1817466cbSJens Wiklander /*
2817466cbSJens Wiklander * HMAC_DRBG implementation (NIST SP 800-90)
3817466cbSJens Wiklander *
47901324dSJerome Forissier * Copyright The Mbed TLS Contributors
5*b0563631STom Van Eyck * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6817466cbSJens Wiklander */
7817466cbSJens Wiklander
8817466cbSJens Wiklander /*
9817466cbSJens Wiklander * The NIST SP 800-90A DRBGs are described in the following publication.
10817466cbSJens Wiklander * http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
11817466cbSJens Wiklander * References below are based on rev. 1 (January 2012).
12817466cbSJens Wiklander */
13817466cbSJens Wiklander
147901324dSJerome Forissier #include "common.h"
15817466cbSJens Wiklander
16817466cbSJens Wiklander #if defined(MBEDTLS_HMAC_DRBG_C)
17817466cbSJens Wiklander
18817466cbSJens Wiklander #include "mbedtls/hmac_drbg.h"
193d3b0591SJens Wiklander #include "mbedtls/platform_util.h"
2011fa71b9SJerome Forissier #include "mbedtls/error.h"
21817466cbSJens Wiklander
22817466cbSJens Wiklander #include <string.h>
23817466cbSJens Wiklander
24817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
25817466cbSJens Wiklander #include <stdio.h>
26817466cbSJens Wiklander #endif
27817466cbSJens Wiklander
28817466cbSJens Wiklander #include "mbedtls/platform.h"
29817466cbSJens Wiklander
30817466cbSJens Wiklander /*
31817466cbSJens Wiklander * HMAC_DRBG context initialization
32817466cbSJens Wiklander */
mbedtls_hmac_drbg_init(mbedtls_hmac_drbg_context * ctx)33817466cbSJens Wiklander void mbedtls_hmac_drbg_init(mbedtls_hmac_drbg_context *ctx)
34817466cbSJens Wiklander {
35817466cbSJens Wiklander memset(ctx, 0, sizeof(mbedtls_hmac_drbg_context));
36817466cbSJens Wiklander
377901324dSJerome Forissier ctx->reseed_interval = MBEDTLS_HMAC_DRBG_RESEED_INTERVAL;
38817466cbSJens Wiklander }
39817466cbSJens Wiklander
40817466cbSJens Wiklander /*
41817466cbSJens Wiklander * HMAC_DRBG update, using optional additional data (10.1.2.2)
42817466cbSJens Wiklander */
mbedtls_hmac_drbg_update(mbedtls_hmac_drbg_context * ctx,const unsigned char * additional,size_t add_len)4332b31808SJens Wiklander int mbedtls_hmac_drbg_update(mbedtls_hmac_drbg_context *ctx,
443d3b0591SJens Wiklander const unsigned char *additional,
453d3b0591SJens Wiklander size_t add_len)
46817466cbSJens Wiklander {
47817466cbSJens Wiklander size_t md_len = mbedtls_md_get_size(ctx->md_ctx.md_info);
48817466cbSJens Wiklander unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1;
49817466cbSJens Wiklander unsigned char sep[1];
50817466cbSJens Wiklander unsigned char K[MBEDTLS_MD_MAX_SIZE];
5111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_MD_BAD_INPUT_DATA;
52817466cbSJens Wiklander
5332b31808SJens Wiklander for (sep[0] = 0; sep[0] < rounds; sep[0]++) {
54817466cbSJens Wiklander /* Step 1 or 4 */
5532b31808SJens Wiklander if ((ret = mbedtls_md_hmac_reset(&ctx->md_ctx)) != 0) {
563d3b0591SJens Wiklander goto exit;
573d3b0591SJens Wiklander }
5832b31808SJens Wiklander if ((ret = mbedtls_md_hmac_update(&ctx->md_ctx,
5932b31808SJens Wiklander ctx->V, md_len)) != 0) {
603d3b0591SJens Wiklander goto exit;
6132b31808SJens Wiklander }
6232b31808SJens Wiklander if ((ret = mbedtls_md_hmac_update(&ctx->md_ctx,
6332b31808SJens Wiklander sep, 1)) != 0) {
6432b31808SJens Wiklander goto exit;
