Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 1 | /** \file psa_crypto_random_impl.h |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 2 | * |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 3 | * \brief PSA crypto random generator implementation abstraction. |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 4 | */ |
| 5 | /* |
| 6 | * Copyright The Mbed TLS Contributors |
Dave Rodgman | 16799db | 2023-11-02 19:47:20 +0000 | [diff] [blame] | 7 | * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 8 | */ |
| 9 | |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 10 | #ifndef PSA_CRYPTO_RANDOM_IMPL_H |
| 11 | #define PSA_CRYPTO_RANDOM_IMPL_H |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 12 | |
Kristian Larsson | a1aeff4 | 2023-09-04 10:19:27 +0200 | [diff] [blame] | 13 | #include "psa_util_internal.h" |
Gilles Peskine | 996f216 | 2021-02-16 16:50:00 +0100 | [diff] [blame] | 14 | |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 15 | #if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG) |
| 16 | |
| 17 | typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t; |
| 18 | |
| 19 | #else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */ |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 20 | |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 21 | #include "mbedtls/entropy.h" |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 22 | |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 23 | /* Choose a DRBG based on configuration and availability */ |
| 24 | #if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE) |
| 25 | |
| 26 | #include "mbedtls/hmac_drbg.h" |
| 27 | |
| 28 | #elif defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 29 | |
| 30 | #include "mbedtls/ctr_drbg.h" |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 31 | |
| 32 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 33 | |
| 34 | #include "mbedtls/hmac_drbg.h" |
Manuel Pégourié-Gonnard | 4011eb4 | 2023-03-21 17:10:45 +0100 | [diff] [blame] | 35 | #if defined(MBEDTLS_MD_CAN_SHA512) && defined(MBEDTLS_MD_CAN_SHA256) |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 36 | #include <limits.h> |
| 37 | #if SIZE_MAX > 0xffffffff |
| 38 | /* Looks like a 64-bit system, so prefer SHA-512. */ |
| 39 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512 |
| 40 | #else |
| 41 | /* Looks like a 32-bit system, so prefer SHA-256. */ |
| 42 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256 |
| 43 | #endif |
Manuel Pégourié-Gonnard | 4011eb4 | 2023-03-21 17:10:45 +0100 | [diff] [blame] | 44 | #elif defined(MBEDTLS_MD_CAN_SHA512) |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 45 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512 |
Manuel Pégourié-Gonnard | 4011eb4 | 2023-03-21 17:10:45 +0100 | [diff] [blame] | 46 | #elif defined(MBEDTLS_MD_CAN_SHA256) |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 47 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256 |
| 48 | #else |
| 49 | #error "No hash algorithm available for HMAC_DBRG." |
| 50 | #endif |
| 51 | |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 52 | #else /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/ |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 53 | |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 54 | #error "No DRBG module available for the psa_crypto module." |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 55 | |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 56 | #endif /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/ |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 57 | |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 58 | #if defined(MBEDTLS_CTR_DRBG_C) |
| 59 | #include "mbedtls/ctr_drbg.h" |
| 60 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 61 | #include "mbedtls/hmac_drbg.h" |
| 62 | #endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */ |
| 63 | |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 64 | /* The maximum number of bytes that mbedtls_psa_get_random() is expected to return. */ |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 65 | #if defined(MBEDTLS_CTR_DRBG_C) |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 66 | #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST |
| 67 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 68 | #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST |
| 69 | #endif |
| 70 | |
| 71 | #if defined(MBEDTLS_CTR_DRBG_C) |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 72 | typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t; |
| 73 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
Valerio Setti | a53e7a5 | 2024-02-26 12:03:59 +0100 | [diff] [blame] | 74 | typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t; |
| 75 | #endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */ |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 76 | |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 77 | typedef struct { |
| 78 | void (* entropy_init)(mbedtls_entropy_context *ctx); |
| 79 | void (* entropy_free)(mbedtls_entropy_context *ctx); |
| 80 | mbedtls_entropy_context entropy; |
| 81 | mbedtls_psa_drbg_context_t drbg; |
| 82 | } mbedtls_psa_random_context_t; |
| 83 | |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 84 | /** Initialize the PSA DRBG. |
| 85 | * |
| 86 | * \param p_rng Pointer to the Mbed TLS DRBG state. |
| 87 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 88 | static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 89 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 90 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 91 | mbedtls_ctr_drbg_init(p_rng); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 92 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 93 | mbedtls_hmac_drbg_init(p_rng); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 94 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 95 | } |
| 96 | |
| 97 | /** Deinitialize the PSA DRBG. |
| 98 | * |
| 99 | * \param p_rng Pointer to the Mbed TLS DRBG state. |
| 100 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 101 | static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 102 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 103 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 104 | mbedtls_ctr_drbg_free(p_rng); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 105 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 106 | mbedtls_hmac_drbg_free(p_rng); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 107 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 108 | } |
| 109 | |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 110 | /** Seed the PSA DRBG. |
| 111 | * |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 112 | * \param entropy An entropy context to read the seed from. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 113 | * \param custom The personalization string. |
| 114 | * This can be \c NULL, in which case the personalization |
| 115 | * string is empty regardless of the value of \p len. |
| 116 | * \param len The length of the personalization string. |
| 117 | * |
| 118 | * \return \c 0 on success. |
| 119 | * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure. |
| 120 | */ |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 121 | static inline int mbedtls_psa_drbg_seed(mbedtls_psa_drbg_context_t *drbg_ctx, |
| 122 | mbedtls_entropy_context *entropy, |
| 123 | const unsigned char *custom, size_t len) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 124 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 125 | #if defined(MBEDTLS_CTR_DRBG_C) |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 126 | return mbedtls_ctr_drbg_seed(drbg_ctx, mbedtls_entropy_func, entropy, custom, len); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 127 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
Valerio Setti | 718180c | 2024-02-27 11:58:39 +0100 | [diff] [blame^] | 128 | const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE); |
| 129 | return mbedtls_hmac_drbg_seed(drbg_ctx, md_info, mbedtls_entropy_func, entropy, custom, len); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 130 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 131 | } |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 132 | |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 133 | #endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */ |
| 134 | |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 135 | #endif /* PSA_CRYPTO_RANDOM_IMPL_H */ |