2b4b28dc32
Initial FIPS 140-2 code ported to HEAD. Doesn't even compile yet, may have missing files, extraneous files and other nastiness. In other words: it's experimental ATM, OK?
178 lines
6 KiB
Bash
Executable file
178 lines
6 KiB
Bash
Executable file
#!/bin/sh -e
|
|
#
|
|
# Copyright (c) 2005-2007 The OpenSSL Project.
|
|
#
|
|
# Depending on output file name, the script either embeds fingerprint
|
|
# into libcrypto.so or static application. "Static" refers to static
|
|
# libcrypto.a, not [necessarily] application per se.
|
|
#
|
|
# Even though this script is called fipsld, it expects C compiler
|
|
# command line syntax and $FIPSLD_CC or $CC environment variable set
|
|
# and can even be used to compile source files.
|
|
|
|
#set -x
|
|
|
|
CC=${FIPSLD_CC:-${CC}}
|
|
[ -n "${CC}" ] || { echo '$CC is not defined'; exit 1; }
|
|
|
|
# Initially -c wasn't intended to be interpreted here, but it might
|
|
# make life easier for those who want to build FIPS-ified applications
|
|
# with minimal [if any] modifications to their Makefiles...
|
|
( while [ "x$1" != "x" -a "x$1" != "x-c" -a "x$1" != "x-E" ]; do shift; done;
|
|
[ $# -ge 1 ]
|
|
) && exec ${CC} "$@"
|
|
|
|
TARGET=`(while [ "x$1" != "x" -a "x$1" != "x-o" ]; do shift; done; echo $2)`
|
|
|
|
# If using an auto-tooled (autoconf/automake/libtool) project,
|
|
# configure will fail when testing the compiler or even performing
|
|
# simple checks. Pass-through to compiler directly if application is
|
|
# is not being linked with libcrypto, allowing auto-tooled applications
|
|
# to utilize fipsld (e.g. CC=/usr/local/ssl/bin/fipsld FIPSLD_CC=gcc
|
|
# ./configure && make). But keep in mind[!] that if certified code
|
|
# resides in a shared library, then fipsld *may not* be used and
|
|
# end-developer should not modify application configuration and build
|
|
# procedures. This is because in-core fingerprint and associated
|
|
# procedures are already embedded into and executed in shared library
|
|
# context.
|
|
case `basename "${TARGET}"` in
|
|
libcrypto*|libfips*|*.dll) ;;
|
|
*) case "$*" in
|
|
*libcrypto.a*|*-lcrypto*|*fipscanister.o*) ;;
|
|
*) exec ${CC} "$@" ;;
|
|
esac
|
|
esac
|
|
|
|
[ -n "${TARGET}" ] || { echo 'no -o specified'; exit 1; }
|
|
|
|
# Turn on debugging output?
|
|
( while [ "x$1" != "x" -a "x$1" != "x-DDEBUG_FINGERPRINT_PREMAIN" ]; do shift; done;
|
|
[ $# -ge 1 ]
|
|
) && set -x
|
|
|
|
THERE="`echo $0 | sed -e 's|[^/]*$||'`"..
|
|
|
|
# fipscanister.o can appear in command line
|
|
CANISTER_O=`(while [ "x$1" != "x" ]; do case "$1" in *fipscanister.o) echo $1; exit;; esac; shift; done)`
|
|
if [ -z "${CANISTER_O}" ]; then
|
|
# If set, FIPSLIBDIR is location of installed validated FIPS module
|
|
if [ -n "${FIPSLIBDIR}" ]; then
|
|
CANISTER_O="${FIPSLIBDIR}/fipscanister.o"
|
|
elif [ -f "${THERE}/fips/fipscanister.o" ]; then
|
|
CANISTER_O="${THERE}/fips/fipscanister.o"
|
|
elif [ -f "${THERE}/lib/fipscanister.o" ]; then
|
|
CANISTER_O="${THERE}/lib/fipscanister.o"
|
|
fi
|
|
CANISTER_O_CMD="${CANISTER_O}"
|
|
fi
|
|
[ -f ${CANISTER_O} ] || { echo "unable to find ${CANISTER_O}"; exit 1; }
|
|
|
|
PREMAIN_C=`dirname "${CANISTER_O}"`/fips_premain.c
|
|
|
|
HMAC_KEY="etaonrishdlcupfm"
|
|
|
|
case "`(uname -s) 2>/dev/null`" in
|
|
OSF1|IRIX*) _WL_PREMAIN="-Wl,-init,FINGERPRINT_premain" ;;
|
|
HP-UX) _WL_PREMAIN="-Wl,+init,FINGERPRINT_premain" ;;
|
|
AIX) _WL_PREMAIN="-Wl,-binitfini:FINGERPRINT_premain,-bnoobjreorder";;
|
|
Darwin) ( while [ "x$1" != "x" -a "x$1" != "x-dynamiclib" ]; do shift; done;
|
|
[ $# -ge 1 ]
|
|
) && _WL_PREMAIN="-Wl,-init,_FINGERPRINT_premain" ;;
|
|
esac
|
|
|
|
case "${TARGET}" in
|
|
[!/]*) TARGET=./${TARGET} ;;
|
|
esac
|
|
|
|
case `basename "${TARGET}"` in
|
|
lib*|*.dll) # must be linking a shared lib...
