xref: /aosp_15_r20/external/mbedtls/library/psa_crypto_random_impl.h (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi /** \file psa_crypto_random_impl.h
2*62c56f98SSadaf Ebrahimi  *
3*62c56f98SSadaf Ebrahimi  * \brief PSA crypto random generator implementation abstraction.
4*62c56f98SSadaf Ebrahimi  *
5*62c56f98SSadaf Ebrahimi  * The definitions here need to be consistent with the declarations
6*62c56f98SSadaf Ebrahimi  * in include/psa_util_internal.h. This file contains some redundant
7*62c56f98SSadaf Ebrahimi  * declarations to increase the chance that a compiler will detect
8*62c56f98SSadaf Ebrahimi  * inconsistencies if one file is changed without updating the other,
9*62c56f98SSadaf Ebrahimi  * but not all potential inconsistencies can be enforced, so make sure
10*62c56f98SSadaf Ebrahimi  * to check the public declarations and contracts in
11*62c56f98SSadaf Ebrahimi  * include/psa_util_internal.h if you modify this file.
12*62c56f98SSadaf Ebrahimi  */
13*62c56f98SSadaf Ebrahimi /*
14*62c56f98SSadaf Ebrahimi  *  Copyright The Mbed TLS Contributors
15*62c56f98SSadaf Ebrahimi  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
16*62c56f98SSadaf Ebrahimi  */
17*62c56f98SSadaf Ebrahimi 
18*62c56f98SSadaf Ebrahimi #ifndef PSA_CRYPTO_RANDOM_IMPL_H
19*62c56f98SSadaf Ebrahimi #define PSA_CRYPTO_RANDOM_IMPL_H
20*62c56f98SSadaf Ebrahimi 
21*62c56f98SSadaf Ebrahimi #include "psa_util_internal.h"
22*62c56f98SSadaf Ebrahimi 
23*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG)
24*62c56f98SSadaf Ebrahimi 
25*62c56f98SSadaf Ebrahimi #include <string.h>
26*62c56f98SSadaf Ebrahimi #include <mbedtls/entropy.h> // only for error codes
27*62c56f98SSadaf Ebrahimi #include <psa/crypto.h>
28*62c56f98SSadaf Ebrahimi 
29*62c56f98SSadaf Ebrahimi typedef mbedtls_psa_external_random_context_t mbedtls_psa_random_context_t;
30*62c56f98SSadaf Ebrahimi 
31*62c56f98SSadaf Ebrahimi /* Trivial wrapper around psa_generate_random(). */
32*62c56f98SSadaf Ebrahimi int mbedtls_psa_get_random(void *p_rng,
33*62c56f98SSadaf Ebrahimi                            unsigned char *output,
34*62c56f98SSadaf Ebrahimi                            size_t output_size);
35*62c56f98SSadaf Ebrahimi 
36*62c56f98SSadaf Ebrahimi /* The PSA RNG API doesn't need any externally maintained state. */
37*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_RANDOM_STATE NULL
38*62c56f98SSadaf Ebrahimi 
39*62c56f98SSadaf Ebrahimi #else /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
40*62c56f98SSadaf Ebrahimi 
41*62c56f98SSadaf Ebrahimi /* Choose a DRBG based on configuration and availability */
42*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE)
43*62c56f98SSadaf Ebrahimi 
44*62c56f98SSadaf Ebrahimi #include "mbedtls/hmac_drbg.h"
45*62c56f98SSadaf Ebrahimi 
46*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_CTR_DRBG_C)
47*62c56f98SSadaf Ebrahimi 
48*62c56f98SSadaf Ebrahimi #include "mbedtls/ctr_drbg.h"
49*62c56f98SSadaf Ebrahimi 
50*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_HMAC_DRBG_C)
51*62c56f98SSadaf Ebrahimi 
52*62c56f98SSadaf Ebrahimi #include "mbedtls/hmac_drbg.h"
53*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_MD_CAN_SHA512) && defined(MBEDTLS_MD_CAN_SHA256)
54*62c56f98SSadaf Ebrahimi #include <limits.h>
55*62c56f98SSadaf Ebrahimi #if SIZE_MAX > 0xffffffff
56*62c56f98SSadaf Ebrahimi /* Looks like a 64-bit system, so prefer SHA-512. */
57*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
58*62c56f98SSadaf Ebrahimi #else
59*62c56f98SSadaf Ebrahimi /* Looks like a 32-bit system, so prefer SHA-256. */
60*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
61*62c56f98SSadaf Ebrahimi #endif
62*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_MD_CAN_SHA512)
63*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA512
64*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_MD_CAN_SHA256)
65*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_HMAC_DRBG_MD_TYPE MBEDTLS_MD_SHA256
66*62c56f98SSadaf Ebrahimi #else
67*62c56f98SSadaf Ebrahimi #error "No hash algorithm available for HMAC_DBRG."
68*62c56f98SSadaf Ebrahimi #endif
69*62c56f98SSadaf Ebrahimi 
70*62c56f98SSadaf Ebrahimi #else
71*62c56f98SSadaf Ebrahimi #error "No DRBG module available for the psa_crypto module."
72*62c56f98SSadaf Ebrahimi #endif
73*62c56f98SSadaf Ebrahimi 
74*62c56f98SSadaf Ebrahimi #include "mbedtls/entropy.h"
75*62c56f98SSadaf Ebrahimi 
76*62c56f98SSadaf Ebrahimi /** Initialize the PSA DRBG.
77*62c56f98SSadaf Ebrahimi  *
78*62c56f98SSadaf Ebrahimi  * \param p_rng        Pointer to the Mbed TLS DRBG state.
79*62c56f98SSadaf Ebrahimi  */
mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t * p_rng)80*62c56f98SSadaf Ebrahimi static inline void mbedtls_psa_drbg_init(mbedtls_psa_drbg_context_t *p_rng)
81*62c56f98SSadaf Ebrahimi {
82*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_CTR_DRBG_C)
83*62c56f98SSadaf Ebrahimi     mbedtls_ctr_drbg_init(p_rng);
84*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_HMAC_DRBG_C)
85*62c56f98SSadaf Ebrahimi     mbedtls_hmac_drbg_init(p_rng);
86*62c56f98SSadaf Ebrahimi #endif
87*62c56f98SSadaf Ebrahimi }
88*62c56f98SSadaf Ebrahimi 
89*62c56f98SSadaf Ebrahimi /** Deinitialize the PSA DRBG.
90*62c56f98SSadaf Ebrahimi  *
91*62c56f98SSadaf Ebrahimi  * \param p_rng        Pointer to the Mbed TLS DRBG state.
92*62c56f98SSadaf Ebrahimi  */
mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t * p_rng)93*62c56f98SSadaf Ebrahimi static inline void mbedtls_psa_drbg_free(mbedtls_psa_drbg_context_t *p_rng)
94*62c56f98SSadaf Ebrahimi {
95*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_CTR_DRBG_C)
96*62c56f98SSadaf Ebrahimi     mbedtls_ctr_drbg_free(p_rng);
97*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_HMAC_DRBG_C)
98*62c56f98SSadaf Ebrahimi     mbedtls_hmac_drbg_free(p_rng);
99*62c56f98SSadaf Ebrahimi #endif
100*62c56f98SSadaf Ebrahimi }
101*62c56f98SSadaf Ebrahimi 
102*62c56f98SSadaf Ebrahimi /** The type of the PSA random generator context.
103*62c56f98SSadaf Ebrahimi  *
104*62c56f98SSadaf Ebrahimi  * The random generator context is composed of an entropy context and
105*62c56f98SSadaf Ebrahimi  * a DRBG context.
106*62c56f98SSadaf Ebrahimi  */
107*62c56f98SSadaf Ebrahimi typedef struct {
108*62c56f98SSadaf Ebrahimi     void (* entropy_init)(mbedtls_entropy_context *ctx);
109*62c56f98SSadaf Ebrahimi     void (* entropy_free)(mbedtls_entropy_context *ctx);
110*62c56f98SSadaf Ebrahimi     mbedtls_entropy_context entropy;
111*62c56f98SSadaf Ebrahimi     mbedtls_psa_drbg_context_t drbg;
112*62c56f98SSadaf Ebrahimi } mbedtls_psa_random_context_t;
113*62c56f98SSadaf Ebrahimi 
114*62c56f98SSadaf Ebrahimi /* Defined in include/psa_util_internal.h so that it's visible to
115*62c56f98SSadaf Ebrahimi  * application code. The declaration here is redundant, but included
116*62c56f98SSadaf Ebrahimi  * as a safety net to make it more likely that a future change that
117*62c56f98SSadaf Ebrahimi  * accidentally causes the implementation to diverge from the interface
118*62c56f98SSadaf Ebrahimi  * will be noticed. */
119*62c56f98SSadaf Ebrahimi /* Do not include the declaration under MSVC because it doesn't accept it
120*62c56f98SSadaf Ebrahimi  * ("error C2370: 'mbedtls_psa_get_random' : redefinition; different storage class").
121*62c56f98SSadaf Ebrahimi  * Observed with Visual Studio 2013. A known bug apparently:
122*62c56f98SSadaf Ebrahimi  * https://stackoverflow.com/questions/8146541/duplicate-external-static-declarations-not-allowed-in-visual-studio
123*62c56f98SSadaf Ebrahimi  */
124*62c56f98SSadaf Ebrahimi #if !defined(_MSC_VER)
125*62c56f98SSadaf Ebrahimi static mbedtls_f_rng_t *const mbedtls_psa_get_random;
126*62c56f98SSadaf Ebrahimi #endif
127*62c56f98SSadaf Ebrahimi 
128*62c56f98SSadaf Ebrahimi /** The maximum number of bytes that mbedtls_psa_get_random() is expected to
129*62c56f98SSadaf Ebrahimi  * return.
130*62c56f98SSadaf Ebrahimi  */
131*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_CTR_DRBG_C)
132*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST
133*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_HMAC_DRBG_C)
134*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_RANDOM_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST
135*62c56f98SSadaf Ebrahimi #endif
136*62c56f98SSadaf Ebrahimi 
137*62c56f98SSadaf Ebrahimi /** A pointer to the PSA DRBG state.
