Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AES-XTS into FIPS #592

Merged
merged 12 commits into from
Aug 22, 2022
Merged

AES-XTS into FIPS #592

merged 12 commits into from
Aug 22, 2022

Conversation

Taffer
Copy link
Contributor

@Taffer Taffer commented Aug 18, 2022

Issues:

Resolves CryptoAlg-1223

Description of changes:

Moves AES-XTS into the FIPS boundary, adds a service indicator test for the AES-XTS cipher. Extends the cipher tests in the service indicator to let each cipher specify its IV, plaintext, and expected ciphertext. Extends service indicator checks into EVP_EncryptUpdate() and EVP_DecryptUpdate().

Testing:

run_tests pass in non-FIPS and FIPS builds, I look forward to seeing what CI has to say.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@Taffer Taffer added the FIPS label Aug 18, 2022
@Taffer Taffer changed the title Aes xts into fips AES-XTS into FIPS Aug 18, 2022
Copy link
Contributor

@samuel40791765 samuel40791765 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: If we add NIST KATs to service_indicator_test.cc, I think we could add them to a separate parameterized test suite. It would be cleaner to see EVPServiceIndicatorTest test upon the same kPlaintext, kAESIV, kAESkey_256, etc. IMO. But this isn't a blocker and more of a test styling nitpick on my end.

@Taffer Taffer merged commit 678a047 into aws:main Aug 22, 2022
@Taffer Taffer deleted the aes-xts-into-fips branch August 22, 2022 15:45
kAESXTSCiphertext_256,
sizeof(kAESXTSCiphertext_256),
AWSLC_APPROVED,
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add a test vector with AWSLC_NOT_APPROVED as the expected result? For example, this negative test case: https://github.com/Taffer/aws-lc/blob/4e1fd6c8f10d21a374a6539b8f4d93c26b0e88ad/crypto/fipsmodule/modes/xts_test.cc#L543

@@ -314,6 +314,8 @@ void EVP_Cipher_verify_service_indicator(const EVP_CIPHER_CTX *ctx) {
case NID_aes_128_ctr:
case NID_aes_192_ctr:
case NID_aes_256_ctr:

case NID_aes_256_xts:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

EVP_Cipher_verify_service_indicator() is called within EVP_Cipher(), EVP_EncryptFinal_ex() and EVP_DecryptFinal_ex(). However, in the case of XTS, the Final functions are NOP, will we check in Update whether the cipher is xts to call EVP_Cipher_verify_service_indicator? Note also that in the case of xts, update can be called only once after init, it cannot be called repeatedly; it does the whole encryption in one shot to do the cipher stealing at the end.
I don't know if all the other ciphers listed here need to call final or not, but I guess yes.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In my opinion, I would keep the original service indicator implementation of leaving the checks within the *Final operations. *Final might be a no-op for XTS, but it was within our general service indicator usage guidance that this "*Final" step was our way of differentiating if the user had finished the "FIPS service". This general guidance goes for all the crypto functions within AWS-LC.
If we tried to add a check within EVP_Update, it would add additional complexity for us to maintain this outlier and our service indicator usage guidance would have to be updated as well.

@@ -799,11 +882,19 @@ static void TestOperation(const EVP_CIPHER *cipher, bool encrypt,
// |EVP_EncryptFinal_ex| and |EVP_DecryptFinal_ex| for approval at the end.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, this may have come up previously. The comment says we test

|EVP_EncryptFinal_ex| and |EVP_DecryptFinal_ex| for approval at the end.
But I don't see we're calling Init and Update to test that they won't set Approved, then call Final to test that it does set it. Is that done elsewhere?
Also, see my comment above in the case of xts particularly where update should return approved, unless we force the FIPS user to call final which would be a NOP but just to return Approved (to be tested that this is what will happen).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes this test was when of the first versions of the service indicator tests, so we hadn't checked for non-approval for Init and Update. "Taffer" has added a new non-approval check for Update on Line 116, but we should add one for init as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants