blob: e01bd4d2dd71f4c11102d8818c0b5b3af0b7ece9 [file] [log] [blame]
Ronald Cronb7eb67f2020-06-09 16:57:42 +02001/**
2 * \file random.c
3 *
4 * \brief This file contains the helper functions to generate random numbers
5 * for the purpose of testing.
6 */
7
Bence Szépkúti86974652020-06-15 11:59:37 +02008/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02009 * Copyright The Mbed TLS Contributors
Ronald Cronb7eb67f2020-06-09 16:57:42 +020010 * SPDX-License-Identifier: Apache-2.0
11 *
12 * Licensed under the Apache License, Version 2.0 (the "License"); you may
13 * not use this file except in compliance with the License.
14 * You may obtain a copy of the License at
15 *
16 * http://www.apache.org/licenses/LICENSE-2.0
17 *
18 * Unless required by applicable law or agreed to in writing, software
19 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
20 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21 * See the License for the specific language governing permissions and
22 * limitations under the License.
Ronald Cronb7eb67f2020-06-09 16:57:42 +020023 */
24
gufe44c54888e2020-08-17 15:04:06 +020025/*
26 * for arc4random_buf() from <stdlib.h>
27 */
28#if defined(__NetBSD__)
29#define _NETBSD_SOURCE 1
30#elif defined(__OpenBSD__)
31#define _BSD_SOURCE 1
32#endif
33
Ronald Cron2058d562020-06-09 17:11:47 +020034#include <test/macros.h>
Ronald Cronb7eb67f2020-06-09 16:57:42 +020035#include <test/random.h>
Ronald Cron2058d562020-06-09 17:11:47 +020036#include <string.h>
37
Ronald Cron351f0ee2020-06-10 12:12:18 +020038int mbedtls_test_rnd_std_rand( void *rng_state,
39 unsigned char *output,
40 size_t len )
Ronald Cron2058d562020-06-09 17:11:47 +020041{
gufe44c2620da2020-08-03 17:56:50 +020042#if !defined(__OpenBSD__) && !defined(__NetBSD__)
Ronald Cron2058d562020-06-09 17:11:47 +020043 size_t i;
44
45 if( rng_state != NULL )
46 rng_state = NULL;
47
48 for( i = 0; i < len; ++i )
49 output[i] = rand();
50#else
51 if( rng_state != NULL )
52 rng_state = NULL;
53
54 arc4random_buf( output, len );
gufe44c2620da2020-08-03 17:56:50 +020055#endif /* !OpenBSD && !NetBSD */
Ronald Cron2058d562020-06-09 17:11:47 +020056
57 return( 0 );
58}
59
Ronald Cron351f0ee2020-06-10 12:12:18 +020060int mbedtls_test_rnd_zero_rand( void *rng_state,
61 unsigned char *output,
62 size_t len )
Ronald Cron2058d562020-06-09 17:11:47 +020063{
64 if( rng_state != NULL )
65 rng_state = NULL;
66
67 memset( output, 0, len );
68
69 return( 0 );
70}
71
Ronald Cron351f0ee2020-06-10 12:12:18 +020072int mbedtls_test_rnd_buffer_rand( void *rng_state,
73 unsigned char *output,
74 size_t len )
Ronald Cron2058d562020-06-09 17:11:47 +020075{
Ronald Cron351f0ee2020-06-10 12:12:18 +020076 mbedtls_test_rnd_buf_info *info = (mbedtls_test_rnd_buf_info *) rng_state;
Ronald Cron2058d562020-06-09 17:11:47 +020077 size_t use_len;
78
79 if( rng_state == NULL )
Ronald Cron351f0ee2020-06-10 12:12:18 +020080 return( mbedtls_test_rnd_std_rand( NULL, output, len ) );
Ronald Cron2058d562020-06-09 17:11:47 +020081
82 use_len = len;
83 if( len > info->length )
84 use_len = info->length;
85
86 if( use_len )
87 {
88 memcpy( output, info->buf, use_len );
89 info->buf += use_len;
90 info->length -= use_len;
91 }
92
93 if( len - use_len > 0 )
Ronald Cron351f0ee2020-06-10 12:12:18 +020094 return( mbedtls_test_rnd_std_rand( NULL, output + use_len,
95 len - use_len ) );
Ronald Cron2058d562020-06-09 17:11:47 +020096
97 return( 0 );
98}
99
Ronald Cron351f0ee2020-06-10 12:12:18 +0200100int mbedtls_test_rnd_pseudo_rand( void *rng_state,
101 unsigned char *output,
102 size_t len )
Ronald Cron2058d562020-06-09 17:11:47 +0200103{
Ronald Cron351f0ee2020-06-10 12:12:18 +0200104 mbedtls_test_rnd_pseudo_info *info =
105 (mbedtls_test_rnd_pseudo_info *) rng_state;
Ronald Cron2058d562020-06-09 17:11:47 +0200106 uint32_t i, *k, sum, delta=0x9E3779B9;
107 unsigned char result[4], *out = output;
108
109 if( rng_state == NULL )
Ronald Cron351f0ee2020-06-10 12:12:18 +0200110 return( mbedtls_test_rnd_std_rand( NULL, output, len ) );
Ronald Cron2058d562020-06-09 17:11:47 +0200111
112 k = info->key;
113
114 while( len > 0 )
115 {
116 size_t use_len = ( len > 4 ) ? 4 : len;
117 sum = 0;
118
119 for( i = 0; i < 32; i++ )
120 {
121 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) )
122 + info->v1 ) ^ ( sum + k[sum & 3] );
123 sum += delta;
124 info->v1 += ( ( ( info->v0 << 4 ) ^ ( info->v0 >> 5 ) )
125 + info->v0 ) ^ ( sum + k[( sum>>11 ) & 3] );
126 }
127
128 PUT_UINT32_BE( info->v0, result, 0 );
129 memcpy( out, result, use_len );
130 len -= use_len;
131 out += 4;
132 }
133
134 return( 0 );
135}