Extensive reorganisation of PRNG handling in FIPS module: all calls
authorDr. Stephen Henson <steve@openssl.org>
Tue, 5 Apr 2011 15:24:10 +0000 (15:24 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Tue, 5 Apr 2011 15:24:10 +0000 (15:24 +0000)
now use an internal RAND_METHOD. All dependencies to OpenSSL standard
PRNG are now removed: it is the applications resposibility to setup
the FIPS PRNG and initalise it.

Initial OpenSSL RAND_init_fips() function that will setup the DRBG
for the "FIPS capable OpenSSL".

17 files changed:
CHANGES
crypto/evp/e_des3.c
crypto/fips_err.h
crypto/o_init.c
crypto/rand/rand.h
crypto/rand/rand_err.c
crypto/rand/rand_lib.c
fips/fips.c
fips/fips.h
fips/fips_test_suite.c
fips/fips_utl.h
fips/rand/Makefile
fips/rand/fips_drbg_rand.c
fips/rand/fips_rand.c
fips/rand/fips_rand.h
fips/rand/fips_rand_lib.c [new file with mode: 0644]
fips/rand/fips_rand_selftest.c

diff --git a/CHANGES b/CHANGES
index 7709cc2ef41835c217cd80f90b8c934a1b529af5..4307a998dfed683908d244aff5f1d2f498c3eeb6 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -4,6 +4,14 @@
 
  Changes between 1.0.1 and 1.1.0  [xx XXX xxxx]
 
+  *) Extensive reorganisation of FIPS PRNG behaviour. Remove all dependencies
+     to OpenSSL RAND code and replace with a tiny FIPS RAND API which also
+     performs algorithm blocking for unapproved PRNG types. Also do not
+     set PRNG type in FIPS_mode_set(): leave this to the application.
+     Add default OpenSSL DRBG handling: sets up FIPS PRNG and seeds with
+     the standard OpenSSL PRNG.
+     [Steve Henson]
+
   *) Rename old X9.31 PRNG functions of the form FIPS_rand* to FIPS_x931*.
      This shouldn't present any incompatibility problems because applications
      shouldn't be using these directly and any that are will need to rethink
index 785d76b5bdefe82f35fdc5671a03c3c6a03ca357..2f016f043181781144449322212056350ae32765 100644 (file)
@@ -56,6 +56,8 @@
  * [including the GNU Public Licence.]
  */
 
+#define OPENSSL_FIPSAPI
+
 #include <stdio.h>
 #include "cryptlib.h"
 #ifndef OPENSSL_NO_DES
index 589263cef8a4ed627c9aadd54865facdd71caa5e..d63e869d24f42afadedd56d5329c5fd7f23e0034 100644 (file)
@@ -96,6 +96,12 @@ static ERR_STRING_DATA FIPS_str_functs[]=
 {ERR_FUNC(FIPS_F_FIPS_DSA_CHECK),      "FIPS_DSA_CHECK"},
 {ERR_FUNC(FIPS_F_FIPS_MODE_SET),       "FIPS_mode_set"},
 {ERR_FUNC(FIPS_F_FIPS_PKEY_SIGNATURE_TEST),    "fips_pkey_signature_test"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_ADD),       "FIPS_rand_add"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_BYTES),     "FIPS_rand_bytes"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_PSEUDO_BYTES),      "FIPS_rand_pseudo_bytes"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_SEED),      "FIPS_rand_seed"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_SET_METHOD),        "FIPS_rand_set_method"},
+{ERR_FUNC(FIPS_F_FIPS_RAND_STATUS),    "FIPS_rand_status"},
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_AES),   "FIPS_selftest_aes"},
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_AES_GCM),       "FIPS_selftest_aes_gcm"},
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_CMAC),  "FIPS_selftest_cmac"},
@@ -105,6 +111,7 @@ static ERR_STRING_DATA FIPS_str_functs[]=
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_HMAC),  "FIPS_selftest_hmac"},
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_RNG),   "FIPS_selftest_rng"},
 {ERR_FUNC(FIPS_F_FIPS_SELFTEST_SHA1),  "FIPS_selftest_sha1"},
+{ERR_FUNC(FIPS_F_FIPS_SELFTEST_X931),  "FIPS_selftest_x931"},
 {ERR_FUNC(FIPS_F_HASH_FINAL),  "HASH_FINAL"},
 {ERR_FUNC(FIPS_F_RSA_BUILTIN_KEYGEN),  "RSA_BUILTIN_KEYGEN"},
 {ERR_FUNC(FIPS_F_RSA_EAY_PRIVATE_DECRYPT),     "RSA_EAY_PRIVATE_DECRYPT"},
index bb6d9cff116e8dc3d570f1f5def7a7cc04665b37..b7f8d10fa0cbfce61a804380ce69c357e2e0f833 100644 (file)
@@ -56,6 +56,7 @@
 #include <openssl/err.h>
 #ifdef OPENSSL_FIPS
 #include <openssl/fips.h>
+#include <openssl/rand.h>
 #endif
 
