blob: e55410c76d6858cdcd862010ea229f6da9bbf014 [file] [log] [blame]
Paul Bakker6083fd22011-12-03 21:45:14 +00001/*
2 * Entropy accumulator implementation
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakker6083fd22011-12-03 21:45:14 +000018 */
19
Gilles Peskinedb09ef62020-06-03 01:43:33 +020020#include "common.h"
Paul Bakker6083fd22011-12-03 21:45:14 +000021
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#if defined(MBEDTLS_ENTROPY_C)
Paul Bakker6083fd22011-12-03 21:45:14 +000023
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000024#include "mbedtls/entropy.h"
Chris Jonesea0a8652021-03-09 19:11:19 +000025#include "entropy_poll.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050026#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000027#include "mbedtls/error.h"
Paul Bakker6083fd22011-12-03 21:45:14 +000028
Rich Evans00ab4702015-02-06 13:43:58 +000029#include <string.h>
30
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020031#if defined(MBEDTLS_FS_IO)
Paul Bakker66ff70d2014-03-26 11:54:05 +010032#include <stdio.h>
33#endif
34
Paul Bakker217efbc2016-07-14 14:30:03 +010035#include "mbedtls/platform.h"
Paul Bakker217efbc2016-07-14 14:30:03 +010036
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000037#include "mbedtls/platform.h"
Rich Evans00ab4702015-02-06 13:43:58 +000038
Paul Bakker28c7e7f2011-12-15 19:49:30 +000039
Paul Bakker6083fd22011-12-03 21:45:14 +000040#define ENTROPY_MAX_LOOP 256 /**< Maximum amount to loop before error */
41
Gilles Peskine449bd832023-01-11 14:50:10 +010042void mbedtls_entropy_init(mbedtls_entropy_context *ctx)
Paul Bakker6083fd22011-12-03 21:45:14 +000043{
Andres Amaya Garciaa7559cb2017-06-29 16:12:31 +010044 ctx->source_count = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +010045 memset(ctx->source, 0, sizeof(ctx->source));
Paul Bakker6083fd22011-12-03 21:45:14 +000046
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020047#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010048 mbedtls_mutex_init(&ctx->mutex);
Paul Bakkerf4e7dc52013-09-28 15:23:57 +020049#endif
50
Andres Amaya Garcia95869c42017-06-29 16:31:44 +010051 ctx->accumulator_started = 0;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Gilles Peskine449bd832023-01-11 14:50:10 +010053 mbedtls_sha512_init(&ctx->accumulator);
Paul Bakkerfb08fd22013-08-27 15:06:26 +020054#else
Gilles Peskine449bd832023-01-11 14:50:10 +010055 mbedtls_sha256_init(&ctx->accumulator);
Paul Bakkerfb08fd22013-08-27 15:06:26 +020056#endif
Paul Bakker6083fd22011-12-03 21:45:14 +000057
Hanno Beckerd4a872e2017-09-07 08:09:33 +010058 /* Reminder: Update ENTROPY_HAVE_STRONG in the test files
Hanno Becker47deec42017-07-24 12:27:09 +010059 * when adding more strong entropy sources here. */
Hanno Beckerc6deafc2017-07-23 14:06:42 +010060
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020061#if !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES)
62#if !defined(MBEDTLS_NO_PLATFORM_ENTROPY)
Gilles Peskine449bd832023-01-11 14:50:10 +010063 mbedtls_entropy_add_source(ctx, mbedtls_platform_entropy_poll, NULL,
64 MBEDTLS_ENTROPY_MIN_PLATFORM,
65 MBEDTLS_ENTROPY_SOURCE_STRONG);
Paul Bakker6083fd22011-12-03 21:45:14 +000066#endif
Manuel Pégourié-Gonnard3f77dfb2015-06-19 10:06:21 +020067#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Gilles Peskine449bd832023-01-11 14:50:10 +010068 mbedtls_entropy_add_source(ctx, mbedtls_hardware_poll, NULL,
69 MBEDTLS_ENTROPY_MIN_HARDWARE,
70 MBEDTLS_ENTROPY_SOURCE_STRONG);
Manuel Pégourié-Gonnard3f77dfb2015-06-19 10:06:21 +020071#endif
Paul Bakker9988d6b2016-06-01 11:29:42 +010072#if defined(MBEDTLS_ENTROPY_NV_SEED)
Gilles Peskine449bd832023-01-11 14:50:10 +010073 mbedtls_entropy_add_source(ctx, mbedtls_nv_seed_poll, NULL,
74 MBEDTLS_ENTROPY_BLOCK_SIZE,
75 MBEDTLS_ENTROPY_SOURCE_STRONG);
Andres Amaya Garciaa7559cb2017-06-29 16:12:31 +010076 ctx->initial_entropy_run = 0;
Paul Bakker9988d6b2016-06-01 11:29:42 +010077#endif
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020078#endif /* MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES */
Paul Bakker6083fd22011-12-03 21:45:14 +000079}
80
Gilles Peskine449bd832023-01-11 14:50:10 +010081void mbedtls_entropy_free(mbedtls_entropy_context *ctx)
Paul Bakker1ffefac2013-09-28 15:23:03 +020082{
Gilles Peskineb1583212021-02-22 21:26:54 +010083 /* If the context was already free, don't call free() again.
