Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
mozilla-nss.2166
nss-CC-ECDH_selftest.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File nss-CC-ECDH_selftest.patch of Package mozilla-nss.2166
# HG changeset patch # Parent 43cbacade3d638f08a97882d76420867bd3f2194 ECDH selftest for FIPS mode bsc#921783 diff --git a/lib/softoken/fipstest.c b/lib/softoken/fipstest.c --- a/lib/softoken/fipstest.c +++ b/lib/softoken/fipstest.c @@ -1758,17 +1758,171 @@ init_loser: if (ecdsaStatus != SECSuccess) { return CKR_DEVICE_ERROR ; } return( CKR_OK ); } static CK_RV -sftk_fips_ECDSA_PowerUpSelfTest() { +sftk_fips_ECDH_Test(const PRUint8 *encodedParams, + unsigned int encodedParamsLen) +{ + + static const PRUint8 ecdh_privKey1_data[] = { + 0x6a, 0x9b, 0xf6, 0xf7, 0xce, 0xed, 0x79, 0x11, + 0xf0, 0xc7, 0xc8, 0x9a, 0xa5, 0xd1, 0x57, 0xb1, + 0x7b, 0x5a, 0x3b, 0x76, 0x4e, 0x7b, 0x7c, 0xbc, + 0xf2, 0x76, 0x1c, 0x1c, 0x7f, 0xc5, 0x53, 0x2f}; + + static const PRUint8 ecdh_pubKey1_data[] = { + 0x04, 0x07, 0xb1, 0xcb, 0x57, 0x20, 0xa7, 0x10, + 0xd6, 0x9d, 0x37, 0x4b, 0x1c, 0xdc, 0x35, 0x90, + 0xff, 0x1a, 0x2d, 0x98, 0x95, 0x1b, 0x2f, 0xeb, + 0x7f, 0xbb, 0x81, 0xca, 0xc0, 0x69, 0x75, 0xea, + 0xc5, 0xb8, 0x03, 0xe6, 0x89, 0xe5, 0x06, 0x55, + 0x22, 0x21, 0x0e, 0xcd, 0x1a, 0xf8, 0xc0, 0xd4, + 0xa7, 0x8f, 0x47, 0x81, 0x1e, 0x4a, 0x81, 0xb5, + 0x41, 0x3d, 0xa1, 0xf0, 0x4b, 0x65, 0xb4, 0x26, + 0xe9}; + + static const PRUint8 ecdh_privKey2_data[] = { + 0xba, 0x27, 0x1b, 0x9e, 0x67, 0xaa, 0x52, 0xf8, + 0xdf, 0x79, 0xc6, 0xd9, 0x36, 0x4d, 0x4b, 0xc3, + 0x29, 0x2b, 0x42, 0xc9, 0xea, 0x43, 0xca, 0x5b, + 0x62, 0xb0, 0x13, 0x6d, 0x16, 0x16, 0x29, 0x52}; + + static const PRUint8 ecdh_pubKey2_data[] = { + 0x04, 0x24, 0xc3, 0x93, 0x43, 0x6b, 0xc2, 0xbd, + 0xb9, 0xb0, 0xab, 0xae, 0x6e, 0x10, 0xa3, 0x3c, + 0xdd, 0x5b, 0x5a, 0xab, 0x0b, 0x98, 0x1c, 0xe7, + 0x51, 0xf9, 0x93, 0xfa, 0xcc, 0xed, 0xc4, 0x21, + 0x19, 0xc9, 0x54, 0x68, 0xf2, 0x0a, 0xe7, 0xb2, + 0x69, 0xb1, 0xf9, 0xe8, 0x09, 0x57, 0x49, 0x09, + 0x65, 0x7d, 0x5a, 0x0c, 0xa5, 0x2d, 0xe1, 0x0a, + 0x39, 0xb3, 0x1c, 0x0c, 0x74, 0xcf, 0x31, 0x68, + 0x96}; + + static const PRUint8 sharedSecret_data[] = { + 0x26, 0xd0, 0x25, 0xf6, 0xa8, 0x10, 0x31, 0x7c, + 0x97, 0x88, 0x3e, 0x96, 0x52, 0x72, 0xea, 0xe2, + 0xa0, 0xb2, 0xa3, 0x66, 0x80, 0x89, 0xae, 0x20, + 0x92, 0x49, 0x4d, 0xa8, 0x26, 0x17, 0xc3, 0x2c}; + + SECItem encodedparams; + ECParams *ecparams = NULL; + ECPrivateKey *ecdh_privKey1 = NULL; + ECPrivateKey *ecdh_privKey2 = NULL; + SECItem sharedSecret1, sharedSecret2; + SECStatus ecdhStatus = SECFailure; + + ecdhStatus = SECOID_Init(); + if (ecdhStatus != SECSuccess) { + goto init_loser; + } + + PORT_Memset(&sharedSecret1, 0, sizeof(sharedSecret1)); + PORT_Memset(&sharedSecret2, 0, sizeof(sharedSecret2)); + + /* construct the ECDSA private/public key pair */ + encodedparams.type = siBuffer; + encodedparams.data = (unsigned char *) encodedParams; + encodedparams.len = encodedParamsLen; + + ecdhStatus = EC_DecodeParams(&encodedparams, &ecparams); + if (ecdhStatus != SECSuccess) { + goto loser; + } + + /* Generate two key pairs from known private data and compare + * resulting public key with expected values. */ + ecdhStatus = EC_NewKeyFromSeed(ecparams, &ecdh_privKey1, + ecdh_privKey1_data, sizeof(ecdh_privKey1_data)); + + if (ecdhStatus != SECSuccess) + goto loser; + + ecdhStatus = EC_NewKeyFromSeed(ecparams, &ecdh_privKey2, + ecdh_privKey2_data, sizeof(ecdh_privKey2_data)); + + if (ecdhStatus != SECSuccess) + goto loser; + + if ((sizeof(ecdh_privKey1_data) != ecdh_privKey1->privateValue.len) || + (sizeof(ecdh_privKey2_data) != ecdh_privKey2->privateValue.len) || + (sizeof(ecdh_pubKey1_data) != ecdh_privKey1->publicValue.len) || + (sizeof(ecdh_pubKey2_data) != ecdh_privKey2->publicValue.len) || + PORT_Memcmp(ecdh_privKey1_data, ecdh_privKey1->privateValue.data, + ecdh_privKey1->privateValue.len) || + PORT_Memcmp(ecdh_privKey2_data, ecdh_privKey2->privateValue.data, + ecdh_privKey2->privateValue.len) || + PORT_Memcmp(ecdh_pubKey1_data, ecdh_privKey1->publicValue.data, + ecdh_privKey1->publicValue.len) || + PORT_Memcmp(ecdh_pubKey2_data, ecdh_privKey2->publicValue.data, + ecdh_privKey2->publicValue.len)) { + ecdhStatus = SECFailure; + goto loser; + } + + /* Generate shared secret for both combinations and compare with expected + * value. */ + + ecdhStatus = ECDH_Derive( + &(ecdh_privKey2->publicValue), + ecparams, + &(ecdh_privKey1->privateValue), + PR_FALSE, + &sharedSecret1); + if (ecdhStatus != SECSuccess) + goto loser; + + ecdhStatus = ECDH_Derive( + &(ecdh_privKey1->publicValue), + ecparams, + &(ecdh_privKey2->privateValue), + PR_FALSE, + &sharedSecret2); + if (ecdhStatus != SECSuccess) + goto loser; + + if ((sizeof(sharedSecret_data) != sharedSecret1.len) || + (sizeof(sharedSecret_data) != sharedSecret2.len) || + PORT_Memcmp(sharedSecret1.data, sharedSecret_data, + sizeof(sharedSecret_data)) || + PORT_Memcmp(sharedSecret2.data, sharedSecret_data, + sizeof(sharedSecret_data))) { + ecdhStatus = SECFailure; + goto loser; + } + +loser: + if (ecparams->arena) + PORT_FreeArena(ecparams->arena, PR_FALSE); + if (ecdh_privKey1) + PORT_FreeArena(ecdh_privKey1->ecParams.arena, PR_TRUE); + if (ecdh_privKey2) + PORT_FreeArena(ecdh_privKey2->ecParams.arena, PR_TRUE); + if (sharedSecret1.data) + PORT_ZFree(sharedSecret1.data, sharedSecret1.len); + if (sharedSecret2.data) + PORT_ZFree(sharedSecret2.data, sharedSecret2.len); + + ecdhStatus = SECOID_Shutdown(); + +init_loser: + + if( ecdhStatus != SECSuccess ) + return( CKR_DEVICE_ERROR ); + + return( CKR_OK ); + +} + +static CK_RV +sftk_fips_EC_PowerUpSelfTest() { /* ECDSA Known curve nistp256 == SEC_OID_SECG_EC_SECP256R1 params */ static const PRUint8 ecdsa_known_P256_EncodedParams[] = { 0x06,0x08,0x2a,0x86,0x48,0xce,0x3d,0x03, 0x01,0x07}; static const PRUint8 ecdsa_known_P256_signature[] = { 0x07,0xb1,0xcb,0x57,0x20,0xa7,0x10,0xd6, @@ -1814,16 +1968,23 @@ sftk_fips_ECDSA_PowerUpSelfTest() { sizeof ecdsa_known_K283_EncodedParams, ecdsa_known_K283_signature, sizeof ecdsa_known_K283_signature ); if (crv != CKR_OK) { return( CKR_DEVICE_ERROR ); } #endif + /* ECDSA GF(p) prime field curve test */ + crv = sftk_fips_ECDH_Test(ecdsa_known_P256_EncodedParams, + sizeof ecdsa_known_P256_EncodedParams); + if (crv != CKR_OK) { + return( CKR_DEVICE_ERROR ); + } + return( CKR_OK ); } #endif /* NSS_DISABLE_ECC */ static CK_RV sftk_fips_DSA_PowerUpSelfTest( void ) { @@ -2268,17 +2429,17 @@ FIPS_cryptoSelftestSoftoken( void ) /* RNG Power-Up SelfTest(s). */ rv = sftk_fips_RNG_PowerUpSelfTest(); if( rv != CKR_OK ) return rv; #ifndef NSS_DISABLE_ECC /* ECDSA Power-Up SelfTest(s). */ - rv = sftk_fips_ECDSA_PowerUpSelfTest(); + rv = sftk_fips_EC_PowerUpSelfTest(); if( rv != CKR_OK ) return rv; #endif /* DH Power-Up SelfTest(s). */ rv = sftk_fips_DH_PowerUpSelfTest();
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor