File nss-CC-DSA_2k_selftest.patch of Package mozilla-nss.972

# HG changeset patch
# Parent  45b2c6c66ca7a7856ccfc3a58ba497e7a3edb1ed
Perform DSA selftest with 2048 bit keys

bsc#921781

diff --git a/lib/softoken/fipstest.c b/lib/softoken/fipstest.c
--- a/lib/softoken/fipstest.c
+++ b/lib/softoken/fipstest.c
@@ -73,16 +73,21 @@
 
 /* FIPS preprocessor directives for DSA.                        */
 #define FIPS_DSA_TYPE                           siBuffer
 #define FIPS_DSA_DIGEST_LENGTH                  20 /*  160-bits */
 #define FIPS_DSA_SUBPRIME_LENGTH                20 /*  160-bits */
 #define FIPS_DSA_SIGNATURE_LENGTH               40 /*  320-bits */
 #define FIPS_DSA_PRIME_LENGTH                  128 /* 1024-bits */
 #define FIPS_DSA_BASE_LENGTH                   128 /* 1024-bits */
+#define FIPS_DSA2_DIGEST_LENGTH                 32 /*  256-bits */
+#define FIPS_DSA2_SUBPRIME_LENGTH               32 /*  256-bits */
+#define FIPS_DSA2_SIGNATURE_LENGTH              64 /*  512-bits */
+#define FIPS_DSA2_PRIME_LENGTH                 256 /* 2048-bits */
+#define FIPS_DSA2_BASE_LENGTH                  256 /* 2048-bits */
 
 /* FIPS preprocessor directives for RNG.                        */
 #define FIPS_RNG_XKEY_LENGTH                    32  /* 256-bits */
 
 /* Do not test algorithms not approved for use in FIPS 140-2 - it adds
  * unnecessary time and code overhead for no noticable gain.
  * Build with -DRUN_ALL_SELFTESTS to compile the tests in
  */
@@ -1816,85 +1821,121 @@ sftk_fips_ECDSA_PowerUpSelfTest() {
 
