a11f06b2dc
for all DRBG combinations.
841 lines
22 KiB
C
841 lines
22 KiB
C
/* fips/rand/fips_drbg_selftest.c */
|
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
* project.
|
|
*/
|
|
/* ====================================================================
|
|
* Copyright (c) 2011 The OpenSSL Project. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* 3. All advertising materials mentioning features or use of this
|
|
* software must display the following acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
*
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
* endorse or promote products derived from this software without
|
|
* prior written permission. For written permission, please contact
|
|
* licensing@OpenSSL.org.
|
|
*
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
* permission of the OpenSSL Project.
|
|
*
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
* acknowledgment:
|
|
* "This product includes software developed by the OpenSSL Project
|
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
* ====================================================================
|
|
*/
|
|
|
|
#define OPENSSL_FIPSAPI
|
|
|
|
#include <string.h>
|
|
#include <openssl/crypto.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/fips_rand.h>
|
|
#include "fips_rand_lcl.h"
|
|
#include "fips_locl.h"
|
|
|
|
#include "fips_drbg_selftest.h"
|
|
|
|
typedef struct {
|
|
int post;
|
|
int nid;
|
|
unsigned int flags;
|
|
|
|
/* KAT data for no PR */
|
|
const unsigned char *ent;
|
|
size_t entlen;
|
|
const unsigned char *nonce;
|
|
size_t noncelen;
|
|
const unsigned char *pers;
|
|
size_t perslen;
|
|
const unsigned char *adin;
|
|
size_t adinlen;
|
|
const unsigned char *entreseed;
|
|
size_t entreseedlen;
|
|
const unsigned char *adinreseed;
|
|
size_t adinreseedlen;
|
|
const unsigned char *adin2;
|
|
size_t adin2len;
|
|
const unsigned char *kat;
|
|
size_t katlen;
|
|
const unsigned char *kat2;
|
|
size_t kat2len;
|
|
|
|
/* KAT data for PR */
|
|
const unsigned char *ent_pr;
|
|
size_t entlen_pr;
|
|
const unsigned char *nonce_pr;
|
|
size_t noncelen_pr;
|
|
const unsigned char *pers_pr;
|
|
size_t perslen_pr;
|
|
const unsigned char *adin_pr;
|
|
size_t adinlen_pr;
|
|
const unsigned char *entpr_pr;
|
|
size_t entprlen_pr;
|
|
const unsigned char *ading_pr;
|
|
size_t adinglen_pr;
|
|
const unsigned char *entg_pr;
|
|
size_t entglen_pr;
|
|
const unsigned char *kat_pr;
|
|
size_t katlen_pr;
|
|
const unsigned char *kat2_pr;
|
|
size_t kat2len_pr;
|
|
|
|
} DRBG_SELFTEST_DATA;
|
|
|
|
#define make_drbg_test_data(nid, flag, pr, p) {p, nid, flag | DRBG_FLAG_TEST, \
|
|
pr##_entropyinput, sizeof(pr##_entropyinput), \
|
|
pr##_nonce, sizeof(pr##_nonce), \
|
|
pr##_personalizationstring, sizeof(pr##_personalizationstring), \
|
|
pr##_additionalinput, sizeof(pr##_additionalinput), \
|
|
pr##_entropyinputreseed, sizeof(pr##_entropyinputreseed), \
|
|
pr##_additionalinputreseed, sizeof(pr##_additionalinputreseed), \
|
|