138*62c56f98SSadaf Ebrahimi  *
139*62c56f98SSadaf Ebrahimi  * This variable is only intended to be used through the macro
140*62c56f98SSadaf Ebrahimi  * #MBEDTLS_PSA_RANDOM_STATE.
141*62c56f98SSadaf Ebrahimi  */
142*62c56f98SSadaf Ebrahimi /* psa_crypto.c sets this variable to a pointer to the DRBG state in the
143*62c56f98SSadaf Ebrahimi  * global PSA crypto state. */
144*62c56f98SSadaf Ebrahimi /* The type `mbedtls_psa_drbg_context_t` is defined in
145*62c56f98SSadaf Ebrahimi  * include/psa_util_internal.h so that `mbedtls_psa_random_state` can be
146*62c56f98SSadaf Ebrahimi  * declared there and be visible to application code. */
147*62c56f98SSadaf Ebrahimi extern mbedtls_psa_drbg_context_t *const mbedtls_psa_random_state;
148*62c56f98SSadaf Ebrahimi 
149*62c56f98SSadaf Ebrahimi /** A pointer to the PSA DRBG state.
150*62c56f98SSadaf Ebrahimi  *
151*62c56f98SSadaf Ebrahimi  * This macro expands to an expression that is suitable as the \c p_rng
152*62c56f98SSadaf Ebrahimi  * parameter to pass to mbedtls_psa_get_random().
153*62c56f98SSadaf Ebrahimi  *
154*62c56f98SSadaf Ebrahimi  * This macro exists in all configurations where the psa_crypto module is
155*62c56f98SSadaf Ebrahimi  * enabled. Its expansion depends on the configuration.
156*62c56f98SSadaf Ebrahimi  */
157*62c56f98SSadaf Ebrahimi #define MBEDTLS_PSA_RANDOM_STATE mbedtls_psa_random_state
158*62c56f98SSadaf Ebrahimi 
159*62c56f98SSadaf Ebrahimi /** Seed the PSA DRBG.
160*62c56f98SSadaf Ebrahimi  *
161*62c56f98SSadaf Ebrahimi  * \param entropy       An entropy context to read the seed from.
162*62c56f98SSadaf Ebrahimi  * \param custom        The personalization string.
163*62c56f98SSadaf Ebrahimi  *                      This can be \c NULL, in which case the personalization
164*62c56f98SSadaf Ebrahimi  *                      string is empty regardless of the value of \p len.
165*62c56f98SSadaf Ebrahimi  * \param len           The length of the personalization string.
166*62c56f98SSadaf Ebrahimi  *
167*62c56f98SSadaf Ebrahimi  * \return              \c 0 on success.
168*62c56f98SSadaf Ebrahimi  * \return              An Mbed TLS error code (\c MBEDTLS_ERR_xxx) on failure.
169*62c56f98SSadaf Ebrahimi  */
mbedtls_psa_drbg_seed(mbedtls_entropy_context * entropy,const unsigned char * custom,size_t len)170*62c56f98SSadaf Ebrahimi static inline int mbedtls_psa_drbg_seed(
171*62c56f98SSadaf Ebrahimi     mbedtls_entropy_context *entropy,
172*62c56f98SSadaf Ebrahimi     const unsigned char *custom, size_t len)
173*62c56f98SSadaf Ebrahimi {
174*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_CTR_DRBG_C)
175*62c56f98SSadaf Ebrahimi     return mbedtls_ctr_drbg_seed(MBEDTLS_PSA_RANDOM_STATE,
176*62c56f98SSadaf Ebrahimi                                  mbedtls_entropy_func,
177*62c56f98SSadaf Ebrahimi                                  entropy,
178*62c56f98SSadaf Ebrahimi                                  custom, len);
179*62c56f98SSadaf Ebrahimi #elif defined(MBEDTLS_HMAC_DRBG_C)
180*62c56f98SSadaf Ebrahimi     const mbedtls_md_info_t *md_info =
181*62c56f98SSadaf Ebrahimi         mbedtls_md_info_from_type(MBEDTLS_PSA_HMAC_DRBG_MD_TYPE);
182*62c56f98SSadaf Ebrahimi     return mbedtls_hmac_drbg_seed(MBEDTLS_PSA_RANDOM_STATE,
183*62c56f98SSadaf Ebrahimi                                   md_info,
184*62c56f98SSadaf Ebrahimi                                   mbedtls_entropy_func,
185*62c56f98SSadaf Ebrahimi                                   entropy,
186*62c56f98SSadaf Ebrahimi                                   custom, len);
187*62c56f98SSadaf Ebrahimi #endif
188*62c56f98SSadaf Ebrahimi }
189*62c56f98SSadaf Ebrahimi 
190*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG */
191*62c56f98SSadaf Ebrahimi 
192*62c56f98SSadaf Ebrahimi #endif /* PSA_CRYPTO_RANDOM_IMPL_H */
193