internal/nelem.h" #include "internal/numbers.h" #include "testutil.h" #define HAVE_BN_SQRT 0 typedef struct filetest_st { const char *name; int (*func)(STANZA *s); } FILETEST; typedef struct mpitest_st { const char *base10; const char *mpi; size_t mpi_len; } MPITEST; static const int NUM0 = 100; static const int NUM1 = 50; static const int NUM_PRIME_TESTS = 20; static BN_CTX *ctx; #ifndef OPENSSL_NO_EC2M static int p0[] = { 163, 7, 6, 3, 0, -1 }; static int p1[] = { 193, 15, 0, -1 }; #endif static const char *findattr(STANZA *s, const char *key) { int i = s->numpairs; PAIR *pp = s->pairs; for ( ; --i >= 0; pp++) if (OPENSSL_strcasecmp(pp->key, key) == 0) return pp->value; return NULL; } static int parse_bigBN(BIGNUM **out, const char *bn_strings[]) { char *bigstring = glue_strings(bn_strings, NULL); int ret = BN_hex2bn(out, bigstring); OPENSSL_free(bigstring); return ret; } static int parseBN(BIGNUM **out, const char *in) { *out = NULL; return BN_hex2bn(out, in); } static int parsedecBN(BIGNUM **out, const char *in) { *out = NULL; return BN_dec2bn(out, in); } static BIGNUM *getBN(STANZA *s, const char *attribute) { const char *hex; BIGNUM *ret = NULL; if ((hex = findattr(s, attribute)) == NULL) { TEST_error("%s:%d: Can't find %s", s->test_file, s->start, attribute); return NULL; } if (parseBN(&ret, hex) != (int)strlen(hex)) { TEST_error("Could not decode '%s'", hex); return NULL; } return ret; } static int getint(STANZA *s, int *out, const char *attribute) { BIGNUM *ret; BN_ULONG word; int st = 0; if (!TEST_ptr(ret = getBN(s, attribute)) || !TEST_ulong_le(word = BN_get_word(ret), INT_MAX)) goto err; *out = (int)word; st = 1; err: BN_free(ret); return st; } static int equalBN(const char *op, const BIGNUM *expected, const BIGNUM *actual) { if (BN_cmp(expected, actual) == 0) return 1; TEST_error("unexpected %s value", op); TEST_BN_eq(expected, actual); return 0; } static int rand_neg(void) { static unsigned int neg = 0; static int sign[8] = { 0, 0, 0, 1, 1, 0, 1, 1 }; return sign[(neg++) % 8]; } static int test_swap(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL; int top, cond, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new())) goto err; if (!(TEST_true(BN_bntest_rand(a, 1024, 1, 0)) && TEST_true(BN_bntest_rand(b, 1024, 1, 0)) && TEST_ptr(BN_copy(c, a)) && TEST_ptr(BN_copy(d, b)))) goto err; top = BN_num_bits(a) / BN_BITS2; BN_swap(a, b); if (!equalBN("swap", a, d) || !equalBN("swap", b, c)) goto err; BN_swap(a, a); if (!equalBN("swap with same pointer", a, d)) goto err; cond = 1; BN_consttime_swap(cond, a, b, top); if (!equalBN("cswap true", a, c) || !equalBN("cswap true", b, d)) goto err; BN_consttime_swap(cond, a, a, top); if (!equalBN("cswap true", a, c)) goto err; cond = 0; BN_consttime_swap(cond, a, b, top); if (!equalBN("cswap false", a, c) || !equalBN("cswap false", b, d)) goto err; BN_consttime_swap(cond, a, a, top); if (!equalBN("cswap false", a, c)) goto err; BN_set_flags(a, BN_FLG_CONSTTIME); BN_swap(a, b); if (!equalBN("swap, flags", a, d) || !equalBN("swap, flags", b, c) || !TEST_true(BN_get_flags(b, BN_FLG_CONSTTIME)) || !TEST_false(BN_get_flags(a, BN_FLG_CONSTTIME))) goto err; cond = 1; BN_consttime_swap(cond, a, b, top); if (!equalBN("cswap true, flags", a, c) || !equalBN("cswap true, flags", b, d) || !TEST_true(BN_get_flags(a, BN_FLG_CONSTTIME)) || !TEST_false(BN_get_flags(b, BN_FLG_CONSTTIME))) goto err; cond = 0; BN_consttime_swap(cond, a, b, top); if (!equalBN("cswap false, flags", a, c) || !equalBN("cswap false, flags", b, d) || !TEST_true(BN_get_flags(a, BN_FLG_CONSTTIME)) || !TEST_false(BN_get_flags(b, BN_FLG_CONSTTIME))) goto err; st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); return st; } static int test_sub(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL; int i, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new())) goto err; for (i = 0; i < NUM0 + NUM1; i++) { if (i < NUM1) { if (!(TEST_true(BN_bntest_rand(a, 512, 0, 0))) && TEST_ptr(BN_copy(b, a)) && TEST_int_ne(BN_set_bit(a, i), 0) && TEST_true(BN_add_word(b, i))) goto err; } else { if (!TEST_true(BN_bntest_rand(b, 400 + i - NUM1, 0, 0))) goto err; BN_set_negative(a, rand_neg()); BN_set_negative(b, rand_neg()); } if (!(TEST_true(BN_sub(c, a, b)) && TEST_true(BN_add(c, c, b)) && TEST_true(BN_sub(c, c, a)) && TEST_BN_eq_zero(c))) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(c); return st; } static int test_div_recip(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL, *e = NULL; BN_RECP_CTX *recp = NULL; int st = 0, i; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(recp = BN_RECP_CTX_new())) goto err; for (i = 0; i < NUM0 + NUM1; i++) { if (i < NUM1) { if (!(TEST_true(BN_bntest_rand(a, 400, 0, 0)) && TEST_ptr(BN_copy(b, a)) && TEST_true(BN_lshift(a, a, i)) && TEST_true(BN_add_word(a, i)))) goto err; } else { if (!(TEST_true(BN_bntest_rand(b, 50 + 3 * (i - NUM1), 0, 0)))) goto err; } BN_set_negative(a, rand_neg()); BN_set_negative(b, rand_neg()); if (!(TEST_true(BN_RECP_CTX_set(recp, b, ctx)) && TEST_true(BN_div_recp(d, c, a, recp, ctx)) && TEST_true(BN_mul(e, d, b, ctx)) && TEST_true(BN_add(d, e, c)) && TEST_true(BN_sub(d, d, a)) && TEST_BN_eq_zero(d))) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); BN_free(e); BN_RECP_CTX_free(recp); return st; } static struct { int n, divisor, result, remainder; } signed_mod_tests[] = { { 10, 3, 3, 1 }, { -10, 3, -3, -1 }, { 10, -3, -3, 1 }, { -10, -3, 3, -1 }, }; static BIGNUM *set_signed_bn(int value) { BIGNUM *bn = BN_new(); if (bn == NULL) return NULL; if (!BN_set_word(bn, value < 0 ? -value : value)) { BN_free(bn); return NULL; } BN_set_negative(bn, value < 0); return bn; } static int test_signed_mod_replace_ab(int n) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL; int st = 0; if (!TEST_ptr(a = set_signed_bn(signed_mod_tests[n].n)) || !TEST_ptr(b = set_signed_bn(signed_mod_tests[n].divisor)) || !TEST_ptr(c = set_signed_bn(signed_mod_tests[n].result)) || !TEST_ptr(d = set_signed_bn(signed_mod_tests[n].remainder))) goto err; if (TEST_true(BN_div(a, b, a, b, ctx)) && TEST_BN_eq(a, c) && TEST_BN_eq(b, d)) st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); return st; } static int test_signed_mod_replace_ba(int n) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL; int st = 0; if (!TEST_ptr(a = set_signed_bn(signed_mod_tests[n].n)) || !TEST_ptr(b = set_signed_bn(signed_mod_tests[n].divisor)) || !TEST_ptr(c = set_signed_bn(signed_mod_tests[n].result)) || !TEST_ptr(d = set_signed_bn(signed_mod_tests[n].remainder))) goto err; if (TEST_true(BN_div(b, a, a, b, ctx)) && TEST_BN_eq(b, c) && TEST_BN_eq(a, d)) st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); return st; } static int test_mod(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL, *e = NULL; int st = 0, i; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new())) goto err; if (!(TEST_true(BN_bntest_rand(a, 1024, 0, 0)))) goto err; for (i = 0; i < NUM0; i++) { if (!(TEST_true(BN_bntest_rand(b, 450 + i * 10, 0, 0)))) goto err; BN_set_negative(a, rand_neg()); BN_set_negative(b, rand_neg()); if (!(TEST_true(BN_mod(c, a, b, ctx)) && TEST_true(BN_div(d, e, a, b, ctx)) && TEST_BN_eq(e, c) && TEST_true(BN_mul(c, d, b, ctx)) && TEST_true(BN_add(d, c, e)) && TEST_BN_eq(d, a))) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); BN_free(e); return st; } static const char *bn1strings[] = { "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000000000FFFFFFFF00", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "00000000000000000000000000000000000000000000000000FFFFFFFFFFFFFF", NULL }; static const char *bn2strings[] = { "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000000000FFFFFFFF0000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "000000000000000000000000000000000000000000FFFFFFFFFFFFFF00000000", NULL }; static int test_modexp_mont5(void) { BIGNUM *a = NULL, *p = NULL, *m = NULL, *d = NULL, *e = NULL; BIGNUM *b = NULL, *n = NULL, *c = NULL; BN_MONT_CTX *mont = NULL; int st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(p = BN_new()) || !TEST_ptr(m = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(n = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(mont = BN_MONT_CTX_new())) goto err; if (!(TEST_true(BN_bntest_rand(m, 1024, 0, 1)) && TEST_true(BN_bntest_rand(a, 1024, 0, 0)))) goto err; BN_zero(p); if (!TEST_true(BN_mod_exp_mont_consttime(d, a, p, m, ctx, NULL))) goto err; if (!TEST_BN_eq_one(d)) goto err; if (!(TEST_true(BN_hex2bn(&a, "7878787878787878787878787878787878787878787878787878787878787878" "7878787878787878787878787878787878787878787878787878787878787878" "7878787878787878787878787878787878787878787878787878787878787878" "7878787878787878787878787878787878787878787878787878787878787878")) && TEST_true(BN_hex2bn(&b, "095D72C08C097BA488C5E439C655A192EAFB6380073D8C2664668EDDB4060744" "E16E57FB4EDB9AE10A0CEFCDC28A894F689A128379DB279D48A2E20849D68593" "9B7803BCF46CEBF5C533FB0DD35B080593DE5472E3FE5DB951B8BFF9B4CB8F03" "9CC638A5EE8CDD703719F8000E6A9F63BEED5F2FCD52FF293EA05A251BB4AB81")) && TEST_true(BN_hex2bn(&n, "D78AF684E71DB0C39CFF4E64FB9DB567132CB9C50CC98009FEB820B26F2DED9B" "91B9B5E2B83AE0AE4EB4E0523CA726BFBE969B89FD754F674CE99118C3F2D1C5" "D81FDC7C54E02B60262B241D53C040E99E45826ECA37A804668E690E1AFC1CA4" "2C9A15D84D4954425F0B7642FC0BD9D7B24E2618D2DCC9B729D944BADACFDDAF")))) goto err; if (!(TEST_true(BN_MONT_CTX_set(mont, n, ctx)) && TEST_true(BN_mod_mul_montgomery(c, a, b, mont, ctx)) && TEST_true(BN_mod_mul_montgomery(d, b, a, mont, ctx)) && TEST_BN_eq(c, d))) goto err; if (!(TEST_true(parse_bigBN(&n, bn1strings)) && TEST_true(parse_bigBN(&a, bn2strings)))) goto err; BN_free(b); if (!(TEST_ptr(b = BN_dup(a)) && TEST_true(BN_MONT_CTX_set(mont, n, ctx)) && TEST_true(BN_mod_mul_montgomery(c, a, a, mont, ctx)) && TEST_true(BN_mod_mul_montgomery(d, a, b, mont, ctx)) && TEST_BN_eq(c, d))) goto err; { static const char *ahex[] = { "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8FFEADBCFC4DAE7FFF908E92820306B", "9544D954000000006C0000000000000000000000000000000000000000000000", "00000000000000000000FF030202FFFFF8FFEBDBCFC4DAE7FFF908E92820306B", "9544D954000000006C000000FF0302030000000000FFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF01FC00FF02FFFFFFFF", "00FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00FCFD", "FCFFFFFFFFFF000000000000000000FF0302030000000000FFFFFFFFFFFFFFFF", "FF00FCFDFDFF030202FF00000000FFFFFFFFFFFFFFFFFF00FCFDFCFFFFFFFFFF", NULL }; static const char *nhex[] = { "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8F8F8F8000000", "00000010000000006C0000000000000000000000000000000000000000000000", "00000000000000000000000000000000000000FFFFFFFFFFFFF8F8F8F8000000", "00000010000000006C000000000000000000000000FFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "00FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFF000000000000000000000000000000000000FFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", NULL }; if (!(TEST_true(parse_bigBN(&a, ahex)) && TEST_true(parse_bigBN(&n, nhex)))) goto err; } BN_free(b); if (!(TEST_ptr(b = BN_dup(a)) && TEST_true(BN_MONT_CTX_set(mont, n, ctx)))) goto err; if (!TEST_true(BN_mod_mul_montgomery(c, a, a, mont, ctx)) || !TEST_true(BN_mod_mul_montgomery(d, a, b, mont, ctx)) || !TEST_BN_eq(c, d)) goto err; if (!(TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF")) && TEST_true(BN_hex2bn(&n, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF")) && TEST_true(BN_MONT_CTX_set(mont, n, ctx)) && TEST_false(BN_mod_mul_montgomery(d, a, a, mont, ctx)))) goto err; if (!(TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF2020202020DF")) && TEST_true(BN_hex2bn(&b, "2020202020202020202020202020202020202020202020202020202020202020" "2020202020202020202020202020202020202020202020202020202020202020" "20202020202020FF202020202020202020202020202020202020202020202020" "2020202020202020202020202020202020202020202020202020202020202020")) && TEST_true(BN_hex2bn(&n, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF2020202020FF")) && TEST_true(BN_MONT_CTX_set(mont, n, ctx)) && TEST_true(BN_mod_exp_mont_consttime(c, a, b, n, ctx, mont)) && TEST_true(BN_mod_exp_mont(d, a, b, n, ctx, mont)) && TEST_BN_eq(c, d))) goto err; if (!(TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF2020202020DF")) && TEST_true(BN_hex2bn(&b, "1FA53F26F8811C58BE0357897AA5E165693230BC9DF5F01DFA6A2D59229EC69D" "9DE6A89C36E3B6957B22D6FAAD5A3C73AE587B710DBE92E83D3A9A3339A085CB" "B58F508CA4F837924BB52CC1698B7FDC2FD74362456A595A5B58E38E38E38E38" "E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E38E")) && TEST_true(BN_hex2bn(&n, "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF2020202020DF")) && TEST_true(BN_MONT_CTX_set(mont, n, ctx)) && TEST_true(BN_mod_exp_mont_consttime(c, a, b, n, ctx, mont)))) goto err; BN_zero(d); if (!TEST_BN_eq(c, d)) goto err; { static const char *ehex[] = { "95564994a96c45954227b845a1e99cb939d5a1da99ee91acc962396ae999a9ee", "38603790448f2f7694c242a875f0cad0aae658eba085f312d2febbbd128dd2b5", "8f7d1149f03724215d704344d0d62c587ae3c5939cba4b9b5f3dc5e8e911ef9a", "5ce1a5a749a4989d0d8368f6e1f8cdf3a362a6c97fb02047ff152b480a4ad985", "2d45efdf0770542992afca6a0590d52930434bba96017afbc9f99e112950a8b1", "a359473ec376f329bdae6a19f503be6d4be7393c4e43468831234e27e3838680", "b949390d2e416a3f9759e5349ab4c253f6f29f819a6fe4cbfd27ada34903300e", "da021f62839f5878a36f1bc3085375b00fd5fa3e68d316c0fdace87a97558465", NULL}; static const char *phex[] = { "f95dc0f980fbd22e90caa5a387cc4a369f3f830d50dd321c40db8c09a7e1a241", "a536e096622d3280c0c1ba849c1f4a79bf490f60006d081e8cf69960189f0d31", "2cd9e17073a3fba7881b21474a13b334116cb2f5dbf3189a6de3515d0840f053", "c776d3982d391b6d04d642dda5cc6d1640174c09875addb70595658f89efb439", "dc6fbd55f903aadd307982d3f659207f265e1ec6271b274521b7a5e28e8fd7a5", "5df089292820477802a43cf5b6b94e999e8c9944ddebb0d0e95a60f88cb7e813", "ba110d20e1024774107dd02949031864923b3cb8c3f7250d6d1287b0a40db6a4", "7bd5a469518eb65aa207ddc47d8c6e5fc8e0c105be8fc1d4b57b2e27540471d5", NULL}; static const char *mhex[] = { "fef15d5ce4625f1bccfbba49fc8439c72bf8202af039a2259678941b60bb4a8f", "2987e965d58fd8cf86a856674d519763d0e1211cc9f8596971050d56d9b35db3", "785866cfbca17cfdbed6060be3629d894f924a89fdc1efc624f80d41a22f1900", "9503fcc3824ef62ccb9208430c26f2d8ceb2c63488ec4c07437aa4c96c43dd8b", "9289ed00a712ff66ee195dc71f5e4ead02172b63c543d69baf495f5fd63ba7bc", "c633bd309c016e37736da92129d0b053d4ab28d21ad7d8b6fab2a8bbdc8ee647", "d2fbcf2cf426cf892e6f5639e0252993965dfb73ccd277407014ea784aaa280c", "b7b03972bc8b0baa72360bdb44b82415b86b2f260f877791cd33ba8f2d65229b", NULL}; if (!TEST_true(parse_bigBN(&e, ehex)) || !TEST_true(parse_bigBN(&p, phex)) || !TEST_true(parse_bigBN(&m, mhex)) || !TEST_true(BN_mod_exp_mont_consttime(d, e, p, m, ctx, NULL)) || !TEST_true(BN_mod_exp_simple(a, e, p, m, ctx)) || !TEST_BN_eq(a, d)) goto err; } if (!TEST_true(BN_bntest_rand(p, 1024, 0, 0))) goto err; BN_zero(a); if (!TEST_true(BN_mod_exp_mont_consttime(d, a, p, m, ctx, NULL)) || !TEST_BN_eq_zero(d)) goto err; if (!(TEST_true(BN_one(a)) && TEST_true(BN_MONT_CTX_set(mont, m, ctx)))) goto err; if (!TEST_true(BN_from_montgomery(e, a, mont, ctx)) || !TEST_true(BN_mod_exp_mont_consttime(d, e, p, m, ctx, NULL)) || !TEST_true(BN_mod_exp_simple(a, e, p, m, ctx)) || !TEST_BN_eq(a, d)) goto err; if (!(TEST_true(BN_bntest_rand(e, 1024, 0, 0)) && TEST_true(BN_mod_exp_mont_consttime(d, e, p, m, ctx, NULL)) && TEST_true(BN_mod_exp_simple(a, e, p, m, ctx)) && TEST_BN_eq(a, d))) goto err; st = 1; err: BN_MONT_CTX_free(mont); BN_free(a); BN_free(p); BN_free(m); BN_free(d); BN_free(e); BN_free(b); BN_free(n); BN_free(c); return st; } #ifndef OPENSSL_NO_EC2M static int test_gf2m_add(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL; int i, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new())) goto err; for (i = 0; i < NUM0; i++) { if (!(TEST_true(BN_rand(a, 512, 0, 0)) && TEST_ptr(BN_copy(b, BN_value_one())))) goto err; BN_set_negative(a, rand_neg()); BN_set_negative(b, rand_neg()); if (!(TEST_true(BN_GF2m_add(c, a, b)) && TEST_false((BN_is_odd(a) && BN_is_odd(c)) || (!BN_is_odd(a) && !BN_is_odd(c))))) goto err; if (!(TEST_true(BN_GF2m_add(c, c, c)) && TEST_BN_eq_zero(c))) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(c); return st; } static int test_gf2m_mod(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL, *e = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 1024, 0, 0))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod(c, a, b[j])) && TEST_true(BN_GF2m_add(d, a, c)) && TEST_true(BN_GF2m_mod(e, d, b[j])) && TEST_BN_eq_zero(e))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); return st; } static int test_gf2m_mul(void) { BIGNUM *a, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; BIGNUM *e = NULL, *f = NULL, *g = NULL, *h = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(f = BN_new()) || !TEST_ptr(g = BN_new()) || !TEST_ptr(h = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!(TEST_true(BN_bntest_rand(a, 1024, 0, 0)) && TEST_true(BN_bntest_rand(c, 1024, 0, 0)) && TEST_true(BN_bntest_rand(d, 1024, 0, 0)))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod_mul(e, a, c, b[j], ctx)) && TEST_true(BN_GF2m_add(f, a, d)) && TEST_true(BN_GF2m_mod_mul(g, f, c, b[j], ctx)) && TEST_true(BN_GF2m_mod_mul(h, d, c, b[j], ctx)) && TEST_true(BN_GF2m_add(f, e, g)) && TEST_true(BN_GF2m_add(f, f, h)) && TEST_BN_eq_zero(f))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); BN_free(f); BN_free(g); BN_free(h); return st; } static int test_gf2m_sqr(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 1024, 0, 0))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod_sqr(c, a, b[j], ctx)) && TEST_true(BN_copy(d, a)) && TEST_true(BN_GF2m_mod_mul(d, a, d, b[j], ctx)) && TEST_true(BN_GF2m_add(d, c, d)) && TEST_BN_eq_zero(d))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); return st; } static int test_gf2m_modinv(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new())) goto err; if (!TEST_true(BN_one(b[0]))) goto err; if (!TEST_true(BN_bntest_rand(a, 512, 0, 0))) goto err; if (!TEST_false(BN_GF2m_mod_inv(c, a, b[0], ctx))) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 512, 0, 0))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod_inv(c, a, b[j], ctx)) && TEST_true(BN_GF2m_mod_mul(d, a, c, b[j], ctx)) && TEST_BN_eq_one(d))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); return st; } static int test_gf2m_moddiv(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; BIGNUM *e = NULL, *f = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(f = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!(TEST_true(BN_bntest_rand(a, 512, 0, 0)) && TEST_true(BN_bntest_rand(c, 512, 0, 0)))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod_div(d, a, c, b[j], ctx)) && TEST_true(BN_GF2m_mod_mul(e, d, c, b[j], ctx)) && TEST_true(BN_GF2m_mod_div(f, a, e, b[j], ctx)) && TEST_BN_eq_one(f))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); BN_free(f); return st; } static int test_gf2m_modexp(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; BIGNUM *e = NULL, *f = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(f = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!(TEST_true(BN_bntest_rand(a, 512, 0, 0)) && TEST_true(BN_bntest_rand(c, 512, 0, 0)) && TEST_true(BN_bntest_rand(d, 512, 0, 0)))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod_exp(e, a, c, b[j], ctx)) && TEST_true(BN_GF2m_mod_exp(f, a, d, b[j], ctx)) && TEST_true(BN_GF2m_mod_mul(e, e, f, b[j], ctx)) && TEST_true(BN_add(f, c, d)) && TEST_true(BN_GF2m_mod_exp(f, a, f, b[j], ctx)) && TEST_true(BN_GF2m_add(f, e, f)) && TEST_BN_eq_zero(f))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); BN_free(f); return st; } static int test_gf2m_modsqrt(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; BIGNUM *e = NULL, *f = NULL; int i, j, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new()) || !TEST_ptr(f = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 512, 0, 0))) goto err; for (j = 0; j < 2; j++) { if (!(TEST_true(BN_GF2m_mod(c, a, b[j])) && TEST_true(BN_GF2m_mod_sqrt(d, a, b[j], ctx)) && TEST_true(BN_GF2m_mod_sqr(e, d, b[j], ctx)) && TEST_true(BN_GF2m_add(f, c, e)) && TEST_BN_eq_zero(f))) goto err; } } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); BN_free(f); return st; } static int test_gf2m_modsolvequad(void) { BIGNUM *a = NULL, *b[2] = {NULL, NULL}, *c = NULL, *d = NULL; BIGNUM *e = NULL; int i, j, s = 0, t, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b[0] = BN_new()) || !TEST_ptr(b[1] = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new()) || !TEST_ptr(e = BN_new())) goto err; if (!(TEST_true(BN_GF2m_arr2poly(p0, b[0])) && TEST_true(BN_GF2m_arr2poly(p1, b[1])))) goto err; for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 512, 0, 0))) goto err; for (j = 0; j < 2; j++) { t = BN_GF2m_mod_solve_quad(c, a, b[j], ctx); if (t) { s++; if (!(TEST_true(BN_GF2m_mod_sqr(d, c, b[j], ctx)) && TEST_true(BN_GF2m_add(d, c, d)) && TEST_true(BN_GF2m_mod(e, a, b[j])) && TEST_true(BN_GF2m_add(e, e, d)) && TEST_BN_eq_zero(e))) goto err; } } } if (!TEST_int_ge(s, 0)) { TEST_info("%d tests found no roots; probably an error", NUM0); goto err; } st = 1; err: BN_free(a); BN_free(b[0]); BN_free(b[1]); BN_free(c); BN_free(d); BN_free(e); return st; } #endif static int test_kronecker(void) { BIGNUM *a = NULL, *b = NULL, *r = NULL, *t = NULL; int i, legendre, kronecker, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(r = BN_new()) || !TEST_ptr(t = BN_new())) goto err; if (!TEST_true(BN_generate_prime_ex(b, 512, 0, NULL, NULL, NULL))) goto err; BN_set_negative(b, rand_neg()); for (i = 0; i < NUM0; i++) { if (!TEST_true(BN_bntest_rand(a, 512, 0, 0))) goto err; BN_set_negative(a, rand_neg()); if (!TEST_true(BN_copy(t, b))) goto err; BN_set_negative(t, 0); if (!TEST_true(BN_sub_word(t, 1))) goto err; if (!TEST_true(BN_rshift1(t, t))) goto err; BN_set_negative(b, 0); if (!TEST_true(BN_mod_exp_recp(r, a, t, b, ctx))) goto err; BN_set_negative(b, 1); if (BN_is_word(r, 1)) legendre = 1; else if (BN_is_zero(r)) legendre = 0; else { if (!TEST_true(BN_add_word(r, 1))) goto err; if (!TEST_int_eq(BN_ucmp(r, b), 0)) { TEST_info("Legendre symbol computation failed"); goto err; } legendre = -1; } if (!TEST_int_ge(kronecker = BN_kronecker(a, b, ctx), -1)) goto err; if (BN_is_negative(a) && BN_is_negative(b)) kronecker = -kronecker; if (!TEST_int_eq(legendre, kronecker)) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(r); BN_free(t); return st; } static int file_sum(STANZA *s) { BIGNUM *a = NULL, *b = NULL, *sum = NULL, *ret = NULL; BN_ULONG b_word; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(b = getBN(s, "B")) || !TEST_ptr(sum = getBN(s, "Sum")) || !TEST_ptr(ret = BN_new())) goto err; if (!TEST_true(BN_add(ret, a, b)) || !equalBN("A + B", sum, ret) || !TEST_true(BN_sub(ret, sum, a)) || !equalBN("Sum - A", b, ret) || !TEST_true(BN_sub(ret, sum, b)) || !equalBN("Sum - B", a, ret)) goto err; if (!TEST_true(BN_copy(ret, a)) || !TEST_true(BN_add(ret, ret, b)) || !equalBN("A + B (r is a)", sum, ret) || !TEST_true(BN_copy(ret, b)) || !TEST_true(BN_add(ret, a, ret)) || !equalBN("A + B (r is b)", sum, ret) || !TEST_true(BN_copy(ret, sum)) || !TEST_true(BN_sub(ret, ret, a)) || !equalBN("Sum - A (r is a)", b, ret) || !TEST_true(BN_copy(ret, a)) || !TEST_true(BN_sub(ret, sum, ret)) || !equalBN("Sum - A (r is b)", b, ret) || !TEST_true(BN_copy(ret, sum)) || !TEST_true(BN_sub(ret, ret, b)) || !equalBN("Sum - B (r is a)", a, ret) || !TEST_true(BN_copy(ret, b)) || !TEST_true(BN_sub(ret, sum, ret)) || !equalBN("Sum - B (r is b)", a, ret)) goto err; if (!BN_is_negative(a) && !BN_is_negative(b) && BN_cmp(a, b) >= 0) { if (!TEST_true(BN_uadd(ret, a, b)) || !equalBN("A +u B", sum, ret) || !TEST_true(BN_usub(ret, sum, a)) || !equalBN("Sum -u A", b, ret) || !TEST_true(BN_usub(ret, sum, b)) || !equalBN("Sum -u B", a, ret)) goto err; if (!TEST_true(BN_copy(ret, a)) || !TEST_true(BN_uadd(ret, ret, b)) || !equalBN("A +u B (r is a)", sum, ret) || !TEST_true(BN_copy(ret, b)) || !TEST_true(BN_uadd(ret, a, ret)) || !equalBN("A +u B (r is b)", sum, ret) || !TEST_true(BN_copy(ret, sum)) || !TEST_true(BN_usub(ret, ret, a)) || !equalBN("Sum -u A (r is a)", b, ret) || !TEST_true(BN_copy(ret, a)) || !TEST_true(BN_usub(ret, sum, ret)) || !equalBN("Sum -u A (r is b)", b, ret) || !TEST_true(BN_copy(ret, sum)) || !TEST_true(BN_usub(ret, ret, b)) || !equalBN("Sum -u B (r is a)", a, ret) || !TEST_true(BN_copy(ret, b)) || !TEST_true(BN_usub(ret, sum, ret)) || !equalBN("Sum -u B (r is b)", a, ret)) goto err; } b_word = BN_get_word(b); if (!BN_is_negative(b) && b_word != (BN_ULONG)-1) { if (!TEST_true(BN_copy(ret, a)) || !TEST_true(BN_add_word(ret, b_word)) || !equalBN("A + B (word)", sum, ret) || !TEST_true(BN_copy(ret, sum)) || !TEST_true(BN_sub_word(ret, b_word)) || !equalBN("Sum - B (word)", a, ret)) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(sum); BN_free(ret); return st; } static int file_lshift1(STANZA *s) { BIGNUM *a = NULL, *lshift1 = NULL, *zero = NULL, *ret = NULL; BIGNUM *two = NULL, *remainder = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(lshift1 = getBN(s, "LShift1")) || !TEST_ptr(zero = BN_new()) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(two = BN_new()) || !TEST_ptr(remainder = BN_new())) goto err; BN_zero(zero); if (!TEST_true(BN_set_word(two, 2)) || !TEST_true(BN_add(ret, a, a)) || !equalBN("A + A", lshift1, ret) || !TEST_true(BN_mul(ret, a, two, ctx)) || !equalBN("A * 2", lshift1, ret) || !TEST_true(BN_div(ret, remainder, lshift1, two, ctx)) || !equalBN("LShift1 / 2", a, ret) || !equalBN("LShift1 % 2", zero, remainder) || !TEST_true(BN_lshift1(ret, a)) || !equalBN("A << 1", lshift1, ret) || !TEST_true(BN_rshift1(ret, lshift1)) || !equalBN("LShift >> 1", a, ret) || !TEST_true(BN_rshift1(ret, lshift1)) || !equalBN("LShift >> 1", a, ret)) goto err; if (!TEST_true(BN_set_bit(lshift1, 0)) || !TEST_true(BN_div(ret, NULL , lshift1, two, ctx)) || !equalBN("(LShift1 | 1) / 2", a, ret) || !TEST_true(BN_rshift1(ret, lshift1)) || !equalBN("(LShift | 1) >> 1", a, ret)) goto err; st = 1; err: BN_free(a); BN_free(lshift1); BN_free(zero); BN_free(ret); BN_free(two); BN_free(remainder); return st; } static int file_lshift(STANZA *s) { BIGNUM *a = NULL, *lshift = NULL, *ret = NULL; int n = 0, st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(lshift = getBN(s, "LShift")) || !TEST_ptr(ret = BN_new()) || !getint(s, &n, "N")) goto err; if (!TEST_true(BN_lshift(ret, a, n)) || !equalBN("A << N", lshift, ret) || !TEST_true(BN_rshift(ret, lshift, n)) || !equalBN("A >> N", a, ret)) goto err; st = 1; err: BN_free(a); BN_free(lshift); BN_free(ret); return st; } static int file_rshift(STANZA *s) { BIGNUM *a = NULL, *rshift = NULL, *ret = NULL; int n = 0, st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(rshift = getBN(s, "RShift")) || !TEST_ptr(ret = BN_new()) || !getint(s, &n, "N")) goto err; if (!TEST_true(BN_rshift(ret, a, n)) || !equalBN("A >> N", rshift, ret)) goto err; if (n == 1) { if (!TEST_true(BN_rshift1(ret, a)) || !equalBN("A >> 1 (rshift1)", rshift, ret)) goto err; } st = 1; err: BN_free(a); BN_free(rshift); BN_free(ret); return st; } static int file_square(STANZA *s) { BIGNUM *a = NULL, *square = NULL, *zero = NULL, *ret = NULL; BIGNUM *remainder = NULL, *tmp = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(square = getBN(s, "Square")) || !TEST_ptr(zero = BN_new()) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(remainder = BN_new())) goto err; BN_zero(zero); if (!TEST_true(BN_sqr(ret, a, ctx)) || !equalBN("A^2", square, ret) || !TEST_true(BN_mul(ret, a, a, ctx)) || !equalBN("A * A", square, ret) || !TEST_true(BN_div(ret, remainder, square, a, ctx)) || !equalBN("Square / A", a, ret) || !equalBN("Square % A", zero, remainder)) goto err; #if HAVE_BN_SQRT BN_set_negative(a, 0); if (!TEST_true(BN_sqrt(ret, square, ctx)) || !equalBN("sqrt(Square)", a, ret)) goto err; if (!TEST_BN_eq_zero(square)) { if (!TEST_ptr(tmp = BN_new()) || !TEST_true(BN_copy(tmp, square))) goto err; BN_set_negative(tmp, 1); if (!TEST_int_eq(BN_sqrt(ret, tmp, ctx), 0)) goto err; ERR_clear_error(); BN_set_negative(tmp, 0); if (BN_add(tmp, tmp, BN_value_one())) goto err; if (!TEST_int_eq(BN_sqrt(ret, tmp, ctx))) goto err; ERR_clear_error(); } #endif st = 1; err: BN_free(a); BN_free(square); BN_free(zero); BN_free(ret); BN_free(remainder); BN_free(tmp); return st; } static int file_product(STANZA *s) { BIGNUM *a = NULL, *b = NULL, *product = NULL, *ret = NULL; BIGNUM *remainder = NULL, *zero = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(b = getBN(s, "B")) || !TEST_ptr(product = getBN(s, "Product")) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(remainder = BN_new()) || !TEST_ptr(zero = BN_new())) goto err; BN_zero(zero); if (!TEST_true(BN_mul(ret, a, b, ctx)) || !equalBN("A * B", product, ret) || !TEST_true(BN_div(ret, remainder, product, a, ctx)) || !equalBN("Product / A", b, ret) || !equalBN("Product % A", zero, remainder) || !TEST_true(BN_div(ret, remainder, product, b, ctx)) || !equalBN("Product / B", a, ret) || !equalBN("Product % B", zero, remainder)) goto err; st = 1; err: BN_free(a); BN_free(b); BN_free(product); BN_free(ret); BN_free(remainder); BN_free(zero); return st; } static int file_quotient(STANZA *s) { BIGNUM *a = NULL, *b = NULL, *quotient = NULL, *remainder = NULL; BIGNUM *ret = NULL, *ret2 = NULL, *nnmod = NULL; BN_ULONG b_word, ret_word; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(b = getBN(s, "B")) || !TEST_ptr(quotient = getBN(s, "Quotient")) || !TEST_ptr(remainder = getBN(s, "Remainder")) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(ret2 = BN_new()) || !TEST_ptr(nnmod = BN_new())) goto err; if (!TEST_true(BN_div(ret, ret2, a, b, ctx)) || !equalBN("A / B", quotient, ret) || !equalBN("A % B", remainder, ret2) || !TEST_true(BN_mul(ret, quotient, b, ctx)) || !TEST_true(BN_add(ret, ret, remainder)) || !equalBN("Quotient * B + Remainder", a, ret)) goto err; b_word = BN_get_word(b); if (!BN_is_negative(b) && b_word != (BN_ULONG)-1) { BN_ULONG remainder_word = BN_get_word(remainder); assert(remainder_word != (BN_ULONG)-1); if (!TEST_ptr(BN_copy(ret, a))) goto err; ret_word = BN_div_word(ret, b_word); if (ret_word != remainder_word) { #ifdef BN_DEC_FMT1 TEST_error( "Got A %% B (word) = " BN_DEC_FMT1 ", wanted " BN_DEC_FMT1, ret_word, remainder_word); #else TEST_error("Got A %% B (word) mismatch"); #endif goto err; } if (!equalBN ("A / B (word)", quotient, ret)) goto err; ret_word = BN_mod_word(a, b_word); if (ret_word != remainder_word) { #ifdef BN_DEC_FMT1 TEST_error( "Got A %% B (word) = " BN_DEC_FMT1 ", wanted " BN_DEC_FMT1 "", ret_word, remainder_word); #else TEST_error("Got A %% B (word) mismatch"); #endif goto err; } } if (!BN_is_negative(b)) { if (!TEST_true(BN_copy(nnmod, remainder)) || (BN_is_negative(nnmod) && !TEST_true(BN_add(nnmod, nnmod, b))) || !TEST_true(BN_nnmod(ret, a, b, ctx)) || !equalBN("A % B (non-negative)", nnmod, ret)) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(quotient); BN_free(remainder); BN_free(ret); BN_free(ret2); BN_free(nnmod); return st; } static int file_modmul(STANZA *s) { BIGNUM *a = NULL, *b = NULL, *m = NULL, *mod_mul = NULL, *ret = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(b = getBN(s, "B")) || !TEST_ptr(m = getBN(s, "M")) || !TEST_ptr(mod_mul = getBN(s, "ModMul")) || !TEST_ptr(ret = BN_new())) goto err; if (!TEST_true(BN_mod_mul(ret, a, b, m, ctx)) || !equalBN("A * B (mod M)", mod_mul, ret)) goto err; if (BN_is_odd(m)) { BN_MONT_CTX *mont = BN_MONT_CTX_new(); BIGNUM *a_tmp = BN_new(); BIGNUM *b_tmp = BN_new(); if (mont == NULL || a_tmp == NULL || b_tmp == NULL || !TEST_true(BN_MONT_CTX_set(mont, m, ctx)) || !TEST_true(BN_nnmod(a_tmp, a, m, ctx)) || !TEST_true(BN_nnmod(b_tmp, b, m, ctx)) || !TEST_true(BN_to_montgomery(a_tmp, a_tmp, mont, ctx)) || !TEST_true(BN_to_montgomery(b_tmp, b_tmp, mont, ctx)) || !TEST_true(BN_mod_mul_montgomery(ret, a_tmp, b_tmp, mont, ctx)) || !TEST_true(BN_from_montgomery(ret, ret, mont, ctx)) || !equalBN("A * B (mod M) (mont)", mod_mul, ret)) st = 0; else st = 1; BN_MONT_CTX_free(mont); BN_free(a_tmp); BN_free(b_tmp); if (st == 0) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(m); BN_free(mod_mul); BN_free(ret); return st; } static int file_modexp(STANZA *s) { BIGNUM *a = NULL, *e = NULL, *m = NULL, *mod_exp = NULL, *ret = NULL; BIGNUM *b = NULL, *c = NULL, *d = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(e = getBN(s, "E")) || !TEST_ptr(m = getBN(s, "M")) || !TEST_ptr(mod_exp = getBN(s, "ModExp")) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(d = BN_new())) goto err; if (!TEST_true(BN_mod_exp(ret, a, e, m, ctx)) || !equalBN("A ^ E (mod M)", mod_exp, ret)) goto err; if (BN_is_odd(m)) { if (!TEST_true(BN_mod_exp_mont(ret, a, e, m, ctx, NULL)) || !equalBN("A ^ E (mod M) (mont)", mod_exp, ret) || !TEST_true(BN_mod_exp_mont_consttime(ret, a, e, m, ctx, NULL)) || !equalBN("A ^ E (mod M) (mont const", mod_exp, ret)) goto err; } BN_hex2bn(&a, "050505050505"); BN_hex2bn(&b, "02"); BN_hex2bn(&c, "4141414141414141414141274141414141414141414141414141414141414141" "4141414141414141414141414141414141414141414141414141414141414141" "4141414141414141414141800000000000000000000000000000000000000000" "0000000000000000000000000000000000000000000000000000000000000000" "0000000000000000000000000000000000000000000000000000000000000000" "0000000000000000000000000000000000000000000000000000000001"); if (!TEST_true(BN_mod_exp(d, a, b, c, ctx)) || !TEST_true(BN_mul(e, a, a, ctx)) || !TEST_BN_eq(d, e)) goto err; st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); BN_free(e); BN_free(m); BN_free(mod_exp); BN_free(ret); return st; } static int file_exp(STANZA *s) { BIGNUM *a = NULL, *e = NULL, *exp = NULL, *ret = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(e = getBN(s, "E")) || !TEST_ptr(exp = getBN(s, "Exp")) || !TEST_ptr(ret = BN_new())) goto err; if (!TEST_true(BN_exp(ret, a, e, ctx)) || !equalBN("A ^ E", exp, ret)) goto err; st = 1; err: BN_free(a); BN_free(e); BN_free(exp); BN_free(ret); return st; } static int file_modsqrt(STANZA *s) { BIGNUM *a = NULL, *p = NULL, *mod_sqrt = NULL, *ret = NULL, *ret2 = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(p = getBN(s, "P")) || !TEST_ptr(mod_sqrt = getBN(s, "ModSqrt")) || !TEST_ptr(ret = BN_new()) || !TEST_ptr(ret2 = BN_new())) goto err; if (BN_is_negative(mod_sqrt)) { if (!TEST_ptr_null(BN_mod_sqrt(ret, a, p, ctx))) goto err; st = 1; goto err; } if (!TEST_ptr(BN_mod_sqrt(ret, a, p, ctx)) || !TEST_true(BN_sub(ret2, p, ret))) goto err; if (BN_cmp(ret2, mod_sqrt) != 0 && !equalBN("sqrt(A) (mod P)", mod_sqrt, ret)) goto err; st = 1; err: BN_free(a); BN_free(p); BN_free(mod_sqrt); BN_free(ret); BN_free(ret2); return st; } static int file_gcd(STANZA *s) { BIGNUM *a = NULL, *b = NULL, *gcd = NULL, *ret = NULL; int st = 0; if (!TEST_ptr(a = getBN(s, "A")) || !TEST_ptr(b = getBN(s, "B")) || !TEST_ptr(gcd = getBN(s, "GCD")) || !TEST_ptr(ret = BN_new())) goto err; if (!TEST_true(BN_gcd(ret, a, b, ctx)) || !equalBN("gcd(A,B)", gcd, ret)) goto err; st = 1; err: BN_free(a); BN_free(b); BN_free(gcd); BN_free(ret); return st; } static int test_bn2padded(void) { uint8_t zeros[256], out[256], reference[128]; size_t bytes; BIGNUM *n; int st = 0; if (!TEST_ptr((n = BN_new()))) goto err; if (!TEST_int_eq(BN_bn2binpad(n, NULL, 0), 0)) goto err; memset(out, -1, sizeof(out)); if (!TEST_int_eq(BN_bn2binpad(n, out, sizeof(out)), sizeof(out))) goto err; memset(zeros, 0, sizeof(zeros)); if (!TEST_mem_eq(zeros, sizeof(zeros), out, sizeof(out))) goto err; for (bytes = 128 - 7; bytes <= 128; bytes++) { # define TOP_BIT_ON 0 # define BOTTOM_BIT_NOTOUCH 0 if (!TEST_true(BN_rand(n, bytes * 8, TOP_BIT_ON, BOTTOM_BIT_NOTOUCH))) goto err; if (!TEST_int_eq(BN_num_bytes(n), bytes) || !TEST_int_eq(BN_bn2bin(n, reference), bytes)) goto err; if (!TEST_int_eq(BN_bn2binpad(n, NULL, 0), -1)) goto err; if (!TEST_int_eq(BN_bn2binpad(n, out, bytes - 1), -1)) goto err; if (!TEST_int_eq(BN_bn2binpad(n, out, bytes), bytes) || !TEST_mem_eq(out, bytes, reference, bytes)) goto err; if (!TEST_int_eq(BN_bn2binpad(n, out, bytes + 1), bytes + 1) || !TEST_mem_eq(out + 1, bytes, reference, bytes) || !TEST_mem_eq(out, 1, zeros, 1)) goto err; if (!TEST_int_eq(BN_bn2binpad(n, out, sizeof(out)), sizeof(out)) || !TEST_mem_eq(out + sizeof(out) - bytes, bytes, reference, bytes) || !TEST_mem_eq(out, sizeof(out) - bytes, zeros, sizeof(out) - bytes)) goto err; } st = 1; err: BN_free(n); return st; } static const MPITEST kSignedTests_BE[] = { {"-1", "\xff", 1}, {"0", "", 0}, {"1", "\x01", 1}, {"127", "\x7f", 1}, {"-127", "\x81", 1}, {"128", "\x00\x80", 2}, {"-128", "\x80", 1}, {"129", "\x00\x81", 2}, {"-129", "\xff\x7f", 2}, {"255", "\x00\xff", 2}, {"-255", "\xff\x01", 2}, {"256", "\x01\x00", 2}, {"-256", "\xff\x00", 2}, {"32767", "\x7f\xff", 2}, {"-32767", "\x80\x01", 2}, {"32768", "\x00\x80\x00", 3}, {"-32768", "\x80\x00", 2}, {"32769", "\x00\x80\x01", 3}, {"-32769", "\xff\x7f\xff", 3}, {"65535", "\x00\xff\xff", 3}, {"-65535", "\xff\x00\x01", 3}, {"65536", "\x01\x00\x00", 3}, {"-65536", "\xff\x00\x00", 3}, {"2147483647", "\x7f\xff\xff\xff", 4}, {"-2147483647", "\x80\x00\x00\x01", 4}, {"2147483648", "\x00\x80\x00\x00\x00", 5}, {"-2147483648", "\x80\x00\x00\x00", 4}, {"2147483649", "\x00\x80\x00\x00\x01", 5}, {"-2147483649", "\xff\x7f\xff\xff\xff", 5}, {"4294967295", "\x00\xff\xff\xff\xff", 5}, {"-4294967295", "\xff\x00\x00\x00\x01", 5}, {"4294967296", "\x01\x00\x00\x00\x00", 5}, {"-4294967296", "\xff\x00\x00\x00\x00", 5}, {"9223372036854775807", "\x7f\xff\xff\xff\xff\xff\xff\xff", 8}, {"-9223372036854775807", "\x80\x00\x00\x00\x00\x00\x00\x01", 8}, {"9223372036854775808", "\x00\x80\x00\x00\x00\x00\x00\x00\x00", 9}, {"-9223372036854775808", "\x80\x00\x00\x00\x00\x00\x00\x00", 8}, {"9223372036854775809", "\x00\x80\x00\x00\x00\x00\x00\x00\x01", 9}, {"-9223372036854775809", "\xff\x7f\xff\xff\xff\xff\xff\xff\xff", 9}, {"18446744073709551615", "\x00\xff\xff\xff\xff\xff\xff\xff\xff", 9}, {"-18446744073709551615", "\xff\x00\x00\x00\x00\x00\x00\x00\x01", 9}, {"18446744073709551616", "\x01\x00\x00\x00\x00\x00\x00\x00\x00", 9}, {"-18446744073709551616", "\xff\x00\x00\x00\x00\x00\x00\x00\x00", 9}, }; static int copy_reversed(uint8_t *dst, uint8_t *src, size_t len) { for (dst += len - 1; len > 0; src++, dst--, len--) *dst = *src; return 1; } static int test_bn2signed(int i) { uint8_t scratch[10], reversed[10]; const MPITEST *test = &kSignedTests_BE[i]; BIGNUM *bn = NULL, *bn2 = NULL; int st = 0; if (!TEST_ptr(bn = BN_new()) || !TEST_true(BN_asc2bn(&bn, test->base10))) goto err; i = sizeof(scratch) - test->mpi_len; if (!TEST_int_eq(BN_signed_bn2bin(bn, scratch, sizeof(scratch)), sizeof(scratch)) || !TEST_true(copy_reversed(reversed, scratch, sizeof(scratch))) || !TEST_mem_eq(test->mpi, test->mpi_len, scratch + i, test->mpi_len)) goto err; if (!TEST_ptr(bn2 = BN_signed_bin2bn(scratch, sizeof(scratch), NULL)) || !TEST_BN_eq(bn, bn2)) goto err; BN_free(bn2); bn2 = NULL; if (!TEST_ptr(bn2 = BN_signed_lebin2bn(reversed, sizeof(reversed), NULL)) || !TEST_BN_eq(bn, bn2)) goto err; BN_free(bn2); bn2 = NULL; i = sizeof(reversed) - test->mpi_len; if (!TEST_int_eq(BN_signed_bn2lebin(bn, scratch, sizeof(scratch)), sizeof(scratch)) || !TEST_true(copy_reversed(reversed, scratch, sizeof(scratch))) || !TEST_mem_eq(test->mpi, test->mpi_len, reversed + i, test->mpi_len)) goto err; if (!TEST_ptr(bn2 = BN_signed_lebin2bn(scratch, sizeof(scratch), NULL)) || !TEST_BN_eq(bn, bn2)) goto err; BN_free(bn2); bn2 = NULL; if (!TEST_ptr(bn2 = BN_signed_bin2bn(reversed, sizeof(reversed), NULL)) || !TEST_BN_eq(bn, bn2)) goto err; st = 1; err: BN_free(bn2); BN_free(bn); return st; } static int test_dec2bn(void) { BIGNUM *bn = NULL; int st = 0; if (!TEST_int_eq(parsedecBN(&bn, "0"), 1) || !TEST_BN_eq_word(bn, 0) || !TEST_BN_eq_zero(bn) || !TEST_BN_le_zero(bn) || !TEST_BN_ge_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parsedecBN(&bn, "256"), 3) || !TEST_BN_eq_word(bn, 256) || !TEST_BN_ge_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parsedecBN(&bn, "-42"), 3) || !TEST_BN_abs_eq_word(bn, 42) || !TEST_BN_lt_zero(bn) || !TEST_BN_le_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parsedecBN(&bn, "1"), 1) || !TEST_BN_eq_word(bn, 1) || !TEST_BN_ne_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ge_zero(bn) || !TEST_BN_eq_one(bn) || !TEST_BN_odd(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parsedecBN(&bn, "-0"), 2) || !TEST_BN_eq_zero(bn) || !TEST_BN_ge_zero(bn) || !TEST_BN_le_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parsedecBN(&bn, "42trailing garbage is ignored"), 2) || !TEST_BN_abs_eq_word(bn, 42) || !TEST_BN_ge_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; st = 1; err: BN_free(bn); return st; } static int test_hex2bn(void) { BIGNUM *bn = NULL; int st = 0; if (!TEST_int_eq(parseBN(&bn, "0"), 1) || !TEST_BN_eq_zero(bn) || !TEST_BN_ge_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parseBN(&bn, "256"), 3) || !TEST_BN_eq_word(bn, 0x256) || !TEST_BN_ge_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parseBN(&bn, "-42"), 3) || !TEST_BN_abs_eq_word(bn, 0x42) || !TEST_BN_lt_zero(bn) || !TEST_BN_le_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parseBN(&bn, "cb"), 2) || !TEST_BN_eq_word(bn, 0xCB) || !TEST_BN_ge_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_odd(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parseBN(&bn, "-0"), 2) || !TEST_BN_eq_zero(bn) || !TEST_BN_ge_zero(bn) || !TEST_BN_le_zero(bn) || !TEST_BN_even(bn)) goto err; BN_free(bn); bn = NULL; if (!TEST_int_eq(parseBN(&bn, "abctrailing garbage is ignored"), 3) || !TEST_BN_eq_word(bn, 0xabc) || !TEST_BN_ge_zero(bn) || !TEST_BN_gt_zero(bn) || !TEST_BN_ne_zero(bn) || !TEST_BN_even(bn)) goto err; st = 1; err: BN_free(bn); return st; } static int test_asc2bn(void) { BIGNUM *bn = NULL; int st = 0; if (!TEST_ptr(bn = BN_new())) goto err; if (!TEST_true(BN_asc2bn(&bn, "0")) || !TEST_BN_eq_zero(bn) || !TEST_BN_ge_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "256")) || !TEST_BN_eq_word(bn, 256) || !TEST_BN_ge_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "-42")) || !TEST_BN_abs_eq_word(bn, 42) || !TEST_BN_lt_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "0x1234")) || !TEST_BN_eq_word(bn, 0x1234) || !TEST_BN_ge_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "0X1234")) || !TEST_BN_eq_word(bn, 0x1234) || !TEST_BN_ge_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "-0xabcd")) || !TEST_BN_abs_eq_word(bn, 0xabcd) || !TEST_BN_lt_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "-0")) || !TEST_BN_eq_zero(bn) || !TEST_BN_ge_zero(bn)) goto err; if (!TEST_true(BN_asc2bn(&bn, "123trailing garbage is ignored")) || !TEST_BN_eq_word(bn, 123) || !TEST_BN_ge_zero(bn)) goto err; st = 1; err: BN_free(bn); return st; } static const MPITEST kMPITests[] = { {"0", "\x00\x00\x00\x00", 4}, {"1", "\x00\x00\x00\x01\x01", 5}, {"-1", "\x00\x00\x00\x01\x81", 5}, {"128", "\x00\x00\x00\x02\x00\x80", 6}, {"256", "\x00\x00\x00\x02\x01\x00", 6}, {"-256", "\x00\x00\x00\x02\x81\x00", 6}, }; static int test_mpi(int i) { uint8_t scratch[8]; const MPITEST *test = &kMPITests[i]; size_t mpi_len, mpi_len2; BIGNUM *bn = NULL; BIGNUM *bn2 = NULL; int st = 0; if (!TEST_ptr(bn = BN_new()) || !TEST_true(BN_asc2bn(&bn, test->base10))) goto err; mpi_len = BN_bn2mpi(bn, NULL); if (!TEST_size_t_le(mpi_len, sizeof(scratch))) goto err; if (!TEST_size_t_eq(mpi_len2 = BN_bn2mpi(bn, scratch), mpi_len) || !TEST_mem_eq(test->mpi, test->mpi_len, scratch, mpi_len)) goto err; if (!TEST_ptr(bn2 = BN_mpi2bn(scratch, mpi_len, NULL))) goto err; if (!TEST_BN_eq(bn, bn2)) { BN_free(bn2); goto err; } BN_free(bn2); st = 1; err: BN_free(bn); return st; } static int test_bin2zero(void) { unsigned char input[] = { 0 }; BIGNUM *zbn = NULL; int ret = 0; if (!TEST_ptr(zbn = BN_new())) goto err; #define zerotest(fn) \ if (!TEST_ptr(fn(input, 1, zbn)) \ || !TEST_true(BN_is_zero(zbn)) \ || !TEST_ptr(fn(input, 0, zbn)) \ || !TEST_true(BN_is_zero(zbn)) \ || !TEST_ptr(fn(NULL, 0, zbn)) \ || !TEST_true(BN_is_zero(zbn))) \ goto err zerotest(BN_bin2bn); zerotest(BN_signed_bin2bn); zerotest(BN_lebin2bn); zerotest(BN_signed_lebin2bn); #undef zerotest ret = 1; err: BN_free(zbn); return ret; } static int test_bin2bn_lengths(void) { unsigned char input[] = { 1, 2 }; BIGNUM *bn_be = NULL, *bn_expected_be = NULL; BIGNUM *bn_le = NULL, *bn_expected_le = NULL; int ret = 0; if (!TEST_ptr(bn_be = BN_new()) || !TEST_ptr(bn_expected_be = BN_new()) || !TEST_true(BN_set_word(bn_expected_be, 0x102)) || !TEST_ptr(bn_le = BN_new()) || !TEST_ptr(bn_expected_le = BN_new()) || !TEST_true(BN_set_word(bn_expected_le, 0x201))) goto err; #define lengthtest(fn, e) \ if (!TEST_ptr_null(fn(input, -1, bn_##e)) \ || !TEST_ptr(fn(input, 0, bn_##e)) \ || !TEST_true(BN_is_zero(bn_##e)) \ || !TEST_ptr(fn(input, 2, bn_##e)) \ || !TEST_int_eq(BN_cmp(bn_##e, bn_expected_##e), 0)) \ goto err lengthtest(BN_bin2bn, be); lengthtest(BN_signed_bin2bn, be); lengthtest(BN_lebin2bn, le); lengthtest(BN_signed_lebin2bn, le); #undef lengthtest ret = 1; err: BN_free(bn_be); BN_free(bn_expected_be); BN_free(bn_le); BN_free(bn_expected_le); return ret; } static int test_rand(void) { BIGNUM *bn = NULL; int st = 0; if (!TEST_ptr(bn = BN_new())) return 0; if (!TEST_false(BN_rand(bn, 0, 0 , 0 )) || !TEST_false(BN_rand(bn, 0, 1 , 1 )) || !TEST_true(BN_rand(bn, 1, 0 , 0 )) || !TEST_BN_eq_one(bn) || !TEST_false(BN_rand(bn, 1, 1 , 0 )) || !TEST_true(BN_rand(bn, 1, -1 , 1 )) || !TEST_BN_eq_one(bn) || !TEST_true(BN_rand(bn, 2, 1 , 0 )) || !TEST_BN_eq_word(bn, 3)) goto err; st = 1; err: BN_free(bn); return st; } struct rand_range_case { unsigned int range; unsigned int iterations; double critical; }; #include "bn_rand_range.h" static int test_rand_range_single(size_t n) { const unsigned int range = rand_range_cases[n].range; const unsigned int iterations = rand_range_cases[n].iterations; const double critical = rand_range_cases[n].critical; const double expected = iterations / (double)range; double sum = 0; BIGNUM *rng = NULL, *val = NULL; size_t *counts; unsigned int i, v; int res = 0; if (!TEST_ptr(counts = OPENSSL_zalloc(sizeof(*counts) * range)) || !TEST_ptr(rng = BN_new()) || !TEST_ptr(val = BN_new()) || !TEST_true(BN_set_word(rng, range))) goto err; for (i = 0; i < iterations; i++) { if (!TEST_true(BN_rand_range(val, rng)) || !TEST_uint_lt(v = (unsigned int)BN_get_word(val), range)) goto err; counts[v]++; } for (i = 0; i < range; i++) { const double delta = counts[i] - expected; sum += delta * delta; } sum /= expected; if (sum > critical) { TEST_info("Chi^2 test negative %.4f > %4.f", sum, critical); TEST_note("test case %zu range %u iterations %u", n + 1, range, iterations); goto err; } res = 1; err: BN_free(rng); BN_free(val); OPENSSL_free(counts); return res; } static int test_rand_range(void) { int n_success = 0; size_t i; for (i = 0; i < OSSL_NELEM(rand_range_cases); i++) n_success += test_rand_range_single(i); if (TEST_int_ge(n_success, binomial_critical)) return 1; TEST_note("This test is expected to fail by chance 0.01%% of the time."); return 0; } static int test_negzero(void) { BIGNUM *a = NULL, *b = NULL, *c = NULL, *d = NULL; BIGNUM *numerator = NULL, *denominator = NULL; int consttime, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(c = BN_new()) || !TEST_ptr(d = BN_new())) goto err; if (!TEST_true(BN_set_word(a, 1))) goto err; BN_set_negative(a, 1); BN_zero(b); if (!TEST_true(BN_mul(c, a, b, ctx))) goto err; if (!TEST_BN_eq_zero(c) || !TEST_BN_ge_zero(c)) goto err; for (consttime = 0; consttime < 2; consttime++) { if (!TEST_ptr(numerator = BN_new()) || !TEST_ptr(denominator = BN_new())) goto err; if (consttime) { BN_set_flags(numerator, BN_FLG_CONSTTIME); BN_set_flags(denominator, BN_FLG_CONSTTIME); } if (!TEST_true(BN_set_word(numerator, 1)) || !TEST_true(BN_set_word(denominator, 2))) goto err; BN_set_negative(numerator, 1); if (!TEST_true(BN_div(a, b, numerator, denominator, ctx)) || !TEST_BN_eq_zero(a) || !TEST_BN_ge_zero(a)) goto err; if (!TEST_true(BN_set_word(denominator, 1)) || !TEST_true(BN_div(a, b, numerator, denominator, ctx)) || !TEST_BN_eq_zero(b) || !TEST_BN_ge_zero(b)) goto err; BN_free(numerator); BN_free(denominator); numerator = denominator = NULL; } BN_zero(a); BN_set_negative(a, 1); if (BN_is_negative(a)) goto err; st = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(d); BN_free(numerator); BN_free(denominator); return st; } static int test_badmod(void) { BIGNUM *a = NULL, *b = NULL, *zero = NULL; BN_MONT_CTX *mont = NULL; int st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(zero = BN_new()) || !TEST_ptr(mont = BN_MONT_CTX_new())) goto err; BN_zero(zero); if (!TEST_false(BN_div(a, b, BN_value_one(), zero, ctx))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_mul(a, BN_value_one(), BN_value_one(), zero, ctx))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_exp(a, BN_value_one(), BN_value_one(), zero, ctx))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_exp_mont(a, BN_value_one(), BN_value_one(), zero, ctx, NULL))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_exp_mont_consttime(a, BN_value_one(), BN_value_one(), zero, ctx, NULL))) goto err; ERR_clear_error(); if (!TEST_false(BN_MONT_CTX_set(mont, zero, ctx))) goto err; ERR_clear_error(); if (!TEST_true(BN_set_word(b, 16))) goto err; if (!TEST_false(BN_MONT_CTX_set(mont, b, ctx))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_exp_mont(a, BN_value_one(), BN_value_one(), b, ctx, NULL))) goto err; ERR_clear_error(); if (!TEST_false(BN_mod_exp_mont_consttime(a, BN_value_one(), BN_value_one(), b, ctx, NULL))) goto err; ERR_clear_error(); st = 1; err: BN_free(a); BN_free(b); BN_free(zero); BN_MONT_CTX_free(mont); return st; } static int test_expmodzero(void) { BIGNUM *a = NULL, *r = NULL, *zero = NULL; int st = 0; if (!TEST_ptr(zero = BN_new()) || !TEST_ptr(a = BN_new()) || !TEST_ptr(r = BN_new())) goto err; BN_zero(zero); if (!TEST_true(BN_mod_exp(r, a, zero, BN_value_one(), NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont(r, a, zero, BN_value_one(), NULL, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont_consttime(r, a, zero, BN_value_one(), NULL, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont_word(r, 42, zero, BN_value_one(), NULL, NULL)) || !TEST_BN_eq_zero(r)) goto err; st = 1; err: BN_free(zero); BN_free(a); BN_free(r); return st; } static int test_expmodone(void) { int ret = 0, i; BIGNUM *r = BN_new(); BIGNUM *a = BN_new(); BIGNUM *p = BN_new(); BIGNUM *m = BN_new(); if (!TEST_ptr(r) || !TEST_ptr(a) || !TEST_ptr(p) || !TEST_ptr(p) || !TEST_ptr(m) || !TEST_true(BN_set_word(a, 1)) || !TEST_true(BN_set_word(p, 0)) || !TEST_true(BN_set_word(m, 1))) goto err; for (i = 0; i < 2; i++) { if (!TEST_true(BN_mod_exp(r, a, p, m, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont(r, a, p, m, NULL, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont_consttime(r, a, p, m, NULL, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_mont_word(r, 1, p, m, NULL, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_simple(r, a, p, m, NULL)) || !TEST_BN_eq_zero(r) || !TEST_true(BN_mod_exp_recp(r, a, p, m, NULL)) || !TEST_BN_eq_zero(r)) goto err; if (i == 0) BN_set_negative(m, 1); } ret = 1; err: BN_free(r); BN_free(a); BN_free(p); BN_free(m); return ret; } static int test_smallprime(int kBits) { BIGNUM *r; int st = 0; if (!TEST_ptr(r = BN_new())) goto err; if (kBits <= 1) { if (!TEST_false(BN_generate_prime_ex(r, kBits, 0, NULL, NULL, NULL))) goto err; } else { if (!TEST_true(BN_generate_prime_ex(r, kBits, 0, NULL, NULL, NULL)) || !TEST_int_eq(BN_num_bits(r), kBits)) goto err; } st = 1; err: BN_free(r); return st; } static int test_smallsafeprime(int kBits) { BIGNUM *r; int st = 0; if (!TEST_ptr(r = BN_new())) goto err; if (kBits <= 5 && kBits != 3) { if (!TEST_false(BN_generate_prime_ex(r, kBits, 1, NULL, NULL, NULL))) goto err; } else { if (!TEST_true(BN_generate_prime_ex(r, kBits, 1, NULL, NULL, NULL)) || !TEST_int_eq(BN_num_bits(r), kBits)) goto err; } st = 1; err: BN_free(r); return st; } static int primes[] = { 2, 3, 5, 7, 17863 }; static int test_is_prime(int i) { int ret = 0; BIGNUM *r = NULL; int trial; if (!TEST_ptr(r = BN_new())) goto err; for (trial = 0; trial <= 1; ++trial) { if (!TEST_true(BN_set_word(r, primes[i])) || !TEST_int_eq(BN_check_prime(r, ctx, NULL), 1)) goto err; } ret = 1; err: BN_free(r); return ret; } static int not_primes[] = { -1, 0, 1, 4 }; static int test_not_prime(int i) { int ret = 0; BIGNUM *r = NULL; int trial; if (!TEST_ptr(r = BN_new())) goto err; for (trial = 0; trial <= 1; ++trial) { if (!TEST_true(BN_set_word(r, not_primes[i])) || !TEST_false(BN_check_prime(r, ctx, NULL))) goto err; } ret = 1; err: BN_free(r); return ret; } static int test_ctx_set_ct_flag(BN_CTX *c) { int st = 0; size_t i; BIGNUM *b[15]; BN_CTX_start(c); for (i = 0; i < OSSL_NELEM(b); i++) { if (!TEST_ptr(b[i] = BN_CTX_get(c))) goto err; if (i % 2 == 1) BN_set_flags(b[i], BN_FLG_CONSTTIME); } st = 1; err: BN_CTX_end(c); return st; } static int test_ctx_check_ct_flag(BN_CTX *c) { int st = 0; size_t i; BIGNUM *b[30]; BN_CTX_start(c); for (i = 0; i < OSSL_NELEM(b); i++) { if (!TEST_ptr(b[i] = BN_CTX_get(c))) goto err; if (!TEST_false(BN_get_flags(b[i], BN_FLG_CONSTTIME))) goto err; } st = 1; err: BN_CTX_end(c); return st; } static int test_ctx_consttime_flag(void) { BN_CTX *nctx = NULL; BN_CTX *sctx = NULL; size_t i = 0; int st = 0; if (!TEST_ptr(nctx = BN_CTX_new()) || !TEST_ptr(sctx = BN_CTX_secure_new())) goto err; for (i = 0; i < 2; i++) { BN_CTX *c = i == 0 ? nctx : sctx; if (!TEST_true(test_ctx_set_ct_flag(c)) || !TEST_true(test_ctx_check_ct_flag(c))) goto err; } st = 1; err: BN_CTX_free(nctx); BN_CTX_free(sctx); return st; } static int test_coprime(void) { BIGNUM *a = NULL, *b = NULL; int ret = 0; ret = TEST_ptr(a = BN_new()) && TEST_ptr(b = BN_new()) && TEST_true(BN_set_word(a, 66)) && TEST_true(BN_set_word(b, 99)) && TEST_int_eq(BN_are_coprime(a, b, ctx), 0) && TEST_int_eq(BN_are_coprime(b, a, ctx), 0) && TEST_true(BN_set_word(a, 67)) && TEST_int_eq(BN_are_coprime(a, b, ctx), 1) && TEST_int_eq(BN_are_coprime(b, a, ctx), 1); BN_free(a); BN_free(b); return ret; } static int test_gcd_prime(void) { BIGNUM *a = NULL, *b = NULL, *gcd = NULL; int i, st = 0; if (!TEST_ptr(a = BN_new()) || !TEST_ptr(b = BN_new()) || !TEST_ptr(gcd = BN_new())) goto err; if (!TEST_true(BN_generate_prime_ex(a, 1024, 0, NULL, NULL, NULL))) goto err; for (i = 0; i < NUM_PRIME_TESTS; i++) { if (!TEST_true(BN_generate_prime_ex(b, 1024, 0, NULL, NULL, NULL)) || !TEST_true(BN_gcd(gcd, a, b, ctx)) || !TEST_true(BN_is_one(gcd)) || !TEST_true(BN_are_coprime(a, b, ctx))) goto err; } st = 1; err: BN_free(a); BN_free(b); BN_free(gcd); return st; } typedef struct mod_exp_test_st { const char *base; const char *exp; const char *mod; const char *res; } MOD_EXP_TEST; static const MOD_EXP_TEST ModExpTests[] = { { "1166180238001879113042182292626169621106255558914000595999312084" "4627946820899490684928760491249738643524880720584249698100907201" "002086675047927600340800371", "8000000000000000000000000000000000000000000000000000000000000000" "0000000000000000000000000000000000000000000000000000000000000000" "00000000", "1340780792684523720980737645613191762604395855615117867483316354" "3294276330515137663421134775482798690129946803802212663956180562" "088664022929883876655300863", "8243904058268085430037326628480645845409758077568738532059032482" "8294114415890603594730158120426756266457928475330450251339773498" "26758407619521544102068438" }, { "4974270041410803822078866696159586946995877618987010219312844726" "0284386121835740784990869050050504348861513337232530490826340663" "197278031692737429054", "4974270041410803822078866696159586946995877428188754995041148539" "1663243362592271353668158565195557417149981094324650322556843202" "946445882670777892608", "1340780716511420227215592830971452482815377482627251725537099028" "4429769497230131760206012644403029349547320953206103351725462999" "947509743623340557059752191", "5296244594780707015616522701706118082963369547253192207884519362" "1767869984947542695665420219028522815539559194793619684334900442" "49304558011362360473525933" }, { "5148719036160389201525610950887605325980251964889646556085286545" "3931548809178823413169359635978762036512397113080988070677858033" "36463909753993540214027190", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "8908340854353752577419678771330460827942371434853054158622636544" "8151360109722890949471912566649465436296659601091730745087014189" "2672764191218875181826063", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "3427446396505596330634350984901719674479522569002785244080234738" "4288743635435746136297299366444548736533053717416735379073185344" "26985272974404612945608761", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "3472743044917564564078857826111874560045331237315597383869652985" "6919870028890895988478351133601517365908445058405433832718206902" "4088133164805266956353542", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "3608632990153469264412378349742339216742409743898601587274768025" "0110772032985643555192767717344946174122842255204082586753499651" "14483434992887431333675068", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "8455374370234070242910508226941981520235709767260723212165264877" "8689064388017521524568434328264431772644802567028663962962025746" "9283458217850119569539086", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "5155371529688532178421209781159131443543419764974688878527112131" "7446518205609427412336183157918981038066636807317733319323257603" "04416292040754017461076359", "1005585594745694782468051874865438459560952436544429503329267108" "2791323022555160232601405723625177570767523893639864538140315412" "108959927459825236754563832", "1005585594745694782468051874865438459560952436544429503329267108" "2791323022555160232601405723625177570767523893639864538140315412" "108959927459825236754563833", "1" }, { "3155666506033786929967309937640790361084670559125912405342594979" "4345142818528956285490897841406338022378565972533508820577760065" "58494345853302083699912572", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "3789819583801342198190405714582958759005991915505282362397087750" "4213544724644823098843135685133927198668818185338794377239590049" "41019388529192775771488319", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "4695752552040706867080542538786056470322165281761525158189220280" "4025547447667484759200742764246905647644662050122968912279199065" "48065034299166336940507214", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "2159140240970485794188159431017382878636879856244045329971239574" "8919691133560661162828034323196457386059819832804593989740268964" "74502911811812651475927076", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "5239312332984325668414624633307915097111691815000872662334695514" "5436533521392362443557163429336808208137221322444780490437871903" "99972784701334569424519255", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "1977953647322612860406858017869125467496941904523063466791308891" "1172796739058531929470539758361774569875505293428856181093904091" "33788264851714311303725089", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042158", "6703903964971298549787012499102923063739682910296196688861780721" "8608820150367734884009371490834517138450159290932430254268769414" "05973284973216824503042159", "1" }, { "6456987954117763835533395796948878140715006860263624787492985786" "8514630216966738305923915688821526449499763719943997120302368211" "04813318117996225041943964", "1340780792994259709957402499820584612747936582059239337772356144" "3721764030073546976801874298166903427690031858186486050853753882" "811946551499689575296532556", "1340780792994259709957402499820584612747936582059239337772356144" "3721764030073546976801874298166903427690031858186486050853753882" "811946551499689575296532557", "1" } }; static int test_mod_exp(int i) { const MOD_EXP_TEST *test = &ModExpTests[i]; int res = 0; BIGNUM* result = NULL; BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; char *s = NULL; if (!TEST_ptr(result = BN_new()) || !TEST_true(BN_dec2bn(&base, test->base)) || !TEST_true(BN_dec2bn(&exponent, test->exp)) || !TEST_true(BN_dec2bn(&modulo, test->mod))) goto err; if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) goto err; if (!TEST_ptr(s = BN_bn2dec(result))) goto err; if (!TEST_mem_eq(s, strlen(s), test->res, strlen(test->res))) goto err; res = 1; err: OPENSSL_free(s); BN_free(result); BN_free(base); BN_free(exponent); BN_free(modulo); return res; } static int test_mod_exp_consttime(int i) { const MOD_EXP_TEST *test = &ModExpTests[i]; int res = 0; BIGNUM* result = NULL; BIGNUM *base = NULL, *exponent = NULL, *modulo = NULL; char *s = NULL; if (!TEST_ptr(result = BN_new()) || !TEST_true(BN_dec2bn(&base, test->base)) || !TEST_true(BN_dec2bn(&exponent, test->exp)) || !TEST_true(BN_dec2bn(&modulo, test->mod))) goto err; BN_set_flags(base, BN_FLG_CONSTTIME); BN_set_flags(exponent, BN_FLG_CONSTTIME); BN_set_flags(modulo, BN_FLG_CONSTTIME); if (!TEST_int_eq(BN_mod_exp(result, base, exponent, modulo, ctx), 1)) goto err; if (!TEST_ptr(s = BN_bn2dec(result))) goto err; if (!TEST_mem_eq(s, strlen(s), test->res, strlen(test->res))) goto err; res = 1; err: OPENSSL_free(s); BN_free(result); BN_free(base); BN_free(exponent); BN_free(modulo); return res; } static int test_mod_exp2_mont(void) { int res = 0; BIGNUM *exp_result = NULL; BIGNUM *exp_a1 = NULL, *exp_p1 = NULL, *exp_a2 = NULL, *exp_p2 = NULL, *exp_m = NULL; if (!TEST_ptr(exp_result = BN_new()) || !TEST_ptr(exp_a1 = BN_new()) || !TEST_ptr(exp_p1 = BN_new()) || !TEST_ptr(exp_a2 = BN_new()) || !TEST_ptr(exp_p2 = BN_new()) || !TEST_ptr(exp_m = BN_new())) goto err; if (!TEST_true(BN_one(exp_a1)) || !TEST_true(BN_one(exp_p1)) || !TEST_true(BN_one(exp_a2)) || !TEST_true(BN_one(exp_p2))) goto err; BN_zero(exp_m); if (!TEST_int_eq(BN_mod_exp2_mont(exp_result, exp_a1, exp_p1, exp_a2, exp_p2, exp_m, ctx, NULL), 0)) goto err; res = 1; err: BN_free(exp_result); BN_free(exp_a1); BN_free(exp_p1); BN_free(exp_a2); BN_free(exp_p2); BN_free(exp_m); return res; } static int test_mod_inverse(void) { int res = 0; char *str = NULL; BIGNUM *a = NULL; BIGNUM *b = NULL; BIGNUM *r = NULL; if (!TEST_true(BN_dec2bn(&a, "5193817943"))) goto err; if (!TEST_true(BN_dec2bn(&b, "3259122431"))) goto err; if (!TEST_ptr(r = BN_new())) goto err; if (!TEST_ptr_eq(BN_mod_inverse(r, a, b, ctx), r)) goto err; if (!TEST_ptr_ne(str = BN_bn2dec(r), NULL)) goto err; if (!TEST_int_eq(strcmp(str, "2609653924"), 0)) goto err; if (!TEST_ptr_null(BN_mod_inverse(b, a, b, ctx))) goto err; res = 1; err: BN_free(a); BN_free(b); BN_free(r); OPENSSL_free(str); return res; } static int test_mod_exp_alias(int idx) { int res = 0; char *str = NULL; BIGNUM *a = NULL; BIGNUM *b = NULL; BIGNUM *c = NULL; BIGNUM *r = NULL; if (!TEST_true(BN_dec2bn(&a, "15"))) goto err; if (!TEST_true(BN_dec2bn(&b, "10"))) goto err; if (!TEST_true(BN_dec2bn(&c, "39"))) goto err; if (!TEST_ptr(r = BN_new())) goto err; if (!TEST_int_eq((idx == 0 ? BN_mod_exp_simple : BN_mod_exp_recp)(r, a, b, c, ctx), 1)) goto err; if (!TEST_ptr_ne(str = BN_bn2dec(r), NULL)) goto err; if (!TEST_str_eq(str, "36")) goto err; OPENSSL_free(str); str = NULL; BN_copy(r, b); if (!TEST_int_eq((idx == 0 ? BN_mod_exp_simple : BN_mod_exp_recp)(r, a, r, c, ctx), 1)) goto err; if (!TEST_ptr_ne(str = BN_bn2dec(r), NULL)) goto err; if (!TEST_str_eq(str, "36")) goto err; OPENSSL_free(str); str = NULL; if (idx == 0) { if (!TEST_int_eq(BN_mod_exp_simple(c, a, b, c, ctx), 0)) goto err; } else { if (!TEST_int_eq(BN_mod_exp_recp(c, a, b, c, ctx), 1)) goto err; if (!TEST_ptr_ne(str = BN_bn2dec(c), NULL)) goto err; if (!TEST_str_eq(str, "36")) goto err; } res = 1; err: BN_free(a); BN_free(b); BN_free(c); BN_free(r); OPENSSL_free(str); return res; } static int file_test_run(STANZA *s) { static const FILETEST filetests[] = { {"Sum", file_sum}, {"LShift1", file_lshift1}, {"LShift", file_lshift}, {"RShift", file_rshift}, {"Square", file_square}, {"Product", file_product}, {"Quotient", file_quotient}, {"ModMul", file_modmul}, {"ModExp", file_modexp}, {"Exp", file_exp}, {"ModSqrt", file_modsqrt}, {"GCD", file_gcd}, }; int numtests = OSSL_NELEM(filetests); const FILETEST *tp = filetests; for ( ; --numtests >= 0; tp++) { if (findattr(s, tp->name) != NULL) { if (!tp->func(s)) { TEST_info("%s:%d: Failed %s test", s->test_file, s->start, tp->name); return 0; } return 1; } } TEST_info("%s:%d: Unknown test", s->test_file, s->start); return 0; } static int run_file_tests(int i) { STANZA *s = NULL; char *testfile = test_get_argument(i); int c; if (!TEST_ptr(s = OPENSSL_zalloc(sizeof(*s)))) return 0; if (!test_start_file(s, testfile)) { OPENSSL_free(s); return 0; } while (!BIO_eof(s->fp) && test_readstanza(s)) { if (s->numpairs == 0) continue; if (!file_test_run(s)) s->errors++; s->numtests++; test_clearstanza(s); } test_end_file(s); c = s->errors; OPENSSL_free(s); return c == 0; } typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_STOCHASTIC_TESTS, OPT_TEST_ENUM } OPTION_CHOICE; const OPTIONS *test_get_options(void) { static const OPTIONS test_options[] = { OPT_TEST_OPTIONS_WITH_EXTRA_USAGE("[file...]\n"), { "stochastic", OPT_STOCHASTIC_TESTS, '-', "Run stochastic tests" }, { OPT_HELP_STR, 1, '-', "file\tFile to run tests on. Normal tests are not run\n" }, { NULL } }; return test_options; } int setup_tests(void) { OPTION_CHOICE o; int n, stochastic = 0; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_STOCHASTIC_TESTS: stochastic = 1; break; case OPT_TEST_CASES: break; default: case OPT_ERR: return 0; } } n = test_get_argument_count(); if (!TEST_ptr(ctx = BN_CTX_new())) return 0; if (n == 0) { ADD_TEST(test_sub); ADD_TEST(test_div_recip); ADD_ALL_TESTS(test_signed_mod_replace_ab, OSSL_NELEM(signed_mod_tests)); ADD_ALL_TESTS(test_signed_mod_replace_ba, OSSL_NELEM(signed_mod_tests)); ADD_TEST(test_mod); ADD_TEST(test_mod_inverse); ADD_ALL_TESTS(test_mod_exp_alias, 2); ADD_TEST(test_modexp_mont5); ADD_TEST(test_kronecker); ADD_TEST(test_rand); ADD_TEST(test_bn2padded); ADD_TEST(test_dec2bn); ADD_TEST(test_hex2bn); ADD_TEST(test_asc2bn); ADD_TEST(test_bin2zero); ADD_TEST(test_bin2bn_lengths); ADD_ALL_TESTS(test_mpi, (int)OSSL_NELEM(kMPITests)); ADD_ALL_TESTS(test_bn2signed, (int)OSSL_NELEM(kSignedTests_BE)); ADD_TEST(test_negzero); ADD_TEST(test_badmod); ADD_TEST(test_expmodzero); ADD_TEST(test_expmodone); ADD_ALL_TESTS(test_smallprime, 16); ADD_ALL_TESTS(test_smallsafeprime, 16); ADD_TEST(test_swap); ADD_TEST(test_ctx_consttime_flag); #ifndef OPENSSL_NO_EC2M ADD_TEST(test_gf2m_add); ADD_TEST(test_gf2m_mod); ADD_TEST(test_gf2m_mul); ADD_TEST(test_gf2m_sqr); ADD_TEST(test_gf2m_modinv); ADD_TEST(test_gf2m_moddiv); ADD_TEST(test_gf2m_modexp); ADD_TEST(test_gf2m_modsqrt); ADD_TEST(test_gf2m_modsolvequad); #endif ADD_ALL_TESTS(test_is_prime, (int)OSSL_NELEM(primes)); ADD_ALL_TESTS(test_not_prime, (int)OSSL_NELEM(not_primes)); ADD_TEST(test_gcd_prime); ADD_TEST(test_coprime); ADD_ALL_TESTS(test_mod_exp, (int)OSSL_NELEM(ModExpTests)); ADD_ALL_TESTS(test_mod_exp_consttime, (int)OSSL_NELEM(ModExpTests)); ADD_TEST(test_mod_exp2_mont); if (stochastic) ADD_TEST(test_rand_range); } else { ADD_ALL_TESTS(run_file_tests, n); } return 1; } void cleanup_tests(void) { BN_CTX_free(ctx); }
test
openssl/test/bntest.c
openssl
#include <stdio.h> #include <stdlib.h> #include <string.h> #include "internal/nelem.h" #include <openssl/crypto.h> #include <openssl/bio.h> #include <openssl/bn.h> #include <openssl/rand.h> #include <openssl/err.h> #include <openssl/evp.h> #include <openssl/ec.h> #include "testutil.h" #if defined(OPENSSL_NO_DH) && defined(OPENSSL_NO_DSA) && defined(OPENSSL_NO_EC) # define OPENSSL_NO_KEYPARAMS #endif #ifndef OPENSSL_NO_KEYPARAMS struct pubkey { int bad; const unsigned char *key_bin; size_t key_bin_len; }; # ifndef OPENSSL_NO_DH static const unsigned char dhparam_bin[] = { 0x30,0x82,0x01,0x08,0x02,0x82,0x01,0x01,0x00,0xc0,0xd1,0x2e,0x14,0x18,0xbd,0x03, 0xfd,0x39,0xe1,0x99,0xf4,0x93,0x06,0x2d,0x49,0xc6,0xb5,0xb9,0xf0,0x91,0xcb,0x2f, 0x48,0x54,0x79,0x7d,0xc4,0x65,0x11,0x55,0xf7,0x99,0xde,0x42,0x83,0x84,0xc0,0xf8, 0x88,0x89,0xa0,0xff,0xff,0x7d,0xe8,0xef,0x9e,0xbc,0xf7,0x1d,0x70,0x6d,0x3a,0x33, 0x49,0x28,0xa1,0xa3,0xe1,0x41,0xc4,0x8b,0x91,0xf9,0xf2,0xb6,0xe2,0x77,0x79,0x38, 0x7d,0x21,0xb3,0xdf,0x79,0x9c,0x5e,0x65,0x16,0x00,0x16,0x82,0xb2,0x36,0x46,0x21, 0xac,0xaf,0x86,0xc7,0xe3,0x10,0x44,0x48,0xfb,0xbd,0xad,0x4e,0x11,0x73,0x4c,0x25, 0xb0,0x8c,0x1c,0x1e,0x8e,0x58,0x50,0x5e,0x43,0x89,0xe4,0xd9,0x34,0xf8,0x3b,0xcc, 0x36,0x2c,0x1b,0xb3,0xb2,0x77,0x0c,0xa5,0x96,0xc1,0x8a,0x38,0xd4,0xe3,0x9c,0x2a, 0xde,0x49,0x46,0xc7,0xd4,0xa2,0x47,0xc9,0x0a,0xbd,0x84,0xd4,0x1c,0xbc,0xb6,0x19, 0x04,0x94,0x64,0xfa,0x8a,0x11,0x9c,0x5f,0x4a,0x4c,0x0f,0x58,0x81,0x02,0xbf,0xcf, 0x87,0x27,0x2b,0xae,0x8e,0xe2,0x61,0x7a,0xdb,0xba,0x23,0x39,0x25,0x44,0xdc,0x22, 0x75,0xc3,0x28,0xd9,0x12,0x33,0x84,0x32,0xd4,0x5d,0xd9,0x77,0xf8,0x04,0x90,0x38, 0x0a,0xec,0x84,0x93,0x43,0xce,0xe7,0x07,0x42,0x7d,0x2d,0xe0,0x21,0x3b,0x19,0x22, 0xa7,0x8f,0x50,0x31,0xda,0xd0,0x0d,0xd3,0x0b,0xdb,0xad,0xed,0x94,0x92,0xff,0x83, 0x06,0x7f,0x7f,0xd7,0x7b,0x42,0x5b,0xba,0x93,0x7a,0xeb,0x43,0x5f,0xce,0x59,0x26, 0xe8,0x76,0xdc,0xee,0xe2,0xbe,0x36,0x7a,0x83,0x02,0x01,0x02 }; static const unsigned char dhkey_1[] = { 0x7a, 0x49, 0xcb, 0xc3, 0x25, 0x67, 0x7a, 0x61, 0xd0, 0x60, 0x81, 0x0f, 0xf6, 0xbd, 0x38, 0x82, 0xe7, 0x38, 0x8c, 0xe9, 0xd1, 0x04, 0x33, 0xbf, 0x8a, 0x03, 0x63, 0xb3, 0x05, 0x04, 0xb5, 0x1f, 0xba, 0x9f, 0x1a, 0x5f, 0x31, 0x3e, 0x96, 0x79, 0x88, 0x7d, 0x3f, 0x59, 0x6d, 0x3b, 0xf3, 0x2f, 0xf2, 0xa6, 0x43, 0x48, 0x64, 0x5a, 0x6a, 0x32, 0x1f, 0x24, 0x37, 0x62, 0x54, 0x3a, 0x7d, 0xab, 0x26, 0x77, 0x7c, 0xec, 0x57, 0x3c, 0xa4, 0xbd, 0x96, 0x9d, 0xaa, 0x3b, 0x0e, 0x9a, 0x55, 0x7e, 0x1d, 0xb4, 0x47, 0x5b, 0xea, 0x20, 0x3c, 0x6d, 0xbe, 0xd6, 0x70, 0x7d, 0xa8, 0x9e, 0x84, 0xb4, 0x03, 0x52, 0xf2, 0x08, 0x4c, 0x98, 0xd3, 0x4f, 0x58, 0xb3, 0xdf, 0xb4, 0xe6, 0xdc, 0x2c, 0x43, 0x55, 0xd1, 0xce, 0x2a, 0xb3, 0xfc, 0xe0, 0x29, 0x97, 0xd8, 0xd8, 0x62, 0xc6, 0x87, 0x0a, 0x1b, 0xfd, 0x72, 0x74, 0xe0, 0xa9, 0xfb, 0xfa, 0x91, 0xf2, 0xc1, 0x09, 0x93, 0xea, 0x63, 0xf6, 0x9a, 0x4b, 0xdf, 0x4e, 0xdf, 0x6b, 0xf9, 0xeb, 0xf6, 0x66, 0x3c, 0xfd, 0x6f, 0x68, 0xcb, 0xdb, 0x6e, 0x40, 0x65, 0xf7, 0xf2, 0x46, 0xe5, 0x0d, 0x9a, 0xd9, 0x6f, 0xcf, 0x28, 0x22, 0x8f, 0xca, 0x0b, 0x30, 0xa0, 0x9e, 0xa5, 0x13, 0xba, 0x72, 0x7f, 0x85, 0x3d, 0x02, 0x9c, 0x97, 0x8e, 0x6f, 0xea, 0x6d, 0x35, 0x4e, 0xd1, 0x78, 0x7d, 0x73, 0x60, 0x92, 0xa9, 0x12, 0xf4, 0x2a, 0xac, 0x17, 0x97, 0xf3, 0x7b, 0x79, 0x08, 0x69, 0xd1, 0x9e, 0xb5, 0xf8, 0x2a, 0x0a, 0x2b, 0x00, 0x7b, 0x16, 0x8d, 0x41, 0x82, 0x3a, 0x72, 0x58, 0x57, 0x80, 0x65, 0xae, 0x17, 0xbc, 0x3a, 0x5b, 0x7e, 0x5c, 0x2d, 0xae, 0xb2, 0xc2, 0x26, 0x20, 0x9a, 0xaa, 0x57, 0x4b, 0x7d, 0x43, 0x41, 0x96, 0x3f, 0xf0, 0x0d }; static const unsigned char dhkey_2[] = { 0x73, 0xb2, 0x22, 0x91, 0x27, 0xb9, 0x45, 0xb0, 0xfd, 0x17, 0x66, 0x79, 0x9b, 0x32, 0x71, 0x92, 0x97, 0x1d, 0x70, 0x02, 0x37, 0x70, 0x79, 0x63, 0xed, 0x11, 0x22, 0xe9, 0xe6, 0xf8, 0xeb, 0xd7, 0x90, 0x00, 0xe6, 0x5c, 0x47, 0x02, 0xfb, 0x13, 0xca, 0x29, 0x14, 0x1e, 0xf4, 0x61, 0x58, 0xf6, 0xaa, 0xbb, 0xcf, 0xa7, 0x82, 0x9a, 0x9e, 0x7c, 0x4a, 0x05, 0x42, 0xed, 0x55, 0xd8, 0x08, 0x37, 0x06, 0x49, 0x9b, 0xda, 0xb3, 0xb9, 0xc9, 0xc0, 0x56, 0x26, 0xda, 0x60, 0x1d, 0xbc, 0x06, 0x0b, 0xb0, 0x94, 0x4b, 0x4e, 0x95, 0xf9, 0xb4, 0x2f, 0x4e, 0xad, 0xf8, 0xab, 0x2d, 0x19, 0xa2, 0xe6, 0x6d, 0x11, 0xfd, 0x9b, 0x5a, 0x2a, 0xb0, 0x81, 0x42, 0x4d, 0x86, 0x76, 0xd5, 0x9e, 0xaf, 0xf9, 0x6f, 0x79, 0xab, 0x1d, 0xfe, 0xd8, 0xc8, 0xba, 0xb6, 0xce, 0x03, 0x61, 0x48, 0x53, 0xd8, 0x0b, 0x83, 0xf0, 0xb0, 0x46, 0xa0, 0xea, 0x46, 0x60, 0x7a, 0x39, 0x4e, 0x46, 0x6a, 0xbb, 0x07, 0x6c, 0x8c, 0x7d, 0xb7, 0x7d, 0x5b, 0xe5, 0x24, 0xa5, 0xab, 0x41, 0x8a, 0xc4, 0x63, 0xf9, 0xce, 0x20, 0x6f, 0x58, 0x4f, 0x0e, 0x42, 0x82, 0x9e, 0x17, 0x53, 0xa6, 0xd6, 0x42, 0x3e, 0x80, 0x66, 0x6f, 0x2a, 0x1c, 0x30, 0x08, 0x01, 0x99, 0x5a, 0x4f, 0x72, 0x16, 0xed, 0xb0, 0xd6, 0x8c, 0xf0, 0x7a, 0x33, 0x15, 0xc4, 0x95, 0x65, 0xba, 0x11, 0x37, 0xa0, 0xcc, 0xe7, 0x45, 0x65, 0x4f, 0x17, 0x0a, 0x2c, 0x62, 0xc0, 0x65, 0x3b, 0x65, 0x2a, 0x56, 0xf7, 0x29, 0x8a, 0x9b, 0x1b, 0xbb, 0x0c, 0x40, 0xcd, 0x66, 0x4b, 0x4f, 0x2f, 0xba, 0xdb, 0x59, 0x93, 0x6d, 0x34, 0xf3, 0x8d, 0xde, 0x68, 0x99, 0x78, 0xfc, 0xac, 0x95, 0xd9, 0xa3, 0x74, 0xe6, 0x24, 0x96, 0x98, 0x6f, 0x64, 0x71, 0x76 }; static const unsigned char dhkey_3[] = { 0x01 }; # endif # ifndef OPENSSL_NO_DSA static const unsigned char dsaparam_bin[] = { 0x30,0x82,0x02,0x28,0x02,0x82,0x01,0x01,0x00,0xf2,0x85,0x01,0xa5,0xb9,0x56,0x65, 0x19,0xff,0x9a,0x7d,0xf9,0x90,0xd6,0xaa,0x73,0xac,0xf7,0x94,0xfa,0x8a,0x64,0x6d, 0xa0,0x01,0x42,0xe5,0x45,0xfc,0x53,0x72,0xb0,0x7c,0xe6,0x3b,0xfb,0x09,0x33,0x41, 0x27,0xbd,0x00,0xb5,0x18,0x87,0x62,0xa8,0x2b,0xfc,0xd0,0x52,0x4a,0x14,0x2d,0xaa, 0x36,0xc6,0xf3,0xa9,0xe3,0x90,0x1b,0x74,0xdf,0x0a,0x6d,0x33,0xba,0xf4,0x32,0x6d, 0xba,0x36,0x68,0x1d,0x83,0x36,0x50,0xc6,0x62,0xc0,0x40,0x67,0x0e,0xf6,0x22,0x00, 0x62,0x1b,0x76,0x72,0x62,0x5f,0xa0,0xdf,0x38,0xb1,0x1d,0x26,0x70,0x9b,0x84,0x64, 0xbb,0x16,0x15,0xc2,0x66,0xb9,0x97,0xd0,0x07,0xf1,0x4b,0x70,0x02,0x03,0xf1,0xd2, 0x03,0xdb,0x78,0x8b,0xb4,0xda,0x6f,0x3c,0xe2,0x31,0xa8,0x1c,0x99,0xea,0x9c,0x75, 0x28,0x96,0x82,0x16,0x77,0xac,0x79,0x32,0x61,0x87,0xec,0xb7,0xb4,0xc3,0xea,0x12, 0x62,0x1f,0x08,0xb8,0x16,0xab,0xcc,0xef,0x28,0xdf,0x06,0x07,0xbe,0xb0,0xdc,0x78, 0x83,0x8a,0x70,0x80,0x34,0xe6,0x91,0xe3,0xd3,0x92,0xd9,0xf4,0x56,0x53,0x52,0xb7, 0x35,0xf6,0x2a,0xec,0x4b,0xcb,0xa2,0x3c,0xc3,0x0c,0x94,0xa7,0x4e,0x1c,0x42,0x9c, 0x72,0x99,0x60,0x8c,0xfe,0xfb,0x60,0x57,0x75,0xf5,0x23,0x11,0x12,0xba,0x97,0xcd, 0xad,0x5a,0x0b,0xa6,0x1f,0x6a,0x48,0x2e,0x8d,0xda,0x95,0xc6,0x0e,0x14,0xde,0xf7, 0x22,0x55,0xa8,0x6b,0x25,0xdf,0xa2,0xab,0x33,0x65,0x56,0xfc,0x78,0x4f,0x62,0xdf, 0x48,0xdd,0xce,0x8b,0xe1,0x76,0xf4,0xf6,0x7f,0x02,0x1d,0x00,0xac,0xb0,0xb8,0x92, 0x3b,0x6b,0x61,0xcf,0x36,0x6d,0xf2,0x1e,0x5d,0xe0,0x7b,0xf5,0x73,0x48,0xa3,0x8b, 0x86,0x9e,0x88,0xce,0x40,0xf8,0x27,0x6d,0x02,0x82,0x01,0x00,0x77,0x6b,0x89,0xd6, 0x8f,0x3d,0xce,0x52,0x30,0x74,0xb2,0xa1,0x13,0x96,0xd5,0x92,0xf2,0xf1,0x6b,0x10, 0x31,0x0b,0xf3,0x69,0xaa,0xbf,0x4b,0x6c,0xcb,0x3f,0x6d,0x58,0x76,0x44,0x09,0xf9, 0x28,0xef,0xa0,0xe4,0x55,0x77,0x57,0xe0,0xfb,0xcc,0x9a,0x6a,0x2c,0x90,0xec,0x72, 0x24,0x0b,0x43,0xc5,0xbc,0x31,0xed,0x1a,0x46,0x2c,0x76,0x42,0x9e,0xc0,0x82,0xfc, 0xff,0xf9,0x7e,0xe2,0x1f,0x39,0xf3,0x3b,0xdb,0x27,0x36,0xe7,0xf5,0x3b,0xc2,0x23, 0xb6,0xd0,0xcf,0x5b,0x85,0x2e,0x1b,0x00,0x5b,0x31,0xaa,0x72,0x8f,0x37,0xee,0x56, 0x71,0xc4,0xfd,0x3c,0x8d,0xfa,0x5b,0xab,0xb1,0xa9,0x52,0x76,0xa0,0xe4,0xe3,0x78, 0x83,0x64,0x5d,0xd7,0x6c,0xec,0x9b,0x40,0x65,0xe2,0x0a,0x11,0x19,0x60,0xdd,0xce, 0x29,0x9f,0xc6,0x1d,0x0a,0xab,0x8e,0x59,0x25,0xc5,0x0b,0x9c,0x02,0x45,0xba,0x99, 0x74,0x22,0x1d,0xc1,0x57,0xca,0x50,0x8c,0x5e,0xdf,0xd8,0x5d,0x43,0xae,0x06,0x28, 0x29,0x82,0xf6,0x5a,0xa9,0x51,0xa2,0x04,0x1d,0xbf,0x88,0x15,0x98,0xce,0x8a,0xb4, 0x3b,0xe5,0x30,0x29,0xce,0x0c,0x9b,0xf8,0xdb,0xbf,0x06,0x9f,0xd0,0x59,0x18,0xd4, 0x0b,0x94,0xbf,0xe9,0x67,0x6b,0x9e,0xf0,0x72,0xc6,0xbf,0x79,0x8f,0x1e,0xa3,0x95, 0x24,0xe3,0xcb,0x58,0xb5,0x67,0xd3,0xae,0x79,0xb0,0x28,0x9c,0x9a,0xd0,0xa4,0xe7, 0x22,0x15,0xc1,0x8b,0x04,0xb9,0x8a,0xa8,0xb7,0x1b,0x62,0x44,0xc6,0xef,0x4b,0x74, 0xd0,0xfd,0xa9,0xb4,0x4e,0xdd,0x7d,0x38,0x60,0xd1,0x40,0xcd }; # endif # ifndef OPENSSL_NO_EC static const unsigned char ecparam_bin[] = { 0x06,0x08,0x2a,0x86,0x48,0xce,0x3d,0x03,0x01,0x07 }; static const unsigned char eckey_1[] = { 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 0x0b, 0x76, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 0xf1 }; static const unsigned char eckey_2[] = { 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 0x0b, 0x77, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 0xf1 }; static const unsigned char eckey_3[] = { 0x04, 0xc8, 0x65, 0x45, 0x63, 0x73, 0xe5, 0x0a, 0x61, 0x1d, 0xcf, 0x60, 0x76, 0x2c, 0xe7, 0x36, 0x0b, 0x76, 0xc2, 0x92, 0xfc, 0xa4, 0x56, 0xee, 0xc2, 0x62, 0x05, 0x00, 0x80, 0xe4, 0x4f, 0x07, 0x3b, 0xf4, 0x59, 0xb8, 0xc3, 0xb3, 0x1f, 0x77, 0x36, 0x16, 0x4c, 0x72, 0x2a, 0xc0, 0x89, 0x89, 0xd6, 0x16, 0x14, 0xee, 0x2f, 0x5a, 0xde, 0x9e, 0x83, 0xc5, 0x78, 0xd0, 0x0b, 0x69, 0xb4, 0xb9, 0xf1, 0xaa }; # endif #define NUM_KEYS 10 static const struct { int type; const unsigned char *param_bin; size_t param_bin_len; struct pubkey keys[NUM_KEYS]; } pkey_params [] = { # ifndef OPENSSL_NO_DH { EVP_PKEY_DH, dhparam_bin, sizeof(dhparam_bin), { { 0, dhkey_1, sizeof(dhkey_1) }, { 0, dhkey_2, sizeof(dhkey_2) }, { 1, dhkey_3, sizeof(dhkey_3) }, { 1, dhkey_1, 0 }, { 1, dhparam_bin, sizeof(dhparam_bin) } } }, # endif # ifndef OPENSSL_NO_DSA { EVP_PKEY_DSA, dsaparam_bin, sizeof(dsaparam_bin) }, # endif # ifndef OPENSSL_NO_EC { EVP_PKEY_EC, ecparam_bin, sizeof(ecparam_bin), { { 0, eckey_1, sizeof(eckey_1) }, { 1, eckey_2, sizeof(eckey_2) }, { 1, eckey_3, sizeof(eckey_3) }, { 1, eckey_1, 0 }, { 1, eckey_1, sizeof(eckey_1) - 1 } } } # endif }; static int params_bio_test(int id) { int ret, out_len; BIO *in = NULL, *out = NULL; EVP_PKEY *in_key = NULL, *out_key = NULL; unsigned char *out_bin; int type = pkey_params[id].type; ret = TEST_ptr(in = BIO_new_mem_buf(pkey_params[id].param_bin, (int)pkey_params[id].param_bin_len)) && TEST_ptr(d2i_KeyParams_bio(type, &in_key, in)) && TEST_ptr(out = BIO_new(BIO_s_mem())) && TEST_int_gt(i2d_KeyParams_bio(out, in_key), 0) && TEST_int_gt(out_len = BIO_get_mem_data(out, &out_bin), 0) && TEST_mem_eq(pkey_params[id].param_bin, (int)pkey_params[id].param_bin_len, out_bin, out_len); BIO_free(in); BIO_free(out); EVP_PKEY_free(in_key); EVP_PKEY_free(out_key); return ret; } static int set_enc_pubkey_test(int id) { int ret, i; BIO *in = NULL; EVP_PKEY *in_key = NULL; int type = pkey_params[id].type; const struct pubkey *keys = pkey_params[id].keys; if (keys[0].key_bin == NULL) return TEST_skip("Not applicable test"); ret = TEST_ptr(in = BIO_new_mem_buf(pkey_params[id].param_bin, (int)pkey_params[id].param_bin_len)) && TEST_ptr(d2i_KeyParams_bio(type, &in_key, in)); for (i = 0; ret && i < NUM_KEYS && keys[i].key_bin != NULL; i++) { if (keys[i].bad) { ERR_set_mark(); ret = ret && TEST_int_le(EVP_PKEY_set1_encoded_public_key(in_key, keys[i].key_bin, keys[i].key_bin_len), 0); ERR_pop_to_mark(); } else { ret = ret && TEST_int_gt(EVP_PKEY_set1_encoded_public_key(in_key, keys[i].key_bin, keys[i].key_bin_len), 0); } if (!ret) TEST_info("Test key index #%d", i); } BIO_free(in); EVP_PKEY_free(in_key); return ret; } #endif int setup_tests(void) { #ifdef OPENSSL_NO_KEYPARAMS TEST_note("No DH/DSA/EC support"); #else ADD_ALL_TESTS(params_bio_test, OSSL_NELEM(pkey_params)); ADD_ALL_TESTS(set_enc_pubkey_test, OSSL_NELEM(pkey_params)); #endif return 1; }
test
openssl/test/evp_pkey_dparams_test.c
openssl
