blob: cc1222a39a283b1ddb1dea312ce67d796690e730 [file] [log] [blame]
Gilles Peskine90edc992020-11-13 15:39:19 +01001/** \file psa_crypto_random.h
2 *
3 * \brief PSA crypto random generator abstraction.
4 */
5/*
6 * Copyright The Mbed TLS Contributors
7 * SPDX-License-Identifier: Apache-2.0
8 *
9 * Licensed under the Apache License, Version 2.0 (the "License"); you may
10 * not use this file except in compliance with the License.
11 * You may obtain a copy of the License at
12 *
13 * http://www.apache.org/licenses/LICENSE-2.0
14 *
15 * Unless required by applicable law or agreed to in writing, software
16 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
17 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18 * See the License for the specific language governing permissions and
19 * limitations under the License.
20 */
21
22#ifndef PSA_CRYPTO_RANDOM_H
23#define PSA_CRYPTO_RANDOM_H
24
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010025#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
26
27#include <string.h>
28#include <mbedtls/entropy.h> // only for error codes
29#include <psa/crypto.h>
30
31typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
32
33static inline int mbedtls_psa_get_random( void *p_rng,
34 unsigned char *output,
35 size_t output_size )
36{
37 (void) p_rng;
38 psa_status_t status = psa_generate_random( output, output_size );
39 if( status == PSA_SUCCESS )
40 return( 0 );
41 else
42 return( MBEDTLS_ERR_ENTROPY_SOURCE_FAILED );
43}
44
Gilles Peskine5894e8e2020-12-14 14:54:06 +010045#define MBEDTLS_PSA_RANDOM_STATE NULL
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010046
47#else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
48
Gilles Peskine82e57d12020-11-13 21:31:17 +010049/* Choose a DRBG based on configuration and availability */
50#if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
51
52#include "mbedtls/hmac_drbg.h"
53
54#elif defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010055
56#include "mbedtls/ctr_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010057
58#elif defined(MBEDTLS_HMAC_DRBG_C)
59
60#include "mbedtls/hmac_drbg.h"
61#if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_SHA256_C)
62#include <limits.h>
63#if SIZE_MAX > 0xffffffff
64/* Looks like a 64-bit system, so prefer SHA-512. */
65#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
66#else
67/* Looks like a 32-bit system, so prefer SHA-256. */
68#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
69#endif
70#elif defined(MBEDTLS_SHA512_C)
71#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
72#elif defined(MBEDTLS_SHA256_C)
73#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
74#else
75#error "No hash algorithm available for HMAC_DBRG."
76#endif
77
78#else
79#error "No DRBG module available for the psa_crypto module."
80#endif
81
Gilles Peskine30524eb2020-11-13 17:02:26 +010082#include "mbedtls/entropy.h"
83
84/** The type of the PSA DRBG context.
85 */
Gilles Peskine82e57d12020-11-13 21:31:17 +010086#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010087typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t;
Gilles Peskine82e57d12020-11-13 21:31:17 +010088#elif defined(MBEDTLS_HMAC_DRBG_C)
89typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t;
90#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010091
92/** Initialize the PSA DRBG.
93 *
94 * \param p_rng Pointer to the Mbed TLS DRBG state.
95 */
96static inline void mbedtls_psa_drbg_init( mbedtls_psa_drbg_context_t *p_rng )
97{
Gilles Peskine82e57d12020-11-13 21:31:17 +010098#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010099 mbedtls_ctr_drbg_init( p_rng );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100100#elif defined(MBEDTLS_HMAC_DRBG_C)
101 mbedtls_hmac_drbg_init( p_rng );
102#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100103}
104
105/** Deinitialize the PSA DRBG.
106 *
107 * \param p_rng Pointer to the Mbed TLS DRBG state.
108 */
109static inline void mbedtls_psa_drbg_free( mbedtls_psa_drbg_context_t *p_rng )
110{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100111#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100112 mbedtls_ctr_drbg_free( p_rng );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100113#elif defined(MBEDTLS_HMAC_DRBG_C)
114 mbedtls_hmac_drbg_free( p_rng );
115#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100116}
117
118/** The type of the PSA random generator context.
119 *
120 * The random generator context is composed of an entropy context and
121 * a DRBG context.
