]> granicus.if.org Git - openssl/commitdiff
Updates to DRBG: fix bugs in infrastructure. Add initial experimental
authorDr. Stephen Henson <steve@openssl.org>
Sun, 6 Mar 2011 12:35:09 +0000 (12:35 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Sun, 6 Mar 2011 12:35:09 +0000 (12:35 +0000)
algorithm test generator.

fips/rand/Makefile
fips/rand/fips_drbg_lib.c
fips/rand/fips_drbgvs.c [new file with mode: 0644]
fips/rand/fips_rand.h
fips/rand/fips_rand_lcl.h
test/Makefile

index 580d6df7771788a2ec0224a676b4cd0a5b598619..0aade52d68e3a9fb521056d4547382c7a9001a85 100644 (file)
@@ -18,7 +18,7 @@ AR=           ar r
 CFLAGS= $(INCLUDES) $(CFLAG)
 
 GENERAL=Makefile
-TEST= fips_randtest.c fips_rngvs.c
+TEST= fips_randtest.c fips_rngvs.c fips_drbgvs.c
 APPS=
 
 LIB=$(TOP)/libcrypto.a
index da9fb37dd9dd8a0902fc3df15b7b26b9f5a94df0..9b497b54cc6eab6fb5cb6db0e0213a97b1435bfc 100644 (file)
@@ -134,6 +134,8 @@ int FIPS_drbg_instantiate(DRBG_CTX *dctx,
 
        dctx->status = DRBG_STATUS_READY;
        dctx->reseed_counter = 1;
+       /* Initial test value for reseed interval */
+       dctx->reseed_interval = 1<<24;
 
        end:
 
@@ -160,7 +162,7 @@ int FIPS_drbg_reseed(DRBG_CTX *dctx,
 
        if (!adin)
                adinlen = 0;
-       else if (adinlen > dctx->max_adin);
+       else if (adinlen > dctx->max_adin)
                {
                /* error */
                return 0;
@@ -223,4 +225,31 @@ int FIPS_drbg_generate(DRBG_CTX *dctx, unsigned char *out, size_t outlen,
        }
 
 
+int FIPS_drbg_set_test_mode(DRBG_CTX *dctx,
+       size_t (*get_entropy)(DRBG_CTX *ctx, unsigned char *out,
+                               int entropy, size_t min_len, size_t max_len),
+       size_t (*get_nonce)(DRBG_CTX *ctx, unsigned char *out,
+                               int entropy, size_t min_len, size_t max_len))
+       {
+       if (dctx->status != DRBG_STATUS_UNINITIALISED)
+               return 0;
+       dctx->flags |= DRBG_FLAG_TEST;
+       dctx->get_entropy = get_entropy;
+       dctx->get_nonce = get_nonce;
+       return 1;
+       }
 
