Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adapt for Ubuntu Pro 22.04 #32

Merged
merged 4 commits into from
Sep 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 4 additions & 2 deletions .github/workflows/maven.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,19 +29,21 @@ jobs:
- name: Install OpenSSL FIPS
run: |
git clone https://github.com/openssl/openssl && cd openssl
git checkout openssl-3.0
git checkout openssl-3.0.2
sudo apt update && sudo apt install build-essential -y
./Configure enable-fips && make && sudo make install && sudo make install_fips
- name: Setup OpenSSL configuration
run: |
sudo mkdir -p /usr/local/ssl
sudo openssl fipsinstall -out /usr/local/ssl/fipsmodule.cnf -module /usr/local/lib64/ossl-modules/fips.so
sudo cat /usr/local/ssl/fipsmodule.cnf
sudo cp ${{ github.workspace }}/src/test/conf/openssl.cnf /usr/local/ssl/openssl.cnf
- name: Build with Maven
env:
JAVA_HOME: /usr/lib/jvm/java-21-openjdk-amd64/
run: mvn -B package --file pom.xml
- name: Upload logfile
uses: actions/upload-artifact@v2
uses: actions/upload-artifact@v4
if: always()
with:
name: maven-surefire-reports
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -57,8 +57,10 @@ public OpenSSLFIPSProvider() {

// Signatures
put("Signature.RSA", "com.canonical.openssl.signature.SignatureRSA");
put("Signature.ED448", "com.canonical.openssl.signature.SignatureED448");
put("Signature.ED25519", "com.canonical.openssl.signature.SignatureED25519");
// The openssl FIPS provider for Ubuntu Pro does not have support for ED448 and ED25519.
// There is lack of clarity over the FIPS approval status of these algorithms.
// put("Signature.ED448", "com.canonical.openssl.signature.SignatureED448");
// put("Signature.ED25519", "com.canonical.openssl.signature.SignatureED25519");

// Secret Key Factory
put("SecretKeyFactory.PBKDF2", "com.canonical.openssl.kdf.PBKDF2withSHA512");
Expand Down
10 changes: 9 additions & 1 deletion src/main/native/c/init.c
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,14 @@ OSSL_LIB_CTX *global_libctx = NULL;

OSSL_LIB_CTX* load_openssl_provider(const char *name, const char* conf_file_path) {
OSSL_LIB_CTX *libctx = OSSL_LIB_CTX_new();

if (OSSL_PROVIDER_available(libctx, "fips")) {
// The FIPS module has been loaded by default.
// The base module should also be loaded and the default model not loaded.
// There's nothing more to do. This is the Ubuntu Pro setup.
return libctx;
}

if (!OSSL_LIB_CTX_load_config(libctx, conf_file_path)) {
ERR_print_errors_fp(stderr);
}
Expand All @@ -43,7 +51,7 @@ OSSL_LIB_CTX* load_openssl_provider(const char *name, const char* conf_file_path
fprintf(stderr, "Failed to load the %s provider:\n", name);
ERR_print_errors_fp(stderr);
}

return libctx;
}

Expand Down
6 changes: 3 additions & 3 deletions src/main/native/c/mac.c
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ static void set_params(EVP_MAC_CTX *ctx, mac_params *params) {
}
_params[n_params] = OSSL_PARAM_construct_end();
if (0 == EVP_MAC_CTX_set_params(ctx, _params)) {
ERR_print_errors_fp(stdout);
ERR_print_errors_fp(stderr);
}
}

Expand All @@ -55,7 +55,7 @@ mac_context *mac_init(char *algorithm, byte *key, size_t key_length, mac_params
EVP_MAC_CTX *ctx = EVP_MAC_CTX_new(mac);
EVP_MAC_free(mac);
if (NULL == ctx) {
ERR_print_errors_fp(stdout);
ERR_print_errors_fp(stderr);
free_mac_context(new_ctx);
return NULL;
}
Expand All @@ -64,7 +64,7 @@ mac_context *mac_init(char *algorithm, byte *key, size_t key_length, mac_params
set_params(new_ctx->ctx, params);
}
if (0 == EVP_MAC_init(new_ctx->ctx, (const unsigned char*)key, key_length, NULL)) {
ERR_print_errors_fp(stdout);
ERR_print_errors_fp(stderr);
free_mac_context(new_ctx);
return NULL;
}
Expand Down
4 changes: 4 additions & 0 deletions src/main/native/c/signature.c
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,10 @@
sv_key *sv_init_key(OSSL_LIB_CTX *libctx, EVP_PKEY *pkey) {
sv_key *key = (sv_key*)malloc(sizeof(sv_key));
key->ctx = EVP_PKEY_CTX_new_from_pkey(libctx, pkey, NULL);
if (key->ctx == NULL) {
ERR_print_errors_fp(stderr);
return NULL;
}
return key;
}

