]>
git.ipfire.org Git - thirdparty/openssl.git/blob - test/drbg_cavs_test.c
2 * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/nelem.h"
12 #include <openssl/crypto.h>
13 #include <openssl/err.h>
14 #include <openssl/rand.h>
15 #include <openssl/obj_mac.h>
16 #include <openssl/evp.h>
17 #include <openssl/aes.h>
18 #include "../crypto/rand/rand_local.h"
21 #include "drbg_cavs_data.h"
23 static int app_data_index
;
25 typedef struct test_ctx_st
{
26 const unsigned char *entropy
;
29 const unsigned char *nonce
;
34 static size_t kat_entropy(RAND_DRBG
*drbg
, unsigned char **pout
,
35 int entropy
, size_t min_len
, size_t max_len
,
36 int prediction_resistance
)
38 TEST_CTX
*t
= (TEST_CTX
*)RAND_DRBG_get_ex_data(drbg
, app_data_index
);
41 *pout
= (unsigned char *)t
->entropy
;
45 static size_t kat_nonce(RAND_DRBG
*drbg
, unsigned char **pout
,
46 int entropy
, size_t min_len
, size_t max_len
)
48 TEST_CTX
*t
= (TEST_CTX
*)RAND_DRBG_get_ex_data(drbg
, app_data_index
);
51 *pout
= (unsigned char *)t
->nonce
;
56 * Do a single NO_RESEED KAT:
59 * Generate Random Bits (pr=false)
60 * Generate Random Bits (pr=false)
63 * Return 0 on failure.
65 static int single_kat_no_reseed(const struct drbg_kat
*td
)
67 struct drbg_kat_no_reseed
*data
= (struct drbg_kat_no_reseed
*)td
->t
;
68 RAND_DRBG
*drbg
= NULL
;
69 unsigned char *buff
= NULL
;
70 unsigned int flags
= 0;
74 if ((td
->flags
& USE_DF
) == 0)
75 flags
|= RAND_DRBG_FLAG_CTR_NO_DF
;
76 if ((td
->flags
& USE_HMAC
) != 0)
77 flags
|= RAND_DRBG_FLAG_HMAC
;
79 if (!TEST_ptr(drbg
= RAND_DRBG_new(td
->nid
, flags
, NULL
)))
82 if (!TEST_true(RAND_DRBG_set_callbacks(drbg
, kat_entropy
, NULL
,
87 memset(&t
, 0, sizeof(t
));
88 t
.entropy
= data
->entropyin
;
89 t
.entropylen
= td
->entropyinlen
;
90 t
.nonce
= data
->nonce
;
91 t
.noncelen
= td
->noncelen
;
92 RAND_DRBG_set_ex_data(drbg
, app_data_index
, &t
);
94 buff
= OPENSSL_malloc(td
->retbyteslen
);
98 if (!TEST_true(RAND_DRBG_instantiate(drbg
, data
->persstr
, td
->persstrlen
))
99 || !TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 0,
100 data
->addin1
, td
->addinlen
))
101 || !TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 0,
102 data
->addin2
, td
->addinlen
))
103 || !TEST_true(RAND_DRBG_uninstantiate(drbg
))
104 || !TEST_mem_eq(data
->retbytes
, td
->retbyteslen
, buff
,
110 RAND_DRBG_uninstantiate(drbg
);
111 RAND_DRBG_free(drbg
);
112 return failures
== 0;
116 * Do a single PR_FALSE KAT:
120 * Generate Random Bits (pr=false)
121 * Generate Random Bits (pr=false)
124 * Return 0 on failure.