#define TESTUTIL_NO_size_t_COMPARISON #include <stdio.h> #include <string.h> #include <openssl/bio.h> #include "internal/numbers.h" #include "testutil.h" #include "testutil/output.h" #define nelem(x) (int)(sizeof(x) / sizeof((x)[0])) static int justprint = 0; static char *fpexpected[][10][5] = { { { "0.0000e+00", "0.0000", "0", "0.0000E+00", "0" }, { "6.7000e-01", "0.6700", "0.67", "6.7000E-01", "0.67" }, { "6.6667e-01", "0.6667", "0.6667", "6.6667E-01", "0.6667" }, { "6.6667e-04", "0.0007", "0.0006667", "6.6667E-04", "0.0006667" }, { "6.6667e-05", "0.0001", "6.667e-05", "6.6667E-05", "6.667E-05" }, { "6.6667e+00", "6.6667", "6.667", "6.6667E+00", "6.667" }, { "6.6667e+01", "66.6667", "66.67", "6.6667E+01", "66.67" }, { "6.6667e+02", "666.6667", "666.7", "6.6667E+02", "666.7" }, { "6.6667e+03", "6666.6667", "6667", "6.6667E+03", "6667" }, { "6.6667e+04", "66666.6667", "6.667e+04", "6.6667E+04", "6.667E+04" }, }, { { "0.00000e+00", "0.00000", "0", "0.00000E+00", "0" }, { "6.70000e-01", "0.67000", "0.67", "6.70000E-01", "0.67" }, { "6.66667e-01", "0.66667", "0.66667", "6.66667E-01", "0.66667" }, { "6.66667e-04", "0.00067", "0.00066667", "6.66667E-04", "0.00066667" }, { "6.66667e-05", "0.00007", "6.6667e-05", "6.66667E-05", "6.6667E-05" }, { "6.66667e+00", "6.66667", "6.6667", "6.66667E+00", "6.6667" }, { "6.66667e+01", "66.66667", "66.667", "6.66667E+01", "66.667" }, { "6.66667e+02", "666.66667", "666.67", "6.66667E+02", "666.67" }, { "6.66667e+03", "6666.66667", "6666.7", "6.66667E+03", "6666.7" }, { "6.66667e+04", "66666.66667", "66667", "6.66667E+04", "66667" }, }, { { " 0.0000e+00", " 0.0000", " 0", " 0.0000E+00", " 0" }, { " 6.7000e-01", " 0.6700", " 0.67", " 6.7000E-01", " 0.67" }, { " 6.6667e-01", " 0.6667", " 0.6667", " 6.6667E-01", " 0.6667" }, { " 6.6667e-04", " 0.0007", " 0.0006667", " 6.6667E-04", " 0.0006667" }, { " 6.6667e-05", " 0.0001", " 6.667e-05", " 6.6667E-05", " 6.667E-05" }, { " 6.6667e+00", " 6.6667", " 6.667", " 6.6667E+00", " 6.667" }, { " 6.6667e+01", " 66.6667", " 66.67", " 6.6667E+01", " 66.67" }, { " 6.6667e+02", " 666.6667", " 666.7", " 6.6667E+02", " 666.7" }, { " 6.6667e+03", " 6666.6667", " 6667", " 6.6667E+03", " 6667" }, { " 6.6667e+04", " 66666.6667", " 6.667e+04", " 6.6667E+04", " 6.667E+04" }, }, { { " 0.00000e+00", " 0.00000", " 0", " 0.00000E+00", " 0" }, { " 6.70000e-01", " 0.67000", " 0.67", " 6.70000E-01", " 0.67" }, { " 6.66667e-01", " 0.66667", " 0.66667", " 6.66667E-01", " 0.66667" }, { " 6.66667e-04", " 0.00067", " 0.00066667", " 6.66667E-04", " 0.00066667" }, { " 6.66667e-05", " 0.00007", " 6.6667e-05", " 6.66667E-05", " 6.6667E-05" }, { " 6.66667e+00", " 6.66667", " 6.6667", " 6.66667E+00", " 6.6667" }, { " 6.66667e+01", " 66.66667", " 66.667", " 6.66667E+01", " 66.667" }, { " 6.66667e+02", " 666.66667", " 666.67", " 6.66667E+02", " 666.67" }, { " 6.66667e+03", " 6666.66667", " 6666.7", " 6.66667E+03", " 6666.7" }, { " 6.66667e+04", " 66666.66667", " 66667", " 6.66667E+04", " 66667" }, }, { { "0e+00", "0", "0", "0E+00", "0" }, { "7e-01", "1", "0.7", "7E-01", "0.7" }, { "7e-01", "1", "0.7", "7E-01", "0.7" }, { "7e-04", "0", "0.0007", "7E-04", "0.0007" }, { "7e-05", "0", "7e-05", "7E-05", "7E-05" }, { "7e+00", "7", "7", "7E+00", "7" }, { "7e+01", "67", "7e+01", "7E+01", "7E+01" }, { "7e+02", "667", "7e+02", "7E+02", "7E+02" }, { "7e+03", "6667", "7e+03", "7E+03", "7E+03" }, { "7e+04", "66667", "7e+04", "7E+04", "7E+04" }, }, { { "0.000000e+00", "0.000000", "0", "0.000000E+00", "0" }, { "6.700000e-01", "0.670000", "0.67", "6.700000E-01", "0.67" }, { "6.666667e-01", "0.666667", "0.666667", "6.666667E-01", "0.666667" }, { "6.666667e-04", "0.000667", "0.000666667", "6.666667E-04", "0.000666667" }, { "6.666667e-05", "0.000067", "6.66667e-05", "6.666667E-05", "6.66667E-05" }, { "6.666667e+00", "6.666667", "6.66667", "6.666667E+00", "6.66667" }, { "6.666667e+01", "66.666667", "66.6667", "6.666667E+01", "66.6667" }, { "6.666667e+02", "666.666667", "666.667", "6.666667E+02", "666.667" }, { "6.666667e+03", "6666.666667", "6666.67", "6.666667E+03", "6666.67" }, { "6.666667e+04", "66666.666667", "66666.7", "6.666667E+04", "66666.7" }, }, { { "0.0000e+00", "000.0000", "00000000", "0.0000E+00", "00000000" }, { "6.7000e-01", "000.6700", "00000.67", "6.7000E-01", "00000.67" }, { "6.6667e-01", "000.6667", "000.6667", "6.6667E-01", "000.6667" }, { "6.6667e-04", "000.0007", "0.0006667", "6.6667E-04", "0.0006667" }, { "6.6667e-05", "000.0001", "6.667e-05", "6.6667E-05", "6.667E-05" }, { "6.6667e+00", "006.6667", "0006.667", "6.6667E+00", "0006.667" }, { "6.6667e+01", "066.6667", "00066.67", "6.6667E+01", "00066.67" }, { "6.6667e+02", "666.6667", "000666.7", "6.6667E+02", "000666.7" }, { "6.6667e+03", "6666.6667", "00006667", "6.6667E+03", "00006667" }, { "6.6667e+04", "66666.6667", "6.667e+04", "6.6667E+04", "6.667E+04" }, }, }; typedef struct z_data_st { size_t value; const char *format; const char *expected; } z_data; static z_data zu_data[] = { { SIZE_MAX, "%zu", (sizeof(size_t) == 4 ? "4294967295" : sizeof(size_t) == 8 ? "18446744073709551615" : "") }, { SIZE_MAX / 2 + 1, "%zi", (sizeof(size_t) == 4 ? "-2147483648" : sizeof(size_t) == 8 ? "-9223372036854775808" : "") }, { 0, "%zu", "0" }, { 0, "%zi", "0" }, }; static int test_zu(int i) { char bio_buf[80]; const z_data *data = &zu_data[i]; BIO_snprintf(bio_buf, sizeof(bio_buf) - 1, data->format, data->value); if (!TEST_str_eq(bio_buf, data->expected)) return 0; return 1; } typedef struct j_data_st { uint64_t value; const char *format; const char *expected; } j_data; static j_data jf_data[] = { { 0xffffffffffffffffULL, "%ju", "18446744073709551615" }, { 0xffffffffffffffffULL, "%jx", "ffffffffffffffff" }, { 0x8000000000000000ULL, "%ju", "9223372036854775808" }, { 0x8000000000000000ULL, "%ji", "-9223372036854775808" }, }; static int test_j(int i) { const j_data *data = &jf_data[i]; char bio_buf[80]; BIO_snprintf(bio_buf, sizeof(bio_buf) - 1, data->format, data->value); if (!TEST_str_eq(bio_buf, data->expected)) return 0; return 1; } typedef struct pw_st { int p; const char *w; } pw; static pw pw_params[] = { { 4, "" }, { 5, "" }, { 4, "12" }, { 5, "12" }, { 0, "" }, { -1, "" }, { 4, "08" } }; static int dofptest(int test, int sub, double val, const char *width, int prec) { static const char *fspecs[] = { "e", "f", "g", "E", "G" }; char format[80], result[80]; int ret = 1, i; for (i = 0; i < nelem(fspecs); i++) { const char *fspec = fspecs[i]; if (prec >= 0) BIO_snprintf(format, sizeof(format), "%%%s.%d%s", width, prec, fspec); else BIO_snprintf(format, sizeof(format), "%%%s%s", width, fspec); BIO_snprintf(result, sizeof(result), format, val); if (justprint) { if (i == 0) printf(" { \"%s\"", test, sub, result); else printf(", \"%s\"", result); } else if (!TEST_str_eq(fpexpected[test][sub][i], result)) { TEST_info("test %d format=|%s| exp=|%s|, ret=|%s|", test, format, fpexpected[test][sub][i], result); ret = 0; } } if (justprint) printf(" },\n"); return ret; } static int test_fp(int i) { int t = 0, r; const double frac = 2.0 / 3.0; const pw *pwp = &pw_params[i]; if (justprint) printf(" {\n"); r = TEST_true(dofptest(i, t++, 0.0, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 0.67, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, frac, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, frac / 1000, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, frac / 10000, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 6.0 + frac, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 66.0 + frac, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 666.0 + frac, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 6666.0 + frac, pwp->w, pwp->p)) && TEST_true(dofptest(i, t++, 66666.0 + frac, pwp->w, pwp->p)); if (justprint) printf(" },\n"); return r; } static int test_big(void) { char buf[80]; if (!TEST_int_eq(BIO_snprintf(buf, sizeof(buf), "%f\n", 2 * (double)ULONG_MAX), -1)) return 0; return 1; } typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_PRINT, OPT_TEST_ENUM } OPTION_CHOICE; const OPTIONS *test_get_options(void) { static const OPTIONS options[] = { OPT_TEST_OPTIONS_DEFAULT_USAGE, { "expected", OPT_PRINT, '-', "Output values" }, { NULL } }; return options; } int setup_tests(void) { OPTION_CHOICE o; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_PRINT: justprint = 1; break; case OPT_TEST_CASES: break; default: return 0; } } ADD_TEST(test_big); ADD_ALL_TESTS(test_fp, nelem(pw_params)); ADD_ALL_TESTS(test_zu, nelem(zu_data)); ADD_ALL_TESTS(test_j, nelem(jf_data)); return 1; } BIO *bio_out = NULL; BIO *bio_err = NULL; static int tap_level = 0; void test_open_streams(void) { } void test_adjust_streams_tap_level(int level) { tap_level = level; } void test_close_streams(void) { } int test_vprintf_stdout(const char *fmt, va_list ap) { return fprintf(stdout, "%*s# ", tap_level, "") + vfprintf(stdout, fmt, ap); } int test_vprintf_stderr(const char *fmt, va_list ap) { return fprintf(stderr, "%*s# ", tap_level, "") + vfprintf(stderr, fmt, ap); } int test_flush_stdout(void) { return fflush(stdout); } int test_flush_stderr(void) { return fflush(stderr); } int test_vprintf_tapout(const char *fmt, va_list ap) { return fprintf(stdout, "%*s", tap_level, "") + vfprintf(stdout, fmt, ap); } int test_vprintf_taperr(const char *fmt, va_list ap) { return fprintf(stderr, "%*s", tap_level, "") + vfprintf(stderr, fmt, ap); } int test_flush_tapout(void) { return fflush(stdout); } int test_flush_taperr(void) { return fflush(stderr); }
test
openssl/test/bioprinttest.c
openssl
#include <string.h> #include <openssl/bio.h> #include <openssl/rand.h> #include "testutil.h" #include "internal/sockets.h" #include "internal/bio_addr.h" #if !defined(OPENSSL_NO_DGRAM) && !defined(OPENSSL_NO_SOCK) static int compare_addr(const BIO_ADDR *a, const BIO_ADDR *b) { struct in_addr xa, xb; #if OPENSSL_USE_IPV6 struct in6_addr xa6, xb6; #endif void *pa, *pb; size_t slen, tmplen; if (BIO_ADDR_family(a) != BIO_ADDR_family(b)) return 0; if (BIO_ADDR_family(a) == AF_INET) { pa = &xa; pb = &xb; slen = sizeof(xa); } #if OPENSSL_USE_IPV6 else if (BIO_ADDR_family(a) == AF_INET6) { pa = &xa6; pb = &xb6; slen = sizeof(xa6); } #endif else { return 0; } tmplen = slen; if (!TEST_int_eq(BIO_ADDR_rawaddress(a, pa, &tmplen), 1)) return 0; tmplen = slen; if (!TEST_int_eq(BIO_ADDR_rawaddress(b, pb, &tmplen), 1)) return 0; if (!TEST_mem_eq(pa, slen, pb, slen)) return 0; if (!TEST_int_eq(BIO_ADDR_rawport(a), BIO_ADDR_rawport(b))) return 0; return 1; } static int do_sendmmsg(BIO *b, BIO_MSG *msg, size_t num_msg, uint64_t flags, size_t *num_processed) { size_t done; for (done = 0; done < num_msg; ) { if (!BIO_sendmmsg(b, msg + done, sizeof(BIO_MSG), num_msg - done, flags, num_processed)) return 0; done += *num_processed; } *num_processed = done; return 1; } static int do_recvmmsg(BIO *b, BIO_MSG *msg, size_t num_msg, uint64_t flags, size_t *num_processed) { size_t done; for (done = 0; done < num_msg; ) { if (!BIO_recvmmsg(b, msg + done, sizeof(BIO_MSG), num_msg - done, flags, num_processed)) return 0; done += *num_processed; } *num_processed = done; return 1; } static int test_bio_dgram_impl(int af, int use_local) { int testresult = 0; BIO *b1 = NULL, *b2 = NULL; int fd1 = -1, fd2 = -1; BIO_ADDR *addr1 = NULL, *addr2 = NULL, *addr3 = NULL, *addr4 = NULL, *addr5 = NULL, *addr6 = NULL; struct in_addr ina; #if OPENSSL_USE_IPV6 struct in6_addr ina6; #endif void *pina; size_t inal, i; union BIO_sock_info_u info1 = {0}, info2 = {0}; char rx_buf[128], rx_buf2[128]; BIO_MSG tx_msg[128], rx_msg[128]; char tx_buf[128]; size_t num_processed = 0; if (af == AF_INET) { TEST_info("# Testing with AF_INET, local=%d\n", use_local); pina = &ina; inal = sizeof(ina); } #if OPENSSL_USE_IPV6 else if (af == AF_INET6) { TEST_info("# Testing with AF_INET6, local=%d\n", use_local); pina = &ina6; inal = sizeof(ina6); } #endif else { goto err; } memset(pina, 0, inal); ina.s_addr = htonl(0x7f000001UL); #if OPENSSL_USE_IPV6 ina6.s6_addr[15] = 1; #endif addr1 = BIO_ADDR_new(); if (!TEST_ptr(addr1)) goto err; addr2 = BIO_ADDR_new(); if (!TEST_ptr(addr2)) goto err; addr3 = BIO_ADDR_new(); if (!TEST_ptr(addr3)) goto err; addr4 = BIO_ADDR_new(); if (!TEST_ptr(addr4)) goto err; addr5 = BIO_ADDR_new(); if (!TEST_ptr(addr5)) goto err; addr6 = BIO_ADDR_new(); if (!TEST_ptr(addr6)) goto err; if (!TEST_int_eq(BIO_ADDR_rawmake(addr1, af, pina, inal, 0), 1)) goto err; if (!TEST_int_eq(BIO_ADDR_rawmake(addr2, af, pina, inal, 0), 1)) goto err; fd1 = BIO_socket(af, SOCK_DGRAM, IPPROTO_UDP, 0); if (!TEST_int_ge(fd1, 0)) goto err; fd2 = BIO_socket(af, SOCK_DGRAM, IPPROTO_UDP, 0); if (!TEST_int_ge(fd2, 0)) goto err; if (BIO_bind(fd1, addr1, 0) <= 0 || BIO_bind(fd2, addr2, 0) <= 0) { testresult = TEST_skip("BIO_bind() failed - assuming it's an unavailable address family"); goto err; } info1.addr = addr1; if (!TEST_int_gt(BIO_sock_info(fd1, BIO_SOCK_INFO_ADDRESS, &info1), 0)) goto err; info2.addr = addr2; if (!TEST_int_gt(BIO_sock_info(fd2, BIO_SOCK_INFO_ADDRESS, &info2), 0)) goto err; if (!TEST_int_gt(BIO_ADDR_rawport(addr1), 0)) goto err; if (!TEST_int_gt(BIO_ADDR_rawport(addr2), 0)) goto err; b1 = BIO_new_dgram(fd1, 0); if (!TEST_ptr(b1)) goto err; b2 = BIO_new_dgram(fd2, 0); if (!TEST_ptr(b2)) goto err; if (!TEST_int_gt(BIO_dgram_set_peer(b1, addr2), 0)) goto err; if (!TEST_int_gt(BIO_write(b1, "hello", 5), 0)) goto err; if (!TEST_int_eq(BIO_read(b2, rx_buf, sizeof(rx_buf)), 5)) goto err; if (!TEST_mem_eq(rx_buf, 5, "hello", 5)) goto err; if (!TEST_int_gt(BIO_dgram_get_peer(b2, addr3), 0)) goto err; if (!TEST_int_eq(compare_addr(addr3, addr1), 1)) goto err; if (!TEST_int_gt(BIO_ADDR_rawmake(addr3, af, pina, inal, 0), 0)) goto err; if (!TEST_int_gt(BIO_dgram_set_peer(b1, addr3), 0)) goto err; if (!TEST_int_gt(BIO_dgram_set_peer(b2, addr3), 0)) goto err; tx_msg[0].data = "apple"; tx_msg[0].data_len = 5; tx_msg[0].peer = NULL; tx_msg[0].local = NULL; tx_msg[0].flags = 0; tx_msg[1].data = "orange"; tx_msg[1].data_len = 6; tx_msg[1].peer = NULL; tx_msg[1].local = NULL; tx_msg[1].flags = 0; if (!TEST_false(do_sendmmsg(b1, tx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 0)) goto err; tx_msg[0].peer = addr2; tx_msg[0].local = addr1; tx_msg[1].peer = addr2; tx_msg[1].local = addr1; if (!TEST_false(do_sendmmsg(b1, tx_msg, 2, 0, &num_processed) || !TEST_size_t_eq(num_processed, 0))) goto err; if (BIO_dgram_get_local_addr_cap(b1) > 0 && use_local) { if (!TEST_int_eq(BIO_dgram_set_local_addr_enable(b1, 1), 1)) goto err; } else { tx_msg[0].local = NULL; tx_msg[1].local = NULL; use_local = 0; } if (!TEST_true(do_sendmmsg(b1, tx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; rx_msg[0].data = rx_buf; rx_msg[0].data_len = sizeof(rx_buf); rx_msg[0].peer = addr3; rx_msg[0].local = addr4; rx_msg[0].flags = (1UL<<31); memset(rx_buf, 0, sizeof(rx_buf)); rx_msg[1].data = rx_buf2; rx_msg[1].data_len = sizeof(rx_buf2); rx_msg[1].peer = addr5; rx_msg[1].local = addr6; rx_msg[1].flags = (1UL<<31); memset(rx_buf2, 0, sizeof(rx_buf2)); if (!TEST_false(do_recvmmsg(b2, rx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 0)) goto err; if (!TEST_int_eq((int)rx_msg[0].data_len, sizeof(rx_buf))) goto err; if (!TEST_int_eq((int)rx_msg[1].data_len, sizeof(rx_buf2))) goto err; if (!TEST_ulong_eq((unsigned long)rx_msg[0].flags, 1UL<<31)) goto err; if (!TEST_ulong_eq((unsigned long)rx_msg[1].flags, 1UL<<31)) goto err; if (BIO_dgram_get_local_addr_cap(b2) > 0 && use_local) { if (!TEST_int_eq(BIO_dgram_set_local_addr_enable(b2, 1), 1)) goto err; } else { rx_msg[0].local = NULL; rx_msg[1].local = NULL; use_local = 0; } if (!TEST_true(do_recvmmsg(b2, rx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; if (!TEST_int_eq((int)rx_msg[0].data_len, 5)) goto err; if (!TEST_int_eq((int)rx_msg[1].data_len, 6)) goto err; if (!TEST_int_eq((int)rx_msg[0].flags, 0)) goto err; if (!TEST_int_eq((int)rx_msg[1].flags, 0)) goto err; if (!TEST_int_eq(compare_addr(addr3, addr1), 1)) goto err; if (!TEST_int_eq(compare_addr(addr5, addr1), 1)) goto err; if (!TEST_true(do_sendmmsg(b1, tx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; rx_msg[0].data_len = sizeof(rx_buf); rx_msg[1].data_len = sizeof(rx_buf2); if (!TEST_true(do_recvmmsg(b2, rx_msg, 2, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; if (rx_msg[0].local != NULL) { if (!TEST_int_eq(compare_addr(addr4, addr2), 1)) goto err; if (!TEST_int_eq(compare_addr(addr6, addr2), 1)) goto err; } for (i = 0; i < OSSL_NELEM(tx_msg); ++i) { tx_buf[i] = (char)i; tx_msg[i].data = tx_buf + i; tx_msg[i].data_len = 1; tx_msg[i].peer = addr2; tx_msg[i].local = use_local ? addr1 : NULL; tx_msg[i].flags = 0; } if (!TEST_true(do_sendmmsg(b1, tx_msg, OSSL_NELEM(tx_msg), 0, &num_processed)) || !TEST_size_t_eq(num_processed, OSSL_NELEM(tx_msg))) goto err; for (i = 0; i < OSSL_NELEM(rx_msg); ++i) { rx_buf[i] = '\0'; rx_msg[i].data = rx_buf + i; rx_msg[i].data_len = 1; rx_msg[i].peer = NULL; rx_msg[i].local = NULL; rx_msg[i].flags = 0; } if (!TEST_true(do_recvmmsg(b2, rx_msg, OSSL_NELEM(rx_msg), 0, &num_processed)) || !TEST_size_t_eq(num_processed, OSSL_NELEM(rx_msg))) goto err; if (!TEST_mem_eq(tx_buf, OSSL_NELEM(tx_msg), rx_buf, OSSL_NELEM(tx_msg))) goto err; testresult = 1; err: BIO_free(b1); BIO_free(b2); if (fd1 >= 0) BIO_closesocket(fd1); if (fd2 >= 0) BIO_closesocket(fd2); BIO_ADDR_free(addr1); BIO_ADDR_free(addr2); BIO_ADDR_free(addr3); BIO_ADDR_free(addr4); BIO_ADDR_free(addr5); BIO_ADDR_free(addr6); return testresult; } struct bio_dgram_case { int af, local; }; static const struct bio_dgram_case bio_dgram_cases[] = { { AF_INET, 0 }, #if OPENSSL_USE_IPV6 { AF_INET6, 0 }, #endif { AF_INET, 1 }, #if OPENSSL_USE_IPV6 { AF_INET6, 1 } #endif }; static int test_bio_dgram(int idx) { return test_bio_dgram_impl(bio_dgram_cases[idx].af, bio_dgram_cases[idx].local); } # if !defined(OPENSSL_NO_CHACHA) static int random_data(const uint32_t *key, uint8_t *data, size_t data_len, size_t offset) { int ret = 0, outl; EVP_CIPHER_CTX *ctx = NULL; EVP_CIPHER *cipher = NULL; static const uint8_t zeroes[2048]; uint32_t counter[4] = {0}; counter[0] = (uint32_t)offset; ctx = EVP_CIPHER_CTX_new(); if (ctx == NULL) goto err; cipher = EVP_CIPHER_fetch(NULL, "ChaCha20", NULL); if (cipher == NULL) goto err; if (EVP_EncryptInit_ex2(ctx, cipher, (uint8_t *)key, (uint8_t *)counter, NULL) == 0) goto err; while (data_len > 0) { outl = data_len > sizeof(zeroes) ? (int)sizeof(zeroes) : (int)data_len; if (EVP_EncryptUpdate(ctx, data, &outl, zeroes, outl) != 1) goto err; data += outl; data_len -= outl; } ret = 1; err: EVP_CIPHER_CTX_free(ctx); EVP_CIPHER_free(cipher); return ret; } static int test_bio_dgram_pair(int idx) { int testresult = 0, blen, mtu1, mtu2, r; BIO *bio1 = NULL, *bio2 = NULL; uint8_t scratch[2048 + 4], scratch2[2048]; uint32_t key[8]; size_t i, num_dgram, num_processed = 0; BIO_MSG msgs[2], rmsgs[2]; BIO_ADDR *addr1 = NULL, *addr2 = NULL, *addr3 = NULL, *addr4 = NULL; struct in_addr in_local; size_t total = 0; const uint32_t ref_caps = BIO_DGRAM_CAP_HANDLES_SRC_ADDR | BIO_DGRAM_CAP_HANDLES_DST_ADDR | BIO_DGRAM_CAP_PROVIDES_SRC_ADDR | BIO_DGRAM_CAP_PROVIDES_DST_ADDR; memset(msgs, 0, sizeof(msgs)); memset(rmsgs, 0, sizeof(rmsgs)); in_local.s_addr = ntohl(0x7f000001); for (i = 0; i < OSSL_NELEM(key); ++i) key[i] = test_random(); if (idx == 0) { if (!TEST_int_eq(BIO_new_bio_dgram_pair(&bio1, 0, &bio2, 0), 1)) goto err; } else { if (!TEST_ptr(bio1 = bio2 = BIO_new(BIO_s_dgram_mem()))) goto err; } mtu1 = BIO_dgram_get_mtu(bio1); if (!TEST_int_ge(mtu1, 1280)) goto err; if (idx == 1) { size_t bufsz; bufsz = 9 * (mtu1 + (sizeof(BIO_ADDR) * 2) + sizeof(size_t)); if (!TEST_true(BIO_set_write_buf_size(bio1, bufsz))) goto err; } mtu2 = BIO_dgram_get_mtu(bio2); if (!TEST_int_ge(mtu2, 1280)) goto err; if (!TEST_int_eq(mtu1, mtu2)) goto err; if (!TEST_int_le(mtu1, sizeof(scratch) - 4)) goto err; for (i = 0; total < 1 * 1024 * 1024; ++i) { if (!TEST_int_eq(random_data(key, scratch, sizeof(scratch), i), 1)) goto err; blen = ((*(uint32_t*)scratch) % mtu1) + 1; r = BIO_write(bio1, scratch + 4, blen); if (r == -1) break; if (!TEST_int_eq(r, blen)) goto err; total += blen; } if (idx <= 1 && !TEST_size_t_lt(total, 1 * 1024 * 1024)) goto err; if (idx == 2 && !TEST_size_t_ge(total, 1 * 1024 * 1024)) goto err; if (!TEST_int_ge(i, 9)) goto err; num_dgram = i; for (i = 0; i < num_dgram; ++i) { if (!TEST_int_eq(random_data(key, scratch, sizeof(scratch), i), 1)) goto err; blen = ((*(uint32_t*)scratch) % mtu1) + 1; r = BIO_read(bio2, scratch2, sizeof(scratch2)); if (!TEST_int_eq(r, blen)) goto err; if (!TEST_mem_eq(scratch + 4, blen, scratch2, blen)) goto err; } if (!TEST_int_eq(BIO_read(bio2, scratch2, sizeof(scratch2)), -1)) goto err; if (!TEST_int_eq(random_data(key, scratch, sizeof(scratch), 0), 1)) goto err; msgs[0].data = scratch; msgs[0].data_len = 19; msgs[1].data = scratch + 19; msgs[1].data_len = 46; if (!TEST_true(BIO_sendmmsg(bio1, msgs, sizeof(BIO_MSG), OSSL_NELEM(msgs), 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; rmsgs[0].data = scratch2; rmsgs[0].data_len = 64; rmsgs[1].data = scratch2 + 64; rmsgs[1].data_len = 64; if (!TEST_true(BIO_recvmmsg(bio2, rmsgs, sizeof(BIO_MSG), OSSL_NELEM(rmsgs), 0, &num_processed)) || !TEST_size_t_eq(num_processed, 2)) goto err; if (!TEST_mem_eq(rmsgs[0].data, rmsgs[0].data_len, scratch, 19)) goto err; if (!TEST_mem_eq(rmsgs[1].data, rmsgs[1].data_len, scratch + 19, 46)) goto err; addr1 = BIO_ADDR_new(); if (!TEST_ptr(addr1)) goto err; if (!TEST_int_eq(BIO_ADDR_rawmake(addr1, AF_INET, &in_local, sizeof(in_local), 1234), 1)) goto err; addr2 = BIO_ADDR_new(); if (!TEST_ptr(addr2)) goto err; if (!TEST_int_eq(BIO_ADDR_rawmake(addr2, AF_INET, &in_local, sizeof(in_local), 2345), 1)) goto err; addr3 = BIO_ADDR_new(); if (!TEST_ptr(addr3)) goto err; addr4 = BIO_ADDR_new(); if (!TEST_ptr(addr4)) goto err; msgs[0].peer = addr1; if (!TEST_false(BIO_sendmmsg(bio1, msgs, sizeof(BIO_MSG), OSSL_NELEM(msgs), 0, &num_processed)) || !TEST_size_t_eq(num_processed, 0)) goto err; if (!TEST_int_eq(BIO_dgram_set_caps(bio2, ref_caps), 1)) goto err; if (!TEST_int_eq(BIO_dgram_get_caps(bio2), ref_caps)) goto err; if (!TEST_int_eq(BIO_dgram_get_effective_caps(bio1), ref_caps)) goto err; if (idx == 0 && !TEST_int_eq(BIO_dgram_get_effective_caps(bio2), 0)) goto err; if (!TEST_int_eq(BIO_dgram_set_caps(bio1, ref_caps), 1)) goto err; if (!TEST_true(BIO_sendmmsg(bio1, msgs, sizeof(BIO_MSG), 1, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 1)) goto err; if (!TEST_int_eq(BIO_dgram_set_local_addr_enable(bio2, 1), 1)) goto err; rmsgs[0].data = scratch2; rmsgs[0].data_len = 64; rmsgs[0].peer = addr3; rmsgs[0].local = addr4; if (!TEST_true(BIO_recvmmsg(bio2, rmsgs, sizeof(BIO_MSG), OSSL_NELEM(rmsgs), 0, &num_processed)) || !TEST_size_t_eq(num_processed, 1)) goto err; if (!TEST_mem_eq(rmsgs[0].data, rmsgs[0].data_len, msgs[0].data, 19)) goto err; if (!TEST_int_eq(BIO_ADDR_family(addr3), 0)) goto err; if (!TEST_int_eq(BIO_ADDR_family(addr4), AF_INET)) goto err; if (!TEST_int_eq(BIO_ADDR_rawport(addr4), 1234)) goto err; msgs[0].local = addr2; if (!TEST_int_eq(BIO_dgram_set_local_addr_enable(bio1, 1), 1)) goto err; if (!TEST_true(BIO_sendmmsg(bio1, msgs, sizeof(BIO_MSG), 1, 0, &num_processed)) || !TEST_size_t_eq(num_processed, 1)) goto err; rmsgs[0].data = scratch2; rmsgs[0].data_len = 64; if (!TEST_true(BIO_recvmmsg(bio2, rmsgs, sizeof(BIO_MSG), OSSL_NELEM(rmsgs), 0, &num_processed)) || !TEST_size_t_eq(num_processed, 1)) goto err; if (!TEST_mem_eq(rmsgs[0].data, rmsgs[0].data_len, msgs[0].data, msgs[0].data_len)) goto err; if (!TEST_int_eq(BIO_ADDR_family(addr3), AF_INET)) goto err; if (!TEST_int_eq(BIO_ADDR_rawport(addr3), 2345)) goto err; if (!TEST_int_eq(BIO_ADDR_family(addr4), AF_INET)) goto err; if (!TEST_int_eq(BIO_ADDR_rawport(addr4), 1234)) goto err; r = BIO_write(bio1, scratch, 64); if (!TEST_int_eq(r, 64)) goto err; memset(scratch2, 0, 64); if (!TEST_int_eq(BIO_dgram_set_no_trunc(bio2, 1), 1)) goto err; if (!TEST_int_eq(BIO_read(bio2, scratch2, 32), -1)) goto err; if (!TEST_int_eq(BIO_pending(bio2), 64)) goto err; if (!TEST_int_eq(BIO_dgram_set_no_trunc(bio2, 0), 1)) goto err; if (!TEST_int_eq(BIO_read(bio2, scratch2, 32), 32)) goto err; if (!TEST_mem_eq(scratch, 32, scratch2, 32)) goto err; testresult = 1; err: if (idx == 0) BIO_free(bio1); BIO_free(bio2); BIO_ADDR_free(addr1); BIO_ADDR_free(addr2); BIO_ADDR_free(addr3); BIO_ADDR_free(addr4); return testresult; } # endif #endif int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } #if !defined(OPENSSL_NO_DGRAM) && !defined(OPENSSL_NO_SOCK) ADD_ALL_TESTS(test_bio_dgram, OSSL_NELEM(bio_dgram_cases)); # if !defined(OPENSSL_NO_CHACHA) ADD_ALL_TESTS(test_bio_dgram_pair, 3); # endif #endif return 1; }
test
openssl/test/bio_dgram_test.c
openssl
#include <string.h> #include <openssl/ssl.h> #include "helpers/quictestlib.h" #include "internal/quic_error.h" #include "testutil.h" static char *cert = NULL; static char *privkey = NULL; static size_t ncid_injected; static int add_ncid_frame_cb(QTEST_FAULT *fault, QUIC_PKT_HDR *hdr, unsigned char *buf, size_t len, void *cbarg) { static unsigned char new_conn_id_frame[] = { 0x18, 0x01, 0x01, 0x08, 0x33, 0x44, 0x55, 0x66, 0xde, 0xad, 0xbe, 0xef, 0xab, 0xcd, 0xef, 0x01, 0x12, 0x32, 0x23, 0x45, 0x56, 0x06, 0x08, 0x89, 0xa1, 0xb2, 0xc3, 0xd4 }; if (ncid_injected++) return 1; return qtest_fault_prepend_frame(fault, new_conn_id_frame, sizeof(new_conn_id_frame)); } static int test_ncid_frame(int fail) { int testresult = 0; SSL_CTX *cctx = SSL_CTX_new(OSSL_QUIC_client_method()); QUIC_TSERVER *qtserv = NULL; SSL *cssl = NULL; char *msg = "Hello World!"; size_t msglen = strlen(msg); unsigned char buf[80]; size_t byteswritten; size_t bytesread; QTEST_FAULT *fault = NULL; static const QUIC_CONN_ID conn_id = { 0x08, {0x33, 0x44, 0x55, 0x66, 0xde, 0xad, 0xbe, 0xef} }; ncid_injected = 0; if (!TEST_ptr(cctx)) goto err; if (!TEST_true(qtest_create_quic_objects(NULL, cctx, NULL, cert, privkey, 0, &qtserv, &cssl, &fault, NULL))) goto err; if (!TEST_true(qtest_create_quic_connection(qtserv, cssl))) goto err; if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) goto err; ossl_quic_tserver_tick(qtserv); if (!TEST_true(ossl_quic_tserver_read(qtserv, 0, buf, sizeof(buf), &bytesread))) goto err; if (!TEST_mem_eq(msg, msglen, buf, bytesread)) goto err; if (!TEST_true(qtest_fault_set_packet_plain_listener(fault, add_ncid_frame_cb, NULL))) goto err; if (!fail && !TEST_true(ossl_quic_tserver_set_new_local_cid(qtserv, &conn_id))) goto err; if (!TEST_true(ossl_quic_tserver_write(qtserv, 0, (unsigned char *)msg, msglen, &byteswritten))) goto err; if (!TEST_true(ncid_injected)) goto err; if (!TEST_size_t_eq(msglen, byteswritten)) goto err; ossl_quic_tserver_tick(qtserv); if (!TEST_true(SSL_handle_events(cssl))) goto err; if (!TEST_int_eq(SSL_read(cssl, buf, sizeof(buf)), msglen)) goto err; if (!TEST_mem_eq(msg, msglen, buf, bytesread)) goto err; if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) goto err; ossl_quic_tserver_tick(qtserv); if (!TEST_true(ossl_quic_tserver_read(qtserv, 0, buf, sizeof(buf), &bytesread))) goto err; if (fail) { if (!TEST_size_t_eq(bytesread, 0)) goto err; } else { if (!TEST_mem_eq(msg, msglen, buf, bytesread)) goto err; } testresult = 1; err: qtest_fault_free(fault); SSL_free(cssl); ossl_quic_tserver_free(qtserv); SSL_CTX_free(cctx); return testresult; } OPT_TEST_DECLARE_USAGE("certsdir\n") int setup_tests(void) { char *certsdir = NULL; if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(certsdir = test_get_argument(0))) return 0; cert = test_mk_file_path(certsdir, "servercert.pem"); if (cert == NULL) goto err; privkey = test_mk_file_path(certsdir, "serverkey.pem"); if (privkey == NULL) goto err; ADD_ALL_TESTS(test_ncid_frame, 2); return 1; err: OPENSSL_free(cert); OPENSSL_free(privkey); return 0; } void cleanup_tests(void) { OPENSSL_free(cert); OPENSSL_free(privkey); }
