diff options
Diffstat (limited to 'test/rand_test.c')
-rw-r--r-- | test/rand_test.c | 218 |
1 files changed, 216 insertions, 2 deletions
diff --git a/test/rand_test.c b/test/rand_test.c index c6cf32610eb3..0dd0e506ed5a 100644 --- a/test/rand_test.c +++ b/test/rand_test.c @@ -1,5 +1,5 @@ /* - * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. + * Copyright 2021-2025 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the >License>). You may not use * this file except in compliance with the License. You can obtain a copy @@ -11,11 +11,15 @@ #include <openssl/rand.h> #include <openssl/bio.h> #include <openssl/core_names.h> +#include <openssl/params.h> +#include "crypto/rand.h" #include "testutil.h" static int test_rand(void) { EVP_RAND_CTX *privctx; + const OSSL_PROVIDER *prov; + int indicator = 1; OSSL_PARAM params[2], *p = params; unsigned char entropy1[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05 }; unsigned char entropy2[] = { 0xff, 0xfe, 0xfd }; @@ -41,13 +45,223 @@ static int test_rand(void) || !TEST_int_gt(RAND_priv_bytes(outbuf, sizeof(outbuf)), 0) || !TEST_mem_eq(outbuf, sizeof(outbuf), entropy2, sizeof(outbuf))) return 0; + + if (fips_provider_version_lt(NULL, 3, 4, 0)) { + /* Skip the rest and pass the test */ + return 1; + } + /* Verify that the FIPS indicator can be read and is false */ + prov = EVP_RAND_get0_provider(EVP_RAND_CTX_get0_rand(privctx)); + if (prov != NULL + && strcmp(OSSL_PROVIDER_get0_name(prov), "fips") == 0) { + params[0] = OSSL_PARAM_construct_int(OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR, + &indicator); + if (!TEST_true(EVP_RAND_CTX_get_params(privctx, params)) + || !TEST_int_eq(indicator, 0)) + return 0; + } return 1; } +static int test_rand_uniform(void) +{ + uint32_t x, i, j; + int err = 0, res = 0; + OSSL_LIB_CTX *ctx; + + if (!test_get_libctx(&ctx, NULL, NULL, NULL, NULL)) + goto err; + + for (i = 1; i < 100; i += 13) { + x = ossl_rand_uniform_uint32(ctx, i, &err); + if (!TEST_int_eq(err, 0) + || !TEST_uint_ge(x, 0) + || !TEST_uint_lt(x, i)) + return 0; + } + for (i = 1; i < 100; i += 17) + for (j = i + 1; j < 150; j += 11) { + x = ossl_rand_range_uint32(ctx, i, j, &err); + if (!TEST_int_eq(err, 0) + || !TEST_uint_ge(x, i) + || !TEST_uint_lt(x, j)) + return 0; + } + + res = 1; + err: + OSSL_LIB_CTX_free(ctx); + return res; +} + +/* Test the FIPS health tests */ +static int fips_health_test_one(const uint8_t *buf, size_t n, size_t gen) +{ + int res = 0; + EVP_RAND *crngt_alg = NULL, *parent_alg = NULL; + EVP_RAND_CTX *crngt = NULL, *parent = NULL; + OSSL_PARAM p[2]; + uint8_t out[1000]; + int indicator = -1; + + p[0] = OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, + (void *)buf, n); + p[1] = OSSL_PARAM_construct_end(); + + if (!TEST_ptr(parent_alg = EVP_RAND_fetch(NULL, "TEST-RAND", "-fips")) + || !TEST_ptr(crngt_alg = EVP_RAND_fetch(NULL, "CRNG-TEST", "-fips")) + || !TEST_ptr(parent = EVP_RAND_CTX_new(parent_alg, NULL)) + || !TEST_ptr(crngt = EVP_RAND_CTX_new(crngt_alg, parent)) + || !TEST_true(EVP_RAND_instantiate(parent, 0, 0, + (unsigned char *)"abc", 3, p)) + || !TEST_true(EVP_RAND_instantiate(crngt, 0, 0, + (unsigned char *)"def", 3, NULL)) + || !TEST_size_t_le(gen, sizeof(out))) + goto err; + + /* Verify that the FIPS indicator is negative */ + p[0] = OSSL_PARAM_construct_int(OSSL_RAND_PARAM_FIPS_APPROVED_INDICATOR, + &indicator); + if (!TEST_true(EVP_RAND_CTX_get_params(crngt, p)) + || !TEST_int_le(indicator, 0)) + goto err; + + ERR_set_mark(); + res = EVP_RAND_generate(crngt, out, gen, 0, 0, NULL, 0); + ERR_pop_to_mark(); + err: + EVP_RAND_CTX_free(crngt); + EVP_RAND_CTX_free(parent); + EVP_RAND_free(crngt_alg); + EVP_RAND_free(parent_alg); + return res; +} + +static int fips_health_tests(void) +{ + uint8_t buf[1000]; + size_t i; + + /* Verify tests can pass */ + for (i = 0; i < sizeof(buf); i++) + buf[i] = 0xff & i; + if (!TEST_true(fips_health_test_one(buf, i, i))) + return 0; + + /* Verify RCT can fail */ + for (i = 0; i < 20; i++) + buf[i] = 0xff & (i > 10 ? 