33#ifdef HAVE_XKEY_PROVIDER
37#include <openssl/bio.h>
38#include <openssl/pem.h>
39#include <openssl/core_names.h>
40#include <openssl/evp.h>
45static int mgmt_callback_called;
48#define _countof(x) sizeof((x)) / sizeof(*(x))
54static const char pubkey1[] =
"-----BEGIN PUBLIC KEY-----\n"
55 "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA7GWP6RLCGlvmVioIqYI6\n"
56 "LUR4owA7sJ/nJxBAk+/xzD6gqgSigBsTqeb+gdZwkKjY1N4w2DUA0r5i8Eja/BWN\n"
57 "xMZtC5nxK4MACtMqIwvlzfk130NhFXKtlZj2cyFBXqDdRyeg1ZrUQagcHVcgcReP\n"
58 "9yiePgfO7NUOQk8edEeOR53SFCgnLBQQ9dGWtZN0hO/5BN6NSm/fd6vq0VjTRP5a\n"
59 "BAH/BnqX9/3jV0jh8N9AE59mI1rjVVQ9VDnuAPkS8dLfdC661/CNxt0YWByTIgt1\n"
60 "+qjW4LUvLbnU/rlPhuJ1SBZg+z/JtDBCKfs7syu5WYFqRvNFg7/91Rr/NwxvW/1h\n"
62 "-----END PUBLIC KEY-----\n";
64static const char pubkey2[] =
"-----BEGIN PUBLIC KEY-----\n"
65 "MFYwEAYHKoZIzj0CAQYFK4EEAAoDQgAEO85iXW+HgnUkwlj1DohNVw0GsnGIh1gZ\n"
66 "u95ff1JiUaJIkYNIkZA+hwIPFVH5aJcSCv3SPIeDS2VUAESNKHZJBQ==\n"
67 "-----END PUBLIC KEY-----\n";
69static const char pubkey3[] =
"-----BEGIN PUBLIC KEY-----\n"
70 "MCowBQYDK2VwAyEA+q5xjF5hGyyqYZidJdz/0saEQabL3N4wIZJBxNGbgJE=\n"
71 "-----END PUBLIC KEY-----";
73static const char *pubkeys[] = { pubkey1, pubkey2, pubkey3 };
75static const char *prov_name =
"ovpn.xkey";
77static const char *test_msg =
"Lorem ipsum dolor sit amet, consectetur "
78 "adipisici elit, sed eiusmod tempor incidunt "
79 "ut labore et dolore magna aliqua.";
81static const char *test_msg_b64 =
82 "TG9yZW0gaXBzdW0gZG9sb3Igc2l0IGFtZXQsIGNvbnNlY3RldHVyIGFkaXBpc2ljaS"
83 "BlbGl0LCBzZWQgZWl1c21vZCB0ZW1wb3IgaW5jaWR1bnQgdXQgbGFib3JlIGV0IGRv"
84 "bG9yZSBtYWduYSBhbGlxdWEu";
87static const uint8_t test_digest[] = { 0x77, 0x38, 0x65, 0x00, 0x1e, 0x96, 0x48, 0xc6,
88 0x57, 0x0b, 0xae, 0xc0, 0xb7, 0x96, 0xf9, 0x66,
89 0x4d, 0x5f, 0xd0, 0xb7, 0xdb, 0xf3, 0x3a, 0xbf,
90 0x02, 0xcc, 0x78, 0x61, 0x83, 0x20, 0x20, 0xee };
92static const char *test_digest_b64 =
"dzhlAB6WSMZXC67At5b5Zk1f0Lfb8zq/Asx4YYMgIO4=";
99static const uint8_t good_sig[] = { 0xd8, 0xa7, 0xd9, 0x81, 0xd8, 0xaa, 0xd8, 0xad,
100 0x20, 0xd9, 0x8a, 0xd8, 0xa7, 0x20, 0xd8, 0xb3,
101 0xd9, 0x85, 0xd8, 0xb3, 0xd9, 0x85, 0x0 };
103static const char *good_sig_b64 =
"2KfZgdiq2K0g2YrYpyDYs9mF2LPZhQA=";
106load_pubkey(
const char *pem)
108 BIO *in = BIO_new_mem_buf(pem, -1);
111 EVP_PKEY *pkey = PEM_read_bio_PUBKEY(in, NULL, NULL, NULL);
112 assert_non_null(pkey);
122 prov[0] = OSSL_PROVIDER_load(NULL,
"default");
123 OSSL_PROVIDER_add_builtin(NULL, prov_name, xkey_provider_init);
124 prov[1] = OSSL_PROVIDER_load(NULL, prov_name);
127 EVP_set_default_properties(NULL,
"?provider!=ovpn.xkey");
129#ifdef ENABLE_MANAGEMENT
137 for (
size_t i = 0;