test
openssl/test/quic_newcid_test.c
openssl
#ifndef OPENSSL_NO_DEPRECATED_3_0 # define OPENSSL_SUPPRESS_DEPRECATED #endif #include <openssl/ssl.h> #include "internal/nelem.h" #include "helpers/ssltestlib.h" #include "testutil.h" #include "../ssl/ssl_local.h" #undef OSSL_NO_USABLE_TLS1_3 #if defined(OPENSSL_NO_TLS1_3) \ || (defined(OPENSSL_NO_EC) && defined(OPENSSL_NO_DH)) # define OSSL_NO_USABLE_TLS1_3 #endif #if !defined(OSSL_NO_USEABLE_TLS1_3) static char *certsdir = NULL; static char *cert = NULL; static char *privkey = NULL; static int client_cert_cb(SSL *ssl, X509 **x509, EVP_PKEY **pkey) { X509 *xcert; EVP_PKEY *privpkey; BIO *in = NULL; BIO *priv_in = NULL; if (!TEST_ptr(SSL_get0_peer_certificate(ssl))) return 0; in = BIO_new_file(cert, "r"); if (!TEST_ptr(in)) return 0; if (!TEST_ptr(xcert = X509_new_ex(NULL, NULL)) || !TEST_ptr(PEM_read_bio_X509(in, &xcert, NULL, NULL)) || !TEST_ptr(priv_in = BIO_new_file(privkey, "r")) || !TEST_ptr(privpkey = PEM_read_bio_PrivateKey_ex(priv_in, NULL, NULL, NULL, NULL, NULL))) goto err; *x509 = xcert; *pkey = privpkey; BIO_free(in); BIO_free(priv_in); return 1; err: X509_free(xcert); BIO_free(in); BIO_free(priv_in); return 0; } static int verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx) { return 1; } static int ssl_comp_cert(SSL *ssl, int alg) { unsigned char *comp_data = NULL; size_t comp_len = 0; size_t orig_len = 0; int retval = 0; if (!TEST_size_t_gt(comp_len = SSL_get1_compressed_cert(ssl, alg, &comp_data, &orig_len), 0)) goto err; if (!TEST_true(SSL_set1_compressed_cert(ssl, alg, comp_data, comp_len, orig_len))) goto err; retval = alg; err: OPENSSL_free(comp_data); return retval; } static void cert_comp_info_cb(const SSL *s, int where, int ret) { int *seen = (int*)SSL_get_app_data(s); if (SSL_is_server(s)) { if (!strcmp(SSL_state_string(s), "TRCCC") && seen != NULL) *seen = 1; } else { if (!strcmp(SSL_state_string(s), "TRSCC") && seen != NULL) *seen = 1; } } static int test_ssl_cert_comp(int test) { SSL_CTX *cctx = NULL, *sctx = NULL; SSL *clientssl = NULL, *serverssl = NULL; int testresult = 0; int expected_client = TLSEXT_comp_cert_none; int expected_server = TLSEXT_comp_cert_none; int client_seen = 0; int server_seen = 0; int server_pref[] = { TLSEXT_comp_cert_zstd, TLSEXT_comp_cert_zlib, TLSEXT_comp_cert_brotli }; int client_pref[] = { TLSEXT_comp_cert_brotli, TLSEXT_comp_cert_zlib, TLSEXT_comp_cert_zstd }; #ifndef OPENSSL_NO_BROTLI expected_server = TLSEXT_comp_cert_brotli; expected_client = TLSEXT_comp_cert_brotli; #endif #ifndef OPENSSL_NO_ZLIB expected_server = TLSEXT_comp_cert_zlib; if (expected_client == TLSEXT_comp_cert_none) expected_client = TLSEXT_comp_cert_zlib; #endif #ifndef OPENSSL_NO_ZSTD expected_server = TLSEXT_comp_cert_zstd; if (expected_client == TLSEXT_comp_cert_none) expected_client = TLSEXT_comp_cert_zstd; #endif if (test == 3 && expected_client == expected_server) { TEST_info("Only one compression algorithm configured"); return 1; } if (!TEST_true(create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_3_VERSION, 0, &sctx, &cctx, cert, privkey))) goto end; if (test == 3) { server_pref[0] = expected_server; server_pref[1] = expected_client; if (!TEST_true(SSL_CTX_set1_cert_comp_preference(sctx, server_pref, 2))) goto end; client_pref[0] = expected_client; if (!TEST_true(SSL_CTX_set1_cert_comp_preference(cctx, client_pref, 1))) goto end; } else { if (!TEST_true(SSL_CTX_set1_cert_comp_preference(sctx, server_pref, OSSL_NELEM(server_pref)))) goto end; if (!TEST_true(SSL_CTX_set1_cert_comp_preference(cctx, client_pref, OSSL_NELEM(client_pref)))) goto end; } if (test == 2) { SSL_CTX_set_client_cert_cb(cctx, client_cert_cb); SSL_CTX_set_verify(sctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, verify_cb); } if (test == 1 || test== 2 || test == 3) { if (!TEST_true(SSL_CTX_compress_certs(sctx, expected_server))) goto end; } if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL, NULL))) goto end; if (!TEST_true(SSL_set_app_data(clientssl, &client_seen))) goto end; if (!TEST_true(SSL_set_app_data(serverssl, &server_seen))) goto end; SSL_set_info_callback(clientssl, cert_comp_info_cb); SSL_set_info_callback(serverssl, cert_comp_info_cb); if (test == 0) { if (!TEST_int_eq(ssl_comp_cert(serverssl, expected_server), expected_server)) goto end; } if (!TEST_true(create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE))) goto end; if (test == 3) { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(serverssl); if (!TEST_int_eq(sc->cert->key->cert_comp_used, 0)) goto end; if (!TEST_false(*(int*)SSL_get_app_data(clientssl))) goto end; } else { SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(serverssl); if (!TEST_int_gt(sc->cert->key->cert_comp_used, 0)) goto end; if (!TEST_true(*(int*)SSL_get_app_data(clientssl))) goto end; } if (test == 2) { if (!TEST_true(*(int*)SSL_get_app_data(serverssl))) goto end; } testresult = 1; end: SSL_free(serverssl); SSL_free(clientssl); SSL_CTX_free(sctx); SSL_CTX_free(cctx); return testresult; } #endif OPT_TEST_DECLARE_USAGE("certdir\n") int setup_tests(void) { #if !defined(OSSL_NO_USEABLE_TLS1_3) if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(certsdir = test_get_argument(0))) return 0; cert = test_mk_file_path(certsdir, "servercert.pem"); if (cert == NULL) goto err; privkey = test_mk_file_path(certsdir, "serverkey.pem"); if (privkey == NULL) goto err; ADD_ALL_TESTS(test_ssl_cert_comp, 4); return 1; err: OPENSSL_free(cert); OPENSSL_free(privkey); return 0; #else return 1; #endif } void cleanup_tests(void) { #if !defined(OSSL_NO_USEABLE_TLS1_3) OPENSSL_free(cert); OPENSSL_free(privkey); #endif }
test
openssl/test/cert_comp_test.c
openssl
#include <string.h> #include <openssl/types.h> #include "testutil.h" #include "internal/numbers.h" #include "internal/time.h" static int test_sanity_null_zero(void) { char *p; char bytes[sizeof(p)]; p = NULL; memset(bytes, 0, sizeof(bytes)); return TEST_mem_eq(&p, sizeof(p), bytes, sizeof(bytes)); } static int test_sanity_enum_size(void) { enum smallchoices { sa, sb, sc }; enum medchoices { ma, mb, mc, md, me, mf, mg, mh, mi, mj, mk, ml }; enum largechoices { a01, b01, c01, d01, e01, f01, g01, h01, i01, j01, a02, b02, c02, d02, e02, f02, g02, h02, i02, j02, a03, b03, c03, d03, e03, f03, g03, h03, i03, j03, a04, b04, c04, d04, e04, f04, g04, h04, i04, j04, a05, b05, c05, d05, e05, f05, g05, h05, i05, j05, a06, b06, c06, d06, e06, f06, g06, h06, i06, j06, a07, b07, c07, d07, e07, f07, g07, h07, i07, j07, a08, b08, c08, d08, e08, f08, g08, h08, i08, j08, a09, b09, c09, d09, e09, f09, g09, h09, i09, j09, a10, b10, c10, d10, e10, f10, g10, h10, i10, j10, xxx }; if (!TEST_size_t_eq(sizeof(enum smallchoices), sizeof(int)) || !TEST_size_t_eq(sizeof(enum medchoices), sizeof(int)) || !TEST_size_t_eq(sizeof(enum largechoices), sizeof(int))) return 0; return 1; } static int test_sanity_twos_complement(void) { if (!TEST_int_eq(~(-1), 0) || !TEST_long_eq(~(-1L), 0L)) return 0; return 1; } static int test_sanity_sign(void) { if (!TEST_int_eq(-(INT_MIN + 1), INT_MAX) || !TEST_long_eq(-(LONG_MIN + 1), LONG_MAX)) return 0; return 1; } static int test_sanity_unsigned_conversion(void) { if (!TEST_int_eq((int)((unsigned int)INT_MAX + 1), INT_MIN) || !TEST_long_eq((long)((unsigned long)LONG_MAX + 1), LONG_MIN)) return 0; return 1; } static int test_sanity_range(void) { if (!TEST_size_t_eq(sizeof(int8_t), 1) || !TEST_size_t_eq(sizeof(uint8_t), 1) || !TEST_size_t_eq(sizeof(int16_t), 2) || !TEST_size_t_eq(sizeof(uint16_t), 2) || !TEST_size_t_eq(sizeof(int32_t), 4) || !TEST_size_t_eq(sizeof(uint32_t), 4) || !TEST_size_t_eq(sizeof(int64_t), 8) || !TEST_size_t_eq(sizeof(uint64_t), 8) #ifdef UINT128_MAX || !TEST_size_t_eq(sizeof(int128_t), 16) || !TEST_size_t_eq(sizeof(uint128_t), 16) #endif || !TEST_size_t_eq(sizeof(char), 1) || !TEST_size_t_eq(sizeof(unsigned char), 1)) return 0; if (!TEST_size_t_ge(sizeof(long long int), 8) || !TEST_size_t_ge(sizeof(unsigned long long int), 8)) return 0; if (!TEST_size_t_ge(sizeof(ossl_intmax_t), 8) || !TEST_size_t_ge(sizeof(ossl_uintmax_t), 8) || !TEST_size_t_ge(sizeof(ossl_uintmax_t), sizeof(size_t))) return 0; if (SIZE_MAX < INT_MAX) { TEST_error("int must not be wider than size_t"); return 0; } if (SIZE_MAX - INT_MAX <= INT_MAX) { TEST_error("SIZE_MAX must exceed 2*INT_MAX"); return 0; } return 1; } static int test_sanity_memcmp(void) { return CRYPTO_memcmp("ab", "cd", 2); } static int test_sanity_sleep(void) { OSSL_TIME start = ossl_time_now(); uint64_t seconds; OSSL_sleep(1000); seconds = ossl_time2seconds(ossl_time_subtract(ossl_time_now(), start)); if (!TEST_uint64_t_ge(seconds, 1) || !TEST_uint64_t_le(seconds, 20)) return 0; return 1; } int setup_tests(void) { ADD_TEST(test_sanity_null_zero); ADD_TEST(test_sanity_enum_size); ADD_TEST(test_sanity_twos_complement); ADD_TEST(test_sanity_sign); ADD_TEST(test_sanity_unsigned_conversion); ADD_TEST(test_sanity_range); ADD_TEST(test_sanity_memcmp); ADD_TEST(test_sanity_sleep); return 1; }
test
openssl/test/sanitytest.c
openssl
#include <openssl/ssl.h> #include "helpers/ssltestlib.h" #include "internal/dane.h" #include "testutil.h" #undef OSSL_NO_USABLE_TLS1_3 #if defined(OPENSSL_NO_TLS1_3) \ || (defined(OPENSSL_NO_EC) && defined(OPENSSL_NO_DH)) # define OSSL_NO_USABLE_TLS1_3 #endif static char *certsdir = NULL; static char *rootcert = NULL; static char *cert = NULL; static char *privkey = NULL; static char *cert2 = NULL; static char *privkey2 = NULL; static char *cert448 = NULL; static char *privkey448 = NULL; static char *cert25519 = NULL; static char *privkey25519 = NULL; static OSSL_LIB_CTX *libctx = NULL; static OSSL_PROVIDER *defctxnull = NULL; static const unsigned char cert_type_rpk[] = { TLSEXT_cert_type_rpk, TLSEXT_cert_type_x509 }; static const unsigned char SID_CTX[] = { 'r', 'p', 'k' }; static int rpk_verify_client_cb(int ok, X509_STORE_CTX *ctx) { int err = X509_STORE_CTX_get_error(ctx); if (X509_STORE_CTX_get0_rpk(ctx) != NULL) { if (err != X509_V_OK) { TEST_info("rpk_verify_client_cb: ok=%d err=%d", ok, err); return 0; } } return 1; } static int rpk_verify_server_cb(int ok, X509_STORE_CTX *ctx) { int err = X509_STORE_CTX_get_error(ctx); if (X509_STORE_CTX_get0_rpk(ctx) != NULL) { if (err != X509_V_OK) { TEST_info("rpk_verify_server_cb: ok=%d err=%d", ok, err); return 0; } } return 1; } static int test_rpk(int idx) { # define RPK_TESTS 16 # define RPK_DIMS (2 * 4 * 2 * 2 * 2 * 2) SSL_CTX *cctx = NULL, *sctx = NULL; SSL *clientssl = NULL, *serverssl = NULL; EVP_PKEY *pkey = NULL, *other_pkey = NULL, *root_pkey = NULL; X509 *x509 = NULL, *other_x509 = NULL, *root_x509 = NULL; int testresult = 0, ret, expected = 1; int client_expected = X509_V_OK; int verify; int tls_version; char *cert_file = NULL; char *privkey_file = NULL; char *other_cert_file = NULL; SSL_SESSION *client_sess = NULL; SSL_SESSION *server_sess = NULL; int idx_server_server_rpk, idx_server_client_rpk; int idx_client_server_rpk, idx_client_client_rpk; int idx_cert, idx_prot; int client_auth = 0; int resumption = 0; long server_verify_result = 0; long client_verify_result = 0; OSSL_LIB_CTX *test_libctx = NULL; if (!TEST_int_le(idx, RPK_TESTS * RPK_DIMS)) return 0; idx_server_server_rpk = idx / (RPK_TESTS * 2 * 4 * 2 * 2 * 2); idx %= RPK_TESTS * 2 * 4 * 2 * 2 * 2; idx_server_client_rpk = idx / (RPK_TESTS * 2 * 4 * 2 * 2); idx %= RPK_TESTS * 2 * 4 * 2 * 2; idx_client_server_rpk = idx / (RPK_TESTS * 2 * 4 * 2); idx %= RPK_TESTS * 2 * 4 * 2; idx_client_client_rpk = idx / (RPK_TESTS * 2 * 4); idx %= RPK_TESTS * 2 * 4; idx_cert = idx / (RPK_TESTS * 2); idx %= RPK_TESTS * 2; idx_prot = idx / RPK_TESTS; idx %= RPK_TESTS; root_x509 = load_cert_pem(rootcert, NULL); if (!TEST_ptr(root_x509)) goto end; root_pkey = X509_get0_pubkey(root_x509); if (!TEST_ptr(root_pkey)) goto end; switch (idx_cert) { case 0: cert_file = cert; privkey_file = privkey; other_cert_file = cert2; break; #ifndef OPENSSL_NO_ECDSA case 1: cert_file = cert2; privkey_file = privkey2; other_cert_file = cert; break; # ifndef OPENSSL_NO_ECX case 2: cert_file = cert448; privkey_file = privkey448; other_cert_file = cert; break; case 3: cert_file = cert25519; privkey_file = privkey25519; other_cert_file = cert; break; # endif #endif default: testresult = TEST_skip("EDCSA disabled"); goto end; } x509 = load_cert_pem(cert_file, NULL); if (!TEST_ptr(x509)) goto end; pkey = X509_get0_pubkey(x509); other_x509 = load_cert_pem(other_cert_file, NULL); if (!TEST_ptr(other_x509)) goto end; other_pkey = X509_get0_pubkey(other_x509); #ifdef OPENSSL_NO_ECDSA if (other_pkey == NULL && idx_cert == 0 && (idx == 4 || idx == 6 || idx == 7)) { testresult = TEST_skip("EDCSA disabled"); goto end; } #endif switch (idx_prot) { case 0: #ifdef OSSL_NO_USABLE_TLS1_3 testresult = TEST_skip("TLSv1.3 disabled"); goto end; #else tls_version = TLS1_3_VERSION; break; #endif case 1: #ifdef OPENSSL_NO_TLS1_2 testresult = TEST_skip("TLSv1.2 disabled"); goto end; #else tls_version = TLS1_2_VERSION; break; #endif default: goto end; } if (idx == 15) { test_libctx = libctx; defctxnull = OSSL_PROVIDER_load(NULL, "null"); if (!TEST_ptr(defctxnull)) goto end; } if (!TEST_true(create_ssl_ctx_pair(test_libctx, TLS_server_method(), TLS_client_method(), tls_version, tls_version, &sctx, &cctx, NULL, NULL))) goto end; if (idx_server_server_rpk) if (!TEST_true(SSL_CTX_set1_server_cert_type(sctx, cert_type_rpk, sizeof(cert_type_rpk)))) goto end; if (idx_server_client_rpk) if (!TEST_true(SSL_CTX_set1_client_cert_type(sctx, cert_type_rpk, sizeof(cert_type_rpk)))) goto end; if (idx_client_server_rpk) if (!TEST_true(SSL_CTX_set1_server_cert_type(cctx, cert_type_rpk, sizeof(cert_type_rpk)))) goto end; if (idx_client_client_rpk) if (!TEST_true(SSL_CTX_set1_client_cert_type(cctx, cert_type_rpk, sizeof(cert_type_rpk)))) goto end; if (!TEST_true(SSL_CTX_set_session_id_context(sctx, SID_CTX, sizeof(SID_CTX)))) goto end; if (!TEST_true(SSL_CTX_set_session_id_context(cctx, SID_CTX, sizeof(SID_CTX)))) goto end; if (!TEST_int_gt(SSL_CTX_dane_enable(sctx), 0)) goto end; if (!TEST_int_gt(SSL_CTX_dane_enable(cctx), 0)) goto end; SSL_CTX_set_verify(cctx, SSL_VERIFY_PEER, rpk_verify_client_cb); if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL, NULL))) goto end; if (!TEST_int_gt(SSL_dane_enable(serverssl, NULL), 0)) goto end; if (!TEST_int_gt(SSL_dane_enable(clientssl, "example.com"), 0)) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(serverssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (idx == 1) { if (idx_server_server_rpk == 0 || idx_client_server_rpk == 0) expected = 0; } else { if (!TEST_int_eq(SSL_use_certificate_file(serverssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(serverssl), 1)) goto end; } switch (idx) { default: if (!TEST_true(idx < RPK_TESTS)) goto end; break; case 0: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; break; case 1: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; break; case 2: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); client_auth = 1; break; case 3: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(clientssl, root_pkey))) goto end; break; case 4: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(clientssl, other_pkey))) goto end; break; case 5: if (!TEST_true(SSL_add_expected_rpk(clientssl, root_pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; break; case 6: if (!TEST_true(SSL_add_expected_rpk(clientssl, other_pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; break; case 7: if (idx_server_server_rpk == 1 && idx_client_server_rpk == 1) client_expected = -1; if (!TEST_true(SSL_add_expected_rpk(clientssl, other_pkey))) goto end; client_verify_result = X509_V_ERR_DANE_NO_MATCH; break; case 8: if (idx_server_server_rpk == 1 && idx_client_server_rpk == 1) client_expected = -1; client_verify_result = X509_V_ERR_RPK_UNTRUSTED; break; case 9: if (tls_version != TLS1_3_VERSION) { testresult = TEST_skip("PHA requires TLSv1.3"); goto end; } if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT | SSL_VERIFY_POST_HANDSHAKE, rpk_verify_server_cb); SSL_set_post_handshake_auth(clientssl, 1); client_auth = 1; break; case 10: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!idx_server_client_rpk || !idx_client_client_rpk) expected = 0; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); client_auth = 1; break; case 11: if (!idx_server_server_rpk || !idx_client_server_rpk) { testresult = TEST_skip("Only testing resumption with server RPK"); goto end; } if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; resumption = 1; break; case 12: if (!idx_server_server_rpk || !idx_client_server_rpk) { testresult = TEST_skip("Only testing resumption with server RPK"); goto end; } if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; SSL_set_options(serverssl, SSL_OP_NO_TICKET); SSL_set_options(clientssl, SSL_OP_NO_TICKET); resumption = 1; break; case 13: if (!idx_server_server_rpk || !idx_client_server_rpk) { testresult = TEST_skip("Only testing resumption with server RPK"); goto end; } if (!idx_server_client_rpk || !idx_client_client_rpk) { testresult = TEST_skip("Only testing client authentication resumption with client RPK"); goto end; } if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); client_auth = 1; resumption = 1; break; case 14: if (!idx_server_server_rpk || !idx_client_server_rpk) { testresult = TEST_skip("Only testing resumption with server RPK"); goto end; } if (!idx_server_client_rpk || !idx_client_client_rpk) { testresult = TEST_skip("Only testing client authentication resumption with client RPK"); goto end; } if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); SSL_set_options(serverssl, SSL_OP_NO_TICKET); SSL_set_options(clientssl, SSL_OP_NO_TICKET); client_auth = 1; resumption = 1; break; case 15: if (!TEST_true(SSL_add_expected_rpk(clientssl, pkey))) goto end; break; } ret = create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE); if (!TEST_int_eq(expected, ret)) goto end; if (expected == 1) { if (idx_server_server_rpk && idx_client_server_rpk) { if (!TEST_long_eq(SSL_get_verify_result(clientssl), client_verify_result)) goto end; if (!TEST_ptr(SSL_get0_peer_rpk(clientssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(serverssl), TLSEXT_cert_type_rpk)) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(clientssl), TLSEXT_cert_type_rpk)) goto end; } else { if (!TEST_ptr(SSL_get0_peer_certificate(clientssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(serverssl), TLSEXT_cert_type_x509)) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(clientssl), TLSEXT_cert_type_x509)) goto end; } } if (idx == 9) { if (!TEST_true(SSL_verify_client_post_handshake(serverssl))) goto end; if (!TEST_true(SSL_do_handshake(serverssl))) goto end; if (!TEST_int_le(SSL_read(clientssl, NULL, 0), 0)) goto end; if (!TEST_int_le(SSL_read(serverssl, NULL, 0), 0)) goto end; } if (client_auth) { if (idx_server_client_rpk && idx_client_client_rpk) { if (!TEST_long_eq(SSL_get_verify_result(serverssl), server_verify_result)) goto end; if (!TEST_ptr(SSL_get0_peer_rpk(serverssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(serverssl), TLSEXT_cert_type_rpk)) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(clientssl), TLSEXT_cert_type_rpk)) goto end; } else { if (expected == 1 && !TEST_ptr(SSL_get0_peer_certificate(serverssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(serverssl), TLSEXT_cert_type_x509)) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(clientssl), TLSEXT_cert_type_x509)) goto end; } } if (resumption) { EVP_PKEY *client_pkey = NULL; EVP_PKEY *server_pkey = NULL; if (!TEST_ptr((client_sess = SSL_get1_session(clientssl))) || !TEST_ptr((client_pkey = SSL_SESSION_get0_peer_rpk(client_sess)))) goto end; if (client_auth) { if (!TEST_ptr((server_sess = SSL_get1_session(serverssl))) || !TEST_ptr((server_pkey = SSL_SESSION_get0_peer_rpk(server_sess)))) goto end; } SSL_shutdown(clientssl); SSL_shutdown(serverssl); SSL_free(clientssl); SSL_free(serverssl); serverssl = clientssl = NULL; if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL, NULL)) || !TEST_true(SSL_set_session(clientssl, client_sess))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(serverssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(serverssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(serverssl), 1)) goto end; if (!TEST_int_gt(SSL_dane_enable(serverssl, "example.com"), 0)) goto end; if (!TEST_int_gt(SSL_dane_enable(clientssl, "example.com"), 0)) goto end; switch (idx) { default: break; case 11: if (!TEST_true(SSL_add_expected_rpk(clientssl, client_pkey))) goto end; break; case 12: if (!TEST_true(SSL_add_expected_rpk(clientssl, client_pkey))) goto end; SSL_set_options(clientssl, SSL_OP_NO_TICKET); SSL_set_options(serverssl, SSL_OP_NO_TICKET); break; case 13: if (!TEST_true(SSL_add_expected_rpk(clientssl, client_pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, server_pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); break; case 14: if (!TEST_true(SSL_add_expected_rpk(clientssl, client_pkey))) goto end; if (!TEST_true(SSL_add_expected_rpk(serverssl, server_pkey))) goto end; if (!TEST_int_eq(SSL_use_PrivateKey_file(clientssl, privkey_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_use_certificate_file(clientssl, cert_file, SSL_FILETYPE_PEM), 1)) goto end; if (!TEST_int_eq(SSL_check_private_key(clientssl), 1)) goto end; SSL_set_verify(serverssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, rpk_verify_server_cb); SSL_set_options(serverssl, SSL_OP_NO_TICKET); SSL_set_options(clientssl, SSL_OP_NO_TICKET); break; } ret = create_ssl_connection(serverssl, clientssl, SSL_ERROR_NONE); if (!TEST_int_eq(expected, ret)) goto end; verify = SSL_get_verify_result(clientssl); if (!TEST_int_eq(client_expected, verify)) goto end; if (!TEST_true(SSL_session_reused(clientssl))) goto end; if (!TEST_ptr(SSL_get0_peer_rpk(clientssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(serverssl), TLSEXT_cert_type_rpk)) goto end; if (!TEST_int_eq(SSL_get_negotiated_server_cert_type(clientssl), TLSEXT_cert_type_rpk)) goto end; if (client_auth) { if (!TEST_ptr(SSL_get0_peer_rpk(serverssl))) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(serverssl), TLSEXT_cert_type_rpk)) goto end; if (!TEST_int_eq(SSL_get_negotiated_client_cert_type(clientssl), TLSEXT_cert_type_rpk)) goto end; } } testresult = 1; end: OSSL_PROVIDER_unload(defctxnull); defctxnull = NULL; SSL_SESSION_free(client_sess); SSL_SESSION_free(server_sess); SSL_free(serverssl); SSL_free(clientssl); SSL_CTX_free(sctx); SSL_CTX_free(cctx); X509_free(x509); X509_free(other_x509); X509_free(root_x509); if (testresult == 0) { TEST_info("idx_ss_rpk=%d, idx_sc_rpk=%d, idx_cs_rpk=%d, idx_cc_rpk=%d, idx_cert=%d, idx_prot=%d, idx=%d", idx_server_server_rpk, idx_server_client_rpk, idx_client_server_rpk, idx_client_client_rpk, idx_cert, idx_prot, idx); } return testresult; } static int test_rpk_api(void) { int ret = 0; SSL_CTX *cctx = NULL, *sctx = NULL; unsigned char cert_type_dups[] = { TLSEXT_cert_type_rpk, TLSEXT_cert_type_x509, TLSEXT_cert_type_x509 }; unsigned char cert_type_bad[] = { 0xFF }; unsigned char cert_type_extra[] = { TLSEXT_cert_type_rpk, TLSEXT_cert_type_x509, 0xFF }; unsigned char cert_type_unsup[] = { TLSEXT_cert_type_pgp, TLSEXT_cert_type_1609dot2 }; unsigned char cert_type_just_x509[] = { TLSEXT_cert_type_x509 }; unsigned char cert_type_just_rpk[] = { TLSEXT_cert_type_rpk }; if (!TEST_true(create_ssl_ctx_pair(NULL, TLS_server_method(), TLS_client_method(), TLS1_2_VERSION, TLS1_2_VERSION, &sctx, &cctx, NULL, NULL))) goto end; if (!TEST_false(SSL_CTX_set1_server_cert_type(sctx, cert_type_dups, sizeof(cert_type_dups)))) goto end; if (!TEST_false(SSL_CTX_set1_server_cert_type(sctx, cert_type_bad, sizeof(cert_type_bad)))) goto end; if (!TEST_false(SSL_CTX_set1_server_cert_type(sctx, cert_type_extra, sizeof(cert_type_extra)))) goto end; if (!TEST_false(SSL_CTX_set1_server_cert_type(sctx, cert_type_unsup, sizeof(cert_type_unsup)))) goto end; if (!TEST_true(SSL_CTX_set1_server_cert_type(sctx, cert_type_just_x509, sizeof(cert_type_just_x509)))) goto end; if (!TEST_true(SSL_CTX_set1_server_cert_type(sctx, cert_type_just_rpk, sizeof(cert_type_just_rpk)))) goto end; ret = 1; end: SSL_CTX_free(sctx); SSL_CTX_free(cctx); return ret; } OPT_TEST_DECLARE_USAGE("certdir\n") int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(certsdir = test_get_argument(0))) return 0; rootcert = test_mk_file_path(certsdir, "rootcert.pem"); if (rootcert == NULL) goto err; cert = test_mk_file_path(certsdir, "servercert.pem"); if (cert == NULL) goto err; privkey = test_mk_file_path(certsdir, "serverkey.pem"); if (privkey == NULL) goto err; cert2 = test_mk_file_path(certsdir, "server-ecdsa-cert.pem"); if (cert2 == NULL) goto err; privkey2 = test_mk_file_path(certsdir, "server-ecdsa-key.pem"); if (privkey2 == NULL) goto err; cert448 = test_mk_file_path(certsdir, "server-ed448-cert.pem"); if (cert2 == NULL) goto err; privkey448 = test_mk_file_path(certsdir, "server-ed448-key.pem"); if (privkey2 == NULL) goto err; cert25519 = test_mk_file_path(certsdir, "server-ed25519-cert.pem"); if (cert2 == NULL) goto err; privkey25519 = test_mk_file_path(certsdir, "server-ed25519-key.pem"); if (privkey2 == NULL) goto err; libctx = OSSL_LIB_CTX_new(); if (libctx == NULL) goto err; ADD_TEST(test_rpk_api); ADD_ALL_TESTS(test_rpk, RPK_TESTS * RPK_DIMS); return 1; err: return 0; } void cleanup_tests(void) { OPENSSL_free(rootcert); OPENSSL_free(cert); OPENSSL_free(privkey); OPENSSL_free(cert2); OPENSSL_free(privkey2); OPENSSL_free(cert448); OPENSSL_free(privkey448); OPENSSL_free(cert25519); OPENSSL_free(privkey25519); OSSL_LIB_CTX_free(libctx); }
