1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
|
/*
* Copyright (C) 2013 Red Hat
*
* Author: Nikos Mavrogiannopoulos
*
* This file is part of GnuTLS.
*
* The GnuTLS is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>
*
*/
#ifndef GNUTLS_LIB_FIPS_H
#define GNUTLS_LIB_FIPS_H
#include "gnutls_int.h"
#include <gnutls/gnutls.h>
#define FIPS140_RND_KEY_SIZE 32
typedef enum {
LIB_STATE_POWERON,
LIB_STATE_INIT,
LIB_STATE_SELFTEST,
LIB_STATE_OPERATIONAL,
LIB_STATE_ERROR,
LIB_STATE_SHUTDOWN
} gnutls_lib_state_t;
/* do not access directly */
extern unsigned int _gnutls_lib_state;
extern gnutls_crypto_rnd_st _gnutls_fips_rnd_ops;
void _gnutls_switch_fips_state(gnutls_fips140_operation_state_t state);
inline static
void _gnutls_switch_lib_state(gnutls_lib_state_t state)
{
/* Once into zombie state no errors can change us */
_gnutls_lib_state = state;
}
inline static gnutls_lib_state_t _gnutls_get_lib_state(void)
{
return _gnutls_lib_state;
}
int _gnutls_fips_perform_self_checks1(void);
int _gnutls_fips_perform_self_checks2(void);
void _gnutls_fips_mode_reset_zombie(void);
#ifdef ENABLE_FIPS140
unsigned _gnutls_fips_mode_enabled(void);
#else
# define _gnutls_fips_mode_enabled() 0
#endif
# define HAVE_LIB_ERROR() unlikely(_gnutls_get_lib_state() != LIB_STATE_OPERATIONAL && _gnutls_get_lib_state() != LIB_STATE_SELFTEST)
# define FAIL_IF_LIB_ERROR \
if (HAVE_LIB_ERROR()) return GNUTLS_E_LIB_IN_ERROR_STATE
void _gnutls_switch_lib_state(gnutls_lib_state_t state);
void _gnutls_lib_simulate_error(void);
void _gnutls_lib_force_operational(void);
inline static bool
is_mac_algo_approved_in_fips(gnutls_mac_algorithm_t algo)
{
switch (algo) {
case GNUTLS_MAC_SHA1:
case GNUTLS_MAC_SHA256:
case GNUTLS_MAC_SHA384:
case GNUTLS_MAC_SHA512:
case GNUTLS_MAC_SHA224:
case GNUTLS_MAC_SHA3_224:
case GNUTLS_MAC_SHA3_256:
case GNUTLS_MAC_SHA3_384:
case GNUTLS_MAC_SHA3_512:
case GNUTLS_MAC_AES_CMAC_128:
case GNUTLS_MAC_AES_CMAC_256:
case GNUTLS_MAC_AES_GMAC_128:
case GNUTLS_MAC_AES_GMAC_192:
case GNUTLS_MAC_AES_GMAC_256:
return true;
default:
return false;
}
}
inline static bool
is_mac_algo_allowed_in_fips(gnutls_mac_algorithm_t algo)
{
return is_mac_algo_approved_in_fips(algo);
}
inline static bool
is_cipher_algo_approved_in_fips(gnutls_cipher_algorithm_t algo)
{
switch (algo) {
case GNUTLS_CIPHER_AES_128_CBC:
case GNUTLS_CIPHER_AES_256_CBC:
case GNUTLS_CIPHER_AES_192_CBC:
case GNUTLS_CIPHER_AES_128_CCM:
case GNUTLS_CIPHER_AES_256_CCM:
case GNUTLS_CIPHER_AES_128_CCM_8:
case GNUTLS_CIPHER_AES_256_CCM_8:
case GNUTLS_CIPHER_AES_128_CFB8:
case GNUTLS_CIPHER_AES_192_CFB8:
case GNUTLS_CIPHER_AES_256_CFB8:
case GNUTLS_CIPHER_AES_128_XTS:
case GNUTLS_CIPHER_AES_256_XTS:
return true;
default:
return false;
}
}
inline static bool
is_cipher_algo_allowed_in_fips(gnutls_cipher_algorithm_t algo)
{
if (is_cipher_algo_approved_in_fips(algo)) {
return true;
}
/* GCM is only approved in TLS */
switch (algo) {
case GNUTLS_CIPHER_AES_128_GCM:
case GNUTLS_CIPHER_AES_192_GCM:
case GNUTLS_CIPHER_AES_256_GCM:
return true;
default:
return false;
}
}
#ifdef ENABLE_FIPS140
/* This will test the condition when in FIPS140-2 mode
* and return an error if necessary or ignore */
# define FIPS_RULE(condition, ret_error, ...) { \
gnutls_fips_mode_t _mode = _gnutls_fips_mode_enabled(); \
if (_mode != GNUTLS_FIPS140_DISABLED) { \
if (condition) { \
if (_mode == GNUTLS_FIPS140_LOG) { \
_gnutls_audit_log(NULL, "fips140-2: allowing "__VA_ARGS__); \
} else if (_mode != GNUTLS_FIPS140_LAX) { \
_gnutls_debug_log("fips140-2: disallowing "__VA_ARGS__); \
return ret_error; \
} \
} \
}}
inline static bool
is_mac_algo_allowed(gnutls_mac_algorithm_t algo)
{
gnutls_fips_mode_t mode = _gnutls_fips_mode_enabled();
if (_gnutls_get_lib_state() != LIB_STATE_SELFTEST &&
!is_mac_algo_allowed_in_fips(algo)) {
switch (mode) {
case GNUTLS_FIPS140_LOG:
_gnutls_audit_log(NULL,
"fips140-2: allowing access to %s\n",
gnutls_mac_get_name(algo));
FALLTHROUGH;
case GNUTLS_FIPS140_DISABLED:
case GNUTLS_FIPS140_LAX:
return true;
default:
return false;
}
}
return true;
}
inline static bool
is_cipher_algo_allowed(gnutls_cipher_algorithm_t algo)
{
gnutls_fips_mode_t mode = _gnutls_fips_mode_enabled();
if (_gnutls_get_lib_state() != LIB_STATE_SELFTEST &&
!is_cipher_algo_allowed_in_fips(algo)) {
switch (mode) {
case GNUTLS_FIPS140_LOG:
_gnutls_audit_log(NULL, "fips140-2: allowing access to %s\n",
gnutls_cipher_get_name(algo));
FALLTHROUGH;
case GNUTLS_FIPS140_DISABLED:
case GNUTLS_FIPS140_LAX:
return true;
default:
return false;
}
}
return true;
}
#else
# define is_mac_algo_allowed(x) true
# define is_cipher_algo_allowed(x) true
# define FIPS_RULE(condition, ret_error, ...)
#endif
#endif /* GNUTLS_LIB_FIPS_H */
|