84 * This is important for mutexes which don't allow double-free. */
Gilles Peskine449bd832023-01-11 14:50:10 +010085 if (ctx->accumulator_started == -1) {
Gilles Peskineb1583212021-02-22 21:26:54 +010086 return;
Gilles Peskine449bd832023-01-11 14:50:10 +010087 }
Gilles Peskineb1583212021-02-22 21:26:54 +010088
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020089#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +010090 mbedtls_mutex_free(&ctx->mutex);
Paul Bakkerf4e7dc52013-09-28 15:23:57 +020091#endif
Andres Amaya Garciaa7559cb2017-06-29 16:12:31 +010092#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Gilles Peskine449bd832023-01-11 14:50:10 +010093 mbedtls_sha512_free(&ctx->accumulator);
Andres Amaya Garciaa7559cb2017-06-29 16:12:31 +010094#else
Gilles Peskine449bd832023-01-11 14:50:10 +010095 mbedtls_sha256_free(&ctx->accumulator);
Andres Amaya Garciaa7559cb2017-06-29 16:12:31 +010096#endif
97#if defined(MBEDTLS_ENTROPY_NV_SEED)
98 ctx->initial_entropy_run = 0;
99#endif
100 ctx->source_count = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100101 mbedtls_platform_zeroize(ctx->source, sizeof(ctx->source));
Gilles Peskineb1583212021-02-22 21:26:54 +0100102 ctx->accumulator_started = -1;
Paul Bakker1ffefac2013-09-28 15:23:03 +0200103}
104
Gilles Peskine449bd832023-01-11 14:50:10 +0100105int mbedtls_entropy_add_source(mbedtls_entropy_context *ctx,
106 mbedtls_entropy_f_source_ptr f_source, void *p_source,
107 size_t threshold, int strong)
Paul Bakker6083fd22011-12-03 21:45:14 +0000108{
Hanno Becker61937d42017-04-26 15:01:23 +0100109 int idx, ret = 0;
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000110
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200111#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100112 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
113 return ret;
114 }
Paul Bakker47703a02014-02-06 15:01:20 +0100115#endif
116
Hanno Becker61937d42017-04-26 15:01:23 +0100117 idx = ctx->source_count;
Gilles Peskine449bd832023-01-11 14:50:10 +0100118 if (idx >= MBEDTLS_ENTROPY_MAX_SOURCES) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119 ret = MBEDTLS_ERR_ENTROPY_MAX_SOURCES;
Paul Bakker47703a02014-02-06 15:01:20 +0100120 goto exit;
121 }
Paul Bakker6083fd22011-12-03 21:45:14 +0000122
Hanno Becker61937d42017-04-26 15:01:23 +0100123 ctx->source[idx].f_source = f_source;
124 ctx->source[idx].p_source = p_source;
125 ctx->source[idx].threshold = threshold;
126 ctx->source[idx].strong = strong;
Paul Bakker6083fd22011-12-03 21:45:14 +0000127
128 ctx->source_count++;
129
Paul Bakker47703a02014-02-06 15:01:20 +0100130exit:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200131#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100132 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
133 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
134 }
Paul Bakker47703a02014-02-06 15:01:20 +0100135#endif
136
Gilles Peskine449bd832023-01-11 14:50:10 +0100137 return ret;
Paul Bakker6083fd22011-12-03 21:45:14 +0000138}
139
140/*
141 * Entropy accumulator update
142 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100143static int entropy_update(mbedtls_entropy_context *ctx, unsigned char source_id,
144 const unsigned char *data, size_t len)
Paul Bakker6083fd22011-12-03 21:45:14 +0000145{
146 unsigned char header[2];
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200147 unsigned char tmp[MBEDTLS_ENTROPY_BLOCK_SIZE];
Paul Bakker6083fd22011-12-03 21:45:14 +0000148 size_t use_len = len;
149 const unsigned char *p = data;
Jaeden Amero66954e12018-01-25 16:05:54 +0000150 int ret = 0;
Paul Bakkerb6c5d2e2013-06-25 16:25:17 +0200151
Gilles Peskine449bd832023-01-11 14:50:10 +0100152 if (use_len > MBEDTLS_ENTROPY_BLOCK_SIZE) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200153#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Gilles Peskine449bd832023-01-11 14:50:10 +0100154 if ((ret = mbedtls_sha512(data, len, tmp, 0)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000155 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100156 }
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200157#else
Gilles Peskine449bd832023-01-11 14:50:10 +0100158 if ((ret = mbedtls_sha256(data, len, tmp, 0)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000159 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100160 }
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200161#endif
Paul Bakker6083fd22011-12-03 21:45:14 +0000162 p = tmp;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200163 use_len = MBEDTLS_ENTROPY_BLOCK_SIZE;
Paul Bakker6083fd22011-12-03 21:45:14 +0000164 }
165
166 header[0] = source_id;
167 header[1] = use_len & 0xFF;
168
Andres Amaya Garcia95869c42017-06-29 16:31:44 +0100169 /*
170 * Start the accumulator if this has not already happened. Note that
171 * it is sufficient to start the accumulator here only because all calls to
172 * gather entropy eventually execute this code.
