blob: 0a2ae9ebc7aa1f80c11a1e8a8b7688f5339e76fe [file] [log] [blame]
Gilles Peskineb2b64d32020-12-14 16:43:58 +01001/** \file psa_crypto_random_impl.h
Gilles Peskine90edc992020-11-13 15:39:19 +01002 *
Gilles Peskineb2b64d32020-12-14 16:43:58 +01003 * \brief PSA crypto random generator implementation abstraction.
Gilles Peskinee3ed8022021-02-03 20:04:08 +01004 *
5 * The definitions here need to be consistent with the declarations
Manuel Pégourié-Gonnard2be8c632023-06-07 13:07:21 +02006 * in include/psa_util_internal.h. This file contains some redundant
Gilles Peskine996f2162021-02-16 16:50:00 +01007 * declarations to increase the chance that a compiler will detect
8 * inconsistencies if one file is changed without updating the other,
9 * but not all potential inconsistencies can be enforced, so make sure
10 * to check the public declarations and contracts in
Manuel Pégourié-Gonnard2be8c632023-06-07 13:07:21 +020011 * include/psa_util_internal.h if you modify this file.
Gilles Peskine90edc992020-11-13 15:39:19 +010012 */
13/*
14 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +000015 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Gilles Peskine90edc992020-11-13 15:39:19 +010016 */
17
Gilles Peskineb2b64d32020-12-14 16:43:58 +010018#ifndef PSA_CRYPTO_RANDOM_IMPL_H
19#define PSA_CRYPTO_RANDOM_IMPL_H
Gilles Peskine90edc992020-11-13 15:39:19 +010020
Kristian Larssona1aeff42023-09-04 10:19:27 +020021#include "psa_util_internal.h"
Gilles Peskine996f2162021-02-16 16:50:00 +010022
Valerio Settia53e7a52024-02-26 12:03:59 +010023#if !defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010024
Valerio Settia53e7a52024-02-26 12:03:59 +010025#include "mbedtls/entropy.h"
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010026
Gilles Peskine82e57d12020-11-13 21:31:17 +010027/* Choose a DRBG based on configuration and availability */
28#if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
29
30#include "mbedtls/hmac_drbg.h"
31
32#elif defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010033
34#include "mbedtls/ctr_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010035
36#elif defined(MBEDTLS_HMAC_DRBG_C)
37
38#include "mbedtls/hmac_drbg.h"
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010039#if defined(MBEDTLS_MD_CAN_SHA512) && defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010040#include <limits.h>
41#if SIZE_MAX > 0xffffffff
42/* Looks like a 64-bit system, so prefer SHA-512. */
43#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
44#else
45/* Looks like a 32-bit system, so prefer SHA-256. */
46#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
47#endif
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010048#elif defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine82e57d12020-11-13 21:31:17 +010049#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010050#elif defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010051#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
52#else
53#error "No hash algorithm available for HMAC_DBRG."
54#endif
55
Valerio Settia53e7a52024-02-26 12:03:59 +010056#else /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Gilles Peskine82e57d12020-11-13 21:31:17 +010057#error "No DRBG module available for the psa_crypto module."
Valerio Settia53e7a52024-02-26 12:03:59 +010058#endif /* !MBEDTLS_PSA_HMAC_DRBG_MD_TYPE && !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Gilles Peskine82e57d12020-11-13 21:31:17 +010059
Valerio Settia53e7a52024-02-26 12:03:59 +010060#if defined(MBEDTLS_CTR_DRBG_C)
61#include "mbedtls/ctr_drbg.h"
62#elif defined(MBEDTLS_HMAC_DRBG_C)
63#include "mbedtls/hmac_drbg.h"
64#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */
65
66#if defined(MBEDTLS_CTR_DRBG_C)
67#define mbedtls_psa_legacy_get_random mbedtls_ctr_drbg_random
68typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t;
69#elif defined(MBEDTLS_HMAC_DRBG_C)
70#define mbedtls_psa_legacy_get_random mbedtls_hmac_drbg_random
71typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t;
72#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */
Gilles Peskine30524eb2020-11-13 17:02:26 +010073
Gilles Peskine30524eb2020-11-13 17:02:26 +010074/** Initialize the PSA DRBG.