 #if defined(__GNUC__) && __GNUC__>=2
@@ -123,6 +124,7 @@ void OPENSSL_init(void)
        FIPS_set_locking_callbacks(CRYPTO_lock, CRYPTO_add_lock);
        FIPS_set_error_callbacks(ERR_put_error, ERR_add_error_vdata);
        FIPS_set_malloc_callbacks(CRYPTO_malloc, CRYPTO_free);
+       RAND_init_fips();
 #endif
 #if 0
        fprintf(stderr, "Called OPENSSL_init\n");
index 8db2a5f80f0bba4d5a73a90416b28a5b23b019be..d446c38daf43e86908e0b1ad6f64e96755605a65 100644 (file)
@@ -94,7 +94,7 @@ extern int rand_predictable;
 
 int RAND_set_rand_method(const RAND_METHOD *meth);
 const RAND_METHOD *RAND_get_rand_method(void);
-#if !defined(OPENSSL_NO_ENGINE) && !defined(OPENSSL_FIPS)
+#ifndef OPENSSL_NO_ENGINE
 int RAND_set_rand_engine(ENGINE *engine);
 #endif
 RAND_METHOD *RAND_SSLeay(void);
@@ -119,6 +119,10 @@ int RAND_event(UINT, WPARAM, LPARAM);
 
 #endif
 
+#ifdef OPENSSL_FIPS
+int RAND_init_fips(void);
+#endif
+
 /* BEGIN ERROR CODES */
 /* The following lines are auto generated by the script mkerr.pl. Any changes
  * made after this point may be overwritten when the script is next run.
@@ -132,6 +136,7 @@ void ERR_load_RAND_strings(void);
 #define RAND_F_FIPS_RAND_SET_DT                                 103
 #define RAND_F_FIPS_SET_PRNG_SEED                       104
 #define RAND_F_FIPS_SET_TEST_MODE                       105
+#define RAND_F_FIPS_X931_SET_DT                                 106
 #define RAND_F_RAND_GET_RAND_METHOD                     101
 #define RAND_F_SSLEAY_RAND_BYTES                        100
 
index 1997752d14eb4c90244f544b59450a0ef1444e4a..a435b0bfa6f6b1f3a06211a5d377e6217d5025e0 100644 (file)
@@ -74,6 +74,7 @@ static ERR_STRING_DATA RAND_str_functs[]=
 {ERR_FUNC(RAND_F_FIPS_RAND_SET_DT),    "FIPS_RAND_SET_DT"},
 {ERR_FUNC(RAND_F_FIPS_SET_PRNG_SEED),  "FIPS_SET_PRNG_SEED"},
 {ERR_FUNC(RAND_F_FIPS_SET_TEST_MODE),  "FIPS_SET_TEST_MODE"},
+{ERR_FUNC(RAND_F_FIPS_X931_SET_DT),    "FIPS_x931_set_dt"},
 {ERR_FUNC(RAND_F_RAND_GET_RAND_METHOD),        "RAND_get_rand_method"},
 {ERR_FUNC(RAND_F_SSLEAY_RAND_BYTES),   "SSLEAY_RAND_BYTES"},
 {0,NULL}
index 3cf9ed505056cb644f41828e795be82dbc26315f..ef10dd507eb4ef15c70e12d8c16deb5ff55e5a74 100644 (file)
 #include "cryptlib.h"
 #include <openssl/rand.h>
 
