blob: e55410c76d6858cdcd862010ea229f6da9bbf014 [file] [log] [blame]
Jens Wiklander817466c2018-05-22 13:49:31 +02001/*
2 * Entropy accumulator implementation
3 *
Jerome Forissier79013242021-07-28 10:24:04 +02004 * Copyright The Mbed TLS Contributors
5 * SPDX-License-Identifier: Apache-2.0
Jens Wiklander817466c2018-05-22 13:49:31 +02006 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Jens Wiklander817466c2018-05-22 13:49:31 +020018 */
19
Jerome Forissier79013242021-07-28 10:24:04 +020020#include "common.h"
Jens Wiklander817466c2018-05-22 13:49:31 +020021
22#if defined(MBEDTLS_ENTROPY_C)
23
Jens Wiklander817466c2018-05-22 13:49:31 +020024#include "mbedtls/entropy.h"
Jens Wiklander32b31802023-10-06 16:59:46 +020025#include "entropy_poll.h"
Jens Wiklander3d3b0592019-03-20 15:30:29 +010026#include "mbedtls/platform_util.h"
Jerome Forissier11fa71b2020-04-20 17:17:56 +020027#include "mbedtls/error.h"
Jens Wiklander817466c2018-05-22 13:49:31 +020028
29#include <string.h>
30
31#if defined(MBEDTLS_FS_IO)
32#include <stdio.h>
33#endif
34
Jens Wiklander817466c2018-05-22 13:49:31 +020035#include "mbedtls/platform.h"
Jens Wiklander817466c2018-05-22 13:49:31 +020036
Jens Wiklander817466c2018-05-22 13:49:31 +020037#include "mbedtls/platform.h"
Jens Wiklander817466c2018-05-22 13:49:31 +020038
Jens Wiklander817466c2018-05-22 13:49:31 +020039
Jens Wiklander817466c2018-05-22 13:49:31 +020040#define ENTROPY_MAX_LOOP 256 /**< Maximum amount to loop before error */
41
Jens Wiklander32b31802023-10-06 16:59:46 +020042void mbedtls_entropy_init(mbedtls_entropy_context *ctx)
Jens Wiklander817466c2018-05-22 13:49:31 +020043{
Jens Wiklander3d3b0592019-03-20 15:30:29 +010044 ctx->source_count = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +020045 memset(ctx->source, 0, sizeof(ctx->source));
Jens Wiklander817466c2018-05-22 13:49:31 +020046
47#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +020048 mbedtls_mutex_init(&ctx->mutex);
Jens Wiklander817466c2018-05-22 13:49:31 +020049#endif
50
Jens Wiklander3d3b0592019-03-20 15:30:29 +010051 ctx->accumulator_started = 0;
Jens Wiklander817466c2018-05-22 13:49:31 +020052#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Jens Wiklander32b31802023-10-06 16:59:46 +020053 mbedtls_sha512_init(&ctx->accumulator);
Jens Wiklander817466c2018-05-22 13:49:31 +020054#else
Jens Wiklander32b31802023-10-06 16:59:46 +020055 mbedtls_sha256_init(&ctx->accumulator);
Jens Wiklander817466c2018-05-22 13:49:31 +020056#endif
57
Jens Wiklander3d3b0592019-03-20 15:30:29 +010058 /* Reminder: Update ENTROPY_HAVE_STRONG in the test files
59 * when adding more strong entropy sources here. */
60
Jens Wiklander817466c2018-05-22 13:49:31 +020061#if !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES)
62#if !defined(MBEDTLS_NO_PLATFORM_ENTROPY)
Jens Wiklander32b31802023-10-06 16:59:46 +020063 mbedtls_entropy_add_source(ctx, mbedtls_platform_entropy_poll, NULL,
64 MBEDTLS_ENTROPY_MIN_PLATFORM,
65 MBEDTLS_ENTROPY_SOURCE_STRONG);
Jens Wiklander817466c2018-05-22 13:49:31 +020066#endif
67#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Jens Wiklander32b31802023-10-06 16:59:46 +020068 mbedtls_entropy_add_source(ctx, mbedtls_hardware_poll, NULL,
69 MBEDTLS_ENTROPY_MIN_HARDWARE,
70 MBEDTLS_ENTROPY_SOURCE_STRONG);
Jens Wiklander817466c2018-05-22 13:49:31 +020071#endif
72#if defined(MBEDTLS_ENTROPY_NV_SEED)
Jens Wiklander32b31802023-10-06 16:59:46 +020073 mbedtls_entropy_add_source(ctx, mbedtls_nv_seed_poll, NULL,
74 MBEDTLS_ENTROPY_BLOCK_SIZE,
75 MBEDTLS_ENTROPY_SOURCE_STRONG);
Jens Wiklander3d3b0592019-03-20 15:30:29 +010076 ctx->initial_entropy_run = 0;
Jens Wiklander817466c2018-05-22 13:49:31 +020077#endif
78#endif /* MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES */
79}
80
Jens Wiklander32b31802023-10-06 16:59:46 +020081void mbedtls_entropy_free(mbedtls_entropy_context *ctx)
Jens Wiklander817466c2018-05-22 13:49:31 +020082{
Jerome Forissier79013242021-07-28 10:24:04 +020083 /* If the context was already free, don't call free() again.