+void *FIPS_drbg_get_app_data(DRBG_CTX *dctx)
+       {
+       return dctx->app_data;
+       }
+
+void FIPS_drbg_set_app_data(DRBG_CTX *dctx, void *app_data)
+       {
+       dctx->app_data = app_data;
+       }
+
+size_t FIPS_drbg_get_blocklength(DRBG_CTX *dctx)
+       {
+       return dctx->blocklength;
+       }
diff --git a/fips/rand/fips_drbgvs.c b/fips/rand/fips_drbgvs.c
new file mode 100644 (file)
index 0000000..a599233
--- /dev/null
@@ -0,0 +1,304 @@
+/* fips/rand/fips_drbgvs.c */
+/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
+ * project.
+ */
+/* ====================================================================
+ * Copyright (c) 2011 The OpenSSL Project.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer. 
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in
+ *    the documentation and/or other materials provided with the
+ *    distribution.
+ *
+ * 3. All advertising materials mentioning features or use of this
+ *    software must display the following acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
+ *
+ * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
+ *    endorse or promote products derived from this software without
+ *    prior written permission. For written permission, please contact
+ *    licensing@OpenSSL.org.
+ *
+ * 5. Products derived from this software may not be called "OpenSSL"
+ *    nor may "OpenSSL" appear in their names without prior written
+ *    permission of the OpenSSL Project.
+ *
+ * 6. Redistributions of any form whatsoever must retain the following
+ *    acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
+ * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
+ * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
+ * ====================================================================
+ */
+
+
+#define OPENSSL_FIPSAPI
+#include <openssl/opensslconf.h>
+
+#ifndef OPENSSL_FIPS
+#include <stdio.h>
+
+int main(int argc, char **argv)
+{
+    printf("No FIPS GCM support\n");
+    return(0);
+}
+#else
+
+#include <openssl/bn.h>
+#include <openssl/dsa.h>
+#include <openssl/fips.h>
+#include <openssl/fips_rand.h>
+#include <openssl/err.h>
+#include <openssl/evp.h>
+#include <string.h>
+#include <ctype.h>
+
+#include "fips_utl.h"
+
+static int parse_md(char *str)
+       {
+       switch(atoi(str + 5))
+               {
+               case 1:
+               return NID_sha1;
+
+               case 224:
+               return NID_sha224;
+
+               case 256:
+               return NID_sha256;
+
+               case 384:
+               return NID_sha384;
+
+               case 512:
+               return NID_sha512;
+
+               }
+
+       return NID_undef;
+       }
+
+static int parse_aes(char *str, int *pdf)
+       {
+
+       if (!strncmp(str + 9, "no", 2))
+               *pdf = 0;
+       else
+               *pdf = DRBG_FLAG_CTR_USE_DF;
+
+       switch(atoi(str + 5))
+               {
+               case 128:
+               return NID_aes_128_ctr;
+
+               case 192:
+               return NID_aes_192_ctr;
+
+               case 256:
+               return NID_aes_256_ctr;
+
+               default:
+               return NID_undef;
+
+               }
+
+       return NID_undef;
+       }
+
+typedef struct 
+       {
+       unsigned char *ent;
+       size_t entlen;
+       unsigned char *nonce;
+       size_t noncelen;
+       } TEST_ENT;
+
+static size_t test_entropy(DRBG_CTX *dctx, unsigned char *out,
+                                int entropy, size_t min_len, size_t max_len)
+       {
+       TEST_ENT *t = FIPS_drbg_get_app_data(dctx);
+       memcpy(out, t->ent, t->entlen);
+       return t->entlen;
+       }
+
+static size_t test_nonce(DRBG_CTX *dctx, unsigned char *out,
+                                int entropy, size_t min_len, size_t max_len)
+       {
+       TEST_ENT *t = FIPS_drbg_get_app_data(dctx);
+       memcpy(out, t->nonce, t->noncelen);
+       return t->noncelen;
+       }
+
+
+
+int main(int argc,char **argv)
+       {
+       DRBG_CTX *dctx;
+       TEST_ENT t;
+       int r, nid;
+       int pr = 0;
+       char buf[2048], lbuf[2048];
+       unsigned char out[2048];
+       char *keyword = NULL, *value = NULL;
+
+       unsigned char *ent = NULL, *nonce = NULL, *pers = NULL, *adin = NULL;
+       long entlen, noncelen, perslen, adinlen;
+       int df;
+
+       int outlen = 0;
+
+       int gen = 0;
+
+       fips_set_error_print();
+       
+       while (fgets(buf, sizeof(buf), stdin) != NULL)
+               {
+               fputs(buf, stdout);
+               if (strlen(buf) > 4 && !strncmp(buf, "[SHA-", 5))
+                       {
+                       nid = parse_md(buf);
+                       if (nid == NID_undef)
+                               exit(1);
+                       }
+               if (strlen(buf) > 12 && !strncmp(buf, "[AES-", 5))
+                       {
+                       nid = parse_aes(buf, &df);
+                       if (nid == NID_undef)
+                               exit(1);
+                       }
+               if (!parse_line(&keyword, &value, lbuf, buf))
+                       continue;
+
+               if (!strcmp(keyword, "[PredictionResistance"))
+                       {
+                       if (!strcmp(value, "True]"))
+                               pr = 1;
+                       else if (!strcmp(value, "False]"))
+                               pr = 0;
+                       else
+                               exit(1);
+                       }
+
+               if (!strcmp(keyword, "EntropyInput"))
+                       {
+                       ent = hex2bin_m(value, &entlen);
+                       t.ent = ent;
+                       t.entlen = entlen;
+                       }
+
+               if (!strcmp(keyword, "Nonce"))
+                       {
+                       nonce = hex2bin_m(value, &noncelen);
+                       t.nonce = nonce;
+                       t.noncelen = noncelen;
+                       }
+
+               if (!strcmp(keyword, "PersonalizationString"))
+                       {
+                       pers = hex2bin_m(value, &perslen);
+                       dctx = FIPS_drbg_new(nid, df);
+                       if (!dctx)
+                               exit (1);
+                       FIPS_drbg_set_test_mode(dctx, test_entropy, test_nonce);
+                       FIPS_drbg_set_app_data(dctx, &t);
+                       outlen = (int)FIPS_drbg_get_blocklength(dctx);
+                       r = FIPS_drbg_instantiate(dctx, 0, pers, perslen);
+                       if (!r)
+                               {
+                               fprintf(stderr, "Error instantiating DRBG\n");
+                               exit(1);
+                               }
+                       OPENSSL_free(pers);
+                       OPENSSL_free(ent);
+                       OPENSSL_free(nonce);
+                       ent = nonce = pers = NULL;
+                       gen = 0;
+                       }
+
+               if (!strcmp(keyword, "AdditionalInput"))
+                       {
+                       adin = hex2bin_m(value, &adinlen);
+                       if (pr)
+                               continue;
+                       r = FIPS_drbg_generate(dctx, out, outlen, 0,
+                                                               adin, adinlen);
+                       if (!r)
+                               {
+                               fprintf(stderr, "Error generating DRBG bits\n");
+                               exit(1);
+                               }
+                       if (!r)
+                               exit(1);
+                       OPENSSL_free(adin);
+                       adin = NULL;
+                       gen++;
+                       }
+
+               if (pr)
+                       {
+                       if (!strcmp(keyword, "EntropyInputPR"))
+                               {
+                               ent = hex2bin_m(value, &entlen);
+                               t.ent = ent;
+                               t.entlen = entlen;
+                               r = FIPS_drbg_generate(dctx, out, outlen, 1,
+                                                       adin, adinlen);
+                               if (!r)
+                                       {
+                                       fprintf(stderr,
+                                               "Error generating DRBG bits\n");
+                                       exit(1);
+                                       }
+                               OPENSSL_free(adin);
+                               OPENSSL_free(ent);
+                               adin = ent = NULL;
+                               gen++;
+                               }
+                       }
+               if (!strcmp(keyword, "EntropyInputReseed"))
+                       {
+                       ent = hex2bin_m(value, &entlen);
+                       t.ent = ent;
+                       t.entlen = entlen;
+                       }
+               if (!strcmp(keyword, "AdditionalInputReseed"))
+                       {
+                       adin = hex2bin_m(value, &adinlen);
+                       FIPS_drbg_reseed(dctx, adin, adinlen);
+                       OPENSSL_free(ent);
+                       OPENSSL_free(adin);
+                       ent = adin = NULL;
+                       }
+               if (gen == 2)
+                       {
+                       OutputValue("ReturnedBits", out, outlen, stdout, 0);
+                       gen = 0;
+                       }
+
+               }
+       return 0;
+       }
+
+#endif
index 27eb8f7c2b415fa42d379a8c4a5166926041165e..e0cc8c9da54e55612d998a18044e22560641f637 100644 (file)
@@ -72,6 +72,9 @@ const RAND_METHOD *FIPS_rand_method(void);
 