173 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200174#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Gilles Peskine449bd832023-01-11 14:50:10 +0100175 if (ctx->accumulator_started == 0 &&
176 (ret = mbedtls_sha512_starts(&ctx->accumulator, 0)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000177 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100178 } else {
Andres Amaya Garcia95869c42017-06-29 16:31:44 +0100179 ctx->accumulator_started = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100180 }
181 if ((ret = mbedtls_sha512_update(&ctx->accumulator, header, 2)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000182 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100183 }
184 ret = mbedtls_sha512_update(&ctx->accumulator, p, use_len);
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200185#else
Gilles Peskine449bd832023-01-11 14:50:10 +0100186 if (ctx->accumulator_started == 0 &&
187 (ret = mbedtls_sha256_starts(&ctx->accumulator, 0)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000188 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100189 } else {
Andres Amaya Garcia95869c42017-06-29 16:31:44 +0100190 ctx->accumulator_started = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100191 }
192 if ((ret = mbedtls_sha256_update(&ctx->accumulator, header, 2)) != 0) {
Jaeden Amero66954e12018-01-25 16:05:54 +0000193 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100194 }
195 ret = mbedtls_sha256_update(&ctx->accumulator, p, use_len);
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200196#endif
Paul Bakkerb6c5d2e2013-06-25 16:25:17 +0200197
Jaeden Amero66954e12018-01-25 16:05:54 +0000198cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100199 mbedtls_platform_zeroize(tmp, sizeof(tmp));
Andres Amaya Garcia65121932017-07-05 15:45:47 +0100200
Gilles Peskine449bd832023-01-11 14:50:10 +0100201 return ret;
Paul Bakker6083fd22011-12-03 21:45:14 +0000202}
203
Gilles Peskine449bd832023-01-11 14:50:10 +0100204int mbedtls_entropy_update_manual(mbedtls_entropy_context *ctx,
205 const unsigned char *data, size_t len)
Paul Bakker6083fd22011-12-03 21:45:14 +0000206{
Janos Follath24eed8d2019-11-22 13:21:35 +0000207 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakker47703a02014-02-06 15:01:20 +0100208
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200209#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100210 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
211 return ret;
212 }
Paul Bakker47703a02014-02-06 15:01:20 +0100213#endif
214
Gilles Peskine449bd832023-01-11 14:50:10 +0100215 ret = entropy_update(ctx, MBEDTLS_ENTROPY_SOURCE_MANUAL, data, len);
Paul Bakker47703a02014-02-06 15:01:20 +0100216
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200217#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100218 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
219 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
220 }
Paul Bakker47703a02014-02-06 15:01:20 +0100221#endif
222
Gilles Peskine449bd832023-01-11 14:50:10 +0100223 return ret;
Paul Bakker6083fd22011-12-03 21:45:14 +0000224}
225
226/*
227 * Run through the different sources to add entropy to our accumulator
228 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100229static int entropy_gather_internal(mbedtls_entropy_context *ctx)
Paul Bakker6083fd22011-12-03 21:45:14 +0000230{
Gilles Peskine006c1b52019-09-30 17:29:54 +0200231 int ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
232 int i;
233 int have_one_strong = 0;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200234 unsigned char buf[MBEDTLS_ENTROPY_MAX_GATHER];
Paul Bakker6083fd22011-12-03 21:45:14 +0000235 size_t olen;
Paul Bakker47703a02014-02-06 15:01:20 +0100236
Gilles Peskine449bd832023-01-11 14:50:10 +0100237 if (ctx->source_count == 0) {
238 return MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED;
239 }
Paul Bakker43655f42011-12-15 20:11:16 +0000240
Paul Bakker6083fd22011-12-03 21:45:14 +0000241 /*
242 * Run through our entropy sources
243 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100244 for (i = 0; i < ctx->source_count; i++) {
245 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) {
Manuel Pégourié-Gonnard7580ba42015-06-19 10:26:32 +0200246 have_one_strong = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100247 }
Manuel Pégourié-Gonnard7580ba42015-06-19 10:26:32 +0200248
Paul Bakker6083fd22011-12-03 21:45:14 +0000249 olen = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100250 if ((ret = ctx->source[i].f_source(ctx->source[i].p_source,
251 buf, MBEDTLS_ENTROPY_MAX_GATHER, &olen)) != 0) {
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100252 goto cleanup;
Paul Bakker6083fd22011-12-03 21:45:14 +0000253 }
254
255 /*
256 * Add if we actually gathered something
257 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100258 if (olen > 0) {
259 if ((ret = entropy_update(ctx, (unsigned char) i,
260 buf, olen)) != 0) {
261 return ret;
262 }
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000263 ctx->source[i].size += olen;
264 }
Paul Bakker6083fd22011-12-03 21:45:14 +0000265 }
266
Gilles Peskine449bd832023-01-11 14:50:10 +0100267 if (have_one_strong == 0) {
