xref: /optee_os/lib/libmbedtls/mbedtls/library/ctr_drbg.c (revision 5b25c76ac40f830867e3d60800120ffd7874e8dc)
1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0
2817466cbSJens Wiklander /*
3817466cbSJens Wiklander  *  CTR_DRBG implementation based on AES-256 (NIST SP 800-90)
4817466cbSJens Wiklander  *
5817466cbSJens Wiklander  *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
6817466cbSJens Wiklander  *
7817466cbSJens Wiklander  *  Licensed under the Apache License, Version 2.0 (the "License"); you may
8817466cbSJens Wiklander  *  not use this file except in compliance with the License.
9817466cbSJens Wiklander  *  You may obtain a copy of the License at
10817466cbSJens Wiklander  *
11817466cbSJens Wiklander  *  http://www.apache.org/licenses/LICENSE-2.0
12817466cbSJens Wiklander  *
13817466cbSJens Wiklander  *  Unless required by applicable law or agreed to in writing, software
14817466cbSJens Wiklander  *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15817466cbSJens Wiklander  *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16817466cbSJens Wiklander  *  See the License for the specific language governing permissions and
17817466cbSJens Wiklander  *  limitations under the License.
18817466cbSJens Wiklander  *
19817466cbSJens Wiklander  *  This file is part of mbed TLS (https://tls.mbed.org)
20817466cbSJens Wiklander  */
21817466cbSJens Wiklander /*
223d3b0591SJens Wiklander  *  The NIST SP 800-90 DRBGs are described in the following publication.
23817466cbSJens Wiklander  *
24817466cbSJens Wiklander  *  http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf
25817466cbSJens Wiklander  */
26817466cbSJens Wiklander 
27817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE)
28817466cbSJens Wiklander #include "mbedtls/config.h"
29817466cbSJens Wiklander #else
30817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE
31817466cbSJens Wiklander #endif
32817466cbSJens Wiklander 
33817466cbSJens Wiklander #if defined(MBEDTLS_CTR_DRBG_C)
34817466cbSJens Wiklander 
35817466cbSJens Wiklander #include "mbedtls/ctr_drbg.h"
363d3b0591SJens Wiklander #include "mbedtls/platform_util.h"
37817466cbSJens Wiklander 
38817466cbSJens Wiklander #include <string.h>
39817466cbSJens Wiklander 
40817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
41817466cbSJens Wiklander #include <stdio.h>
42817466cbSJens Wiklander #endif
43817466cbSJens Wiklander 
44817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST)
45817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C)
46817466cbSJens Wiklander #include "mbedtls/platform.h"
47817466cbSJens Wiklander #else
48817466cbSJens Wiklander #include <stdio.h>
49817466cbSJens Wiklander #define mbedtls_printf printf
50817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */
51817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */
52817466cbSJens Wiklander 
53817466cbSJens Wiklander /*
54817466cbSJens Wiklander  * CTR_DRBG context initialization
55817466cbSJens Wiklander  */
56817466cbSJens Wiklander void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx )
57817466cbSJens Wiklander {
58817466cbSJens Wiklander     memset( ctx, 0, sizeof( mbedtls_ctr_drbg_context ) );
59817466cbSJens Wiklander 
60817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
61817466cbSJens Wiklander     mbedtls_mutex_init( &ctx->mutex );
62817466cbSJens Wiklander #endif
63817466cbSJens Wiklander }
64817466cbSJens Wiklander 
65817466cbSJens Wiklander void mbedtls_ctr_drbg_free( mbedtls_ctr_drbg_context *ctx )
66817466cbSJens Wiklander {
67817466cbSJens Wiklander     if( ctx == NULL )
68817466cbSJens Wiklander         return;
69817466cbSJens Wiklander 
70817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
71817466cbSJens Wiklander     mbedtls_mutex_free( &ctx->mutex );
72817466cbSJens Wiklander #endif
73817466cbSJens Wiklander     mbedtls_aes_free( &ctx->aes_ctx );
743d3b0591SJens Wiklander     mbedtls_platform_zeroize( ctx, sizeof( mbedtls_ctr_drbg_context ) );
75817466cbSJens Wiklander }
76817466cbSJens Wiklander 
77817466cbSJens Wiklander void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx, int resistance )
78817466cbSJens Wiklander {
79817466cbSJens Wiklander     ctx->prediction_resistance = resistance;
80817466cbSJens Wiklander }
81817466cbSJens Wiklander 
82817466cbSJens Wiklander void mbedtls_ctr_drbg_set_entropy_len( mbedtls_ctr_drbg_context *ctx, size_t len )
83817466cbSJens Wiklander {
84817466cbSJens Wiklander     ctx->entropy_len = len;
85817466cbSJens Wiklander }
86817466cbSJens Wiklander 
87817466cbSJens Wiklander void mbedtls_ctr_drbg_set_reseed_interval( mbedtls_ctr_drbg_context *ctx, int interval )
88817466cbSJens Wiklander {
89817466cbSJens Wiklander     ctx->reseed_interval = interval;
90817466cbSJens Wiklander }
91817466cbSJens Wiklander 
92817466cbSJens Wiklander static int block_cipher_df( unsigned char *output,
93817466cbSJens Wiklander                             const unsigned char *data, size_t data_len )
94817466cbSJens Wiklander {
95817466cbSJens Wiklander     unsigned char buf[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16];
96817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