pr##_additionalinput2, sizeof(pr##_additionalinput2), \
|
|
pr##_int_returnedbits, sizeof(pr##_int_returnedbits), \
|
|
pr##_returnedbits, sizeof(pr##_returnedbits), \
|
|
pr##_pr_entropyinput, sizeof(pr##_pr_entropyinput), \
|
|
pr##_pr_nonce, sizeof(pr##_pr_nonce), \
|
|
pr##_pr_personalizationstring, sizeof(pr##_pr_personalizationstring), \
|
|
pr##_pr_additionalinput, sizeof(pr##_pr_additionalinput), \
|
|
pr##_pr_entropyinputpr, sizeof(pr##_pr_entropyinputpr), \
|
|
pr##_pr_additionalinput2, sizeof(pr##_pr_additionalinput2), \
|
|
pr##_pr_entropyinputpr2, sizeof(pr##_pr_entropyinputpr2), \
|
|
pr##_pr_int_returnedbits, sizeof(pr##_pr_int_returnedbits), \
|
|
pr##_pr_returnedbits, sizeof(pr##_pr_returnedbits), \
|
|
}
|
|
|
|
#define make_drbg_test_data_df(nid, pr, p) \
|
|
make_drbg_test_data(nid, DRBG_FLAG_CTR_USE_DF, pr, p)
|
|
|
|
#define make_drbg_test_data_ec(curve, md, pr, p) \
|
|
make_drbg_test_data((curve << 16) | md , 0, pr, p)
|
|
|
|
static DRBG_SELFTEST_DATA drbg_test[] = {
|
|
make_drbg_test_data_df(NID_aes_128_ctr, aes_128_use_df, 0),
|
|
make_drbg_test_data_df(NID_aes_192_ctr, aes_192_use_df, 0),
|
|
make_drbg_test_data_df(NID_aes_256_ctr, aes_256_use_df, 1),
|
|
make_drbg_test_data(NID_aes_128_ctr, 0, aes_128_no_df, 0),
|
|
make_drbg_test_data(NID_aes_192_ctr, 0, aes_192_no_df, 0),
|
|
make_drbg_test_data(NID_aes_256_ctr, 0, aes_256_no_df, 1),
|
|
make_drbg_test_data(NID_sha1, 0, sha1, 0),
|
|
make_drbg_test_data(NID_sha224, 0, sha224, 0),
|
|
make_drbg_test_data(NID_sha256, 0, sha256, 1),
|
|
make_drbg_test_data(NID_sha384, 0, sha384, 0),
|
|
make_drbg_test_data(NID_sha512, 0, sha512, 0),
|
|
make_drbg_test_data(NID_hmacWithSHA1, 0, hmac_sha1, 0),
|
|
make_drbg_test_data(NID_hmacWithSHA224, 0, hmac_sha224, 0),
|
|
make_drbg_test_data(NID_hmacWithSHA256, 0, hmac_sha256, 1),
|
|
make_drbg_test_data(NID_hmacWithSHA384, 0, hmac_sha384, 0),
|
|
make_drbg_test_data(NID_hmacWithSHA512, 0, hmac_sha512, 0),
|
|
make_drbg_test_data_ec(NID_X9_62_prime256v1, NID_sha1, p_256_sha1, 0),
|
|
make_drbg_test_data_ec(NID_X9_62_prime256v1, NID_sha224, p_256_sha224, 0),
|
|
make_drbg_test_data_ec(NID_X9_62_prime256v1, NID_sha256, p_256_sha256, 1),
|
|
make_drbg_test_data_ec(NID_X9_62_prime256v1, NID_sha384, p_256_sha384, 0),
|
|
make_drbg_test_data_ec(NID_X9_62_prime256v1, NID_sha512, p_256_sha512, 0),
|
|
make_drbg_test_data_ec(NID_secp384r1, NID_sha224, p_384_sha224, 0),
|
|
make_drbg_test_data_ec(NID_secp384r1, NID_sha256, p_384_sha256, 0),
|
|
make_drbg_test_data_ec(NID_secp384r1, NID_sha384, p_384_sha384, 0),
|
|
make_drbg_test_data_ec(NID_secp384r1, NID_sha512, p_384_sha512, 0),
|
|
make_drbg_test_data_ec(NID_secp521r1, NID_sha256, p_521_sha256, 0),
|
|
make_drbg_test_data_ec(NID_secp521r1, NID_sha384, p_521_sha384, 0),
|
|
make_drbg_test_data_ec(NID_secp521r1, NID_sha512, p_521_sha512, 0),
|
|
{0,0,0}
|
|
};
|
|
|
|
typedef struct
|
|
{
|
|
const unsigned char *ent;
|
|
size_t entlen;
|
|
int entcnt;
|
|
const unsigned char *nonce;
|
|
size_t noncelen;
|
|