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100268 ret = MBEDTLS_ERR_ENTROPY_NO_STRONG_SOURCE;
Gilles Peskine449bd832023-01-11 14:50:10 +0100269 }
Manuel Pégourié-Gonnard7580ba42015-06-19 10:26:32 +0200270
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100271cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100272 mbedtls_platform_zeroize(buf, sizeof(buf));
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100273
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 return ret;
Paul Bakker6083fd22011-12-03 21:45:14 +0000275}
276
Paul Bakker47703a02014-02-06 15:01:20 +0100277/*
278 * Thread-safe wrapper for entropy_gather_internal()
279 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100280int mbedtls_entropy_gather(mbedtls_entropy_context *ctx)
Paul Bakker47703a02014-02-06 15:01:20 +0100281{
Janos Follath24eed8d2019-11-22 13:21:35 +0000282 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakker47703a02014-02-06 15:01:20 +0100283
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200284#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100285 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
286 return ret;
287 }
Paul Bakker47703a02014-02-06 15:01:20 +0100288#endif
289
Gilles Peskine449bd832023-01-11 14:50:10 +0100290 ret = entropy_gather_internal(ctx);
Paul Bakker47703a02014-02-06 15:01:20 +0100291
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200292#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100293 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
294 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
295 }
Paul Bakker47703a02014-02-06 15:01:20 +0100296#endif
297
Gilles Peskine449bd832023-01-11 14:50:10 +0100298 return ret;
Paul Bakker47703a02014-02-06 15:01:20 +0100299}
300
Gilles Peskine449bd832023-01-11 14:50:10 +0100301int mbedtls_entropy_func(void *data, unsigned char *output, size_t len)
Paul Bakker6083fd22011-12-03 21:45:14 +0000302{
Gilles Peskine85485c72019-10-08 15:04:16 +0200303 int ret, count = 0, i, thresholds_reached;
304 size_t strong_size;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200305 mbedtls_entropy_context *ctx = (mbedtls_entropy_context *) data;
306 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
Paul Bakker6083fd22011-12-03 21:45:14 +0000307
Gilles Peskine449bd832023-01-11 14:50:10 +0100308 if (len > MBEDTLS_ENTROPY_BLOCK_SIZE) {
309 return MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
310 }
Paul Bakker6083fd22011-12-03 21:45:14 +0000311
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100312#if defined(MBEDTLS_ENTROPY_NV_SEED)
313 /* Update the NV entropy seed before generating any entropy for outside
314 * use.
315 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100316 if (ctx->initial_entropy_run == 0) {
Paul Bakkerfc9c7c82016-06-01 15:25:50 +0100317 ctx->initial_entropy_run = 1;
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 if ((ret = mbedtls_entropy_update_nv_seed(ctx)) != 0) {
319 return ret;
320 }
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100321 }
322#endif
323
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200324#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
326 return ret;
327 }
Paul Bakkerf4e7dc52013-09-28 15:23:57 +0200328#endif
329
Paul Bakker6083fd22011-12-03 21:45:14 +0000330 /*
331 * Always gather extra entropy before a call
332 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100333 do {
334 if (count++ > ENTROPY_MAX_LOOP) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200335 ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
Paul Bakkerf4e7dc52013-09-28 15:23:57 +0200336 goto exit;
337 }
Paul Bakker6083fd22011-12-03 21:45:14 +0000338
Gilles Peskine449bd832023-01-11 14:50:10 +0100339 if ((ret = entropy_gather_internal(ctx)) != 0) {
Paul Bakkerf4e7dc52013-09-28 15:23:57 +0200340 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100341 }
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000342
Gilles Peskine85485c72019-10-08 15:04:16 +0200343 thresholds_reached = 1;
344 strong_size = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100345 for (i = 0; i < ctx->source_count; i++) {
346 if (ctx->source[i].size < ctx->source[i].threshold) {
Gilles Peskine85485c72019-10-08 15:04:16 +0200347 thresholds_reached = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100348 }
349 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) {
Gilles Peskine85485c72019-10-08 15:04:16 +0200350 strong_size += ctx->source[i].size;
Gilles Peskine449bd832023-01-11 14:50:10 +0100351 }
Gilles Peskine85485c72019-10-08 15:04:16 +0200352 }
Gilles Peskine449bd832023-01-11 14:50:10 +0100353 } while (!thresholds_reached || strong_size < MBEDTLS_ENTROPY_BLOCK_SIZE);
Paul Bakker6083fd22011-12-03 21:45:14 +0000354
Gilles Peskine449bd832023-01-11 14:50:10 +0100355 memset(buf, 0, MBEDTLS_ENTROPY_BLOCK_SIZE);
Paul Bakker6083fd22011-12-03 21:45:14 +0000356
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200357#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR)
Andres Amaya Garciab2b063f2017-07-20 16:45:24 +0100358 /*
359 * Note that at this stage it is assumed that the accumulator was started
360 * in a previous call to entropy_update(). If this is not guaranteed, the
361 * code below will fail.
