blob: 3b8e3ec9bd2ca9ee180e99731a90614b54793c79 [file] [log] [blame]
Gilles Peskineb2b64d32020-12-14 16:43:58 +01001/** \file psa_crypto_random_impl.h
Gilles Peskine90edc992020-11-13 15:39:19 +01002 *
Gilles Peskineb2b64d32020-12-14 16:43:58 +01003 * \brief PSA crypto random generator implementation abstraction.
Gilles Peskinee3ed8022021-02-03 20:04:08 +01004 *
5 * The definitions here need to be consistent with the declarations
Gilles Peskine996f2162021-02-16 16:50:00 +01006 * in include/mbedtls/psa_util.h. This file contains some redundant
7 * declarations to increase the chance that a compiler will detect
8 * inconsistencies if one file is changed without updating the other,
9 * but not all potential inconsistencies can be enforced, so make sure
10 * to check the public declarations and contracts in
11 * include/mbedtls/psa_util.h if you modify this file.
Gilles Peskine90edc992020-11-13 15:39:19 +010012 */
13/*
14 * Copyright The Mbed TLS Contributors
15 * SPDX-License-Identifier: Apache-2.0
16 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
28 */
29
Gilles Peskineb2b64d32020-12-14 16:43:58 +010030#ifndef PSA_CRYPTO_RANDOM_IMPL_H
31#define PSA_CRYPTO_RANDOM_IMPL_H
Gilles Peskine90edc992020-11-13 15:39:19 +010032
Gilles Peskine996f2162021-02-16 16:50:00 +010033#include <mbedtls/psa_util.h>
34
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010035#if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
36
37#include <string.h>
38#include <mbedtls/entropy.h> // only for error codes
39#include <psa/crypto.h>
40
41typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
42
Gilles Peskine9c3e0602021-01-05 16:03:55 +010043/* Trivial wrapper around psa_generate_random(). */
Gilles Peskine8814fc42020-12-14 15:33:44 +010044int mbedtls_psa_get_random( void *p_rng,
45 unsigned char *output,
46 size_t output_size );
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010047
Gilles Peskine9c3e0602021-01-05 16:03:55 +010048/* The PSA RNG API doesn't need any externally maintained state. */
Gilles Peskine5894e8e2020-12-14 14:54:06 +010049#define MBEDTLS_PSA_RANDOM_STATE NULL
Gilles Peskine4fc21fd2020-11-13 18:47:18 +010050
51#else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
52
Gilles Peskine82e57d12020-11-13 21:31:17 +010053/* Choose a DRBG based on configuration and availability */
54#if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
55
56#include "mbedtls/hmac_drbg.h"
57
58#elif defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010059
60#include "mbedtls/ctr_drbg.h"
Gilles Peskine82e57d12020-11-13 21:31:17 +010061
62#elif defined(MBEDTLS_HMAC_DRBG_C)
63
64#include "mbedtls/hmac_drbg.h"
65#if defined(MBEDTLS_SHA512_C) && defined(MBEDTLS_SHA256_C)
66#include <limits.h>
67#if SIZE_MAX > 0xffffffff
68/* Looks like a 64-bit system, so prefer SHA-512. */
69#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
70#else
71/* Looks like a 32-bit system, so prefer SHA-256. */
72#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
73#endif
74#elif defined(MBEDTLS_SHA512_C)
75#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
76#elif defined(MBEDTLS_SHA256_C)
77#define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
78#else
79#error "No hash algorithm available for HMAC_DBRG."
80#endif
81
82#else
83#error "No DRBG module available for the psa_crypto module."
84#endif
85
Gilles Peskine30524eb2020-11-13 17:02:26 +010086#include "mbedtls/entropy.h"
87
Gilles Peskine30524eb2020-11-13 17:02:26 +010088/** Initialize the PSA DRBG.
89 *
90 * \param p_rng Pointer to the Mbed TLS DRBG state.
91 */
92static inline void mbedtls_psa_drbg_init( mbedtls_psa_drbg_context_t *p_rng )
93{
Gilles Peskine82e57d12020-11-13 21:31:17 +010094#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +010095 mbedtls_ctr_drbg_init( p_rng );
Gilles Peskine82e57d12020-11-13 21:31:17 +010096#elif defined(MBEDTLS_HMAC_DRBG_C)
97 mbedtls_hmac_drbg_init( p_rng );
98#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +010099}
100
101/** Deinitialize the PSA DRBG.
102 *
103 * \param p_rng Pointer to the Mbed TLS DRBG state.
104 */
105static inline void mbedtls_psa_drbg_free( mbedtls_psa_drbg_context_t *p_rng )
106{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100107#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100108 mbedtls_ctr_drbg_free( p_rng );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100109#elif defined(MBEDTLS_HMAC_DRBG_C)
110 mbedtls_hmac_drbg_free( p_rng );
111#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100112}
113
114/** The type of the PSA random generator context.
