blob: b7d2bece9d59e64b87b200b4554c2d03cea6ce57 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +00002#include "mbedtls/ctr_drbg.h"
Rich Evans00ab4702015-02-06 13:43:58 +00003
Paul Bakker3ddfa662013-11-26 17:45:20 +01004int test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +02005int mbedtls_entropy_func( void *data, unsigned char *buf, size_t len )
Paul Bakker0e04d0e2011-11-27 14:46:59 +00006{
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +01007 const unsigned char *p = (unsigned char *) data;
Paul Bakker3ddfa662013-11-26 17:45:20 +01008 memcpy( buf, p + test_offset_idx, len );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +01009 test_offset_idx += len;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000010 return( 0 );
11}
Paul Bakker33b43f12013-08-20 11:48:36 +020012/* END_HEADER */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000013
Paul Bakker33b43f12013-08-20 11:48:36 +020014/* BEGIN_DEPENDENCIES
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020015 * depends_on:MBEDTLS_CTR_DRBG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020016 * END_DEPENDENCIES
17 */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000018
Paul Bakker33b43f12013-08-20 11:48:36 +020019/* BEGIN_CASE */
20void ctr_drbg_validate_pr( char *add_init_string, char *entropy_string,
21 char *add1_string, char *add2_string,
22 char *result_str )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000023{
24 unsigned char entropy[512];
25 unsigned char add_init[512];
26 unsigned char add1[512];
27 unsigned char add2[512];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020028 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000029 unsigned char buf[512];
30 unsigned char output_str[512];
31 int add_init_len, add1_len, add2_len;
32
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020033 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000034 memset( output_str, 0, 512 );
35
Paul Bakker33b43f12013-08-20 11:48:36 +020036 unhexify( entropy, entropy_string );
37 add_init_len = unhexify( add_init, add_init_string );
38 add1_len = unhexify( add1, add1_string );
39 add2_len = unhexify( add2, add2_string );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000040
Paul Bakker3ddfa662013-11-26 17:45:20 +010041 test_offset_idx = 0;
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020042 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_entropy_func, entropy, add_init, add_init_len, 32 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020043 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000044
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020045 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add1, add1_len ) == 0 );
46 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add2, add2_len ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000047 hexify( output_str, buf, 16 );
Paul Bakker33b43f12013-08-20 11:48:36 +020048 TEST_ASSERT( strcmp( (char *) output_str, result_str ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +020049
Paul Bakkerbd51b262014-07-10 15:26:12 +020050exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020051 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000052}
Paul Bakker33b43f12013-08-20 11:48:36 +020053/* END_CASE */
Paul Bakker0e04d0e2011-11-27 14:46:59 +000054
Paul Bakker33b43f12013-08-20 11:48:36 +020055/* BEGIN_CASE */
56void ctr_drbg_validate_nopr( char *add_init_string, char *entropy_string,
57 char *add1_string, char *add_reseed_string,
58 char *add2_string, char *result_str )
Paul Bakker0e04d0e2011-11-27 14:46:59 +000059{
60 unsigned char entropy[512];
61 unsigned char add_init[512];
62 unsigned char add1[512];
63 unsigned char add_reseed[512];
64 unsigned char add2[512];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020065 mbedtls_ctr_drbg_context ctx;
Paul Bakker0e04d0e2011-11-27 14:46:59 +000066 unsigned char buf[512];
67 unsigned char output_str[512];
68 int add_init_len, add1_len, add_reseed_len, add2_len;
69
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020070 mbedtls_ctr_drbg_init( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000071 memset( output_str, 0, 512 );
72
Paul Bakker33b43f12013-08-20 11:48:36 +020073 unhexify( entropy, entropy_string );
74 add_init_len = unhexify( add_init, add_init_string );
75 add1_len = unhexify( add1, add1_string );
76 add_reseed_len = unhexify( add_reseed, add_reseed_string );
77 add2_len = unhexify( add2, add2_string );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000078
Paul Bakker3ddfa662013-11-26 17:45:20 +010079 test_offset_idx = 0;
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +020080 TEST_ASSERT( mbedtls_ctr_drbg_seed_entropy_len( &ctx, mbedtls_entropy_func, entropy, add_init, add_init_len, 32 ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000081
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020082 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add1, add1_len ) == 0 );
83 TEST_ASSERT( mbedtls_ctr_drbg_reseed( &ctx, add_reseed, add_reseed_len ) == 0 );
84 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, buf, 16, add2, add2_len ) == 0 );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000085 hexify( output_str, buf, 16 );
Paul Bakker33b43f12013-08-20 11:48:36 +020086 TEST_ASSERT( strcmp( (char *) output_str, result_str ) == 0 );
Paul Bakkera317a982014-06-18 16:44:11 +020087
Paul Bakkerbd51b262014-07-10 15:26:12 +020088exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020089 mbedtls_ctr_drbg_free( &ctx );
Paul Bakker0e04d0e2011-11-27 14:46:59 +000090}
Paul Bakker33b43f12013-08-20 11:48:36 +020091/* END_CASE */