test
openssl/test/rpktest.c
openssl
#include <openssl/crypto.h> #include <string.h> #include "crypto/punycode.h" #include "internal/nelem.h" #include "internal/packet.h" #include "testutil.h" static const struct puny_test { unsigned int raw[50]; const char *encoded; } puny_cases[] = { { { 0x1F600 }, "e28h" }, { { 0x0644, 0x064A, 0x0647, 0x0645, 0x0627, 0x0628, 0x062A, 0x0643, 0x0644, 0x0645, 0x0648, 0x0634, 0x0639, 0x0631, 0x0628, 0x064A, 0x061F }, "egbpdaj6bu4bxfgehfvwxn" }, { { 0x4ED6, 0x4EEC, 0x4E3A, 0x4EC0, 0x4E48, 0x4E0D, 0x8BF4, 0x4E2D, 0x6587 }, "ihqwcrb4cv8a8dqg056pqjye" }, { { 0x4ED6, 0x5011, 0x7232, 0x4EC0, 0x9EBD, 0x4E0D, 0x8AAA, 0x4E2D, 0x6587 }, "ihqwctvzc91f659drss3x8bo0yb" }, { { 0x0050, 0x0072, 0x006F, 0x010D, 0x0070, 0x0072, 0x006F, 0x0073, 0x0074, 0x011B, 0x006E, 0x0065, 0x006D, 0x006C, 0x0075, 0x0076, 0x00ED, 0x010D, 0x0065, 0x0073, 0x006B, 0x0079 }, "Proprostnemluvesky-uyb24dma41a" }, { { 0x05DC, 0x05DE, 0x05D4, 0x05D4, 0x05DD, 0x05E4, 0x05E9, 0x05D5, 0x05D8, 0x05DC, 0x05D0, 0x05DE, 0x05D3, 0x05D1, 0x05E8, 0x05D9, 0x05DD, 0x05E2, 0x05D1, 0x05E8, 0x05D9, 0x05EA }, "4dbcagdahymbxekheh6e0a7fei0b" }, { { 0x092F, 0x0939, 0x0932, 0x094B, 0x0917, 0x0939, 0x093F, 0x0928, 0x094D, 0x0926, 0x0940, 0x0915, 0x094D, 0x092F, 0x094B, 0x0902, 0x0928, 0x0939, 0x0940, 0x0902, 0x092C, 0x094B, 0x0932, 0x0938, 0x0915, 0x0924, 0x0947, 0x0939, 0x0948, 0x0902 }, "i1baa7eci9glrd9b2ae1bj0hfcgg6iyaf8o0a1dig0cd" }, { { 0x306A, 0x305C, 0x307F, 0x3093, 0x306A, 0x65E5, 0x672C, 0x8A9E, 0x3092, 0x8A71, 0x3057, 0x3066, 0x304F, 0x308C, 0x306A, 0x3044, 0x306E, 0x304B }, "n8jok5ay5dzabd5bym9f0cm5685rrjetr6pdxa" }, { { 0xC138, 0xACC4, 0xC758, 0xBAA8, 0xB4E0, 0xC0AC, 0xB78C, 0xB4E4, 0xC774, 0xD55C, 0xAD6D, 0xC5B4, 0xB97C, 0xC774, 0xD574, 0xD55C, 0xB2E4, 0xBA74, 0xC5BC, 0xB9C8, 0xB098, 0xC88B, 0xC744, 0xAE4C }, "989aomsvi5e83db1d2a355cv1e0vak1dwrv93d5xbh15a0dt30a5jpsd879ccm6fea98c" }, { { 0x043F, 0x043E, 0x0447, 0x0435, 0x043C, 0x0443, 0x0436, 0x0435, 0x043E, 0x043D, 0x0438, 0x043D, 0x0435, 0x0433, 0x043E, 0x0432, 0x043E, 0x0440, 0x044F, 0x0442, 0x043F, 0x043E, 0x0440, 0x0443, 0x0441, 0x0441, 0x043A, 0x0438 }, "b1abfaaepdrnnbgefbaDotcwatmq2g4l" }, { { 0x0050, 0x006F, 0x0072, 0x0071, 0x0075, 0x00E9, 0x006E, 0x006F, 0x0070, 0x0075, 0x0065, 0x0064, 0x0065, 0x006E, 0x0073, 0x0069, 0x006D, 0x0070, 0x006C, 0x0065, 0x006D, 0x0065, 0x006E, 0x0074, 0x0065, 0x0068, 0x0061, 0x0062, 0x006C, 0x0061, 0x0072, 0x0065, 0x006E, 0x0045, 0x0073, 0x0070, 0x0061, 0x00F1, 0x006F, 0x006C }, "PorqunopuedensimplementehablarenEspaol-fmd56a" }, { { 0x0054, 0x1EA1, 0x0069, 0x0073, 0x0061, 0x006F, 0x0068, 0x1ECD, 0x006B, 0x0068, 0x00F4, 0x006E, 0x0067, 0x0074, 0x0068, 0x1EC3, 0x0063, 0x0068, 0x1EC9, 0x006E, 0x00F3, 0x0069, 0x0074, 0x0069, 0x1EBF, 0x006E, 0x0067, 0x0056, 0x0069, 0x1EC7, 0x0074 }, "TisaohkhngthchnitingVit-kjcr8268qyxafd2f1b9g" }, { { 0x0033, 0x5E74, 0x0042, 0x7D44, 0x91D1, 0x516B, 0x5148, 0x751F }, "3B-ww4c5e180e575a65lsy2b" }, { { 0x5B89, 0x5BA4, 0x5948, 0x7F8E, 0x6075, 0x002D, 0x0077, 0x0069, 0x0074, 0x0068, 0x002D, 0x0053, 0x0055, 0x0050, 0x0045, 0x0052, 0x002D, 0x004D, 0x004F, 0x004E, 0x004B, 0x0045, 0x0059, 0x0053 }, "-with-SUPER-MONKEYS-pc58ag80a8qai00g7n9n" }, { { 0x0048, 0x0065, 0x006C, 0x006C, 0x006F, 0x002D, 0x0041, 0x006E, 0x006F, 0x0074, 0x0068, 0x0065, 0x0072, 0x002D, 0x0057, 0x0061, 0x0079, 0x002D, 0x305D, 0x308C, 0x305E, 0x308C, 0x306E, 0x5834, 0x6240 }, "Hello-Another-Way--fc4qua05auwb3674vfr0b" }, { { 0x3072, 0x3068, 0x3064, 0x5C4B, 0x6839, 0x306E, 0x4E0B, 0x0032 }, "2-u9tlzr9756bt3uc0v" }, { { 0x004D, 0x0061, 0x006A, 0x0069, 0x3067, 0x004B, 0x006F, 0x0069, 0x3059, 0x308B, 0x0035, 0x79D2, 0x524D }, "MajiKoi5-783gue6qz075azm5e" }, { { 0x30D1, 0x30D5, 0x30A3, 0x30FC, 0x0064, 0x0065, 0x30EB, 0x30F3, 0x30D0 }, "de-jg4avhby1noc0d" }, { { 0x305D, 0x306E, 0x30B9, 0x30D4, 0x30FC, 0x30C9, 0x3067 }, "d9juau41awczczp" }, { { 0x002D, 0x003E, 0x0020, 0x0024, 0x0031, 0x002E, 0x0030, 0x0030, 0x0020, 0x003C, 0x002D }, "-> $1.00 <--" } }; static int test_punycode(int n) { const struct puny_test *tc = puny_cases + n; unsigned int buffer[50]; unsigned int bsize = OSSL_NELEM(buffer); size_t i; if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded), buffer, &bsize))) return 0; for (i = 0; i < OSSL_NELEM(tc->raw); i++) if (tc->raw[i] == 0) break; if (!TEST_mem_eq(buffer, bsize * sizeof(*buffer), tc->raw, i * sizeof(*tc->raw))) return 0; return 1; } static const struct bad_decode_test { size_t outlen; const char input[20]; } bad_decode_tests[] = { { 20, "xn--e-*" }, { 10, "xn--e-999" }, { 20, "xn--e-999999999" }, { 20, {'x', 'n', '-', '-', (char)0x80, '-' } }, { 20, "xn--e-Oy65t" }, }; static int test_a2ulabel_bad_decode(int tst) { char out[20]; return TEST_int_eq(ossl_a2ulabel(bad_decode_tests[tst].input, out, bad_decode_tests[tst].outlen), -1); } static int test_a2ulabel(void) { char out[50]; char in[530] = { 0 }; if (!TEST_int_eq(ossl_a2ulabel("xn--a.b.c", out, 1), 0) || !TEST_int_eq(ossl_a2ulabel("xn--a.b.c", out, 7), 1)) return 0; if (!TEST_int_eq(ossl_a2ulabel("xn--a.b.c", out, 6), 0) || !TEST_int_eq(ossl_a2ulabel("xn--a.b.c", out, 7), 1) || !TEST_str_eq(out,"\xc2\x80.b.c")) return 0; if (!TEST_int_eq(ossl_a2ulabel("xn--e28h.com", out, 10), 1)) return 0; strcpy(in, "xn--"); memset(in + 4, 'e', 513); memcpy(in + 517, "-3ya", 4); if (!TEST_int_eq(ossl_a2ulabel(in, out, 50), -1)) return 0; return 1; } static int test_puny_overrun(void) { static const unsigned int out[] = { 0x0033, 0x5E74, 0x0042, 0x7D44, 0x91D1, 0x516B, 0x5148, 0x751F }; static const char *in = "3B-ww4c5e180e575a65lsy2b"; unsigned int buf[OSSL_NELEM(out)]; unsigned int bsize = OSSL_NELEM(buf) - 1; if (!TEST_false(ossl_punycode_decode(in, strlen(in), buf, &bsize))) { if (TEST_mem_eq(buf, bsize * sizeof(*buf), out, sizeof(out))) TEST_error("CRITICAL: buffer overrun detected!"); return 0; } return 1; } static int test_dotted_overflow(void) { static const char string[] = "a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a"; const size_t num_reps = OSSL_NELEM(string) / 2; WPACKET p; BUF_MEM *in; char *out = NULL; size_t i; int res = 0; if (!TEST_ptr(in = BUF_MEM_new())) return 0; if (!TEST_true(WPACKET_init_len(&p, in, 0))) { BUF_MEM_free(in); return 0; } for (i = 0; i < num_reps; i++) { if (i > 1 && !TEST_true(WPACKET_put_bytes_u8(&p, '.'))) goto err; if (!TEST_true(WPACKET_memcpy(&p, "xn--a", sizeof("xn--a") - 1))) goto err; } if (!TEST_true(WPACKET_put_bytes_u8(&p, '\0'))) goto err; if (!TEST_ptr(out = OPENSSL_malloc(in->length))) goto err; memset(out, 0x7f, in->length - 1); if (!TEST_int_le(ossl_a2ulabel(in->data, out, num_reps), 0) || !TEST_int_eq(out[num_reps], 0x7f)) goto err; if (!TEST_int_gt(ossl_a2ulabel(in->data, out, in->length), 0) || !TEST_size_t_eq(strlen(out), num_reps * 3)) goto err; res = 1; err: WPACKET_cleanup(&p); BUF_MEM_free(in); OPENSSL_free(out); return res; } int setup_tests(void) { ADD_ALL_TESTS(test_punycode, OSSL_NELEM(puny_cases)); ADD_TEST(test_dotted_overflow); ADD_TEST(test_a2ulabel); ADD_TEST(test_puny_overrun); ADD_ALL_TESTS(test_a2ulabel_bad_decode, OSSL_NELEM(bad_decode_tests)); return 1; }
test
openssl/test/punycode_test.c
openssl
#include <openssl/ssl.h> #include <openssl/err.h> #include "helpers/ssltestlib.h" #include "testutil.h" #include <string.h> static char *cert = NULL; static char *privkey = NULL; static int test_fatalerr(void) { SSL_CTX *sctx = NULL, *cctx = NULL; SSL *sssl = NULL, *cssl = NULL; const char *msg = "Dummy"; BIO *wbio = NULL; int ret = 0, len; char buf[80]; unsigned char dummyrec[] = { 0x17, 0x03, 0x03, 0x00, 0x05, 'D', 'u', 'm', 'm', 'y' }; if (!TEST_true(create_ssl_ctx_pair(NULL, TLS_method(), TLS_method(), TLS1_VERSION, 0, &sctx, &cctx, cert, privkey))) goto err; if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "AES128-SHA")) || !TEST_true(SSL_CTX_set_cipher_list(cctx, "AES256-SHA")) || !TEST_true(SSL_CTX_set_ciphersuites(sctx, "TLS_AES_128_GCM_SHA256")) || !TEST_true(SSL_CTX_set_ciphersuites(cctx, "TLS_AES_256_GCM_SHA384")) || !TEST_true(create_ssl_objects(sctx, cctx, &sssl, &cssl, NULL, NULL))) goto err; wbio = SSL_get_wbio(cssl); if (!TEST_ptr(wbio)) { printf("Unexpected NULL bio received\n"); goto err; } if (!TEST_false(create_ssl_connection(sssl, cssl, SSL_ERROR_NONE))) goto err; ERR_clear_error(); if (!TEST_int_gt(BIO_write(wbio, dummyrec, sizeof(dummyrec)), 0)) goto err; if (!TEST_int_le(len = SSL_read(sssl, buf, sizeof(buf) - 1), 0)) { buf[len] = '\0'; TEST_error("Unexpected success reading data: %s\n", buf); goto err; } if (!TEST_int_le(SSL_write(sssl, msg, strlen(msg)), 0)) goto err; ret = 1; err: SSL_free(sssl); SSL_free(cssl); SSL_CTX_free(sctx); SSL_CTX_free(cctx); return ret; } OPT_TEST_DECLARE_USAGE("certfile privkeyfile\n") int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(cert = test_get_argument(0)) || !TEST_ptr(privkey = test_get_argument(1))) return 0; ADD_TEST(test_fatalerr); return 1; }
test
openssl/test/fatalerrtest.c
openssl
#include <openssl/evp.h> #include <openssl/core_names.h> #include <openssl/rand.h> #include <openssl/hpke.h> #include "testutil.h" #define OSSL_HPKE_TSTSIZE 512 static OSSL_LIB_CTX *testctx = NULL; static OSSL_PROVIDER *nullprov = NULL; static OSSL_PROVIDER *deflprov = NULL; static char *testpropq = "provider=default"; static int verbose = 0; typedef struct { int mode; OSSL_HPKE_SUITE suite; const unsigned char *ikmE; size_t ikmElen; const unsigned char *expected_pkEm; size_t expected_pkEmlen; const unsigned char *ikmR; size_t ikmRlen; const unsigned char *expected_pkRm; size_t expected_pkRmlen; const unsigned char *expected_skRm; size_t expected_skRmlen; const unsigned char *expected_secret; size_t expected_secretlen; const unsigned char *ksinfo; size_t ksinfolen; const unsigned char *ikmAuth; size_t ikmAuthlen; const unsigned char *psk; size_t psklen; const char *pskid; } TEST_BASEDATA; typedef struct { int seq; const unsigned char *pt; size_t ptlen; const unsigned char *aad; size_t aadlen; const unsigned char *expected_ct; size_t expected_ctlen; } TEST_AEADDATA; typedef struct { const unsigned char *context; size_t contextlen; const unsigned char *expected_secret; size_t expected_secretlen; } TEST_EXPORTDATA; static int cmpkey(const EVP_PKEY *pkey, const unsigned char *pub, size_t publen) { unsigned char pubbuf[256]; size_t pubbuflen = 0; int erv = 0; if (!TEST_true(publen <= sizeof(pubbuf))) return 0; erv = EVP_PKEY_get_octet_string_param(pkey, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, pubbuf, sizeof(pubbuf), &pubbuflen); if (!TEST_true(erv)) return 0; if (pub != NULL && !TEST_mem_eq(pubbuf, pubbuflen, pub, publen)) return 0; return 1; } static int do_testhpke(const TEST_BASEDATA *base, const TEST_AEADDATA *aead, size_t aeadsz, const TEST_EXPORTDATA *export, size_t exportsz) { OSSL_LIB_CTX *libctx = testctx; const char *propq = testpropq; OSSL_HPKE_CTX *sealctx = NULL, *openctx = NULL; unsigned char ct[256]; unsigned char enc[256]; unsigned char ptout[256]; size_t ptoutlen = sizeof(ptout); size_t enclen = sizeof(enc); size_t ctlen = sizeof(ct); unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t publen = sizeof(pub); EVP_PKEY *privE = NULL; unsigned char authpub[OSSL_HPKE_TSTSIZE]; size_t authpublen = sizeof(authpub); EVP_PKEY *authpriv = NULL; unsigned char rpub[OSSL_HPKE_TSTSIZE]; size_t rpublen = sizeof(pub); EVP_PKEY *privR = NULL; int ret = 0; size_t i; uint64_t lastseq = 0; if (!TEST_true(OSSL_HPKE_keygen(base->suite, pub, &publen, &privE, base->ikmE, base->ikmElen, libctx, propq))) goto end; if (!TEST_true(cmpkey(privE, base->expected_pkEm, base->expected_pkEmlen))) goto end; if (!TEST_ptr(sealctx = OSSL_HPKE_CTX_new(base->mode, base->suite, OSSL_HPKE_ROLE_SENDER, libctx, propq))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set1_ikme(sealctx, base->ikmE, base->ikmElen))) goto end; if (base->mode == OSSL_HPKE_MODE_AUTH || base->mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(base->ikmAuth != NULL && base->ikmAuthlen > 0)) goto end; if (!TEST_true(OSSL_HPKE_keygen(base->suite, authpub, &authpublen, &authpriv, base->ikmAuth, base->ikmAuthlen, libctx, propq))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set1_authpriv(sealctx, authpriv))) goto end; } if (!TEST_true(OSSL_HPKE_keygen(base->suite, rpub, &rpublen, &privR, base->ikmR, base->ikmRlen, libctx, propq))) goto end; if (!TEST_true(cmpkey(privR, base->expected_pkRm, base->expected_pkRmlen))) goto end; if (base->mode == OSSL_HPKE_MODE_PSK || base->mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(OSSL_HPKE_CTX_set1_psk(sealctx, base->pskid, base->psk, base->psklen))) goto end; } if (!TEST_true(OSSL_HPKE_encap(sealctx, enc, &enclen, rpub, rpublen, base->ksinfo, base->ksinfolen))) goto end; if (!TEST_true(cmpkey(privE, enc, enclen))) goto end; for (i = 0; i < aeadsz; ++i) { ctlen = sizeof(ct); memset(ct, 0, ctlen); if (!TEST_true(OSSL_HPKE_seal(sealctx, ct, &ctlen, aead[i].aad, aead[i].aadlen, aead[i].pt, aead[i].ptlen))) goto end; if (!TEST_mem_eq(ct, ctlen, aead[i].expected_ct, aead[i].expected_ctlen)) goto end; if (!TEST_true(OSSL_HPKE_CTX_get_seq(sealctx, &lastseq))) goto end; if (lastseq != (uint64_t)(i + 1)) goto end; } if (!TEST_ptr(openctx = OSSL_HPKE_CTX_new(base->mode, base->suite, OSSL_HPKE_ROLE_RECEIVER, libctx, propq))) goto end; if (base->mode == OSSL_HPKE_MODE_PSK || base->mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(base->pskid != NULL && base->psk != NULL && base->psklen > 0)) goto end; if (!TEST_true(OSSL_HPKE_CTX_set1_psk(openctx, base->pskid, base->psk, base->psklen))) goto end; } if (base->mode == OSSL_HPKE_MODE_AUTH || base->mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(OSSL_HPKE_CTX_set1_authpub(openctx, authpub, authpublen))) goto end; } if (!TEST_true(OSSL_HPKE_decap(openctx, enc, enclen, privR, base->ksinfo, base->ksinfolen))) goto end; for (i = 0; i < aeadsz; ++i) { ptoutlen = sizeof(ptout); memset(ptout, 0, ptoutlen); if (!TEST_true(OSSL_HPKE_open(openctx, ptout, &ptoutlen, aead[i].aad, aead[i].aadlen, aead[i].expected_ct, aead[i].expected_ctlen))) goto end; if (!TEST_mem_eq(aead[i].pt, aead[i].ptlen, ptout, ptoutlen)) goto end; if (!TEST_true(OSSL_HPKE_CTX_get_seq(openctx, &lastseq))) goto end; if (lastseq != (uint64_t)(i + 1)) goto end; } for (i = 0; i < exportsz; ++i) { size_t len = export[i].expected_secretlen; unsigned char eval[OSSL_HPKE_TSTSIZE]; if (len > sizeof(eval)) goto end; if (!TEST_false(OSSL_HPKE_export(sealctx, eval, len, export[i].context, -1))) goto end; if (!TEST_true(OSSL_HPKE_export(sealctx, eval, len, export[i].context, export[i].contextlen))) goto end; if (!TEST_mem_eq(eval, len, export[i].expected_secret, export[i].expected_secretlen)) goto end; if (aeadsz == 0) { if (!TEST_false(OSSL_HPKE_seal(sealctx, ct, &ctlen, NULL, 0, ptout, ptoutlen))) goto end; } } ret = 1; end: OSSL_HPKE_CTX_free(sealctx); OSSL_HPKE_CTX_free(openctx); EVP_PKEY_free(privE); EVP_PKEY_free(privR); EVP_PKEY_free(authpriv); return ret; } static const unsigned char pt[] = { 0x42, 0x65, 0x61, 0x75, 0x74, 0x79, 0x20, 0x69, 0x73, 0x20, 0x74, 0x72, 0x75, 0x74, 0x68, 0x2c, 0x20, 0x74, 0x72, 0x75, 0x74, 0x68, 0x20, 0x62, 0x65, 0x61, 0x75, 0x74, 0x79 }; static const unsigned char ksinfo[] = { 0x4f, 0x64, 0x65, 0x20, 0x6f, 0x6e, 0x20, 0x61, 0x20, 0x47, 0x72, 0x65, 0x63, 0x69, 0x61, 0x6e, 0x20, 0x55, 0x72, 0x6e }; #ifndef OPENSSL_NO_ECX static const unsigned char pskid[] = { 0x45, 0x6e, 0x6e, 0x79, 0x6e, 0x20, 0x44, 0x75, 0x72, 0x69, 0x6e, 0x20, 0x61, 0x72, 0x61, 0x6e, 0x20, 0x4d, 0x6f, 0x72, 0x69, 0x61, 0x00 }; static const unsigned char psk[] = { 0x02, 0x47, 0xfd, 0x33, 0xb9, 0x13, 0x76, 0x0f, 0xa1, 0xfa, 0x51, 0xe1, 0x89, 0x2d, 0x9f, 0x30, 0x7f, 0xbe, 0x65, 0xeb, 0x17, 0x1e, 0x81, 0x32, 0xc2, 0xaf, 0x18, 0x55, 0x5a, 0x73, 0x8b, 0x82 }; static const unsigned char first_ikme[] = { 0x78, 0x62, 0x8c, 0x35, 0x4e, 0x46, 0xf3, 0xe1, 0x69, 0xbd, 0x23, 0x1b, 0xe7, 0xb2, 0xff, 0x1c, 0x77, 0xaa, 0x30, 0x24, 0x60, 0xa2, 0x6d, 0xbf, 0xa1, 0x55, 0x15, 0x68, 0x4c, 0x00, 0x13, 0x0b }; static const unsigned char first_ikmr[] = { 0xd4, 0xa0, 0x9d, 0x09, 0xf5, 0x75, 0xfe, 0xf4, 0x25, 0x90, 0x5d, 0x2a, 0xb3, 0x96, 0xc1, 0x44, 0x91, 0x41, 0x46, 0x3f, 0x69, 0x8f, 0x8e, 0xfd, 0xb7, 0xac, 0xcf, 0xaf, 0xf8, 0x99, 0x50, 0x98 }; static const unsigned char first_ikmepub[] = { 0x0a, 0xd0, 0x95, 0x0d, 0x9f, 0xb9, 0x58, 0x8e, 0x59, 0x69, 0x0b, 0x74, 0xf1, 0x23, 0x7e, 0xcd, 0xf1, 0xd7, 0x75, 0xcd, 0x60, 0xbe, 0x2e, 0xca, 0x57, 0xaf, 0x5a, 0x4b, 0x04, 0x71, 0xc9, 0x1b, }; static const unsigned char first_ikmrpub[] = { 0x9f, 0xed, 0x7e, 0x8c, 0x17, 0x38, 0x75, 0x60, 0xe9, 0x2c, 0xc6, 0x46, 0x2a, 0x68, 0x04, 0x96, 0x57, 0x24, 0x6a, 0x09, 0xbf, 0xa8, 0xad, 0xe7, 0xae, 0xfe, 0x58, 0x96, 0x72, 0x01, 0x63, 0x66 }; static const unsigned char first_ikmrpriv[] = { 0xc5, 0xeb, 0x01, 0xeb, 0x45, 0x7f, 0xe6, 0xc6, 0xf5, 0x75, 0x77, 0xc5, 0x41, 0x3b, 0x93, 0x15, 0x50, 0xa1, 0x62, 0xc7, 0x1a, 0x03, 0xac, 0x8d, 0x19, 0x6b, 0xab, 0xbd, 0x4e, 0x5c, 0xe0, 0xfd }; static const unsigned char first_expected_shared_secret[] = { 0x72, 0x76, 0x99, 0xf0, 0x09, 0xff, 0xe3, 0xc0, 0x76, 0x31, 0x50, 0x19, 0xc6, 0x96, 0x48, 0x36, 0x6b, 0x69, 0x17, 0x14, 0x39, 0xbd, 0x7d, 0xd0, 0x80, 0x77, 0x43, 0xbd, 0xe7, 0x69, 0x86, 0xcd }; static const unsigned char first_aad0[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x30 }; static const unsigned char first_ct0[] = { 0xe5, 0x2c, 0x6f, 0xed, 0x7f, 0x75, 0x8d, 0x0c, 0xf7, 0x14, 0x56, 0x89, 0xf2, 0x1b, 0xc1, 0xbe, 0x6e, 0xc9, 0xea, 0x09, 0x7f, 0xef, 0x4e, 0x95, 0x94, 0x40, 0x01, 0x2f, 0x4f, 0xeb, 0x73, 0xfb, 0x61, 0x1b, 0x94, 0x61, 0x99, 0xe6, 0x81, 0xf4, 0xcf, 0xc3, 0x4d, 0xb8, 0xea }; static const unsigned char first_aad1[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x31 }; static const unsigned char first_ct1[] = { 0x49, 0xf3, 0xb1, 0x9b, 0x28, 0xa9, 0xea, 0x9f, 0x43, 0xe8, 0xc7, 0x12, 0x04, 0xc0, 0x0d, 0x4a, 0x49, 0x0e, 0xe7, 0xf6, 0x13, 0x87, 0xb6, 0x71, 0x9d, 0xb7, 0x65, 0xe9, 0x48, 0x12, 0x3b, 0x45, 0xb6, 0x16, 0x33, 0xef, 0x05, 0x9b, 0xa2, 0x2c, 0xd6, 0x24, 0x37, 0xc8, 0xba }; static const unsigned char first_aad2[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x32 }; static const unsigned char first_ct2[] = { 0x25, 0x7c, 0xa6, 0xa0, 0x84, 0x73, 0xdc, 0x85, 0x1f, 0xde, 0x45, 0xaf, 0xd5, 0x98, 0xcc, 0x83, 0xe3, 0x26, 0xdd, 0xd0, 0xab, 0xe1, 0xef, 0x23, 0xba, 0xa3, 0xba, 0xa4, 0xdd, 0x8c, 0xde, 0x99, 0xfc, 0xe2, 0xc1, 0xe8, 0xce, 0x68, 0x7b, 0x0b, 0x47, 0xea, 0xd1, 0xad, 0xc9 }; static const unsigned char first_export1[] = { 0xdf, 0xf1, 0x7a, 0xf3, 0x54, 0xc8, 0xb4, 0x16, 0x73, 0x56, 0x7d, 0xb6, 0x25, 0x9f, 0xd6, 0x02, 0x99, 0x67, 0xb4, 0xe1, 0xaa, 0xd1, 0x30, 0x23, 0xc2, 0xae, 0x5d, 0xf8, 0xf4, 0xf4, 0x3b, 0xf6 }; static const unsigned char first_context2[] = { 0x00 }; static const unsigned char first_export2[] = { 0x6a, 0x84, 0x72, 0x61, 0xd8, 0x20, 0x7f, 0xe5, 0x96, 0xbe, 0xfb, 0x52, 0x92, 0x84, 0x63, 0x88, 0x1a, 0xb4, 0x93, 0xda, 0x34, 0x5b, 0x10, 0xe1, 0xdc, 0xc6, 0x45, 0xe3, 0xb9, 0x4e, 0x2d, 0x95 }; static const unsigned char first_context3[] = { 0x54, 0x65, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x74, 0x65, 0x78, 0x74 }; static const unsigned char first_export3[] = { 0x8a, 0xff, 0x52, 0xb4, 0x5a, 0x1b, 0xe3, 0xa7, 0x34, 0xbc, 0x7a, 0x41, 0xe2, 0x0b, 0x4e, 0x05, 0x5a, 0xd4, 0xc4, 0xd2, 0x21, 0x04, 0xb0, 0xc2, 0x02, 0x85, 0xa7, 0xc4, 0x30, 0x24, 0x01, 0xcd }; static int x25519kdfsha256_hkdfsha256_aes128gcm_psk_test(void) { const TEST_BASEDATA pskdata = { OSSL_HPKE_MODE_PSK, { OSSL_HPKE_KEM_ID_X25519, OSSL_HPKE_KDF_ID_HKDF_SHA256, OSSL_HPKE_AEAD_ID_AES_GCM_128 }, first_ikme, sizeof(first_ikme), first_ikmepub, sizeof(first_ikmepub), first_ikmr, sizeof(first_ikmr), first_ikmrpub, sizeof(first_ikmrpub), first_ikmrpriv, sizeof(first_ikmrpriv), first_expected_shared_secret, sizeof(first_expected_shared_secret), ksinfo, sizeof(ksinfo), NULL, 0, psk, sizeof(psk), (char *) pskid }; const TEST_AEADDATA aeaddata[] = { { 0, pt, sizeof(pt), first_aad0, sizeof(first_aad0), first_ct0, sizeof(first_ct0) }, { 1, pt, sizeof(pt), first_aad1, sizeof(first_aad1), first_ct1, sizeof(first_ct1) }, { 2, pt, sizeof(pt), first_aad2, sizeof(first_aad2), first_ct2, sizeof(first_ct2) } }; const TEST_EXPORTDATA exportdata[] = { { NULL, 0, first_export1, sizeof(first_export1) }, { first_context2, sizeof(first_context2), first_export2, sizeof(first_export2) }, { first_context3, sizeof(first_context3), first_export3, sizeof(first_export3) }, }; return do_testhpke(&pskdata, aeaddata, OSSL_NELEM(aeaddata), exportdata, OSSL_NELEM(exportdata)); } static const unsigned char second_ikme[] = { 0x72, 0x68, 0x60, 0x0d, 0x40, 0x3f, 0xce, 0x43, 0x15, 0x61, 0xae, 0xf5, 0x83, 0xee, 0x16, 0x13, 0x52, 0x7c, 0xff, 0x65, 0x5c, 0x13, 0x43, 0xf2, 0x98, 0x12, 0xe6, 0x67, 0x06, 0xdf, 0x32, 0x34 }; static const unsigned char second_ikmepub[] = { 0x37, 0xfd, 0xa3, 0x56, 0x7b, 0xdb, 0xd6, 0x28, 0xe8, 0x86, 0x68, 0xc3, 0xc8, 0xd7, 0xe9, 0x7d, 0x1d, 0x12, 0x53, 0xb6, 0xd4, 0xea, 0x6d, 0x44, 0xc1, 0x50, 0xf7, 0x41, 0xf1, 0xbf, 0x44, 0x31, }; static const unsigned char second_ikmr[] = { 0x6d, 0xb9, 0xdf, 0x30, 0xaa, 0x07, 0xdd, 0x42, 0xee, 0x5e, 0x81, 0x81, 0xaf, 0xdb, 0x97, 0x7e, 0x53, 0x8f, 0x5e, 0x1f, 0xec, 0x8a, 0x06, 0x22, 0x3f, 0x33, 0xf7, 0x01, 0x3e, 0x52, 0x50, 0x37 }; static const unsigned char second_ikmrpub[] = { 0x39, 0x48, 0xcf, 0xe0, 0xad, 0x1d, 0xdb, 0x69, 0x5d, 0x78, 0x0e, 0x59, 0x07, 0x71, 0x95, 0xda, 0x6c, 0x56, 0x50, 0x6b, 0x02, 0x73, 0x29, 0x79, 0x4a, 0xb0, 0x2b, 0xca, 0x80, 0x81, 0x5c, 0x4d }; static const unsigned char second_ikmrpriv[] = { 0x46, 0x12, 0xc5, 0x50, 0x26, 0x3f, 0xc8, 0xad, 0x58, 0x37, 0x5d, 0xf3, 0xf5, 0x57, 0xaa, 0xc5, 0x31, 0xd2, 0x68, 0x50, 0x90, 0x3e, 0x55, 0xa9, 0xf2, 0x3f, 0x21, 0xd8, 0x53, 0x4e, 0x8a, 0xc8 }; static const unsigned char second_expected_shared_secret[] = { 0xfe, 0x0e, 0x18, 0xc9, 0xf0, 0x24, 0xce, 0x43, 0x79, 0x9a, 0xe3, 0x93, 0xc7, 0xe8, 0xfe, 0x8f, 0xce, 0x9d, 0x21, 0x88, 0x75, 0xe8, 0x22, 0x7b, 0x01, 0x87, 0xc0, 0x4e, 0x7d, 0x2e, 0xa1, 0xfc }; static const unsigned char second_aead0[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x30 }; static const unsigned char second_ct0[] = { 0xf9, 0x38, 0x55, 0x8b, 0x5d, 0x72, 0xf1, 0xa2, 0x38, 0x10, 0xb4, 0xbe, 0x2a, 0xb4, 0xf8, 0x43, 0x31, 0xac, 0xc0, 0x2f, 0xc9, 0x7b, 0xab, 0xc5, 0x3a, 0x52, 0xae, 0x82, 0x18, 0xa3, 0x55, 0xa9, 0x6d, 0x87, 0x70, 0xac, 0x83, 0xd0, 0x7b, 0xea, 0x87, 0xe1, 0x3c, 0x51, 0x2a }; static const unsigned char second_aead1[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x31 }; static const unsigned char second_ct1[] = { 0xaf, 0x2d, 0x7e, 0x9a, 0xc9, 0xae, 0x7e, 0x27, 0x0f, 0x46, 0xba, 0x1f, 0x97, 0x5b, 0xe5, 0x3c, 0x09, 0xf8, 0xd8, 0x75, 0xbd, 0xc8, 0x53, 0x54, 0x58, 0xc2, 0x49, 0x4e, 0x8a, 0x6e, 0xab, 0x25, 0x1c, 0x03, 0xd0, 0xc2, 0x2a, 0x56, 0xb8, 0xca, 0x42, 0xc2, 0x06, 0x3b, 0x84 }; static const unsigned char second_export1[] = { 0x38, 0x53, 0xfe, 0x2b, 0x40, 0x35, 0x19, 0x5a, 0x57, 0x3f, 0xfc, 0x53, 0x85, 0x6e, 0x77, 0x05, 0x8e, 0x15, 0xd9, 0xea, 0x06, 0x4d, 0xe3, 0xe5, 0x9f, 0x49, 0x61, 0xd0, 0x09, 0x52, 0x50, 0xee }; static const unsigned char second_context2[] = { 0x00 }; static const unsigned char second_export2[] = { 0x2e, 0x8f, 0x0b, 0x54, 0x67, 0x3c, 0x70, 0x29, 0x64, 0x9d, 0x4e, 0xb9, 0xd5, 0xe3, 0x3b, 0xf1, 0x87, 0x2c, 0xf7, 0x6d, 0x62, 0x3f, 0xf1, 0x64, 0xac, 0x18, 0x5d, 0xa9, 0xe8, 0x8c, 0x21, 0xa5 }; static const unsigned char second_context3[] = { 0x54, 0x65, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x74, 0x65, 0x78, 0x74 }; static const unsigned char second_export3[] = { 0xe9, 0xe4, 0x30, 0x65, 0x10, 0x2c, 0x38, 0x36, 0x40, 0x1b, 0xed, 0x8c, 0x3c, 0x3c, 0x75, 0xae, 0x46, 0xbe, 0x16, 0x39, 0x86, 0x93, 0x91, 0xd6, 0x2c, 0x61, 0xf1, 0xec, 0x7a, 0xf5, 0x49, 0x31 }; static int x25519kdfsha256_hkdfsha256_aes128gcm_base_test(void) { const TEST_BASEDATA basedata = { OSSL_HPKE_MODE_BASE, { OSSL_HPKE_KEM_ID_X25519, OSSL_HPKE_KDF_ID_HKDF_SHA256, OSSL_HPKE_AEAD_ID_AES_GCM_128 }, second_ikme, sizeof(second_ikme), second_ikmepub, sizeof(second_ikmepub), second_ikmr, sizeof(second_ikmr), second_ikmrpub, sizeof(second_ikmrpub), second_ikmrpriv, sizeof(second_ikmrpriv), second_expected_shared_secret, sizeof(second_expected_shared_secret), ksinfo, sizeof(ksinfo), NULL, 0, NULL, 0, NULL }; const TEST_AEADDATA aeaddata[] = { { 0, pt, sizeof(pt), second_aead0, sizeof(second_aead0), second_ct0, sizeof(second_ct0) }, { 1, pt, sizeof(pt), second_aead1, sizeof(second_aead1), second_ct1, sizeof(second_ct1) } }; const TEST_EXPORTDATA exportdata[] = { { NULL, 0, second_export1, sizeof(second_export1) }, { second_context2, sizeof(second_context2), second_export2, sizeof(second_export2) }, { second_context3, sizeof(second_context3), second_export3, sizeof(second_export3) }, }; return do_testhpke(&basedata, aeaddata, OSSL_NELEM(aeaddata), exportdata, OSSL_NELEM(exportdata)); } #endif static const unsigned char third_ikme[] = { 0x42, 0x70, 0xe5, 0x4f, 0xfd, 0x08, 0xd7, 0x9d, 0x59, 0x28, 0x02, 0x0a, 0xf4, 0x68, 0x6d, 0x8f, 0x6b, 0x7d, 0x35, 0xdb, 0xe4, 0x70, 0x26, 0x5f, 0x1f, 0x5a, 0xa2, 0x28, 0x16, 0xce, 0x86, 0x0e }; static const unsigned char third_ikmepub[] = { 0x04, 0xa9, 0x27, 0x19, 0xc6, 0x19, 0x5d, 0x50, 0x85, 0x10, 0x4f, 0x46, 0x9a, 0x8b, 0x98, 0x14, 0xd5, 0x83, 0x8f, 0xf7, 0x2b, 0x60, 0x50, 0x1e, 0x2c, 0x44, 0x66, 0xe5, 0xe6, 0x7b, 0x32, 0x5a, 0xc9, 0x85, 0x36, 0xd7, 0xb6, 0x1a, 0x1a, 0xf4, 0xb7, 0x8e, 0x5b, 0x7f, 0x95, 0x1c, 0x09, 0x00, 0xbe, 0x86, 0x3c, 0x40, 0x3c, 0xe6, 0x5c, 0x9b, 0xfc, 0xb9, 0x38, 0x26, 0x57, 0x22, 0x2d, 0x18, 0xc4, }; static const unsigned char third_ikmr[] = { 0x66, 0x8b, 0x37, 0x17, 0x1f, 0x10, 0x72, 0xf3, 0xcf, 0x12, 0xea, 0x8a, 0x23, 0x6a, 0x45, 0xdf, 0x23, 0xfc, 0x13, 0xb8, 0x2a, 0xf3, 0x60, 0x9a, 0xd1, 0xe3, 0x54, 0xf6, 0xef, 0x81, 0x75, 0x50 }; static const unsigned char third_ikmrpub[] = { 0x04, 0xfe, 0x8c, 0x19, 0xce, 0x09, 0x05, 0x19, 0x1e, 