i < _countof(prov);
i++)
141 OSSL_PROVIDER_unload(prov[
i]);
159 mgmt_callback_called = 1;
161 const char *expected_tbs = test_digest_b64;
162 if (strstr(algorithm,
"data=message"))
164 expected_tbs = test_msg_b64;
167 if (!strstr(algorithm,
"ED25519"))
169 assert_non_null(strstr(algorithm,
"hashalg=SHA256"));
172 assert_string_equal(b64_data, expected_tbs);
175 if (!strstr(algorithm,
"ECDSA") && !strstr(algorithm,
"ED25519"))
177 assert_non_null(strstr(algorithm,
"RSA_PKCS1_PSS_PADDING,hashalg=SHA256,saltlen=digest"));
183 out = strdup(good_sig_b64);
184 assert_non_null(out);
191xkey_provider_test_fetch(
void **state)
193 assert_true(OSSL_PROVIDER_available(NULL, prov_name));
195 const char *algs[] = {
"RSA",
"ECDSA" };
197 for (
size_t i = 0;
i < _countof(algs);
i++)
199 EVP_SIGNATURE *sig = EVP_SIGNATURE_fetch(NULL, algs[
i],
"provider=ovpn.xkey");
200 assert_non_null(sig);
201 assert_string_equal(OSSL_PROVIDER_get0_name(EVP_SIGNATURE_get0_provider(sig)), prov_name);
203 EVP_SIGNATURE_free(sig);
206 const char *names[] = {
"RSA",
"EC" };
208 for (
size_t i = 0;
i < _countof(names);
i++)
210 EVP_KEYMGMT *km = EVP_KEYMGMT_fetch(NULL, names[
i],
"provider=ovpn.xkey");
212 assert_string_equal(OSSL_PROVIDER_get0_name(EVP_KEYMGMT_get0_provider(km)), prov_name);
214 EVP_KEYMGMT_free(km);
220digest_sign(EVP_PKEY *pkey)
225 OSSL_PARAM params[6] = { OSSL_PARAM_END };
227 const char *mdname =
"SHA256";
228 const char *padmode =
"pss";
229 const char *saltlen =
"digest";
231 if (EVP_PKEY_get_id(pkey) == EVP_PKEY_RSA)
234 OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_DIGEST, (
char *)mdname, 0);
236 OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, (
char *)padmode, 0);
238 OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_PSS_SALTLEN, (
char *)saltlen, 0);
241 OSSL_PARAM_construct_utf8_string(OSSL_SIGNATURE_PARAM_MGF1_DIGEST, (
char *)saltlen, 0);
242 params[4] = OSSL_PARAM_construct_end();
244 else if (EVP_PKEY_get_id(pkey) == EVP_PKEY_ED25519)
247 params[0] = OSSL_PARAM_construct_end();
251 EVP_PKEY_CTX *pctx = NULL;
252 EVP_MD_CTX *mctx = EVP_MD_CTX_new();
254 if (!mctx || EVP_DigestSignInit_ex(mctx, &pctx, mdname, NULL, NULL, pkey, params) <= 0)
256 fail_msg(
"Failed to initialize EVP_DigestSignInit_ex()");
261 assert_int_equal(EVP_DigestSign(mctx, sig, &siglen, (uint8_t *)test_msg, strlen(test_msg)), 1);
262 assert_true(siglen > 0);
264 if ((sig = test_calloc(1, siglen)) == NULL)
266 fail_msg(
"Out of memory");
268 assert_int_equal(EVP_DigestSign(mctx, sig, &siglen, (uint8_t *)test_msg, strlen(test_msg)), 1);
273 EVP_MD_CTX_free(mctx);
278#ifdef ENABLE_MANAGEMENT
284xkey_provider_test_mgmt_sign_cb(
void **state)
