xref: /optee_os/lib/libmbedtls/mbedtls/library/ctr_drbg.c (revision 3d3b05918ec9052ba13de82fbcaba204766eb636)
1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0
2817466cbSJens Wiklander /*
3817466cbSJens Wiklander  *  CTR_DRBG implementation based on AES-256 (NIST SP 800-90)
4817466cbSJens Wiklander  *
5817466cbSJens Wiklander  *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
6817466cbSJens Wiklander  *
7817466cbSJens Wiklander  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
8817466cbSJens Wiklander  *  not use this file except in compliance with the License.
9817466cbSJens Wiklander  *  You may obtain a copy of the License at
10817466cbSJens Wiklander  *
11817466cbSJens Wiklander  *  http://www.apache.org/licenses/LICENSE-2.0
12817466cbSJens Wiklander  *
13817466cbSJens Wiklander  *  Unless required by applicable law or agreed to in writing, software
14817466cbSJens Wiklander  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15817466cbSJens Wiklander  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16817466cbSJens Wiklander  *  See the License for the specific language governing permissions and
17817466cbSJens Wiklander  *  limitations under the License.
18817466cbSJens Wiklander  *
19817466cbSJens Wiklander  *  This file is part of mbed TLS (https://tls.mbed.org)
20817466cbSJens Wiklander  */
21817466cbSJens Wiklander /*
22*3d3b0591SJens Wiklander  *  The NIST SP 800-90 DRBGs are described in the following publication.
23817466cbSJens Wiklander  *
24817466cbSJens Wiklander  *  http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf
25817466cbSJens Wiklander  */
26817466cbSJens Wiklander 
27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE)
28817466cbSJens Wiklander #include "mbedtls/config.h"
29817466cbSJens Wiklander #else
30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE
31817466cbSJens Wiklander #endif
32817466cbSJens Wiklander 
33817466cbSJens Wiklander #if defined(MBEDTLS_CTR_DRBG_C)
34817466cbSJens Wiklander 
35817466cbSJens Wiklander #include "mbedtls/ctr_drbg.h"
36*3d3b0591SJens Wiklander #include "mbedtls/platform_util.h"
37817466cbSJens Wiklander 
38817466cbSJens Wiklander #include <string.h>
39817466cbSJens Wiklander 
40817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
41817466cbSJens Wiklander #include <stdio.h>
42817466cbSJens Wiklander #endif
43817466cbSJens Wiklander 
44817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST)
45817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C)
46817466cbSJens Wiklander #include "mbedtls/platform.h"
47817466cbSJens Wiklander #else
48817466cbSJens Wiklander #include <stdio.h>
49817466cbSJens Wiklander #define mbedtls_printf printf
50817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */
51817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */
52817466cbSJens Wiklander 
53817466cbSJens Wiklander /*
54817466cbSJens Wiklander  * CTR_DRBG context initialization
55817466cbSJens Wiklander  */
56817466cbSJens Wiklander void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx )
57817466cbSJens Wiklander {
58817466cbSJens Wiklander     memset( ctx, 0, sizeof( mbedtls_ctr_drbg_context ) );
59817466cbSJens Wiklander 
60817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
61817466cbSJens Wiklander     mbedtls_mutex_init( &ctx->mutex );
62817466cbSJens Wiklander #endif
63817466cbSJens Wiklander }
64817466cbSJens Wiklander 
65817466cbSJens Wiklander /*
66817466cbSJens Wiklander  * Non-public function wrapped by mbedtls_ctr_drbg_seed(). Necessary to allow
67817466cbSJens Wiklander  * NIST tests to succeed (which require known length fixed entropy)
68817466cbSJens Wiklander  */
69*3d3b0591SJens Wiklander /* CTR_DRBG_Instantiate with derivation function (SP 800-90A &sect;10.2.1.3.2)
70*3d3b0591SJens Wiklander  * mbedtls_ctr_drbg_seed_entropy_len(ctx, f_entropy, p_entropy,
71*3d3b0591SJens Wiklander  *                                   custom, len, entropy_len)
72*3d3b0591SJens Wiklander  * implements
73*3d3b0591SJens Wiklander  * CTR_DRBG_Instantiate(entropy_input, nonce, personalization_string,
74*3d3b0591SJens Wiklander  *                      security_strength) -> initial_working_state
75*3d3b0591SJens Wiklander  * with inputs
76*3d3b0591SJens Wiklander  *   custom[:len] = nonce || personalization_string
77*3d3b0591SJens Wiklander  * where entropy_input comes from f_entropy for entropy_len bytes
78*3d3b0591SJens Wiklander  * and with outputs
79*3d3b0591SJens Wiklander  *   ctx = initial_working_state
80*3d3b0591SJens Wiklander  */
81817466cbSJens Wiklander int mbedtls_ctr_drbg_seed_entropy_len(
82817466cbSJens Wiklander                    mbedtls_ctr_drbg_context *ctx,
83817466cbSJens Wiklander                    int (*f_entropy)(void *, unsigned char *, size_t),
84817466cbSJens Wiklander                    void *p_entropy,
85817466cbSJens Wiklander                    const unsigned char *custom,
86817466cbSJens Wiklander                    size_t len,
87817466cbSJens Wiklander                    size_t entropy_len )
88817466cbSJens Wiklander {
89817466cbSJens Wiklander     int ret;