97817466cbSJens Wiklander     unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
98817466cbSJens Wiklander     unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE];
99817466cbSJens Wiklander     unsigned char *p, *iv;
100817466cbSJens Wiklander     mbedtls_aes_context aes_ctx;
1013d3b0591SJens Wiklander     int ret = 0;
102817466cbSJens Wiklander 
103817466cbSJens Wiklander     int i, j;
104817466cbSJens Wiklander     size_t buf_len, use_len;
105817466cbSJens Wiklander 
106817466cbSJens Wiklander     if( data_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
107817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
108817466cbSJens Wiklander 
109817466cbSJens Wiklander     memset( buf, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16 );
110817466cbSJens Wiklander     mbedtls_aes_init( &aes_ctx );
111817466cbSJens Wiklander 
112817466cbSJens Wiklander     /*
113817466cbSJens Wiklander      * Construct IV (16 bytes) and S in buffer
114817466cbSJens Wiklander      * IV = Counter (in 32-bits) padded to 16 with zeroes
115817466cbSJens Wiklander      * S = Length input string (in 32-bits) || Length of output (in 32-bits) ||
116817466cbSJens Wiklander      *     data || 0x80
117817466cbSJens Wiklander      *     (Total is padded to a multiple of 16-bytes with zeroes)
118817466cbSJens Wiklander      */
119817466cbSJens Wiklander     p = buf + MBEDTLS_CTR_DRBG_BLOCKSIZE;
120817466cbSJens Wiklander     *p++ = ( data_len >> 24 ) & 0xff;
121817466cbSJens Wiklander     *p++ = ( data_len >> 16 ) & 0xff;
122817466cbSJens Wiklander     *p++ = ( data_len >> 8  ) & 0xff;
123817466cbSJens Wiklander     *p++ = ( data_len       ) & 0xff;
124817466cbSJens Wiklander     p += 3;
125817466cbSJens Wiklander     *p++ = MBEDTLS_CTR_DRBG_SEEDLEN;
126817466cbSJens Wiklander     memcpy( p, data, data_len );
127817466cbSJens Wiklander     p[data_len] = 0x80;
128817466cbSJens Wiklander 
129817466cbSJens Wiklander     buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1;
130817466cbSJens Wiklander 
131817466cbSJens Wiklander     for( i = 0; i < MBEDTLS_CTR_DRBG_KEYSIZE; i++ )
132817466cbSJens Wiklander         key[i] = i;
133817466cbSJens Wiklander 
1343d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
1353d3b0591SJens Wiklander     {
1363d3b0591SJens Wiklander         goto exit;
1373d3b0591SJens Wiklander     }
138817466cbSJens Wiklander 
139817466cbSJens Wiklander     /*
140817466cbSJens Wiklander      * Reduce data to MBEDTLS_CTR_DRBG_SEEDLEN bytes of data
141817466cbSJens Wiklander      */
142817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
143817466cbSJens Wiklander     {
144817466cbSJens Wiklander         p = buf;
145817466cbSJens Wiklander         memset( chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE );
146817466cbSJens Wiklander         use_len = buf_len;
147817466cbSJens Wiklander 
148817466cbSJens Wiklander         while( use_len > 0 )
149817466cbSJens Wiklander         {
150817466cbSJens Wiklander             for( i = 0; i < MBEDTLS_CTR_DRBG_BLOCKSIZE; i++ )
151817466cbSJens Wiklander                 chain[i] ^= p[i];
152817466cbSJens Wiklander             p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
153817466cbSJens Wiklander             use_len -= ( use_len >= MBEDTLS_CTR_DRBG_BLOCKSIZE ) ?
154817466cbSJens Wiklander                        MBEDTLS_CTR_DRBG_BLOCKSIZE : use_len;
155817466cbSJens Wiklander 
1563d3b0591SJens Wiklander             if( ( ret = mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, chain, chain ) ) != 0 )
1573d3b0591SJens Wiklander             {
1583d3b0591SJens Wiklander                 goto exit;
1593d3b0591SJens Wiklander             }
160817466cbSJens Wiklander         }
161817466cbSJens Wiklander 
162817466cbSJens Wiklander         memcpy( tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE );
163817466cbSJens Wiklander 
164817466cbSJens Wiklander         /*
165817466cbSJens Wiklander          * Update IV
166817466cbSJens Wiklander          */
167817466cbSJens Wiklander         buf[3]++;
168817466cbSJens Wiklander     }
169817466cbSJens Wiklander 
170817466cbSJens Wiklander     /*
171817466cbSJens Wiklander      * Do final encryption with reduced data
172817466cbSJens Wiklander      */
1733d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
1743d3b0591SJens Wiklander     {
1753d3b0591SJens Wiklander         goto exit;
1763d3b0591SJens Wiklander     }
177817466cbSJens Wiklander     iv = tmp + MBEDTLS_CTR_DRBG_KEYSIZE;
178817466cbSJens Wiklander     p = output;
179817466cbSJens Wiklander 
180817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
181817466cbSJens Wiklander     {
1823d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, iv, iv ) ) != 0 )
1833d3b0591SJens Wiklander         {
1843d3b0591SJens Wiklander             goto exit;
1853d3b0591SJens Wiklander         }
186817466cbSJens Wiklander         memcpy( p, iv, MBEDTLS_CTR_DRBG_BLOCKSIZE );
187817466cbSJens Wiklander         p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
188817466cbSJens Wiklander     }
1893d3b0591SJens Wiklander exit:
190817466cbSJens Wiklander     mbedtls_aes_free( &aes_ctx );
