]>
Commit | Line | Data |
---|---|---|
2b4b28dc | 1 | /* ==================================================================== |
87829ac9 | 2 | * Copyright (c) 2011 The OpenSSL Project. All rights reserved. |
2b4b28dc DSH |
3 | * |
4 | * Redistribution and use in source and binary forms, with or without | |
5 | * modification, are permitted provided that the following conditions | |
6 | * are met: | |
7 | * | |
8 | * 1. Redistributions of source code must retain the above copyright | |
9 | * notice, this list of conditions and the following disclaimer. | |
10 | * | |
11 | * 2. Redistributions in binary form must reproduce the above copyright | |
12 | * notice, this list of conditions and the following disclaimer in | |
13 | * the documentation and/or other materials provided with the | |
14 | * distribution. | |
15 | * | |
16 | * 3. All advertising materials mentioning features or use of this | |
17 | * software must display the following acknowledgment: | |
18 | * "This product includes software developed by the OpenSSL Project | |
19 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | |
20 | * | |
21 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | |
22 | * endorse or promote products derived from this software without | |
23 | * prior written permission. For written permission, please contact | |
24 | * openssl-core@openssl.org. | |
25 | * | |
26 | * 5. Products derived from this software may not be called "OpenSSL" | |
27 | * nor may "OpenSSL" appear in their names without prior written | |
28 | * permission of the OpenSSL Project. | |
29 | * | |
30 | * 6. Redistributions of any form whatsoever must retain the following | |
31 | * acknowledgment: | |
32 | * "This product includes software developed by the OpenSSL Project | |
33 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | |
34 | * | |
35 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | |
36 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
37 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | |
38 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | |
39 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
40 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | |
41 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | |
42 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
43 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | |
44 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
45 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | |
46 | * OF THE POSSIBILITY OF SUCH DAMAGE. | |
47 | * | |
48 | */ | |
49 | ||
50 | #include <openssl/opensslconf.h> | |
644ce07e | 51 | #include <stdarg.h> |
2b4b28dc DSH |
52 | |
53 | #ifndef OPENSSL_FIPS | |
54 | #error FIPS is disabled. | |
55 | #endif | |
56 | ||
57 | #ifdef OPENSSL_FIPS | |
58 | ||
59 | #ifdef __cplusplus | |
60 | extern "C" { | |
61 | #endif | |
62 | ||
549c4ad3 DSH |
