util/find-docs-nits: Recognise SPARSE_ARRAY_OF
[oweals/openssl.git] / test / drbg_cavs_test.c
1 /*
2  * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9
10 #include <string.h>
11 #include "internal/nelem.h"
12 #include <openssl/crypto.h>
13 #include <openssl/err.h>
14 #include <openssl/rand.h>
15 #include <openssl/obj_mac.h>
16 #include <openssl/evp.h>
17 #include <openssl/aes.h>
18 #include "../crypto/rand/rand_lcl.h"
19
20 #include "testutil.h"
21 #include "drbg_cavs_data.h"
22
23 static int app_data_index;
24
25 typedef struct test_ctx_st {
26     const unsigned char *entropy;
27     size_t entropylen;
28     int entropycnt;
29     const unsigned char *nonce;
30     size_t noncelen;
31     int noncecnt;
32 } TEST_CTX;
33
34 static size_t kat_entropy(RAND_DRBG *drbg, unsigned char **pout,
35                           int entropy, size_t min_len, size_t max_len,
36                           int prediction_resistance)
37 {
38     TEST_CTX *t = (TEST_CTX *)RAND_DRBG_get_ex_data(drbg, app_data_index);
39
40     t->entropycnt++;
41     *pout = (unsigned char *)t->entropy;
42     return t->entropylen;
43 }
44
45 static size_t kat_nonce(RAND_DRBG *drbg, unsigned char **pout,
46                         int entropy, size_t min_len, size_t max_len)
47 {
48     TEST_CTX *t = (TEST_CTX *)RAND_DRBG_get_ex_data(drbg, app_data_index);
49
50     t->noncecnt++;
51     *pout = (unsigned char *)t->nonce;
52     return t->noncelen;
53 }
54
55 /*
56  * Do a single NO_RESEED KAT:
57  *
58  * Instantiate
59  * Generate Random Bits (pr=false)
60  * Generate Random Bits (pr=false)
61  * Uninstantiate
62  *
63  * Return 0 on failure.
64  */
65 static int single_kat_no_reseed(const struct drbg_kat *td)
66 {
67     struct drbg_kat_no_reseed *data = (struct drbg_kat_no_reseed *)td->t;
68     RAND_DRBG *drbg = NULL;
69     unsigned char *buff = NULL;
70     unsigned int flags = 0;
71     int failures = 0;
72     TEST_CTX t;
73
74     if ((td->flags & USE_DF) == 0)
75         flags |= RAND_DRBG_FLAG_CTR_NO_DF;
76     if ((td->flags & USE_HMAC) != 0)
77         flags |= RAND_DRBG_FLAG_HMAC;
78
79     if (!TEST_ptr(drbg = RAND_DRBG_new(td->nid, flags, NULL)))
80         return 0;
81
82     if (!TEST_true(RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
83                                            kat_nonce, NULL))) {
84         failures++;
85         goto err;
86     }
87     memset(&t, 0, sizeof(t));
88     t.entropy = data->entropyin;
89     t.entropylen = td->entropyinlen;
90     t.nonce = data->nonce;
91     t.noncelen = td->noncelen;
92     RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
93
94     buff = OPENSSL_malloc(td->retbyteslen);
95     if (buff == NULL)
96         goto err;
97
98     if (!TEST_true(RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen))
99         || !TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
100                                          data->addin1, td->addinlen))
101         || !TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
102                                          data->addin2, td->addinlen))
103         || !TEST_true(RAND_DRBG_uninstantiate(drbg))
104         || !TEST_mem_eq(data->retbytes, td->retbyteslen, buff,
105                         td->retbyteslen))
106         failures++;
107
108 err:
109     OPENSSL_free(buff);
110     RAND_DRBG_uninstantiate(drbg);
111     RAND_DRBG_free(drbg);
112     return failures == 0;
113 }
114
115 /*-
116  * Do a single PR_FALSE KAT:
117  *
118  * Instantiate
119  * Reseed
120  * Generate Random Bits (pr=false)
121  * Generate Random Bits (pr=false)
122  * Uninstantiate
123  *
124  * Return 0 on failure.
