Blame lib/fips.h

Packit aea12f
/*
Packit aea12f
 * Copyright (C) 2013 Red Hat
Packit aea12f
 *
Packit aea12f
 * Author: Nikos Mavrogiannopoulos
Packit aea12f
 *
Packit aea12f
 * This file is part of GnuTLS.
Packit aea12f
 *
Packit aea12f
 * The GnuTLS is free software; you can redistribute it and/or
Packit aea12f
 * modify it under the terms of the GNU Lesser General Public License
Packit aea12f
 * as published by the Free Software Foundation; either version 2.1 of
Packit aea12f
 * the License, or (at your option) any later version.
Packit aea12f
 *
Packit aea12f
 * This library is distributed in the hope that it will be useful, but
Packit aea12f
 * WITHOUT ANY WARRANTY; without even the implied warranty of
Packit aea12f
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit aea12f
 * Lesser General Public License for more details.
Packit aea12f
 *
Packit aea12f
 * You should have received a copy of the GNU Lesser General Public License
Packit aea12f
 * along with this program.  If not, see <https://www.gnu.org/licenses/>
Packit aea12f
 *
Packit aea12f
 */
Packit aea12f
Packit aea12f
#ifndef GNUTLS_LIB_FIPS_H
Packit aea12f
#define GNUTLS_LIB_FIPS_H
Packit aea12f
Packit aea12f
#include "gnutls_int.h"
Packit aea12f
#include <gnutls/gnutls.h>
Packit aea12f
Packit aea12f
#define FIPS140_RND_KEY_SIZE 32
Packit aea12f
Packit aea12f
typedef enum {
Packit aea12f
  LIB_STATE_POWERON,
Packit aea12f
  LIB_STATE_INIT,
Packit aea12f
  LIB_STATE_SELFTEST,
Packit aea12f
  LIB_STATE_OPERATIONAL,
Packit aea12f
  LIB_STATE_ERROR,
Packit aea12f
  LIB_STATE_SHUTDOWN
Packit aea12f
} gnutls_lib_state_t;
Packit aea12f
Packit aea12f
/* do not access directly */
Packit aea12f
extern unsigned int _gnutls_lib_state;
Packit aea12f
extern gnutls_crypto_rnd_st _gnutls_fips_rnd_ops;
Packit aea12f
Packit aea12f
inline static 
Packit aea12f
void _gnutls_switch_lib_state(gnutls_lib_state_t state)
Packit aea12f
{
Packit aea12f
	/* Once into zombie state no errors can change us */
Packit aea12f
	_gnutls_lib_state = state;
Packit aea12f
}
Packit aea12f
Packit aea12f
inline static gnutls_lib_state_t _gnutls_get_lib_state(void)
Packit aea12f
{
Packit aea12f
	return _gnutls_lib_state;
Packit aea12f
}
Packit aea12f
Packit aea12f
int _gnutls_fips_perform_self_checks1(void);
Packit aea12f
int _gnutls_fips_perform_self_checks2(void);
Packit aea12f
void _gnutls_fips_mode_reset_zombie(void);
Packit aea12f
Packit aea12f
#ifdef ENABLE_FIPS140
Packit aea12f
unsigned _gnutls_fips_mode_enabled(void);
Packit aea12f
#else
Packit aea12f
# define _gnutls_fips_mode_enabled() 0
Packit aea12f
#endif
Packit aea12f
Packit aea12f
# define HAVE_LIB_ERROR() unlikely(_gnutls_get_lib_state() != LIB_STATE_OPERATIONAL && _gnutls_get_lib_state() != LIB_STATE_SELFTEST)
Packit aea12f
Packit aea12f
# define FAIL_IF_LIB_ERROR \
Packit aea12f
	if (HAVE_LIB_ERROR()) return GNUTLS_E_LIB_IN_ERROR_STATE
Packit aea12f
Packit aea12f
void _gnutls_switch_lib_state(gnutls_lib_state_t state);
Packit aea12f
Packit aea12f
void _gnutls_lib_simulate_error(void);
Packit aea12f
void _gnutls_lib_force_operational(void);
Packit aea12f
Packit aea12f
#ifdef ENABLE_FIPS140
Packit aea12f
/* This will test the condition when in FIPS140-2 mode
Packit aea12f
 * and return an error if necessary or ignore */
Packit aea12f
# define FIPS_RULE(condition, ret_error, ...) { \
Packit aea12f
	gnutls_fips_mode_t _mode = _gnutls_fips_mode_enabled(); \
Packit aea12f
	if (_mode != GNUTLS_FIPS140_DISABLED) { \
Packit aea12f
		if (condition) { \
Packit aea12f
			if (_mode == GNUTLS_FIPS140_LOG) { \
Packit aea12f
				_gnutls_audit_log(NULL, "fips140-2: allowing "__VA_ARGS__); \
Packit aea12f
			} else if (_mode != GNUTLS_FIPS140_LAX) { \
Packit aea12f