int noncecnt;
|
|
} TEST_ENT;
|
|
|
|
static size_t test_entropy(DRBG_CTX *dctx, unsigned char **pout,
|
|
int entropy, size_t min_len, size_t max_len)
|
|
{
|
|
TEST_ENT *t = FIPS_drbg_get_app_data(dctx);
|
|
*pout = (unsigned char *)t->ent;
|
|
t->entcnt++;
|
|
return t->entlen;
|
|
}
|
|
|
|
static size_t test_nonce(DRBG_CTX *dctx, unsigned char **pout,
|
|
int entropy, size_t min_len, size_t max_len)
|
|
{
|
|
TEST_ENT *t = FIPS_drbg_get_app_data(dctx);
|
|
*pout = (unsigned char *)t->nonce;
|
|
t->noncecnt++;
|
|
return t->noncelen;
|
|
}
|
|
|
|
static int fips_drbg_single_kat(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td,
|
|
int quick)
|
|
{
|
|
TEST_ENT t;
|
|
int rv = 0;
|
|
size_t adinlen;
|
|
unsigned char randout[1024];
|
|
|
|
/* Initial test without PR */
|
|
|
|
if (!FIPS_drbg_init(dctx, td->nid, td->flags))
|
|
return 0;
|
|
if (!FIPS_drbg_set_callbacks(dctx, test_entropy, 0, 0, test_nonce, 0))
|
|
return 0;
|
|
|
|
FIPS_drbg_set_app_data(dctx, &t);
|
|
|
|
t.ent = td->ent;
|
|
t.entlen = td->entlen;
|
|
t.nonce = td->nonce;
|
|
t.noncelen = td->noncelen;
|
|
t.entcnt = 0;
|
|
t.noncecnt = 0;
|
|
|
|
if (!FIPS_drbg_instantiate(dctx, td->pers, td->perslen))
|
|
goto err;
|
|
|
|
/* Note for CTR without DF some additional input values
|
|
* ignore bytes after the keylength: so reduce adinlen
|
|
* to half to ensure invalid data is fed in.
|
|
*/
|
|
if (!fips_post_corrupt(FIPS_TEST_DRBG, dctx->type, &dctx->flags))
|
|
adinlen = td->adinlen / 2;
|
|
else
|
|
adinlen = td->adinlen;
|
|
if (!FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, adinlen))
|
|
goto err;
|
|
|
|
if (memcmp(randout, td->kat, td->katlen))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_SINGLE_KAT, FIPS_R_NOPR_TEST1_FAILURE);
|
|
goto err2;
|
|
}
|
|
|
|
if (quick)
|
|
{
|
|
rv = 1;
|
|
goto err;
|
|
}
|
|
|
|
t.ent = td->entreseed;
|
|
t.entlen = td->entreseedlen;
|
|
|
|
if (!FIPS_drbg_reseed(dctx, td->adinreseed, td->adinreseedlen))
|
|
goto err;
|
|
|
|
if (!FIPS_drbg_generate(dctx, randout, td->kat2len, 0,
|
|
td->adin2, td->adin2len))
|
|
goto err;
|
|
|
|
if (memcmp(randout, td->kat2, td->kat2len))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_SINGLE_KAT, FIPS_R_NOPR_TEST2_FAILURE);
|
|
goto err2;
|
|
}
|
|
|
|
FIPS_drbg_uninstantiate(dctx);
|
|
|
|
/* Now test with PR */
|
|
if (!FIPS_drbg_init(dctx, td->nid, td->flags))
|
|
return 0;
|
|
if (!FIPS_drbg_set_callbacks(dctx, test_entropy, 0, 0, test_nonce, 0))
|
|
return 0;
|
|
|
|
FIPS_drbg_set_app_data(dctx, &t);
|
|
|
|
t.ent = td->ent_pr;
|
|
t.entlen = td->entlen_pr;
|
|
t.nonce = td->nonce_pr;
|
|
t.noncelen = td->noncelen_pr;
|
|
t.entcnt = 0;
|
|
t.noncecnt = 0;
|
|
|
|
if (!FIPS_drbg_instantiate(dctx, td->pers_pr, td->perslen_pr))
|
|
goto err;
|
|
|
|
t.ent = td->entpr_pr;
|
|
t.entlen = td->entprlen_pr;
|
|
|
|
/* Note for CTR without DF some additional input values
|
|
* ignore bytes after the keylength: so reduce adinlen
|
|
* to half to ensure invalid data is fed in.