6532b31808SJens Wiklander }
6632b31808SJens Wiklander if (rounds == 2) {
6732b31808SJens Wiklander if ((ret = mbedtls_md_hmac_update(&ctx->md_ctx,
6832b31808SJens Wiklander additional, add_len)) != 0) {
6932b31808SJens Wiklander goto exit;
7032b31808SJens Wiklander }
7132b31808SJens Wiklander }
7232b31808SJens Wiklander if ((ret = mbedtls_md_hmac_finish(&ctx->md_ctx, K)) != 0) {
7332b31808SJens Wiklander goto exit;
7432b31808SJens Wiklander }
75817466cbSJens Wiklander
76817466cbSJens Wiklander /* Step 2 or 5 */
7732b31808SJens Wiklander if ((ret = mbedtls_md_hmac_starts(&ctx->md_ctx, K, md_len)) != 0) {
783d3b0591SJens Wiklander goto exit;
7932b31808SJens Wiklander }
803d3b0591SJens Wiklander if ((ret = mbedtls_md_hmac_update(&ctx->md_ctx,
8132b31808SJens Wiklander ctx->V, md_len)) != 0) {
823d3b0591SJens Wiklander goto exit;
8332b31808SJens Wiklander }
8432b31808SJens Wiklander if ((ret = mbedtls_md_hmac_finish(&ctx->md_ctx, ctx->V)) != 0) {
853d3b0591SJens Wiklander goto exit;
86817466cbSJens Wiklander }
8732b31808SJens Wiklander }
883d3b0591SJens Wiklander
893d3b0591SJens Wiklander exit:
903d3b0591SJens Wiklander mbedtls_platform_zeroize(K, sizeof(K));
9132b31808SJens Wiklander return ret;
92817466cbSJens Wiklander }
93817466cbSJens Wiklander
94817466cbSJens Wiklander /*
95817466cbSJens Wiklander * Simplified HMAC_DRBG initialisation (for use with deterministic ECDSA)
96817466cbSJens Wiklander */
mbedtls_hmac_drbg_seed_buf(mbedtls_hmac_drbg_context * ctx,const mbedtls_md_info_t * md_info,const unsigned char * data,size_t data_len)97817466cbSJens Wiklander int mbedtls_hmac_drbg_seed_buf(mbedtls_hmac_drbg_context *ctx,
98817466cbSJens Wiklander const mbedtls_md_info_t *md_info,
99817466cbSJens Wiklander const unsigned char *data, size_t data_len)
100817466cbSJens Wiklander {
10111fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
102817466cbSJens Wiklander
10332b31808SJens Wiklander if ((ret = mbedtls_md_setup(&ctx->md_ctx, md_info, 1)) != 0) {
10432b31808SJens Wiklander return ret;
10532b31808SJens Wiklander }
106817466cbSJens Wiklander
1077901324dSJerome Forissier #if defined(MBEDTLS_THREADING_C)
1087901324dSJerome Forissier mbedtls_mutex_init(&ctx->mutex);
1097901324dSJerome Forissier #endif
1107901324dSJerome Forissier
111817466cbSJens Wiklander /*
112817466cbSJens Wiklander * Set initial working state.
113817466cbSJens Wiklander * Use the V memory location, which is currently all 0, to initialize the
114817466cbSJens Wiklander * MD context with an all-zero key. Then set V to its initial value.
115817466cbSJens Wiklander */
1163d3b0591SJens Wiklander if ((ret = mbedtls_md_hmac_starts(&ctx->md_ctx, ctx->V,
11732b31808SJens Wiklander mbedtls_md_get_size(md_info))) != 0) {
11832b31808SJens Wiklander return ret;
11932b31808SJens Wiklander }
120817466cbSJens Wiklander memset(ctx->V, 0x01, mbedtls_md_get_size(md_info));
121817466cbSJens Wiklander
12232b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_update(ctx, data, data_len)) != 0) {
12332b31808SJens Wiklander return ret;
12432b31808SJens Wiklander }
125817466cbSJens Wiklander
12632b31808SJens Wiklander return 0;
127817466cbSJens Wiklander }
128817466cbSJens Wiklander
129817466cbSJens Wiklander /*
1305b25c76aSJerome Forissier * Internal function used both for seeding and reseeding the DRBG.