90817466cbSJens Wiklander     unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
91817466cbSJens Wiklander 
92817466cbSJens Wiklander     memset( key, 0, MBEDTLS_CTR_DRBG_KEYSIZE );
93817466cbSJens Wiklander 
94817466cbSJens Wiklander     mbedtls_aes_init( &ctx->aes_ctx );
95817466cbSJens Wiklander 
96817466cbSJens Wiklander     ctx->f_entropy = f_entropy;
97817466cbSJens Wiklander     ctx->p_entropy = p_entropy;
98817466cbSJens Wiklander 
99817466cbSJens Wiklander     ctx->entropy_len = entropy_len;
100817466cbSJens Wiklander     ctx->reseed_interval = MBEDTLS_CTR_DRBG_RESEED_INTERVAL;
101817466cbSJens Wiklander 
102817466cbSJens Wiklander     /*
103817466cbSJens Wiklander      * Initialize with an empty key
104817466cbSJens Wiklander      */
105*3d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &ctx->aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
106*3d3b0591SJens Wiklander     {
107*3d3b0591SJens Wiklander         return( ret );
108*3d3b0591SJens Wiklander     }
109817466cbSJens Wiklander 
110817466cbSJens Wiklander     if( ( ret = mbedtls_ctr_drbg_reseed( ctx, custom, len ) ) != 0 )
111*3d3b0591SJens Wiklander     {
112817466cbSJens Wiklander         return( ret );
113*3d3b0591SJens Wiklander     }
114817466cbSJens Wiklander     return( 0 );
115817466cbSJens Wiklander }
116817466cbSJens Wiklander 
117817466cbSJens Wiklander int mbedtls_ctr_drbg_seed( mbedtls_ctr_drbg_context *ctx,
118817466cbSJens Wiklander                    int (*f_entropy)(void *, unsigned char *, size_t),
119817466cbSJens Wiklander                    void *p_entropy,
120817466cbSJens Wiklander                    const unsigned char *custom,
121817466cbSJens Wiklander                    size_t len )
122817466cbSJens Wiklander {
123817466cbSJens Wiklander     return( mbedtls_ctr_drbg_seed_entropy_len( ctx, f_entropy, p_entropy, custom, len,
124817466cbSJens Wiklander                                        MBEDTLS_CTR_DRBG_ENTROPY_LEN ) );
125817466cbSJens Wiklander }
126817466cbSJens Wiklander 
127817466cbSJens Wiklander void mbedtls_ctr_drbg_free( mbedtls_ctr_drbg_context *ctx )
128817466cbSJens Wiklander {
129817466cbSJens Wiklander     if( ctx == NULL )
130817466cbSJens Wiklander         return;
131817466cbSJens Wiklander 
132817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
133817466cbSJens Wiklander     mbedtls_mutex_free( &ctx->mutex );
134817466cbSJens Wiklander #endif
135817466cbSJens Wiklander     mbedtls_aes_free( &ctx->aes_ctx );
136*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( ctx, sizeof( mbedtls_ctr_drbg_context ) );
137817466cbSJens Wiklander }
138817466cbSJens Wiklander 
139817466cbSJens Wiklander void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx, int resistance )
140817466cbSJens Wiklander {
141817466cbSJens Wiklander     ctx->prediction_resistance = resistance;
142817466cbSJens Wiklander }
143817466cbSJens Wiklander 
144817466cbSJens Wiklander void mbedtls_ctr_drbg_set_entropy_len( mbedtls_ctr_drbg_context *ctx, size_t len )
145817466cbSJens Wiklander {
146817466cbSJens Wiklander     ctx->entropy_len = len;
147817466cbSJens Wiklander }
148817466cbSJens Wiklander 
149817466cbSJens Wiklander void mbedtls_ctr_drbg_set_reseed_interval( mbedtls_ctr_drbg_context *ctx, int interval )
150817466cbSJens Wiklander {
151817466cbSJens Wiklander     ctx->reseed_interval = interval;
152817466cbSJens Wiklander }
153817466cbSJens Wiklander 
154817466cbSJens Wiklander static int block_cipher_df( unsigned char *output,
155817466cbSJens Wiklander                             const unsigned char *data, size_t data_len )
156817466cbSJens Wiklander {
157817466cbSJens Wiklander     unsigned char buf[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16];
158817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
159817466cbSJens Wiklander     unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
160817466cbSJens Wiklander     unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE];
161817466cbSJens Wiklander     unsigned char *p, *iv;
162817466cbSJens Wiklander     mbedtls_aes_context aes_ctx;
163*3d3b0591SJens Wiklander     int ret = 0;
164817466cbSJens Wiklander 
165817466cbSJens Wiklander     int i, j;
166817466cbSJens Wiklander     size_t buf_len, use_len;
167817466cbSJens Wiklander 
168817466cbSJens Wiklander     if( data_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
169817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
170817466cbSJens Wiklander 
171817466cbSJens Wiklander     memset( buf, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16 );
172817466cbSJens Wiklander     mbedtls_aes_init( &aes_ctx );
173817466cbSJens Wiklander 
174817466cbSJens Wiklander     /*
175817466cbSJens Wiklander      * Construct IV (16 bytes) and S in buffer
176817466cbSJens Wiklander      * IV = Counter (in 32-bits) padded to 16 with zeroes
177817466cbSJens Wiklander      * S = Length input string (in 32-bits) || Length of output (in 32-bits) ||
178817466cbSJens Wiklander      *     data || 0x80
179817466cbSJens Wiklander      *     (Total is padded to a multiple of 16-bytes with zeroes)
180817466cbSJens Wiklander      */