0xbc, 0x29, 0x8a, 0x92, 0x45, 0x79, 0x25, 0x31, 0xf2, 0x6f, 0x0c, 0xec, 0xe2, 0x46, 0x06, 0x39, 0xe8, 0xbc, 0x39, 0xcb, 0x7f, 0x70, 0x6a, 0x82, 0x6a, 0x77, 0x9b, 0x4c, 0xf9, 0x69, 0xb8, 0xa0, 0xe5, 0x39, 0xc7, 0xf6, 0x2f, 0xb3, 0xd3, 0x0a, 0xd6, 0xaa, 0x8f, 0x80, 0xe3, 0x0f, 0x1d, 0x12, 0x8a, 0xaf, 0xd6, 0x8a, 0x2c, 0xe7, 0x2e, 0xa0 }; static const unsigned char third_ikmrpriv[] = { 0xf3, 0xce, 0x7f, 0xda, 0xe5, 0x7e, 0x1a, 0x31, 0x0d, 0x87, 0xf1, 0xeb, 0xbd, 0xe6, 0xf3, 0x28, 0xbe, 0x0a, 0x99, 0xcd, 0xbc, 0xad, 0xf4, 0xd6, 0x58, 0x9c, 0xf2, 0x9d, 0xe4, 0xb8, 0xff, 0xd2 }; static const unsigned char third_expected_shared_secret[] = { 0xc0, 0xd2, 0x6a, 0xea, 0xb5, 0x36, 0x60, 0x9a, 0x57, 0x2b, 0x07, 0x69, 0x5d, 0x93, 0x3b, 0x58, 0x9d, 0xcf, 0x36, 0x3f, 0xf9, 0xd9, 0x3c, 0x93, 0xad, 0xea, 0x53, 0x7a, 0xea, 0xbb, 0x8c, 0xb8 }; static const unsigned char third_aead0[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x30 }; static const unsigned char third_ct0[] = { 0x5a, 0xd5, 0x90, 0xbb, 0x8b, 0xaa, 0x57, 0x7f, 0x86, 0x19, 0xdb, 0x35, 0xa3, 0x63, 0x11, 0x22, 0x6a, 0x89, 0x6e, 0x73, 0x42, 0xa6, 0xd8, 0x36, 0xd8, 0xb7, 0xbc, 0xd2, 0xf2, 0x0b, 0x6c, 0x7f, 0x90, 0x76, 0xac, 0x23, 0x2e, 0x3a, 0xb2, 0x52, 0x3f, 0x39, 0x51, 0x34, 0x34 }; static const unsigned char third_aead1[] = { 0x43, 0x6f, 0x75, 0x6e, 0x74, 0x2d, 0x31 }; static const unsigned char third_ct1[] = { 0xfa, 0x6f, 0x03, 0x7b, 0x47, 0xfc, 0x21, 0x82, 0x6b, 0x61, 0x01, 0x72, 0xca, 0x96, 0x37, 0xe8, 0x2d, 0x6e, 0x58, 0x01, 0xeb, 0x31, 0xcb, 0xd3, 0x74, 0x82, 0x71, 0xaf, 0xfd, 0x4e, 0xcb, 0x06, 0x64, 0x6e, 0x03, 0x29, 0xcb, 0xdf, 0x3c, 0x3c, 0xd6, 0x55, 0xb2, 0x8e, 0x82 }; static const unsigned char third_export1[] = { 0x5e, 0x9b, 0xc3, 0xd2, 0x36, 0xe1, 0x91, 0x1d, 0x95, 0xe6, 0x5b, 0x57, 0x6a, 0x8a, 0x86, 0xd4, 0x78, 0xfb, 0x82, 0x7e, 0x8b, 0xdf, 0xe7, 0x7b, 0x74, 0x1b, 0x28, 0x98, 0x90, 0x49, 0x0d, 0x4d }; static const unsigned char third_context2[] = { 0x00 }; static const unsigned char third_export2[] = { 0x6c, 0xff, 0x87, 0x65, 0x89, 0x31, 0xbd, 0xa8, 0x3d, 0xc8, 0x57, 0xe6, 0x35, 0x3e, 0xfe, 0x49, 0x87, 0xa2, 0x01, 0xb8, 0x49, 0x65, 0x8d, 0x9b, 0x04, 0x7a, 0xab, 0x4c, 0xf2, 0x16, 0xe7, 0x96 }; static const unsigned char third_context3[] = { 0x54, 0x65, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x74, 0x65, 0x78, 0x74 }; static const unsigned char third_export3[] = { 0xd8, 0xf1, 0xea, 0x79, 0x42, 0xad, 0xbb, 0xa7, 0x41, 0x2c, 0x6d, 0x43, 0x1c, 0x62, 0xd0, 0x13, 0x71, 0xea, 0x47, 0x6b, 0x82, 0x3e, 0xb6, 0x97, 0xe1, 0xf6, 0xe6, 0xca, 0xe1, 0xda, 0xb8, 0x5a }; static int P256kdfsha256_hkdfsha256_aes128gcm_base_test(void) { const TEST_BASEDATA basedata = { OSSL_HPKE_MODE_BASE, { OSSL_HPKE_KEM_ID_P256, OSSL_HPKE_KDF_ID_HKDF_SHA256, OSSL_HPKE_AEAD_ID_AES_GCM_128 }, third_ikme, sizeof(third_ikme), third_ikmepub, sizeof(third_ikmepub), third_ikmr, sizeof(third_ikmr), third_ikmrpub, sizeof(third_ikmrpub), third_ikmrpriv, sizeof(third_ikmrpriv), third_expected_shared_secret, sizeof(third_expected_shared_secret), ksinfo, sizeof(ksinfo), NULL, 0, NULL, 0, NULL }; const TEST_AEADDATA aeaddata[] = { { 0, pt, sizeof(pt), third_aead0, sizeof(third_aead0), third_ct0, sizeof(third_ct0) }, { 1, pt, sizeof(pt), third_aead1, sizeof(third_aead1), third_ct1, sizeof(third_ct1) } }; const TEST_EXPORTDATA exportdata[] = { { NULL, 0, third_export1, sizeof(third_export1) }, { third_context2, sizeof(third_context2), third_export2, sizeof(third_export2) }, { third_context3, sizeof(third_context3), third_export3, sizeof(third_export3) }, }; return do_testhpke(&basedata, aeaddata, OSSL_NELEM(aeaddata), exportdata, OSSL_NELEM(exportdata)); } #ifndef OPENSSL_NO_ECX static const unsigned char fourth_ikme[] = { 0x55, 0xbc, 0x24, 0x5e, 0xe4, 0xef, 0xda, 0x25, 0xd3, 0x8f, 0x2d, 0x54, 0xd5, 0xbb, 0x66, 0x65, 0x29, 0x1b, 0x99, 0xf8, 0x10, 0x8a, 0x8c, 0x4b, 0x68, 0x6c, 0x2b, 0x14, 0x89, 0x3e, 0xa5, 0xd9 }; static const unsigned char fourth_ikmepub[] = { 0xe5, 0xe8, 0xf9, 0xbf, 0xff, 0x6c, 0x2f, 0x29, 0x79, 0x1f, 0xc3, 0x51, 0xd2, 0xc2, 0x5c, 0xe1, 0x29, 0x9a, 0xa5, 0xea, 0xca, 0x78, 0xa7, 0x57, 0xc0, 0xb4, 0xfb, 0x4b, 0xcd, 0x83, 0x09, 0x18 }; static const unsigned char fourth_ikmr[] = { 0x68, 0x3a, 0xe0, 0xda, 0x1d, 0x22, 0x18, 0x1e, 0x74, 0xed, 0x2e, 0x50, 0x3e, 0xbf, 0x82, 0x84, 0x0d, 0xeb, 0x1d, 0x5e, 0x87, 0x2c, 0xad, 0xe2, 0x0f, 0x4b, 0x45, 0x8d, 0x99, 0x78, 0x3e, 0x31 }; static const unsigned char fourth_ikmrpub[] = { 0x19, 0x41, 0x41, 0xca, 0x6c, 0x3c, 0x3b, 0xeb, 0x47, 0x92, 0xcd, 0x97, 0xba, 0x0e, 0xa1, 0xfa, 0xff, 0x09, 0xd9, 0x84, 0x35, 0x01, 0x23, 0x45, 0x76, 0x6e, 0xe3, 0x3a, 0xae, 0x2d, 0x76, 0x64 }; static const unsigned char fourth_ikmrpriv[] = { 0x33, 0xd1, 0x96, 0xc8, 0x30, 0xa1, 0x2f, 0x9a, 0xc6, 0x5d, 0x6e, 0x56, 0x5a, 0x59, 0x0d, 0x80, 0xf0, 0x4e, 0xe9, 0xb1, 0x9c, 0x83, 0xc8, 0x7f, 0x2c, 0x17, 0x0d, 0x97, 0x2a, 0x81, 0x28, 0x48 }; static const unsigned char fourth_expected_shared_secret[] = { 0xe8, 0x17, 0x16, 0xce, 0x8f, 0x73, 0x14, 0x1d, 0x4f, 0x25, 0xee, 0x90, 0x98, 0xef, 0xc9, 0x68, 0xc9, 0x1e, 0x5b, 0x8c, 0xe5, 0x2f, 0xff, 0xf5, 0x9d, 0x64, 0x03, 0x9e, 0x82, 0x91, 0x8b, 0x66 }; static const unsigned char fourth_export1[] = { 0x7a, 0x36, 0x22, 0x1b, 0xd5, 0x6d, 0x50, 0xfb, 0x51, 0xee, 0x65, 0xed, 0xfd, 0x98, 0xd0, 0x6a, 0x23, 0xc4, 0xdc, 0x87, 0x08, 0x5a, 0xa5, 0x86, 0x6c, 0xb7, 0x08, 0x72, 0x44, 0xbd, 0x2a, 0x36 }; static const unsigned char fourth_context2[] = { 0x00 }; static const unsigned char fourth_export2[] = { 0xd5, 0x53, 0x5b, 0x87, 0x09, 0x9c, 0x6c, 0x3c, 0xe8, 0x0d, 0xc1, 0x12, 0xa2, 0x67, 0x1c, 0x6e, 0xc8, 0xe8, 0x11, 0xa2, 0xf2, 0x84, 0xf9, 0x48, 0xce, 0xc6, 0xdd, 0x17, 0x08, 0xee, 0x33, 0xf0 }; static const unsigned char fourth_context3[] = { 0x54, 0x65, 0x73, 0x74, 0x43, 0x6f, 0x6e, 0x74, 0x65, 0x78, 0x74 }; static const unsigned char fourth_export3[] = { 0xff, 0xaa, 0xbc, 0x85, 0xa7, 0x76, 0x13, 0x6c, 0xa0, 0xc3, 0x78, 0xe5, 0xd0, 0x84, 0xc9, 0x14, 0x0a, 0xb5, 0x52, 0xb7, 0x8f, 0x03, 0x9d, 0x2e, 0x87, 0x75, 0xf2, 0x6e, 0xff, 0xf4, 0xc7, 0x0e }; static int export_only_test(void) { const TEST_BASEDATA basedata = { OSSL_HPKE_MODE_BASE, { OSSL_HPKE_KEM_ID_X25519, OSSL_HPKE_KDF_ID_HKDF_SHA256, OSSL_HPKE_AEAD_ID_EXPORTONLY }, fourth_ikme, sizeof(fourth_ikme), fourth_ikmepub, sizeof(fourth_ikmepub), fourth_ikmr, sizeof(fourth_ikmr), fourth_ikmrpub, sizeof(fourth_ikmrpub), fourth_ikmrpriv, sizeof(fourth_ikmrpriv), fourth_expected_shared_secret, sizeof(fourth_expected_shared_secret), ksinfo, sizeof(ksinfo), NULL, 0, NULL, 0, NULL }; const TEST_EXPORTDATA exportdata[] = { { NULL, 0, fourth_export1, sizeof(fourth_export1) }, { fourth_context2, sizeof(fourth_context2), fourth_export2, sizeof(fourth_export2) }, { fourth_context3, sizeof(fourth_context3), fourth_export3, sizeof(fourth_export3) }, }; return do_testhpke(&basedata, NULL, 0, exportdata, OSSL_NELEM(exportdata)); } #endif #define COIN_IS_HEADS (test_random() % 2) static int hpke_mode_list[] = { OSSL_HPKE_MODE_BASE, OSSL_HPKE_MODE_PSK, OSSL_HPKE_MODE_AUTH, OSSL_HPKE_MODE_PSKAUTH }; static uint16_t hpke_kem_list[] = { OSSL_HPKE_KEM_ID_P256, OSSL_HPKE_KEM_ID_P384, OSSL_HPKE_KEM_ID_P521, #ifndef OPENSSL_NO_ECX OSSL_HPKE_KEM_ID_X25519, OSSL_HPKE_KEM_ID_X448 #endif }; static uint16_t hpke_kdf_list[] = { OSSL_HPKE_KDF_ID_HKDF_SHA256, OSSL_HPKE_KDF_ID_HKDF_SHA384, OSSL_HPKE_KDF_ID_HKDF_SHA512 }; static uint16_t hpke_aead_list[] = { OSSL_HPKE_AEAD_ID_AES_GCM_128, OSSL_HPKE_AEAD_ID_AES_GCM_256, #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305) OSSL_HPKE_AEAD_ID_CHACHA_POLY1305 #endif }; static const char *mode_str_list[] = { "base", "psk", "auth", "pskauth" }; static const char *kem_str_list[] = { #ifndef OPENSSL_NO_ECX "P-256", "P-384", "P-521", "x25519", "x448", "0x10", "0x11", "0x12", "0x20", "0x21", "16", "17", "18", "32", "33" #else "P-256", "P-384", "P-521", "0x10", "0x11", "0x12", "16", "17", "18" #endif }; static const char *kdf_str_list[] = { "hkdf-sha256", "hkdf-sha384", "hkdf-sha512", "0x1", "0x01", "0x2", "0x02", "0x3", "0x03", "1", "2", "3" }; static const char *aead_str_list[] = { "aes-128-gcm", "aes-256-gcm", "chacha20-poly1305", "exporter", "0x1", "0x01", "0x2", "0x02", "0x3", "0x03", "1", "2", "3", "0xff", "255" }; static const char *bogus_suite_strs[] = { "3,33,3", "bogus,bogus,bogus", "bogus,33,3,1,bogus", "bogus,33,3,1", "bogus,bogus", "bogus", "0x10,0x01,bogus", "0x10,bogus,0x01", "bogus,0x02,0x01", "aes-256-gcm,hkdf-sha512,x25519", ",,0x10,0x01,0x02", "0x10,,0x01,0x02", "0x10,0x01,,0x02", "0x10,\00x01,,0x02", "0x10,\0""0x01,0x02", "0x10\0,0x01,0x02", "0x10,0x01\0,0x02", "0x10,0x01,\0""0x02", " aes-256-gcm,hkdf-sha512,x25519", "aes-256-gcm, hkdf-sha512,x25519", "aes-256-gcm ,hkdf-sha512,x25519", "aes-256-gcm,hkdf-sha512, x25519", "aes-256-gcm,hkdf-sha512 ,x25519", "aes-256-gcm,hkdf-sha512,x25519 ", "0x10,0x01,0x02,", "0x10,0x01,0x02,,,", "0x10,0x01,0x01,0x02", "0x10,0x01,0x01,blah", "0x10,0x01,0x01 0x02", "0x10,0x01", "0x10", NULL, "", ",", ",," }; static int test_hpke_modes_suites(void) { int overallresult = 1; size_t mind = 0; size_t kemind = 0; size_t kdfind = 0; size_t aeadind = 0; for (mind = 0; mind < OSSL_NELEM(hpke_mode_list); mind++) { int hpke_mode = hpke_mode_list[mind]; size_t aadlen = OSSL_HPKE_TSTSIZE; unsigned char aad[OSSL_HPKE_TSTSIZE]; unsigned char *aadp = NULL; size_t infolen = 32; unsigned char info[32]; unsigned char *infop = NULL; unsigned char lpsk[32]; unsigned char *pskp = NULL; char lpskid[32]; size_t psklen = 32; char *pskidp = NULL; EVP_PKEY *privp = NULL; OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; size_t plainlen = OSSL_HPKE_TSTSIZE; unsigned char plain[OSSL_HPKE_TSTSIZE]; OSSL_HPKE_CTX *rctx = NULL; OSSL_HPKE_CTX *ctx = NULL; memset(plain, 0x00, OSSL_HPKE_TSTSIZE); strcpy((char *)plain, "a message not in a bottle"); plainlen = strlen((char *)plain); if (COIN_IS_HEADS) { aadp = aad; memset(aad, 'a', aadlen); } else { aadlen = 0; } if (COIN_IS_HEADS) { infop = info; memset(info, 'i', infolen); } else { infolen = 0; } if (hpke_mode == OSSL_HPKE_MODE_PSK || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { pskp = lpsk; memset(lpsk, 'P', psklen); pskidp = lpskid; memset(lpskid, 'I', psklen - 1); lpskid[psklen - 1] = '\0'; } else { psklen = 0; } for (kemind = 0; overallresult == 1 && kemind < OSSL_NELEM(hpke_kem_list); kemind++) { uint16_t kem_id = hpke_kem_list[kemind]; size_t authpublen = OSSL_HPKE_TSTSIZE; unsigned char authpub[OSSL_HPKE_TSTSIZE]; unsigned char *authpubp = NULL; EVP_PKEY *authpriv = NULL; hpke_suite.kem_id = kem_id; if (hpke_mode == OSSL_HPKE_MODE_AUTH || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { if (TEST_true(OSSL_HPKE_keygen(hpke_suite, authpub, &authpublen, &authpriv, NULL, 0, testctx, NULL)) != 1) { overallresult = 0; } authpubp = authpub; } else { authpublen = 0; } for (kdfind = 0; overallresult == 1 && kdfind < OSSL_NELEM(hpke_kdf_list); kdfind++) { uint16_t kdf_id = hpke_kdf_list[kdfind]; hpke_suite.kdf_id = kdf_id; for (aeadind = 0; overallresult == 1 && aeadind < OSSL_NELEM(hpke_aead_list); aeadind++) { uint16_t aead_id = hpke_aead_list[aeadind]; size_t publen = OSSL_HPKE_TSTSIZE; unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t senderpublen = OSSL_HPKE_TSTSIZE; unsigned char senderpub[OSSL_HPKE_TSTSIZE]; size_t cipherlen = OSSL_HPKE_TSTSIZE; unsigned char cipher[OSSL_HPKE_TSTSIZE]; size_t clearlen = OSSL_HPKE_TSTSIZE; unsigned char clear[OSSL_HPKE_TSTSIZE]; hpke_suite.aead_id = aead_id; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) overallresult = 0; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) overallresult = 0; if (hpke_mode == OSSL_HPKE_MODE_PSK || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(OSSL_HPKE_CTX_set1_psk(ctx, pskidp, pskp, psklen))) overallresult = 0; } if (hpke_mode == OSSL_HPKE_MODE_AUTH || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(OSSL_HPKE_CTX_set1_authpriv(ctx, authpriv))) overallresult = 0; } if (!TEST_true(OSSL_HPKE_encap(ctx, senderpub, &senderpublen, pub, publen, infop, infolen))) overallresult = 0; cipherlen = 15; if (!TEST_false(OSSL_HPKE_seal(ctx, cipher, &cipherlen, aadp, aadlen, plain, plainlen))) overallresult = 0; cipherlen = OSSL_HPKE_TSTSIZE; if (!TEST_true(OSSL_HPKE_seal(ctx, cipher, &cipherlen, aadp, aadlen, plain, plainlen))) overallresult = 0; OSSL_HPKE_CTX_free(ctx); memset(clear, 0, clearlen); rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL); if (!TEST_ptr(rctx)) overallresult = 0; if (hpke_mode == OSSL_HPKE_MODE_PSK || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { if (!TEST_true(OSSL_HPKE_CTX_set1_psk(rctx, pskidp, pskp, psklen))) overallresult = 0; } if (hpke_mode == OSSL_HPKE_MODE_AUTH || hpke_mode == OSSL_HPKE_MODE_PSKAUTH) { if (hpke_suite.kem_id == OSSL_HPKE_KEM_ID_P256) { if (!TEST_false(OSSL_HPKE_CTX_set1_authpub(rctx, authpub, 10 ))) overallresult = 0; } if (!TEST_true(OSSL_HPKE_CTX_set1_authpub(rctx, authpubp, authpublen))) overallresult = 0; } if (!TEST_true(OSSL_HPKE_decap(rctx, senderpub, senderpublen, privp, infop, infolen))) overallresult = 0; clearlen = 15; if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, aadp, aadlen, cipher, cipherlen))) overallresult = 0; clearlen = OSSL_HPKE_TSTSIZE; if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, aadp, aadlen, cipher, cipherlen))) overallresult = 0; OSSL_HPKE_CTX_free(rctx); EVP_PKEY_free(privp); privp = NULL; if (!TEST_mem_eq(clear, clearlen, plain, plainlen)) { overallresult = 0; } if (verbose || overallresult != 1) { const char *res = NULL; res = (overallresult == 1 ? "worked" : "failed"); TEST_note("HPKE %s for mode: %s/0x%02x, "\ "kem: %s/0x%02x, kdf: %s/0x%02x, "\ "aead: %s/0x%02x", res, mode_str_list[mind], (int) mind, kem_str_list[kemind], kem_id, kdf_str_list[kdfind], kdf_id, aead_str_list[aeadind], aead_id); } } } EVP_PKEY_free(authpriv); } } return overallresult; } static int test_hpke_export(void) { int erv = 0; EVP_PKEY *privp = NULL; unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t publen = sizeof(pub); int hpke_mode = OSSL_HPKE_MODE_BASE; OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_CTX *ctx = NULL; OSSL_HPKE_CTX *rctx = NULL; unsigned char exp[32]; unsigned char exp2[32]; unsigned char rexp[32]; unsigned char rexp2[32]; unsigned char plain[] = "quick brown fox"; size_t plainlen = sizeof(plain); unsigned char enc[OSSL_HPKE_TSTSIZE]; size_t enclen = sizeof(enc); unsigned char cipher[OSSL_HPKE_TSTSIZE]; size_t cipherlen = sizeof(cipher); unsigned char clear[OSSL_HPKE_TSTSIZE]; size_t clearlen = sizeof(clear); char *estr = "foo"; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_export(NULL, exp, sizeof(exp), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_false(OSSL_HPKE_export(ctx, exp, sizeof(exp), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; if (!TEST_true(OSSL_HPKE_export(ctx, exp, sizeof(exp), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_true(OSSL_HPKE_export(ctx, exp2, sizeof(exp2), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_mem_eq(exp, sizeof(exp), exp2, sizeof(exp2))) goto end; if (!TEST_ptr(rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL))) goto end; if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; if (!TEST_true(OSSL_HPKE_export(rctx, rexp, sizeof(rexp), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_true(OSSL_HPKE_export(rctx, rexp2, sizeof(rexp2), (unsigned char *)estr, strlen(estr)))) goto end; if (!TEST_mem_eq(rexp, sizeof(rexp), rexp2, sizeof(rexp2))) goto end; if (!TEST_mem_eq(exp, sizeof(exp), rexp, sizeof(rexp))) goto end; erv = 1; end: OSSL_HPKE_CTX_free(ctx); OSSL_HPKE_CTX_free(rctx); EVP_PKEY_free(privp); return erv; } static int test_hpke_suite_strs(void) { int overallresult = 1; int kemind = 0; int kdfind = 0; int aeadind = 0; int sind = 0; char sstr[128]; OSSL_HPKE_SUITE stirred; char giant[2048]; for (kemind = 0; kemind != OSSL_NELEM(kem_str_list); kemind++) { for (kdfind = 0; kdfind != OSSL_NELEM(kdf_str_list); kdfind++) { for (aeadind = 0; aeadind != OSSL_NELEM(aead_str_list); aeadind++) { BIO_snprintf(sstr, 128, "%s,%s,%s", kem_str_list[kemind], kdf_str_list[kdfind], aead_str_list[aeadind]); if (TEST_true(OSSL_HPKE_str2suite(sstr, &stirred)) != 1) { if (verbose) TEST_note("Unexpected str2suite fail for :%s", bogus_suite_strs[sind]); overallresult = 0; } } } } for (sind = 0; sind != OSSL_NELEM(bogus_suite_strs); sind++) { if (TEST_false(OSSL_HPKE_str2suite(bogus_suite_strs[sind], &stirred)) != 1) { if (verbose) TEST_note("OSSL_HPKE_str2suite didn't fail for bogus[%d]:%s", sind, bogus_suite_strs[sind]); overallresult = 0; } } if (!TEST_false(OSSL_HPKE_str2suite("", &stirred))) overallresult = 0; if (!TEST_false(OSSL_HPKE_str2suite(NULL, &stirred))) overallresult = 0; if (!TEST_false(OSSL_HPKE_str2suite("", NULL))) overallresult = 0; memset(giant, 'A', sizeof(giant) - 1); giant[sizeof(giant) - 1] = '\0'; if (!TEST_false(OSSL_HPKE_str2suite(giant, &stirred))) overallresult = 0; return overallresult; } static int test_hpke_grease(void) { int overallresult = 1; OSSL_HPKE_SUITE g_suite; unsigned char g_pub[OSSL_HPKE_TSTSIZE]; size_t g_pub_len = OSSL_HPKE_TSTSIZE; unsigned char g_cipher[OSSL_HPKE_TSTSIZE]; size_t g_cipher_len = 266; size_t clearlen = 128; size_t expanded = 0; size_t enclen = 0; size_t ikmelen = 0; memset(&g_suite, 0, sizeof(OSSL_HPKE_SUITE)); g_pub_len = 10; if (TEST_false(OSSL_HPKE_get_grease_value(NULL, &g_suite, g_pub, &g_pub_len, g_cipher, g_cipher_len, testctx, NULL)) != 1) { overallresult = 0; } g_pub_len = OSSL_HPKE_TSTSIZE; if (TEST_true(OSSL_HPKE_get_grease_value(NULL, &g_suite, g_pub, &g_pub_len, g_cipher, g_cipher_len, testctx, NULL)) != 1) { overallresult = 0; } expanded = OSSL_HPKE_get_ciphertext_size(g_suite, clearlen); if (!TEST_size_t_gt(expanded, clearlen)) { overallresult = 0; } enclen = OSSL_HPKE_get_public_encap_size(g_suite); if (!TEST_size_t_ne(enclen, 0)) overallresult = 0; ikmelen = OSSL_HPKE_get_recommended_ikmelen(g_suite); if (!TEST_size_t_ne(ikmelen, 0)) overallresult = 0; return overallresult; } static int test_hpke_oddcalls(void) { int erv = 0; EVP_PKEY *privp = NULL; unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t publen = sizeof(pub); int hpke_mode = OSSL_HPKE_MODE_BASE; int bad_mode = 0xbad; OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_SUITE bad_suite = { 0xbad, 0xbad, 0xbad }; OSSL_HPKE_CTX *ctx = NULL; OSSL_HPKE_CTX *rctx = NULL; unsigned char plain[] = "quick brown fox"; size_t plainlen = sizeof(plain); unsigned char enc[OSSL_HPKE_TSTSIZE], smallenc[10]; size_t enclen = sizeof(enc), smallenclen = sizeof(smallenc); unsigned char cipher[OSSL_HPKE_TSTSIZE]; size_t cipherlen = sizeof(cipher); unsigned char clear[OSSL_HPKE_TSTSIZE]; size_t clearlen = sizeof(clear); unsigned char fake_ikm[OSSL_HPKE_TSTSIZE]; char *badpropq = "yeah, this won't work"; uint64_t lseq = 0; char giant_pskid[OSSL_HPKE_MAX_PARMLEN + 10]; unsigned char info[OSSL_HPKE_TSTSIZE]; OSSL_HPKE_CTX_free(NULL); if (!TEST_false(OSSL_HPKE_CTX_set_seq(NULL, 1))) goto end; if (!TEST_false(OSSL_HPKE_CTX_get_seq(NULL, &lseq))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_authpub(NULL, pub, publen))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_authpriv(NULL, privp))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_ikme(NULL, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_psk(NULL, NULL, NULL, 0))) goto end; hpke_suite.aead_id = 0xbad; if (!TEST_false(OSSL_HPKE_suite_check(hpke_suite))) goto end; hpke_suite.aead_id = OSSL_HPKE_AEAD_ID_AES_GCM_128; if (!TEST_false(OSSL_HPKE_suite_check(bad_suite))) goto end; if (!TEST_false(OSSL_HPKE_get_recommended_ikmelen(bad_suite))) goto end; if (!TEST_false(OSSL_HPKE_get_public_encap_size(bad_suite))) goto end; if (!TEST_false(OSSL_HPKE_get_ciphertext_size(bad_suite, 0))) goto end; if (!TEST_false(OSSL_HPKE_keygen(bad_suite, pub, &publen, &privp, NULL, 0, testctx, badpropq))) goto end; if (!TEST_false(OSSL_HPKE_keygen(bad_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_keygen(hpke_suite, NULL, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 80, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, fake_ikm, 0, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, fake_ikm, -1, testctx, NULL))) goto end; publen = 10; if (!TEST_false(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; publen = sizeof(pub); if (!TEST_false(OSSL_HPKE_encap(NULL, NULL, NULL, NULL, 0, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_decap(NULL, NULL, 0, NULL, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(OSSL_HPKE_MODE_PSK, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_psk(ctx, "foo", (unsigned char *)"bar", -1))) goto end; memset(giant_pskid, 'A', sizeof(giant_pskid) - 1); giant_pskid[sizeof(giant_pskid) - 1] = '\0'; if (!TEST_false(OSSL_HPKE_CTX_set1_psk(ctx, giant_pskid, (unsigned char *)"bar", 3))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; OSSL_HPKE_CTX_free(ctx); if (!TEST_ptr_null(ctx = OSSL_HPKE_CTX_new(hpke_mode, bad_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_ptr_null(ctx = OSSL_HPKE_CTX_new(bad_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_ikme(ctx, fake_ikm, -1))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_ikme(ctx, fake_ikm, 0))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_authpub(ctx, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_authpriv(ctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_authpriv(ctx, privp))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set1_psk(ctx, "foo", (unsigned char *)"bar", 3))) goto end; if (!TEST_false(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, 1, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, 1, info, -1))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, 1, NULL, 1))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, 1, info, 0))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, smallenc, &smallenclen, pub, 1, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; plainlen = 0; if (!TEST_false(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; plainlen = sizeof(plain); if (!TEST_true(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; if (!TEST_ptr(rctx = OSSL_HPKE_CTX_new(OSSL_HPKE_MODE_PSK, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; OSSL_HPKE_CTX_free(rctx); if (!TEST_ptr(rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; if (!TEST_false(OSSL_HPKE_decap(rctx, enc, enclen, privp, info, -1))) goto end; if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; clearlen = 0; if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; clearlen = OSSL_HPKE_TSTSIZE; if (!TEST_true(OSSL_HPKE_CTX_set_seq(rctx, -1))) goto end; if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set_seq(rctx, 0))) goto end; if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; if (!TEST_mem_eq(plain, plainlen, clear, clearlen)) goto end; erv = 1; end: OSSL_HPKE_CTX_free(ctx); OSSL_HPKE_CTX_free(rctx); EVP_PKEY_free(privp); return erv; } #ifndef OPENSSL_NO_ECX static const unsigned char ikm25519[] = { 0x72, 0x68, 0x60, 0x0d, 0x40, 0x3f, 0xce, 0x43, 0x15, 0x61, 0xae, 0xf5, 0x83, 0xee, 0x16, 0x13, 0x52, 0x7c, 0xff, 0x65, 0x5c, 0x13, 0x43, 0xf2, 0x98, 0x12, 0xe6, 0x67, 0x06, 0xdf, 0x32, 0x34 }; static const unsigned char pub25519[] = { 0x37, 0xfd, 0xa3, 0x56, 0x7b, 0xdb, 0xd6, 0x28, 0xe8, 0x86, 0x68, 0xc3, 0xc8, 0xd7, 0xe9, 0x7d, 0x1d, 0x12, 0x53, 0xb6, 0xd4, 0xea, 0x6d, 0x44, 0xc1, 0x50, 0xf7, 0x41, 0xf1, 0xbf, 0x44, 0x31 }; #endif static const unsigned char ikmp256[] = { 0x42, 0x70, 0xe5, 0x4f, 0xfd, 0x08, 0xd7, 0x9d, 0x59, 0x28, 0x02, 0x0a, 0xf4, 0x68, 0x6d, 0x8f, 0x6b, 0x7d, 0x35, 0xdb, 0xe4, 0x70, 0x26, 0x5f, 0x1f, 0x5a, 0xa2, 0x28, 0x16, 0xce, 0x86, 0x0e }; static const unsigned char pubp256[] = { 0x04, 0xa9, 0x27, 0x19, 0xc6, 0x19, 0x5d, 0x50, 0x85, 0x10, 0x4f, 0x46, 0x9a, 0x8b, 0x98, 0x14, 0xd5, 0x83, 0x8f, 0xf7, 0x2b, 0x60, 0x50, 0x1e, 0x2c, 0x44, 0x66, 0xe5, 0xe6, 0x7b, 0x32, 0x5a, 0xc9, 0x85, 0x36, 0xd7, 0xb6, 0x1a, 0x1a, 0xf4, 0xb7, 0x8e, 0x5b, 0x7f, 0x95, 0x1c, 0x09, 0x00, 0xbe, 0x86, 0x3c, 0x40, 0x3c, 0xe6, 0x5c, 0x9b, 0xfc, 0xb9, 0x38, 0x26, 0x57, 0x22, 0x2d, 0x18, 0xc4 }; static const unsigned char ikmiter[] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x01, 0x38, 0xb5, 0xec }; static const unsigned char pubiter[] = { 0x04, 0x7d, 0x0c, 0x87, 0xff, 0xd5, 0xd1, 0x45, 0x54, 0xa7, 0x51, 0xdf, 0xa3, 0x99, 0x26, 0xa9, 0xe3, 0x0e, 0x7c, 0x3c, 0x65, 0x62, 0x4f, 0x4b, 0x5f, 0xb3, 0xad, 0x7a, 0xa4, 0xda, 0xc2, 0x4a, 0xd8, 0xf5, 0xbe, 0xd0, 0xe8, 0x6e, 0xb8, 0x84, 0x1c, 0xe4, 0x89, 0x2e, 0x0f, 0xc3, 0x87, 0xbb, 0xdb, 0xfe, 0x16, 0x0d, 0x58, 0x9c, 0x89, 0x2d, 0xd4, 0xb1, 0x46, 0x4a, 0xc3, 0x51, 0xc5, 0x6f, 0xb6 }; static const unsigned char ikmp521[] = { 0x7f, 0x06, 0xab, 0x82, 0x15, 0x10, 0x5f, 0xc4, 0x6a, 0xce, 0xeb, 0x2e, 0x3d, 0xc5, 0x02, 0x8b, 0x44, 0x36, 0x4f, 0x96, 0x04, 0x26, 0xeb, 0x0d, 0x8e, 0x40, 0x26, 0xc2, 0xf8, 0xb5, 0xd7, 0xe7, 0xa9, 0x86, 0x68, 0x8f, 0x15, 0x91, 0xab, 0xf5, 0xab, 0x75, 0x3c, 0x35, 0x7a, 0x5d, 0x6f, 0x04, 0x40, 0x41, 0x4b, 0x4e, 0xd4, 0xed, 0xe7, 0x13, 0x17, 0x77, 0x2a, 0xc9, 0x8d, 0x92, 0x39, 0xf7, 0x09, 0x04 }; static const unsigned char pubp521[] = { 0x04, 0x01, 0x38, 0xb3, 0x85, 0xca, 0x16, 0xbb, 0x0d, 0x5f, 0xa0, 0xc0, 0x66, 0x5f, 0xbb, 0xd7, 0xe6, 0x9e, 0x3e, 0xe2, 0x9f, 0x63, 0x99, 0x1d, 0x3e, 0x9b, 0x5f, 0xa7, 0x40, 0xaa, 0xb8, 0x90, 0x0a, 0xae, 0xed, 0x46, 0xed, 0x73, 0xa4, 0x90, 0x55, 0x75, 0x84, 0x25, 0xa0, 0xce, 0x36, 0x50, 0x7c, 0x54, 0xb2, 0x9c, 0xc5, 0xb8, 0x5a, 0x5c, 0xee, 0x6b, 0xae, 0x0c, 0xf1, 0xc2, 0x1f, 0x27, 0x31, 0xec, 0xe2, 0x01, 0x3d, 0xc3, 0xfb, 0x7c, 0x8d, 0x21, 0x65, 0x4b, 0xb1, 0x61, 0xb4, 0x63, 0x96, 0x2c, 0xa1, 0x9e, 0x8c, 0x65, 0x4f, 0xf2, 0x4c, 0x94, 0xdd, 0x28, 0x98, 0xde, 0x12, 0x05, 0x1f, 0x1e, 0xd0, 0x69, 0x22, 0x37, 0xfb, 0x02, 0xb2, 0xf8, 0xd1, 0xdc, 0x1c, 0x73, 0xe9, 0xb3, 0x66, 0xb5, 0x29, 0xeb, 0x43, 0x6e, 0x98, 0xa9, 0x96, 0xee, 0x52, 0x2a, 0xef, 0x86, 0x3d, 0xd5, 0x73, 0x9d, 0x2f, 0x29, 0xb0 }; static int test_hpke_random_suites(void) { OSSL_HPKE_SUITE def_suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_SUITE suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_SUITE suite2 = { 0xff01, 0xff02, 0xff03 }; unsigned char enc[200]; size_t enclen = sizeof(enc); unsigned char ct[500]; size_t ctlen = sizeof(ct); if (!TEST_false(OSSL_HPKE_get_grease_value(NULL, NULL, NULL, NULL, NULL, 0, testctx, NULL))) return 0; enclen = 10; if (!TEST_false(OSSL_HPKE_get_grease_value(&def_suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); if (!TEST_true(OSSL_HPKE_get_grease_value(&def_suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); if (!TEST_true(OSSL_HPKE_get_grease_value(NULL, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); suite.kem_id = OSSL_HPKE_KEM_ID_P521; if (!TEST_true(OSSL_HPKE_get_grease_value(&suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); ctlen = 2; if (!TEST_false(OSSL_HPKE_get_grease_value(NULL, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; ctlen = sizeof(ct); enclen = sizeof(enc); suite.kem_id = OSSL_HPKE_KEM_ID_X25519; suite.aead_id = 0x1234; if (!TEST_false(OSSL_HPKE_get_grease_value(&suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); suite.aead_id = def_suite.aead_id; suite.kdf_id = 0x3451; if (!TEST_false(OSSL_HPKE_get_grease_value(&suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; enclen = sizeof(enc); suite.kdf_id = def_suite.kdf_id; suite.kem_id = 0x4517; if (!TEST_false(OSSL_HPKE_get_grease_value(&suite, &suite2, enc, &enclen, ct, ctlen, testctx, NULL))) return 0; return 1; } static int test_hpke_one_ikm_gen(uint16_t kem_id, const unsigned char *ikm, size_t ikmlen, const unsigned char *pub, size_t publen) { OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; unsigned char lpub[OSSL_HPKE_TSTSIZE]; size_t lpublen = OSSL_HPKE_TSTSIZE; EVP_PKEY *sk = NULL; hpke_suite.kem_id = kem_id; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, lpub, &lpublen, &sk, ikm, ikmlen, testctx, NULL))) return 0; if (!TEST_ptr(sk)) return 0; EVP_PKEY_free(sk); if (!TEST_mem_eq(pub, publen, lpub, lpublen)) return 0; return 1; } static int test_hpke_ikms(void) { int res = 1; #ifndef OPENSSL_NO_ECX res = test_hpke_one_ikm_gen(OSSL_HPKE_KEM_ID_X25519, ikm25519, sizeof(ikm25519), pub25519, sizeof(pub25519)); if (res != 1) return res; #endif res = test_hpke_one_ikm_gen(OSSL_HPKE_KEM_ID_P521, ikmp521, sizeof(ikmp521), pubp521, sizeof(pubp521)); if (res != 1) return res; res = test_hpke_one_ikm_gen(OSSL_HPKE_KEM_ID_P256, ikmp256, sizeof(ikmp256), pubp256, sizeof(pubp256)); if (res != 1) return res; res = test_hpke_one_ikm_gen(OSSL_HPKE_KEM_ID_P256, ikmiter, sizeof(ikmiter), pubiter, sizeof(pubiter)); if (res != 1) return res; return res; } static int test_hpke_compressed(void) { int erv = 0; EVP_PKEY *privp = NULL; unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t publen = sizeof(pub); EVP_PKEY *authpriv = NULL; unsigned char authpub[OSSL_HPKE_TSTSIZE]; size_t authpublen = sizeof(authpub); int hpke_mode = OSSL_HPKE_MODE_AUTH; OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_CTX *ctx = NULL; OSSL_HPKE_CTX *rctx = NULL; unsigned char plain[] = "quick brown fox"; size_t plainlen = sizeof(plain); unsigned char enc[OSSL_HPKE_TSTSIZE]; size_t enclen = sizeof(enc); unsigned char cipher[OSSL_HPKE_TSTSIZE]; size_t cipherlen = sizeof(cipher); unsigned char clear[OSSL_HPKE_TSTSIZE]; size_t clearlen = sizeof(clear); hpke_suite.kem_id = OSSL_HPKE_KEM_ID_P256; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, authpub, &authpublen, &authpriv, NULL, 0, testctx, NULL))) goto end; if (!TEST_true(EVP_PKEY_set_utf8_string_param(authpriv, OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT, OSSL_PKEY_EC_POINT_CONVERSION_FORMAT_COMPRESSED))) goto end; if (!TEST_true(EVP_PKEY_get_octet_string_param(authpriv, OSSL_PKEY_PARAM_PUB_KEY, authpub, sizeof(authpub), &authpublen))) goto end; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set1_authpriv(ctx, authpriv))) goto end; if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; if (!TEST_ptr(rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set1_authpub(rctx, authpub, authpublen))) goto end; if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; erv = 1; end: EVP_PKEY_free(privp); EVP_PKEY_free(authpriv); OSSL_HPKE_CTX_free(ctx); OSSL_HPKE_CTX_free(rctx); return erv; } static int test_hpke_noncereuse(void) { int erv = 0; EVP_PKEY *privp = NULL; unsigned char pub[OSSL_HPKE_TSTSIZE]; size_t publen = sizeof(pub); int hpke_mode = OSSL_HPKE_MODE_BASE; OSSL_HPKE_SUITE hpke_suite = OSSL_HPKE_SUITE_DEFAULT; OSSL_HPKE_CTX *ctx = NULL; OSSL_HPKE_CTX *rctx = NULL; unsigned char plain[] = "quick brown fox"; size_t plainlen = sizeof(plain); unsigned char enc[OSSL_HPKE_TSTSIZE]; size_t enclen = sizeof(enc); unsigned char cipher[OSSL_HPKE_TSTSIZE]; size_t cipherlen = sizeof(cipher); unsigned char clear[OSSL_HPKE_TSTSIZE]; size_t clearlen = sizeof(clear); uint64_t seq = 0xbad1dea; if (!TEST_true(OSSL_HPKE_keygen(hpke_suite, pub, &publen, &privp, NULL, 0, testctx, NULL))) goto end; if (!TEST_ptr(ctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_SENDER, testctx, NULL))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set_seq(ctx, seq))) goto end; if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) goto end; if (!TEST_false(OSSL_HPKE_CTX_set_seq(ctx, seq + 1))) goto end; if (!TEST_true(OSSL_HPKE_seal(ctx, cipher, &cipherlen, NULL, 0, plain, plainlen))) goto end; if (!TEST_ptr(rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, OSSL_HPKE_ROLE_RECEIVER, testctx, NULL))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set_seq(rctx, seq))) goto end; if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set_seq(rctx, seq))) goto end; if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; if (!TEST_true(OSSL_HPKE_CTX_set_seq(rctx, 0))) goto end; if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, NULL, 0, cipher, cipherlen))) goto end; erv = 1; end: EVP_PKEY_free(privp); OSSL_HPKE_CTX_free(ctx); OSSL_HPKE_CTX_free(rctx); return erv; } typedef enum OPTION_choice { OPT_ERR = -1, OPT_EOF = 0, OPT_VERBOSE, OPT_TEST_ENUM } OPTION_CHOICE; const OPTIONS *test_get_options(void) { static const OPTIONS test_options[] = { OPT_TEST_OPTIONS_DEFAULT_USAGE, { "v", OPT_VERBOSE, '-', "Enable verbose mode" }, { OPT_HELP_STR, 1, '-', "Run HPKE tests\n" }, { NULL } }; return test_options; } int setup_tests(void) { OPTION_CHOICE o; while ((o = opt_next()) != OPT_EOF) { switch (o) { case OPT_VERBOSE: verbose = 1; break; case OPT_TEST_CASES: break; default: return 0; } } if (!test_get_libctx(&testctx, &nullprov, NULL, &deflprov, "default")) return 0; #ifndef OPENSSL_NO_ECX ADD_TEST(export_only_test); ADD_TEST(x25519kdfsha256_hkdfsha256_aes128gcm_base_test); ADD_TEST(x25519kdfsha256_hkdfsha256_aes128gcm_psk_test); #endif ADD_TEST(P256kdfsha256_hkdfsha256_aes128gcm_base_test); ADD_TEST(test_hpke_export); ADD_TEST(test_hpke_modes_suites); ADD_TEST(test_hpke_suite_strs); ADD_TEST(test_hpke_grease); ADD_TEST(test_hpke_ikms); ADD_TEST(test_hpke_random_suites); ADD_TEST(test_hpke_oddcalls); ADD_TEST(test_hpke_compressed); ADD_TEST(test_hpke_noncereuse); return 1; } void cleanup_tests(void) { OSSL_PROVIDER_unload(deflprov); OSSL_PROVIDER_unload(nullprov); OSSL_LIB_CTX_free(testctx); }
test
openssl/test/hpke_test.c
openssl
#include <stdio.h> #include <string.h> #include <ctype.h> #include <limits.h> #include <errno.h> #include <openssl/crypto.h> #include <openssl/evp.h> #include <openssl/x509.h> #include <openssl/ssl.h> #include <openssl/err.h> #include <openssl/conf.h> #ifndef OPENSSL_NO_ENGINE # include <openssl/engine.h> #endif #include "testutil.h" #include "internal/nelem.h" #define _UC(c) ((unsigned char)(c)) static const char *basedomain; static const char *CAfile; static const char *tlsafile; static void store_ctx_dane_init(X509_STORE_CTX *, SSL *); static int saved_errno; static void save_errno(void) { saved_errno = errno; } static int restore_errno(void) { int ret = errno; errno = saved_errno; return ret; } static int verify_chain(SSL *ssl, STACK_OF(X509) *chain) { X509_STORE_CTX *store_ctx = NULL; SSL_CTX *ssl_ctx = NULL; X509_STORE *store = NULL; int ret = 0; int store_ctx_idx = SSL_get_ex_data_X509_STORE_CTX_idx(); if (!TEST_ptr(store_ctx = X509_STORE_CTX_new()) || !TEST_ptr(ssl_ctx = SSL_get_SSL_CTX(ssl)) || !TEST_ptr(store = SSL_CTX_get_cert_store(ssl_ctx)) || !TEST_true(X509_STORE_CTX_init(store_ctx, store, NULL, chain)) || !TEST_true(X509_STORE_CTX_set_ex_data(store_ctx, store_ctx_idx, ssl))) goto end; X509_STORE_CTX_set_default(store_ctx, SSL_is_server(ssl) ? "ssl_client" : "ssl_server"); X509_VERIFY_PARAM_set1(X509_STORE_CTX_get0_param(store_ctx), SSL_get0_param(ssl)); store_ctx_dane_init(store_ctx, ssl); if (SSL_get_verify_callback(ssl) != NULL) X509_STORE_CTX_set_verify_cb(store_ctx, SSL_get_verify_callback(ssl)); if (!TEST_int_ge(ret = X509_STORE_CTX_verify(store_ctx), 0)) ret = 0; SSL_set_verify_result(ssl, X509_STORE_CTX_get_error(store_ctx)); end: X509_STORE_CTX_free(store_ctx); return ret; } static STACK_OF(X509) *load_chain(BIO *fp, int nelem) { int count; char *name = 0; char *header = 0; unsigned char *data = 0; long len; char *errtype = 0; STACK_OF(X509) *chain; typedef X509 *(*d2i_X509_t)(X509 **, const unsigned char **, long); if (!TEST_ptr(chain = sk_X509_new_null())) goto err; for (count = 0; count < nelem && errtype == 0 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; ++count) { if (strcmp(name, PEM_STRING_X509) == 0 || strcmp(name, PEM_STRING_X509_TRUSTED) == 0 || strcmp(name, PEM_STRING_X509_OLD) == 0) { d2i_X509_t d = strcmp(name, PEM_STRING_X509_TRUSTED) != 0 ? d2i_X509_AUX : d2i_X509; X509 *cert; const unsigned char *p = data; if (!TEST_ptr(cert = d(0, &p, len)) || !TEST_long_eq(p - data, len)) { TEST_info("Certificate parsing error"); goto err; } if (!TEST_true(sk_X509_push(chain, cert))) goto err; } else { TEST_info("Unknown chain file object %s", name); goto err; } OPENSSL_free(name); OPENSSL_free(header); OPENSSL_free(data); name = header = NULL; data = NULL; } if (count == nelem) { ERR_clear_error(); return chain; } err: OPENSSL_free(name); OPENSSL_free(header); OPENSSL_free(data); OSSL_STACK_OF_X509_free(chain); return NULL; } static char *read_to_eol(BIO *f) { static char buf[4096]; int n; if (BIO_gets(f, buf, sizeof(buf)) <= 0) return NULL; n = strlen(buf); if (buf[n - 1] != '\n') { if (n + 1 == sizeof(buf)) TEST_error("input too long"); else TEST_error("EOF before newline"); return NULL; } while (n > 0 && isspace(_UC(buf[n - 1]))) buf[--n] = '\0'; return buf; } static ossl_ssize_t hexdecode(const char *in, void *result) { unsigned char **out = (unsigned char **)result; unsigned char *ret; unsigned char *cp; uint8_t byte; int nibble = 0; if (!TEST_ptr(ret = OPENSSL_malloc(strlen(in) / 2))) return -1; cp = ret; for (byte = 0; *in; ++in) { int x; if (isspace(_UC(*in))) continue; x = OPENSSL_hexchar2int(*in); if (x < 0) { OPENSSL_free(ret); return 0; } byte |= (char)x; if ((nibble ^= 1) == 0) { *cp++ = byte; byte = 0; } else { byte <<= 4; } } if (nibble != 0) { OPENSSL_free(ret); return 0; } return cp - (*out = ret); } static ossl_ssize_t checked_uint8(const char *in, void *out) { uint8_t *result = (uint8_t *)out; const char *cp = in; char *endp; long v; int e; save_errno(); v = strtol(cp, &endp, 10); e = restore_errno(); if (((v == LONG_MIN || v == LONG_MAX) && e == ERANGE) || endp == cp || !isspace(_UC(*endp)) || v != (*(uint8_t *)result = (uint8_t) v)) { return -1; } for (cp = endp; isspace(_UC(*cp)); ++cp) continue; return cp - in; } struct tlsa_field { void *var; const char *name; ossl_ssize_t (*parser)(const char *, void *); }; static int tlsa_import_rr(SSL *ssl, const char *rrdata) { static uint8_t usage; static uint8_t selector; static uint8_t mtype; static unsigned char *data = NULL; static struct tlsa_field tlsa_fields[] = { { &usage, "usage", checked_uint8 }, { &selector, "selector", checked_uint8 }, { &mtype, "mtype", checked_uint8 }, { &data, "data", hexdecode }, { NULL, } }; int ret; struct tlsa_field *f; const char *cp = rrdata; ossl_ssize_t len = 0; for (f = tlsa_fields; f->var; ++f) { if ((len = f->parser(cp += len, f->var)) <= 0) { TEST_info("bad TLSA %s field in: %s", f->name, rrdata); return 0; } } ret = SSL_dane_tlsa_add(ssl, usage, selector, mtype, data, len); OPENSSL_free(data); if (ret == 0) { TEST_info("unusable TLSA rrdata: %s", rrdata); return 0; } if (ret < 0) { TEST_info("error loading TLSA rrdata: %s", rrdata); return 0; } return ret; } static int allws(const char *cp) { while (*cp) if (!isspace(_UC(*cp++))) return 0; return 1; } static int test_tlsafile(SSL_CTX *ctx, const char *base_name, BIO *f, const char *path) { char *line; int testno = 0; int ret = 1; SSL *ssl; while (ret > 0 && (line = read_to_eol(f)) != NULL) { STACK_OF(X509) *chain; int ntlsa; int ncert; int noncheck; int want; int want_depth; int off; int i; int ok; int err; int mdpth; if (*line == '\0' || *line == '#') continue; ++testno; if (sscanf(line, "%d %d %d %d %d%n", &ntlsa, &ncert, &noncheck, &want, &want_depth, &off) != 5 || !allws(line + off)) { TEST_error("Malformed line for test %d", testno); return 0; } if (!TEST_ptr(ssl = SSL_new(ctx))) return 0; SSL_set_connect_state(ssl); if (SSL_dane_enable(ssl, base_name) <= 0) { SSL_free(ssl); return 0; } if (noncheck) SSL_dane_set_flags(ssl, DANE_FLAG_NO_DANE_EE_NAMECHECKS); for (i = 0; i < ntlsa; ++i) { if ((line = read_to_eol(f)) == NULL || !tlsa_import_rr(ssl, line)) { SSL_free(ssl); return 0; } } ERR_clear_error(); if (!TEST_ptr(chain = load_chain(f, ncert))) { SSL_free(ssl); return 0; } ok = verify_chain(ssl, chain); OSSL_STACK_OF_X509_free(chain); err = SSL_get_verify_result(ssl); SSL_set_verify_result(ssl, X509_V_OK); mdpth = SSL_get0_dane_authority(ssl, NULL, NULL); SSL_set_verify_result(ssl, err); SSL_free(ssl); if (!TEST_int_eq(err, want)) { if (want == X509_V_OK) TEST_info("Verification failure in test %d: %d=%s", testno, err, X509_verify_cert_error_string(err)); else TEST_info("Unexpected error in test %d", testno); ret = 0; continue; } if (!TEST_false(want == 0 && ok == 0)) { TEST_info("Verification failure in test %d: ok=0", testno); ret = 0; continue; } if (!TEST_int_eq(mdpth, want_depth)) { TEST_info("In test test %d", testno); ret = 0; } } ERR_clear_error(); return ret; } static int run_tlsatest(void) { SSL_CTX *ctx = NULL; BIO *f = NULL; int ret = 0; if (!TEST_ptr(f = BIO_new_file(tlsafile, "r")) || !TEST_ptr(ctx = SSL_CTX_new(TLS_client_method())) || !TEST_int_gt(SSL_CTX_dane_enable(ctx), 0) || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) || !TEST_int_gt(SSL_CTX_dane_mtype_set(ctx, EVP_sha512(), 2, 1), 0) || !TEST_int_gt(SSL_CTX_dane_mtype_set(ctx, EVP_sha256(), 1, 2), 0) || !TEST_int_gt(test_tlsafile(ctx, basedomain, f, tlsafile), 0)) goto end; ret = 1; end: BIO_free(f); SSL_CTX_free(ctx); return ret; } OPT_TEST_DECLARE_USAGE("basedomain CAfile tlsafile\n") int setup_tests(void) { if (!test_skip_common_options()) { TEST_error("Error parsing test options\n"); return 0; } if (!TEST_ptr(basedomain = test_get_argument(0)) || !TEST_ptr(CAfile = test_get_argument(1)) || !TEST_ptr(tlsafile = test_get_argument(2))) return 0; ADD_TEST(run_tlsatest); return 1; } #include "internal/dane.h" static void store_ctx_dane_init(X509_STORE_CTX *store_ctx, SSL *ssl) { X509_STORE_CTX_set0_dane(store_ctx, SSL_get0_dane(ssl)); }
test
openssl/test/danetest.c
openssl
#include <openssl/crypto.h> int main(int argc, char **argv) { OPENSSL_die("Voluntary abort", __FILE__, __LINE__); return 0; }
test
openssl/test/aborttest.c
openssl
#include "internal/deprecated.h" #include <stdio.h> #include <string.h> #include <stdlib.h> #include <openssl/opensslconf.h> #include "internal/nelem.h" #include "testutil.h" #ifndef OPENSSL_NO_CAST # include <openssl/cast.h> static unsigned char k[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A }; static unsigned char in[8] = { 0x01, 0x23, 0x45, 0x67, 0x89, 0xAB, 0xCD, 0xEF }; static int k_len[3] = { 16, 10, 5 }; static unsigned char c[3][8] = { {0x23, 0x8B, 0x4F, 0xE5, 0x84, 0x7E, 0x44, 0xB2}, {0xEB, 0x6A, 0x71, 0x1A, 0x2C, 0x02, 0x27, 0x1B}, {0x7A, 0xC8, 0x16, 0xD1, 0x6E, 0x9B, 0x30, 0x2E}, }; static unsigned char in_a[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A }; static unsigned char in_b[16] = { 0x01, 0x23, 0x45, 0x67, 0x12, 0x34, 0x56, 0x78, 0x23, 0x45, 0x67, 0x89, 0x34, 0x56, 0x78, 0x9A }; static unsigned char c_a[16] = { 0xEE, 0xA9, 0xD0, 0xA2, 0x49, 0xFD, 0x3B, 0xA6, 0xB3, 0x43, 0x6F, 0xB8, 0x9D, 0x6D, 0xCA, 0x92 }; static unsigned char c_b[16] = { 0xB2, 0xC9, 0x5E, 0xB0, 0x0C, 0x31, 0xAD, 0x71, 0x80, 0xAC, 0x05, 0xB8, 0xE8, 0x3D, 0x69, 0x6E }; static int cast_test_vector(int z) { int testresult = 1; CAST_KEY key; unsigned char out[80]; CAST_set_key(&key, k_len[z], k); CAST_ecb_encrypt(in, out, &key, CAST_ENCRYPT); if (!TEST_mem_eq(out, sizeof(c[z]), c[z], sizeof(c[z]))) { TEST_info("CAST_ENCRYPT iteration %d failed (len=%d)", z, k_len[z]); testresult = 0; } CAST_ecb_encrypt(out, out, &key, CAST_DECRYPT); if (!TEST_mem_eq(out, sizeof(in), in, sizeof(in))) { TEST_info("CAST_DECRYPT iteration %d failed (len=%d)", z, k_len[z]); testresult = 0; } return testresult; } static int cast_test_iterations(void) { long l; int testresult = 1; CAST_KEY key, key_b; unsigned char out_a[16], out_b[16]; memcpy(out_a, in_a, sizeof(in_a)); memcpy(out_b, in_b, sizeof(in_b)); for (l = 0; l < 1000000L; l++) { CAST_set_key(&key_b, 16, out_b); CAST_ecb_encrypt(&(out_a[0]), &(out_a[0]), &key_b, CAST_ENCRYPT); CAST_ecb_encrypt(&(out_a[8]), &(out_a[8]), &key_b, CAST_ENCRYPT); CAST_set_key(&key, 16, out_a); CAST_ecb_encrypt(&(out_b[0]), &(out_b[0]), &key, CAST_ENCRYPT); CAST_ecb_encrypt(&(out_b[8]), &(out_b[8]), &key, CAST_ENCRYPT); } if (!TEST_mem_eq(out_a, sizeof(c_a), c_a, sizeof(c_a)) || !TEST_mem_eq(out_b, sizeof(c_b), c_b, sizeof(c_b))) testresult = 0; return testresult; } #endif int setup_tests(void) { #ifndef OPENSSL_NO_CAST ADD_ALL_TESTS(cast_test_vector, OSSL_NELEM(k_len)); ADD_TEST(cast_test_iterations); #endif return 1; }
test
openssl/test/casttest.c
openssl
#include "internal/deprecated.h" #include <string.h> #include "internal/nelem.h" #include "testutil.h" #ifndef OPENSSL_NO_IDEA # include <openssl/idea.h> static const unsigned char k[16] = { 0x00, 0x01, 0x00, 0x02, 0x00, 0x03, 0x00, 0x04, 0x00, 0x05, 0x00, 0x06, 0x00, 0x07, 0x00, 0x08 }; static const unsigned char in[8] = { 0x00, 0x00, 0x00, 0x01, 0x00, 0x02, 0x00, 0x03 }; static const unsigned char c[8] = { 0x11, 0xFB, 0xED, 0x2B, 0x01, 0x98, 0x6D, 0xE5 }; static unsigned char out[80]; static const unsigned char text[] = "Hello to all people out there"; static const unsigned char cfb_key[16] = { 0xe1, 0xf0, 0xc3, 0xd2, 0xa5, 0xb4, 0x87, 0x96, 0x69, 0x78, 0x4b, 0x5a, 0x2d, 0x3c, 0x0f, 0x1e, }; static const unsigned char cfb_iv[80] = { 0x34, 0x12, 0x78, 0x56, 0xab, 0x90, 0xef, 0xcd }; static unsigned char cfb_buf1[40], cfb_buf2[40], cfb_tmp[8]; # define CFB_TEST_SIZE 24 static const unsigned char plain[CFB_TEST_SIZE] = { 0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68, 0x65, 0x20, 0x74, 0x69, 0x6d, 0x65, 0x20, 0x66, 0x6f, 0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20 }; static const unsigned char cfb_cipher64[CFB_TEST_SIZE] = { 0x59, 0xD8, 0xE2, 0x65, 0x00, 0x58, 0x6C, 0x3F, 0x2C, 0x17, 0x25, 0xD0, 0x1A, 0x38, 0xB7, 0x2A, 0x39, 0x61, 0x37, 0xDC, 0x79, 0xFB, 0x9F, 0x45 }; static int test_idea_ecb(void) { IDEA_KEY_SCHEDULE key, dkey; IDEA_set_encrypt_key(k, &key); IDEA_ecb_encrypt(in, out, &key); if (!TEST_mem_eq(out, IDEA_BLOCK, c, sizeof(c))) return 0; IDEA_set_decrypt_key(&key, &dkey); IDEA_ecb_encrypt(c, out, &dkey); return TEST_mem_eq(out, IDEA_BLOCK, in, sizeof(in)); } static int test_idea_cbc(void) { IDEA_KEY_SCHEDULE key, dkey; unsigned char iv[IDEA_BLOCK]; const size_t text_len = sizeof(text); IDEA_set_encrypt_key(k, &key); IDEA_set_decrypt_key(&key, &dkey); memcpy(iv, k, sizeof(iv)); IDEA_cbc_encrypt(text, out, text_len, &key, iv, 1); memcpy(iv, k, sizeof(iv)); IDEA_cbc_encrypt(out, out, IDEA_BLOCK, &dkey, iv, 0); IDEA_cbc_encrypt(&out[8], &out[8], text_len - 8, &dkey, iv, 0); return TEST_mem_eq(text, text_len, out, text_len); } static int test_idea_cfb64(void) { IDEA_KEY_SCHEDULE eks, dks; int n; IDEA_set_encrypt_key(cfb_key, &eks); IDEA_set_decrypt_key(&eks, &dks); memcpy(cfb_tmp, cfb_iv, sizeof(cfb_tmp)); n = 0; IDEA_cfb64_encrypt(plain, cfb_buf1, (long)12, &eks, cfb_tmp, &n, IDEA_ENCRYPT); IDEA_cfb64_encrypt(&plain[12], &cfb_buf1[12], (long)CFB_TEST_SIZE - 12, &eks, cfb_tmp, &n, IDEA_ENCRYPT); if (!TEST_mem_eq(cfb_cipher64, CFB_TEST_SIZE, cfb_buf1, CFB_TEST_SIZE)) return 0; memcpy(cfb_tmp, cfb_iv, sizeof(cfb_tmp)); n = 0; IDEA_cfb64_encrypt(cfb_buf1, cfb_buf2, (long)13, &eks, cfb_tmp, &n, IDEA_DECRYPT); IDEA_cfb64_encrypt(&cfb_buf1[13], &cfb_buf2[13], (long)CFB_TEST_SIZE - 13, &eks, cfb_tmp, &n, IDEA_DECRYPT); return TEST_mem_eq(plain, CFB_TEST_SIZE, cfb_buf2, CFB_TEST_SIZE); } #endif int setup_tests(void) { #ifndef OPENSSL_NO_IDEA ADD_TEST(test_idea_ecb); ADD_TEST(test_idea_cbc); ADD_TEST(test_idea_cfb64); #endif return 1; }
test
openssl/test/ideatest.c
openssl
#include "internal/deprecated.h" #include <stdio.h> #include <string.h> #include <stdlib.h> #include "internal/nelem.h" # include <openssl/hmac.h> # include <openssl/sha.h> # ifndef OPENSSL_NO_MD5 # include <openssl/md5.h> # endif # ifdef CHARSET_EBCDIC # include <openssl/ebcdic.h> # endif #include "testutil.h" # ifndef OPENSSL_NO_MD5 static struct test_st { const char key[16]; int key_len; const unsigned char data[64]; int data_len; const char *digest; } test[8] = { { "", 0, "More text test vectors to stuff up EBCDIC machines :-)", 54, "e9139d1e6ee064ef8cf514fc7dc83e86", }, { "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b", 16, "Hi There", 8, "9294727a3638bb1c13f48ef8158bfc9d", }, { "Jefe", 4, "what do ya want for nothing?", 28, "750c783e6ab0b503eaa86e310a5db738", }, { "\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa\xaa", 16, { 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd, 0xdd }, 50, "56be34521d144c88dbb8c733f0e8b3f6", }, { "", 0, "My test data", 12, "61afdecb95429ef494d61fdee15990cabf0826fc" }, { "", 0, "My test data", 12, "2274b195d90ce8e03406f4b526a47e0787a88a65479938f1a5baa3ce0f079776" }, { "123456", 6, "My test data", 12, "bab53058ae861a7f191abe2d0145cbb123776a6369ee3f9d79ce455667e411dd" }, { "12345", 5, "My test data again", 18, "a12396ceddd2a85f4c656bc1e0aa50c78cffde3e" } }; # endif static char *pt(unsigned char *md, unsigned int len); # ifndef OPENSSL_NO_MD5 static int test_hmac_md5(int idx) { char *p; # ifdef CHARSET_EBCDIC ebcdic2ascii(test[0].data, test[0].data, test[0].data_len); ebcdic2ascii(test[1].data, test[1].data, test[1].data_len); ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); ebcdic2ascii(test[2].data, test[2].data, test[2].data_len); # endif p = pt(HMAC(EVP_md5(), test[idx].key, test[idx].key_len, test[idx].data, test[idx].data_len, NULL, NULL), MD5_DIGEST_LENGTH); return TEST_ptr(p) && TEST_str_eq(p, test[idx].digest); } # endif static int test_hmac_bad(void) { HMAC_CTX *ctx = NULL; int ret = 0; ctx = HMAC_CTX_new(); if (!TEST_ptr(ctx) || !TEST_ptr_null(HMAC_CTX_get_md(ctx)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, EVP_sha1(), NULL)) || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len))) goto err; ret = 1; err: HMAC_CTX_free(ctx); return ret; } static int test_hmac_run(void) { char *p; HMAC_CTX *ctx = NULL; unsigned char buf[EVP_MAX_MD_SIZE]; unsigned int len; int ret = 0; if (!TEST_ptr(ctx = HMAC_CTX_new())) return 0; HMAC_CTX_reset(ctx); if (!TEST_ptr(ctx) || !TEST_ptr_null(HMAC_CTX_get_md(ctx)) || !TEST_false(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) || !TEST_false(HMAC_Update(ctx, test[4].data, test[4].data_len)) || !TEST_false(HMAC_Init_ex(ctx, test[4].key, -1, EVP_sha1(), NULL))) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) || !TEST_true(HMAC_Update(ctx, test[4].data, test[4].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) goto err; if (!TEST_false(HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL))) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[5].key, test[5].key_len, EVP_sha256(), NULL)) || !TEST_ptr_eq(HMAC_CTX_get_md(ctx), EVP_sha256()) || !TEST_true(HMAC_Update(ctx, test[5].data, test[5].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[5].digest)) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) goto err; if (!TEST_true(HMAC_Init_ex(ctx, NULL, 0, NULL, NULL)) || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) goto err; if (!TEST_true(HMAC_Init_ex(ctx, NULL, 0, EVP_sha256(), NULL)) || !TEST_true(HMAC_Update(ctx, test[6].data, test[6].data_len)) || !TEST_true(HMAC_Final(ctx, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[6].digest)) goto err; ret = 1; err: HMAC_CTX_free(ctx); return ret; } static int test_hmac_single_shot(void) { char *p; p = pt(HMAC(EVP_sha1(), NULL, 0, test[4].data, test[4].data_len, NULL, NULL), SHA_DIGEST_LENGTH); if (!TEST_ptr(p) || !TEST_str_eq(p, test[4].digest)) return 0; return 1; } static int test_hmac_copy(void) { char *p; HMAC_CTX *ctx = NULL, *ctx2 = NULL; unsigned char buf[EVP_MAX_MD_SIZE]; unsigned int len; int ret = 0; ctx = HMAC_CTX_new(); ctx2 = HMAC_CTX_new(); if (!TEST_ptr(ctx) || !TEST_ptr(ctx2)) goto err; if (!TEST_true(HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) || !TEST_true(HMAC_Update(ctx, test[7].data, test[7].data_len)) || !TEST_true(HMAC_CTX_copy(ctx2, ctx)) || !TEST_true(HMAC_Final(ctx2, buf, &len))) goto err; p = pt(buf, len); if (!TEST_ptr(p) || !TEST_str_eq(p, test[7].digest)) goto err; ret = 1; err: HMAC_CTX_free(ctx2); HMAC_CTX_free(ctx); return ret; } static int test_hmac_copy_uninited(void) { const unsigned char key[24] = {0}; const unsigned char ct[166] = {0}; EVP_PKEY *pkey = NULL; EVP_MD_CTX *ctx = NULL; EVP_MD_CTX *ctx_tmp = NULL; int res = 0; if (!TEST_ptr(ctx = EVP_MD_CTX_new()) || !TEST_ptr(pkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, key, sizeof(key))) || !TEST_true(EVP_DigestSignInit(ctx, NULL, EVP_sha1(), NULL, pkey)) || !TEST_ptr(ctx_tmp = EVP_MD_CTX_new()) || !TEST_true(EVP_MD_CTX_copy(ctx_tmp, ctx))) goto err; EVP_MD_CTX_free(ctx); ctx = ctx_tmp; ctx_tmp = NULL; if (!TEST_true(EVP_DigestSignUpdate(ctx, ct, sizeof(ct)))) goto err; res = 1; err: EVP_MD_CTX_free(ctx); EVP_MD_CTX_free(ctx_tmp); EVP_PKEY_free(pkey); return res; } # ifndef OPENSSL_NO_MD5 static char *pt(unsigned char *md, unsigned int len) { unsigned int i; static char buf[80]; if (md == NULL) return NULL; for (i = 0; i < len; i++) sprintf(&(buf[i * 2]), "%02x", md[i]); return buf; } # endif int setup_tests(void) { ADD_ALL_TESTS(test_hmac_md5, 4); ADD_TEST(test_hmac_single_shot); ADD_TEST(test_hmac_bad); ADD_TEST(test_hmac_run); ADD_TEST(test_hmac_copy); ADD_TEST(test_hmac_copy_uninited); return 1; }
test
openssl/test/hmactest.c
openssl