63 | #ifndef OPENSSL_FIPSCANISTER |
64 | #define OPENSSL_FIPSCAPABLE | |
65 | #endif | |
66 | ||
2b4b28dc | 67 | struct dsa_st; |
cac4fb58 | 68 | struct ec_key_st; |
7edfe674 | 69 | struct rsa_st; |
2b4b28dc DSH |
70 | struct evp_pkey_st; |
71 | struct env_md_st; | |
0cabe4e1 | 72 | struct env_md_ctx_st; |
2b4b28dc DSH |
73 | struct evp_cipher_st; |
74 | struct evp_cipher_ctx_st; | |
7f0d1be3 DSH |
75 | struct ec_method_st; |
76 | struct ecdsa_method; | |
4960411e | 77 | struct dh_method; |
2b4b28dc | 78 | |
c2fd5989 DSH |
79 | int FIPS_module_mode_set(int onoff); |
80 | int FIPS_module_mode(void); | |
2b4b28dc DSH |
81 | const void *FIPS_rand_check(void); |
82 | int FIPS_selftest(void); | |
83 | int FIPS_selftest_failed(void); | |
84 | void FIPS_selftest_check(void); | |
2b4b28dc | 85 | int FIPS_selftest_sha1(void); |
cb1b3aa1 | 86 | int FIPS_selftest_aes_ccm(void); |
acf254f8 | 87 | int FIPS_selftest_aes_gcm(void); |
bf8131f7 | 88 | int FIPS_selftest_aes_xts(void); |
2b4b28dc | 89 | int FIPS_selftest_aes(void); |
2b4b28dc | 90 | int FIPS_selftest_des(void); |
2b4b28dc | 91 | int FIPS_selftest_rsa(void); |
2b4b28dc | 92 | int FIPS_selftest_dsa(void); |
947ff113 | 93 | int FIPS_selftest_ecdsa(void); |
fbbabb64 | 94 | void FIPS_corrupt_drbg(void); |
cab0595c | 95 | void FIPS_x931_stick(void); |
ded19997 | 96 | void FIPS_drbg_stick(void); |
cab0595c | 97 | int FIPS_selftest_x931(void); |
2b4b28dc | 98 | int FIPS_selftest_hmac(void); |
fbbabb64 | 99 | int FIPS_selftest_drbg(void); |
399aa6b5 | 100 | int FIPS_selftest_cmac(void); |
2b4b28dc DSH |
101 | |
102 | unsigned int FIPS_incore_fingerprint(unsigned char *sig,unsigned int len); | |
103 | int FIPS_check_incore_fingerprint(void); | |
104 | ||
2b4b28dc DSH |
105 | void fips_set_selftest_fail(void); |
106 | int fips_check_rsa(struct rsa_st *rsa); | |
cac4fb58 DSH |
107 | int fips_check_rsa_prng(struct rsa_st *rsa, int bits); |
108 | int fips_check_dsa_prng(struct dsa_st *dsa, size_t L, size_t N); | |
109 | int fips_check_ec_prng(struct ec_key_st *ec); | |
2b4b28dc | 110 | |
c876a4b7 DSH |
111 | void FIPS_set_locking_callbacks(void (*func)(int mode, int type, |
112 | const char *file,int line), | |
113 | int (*add_cb)(int *pointer, int amount, | |
114 | int type, const char *file, int line)); | |
2b4b28dc | 115 | |
644ce07e DSH |
116 | void FIPS_set_error_callbacks( |
117 | void (*put_cb)(int lib, int func,int reason,const char *file,int line), | |
118 | void (*add_cb)(int num, va_list args) ); | |
119 | ||
8cf88778 DSH |
120 | void FIPS_set_malloc_callbacks( |
121 | void *(*malloc_cb)(int num, const char *file, int line), | |
122 | void (*free_cb)(void *)); | |
123 | ||
6653c6f2 DSH |
124 | void FIPS_get_timevec(unsigned char *buf, unsigned long *pctr); |
125 | ||
ac892b7a DSH |
126 | /* POST callback operation value: */ |
127 | /* All tests started */ | |
128 | #define FIPS_POST_BEGIN 1 | |
