Remove several of the old obsolete FIPS_corrupt_*() functions.
[openssl.git] / fips / ecdsa / fips_ecdsa_selftest.c
1 /* fips/ecdsa/fips_ecdsa_selftest.c */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3  * project 2011.
4  */
5 /* ====================================================================
6  * Copyright (c) 2011 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer. 
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  */
54
55 #define OPENSSL_FIPSAPI
56
57 #include <string.h>
58 #include <openssl/crypto.h>
59 #include <openssl/ec.h>
60 #include <openssl/ecdsa.h>
61 #include <openssl/fips.h>
62 #include <openssl/err.h>
63 #include <openssl/evp.h>
64 #include <openssl/bn.h>
65
66 #ifdef OPENSSL_FIPS
67
68 static const char P_384_name[] = "ECDSA P-384";
69
70 static const unsigned char P_384_d[] = {
71         0x1d,0x84,0x42,0xde,0xa2,0x35,0x29,0xbd,0x9f,0xe2,0x6e,0x6d,
72         0x01,0x26,0x30,0x79,0x33,0x57,0x01,0xf3,0x97,0x88,0x41,0xb3,
73         0x82,0x07,0x08,0x5e,0x63,0x8e,0x1a,0xa6,0x9b,0x08,0xb6,0xe2,
74         0xa2,0x98,0xac,0x1c,0x9b,0x25,0xb3,0xf1,0x5c,0x20,0xe9,0x85
75 };
76 static const unsigned char P_384_qx[] = {
77         0x6b,0x7e,0x9c,0xbb,0x3d,0xc5,0x4d,0x53,0xf7,0x6c,0x8d,0xcc,
78         0xf8,0xc3,0xa8,0x26,0xba,0xeb,0xa6,0x56,0x6a,0x41,0x98,0xb1,
79         0x90,0x90,0xcc,0xe7,0x48,0x74,0x3d,0xe6,0xd7,0x65,0x90,0x3b,
80         0x13,0x69,0xdc,0x8f,0x48,0xc1,0xb4,0xf4,0xb1,0x91,0x36,0x3f
81 };
82 static const unsigned char P_384_qy[] = {
83         0x40,0xc2,0x62,0x2a,0xea,0xfb,0x47,0x75,0xb5,0xdc,0x2e,0x1e,
84         0xa0,0xa9,0x1f,0x6a,0xb7,0x54,0xac,0xce,0x91,0xe8,0x5b,0x8c,
85         0xe3,0xf5,0xb8,0x0e,0xcb,0x82,0xb0,0xd9,0x57,0x1d,0xeb,0x25,
86         0xfc,0x03,0xe5,0x12,0x50,0x17,0x98,0x7f,0x14,0x7e,0x95,0x17
87 };
88
89 #ifndef OPENSSL_NO_EC2M
90
91 static const char K_409_name[] = "ECDSA K-409";
92
93 static const unsigned char K_409_d[] = {
94         0x68,0xe1,0x64,0x0a,0xe6,0x80,0x57,0x53,0x8d,0x35,0xd1,0xec,
95         0x69,0xea,0x82,0x05,0x47,0x48,0x4d,0xda,0x9f,0x8c,0xa0,0xf3,
96         0x06,0xc7,0x77,0xcb,0x14,0x05,0x9f,0x5d,0xdd,0xe0,0x5d,0x68,
97         0x4e,0x1a,0xe4,0x9c,0xe0,0x4d,0x4a,0x74,0x47,0x54,0x4e,0x55,
98         0xae,0x70,0x8c
99 };
100 static const unsigned char K_409_qx[] = {
101         0x01,0x07,0xd6,0x6f,0xa8,0xf8,0x0e,0xbb,0xb8,0xa7,0x83,0x04,
102         0xc3,0x19,0x67,0x9e,0x73,0x7b,0xeb,0xf4,0x6c,0xf3,0xeb,0xda,
103         0x0d,0xe7,0x60,0xaf,0x29,0x37,0x13,0x32,0x51,0xac,0xb6,0x35,
104         0x00,0x60,0xfa,0xd5,0x8b,0x6d,0xae,0xb0,0xe9,0x46,0x7f,0xe2,
105         0x2d,0x50,0x04,0x40
106 };
107 static const unsigned char K_409_qy[] = {
108         0x0a,0x53,0xf1,0x4f,0x2a,0xa5,0x5a,0xfb,0x37,0xb4,0x76,0x47,
109         0x1b,0x14,0xd1,0x8d,0x86,0x94,0x75,0x26,0xc3,0x0b,0x09,0x57,
110         0x1d,0x26,0x38,0x33,0x84,0x97,0x9d,0x56,0xe1,0x0d,0x51,0x9b,
111         0x2c,0xbb,0x3d,0x92,0x48,0xaa,0x2a,0x39,0x4f,0x07,0x92,0xbd,
112         0xb0,0x4d,0x2e
113 };
114
115 #endif
116
117 typedef struct 
118         {
119         int curve;
120         const char *name;
121         const unsigned char *x;
122         size_t xlen;
123         const unsigned char *y;
124         size_t ylen;
125         const unsigned char *d;
126         size_t dlen;
127         } EC_SELFTEST_DATA;
128
129 #define make_ecdsa_test(nid, pr) { nid, pr##_name, \
130                                 pr##_qx, sizeof(pr##_qx), \
131                                 pr##_qy, sizeof(pr##_qy), \
132                                 pr##_d, sizeof(pr##_d)}
133
134 static EC_SELFTEST_DATA test_ec_data[] = 
135         {
136         make_ecdsa_test(NID_secp384r1, P_384),
137 #ifndef OPENSSL_NO_EC2M
138         make_ecdsa_test(NID_sect409k1, K_409)
139 #endif
140         };
141
142 int FIPS_selftest_ecdsa()
143         {
144         EC_KEY *ec = NULL;
145         BIGNUM *x = NULL, *y = NULL, *d = NULL;
146         EVP_PKEY pk;
147         int rv = 0;
148         size_t i;
149
150         for (i = 0; i < sizeof(test_ec_data)/sizeof(EC_SELFTEST_DATA); i++)
151                 {
152                 EC_SELFTEST_DATA *ecd = test_ec_data + i;
153
154                 x = BN_bin2bn(ecd->x, ecd->xlen, x);
155                 y = BN_bin2bn(ecd->y, ecd->ylen, y);
156                 d = BN_bin2bn(ecd->d, ecd->dlen, d);
157
158                 if (!x || !y || !d)
159                         goto err;
160
161                 ec = EC_KEY_new_by_curve_name(ecd->curve);
162                 if (!ec)
163                         goto err;
164
165                 if (!EC_KEY_set_public_key_affine_coordinates(ec, x, y))
166                         goto err;
167
168                 if (!EC_KEY_set_private_key(ec, d))
169                         goto err;
170
171                 pk.type = EVP_PKEY_EC;
172                 pk.pkey.ec = ec;
173
174                 if (!fips_pkey_signature_test(FIPS_TEST_SIGNATURE, &pk, NULL, 0,
175                                                 NULL, 0, EVP_sha512(), 0,
176                                                 ecd->name))
177                         goto err;
178                 EC_KEY_free(ec);
179                 ec = NULL;
180                 }
181
182         rv = 1;
183
184         err:
185
186         if (x)
187                 BN_clear_free(x);
188         if (y)
189                 BN_clear_free(y);
190         if (d)
191                 BN_clear_free(d);
192         if (ec)
193                 EC_KEY_free(ec);
194
195         return rv;
196
197         }
198
199 #endif