84 * This is important for mutexes which don't allow double-free. */
Jens Wiklander32b31802023-10-06 16:59:46 +020085 if (ctx->accumulator_started == -1) {
Jerome Forissier79013242021-07-28 10:24:04 +020086 return;
Jens Wiklander32b31802023-10-06 16:59:46 +020087 }
Jerome Forissier79013242021-07-28 10:24:04 +020088
Jens Wiklander817466c2018-05-22 13:49:31 +020089#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +020090 mbedtls_mutex_free(&ctx->mutex);
Jens Wiklander817466c2018-05-22 13:49:31 +020091#endif
Jens Wiklander3d3b0592019-03-20 15:30:29 +010092#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Jens Wiklander32b31802023-10-06 16:59:46 +020093 mbedtls_sha512_free(&ctx->accumulator);
Jens Wiklander3d3b0592019-03-20 15:30:29 +010094#else
Jens Wiklander32b31802023-10-06 16:59:46 +020095 mbedtls_sha256_free(&ctx->accumulator);
Jens Wiklander3d3b0592019-03-20 15:30:29 +010096#endif
97#if defined(MBEDTLS_ENTROPY_NV_SEED)
98 ctx->initial_entropy_run = 0;
99#endif
100 ctx->source_count = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200101 mbedtls_platform_zeroize(ctx->source, sizeof(ctx->source));
Jerome Forissier79013242021-07-28 10:24:04 +0200102 ctx->accumulator_started = -1;
Jens Wiklander817466c2018-05-22 13:49:31 +0200103}
104
Jens Wiklander32b31802023-10-06 16:59:46 +0200105int mbedtls_entropy_add_source(mbedtls_entropy_context *ctx,
106 mbedtls_entropy_f_source_ptr f_source, void *p_source,
107 size_t threshold, int strong)
Jens Wiklander817466c2018-05-22 13:49:31 +0200108{
109 int idx, ret = 0;
110
111#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200112 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
113 return ret;
114 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200115#endif
116
117 idx = ctx->source_count;
Jens Wiklander32b31802023-10-06 16:59:46 +0200118 if (idx >= MBEDTLS_ENTROPY_MAX_SOURCES) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200119 ret = MBEDTLS_ERR_ENTROPY_MAX_SOURCES;
120 goto exit;
121 }
122
123 ctx->source[idx].f_source = f_source;
124 ctx->source[idx].p_source = p_source;
125 ctx->source[idx].threshold = threshold;
126 ctx->source[idx].strong = strong;
127
128 ctx->source_count++;
129
130exit:
131#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200132 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
133 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
134 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200135#endif
136
Jens Wiklander32b31802023-10-06 16:59:46 +0200137 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200138}
139
140/*
141 * Entropy accumulator update
142 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200143static int entropy_update(mbedtls_entropy_context *ctx, unsigned char source_id,
144 const unsigned char *data, size_t len)
Jens Wiklander817466c2018-05-22 13:49:31 +0200145{
146 unsigned char header[2];
147 unsigned char tmp[MBEDTLS_ENTROPY_BLOCK_SIZE];
148 size_t use_len = len;
149 const unsigned char *p = data;
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100150 int ret = 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200151
Jens Wiklander32b31802023-10-06 16:59:46 +0200152 if (use_len > MBEDTLS_ENTROPY_BLOCK_SIZE) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200153#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Jens Wiklander32b31802023-10-06 16:59:46 +0200154 if ((ret = mbedtls_sha512(data, len, tmp, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100155 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200156 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200157#else
Jens Wiklander32b31802023-10-06 16:59:46 +0200158 if ((ret = mbedtls_sha256(data, len, tmp, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100159 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200160 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200161#endif
162 p = tmp;
163 use_len = MBEDTLS_ENTROPY_BLOCK_SIZE;
164 }
165
166 header[0] = source_id;
167 header[1] = use_len & 0xFF;
168
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100169 /*
170 * Start the accumulator if this has not already happened. Note that
171 * it is sufficient to start the accumulator here only because all calls to
172 * gather entropy eventually execute this code.
