123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319 |
- #! /usr/bin/env perl
- # Copyright 2020 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- use strict;
- use warnings;
- use File::Spec;
- use File::Spec::Functions qw/curdir abs2rel/;
- use File::Copy;
- use OpenSSL::Glob;
- use OpenSSL::Test qw/:DEFAULT srctop_dir bldtop_dir bldtop_file srctop_file data_file/;
- use OpenSSL::Test::Utils;
- BEGIN {
- setup("test_cli_fips");
- }
- use lib srctop_dir('Configurations');
- use lib bldtop_dir('.');
- use platform;
- my $no_check = disabled('fips-securitychecks');
- plan skip_all => "Test only supported in a fips build with security checks"
- if disabled("fips") || disabled("fips-securitychecks");
- plan tests => 13;
- my $fipsmodule = bldtop_file('providers', platform->dso('fips'));
- my $fipsconf = srctop_file("test", "fips-and-base.cnf");
- my $defaultconf = srctop_file("test", "default.cnf");
- my $tbs_data = $fipsmodule;
- my $bogus_data = $fipsconf;
- # output a fipsmodule.cnf file containing mac data
- ok(run(app(['openssl', 'fipsinstall', '-out', 'fipsmodule.cnf',
- '-module', $fipsmodule, ])),
- "fipsinstall");
- # verify the $fipsconf file
- ok(run(app(['openssl', 'fipsinstall', '-in', 'fipsmodule.cnf', '-module', $fipsmodule,
- '-verify'])),
- "fipsinstall verify");
- $ENV{OPENSSL_CONF_INCLUDE} = abs2rel(curdir());
- $ENV{OPENSSL_CONF} = $fipsconf;
- ok(run(app(['openssl', 'list', '-public-key-methods', '-verbose'])),
- "provider listing of public key methods");
- ok(run(app(['openssl', 'list', '-public-key-algorithms', '-verbose'])),
- "provider listing of public key algorithms");
- ok(run(app(['openssl', 'list', '-key-managers', '-verbose'])),
- "provider listing of keymanagers");
- ok(run(app(['openssl', 'list', '-key-exchange-algorithms', '-verbose'])),
- "provider listing of key exchange algorithms");
- ok(run(app(['openssl', 'list', '-kem-algorithms', '-verbose'])),
- "provider listing of key encapsulation algorithms");
- ok(run(app(['openssl', 'list', '-signature-algorithms', '-verbose'])),
- "provider listing of signature algorithms");
- ok(run(app(['openssl', 'list', '-asymcipher-algorithms', '-verbose'])),
- "provider listing of encryption algorithms");
- ok(run(app(['openssl', 'list', '-key-managers', '-verbose', '-select', 'DSA' ])),
- "provider listing of one item in the keymanager");
- my $tsignverify_count = 8;
- sub tsignverify {
- my $prefix = shift;
- my $fips_key = shift;
- my $nonfips_key = shift;
- my $fips_sigfile = $prefix.'.fips.sig';
- my $nonfips_sigfile = $prefix.'.nonfips.sig';
- my $sigfile = '';
- my $testtext = '';
- $ENV{OPENSSL_CONF} = $fipsconf;
- $sigfile = $fips_sigfile;
- $testtext = $prefix.': '.
- 'Sign something with a FIPS key';
- ok(run(app(['openssl', 'dgst', '-sha256',
- '-sign', $fips_key,
- '-out', $sigfile,
- $tbs_data])),
- $testtext);
- $testtext = $prefix.': '.
- 'Verify something with a FIPS key';
- ok(run(app(['openssl', 'dgst', '-sha256',
- '-verify', $fips_key,
- '-signature', $sigfile,
- $tbs_data])),
- $testtext);
- $testtext = $prefix.': '.
- 'Verify a valid signature against the wrong data with a FIPS key'.