				_gnutls_debug_log("fips140-2: disallowing "__VA_ARGS__); \
Packit aea12f
				return ret_error; \
Packit aea12f
			} \
Packit aea12f
		} \
Packit aea12f
	}}
Packit aea12f
Packit aea12f
inline
Packit aea12f
static unsigned is_mac_algo_forbidden(gnutls_mac_algorithm_t algo)
Packit aea12f
{
Packit aea12f
	gnutls_fips_mode_t mode = _gnutls_fips_mode_enabled();
Packit aea12f
	if (mode != GNUTLS_FIPS140_DISABLED &&
Packit aea12f
	    _gnutls_get_lib_state() != LIB_STATE_SELFTEST) {
Packit aea12f
		switch(algo) {
Packit aea12f
			case GNUTLS_MAC_SHA1:
Packit aea12f
			case GNUTLS_MAC_SHA256:
Packit aea12f
			case GNUTLS_MAC_SHA384:
Packit aea12f
			case GNUTLS_MAC_SHA512:
Packit aea12f
			case GNUTLS_MAC_SHA224:
Packit aea12f
			case GNUTLS_MAC_SHA3_224:
Packit aea12f
			case GNUTLS_MAC_SHA3_256:
Packit aea12f
			case GNUTLS_MAC_SHA3_384:
Packit aea12f
			case GNUTLS_MAC_SHA3_512:
Packit aea12f
                        case GNUTLS_MAC_AES_CMAC_128:
Packit aea12f
                        case GNUTLS_MAC_AES_CMAC_256:
Packit Service 991b93
                        case GNUTLS_MAC_AES_GMAC_128:
Packit Service 991b93
                        case GNUTLS_MAC_AES_GMAC_192:
Packit Service 991b93
                        case GNUTLS_MAC_AES_GMAC_256:
Packit aea12f
				return 0;
Packit aea12f
			default:
Packit aea12f
				if (mode == GNUTLS_FIPS140_LAX)
Packit aea12f
					return 0;
Packit aea12f
				else if (mode == GNUTLS_FIPS140_LOG) {
Packit aea12f
					_gnutls_audit_log(NULL, "fips140-2: allowing access to %s\n",
Packit aea12f
							  gnutls_mac_get_name(algo));
Packit aea12f
					return 0;
Packit aea12f
				}
Packit aea12f
				return 1;
Packit aea12f
		}
Packit aea12f
	}
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
Packit aea12f
inline
Packit aea12f
static unsigned is_cipher_algo_forbidden(gnutls_cipher_algorithm_t algo)
Packit aea12f
{
Packit aea12f
	gnutls_fips_mode_t mode = _gnutls_fips_mode_enabled();
Packit aea12f
	if (mode != GNUTLS_FIPS140_DISABLED &&
Packit aea12f
	    _gnutls_get_lib_state() != LIB_STATE_SELFTEST) {
Packit aea12f
Packit aea12f
		switch(algo) {
Packit aea12f
			case GNUTLS_CIPHER_AES_128_CBC:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_CBC:
Packit aea12f
			case GNUTLS_CIPHER_AES_192_CBC:
Packit aea12f
			case GNUTLS_CIPHER_AES_128_GCM:
Packit Service 991b93
			case GNUTLS_CIPHER_AES_192_GCM:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_GCM:
Packit aea12f
			case GNUTLS_CIPHER_AES_128_CCM:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_CCM:
Packit aea12f
			case GNUTLS_CIPHER_3DES_CBC:
Packit aea12f
			case GNUTLS_CIPHER_AES_128_CCM_8:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_CCM_8:
Packit aea12f
			case GNUTLS_CIPHER_AES_128_CFB8:
Packit aea12f
			case GNUTLS_CIPHER_AES_192_CFB8:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_CFB8:
Packit aea12f
			case GNUTLS_CIPHER_AES_128_XTS:
Packit aea12f
			case GNUTLS_CIPHER_AES_256_XTS:
Packit aea12f
				return 0;
Packit aea12f
			default:
Packit aea12f
				if (mode == GNUTLS_FIPS140_LAX)
Packit aea12f
					return 0;
Packit aea12f
				else if (mode == GNUTLS_FIPS140_LOG) {
Packit aea12f
					_gnutls_audit_log(NULL, "fips140-2: allowing access to %s\n",
Packit aea12f
							  gnutls_cipher_get_name(algo));
Packit aea12f
					return 0;
Packit aea12f
				}
Packit aea12f
				return 1;
Packit aea12f
		}
Packit aea12f
	}
Packit aea12f
Packit aea12f
	return 0;
Packit aea12f
}
Packit aea12f
#else
Packit aea12f
# define is_mac_algo_forbidden(x) 0
Packit aea12f
# define is_cipher_algo_forbidden(x) 0
Packit aea12f
# define FIPS_RULE(condition, ret_error, ...)
Packit aea12f
#endif
Packit aea12f
Packit aea12f
#endif /* GNUTLS_LIB_FIPS_H */