blob: 40c3c05fc0d47463058e67f02ed6af672f14e30d [file] [log] [blame]
Gilles Peskineb2b64d32020-12-14 16:43:58 +01001/** \file psa_crypto_random_impl.h
Gilles Peskine90edc992020-11-13 15:39:19 +01002 *
Gilles Peskineb2b64d32020-12-14 16:43:58 +01003 * \brief PSA crypto random generator implementation abstraction.
Gilles Peskinee3ed8022021-02-03 20:04:08 +01004 *
5 * The definitions here need to be consistent with the declarations
Gilles Peskine996f2162021-02-16 16:50:00 +01006 * in include/mbedtls/psa_util.h. This file contains some redundant
7 * declarations to increase the chance that a compiler will detect
8 * inconsistencies if one file is changed without updating the other,
9 * but not all potential inconsistencies can be enforced, so make sure
10 * to check the public declarations and contracts in
11 * include/mbedtls/psa_util.h if you modify this file.
Gilles Peskine90edc992020-11-13 15:39:19 +010012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
Gilles Peskineb2b64d32020-12-14 16:43:58 +010030#ifndef PSA_CRYPTO_RANDOM_IMPL_H
31#define PSA_CRYPTO_RANDOM_IMPL_H
Gilles Peskine90edc992020-11-13 15:39:19 +010032
Gilles Peskine996f2162021-02-16 16:50:00 +010033#include <mbedtls/psa_util.h>
34
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010035#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
36
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020037# include <string.h>
38# include <mbedtls/entropy.h> // only for error codes
39# include <psa/crypto.h>
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010040
41typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
42
Gilles Peskine9c3e0602021-01-05 16:03:55 +010043/* Trivial wrapper around psa_generate_random(). */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020044int mbedtls_psa_get_random(void *p_rng,
45 unsigned char *output,
46 size_t output_size);
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010047
Gilles Peskine9c3e0602021-01-05 16:03:55 +010048/* The PSA RNG API doesn't need any externally maintained state. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020049# define MBEDTLS_PSA_RANDOM_STATE NULL
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010050
51#else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
52
Gilles Peskine82e57d12020-11-13 21:31:17 +010053/* Choose a DRBG based on configuration and availability */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020054# if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
Gilles Peskine82e57d12020-11-13 21:31:17 +010055
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020056# include "mbedtls/hmac_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010057
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020058# elif defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010059
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020060# include "mbedtls/ctr_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010061
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020062# elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine82e57d12020-11-13 21:31:17 +010063
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020064# include "mbedtls/hmac_drbg.h"
65# if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_SHA256_C)
66# include <limits.h>
67# if SIZE_MAX > 0xffffffff
Gilles Peskine82e57d12020-11-13 21:31:17 +010068/* Looks like a 64-bit system, so prefer SHA-512. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020069# define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
70# else
Gilles Peskine82e57d12020-11-13 21:31:17 +010071/* Looks like a 32-bit system, so prefer SHA-256. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020072# define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
73# endif
74# elif defined(MBEDTLS_SHA512_C)
75# define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
76# elif defined(MBEDTLS_SHA256_C)
77# define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
78# else
79# error "No hash algorithm available for HMAC_DBRG."
80# endif
Gilles Peskine82e57d12020-11-13 21:31:17 +010081
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020082# else
83# error "No DRBG module available for the psa_crypto module."
84# endif
Gilles Peskine82e57d12020-11-13 21:31:17 +010085
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020086# include "mbedtls/entropy.h"
Gilles Peskine30524eb2020-11-13 17:02:26 +010087
Gilles Peskine30524eb2020-11-13 17:02:26 +010088/** Initialize the PSA DRBG.
89 *
90 * \param p_rng Pointer to the Mbed TLS DRBG state.
91 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020092static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010093{
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020094# if defined(MBEDTLS_CTR_DRBG_C)
95 mbedtls_ctr_drbg_init(p_rng);
96# elif defined(MBEDTLS_HMAC_DRBG_C)
97 mbedtls_hmac_drbg_init(p_rng);
98# endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010099}
100
101/** Deinitialize the PSA DRBG.
102 *
103 * \param p_rng Pointer to the Mbed TLS DRBG state.
104 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200105static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100106{
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200107# if defined(MBEDTLS_CTR_DRBG_C)
108 mbedtls_ctr_drbg_free(p_rng);
109# elif defined(MBEDTLS_HMAC_DRBG_C)
110 mbedtls_hmac_drbg_free(p_rng);
111# endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100112}
113
114/** The type of the PSA random generator context.