|
|
# Shared lib creation can be taking place in the source
|
|
# directory only, but fipscanister.o can reside elsewhere...
|
|
FINGERTYPE="${THERE}/fips/fips_standalone_sha1"
|
|
|
|
# verify fipspremain.c against its detached signature...
|
|
${FINGERTYPE} "${PREMAIN_C}" | sed "s/(.*\//(/" | \
|
|
diff -w "${PREMAIN_C}.sha1" - || \
|
|
{ echo "${PREMAIN_C} fingerprint mismatch"; exit 1; }
|
|
# verify fipscanister.o against its detached signature...
|
|
${FINGERTYPE} "${CANISTER_O}" | sed "s/(.*\//(/" | \
|
|
diff -w "${CANISTER_O}.sha1" - || \
|
|
{ echo "${CANISTER_O} fingerprint mismatch"; exit 1; }
|
|
|
|
# Temporarily remove fipscanister.o from libcrypto.a!
|
|
# We are required to use the standalone copy...
|
|
if [ -f "${THERE}/libcrypto.a" ]; then
|
|
if ar d "${THERE}/libcrypto.a" fipscanister.o; then
|
|
(ranlib "${THERE}/libcrypto.a") 2>/dev/null || :
|
|
trap 'ar r "${THERE}/libcrypto.a" "${CANISTER_O}";
|
|
(ranlib "${THERE}/libcrypto.a") 2>/dev/null || :;
|
|
sleep 1;
|
|
touch -c "${TARGET}"' 0
|
|
fi
|
|
fi
|
|
|
|
/bin/rm -f "${TARGET}"
|
|
${CC} ${CANISTER_O_CMD:+"${CANISTER_O_CMD}"} \
|
|
"${PREMAIN_C}" \
|
|
${_WL_PREMAIN} "$@"
|
|
|
|
# generate signature...
|
|
if [ -z "${FIPS_SIG}" ]; then
|
|
SIG=`"${THERE}/fips/fips_premain_dso" "${TARGET}"`
|
|
else
|
|
SIG=`"${FIPS_SIG}" -dso "${TARGET}"`
|
|
fi
|
|
/bin/rm -f "${TARGET}"
|
|
if [ -z "${SIG}" ]; then
|
|
echo "unable to collect signature"; exit 1
|
|
fi
|
|
|
|
# recompile with signature...
|
|
${CC} ${CANISTER_O_CMD:+"${CANISTER_O_CMD}"} \
|
|
-DHMAC_SHA1_SIG=\"${SIG}\" "${PREMAIN_C}" \
|
|
${_WL_PREMAIN} "$@"
|
|
;;
|
|
|
|
*) # must be linking statically...
|
|
# Static linking can be taking place either in the source
|
|
# directory or off the installed binary target destination.
|
|
if [ -x "${THERE}/fips/fips_standalone_sha1" ]; then
|
|
FINGERTYPE="${THERE}/fips/fips_standalone_sha1"
|
|
else # Installed tree is expected to contain
|
|
# lib/fipscanister.o, lib/fipscanister.o.sha1 and
|
|
# lib/fips_premain.c [not to mention bin/openssl].
|
|
FINGERTYPE="${THERE}/bin/openssl sha1 -hmac ${HMAC_KEY}"
|
|
fi
|
|
|
|
# verify fipscanister.o against its detached signature...
|
|
${FINGERTYPE} "${CANISTER_O}" | sed "s/(.*\//(/" | \
|
|
diff -w "${CANISTER_O}.sha1" - || \
|
|
{ echo "${CANISTER_O} fingerprint mismatch"; exit 1; }
|
|
|
|
# verify fips_premain.c against its detached signature...
|
|
${FINGERTYPE} "${PREMAIN_C}" | sed "s/(.*\//(/" | \
|
|
diff -w "${PREMAIN_C}.sha1" - || \
|
|
{ echo "${PREMAIN_C} fingerprint mismatch"; exit 1; }
|
|
|
|
/bin/rm -f "${TARGET}"
|
|
${CC} ${CANISTER_O_CMD:+"${CANISTER_O_CMD}"} \
|
|
"${PREMAIN_C}" \
|
|
${_WL_PREMAIN} "$@"
|
|
|
|
# generate signature...
|
|
if [ -z "${FIPS_SIG}" ]; then
|
|
SIG=`"${TARGET}"`
|
|
else
|
|
SIG=`"${FIPS_SIG}" -exe "${TARGET}"`
|
|
fi
|
|
/bin/rm -f "${TARGET}"
|
|
if [ -z "${SIG}" ]; then
|
|
echo "unable to collect signature"; exit 1
|
|
fi
|
|
|
|
# recompile with signature...
|
|
${CC} ${CANISTER_O_CMD:+"${CANISTER_O_CMD}"} \
|
|
-DHMAC_SHA1_SIG=\"${SIG}\" "${PREMAIN_C}" \
|
|
${_WL_PREMAIN} "$@"
|
|
;;
|
|
esac
|