-#ifdef OPENSSL_FIPSCANISTER
-#define OPENSSL_NO_ENGINE
-#include <openssl/fips.h>
-#endif
-
 #ifndef OPENSSL_NO_ENGINE
 #include <openssl/engine.h>
 #endif
@@ -180,3 +175,70 @@ int RAND_status(void)
                return meth->status();
        return 0;
        }
+
+#ifdef OPENSSL_FIPS
+
+#include <openssl/fips.h>
+#include <openssl/fips_rand.h>
+
+/* FIPS DRBG initialisation code. This sets up the DRBG for use by the
+ * rest of OpenSSL. 
+ */
+
+/* Entropy gatherer: use standard OpenSSL PRNG to seed (this will gather
+ * entropy internally through RAND_poll().
+ */
+
+static size_t drbg_get_entropy(DRBG_CTX *ctx, unsigned char **pout,
+                                int entropy, size_t min_len, size_t max_len)
+        {
+       *pout = OPENSSL_malloc(min_len);
+       if (!*pout)
+               return 0;
+       if (RAND_SSLeay()->bytes(*pout, min_len) <= 0)
+               {
+               OPENSSL_free(*pout);
+               *pout = NULL;
+               return 0;
+               }
+        return min_len;
+        }
+
+static void drbg_free_entropy(DRBG_CTX *ctx, unsigned char *out, size_t olen)
+       {
+       OPENSSL_cleanse(out, olen);
+       OPENSSL_free(out);
+       }
+
+/* RAND_add() and RAND_seed() pass through to OpenSSL PRNG so it is 
+ * correctly seeded by RAND_poll().
+ */
+
+static int drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen,
+                               double entropy)
+       {
+       return RAND_SSLeay()->add(in, inlen, entropy);
+       }
+
+static int drbg_rand_seed(DRBG_CTX *ctx, const void *in, int inlen)
+       {
+       return RAND_SSLeay()->seed(in, inlen);
+       }
+
+int RAND_init_fips(void)
+       {
+       DRBG_CTX *dctx;
+       unsigned char pers[16] = {0,0,0};
+       dctx = FIPS_get_default_drbg();
+        FIPS_drbg_init(dctx, NID_aes_256_ctr, DRBG_FLAG_CTR_USE_DF);
+        FIPS_drbg_set_callbacks(dctx,
+                               drbg_get_entropy, drbg_free_entropy,
+                               drbg_get_entropy, drbg_free_entropy);
+       FIPS_drbg_set_rand_callbacks(dctx, 0, 0,
+                                       drbg_rand_seed, drbg_rand_add);
+        FIPS_drbg_instantiate(dctx, pers, sizeof(pers));
+        FIPS_rand_set_method(FIPS_drbg_method());
+       return 1;
+       }
+
+#endif
index 42f400311956288e89165bc29ad251134f968b17..7ca24924dd6c9272434d71e591425aaa9d9dbe33 100644 (file)
@@ -73,7 +73,6 @@
 static int fips_selftest_fail;
 static int fips_mode;
 static int fips_started = 0;
-static const void *fips_rand_check;
 
 static int fips_is_owning_thread(void);
 static int fips_set_owning_thread(void);
@@ -97,18 +96,6 @@ static void fips_set_mode(int onoff)
                }
        }
 
-static void fips_set_rand_check(const void *rand_check)
-       {
-       int owning_thread = fips_is_owning_thread();
-
-       if (fips_started)
-               {
-               if (!owning_thread) fips_w_lock();
-               fips_rand_check = rand_check;
-               if (!owning_thread) fips_w_unlock();
-               }
-       }
-
 int FIPS_mode(void)
        {
        int ret = 0;
@@ -123,20 +110,6 @@ int FIPS_mode(void)
        return ret;
        }
 
-const void *FIPS_rand_check(void)
-       {
-       const void *ret = 0;
-       int owning_thread = fips_is_owning_thread();
-
-       if (fips_started)
-               {
-               if (!owning_thread) fips_r_lock();
-               ret = fips_rand_check;
-               if (!owning_thread) fips_r_unlock();
-               }
-       return ret;
-       }
-
 int FIPS_selftest_failed(void)
     {
     int ret = 0;
@@ -329,28 +302,7 @@ int FIPS_mode_set(int onoff)
            ret = 0;
            goto end;
            }
-#if 0
-       /* automagically seed PRNG if not already seeded */
-       if(!FIPS_rand_status())
-           {
-           unsigned char buf[48];
-           if(RAND_bytes(buf,sizeof buf) <= 0)
-               {
-               fips_selftest_fail = 1;
-               ret = 0;
-               goto end;
-               }
-           FIPS_rand_set_key(buf,32);
-           FIPS_rand_seed(buf+32,16);
-           }
 