1913d3b0591SJens Wiklander     /*
1923d3b0591SJens Wiklander     * tidy up the stack
1933d3b0591SJens Wiklander     */
1943d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
1953d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
1963d3b0591SJens Wiklander     mbedtls_platform_zeroize( key, sizeof( key ) );
1973d3b0591SJens Wiklander     mbedtls_platform_zeroize( chain, sizeof( chain ) );
1983d3b0591SJens Wiklander     if( 0 != ret )
1993d3b0591SJens Wiklander     {
2003d3b0591SJens Wiklander         /*
2013d3b0591SJens Wiklander         * wipe partial seed from memory
2023d3b0591SJens Wiklander         */
2033d3b0591SJens Wiklander         mbedtls_platform_zeroize( output, MBEDTLS_CTR_DRBG_SEEDLEN );
204817466cbSJens Wiklander     }
205817466cbSJens Wiklander 
2063d3b0591SJens Wiklander     return( ret );
2073d3b0591SJens Wiklander }
2083d3b0591SJens Wiklander 
2093d3b0591SJens Wiklander /* CTR_DRBG_Update (SP 800-90A &sect;10.2.1.2)
2103d3b0591SJens Wiklander  * ctr_drbg_update_internal(ctx, provided_data)
2113d3b0591SJens Wiklander  * implements
2123d3b0591SJens Wiklander  * CTR_DRBG_Update(provided_data, Key, V)
2133d3b0591SJens Wiklander  * with inputs and outputs
2143d3b0591SJens Wiklander  *   ctx->aes_ctx = Key
2153d3b0591SJens Wiklander  *   ctx->counter = V
2163d3b0591SJens Wiklander  */
217817466cbSJens Wiklander static int ctr_drbg_update_internal( mbedtls_ctr_drbg_context *ctx,
218817466cbSJens Wiklander                               const unsigned char data[MBEDTLS_CTR_DRBG_SEEDLEN] )
219817466cbSJens Wiklander {
220817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
221817466cbSJens Wiklander     unsigned char *p = tmp;
222817466cbSJens Wiklander     int i, j;
2233d3b0591SJens Wiklander     int ret = 0;
224817466cbSJens Wiklander 
225817466cbSJens Wiklander     memset( tmp, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
226817466cbSJens Wiklander 
227817466cbSJens Wiklander     for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
228817466cbSJens Wiklander     {
229817466cbSJens Wiklander         /*
230817466cbSJens Wiklander          * Increase counter
231817466cbSJens Wiklander          */
232817466cbSJens Wiklander         for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
233817466cbSJens Wiklander             if( ++ctx->counter[i - 1] != 0 )
234817466cbSJens Wiklander                 break;
235817466cbSJens Wiklander 
236817466cbSJens Wiklander         /*
237817466cbSJens Wiklander          * Crypt counter block
238817466cbSJens Wiklander          */
2393d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, p ) ) != 0 )
2403d3b0591SJens Wiklander             goto exit;
241817466cbSJens Wiklander 
242817466cbSJens Wiklander         p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
243817466cbSJens Wiklander     }
244817466cbSJens Wiklander 
245817466cbSJens Wiklander     for( i = 0; i < MBEDTLS_CTR_DRBG_SEEDLEN; i++ )
246817466cbSJens Wiklander         tmp[i] ^= data[i];
247817466cbSJens Wiklander 
248817466cbSJens Wiklander     /*
249817466cbSJens Wiklander      * Update key and counter
250817466cbSJens Wiklander      */
2513d3b0591SJens Wiklander     if( ( ret = mbedtls_aes_setkey_enc( &ctx->aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
2523d3b0591SJens Wiklander         goto exit;
253817466cbSJens Wiklander     memcpy( ctx->counter, tmp + MBEDTLS_CTR_DRBG_KEYSIZE, MBEDTLS_CTR_DRBG_BLOCKSIZE );
254817466cbSJens Wiklander 
2553d3b0591SJens Wiklander exit:
2563d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
2573d3b0591SJens Wiklander     return( ret );
258817466cbSJens Wiklander }
259817466cbSJens Wiklander 
2603d3b0591SJens Wiklander /* CTR_DRBG_Instantiate with derivation function (SP 800-90A &sect;10.2.1.3.2)
2613d3b0591SJens Wiklander  * mbedtls_ctr_drbg_update(ctx, additional, add_len)
2623d3b0591SJens Wiklander  * implements
2633d3b0591SJens Wiklander  * CTR_DRBG_Instantiate(entropy_input, nonce, personalization_string,
2643d3b0591SJens Wiklander  *                      security_strength) -> initial_working_state
2653d3b0591SJens Wiklander  * with inputs
2663d3b0591SJens Wiklander  *   ctx->counter = all-bits-0
2673d3b0591SJens Wiklander  *   ctx->aes_ctx = context from all-bits-0 key
2683d3b0591SJens Wiklander  *   additional[:add_len] = entropy_input || nonce || personalization_string
2693d3b0591SJens Wiklander  * and with outputs
2703d3b0591SJens Wiklander  *   ctx = initial_working_state
2713d3b0591SJens Wiklander  */
2723d3b0591SJens Wiklander int mbedtls_ctr_drbg_update_ret( mbedtls_ctr_drbg_context *ctx,
2733d3b0591SJens Wiklander                                  const unsigned char *additional,
2743d3b0591SJens Wiklander                                  size_t add_len )
275817466cbSJens Wiklander {
276817466cbSJens Wiklander     unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
2773d3b0591SJens Wiklander     int ret;
278817466cbSJens Wiklander 
2793d3b0591SJens Wiklander     if( add_len == 0 )
2803d3b0591SJens Wiklander         return( 0 );
2813d3b0591SJens Wiklander 
2823d3b0591SJens Wiklander     if( ( ret = block_cipher_df( add_input, additional, add_len ) ) != 0 )