181817466cbSJens Wiklander     p = buf + MBEDTLS_CTR_DRBG_BLOCKSIZE;
182817466cbSJens Wiklander     *p++ = ( data_len >> 24 ) & 0xff;
183817466cbSJens Wiklander     *p++ = ( data_len >> 16 ) & 0xff;
184817466cbSJens Wiklander     *p++ = ( data_len >> 8  ) & 0xff;
185817466cbSJens Wiklander     *p++ = ( data_len       ) & 0xff;
186817466cbSJens Wiklander     p += 3;
187817466cbSJens Wiklander     *p++ = MBEDTLS_CTR_DRBG_SEEDLEN;
188817466cbSJens Wiklander     memcpy( p, data, data_len );
189817466cbSJens Wiklander     p[data_len] = 0x80;
190817466cbSJens Wiklander 
191817466cbSJens Wiklander     buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1;
192817466cbSJens Wiklander 
193817466cbSJens Wiklander     for( i = 0; i < MBEDTLS_CTR_DRBG_KEYSIZE; i++ )
194817466cbSJens Wiklander         key[i] = i;
195817466cbSJens Wiklander 
196*3d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
197*3d3b0591SJens Wiklander     {
198*3d3b0591SJens Wiklander         goto exit;
199*3d3b0591SJens Wiklander     }
200817466cbSJens Wiklander 
201817466cbSJens Wiklander     /*
202817466cbSJens Wiklander      * Reduce data to MBEDTLS_CTR_DRBG_SEEDLEN bytes of data
203817466cbSJens Wiklander      */
204817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
205817466cbSJens Wiklander     {
206817466cbSJens Wiklander         p = buf;
207817466cbSJens Wiklander         memset( chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE );
208817466cbSJens Wiklander         use_len = buf_len;
209817466cbSJens Wiklander 
210817466cbSJens Wiklander         while( use_len > 0 )
211817466cbSJens Wiklander         {
212817466cbSJens Wiklander             for( i = 0; i < MBEDTLS_CTR_DRBG_BLOCKSIZE; i++ )
213817466cbSJens Wiklander                 chain[i] ^= p[i];
214817466cbSJens Wiklander             p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
215817466cbSJens Wiklander             use_len -= ( use_len >= MBEDTLS_CTR_DRBG_BLOCKSIZE ) ?
216817466cbSJens Wiklander                        MBEDTLS_CTR_DRBG_BLOCKSIZE : use_len;
217817466cbSJens Wiklander 
218*3d3b0591SJens Wiklander             if( ( ret = mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, chain, chain ) ) != 0 )
219*3d3b0591SJens Wiklander             {
220*3d3b0591SJens Wiklander                 goto exit;
221*3d3b0591SJens Wiklander             }
222817466cbSJens Wiklander         }
223817466cbSJens Wiklander 
224817466cbSJens Wiklander         memcpy( tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE );
225817466cbSJens Wiklander 
226817466cbSJens Wiklander         /*
227817466cbSJens Wiklander          * Update IV
228817466cbSJens Wiklander          */
229817466cbSJens Wiklander         buf[3]++;
230817466cbSJens Wiklander     }
231817466cbSJens Wiklander 
232817466cbSJens Wiklander     /*
233817466cbSJens Wiklander      * Do final encryption with reduced data
234817466cbSJens Wiklander      */
235*3d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
236*3d3b0591SJens Wiklander     {
237*3d3b0591SJens Wiklander         goto exit;
238*3d3b0591SJens Wiklander     }
239817466cbSJens Wiklander     iv = tmp + MBEDTLS_CTR_DRBG_KEYSIZE;
240817466cbSJens Wiklander     p = output;
241817466cbSJens Wiklander 
242817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
243817466cbSJens Wiklander     {
244*3d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, iv, iv ) ) != 0 )
245*3d3b0591SJens Wiklander         {
246*3d3b0591SJens Wiklander             goto exit;
247*3d3b0591SJens Wiklander         }
248817466cbSJens Wiklander         memcpy( p, iv, MBEDTLS_CTR_DRBG_BLOCKSIZE );
249817466cbSJens Wiklander         p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
250817466cbSJens Wiklander     }
251*3d3b0591SJens Wiklander exit:
252817466cbSJens Wiklander     mbedtls_aes_free( &aes_ctx );
253*3d3b0591SJens Wiklander     /*
254*3d3b0591SJens Wiklander     * tidy up the stack
255*3d3b0591SJens Wiklander     */
256*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
257*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
258*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( key, sizeof( key ) );
259*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( chain, sizeof( chain ) );
260*3d3b0591SJens Wiklander     if( 0 != ret )
261*3d3b0591SJens Wiklander     {
262*3d3b0591SJens Wiklander         /*
263*3d3b0591SJens Wiklander         * wipe partial seed from memory
264*3d3b0591SJens Wiklander         */
265*3d3b0591SJens Wiklander         mbedtls_platform_zeroize( output, MBEDTLS_CTR_DRBG_SEEDLEN );
266817466cbSJens Wiklander     }
267817466cbSJens Wiklander 
268*3d3b0591SJens Wiklander     return( ret );
269*3d3b0591SJens Wiklander }
270*3d3b0591SJens Wiklander 
271*3d3b0591SJens Wiklander /* CTR_DRBG_Update (SP 800-90A &sect;10.2.1.2)
272*3d3b0591SJens Wiklander  * ctr_drbg_update_internal(ctx, provided_data)
273*3d3b0591SJens Wiklander  * implements
274*3d3b0591SJens Wiklander  * CTR_DRBG_Update(provided_data, Key, V)
275*3d3b0591SJens Wiklander  * with inputs and outputs
276*3d3b0591SJens Wiklander  *   ctx->aes_ctx = Key
277*3d3b0591SJens Wiklander  *   ctx->counter = V
