/[smecontribs]/rpms/openssl3/contribs10/0062-fips-Expose-a-FIPS-indicator.patch
ViewVC logotype

Contents of /rpms/openssl3/contribs10/0062-fips-Expose-a-FIPS-indicator.patch

Parent Directory Parent Directory | Revision Log Revision Log | View Revision Graph Revision Graph


Revision 1.1 - (show annotations) (download)
Wed Jan 31 17:24:42 2024 UTC (9 months, 3 weeks ago) by jpp
Branch: MAIN
CVS Tags: openssl3-3_0_7-5_el7_sme_1, HEAD
Initial import

1 From e3d6fca1af033d00c47bcd8f9ba28fcf1aa476aa Mon Sep 17 00:00:00 2001
2 From: Clemens Lang <cllang@redhat.com>
3 Date: Tue, 7 Jun 2022 12:02:49 +0200
4 Subject: [PATCH] fips: Expose a FIPS indicator
5
6 FIPS 140-3 requires us to indicate whether an operation was using
7 approved services or not. The FIPS 140-3 implementation guidelines
8 provide two basic approaches to doing this: implicit indicators, and
9 explicit indicators.
10
11 Implicit indicators are basically the concept of "if the operation
12 passes, it was approved". We were originally aiming for implicit
13 indicators in our copy of OpenSSL. However, this proved to be a problem,
14 because we wanted to certify a signature service, and FIPS 140-3
15 requires that a signature service computes the digest to be signed
16 within the boundaries of the FIPS module. Since we were planning to
17 certify fips.so only, this means that EVP_PKEY_sign/EVP_PKEY_verify
18 would have to be blocked. Unfortunately, EVP_SignFinal uses
19 EVP_PKEY_sign internally, but outside of fips.so and thus outside of the
20 FIPS module boundary. This means that using implicit indicators in
21 combination with certifying only fips.so would require us to block both
22 EVP_PKEY_sign and EVP_SignFinal, which are the two APIs currently used
23 by most users of OpenSSL for signatures.
24
25 EVP_DigestSign would be acceptable, but has only been added in 3.0 and
26 is thus not yet widely used.
27
28 As a consequence, we've decided to introduce explicit indicators so that
29 EVP_PKEY_sign and EVP_SignFinal can continue to work for now, but
30 FIPS-aware applications can query the explicit indicator to check
31 whether the operation was approved.
32
33 To avoid affecting the ABI and public API too much, this is implemented
34 as an exported symbol in fips.so and a private header, so applications
35 that wish to use this will have to dlopen(3) fips.so, locate the
36 function using dlsym(3), and then call it. These applications will have
37 to build against the private header in order to use the returned
38 pointer.
39
40 Modify util/mkdef.pl to support exposing a symbol only for a specific
41 provider identified by its name and path.
42
43 Signed-off-by: Clemens Lang <cllang@redhat.com>
44 ---
45 doc/build.info | 6 ++
46 doc/man7/fips_module_indicators.pod | 154 ++++++++++++++++++++++++++++
47 providers/fips/fipsprov.c | 71 +++++++++++++
48 providers/fips/indicator.h | 66 ++++++++++++
49 util/mkdef.pl | 25 ++++-
50 util/providers.num | 1 +
51 6 files changed, 322 insertions(+), 1 deletion(-)
52 create mode 100644 doc/man7/fips_module_indicators.pod
53 create mode 100644 providers/fips/indicator.h
54
55 diff --git a/doc/build.info b/doc/build.info
56 index b0aa4297a4..af235113bb 100644
57 --- a/doc/build.info
58 +++ b/doc/build.info
59 @@ -4389,6 +4389,10 @@ DEPEND[html/man7/fips_module.html]=man7/fips_module.pod
60 GENERATE[html/man7/fips_module.html]=man7/fips_module.pod
61 DEPEND[man/man7/fips_module.7]=man7/fips_module.pod
62 GENERATE[man/man7/fips_module.7]=man7/fips_module.pod
63 +DEPEND[html/man7/fips_module_indicators.html]=man7/fips_module_indicators.pod
64 +GENERATE[html/man7/fips_module_indicators.html]=man7/fips_module_indicators.pod
65 +DEPEND[man/man7/fips_module_indicators.7]=man7/fips_module_indicators.pod
66 +GENERATE[man/man7/fips_module_indicators.7]=man7/fips_module_indicators.pod
67 DEPEND[html/man7/life_cycle-cipher.html]=man7/life_cycle-cipher.pod
68 GENERATE[html/man7/life_cycle-cipher.html]=man7/life_cycle-cipher.pod
69 DEPEND[man/man7/life_cycle-cipher.7]=man7/life_cycle-cipher.pod
70 @@ -4631,6 +4635,7 @@ html/man7/ct.html \
71 html/man7/des_modes.html \
72 html/man7/evp.html \
73 html/man7/fips_module.html \
74 +html/man7/fips_module_indicators.html \
75 html/man7/life_cycle-cipher.html \
76 html/man7/life_cycle-digest.html \
77 html/man7/life_cycle-kdf.html \
78 @@ -4754,6 +4759,7 @@ man/man7/ct.7 \
79 man/man7/des_modes.7 \
80 man/man7/evp.7 \
81 man/man7/fips_module.7 \
82 +man/man7/fips_module_indicators.7 \
83 man/man7/life_cycle-cipher.7 \
84 man/man7/life_cycle-digest.7 \
85 man/man7/life_cycle-kdf.7 \
86 diff --git a/doc/man7/fips_module_indicators.pod b/doc/man7/fips_module_indicators.pod
87 new file mode 100644
88 index 0000000000..23db2b395c
89 --- /dev/null
90 +++ b/doc/man7/fips_module_indicators.pod
91 @@ -0,0 +1,154 @@
92 +=pod
93 +
94 +=head1 NAME
95 +
96 +fips_module_indicators - Red Hat OpenSSL FIPS module indicators guide
97 +
98 +=head1 DESCRIPTION
99 +
100 +This guide documents how the Red Hat Enterprise Linux 9 OpenSSL FIPS provider
101 +implements Approved Security Service Indicators according to the FIPS 140-3
102 +Implementation Guidelines, section 2.4.C. See
103 +L<https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf>
104 +for the FIPS 140-3 Implementation Guidelines.
105 +
106 +For all approved services except signatures, the Red Hat OpenSSL FIPS provider
107 +uses the return code as the indicator as understood by FIPS 140-3. That means
108 +that every operation that succeeds denotes use of an approved security service.
109 +Operations that do not succeed may not have been approved security services, or
110 +may have been used incorrectly.
111 +
112 +For signatures, an explicit indicator API is available to determine whether
113 +a selected operation is an approved security service, in combination with the
114 +return code of the operation. For a signature operation to be approved, the
115 +explicit indicator must claim it as approved, and it must succeed.
116 +
117 +=head2 Querying the explicit indicator
118 +
119 +The Red Hat OpenSSL FIPS provider exports a symbol named
120 +I<redhat_ossl_query_fipsindicator> that provides information on which signature
121 +operations are approved security functions. To use this function, either link
122 +against I<fips.so> directly, or load it at runtime using dlopen(3) and
123 +dlsym(3).
124 +
125 + #include <openssl/core_dispatch.h>
126 + #include "providers/fips/indicator.h"
127 +
128 + void *provider = dlopen("/usr/lib64/ossl-modules/fips.so", RTLD_LAZY);
129 + if (provider == NULL) {
130 + fprintf(stderr, "%s\n", dlerror());
131 + // handle error
132 + }
133 +
134 + const OSSL_RH_FIPSINDICATOR_ALORITHM *(*redhat_ossl_query_fipsindicator)(int) \
135 + = dlsym(provider, "redhat_ossl_query_fipsindicator");
136 + if (redhat_ossl_query_fipsindicator == NULL) {
137 + fprintf(stderr, "%s\n", dlerror());
138 + fprintf(stderr, "Does your copy of fips.so have the required Red Hat"
139 + " patches?\n");
140 + // handle error
141 + }
142 +
143 +Note that this uses the I<providers/fips/indicator.h> header, which is not
144 +public. Install the I<openssl-debugsource> package from the I<BaseOS-debuginfo>
145 +repository using I<dnf debuginfo-install openssl> and include
146 +I</usr/src/debug/openssl-3.*/> in the compiler's include path.