2833d3b0591SJens Wiklander         goto exit;
2843d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
2853d3b0591SJens Wiklander         goto exit;
2863d3b0591SJens Wiklander 
2873d3b0591SJens Wiklander exit:
2883d3b0591SJens Wiklander     mbedtls_platform_zeroize( add_input, sizeof( add_input ) );
2893d3b0591SJens Wiklander     return( ret );
2903d3b0591SJens Wiklander }
2913d3b0591SJens Wiklander 
2923d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED)
2933d3b0591SJens Wiklander void mbedtls_ctr_drbg_update( mbedtls_ctr_drbg_context *ctx,
2943d3b0591SJens Wiklander                               const unsigned char *additional,
2953d3b0591SJens Wiklander                               size_t add_len )
296817466cbSJens Wiklander {
297817466cbSJens Wiklander     /* MAX_INPUT would be more logical here, but we have to match
298817466cbSJens Wiklander      * block_cipher_df()'s limits since we can't propagate errors */
299817466cbSJens Wiklander     if( add_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
300817466cbSJens Wiklander         add_len = MBEDTLS_CTR_DRBG_MAX_SEED_INPUT;
3013d3b0591SJens Wiklander     (void) mbedtls_ctr_drbg_update_ret( ctx, additional, add_len );
302817466cbSJens Wiklander }
3033d3b0591SJens Wiklander #endif /* MBEDTLS_DEPRECATED_REMOVED */
304817466cbSJens Wiklander 
3053d3b0591SJens Wiklander /* CTR_DRBG_Reseed with derivation function (SP 800-90A &sect;10.2.1.4.2)
3063d3b0591SJens Wiklander  * mbedtls_ctr_drbg_reseed(ctx, additional, len)
3073d3b0591SJens Wiklander  * implements
3083d3b0591SJens Wiklander  * CTR_DRBG_Reseed(working_state, entropy_input, additional_input)
3093d3b0591SJens Wiklander  *                -> new_working_state
3103d3b0591SJens Wiklander  * with inputs
3113d3b0591SJens Wiklander  *   ctx contains working_state
3123d3b0591SJens Wiklander  *   additional[:len] = additional_input
3133d3b0591SJens Wiklander  * and entropy_input comes from calling ctx->f_entropy
3143d3b0591SJens Wiklander  * and with output
3153d3b0591SJens Wiklander  *   ctx contains new_working_state
3163d3b0591SJens Wiklander  */
317817466cbSJens Wiklander int mbedtls_ctr_drbg_reseed( mbedtls_ctr_drbg_context *ctx,
318817466cbSJens Wiklander                      const unsigned char *additional, size_t len )
319817466cbSJens Wiklander {
320817466cbSJens Wiklander     unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT];
321817466cbSJens Wiklander     size_t seedlen = 0;
3223d3b0591SJens Wiklander     int ret;
323817466cbSJens Wiklander 
324817466cbSJens Wiklander     if( ctx->entropy_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ||
325817466cbSJens Wiklander         len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len )
326817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
327817466cbSJens Wiklander 
328817466cbSJens Wiklander     memset( seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT );
329817466cbSJens Wiklander 
330817466cbSJens Wiklander     /*
331817466cbSJens Wiklander      * Gather entropy_len bytes of entropy to seed state
332817466cbSJens Wiklander      */
333817466cbSJens Wiklander     if( 0 != ctx->f_entropy( ctx->p_entropy, seed,
334817466cbSJens Wiklander                              ctx->entropy_len ) )
335817466cbSJens Wiklander     {
336817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED );
337817466cbSJens Wiklander     }
338817466cbSJens Wiklander 
339817466cbSJens Wiklander     seedlen += ctx->entropy_len;
340817466cbSJens Wiklander 
341817466cbSJens Wiklander     /*
342817466cbSJens Wiklander      * Add additional data
343817466cbSJens Wiklander      */
344817466cbSJens Wiklander     if( additional && len )
345817466cbSJens Wiklander     {
346817466cbSJens Wiklander         memcpy( seed + seedlen, additional, len );
347817466cbSJens Wiklander         seedlen += len;
348817466cbSJens Wiklander     }
349817466cbSJens Wiklander 
350817466cbSJens Wiklander     /*
351817466cbSJens Wiklander      * Reduce to 384 bits
352817466cbSJens Wiklander      */
3533d3b0591SJens Wiklander     if( ( ret = block_cipher_df( seed, seed, seedlen ) ) != 0 )
3543d3b0591SJens Wiklander         goto exit;
355817466cbSJens Wiklander 
356817466cbSJens Wiklander     /*
357817466cbSJens Wiklander      * Update state
358817466cbSJens Wiklander      */
3593d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, seed ) ) != 0 )
3603d3b0591SJens Wiklander         goto exit;
361817466cbSJens Wiklander     ctx->reseed_counter = 1;
362817466cbSJens Wiklander 
3633d3b0591SJens Wiklander exit:
3643d3b0591SJens Wiklander     mbedtls_platform_zeroize( seed, sizeof( seed ) );
3653d3b0591SJens Wiklander     return( ret );
366817466cbSJens Wiklander }
367817466cbSJens Wiklander 
368*5b25c76aSJerome Forissier /* CTR_DRBG_Instantiate with derivation function (SP 800-90A &sect;10.2.1.3.2)
369*5b25c76aSJerome Forissier  * mbedtls_ctr_drbg_seed(ctx, f_entropy, p_entropy, custom, len)
370*5b25c76aSJerome Forissier  * implements
371*5b25c76aSJerome Forissier  * CTR_DRBG_Instantiate(entropy_input, nonce, personalization_string,
372*5b25c76aSJerome Forissier  *                      security_strength) -> initial_working_state
