| /* Copyright (c) 2021, Google Inc. |
| * |
| * Permission to use, copy, modify, and/or distribute this software for any |
| * purpose with or without fee is hereby granted, provided that the above |
| * copyright notice and this permission notice appear in all copies. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY |
| * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
| * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
| * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ |
| |
| #include <inttypes.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <unistd.h> |
| #include <string> |
| |
| #include <openssl/crypto.h> |
| #include <openssl/span.h> |
| |
| #include "modulewrapper.h" |
| |
| |
| static bool EqString(bssl::Span<const uint8_t> cmd, const char *str) { |
| return cmd.size() == strlen(str) && memcmp(str, cmd.data(), cmd.size()) == 0; |
| } |
| |
| int main(int argc, char **argv) { |
| if (argc == 2 && strcmp(argv[1], "--version") == 0) { |
| printf("Built for architecture: "); |
| |
| #if defined(OPENSSL_X86_64) |
| puts("x86-64 (64-bit)"); |
| #elif defined(OPENSSL_ARM) |
| puts("ARM (32-bit)"); |
| #elif defined(OPENSSL_AARCH64) |
| puts("aarch64 (64-bit)"); |
| #else |
| #error "FIPS build not supported on this architecture" |
| #endif |
| |
| if (!FIPS_mode()) { |
| printf("Module not in FIPS mode\n"); |
| abort(); |
| } |
| printf("Module is in FIPS mode\n"); |
| |
| const uint32_t module_version = FIPS_version(); |
| if (module_version == 0) { |
| printf("No module version set\n"); |
| abort(); |
| } |
| printf("Module: '%s', version: %" PRIu32 " hash:\n", FIPS_module_name(), |
| module_version); |
| |
| #if !defined(BORINGSSL_FIPS) |
| // |module_version| will be zero, so the non-FIPS build will never get |
| // this far. |
| printf("Non zero module version in non-FIPS build - should not happen!\n"); |
| abort(); |
| #elif defined(OPENSSL_ASAN) |
| printf("(not available when compiled for ASAN)"); |
| #else |
| const uint8_t *module_hash = FIPS_module_hash(); |
| for (size_t i = 0; i < SHA256_DIGEST_LENGTH; i++) { |
| printf("%02x", module_hash[i]); |
| } |
| printf("\n"); |
| #endif |
| printf("Hardware acceleration enabled: %s\n", |
| CRYPTO_has_asm() ? "yes" : "no"); |
| |
| return 0; |
| } else if (argc != 1) { |
| fprintf(stderr, "Usage: %s [--version]\n", argv[0]); |
| return 4; |
| } |
| |
| // modulewrapper buffers responses to the greatest degree allowed in order to |
| // fully exercise the async handling in acvptool. |
| std::unique_ptr<bssl::acvp::RequestBuffer> buffer = |
| bssl::acvp::RequestBuffer::New(); |
| const bssl::acvp::ReplyCallback write_reply = std::bind( |
| bssl::acvp::WriteReplyToFd, STDOUT_FILENO, std::placeholders::_1); |
| const bssl::acvp::ReplyCallback buffer_reply = |
| std::bind(bssl::acvp::WriteReplyToBuffer, std::placeholders::_1); |
| |
| for (;;) { |
| const bssl::Span<const bssl::Span<const uint8_t>> args = |
| ParseArgsFromFd(STDIN_FILENO, buffer.get()); |
| if (args.empty()) { |
| return 1; |
| } |
| |
| if (EqString(args[0], "flush")) { |
| if (!bssl::acvp::FlushBuffer(STDOUT_FILENO)) { |
| abort(); |
| } |
| continue; |
| } |
| |
| const bssl::acvp::Handler handler = bssl::acvp::FindHandler(args); |
| if (!handler) { |
| return 2; |
| } |
| |
| auto &reply_callback = |
| EqString(args[0], "getConfig") ? write_reply : buffer_reply; |
| if (!handler(args.subspan(1).data(), reply_callback)) { |
| const std::string name(reinterpret_cast<const char *>(args[0].data()), |
| args[0].size()); |
| fprintf(stderr, "\'%s\' operation failed.\n", name.c_str()); |
| return 3; |
| } |
| } |
| } |