aboutsummaryrefslogtreecommitdiff
path: root/test/rand_test.c
diff options
context:
space:
mode:
Diffstat (limited to 'test/rand_test.c')
-rw-r--r--test/rand_test.c218
1 files changed, 216 insertions, 2 deletions
diff --git a/test/rand_test.c b/test/rand_test.c
index c6cf32610eb3..0dd0e506ed5a 100644
--- a/test/rand_test.c
+++ b/test/rand_test.c
@@ -1,5 +1,5 @@
/*
- * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the >License>). You may not use
* this file except in compliance with the License. You can obtain a copy
@@ -11,11 +11,15 @@
#include <openssl/rand.h>
#include <openssl/bio.h>
#include <openssl/core_names.h>
+#include <openssl/params.h>
+#include "crypto/rand.h"
#include "testutil.h"
static int test_rand(void)
{
EVP_RAND_CTX *privctx;
+ const OSSL_PROVIDER *prov;
+ int indicator = 1;
OSSL_PARAM params[2], *p = params;
unsigned char entropy1[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05 };
unsigned char entropy2[] = { 0xff, 0xfe, 0xfd };
@@ -41,13 +45,223 @@ static int test_rand(void)
|| !TEST_int_gt(RAND_priv_bytes(outbuf, sizeof(outbuf)), 0)
|| !TEST_mem_eq(outbuf, sizeof(outbuf), entropy2, sizeof(outbuf)))
return 0;
+
+ if (fips_provider_version_lt(NULL, 3, 4, 0)) {
+ /* Skip the rest and pass the test */
+ return 1;
+ }
+ /* Verify that the FIPS indicator can be read and is false */
+ prov = EVP_RAND_get0_provider(EVP_RAND_CTX_get0_rand(privctx));
+ if (prov != NULL
+ && strcmp(OSSL_PROVIDER_get0_name(prov), "fips") == 0) {
+ params[0] = OSSL_PARAM_construct_int(OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR,
+ &indicator);
+ if (!TEST_true(EVP_RAND_CTX_get_params(privctx, params))
+ || !TEST_int_eq(indicator, 0))
+ return 0;
+ }
return 1;
}
+static int test_rand_uniform(void)
+{
+ uint32_t x, i, j;
+ int err = 0, res = 0;
+ OSSL_LIB_CTX *ctx;
+
+ if (!test_get_libctx(&ctx, NULL, NULL, NULL, NULL))
+ goto err;
+
+ for (i = 1; i < 100; i += 13) {
+ x = ossl_rand_uniform_uint32(ctx, i, &err);
+ if (!TEST_int_eq(err, 0)
+ || !TEST_uint_ge(x, 0)
+ || !TEST_uint_lt(x, i))
+ return 0;
+ }
+ for (i = 1; i < 100; i += 17)
+ for (j = i + 1; j < 150; j += 11) {
+ x = ossl_rand_range_uint32(ctx, i, j, &err);
+ if (!TEST_int_eq(err, 0)
+ || !TEST_uint_ge(x, i)
+ || !TEST_uint_lt(x, j))
+ return 0;
+ }
+
+ res = 1;
+ err:
+ OSSL_LIB_CTX_free(ctx);
+ return res;
+}
+
+/* Test the FIPS health tests */
+static int fips_health_test_one(const uint8_t *buf, size_t n, size_t gen)
+{
+ int res = 0;
+ EVP_RAND *crngt_alg = NULL, *parent_alg = NULL;
+ EVP_RAND_CTX *crngt = NULL, *parent = NULL;
+ OSSL_PARAM p[2];
+ uint8_t out[1000];
+ int indicator = -1;
+
+ p[0] = OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY,
+ (void *)buf, n);
+ p[1] = OSSL_PARAM_construct_end();
+
+ if (!TEST_ptr(parent_alg = EVP_RAND_fetch(NULL, "TEST-RAND", "-fips"))
+ || !TEST_ptr(crngt_alg = EVP_RAND_fetch(NULL, "CRNG-TEST", "-fips"))
+ || !TEST_ptr(parent = EVP_RAND_CTX_new(parent_alg, NULL))
+ || !TEST_ptr(crngt = EVP_RAND_CTX_new(crngt_alg, parent))
+ || !TEST_true(EVP_RAND_instantiate(parent, 0, 0,
+ (unsigned char *)"abc", 3, p))
+ || !TEST_true(EVP_RAND_instantiate(crngt, 0, 0,
+ (unsigned char *)"def", 3, NULL))
+ || !TEST_size_t_le(gen, sizeof(out)))
+ goto err;
+
+ /* Verify that the FIPS indicator is negative */
+ p[0] = OSSL_PARAM_construct_int(OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR,
+ &indicator);
+ if (!TEST_true(EVP_RAND_CTX_get_params(crngt, p))
+ || !TEST_int_le(indicator, 0))
+ goto err;
+
+ ERR_set_mark();
+ res = EVP_RAND_generate(crngt, out, gen, 0, 0, NULL, 0);
+ ERR_pop_to_mark();
+ err:
+ EVP_RAND_CTX_free(crngt);