373*5b25c76aSJerome Forissier  * with inputs
374*5b25c76aSJerome Forissier  *   custom[:len] = nonce || personalization_string
375*5b25c76aSJerome Forissier  * where entropy_input comes from f_entropy for ctx->entropy_len bytes
376*5b25c76aSJerome Forissier  * and with outputs
377*5b25c76aSJerome Forissier  *   ctx = initial_working_state
378*5b25c76aSJerome Forissier  */
379*5b25c76aSJerome Forissier int mbedtls_ctr_drbg_seed( mbedtls_ctr_drbg_context *ctx,
380*5b25c76aSJerome Forissier                            int (*f_entropy)(void *, unsigned char *, size_t),
381*5b25c76aSJerome Forissier                            void *p_entropy,
382*5b25c76aSJerome Forissier                            const unsigned char *custom,
383*5b25c76aSJerome Forissier                            size_t len )
384*5b25c76aSJerome Forissier {
385*5b25c76aSJerome Forissier     int ret;
386*5b25c76aSJerome Forissier     unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
387*5b25c76aSJerome Forissier 
388*5b25c76aSJerome Forissier     memset( key, 0, MBEDTLS_CTR_DRBG_KEYSIZE );
389*5b25c76aSJerome Forissier 
390*5b25c76aSJerome Forissier     mbedtls_aes_init( &ctx->aes_ctx );
391*5b25c76aSJerome Forissier 
392*5b25c76aSJerome Forissier     ctx->f_entropy = f_entropy;
393*5b25c76aSJerome Forissier     ctx->p_entropy = p_entropy;
394*5b25c76aSJerome Forissier 
395*5b25c76aSJerome Forissier     if( ctx->entropy_len == 0 )
396*5b25c76aSJerome Forissier         ctx->entropy_len = MBEDTLS_CTR_DRBG_ENTROPY_LEN;
397*5b25c76aSJerome Forissier     ctx->reseed_interval = MBEDTLS_CTR_DRBG_RESEED_INTERVAL;
398*5b25c76aSJerome Forissier 
399*5b25c76aSJerome Forissier     /*
400*5b25c76aSJerome Forissier      * Initialize with an empty key
401*5b25c76aSJerome Forissier      */
402*5b25c76aSJerome Forissier     if( ( ret = mbedtls_aes_setkey_enc( &ctx->aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS ) ) != 0 )
403*5b25c76aSJerome Forissier     {
404*5b25c76aSJerome Forissier         return( ret );
405*5b25c76aSJerome Forissier     }
406*5b25c76aSJerome Forissier 
407*5b25c76aSJerome Forissier     if( ( ret = mbedtls_ctr_drbg_reseed( ctx, custom, len ) ) != 0 )
408*5b25c76aSJerome Forissier     {
409*5b25c76aSJerome Forissier         return( ret );
410*5b25c76aSJerome Forissier     }
411*5b25c76aSJerome Forissier     return( 0 );
412*5b25c76aSJerome Forissier }
413*5b25c76aSJerome Forissier 
414*5b25c76aSJerome Forissier /* Backward compatibility wrapper */
415*5b25c76aSJerome Forissier int mbedtls_ctr_drbg_seed_entropy_len(
416*5b25c76aSJerome Forissier     mbedtls_ctr_drbg_context *ctx,
417*5b25c76aSJerome Forissier     int (*f_entropy)(void *, unsigned char *, size_t), void *p_entropy,
418*5b25c76aSJerome Forissier     const unsigned char *custom, size_t len,
419*5b25c76aSJerome Forissier     size_t entropy_len )
420*5b25c76aSJerome Forissier {
421*5b25c76aSJerome Forissier     mbedtls_ctr_drbg_set_entropy_len( ctx, entropy_len );
422*5b25c76aSJerome Forissier     return( mbedtls_ctr_drbg_seed( ctx, f_entropy, p_entropy, custom, len ) );
423*5b25c76aSJerome Forissier }
424*5b25c76aSJerome Forissier 
4253d3b0591SJens Wiklander /* CTR_DRBG_Generate with derivation function (SP 800-90A &sect;10.2.1.5.2)
4263d3b0591SJens Wiklander  * mbedtls_ctr_drbg_random_with_add(ctx, output, output_len, additional, add_len)
4273d3b0591SJens Wiklander  * implements
4283d3b0591SJens Wiklander  * CTR_DRBG_Reseed(working_state, entropy_input, additional[:add_len])
4293d3b0591SJens Wiklander  *                -> working_state_after_reseed
4303d3b0591SJens Wiklander  *                if required, then
4313d3b0591SJens Wiklander  * CTR_DRBG_Generate(working_state_after_reseed,
4323d3b0591SJens Wiklander  *                   requested_number_of_bits, additional_input)
4333d3b0591SJens Wiklander  *                -> status, returned_bits, new_working_state
4343d3b0591SJens Wiklander  * with inputs
4353d3b0591SJens Wiklander  *   ctx contains working_state
4363d3b0591SJens Wiklander  *   requested_number_of_bits = 8 * output_len
4373d3b0591SJens Wiklander  *   additional[:add_len] = additional_input
4383d3b0591SJens Wiklander  * and entropy_input comes from calling ctx->f_entropy
4393d3b0591SJens Wiklander  * and with outputs
4403d3b0591SJens Wiklander  *   status = SUCCESS (this function does the reseed internally)
4413d3b0591SJens Wiklander  *   returned_bits = output[:output_len]
4423d3b0591SJens Wiklander  *   ctx contains new_working_state
4433d3b0591SJens Wiklander  */
444817466cbSJens Wiklander int mbedtls_ctr_drbg_random_with_add( void *p_rng,
445817466cbSJens Wiklander                               unsigned char *output, size_t output_len,
446817466cbSJens Wiklander                               const unsigned char *additional, size_t add_len )
447817466cbSJens Wiklander {
448817466cbSJens Wiklander     int ret = 0;
449817466cbSJens Wiklander     mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
450817466cbSJens Wiklander     unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
451817466cbSJens Wiklander     unsigned char *p = output;
452817466cbSJens Wiklander     unsigned char tmp[MBEDTLS_CTR_DRBG_BLOCKSIZE];