147 +
148 +I<redhat_ossl_query_fipsindicator> expects an operation ID as its only
149 +argument. Currently, the only supported operation ID is I<OSSL_OP_SIGNATURE> to
150 +obtain the indicators for signature operations. On success, the return value is
151 +a pointer to an array of I<OSSL_RH_FIPSINDICATOR_STRUCT>s. On failure, NULL is
152 +returned. The last entry in the array is indicated by I<algorithm_names> being
153 +NULL.
154 +
155 + typedef struct ossl_rh_fipsindicator_algorithm_st {
156 + const char *algorithm_names; /* key */
157 + const char *property_definition; /* key */
158 + const OSSL_RH_FIPSINDICATOR_DISPATCH *indicators;
159 + } OSSL_RH_FIPSINDICATOR_ALGORITHM;
160 +
161 + typedef struct ossl_rh_fipsindicator_dispatch_st {
162 + int function_id;
163 + int approved;
164 + } OSSL_RH_FIPSINDICATOR_DISPATCH;
165 +
166 +The I<algorithm_names> field is a colon-separated list of algorithm names from
167 +one of the I<PROV_NAMES_...> constants, e.g., I<PROV_NAMES_RSA>. strtok(3) can
168 +be used to locate the appropriate entry. See the example below, where
169 +I<algorithm> contains the algorithm name to search for:
170 +
171 + const OSSL_RH_FIPSINDICATOR_DISPATCH *indicator_dispatch = NULL;
172 + const OSSL_RH_FIPSINDICATOR_ALGORITHM *indicator =
173 + redhat_ossl_query_fipsindicator(operation_id);
174 + if (indicator == NULL) {
175 + fprintf(stderr, "No indicator for operation, probably using implicit"
176 + " indicators.\n");
177 + // handle error
178 + }
179 +
180 + for (; indicator->algorithm_names != NULL; ++indicator) {
181 + char *algorithm_names = strdup(indicator->algorithm_names);
182 + if (algorithm_names == NULL) {
183 + perror("strdup(3)");
184 + // handle error
185 + }
186 +
187 + const char *algorithm_name = strtok(algorithm_names, ":");
188 + for (; algorithm_name != NULL; algorithm_name = strtok(NULL, ":")) {
189 + if (strcasecmp(algorithm_name, algorithm) == 0) {
190 + indicator_dispatch = indicator->indicators;
191 + free(algorithm_names);
192 + algorithm_names = NULL;
193 + break;
194 + }
195 + }
196 + free(algorithm_names);
197 + }
198 + if (indicator_dispatch == NULL) {
199 + fprintf(stderr, "No indicator for algorithm %s.\n", algorithm);
200 + // handle error
201 + }
202 +
203 +If an appropriate I<OSSL_RH_FIPSINDICATOR_DISPATCH> array is available for the
204 +given algorithm name, it maps function IDs to their approval status. The last
205 +entry is indicated by a zero I<function_id>. I<approved> is
206 +I<OSSL_RH_FIPSINDICATOR_APPROVED> if the operation is an approved security
207 +service, or part of an approved security service, or
208 +I<OSSL_RH_FIPSINDICATOR_UNAPPROVED> otherwise. Any other value is invalid.
209 +Function IDs are I<OSSL_FUNC_*> constants from I<openssl/core_dispatch.h>,
210 +e.g., I<OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE> or I<OSSL_FUNC_SIGNATURE_SIGN>.
