1 /*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include "UniquePtr.h"
18
19 #include <stdarg.h>
20 #include <string.h>
21 #include <unistd.h>
22
23 #include <openssl/objects.h>
24 #include <openssl/engine.h>
25 #include <openssl/evp.h>
26 #include <openssl/pem.h>
27
28 #define DYNAMIC_ENGINE
29 #define TEST_ENGINE_ID "javacoretests"
30 #define TEST_ENGINE_NAME "libcore test engine"
31
32 struct RSA_Delete {
operator ()RSA_Delete33 void operator()(RSA* p) const {
34 RSA_free(p);
35 }
36 };
37 typedef UniquePtr<RSA, RSA_Delete> Unique_RSA;
38
39 static const char* HMAC_TAG = "-HMAC-";
40 static const size_t HMAC_TAG_LEN = strlen(HMAC_TAG);
41
test_load_key(ENGINE * e,const char * key_id,EVP_PKEY * (* read_func)(BIO *,EVP_PKEY **,pem_password_cb *,void *))42 static EVP_PKEY *test_load_key(ENGINE* e, const char *key_id,
43 EVP_PKEY* (*read_func)(BIO*, EVP_PKEY**, pem_password_cb*, void*)) {
44 void* data = static_cast<void*>(const_cast<char*>(key_id));
45
46 EVP_PKEY *key = NULL;
47
48 const size_t key_len = strlen(key_id);
49 if (key_len > HMAC_TAG_LEN && !strncmp(key_id, HMAC_TAG, HMAC_TAG_LEN)) {
50 key = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e, reinterpret_cast<const unsigned char*>(key_id),
51 key_len);
52 } else {
53 BIO* in = BIO_new_mem_buf(data, strlen(key_id));
54 if (!in) {
55 return NULL;
56 }
57 key = read_func(in, NULL, 0, NULL);
58 BIO_free(in);
59
60 if (key != NULL && EVP_PKEY_type(key->type) == EVP_PKEY_RSA) {
61 ENGINE_init(e);
62
63 Unique_RSA rsa(EVP_PKEY_get1_RSA(key));
64 rsa->engine = e;
65 rsa->flags |= RSA_FLAG_EXT_PKEY;
66 }
67 }
68
69 return key;
70 }
71
test_load_privkey(ENGINE * e,const char * key_id,UI_METHOD *,void *)72 static EVP_PKEY* test_load_privkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
73 return test_load_key(e, key_id, PEM_read_bio_PrivateKey);
74 }
75
test_load_pubkey(ENGINE * e,const char * key_id,UI_METHOD *,void *)76 static EVP_PKEY* test_load_pubkey(ENGINE* e, const char* key_id, UI_METHOD*, void*) {
77 return test_load_key(e, key_id, PEM_read_bio_PUBKEY);
78 }
79
80 static const int meths[] = {
81 EVP_PKEY_HMAC,
82 };
83
pkey_meths(ENGINE *,EVP_PKEY_METHOD ** meth,const int ** nids,int nid)84 static int pkey_meths(ENGINE*, EVP_PKEY_METHOD** meth, const int** nids, int nid) {
85 if (nid == EVP_PKEY_HMAC) {
86 *meth = const_cast<EVP_PKEY_METHOD*>(EVP_PKEY_meth_find(nid));
87 return 1;
88 } else if (nid != 0) {
89 return 0;
90 }
91
92 if (nids != NULL) {
93 *nids = meths;
94 return 1;
95 }
96
97 return 0;
98 }
99
test_engine_setup(ENGINE * e)100 static int test_engine_setup(ENGINE* e) {
101 if (!ENGINE_set_id(e, TEST_ENGINE_ID)
102 || !ENGINE_set_name(e, TEST_ENGINE_NAME)
103 || !ENGINE_set_flags(e, 0)
104 || !ENGINE_set_RSA(e, RSA_get_default_method())
105 || !ENGINE_set_load_privkey_function(e, test_load_privkey)
106 || !ENGINE_set_load_pubkey_function(e, test_load_pubkey)
107 || !ENGINE_set_pkey_meths(e, pkey_meths)) {
108 return 0;
109 }
110
111 return 1;
112 }
113
test_engine_bind_fn(ENGINE * e,const char * id)114 static int test_engine_bind_fn(ENGINE *e, const char *id) {
115 if (id && (strcmp(id, TEST_ENGINE_ID) != 0)) {
116 return 0;
117 }
118
119 if (!test_engine_setup(e)) {
120 return 0;
121 }
122
123 return 1;
124 }
125
126 extern "C" {
127 #undef OPENSSL_EXPORT
128 #define OPENSSL_EXPORT extern __attribute__ ((visibility ("default")))
129
130 IMPLEMENT_DYNAMIC_CHECK_FN()
131 IMPLEMENT_DYNAMIC_BIND_FN(test_engine_bind_fn)
132 };
133