173 */
Jens Wiklander817466c2018-05-22 13:49:31 +0200174#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Jens Wiklander32b31802023-10-06 16:59:46 +0200175 if (ctx->accumulator_started == 0 &&
176 (ret = mbedtls_sha512_starts(&ctx->accumulator, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100177 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200178 } else {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100179 ctx->accumulator_started = 1;
Jens Wiklander32b31802023-10-06 16:59:46 +0200180 }
181 if ((ret = mbedtls_sha512_update(&ctx->accumulator, header, 2)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100182 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200183 }
184 ret = mbedtls_sha512_update(&ctx->accumulator, p, use_len);
Jens Wiklander817466c2018-05-22 13:49:31 +0200185#else
Jens Wiklander32b31802023-10-06 16:59:46 +0200186 if (ctx->accumulator_started == 0 &&
187 (ret = mbedtls_sha256_starts(&ctx->accumulator, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100188 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200189 } else {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100190 ctx->accumulator_started = 1;
Jens Wiklander32b31802023-10-06 16:59:46 +0200191 }
192 if ((ret = mbedtls_sha256_update(&ctx->accumulator, header, 2)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100193 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200194 }
195 ret = mbedtls_sha256_update(&ctx->accumulator, p, use_len);
Jens Wiklander817466c2018-05-22 13:49:31 +0200196#endif
197
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100198cleanup:
Jens Wiklander32b31802023-10-06 16:59:46 +0200199 mbedtls_platform_zeroize(tmp, sizeof(tmp));
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100200
Jens Wiklander32b31802023-10-06 16:59:46 +0200201 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200202}
203
Jens Wiklander32b31802023-10-06 16:59:46 +0200204int mbedtls_entropy_update_manual(mbedtls_entropy_context *ctx,
205 const unsigned char *data, size_t len)
Jens Wiklander817466c2018-05-22 13:49:31 +0200206{
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200207 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Jens Wiklander817466c2018-05-22 13:49:31 +0200208
209#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200210 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
211 return ret;
212 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200213#endif
214
Jens Wiklander32b31802023-10-06 16:59:46 +0200215 ret = entropy_update(ctx, MBEDTLS_ENTROPY_SOURCE_MANUAL, data, len);
Jens Wiklander817466c2018-05-22 13:49:31 +0200216
217#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200218 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
219 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
220 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200221#endif
222
Jens Wiklander32b31802023-10-06 16:59:46 +0200223 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200224}
225
226/*
227 * Run through the different sources to add entropy to our accumulator
228 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200229static int entropy_gather_internal(mbedtls_entropy_context *ctx)
Jens Wiklander817466c2018-05-22 13:49:31 +0200230{
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200231 int ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
232 int i;
233 int have_one_strong = 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200234 unsigned char buf[MBEDTLS_ENTROPY_MAX_GATHER];
235 size_t olen;
236
Jens Wiklander32b31802023-10-06 16:59:46 +0200237 if (ctx->source_count == 0) {
238 return MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED;
239 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200240
241 /*
242 * Run through our entropy sources
243 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200244 for (i = 0; i < ctx->source_count; i++) {
245 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200246 have_one_strong = 1;
Jens Wiklander32b31802023-10-06 16:59:46 +0200247 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200248
249 olen = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200250 if ((ret = ctx->source[i].f_source(ctx->source[i].p_source,
251 buf, MBEDTLS_ENTROPY_MAX_GATHER, &olen)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100252 goto cleanup;
Jens Wiklander817466c2018-05-22 13:49:31 +0200253 }
254
255 /*
256 * Add if we actually gathered something
257 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200258 if (olen > 0) {
259 if ((ret = entropy_update(ctx, (unsigned char) i,
260 buf, olen)) != 0) {
261 return ret;
262 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200263 ctx->source[i].size += olen;
264 }
265 }
266
Jens Wiklander32b31802023-10-06 16:59:46 +0200267 if (have_one_strong == 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100268 ret = MBEDTLS_ERR_ENTROPY_NO_STRONG_SOURCE;