211 +
212 +Assuming I<function_id> is the function in question, the following code can be
213 +used to query the approval status:
214 +
215 + for (; indicator_dispatch->function_id != 0; ++indicator_dispatch) {
216 + if (indicator_dispatch->function_id == function_id) {
217 + switch (indicator_dispatch->approved) {
218 + case OSSL_RH_FIPSINDICATOR_APPROVED:
219 + // approved security service
220 + break;
221 + case OSSL_RH_FIPSINDICATOR_UNAPPROVED:
222 + // unapproved security service
223 + break;
224 + default:
225 + // invalid result
226 + break;
227 + }
228 + break;
229 + }
230 + }
231 +
232 +=head1 SEE ALSO
233 +
234 +L<fips_module(7)>, L<provider(7)>
235 +
236 +=head1 COPYRIGHT
237 +
238 +Copyright 2022 Red Hat, Inc. All Rights Reserved.
239 +
240 +Licensed under the Apache License 2.0 (the "License"). You may not use
241 +this file except in compliance with the License. You can obtain a copy
242 +in the file LICENSE in the source distribution or at
243 +L<https://www.openssl.org/source/license.html>.
244 +
245 +=cut
246 diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
247 index de391ce067..1cfd71c5cf 100644
248 --- a/providers/fips/fipsprov.c
249 +++ b/providers/fips/fipsprov.c
250 @@ -23,6 +23,7 @@
251 #include "prov/seeding.h"
252 #include "self_test.h"
253 #include "internal/core.h"
254 +#include "indicator.h"
255
256 static const char FIPS_DEFAULT_PROPERTIES[] = "provider=fips,fips=yes";
257 static const char FIPS_UNAPPROVED_PROPERTIES[] = "provider=fips,fips=no";
258 @@ -425,6 +426,68 @@ static const OSSL_ALGORITHM fips_signature[] = {
259 { NULL, NULL, NULL }
260 };
261
262 +static const OSSL_RH_FIPSINDICATOR_DISPATCH redhat_rsa_signature_indicators[] = {
263 + { OSSL_FUNC_SIGNATURE_NEWCTX, OSSL_RH_FIPSINDICATOR_APPROVED },
264 + { OSSL_FUNC_SIGNATURE_SIGN_INIT, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
265 + { OSSL_FUNC_SIGNATURE_SIGN, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
266 + { OSSL_FUNC_SIGNATURE_VERIFY_INIT, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
267 + { OSSL_FUNC_SIGNATURE_VERIFY, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
268 + { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER_INIT, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
269 + { OSSL_FUNC_SIGNATURE_VERIFY_RECOVER, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
270 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT, OSSL_RH_FIPSINDICATOR_APPROVED },
271 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE, OSSL_RH_FIPSINDICATOR_APPROVED },
272 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL, OSSL_RH_FIPSINDICATOR_APPROVED },
273 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT, OSSL_RH_FIPSINDICATOR_APPROVED },
274 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE, OSSL_RH_FIPSINDICATOR_APPROVED },
275 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL, OSSL_RH_FIPSINDICATOR_APPROVED },
276 + { OSSL_FUNC_SIGNATURE_FREECTX, OSSL_RH_FIPSINDICATOR_APPROVED },
277 + { OSSL_FUNC_SIGNATURE_DUPCTX, OSSL_RH_FIPSINDICATOR_APPROVED },
278 + { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
279 + { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
280 + { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
281 + { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
282 + { OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
283 + { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
284 + { OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
285 + { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
286 + { 0, OSSL_RH_FIPSINDICATOR_UNAPPROVED }
287 +};
288 +
289 +static const OSSL_RH_FIPSINDICATOR_DISPATCH redhat_ecdsa_signature_indicators[] = {