- ' (should fail)';
- ok(!run(app(['openssl', 'dgst', '-sha256',
- '-verify', $fips_key,
- '-signature', $sigfile,
- $bogus_data])),
- $testtext);
- $ENV{OPENSSL_CONF} = $defaultconf;
- $sigfile = $nonfips_sigfile;
- $testtext = $prefix.': '.
- 'Sign something with a non-FIPS key'.
- ' with the default provider';
- ok(run(app(['openssl', 'dgst', '-sha256',
- '-sign', $nonfips_key,
- '-out', $sigfile,
- $tbs_data])),
- $testtext);
- $testtext = $prefix.': '.
- 'Verify something with a non-FIPS key'.
- ' with the default provider';
- ok(run(app(['openssl', 'dgst', '-sha256',
- '-verify', $nonfips_key,
- '-signature', $sigfile,
- $tbs_data])),
- $testtext);
- $ENV{OPENSSL_CONF} = $fipsconf;
- $testtext = $prefix.': '.
- 'Sign something with a non-FIPS key'.
- ' (should fail)';
- ok(!run(app(['openssl', 'dgst', '-sha256',
- '-sign', $nonfips_key,
- '-out', $prefix.'.nonfips.fail.sig',
- $tbs_data])),
- $testtext);
- $testtext = $prefix.': '.
- 'Verify something with a non-FIPS key'.
- ' (should fail)';
- ok(!run(app(['openssl', 'dgst', '-sha256',
- '-verify', $nonfips_key,
- '-signature', $sigfile,
- $tbs_data])),
- $testtext);
- $testtext = $prefix.': '.
- 'Verify a valid signature against the wrong data with a non-FIPS key'.
- ' (should fail)';
- ok(!run(app(['openssl', 'dgst', '-sha256',
- '-verify', $nonfips_key,
- '-signature', $sigfile,
- $bogus_data])),
- $testtext);
- }
- SKIP : {
- skip "FIPS EC tests because of no ec in this build", 1
- if disabled("ec");
- subtest EC => sub {
- my $testtext_prefix = 'EC';
- my $a_fips_curve = 'prime256v1';
- my $fips_key = $testtext_prefix.'.fips.priv.pem';
- my $a_nonfips_curve = 'brainpoolP256r1';
- my $nonfips_key = $testtext_prefix.'.nonfips.priv.pem';
- my $testtext = '';
- my $curvename = '';
- plan tests => 3 + $tsignverify_count;
- $ENV{OPENSSL_CONF} = $defaultconf;
- $curvename = $a_nonfips_curve;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a non-FIPS algorithm with the default provider';
- ok(run(app(['openssl', 'genpkey', '-algorithm', 'EC',
- '-pkeyopt', 'ec_paramgen_curve:'.$curvename,
- '-out', $nonfips_key])),
- $testtext);
- $ENV{OPENSSL_CONF} = $fipsconf;
- $curvename = $a_fips_curve;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a FIPS algorithm';
- ok(run(app(['openssl', 'genpkey', '-algorithm', 'EC',
- '-pkeyopt', 'ec_paramgen_curve:'.$curvename,
- '-out', $fips_key])),
- $testtext);
- $curvename = $a_nonfips_curve;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a non-FIPS algorithm'.
- ' (should fail)';
- ok(!run(app(['openssl', 'genpkey', '-algorithm', 'EC',
- '-pkeyopt', 'ec_paramgen_curve:'.$curvename,
- '-out', $testtext_prefix.'.'.$curvename.'.priv.pem'])),
- $testtext);
- tsignverify($testtext_prefix, $fips_key, $nonfips_key);
- };
- }
- SKIP: {
- skip "FIPS RSA tests because of no rsa in this build", 1
- if disabled("rsa");
- subtest RSA => sub {
- my $testtext_prefix = 'RSA';
- my $fips_key = $testtext_prefix.'.fips.priv.pem';
- my $nonfips_key = $testtext_prefix.'.nonfips.priv.pem';
- my $testtext = '';
- plan tests => 3 + $tsignverify_count;
- $ENV{OPENSSL_CONF} = $defaultconf;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a non-FIPS algorithm with the default provider';
- ok(run(app(['openssl', 'genpkey', '-algorithm', 'RSA',
- '-pkeyopt', 'rsa_keygen_bits:512',
- '-out', $nonfips_key])),
- $testtext);
- $ENV{OPENSSL_CONF} = $fipsconf;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a FIPS algorithm';
- ok(run(app(['openssl', 'genpkey', '-algorithm', 'RSA',
- '-pkeyopt', 'rsa_keygen_bits:2048',
- '-out', $fips_key])),
- $testtext);
- $testtext = $testtext_prefix.': '.