129 | /* All tests end: result in id */ | |
130 | #define FIPS_POST_END 2 | |
131 | /* One individual test started */ | |
132 | #define FIPS_POST_STARTED 3 | |
133 | /* Individual test success */ | |
134 | #define FIPS_POST_SUCCESS 4 | |
135 | /* Individual test failure */ | |
136 | #define FIPS_POST_FAIL 5 | |
137 | /* Induce failure in test if zero return */ | |
138 | #define FIPS_POST_CORRUPT 6 | |
139 | ||
140 | /* Test IDs */ | |
141 | /* HMAC integrity test */ | |
142 | #define FIPS_TEST_INTEGRITY 1 | |
143 | /* Digest test */ | |
144 | #define FIPS_TEST_DIGEST 2 | |
145 | /* Symmetric cipher test */ | |
146 | #define FIPS_TEST_CIPHER 3 | |
147 | /* Public key signature test */ | |
148 | #define FIPS_TEST_SIGNATURE 4 | |
149 | /* HMAC test */ | |
150 | #define FIPS_TEST_HMAC 5 | |
151 | /* CMAC test */ | |
152 | #define FIPS_TEST_CMAC 6 | |
153 | /* GCM test */ | |
154 | #define FIPS_TEST_GCM 7 | |
155 | /* CCM test */ | |
156 | #define FIPS_TEST_CCM 8 | |
157 | /* XTS test */ | |
158 | #define FIPS_TEST_XTS 9 | |
159 | /* X9.31 PRNG */ | |
160 | #define FIPS_TEST_X931 10 | |
161 | /* DRNB */ | |
162 | #define FIPS_TEST_DRBG 11 | |
163 | /* Keygen pairwise consistency test */ | |
164 | #define FIPS_TEST_PAIRWISE 12 | |
165 | /* Continuous PRNG test */ | |
166 | #define FIPS_TEST_CONTINUOUS 13 | |
167 | ||
168 | void FIPS_post_set_callback( | |
169 | int (*post_cb)(int op, int id, int subid, void *ex)); | |
170 | ||
25c65429 DSH |
171 | #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ |
172 | alg " previous FIPS forbidden algorithm error ignored"); | |
173 | ||
ac892b7a DSH |
174 | int fips_pkey_signature_test(int id, struct evp_pkey_st *pkey, |
175 | const unsigned char *tbs, size_t tbslen, | |
176 | const unsigned char *kat, size_t katlen, | |
177 | const struct env_md_st *digest, int pad_mode, | |
178 | const char *fail_str); | |
179 | ||
180 | int fips_cipher_test(int id, struct evp_cipher_ctx_st *ctx, | |
181 | const struct evp_cipher_st *cipher, | |
182 | const unsigned char *key, | |
183 | const unsigned char *iv, | |
184 | const unsigned char *plaintext, | |
185 | const unsigned char *ciphertext, | |
186 | int len); | |
187 | ||
0cabe4e1 DSH |
188 | const struct env_md_st *FIPS_get_digestbynid(int nid); |
189 | ||
190 | struct rsa_st *FIPS_rsa_new(void); | |
191 | void FIPS_rsa_free(struct rsa_st *r); | |
192 | int FIPS_rsa_sign_ctx(struct rsa_st *rsa, struct env_md_ctx_st *ctx, | |
193 | int rsa_pad_mode, int saltlen, | |
194 | const struct env_md_st *mgf1Hash, | |
195 | unsigned char *sigret, unsigned int *siglen); | |
196 | int FIPS_rsa_sign_digest(struct rsa_st *rsa, | |
197 | const unsigned char *md, int md_len, | |
198 | const struct env_md_st *mhash, | |
199 | int rsa_pad_mode, int saltlen, | |
200 | const struct env_md_st *mgf1Hash, | |
201 | unsigned char *sigret, unsigned int *siglen); | |