278*3d3b0591SJens Wiklander  */
279817466cbSJens Wiklander static int ctr_drbg_update_internal( mbedtls_ctr_drbg_context *ctx,
280817466cbSJens Wiklander                               const unsigned char data[MBEDTLS_CTR_DRBG_SEEDLEN] )
281817466cbSJens Wiklander {
282817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
283817466cbSJens Wiklander     unsigned char *p = tmp;
284817466cbSJens Wiklander     int i, j;
285*3d3b0591SJens Wiklander     int ret = 0;
286817466cbSJens Wiklander 
287817466cbSJens Wiklander     memset( tmp, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
288817466cbSJens Wiklander 
289817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
290817466cbSJens Wiklander     {
291817466cbSJens Wiklander         /*
292817466cbSJens Wiklander          * Increase counter
293817466cbSJens Wiklander          */
294817466cbSJens Wiklander         for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
295817466cbSJens Wiklander             if( ++ctx->counter[i - 1] != 0 )
296817466cbSJens Wiklander                 break;
297817466cbSJens Wiklander 
298817466cbSJens Wiklander         /*
299817466cbSJens Wiklander          * Crypt counter block
300817466cbSJens Wiklander          */
301*3d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, p ) ) != 0 )
302*3d3b0591SJens Wiklander             goto exit;
303817466cbSJens Wiklander 
304817466cbSJens Wiklander         p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
305817466cbSJens Wiklander     }
306817466cbSJens Wiklander 
307817466cbSJens Wiklander     for( i = 0; i < MBEDTLS_CTR_DRBG_SEEDLEN; i++ )
308817466cbSJens Wiklander         tmp[i] ^= data[i];
309817466cbSJens Wiklander 
310817466cbSJens Wiklander     /*
311817466cbSJens Wiklander      * Update key and counter
312817466cbSJens Wiklander      */
313*3d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &ctx->aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
314*3d3b0591SJens Wiklander         goto exit;
315817466cbSJens Wiklander     memcpy( ctx->counter, tmp + MBEDTLS_CTR_DRBG_KEYSIZE, MBEDTLS_CTR_DRBG_BLOCKSIZE );
316817466cbSJens Wiklander 
317*3d3b0591SJens Wiklander exit:
318*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
319*3d3b0591SJens Wiklander     return( ret );
320817466cbSJens Wiklander }
321817466cbSJens Wiklander 
322*3d3b0591SJens Wiklander /* CTR_DRBG_Instantiate with derivation function (SP 800-90A &sect;10.2.1.3.2)
323*3d3b0591SJens Wiklander  * mbedtls_ctr_drbg_update(ctx, additional, add_len)
324*3d3b0591SJens Wiklander  * implements
325*3d3b0591SJens Wiklander  * CTR_DRBG_Instantiate(entropy_input, nonce, personalization_string,
326*3d3b0591SJens Wiklander  *                      security_strength) -> initial_working_state
327*3d3b0591SJens Wiklander  * with inputs
328*3d3b0591SJens Wiklander  *   ctx->counter = all-bits-0
329*3d3b0591SJens Wiklander  *   ctx->aes_ctx = context from all-bits-0 key
330*3d3b0591SJens Wiklander  *   additional[:add_len] = entropy_input || nonce || personalization_string
331*3d3b0591SJens Wiklander  * and with outputs
332*3d3b0591SJens Wiklander  *   ctx = initial_working_state
333*3d3b0591SJens Wiklander  */
334*3d3b0591SJens Wiklander int mbedtls_ctr_drbg_update_ret( mbedtls_ctr_drbg_context *ctx,
335*3d3b0591SJens Wiklander                                  const unsigned char *additional,
336*3d3b0591SJens Wiklander                                  size_t add_len )
337817466cbSJens Wiklander {
338817466cbSJens Wiklander     unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
339*3d3b0591SJens Wiklander     int ret;
340817466cbSJens Wiklander 
341*3d3b0591SJens Wiklander     if( add_len == 0 )
342*3d3b0591SJens Wiklander         return( 0 );
343*3d3b0591SJens Wiklander 
344*3d3b0591SJens Wiklander     if( ( ret = block_cipher_df( add_input, additional, add_len ) ) != 0 )
345*3d3b0591SJens Wiklander         goto exit;
346*3d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
347*3d3b0591SJens Wiklander         goto exit;
348*3d3b0591SJens Wiklander 
349*3d3b0591SJens Wiklander exit:
350*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( add_input, sizeof( add_input ) );
351*3d3b0591SJens Wiklander     return( ret );
352*3d3b0591SJens Wiklander }
353*3d3b0591SJens Wiklander 
354*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED)
355*3d3b0591SJens Wiklander void mbedtls_ctr_drbg_update( mbedtls_ctr_drbg_context *ctx,
356*3d3b0591SJens Wiklander                               const unsigned char *additional,
357*3d3b0591SJens Wiklander                               size_t add_len )
358817466cbSJens Wiklander {
359817466cbSJens Wiklander     /* MAX_INPUT would be more logical here, but we have to match
360817466cbSJens Wiklander      * block_cipher_df()'s limits since we can't propagate errors */
361817466cbSJens Wiklander     if( add_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
362817466cbSJens Wiklander         add_len = MBEDTLS_CTR_DRBG_MAX_SEED_INPUT;
363*3d3b0591SJens Wiklander     (void) mbedtls_ctr_drbg_update_ret( ctx, additional, add_len );
364817466cbSJens Wiklander }