 #endif /* NSS_DISABLE_ECC */
 
 static CK_RV
 sftk_fips_DSA_PowerUpSelfTest( void )
 {
     /* DSA Known P (1024-bits), Q (160-bits), and G (1024-bits) Values. */
     static const PRUint8 dsa_P[] = {
-         0x80,0xb0,0xd1,0x9d,0x6e,0xa4,0xf3,0x28, 
-         0x9f,0x24,0xa9,0x8a,0x49,0xd0,0x0c,0x63, 
-         0xe8,0x59,0x04,0xf9,0x89,0x4a,0x5e,0xc0, 
-         0x6d,0xd2,0x67,0x6b,0x37,0x81,0x83,0x0c,
-         0xfe,0x3a,0x8a,0xfd,0xa0,0x3b,0x08,0x91, 
-         0x1c,0xcb,0xb5,0x63,0xb0,0x1c,0x70,0xd0, 
-         0xae,0xe1,0x60,0x2e,0x12,0xeb,0x54,0xc7, 
-         0xcf,0xc6,0xcc,0xae,0x97,0x52,0x32,0x63,
-         0xd3,0xeb,0x55,0xea,0x2f,0x4c,0xd5,0xd7, 
-         0x3f,0xda,0xec,0x49,0x27,0x0b,0x14,0x56, 
-         0xc5,0x09,0xbe,0x4d,0x09,0x15,0x75,0x2b, 
-         0xa3,0x42,0x0d,0x03,0x71,0xdf,0x0f,0xf4,
-         0x0e,0xe9,0x0c,0x46,0x93,0x3d,0x3f,0xa6, 
-         0x6c,0xdb,0xca,0xe5,0xac,0x96,0xc8,0x64, 
-         0x5c,0xec,0x4b,0x35,0x65,0xfc,0xfb,0x5a, 
-         0x1b,0x04,0x1b,0xa1,0x0e,0xfd,0x88,0x15};
+	0xdc,0x81,0x2b,0x62,0xa3,0xfe,0xd8,0x5f,
+	0x08,0x79,0x9d,0xf6,0x1c,0x62,0xf9,0xab,
+	0x0d,0x01,0xf0,0x1f,0x5a,0x99,0x68,0xbe,
+	0x9e,0xa8,0x38,0x9b,0xea,0x41,0x85,0x98,
+	0x55,0x80,0x22,0x78,0x39,0x8b,0xc5,0xb2,
+	0x69,0x14,0x6c,0x4c,0x09,0x22,0x1c,0xea,
+	0x46,0x39,0x3e,0xc0,0xdc,0x41,0x02,0xa1,
+	0x08,0x11,0x12,0xb3,0x58,0xe1,0x46,0x98,
+	0xf3,0x80,0x46,0xa6,0xb3,0x66,0xaf,0x61,
+	0xbc,0xbc,0x43,0x2e,0x15,0x08,0xfc,0x44,
+	0xa8,0xfb,0x5c,0x7f,0x1d,0xfd,0x4c,0xcb,
+	0xac,0xec,0x71,0xb8,0x78,0x4a,0x25,0xaa,
+	0xc8,0xd4,0xde,0x4f,0x90,0x51,0xfc,0x83,
+	0xff,0x73,0x9c,0xda,0xea,0x36,0x37,0xd1,
+	0x3f,0x14,0xa1,0x1e,0xef,0x85,0x7c,0x8b,
+	0xab,0xa0,0x18,0x97,0x68,0x31,0x97,0xcb,
+	0x74,0x91,0x5d,0xee,0x72,0x2b,0xbf,0x1e,
+	0x2e,0xce,0xfd,0x27,0x09,0x19,0x98,0x60,
+	0x8c,0x23,0x62,0xe9,0x17,0xfc,0xcd,0xa2,
+	0x59,0xd4,0xb7,0x34,0xf7,0x74,0x8f,0x19,
+	0xc9,0x77,0x2c,0xaf,0x53,0x22,0x40,0x33,
+	0x03,0xb8,0x5d,0xef,0xe9,0x15,0xd4,0x75,
+	0x03,0x53,0x2f,0xa8,0x7c,0x8b,0xad,0xfd,
+	0xd3,0xc1,0xbf,0x9b,0xca,0xa3,0xef,0x06,
+	0x75,0x8d,0x23,0x60,0x4c,0x87,0x76,0x8e,
+	0xda,0x22,0x5d,0xe4,0x8a,0x50,0xb2,0xcf,
+	0x53,0x0d,0x82,0xe0,0xf2,0x36,0xdd,0x8a,
+	0x89,0xbf,0xbb,0x66,0x35,0x31,0x7d,0xf4,
+	0x34,0x26,0xf6,0x0e,0xe1,0x0a,0xc7,0x7a,
+	0x37,0xf7,0xf8,0x0d,0x7d,0x9e,0xb0,0xb8,
+	0xbd,0xc3,0xe0,0x83,0x46,0xb8,0x99,0x8f,
+	0x92,0x9c,0xa5,0xc2,0xb5,0xe7,0xd9,0xb5};
         
     static const PRUint8 dsa_Q[] = {
-         0xad,0x22,0x59,0xdf,0xe5,0xec,0x4c,0x6e, 
-         0xf9,0x43,0xf0,0x4b,0x2d,0x50,0x51,0xc6, 
-         0x91,0x99,0x8b,0xcf};
+	0xb6,0x69,0xf2,0x1c,0xd7,0x41,0xb4,0x8b,
+	0x99,0x10,0x11,0x28,0xc8,0xbf,0xbb,0x73,
+	0x24,0xe1,0x4f,0x1d,0x43,0x2e,0x1b,0x29,
+	0x25,0x7e,0x4e,0xdd,0xf0,0xba,0x6b,0xd1};
         