Jens Wiklander32b31802023-10-06 16:59:46 +0200269 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200270
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100271cleanup:
Jens Wiklander32b31802023-10-06 16:59:46 +0200272 mbedtls_platform_zeroize(buf, sizeof(buf));
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100273
Jens Wiklander32b31802023-10-06 16:59:46 +0200274 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200275}
276
277/*
278 * Thread-safe wrapper for entropy_gather_internal()
279 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200280int mbedtls_entropy_gather(mbedtls_entropy_context *ctx)
Jens Wiklander817466c2018-05-22 13:49:31 +0200281{
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200282 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Jens Wiklander817466c2018-05-22 13:49:31 +0200283
284#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200285 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
286 return ret;
287 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200288#endif
289
Jens Wiklander32b31802023-10-06 16:59:46 +0200290 ret = entropy_gather_internal(ctx);
Jens Wiklander817466c2018-05-22 13:49:31 +0200291
292#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200293 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
294 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
295 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200296#endif
297
Jens Wiklander32b31802023-10-06 16:59:46 +0200298 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200299}
300
Jens Wiklander32b31802023-10-06 16:59:46 +0200301int mbedtls_entropy_func(void *data, unsigned char *output, size_t len)
Jens Wiklander817466c2018-05-22 13:49:31 +0200302{
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200303 int ret, count = 0, i, thresholds_reached;
304 size_t strong_size;
Jens Wiklander817466c2018-05-22 13:49:31 +0200305 mbedtls_entropy_context *ctx = (mbedtls_entropy_context *) data;
306 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
307
Jens Wiklander32b31802023-10-06 16:59:46 +0200308 if (len > MBEDTLS_ENTROPY_BLOCK_SIZE) {
309 return MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
310 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200311
312#if defined(MBEDTLS_ENTROPY_NV_SEED)
313 /* Update the NV entropy seed before generating any entropy for outside
314 * use.
315 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200316 if (ctx->initial_entropy_run == 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200317 ctx->initial_entropy_run = 1;
Jens Wiklander32b31802023-10-06 16:59:46 +0200318 if ((ret = mbedtls_entropy_update_nv_seed(ctx)) != 0) {
319 return ret;
320 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200321 }
322#endif
323
324#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200325 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
326 return ret;
327 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200328#endif
329
330 /*
331 * Always gather extra entropy before a call
332 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200333 do {
334 if (count++ > ENTROPY_MAX_LOOP) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200335 ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
336 goto exit;
337 }
338
Jens Wiklander32b31802023-10-06 16:59:46 +0200339 if ((ret = entropy_gather_internal(ctx)) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200340 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200341 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200342
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200343 thresholds_reached = 1;
344 strong_size = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200345 for (i = 0; i < ctx->source_count; i++) {
346 if (ctx->source[i].size < ctx->source[i].threshold) {
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200347 thresholds_reached = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200348 }
349 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) {
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200350 strong_size += ctx->source[i].size;
Jens Wiklander32b31802023-10-06 16:59:46 +0200351 }
Jerome Forissier11fa71b2020-04-20 17:17:56 +0200352 }
Jens Wiklander32b31802023-10-06 16:59:46 +0200353 } while (!thresholds_reached || strong_size < MBEDTLS_ENTROPY_BLOCK_SIZE);
Jens Wiklander817466c2018-05-22 13:49:31 +0200354
Jens Wiklander32b31802023-10-06 16:59:46 +0200355 memset(buf, 0, MBEDTLS_ENTROPY_BLOCK_SIZE);
Jens Wiklander817466c2018-05-22 13:49:31 +0200356
357#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100358 /*
359 * Note that at this stage it is assumed that the accumulator was started
360 * in a previous call to entropy_update(). If this is not guaranteed, the
361 * code below will fail.