1315b25c76aSJerome Forissier * Comments starting with arabic numbers refer to section 10.1.2.4
1325b25c76aSJerome Forissier * of SP800-90A, while roman numbers refer to section 9.2.
133817466cbSJens Wiklander */
hmac_drbg_reseed_core(mbedtls_hmac_drbg_context * ctx,const unsigned char * additional,size_t len,int use_nonce)1345b25c76aSJerome Forissier static int hmac_drbg_reseed_core(mbedtls_hmac_drbg_context *ctx,
1355b25c76aSJerome Forissier const unsigned char *additional, size_t len,
1365b25c76aSJerome Forissier int use_nonce)
137817466cbSJens Wiklander {
138817466cbSJens Wiklander unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT];
1395b25c76aSJerome Forissier size_t seedlen = 0;
14011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
141817466cbSJens Wiklander
1425b25c76aSJerome Forissier {
1435b25c76aSJerome Forissier size_t total_entropy_len;
1445b25c76aSJerome Forissier
14532b31808SJens Wiklander if (use_nonce == 0) {
1465b25c76aSJerome Forissier total_entropy_len = ctx->entropy_len;
14732b31808SJens Wiklander } else {
1485b25c76aSJerome Forissier total_entropy_len = ctx->entropy_len * 3 / 2;
14932b31808SJens Wiklander }
1505b25c76aSJerome Forissier
151817466cbSJens Wiklander /* III. Check input length */
152817466cbSJens Wiklander if (len > MBEDTLS_HMAC_DRBG_MAX_INPUT ||
15332b31808SJens Wiklander total_entropy_len + len > MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT) {
15432b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG;
155817466cbSJens Wiklander }
1565b25c76aSJerome Forissier }
157817466cbSJens Wiklander
158817466cbSJens Wiklander memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT);
159817466cbSJens Wiklander
160817466cbSJens Wiklander /* IV. Gather entropy_len bytes of entropy for the seed */
1613d3b0591SJens Wiklander if ((ret = ctx->f_entropy(ctx->p_entropy,
16232b31808SJens Wiklander seed, ctx->entropy_len)) != 0) {
16332b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED;
1645b25c76aSJerome Forissier }
1655b25c76aSJerome Forissier seedlen += ctx->entropy_len;
166817466cbSJens Wiklander
1675b25c76aSJerome Forissier /* For initial seeding, allow adding of nonce generated
1685b25c76aSJerome Forissier * from the entropy source. See Sect 8.6.7 in SP800-90A. */
16932b31808SJens Wiklander if (use_nonce) {
1705b25c76aSJerome Forissier /* Note: We don't merge the two calls to f_entropy() in order
1715b25c76aSJerome Forissier * to avoid requesting too much entropy from f_entropy()
1725b25c76aSJerome Forissier * at once. Specifically, if the underlying digest is not
1735b25c76aSJerome Forissier * SHA-1, 3 / 2 * entropy_len is at least 36 Bytes, which
1745b25c76aSJerome Forissier * is larger than the maximum of 32 Bytes that our own
1755b25c76aSJerome Forissier * entropy source implementation can emit in a single
1765b25c76aSJerome Forissier * call in configurations disabling SHA-512. */
1775b25c76aSJerome Forissier if ((ret = ctx->f_entropy(ctx->p_entropy,
1785b25c76aSJerome Forissier seed + seedlen,
17932b31808SJens Wiklander ctx->entropy_len / 2)) != 0) {
18032b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED;
1815b25c76aSJerome Forissier }
1825b25c76aSJerome Forissier
1835b25c76aSJerome Forissier seedlen += ctx->entropy_len / 2;