115 *
116 * The random generator context is composed of an entropy context and
117 * a DRBG context.
118 */
119typedef struct
120{
121 void (* entropy_init )( mbedtls_entropy_context *ctx );
122 void (* entropy_free )( mbedtls_entropy_context *ctx );
123 mbedtls_entropy_context entropy;
124 mbedtls_psa_drbg_context_t drbg;
125} mbedtls_psa_random_context_t;
126
Gilles Peskine996f2162021-02-16 16:50:00 +0100127/* Defined in include/mbedtls/psa_util.h so that it's visible to
128 * application code. */
129static mbedtls_f_rng_t *const mbedtls_psa_get_random;
Gilles Peskine30524eb2020-11-13 17:02:26 +0100130
131/** The maximum number of bytes that mbedtls_psa_get_random() is expected to
132 * return.
133 */
Gilles Peskine82e57d12020-11-13 21:31:17 +0100134#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine30524eb2020-11-13 17:02:26 +0100135#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
Gilles Peskine82e57d12020-11-13 21:31:17 +0100136#elif defined(MBEDTLS_HMAC_DRBG_C)
137#define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
138#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100139
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100140/** A pointer to the PSA DRBG state.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100141 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100142 * This variable is only intended to be used through the macro
143 * #MBEDTLS_PSA_RANDOM_STATE.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100144 */
Gilles Peskine9c3e0602021-01-05 16:03:55 +0100145/* psa_crypto.c sets this variable to a pointer to the DRBG state in the
146 * global PSA crypto state. */
Gilles Peskine996f2162021-02-16 16:50:00 +0100147/* The type `mbedtls_psa_drbg_context_t` is defined in
148 * include/mbedtls/psa_util.h so that `mbedtls_psa_random_state` can be
149 * declared there and be visible to application code. */
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100150extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state;
151
152/** A pointer to the PSA DRBG state.
153 *
Gilles Peskine88fa5c42021-01-04 21:00:53 +0100154 * This macro expands to an expression that is suitable as the \c p_rng
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100155 * parameter to pass to mbedtls_psa_get_random().
156 *
157 * This macro exists in all configurations where the psa_crypto module is
158 * enabled. Its expansion depends on the configuration.
159 */
160#define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state
Gilles Peskine30524eb2020-11-13 17:02:26 +0100161
Gilles Peskine30524eb2020-11-13 17:02:26 +0100162/** Seed the PSA DRBG.
163 *
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100164 * \param entropy An entropy context to read the seed from.
Gilles Peskine30524eb2020-11-13 17:02:26 +0100165 * \param custom The personalization string.
166 * This can be \c NULL, in which case the personalization
167 * string is empty regardless of the value of \p len.
168 * \param len The length of the personalization string.
169 *
170 * \return \c 0 on success.
171 * \return An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
172 */
173static inline int mbedtls_psa_drbg_seed(
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100174 mbedtls_entropy_context *entropy,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100175 const unsigned char *custom, size_t len )
176{
Gilles Peskine82e57d12020-11-13 21:31:17 +0100177#if defined(MBEDTLS_CTR_DRBG_C)
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100178 return( mbedtls_ctr_drbg_seed( MBEDTLS_PSA_RANDOM_STATE,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100179 mbedtls_entropy_func,
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100180 entropy,
Gilles Peskine30524eb2020-11-13 17:02:26 +0100181 custom, len ) );
Gilles Peskine82e57d12020-11-13 21:31:17 +0100182#elif defined(MBEDTLS_HMAC_DRBG_C)
183 const mbedtls_md_info_t *md_info =
184 mbedtls_md_info_from_type( MBEDTLS_PSA_HMAC_DRBG_MD_TYPE );
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100185 return( mbedtls_hmac_drbg_seed( MBEDTLS_PSA_RANDOM_STATE,
Gilles Peskine82e57d12020-11-13 21:31:17 +0100186 md_info,
187 mbedtls_entropy_func,
Gilles Peskine5894e8e2020-12-14 14:54:06 +0100188 entropy,
Gilles Peskine82e57d12020-11-13 21:31:17 +0100189 custom, len ) );
190#endif
Gilles Peskine30524eb2020-11-13 17:02:26 +0100191}
Gilles Peskine90edc992020-11-13 15:39:19 +0100192
Gilles Peskine4fc21fd2020-11-13 18:47:18 +0100193#endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
194
Gilles Peskineb2b64d32020-12-14 16:43:58 +0100195#endif /* PSA_CRYPTO_RANDOM_IMPL_H */