Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 1 | /** \file psa_crypto_random_impl.h |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 2 | * |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 3 | * \brief PSA crypto random generator implementation abstraction. |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 4 | */ |
| 5 | /* |
| 6 | * Copyright The Mbed TLS Contributors |
| 7 | * SPDX-License-Identifier: Apache-2.0 |
| 8 | * |
| 9 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 10 | * not use this file except in compliance with the License. |
| 11 | * You may obtain a copy of the License at |
| 12 | * |
| 13 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 14 | * |
| 15 | * Unless required by applicable law or agreed to in writing, software |
| 16 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 17 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 18 | * See the License for the specific language governing permissions and |
| 19 | * limitations under the License. |
| 20 | */ |
| 21 | |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 22 | #ifndef PSA_CRYPTO_RANDOM_IMPL_H |
| 23 | #define PSA_CRYPTO_RANDOM_IMPL_H |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 24 | |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 25 | #if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG) |
| 26 | |
| 27 | #include <string.h> |
| 28 | #include <mbedtls/entropy.h> // only for error codes |
| 29 | #include <psa/crypto.h> |
| 30 | |
| 31 | typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t; |
| 32 | |
Gilles Peskine | 8814fc4 | 2020-12-14 15:33:44 +0100 | [diff] [blame] | 33 | int mbedtls_psa_get_random( void *p_rng, |
| 34 | unsigned char *output, |
| 35 | size_t output_size ); |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 36 | |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 37 | #define MBEDTLS_PSA_RANDOM_STATE NULL |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 38 | |
| 39 | #else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */ |
| 40 | |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 41 | /* Choose a DRBG based on configuration and availability */ |
| 42 | #if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE) |
| 43 | |
| 44 | #include "mbedtls/hmac_drbg.h" |
| 45 | |
| 46 | #elif defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 47 | |
| 48 | #include "mbedtls/ctr_drbg.h" |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 49 | |
| 50 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 51 | |
| 52 | #include "mbedtls/hmac_drbg.h" |
| 53 | #if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_SHA256_C) |
| 54 | #include <limits.h> |
| 55 | #if SIZE_MAX > 0xffffffff |
| 56 | /* Looks like a 64-bit system, so prefer SHA-512. */ |
| 57 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512 |
| 58 | #else |
| 59 | /* Looks like a 32-bit system, so prefer SHA-256. */ |
| 60 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256 |
| 61 | #endif |
| 62 | #elif defined(MBEDTLS_SHA512_C) |
| 63 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512 |
| 64 | #elif defined(MBEDTLS_SHA256_C) |
| 65 | #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256 |
| 66 | #else |
| 67 | #error "No hash algorithm available for HMAC_DBRG." |
| 68 | #endif |
| 69 | |
| 70 | #else |
| 71 | #error "No DRBG module available for the psa_crypto module." |
| 72 | #endif |
| 73 | |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 74 | #include "mbedtls/entropy.h" |
| 75 | |
| 76 | /** The type of the PSA DRBG context. |
| 77 | */ |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 78 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 79 | typedef mbedtls_ctr_drbg_context mbedtls_psa_drbg_context_t; |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 80 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 81 | typedef mbedtls_hmac_drbg_context mbedtls_psa_drbg_context_t; |
| 82 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 83 | |
| 84 | /** Initialize the PSA DRBG. |
| 85 | * |
| 86 | * \param p_rng Pointer to the Mbed TLS DRBG state. |
| 87 | */ |
| 88 | static inline void mbedtls_psa_drbg_init( mbedtls_psa_drbg_context_t *p_rng ) |
| 89 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 90 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 91 | mbedtls_ctr_drbg_init( p_rng ); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 92 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 93 | mbedtls_hmac_drbg_init( p_rng ); |
| 94 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 95 | } |
| 96 | |
| 97 | /** Deinitialize the PSA DRBG. |
| 98 | * |
| 99 | * \param p_rng Pointer to the Mbed TLS DRBG state. |
| 100 | */ |
| 101 | static inline void mbedtls_psa_drbg_free( mbedtls_psa_drbg_context_t *p_rng ) |
| 102 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 103 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 104 | mbedtls_ctr_drbg_free( p_rng ); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 105 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 106 | mbedtls_hmac_drbg_free( p_rng ); |
| 107 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 108 | } |
| 109 | |
| 110 | /** The type of the PSA random generator context. |
| 111 | * |
| 112 | * The random generator context is composed of an entropy context and |
| 113 | * a DRBG context. |
| 114 | */ |
| 115 | typedef struct |
| 116 | { |
| 117 | void (* entropy_init )( mbedtls_entropy_context *ctx ); |
| 118 | void (* entropy_free )( mbedtls_entropy_context *ctx ); |
| 119 | mbedtls_entropy_context entropy; |
| 120 | mbedtls_psa_drbg_context_t drbg; |
| 121 | } mbedtls_psa_random_context_t; |
| 122 | |
Gilles Peskine | b3cd963 | 2020-12-14 19:54:24 +0100 | [diff] [blame] | 123 | /* The type of an Mbed TLS random generator function. This should be |
| 124 | * part of the public API instead of repeating the type everywhere. |
| 125 | * For the time being, declare it here. Declaring a type is necessary |