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +010092
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +010093/* BEGIN_CASE */
94void ctr_drbg_entropy_usage( )
95{
96 unsigned char out[16];
97 unsigned char add[16];
98 unsigned char entropy[1024];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020099 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100100 size_t i, reps = 10;
101 int last_idx;
102
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200103 mbedtls_ctr_drbg_init( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100104 test_offset_idx = 0;
105 memset( entropy, 0, sizeof( entropy ) );
106 memset( out, 0, sizeof( out ) );
107 memset( add, 0, sizeof( add ) );
108
109 /* Init must use entropy */
110 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200111 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, mbedtls_entropy_func, entropy, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100112 TEST_ASSERT( last_idx < test_offset_idx );
113
114 /* By default, PR is off and reseed_interval is large,
115 * so the next few calls should not use entropy */
116 last_idx = test_offset_idx;
117 for( i = 0; i < reps; i++ )
118 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) - 4 ) == 0 );
120 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) - 4,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100121 add, sizeof( add ) ) == 0 );
122 }
123 TEST_ASSERT( last_idx == test_offset_idx );
124
125 /* While at it, make sure we didn't write past the requested length */
126 TEST_ASSERT( out[sizeof( out ) - 4] == 0 );
127 TEST_ASSERT( out[sizeof( out ) - 3] == 0 );
128 TEST_ASSERT( out[sizeof( out ) - 2] == 0 );
129 TEST_ASSERT( out[sizeof( out ) - 1] == 0 );
130
131 /* Set reseed_interval to the number of calls done,
132 * so the next call should reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200133 mbedtls_ctr_drbg_set_reseed_interval( &ctx, 2 * reps );
134 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100135 TEST_ASSERT( last_idx < test_offset_idx );
136
137 /* The new few calls should not reseed */
138 last_idx = test_offset_idx;
139 for( i = 0; i < reps / 2; i++ )
140 {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200141 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
142 TEST_ASSERT( mbedtls_ctr_drbg_random_with_add( &ctx, out, sizeof( out ) ,
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100143 add, sizeof( add ) ) == 0 );
144 }
145 TEST_ASSERT( last_idx == test_offset_idx );
146
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100147 /* Call update with too much data (sizeof entropy > MAX(_SEED)_INPUT)
148 * (just make sure it doesn't cause memory corruption) */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200149 mbedtls_ctr_drbg_update( &ctx, entropy, sizeof( entropy ) );
Manuel Pégourié-Gonnardf5f25b32014-11-27 14:04:56 +0100150
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100151 /* Now enable PR, so the next few calls should all reseed */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
153 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100154 TEST_ASSERT( last_idx < test_offset_idx );
155
156 /* Finally, check setting entropy_len */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200157 mbedtls_ctr_drbg_set_entropy_len( &ctx, 42 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100158 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200159 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100160 TEST_ASSERT( test_offset_idx - last_idx == 42 );
161
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200162 mbedtls_ctr_drbg_set_entropy_len( &ctx, 13 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100163 last_idx = test_offset_idx;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200164 TEST_ASSERT( mbedtls_ctr_drbg_random( &ctx, out, sizeof( out ) ) == 0 );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100165 TEST_ASSERT( test_offset_idx - last_idx == 13 );
Paul Bakkera317a982014-06-18 16:44:11 +0200166
Paul Bakkerbd51b262014-07-10 15:26:12 +0200167exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200168 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100169}
170/* END_CASE */
171
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200172/* BEGIN_CASE depends_on:MBEDTLS_FS_IO */
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100173void ctr_drbg_seed_file( char *path, int ret )
174{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200175 mbedtls_ctr_drbg_context ctx;
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100176
Manuel Pégourié-Gonnard8d128ef2015-04-28 22:38:08 +0200177 mbedtls_ctr_drbg_init( &ctx );
178
179 TEST_ASSERT( mbedtls_ctr_drbg_seed( &ctx, rnd_std_rand, NULL, NULL, 0 ) == 0 );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200180 TEST_ASSERT( mbedtls_ctr_drbg_write_seed_file( &ctx, path ) == ret );
181 TEST_ASSERT( mbedtls_ctr_drbg_update_seed_file( &ctx, path ) == ret );
Paul Bakkera317a982014-06-18 16:44:11 +0200182
Paul Bakkerbd51b262014-07-10 15:26:12 +0200183exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200184 mbedtls_ctr_drbg_free( &ctx );
Manuel Pégourié-Gonnard7575daa2014-01-31 12:16:54 +0100185}
186/* END_CASE */
187
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200188/* BEGIN_CASE depends_on:MBEDTLS_SELF_TEST */
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100189void ctr_drbg_selftest( )
190{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200191 TEST_ASSERT( mbedtls_ctr_drbg_self_test( 0 ) == 0 );
Manuel Pégourié-Gonnardb3b205e2014-01-31 12:04:06 +0100192}
193/* END_CASE */