365*3d3b0591SJens Wiklander #endif /* MBEDTLS_DEPRECATED_REMOVED */
366817466cbSJens Wiklander 
367*3d3b0591SJens Wiklander /* CTR_DRBG_Reseed with derivation function (SP 800-90A &sect;10.2.1.4.2)
368*3d3b0591SJens Wiklander  * mbedtls_ctr_drbg_reseed(ctx, additional, len)
369*3d3b0591SJens Wiklander  * implements
370*3d3b0591SJens Wiklander  * CTR_DRBG_Reseed(working_state, entropy_input, additional_input)
371*3d3b0591SJens Wiklander  *                -> new_working_state
372*3d3b0591SJens Wiklander  * with inputs
373*3d3b0591SJens Wiklander  *   ctx contains working_state
374*3d3b0591SJens Wiklander  *   additional[:len] = additional_input
375*3d3b0591SJens Wiklander  * and entropy_input comes from calling ctx->f_entropy
376*3d3b0591SJens Wiklander  * and with output
377*3d3b0591SJens Wiklander  *   ctx contains new_working_state
378*3d3b0591SJens Wiklander  */
379817466cbSJens Wiklander int mbedtls_ctr_drbg_reseed( mbedtls_ctr_drbg_context *ctx,
380817466cbSJens Wiklander                      const unsigned char *additional, size_t len )
381817466cbSJens Wiklander {
382817466cbSJens Wiklander     unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT];
383817466cbSJens Wiklander     size_t seedlen = 0;
384*3d3b0591SJens Wiklander     int ret;
385817466cbSJens Wiklander 
386817466cbSJens Wiklander     if( ctx->entropy_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ||
387817466cbSJens Wiklander         len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len )
388817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
389817466cbSJens Wiklander 
390817466cbSJens Wiklander     memset( seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT );
391817466cbSJens Wiklander 
392817466cbSJens Wiklander     /*
393817466cbSJens Wiklander      * Gather entropy_len bytes of entropy to seed state
394817466cbSJens Wiklander      */
395817466cbSJens Wiklander     if( 0 != ctx->f_entropy( ctx->p_entropy, seed,
396817466cbSJens Wiklander                              ctx->entropy_len ) )
397817466cbSJens Wiklander     {
398817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED );
399817466cbSJens Wiklander     }
400817466cbSJens Wiklander 
401817466cbSJens Wiklander     seedlen += ctx->entropy_len;
402817466cbSJens Wiklander 
403817466cbSJens Wiklander     /*
404817466cbSJens Wiklander      * Add additional data
405817466cbSJens Wiklander      */
406817466cbSJens Wiklander     if( additional && len )
407817466cbSJens Wiklander     {
408817466cbSJens Wiklander         memcpy( seed + seedlen, additional, len );
409817466cbSJens Wiklander         seedlen += len;
410817466cbSJens Wiklander     }
411817466cbSJens Wiklander 
412817466cbSJens Wiklander     /*
413817466cbSJens Wiklander      * Reduce to 384 bits
414817466cbSJens Wiklander      */
415*3d3b0591SJens Wiklander     if( ( ret = block_cipher_df( seed, seed, seedlen ) ) != 0 )
416*3d3b0591SJens Wiklander         goto exit;
417817466cbSJens Wiklander 
418817466cbSJens Wiklander     /*
419817466cbSJens Wiklander      * Update state
420817466cbSJens Wiklander      */
421*3d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, seed ) ) != 0 )
422*3d3b0591SJens Wiklander         goto exit;
423817466cbSJens Wiklander     ctx->reseed_counter = 1;
424817466cbSJens Wiklander 
425*3d3b0591SJens Wiklander exit:
426*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( seed, sizeof( seed ) );
427*3d3b0591SJens Wiklander     return( ret );
428817466cbSJens Wiklander }
429817466cbSJens Wiklander 
430*3d3b0591SJens Wiklander /* CTR_DRBG_Generate with derivation function (SP 800-90A &sect;10.2.1.5.2)
431*3d3b0591SJens Wiklander  * mbedtls_ctr_drbg_random_with_add(ctx, output, output_len, additional, add_len)
432*3d3b0591SJens Wiklander  * implements
433*3d3b0591SJens Wiklander  * CTR_DRBG_Reseed(working_state, entropy_input, additional[:add_len])
434*3d3b0591SJens Wiklander  *                -> working_state_after_reseed
435*3d3b0591SJens Wiklander  *                if required, then
436*3d3b0591SJens Wiklander  * CTR_DRBG_Generate(working_state_after_reseed,
437*3d3b0591SJens Wiklander  *                   requested_number_of_bits, additional_input)
438*3d3b0591SJens Wiklander  *                -> status, returned_bits, new_working_state
439*3d3b0591SJens Wiklander  * with inputs
440*3d3b0591SJens Wiklander  *   ctx contains working_state
441*3d3b0591SJens Wiklander  *   requested_number_of_bits = 8 * output_len
442*3d3b0591SJens Wiklander  *   additional[:add_len] = additional_input
443*3d3b0591SJens Wiklander  * and entropy_input comes from calling ctx->f_entropy
444*3d3b0591SJens Wiklander  * and with outputs
445*3d3b0591SJens Wiklander  *   status = SUCCESS (this function does the reseed internally)
446*3d3b0591SJens Wiklander  *   returned_bits = output[:output_len]
447*3d3b0591SJens Wiklander  *   ctx contains new_working_state
448*3d3b0591SJens Wiklander  */
449817466cbSJens Wiklander int mbedtls_ctr_drbg_random_with_add( void *p_rng,
450817466cbSJens Wiklander                               unsigned char *output, size_t output_len,
451817466cbSJens Wiklander                               const unsigned char *additional, size_t add_len )