362 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100363 if ((ret = mbedtls_sha512_finish(&ctx->accumulator, buf)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100364 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100365 }
Paul Bakker9e36f042013-06-30 14:34:05 +0200366
Paul Bakker6083fd22011-12-03 21:45:14 +0000367 /*
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000368 * Reset accumulator and counters and recycle existing entropy
Paul Bakker6083fd22011-12-03 21:45:14 +0000369 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100370 mbedtls_sha512_free(&ctx->accumulator);
371 mbedtls_sha512_init(&ctx->accumulator);
372 if ((ret = mbedtls_sha512_starts(&ctx->accumulator, 0)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100373 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100374 }
375 if ((ret = mbedtls_sha512_update(&ctx->accumulator, buf,
376 MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100377 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100378 }
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200379
380 /*
Paul Bakkerb13d3ff2014-03-26 12:51:25 +0100381 * Perform second SHA-512 on entropy
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200382 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100383 if ((ret = mbedtls_sha512(buf, MBEDTLS_ENTROPY_BLOCK_SIZE,
384 buf, 0)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100385 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100386 }
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200387#else /* MBEDTLS_ENTROPY_SHA512_ACCUMULATOR */
Gilles Peskine449bd832023-01-11 14:50:10 +0100388 if ((ret = mbedtls_sha256_finish(&ctx->accumulator, buf)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100389 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100390 }
Paul Bakkerfb08fd22013-08-27 15:06:26 +0200391
392 /*
393 * Reset accumulator and counters and recycle existing entropy
394 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100395 mbedtls_sha256_free(&ctx->accumulator);
396 mbedtls_sha256_init(&ctx->accumulator);
397 if ((ret = mbedtls_sha256_starts(&ctx->accumulator, 0)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100398 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100399 }
400 if ((ret = mbedtls_sha256_update(&ctx->accumulator, buf,
401 MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100402 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100403 }
Paul Bakkerb13d3ff2014-03-26 12:51:25 +0100404
405 /*
406 * Perform second SHA-256 on entropy
407 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100408 if ((ret = mbedtls_sha256(buf, MBEDTLS_ENTROPY_BLOCK_SIZE,
409 buf, 0)) != 0) {
Andres Amaya Garcia207cea52017-06-29 13:28:13 +0100410 goto exit;
Gilles Peskine449bd832023-01-11 14:50:10 +0100411 }
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200412#endif /* MBEDTLS_ENTROPY_SHA512_ACCUMULATOR */
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000413
Gilles Peskine449bd832023-01-11 14:50:10 +0100414 for (i = 0; i < ctx->source_count; i++) {
Paul Bakkerbd4a9d02011-12-10 17:02:19 +0000415 ctx->source[i].size = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100416 }
Paul Bakker6083fd22011-12-03 21:45:14 +0000417
Gilles Peskine449bd832023-01-11 14:50:10 +0100418 memcpy(output, buf, len);
Paul Bakker6083fd22011-12-03 21:45:14 +0000419
Paul Bakkerf4e7dc52013-09-28 15:23:57 +0200420 ret = 0;
421
422exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100423 mbedtls_platform_zeroize(buf, sizeof(buf));
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100424
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200425#if defined(MBEDTLS_THREADING_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100426 if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
427 return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
428 }
Paul Bakkerf4e7dc52013-09-28 15:23:57 +0200429#endif
430
Gilles Peskine449bd832023-01-11 14:50:10 +0100431 return ret;
Paul Bakker6083fd22011-12-03 21:45:14 +0000432}
433
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100434#if defined(MBEDTLS_ENTROPY_NV_SEED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100435int mbedtls_entropy_update_nv_seed(mbedtls_entropy_context *ctx)
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100436{
437 int ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
Andres Amaya Garciaaf0b31d2017-07-05 14:23:54 +0100438 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100439
440 /* Read new seed and write it to NV */
Gilles Peskine449bd832023-01-11 14:50:10 +0100441 if ((ret = mbedtls_entropy_func(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
442 return ret;
443 }
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100444
Gilles Peskine449bd832023-01-11 14:50:10 +0100445 if (mbedtls_nv_seed_write(buf, MBEDTLS_ENTROPY_BLOCK_SIZE) < 0) {
446 return MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
447 }
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100448
449 /* Manually update the remaining stream with a separator value to diverge */
Gilles Peskine449bd832023-01-11 14:50:10 +0100450 memset(buf, 0, MBEDTLS_ENTROPY_BLOCK_SIZE);
451 ret = mbedtls_entropy_update_manual(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE);
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100452