453817466cbSJens Wiklander     int i;
454817466cbSJens Wiklander     size_t use_len;
455817466cbSJens Wiklander 
456817466cbSJens Wiklander     if( output_len > MBEDTLS_CTR_DRBG_MAX_REQUEST )
457817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
458817466cbSJens Wiklander 
459817466cbSJens Wiklander     if( add_len > MBEDTLS_CTR_DRBG_MAX_INPUT )
460817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
461817466cbSJens Wiklander 
462817466cbSJens Wiklander     memset( add_input, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
463817466cbSJens Wiklander 
464817466cbSJens Wiklander     if( ctx->reseed_counter > ctx->reseed_interval ||
465817466cbSJens Wiklander         ctx->prediction_resistance )
466817466cbSJens Wiklander     {
467817466cbSJens Wiklander         if( ( ret = mbedtls_ctr_drbg_reseed( ctx, additional, add_len ) ) != 0 )
4683d3b0591SJens Wiklander         {
469817466cbSJens Wiklander             return( ret );
4703d3b0591SJens Wiklander         }
471817466cbSJens Wiklander         add_len = 0;
472817466cbSJens Wiklander     }
473817466cbSJens Wiklander 
474817466cbSJens Wiklander     if( add_len > 0 )
475817466cbSJens Wiklander     {
4763d3b0591SJens Wiklander         if( ( ret = block_cipher_df( add_input, additional, add_len ) ) != 0 )
4773d3b0591SJens Wiklander             goto exit;
4783d3b0591SJens Wiklander         if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
4793d3b0591SJens Wiklander             goto exit;
480817466cbSJens Wiklander     }
481817466cbSJens Wiklander 
482817466cbSJens Wiklander     while( output_len > 0 )
483817466cbSJens Wiklander     {
484817466cbSJens Wiklander         /*
485817466cbSJens Wiklander          * Increase counter
486817466cbSJens Wiklander          */
487817466cbSJens Wiklander         for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
488817466cbSJens Wiklander             if( ++ctx->counter[i - 1] != 0 )
489817466cbSJens Wiklander                 break;
490817466cbSJens Wiklander 
491817466cbSJens Wiklander         /*
492817466cbSJens Wiklander          * Crypt counter block
493817466cbSJens Wiklander          */
4943d3b0591SJens Wiklander         if( ( ret = mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, tmp ) ) != 0 )
4953d3b0591SJens Wiklander             goto exit;
496817466cbSJens Wiklander 
497817466cbSJens Wiklander         use_len = ( output_len > MBEDTLS_CTR_DRBG_BLOCKSIZE ) ? MBEDTLS_CTR_DRBG_BLOCKSIZE :
498817466cbSJens Wiklander                                                        output_len;
499817466cbSJens Wiklander         /*
500817466cbSJens Wiklander          * Copy random block to destination
501817466cbSJens Wiklander          */
502817466cbSJens Wiklander         memcpy( p, tmp, use_len );
503817466cbSJens Wiklander         p += use_len;
504817466cbSJens Wiklander         output_len -= use_len;
505817466cbSJens Wiklander     }
506817466cbSJens Wiklander 
5073d3b0591SJens Wiklander     if( ( ret = ctr_drbg_update_internal( ctx, add_input ) ) != 0 )
5083d3b0591SJens Wiklander         goto exit;
509817466cbSJens Wiklander 
510817466cbSJens Wiklander     ctx->reseed_counter++;
511817466cbSJens Wiklander 
5123d3b0591SJens Wiklander exit:
5133d3b0591SJens Wiklander     mbedtls_platform_zeroize( add_input, sizeof( add_input ) );
5143d3b0591SJens Wiklander     mbedtls_platform_zeroize( tmp, sizeof( tmp ) );
515*5b25c76aSJerome Forissier     return( ret );
516817466cbSJens Wiklander }
517817466cbSJens Wiklander 
518817466cbSJens Wiklander int mbedtls_ctr_drbg_random( void *p_rng, unsigned char *output, size_t output_len )
519817466cbSJens Wiklander {
520817466cbSJens Wiklander     int ret;
521817466cbSJens Wiklander     mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
522817466cbSJens Wiklander 
523817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
524817466cbSJens Wiklander     if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
525817466cbSJens Wiklander         return( ret );
526817466cbSJens Wiklander #endif
527817466cbSJens Wiklander 
528817466cbSJens Wiklander     ret = mbedtls_ctr_drbg_random_with_add( ctx, output, output_len, NULL, 0 );
529817466cbSJens Wiklander 
530817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
531817466cbSJens Wiklander     if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 )
532817466cbSJens Wiklander         return( MBEDTLS_ERR_THREADING_MUTEX_ERROR );
533817466cbSJens Wiklander #endif
534817466cbSJens Wiklander 
535817466cbSJens Wiklander     return( ret );
536817466cbSJens Wiklander }
537817466cbSJens Wiklander 
538817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
539817466cbSJens Wiklander int mbedtls_ctr_drbg_write_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
540817466cbSJens Wiklander {
541817466cbSJens Wiklander     int ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
542817466cbSJens Wiklander     FILE *f;
543817466cbSJens Wiklander     unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
544817466cbSJens Wiklander 
545817466cbSJens Wiklander     if( ( f = fopen( path, "wb" ) ) == NULL )
546817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
547817466cbSJens Wiklander 
