To meet FIPS 140 requirements, add support for building a kernel module "fips140.ko" that contains various cryptographic algorithms built from existing kernel source files. At load time, the module checks its own integrity and self-tests its algorithms, then registers the algorithms with the crypto API to supersede the original algorithms provided by the kernel itself. [ebiggers: this commit originated from "ANDROID: crypto: fips140 - perform load time integrity check", but I've folded many later commits into it to make forward porting easier. See below] Original commits from android12-5.10: *6be141eb36("ANDROID: crypto: fips140 - perform load time integrity check") *868be244bb("ANDROID: inject correct HMAC digest into fips140.ko at build time") *091338cb39("ANDROID: fips140: add missing static keyword to fips140_init()") *c799c6644b("ANDROID: fips140: adjust some log messages") *92de53472e("ANDROID: fips140: log already-live algorithms") *0af06624ea("ANDROID: fips140: check for errors from initcalls") *634445a640("ANDROID: fips140: fix deadlock in unregister_existing_fips140_algos()") *e886dd4c33("ANDROID: fips140: unregister existing DRBG algorithms") *b7397e89db("ANDROID: fips140: add power-up cryptographic self-tests") *50661975be("ANDROID: fips140: add/update module help text") *b397a0387c("ANDROID: fips140: test all implementations") *17ccefe140("ANDROID: fips140: use full 16-byte IV") *1be58af077("ANDROID: fips140: remove non-prediction-resistant DRBG test") *2b5843ae2d("ANDROID: fips140: add AES-CBC-CTS") *2ee56aad31("ANDROID: fips140: add AES-CMAC") *960ebb2b56("ANDROID: fips140: add jitterentropy to fips140 module") *e5b14396f9("ANDROID: fips140: take into account AES-GCM not being approvable") *52b70d491b("ANDROID: fips140: use FIPS140_CFLAGS when compiling fips140-selftests.c") *6b995f5a54("ANDROID: fips140: preserve RELA sections without relying on the module loader") *e45108ecff("ANDROID: fips140: block crypto operations until tests complete") *ecf9341134("ANDROID: fips140: remove in-place updating of live algorithms") *482b0323cf("ANDROID: fips140: zeroize temporary values from integrity check") *64d769e53f("ANDROID: fips140: add service indicators") *8d7f609cda("ANDROID: fips140: add name and version, and a function to retrieve them") *6b7c37f6c4("ANDROID: fips140: use UTS_RELEASE as FIPS version") *903e97a0ca("ANDROID: fips140: refactor evaluation testing support") *97fb2104fe("ANDROID: fips140: add support for injecting integrity error") *109f31ac23("ANDROID: fips140: add userspace interface for evaluation testing") Bug: 153614920 Bug: 188620248 Test: tested that the module builds and can be loaded on raven. Change-Id: I3fde49dbc3d16b149b072a27ba5b4c6219015c94 Signed-off-by: Ard Biesheuvel <ardb@google.com> Signed-off-by: Eric Biggers <ebiggers@google.com>
69 lines
2.7 KiB
C
69 lines
2.7 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/* Copyright 2021 Google LLC */
|
|
|
|
/*
|
|
* This header was automatically generated by gen_fips140_testvecs.py.
|
|
* Don't edit it directly.
