blob: 09626ec13d957272680b7df88be9f31541130eff [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Gilles Peskineef0624f2018-08-03 20:23:09 +02002#include "mbedtls/entropy.h"
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00003#include "mbedtls/ctr_drbg.h"
Mohammad Azim Khan67735d52017-04-06 11:55:43 +01004#include "string.h"
Rich Evans00ab4702015-02-06 13:43:58 +00005
Gilles Peskineef0624f2018-08-03 20:23:09 +02006static size_t test_offset_idx;
7static size_t test_max_idx;
Reut Caspie278b362017-10-19 08:49:19 +01008static int mbedtls_test_entropy_func( void *data, unsigned char *buf, size_t len )
Paul Bakker0e04d0e2011-11-27 14:46:59 +00009{
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +010010 const unsigned char *p = (unsigned char *) data;
Gilles Peskineef0624f2018-08-03 20:23:09 +020011 if( test_offset_idx + len > test_max_idx )
12 return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
Paul Bakker3ddfa662013-11-26 17:45:20 +010013 memcpy( buf, p + test_offset_idx, len );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +010014 test_offset_idx += len;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000015 return( 0 );
16}
Paul Bakker33b43f12013-08-20 11:48:36 +020017/* END_HEADER */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000018
Paul Bakker33b43f12013-08-20 11:48:36 +020019/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020020 * depends_on:MBEDTLS_CTR_DRBG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020021 * END_DEPENDENCIES
22 */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000023
Paul Bakker33b43f12013-08-20 11:48:36 +020024/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +010025void ctr_drbg_special_behaviours( )
Paul Bakker185ccf72016-07-14 13:21:10 +010026{
27 mbedtls_ctr_drbg_context ctx;
28 unsigned char output[512];
29 unsigned char additional[512];
30
31 mbedtls_ctr_drbg_init( &ctx );
32 memset( output, 0, sizeof( output ) );
33 memset( additional, 0, sizeof( additional ) );
34
35 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
36 output, MBEDTLS_CTR_DRBG_MAX_REQUEST + 1,
37 additional, 16 ) ==
38 MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
39 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx,
40 output, 16,
41 additional, MBEDTLS_CTR_DRBG_MAX_INPUT + 1 ) ==
42 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
43
44 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
45 MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + 1 ) ==
46 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
Andres Amaya Garcia6a543362017-01-17 23:04:22 +000047
48 mbedtls_ctr_drbg_set_entropy_len( &ctx, ~0 );
49 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, additional,
50 MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ) ==
51 MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
Paul Bakker185ccf72016-07-14 13:21:10 +010052exit:
53 mbedtls_ctr_drbg_free( &ctx );
54}
55/* END_CASE */
56
57/* BEGIN_CASE */
Azim Khan5fcca462018-06-29 11:05:32 +010058void ctr_drbg_validate_pr( data_t * add_init, data_t * entropy,
59 data_t * add1, data_t * add2,
Gilles Peskineef0624f2018-08-03 20:23:09 +020060 char *result_string )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000061{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020062 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000063 unsigned char buf[512];
Gilles Peskineef0624f2018-08-03 20:23:09 +020064 unsigned char result[512];
65 size_t entropy_len, add_init_len, add1_len, add2_len, result_len;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000066
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020067 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000068
Gilles Peskineef0624f2018-08-03 20:23:09 +020069 entropy_len = unhexify( entropy, entropy_string );
70 result_len = unhexify( result, result_string );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000071
Paul Bakker3ddfa662013-11-26 17:45:20 +010072 test_offset_idx = 0;
Gilles Peskineef0624f2018-08-03 20:23:09 +020073 test_max_idx = entropy_len;
Gilles Peskineed7da592018-08-03 20:16:52 +020074 /* CTR_DRBG_Instantiate(entropy[:entropy_len/3], nonce, perso, <ignored>)
75 * where nonce||perso = add_init[add_init_len] */
Gilles Peskineef0624f2018-08-03 20:23:09 +020076 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_test_entropy_func, entropy, add_init, add_init_len, entropy_len / 3 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000078
Gilles Peskineed7da592018-08-03 20:16:52 +020079 /* CTR_DRBG_Generate(result_len * 8 bits, add1[:add1_len]) -> buf */
80 /* Then reseed because of prediction resistance. */