     static const PRUint8 dsa_G[] = {
-         0x78,0x6e,0xa9,0xd8,0xcd,0x4a,0x85,0xa4, 
-         0x45,0xb6,0x6e,0x5d,0x21,0x50,0x61,0xf6, 
-         0x5f,0xdf,0x5c,0x7a,0xde,0x0d,0x19,0xd3, 
-         0xc1,0x3b,0x14,0xcc,0x8e,0xed,0xdb,0x17,
-         0xb6,0xca,0xba,0x86,0xa9,0xea,0x51,0x2d, 
-         0xc1,0xa9,0x16,0xda,0xf8,0x7b,0x59,0x8a, 
-         0xdf,0xcb,0xa4,0x67,0x00,0x44,0xea,0x24, 
-         0x73,0xe5,0xcb,0x4b,0xaf,0x2a,0x31,0x25,
-         0x22,0x28,0x3f,0x16,0x10,0x82,0xf7,0xeb, 
-         0x94,0x0d,0xdd,0x09,0x22,0x14,0x08,0x79, 
-         0xba,0x11,0x0b,0xf1,0xff,0x2d,0x67,0xac, 
-         0xeb,0xb6,0x55,0x51,0x69,0x97,0xa7,0x25,
-         0x6b,0x9c,0xa0,0x9b,0xd5,0x08,0x9b,0x27, 
-         0x42,0x1c,0x7a,0x69,0x57,0xe6,0x2e,0xed, 
-         0xa9,0x5b,0x25,0xe8,0x1f,0xd2,0xed,0x1f, 
-         0xdf,0xe7,0x80,0x17,0xba,0x0d,0x4d,0x38};
+	0xd1,0xbe,0xb6,0xe3,0x2b,0x90,0x5e,0xef,
+	0x23,0xd0,0x21,0x90,0x58,0xb2,0xaf,0xb1,
+	0xb9,0xc7,0x3b,0x6a,0xc2,0xdd,0x09,0x7f,
+	0x26,0x81,0xdd,0xa9,0xb4,0x25,0x1f,0xab,
+	0x8e,0x57,0x5e,0x8a,0x2e,0x75,0xd2,0x00,
+	0xf5,0x18,0xd8,0xa5,0x5e,0x93,0x48,0x8a,
+	0x9f,0xbd,0xa5,0x4a,0xb8,0xde,0x31,0xd0,
+	0xea,0xeb,0x6a,0x02,0xc1,0x58,0xdb,0xdb,
+	0xb7,0xec,0xe8,0xe1,0xf1,0xbd,0x47,0xec,
+	0x89,0x15,0x09,0x80,0xa7,0x77,0x34,0x5d,
+	0x8f,0x45,0xc2,0x53,0x9d,0x2d,0xba,0xbb,
+	0x0d,0xed,0xd0,0x45,0xff,0x8c,0xbd,0xe9,
+	0xa9,0x84,0xa6,0x77,0xa6,0x8a,0x42,0x2a,
+	0xae,0xed,0xd6,0x45,0x7f,0x9a,0xca,0x12,
+	0x13,0x6c,0x6e,0x1a,0x60,0xf6,0x05,0x94,
+	0x51,0xef,0xd5,0x11,0xd1,0x44,0xe1,0x79,
+	0xa8,0x99,0x22,0xe6,0x96,0x77,0x69,0x34,
+	0xb6,0x76,0xf2,0xd8,0xfe,0xe2,0xee,0x40,
+	0x4c,0x90,0x3d,0x66,0xd3,0x7e,0x41,0xb5,
+	0x9b,0x3a,0x79,0xa7,0x8b,0x0e,0x20,0x6f,
+	0x3d,0x90,0x11,0x9a,0x0e,0x3d,0x6d,0x8a,
+	0x02,0x8d,0x01,0x15,0x56,0x8a,0x49,0xf6,
+	0x3d,0xdb,0x9e,0xbc,0xfe,0xd6,0x04,0xf8,
+	0x71,0x53,0x7e,0x46,0x42,0xce,0x4e,0xe1,
+	0x2c,0x1c,0xe6,0x87,0x05,0x9c,0xf4,0xa0,
+	0x17,0xde,0xdb,0xa6,0xe5,0x22,0x4d,0xc1,
+	0xdc,0xf4,0x15,0x96,0x17,0x59,0xea,0x4d,
+	0x0b,0x8c,0x99,0x8f,0xb4,0x9e,0x82,0xe6,
+	0x97,0xf6,0x6d,0xf4,0x02,0xc8,0x83,0x1e,
+	0xb6,0x57,0x96,0x45,0x2b,0x1f,0xbf,0x20,
+	0x3d,0x5e,0x8d,0x2e,0x55,0x0c,0x4f,0xed,
+	0x42,0x9f,0x35,0xf1,0x0f,0x69,0x4b,0xca};
 
     /* DSA Known Random Values (known random key block       is 160-bits)  */
     /*                     and (known random signature block is 160-bits). */
     static const PRUint8 dsa_known_random_key_block[] = {
-                                                      "Mozilla Rules World!"};
+                                                      "Mozilla Rules World Forever Now."};
     static const PRUint8 dsa_known_random_signature_block[] = {
-                                                      "Random DSA Signature"};
+                                                      "Random 256bit long DSA Signature"};
 