75 *
76 * \param p_rng Pointer to the Mbed TLS DRBG state.
77 */
Gilles Peskine449bd832023-01-11 14:50:10 +010078static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010079{
Gilles Peskine82e57d12020-11-13 21:31:17 +010080#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010081 mbedtls_ctr_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010082#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010083 mbedtls_hmac_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010084#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010085}
86
87/** Deinitialize the PSA DRBG.
88 *
89 * \param p_rng Pointer to the Mbed TLS DRBG state.
90 */
Gilles Peskine449bd832023-01-11 14:50:10 +010091static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010092{
Gilles Peskine82e57d12020-11-13 21:31:17 +010093#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010094 mbedtls_ctr_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010095#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010096 mbedtls_hmac_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010097#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010098}
99
100/** The type of the PSA random generator context.
101 *
102 * The random generator context is composed of an entropy context and
103 * a DRBG context.
104 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100105typedef struct {
106 void (* entropy_init)(mbedtls_entropy_context *ctx);
107 void (* entropy_free)(mbedtls_entropy_context *ctx);
Gilles Peskine30524eb2020-11-13 17:02:26 +0100108 mbedtls_entropy_context entropy;
109 mbedtls_psa_drbg_context_t drbg;
110} mbedtls_psa_random_context_t;
111
Gilles Peskine30524eb2020-11-13 17:02:26 +0100112/** The maximum number of bytes that mbedtls_psa_get_random() is expected to
113 * return.
114 */
Gilles Peskine82e57d12020-11-13 21:31:17 +0100115#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100116#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
Gilles Peskine82e57d12020-11-13 21:31:17 +0100117#elif defined(MBEDTLS_HMAC_DRBG_C)
118#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
119#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100120
Valerio Settia53e7a52024-02-26 12:03:59 +0100121/** A pointer to the PSA DRBG context.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100122 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100123 * This variable is only intended to be used through the macro
Valerio Settia53e7a52024-02-26 12:03:59 +0100124 * #MBEDTLS_PSA_DRBG_CTX.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100125 */
Valerio Settia53e7a52024-02-26 12:03:59 +0100126extern mbedtls_psa_drbg_context_t *const mbedtls_psa_drbg_ctx;
127#define MBEDTLS_PSA_DRBG_CTX mbedtls_psa_drbg_ctx
Gilles Peskine30524eb2020-11-13 17:02:26 +0100128
Gilles Peskine30524eb2020-11-13 17:02:26 +0100129/** Seed the PSA DRBG.
130 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100131 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100132 * \param custom The personalization string.
133 * This can be \c NULL, in which case the personalization
134 * string is empty regardless of the value of \p len.
135 * \param len The length of the personalization string.
136 *
137 * \return \c 0 on success.
138 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
139 */
140static inline int mbedtls_psa_drbg_seed(
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100141 mbedtls_entropy_context *entropy,
Gilles Peskine449bd832023-01-11 14:50:10 +0100142 const unsigned char *custom, size_t len)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100143{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100144#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Settia53e7a52024-02-26 12:03:59 +0100145 return mbedtls_ctr_drbg_seed(MBEDTLS_PSA_DRBG_CTX,
Gilles Peskine449bd832023-01-11 14:50:10 +0100146 mbedtls_entropy_func,
147 entropy,
148 custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100149#elif defined(MBEDTLS_HMAC_DRBG_C)
150 const mbedtls_md_info_t *md_info =
Gilles Peskine449bd832023-01-11 14:50:10 +0100151 mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE);
Valerio Settia53e7a52024-02-26 12:03:59 +0100152 return mbedtls_hmac_drbg_seed(MBEDTLS_PSA_DRBG_CTX,
Gilles Peskine449bd832023-01-11 14:50:10 +0100153 md_info,
154 mbedtls_entropy_func,
155 entropy,
156 custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100157#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100158}
Gilles Peskine90edc992020-11-13 15:39:19 +0100159
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100160#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
161
Gilles Peskineb2b64d32020-12-14 16:43:58 +0100162#endif /* PSA_CRYPTO_RANDOM_IMPL_H */