202 | int FIPS_rsa_verify_ctx(struct rsa_st *rsa, struct env_md_ctx_st *ctx, | |
203 | int rsa_pad_mode, int saltlen, | |
204 | const struct env_md_st *mgf1Hash, | |
267229b1 | 205 | const unsigned char *sigbuf, unsigned int siglen); |
0cabe4e1 DSH |
206 | int FIPS_rsa_verify_digest(struct rsa_st *rsa, |
207 | const unsigned char *dig, int diglen, | |
208 | const struct env_md_st *mhash, | |
209 | int rsa_pad_mode, int saltlen, | |
210 | const struct env_md_st *mgf1Hash, | |
267229b1 | 211 | const unsigned char *sigbuf, unsigned int siglen); |
0cabe4e1 | 212 | |
f87ff24b DSH |
213 | #ifndef OPENSSL_FIPSCANISTER |
214 | ||
c3306690 | 215 | int FIPS_digestinit(EVP_MD_CTX *ctx, const EVP_MD *type); |
87829ac9 DSH |
216 | int FIPS_digestupdate(EVP_MD_CTX *ctx, const void *data, size_t count); |
217 | int FIPS_digestfinal(EVP_MD_CTX *ctx, unsigned char *md, unsigned int *size); | |
218 | int FIPS_md_ctx_cleanup(EVP_MD_CTX *ctx); | |
219 | ||
220 | int FIPS_cipherinit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, | |
221 | const unsigned char *key, const unsigned char *iv, int enc); | |
3e2e2318 DSH |
222 | int FIPS_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, |
223 | const unsigned char *in, unsigned int inl); | |
224 | int FIPS_cipher_ctx_cleanup(EVP_CIPHER_CTX *c); | |
c3306690 | 225 | |
f87ff24b DSH |
226 | const EVP_CIPHER *FIPS_evp_aes_128_cbc(void); |
227 | const EVP_CIPHER *FIPS_evp_aes_128_ccm(void); | |
228 | const EVP_CIPHER *FIPS_evp_aes_128_cfb1(void); | |
229 | const EVP_CIPHER *FIPS_evp_aes_128_cfb128(void); | |
230 | const EVP_CIPHER *FIPS_evp_aes_128_cfb8(void); | |
231 | const EVP_CIPHER *FIPS_evp_aes_128_ctr(void); | |
232 | const EVP_CIPHER *FIPS_evp_aes_128_ecb(void); | |
233 | const EVP_CIPHER *FIPS_evp_aes_128_gcm(void); | |
234 | const EVP_CIPHER *FIPS_evp_aes_128_ofb(void); | |
235 | const EVP_CIPHER *FIPS_evp_aes_128_xts(void); | |
236 | const EVP_CIPHER *FIPS_evp_aes_192_cbc(void); | |
237 | const EVP_CIPHER *FIPS_evp_aes_192_ccm(void); | |
238 | const EVP_CIPHER *FIPS_evp_aes_192_cfb1(void); | |
239 | const EVP_CIPHER *FIPS_evp_aes_192_cfb128(void); | |
240 | const EVP_CIPHER *FIPS_evp_aes_192_cfb8(void); | |
241 | const EVP_CIPHER *FIPS_evp_aes_192_ctr(void); | |
242 | const EVP_CIPHER *FIPS_evp_aes_192_ecb(void); | |
243 | const EVP_CIPHER *FIPS_evp_aes_192_gcm(void); | |
244 | const EVP_CIPHER *FIPS_evp_aes_192_ofb(void); | |
245 | const EVP_CIPHER *FIPS_evp_aes_256_cbc(void); | |
246 | const EVP_CIPHER *FIPS_evp_aes_256_ccm(void); | |
247 | const EVP_CIPHER *FIPS_evp_aes_256_cfb1(void); | |
248 | const EVP_CIPHER *FIPS_evp_aes_256_cfb128(void); | |
249 | const EVP_CIPHER *FIPS_evp_aes_256_cfb8(void); | |
250 | const EVP_CIPHER *FIPS_evp_aes_256_ctr(void); | |
251 | const EVP_CIPHER *FIPS_evp_aes_256_ecb(void); | |
252 | const EVP_CIPHER *FIPS_evp_aes_256_gcm(void); | |