-       /* now switch into FIPS mode */
-       fips_set_rand_check(FIPS_rand_method());
-       RAND_set_rand_method(FIPS_rand_method());
-#else
-       fips_set_rand_check(FIPS_drbg_method());
-       RAND_set_rand_method(FIPS_drbg_method());
-#endif
        if(FIPS_selftest())
            fips_set_mode(1);
        else
index e4c32664dfbeb458228db37ccae0b527e376fafd..53bc12fe9aed47f7991ad2b5334c634188192235 100644 (file)
@@ -177,6 +177,12 @@ void FIPS_set_malloc_callbacks(
 #define ecdsa_check fips_ecdsa_check
 #define ecdh_check fips_ecdh_check
 
+#define RAND_bytes FIPS_rand_bytes
+#define RAND_pseudo_bytes FIPS_rand_pseudo_bytes
+#define RAND_add FIPS_rand_add
+#define RAND_seed FIPS_rand_seed
+#define RAND_status FIPS_rand_status
+
 #endif
 
 /* BEGIN ERROR CODES */
@@ -214,6 +220,12 @@ void ERR_load_FIPS_strings(void);
 #define FIPS_F_FIPS_DSA_CHECK                           107
 #define FIPS_F_FIPS_MODE_SET                            108
 #define FIPS_F_FIPS_PKEY_SIGNATURE_TEST                         109
+#define FIPS_F_FIPS_RAND_ADD                            143
+#define FIPS_F_FIPS_RAND_BYTES                          144
+#define FIPS_F_FIPS_RAND_PSEUDO_BYTES                   145
+#define FIPS_F_FIPS_RAND_SEED                           148
+#define FIPS_F_FIPS_RAND_SET_METHOD                     146
+#define FIPS_F_FIPS_RAND_STATUS                                 147
 #define FIPS_F_FIPS_SELFTEST_AES                        110
 #define FIPS_F_FIPS_SELFTEST_AES_GCM                    130
 #define FIPS_F_FIPS_SELFTEST_CMAC                       139
@@ -223,6 +235,7 @@ void ERR_load_FIPS_strings(void);
 #define FIPS_F_FIPS_SELFTEST_HMAC                       113
 #define FIPS_F_FIPS_SELFTEST_RNG                        114
 #define FIPS_F_FIPS_SELFTEST_SHA1                       115
+#define FIPS_F_FIPS_SELFTEST_X931                       149
 #define FIPS_F_HASH_FINAL                               123
 #define FIPS_F_RSA_BUILTIN_KEYGEN                       116
 #define FIPS_F_RSA_EAY_PRIVATE_DECRYPT                  117
index c82dffea88537dfa3616589950ef013bd488b5b8..2cfd5ef9308c6a0461beb54f5625c50f87eed5c1 100644 (file)
@@ -678,9 +678,6 @@ int main(int argc,char **argv)
 
     printf("\tFIPS-mode test application\n\n");
 
-    /* Load entropy from external file, if any */
-    RAND_load_file(".rnd", 1024);
-
     if (argv[1]) {
         /* Corrupted KAT tests */
         if (!strcmp(argv[1], "aes")) {
index 4810566c2f712d9f897c2c2161205390c9a3e051..91cbea25c57048c19d935db03ff63b3da77952f3 100644 (file)
@@ -118,6 +118,7 @@ static void fips_algtest_init_nofips(void)
        FIPS_drbg_init(ctx, NID_aes_256_ctr, DRBG_FLAG_CTR_USE_DF);
        FIPS_drbg_set_callbacks(ctx, dummy_cb, 0, dummy_cb, 0);
        FIPS_drbg_instantiate(ctx, dummy_entropy, 10);
+       FIPS_rand_set_method(FIPS_drbg_method());
        }
 