362 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200363 if ((ret = mbedtls_sha512_finish(&ctx->accumulator, buf)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100364 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200365 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200366
367 /*
368 * Reset accumulator and counters and recycle existing entropy
369 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200370 mbedtls_sha512_free(&ctx->accumulator);
371 mbedtls_sha512_init(&ctx->accumulator);
372 if ((ret = mbedtls_sha512_starts(&ctx->accumulator, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100373 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200374 }
375 if ((ret = mbedtls_sha512_update(&ctx->accumulator, buf,
376 MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100377 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200378 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200379
380 /*
381 * Perform second SHA-512 on entropy
382 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200383 if ((ret = mbedtls_sha512(buf, MBEDTLS_ENTROPY_BLOCK_SIZE,
384 buf, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100385 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200386 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200387#else /* MBEDTLS_ENTROPY_SHA512_ACCUMULATOR */
Jens Wiklander32b31802023-10-06 16:59:46 +0200388 if ((ret = mbedtls_sha256_finish(&ctx->accumulator, buf)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100389 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200390 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200391
392 /*
393 * Reset accumulator and counters and recycle existing entropy
394 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200395 mbedtls_sha256_free(&ctx->accumulator);
396 mbedtls_sha256_init(&ctx->accumulator);
397 if ((ret = mbedtls_sha256_starts(&ctx->accumulator, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100398 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200399 }
400 if ((ret = mbedtls_sha256_update(&ctx->accumulator, buf,
401 MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100402 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200403 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200404
405 /*
406 * Perform second SHA-256 on entropy
407 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200408 if ((ret = mbedtls_sha256(buf, MBEDTLS_ENTROPY_BLOCK_SIZE,
409 buf, 0)) != 0) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100410 goto exit;
Jens Wiklander32b31802023-10-06 16:59:46 +0200411 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200412#endif /* MBEDTLS_ENTROPY_SHA512_ACCUMULATOR */
413
Jens Wiklander32b31802023-10-06 16:59:46 +0200414 for (i = 0; i < ctx->source_count; i++) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200415 ctx->source[i].size = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200416 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200417
Jens Wiklander32b31802023-10-06 16:59:46 +0200418 memcpy(output, buf, len);
Jens Wiklander817466c2018-05-22 13:49:31 +0200419
420 ret = 0;
421
422exit:
Jens Wiklander32b31802023-10-06 16:59:46 +0200423 mbedtls_platform_zeroize(buf, sizeof(buf));
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100424
Jens Wiklander817466c2018-05-22 13:49:31 +0200425#if defined(MBEDTLS_THREADING_C)
Jens Wiklander32b31802023-10-06 16:59:46 +0200426 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
427 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
428 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200429#endif
430
Jens Wiklander32b31802023-10-06 16:59:46 +0200431 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200432}
433
434#if defined(MBEDTLS_ENTROPY_NV_SEED)
Jens Wiklander32b31802023-10-06 16:59:46 +0200435int mbedtls_entropy_update_nv_seed(mbedtls_entropy_context *ctx)
Jens Wiklander817466c2018-05-22 13:49:31 +0200436{
437 int ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100438 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
Jens Wiklander817466c2018-05-22 13:49:31 +0200439
440 /* Read new seed and write it to NV */
Jens Wiklander32b31802023-10-06 16:59:46 +0200441 if ((ret = mbedtls_entropy_func(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
442 return ret;
443 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200444
Jens Wiklander32b31802023-10-06 16:59:46 +0200445 if (mbedtls_nv_seed_write(buf, MBEDTLS_ENTROPY_BLOCK_SIZE) < 0) {
446 return MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
447 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200448
449 /* Manually update the remaining stream with a separator value to diverge */
Jens Wiklander32b31802023-10-06 16:59:46 +0200450 memset(buf, 0, MBEDTLS_ENTROPY_BLOCK_SIZE);
451 ret = mbedtls_entropy_update_manual(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE);
Jens Wiklander817466c2018-05-22 13:49:31 +0200452
Jens Wiklander32b31802023-10-06 16:59:46 +0200453 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200454}