- 'Generate a key with a non-FIPS algorithm'.
- ' (should fail)';
- ok(!run(app(['openssl', 'genpkey', '-algorithm', 'RSA',
- '-pkeyopt', 'rsa_keygen_bits:512',
- '-out', $testtext_prefix.'.fail.priv.pem'])),
- $testtext);
- tsignverify($testtext_prefix, $fips_key, $nonfips_key);
- };
- }
- SKIP : {
- skip "FIPS DSA tests because of no dsa in this build", 1
- if disabled("dsa");
- subtest DSA => sub {
- my $testtext_prefix = 'DSA';
- my $fips_key = $testtext_prefix.'.fips.priv.pem';
- my $nonfips_key = $testtext_prefix.'.nonfips.priv.pem';
- my $testtext = '';
- my $fips_param = $testtext_prefix.'.fips.param.pem';
- my $nonfips_param = $testtext_prefix.'.nonfips.param.pem';
- plan tests => 6 + $tsignverify_count;
- $ENV{OPENSSL_CONF} = $defaultconf;
- $testtext = $testtext_prefix.': '.
- 'Generate non-FIPS params with the default provider';
- ok(run(app(['openssl', 'genpkey', '-genparam',
- '-algorithm', 'DSA',
- '-pkeyopt', 'type:fips186_2',
- '-pkeyopt', 'dsa_paramgen_bits:512',
- '-out', $nonfips_param])),
- $testtext);
- $ENV{OPENSSL_CONF} = $fipsconf;
- $testtext = $testtext_prefix.': '.
- 'Generate FIPS params';
- ok(run(app(['openssl', 'genpkey', '-genparam',
- '-algorithm', 'DSA',
- '-pkeyopt', 'dsa_paramgen_bits:2048',
- '-out', $fips_param])),
- $testtext);
- $testtext = $testtext_prefix.': '.
- 'Generate non-FIPS params'.
- ' (should fail)';
- ok(!run(app(['openssl', 'genpkey', '-genparam',
- '-algorithm', 'DSA',
- '-pkeyopt', 'dsa_paramgen_bits:512',
- '-out', $testtext_prefix.'.fail.param.pem'])),
- $testtext);
- $ENV{OPENSSL_CONF} = $defaultconf;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with non-FIPS params with the default provider';
- ok(run(app(['openssl', 'genpkey',
- '-paramfile', $nonfips_param,
- '-pkeyopt', 'type:fips186_2',
- '-out', $nonfips_key])),
- $testtext);
- $ENV{OPENSSL_CONF} = $fipsconf;
- $testtext = $testtext_prefix.': '.
- 'Generate a key with FIPS parameters';
- ok(run(app(['openssl', 'genpkey',
- '-paramfile', $fips_param,
- '-pkeyopt', 'type:fips186_4',
- '-out', $fips_key])),
- $testtext);
- $testtext = $testtext_prefix.': '.
- 'Generate a key with non-FIPS parameters'.
- ' (should fail)';
- ok(!run(app(['openssl', 'genpkey',
- '-paramfile', $nonfips_param,
- '-pkeyopt', 'type:fips186_2',
- '-out', $testtext_prefix.'.fail.priv.pem'])),
- $testtext);
- tsignverify($testtext_prefix, $fips_key, $nonfips_key);
- };
- }
|