 void fips_algtest_init(void)
index 8147951ca5d32c59c66fee802d3703ed3e4d5cfa..bcf68dcb81a15f8f965e9f3a4948ef0c989cf47c 100644 (file)
@@ -24,10 +24,10 @@ APPS=
 LIB=$(TOP)/libcrypto.a
 LIBSRC=        fips_rand.c fips_rand_selftest.c \
        fips_drbg_lib.c fips_drbg_hash.c fips_drbg_ctr.c fips_drbg_selftest.c \
-       fips_drbg_rand.c
+       fips_drbg_rand.c fips_rand_lib.c
 LIBOBJ=        fips_rand.o fips_rand_selftest.o \
        fips_drbg_lib.o fips_drbg_hash.o fips_drbg_ctr.o fips_drbg_selftest.o \
-       fips_drbg_rand.o
+       fips_drbg_rand.o fips_rand_lib.o
 
 SRC= $(LIBSRC)
 
index 1863026bd56a8aff6dcf691d5f8d21bd09173a47..8872ba2992de669ebd6357f3752f07ae995e7f2b 100644 (file)
@@ -145,28 +145,18 @@ static void fips_drbg_cleanup(void)
 static int fips_drbg_seed(const void *seed, int seedlen)
        {
        DRBG_CTX *dctx = &ossl_dctx;
-       int rv = 1;
        if (dctx->rand_seed_cb)
-               {
-               CRYPTO_w_lock(CRYPTO_LOCK_RAND);
-               rv = dctx->rand_seed_cb(dctx, seed, seedlen);
-               CRYPTO_w_unlock(CRYPTO_LOCK_RAND);
-               }
-       return rv;
+               return dctx->rand_seed_cb(dctx, seed, seedlen);
+       return 1;
        }
 
 static int fips_drbg_add(const void *seed, int seedlen,
                                        double add_entropy)
        {
        DRBG_CTX *dctx = &ossl_dctx;
-       int rv = 1;
        if (dctx->rand_add_cb)
-               {
-               CRYPTO_w_lock(CRYPTO_LOCK_RAND);
-               rv = dctx->rand_add_cb(dctx, seed, seedlen, add_entropy);
-               CRYPTO_w_unlock(CRYPTO_LOCK_RAND);
-               }
-       return rv;
+               return dctx->rand_add_cb(dctx, seed, seedlen, add_entropy);
+       return 1;
        }
 
 static const RAND_METHOD rand_drbg_meth =
index d56b940a6d9d1dfdda9d113d43ac1efa6e047de9..a8ebdb85c0c1581437fe5e0592f5f1f4cf148cd7 100644 (file)
@@ -214,7 +214,7 @@ int FIPS_x931_set_dt(unsigned char *dt)
        {
        if (!sctx.test_mode)
                {
-               RANDerr(RAND_F_FIPS_RAND_SET_DT,RAND_R_NOT_IN_TEST_MODE);
+               RANDerr(RAND_F_FIPS_X931_SET_DT,RAND_R_NOT_IN_TEST_MODE);
                return 0;
                }
        memcpy(sctx.DT, dt, AES_BLOCK_LENGTH);
index a691e14359e156887644a889102626d2e0aafbb3..1a57edd06e39d3d278374c981263c1b0eb398184 100644 (file)
@@ -112,6 +112,7 @@ int FIPS_drbg_get_strength(DRBG_CTX *dctx);
 DRBG_CTX *FIPS_get_default_drbg(void);
 const RAND_METHOD *FIPS_drbg_method(void);
 
+int FIPS_rand_set_method(const RAND_METHOD *meth);
 