 typedef struct drbg_ctx_st DRBG_CTX;
 
+/* Flag for CTR mode only: use derivation function ctr_df */
+#define        DRBG_FLAG_CTR_USE_DF            0x1
+
 DRBG_CTX *FIPS_drbg_new(int type, unsigned int flags);
 int FIPS_drbg_instantiate(DRBG_CTX *dctx, int strength,
                                const unsigned char *pers, size_t perslen);
@@ -80,6 +83,16 @@ int FIPS_drbg_generate(DRBG_CTX *dctx, unsigned char *out, size_t outlen,
                        int prediction_resistance,
                        const unsigned char *adin, size_t adinlen);
 
+int FIPS_drbg_set_test_mode(DRBG_CTX *dctx,
+       size_t (*get_entropy)(DRBG_CTX *ctx, unsigned char *out,
+                               int entropy, size_t min_len, size_t max_len),
+       size_t (*get_nonce)(DRBG_CTX *ctx, unsigned char *out,
+                               int entropy, size_t min_len, size_t max_len));
+
+void *FIPS_drbg_get_app_data(DRBG_CTX *ctx);
+void FIPS_drbg_set_app_data(DRBG_CTX *ctx, void *app_data);
+size_t FIPS_drbg_get_blocklength(DRBG_CTX *dctx);
+
 #ifdef  __cplusplus
 }
 #endif
index 72820bf784a7a03166b30b7ef3b8cd140dbf62d5..34f1c59991fa6a6cbc5d1f19152475cb21ebe5ab 100644 (file)
@@ -84,12 +84,8 @@ struct drbg_ctr_ctx_st
 
 /* DRBG flags */
 
-/* Enable prediction resistance */
-#define        DRBG_FLAG_PREDICTION_RESISTANCE 0x1
-/* CTR only: use derivation function */
-#define        DRBG_FLAG_CTR_USE_DF            0x2
 /* PRNG is in test state */
-#define        DRBG_FLAG_TEST                  0x4
+#define        DRBG_FLAG_TEST                  0x2
 