Gilles Peskine449bd832023-01-11 14:50:10 +0100453 return ret;
Paul Bakkerd5c9f6d2016-06-01 11:30:54 +0100454}
455#endif /* MBEDTLS_ENTROPY_NV_SEED */
456
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200457#if defined(MBEDTLS_FS_IO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100458int mbedtls_entropy_write_seed_file(mbedtls_entropy_context *ctx, const char *path)
Paul Bakker66ff70d2014-03-26 11:54:05 +0100459{
Victor Krasnoshchoka0c2d192020-09-03 00:07:05 +0300460 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Victor Krasnoshchoke79812e2020-08-27 00:19:55 +0300461 FILE *f = NULL;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200462 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
Paul Bakker66ff70d2014-03-26 11:54:05 +0100463
Gilles Peskine449bd832023-01-11 14:50:10 +0100464 if ((ret = mbedtls_entropy_func(ctx, buf, MBEDTLS_ENTROPY_BLOCK_SIZE)) != 0) {
Victor Krasnoshchokb3129ba2020-08-29 22:54:37 +0300465 ret = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
Paul Bakker66ff70d2014-03-26 11:54:05 +0100466 goto exit;
Victor Krasnoshchokb3129ba2020-08-29 22:54:37 +0300467 }
468
Gilles Peskine449bd832023-01-11 14:50:10 +0100469 if ((f = fopen(path, "wb")) == NULL) {
Victor Krasnoshchokb3129ba2020-08-29 22:54:37 +0300470 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
471 goto exit;
472 }
Paul Bakker66ff70d2014-03-26 11:54:05 +0100473
Gilles Peskineda0913b2022-06-30 17:03:40 +0200474 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100475 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200476
Gilles Peskine449bd832023-01-11 14:50:10 +0100477 if (fwrite(buf, 1, MBEDTLS_ENTROPY_BLOCK_SIZE, f) != MBEDTLS_ENTROPY_BLOCK_SIZE) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200478 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
Paul Bakker66ff70d2014-03-26 11:54:05 +0100479 goto exit;
480 }
481
482 ret = 0;
483
484exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100485 mbedtls_platform_zeroize(buf, sizeof(buf));
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100486
Gilles Peskine449bd832023-01-11 14:50:10 +0100487 if (f != NULL) {
488 fclose(f);
489 }
Victor Krasnoshchoke79812e2020-08-27 00:19:55 +0300490
Gilles Peskine449bd832023-01-11 14:50:10 +0100491 return ret;
Paul Bakker66ff70d2014-03-26 11:54:05 +0100492}
493
Gilles Peskine449bd832023-01-11 14:50:10 +0100494int mbedtls_entropy_update_seed_file(mbedtls_entropy_context *ctx, const char *path)
Paul Bakker66ff70d2014-03-26 11:54:05 +0100495{
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100496 int ret = 0;
Paul Bakker66ff70d2014-03-26 11:54:05 +0100497 FILE *f;
498 size_t n;
Gilles Peskine449bd832023-01-11 14:50:10 +0100499 unsigned char buf[MBEDTLS_ENTROPY_MAX_SEED_SIZE];
Paul Bakker66ff70d2014-03-26 11:54:05 +0100500
Gilles Peskine449bd832023-01-11 14:50:10 +0100501 if ((f = fopen(path, "rb")) == NULL) {
502 return MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
503 }
Paul Bakker66ff70d2014-03-26 11:54:05 +0100504
Gilles Peskineda0913b2022-06-30 17:03:40 +0200505 /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100506 mbedtls_setbuf(f, NULL);
Gilles Peskineda0913b2022-06-30 17:03:40 +0200507
Gilles Peskine449bd832023-01-11 14:50:10 +0100508 fseek(f, 0, SEEK_END);
509 n = (size_t) ftell(f);
510 fseek(f, 0, SEEK_SET);
Paul Bakker66ff70d2014-03-26 11:54:05 +0100511
Gilles Peskine449bd832023-01-11 14:50:10 +0100512 if (n > MBEDTLS_ENTROPY_MAX_SEED_SIZE) {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200513 n = MBEDTLS_ENTROPY_MAX_SEED_SIZE;
Gilles Peskine449bd832023-01-11 14:50:10 +0100514 }
Paul Bakker66ff70d2014-03-26 11:54:05 +0100515
Gilles Peskine449bd832023-01-11 14:50:10 +0100516 if (fread(buf, 1, n, f) != n) {
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100517 ret = MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR;
Gilles Peskine449bd832023-01-11 14:50:10 +0100518 } else {
519 ret = mbedtls_entropy_update_manual(ctx, buf, n);
520 }
Paul Bakker66ff70d2014-03-26 11:54:05 +0100521
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 fclose(f);
Paul Bakker66ff70d2014-03-26 11:54:05 +0100523
Gilles Peskine449bd832023-01-11 14:50:10 +0100524 mbedtls_platform_zeroize(buf, sizeof(buf));
Andres Amaya Garcia1adcd952017-06-26 09:58:59 +0100525
Gilles Peskine449bd832023-01-11 14:50:10 +0100526 if (ret != 0) {
527 return ret;
528 }
Paul Bakker66ff70d2014-03-26 11:54:05 +0100529
Gilles Peskine449bd832023-01-11 14:50:10 +0100530 return mbedtls_entropy_write_seed_file(ctx, path);
Paul Bakker66ff70d2014-03-26 11:54:05 +0100531}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200532#endif /* MBEDTLS_FS_IO */
Paul Bakker66ff70d2014-03-26 11:54:05 +0100533
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200534#if defined(MBEDTLS_SELF_TEST)
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200535/*
536 * Dummy source function
537 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100538static int entropy_dummy_source(void *data, unsigned char *output,
539 size_t len, size_t *olen)
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200540{
541 ((void) data);
542
Gilles Peskine449bd832023-01-11 14:50:10 +0100543 memset(output, 0x2a, len);
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200544 *olen = len;
545
Gilles Peskine449bd832023-01-11 14:50:10 +0100546 return 0;
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200547}