1845b25c76aSJerome Forissier }
1855b25c76aSJerome Forissier
186817466cbSJens Wiklander
187817466cbSJens Wiklander /* 1. Concatenate entropy and additional data if any */
18832b31808SJens Wiklander if (additional != NULL && len != 0) {
189817466cbSJens Wiklander memcpy(seed + seedlen, additional, len);
190817466cbSJens Wiklander seedlen += len;
191817466cbSJens Wiklander }
192817466cbSJens Wiklander
193817466cbSJens Wiklander /* 2. Update state */
19432b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) {
1953d3b0591SJens Wiklander goto exit;
19632b31808SJens Wiklander }
197817466cbSJens Wiklander
198817466cbSJens Wiklander /* 3. Reset reseed_counter */
199817466cbSJens Wiklander ctx->reseed_counter = 1;
200817466cbSJens Wiklander
2013d3b0591SJens Wiklander exit:
202817466cbSJens Wiklander /* 4. Done */
2033d3b0591SJens Wiklander mbedtls_platform_zeroize(seed, seedlen);
20432b31808SJens Wiklander return ret;
205817466cbSJens Wiklander }
206817466cbSJens Wiklander
207817466cbSJens Wiklander /*
2085b25c76aSJerome Forissier * HMAC_DRBG reseeding: 10.1.2.4 + 9.2
2095b25c76aSJerome Forissier */
mbedtls_hmac_drbg_reseed(mbedtls_hmac_drbg_context * ctx,const unsigned char * additional,size_t len)2105b25c76aSJerome Forissier int mbedtls_hmac_drbg_reseed(mbedtls_hmac_drbg_context *ctx,
2115b25c76aSJerome Forissier const unsigned char *additional, size_t len)
2125b25c76aSJerome Forissier {
21332b31808SJens Wiklander return hmac_drbg_reseed_core(ctx, additional, len, 0);
2145b25c76aSJerome Forissier }
2155b25c76aSJerome Forissier
2165b25c76aSJerome Forissier /*
217817466cbSJens Wiklander * HMAC_DRBG initialisation (10.1.2.3 + 9.1)
2185b25c76aSJerome Forissier *
2195b25c76aSJerome Forissier * The nonce is not passed as a separate parameter but extracted
2205b25c76aSJerome Forissier * from the entropy source as suggested in 8.6.7.
221817466cbSJens Wiklander */
mbedtls_hmac_drbg_seed(mbedtls_hmac_drbg_context * ctx,const mbedtls_md_info_t * md_info,int (* f_entropy)(void *,unsigned char *,size_t),void * p_entropy,const unsigned char * custom,size_t len)222817466cbSJens Wiklander int mbedtls_hmac_drbg_seed(mbedtls_hmac_drbg_context *ctx,
223817466cbSJens Wiklander const mbedtls_md_info_t *md_info,
224817466cbSJens Wiklander int (*f_entropy)(void *, unsigned char *, size_t),
225817466cbSJens Wiklander void *p_entropy,
226817466cbSJens Wiklander const unsigned char *custom,
227817466cbSJens Wiklander size_t len)
228817466cbSJens Wiklander {
22911fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2305b25c76aSJerome Forissier size_t md_size;
231817466cbSJens Wiklander
23232b31808SJens Wiklander if ((ret = mbedtls_md_setup(&ctx->md_ctx, md_info, 1)) != 0) {
23332b31808SJens Wiklander return ret;
23432b31808SJens Wiklander }
235817466cbSJens Wiklander
2367901324dSJerome Forissier /* The mutex is initialized iff the md context is set up. */
2377901324dSJerome Forissier #if defined(MBEDTLS_THREADING_C)
2387901324dSJerome Forissier mbedtls_mutex_init(&ctx->mutex);
2397901324dSJerome Forissier #endif
2407901324dSJerome Forissier
241817466cbSJens Wiklander md_size = mbedtls_md_get_size(md_info);
242817466cbSJens Wiklander
243817466cbSJens Wiklander /*
244817466cbSJens Wiklander * Set initial working state.
