blob: c852c30d15757e32957d0de866f2e3cb2c790ed7 [file] [log] [blame]
kste47b6e172021-04-16 07:33:15 -07001// Copyright 2021 Google LLC
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14//
15///////////////////////////////////////////////////////////////////////////////
16#include "tink/internal/fips_utils.h"
17
18#include "gmock/gmock.h"
19#include "gtest/gtest.h"
lizatretyakova456657f2021-11-01 05:48:32 -070020#include "absl/status/status.h"
kste47b6e172021-04-16 07:33:15 -070021#include "openssl/crypto.h"
22#include "tink/util/status.h"
23#include "tink/util/test_matchers.h"
24
25namespace crypto {
26namespace tink {
ambrosin113db292023-04-20 06:13:22 -070027namespace internal {
kste47b6e172021-04-16 07:33:15 -070028namespace {
29
30using ::crypto::tink::test::IsOk;
31using ::crypto::tink::test::StatusIs;
32
33class FipsIncompatible {
34 public:
ambrosin113db292023-04-20 06:13:22 -070035 static constexpr FipsCompatibility kFipsStatus = FipsCompatibility::kNotFips;
kste47b6e172021-04-16 07:33:15 -070036};
37
38class FipsCompatibleWithBoringCrypto {
39 public:
ambrosin113db292023-04-20 06:13:22 -070040 static constexpr FipsCompatibility kFipsStatus =
41 FipsCompatibility::kRequiresBoringCrypto;
kste47b6e172021-04-16 07:33:15 -070042};
43
44TEST(FipsUtilsTest, CompatibilityInNonFipsMode) {
ambrosin113db292023-04-20 06:13:22 -070045 if (kUseOnlyFips) {
kste47b6e172021-04-16 07:33:15 -070046 GTEST_SKIP() << "Not supported in FIPS-only mode";
47 }
48
ambrosin113db292023-04-20 06:13:22 -070049 EXPECT_THAT(CheckFipsCompatibility<FipsIncompatible>(), IsOk());
50 EXPECT_THAT(CheckFipsCompatibility<FipsCompatibleWithBoringCrypto>(), IsOk());
kste47b6e172021-04-16 07:33:15 -070051}
52
53TEST(FipsUtilsTest, CompatibilityInFipsMode) {
ambrosin113db292023-04-20 06:13:22 -070054 if (!kUseOnlyFips || !IsFipsEnabledInSsl()) {
ksteccc05692021-04-16 09:29:25 -070055 GTEST_SKIP()
56 << "Test should only run in FIPS mode with Boringcrypto available.";
kste47b6e172021-04-16 07:33:15 -070057 }
58
ambrosin113db292023-04-20 06:13:22 -070059 EXPECT_THAT(CheckFipsCompatibility<FipsIncompatible>(),
lizatretyakova456657f2021-11-01 05:48:32 -070060 StatusIs(absl::StatusCode::kInternal));
ambrosin113db292023-04-20 06:13:22 -070061 EXPECT_THAT(CheckFipsCompatibility<FipsCompatibleWithBoringCrypto>(), IsOk());
kste47b6e172021-04-16 07:33:15 -070062}
63
64TEST(TinkFipsTest, CompatibilityInFipsModeWithoutBoringCrypto) {
ambrosin113db292023-04-20 06:13:22 -070065 if (!kUseOnlyFips || IsFipsEnabledInSsl()) {
kste47b6e172021-04-16 07:33:15 -070066 GTEST_SKIP() << "Test only run if BoringCrypto module is not available.";
67 }
68
69 // In FIPS only mode compatibility checks should disallow algorithms
70 // with the FipsCompatibility::kNone flag.
ambrosin113db292023-04-20 06:13:22 -070071 EXPECT_THAT(CheckFipsCompatibility<FipsIncompatible>(),
lizatretyakova456657f2021-11-01 05:48:32 -070072 StatusIs(absl::StatusCode::kInternal));
kste47b6e172021-04-16 07:33:15 -070073
74 // FIPS validated implementations are not allowed if BoringCrypto is not
75 // available.
ambrosin113db292023-04-20 06:13:22 -070076 EXPECT_THAT(CheckFipsCompatibility<FipsCompatibleWithBoringCrypto>(),
77 StatusIs(absl::StatusCode::kInternal));
kste47b6e172021-04-16 07:33:15 -070078}
79
80} // namespace
ambrosin113db292023-04-20 06:13:22 -070081} // namespace internal
kste47b6e172021-04-16 07:33:15 -070082} // namespace tink
83} // namespace crypto