| 126 | * to define mbedtls_psa_get_random as a variable of a function pointer |
| 127 | * type without incurring the wrath of check-names.sh. */ |
| 128 | typedef int mbedtls_f_rng_t( void *p_rng, unsigned char *output, size_t output_size ); |
| 129 | |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 130 | /** Return random data. |
| 131 | * |
| 132 | * This function is suitable as the \p f_rng parameter to Mbed TLS functions |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 133 | * that require a random generator. Use #MBEDTLS_PSA_RANDOM_STATE to |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 134 | * obtain the \p p_rng parameter. |
| 135 | * |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 136 | * \param p_rng The DRBG context. This must be |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 137 | * #MBEDTLS_PSA_RANDOM_STATE. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 138 | * \param output The buffer to fill. |
| 139 | * \param output_len The length of the buffer in bytes. |
| 140 | * It must be at most #MBEDTLS_PSA_RANDOM_MAX_REQUEST. |
| 141 | * |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 142 | * \retval \c 0 on success. |
| 143 | * \return \c MBEDTLS_ERR_xxx_DRBG_xxx or |
| 144 | * \c MBEDTLS_ERR_PLATFORM_xxx on failure. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 145 | */ |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 146 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | b3cd963 | 2020-12-14 19:54:24 +0100 | [diff] [blame] | 147 | static mbedtls_f_rng_t *const mbedtls_psa_get_random = mbedtls_ctr_drbg_random; |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 148 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
Gilles Peskine | b3cd963 | 2020-12-14 19:54:24 +0100 | [diff] [blame] | 149 | static mbedtls_f_rng_t *const mbedtls_psa_get_random = mbedtls_hmac_drbg_random; |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 150 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 151 | |
| 152 | /** The maximum number of bytes that mbedtls_psa_get_random() is expected to |
| 153 | * return. |
| 154 | */ |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 155 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 156 | #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 157 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 158 | #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST |
| 159 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 160 | |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 161 | /** A pointer to the PSA DRBG state. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 162 | * |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 163 | * This variable is only intended to be used through the macro |
| 164 | * #MBEDTLS_PSA_RANDOM_STATE. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 165 | */ |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 166 | extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state; |
| 167 | |
| 168 | /** A pointer to the PSA DRBG state. |
| 169 | * |
Gilles Peskine | 88fa5c4 | 2021-01-04 21:00:53 +0100 | [diff] [blame^] | 170 | * This macro expands to an expression that is suitable as the \c p_rng |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 171 | * parameter to pass to mbedtls_psa_get_random(). |
| 172 | * |
| 173 | * This macro exists in all configurations where the psa_crypto module is |
| 174 | * enabled. Its expansion depends on the configuration. |
| 175 | */ |
| 176 | #define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 177 | |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 178 | /** Seed the PSA DRBG. |
| 179 | * |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 180 | * \param entropy An entropy context to read the seed from. |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 181 | * \param custom The personalization string. |
| 182 | * This can be \c NULL, in which case the personalization |
| 183 | * string is empty regardless of the value of \p len. |
| 184 | * \param len The length of the personalization string. |
| 185 | * |
| 186 | * \return \c 0 on success. |
| 187 | * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure. |
| 188 | */ |
| 189 | static inline int mbedtls_psa_drbg_seed( |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 190 | mbedtls_entropy_context *entropy, |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 191 | const unsigned char *custom, size_t len ) |
| 192 | { |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 193 | #if defined(MBEDTLS_CTR_DRBG_C) |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 194 | return( mbedtls_ctr_drbg_seed( MBEDTLS_PSA_RANDOM_STATE, |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 195 | mbedtls_entropy_func, |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 196 | entropy, |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 197 | custom, len ) ); |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 198 | #elif defined(MBEDTLS_HMAC_DRBG_C) |
| 199 | const mbedtls_md_info_t *md_info = |
| 200 | mbedtls_md_info_from_type( MBEDTLS_PSA_HMAC_DRBG_MD_TYPE ); |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 201 | return( mbedtls_hmac_drbg_seed( MBEDTLS_PSA_RANDOM_STATE, |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 202 | md_info, |
| 203 | mbedtls_entropy_func, |
Gilles Peskine | 5894e8e | 2020-12-14 14:54:06 +0100 | [diff] [blame] | 204 | entropy, |
Gilles Peskine | 82e57d1 | 2020-11-13 21:31:17 +0100 | [diff] [blame] | 205 | custom, len ) ); |
| 206 | #endif |
Gilles Peskine | 30524eb | 2020-11-13 17:02:26 +0100 | [diff] [blame] | 207 | } |
Gilles Peskine | 90edc99 | 2020-11-13 15:39:19 +0100 | [diff] [blame] | 208 | |
Gilles Peskine | 4fc21fd | 2020-11-13 18:47:18 +0100 | [diff] [blame] | 209 | #endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */ |
| 210 | |
Gilles Peskine | b2b64d3 | 2020-12-14 16:43:58 +0100 | [diff] [blame] | 211 | #endif /* PSA_CRYPTO_RANDOM_IMPL_H */ |