115 *
116 * The random generator context is composed of an entropy context and
117 * a DRBG context.
118 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200119typedef struct {
120 void (*entropy_init)(mbedtls_entropy_context *ctx);
121 void (*entropy_free)(mbedtls_entropy_context *ctx);
Gilles Peskine30524eb2020-11-13 17:02:26 +0100122 mbedtls_entropy_context entropy;
123 mbedtls_psa_drbg_context_t drbg;
124} mbedtls_psa_random_context_t;
125
Gilles Peskine996f2162021-02-16 16:50:00 +0100126/* Defined in include/mbedtls/psa_util.h so that it's visible to
Gilles Peskine277a3a62021-02-16 18:55:05 +0100127 * application code. The declaration here is redundant, but included
128 * as a safety net to make it more likely that a future change that
129 * accidentally causes the implementation to diverge from the interface
130 * will be noticed. */
131/* Do not include the declaration under MSVC because it doesn't accept it
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200132 * ("error C2370: 'mbedtls_psa_get_random' : redefinition; different storage
133 * class"). Observed with Visual Studio 2013. A known bug apparently:
Gilles Peskine277a3a62021-02-16 18:55:05 +0100134 * https://stackoverflow.com/questions/8146541/duplicate-external-static-declarations-not-allowed-in-visual-studio
135 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200136# if !defined(_MSC_VER)
Gilles Peskine996f2162021-02-16 16:50:00 +0100137static mbedtls_f_rng_t *const mbedtls_psa_get_random;
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200138# endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100139
140/** The maximum number of bytes that mbedtls_psa_get_random() is expected to
141 * return.
142 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200143# if defined(MBEDTLS_CTR_DRBG_C)
144# define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
145# elif defined(MBEDTLS_HMAC_DRBG_C)
146# define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
147# endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100148
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100149/** A pointer to the PSA DRBG state.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100150 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100151 * This variable is only intended to be used through the macro
152 * #MBEDTLS_PSA_RANDOM_STATE.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100153 */
Gilles Peskine9c3e0602021-01-05 16:03:55 +0100154/* psa_crypto.c sets this variable to a pointer to the DRBG state in the
155 * global PSA crypto state. */
Gilles Peskine996f2162021-02-16 16:50:00 +0100156/* The type `mbedtls_psa_drbg_context_t` is defined in
157 * include/mbedtls/psa_util.h so that `mbedtls_psa_random_state` can be
158 * declared there and be visible to application code. */
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100159extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state;
160
161/** A pointer to the PSA DRBG state.
162 *
Gilles Peskine88fa5c42021-01-04 21:00:53 +0100163 * This macro expands to an expression that is suitable as the \c p_rng
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100164 * parameter to pass to mbedtls_psa_get_random().
165 *
166 * This macro exists in all configurations where the psa_crypto module is
167 * enabled. Its expansion depends on the configuration.
168 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200169# define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state
Gilles Peskine30524eb2020-11-13 17:02:26 +0100170
Gilles Peskine30524eb2020-11-13 17:02:26 +0100171/** Seed the PSA DRBG.
172 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100173 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100174 * \param custom The personalization string.
175 * This can be \c NULL, in which case the personalization
176 * string is empty regardless of the value of \p len.
177 * \param len The length of the personalization string.
178 *
179 * \return \c 0 on success.
180 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
181 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200182static inline int mbedtls_psa_drbg_seed(mbedtls_entropy_context *entropy,
183 const unsigned char *custom,
184 size_t len)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100185{
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200186# if defined(MBEDTLS_CTR_DRBG_C)
187 return (mbedtls_ctr_drbg_seed(MBEDTLS_PSA_RANDOM_STATE,
188 mbedtls_entropy_func, entropy, custom, len));
189# elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine82e57d12020-11-13 21:31:17 +0100190 const mbedtls_md_info_t *md_info =
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200191 mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE);
192 return (mbedtls_hmac_drbg_seed(MBEDTLS_PSA_RANDOM_STATE, md_info,
193 mbedtls_entropy_func, entropy, custom, len));
194# endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100195}
Gilles Peskine90edc992020-11-13 15:39:19 +0100196
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100197#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
198
Gilles Peskineb2b64d32020-12-14 16:43:58 +0100199#endif /* PSA_CRYPTO_RANDOM_IMPL_H */