548817466cbSJens Wiklander     if( ( ret = mbedtls_ctr_drbg_random( ctx, buf, MBEDTLS_CTR_DRBG_MAX_INPUT ) ) != 0 )
549817466cbSJens Wiklander         goto exit;
550817466cbSJens Wiklander 
551817466cbSJens Wiklander     if( fwrite( buf, 1, MBEDTLS_CTR_DRBG_MAX_INPUT, f ) != MBEDTLS_CTR_DRBG_MAX_INPUT )
552817466cbSJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
5533d3b0591SJens Wiklander     else
554817466cbSJens Wiklander         ret = 0;
555817466cbSJens Wiklander 
556817466cbSJens Wiklander exit:
5573d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
5583d3b0591SJens Wiklander 
559817466cbSJens Wiklander     fclose( f );
560817466cbSJens Wiklander     return( ret );
561817466cbSJens Wiklander }
562817466cbSJens Wiklander 
563817466cbSJens Wiklander int mbedtls_ctr_drbg_update_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
564817466cbSJens Wiklander {
5653d3b0591SJens Wiklander     int ret = 0;
5663d3b0591SJens Wiklander     FILE *f = NULL;
567817466cbSJens Wiklander     size_t n;
568817466cbSJens Wiklander     unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
5693d3b0591SJens Wiklander     unsigned char c;
570817466cbSJens Wiklander 
571817466cbSJens Wiklander     if( ( f = fopen( path, "rb" ) ) == NULL )
572817466cbSJens Wiklander         return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
573817466cbSJens Wiklander 
5743d3b0591SJens Wiklander     n = fread( buf, 1, sizeof( buf ), f );
5753d3b0591SJens Wiklander     if( fread( &c, 1, 1, f ) != 0 )
576817466cbSJens Wiklander     {
5773d3b0591SJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG;
5783d3b0591SJens Wiklander         goto exit;
579817466cbSJens Wiklander     }
5803d3b0591SJens Wiklander     if( n == 0 || ferror( f ) )
581817466cbSJens Wiklander     {
5823d3b0591SJens Wiklander         ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
5833d3b0591SJens Wiklander         goto exit;
584817466cbSJens Wiklander     }
585817466cbSJens Wiklander     fclose( f );
5863d3b0591SJens Wiklander     f = NULL;
587817466cbSJens Wiklander 
5883d3b0591SJens Wiklander     ret = mbedtls_ctr_drbg_update_ret( ctx, buf, n );
589817466cbSJens Wiklander 
5903d3b0591SJens Wiklander exit:
5913d3b0591SJens Wiklander     mbedtls_platform_zeroize( buf, sizeof( buf ) );
5923d3b0591SJens Wiklander     if( f != NULL )
5933d3b0591SJens Wiklander         fclose( f );
5943d3b0591SJens Wiklander     if( ret != 0 )
5953d3b0591SJens Wiklander         return( ret );
596817466cbSJens Wiklander     return( mbedtls_ctr_drbg_write_seed_file( ctx, path ) );
597817466cbSJens Wiklander }
598817466cbSJens Wiklander #endif /* MBEDTLS_FS_IO */
599817466cbSJens Wiklander 
600817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST)
601817466cbSJens Wiklander 
602817466cbSJens Wiklander static const unsigned char entropy_source_pr[96] =
603817466cbSJens Wiklander     { 0xc1, 0x80, 0x81, 0xa6, 0x5d, 0x44, 0x02, 0x16,
604817466cbSJens Wiklander       0x19, 0xb3, 0xf1, 0x80, 0xb1, 0xc9, 0x20, 0x02,
605817466cbSJens Wiklander       0x6a, 0x54, 0x6f, 0x0c, 0x70, 0x81, 0x49, 0x8b,
606817466cbSJens Wiklander       0x6e, 0xa6, 0x62, 0x52, 0x6d, 0x51, 0xb1, 0xcb,
607817466cbSJens Wiklander       0x58, 0x3b, 0xfa, 0xd5, 0x37, 0x5f, 0xfb, 0xc9,
608817466cbSJens Wiklander       0xff, 0x46, 0xd2, 0x19, 0xc7, 0x22, 0x3e, 0x95,
609817466cbSJens Wiklander       0x45, 0x9d, 0x82, 0xe1, 0xe7, 0x22, 0x9f, 0x63,
610817466cbSJens Wiklander       0x31, 0x69, 0xd2, 0x6b, 0x57, 0x47, 0x4f, 0xa3,
611817466cbSJens Wiklander       0x37, 0xc9, 0x98, 0x1c, 0x0b, 0xfb, 0x91, 0x31,
612817466cbSJens Wiklander       0x4d, 0x55, 0xb9, 0xe9, 0x1c, 0x5a, 0x5e, 0xe4,
613817466cbSJens Wiklander       0x93, 0x92, 0xcf, 0xc5, 0x23, 0x12, 0xd5, 0x56,
614817466cbSJens Wiklander       0x2c, 0x4a, 0x6e, 0xff, 0xdc, 0x10, 0xd0, 0x68 };
615817466cbSJens Wiklander 
616817466cbSJens Wiklander static const unsigned char entropy_source_nopr[64] =
617817466cbSJens Wiklander     { 0x5a, 0x19, 0x4d, 0x5e, 0x2b, 0x31, 0x58, 0x14,
618817466cbSJens Wiklander       0x54, 0xde, 0xf6, 0x75, 0xfb, 0x79, 0x58, 0xfe,
619817466cbSJens Wiklander       0xc7, 0xdb, 0x87, 0x3e, 0x56, 0x89, 0xfc, 0x9d,
620817466cbSJens Wiklander       0x03, 0x21, 0x7c, 0x68, 0xd8, 0x03, 0x38, 0x20,
621817466cbSJens Wiklander       0xf9, 0xe6, 0x5e, 0x04, 0xd8, 0x56, 0xf3, 0xa9,
622817466cbSJens Wiklander       0xc4, 0x4a, 0x4c, 0xbd, 0xc1, 0xd0, 0x08, 0x46,
623817466cbSJens Wiklander       0xf5, 0x98, 0x3d, 0x77, 0x1c, 0x1b, 0x13, 0x7e,
624817466cbSJens Wiklander       0x4e, 0x0f, 0x9d, 0x8e, 0xf4, 0x09, 0xf9, 0x2e };
625817466cbSJens Wiklander 
626817466cbSJens Wiklander static const unsigned char nonce_pers_pr[16] =
627817466cbSJens Wiklander     { 0xd2, 0x54, 0xfc, 0xff, 0x02, 0x1e, 0x69, 0xd2,
628817466cbSJens Wiklander       0x29, 0xc9, 0xcf, 0xad, 0x85, 0xfa, 0x48, 0x6c };
629817466cbSJens Wiklander 
630817466cbSJens Wiklander static const unsigned char nonce_pers_nopr[16] =
631817466cbSJens Wiklander     { 0x1b, 0x54, 0xb8, 0xff, 0x06, 0x42, 0xbf, 0xf5,
632817466cbSJens Wiklander       0x21, 0xf1, 0x5c, 0x1c, 0x0b, 0x66, 0x5f, 0x3f };
633817466cbSJens Wiklander 
