summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorPauli <paul.dale@oracle.com>2019-11-01 12:47:06 +1000
committerPauli <paul.dale@oracle.com>2019-11-02 15:10:54 +1000
commit9fff0a4b0d6f3b7499f85cbd30e599db7f1b723b (patch)
tree593dba21a4cb06a27a50ac15948e406474d24c45 /crypto
parentc47a56d615a7baf974de85e7f609cacbf5297dd5 (diff)
DRBG: weaken the restriction on allowed digests.
The artificial restriction of digests for the HMAC and HASH DRBGs is lifted. Any fetchable digest is acceptable except XOF ones (such as SHAKE). In FIPS mode, the fetch remains internal to the provider so only a FIPS validated digest will be located. Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/10321)
Diffstat (limited to 'crypto')
-rw-r--r--crypto/rand/drbg_hash.c29
-rw-r--r--crypto/rand/drbg_hmac.c29
2 files changed, 6 insertions, 52 deletions
diff --git a/crypto/rand/drbg_hash.c b/crypto/rand/drbg_hash.c
index 72068c67c0..5ff1d117c9 100644
--- a/crypto/rand/drbg_hash.c
+++ b/crypto/rand/drbg_hash.c
@@ -309,33 +309,10 @@ int drbg_hash_init(RAND_DRBG *drbg)
RAND_DRBG_HASH *hash = &drbg->data.hash;
/*
- * Confirm digest is allowed. Outside FIPS_MODE we allow all non-legacy
- * digests. Inside FIPS_MODE we only allow approved digests. Also no XOF
- * digests (such as SHAKE).
+ * Confirm digest is allowed. We allow all digests that are not XOF
+ * (such as SHAKE). In FIPS mode, the fetch will fail for non-approved
+ * digests.
*/
- switch (drbg->type) {
- default:
- return 0;
-
- case NID_sha1:
- case NID_sha224:
- case NID_sha256:
- case NID_sha384:
- case NID_sha512:
- case NID_sha512_224:
- case NID_sha512_256:
- case NID_sha3_224:
- case NID_sha3_256:
- case NID_sha3_384:
- case NID_sha3_512:
-#ifndef FIPS_MODE
- case NID_blake2b512:
- case NID_blake2s256:
- case NID_sm3:
-#endif
- break;
- }
-
md = EVP_MD_fetch(drbg->libctx, ossl_prov_util_nid_to_name(drbg->type), "");
if (md == NULL)
return 0;
diff --git a/crypto/rand/drbg_hmac.c b/crypto/rand/drbg_hmac.c
index 0289070f81..0047d8c094 100644
--- a/crypto/rand/drbg_hmac.c
+++ b/crypto/rand/drbg_hmac.c
@@ -203,33 +203,10 @@ int drbg_hmac_init(RAND_DRBG *drbg)
RAND_DRBG_HMAC *hmac = &drbg->data.hmac;
/*
- * Confirm digest is allowed. Outside FIPS_MODE we allow all non-legacy
- * digests. Inside FIPS_MODE we only allow approved digests. Also no XOF
- * digests (such as SHAKE).
+ * Confirm digest is allowed. We allow all digests that are not XOF
+ * (such as SHAKE). In FIPS mode, the fetch will fail for non-approved
+ * digests.
*/
- switch (drbg->type) {
- default:
- return 0;
-
- case NID_sha1:
- case NID_sha224:
- case NID_sha256:
- case NID_sha384:
- case NID_sha512:
- case NID_sha512_224:
- case NID_sha512_256:
- case NID_sha3_224:
- case NID_sha3_256:
- case NID_sha3_384:
- case NID_sha3_512:
-#ifndef FIPS_MODE
- case NID_blake2b512:
- case NID_blake2s256:
- case NID_sm3:
-#endif
- break;
- }
-
md = EVP_MD_fetch(drbg->libctx, ossl_prov_util_nid_to_name(drbg->type), "");
if (md == NULL)
return 0;