/* Copyright 2021 The BoringSSL Authors * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include "modulewrapper.h" static bool EqString(bssl::Span cmd, const char *str) { return cmd.size() == strlen(str) && memcmp(str, cmd.data(), cmd.size()) == 0; } int main(int argc, char **argv) { if (argc == 2 && strcmp(argv[1], "--version") == 0) { printf("Built for architecture: "); #if defined(OPENSSL_X86_64) puts("x86-64 (64-bit)"); #elif defined(OPENSSL_ARM) puts("ARM (32-bit)"); #elif defined(OPENSSL_AARCH64) puts("aarch64 (64-bit)"); #else #error "FIPS build not supported on this architecture" #endif if (!FIPS_mode()) { printf("Module not in FIPS mode\n"); abort(); } printf("Module is in FIPS mode\n"); const uint32_t module_version = FIPS_version(); if (module_version == 0) { printf("No module version set\n"); abort(); } printf("Module: '%s', version: %" PRIu32 " hash:\n", FIPS_module_name(), module_version); #if !defined(BORINGSSL_FIPS) // |module_version| will be zero, so the non-FIPS build will never get // this far. printf("Non zero module version in non-FIPS build - should not happen!\n"); abort(); #elif defined(OPENSSL_ASAN) printf("(not available when compiled for ASAN)"); #else const uint8_t *module_hash = FIPS_module_hash(); for (size_t i = 0; i < SHA256_DIGEST_LENGTH; i++) { printf("%02x", module_hash[i]); } printf("\n"); #endif printf("Hardware acceleration enabled: %s\n", CRYPTO_has_asm() ? "yes" : "no"); return 0; } else if (argc != 1) { fprintf(stderr, "Usage: %s [--version]\n", argv[0]); return 4; } // modulewrapper buffers responses to the greatest degree allowed in order to // fully exercise the async handling in acvptool. std::unique_ptr buffer = bssl::acvp::RequestBuffer::New(); const bssl::acvp::ReplyCallback write_reply = std::bind( bssl::acvp::WriteReplyToFd, STDOUT_FILENO, std::placeholders::_1); const bssl::acvp::ReplyCallback buffer_reply = std::bind(bssl::acvp::WriteReplyToBuffer, std::placeholders::_1); for (;;) { const bssl::Span> args = ParseArgsFromFd(STDIN_FILENO, buffer.get()); if (args.empty()) { return 1; } if (EqString(args[0], "flush")) { if (!bssl::acvp::FlushBuffer(STDOUT_FILENO)) { abort(); } continue; } const bssl::acvp::Handler handler = bssl::acvp::FindHandler(args); if (!handler) { return 2; } auto &reply_callback = EqString(args[0], "getConfig") ? write_reply : buffer_reply; if (!handler(args.subspan(1).data(), reply_callback)) { const std::string name(reinterpret_cast(args[0].data()), args[0].size()); fprintf(stderr, "\'%s\' operation failed.\n", name.c_str()); return 3; } } }