455#endif /* MBEDTLS_ENTROPY_NV_SEED */
456
457#if defined(MBEDTLS_FS_IO)
Jens Wiklander32b31802023-10-06 16:59:46 +0200458int mbedtls_entropy_write_seed_file(mbedtls_entropy_context *ctx, const char *path)
Jens Wiklander817466c2018-05-22 13:49:31 +0200459{
Jerome Forissier79013242021-07-28 10:24:04 +0200460 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
461 FILE *f = NULL;
Jens Wiklander817466c2018-05-22 13:49:31 +0200462 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
463
Jens Wiklander32b31802023-10-06 16:59:46 +0200464 if ((ret = mbedtls_entropy_func(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Jerome Forissier79013242021-07-28 10:24:04 +0200465 ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
Jens Wiklander817466c2018-05-22 13:49:31 +0200466 goto exit;
Jerome Forissier79013242021-07-28 10:24:04 +0200467 }
468
Jens Wiklander32b31802023-10-06 16:59:46 +0200469 if ((f = fopen(path, "wb")) == NULL) {
Jerome Forissier79013242021-07-28 10:24:04 +0200470 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
471 goto exit;
472 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200473
Jens Wiklander32b31802023-10-06 16:59:46 +0200474 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
475 mbedtls_setbuf(f, NULL);
476
477 if (fwrite(buf, 1, MBEDTLS_ENTROPY_BLOCK_SIZE, f) != MBEDTLS_ENTROPY_BLOCK_SIZE) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200478 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
479 goto exit;
480 }
481
482 ret = 0;
483
484exit:
Jens Wiklander32b31802023-10-06 16:59:46 +0200485 mbedtls_platform_zeroize(buf, sizeof(buf));
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100486
Jens Wiklander32b31802023-10-06 16:59:46 +0200487 if (f != NULL) {
488 fclose(f);
489 }
Jerome Forissier79013242021-07-28 10:24:04 +0200490
Jens Wiklander32b31802023-10-06 16:59:46 +0200491 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200492}
493
Jens Wiklander32b31802023-10-06 16:59:46 +0200494int mbedtls_entropy_update_seed_file(mbedtls_entropy_context *ctx, const char *path)
Jens Wiklander817466c2018-05-22 13:49:31 +0200495{
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100496 int ret = 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200497 FILE *f;
498 size_t n;
Jens Wiklander32b31802023-10-06 16:59:46 +0200499 unsigned char buf[MBEDTLS_ENTROPY_MAX_SEED_SIZE];
Jens Wiklander817466c2018-05-22 13:49:31 +0200500
Jens Wiklander32b31802023-10-06 16:59:46 +0200501 if ((f = fopen(path, "rb")) == NULL) {
502 return MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
503 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200504
Jens Wiklander32b31802023-10-06 16:59:46 +0200505 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
506 mbedtls_setbuf(f, NULL);
Jens Wiklander817466c2018-05-22 13:49:31 +0200507
Jens Wiklander32b31802023-10-06 16:59:46 +0200508 fseek(f, 0, SEEK_END);
509 n = (size_t) ftell(f);
510 fseek(f, 0, SEEK_SET);
511
512 if (n > MBEDTLS_ENTROPY_MAX_SEED_SIZE) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200513 n = MBEDTLS_ENTROPY_MAX_SEED_SIZE;
Jens Wiklander32b31802023-10-06 16:59:46 +0200514 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200515
Jens Wiklander32b31802023-10-06 16:59:46 +0200516 if (fread(buf, 1, n, f) != n) {
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100517 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
Jens Wiklander32b31802023-10-06 16:59:46 +0200518 } else {
519 ret = mbedtls_entropy_update_manual(ctx, buf, n);
520 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200521
Jens Wiklander32b31802023-10-06 16:59:46 +0200522 fclose(f);
Jens Wiklander817466c2018-05-22 13:49:31 +0200523
Jens Wiklander32b31802023-10-06 16:59:46 +0200524 mbedtls_platform_zeroize(buf, sizeof(buf));
Jens Wiklander3d3b0592019-03-20 15:30:29 +0100525
Jens Wiklander32b31802023-10-06 16:59:46 +0200526 if (ret != 0) {
527 return ret;
528 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200529
Jens Wiklander32b31802023-10-06 16:59:46 +0200530 return mbedtls_entropy_write_seed_file(ctx, path);
Jens Wiklander817466c2018-05-22 13:49:31 +0200531}
532#endif /* MBEDTLS_FS_IO */
533
534#if defined(MBEDTLS_SELF_TEST)
Jens Wiklander817466c2018-05-22 13:49:31 +0200535/*
536 * Dummy source function
537 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200538static int entropy_dummy_source(void *data, unsigned char *output,
539 size_t len, size_t *olen)
Jens Wiklander817466c2018-05-22 13:49:31 +0200540{
541 ((void) data);
542
Jens Wiklander32b31802023-10-06 16:59:46 +0200543 memset(output, 0x2a, len);
Jens Wiklander817466c2018-05-22 13:49:31 +0200544 *olen = len;
545
Jens Wiklander32b31802023-10-06 16:59:46 +0200546 return 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200547}
Jens Wiklander817466c2018-05-22 13:49:31 +0200548
549#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
550