Gilles Peskineef0624f2018-08-03 20:23:09 +020081 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, result_len, add1, add1_len ) == 0 );
Gilles Peskineed7da592018-08-03 20:16:52 +020082 /* CTR_DRBG_Generate(result_len * 8 bits, add2[:add2_len]) -> buf */
83 /* Then reseed because of prediction resistance. */
Gilles Peskineef0624f2018-08-03 20:23:09 +020084 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, result_len, add2, add2_len ) == 0 );
85 TEST_ASSERT( memcmp( buf, result, result_len ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +020086
Paul Bakkerbd51b262014-07-10 15:26:12 +020087exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020088 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000089}
Paul Bakker33b43f12013-08-20 11:48:36 +020090/* END_CASE */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000091
Paul Bakker33b43f12013-08-20 11:48:36 +020092/* BEGIN_CASE */
Azim Khan5fcca462018-06-29 11:05:32 +010093void ctr_drbg_validate_nopr( data_t * add_init, data_t * entropy,
94 data_t * add1, data_t * add_reseed,
Gilles Peskineef0624f2018-08-03 20:23:09 +020095 char *add2_string, char *result_string )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000096{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020097 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000098 unsigned char buf[512];
Gilles Peskineef0624f2018-08-03 20:23:09 +020099 unsigned char result[512];
100 size_t entropy_len, add_init_len, add1_len, add_reseed_len, add2_len, result_len;
Paul Bakker0e04d0e2011-11-27 14:46:59 +0000101
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200102 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +0000103
Gilles Peskineef0624f2018-08-03 20:23:09 +0200104 entropy_len = unhexify( entropy, entropy_string );
105 result_len = unhexify( result, result_string );
Paul Bakker0e04d0e2011-11-27 14:46:59 +0000106
Paul Bakker3ddfa662013-11-26 17:45:20 +0100107 test_offset_idx = 0;
Gilles Peskineef0624f2018-08-03 20:23:09 +0200108 test_max_idx = entropy_len;
Gilles Peskineed7da592018-08-03 20:16:52 +0200109 /* CTR_DRBG_Instantiate(entropy[:entropy_len/2], nonce, perso, <ignored>)
110 * where nonce||perso = add_init[add_init_len] */
Gilles Peskineef0624f2018-08-03 20:23:09 +0200111 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_test_entropy_func, entropy, add_init, add_init_len, entropy_len / 2 ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +0000112
Gilles Peskineed7da592018-08-03 20:16:52 +0200113 /* CTR_DRBG_Generate(16 * 8 bits, add1[:add1_len]) -> buf */
Gilles Peskineef0624f2018-08-03 20:23:09 +0200114 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, result_len, add1, add1_len ) == 0 );
Gilles Peskineed7da592018-08-03 20:16:52 +0200115 /* CTR_DRBG_Reseed(entropy[entropy_len/2:entropy_len], add_reseed[:add_reseed_len]) */
Azim Khand30ca132017-06-09 04:32:58 +0100116 TEST_ASSERT( hexcmp( buf, result_str->x, 16, result_str->len ) == 0 );
Gilles Peskineed7da592018-08-03 20:16:52 +0200117 /* CTR_DRBG_Generate(16 * 8 bits, add2[:add2_len]) -> buf */
Gilles Peskineef0624f2018-08-03 20:23:09 +0200118 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, result_len, add2, add2_len ) == 0 );
119 TEST_ASSERT( memcmp( buf, result, result_len ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +0200120
Paul Bakkerbd51b262014-07-10 15:26:12 +0200121exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +0000123}
Paul Bakker33b43f12013-08-20 11:48:36 +0200124/* END_CASE */
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100125
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100126/* BEGIN_CASE */
Azim Khanf1aaec92017-05-30 14:23:15 +0100127void ctr_drbg_entropy_usage( )
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100128{
129 unsigned char out[16];
130 unsigned char add[16];
131 unsigned char entropy[1024];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200132 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100133 size_t i, reps = 10;
Gilles Peskineef0624f2018-08-03 20:23:09 +0200134 size_t last_idx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100135
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200136 mbedtls_ctr_drbg_init( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100137 test_offset_idx = 0;
Gilles Peskineef0624f2018-08-03 20:23:09 +0200138 test_max_idx = sizeof( entropy );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100139 memset( entropy, 0, sizeof( entropy ) );
140 memset( out, 0, sizeof( out ) );
141 memset( add, 0, sizeof( add ) );
142
143 /* Init must use entropy */
144 last_idx = test_offset_idx;
