forked from pool/gnutls
* libgnutls: New configure option to compile out DSA support The --disable-dsa configure option has been added to completely disable DSA algorithm support. * libgnutls: Experimental support for X25519Kyber768Draft00 key exchange in TLS. For testing purposes, the hybrid post-quantum key exchange defined in draft-tls-westerbaan-xyber768d00 has been implemented using liboqs. Since the algorithm is still not finalized, the support of this key exchange is disabled by default and can be enabled with the --with-liboqs configure option. * Rebase patches: - gnutls-FIPS-140-3-references.patch - gnutls-FIPS-HMAC-nettle-hogweed-gmp.patch OBS-URL: https://build.opensuse.org/package/show/security:tls/gnutls?expand=0&rev=113
32 lines
1.2 KiB
Diff
32 lines
1.2 KiB
Diff
Index: gnutls-3.8.5/lib/fips.c
|
|
===================================================================
|
|
--- gnutls-3.8.5.orig/lib/fips.c
|
|
+++ gnutls-3.8.5/lib/fips.c
|
|
@@ -593,6 +593,26 @@ int _gnutls_fips_perform_self_checks2(vo
|
|
return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
|
|
}
|
|
|
|
+ /* KDF */
|
|
+
|
|
+ char derived[512];
|
|
+
|
|
+ gnutls_datum_t secret = { (void *)"\x04\x50\xb0\xea\x9e\xcd\x36\x02\xee\x0d\x76\xc5\xc3\xc8\x6f\x4a", 16 };
|
|
+ gnutls_datum_t seed = { (void *)"\x20\x7a\xcc\x02\x54\xb8\x67\xf5\xb9\x25\xb4\x5a\x33\x60\x1d\x8b", 16 };
|
|
+ gnutls_datum_t label = { (void *)"test label", 10 };
|
|
+ gnutls_datum_t expected = { (void *)"\xae\x67\x9e\x0e\x71\x4f\x59\x75\x76\x37\x68\xb1\x66\x97\x9e\x1d", 16 };
|
|
+
|
|
+ ret = _gnutls_prf_raw(GNUTLS_MAC_SHA256, secret.size, secret.data,
|
|
+ label.size, (char*)label.data, seed.size, seed.data, expected.size, derived);
|
|
+ if (ret < 0) {
|
|
+ return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
|
|
+ }
|
|
+
|
|
+ ret = memcmp(derived, expected.data, expected.size);
|
|
+ if (ret != 0) {
|
|
+ return gnutls_assert_val(GNUTLS_E_SELF_TEST_ERROR);
|
|
+ }
|
|
+
|
|
/* PK */
|
|
if (_gnutls_config_is_rsa_pkcs1_encrypt_allowed()) {
|
|
ret = gnutls_pk_self_test(0, GNUTLS_PK_RSA);
|