 #ifdef  __cplusplus
 }
diff --git a/fips/rand/fips_rand_lib.c b/fips/rand/fips_rand_lib.c
new file mode 100644 (file)
index 0000000..2d198f9
--- /dev/null
@@ -0,0 +1,140 @@
+/* ====================================================================
+ * Copyright (c) 2011 The OpenSSL Project.  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer. 
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in
+ *    the documentation and/or other materials provided with the
+ *    distribution.
+ *
+ * 3. All advertising materials mentioning features or use of this
+ *    software must display the following acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
+ *
+ * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
+ *    endorse or promote products derived from this software without
+ *    prior written permission. For written permission, please contact
+ *    openssl-core@openssl.org.
+ *
+ * 5. Products derived from this software may not be called "OpenSSL"
+ *    nor may "OpenSSL" appear in their names without prior written
+ *    permission of the OpenSSL Project.
+ *
+ * 6. Redistributions of any form whatsoever must retain the following
+ *    acknowledgment:
+ *    "This product includes software developed by the OpenSSL Project
+ *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
+ * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
+ * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#define OPENSSL_FIPSAPI
+
+#include <openssl/crypto.h>
+#include <openssl/rand.h>
+#include <openssl/err.h>
+#include <openssl/fips.h>
+#include <openssl/fips_rand.h>
+#include "e_os.h"
+
+/* FIPS API for PRNG use. Similar to RAND functionality but without
+ * ENGINE and additional checking for non-FIPS rand methods.
+ */
+
+static const RAND_METHOD *fips_rand_meth = NULL;
+static int fips_approved_rand_meth = 0;
+
+int FIPS_rand_set_method(const RAND_METHOD *meth)
+       {
+       if (meth == FIPS_drbg_method())
+               fips_approved_rand_meth = 1;
+       else if (meth == FIPS_x931_method())
+               fips_approved_rand_meth = 2;
+       else
+               fips_approved_rand_meth = 0;
+
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_SET_METHOD, FIPS_R_NON_FIPS_METHOD);
+               return 0;
+               }
+       fips_rand_meth = meth;
+       return 1;
+       }
+
+void FIPS_rand_seed(const void *buf, int num)
+       {
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_SEED, FIPS_R_NON_FIPS_METHOD);
+               return;
+               }
+       if (fips_rand_meth && fips_rand_meth->seed)
+               fips_rand_meth->seed(buf,num);
+       }
+
+void FIPS_rand_add(const void *buf, int num, double entropy)
+       {
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_ADD, FIPS_R_NON_FIPS_METHOD);
+               return;
+               }
+       if (fips_rand_meth && fips_rand_meth->add)
+               fips_rand_meth->add(buf,num,entropy);
+       }
+
+int FIPS_rand_bytes(unsigned char *buf, int num)
+       {
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_BYTES, FIPS_R_NON_FIPS_METHOD);
+               return 0;
+               }
+       if (fips_rand_meth && fips_rand_meth->bytes)
+               return fips_rand_meth->bytes(buf,num);
+       return 0;
+       }
+
+int FIPS_rand_pseudo_bytes(unsigned char *buf, int num)
+       {
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_PSEUDO_BYTES, FIPS_R_NON_FIPS_METHOD);
+               return 0;
+               }
+       if (fips_rand_meth && fips_rand_meth->pseudorand)
+               return fips_rand_meth->pseudorand(buf,num);
+       return -1;
+       }
+
+int FIPS_rand_status(void)
+       {
+       if (!fips_approved_rand_meth && FIPS_mode())
+               {
+               FIPSerr(FIPS_F_FIPS_RAND_STATUS, FIPS_R_NON_FIPS_METHOD);
+               return 0;
+               }
+       if (fips_rand_meth && fips_rand_meth->status)
+               return fips_rand_meth->status();
+       return 0;
+       }
index ee5f320e0e2de239cf8287bcd2f4f7beb6e3ac9f..afab1fa40bce17e0519ff4b9f24402f9441485fd 100644 (file)
@@ -356,14 +356,14 @@ int FIPS_selftest_x931()
        FIPS_x931_reset();
        if (!FIPS_x931_test_mode())
                {
-               FIPSerr(FIPS_F_FIPS_SELFTEST_RNG,FIPS_R_SELFTEST_FAILED);
+               FIPSerr(FIPS_F_FIPS_SELFTEST_X931,FIPS_R_SELFTEST_FAILED);
                return 0;
                }
        if (!fips_x931_test(aes_128_key,aes_128_tv)
                || !fips_x931_test(aes_192_key, aes_192_tv)
                || !fips_x931_test(aes_256_key, aes_256_tv))
                {
-               FIPSerr(FIPS_F_FIPS_SELFTEST_RNG,FIPS_R_SELFTEST_FAILED);
+               FIPSerr(FIPS_F_FIPS_SELFTEST_X931,FIPS_R_SELFTEST_FAILED);
                return 0;
                }
        FIPS_x931_reset();