126 static int single_kat_pr_false(const struct drbg_kat
*td
)
128 struct drbg_kat_pr_false
*data
= (struct drbg_kat_pr_false
*)td
->t
;
129 RAND_DRBG
*drbg
= NULL
;
130 unsigned char *buff
= NULL
;
131 unsigned int flags
= 0;
135 if ((td
->flags
& USE_DF
) == 0)
136 flags
|= RAND_DRBG_FLAG_CTR_NO_DF
;
137 if ((td
->flags
& USE_HMAC
) != 0)
138 flags
|= RAND_DRBG_FLAG_HMAC
;
140 if (!TEST_ptr(drbg
= RAND_DRBG_new(td
->nid
, flags
, NULL
)))
143 if (!TEST_true(RAND_DRBG_set_callbacks(drbg
, kat_entropy
, NULL
,
148 memset(&t
, 0, sizeof(t
));
149 t
.entropy
= data
->entropyin
;
150 t
.entropylen
= td
->entropyinlen
;
151 t
.nonce
= data
->nonce
;
152 t
.noncelen
= td
->noncelen
;
153 RAND_DRBG_set_ex_data(drbg
, app_data_index
, &t
);
155 buff
= OPENSSL_malloc(td
->retbyteslen
);
159 if (!TEST_true(RAND_DRBG_instantiate(drbg
, data
->persstr
, td
->persstrlen
)))
162 t
.entropy
= data
->entropyinreseed
;
163 t
.entropylen
= td
->entropyinlen
;
165 if (!TEST_true(RAND_DRBG_reseed(drbg
, data
->addinreseed
, td
->addinlen
, 0))
166 || !TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 0,
167 data
->addin1
, td
->addinlen
))
168 || !TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 0,
169 data
->addin2
, td
->addinlen
))
170 || !TEST_true(RAND_DRBG_uninstantiate(drbg
))
171 || !TEST_mem_eq(data
->retbytes
, td
->retbyteslen
, buff
,
177 RAND_DRBG_uninstantiate(drbg
);
178 RAND_DRBG_free(drbg
);
179 return failures
== 0;
183 * Do a single PR_TRUE KAT:
186 * Generate Random Bits (pr=true)
187 * Generate Random Bits (pr=true)
190 * Return 0 on failure.
192 static int single_kat_pr_true(const struct drbg_kat
*td
)
194 struct drbg_kat_pr_true
*data
= (struct drbg_kat_pr_true
*)td
->t
;
195 RAND_DRBG
*drbg
= NULL
;
196 unsigned char *buff
= NULL
;
197 unsigned int flags
= 0;
201 if ((td
->flags
& USE_DF
) == 0)
202 flags
|= RAND_DRBG_FLAG_CTR_NO_DF
;
203 if ((td
->flags
& USE_HMAC
) != 0)
204 flags
|= RAND_DRBG_FLAG_HMAC
;
206 if (!TEST_ptr(drbg
= RAND_DRBG_new(td
->nid
, flags
, NULL
)))
209 if (!TEST_true(RAND_DRBG_set_callbacks(drbg
, kat_entropy
, NULL
,
214 memset(&t
, 0, sizeof(t
));
215 t
.nonce
= data
->nonce
;
216 t
.noncelen
= td
->noncelen
;
217 t
.entropy
= data
->entropyin
;
218 t
.entropylen
= td
->entropyinlen
;
219 RAND_DRBG_set_ex_data(drbg
, app_data_index
, &t
);
221 buff
= OPENSSL_malloc(td
->retbyteslen
);
225 if (!TEST_true(RAND_DRBG_instantiate(drbg
, data
->persstr
, td
->persstrlen
)))
228 t
.entropy
= data
->entropyinpr1
;
229 t
.entropylen
= td
->entropyinlen
;
231 if (!TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 1,
232 data
->addin1
, td
->addinlen
)))
235 t
.entropy
= data
->entropyinpr2
;
236 t
.entropylen
= td
->entropyinlen
;
238 if (!TEST_true(RAND_DRBG_generate(drbg
, buff
, td
->retbyteslen
, 1,
239 data
->addin2
, td
->addinlen
))
240 || !TEST_true(RAND_DRBG_uninstantiate(drbg
))
241 || !TEST_mem_eq(data
->retbytes
, td
->retbyteslen
, buff
,
247 RAND_DRBG_uninstantiate(drbg
);
248 RAND_DRBG_free(drbg
);
249 return failures
== 0;
252 static int test_cavs_kats(const struct drbg_kat
*test
[], int i
)
254 const struct drbg_kat
*td
= test
[i
];
258 /* FIPS mode doesn't support instantiating without a derivation function */
259 if ((td
->flags
& USE_DF
) == 0)
260 return TEST_skip("instantiating without derivation function "
261 "is not supported in FIPS mode");
265 if (!single_kat_no_reseed(td
))
269 if (!single_kat_pr_false(td
))
273 if (!single_kat_pr_true(td
))
276 default: /* cant happen */
284 static int test_cavs_ctr(int i
)
286 return test_cavs_kats(drbg_ctr_test
, i
);
289 static int test_cavs_hmac(int i
)
291 return test_cavs_kats(drbg_hmac_test
, i
);
294 static int test_cavs_hash(int i
)
296 return test_cavs_kats(drbg_hash_test
, i
);
299 int setup_tests(void)
301 app_data_index
= RAND_DRBG_get_ex_new_index(0L, NULL
, NULL
, NULL
, NULL
);
303 ADD_ALL_TESTS(test_cavs_ctr
, drbg_ctr_nelem
);
304 ADD_ALL_TESTS(test_cavs_hmac
, drbg_hmac_nelem
);
305 ADD_ALL_TESTS(test_cavs_hash
, drbg_hash_nelem
);