548
Andres AGe7723ec2016-08-25 10:18:50 +0100549#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Andres AGb34e42e2016-08-22 11:08:50 +0100550
Gilles Peskine449bd832023-01-11 14:50:10 +0100551static int mbedtls_entropy_source_self_test_gather(unsigned char *buf, size_t buf_len)
Andres AGe7723ec2016-08-25 10:18:50 +0100552{
553 int ret = 0;
554 size_t entropy_len = 0;
555 size_t olen = 0;
556 size_t attempts = buf_len;
557
Gilles Peskine449bd832023-01-11 14:50:10 +0100558 while (attempts > 0 && entropy_len < buf_len) {
559 if ((ret = mbedtls_hardware_poll(NULL, buf + entropy_len,
560 buf_len - entropy_len, &olen)) != 0) {
561 return ret;
562 }
Andres AGe7723ec2016-08-25 10:18:50 +0100563
564 entropy_len += olen;
565 attempts--;
566 }
567
Gilles Peskine449bd832023-01-11 14:50:10 +0100568 if (entropy_len < buf_len) {
Andres AGe7723ec2016-08-25 10:18:50 +0100569 ret = 1;
570 }
571
Gilles Peskine449bd832023-01-11 14:50:10 +0100572 return ret;
Andres AGe7723ec2016-08-25 10:18:50 +0100573}
574
575
Gilles Peskine449bd832023-01-11 14:50:10 +0100576static int mbedtls_entropy_source_self_test_check_bits(const unsigned char *buf,
577 size_t buf_len)
Andres AGe7723ec2016-08-25 10:18:50 +0100578{
Gilles Peskine449bd832023-01-11 14:50:10 +0100579 unsigned char set = 0xFF;
Andres AGe7723ec2016-08-25 10:18:50 +0100580 unsigned char unset = 0x00;
581 size_t i;
582
Gilles Peskine449bd832023-01-11 14:50:10 +0100583 for (i = 0; i < buf_len; i++) {
Andres AGe7723ec2016-08-25 10:18:50 +0100584 set &= buf[i];
585 unset |= buf[i];
586 }
587
Gilles Peskine449bd832023-01-11 14:50:10 +0100588 return set == 0xFF || unset == 0x00;
Andres AGe7723ec2016-08-25 10:18:50 +0100589}
Andres AGb34e42e2016-08-22 11:08:50 +0100590
591/*
Zachary Fleckenstein73defe42022-12-08 07:28:29 -0500592 * A test to ensure that the entropy sources are functioning correctly
Andres AGe7723ec2016-08-25 10:18:50 +0100593 * and there is no obvious failure. The test performs the following checks:
Andres AGb34e42e2016-08-22 11:08:50 +0100594 * - The entropy source is not providing only 0s (all bits unset) or 1s (all
595 * bits set).
596 * - The entropy source is not providing values in a pattern. Because the
Andres AGe7723ec2016-08-25 10:18:50 +0100597 * hardware could be providing data in an arbitrary length, this check polls
598 * the hardware entropy source twice and compares the result to ensure they
599 * are not equal.
Andres AGb34e42e2016-08-22 11:08:50 +0100600 * - The error code returned by the entropy source is not an error.
601 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100602int mbedtls_entropy_source_self_test(int verbose)
Andres AGb34e42e2016-08-22 11:08:50 +0100603{
604 int ret = 0;
Gilles Peskine449bd832023-01-11 14:50:10 +0100605 unsigned char buf0[2 * sizeof(unsigned long long int)];
606 unsigned char buf1[2 * sizeof(unsigned long long int)];
Andres AGb34e42e2016-08-22 11:08:50 +0100607
Gilles Peskine449bd832023-01-11 14:50:10 +0100608 if (verbose != 0) {
609 mbedtls_printf(" ENTROPY_BIAS test: ");
610 }
Andres AGb34e42e2016-08-22 11:08:50 +0100611
Gilles Peskine449bd832023-01-11 14:50:10 +0100612 memset(buf0, 0x00, sizeof(buf0));
613 memset(buf1, 0x00, sizeof(buf1));
Andres AGb34e42e2016-08-22 11:08:50 +0100614
Gilles Peskine449bd832023-01-11 14:50:10 +0100615 if ((ret = mbedtls_entropy_source_self_test_gather(buf0, sizeof(buf0))) != 0) {
Andres AGb34e42e2016-08-22 11:08:50 +0100616 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100617 }
618 if ((ret = mbedtls_entropy_source_self_test_gather(buf1, sizeof(buf1))) != 0) {
Andres AGe7723ec2016-08-25 10:18:50 +0100619 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100620 }
Andres AGe7723ec2016-08-25 10:18:50 +0100621
622 /* Make sure that the returned values are not all 0 or 1 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100623 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf0, sizeof(buf0))) != 0) {
Andres AGe7723ec2016-08-25 10:18:50 +0100624 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100625 }
626 if ((ret = mbedtls_entropy_source_self_test_check_bits(buf1, sizeof(buf1))) != 0) {
Andres AGe7723ec2016-08-25 10:18:50 +0100627 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100628 }
Andres AGb34e42e2016-08-22 11:08:50 +0100629
630 /* Make sure that the entropy source is not returning values in a
631 * pattern */
Gilles Peskine449bd832023-01-11 14:50:10 +0100632 ret = memcmp(buf0, buf1, sizeof(buf0)) == 0;
Andres AGb34e42e2016-08-22 11:08:50 +0100633
634cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100635 if (verbose != 0) {
636 if (ret != 0) {
637 mbedtls_printf("failed\n");
638 } else {
639 mbedtls_printf("passed\n");
640 }
Andres AGb34e42e2016-08-22 11:08:50 +0100641
Gilles Peskine449bd832023-01-11 14:50:10 +0100642 mbedtls_printf("\n");
Andres AGb34e42e2016-08-22 11:08:50 +0100643 }
644
Gilles Peskine449bd832023-01-11 14:50:10 +0100645 return ret != 0;
Andres AGb34e42e2016-08-22 11:08:50 +0100646}
Andres AGe7723ec2016-08-25 10:18:50 +0100647
648#endif /* MBEDTLS_ENTROPY_HARDWARE_ALT */
Andres AGb34e42e2016-08-22 11:08:50 +0100649
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200650/*
651 * The actual entropy quality is hard to test, but we can at least
652 * test that the functions don't cause errors and write the correct
653 * amount of data to buffers.
