blob: 619c76e197051b397a9db3bd7dc0da7147755699 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/ctr_drbg.h"
Mohammad Azim Khan67735d52017-04-06 11:55:43 +01003#include "string.h"
Rich Evans00ab4702015-02-06 13:43:58 +00004
Reut Caspie278b362017-10-19 08:49:19 +01005static int test_offset_idx;
6static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
Paul Bakker0e04d0e2011-11-27 14:46:59 +00007{
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +01008 const unsigned char *p = (unsigned char *) data;
Paul Bakker3ddfa662013-11-26 17:45:20 +01009 memcpy( buf, p + test_offset_idx, len );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +010010 test_offset_idx += len;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000011 return( 0 );
12}
Paul Bakker33b43f12013-08-20 11:48:36 +020013/* END_HEADER */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000014
Paul Bakker33b43f12013-08-20 11:48:36 +020015/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020016 * depends_on:MBEDTLS_CTR_DRBG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020017 * END_DEPENDENCIES
18 */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000019
Paul Bakker33b43f12013-08-20 11:48:36 +020020/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +010021void ctr_drbg_special_behaviours( )
Paul Bakker185ccf72016-07-14 13:21:10 +010022{
23 mbedtls_ctr_drbg_context ctx;
24 unsigned char output[512];
25 unsigned char additional[512];
26
27 mbedtls_ctr_drbg_init( &ctx );
28 memset( output, 0, sizeof( output ) );
29 memset( additional, 0, sizeof( additional ) );
30
31 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
32 output, MBEDTLS_CTR_DRBG_MAX_REQUEST + 1,
33 additional, 16 ) ==
34 MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
35 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
36 output, 16,
37 additional, MBEDTLS_CTR_DRBG_MAX_INPUT + 1 ) ==
38 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
39
40 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
41 MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + 1 ) ==
42 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
Andres Amaya Garcia6a543362017-01-17 23:04:22 +000043
44 mbedtls_ctr_drbg_set_entropy_len( &ctx, ~0 );
45 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
46 MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ) ==
47 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
Paul Bakker185ccf72016-07-14 13:21:10 +010048exit:
49 mbedtls_ctr_drbg_free( &ctx );
50}
51/* END_CASE */
52
53/* BEGIN_CASE */
Azim Khand30ca132017-06-09 04:32:58 +010054void ctr_drbg_validate_pr( HexParam_t * add_init, HexParam_t * entropy,
55 HexParam_t * add1, HexParam_t * add2,
56 HexParam_t * result_str )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000057{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000059 unsigned char buf[512];
Paul Bakker0e04d0e2011-11-27 14:46:59 +000060
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020061 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000062
Paul Bakker0e04d0e2011-11-27 14:46:59 +000063
Paul Bakker3ddfa662013-11-26 17:45:20 +010064 test_offset_idx = 0;
Azim Khand30ca132017-06-09 04:32:58 +010065 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_test_entropy_func, entropy->x, add_init->x, add_init->len, 32 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000067
Azim Khand30ca132017-06-09 04:32:58 +010068 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add1->x, add1->len ) == 0 );
69 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add2->x, add2->len ) == 0 );
70 TEST_ASSERT( hexcmp( buf, result_str->x, 16, result_str->len ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +020071
Paul Bakkerbd51b262014-07-10 15:26:12 +020072exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020073 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000074}
Paul Bakker33b43f12013-08-20 11:48:36 +020075/* END_CASE */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000076
Paul Bakker33b43f12013-08-20 11:48:36 +020077/* BEGIN_CASE */
Azim Khand30ca132017-06-09 04:32:58 +010078void ctr_drbg_validate_nopr( HexParam_t * add_init, HexParam_t * entropy,
79 HexParam_t * add1, HexParam_t * add_reseed,
80 HexParam_t * add2, HexParam_t * result_str )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000081{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020082 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000083 unsigned char buf[512];
Paul Bakker0e04d0e2011-11-27 14:46:59 +000084
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020085 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000086
Paul Bakker0e04d0e2011-11-27 14:46:59 +000087
Paul Bakker3ddfa662013-11-26 17:45:20 +010088 test_offset_idx = 0;
Azim Khand30ca132017-06-09 04:32:58 +010089 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_test_entropy_func, entropy->x, add_init->x, add_init->len, 32 ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000090
Azim Khand30ca132017-06-09 04:32:58 +010091 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add1->x, add1->len ) == 0 );
92 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, add_reseed->x, add_reseed->len ) == 0 );
93 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add2->x, add2->len ) == 0 );
94 TEST_ASSERT( hexcmp( buf, result_str->x, 16, result_str->len ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +020095
Paul Bakkerbd51b262014-07-10 15:26:12 +020096exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020097 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000098}