122 */
123typedef struct
124{
125 void (* entropy_init )( mbedtls_entropy_context *ctx );
126 void (* entropy_free )( mbedtls_entropy_context *ctx );
127 mbedtls_entropy_context entropy;
128 mbedtls_psa_drbg_context_t drbg;
129} mbedtls_psa_random_context_t;
130
131/** Return random data.
132 *
133 * This function is suitable as the \p f_rng parameter to Mbed TLS functions
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100134 * that require a random generator. Use #MBEDTLS_PSA_RANDOM_STATE to
Gilles Peskine30524eb2020-11-13 17:02:26 +0100135 * obtain the \p p_rng parameter.
136 *
Gilles Peskine82e57d12020-11-13 21:31:17 +0100137 * \param p_rng The DRBG context. This must be
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100138 * #MBEDTLS_PSA_RANDOM_STATE.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100139 * \param output The buffer to fill.
140 * \param output_len The length of the buffer in bytes.
141 * It must be at most #MBEDTLS_PSA_RANDOM_MAX_REQUEST.
142 *
Gilles Peskine82e57d12020-11-13 21:31:17 +0100143 * \retval \c 0 on success.
144 * \return \c MBEDTLS_ERR_xxx_DRBG_xxx or
145 * \c MBEDTLS_ERR_PLATFORM_xxx on failure.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100146 */
147static inline int mbedtls_psa_get_random( void *p_rng,
148 unsigned char *output,
149 size_t output_len )
150{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100151#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100152 return( mbedtls_ctr_drbg_random( p_rng, output, output_len ) );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100153#elif defined(MBEDTLS_HMAC_DRBG_C)
154 return( mbedtls_hmac_drbg_random( p_rng, output, output_len ) );
155#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100156}
157
158/** The maximum number of bytes that mbedtls_psa_get_random() is expected to
159 * return.
160 */
Gilles Peskine82e57d12020-11-13 21:31:17 +0100161#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100162#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
Gilles Peskine82e57d12020-11-13 21:31:17 +0100163#elif defined(MBEDTLS_HMAC_DRBG_C)
164#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
165#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100166
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100167/** A pointer to the PSA DRBG state.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100168 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100169 * This variable is only intended to be used through the macro
170 * #MBEDTLS_PSA_RANDOM_STATE.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100171 */
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100172extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state;
173
174/** A pointer to the PSA DRBG state.
175 *
176 * This macro expnds to an expression that is suitable as the \c p_rng
177 * parameter to pass to mbedtls_psa_get_random().
178 *
179 * This macro exists in all configurations where the psa_crypto module is
180 * enabled. Its expansion depends on the configuration.
181 */
182#define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state
Gilles Peskine30524eb2020-11-13 17:02:26 +0100183
Gilles Peskine30524eb2020-11-13 17:02:26 +0100184/** Seed the PSA DRBG.
185 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100186 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100187 * \param custom The personalization string.
188 * This can be \c NULL, in which case the personalization
189 * string is empty regardless of the value of \p len.
190 * \param len The length of the personalization string.
191 *
192 * \return \c 0 on success.
193 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
194 */
195static inline int mbedtls_psa_drbg_seed(
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100196 mbedtls_entropy_context *entropy,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100197 const unsigned char *custom, size_t len )
198{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100199#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100200 return( mbedtls_ctr_drbg_seed( MBEDTLS_PSA_RANDOM_STATE,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100201 mbedtls_entropy_func,
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100202 entropy,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100203 custom, len ) );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100204#elif defined(MBEDTLS_HMAC_DRBG_C)
205 const mbedtls_md_info_t *md_info =
206 mbedtls_md_info_from_type( MBEDTLS_PSA_HMAC_DRBG_MD_TYPE );
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100207 return( mbedtls_hmac_drbg_seed( MBEDTLS_PSA_RANDOM_STATE,
Gilles Peskine82e57d12020-11-13 21:31:17 +0100208 md_info,
209 mbedtls_entropy_func,
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100210 entropy,
Gilles Peskine82e57d12020-11-13 21:31:17 +0100211 custom, len ) );
212#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100213}
Gilles Peskine90edc992020-11-13 15:39:19 +0100214
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100215#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
216
Gilles Peskine90edc992020-11-13 15:39:19 +0100217#endif /* PSA_CRYPTO_RANDOM_H */