gnutls/gnutls-FIPS-TLS_KDF_selftest.patch
Pedro Monreal Gonzalez b97f6df6c5 - Update to 3.8.7:
* libgnutls: New configure option to compile out DSA support
    The --disable-dsa configure option has been added to completely
    disable DSA algorithm support.
  * libgnutls: Experimental support for X25519Kyber768Draft00 key
    exchange in TLS. For testing purposes, the hybrid post-quantum
    key exchange defined in draft-tls-westerbaan-xyber768d00 has been
    implemented using liboqs. Since the algorithm is still not finalized,
    the support of this key exchange is disabled by default and can be
    enabled with the --with-liboqs configure option.
  * Rebase patches:
    - gnutls-FIPS-140-3-references.patch
    - gnutls-FIPS-HMAC-nettle-hogweed-gmp.patch

OBS-URL: https://build.opensuse.org/package/show/security:tls/gnutls?expand=0&rev=113
2024-09-04 09:29:34 +00:00

32 lines
1.2 KiB
Diff

Index: gnutls-3.8.5/lib/fips.c
===================================================================
--- gnutls-3.8.5.orig/lib/fips.c
+++ gnutls-3.8.5/lib/fips.c
@@ -593,6 +593,26 @@ int _gnutls_fips_perform_self_checks2(vo
return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
}
+ /* KDF */
+
+ char derived[512];
+
+ gnutls_datum_t secret = { (void *)"\x04\x50\xb0\xea\x9e\xcd\x36\x02\xee\x0d\x76\xc5\xc3\xc8\x6f\x4a", 16 };
+ gnutls_datum_t seed = { (void *)"\x20\x7a\xcc\x02\x54\xb8\x67\xf5\xb9\x25\xb4\x5a\x33\x60\x1d\x8b", 16 };
+ gnutls_datum_t label = { (void *)"test label", 10 };
+ gnutls_datum_t expected = { (void *)"\xae\x67\x9e\x0e\x71\x4f\x59\x75\x76\x37\x68\xb1\x66\x97\x9e\x1d", 16 };
+
+ ret = _gnutls_prf_raw(GNUTLS_MAC_SHA256, secret.size, secret.data,
+ label.size, (char*)label.data, seed.size, seed.data, expected.size, derived);
+ if (ret < 0) {
+ return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
+ }
+
+ ret = memcmp(derived, expected.data, expected.size);
+ if (ret != 0) {
+ return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
+ }
+
/* PK */
if (_gnutls_config_is_rsa_pkcs1_encrypt_allowed()) {
ret = gnutls_pk_self_test(0, GNUTLS_PK_RSA);