blob: 533fb2e9404073d7ff0620c5abebeeb2b1e6637f [file] [log] [blame]
Gilles Peskineb2b64d32020-12-14 16:43:58 +01001/** \file psa_crypto_random_impl.h
Gilles Peskine90edc992020-11-13 15:39:19 +01002 *
Gilles Peskineb2b64d32020-12-14 16:43:58 +01003 * \brief PSA crypto random generator implementation abstraction.
Gilles Peskine90edc992020-11-13 15:39:19 +01004 */
5/*
6 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00007 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Gilles Peskine90edc992020-11-13 15:39:19 +01008 */
9
Gilles Peskineb2b64d32020-12-14 16:43:58 +010010#ifndef PSA_CRYPTO_RANDOM_IMPL_H
11#define PSA_CRYPTO_RANDOM_IMPL_H
Gilles Peskine90edc992020-11-13 15:39:19 +010012
Kristian Larssona1aeff42023-09-04 10:19:27 +020013#include "psa_util_internal.h"
Gilles Peskine996f2162021-02-16 16:50:00 +010014
Valerio Setti718180c2024-02-27 11:58:39 +010015#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
16
17typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
18
19#else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010020
Valerio Settia53e7a52024-02-26 12:03:59 +010021#include "mbedtls/entropy.h"
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010022
Gilles Peskine82e57d12020-11-13 21:31:17 +010023/* Choose a DRBG based on configuration and availability */
24#if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
25
26#include "mbedtls/hmac_drbg.h"
27
28#elif defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010029
30#include "mbedtls/ctr_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010031
32#elif defined(MBEDTLS_HMAC_DRBG_C)
33
34#include "mbedtls/hmac_drbg.h"
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010035#if defined(MBEDTLS_MD_CAN_SHA512) && defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010036#include <limits.h>
37#if SIZE_MAX > 0xffffffff
38/* Looks like a 64-bit system, so prefer SHA-512. */
39#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
40#else
41/* Looks like a 32-bit system, so prefer SHA-256. */
42#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
43#endif
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010044#elif defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine82e57d12020-11-13 21:31:17 +010045#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010046#elif defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010047#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
48#else
49#error "No hash algorithm available for HMAC_DBRG."
50#endif
51
Valerio Settia53e7a52024-02-26 12:03:59 +010052#else /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Valerio Setti718180c2024-02-27 11:58:39 +010053
Gilles Peskine82e57d12020-11-13 21:31:17 +010054#error "No DRBG module available for the psa_crypto module."
Valerio Setti718180c2024-02-27 11:58:39 +010055
Valerio Settia53e7a52024-02-26 12:03:59 +010056#endif /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Gilles Peskine82e57d12020-11-13 21:31:17 +010057
Valerio Settia53e7a52024-02-26 12:03:59 +010058#if defined(MBEDTLS_CTR_DRBG_C)
59#include "mbedtls/ctr_drbg.h"
60#elif defined(MBEDTLS_HMAC_DRBG_C)
61#include "mbedtls/hmac_drbg.h"
62#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */
63
Valerio Setti718180c2024-02-27 11:58:39 +010064/* The maximum number of bytes that mbedtls_psa_get_random() is expected to return. */
Valerio Settia53e7a52024-02-26 12:03:59 +010065#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +010066#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
67#elif defined(MBEDTLS_HMAC_DRBG_C)
68#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
69#endif
70
71#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Settia53e7a52024-02-26 12:03:59 +010072typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t;
73#elif defined(MBEDTLS_HMAC_DRBG_C)
Valerio Settia53e7a52024-02-26 12:03:59 +010074typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t;
75#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */
Gilles Peskine30524eb2020-11-13 17:02:26 +010076
Valerio Setti718180c2024-02-27 11:58:39 +010077typedef struct {
78 void (* entropy_init)(mbedtls_entropy_context *ctx);
79 void (* entropy_free)(mbedtls_entropy_context *ctx);
80 mbedtls_entropy_context entropy;
81 mbedtls_psa_drbg_context_t drbg;
82} mbedtls_psa_random_context_t;
83
Gilles Peskine30524eb2020-11-13 17:02:26 +010084/** Initialize the PSA DRBG.
85 *
86 * \param p_rng Pointer to the Mbed TLS DRBG state.
87 */
Gilles Peskine449bd832023-01-11 14:50:10 +010088static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010089{
Gilles Peskine82e57d12020-11-13 21:31:17 +010090#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010091 mbedtls_ctr_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010092#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010093 mbedtls_hmac_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010094#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010095}
96
97/** Deinitialize the PSA DRBG.
98 *
99 * \param p_rng Pointer to the Mbed TLS DRBG state.
100 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100101static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100102{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100103#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100104 mbedtls_ctr_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100105#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100106 mbedtls_hmac_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100107#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100108}
109
Gilles Peskine30524eb2020-11-13 17:02:26 +0100110/** Seed the PSA DRBG.
111 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100112 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100113 * \param custom The personalization string.
114 * This can be \c NULL, in which case the personalization
115 * string is empty regardless of the value of \p len.
116 * \param len The length of the personalization string.
117 *
118 * \return \c 0 on success.
119 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
120 */
Valerio Setti718180c2024-02-27 11:58:39 +0100121static inline int mbedtls_psa_drbg_seed(mbedtls_psa_drbg_context_t *drbg_ctx,
122 mbedtls_entropy_context *entropy,
123 const unsigned char *custom, size_t len)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100124{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100125#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +0100126 return mbedtls_ctr_drbg_seed(drbg_ctx, mbedtls_entropy_func, entropy, custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100127#elif defined(MBEDTLS_HMAC_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +0100128 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE);
129 return mbedtls_hmac_drbg_seed(drbg_ctx, md_info, mbedtls_entropy_func, entropy, custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100130#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100131}
Gilles Peskine90edc992020-11-13 15:39:19 +0100132
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100133#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
134
Gilles Peskineb2b64d32020-12-14 16:43:58 +0100135#endif /* PSA_CRYPTO_RANDOM_IMPL_H */