654 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100655int mbedtls_entropy_self_test(int verbose)
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200656{
Andres Amaya Garciaa928e672016-09-13 13:30:02 +0100657 int ret = 1;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200658 mbedtls_entropy_context ctx;
659 unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE] = { 0 };
660 unsigned char acc[MBEDTLS_ENTROPY_BLOCK_SIZE] = { 0 };
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200661 size_t i, j;
662
Gilles Peskine449bd832023-01-11 14:50:10 +0100663 if (verbose != 0) {
664 mbedtls_printf(" ENTROPY test: ");
665 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200666
Gilles Peskine449bd832023-01-11 14:50:10 +0100667 mbedtls_entropy_init(&ctx);
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200668
Manuel Pégourié-Gonnard7580ba42015-06-19 10:26:32 +0200669 /* First do a gather to make sure we have default sources */
Gilles Peskine449bd832023-01-11 14:50:10 +0100670 if ((ret = mbedtls_entropy_gather(&ctx)) != 0) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200671 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100672 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200673
Gilles Peskine449bd832023-01-11 14:50:10 +0100674 ret = mbedtls_entropy_add_source(&ctx, entropy_dummy_source, NULL, 16,
675 MBEDTLS_ENTROPY_SOURCE_WEAK);
676 if (ret != 0) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200677 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100678 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200679
Dave Rodgman6dd757a2023-02-02 12:40:50 +0000680 if ((ret = mbedtls_entropy_update_manual(&ctx, buf, sizeof(buf))) != 0) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200681 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100682 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200683
684 /*
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200685 * To test that mbedtls_entropy_func writes correct number of bytes:
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200686 * - use the whole buffer and rely on ASan to detect overruns
687 * - collect entropy 8 times and OR the result in an accumulator:
688 * any byte should then be 0 with probably 2^(-64), so requiring
689 * each of the 32 or 64 bytes to be non-zero has a false failure rate
690 * of at most 2^(-58) which is acceptable.
691 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100692 for (i = 0; i < 8; i++) {
693 if ((ret = mbedtls_entropy_func(&ctx, buf, sizeof(buf))) != 0) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200694 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100695 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200696
Gilles Peskine449bd832023-01-11 14:50:10 +0100697 for (j = 0; j < sizeof(buf); j++) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200698 acc[j] |= buf[j];
Gilles Peskine449bd832023-01-11 14:50:10 +0100699 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200700 }
701
Gilles Peskine449bd832023-01-11 14:50:10 +0100702 for (j = 0; j < sizeof(buf); j++) {
703 if (acc[j] == 0) {
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200704 ret = 1;
705 goto cleanup;
706 }
707 }
708
Andres AGe7723ec2016-08-25 10:18:50 +0100709#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
Gilles Peskine449bd832023-01-11 14:50:10 +0100710 if ((ret = mbedtls_entropy_source_self_test(0)) != 0) {
Andres AGe7723ec2016-08-25 10:18:50 +0100711 goto cleanup;
Gilles Peskine449bd832023-01-11 14:50:10 +0100712 }
Andres AGe7723ec2016-08-25 10:18:50 +0100713#endif
714
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200715cleanup:
Gilles Peskine449bd832023-01-11 14:50:10 +0100716 mbedtls_entropy_free(&ctx);
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200717
Gilles Peskine449bd832023-01-11 14:50:10 +0100718 if (verbose != 0) {
719 if (ret != 0) {
720 mbedtls_printf("failed\n");
721 } else {
722 mbedtls_printf("passed\n");
723 }
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200724
Gilles Peskine449bd832023-01-11 14:50:10 +0100725 mbedtls_printf("\n");
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200726 }
727
Gilles Peskine449bd832023-01-11 14:50:10 +0100728 return ret != 0;
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200729}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200730#endif /* MBEDTLS_SELF_TEST */
Manuel Pégourié-Gonnard4dd73922014-05-30 10:34:15 +0200731
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200732#endif /* MBEDTLS_ENTROPY_C */