|
|
*/
|
|
if (!fips_post_corrupt(FIPS_TEST_DRBG, dctx->type, &dctx->flags))
|
|
adinlen = td->adinlen_pr / 2;
|
|
else
|
|
adinlen = td->adinlen_pr;
|
|
if (!FIPS_drbg_generate(dctx, randout, td->katlen_pr, 1,
|
|
td->adin_pr, adinlen))
|
|
goto err;
|
|
|
|
if (memcmp(randout, td->kat_pr, td->katlen_pr))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_SINGLE_KAT, FIPS_R_PR_TEST1_FAILURE);
|
|
goto err2;
|
|
}
|
|
|
|
t.ent = td->entg_pr;
|
|
t.entlen = td->entglen_pr;
|
|
|
|
if (!FIPS_drbg_generate(dctx, randout, td->kat2len_pr, 1,
|
|
td->ading_pr, td->adinglen_pr))
|
|
goto err;
|
|
|
|
if (memcmp(randout, td->kat2_pr, td->kat2len_pr))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_SINGLE_KAT, FIPS_R_PR_TEST2_FAILURE);
|
|
goto err2;
|
|
}
|
|
|
|
rv = 1;
|
|
|
|
err:
|
|
if (rv == 0)
|
|
FIPSerr(FIPS_F_FIPS_DRBG_SINGLE_KAT, FIPS_R_SELFTEST_FAILED);
|
|
err2:
|
|
FIPS_drbg_uninstantiate(dctx);
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
/* Initialise a DRBG based on selftest data */
|
|
|
|
static int do_drbg_init(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td, TEST_ENT *t)
|
|
{
|
|
|
|
if (!FIPS_drbg_init(dctx, td->nid, td->flags))
|
|
return 0;
|
|
|
|
if (!FIPS_drbg_set_callbacks(dctx, test_entropy, 0, 0, test_nonce, 0))
|
|
return 0;
|
|
|
|
FIPS_drbg_set_app_data(dctx, t);
|
|
|
|
t->ent = td->ent;
|
|
t->entlen = td->entlen;
|
|
t->nonce = td->nonce;
|
|
t->noncelen = td->noncelen;
|
|
t->entcnt = 0;
|
|
t->noncecnt = 0;
|
|
return 1;
|
|
}
|
|
|
|
/* Initialise and instantiate DRBG based on selftest data */
|
|
static int do_drbg_instantiate(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td,
|
|
TEST_ENT *t)
|
|
{
|
|
if (!do_drbg_init(dctx, td, t))
|
|
return 0;
|
|
if (!FIPS_drbg_instantiate(dctx, td->pers, td->perslen))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* This is the "health check" function required by SP800-90. Induce several
|
|
* failure modes and check an error condition is set.
|
|
*/
|
|
|
|
static int fips_drbg_health_check(DRBG_CTX *dctx, DRBG_SELFTEST_DATA *td)
|
|
{
|
|
unsigned char randout[1024];
|
|
TEST_ENT t;
|
|
size_t i;
|
|
unsigned int reseed_counter_tmp;
|
|
unsigned char *p = (unsigned char *)dctx;
|
|
|
|
/* Initialise DRBG */
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
/* Don't report induced errors */
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
/* Personalisation string tests */
|
|
|
|
/* Test detection of too large personlisation string */
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, dctx->max_pers + 1) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_PERSONALISATION_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Entropy source tests */
|
|
|
|
/* Test entropy source failure detecion: i.e. returns no data */
|
|
|
|
t.entlen = 0;
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, td->perslen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Try to generate output from uninstantiated DRBG */
|
|
if (FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, td->adinlen))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_GENERATE_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
/* Test insufficient entropy */
|
|
|
|
t.entlen = dctx->min_entropy - 1;
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, td->perslen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Test too much entropy */
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.entlen = dctx->max_entropy + 1;
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, td->perslen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Nonce tests */
|
|
|
|
/* Test too small nonce */
|
|
|
|
if (dctx->min_nonce)
|
|
{
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.noncelen = dctx->min_nonce - 1;
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, td->perslen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_NONCE_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
}
|
|
|
|
/* Test too large nonce */
|
|
|
|
if (dctx->max_nonce)
|
|
{
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.noncelen = dctx->max_nonce + 1;
|
|
|
|
if (FIPS_drbg_instantiate(dctx, td->pers, td->perslen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_NONCE_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
}
|
|
|
|
/* Instantiate with valid data. */
|
|
if (!do_drbg_instantiate(dctx, td, &t))
|
|
goto err;
|
|
|
|
/* Check generation is now OK */
|
|
if (!FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, td->adinlen))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
/* Request too much data for one request */
|
|
if (FIPS_drbg_generate(dctx, randout, dctx->max_request + 1, 0,
|
|
td->adin, td->adinlen))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_REQUEST_LENGTH_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Try too large additional input */
|
|
if (FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, dctx->max_adin + 1))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ADDITIONAL_INPUT_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Check prediction resistance request fails if entropy source
|
|
* failure.