287 for (
size_t i = 0;
i < _countof(pubkeys);
i++)
289 pubkey = load_pubkey(pubkeys[
i]);
290 assert_true(pubkey != NULL);
291 EVP_PKEY *privkey = xkey_load_management_key(NULL, pubkey);
292 assert_true(privkey != NULL);
298 mgmt_callback_called = 0;
299 uint8_t *sig = digest_sign(privkey);
300 assert_non_null(sig);
303 assert_int_equal(mgmt_callback_called, 1);
304 assert_memory_equal(sig, good_sig,
sizeof(good_sig));
313 EVP_PKEY_free(pubkey);
314 EVP_PKEY_free(privkey);
320static int xkey_free_called;
321static int xkey_sign_called;
323xkey_free(
void *handle)
325 xkey_free_called = 1;
327 assert_string_equal(handle,
"xkey_handle");
331xkey_sign(
void *handle,
unsigned char *sig,
size_t *siglen,
const unsigned char *tbs,
size_t tbslen,
340 xkey_sign_called = 1;
342 if (!strcmp(s.op,
"DigestSign"))
344 assert_memory_equal(tbs, test_msg, strlen(test_msg));
348 assert_memory_equal(tbs, test_digest,
sizeof(test_digest));
352 if (!strcmp(s.keytype,
"ED25519"))
354 assert_string_equal(s.mdname,
"none");
358 assert_int_equal(OBJ_sn2nid(s.mdname), NID_sha256);
360 if (!strcmp(s.keytype,
"RSA"))
362 assert_string_equal(s.padmode,
"pss");
364 else if (strcmp(s.keytype,
"EC") && strcmp(s.keytype,
"ED25519"))
366 fail_msg(
"Unknown keytype: %s", s.keytype);
370 memcpy(sig, good_sig,
min_size(
sizeof(good_sig), *siglen));
379xkey_provider_test_generic_sign_cb(
void **state)
382 const char *dummy =
"xkey_handle";
384 for (
size_t i = 0;
i < _countof(pubkeys);
i++)
386 pubkey = load_pubkey(pubkeys[
i]);
387 assert_true(pubkey != NULL);
390 xkey_load_generic_key(NULL, (
void *)dummy, pubkey, xkey_sign, xkey_free);
391 assert_true(privkey != NULL);
393 xkey_sign_called = 0;
394 xkey_free_called = 0;
395 uint8_t *sig = digest_sign(privkey);
396 assert_non_null(sig);
399 assert_int_equal(xkey_sign_called, 1);
400 assert_memory_equal(sig, good_sig,
sizeof(good_sig));
403 EVP_PKEY_free(pubkey);
404 EVP_PKEY_free(privkey);
407 assert_int_equal(xkey_free_called, 1);
416 const struct CMUnitTest tests[] = {
417 cmocka_unit_test(xkey_provider_test_fetch),
418#ifdef ENABLE_MANAGEMENT
419 cmocka_unit_test(xkey_provider_test_mgmt_sign_cb),
421 cmocka_unit_test(xkey_provider_test_generic_sign_cb),
424 int ret = cmocka_run_group_tests_name(
"xkey provider tests", tests, NULL, NULL);
static size_t min_size(size_t x, size_t y)
char * management_query_pk_sig(struct management *man, const char *b64_data, const char *algorithm)
#define MF_EXTERNAL_KEY_PSSPAD
#define MF_EXTERNAL_KEY_DIGEST
struct man_settings settings
static void openvpn_unit_test_setup(void)
Sets up the environment for unit tests like making both stderr and stdout non-buffered to avoid messa...