253 | const EVP_CIPHER *FIPS_evp_aes_256_ofb(void); | |
254 | const EVP_CIPHER *FIPS_evp_aes_256_xts(void); | |
255 | const EVP_CIPHER *FIPS_evp_des_ede(void); | |
256 | const EVP_CIPHER *FIPS_evp_des_ede3(void); | |
257 | const EVP_CIPHER *FIPS_evp_des_ede3_cbc(void); | |
258 | const EVP_CIPHER *FIPS_evp_des_ede3_cfb1(void); | |
259 | const EVP_CIPHER *FIPS_evp_des_ede3_cfb64(void); | |
260 | const EVP_CIPHER *FIPS_evp_des_ede3_cfb8(void); | |
261 | const EVP_CIPHER *FIPS_evp_des_ede3_ecb(void); | |
262 | const EVP_CIPHER *FIPS_evp_des_ede3_ofb(void); | |
263 | const EVP_CIPHER *FIPS_evp_des_ede_cbc(void); | |
264 | const EVP_CIPHER *FIPS_evp_des_ede_cfb64(void); | |
265 | const EVP_CIPHER *FIPS_evp_des_ede_ecb(void); | |
266 | const EVP_CIPHER *FIPS_evp_des_ede_ofb(void); | |
267 | const EVP_MD *FIPS_evp_sha1(void); | |
268 | const EVP_MD *FIPS_evp_sha224(void); | |
269 | const EVP_MD *FIPS_evp_sha256(void); | |
270 | const EVP_MD *FIPS_evp_sha384(void); | |
271 | const EVP_MD *FIPS_evp_sha512(void); | |
e7ee10d3 DSH |
272 | const EVP_MD *FIPS_evp_dss1(void); |
273 | const EVP_MD *FIPS_evp_dss(void); | |
274 | const EVP_MD *FIPS_evp_ecdsa(void); | |
f87ff24b | 275 | |
0cabe4e1 | 276 | const RSA_METHOD *FIPS_rsa_pkcs1_ssleay(void); |
549c4ad3 | 277 | int FIPS_rsa_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); |
0cabe4e1 | 278 | |
da923413 | 279 | const struct dsa_method *FIPS_dsa_openssl(void); |
603bc939 | 280 | int FIPS_dsa_generate_key(DSA *dsa); |
da923413 DSH |
281 | int FIPS_dsa_generate_parameters_ex(DSA *dsa, int bits, |
282 | const unsigned char *seed,int seed_len, | |
283 | int *counter_ret, unsigned long *h_ret, BN_GENCB *cb); | |
284 | ||
285 | int fips_dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N, | |
286 | const EVP_MD *evpmd, const unsigned char *seed_in, size_t seed_len, | |
287 | unsigned char *seed_out, | |
603bc939 | 288 | int *counter_ret, unsigned long *h_ret, BN_GENCB *cb); |
da923413 | 289 | |
4960411e DSH |
290 | const struct ec_method_st *fips_ec_gf2m_simple_method(void); |
291 | const struct ec_method_st *fips_ec_gfp_simple_method(void); | |
292 | const struct ec_method_st *fips_ec_gfp_mont_method(void); | |
293 | const struct ec_method_st *fips_ec_gfp_nist_method(void); | |
7f0d1be3 | 294 | |
4960411e DSH |
295 | const struct ecdsa_method *FIPS_ecdsa_openssl(void); |
296 | const struct ecdh_method *FIPS_ecdh_openssl(void); | |
7f0d1be3 DSH |
297 | |
298 | int FIPS_ec_key_generate_key(struct ec_key_st *key); | |
299 | ||
4960411e | 300 | const struct dh_method *FIPS_dh_openssl(void); |
603bc939 DSH |
301 | int FIPS_dh_generate_parameters_ex(DH *dh, int prime_len, |
302 | int generator, BN_GENCB *cb); | |
4960411e | 303 | |
f87ff24b DSH |
304 | #endif |
305 | ||
7edfe674 | 306 | /* Where necessary redirect standard OpenSSL APIs to FIPS versions */ |
7cc684f4 | 307 | |
7c8ced94 | 308 | #if defined(OPENSSL_FIPSCANISTER) && defined(OPENSSL_FIPSAPI) |