|
|
*/
|
|
|
|
t.entlen = 0;
|
|
|
|
if (FIPS_drbg_generate(dctx, randout, td->katlen, 1,
|
|
td->adin, td->adinlen))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
|
|
/* Instantiate again with valid data */
|
|
|
|
if (!do_drbg_instantiate(dctx, td, &t))
|
|
goto err;
|
|
/* Test reseed counter works */
|
|
/* Save initial reseed counter */
|
|
reseed_counter_tmp = dctx->reseed_counter;
|
|
/* Set reseed counter to beyond interval */
|
|
dctx->reseed_counter = dctx->reseed_interval;
|
|
|
|
/* Generate output and check entropy has been requested for reseed */
|
|
t.entcnt = 0;
|
|
if (!FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, td->adinlen))
|
|
goto err;
|
|
if (t.entcnt != 1)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_NOT_REQUESTED_FOR_RESEED);
|
|
goto err;
|
|
}
|
|
/* Check reseed counter has been reset */
|
|
if (dctx->reseed_counter != reseed_counter_tmp + 1)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_RESEED_COUNTER_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Explicit reseed tests */
|
|
|
|
/* Test explicit reseed with too large additional input */
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
if (FIPS_drbg_reseed(dctx, td->adin, dctx->max_adin + 1) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ADDITIONAL_INPUT_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Test explicit reseed with entropy source failure */
|
|
|
|
/* Check prediction resistance request fails if entropy source
|
|
* failure.
|
|
*/
|
|
|
|
t.entlen = 0;
|
|
|
|
if (FIPS_drbg_generate(dctx, randout, td->katlen, 1,
|
|
td->adin, td->adinlen))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
dctx->flags &= ~DRBG_FLAG_NOERR;
|
|
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
|
|
if (!do_drbg_instantiate(dctx, td, &t))
|
|
goto err;
|
|
/* Test reseed counter works */
|
|
/* Save initial reseed counter */
|
|
reseed_counter_tmp = dctx->reseed_counter;
|
|
/* Set reseed counter to beyond interval */
|
|
dctx->reseed_counter = dctx->reseed_interval;
|
|
|
|
/* Generate output and check entropy has been requested for reseed */
|
|
t.entcnt = 0;
|
|
if (!FIPS_drbg_generate(dctx, randout, td->katlen, 0,
|
|
td->adin, td->adinlen))
|
|
goto err;
|
|
if (t.entcnt != 1)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_NOT_REQUESTED_FOR_RESEED);
|
|
goto err;
|
|
}
|
|
/* Check reseed counter has been reset */
|
|
if (dctx->reseed_counter != reseed_counter_tmp + 1)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_RESEED_COUNTER_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Explicit reseed tests */
|
|
|
|
/* Test explicit reseed with too large additional input */
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
if (FIPS_drbg_reseed(dctx, td->adin, dctx->max_adin + 1) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ADDITIONAL_INPUT_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
/* Test explicit reseed with entropy source failure */
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.entlen = 0;
|
|
|
|
if (FIPS_drbg_reseed(dctx, td->adin, td->adinlen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Test explicit reseed with too much entropy */
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.entlen = dctx->max_entropy + 1;
|
|
|
|
if (FIPS_drbg_reseed(dctx, td->adin, td->adinlen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
/* Test explicit reseed with too little entropy */
|
|
|
|
if (!do_drbg_init(dctx, td, &t))
|
|
goto err;
|
|
|
|
dctx->flags |= DRBG_FLAG_NOERR;
|
|
|
|
t.entlen = dctx->min_entropy - 1;
|
|
|
|
if (FIPS_drbg_reseed(dctx, td->adin, td->adinlen) > 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_ENTROPY_ERROR_UNDETECTED);
|
|
goto err;
|
|
}
|
|
|
|
if (!FIPS_drbg_uninstantiate(dctx))
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ERROR);
|
|
goto err;
|
|
}
|
|
|
|
p = (unsigned char *)&dctx->d;
|
|
/* Standard says we have to check uninstantiate really zeroes
|
|
* the data...