452817466cbSJens Wiklander {
453817466cbSJens Wiklander     int ret = 0;
454817466cbSJens Wiklander     mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
455817466cbSJens Wiklander     unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
456817466cbSJens Wiklander     unsigned char *p = output;
457817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_BLOCKSIZE];
458817466cbSJens Wiklander     int i;
459817466cbSJens Wiklander     size_t use_len;
460817466cbSJens Wiklander 
461817466cbSJens Wiklander     if( output_len > MBEDTLS_CTR_DRBG_MAX_REQUEST )
462817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
463817466cbSJens Wiklander 
464817466cbSJens Wiklander     if( add_len > MBEDTLS_CTR_DRBG_MAX_INPUT )
465817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
466817466cbSJens Wiklander 
467817466cbSJens Wiklander     memset( add_input, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
468817466cbSJens Wiklander 
469817466cbSJens Wiklander     if( ctx->reseed_counter > ctx->reseed_interval ||
470817466cbSJens Wiklander         ctx->prediction_resistance )
471817466cbSJens Wiklander     {
472817466cbSJens Wiklander         if( ( ret = mbedtls_ctr_drbg_reseed( ctx, additional, add_len ) ) != 0 )
473*3d3b0591SJens Wiklander         {
474817466cbSJens Wiklander             return( ret );
475*3d3b0591SJens Wiklander         }
476817466cbSJens Wiklander         add_len = 0;
477817466cbSJens Wiklander     }
478817466cbSJens Wiklander 
479817466cbSJens Wiklander     if( add_len > 0 )
480817466cbSJens Wiklander     {
481*3d3b0591SJens Wiklander         if( ( ret = block_cipher_df( add_input, additional, add_len ) ) != 0 )
482*3d3b0591SJens Wiklander             goto exit;
483*3d3b0591SJens Wiklander         if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
484*3d3b0591SJens Wiklander             goto exit;
485817466cbSJens Wiklander     }
486817466cbSJens Wiklander 
487817466cbSJens Wiklander     while( output_len > 0 )
488817466cbSJens Wiklander     {
489817466cbSJens Wiklander         /*
490817466cbSJens Wiklander          * Increase counter
491817466cbSJens Wiklander          */
492817466cbSJens Wiklander         for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
493817466cbSJens Wiklander             if( ++ctx->counter[i - 1] != 0 )
494817466cbSJens Wiklander                 break;
495817466cbSJens Wiklander 
496817466cbSJens Wiklander         /*
497817466cbSJens Wiklander          * Crypt counter block
498817466cbSJens Wiklander          */
499*3d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, tmp ) ) != 0 )
500*3d3b0591SJens Wiklander             goto exit;
501817466cbSJens Wiklander 
502817466cbSJens Wiklander         use_len = ( output_len > MBEDTLS_CTR_DRBG_BLOCKSIZE ) ? MBEDTLS_CTR_DRBG_BLOCKSIZE :
503817466cbSJens Wiklander                                                        output_len;
504817466cbSJens Wiklander         /*
505817466cbSJens Wiklander          * Copy random block to destination
506817466cbSJens Wiklander          */
507817466cbSJens Wiklander         memcpy( p, tmp, use_len );
508817466cbSJens Wiklander         p += use_len;
509817466cbSJens Wiklander         output_len -= use_len;
510817466cbSJens Wiklander     }
511817466cbSJens Wiklander 
512*3d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
513*3d3b0591SJens Wiklander         goto exit;
514817466cbSJens Wiklander 
515817466cbSJens Wiklander     ctx->reseed_counter++;
516817466cbSJens Wiklander 
517*3d3b0591SJens Wiklander exit:
518*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( add_input, sizeof( add_input ) );
519*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
520817466cbSJens Wiklander     return( 0 );
521817466cbSJens Wiklander }
522817466cbSJens Wiklander 
523817466cbSJens Wiklander int mbedtls_ctr_drbg_random( void *p_rng, unsigned char *output, size_t output_len )
524817466cbSJens Wiklander {
525817466cbSJens Wiklander     int ret;
526817466cbSJens Wiklander     mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
527817466cbSJens Wiklander 
528817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
529817466cbSJens Wiklander     if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
530817466cbSJens Wiklander         return( ret );
531817466cbSJens Wiklander #endif
532817466cbSJens Wiklander 
533817466cbSJens Wiklander     ret = mbedtls_ctr_drbg_random_with_add( ctx, output, output_len, NULL, 0 );
534817466cbSJens Wiklander 
535817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
536817466cbSJens Wiklander     if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 )
537817466cbSJens Wiklander         return( MBEDTLS_ERR_THREADING_MUTEX_ERROR );
538817466cbSJens Wiklander #endif
539817466cbSJens Wiklander 
540817466cbSJens Wiklander     return( ret );
541817466cbSJens Wiklander }
542817466cbSJens Wiklander 
543817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
544817466cbSJens Wiklander int mbedtls_ctr_drbg_write_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
545817466cbSJens Wiklander {