125  */
126 static int single_kat_pr_false(const struct drbg_kat *td)
127 {
128     struct drbg_kat_pr_false *data = (struct drbg_kat_pr_false *)td->t;
129     RAND_DRBG *drbg = NULL;
130     unsigned char *buff = NULL;
131     unsigned int flags = 0;
132     int failures = 0;
133     TEST_CTX t;
134
135     if ((td->flags & USE_DF) == 0)
136         flags |= RAND_DRBG_FLAG_CTR_NO_DF;
137     if ((td->flags & USE_HMAC) != 0)
138         flags |= RAND_DRBG_FLAG_HMAC;
139
140     if (!TEST_ptr(drbg = RAND_DRBG_new(td->nid, flags, NULL)))
141         return 0;
142
143     if (!TEST_true(RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
144                                            kat_nonce, NULL))) {
145         failures++;
146         goto err;
147     }
148     memset(&t, 0, sizeof(t));
149     t.entropy = data->entropyin;
150     t.entropylen = td->entropyinlen;
151     t.nonce = data->nonce;
152     t.noncelen = td->noncelen;
153     RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
154
155     buff = OPENSSL_malloc(td->retbyteslen);
156     if (buff == NULL)
157         goto err;
158
159     if (!TEST_true(RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen)))
160         failures++;
161
162     t.entropy = data->entropyinreseed;
163     t.entropylen = td->entropyinlen;
164
165     if (!TEST_true(RAND_DRBG_reseed(drbg, data->addinreseed, td->addinlen, 0))
166         || !TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
167                                          data->addin1, td->addinlen))
168         || !TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
169                                          data->addin2, td->addinlen))
170         || !TEST_true(RAND_DRBG_uninstantiate(drbg))
171         || !TEST_mem_eq(data->retbytes, td->retbyteslen, buff,
172                         td->retbyteslen))
173         failures++;
174
175 err:
176     OPENSSL_free(buff);
177     RAND_DRBG_uninstantiate(drbg);
178     RAND_DRBG_free(drbg);
179     return failures == 0;
180 }
181
182 /*-
183  * Do a single PR_TRUE KAT:
184  *
185  * Instantiate
186  * Generate Random Bits (pr=true)
187  * Generate Random Bits (pr=true)
188  * Uninstantiate
189  *
190  * Return 0 on failure.
191  */
192 static int single_kat_pr_true(const struct drbg_kat *td)
193 {
194     struct drbg_kat_pr_true *data = (struct drbg_kat_pr_true *)td->t;
195     RAND_DRBG *drbg = NULL;
196     unsigned char *buff = NULL;
197     unsigned int flags = 0;
198     int failures = 0;
199     TEST_CTX t;
200
201     if ((td->flags & USE_DF) == 0)
202         flags |= RAND_DRBG_FLAG_CTR_NO_DF;
203     if ((td->flags & USE_HMAC) != 0)
204         flags |= RAND_DRBG_FLAG_HMAC;
205
206     if (!TEST_ptr(drbg = RAND_DRBG_new(td->nid, flags, NULL)))
207         return 0;
208
209     if (!TEST_true(RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
210                                            kat_nonce, NULL))) {
211         failures++;
212         goto err;
213     }
214     memset(&t, 0, sizeof(t));
215     t.nonce = data->nonce;
216     t.noncelen = td->noncelen;
217     t.entropy = data->entropyin;
218     t.entropylen = td->entropyinlen;
219     RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
220
221     buff = OPENSSL_malloc(td->retbyteslen);
222     if (buff == NULL)
223         goto err;
224
225     if (!TEST_true(RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen)))
226         failures++;
227
228     t.entropy = data->entropyinpr1;
229     t.entropylen = td->entropyinlen;
230
231     if (!TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 1,
232                                       data->addin1, td->addinlen)))
233         failures++;
234
235     t.entropy = data->entropyinpr2;
236     t.entropylen = td->entropyinlen;
237
238     if (!TEST_true(RAND_DRBG_generate(drbg, buff, td->retbyteslen, 1,
239                                       data->addin2, td->addinlen))
240         || !TEST_true(RAND_DRBG_uninstantiate(drbg))
241         || !TEST_mem_eq(data->retbytes, td->retbyteslen, buff,
242                         td->retbyteslen))
243         failures++;
244
245 err:
246     OPENSSL_free(buff);
247     RAND_DRBG_uninstantiate(drbg);
248     RAND_DRBG_free(drbg);
249     return failures == 0;
250 }
251
252 static int test_cavs_kats(const struct drbg_kat *test[], int i)
253 {
254     const struct drbg_kat *td = test[i];
255     int rv = 0;
256
257     switch (td->type) {
258     case NO_RESEED:
259         if (!single_kat_no_reseed(td))
260             goto err;
261         break;
262     case PR_FALSE:
263         if (!single_kat_pr_false(td))
264             goto err;
265         break;
266     case PR_TRUE:
267         if (!single_kat_pr_true(td))
268             goto err;
269         break;
270     default:    /* cant happen */
271         goto err;
272     }
273     rv = 1;
274 err:
275     return rv;
276 }
277
278 static int test_cavs_ctr(int i)
279 {
280     return test_cavs_kats(drbg_ctr_test, i);
281 }
282
283 static int test_cavs_hmac(int i)
284 {
285     return test_cavs_kats(drbg_hmac_test, i);
286 }
287
288 static int test_cavs_hash(int i)
289 {
290     return test_cavs_kats(drbg_hash_test, i);
291 }
292
293 int setup_tests(void)
294 {
295     app_data_index = RAND_DRBG_get_ex_new_index(0L, NULL, NULL, NULL, NULL);
296
297     ADD_ALL_TESTS(test_cavs_ctr,  drbg_ctr_nelem);
298     ADD_ALL_TESTS(test_cavs_hmac, drbg_hmac_nelem);
299     ADD_ALL_TESTS(test_cavs_hash, drbg_hash_nelem);
300
301     return 1;
302 }