 /* DRBG status values */
 /* not initialised */
index c1a05c327b0e0c8f7fda1ac8d3c4c8969cf9e617..3e26dfcbfbf668fb8d025ee9a7c8c3000780fdd3 100644 (file)
@@ -74,6 +74,7 @@ FIPS_RSAGTEST=        fips_rsagtest
 FIPS_DSATEST=  fips_dsatest
 FIPS_DSSVS=    fips_dssvs
 FIPS_RNGVS=    fips_rngvs
+FIPS_DRBGVS=   fips_drbgvs
 FIPS_ECDSAVS=  fips_ecdsavs
 FIPS_TEST_SUITE=fips_test_suite
 
@@ -94,7 +95,8 @@ FIPSEXE=$(FIPS_SHATEST)$(EXE_EXT) $(FIPS_DESTEST)$(EXE_EXT) \
        $(FIPS_HMACTEST)$(EXE_EXT) $(FIPS_RSAVTEST)$(EXE_EXT) \
        $(FIPS_RSASTEST)$(EXE_EXT) $(FIPS_RSAGTEST)$(EXE_EXT) \
        $(FIPS_DSSVS)$(EXE_EXT) $(FIPS_DSATEST)$(EXE_EXT) \
-       $(FIPS_RNGVS)$(EXE_EXT) $(FIPS_TEST_SUITE)$(EXE_EXT)  \
+       $(FIPS_RNGVS)$(EXE_EXT) $(FIPS_DRBGVS)$(EXE_EXT) \
+       $(FIPS_TEST_SUITE)$(EXE_EXT)  \
        $(FIPS_GCMTEST)$(EXE_EXT) $(FIPS_ECDSAVS)$(EXE_EXT)
 
 # $(METHTEST)$(EXE_EXT)
@@ -110,8 +112,8 @@ OBJ=        $(BNTEST).o $(ECTEST).o  $(ECDSATEST).o $(ECDHTEST).o $(IDEATEST).o \
        $(FIPS_SHATEST).o $(FIPS_DESTEST).o $(FIPS_RANDTEST).o \
        $(FIPS_AESTEST).o $(FIPS_HMACTEST).o $(FIPS_RSAVTEST).o \
        $(FIPS_RSASTEST).o $(FIPS_RSAGTEST).o $(FIPS_GCMTEST).o \
-       $(FIPS_DSSVS).o $(FIPS_DSATEST).o $(FIPS_RNGVS).o $(FIPS_TEST_SUITE).o \
-       $(FIPS_ECDSAVS).o \
+       $(FIPS_DSSVS).o $(FIPS_DSATEST).o $(FIPS_RNGVS).o $(FIPS_DRBGVS).o \
+       $(FIPS_TEST_SUITE).o $(FIPS_ECDSAVS).o \
        $(EVPTEST).o $(IGETEST).o $(JPAKETEST).o
 SRC=   $(BNTEST).c $(ECTEST).c  $(ECDSATEST).c $(ECDHTEST).c $(IDEATEST).c \
        $(MD2TEST).c  $(MD4TEST).c $(MD5TEST).c \
@@ -123,8 +125,8 @@ SRC=        $(BNTEST).c $(ECTEST).c  $(ECDSATEST).c $(ECDHTEST).c $(IDEATEST).c \
        $(FIPS_SHATEST).c $(FIPS_DESTEST).c $(FIPS_RANDTEST).c \
        $(FIPS_AESTEST).c $(FIPS_HMACTEST).c $(FIPS_RSAVTEST).c \
        $(FIPS_RSASTEST).c $(FIPS_RSAGTEST).c $(FIPS_GCMTEST).c \
-       $(FIPS_DSSVS).c $(FIPS_DSATEST).c $(FIPS_RNGVS).c $(FIPS_TEST_SUITE).c \
-       $(FIPS_ECDSAVS).c \
+       $(FIPS_DSSVS).c $(FIPS_DSATEST).c $(FIPS_RNGVS).c $(FIPS_DRBGVS).c \
+       $(FIPS_TEST_SUITE).c $(FIPS_ECDSAVS).c \
        $(EVPTEST).c $(IGETEST).c $(JPAKETEST).c
 
 EXHEADER= 
@@ -476,6 +478,9 @@ $(FIPS_ECDSAVS)$(EXE_EXT): $(FIPS_ECDSAVS).o $(DLIBCRYPTO)
 $(FIPS_RNGVS)$(EXE_EXT): $(FIPS_RNGVS).o $(DLIBCRYPTO)
        @target=$(FIPS_RNGVS); $(FIPS_BUILD_CMD)
 
+$(FIPS_DRBGVS)$(EXE_EXT): $(FIPS_DRBGVS).o $(DLIBCRYPTO)
+       @target=$(FIPS_DRBGVS); $(FIPS_BUILD_CMD)
+
 $(FIPS_TEST_SUITE)$(EXE_EXT): $(FIPS_TEST_SUITE).o $(DLIBCRYPTO)
        @target=$(FIPS_TEST_SUITE); $(FIPS_BUILD_CMD)