546817466cbSJens Wiklander     int ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
547817466cbSJens Wiklander     FILE *f;
548817466cbSJens Wiklander     unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
549817466cbSJens Wiklander 
550817466cbSJens Wiklander     if( ( f = fopen( path, "wb" ) ) == NULL )
551817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
552817466cbSJens Wiklander 
553817466cbSJens Wiklander     if( ( ret = mbedtls_ctr_drbg_random( ctx, buf, MBEDTLS_CTR_DRBG_MAX_INPUT ) ) != 0 )
554817466cbSJens Wiklander         goto exit;
555817466cbSJens Wiklander 
556817466cbSJens Wiklander     if( fwrite( buf, 1, MBEDTLS_CTR_DRBG_MAX_INPUT, f ) != MBEDTLS_CTR_DRBG_MAX_INPUT )
557817466cbSJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
558*3d3b0591SJens Wiklander     else
559817466cbSJens Wiklander         ret = 0;
560817466cbSJens Wiklander 
561817466cbSJens Wiklander exit:
562*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
563*3d3b0591SJens Wiklander 
564817466cbSJens Wiklander     fclose( f );
565817466cbSJens Wiklander     return( ret );
566817466cbSJens Wiklander }
567817466cbSJens Wiklander 
568817466cbSJens Wiklander int mbedtls_ctr_drbg_update_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
569817466cbSJens Wiklander {
570*3d3b0591SJens Wiklander     int ret = 0;
571*3d3b0591SJens Wiklander     FILE *f = NULL;
572817466cbSJens Wiklander     size_t n;
573817466cbSJens Wiklander     unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
574*3d3b0591SJens Wiklander     unsigned char c;
575817466cbSJens Wiklander 
576817466cbSJens Wiklander     if( ( f = fopen( path, "rb" ) ) == NULL )
577817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
578817466cbSJens Wiklander 
579*3d3b0591SJens Wiklander     n = fread( buf, 1, sizeof( buf ), f );
580*3d3b0591SJens Wiklander     if( fread( &c, 1, 1, f ) != 0 )
581817466cbSJens Wiklander     {
582*3d3b0591SJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG;
583*3d3b0591SJens Wiklander         goto exit;
584817466cbSJens Wiklander     }
585*3d3b0591SJens Wiklander     if( n == 0 || ferror( f ) )
586817466cbSJens Wiklander     {
587*3d3b0591SJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
588*3d3b0591SJens Wiklander         goto exit;
589817466cbSJens Wiklander     }
590817466cbSJens Wiklander     fclose( f );
591*3d3b0591SJens Wiklander     f = NULL;
592817466cbSJens Wiklander 
593*3d3b0591SJens Wiklander     ret = mbedtls_ctr_drbg_update_ret( ctx, buf, n );
594817466cbSJens Wiklander 
595*3d3b0591SJens Wiklander exit:
596*3d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
597*3d3b0591SJens Wiklander     if( f != NULL )
598*3d3b0591SJens Wiklander         fclose( f );
599*3d3b0591SJens Wiklander     if( ret != 0 )
600*3d3b0591SJens Wiklander         return( ret );
601817466cbSJens Wiklander     return( mbedtls_ctr_drbg_write_seed_file( ctx, path ) );
602817466cbSJens Wiklander }
603817466cbSJens Wiklander #endif /* MBEDTLS_FS_IO */
604817466cbSJens Wiklander 
605817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST)
606817466cbSJens Wiklander 
607817466cbSJens Wiklander static const unsigned char entropy_source_pr[96] =
608817466cbSJens Wiklander     { 0xc1, 0x80, 0x81, 0xa6, 0x5d, 0x44, 0x02, 0x16,
609817466cbSJens Wiklander       0x19, 0xb3, 0xf1, 0x80, 0xb1, 0xc9, 0x20, 0x02,
610817466cbSJens Wiklander       0x6a, 0x54, 0x6f, 0x0c, 0x70, 0x81, 0x49, 0x8b,
611817466cbSJens Wiklander       0x6e, 0xa6, 0x62, 0x52, 0x6d, 0x51, 0xb1, 0xcb,
612817466cbSJens Wiklander       0x58, 0x3b, 0xfa, 0xd5, 0x37, 0x5f, 0xfb, 0xc9,
613817466cbSJens Wiklander       0xff, 0x46, 0xd2, 0x19, 0xc7, 0x22, 0x3e, 0x95,
614817466cbSJens Wiklander       0x45, 0x9d, 0x82, 0xe1, 0xe7, 0x22, 0x9f, 0x63,
615817466cbSJens Wiklander       0x31, 0x69, 0xd2, 0x6b, 0x57, 0x47, 0x4f, 0xa3,
616817466cbSJens Wiklander       0x37, 0xc9, 0x98, 0x1c, 0x0b, 0xfb, 0x91, 0x31,
617817466cbSJens Wiklander       0x4d, 0x55, 0xb9, 0xe9, 0x1c, 0x5a, 0x5e, 0xe4,
618817466cbSJens Wiklander       0x93, 0x92, 0xcf, 0xc5, 0x23, 0x12, 0xd5, 0x56,
619817466cbSJens Wiklander       0x2c, 0x4a, 0x6e, 0xff, 0xdc, 0x10, 0xd0, 0x68 };
620817466cbSJens Wiklander 
621817466cbSJens Wiklander static const unsigned char entropy_source_nopr[64] =
622817466cbSJens Wiklander     { 0x5a, 0x19, 0x4d, 0x5e, 0x2b, 0x31, 0x58, 0x14,
623817466cbSJens Wiklander       0x54, 0xde, 0xf6, 0x75, 0xfb, 0x79, 0x58, 0xfe,
624817466cbSJens Wiklander       0xc7, 0xdb, 0x87, 0x3e, 0x56, 0x89, 0xfc, 0x9d,
625817466cbSJens Wiklander       0x03, 0x21, 0x7c, 0x68, 0xd8, 0x03, 0x38, 0x20,
626817466cbSJens Wiklander       0xf9, 0xe6, 0x5e, 0x04, 0xd8, 0x56, 0xf3, 0xa9,
627817466cbSJens Wiklander       0xc4, 0x4a, 0x4c, 0xbd, 0xc1, 0xd0, 0x08, 0x46,
628817466cbSJens Wiklander       0xf5, 0x98, 0x3d, 0x77, 0x1c, 0x1b, 0x13, 0x7e,
629817466cbSJens Wiklander       0x4e, 0x0f, 0x9d, 0x8e, 0xf4, 0x09, 0xf9, 0x2e };
630817466cbSJens Wiklander 
631817466cbSJens Wiklander static const unsigned char nonce_pers_pr[16] =
632817466cbSJens Wiklander     { 0xd2, 0x54, 0xfc, 0xff, 0x02, 0x1e, 0x69, 0xd2,