+ EVP_RAND_CTX_free(parent);
+ EVP_RAND_free(crngt_alg);
+ EVP_RAND_free(parent_alg);
+ return res;
+}
+
+static int fips_health_tests(void)
+{
+ uint8_t buf[1000];
+ size_t i;
+
+ /* Verify tests can pass */
+ for (i = 0; i < sizeof(buf); i++)
+ buf[i] = 0xff & i;
+ if (!TEST_true(fips_health_test_one(buf, i, i)))
+ return 0;
+
+ /* Verify RCT can fail */
+ for (i = 0; i < 20; i++)
+ buf[i] = 0xff & (i > 10 ? 200 : i);
+ if (!TEST_false(fips_health_test_one(buf, i, i)))
+ return 0;
+
+ /* Verify APT can fail */
+ for (i = 0; i < sizeof(buf); i++)
+ buf[i] = 0xff & (i >= 512 && i % 8 == 0 ? 0x80 : i);
+ if (!TEST_false(fips_health_test_one(buf, i, i)))
+ return 0;
+ return 1;
+}
+
+typedef struct r_test_ctx {
+ const OSSL_CORE_HANDLE *handle;
+} R_TEST_CTX;
+
+static void r_teardown(void *provctx)
+{
+ R_TEST_CTX *ctx = (R_TEST_CTX *)provctx;
+
+ free(ctx);
+}
+
+static int r_random_bytes(ossl_unused void *vprov, ossl_unused int which,
+ void *buf, size_t n, ossl_unused unsigned int strength)
+{
+ while (n-- > 0)
+ ((unsigned char *)buf)[n] = 0xff & n;
+ return 1;
+}
+
+static const OSSL_DISPATCH r_test_table[] = {
+ { OSSL_FUNC_PROVIDER_RANDOM_BYTES, (void (*)(void))r_random_bytes },
+ { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))r_teardown },
+ OSSL_DISPATCH_END
+};
+
+static int r_init(const OSSL_CORE_HANDLE *handle,
+ ossl_unused const OSSL_DISPATCH *oin,
+ const OSSL_DISPATCH **out,
+ void **provctx)
+{
+ R_TEST_CTX *ctx;
+
+ ctx = malloc(sizeof(*ctx));
+ if (ctx == NULL)
+ return 0;
+ ctx->handle = handle;
+
+ *provctx = (void *)ctx;
+ *out = r_test_table;
+ return 1;
+}
+
+static int test_rand_random_provider(void)
+{
+ OSSL_LIB_CTX *ctx = NULL;
+ OSSL_PROVIDER *prov = NULL;
+ int res = 0;
+ static const unsigned char data[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 };
+ unsigned char buf[sizeof(data)], privbuf[sizeof(data)];
+
+ memset(buf, 255, sizeof(buf));
+ memset(privbuf, 255, sizeof(privbuf));
+
+ if (!test_get_libctx(&ctx, NULL, NULL, NULL, NULL)
+ || !TEST_true(OSSL_PROVIDER_add_builtin(ctx, "r_prov", &r_init))
+ || !TEST_ptr(prov = OSSL_PROVIDER_try_load(ctx, "r_prov", 1))
+ || !TEST_true(RAND_set1_random_provider(ctx, prov))
+ || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256)
+ || !TEST_mem_eq(buf, sizeof(buf), data, sizeof(data))
+ || !RAND_priv_bytes_ex(ctx, privbuf, sizeof(privbuf), 256)
+ || !TEST_mem_eq(privbuf, sizeof(privbuf), data, sizeof(data)))
+ goto err;
+
+ /* Test we can revert to not using the provider based randomness */
+ if (!TEST_true(RAND_set1_random_provider(ctx, NULL))
+ || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256)
+ || !TEST_mem_ne(buf, sizeof(buf), data, sizeof(data)))
+ goto err;
+
+ /* And back to the provided randomness */
+ if (!TEST_true(RAND_set1_random_provider(ctx, prov))
+ || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256)
+ || !TEST_mem_eq(buf, sizeof(buf), data, sizeof(data)))
+ goto err;
+
+ res = 1;
+ err:
+ OSSL_PROVIDER_unload(prov);
+ OSSL_LIB_CTX_free(ctx);
+ return res;
+}
+
int setup_tests(void)
{
- if (!TEST_true(RAND_set_DRBG_type(NULL, "TEST-RAND", NULL, NULL, NULL)))
+ char *configfile;
+
+ if (!TEST_ptr(configfile = test_get_argument(0))
+ || !TEST_true(RAND_set_DRBG_type(NULL, "TEST-RAND", "fips=no",
+ NULL, NULL))
+ || (fips_provider_version_ge(NULL, 3, 0, 8)
+ && !TEST_true(OSSL_LIB_CTX_load_config(NULL, configfile))))
return 0;
+
ADD_TEST(test_rand);
+ ADD_TEST(test_rand_uniform);
+
+ if (OSSL_PROVIDER_available(NULL, "fips")
+ && fips_provider_version_ge(NULL, 3, 4, 0))
+ ADD_TEST(fips_health_tests);
+
+ ADD_TEST(test_rand_random_provider);
return 1;
}