|
|
*/
|
|
|
|
static const u8 fips_message[32] __initconst =
|
|
"This is a 32-byte test message.";
|
|
|
|
static const u8 fips_aes_key[16] __initconst = "128-bit AES key";
|
|
|
|
static const u8 fips_aes_iv[16] __initconst = "ABCDEFGHIJKLMNOP";
|
|
|
|
static const u8 fips_aes_cbc_ciphertext[32] __initconst =
|
|
"\x4c\x3e\xeb\x38\x8d\x1f\x28\xfd\xa2\x3b\xa9\xda\x36\xf2\x99\xe2"
|
|
"\x84\x84\x66\x37\x0a\x53\x68\x2f\x17\x95\x8d\x7f\xca\x5a\x68\x4e";
|
|
|
|
static const u8 fips_aes_ecb_ciphertext[32] __initconst =
|
|
"\xc1\x9d\xe6\xb8\xb2\x90\xff\xfe\xf2\x77\x18\xb0\x55\xd3\xee\xa9"
|
|
"\xe2\x6f\x4a\x32\x67\xfd\xb7\xa5\x2f\x4b\x6e\x1a\x86\x2b\x6e\x3a";
|
|
|
|
static const u8 fips_aes_ctr_ciphertext[32] __initconst =
|
|
"\xed\x06\x2c\xd0\xbc\x48\xd1\x2e\x6a\x4e\x13\xe9\xaa\x17\x40\xca"
|
|
"\x00\xb4\xaf\x3b\x4f\xee\x73\xd6\x6c\x41\xf6\x4c\x8b\x0d\x6a\x0f";
|
|
|
|
static const u8 fips_aes_gcm_assoc[22] __initconst = "associated data string";
|
|
|
|
static const u8 fips_aes_gcm_ciphertext[48] __initconst =
|
|
"\x37\x88\x3e\x1d\x58\x50\xda\x10\x07\xeb\x52\xdf\xea\x0a\x54\xd4"
|
|
"\x44\xbf\x88\x2a\xf3\x03\x03\x84\xaf\x8b\x96\xbd\xea\x65\x60\x6f"
|
|
"\x82\xfa\x51\xf4\x28\xad\x0c\xf1\xce\x0f\x91\xdd\x1a\x4c\x77\x5f";
|
|
|
|
static const u8 fips_aes_xts_key[32] __initconst =
|
|
"This is an AES-128-XTS key.";
|
|
|
|
static const u8 fips_aes_xts_ciphertext[32] __initconst =
|
|
"\x4f\xf7\x9f\x6c\x00\xa8\x30\xdf\xff\xf3\x25\x9c\xf6\x0b\x1b\xfd"
|
|
"\x3b\x34\x5e\x67\x7c\xf8\x8b\x68\x9a\xb9\x5a\x89\x51\x51\xbd\x35";
|
|
|
|
static const u8 fips_aes_cmac_digest[16] __initconst =
|
|
"\x0c\x05\xda\x64\x51\x0c\x8e\x6c\x86\x52\x46\xa8\x2d\xb1\xfe\x0f";
|
|
|
|
static const u8 fips_hmac_key[16] __initconst = "128-bit HMAC key";
|
|
|
|
static const u8 fips_sha1_digest[20] __initconst =
|
|
"\x1b\x78\xc7\x4b\xd5\xd4\x83\xb1\x58\xc5\x96\x83\x4f\x16\x8d\x15"
|
|
"\xb4\xaa\x22\x8c";
|
|
|
|
static const u8 fips_sha256_digest[32] __initconst =
|
|
"\x4e\x11\x83\x0c\x53\x80\x1e\x5f\x9b\x38\x33\x38\xe8\x74\x43\xb0"
|
|
"\xc1\x3a\xbe\xbf\x75\xf0\x12\x0f\x21\x33\xf5\x16\x33\xf1\xb0\x81";
|
|
|
|
static const u8 fips_hmac_sha256_digest[32] __initconst =
|
|
"\x63\x0e\xb5\x73\x79\xfc\xaf\x5f\x86\xe3\xaf\xf0\xc8\x36\xef\xd5"
|
|
"\x35\x8d\x40\x25\x38\xb3\x65\x72\x98\xf3\x59\xd8\x1e\x54\x4c\xa1";
|
|
|
|
static const u8 fips_sha512_digest[64] __initconst =
|
|
"\x32\xe0\x44\x23\xbd\xe3\xec\x28\xbf\xf1\x34\x11\xd5\xae\xbf\xd5"
|
|
"\xc0\x8e\xb5\xa1\x04\xef\x2f\x07\x84\xf1\xd9\x83\x0f\x6c\x31\xab"
|
|
"\xf7\xe7\x57\xfa\xf7\xae\xf0\x6f\xb2\x16\x08\x32\xcf\xc7\xef\x35"
|
|
"\xb3\x3b\x51\xb9\xfd\xe7\xff\x5e\xb2\x8b\xc6\x79\xe6\x14\x04\xb4";
|
|
|
|
/*
|
|
* This header was automatically generated by gen_fips140_testvecs.py.
|
|
* Don't edit it directly.
|
|
*/
|