Expand Down
12 changes: 0 additions & 12 deletions src/test/conf/openssl.cnf
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,6 @@ alg_section = algorithm_sect

# List of providers to load
[provider_sect]
default = default_sect
# The fips section name should match the section name inside the
# included fipsmodule.cnf.
fips = fips_sect
Expand All @@ -68,17 +67,6 @@ activate = 1
[algorithm_sect]
default_properties = fips=yes

# If no providers are activated explicitly, the default one is activated implicitly.
# See man 7 OSSL_PROVIDER-default for more details.
#
# If you add a section explicitly activating any other provider(s), you most
# probably need to explicitly activate the default provider, otherwise it
# becomes unavailable in openssl. As a consequence applications depending on
# OpenSSL may not work correctly which could lead to significant system
# problems including inability to remotely access the system.
[default_sect]
# activate = 1


####################################################################
[ ca ]
Expand Down
2 changes: 1 addition & 1 deletion src/test/java/MacTest.java
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ public void testHMAC_SHA3_512() throws Exception {
@Test
public void testKMAC_128() throws Exception {
runTest("KMAC-128",
new SecretKeySpec(Arrays.copyOfRange(key, 0, 4), "KMAC-128"),
new SecretKeySpec(Arrays.copyOfRange(key, 0, 16), "KMAC-128"),
"KMAC128");
}

Expand Down
4 changes: 2 additions & 2 deletions src/test/java/ProviderSanityTest.java
Original file line number Diff line number Diff line change
Expand Up @@ -109,8 +109,8 @@ public void testMessageDigests() {
@Test
public void testSignatures() {
test(Signature.class, "RSA", SignatureRSA.class, "sigSpi");
test(Signature.class, "ED448", SignatureED448.class, "sigSpi");
test(Signature.class, "ED25519", SignatureED25519.class, "sigSpi");
//test(Signature.class, "ED448", SignatureED448.class, "sigSpi");
//test(Signature.class, "ED25519", SignatureED25519.class, "sigSpi");
}

@Test
Expand Down
2 changes: 0 additions & 2 deletions src/test/java/SignatureTest.java
Original file line number Diff line number Diff line change
Expand Up @@ -60,14 +60,12 @@ public void testRSA() throws Exception {
testSignature("RSA", gen.pubKey, gen.privKey);
}

@Test
public void testED25519() throws Exception {
EdDSAPublicKey publicKey = new EdDSAPublicKey("src/test/keys/ed25519-pub.pem");
EdDSAPrivateKey privateKey = new EdDSAPrivateKey("src/test/keys/ed25519-priv.pem");
testSignature("ED25519", publicKey, privateKey);
}

@Test
public void testED448() throws Exception {
EdDSAPublicKey publicKey = new EdDSAPublicKey("src/test/keys/ed448-pub.pem");
EdDSAPrivateKey privateKey = new EdDSAPrivateKey("src/test/keys/ed448-priv.pem");
Expand Down
4 changes: 2 additions & 2 deletions src/test/native/mac.c
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ static unsigned char data[] =

void run_test(mac_context *ctx) {
if (NULL == ctx) {
printf("FAILED (Couldn't init CMAC)\n");
printf("FAILED (Couldn't init MAC)\n");
}

if(0 == (mac_update(ctx, data, sizeof(data)))) {
Expand Down Expand Up @@ -117,7 +117,7 @@ void test_gmac(OSSL_LIB_CTX *libctx) {

void test_kmac128(OSSL_LIB_CTX *libctx) {
printf("Testing KMAC-128: ");
mac_context *ctx = mac_init("KMAC-128", key, 4, NULL);
mac_context *ctx = mac_init("KMAC-128", key, 16, NULL);
run_test(ctx);
free_mac_context(ctx);
}
Expand Down
4 changes: 2 additions & 2 deletions src/test/native/signature.c
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ void test_ed448_sign_and_verify(OSSL_LIB_CTX *libctx) {
int main(int argc, char ** argv) {
OSSL_LIB_CTX *libctx = load_openssl_fips_provider("/usr/local/ssl/openssl.cnf");
test_rsa_sign_and_verify(libctx);
test_ed25519_sign_and_verify(libctx);
test_ed448_sign_and_verify(libctx);
//test_ed25519_sign_and_verify(libctx);
//test_ed448_sign_and_verify(libctx);
return rc;
}