633817466cbSJens Wiklander       0x29, 0xc9, 0xcf, 0xad, 0x85, 0xfa, 0x48, 0x6c };
634817466cbSJens Wiklander 
635817466cbSJens Wiklander static const unsigned char nonce_pers_nopr[16] =
636817466cbSJens Wiklander     { 0x1b, 0x54, 0xb8, 0xff, 0x06, 0x42, 0xbf, 0xf5,
637817466cbSJens Wiklander       0x21, 0xf1, 0x5c, 0x1c, 0x0b, 0x66, 0x5f, 0x3f };
638817466cbSJens Wiklander 
639817466cbSJens Wiklander static const unsigned char result_pr[16] =
640817466cbSJens Wiklander     { 0x34, 0x01, 0x16, 0x56, 0xb4, 0x29, 0x00, 0x8f,
641817466cbSJens Wiklander       0x35, 0x63, 0xec, 0xb5, 0xf2, 0x59, 0x07, 0x23 };
642817466cbSJens Wiklander 
643817466cbSJens Wiklander static const unsigned char result_nopr[16] =
644817466cbSJens Wiklander     { 0xa0, 0x54, 0x30, 0x3d, 0x8a, 0x7e, 0xa9, 0x88,
645817466cbSJens Wiklander       0x9d, 0x90, 0x3e, 0x07, 0x7c, 0x6f, 0x21, 0x8f };
646817466cbSJens Wiklander 
647817466cbSJens Wiklander static size_t test_offset;
648817466cbSJens Wiklander static int ctr_drbg_self_test_entropy( void *data, unsigned char *buf,
649817466cbSJens Wiklander                                        size_t len )
650817466cbSJens Wiklander {
651817466cbSJens Wiklander     const unsigned char *p = data;
652817466cbSJens Wiklander     memcpy( buf, p + test_offset, len );
653817466cbSJens Wiklander     test_offset += len;
654817466cbSJens Wiklander     return( 0 );
655817466cbSJens Wiklander }
656817466cbSJens Wiklander 
657817466cbSJens Wiklander #define CHK( c )    if( (c) != 0 )                          \
658817466cbSJens Wiklander                     {                                       \
659817466cbSJens Wiklander                         if( verbose != 0 )                  \
660817466cbSJens Wiklander                             mbedtls_printf( "failed\n" );  \
661817466cbSJens Wiklander                         return( 1 );                        \
662817466cbSJens Wiklander                     }
663817466cbSJens Wiklander 
664817466cbSJens Wiklander /*
665817466cbSJens Wiklander  * Checkup routine
666817466cbSJens Wiklander  */
667817466cbSJens Wiklander int mbedtls_ctr_drbg_self_test( int verbose )
668817466cbSJens Wiklander {
669817466cbSJens Wiklander     mbedtls_ctr_drbg_context ctx;
670817466cbSJens Wiklander     unsigned char buf[16];
671817466cbSJens Wiklander 
672817466cbSJens Wiklander     mbedtls_ctr_drbg_init( &ctx );
673817466cbSJens Wiklander 
674817466cbSJens Wiklander     /*
675817466cbSJens Wiklander      * Based on a NIST CTR_DRBG test vector (PR = True)
676817466cbSJens Wiklander      */
677817466cbSJens Wiklander     if( verbose != 0 )
678817466cbSJens Wiklander         mbedtls_printf( "  CTR_DRBG (PR = TRUE) : " );
679817466cbSJens Wiklander 
680817466cbSJens Wiklander     test_offset = 0;
681817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_seed_entropy_len( &ctx, ctr_drbg_self_test_entropy,
682817466cbSJens Wiklander                                 (void *) entropy_source_pr, nonce_pers_pr, 16, 32 ) );
683817466cbSJens Wiklander     mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
684817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
685817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
686817466cbSJens Wiklander     CHK( memcmp( buf, result_pr, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
687817466cbSJens Wiklander 
688817466cbSJens Wiklander     mbedtls_ctr_drbg_free( &ctx );
689817466cbSJens Wiklander 
690817466cbSJens Wiklander     if( verbose != 0 )
691817466cbSJens Wiklander         mbedtls_printf( "passed\n" );
692817466cbSJens Wiklander 
693817466cbSJens Wiklander     /*
694817466cbSJens Wiklander      * Based on a NIST CTR_DRBG test vector (PR = FALSE)
695817466cbSJens Wiklander      */
696817466cbSJens Wiklander     if( verbose != 0 )
697817466cbSJens Wiklander         mbedtls_printf( "  CTR_DRBG (PR = FALSE): " );
698817466cbSJens Wiklander 
699817466cbSJens Wiklander     mbedtls_ctr_drbg_init( &ctx );
700817466cbSJens Wiklander 
701817466cbSJens Wiklander     test_offset = 0;
702817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_seed_entropy_len( &ctx, ctr_drbg_self_test_entropy,
703817466cbSJens Wiklander                             (void *) entropy_source_nopr, nonce_pers_nopr, 16, 32 ) );
704817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
705817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_reseed( &ctx, NULL, 0 ) );
706817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
707817466cbSJens Wiklander     CHK( memcmp( buf, result_nopr, 16 ) );
708817466cbSJens Wiklander 
709817466cbSJens Wiklander     mbedtls_ctr_drbg_free( &ctx );
710817466cbSJens Wiklander 
711817466cbSJens Wiklander     if( verbose != 0 )
712817466cbSJens Wiklander         mbedtls_printf( "passed\n" );
713817466cbSJens Wiklander 
714817466cbSJens Wiklander     if( verbose != 0 )
715817466cbSJens Wiklander             mbedtls_printf( "\n" );
716817466cbSJens Wiklander 
717817466cbSJens Wiklander     return( 0 );
718817466cbSJens Wiklander }
719817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */
720817466cbSJens Wiklander 
721817466cbSJens Wiklander #endif /* MBEDTLS_CTR_DRBG_C */
722