245817466cbSJens Wiklander * Use the V memory location, which is currently all 0, to initialize the
246817466cbSJens Wiklander * MD context with an all-zero key. Then set V to its initial value.
247817466cbSJens Wiklander */
24832b31808SJens Wiklander if ((ret = mbedtls_md_hmac_starts(&ctx->md_ctx, ctx->V, md_size)) != 0) {
24932b31808SJens Wiklander return ret;
25032b31808SJens Wiklander }
251817466cbSJens Wiklander memset(ctx->V, 0x01, md_size);
252817466cbSJens Wiklander
253817466cbSJens Wiklander ctx->f_entropy = f_entropy;
254817466cbSJens Wiklander ctx->p_entropy = p_entropy;
255817466cbSJens Wiklander
25632b31808SJens Wiklander if (ctx->entropy_len == 0) {
257817466cbSJens Wiklander /*
258817466cbSJens Wiklander * See SP800-57 5.6.1 (p. 65-66) for the security strength provided by
259817466cbSJens Wiklander * each hash function, then according to SP800-90A rev1 10.1 table 2,
260817466cbSJens Wiklander * min_entropy_len (in bits) is security_strength.
261817466cbSJens Wiklander *
262817466cbSJens Wiklander * (This also matches the sizes used in the NIST test vectors.)
263817466cbSJens Wiklander */
2645b25c76aSJerome Forissier ctx->entropy_len = md_size <= 20 ? 16 : /* 160-bits hash -> 128 bits */
265817466cbSJens Wiklander md_size <= 28 ? 24 : /* 224-bits hash -> 192 bits */
266817466cbSJens Wiklander 32; /* better (256+) -> 256 bits */
2675b25c76aSJerome Forissier }
268817466cbSJens Wiklander
2695b25c76aSJerome Forissier if ((ret = hmac_drbg_reseed_core(ctx, custom, len,
27032b31808SJens Wiklander 1 /* add nonce */)) != 0) {
27132b31808SJens Wiklander return ret;
2725b25c76aSJerome Forissier }
273817466cbSJens Wiklander
27432b31808SJens Wiklander return 0;
275817466cbSJens Wiklander }
276817466cbSJens Wiklander
277817466cbSJens Wiklander /*
278817466cbSJens Wiklander * Set prediction resistance
279817466cbSJens Wiklander */
mbedtls_hmac_drbg_set_prediction_resistance(mbedtls_hmac_drbg_context * ctx,int resistance)280817466cbSJens Wiklander void mbedtls_hmac_drbg_set_prediction_resistance(mbedtls_hmac_drbg_context *ctx,
281817466cbSJens Wiklander int resistance)
282817466cbSJens Wiklander {
283817466cbSJens Wiklander ctx->prediction_resistance = resistance;
284817466cbSJens Wiklander }
285817466cbSJens Wiklander
286817466cbSJens Wiklander /*
2875b25c76aSJerome Forissier * Set entropy length grabbed for seeding
288817466cbSJens Wiklander */
mbedtls_hmac_drbg_set_entropy_len(mbedtls_hmac_drbg_context * ctx,size_t len)289817466cbSJens Wiklander void mbedtls_hmac_drbg_set_entropy_len(mbedtls_hmac_drbg_context *ctx, size_t len)
290817466cbSJens Wiklander {
291817466cbSJens Wiklander ctx->entropy_len = len;
292817466cbSJens Wiklander }
293817466cbSJens Wiklander
294817466cbSJens Wiklander /*
295817466cbSJens Wiklander * Set reseed interval
296817466cbSJens Wiklander */
mbedtls_hmac_drbg_set_reseed_interval(mbedtls_hmac_drbg_context * ctx,int interval)297817466cbSJens Wiklander void mbedtls_hmac_drbg_set_reseed_interval(mbedtls_hmac_drbg_context *ctx, int interval)
298817466cbSJens Wiklander {
299817466cbSJens Wiklander ctx->reseed_interval = interval;
300817466cbSJens Wiklander }
301817466cbSJens Wiklander
302817466cbSJens Wiklander /*
303817466cbSJens Wiklander * HMAC_DRBG random function with optional additional data:
304817466cbSJens Wiklander * 10.1.2.5 (arabic) + 9.3 (Roman)