7edfe674 | 309 | |
7c8ced94 | 310 | #define CRYPTO_lock FIPS_lock |
c876a4b7 | 311 | #define CRYPTO_add_lock FIPS_add_lock |
7cc684f4 DSH |
312 | #define CRYPTO_malloc FIPS_malloc |
313 | #define CRYPTO_free FIPS_free | |
7edfe674 | 314 | |
14ae26f2 DSH |
315 | #define ERR_put_error FIPS_put_error |
316 | #define ERR_add_error_data FIPS_add_error_data | |
317 | ||
7edfe674 DSH |
318 | #define EVP_MD_CTX_init FIPS_md_ctx_init |
319 | #define EVP_MD_CTX_cleanup FIPS_md_ctx_cleanup | |
320 | #define EVP_MD_CTX_create FIPS_md_ctx_create | |
321 | #define EVP_MD_CTX_destroy FIPS_md_ctx_destroy | |
322 | #define EVP_DigestInit_ex(ctx, type, impl) FIPS_digestinit(ctx, type) | |
323 | #define EVP_DigestInit FIPS_digestinit | |
324 | #define EVP_DigestUpdate FIPS_digestupdate | |
325 | #define EVP_Digest(data, count, md, size, type, impl) \ | |
326 | FIPS_digest(data, count, md, size, type) | |
327 | #define EVP_DigestFinal_ex FIPS_digestfinal | |
328 | #define EVP_MD_CTX_copy_ex FIPS_md_ctx_copy | |
329 | ||
330 | #define EVP_CipherInit_ex(ctx, cipher, impl, key, iv, enc) \ | |
331 | FIPS_cipherinit(ctx, cipher, key, iv, enc) | |
332 | ||
333 | #define EVP_CipherInit FIPS_cipherinit | |
334 | ||
335 | #define EVP_CIPHER_CTX_init FIPS_cipher_ctx_init | |
336 | #define EVP_CIPHER_CTX_cleanup FIPS_cipher_ctx_cleanup | |
337 | #define EVP_Cipher FIPS_cipher | |
338 | #define EVP_CIPHER_CTX_ctrl FIPS_cipher_ctx_ctrl | |
339 | #define EVP_CIPHER_CTX_new FIPS_cipher_ctx_new | |
340 | #define EVP_CIPHER_CTX_free FIPS_cipher_ctx_free | |
399aa6b5 RL |
341 | #define EVP_CIPHER_CTX_copy FIPS_cipher_ctx_copy |
342 | #define EVP_CIPHER_CTX_set_key_length FIPS_cipher_ctx_set_key_length | |
7edfe674 | 343 | |
e990b4f8 DSH |
344 | #define DSA_SIG_new FIPS_dsa_sig_new |
345 | #define DSA_SIG_free FIPS_dsa_sig_free | |
346 | ||
fe26d066 DSH |
347 | #define ECDSA_SIG_new FIPS_ecdsa_sig_new |
348 | #define ECDSA_SIG_free FIPS_ecdsa_sig_free | |
349 | ||
350 | #define ecdsa_check fips_ecdsa_check | |
8857b380 | 351 | #define ecdh_check fips_ecdh_check |
fe26d066 | 352 | |
05e24c87 DSH |
353 | #define RAND_bytes FIPS_rand_bytes |
354 | #define RAND_pseudo_bytes FIPS_rand_pseudo_bytes | |
355 | #define RAND_add FIPS_rand_add | |
356 | #define RAND_seed FIPS_rand_seed | |
357 | #define RAND_status FIPS_rand_status | |
358 | ||
7c8ced94 DSH |
359 | #endif |
360 | ||
2b4b28dc DSH |
361 | /* BEGIN ERROR CODES */ |
362 | /* The following lines are auto generated by the script mkerr.pl. Any changes | |
363 | * made after this point may be overwritten when the script is next run. | |
364 | */ | |
365 | void ERR_load_FIPS_strings(void); | |
366 | ||
367 | /* Error codes for the FIPS functions. */ | |
368 | ||
369 | /* Function codes. */ | |
370 | #define FIPS_F_DH_BUILTIN_GENPARAMS 100 | |
74fac927 | 371 | #define FIPS_F_DH_INIT 148 |