200 : i); + if (!TEST_false(fips_health_test_one(buf, i, i))) + return 0; + + /* Verify APT can fail */ + for (i = 0; i < sizeof(buf); i++) + buf[i] = 0xff & (i >= 512 && i % 8 == 0 ? 0x80 : i); + if (!TEST_false(fips_health_test_one(buf, i, i))) + return 0; + return 1; +} + +typedef struct r_test_ctx { + const OSSL_CORE_HANDLE *handle; +} R_TEST_CTX; + +static void r_teardown(void *provctx) +{ + R_TEST_CTX *ctx = (R_TEST_CTX *)provctx; + + free(ctx); +} + +static int r_random_bytes(ossl_unused void *vprov, ossl_unused int which, + void *buf, size_t n, ossl_unused unsigned int strength) +{ + while (n-- > 0) + ((unsigned char *)buf)[n] = 0xff & n; + return 1; +} + +static const OSSL_DISPATCH r_test_table[] = { + { OSSL_FUNC_PROVIDER_RANDOM_BYTES, (void (*)(void))r_random_bytes }, + { OSSL_FUNC_PROVIDER_TEARDOWN, (void (*)(void))r_teardown }, + OSSL_DISPATCH_END +}; + +static int r_init(const OSSL_CORE_HANDLE *handle, + ossl_unused const OSSL_DISPATCH *oin, + const OSSL_DISPATCH **out, + void **provctx) +{ + R_TEST_CTX *ctx; + + ctx = malloc(sizeof(*ctx)); + if (ctx == NULL) + return 0; + ctx->handle = handle; + + *provctx = (void *)ctx; + *out = r_test_table; + return 1; +} + +static int test_rand_random_provider(void) +{ + OSSL_LIB_CTX *ctx = NULL; + OSSL_PROVIDER *prov = NULL; + int res = 0; + static const unsigned char data[] = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 }; + unsigned char buf[sizeof(data)], privbuf[sizeof(data)]; + + memset(buf, 255, sizeof(buf)); + memset(privbuf, 255, sizeof(privbuf)); + + if (!test_get_libctx(&ctx, NULL, NULL, NULL, NULL) + || !TEST_true(OSSL_PROVIDER_add_builtin(ctx, "r_prov", &r_init)) + || !TEST_ptr(prov = OSSL_PROVIDER_try_load(ctx, "r_prov", 1)) + || !TEST_true(RAND_set1_random_provider(ctx, prov)) + || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256) + || !TEST_mem_eq(buf, sizeof(buf), data, sizeof(data)) + || !RAND_priv_bytes_ex(ctx, privbuf, sizeof(privbuf), 256) + || !TEST_mem_eq(privbuf, sizeof(privbuf), data, sizeof(data))) + goto err; + + /* Test we can revert to not using the provider based randomness */ + if (!TEST_true(RAND_set1_random_provider(ctx, NULL)) + || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256) + || !TEST_mem_ne(buf, sizeof(buf), data, sizeof(data))) + goto err; + + /* And back to the provided randomness */ + if (!TEST_true(RAND_set1_random_provider(ctx, prov)) + || !RAND_bytes_ex(ctx, buf, sizeof(buf), 256) + || !TEST_mem_eq(buf, sizeof(buf), data, sizeof(data))) + goto err; + + res = 1; + err: + OSSL_PROVIDER_unload(prov); + OSSL_LIB_CTX_free(ctx); + return res; +} + int setup_tests(void) { - if (!TEST_true(RAND_set_DRBG_type(NULL, "TEST-RAND", NULL, NULL, NULL))) + char *configfile; + + if (!TEST_ptr(configfile = test_get_argument(0)) + || !TEST_true(RAND_set_DRBG_type(NULL, "TEST-RAND", "fips=no", + NULL, NULL)) + || (fips_provider_version_ge(NULL, 3, 0, 8) + && !TEST_true(OSSL_LIB_CTX_load_config(NULL, configfile)))) return 0; + ADD_TEST(test_rand); + ADD_TEST(test_rand_uniform); + + if (OSSL_PROVIDER_available(NULL, "fips") + && fips_provider_version_ge(NULL, 3, 4, 0)) + ADD_TEST(fips_health_tests); + + ADD_TEST(test_rand_random_provider); return 1; } |