305817466cbSJens Wiklander */
mbedtls_hmac_drbg_random_with_add(void * p_rng,unsigned char * output,size_t out_len,const unsigned char * additional,size_t add_len)306817466cbSJens Wiklander int mbedtls_hmac_drbg_random_with_add(void *p_rng,
307817466cbSJens Wiklander unsigned char *output, size_t out_len,
308817466cbSJens Wiklander const unsigned char *additional, size_t add_len)
309817466cbSJens Wiklander {
31011fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
311817466cbSJens Wiklander mbedtls_hmac_drbg_context *ctx = (mbedtls_hmac_drbg_context *) p_rng;
312817466cbSJens Wiklander size_t md_len = mbedtls_md_get_size(ctx->md_ctx.md_info);
313817466cbSJens Wiklander size_t left = out_len;
314817466cbSJens Wiklander unsigned char *out = output;
315817466cbSJens Wiklander
316817466cbSJens Wiklander /* II. Check request length */
31732b31808SJens Wiklander if (out_len > MBEDTLS_HMAC_DRBG_MAX_REQUEST) {
31832b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG;
31932b31808SJens Wiklander }
320817466cbSJens Wiklander
321817466cbSJens Wiklander /* III. Check input length */
32232b31808SJens Wiklander if (add_len > MBEDTLS_HMAC_DRBG_MAX_INPUT) {
32332b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG;
32432b31808SJens Wiklander }
325817466cbSJens Wiklander
326817466cbSJens Wiklander /* 1. (aka VII and IX) Check reseed counter and PR */
327817466cbSJens Wiklander if (ctx->f_entropy != NULL && /* For no-reseeding instances */
328817466cbSJens Wiklander (ctx->prediction_resistance == MBEDTLS_HMAC_DRBG_PR_ON ||
32932b31808SJens Wiklander ctx->reseed_counter > ctx->reseed_interval)) {
33032b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_reseed(ctx, additional, add_len)) != 0) {
33132b31808SJens Wiklander return ret;
33232b31808SJens Wiklander }
333817466cbSJens Wiklander
334817466cbSJens Wiklander add_len = 0; /* VII.4 */
335817466cbSJens Wiklander }
336817466cbSJens Wiklander
337817466cbSJens Wiklander /* 2. Use additional data if any */
33832b31808SJens Wiklander if (additional != NULL && add_len != 0) {
33932b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_update(ctx,
34032b31808SJens Wiklander additional, add_len)) != 0) {
3413d3b0591SJens Wiklander goto exit;
3423d3b0591SJens Wiklander }
34332b31808SJens Wiklander }
344817466cbSJens Wiklander
345817466cbSJens Wiklander /* 3, 4, 5. Generate bytes */
34632b31808SJens Wiklander while (left != 0) {
347817466cbSJens Wiklander size_t use_len = left > md_len ? md_len : left;
348817466cbSJens Wiklander
34932b31808SJens Wiklander if ((ret = mbedtls_md_hmac_reset(&ctx->md_ctx)) != 0) {
3503d3b0591SJens Wiklander goto exit;
35132b31808SJens Wiklander }
3523d3b0591SJens Wiklander if ((ret = mbedtls_md_hmac_update(&ctx->md_ctx,
35332b31808SJens Wiklander ctx->V, md_len)) != 0) {
3543d3b0591SJens Wiklander goto exit;
35532b31808SJens Wiklander }
35632b31808SJens Wiklander if ((ret = mbedtls_md_hmac_finish(&ctx->md_ctx, ctx->V)) != 0) {
3573d3b0591SJens Wiklander goto exit;
35832b31808SJens Wiklander }
359817466cbSJens Wiklander
360817466cbSJens Wiklander memcpy(out, ctx->V, use_len);
361817466cbSJens Wiklander out += use_len;
362817466cbSJens Wiklander left -= use_len;
363817466cbSJens Wiklander }
364817466cbSJens Wiklander
365817466cbSJens Wiklander /* 6. Update */
36632b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_update(ctx,