634817466cbSJens Wiklander static const unsigned char result_pr[16] =
635817466cbSJens Wiklander     { 0x34, 0x01, 0x16, 0x56, 0xb4, 0x29, 0x00, 0x8f,
636817466cbSJens Wiklander       0x35, 0x63, 0xec, 0xb5, 0xf2, 0x59, 0x07, 0x23 };
637817466cbSJens Wiklander 
638817466cbSJens Wiklander static const unsigned char result_nopr[16] =
639817466cbSJens Wiklander     { 0xa0, 0x54, 0x30, 0x3d, 0x8a, 0x7e, 0xa9, 0x88,
640817466cbSJens Wiklander       0x9d, 0x90, 0x3e, 0x07, 0x7c, 0x6f, 0x21, 0x8f };
641817466cbSJens Wiklander 
642817466cbSJens Wiklander static size_t test_offset;
643817466cbSJens Wiklander static int ctr_drbg_self_test_entropy( void *data, unsigned char *buf,
644817466cbSJens Wiklander                                        size_t len )
645817466cbSJens Wiklander {
646817466cbSJens Wiklander     const unsigned char *p = data;
647817466cbSJens Wiklander     memcpy( buf, p + test_offset, len );
648817466cbSJens Wiklander     test_offset += len;
649817466cbSJens Wiklander     return( 0 );
650817466cbSJens Wiklander }
651817466cbSJens Wiklander 
652817466cbSJens Wiklander #define CHK( c )    if( (c) != 0 )                          \
653817466cbSJens Wiklander                     {                                       \
654817466cbSJens Wiklander                         if( verbose != 0 )                  \
655817466cbSJens Wiklander                             mbedtls_printf( "failed\n" );  \
656817466cbSJens Wiklander                         return( 1 );                        \
657817466cbSJens Wiklander                     }
658817466cbSJens Wiklander 
659817466cbSJens Wiklander /*
660817466cbSJens Wiklander  * Checkup routine
661817466cbSJens Wiklander  */
662817466cbSJens Wiklander int mbedtls_ctr_drbg_self_test( int verbose )
663817466cbSJens Wiklander {
664817466cbSJens Wiklander     mbedtls_ctr_drbg_context ctx;
665817466cbSJens Wiklander     unsigned char buf[16];
666817466cbSJens Wiklander 
667817466cbSJens Wiklander     mbedtls_ctr_drbg_init( &ctx );
668817466cbSJens Wiklander 
669817466cbSJens Wiklander     /*
670817466cbSJens Wiklander      * Based on a NIST CTR_DRBG test vector (PR = True)
671817466cbSJens Wiklander      */
672817466cbSJens Wiklander     if( verbose != 0 )
673817466cbSJens Wiklander         mbedtls_printf( "  CTR_DRBG (PR = TRUE) : " );
674817466cbSJens Wiklander 
675817466cbSJens Wiklander     test_offset = 0;
676*5b25c76aSJerome Forissier     mbedtls_ctr_drbg_set_entropy_len( &ctx, 32 );
677*5b25c76aSJerome Forissier     CHK( mbedtls_ctr_drbg_seed( &ctx,
678*5b25c76aSJerome Forissier                                 ctr_drbg_self_test_entropy,
679*5b25c76aSJerome Forissier                                 (void *) entropy_source_pr,
680*5b25c76aSJerome Forissier                                 nonce_pers_pr, 16 ) );
681817466cbSJens Wiklander     mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
682817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
683817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
684817466cbSJens Wiklander     CHK( memcmp( buf, result_pr, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
685817466cbSJens Wiklander 
686817466cbSJens Wiklander     mbedtls_ctr_drbg_free( &ctx );
687817466cbSJens Wiklander 
688817466cbSJens Wiklander     if( verbose != 0 )
689817466cbSJens Wiklander         mbedtls_printf( "passed\n" );
690817466cbSJens Wiklander 
691817466cbSJens Wiklander     /*
692817466cbSJens Wiklander      * Based on a NIST CTR_DRBG test vector (PR = FALSE)
693817466cbSJens Wiklander      */
694817466cbSJens Wiklander     if( verbose != 0 )
695817466cbSJens Wiklander         mbedtls_printf( "  CTR_DRBG (PR = FALSE): " );
696817466cbSJens Wiklander 
697817466cbSJens Wiklander     mbedtls_ctr_drbg_init( &ctx );
698817466cbSJens Wiklander 
699817466cbSJens Wiklander     test_offset = 0;
700*5b25c76aSJerome Forissier     mbedtls_ctr_drbg_set_entropy_len( &ctx, 32 );
701*5b25c76aSJerome Forissier     CHK( mbedtls_ctr_drbg_seed( &ctx,
702*5b25c76aSJerome Forissier                                 ctr_drbg_self_test_entropy,
703*5b25c76aSJerome Forissier                                 (void *) entropy_source_nopr,
704*5b25c76aSJerome Forissier                                 nonce_pers_nopr, 16 ) );
705817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
706817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_reseed( &ctx, NULL, 0 ) );
707817466cbSJens Wiklander     CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
708817466cbSJens Wiklander     CHK( memcmp( buf, result_nopr, 16 ) );
709817466cbSJens Wiklander 
710817466cbSJens Wiklander     mbedtls_ctr_drbg_free( &ctx );
711817466cbSJens Wiklander 
712817466cbSJens Wiklander     if( verbose != 0 )
713817466cbSJens Wiklander         mbedtls_printf( "passed\n" );
714817466cbSJens Wiklander 
715817466cbSJens Wiklander     if( verbose != 0 )
716817466cbSJens Wiklander             mbedtls_printf( "\n" );
717817466cbSJens Wiklander 
718817466cbSJens Wiklander     return( 0 );
719817466cbSJens Wiklander }
720817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */
721817466cbSJens Wiklander 
722817466cbSJens Wiklander #endif /* MBEDTLS_CTR_DRBG_C */
723