|
|
*/
|
|
for (i = 0; i < sizeof(dctx->d); i++)
|
|
{
|
|
if (*p != 0)
|
|
{
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_UNINSTANTIATE_ZEROISE_ERROR);
|
|
goto err;
|
|
}
|
|
p++;
|
|
}
|
|
|
|
return 1;
|
|
|
|
err:
|
|
/* A real error as opposed to an induced one: underlying function will
|
|
* indicate the error.
|
|
*/
|
|
if (!(dctx->flags & DRBG_FLAG_NOERR))
|
|
FIPSerr(FIPS_F_FIPS_DRBG_HEALTH_CHECK, FIPS_R_FUNCTION_ERROR);
|
|
FIPS_drbg_uninstantiate(dctx);
|
|
return 0;
|
|
|
|
}
|
|
|
|
int fips_drbg_kat(DRBG_CTX *dctx, int nid, unsigned int flags)
|
|
{
|
|
int rv;
|
|
DRBG_SELFTEST_DATA *td;
|
|
for (td = drbg_test; td->nid != 0; td++)
|
|
{
|
|
if (td->nid == nid && td->flags == flags)
|
|
{
|
|
rv = fips_drbg_single_kat(dctx, td, 0);
|
|
if (rv <= 0)
|
|
return rv;
|
|
return fips_drbg_health_check(dctx, td);
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
int FIPS_selftest_drbg(void)
|
|
{
|
|
DRBG_CTX *dctx;
|
|
DRBG_SELFTEST_DATA *td;
|
|
int rv = 1;
|
|
dctx = FIPS_drbg_new(0, 0);
|
|
if (!dctx)
|
|
return 0;
|
|
for (td = drbg_test; td->nid != 0; td++)
|
|
{
|
|
if (td->post != 1)
|
|
continue;
|
|
if (!fips_post_started(FIPS_TEST_DRBG, td->nid, &td->flags))
|
|
return 1;
|
|
if (!fips_drbg_single_kat(dctx, td, 1))
|
|
{
|
|
fips_post_failed(FIPS_TEST_DRBG, td->nid, &td->flags);
|
|
rv = 0;
|
|
continue;
|
|
}
|
|
if (!fips_post_success(FIPS_TEST_DRBG, td->nid, &td->flags))
|
|
return 0;
|
|
}
|
|
FIPS_drbg_free(dctx);
|
|
return rv;
|
|
}
|
|
|
|
|
|
int FIPS_selftest_drbg_all(void)
|
|
{
|
|
DRBG_CTX *dctx;
|
|
DRBG_SELFTEST_DATA *td;
|
|
int rv = 1;
|
|
dctx = FIPS_drbg_new(0, 0);
|
|
if (!dctx)
|
|
return 0;
|
|
for (td = drbg_test; td->nid != 0; td++)
|
|
{
|
|
if (!fips_post_started(FIPS_TEST_DRBG, td->nid, &td->flags))
|
|
return 1;
|
|
if (!fips_drbg_single_kat(dctx, td, 0))
|
|
{
|
|
fips_post_failed(FIPS_TEST_DRBG, td->nid, &td->flags);
|
|
rv = 0;
|
|
continue;
|
|
}
|
|
if (!fips_drbg_health_check(dctx, td))
|
|
{
|
|
fips_post_failed(FIPS_TEST_DRBG, td->nid, &td->flags);
|
|
rv = 0;
|
|
continue;
|
|
}
|
|
if (!fips_post_success(FIPS_TEST_DRBG, td->nid, &td->flags))
|
|
return 0;
|
|
}
|
|
FIPS_drbg_free(dctx);
|
|
return rv;
|
|
}
|
|
|