| /* Copyright (c) 2017, Google Inc. | 
 |  * | 
 |  * Permission to use, copy, modify, and/or distribute this software for any | 
 |  * purpose with or without fee is hereby granted, provided that the above | 
 |  * copyright notice and this permission notice appear in all copies. | 
 |  * | 
 |  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | 
 |  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | 
 |  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY | 
 |  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | 
 |  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | 
 |  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | 
 |  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ | 
 |  | 
 | #include <openssl/crypto.h> | 
 |  | 
 | #include "../../internal.h" | 
 | #include "../delocate.h" | 
 |  | 
 |  | 
 | int FIPS_mode(void) { | 
 | #if defined(BORINGSSL_FIPS) && !defined(OPENSSL_ASAN) | 
 |   return 1; | 
 | #else | 
 |   return 0; | 
 | #endif | 
 | } | 
 |  | 
 | int FIPS_mode_set(int on) { return on == FIPS_mode(); } | 
 |  | 
 | const char *FIPS_module_name(void) { return "BoringCrypto"; } | 
 |  | 
 | uint32_t FIPS_version(void) { | 
 |   return 20240407; | 
 | } | 
 |  | 
 | int FIPS_query_algorithm_status(const char *algorithm) { | 
 | #if defined(BORINGSSL_FIPS) | 
 |   static const char kApprovedAlgorithms[][13] = { | 
 |     "AES-CBC", | 
 |     "AES-CCM", | 
 |     "AES-CTR", | 
 |     "AES-ECB", | 
 |     "AES-GCM", | 
 |     "AES-KW", | 
 |     "AES-KWP", | 
 |     "ctrDRBG", | 
 |     "ECC-SSC", | 
 |     "ECDSA-sign", | 
 |     "ECDSA-verify", | 
 |     "FFC-SSC", | 
 |     "HMAC", | 
 |     "RSA-sign", | 
 |     "RSA-verify", | 
 |     "SHA-1", | 
 |     "SHA2-224", | 
 |     "SHA2-256", | 
 |     "SHA2-384", | 
 |     "SHA2-512", | 
 |     "SHA2-512/256", | 
 |   }; | 
 |   for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(kApprovedAlgorithms); i++) { | 
 |     if (strcmp(algorithm, kApprovedAlgorithms[i]) == 0) { | 
 |       return 1; | 
 |     } | 
 |   } | 
 | #endif  // BORINGSSL_FIPS | 
 |  | 
 |   return 0; | 
 | } | 
 |  | 
 | #if defined(BORINGSSL_FIPS_COUNTERS) | 
 |  | 
 | size_t FIPS_read_counter(enum fips_counter_t counter) { | 
 |   if (counter < 0 || counter > fips_counter_max) { | 
 |     abort(); | 
 |   } | 
 |  | 
 |   const size_t *array = | 
 |       CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_FIPS_COUNTERS); | 
 |   if (!array) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   return array[counter]; | 
 | } | 
 |  | 
 | void boringssl_fips_inc_counter(enum fips_counter_t counter) { | 
 |   if (counter < 0 || counter > fips_counter_max) { | 
 |     abort(); | 
 |   } | 
 |  | 
 |   size_t *array = | 
 |       CRYPTO_get_thread_local(OPENSSL_THREAD_LOCAL_FIPS_COUNTERS); | 
 |   if (!array) { | 
 |     const size_t num_bytes = sizeof(size_t) * (fips_counter_max + 1); | 
 |     array = OPENSSL_zalloc(num_bytes); | 
 |     if (!array) { | 
 |       return; | 
 |     } | 
 |  | 
 |     if (!CRYPTO_set_thread_local(OPENSSL_THREAD_LOCAL_FIPS_COUNTERS, array, | 
 |                                  OPENSSL_free)) { | 
 |       // |OPENSSL_free| has already been called by |CRYPTO_set_thread_local|. | 
 |       return; | 
 |     } | 
 |   } | 
 |  | 
 |   array[counter]++; | 
 | } | 
 |  | 
 | #else | 
 |  | 
 | size_t FIPS_read_counter(enum fips_counter_t counter) { return 0; } | 
 |  | 
 | // boringssl_fips_inc_counter is a no-op, inline function in internal.h in this | 
 | // case. That should let the compiler optimise away the callsites. | 
 |  | 
 | #endif |