290 + { OSSL_FUNC_SIGNATURE_NEWCTX, OSSL_RH_FIPSINDICATOR_APPROVED },
291 + { OSSL_FUNC_SIGNATURE_SIGN_INIT, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
292 + { OSSL_FUNC_SIGNATURE_SIGN, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
293 + { OSSL_FUNC_SIGNATURE_VERIFY_INIT, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
294 + { OSSL_FUNC_SIGNATURE_VERIFY, OSSL_RH_FIPSINDICATOR_UNAPPROVED },
295 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT, OSSL_RH_FIPSINDICATOR_APPROVED },
296 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_UPDATE, OSSL_RH_FIPSINDICATOR_APPROVED },
297 + { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL, OSSL_RH_FIPSINDICATOR_APPROVED },
298 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT, OSSL_RH_FIPSINDICATOR_APPROVED },
299 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_UPDATE, OSSL_RH_FIPSINDICATOR_APPROVED },
300 + { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_FINAL, OSSL_RH_FIPSINDICATOR_APPROVED },
301 + { OSSL_FUNC_SIGNATURE_FREECTX, OSSL_RH_FIPSINDICATOR_APPROVED },
302 + { OSSL_FUNC_SIGNATURE_DUPCTX, OSSL_RH_FIPSINDICATOR_APPROVED },
303 + { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
304 + { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
305 + { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
306 + { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
307 + { OSSL_FUNC_SIGNATURE_GET_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
308 + { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
309 + { OSSL_FUNC_SIGNATURE_SET_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
310 + { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_MD_PARAMS, OSSL_RH_FIPSINDICATOR_APPROVED },
311 + { 0, OSSL_RH_FIPSINDICATOR_UNAPPROVED }
312 +};
313 +
314 +static const OSSL_RH_FIPSINDICATOR_ALGORITHM redhat_indicator_fips_signature[] = {
315 + { PROV_NAMES_RSA, FIPS_DEFAULT_PROPERTIES,
316 + redhat_rsa_signature_indicators },
317 +#ifndef OPENSSL_NO_EC
318 + { PROV_NAMES_ECDSA, FIPS_DEFAULT_PROPERTIES,
319 + redhat_ecdsa_signature_indicators },
320 +#endif
321 + { NULL, NULL, NULL }
322 +};
323 +
324 static const OSSL_ALGORITHM fips_asym_cipher[] = {
325 { PROV_NAMES_RSA, FIPS_DEFAULT_PROPERTIES, ossl_rsa_asym_cipher_functions },
326 { NULL, NULL, NULL }
327 @@ -527,6 +590,14 @@ static void fips_deinit_casecmp(void) {
328 return NULL;
329 }
330
331 +const OSSL_RH_FIPSINDICATOR_ALGORITHM *redhat_ossl_query_fipsindicator(int operation_id) {
332 + switch (operation_id) {
333 + case OSSL_OP_SIGNATURE:
334 + return redhat_indicator_fips_signature;
335 + }
336 + return NULL;
337 +}
338 +
339 static void fips_teardown(void *provctx)
340 {
341 OSSL_LIB_CTX_free(PROV_LIBCTX_OF(provctx));
342 diff --git a/providers/fips/indicator.h b/providers/fips/indicator.h
343 new file mode 100644
344 index 0000000000..b323efe44c
345 --- /dev/null
346 +++ b/providers/fips/indicator.h
347 @@ -0,0 +1,66 @@
348 +/*
349 + * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
350 + *
351 + * Licensed under the Apache License 2.0 (the "License"). You may not use
352 + * this file except in compliance with the License. You can obtain a copy
353 + * in the file LICENSE in the source distribution or at
354 + * https://www.openssl.org/source/license.html
355 + */
356 +
357 +#ifndef OPENSSL_FIPS_INDICATOR_H
358 +# define OPENSSL_FIPS_INDICATOR_H
359 +# pragma once
360 +
361 +# ifdef __cplusplus
362 +extern "C" {
363 +# endif
364 +
365 +# define OSSL_RH_FIPSINDICATOR_UNAPPROVED (0)
366 +# define OSSL_RH_FIPSINDICATOR_APPROVED (1)
367 +
368 +/*
369 + * FIPS indicator dispatch table element. function_id numbers and the
370 + * functions are defined in core_dispatch.h, see macros with
371 + * 'OSSL_CORE_MAKE_FUNC' in their names.
