xref: /freebsd/crypto/openssl/test/helpers/handshake_srp.c (revision a90b9d0159070121c221b966469c3e36d912bf82)
1 /*
2  * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 /*
11  * SRP is deprecated and there is no replacent. When SRP is removed, the code in
12  * this file can be removed too. Until then we have to use the deprecated APIs.
13  */
14 #define OPENSSL_SUPPRESS_DEPRECATED
15 
16 #include <openssl/srp.h>
17 #include <openssl/ssl.h>
18 #include "handshake.h"
19 #include "../testutil.h"
20 
21 static char *client_srp_cb(SSL *s, void *arg)
22 {
23     CTX_DATA *ctx_data = (CTX_DATA*)(arg);
24     return OPENSSL_strdup(ctx_data->srp_password);
25 }
26 
27 static int server_srp_cb(SSL *s, int *ad, void *arg)
28 {
29     CTX_DATA *ctx_data = (CTX_DATA*)(arg);
30     if (strcmp(ctx_data->srp_user, SSL_get_srp_username(s)) != 0)
31         return SSL3_AL_FATAL;
32     if (SSL_set_srp_server_param_pw(s, ctx_data->srp_user,
33                                     ctx_data->srp_password,
34                                     "2048" /* known group */) < 0) {
35         *ad = SSL_AD_INTERNAL_ERROR;
36         return SSL3_AL_FATAL;
37     }
38     return SSL_ERROR_NONE;
39 }
40 
41 int configure_handshake_ctx_for_srp(SSL_CTX *server_ctx, SSL_CTX *server2_ctx,
42                                     SSL_CTX *client_ctx,
43                                     const SSL_TEST_EXTRA_CONF *extra,
44                                     CTX_DATA *server_ctx_data,
45                                     CTX_DATA *server2_ctx_data,
46                                     CTX_DATA *client_ctx_data)
47 {
48     if (extra->server.srp_user != NULL) {
49         SSL_CTX_set_srp_username_callback(server_ctx, server_srp_cb);
50         server_ctx_data->srp_user = OPENSSL_strdup(extra->server.srp_user);
51         server_ctx_data->srp_password = OPENSSL_strdup(extra->server.srp_password);
52         if (server_ctx_data->srp_user == NULL || server_ctx_data->srp_password == NULL) {
53             OPENSSL_free(server_ctx_data->srp_user);
54             OPENSSL_free(server_ctx_data->srp_password);
55             server_ctx_data->srp_user = NULL;
56             server_ctx_data->srp_password = NULL;
57             return 0;
58         }
59         SSL_CTX_set_srp_cb_arg(server_ctx, server_ctx_data);
60     }
61     if (extra->server2.srp_user != NULL) {
62         if (!TEST_ptr(server2_ctx))
63             return 0;
64         SSL_CTX_set_srp_username_callback(server2_ctx, server_srp_cb);
65         server2_ctx_data->srp_user = OPENSSL_strdup(extra->server2.srp_user);
66         server2_ctx_data->srp_password = OPENSSL_strdup(extra->server2.srp_password);
67         if (server2_ctx_data->srp_user == NULL || server2_ctx_data->srp_password == NULL) {
68             OPENSSL_free(server2_ctx_data->srp_user);
69             OPENSSL_free(server2_ctx_data->srp_password);
70             server2_ctx_data->srp_user = NULL;
71             server2_ctx_data->srp_password = NULL;
72             return 0;
73         }
74         SSL_CTX_set_srp_cb_arg(server2_ctx, server2_ctx_data);
75     }
76     if (extra->client.srp_user != NULL) {
77         if (!TEST_true(SSL_CTX_set_srp_username(client_ctx,
78                                                 extra->client.srp_user)))
79             return 0;
80         SSL_CTX_set_srp_client_pwd_callback(client_ctx, client_srp_cb);
81         client_ctx_data->srp_password = OPENSSL_strdup(extra->client.srp_password);
82         if (client_ctx_data->srp_password == NULL)
83             return 0;
84         SSL_CTX_set_srp_cb_arg(client_ctx, client_ctx_data);
85     }
86     return 1;
87 }
88