2b4b28dc | 372 | #define FIPS_F_DSA_BUILTIN_PARAMGEN 101 |
55e328f5 DSH |
373 | #define FIPS_F_DSA_BUILTIN_PARAMGEN2 102 |
374 | #define FIPS_F_DSA_DO_SIGN 103 | |
375 | #define FIPS_F_DSA_DO_VERIFY 104 | |
376 | #define FIPS_F_FIPS_CHECK_DSA 105 | |
cac4fb58 | 377 | #define FIPS_F_FIPS_CHECK_DSA_PRNG 151 |
55e328f5 | 378 | #define FIPS_F_FIPS_CHECK_EC 106 |
cac4fb58 | 379 | #define FIPS_F_FIPS_CHECK_EC_PRNG 152 |
55e328f5 DSH |
380 | #define FIPS_F_FIPS_CHECK_INCORE_FINGERPRINT 107 |
381 | #define FIPS_F_FIPS_CHECK_RSA 108 | |
cac4fb58 | 382 | #define FIPS_F_FIPS_CHECK_RSA_PRNG 150 |
ad478495 | 383 | #define FIPS_F_FIPS_CIPHER 160 |
55e328f5 | 384 | #define FIPS_F_FIPS_CIPHERINIT 109 |
ad478495 DSH |
385 | #define FIPS_F_FIPS_CIPHER_CTX_CTRL 161 |
386 | #define FIPS_F_FIPS_DIGESTFINAL 158 | |
55e328f5 | 387 | #define FIPS_F_FIPS_DIGESTINIT 110 |
ad478495 | 388 | #define FIPS_F_FIPS_DIGESTUPDATE 159 |
55e328f5 | 389 | #define FIPS_F_FIPS_DRBG_BYTES 111 |
14264b19 | 390 | #define FIPS_F_FIPS_DRBG_CHECK 146 |
55e328f5 DSH |
391 | #define FIPS_F_FIPS_DRBG_CPRNG_TEST 112 |
392 | #define FIPS_F_FIPS_DRBG_GENERATE 113 | |
393 | #define FIPS_F_FIPS_DRBG_HEALTH_CHECK 114 | |
394 | #define FIPS_F_FIPS_DRBG_INIT 115 | |
395 | #define FIPS_F_FIPS_DRBG_INSTANTIATE 116 | |
396 | #define FIPS_F_FIPS_DRBG_NEW 117 | |
397 | #define FIPS_F_FIPS_DRBG_RESEED 118 | |
398 | #define FIPS_F_FIPS_DRBG_SINGLE_KAT 119 | |
ad478495 DSH |
399 | #define FIPS_F_FIPS_DSA_SIGN_DIGEST 154 |
400 | #define FIPS_F_FIPS_DSA_VERIFY_DIGEST 155 | |
b8b6a13a | 401 | #define FIPS_F_FIPS_GET_ENTROPY 147 |
f76b1baf | 402 | #define FIPS_F_FIPS_MODULE_MODE_SET 120 |
55e328f5 DSH |
403 | #define FIPS_F_FIPS_PKEY_SIGNATURE_TEST 121 |
404 | #define FIPS_F_FIPS_RAND_ADD 122 | |
405 | #define FIPS_F_FIPS_RAND_BYTES 123 | |
406 | #define FIPS_F_FIPS_RAND_PSEUDO_BYTES 124 | |
407 | #define FIPS_F_FIPS_RAND_SEED 125 | |
408 | #define FIPS_F_FIPS_RAND_SET_METHOD 126 | |
409 | #define FIPS_F_FIPS_RAND_STATUS 127 | |
ad478495 DSH |
410 | #define FIPS_F_FIPS_RSA_SIGN_DIGEST 156 |
411 | #define FIPS_F_FIPS_RSA_VERIFY_DIGEST 157 | |
55e328f5 | 412 | #define FIPS_F_FIPS_SELFTEST_AES 128 |
cb1b3aa1 | 413 | #define FIPS_F_FIPS_SELFTEST_AES_CCM 145 |
55e328f5 | 414 | #define FIPS_F_FIPS_SELFTEST_AES_GCM 129 |
bf8131f7 | 415 | #define FIPS_F_FIPS_SELFTEST_AES_XTS 144 |
55e328f5 DSH |
416 | #define FIPS_F_FIPS_SELFTEST_CMAC 130 |
417 | #define FIPS_F_FIPS_SELFTEST_DES 131 | |
418 | #define FIPS_F_FIPS_SELFTEST_DSA 132 | |
419 | #define FIPS_F_FIPS_SELFTEST_ECDSA 133 | |
420 | #define FIPS_F_FIPS_SELFTEST_HMAC 134 | |
421 | #define FIPS_F_FIPS_SELFTEST_SHA1 135 | |
422 | #define FIPS_F_FIPS_SELFTEST_X931 136 | |
ad478495 | 423 | #define FIPS_F_FIPS_SET_PRNG_KEY 153 |
55e328f5 DSH |
424 | #define FIPS_F_HASH_FINAL 137 |
425 | #define FIPS_F_RSA_BUILTIN_KEYGEN 138 | |
74fac927 | 426 | #define FIPS_F_RSA_EAY_INIT 149 |