Reut Caspie278b362017-10-19 08:49:19 +0100145 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, mbedtls_test_entropy_func, entropy, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100146 TEST_ASSERT( last_idx < test_offset_idx );
147
148 /* By default, PR is off and reseed_interval is large,
149 * so the next few calls should not use entropy */
150 last_idx = test_offset_idx;
151 for( i = 0; i < reps; i++ )
152 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200153 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
154 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100155 add, sizeof( add ) ) == 0 );
156 }
157 TEST_ASSERT( last_idx == test_offset_idx );
158
159 /* While at it, make sure we didn't write past the requested length */
160 TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
161 TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
162 TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
163 TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
164
165 /* Set reseed_interval to the number of calls done,
166 * so the next call should reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167 mbedtls_ctr_drbg_set_reseed_interval( &ctx, 2 * reps );
168 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100169 TEST_ASSERT( last_idx < test_offset_idx );
170
171 /* The new few calls should not reseed */
172 last_idx = test_offset_idx;
173 for( i = 0; i < reps / 2; i++ )
174 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
176 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) ,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100177 add, sizeof( add ) ) == 0 );
178 }
179 TEST_ASSERT( last_idx == test_offset_idx );
180
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100181 /* Call update with too much data (sizeof entropy > MAX(_SEED)_INPUT)
182 * (just make sure it doesn't cause memory corruption) */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183 mbedtls_ctr_drbg_update( &ctx, entropy, sizeof( entropy ) );
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100184
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100185 /* Now enable PR, so the next few calls should all reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200186 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
187 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100188 TEST_ASSERT( last_idx < test_offset_idx );
189
190 /* Finally, check setting entropy_len */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200191 mbedtls_ctr_drbg_set_entropy_len( &ctx, 42 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100192 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200193 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100194 TEST_ASSERT( test_offset_idx - last_idx == 42 );
195
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196 mbedtls_ctr_drbg_set_entropy_len( &ctx, 13 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100197 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100199 TEST_ASSERT( test_offset_idx - last_idx == 13 );
Paul Bakkera317a982014-06-18 16:44:11 +0200200
Paul Bakkerbd51b262014-07-10 15:26:12 +0200201exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100203}
204/* END_CASE */
205
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206/* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
Azim Khanf1aaec92017-05-30 14:23:15 +0100207void ctr_drbg_seed_file( char * path, int ret )
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100208{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200209 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100210
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200211 mbedtls_ctr_drbg_init( &ctx );
212
213 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, rnd_std_rand, NULL, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200214 TEST_ASSERT( mbedtls_ctr_drbg_write_seed_file( &ctx, path ) == ret );
215 TEST_ASSERT( mbedtls_ctr_drbg_update_seed_file( &ctx, path ) == ret );
Paul Bakkera317a982014-06-18 16:44:11 +0200216
Paul Bakkerbd51b262014-07-10 15:26:12 +0200217exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200218 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100219}
220/* END_CASE */
221
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200222/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Azim Khanf1aaec92017-05-30 14:23:15 +0100223void ctr_drbg_selftest( )
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100224{
Andres AG93012e82016-09-09 09:10:28 +0100225 TEST_ASSERT( mbedtls_ctr_drbg_self_test( 1 ) == 0 );
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100226}
227/* END_CASE */