     /* DSA Known Digest (160-bits) */
-    static const PRUint8 dsa_known_digest[] = { "DSA Signature Digest" };
+    static const PRUint8 dsa_known_digest[] = { "Long enough DSA Signature Digest" };
 
     /* DSA Known Signature (320-bits). */
     static const PRUint8 dsa_known_signature[] = {
-        0x25,0x7c,0x3a,0x79,0x32,0x45,0xb7,0x32, 
-        0x70,0xca,0x62,0x63,0x2b,0xf6,0x29,0x2c, 
-        0x22,0x2a,0x03,0xce,0x48,0x15,0x11,0x72, 
-        0x7b,0x7e,0xf5,0x7a,0xf3,0x10,0x3b,0xde,
-        0x34,0xc1,0x9e,0xd7,0x27,0x9e,0x77,0x38};
+	0x36,0xab,0x18,0x27,0x00,0x9c,0x0c,0x1c,
+	0x54,0x88,0xf3,0x4c,0x51,0x3d,0x7d,0x2c,
+	0xc9,0x1b,0x35,0x02,0xe3,0x0b,0xc6,0x18,
+	0xd1,0x04,0xad,0x2d,0x4e,0x2a,0x75,0xdb,
+	0x1c,0x37,0x0d,0x14,0xea,0x5b,0x32,0x86,
+	0x26,0x00,0x30,0x30,0x8e,0xfa,0x51,0x44,
+	0xb5,0x23,0x41,0xd6,0x39,0xc3,0x8c,0x9c,
+	0x32,0x41,0x15,0xe0,0xb3,0xbf,0x59,0x5e};
 
     /* DSA variables. */
     DSAPrivateKey *        dsa_private_key;
     SECStatus              dsa_status;
     SECItem                dsa_signature_item;
     SECItem                dsa_digest_item;
     DSAPublicKey           dsa_public_key;
-    PRUint8                dsa_computed_signature[FIPS_DSA_SIGNATURE_LENGTH];
+    PRUint8                dsa_computed_signature[FIPS_DSA2_SIGNATURE_LENGTH];
     static const PQGParams dsa_pqg = { NULL,
-			    { FIPS_DSA_TYPE, (unsigned char *)dsa_P, FIPS_DSA_PRIME_LENGTH },
-			    { FIPS_DSA_TYPE, (unsigned char *)dsa_Q, FIPS_DSA_SUBPRIME_LENGTH },
-			    { FIPS_DSA_TYPE, (unsigned char *)dsa_G, FIPS_DSA_BASE_LENGTH }};
+			    { FIPS_DSA_TYPE, (unsigned char *)dsa_P, FIPS_DSA2_PRIME_LENGTH },
+			    { FIPS_DSA_TYPE, (unsigned char *)dsa_Q, FIPS_DSA2_SUBPRIME_LENGTH },
+			    { FIPS_DSA_TYPE, (unsigned char *)dsa_G, FIPS_DSA2_BASE_LENGTH }};
 
     /*******************************************/
     /* Generate a DSA public/private key pair. */
     /*******************************************/
 
     /* Generate a DSA public/private key pair. */
     dsa_status = DSA_NewKeyFromSeed(&dsa_pqg, dsa_known_random_key_block,
                                     &dsa_private_key);
@@ -1918,19 +1959,19 @@ sftk_fips_DSA_PowerUpSelfTest( void )
 
     /* Perform DSA signature process. */
     dsa_status = DSA_SignDigestWithSeed( dsa_private_key, 
                                          &dsa_signature_item,
                                          &dsa_digest_item,
                                          dsa_known_random_signature_block );
 
     if( ( dsa_status != SECSuccess ) ||
-        ( dsa_signature_item.len != FIPS_DSA_SIGNATURE_LENGTH ) ||
+        ( dsa_signature_item.len != FIPS_DSA2_SIGNATURE_LENGTH ) ||
         ( PORT_Memcmp( dsa_computed_signature, dsa_known_signature,
-                       FIPS_DSA_SIGNATURE_LENGTH ) != 0 ) ) {
+                       FIPS_DSA2_SIGNATURE_LENGTH ) != 0 ) ) {
         dsa_status = SECFailure;
     } else {
 
     /****************************************************/
     /* DSA Single-Round Known Answer Verification Test. */
     /****************************************************/
 
     /* Perform DSA verification process. */