Paul Bakker33b43f12013-08-20 11:48:36 +020099/* END_CASE */
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100100
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100101/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +0100102void ctr_drbg_entropy_usage( )
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100103{
104 unsigned char out[16];
105 unsigned char add[16];
106 unsigned char entropy[1024];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200107 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100108 size_t i, reps = 10;
109 int last_idx;
110
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200111 mbedtls_ctr_drbg_init( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100112 test_offset_idx = 0;
113 memset( entropy, 0, sizeof( entropy ) );
114 memset( out, 0, sizeof( out ) );
115 memset( add, 0, sizeof( add ) );
116
117 /* Init must use entropy */
118 last_idx = test_offset_idx;
Reut Caspie278b362017-10-19 08:49:19 +0100119 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, mbedtls_test_entropy_func, entropy, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100120 TEST_ASSERT( last_idx < test_offset_idx );
121
122 /* By default, PR is off and reseed_interval is large,
123 * so the next few calls should not use entropy */
124 last_idx = test_offset_idx;
125 for( i = 0; i < reps; i++ )
126 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200127 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
128 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100129 add, sizeof( add ) ) == 0 );
130 }
131 TEST_ASSERT( last_idx == test_offset_idx );
132
133 /* While at it, make sure we didn't write past the requested length */
134 TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
135 TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
136 TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
137 TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
138
139 /* Set reseed_interval to the number of calls done,
140 * so the next call should reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200141 mbedtls_ctr_drbg_set_reseed_interval( &ctx, 2 * reps );
142 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100143 TEST_ASSERT( last_idx < test_offset_idx );
144
145 /* The new few calls should not reseed */
146 last_idx = test_offset_idx;
147 for( i = 0; i < reps / 2; i++ )
148 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200149 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
150 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) ,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100151 add, sizeof( add ) ) == 0 );
152 }
153 TEST_ASSERT( last_idx == test_offset_idx );
154
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100155 /* Call update with too much data (sizeof entropy > MAX(_SEED)_INPUT)
156 * (just make sure it doesn't cause memory corruption) */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200157 mbedtls_ctr_drbg_update( &ctx, entropy, sizeof( entropy ) );
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100158
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100159 /* Now enable PR, so the next few calls should all reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200160 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
161 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100162 TEST_ASSERT( last_idx < test_offset_idx );
163
164 /* Finally, check setting entropy_len */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200165 mbedtls_ctr_drbg_set_entropy_len( &ctx, 42 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100166 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100168 TEST_ASSERT( test_offset_idx - last_idx == 42 );
169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170 mbedtls_ctr_drbg_set_entropy_len( &ctx, 13 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100171 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200172 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100173 TEST_ASSERT( test_offset_idx - last_idx == 13 );
Paul Bakkera317a982014-06-18 16:44:11 +0200174
Paul Bakkerbd51b262014-07-10 15:26:12 +0200175exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200176 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100177}
178/* END_CASE */
179
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200180/* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
Azim Khanf1aaec92017-05-30 14:23:15 +0100181void ctr_drbg_seed_file( char * path, int ret )
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100182{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100184
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200185 mbedtls_ctr_drbg_init( &ctx );
186
187 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, rnd_std_rand, NULL, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200188 TEST_ASSERT( mbedtls_ctr_drbg_write_seed_file( &ctx, path ) == ret );
189 TEST_ASSERT( mbedtls_ctr_drbg_update_seed_file( &ctx, path ) == ret );
Paul Bakkera317a982014-06-18 16:44:11 +0200190
Paul Bakkerbd51b262014-07-10 15:26:12 +0200191exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100193}
194/* END_CASE */
195
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Azim Khanf1aaec92017-05-30 14:23:15 +0100197void ctr_drbg_selftest( )
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100198{
Andres AG93012e82016-09-09 09:10:28 +0100199 TEST_ASSERT( mbedtls_ctr_drbg_self_test( 1 ) == 0 );
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100200}
201/* END_CASE */