Jens Wiklander32b31802023-10-06 16:59:46 +0200551static int mbedtls_entropy_source_self_test_gather(unsigned char *buf, size_t buf_len)
Jens Wiklander817466c2018-05-22 13:49:31 +0200552{
553 int ret = 0;
554 size_t entropy_len = 0;
555 size_t olen = 0;
556 size_t attempts = buf_len;
557
Jens Wiklander32b31802023-10-06 16:59:46 +0200558 while (attempts > 0 && entropy_len < buf_len) {
559 if ((ret = mbedtls_hardware_poll(NULL, buf + entropy_len,
560 buf_len - entropy_len, &olen)) != 0) {
561 return ret;
562 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200563
564 entropy_len += olen;
565 attempts--;
566 }
567
Jens Wiklander32b31802023-10-06 16:59:46 +0200568 if (entropy_len < buf_len) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200569 ret = 1;
570 }
571
Jens Wiklander32b31802023-10-06 16:59:46 +0200572 return ret;
Jens Wiklander817466c2018-05-22 13:49:31 +0200573}
574
575
Jens Wiklander32b31802023-10-06 16:59:46 +0200576static int mbedtls_entropy_source_self_test_check_bits(const unsigned char *buf,
577 size_t buf_len)
Jens Wiklander817466c2018-05-22 13:49:31 +0200578{
Jens Wiklander32b31802023-10-06 16:59:46 +0200579 unsigned char set = 0xFF;
Jens Wiklander817466c2018-05-22 13:49:31 +0200580 unsigned char unset = 0x00;
581 size_t i;
582
Jens Wiklander32b31802023-10-06 16:59:46 +0200583 for (i = 0; i < buf_len; i++) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200584 set &= buf[i];
585 unset |= buf[i];
586 }
587
Jens Wiklander32b31802023-10-06 16:59:46 +0200588 return set == 0xFF || unset == 0x00;
Jens Wiklander817466c2018-05-22 13:49:31 +0200589}
590
591/*
Jens Wiklander32b31802023-10-06 16:59:46 +0200592 * A test to ensure that the entropy sources are functioning correctly
Jens Wiklander817466c2018-05-22 13:49:31 +0200593 * and there is no obvious failure. The test performs the following checks:
594 * - The entropy source is not providing only 0s (all bits unset) or 1s (all
595 * bits set).
596 * - The entropy source is not providing values in a pattern. Because the
597 * hardware could be providing data in an arbitrary length, this check polls
598 * the hardware entropy source twice and compares the result to ensure they
599 * are not equal.
600 * - The error code returned by the entropy source is not an error.
601 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200602int mbedtls_entropy_source_self_test(int verbose)
Jens Wiklander817466c2018-05-22 13:49:31 +0200603{
604 int ret = 0;
Jens Wiklander32b31802023-10-06 16:59:46 +0200605 unsigned char buf0[2 * sizeof(unsigned long long int)];
606 unsigned char buf1[2 * sizeof(unsigned long long int)];
Jens Wiklander817466c2018-05-22 13:49:31 +0200607
Jens Wiklander32b31802023-10-06 16:59:46 +0200608 if (verbose != 0) {
609 mbedtls_printf(" ENTROPY_BIAS test: ");
610 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200611
Jens Wiklander32b31802023-10-06 16:59:46 +0200612 memset(buf0, 0x00, sizeof(buf0));
613 memset(buf1, 0x00, sizeof(buf1));
Jens Wiklander817466c2018-05-22 13:49:31 +0200614
Jens Wiklander32b31802023-10-06 16:59:46 +0200615 if ((ret = mbedtls_entropy_source_self_test_gather(buf0, sizeof(buf0))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200616 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200617 }
618 if ((ret = mbedtls_entropy_source_self_test_gather(buf1, sizeof(buf1))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200619 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200620 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200621
622 /* Make sure that the returned values are not all 0 or 1 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200623 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf0, sizeof(buf0))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200624 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200625 }
626 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf1, sizeof(buf1))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200627 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200628 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200629
630 /* Make sure that the entropy source is not returning values in a
631 * pattern */
Jens Wiklander32b31802023-10-06 16:59:46 +0200632 ret = memcmp(buf0, buf1, sizeof(buf0)) == 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200633
634cleanup:
Jens Wiklander32b31802023-10-06 16:59:46 +0200635 if (verbose != 0) {
636 if (ret != 0) {
637 mbedtls_printf("failed\n");
638 } else {
639 mbedtls_printf("passed\n");
640 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200641
Jens Wiklander32b31802023-10-06 16:59:46 +0200642 mbedtls_printf("\n");
Jens Wiklander817466c2018-05-22 13:49:31 +0200643 }
644
Jens Wiklander32b31802023-10-06 16:59:46 +0200645 return ret != 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200646}
647
648#endif /* MBEDTLS_ENTROPY_HARDWARE_ALT */
649
650/*
651 * The actual entropy quality is hard to test, but we can at least
652 * test that the functions don't cause errors and write the correct
653 * amount of data to buffers.