55e328f5 DSH |
427 | #define FIPS_F_RSA_EAY_PRIVATE_DECRYPT 139 |
428 | #define FIPS_F_RSA_EAY_PRIVATE_ENCRYPT 140 | |
429 | #define FIPS_F_RSA_EAY_PUBLIC_DECRYPT 141 | |
430 | #define FIPS_F_RSA_EAY_PUBLIC_ENCRYPT 142 | |
431 | #define FIPS_F_RSA_X931_GENERATE_KEY_EX 143 | |
2b4b28dc DSH |
432 | |
433 | /* Reason codes. */ | |
55e328f5 DSH |
434 | #define FIPS_R_ADDITIONAL_INPUT_TOO_LONG 100 |
435 | #define FIPS_R_ALREADY_INSTANTIATED 101 | |
436 | #define FIPS_R_CONTRADICTING_EVIDENCE 102 | |
437 | #define FIPS_R_DRBG_STUCK 103 | |
438 | #define FIPS_R_ENTROPY_ERROR_UNDETECTED 104 | |
439 | #define FIPS_R_ENTROPY_NOT_REQUESTED_FOR_RESEED 105 | |
b8b6a13a | 440 | #define FIPS_R_ENTROPY_SOURCE_STUCK 142 |
55e328f5 DSH |
441 | #define FIPS_R_ERROR_INITIALISING_DRBG 106 |
442 | #define FIPS_R_ERROR_INSTANTIATING_DRBG 107 | |
443 | #define FIPS_R_ERROR_RETRIEVING_ADDITIONAL_INPUT 108 | |
444 | #define FIPS_R_ERROR_RETRIEVING_ENTROPY 109 | |
445 | #define FIPS_R_ERROR_RETRIEVING_NONCE 110 | |
446 | #define FIPS_R_FINGERPRINT_DOES_NOT_MATCH 111 | |
447 | #define FIPS_R_FINGERPRINT_DOES_NOT_MATCH_NONPIC_RELOCATED 112 | |
448 | #define FIPS_R_FINGERPRINT_DOES_NOT_MATCH_SEGMENT_ALIASING 113 | |
449 | #define FIPS_R_FIPS_MODE_ALREADY_SET 114 | |
450 | #define FIPS_R_FIPS_SELFTEST_FAILED 115 | |
451 | #define FIPS_R_FUNCTION_ERROR 116 | |
452 | #define FIPS_R_GENERATE_ERROR 117 | |
453 | #define FIPS_R_GENERATE_ERROR_UNDETECTED 118 | |
454 | #define FIPS_R_INSTANTIATE_ERROR 119 | |
455 | #define FIPS_R_INSUFFICIENT_SECURITY_STRENGTH 120 | |
456 | #define FIPS_R_INTERNAL_ERROR 121 | |
457 | #define FIPS_R_INVALID_KEY_LENGTH 122 | |
cac4fb58 | 458 | #define FIPS_R_INVALID_PARAMETERS 144 |
55e328f5 DSH |
459 | #define FIPS_R_IN_ERROR_STATE 123 |
460 | #define FIPS_R_KEY_TOO_SHORT 124 | |
461 | #define FIPS_R_NON_FIPS_METHOD 125 | |
462 | #define FIPS_R_NOT_INSTANTIATED 126 | |
463 | #define FIPS_R_PAIRWISE_TEST_FAILED 127 | |
464 | #define FIPS_R_PERSONALISATION_ERROR_UNDETECTED 128 | |
465 | #define FIPS_R_PERSONALISATION_STRING_TOO_LONG 129 | |
cac4fb58 | 466 | #define FIPS_R_PRNG_STRENGTH_TOO_LOW 143 |
55e328f5 DSH |
467 | #define FIPS_R_REQUEST_LENGTH_ERROR_UNDETECTED 130 |
468 | #define FIPS_R_REQUEST_TOO_LARGE_FOR_DRBG 131 | |
469 | #define FIPS_R_RESEED_COUNTER_ERROR 132 | |
470 | #define FIPS_R_RESEED_ERROR 133 | |
471 | #define FIPS_R_SELFTEST_FAILED 134 | |
472 | #define FIPS_R_SELFTEST_FAILURE 135 | |
473 | #define FIPS_R_STRENGTH_ERROR_UNDETECTED 136 | |
474 | #define FIPS_R_TEST_FAILURE 137 | |
49cb5e0b | 475 | #define FIPS_R_UNINSTANTIATE_ERROR 141 |
55e328f5 DSH |
476 | #define FIPS_R_UNINSTANTIATE_ZEROISE_ERROR 138 |
477 | #define FIPS_R_UNSUPPORTED_DRBG_TYPE 139 | |
478 | #define FIPS_R_UNSUPPORTED_PLATFORM 140 | |
2b4b28dc DSH |
479 | |
480 | #ifdef __cplusplus | |
481 | } | |
482 | #endif | |
483 | #endif |