372 + *
373 + * An array of these is always terminated by function_id == 0
374 + */
375 +typedef struct ossl_rh_fipsindicator_dispatch_st {
376 + int function_id;
377 + int approved;
378 +} OSSL_RH_FIPSINDICATOR_DISPATCH;
379 +
380 +/*
381 + * Type to tie together algorithm names, property definition string and the
382 + * algorithm implementation's FIPS indicator status in the form of a FIPS
383 + * indicator dispatch table.
384 + *
385 + * An array of these is always terminated by algorithm_names == NULL
386 + */
387 +typedef struct ossl_rh_fipsindicator_algorithm_st {
388 + const char *algorithm_names; /* key */
389 + const char *property_definition; /* key */
390 + const OSSL_RH_FIPSINDICATOR_DISPATCH *indicators;
391 +} OSSL_RH_FIPSINDICATOR_ALGORITHM;
392 +
393 +/**
394 + * Query FIPS indicator status for the given operation. Possible values for
395 + * 'operation_id' are currently only OSSL_OP_SIGNATURE, as all other algorithms
396 + * use implicit indicators. The return value is an array of
397 + * OSSL_RH_FIPSINDICATOR_ALGORITHMs, terminated by an entry with
398 + * algorithm_names == NULL. 'algorithm_names' is a colon-separated list of
399 + * algorithm names, 'property_definition' a comma-separated list of properties,
400 + * and 'indicators' is a list of OSSL_RH_FIPSINDICATOR_DISPATCH structs. This
401 + * list is terminated by function_id == 0. 'function_id' is one of the
402 + * OSSL_FUNC_* constants, e.g., OSSL_FUNC_SIGNATURE_DIGEST_SIGN_FINAL.
403 + *
404 + * If there is no entry in the returned struct for the given operation_id,
405 + * algorithm name, or function_id, the algorithm is unapproved.
406 + */
407 +const OSSL_RH_FIPSINDICATOR_ALGORITHM *redhat_ossl_query_fipsindicator(int operation_id);
408 +
409 +# ifdef __cplusplus
410 +}
411 +# endif
412 +
413 +#endif
414 diff --git a/util/mkdef.pl b/util/mkdef.pl
415 index a1c76f7c97..eda39b71ee 100755
416 --- a/util/mkdef.pl
417 +++ b/util/mkdef.pl
418 @@ -149,7 +149,8 @@ $ordinal_opts{filter} =
419 return
420 $item->exists()
421 && platform_filter($item)
422 - && feature_filter($item);
423 + && feature_filter($item)
424 + && fips_filter($item, $name);
425 };
426 my $ordinals = OpenSSL::Ordinals->new(from => $ordinals_file);
427
428 @@ -205,6 +206,28 @@ sub feature_filter {
429 return $verdict;
430 }
431
432 +sub fips_filter {
433 + my $item = shift;
434 + my $name = uc(shift);
435 + my @features = ( $item->features() );
436 +
437 + # True if no features are defined
438 + return 1 if scalar @features == 0;
439 +
440 + my @matches = grep(/^ONLY_.*$/, @features);
441 + if (@matches) {
442 + # There is at least one only_* flag on this symbol, check if any of
443 + # them match the name
444 + for (@matches) {
445 + if ($_ eq "ONLY_${name}") {
446 + return 1;
447 + }
448 + }
449 + return 0;
450 + }
451 + return 1;
452 +}
453 +
454 sub sorter_unix {
455 my $by_name = OpenSSL::Ordinals::by_name();
456 my %weight = (
457 diff --git a/util/providers.num b/util/providers.num
458 index 4e2fa81b98..77879d0e5f 100644
459 --- a/util/providers.num
460 +++ b/util/providers.num
461 @@ -1 +1,2 @@
462 OSSL_provider_init 1 * EXIST::FUNCTION:
463 +redhat_ossl_query_fipsindicator 1 * EXIST::FUNCTION:ONLY_PROVIDERS/FIPS
464 --
465 2.35.3
466

admin@koozali.org
ViewVC Help
Powered by ViewVC 1.2.1 RSS 2.0 feed