654 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200655int mbedtls_entropy_self_test(int verbose)
Jens Wiklander817466c2018-05-22 13:49:31 +0200656{
657 int ret = 1;
Jens Wiklander817466c2018-05-22 13:49:31 +0200658 mbedtls_entropy_context ctx;
659 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE] = { 0 };
660 unsigned char acc[MBEDTLS_ENTROPY_BLOCK_SIZE] = { 0 };
661 size_t i, j;
Jens Wiklander817466c2018-05-22 13:49:31 +0200662
Jens Wiklander32b31802023-10-06 16:59:46 +0200663 if (verbose != 0) {
664 mbedtls_printf(" ENTROPY test: ");
665 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200666
Jens Wiklander32b31802023-10-06 16:59:46 +0200667 mbedtls_entropy_init(&ctx);
Jens Wiklander817466c2018-05-22 13:49:31 +0200668
669 /* First do a gather to make sure we have default sources */
Jens Wiklander32b31802023-10-06 16:59:46 +0200670 if ((ret = mbedtls_entropy_gather(&ctx)) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200671 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200672 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200673
Jens Wiklander32b31802023-10-06 16:59:46 +0200674 ret = mbedtls_entropy_add_source(&ctx, entropy_dummy_source, NULL, 16,
675 MBEDTLS_ENTROPY_SOURCE_WEAK);
676 if (ret != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200677 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200678 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200679
Jens Wiklander32b31802023-10-06 16:59:46 +0200680 if ((ret = mbedtls_entropy_update_manual(&ctx, buf, sizeof(buf))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200681 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200682 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200683
684 /*
685 * To test that mbedtls_entropy_func writes correct number of bytes:
686 * - use the whole buffer and rely on ASan to detect overruns
687 * - collect entropy 8 times and OR the result in an accumulator:
688 * any byte should then be 0 with probably 2^(-64), so requiring
689 * each of the 32 or 64 bytes to be non-zero has a false failure rate
690 * of at most 2^(-58) which is acceptable.
691 */
Jens Wiklander32b31802023-10-06 16:59:46 +0200692 for (i = 0; i < 8; i++) {
693 if ((ret = mbedtls_entropy_func(&ctx, buf, sizeof(buf))) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200694 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200695 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200696
Jens Wiklander32b31802023-10-06 16:59:46 +0200697 for (j = 0; j < sizeof(buf); j++) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200698 acc[j] |= buf[j];
Jens Wiklander32b31802023-10-06 16:59:46 +0200699 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200700 }
701
Jens Wiklander32b31802023-10-06 16:59:46 +0200702 for (j = 0; j < sizeof(buf); j++) {
703 if (acc[j] == 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200704 ret = 1;
705 goto cleanup;
706 }
707 }
708
709#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Jens Wiklander32b31802023-10-06 16:59:46 +0200710 if ((ret = mbedtls_entropy_source_self_test(0)) != 0) {
Jens Wiklander817466c2018-05-22 13:49:31 +0200711 goto cleanup;
Jens Wiklander32b31802023-10-06 16:59:46 +0200712 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200713#endif
714
715cleanup:
Jens Wiklander32b31802023-10-06 16:59:46 +0200716 mbedtls_entropy_free(&ctx);
Jens Wiklander817466c2018-05-22 13:49:31 +0200717
Jens Wiklander32b31802023-10-06 16:59:46 +0200718 if (verbose != 0) {
719 if (ret != 0) {
720 mbedtls_printf("failed\n");
721 } else {
722 mbedtls_printf("passed\n");
723 }
Jens Wiklander817466c2018-05-22 13:49:31 +0200724
Jens Wiklander32b31802023-10-06 16:59:46 +0200725 mbedtls_printf("\n");
Jens Wiklander817466c2018-05-22 13:49:31 +0200726 }
727
Jens Wiklander32b31802023-10-06 16:59:46 +0200728 return ret != 0;
Jens Wiklander817466c2018-05-22 13:49:31 +0200729}
730#endif /* MBEDTLS_SELF_TEST */
731
732#endif /* MBEDTLS_ENTROPY_C */