blob: 5b5163111b09b51951a5bc366f76f0db81572234 [file] [log] [blame]
Gilles Peskineb2b64d32020-12-14 16:43:58 +01001/** \file psa_crypto_random_impl.h
Gilles Peskine90edc992020-11-13 15:39:19 +01002 *
Gilles Peskineb2b64d32020-12-14 16:43:58 +01003 * \brief PSA crypto random generator implementation abstraction.
Gilles Peskine90edc992020-11-13 15:39:19 +01004 */
5/*
6 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00007 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Gilles Peskine90edc992020-11-13 15:39:19 +01008 */
9
Gilles Peskineb2b64d32020-12-14 16:43:58 +010010#ifndef PSA_CRYPTO_RANDOM_IMPL_H
11#define PSA_CRYPTO_RANDOM_IMPL_H
Gilles Peskine90edc992020-11-13 15:39:19 +010012
Kristian Larssona1aeff42023-09-04 10:19:27 +020013#include "psa_util_internal.h"
Gilles Peskine996f2162021-02-16 16:50:00 +010014
Valerio Setti718180c2024-02-27 11:58:39 +010015#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
16
17typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
18
19#else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010020
Valerio Settia53e7a52024-02-26 12:03:59 +010021#include "mbedtls/entropy.h"
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010022
Gilles Peskine82e57d12020-11-13 21:31:17 +010023/* Choose a DRBG based on configuration and availability */
Gilles Peskine5d660392024-07-02 15:47:22 +020024#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010025
26#include "mbedtls/ctr_drbg.h"
Gilles Peskine5d660392024-07-02 15:47:22 +020027#undef MBEDTLS_PSA_HMAC_DRBG_MD_TYPE
Gilles Peskine82e57d12020-11-13 21:31:17 +010028
29#elif defined(MBEDTLS_HMAC_DRBG_C)
30
31#include "mbedtls/hmac_drbg.h"
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010032#if defined(MBEDTLS_MD_CAN_SHA512) && defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010033#include <limits.h>
34#if SIZE_MAX > 0xffffffff
35/* Looks like a 64-bit system, so prefer SHA-512. */
36#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
37#else
38/* Looks like a 32-bit system, so prefer SHA-256. */
39#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
40#endif
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010041#elif defined(MBEDTLS_MD_CAN_SHA512)
Gilles Peskine82e57d12020-11-13 21:31:17 +010042#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
Manuel Pégourié-Gonnard4011eb42023-03-21 17:10:45 +010043#elif defined(MBEDTLS_MD_CAN_SHA256)
Gilles Peskine82e57d12020-11-13 21:31:17 +010044#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
45#else
46#error "No hash algorithm available for HMAC_DBRG."
47#endif
48
Gilles Peskine5d660392024-07-02 15:47:22 +020049#else /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Valerio Setti718180c2024-02-27 11:58:39 +010050
Gilles Peskine82e57d12020-11-13 21:31:17 +010051#error "No DRBG module available for the psa_crypto module."
Valerio Setti718180c2024-02-27 11:58:39 +010052
Gilles Peskine5d660392024-07-02 15:47:22 +020053#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C*/
Valerio Settia53e7a52024-02-26 12:03:59 +010054
Valerio Setti718180c2024-02-27 11:58:39 +010055/* The maximum number of bytes that mbedtls_psa_get_random() is expected to return. */
Valerio Settia53e7a52024-02-26 12:03:59 +010056#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +010057#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
58#elif defined(MBEDTLS_HMAC_DRBG_C)
59#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
60#endif
61
62#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Settia53e7a52024-02-26 12:03:59 +010063typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t;
64#elif defined(MBEDTLS_HMAC_DRBG_C)
Valerio Settia53e7a52024-02-26 12:03:59 +010065typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t;
66#endif /* !MBEDTLS_CTR_DRBG_C && !MBEDTLS_HMAC_DRBG_C */
Gilles Peskine30524eb2020-11-13 17:02:26 +010067
Valerio Setti718180c2024-02-27 11:58:39 +010068typedef struct {
69 void (* entropy_init)(mbedtls_entropy_context *ctx);
70 void (* entropy_free)(mbedtls_entropy_context *ctx);
71 mbedtls_entropy_context entropy;
72 mbedtls_psa_drbg_context_t drbg;
73} mbedtls_psa_random_context_t;
74
Gilles Peskine30524eb2020-11-13 17:02:26 +010075/** Initialize the PSA DRBG.
76 *
77 * \param p_rng Pointer to the Mbed TLS DRBG state.
78 */
Gilles Peskine449bd832023-01-11 14:50:10 +010079static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010080{
Gilles Peskine82e57d12020-11-13 21:31:17 +010081#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010082 mbedtls_ctr_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010083#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010084 mbedtls_hmac_drbg_init(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010085#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010086}
87
88/** Deinitialize the PSA DRBG.
89 *
90 * \param p_rng Pointer to the Mbed TLS DRBG state.
91 */
Gilles Peskine449bd832023-01-11 14:50:10 +010092static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng)
Gilles Peskine30524eb2020-11-13 17:02:26 +010093{
Gilles Peskine82e57d12020-11-13 21:31:17 +010094#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010095 mbedtls_ctr_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010096#elif defined(MBEDTLS_HMAC_DRBG_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010097 mbedtls_hmac_drbg_free(p_rng);
Gilles Peskine82e57d12020-11-13 21:31:17 +010098#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010099}
100
Gilles Peskine30524eb2020-11-13 17:02:26 +0100101/** Seed the PSA DRBG.
102 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100103 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100104 * \param custom The personalization string.
105 * This can be \c NULL, in which case the personalization
106 * string is empty regardless of the value of \p len.
107 * \param len The length of the personalization string.
108 *
109 * \return \c 0 on success.
110 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
111 */
Valerio Setti718180c2024-02-27 11:58:39 +0100112static inline int mbedtls_psa_drbg_seed(mbedtls_psa_drbg_context_t *drbg_ctx,
113 mbedtls_entropy_context *entropy,
114 const unsigned char *custom, size_t len)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100115{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100116#if defined(MBEDTLS_CTR_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +0100117 return mbedtls_ctr_drbg_seed(drbg_ctx, mbedtls_entropy_func, entropy, custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100118#elif defined(MBEDTLS_HMAC_DRBG_C)
Valerio Setti718180c2024-02-27 11:58:39 +0100119 const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE);
120 return mbedtls_hmac_drbg_seed(drbg_ctx, md_info, mbedtls_entropy_func, entropy, custom, len);
Gilles Peskine82e57d12020-11-13 21:31:17 +0100121#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100122}
Gilles Peskine90edc992020-11-13 15:39:19 +0100123
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100124#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
125
Gilles Peskineb2b64d32020-12-14 16:43:58 +0100126#endif /* PSA_CRYPTO_RANDOM_IMPL_H */