36732b31808SJens Wiklander additional, add_len)) != 0) {
3683d3b0591SJens Wiklander goto exit;
36932b31808SJens Wiklander }
370817466cbSJens Wiklander
371817466cbSJens Wiklander /* 7. Update reseed counter */
372817466cbSJens Wiklander ctx->reseed_counter++;
373817466cbSJens Wiklander
3743d3b0591SJens Wiklander exit:
375817466cbSJens Wiklander /* 8. Done */
37632b31808SJens Wiklander return ret;
377817466cbSJens Wiklander }
378817466cbSJens Wiklander
379817466cbSJens Wiklander /*
380817466cbSJens Wiklander * HMAC_DRBG random function
381817466cbSJens Wiklander */
mbedtls_hmac_drbg_random(void * p_rng,unsigned char * output,size_t out_len)382817466cbSJens Wiklander int mbedtls_hmac_drbg_random(void *p_rng, unsigned char *output, size_t out_len)
383817466cbSJens Wiklander {
38411fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
385817466cbSJens Wiklander mbedtls_hmac_drbg_context *ctx = (mbedtls_hmac_drbg_context *) p_rng;
386817466cbSJens Wiklander
387817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
38832b31808SJens Wiklander if ((ret = mbedtls_mutex_lock(&ctx->mutex)) != 0) {
38932b31808SJens Wiklander return ret;
39032b31808SJens Wiklander }
391817466cbSJens Wiklander #endif
392817466cbSJens Wiklander
393817466cbSJens Wiklander ret = mbedtls_hmac_drbg_random_with_add(ctx, output, out_len, NULL, 0);
394817466cbSJens Wiklander
395817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
39632b31808SJens Wiklander if (mbedtls_mutex_unlock(&ctx->mutex) != 0) {
39732b31808SJens Wiklander return MBEDTLS_ERR_THREADING_MUTEX_ERROR;
39832b31808SJens Wiklander }
399817466cbSJens Wiklander #endif
400817466cbSJens Wiklander
40132b31808SJens Wiklander return ret;
402817466cbSJens Wiklander }
403817466cbSJens Wiklander
404817466cbSJens Wiklander /*
4057901324dSJerome Forissier * This function resets HMAC_DRBG context to the state immediately
4067901324dSJerome Forissier * after initial call of mbedtls_hmac_drbg_init().
407817466cbSJens Wiklander */
mbedtls_hmac_drbg_free(mbedtls_hmac_drbg_context * ctx)408817466cbSJens Wiklander void mbedtls_hmac_drbg_free(mbedtls_hmac_drbg_context *ctx)
409817466cbSJens Wiklander {
41032b31808SJens Wiklander if (ctx == NULL) {
411817466cbSJens Wiklander return;
41232b31808SJens Wiklander }
413817466cbSJens Wiklander
414817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C)
4157901324dSJerome Forissier /* The mutex is initialized iff the md context is set up. */
41632b31808SJens Wiklander if (ctx->md_ctx.md_info != NULL) {
417817466cbSJens Wiklander mbedtls_mutex_free(&ctx->mutex);
41832b31808SJens Wiklander }
419817466cbSJens Wiklander #endif
420817466cbSJens Wiklander mbedtls_md_free(&ctx->md_ctx);
4213d3b0591SJens Wiklander mbedtls_platform_zeroize(ctx, sizeof(mbedtls_hmac_drbg_context));
4227901324dSJerome Forissier ctx->reseed_interval = MBEDTLS_HMAC_DRBG_RESEED_INTERVAL;
423817466cbSJens Wiklander }
424817466cbSJens Wiklander
425817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO)
mbedtls_hmac_drbg_write_seed_file(mbedtls_hmac_drbg_context * ctx,const char * path)426817466cbSJens Wiklander int mbedtls_hmac_drbg_write_seed_file(mbedtls_hmac_drbg_context *ctx, const char *path)
427817466cbSJens Wiklander {
42811fa71b9SJerome Forissier int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
429817466cbSJens Wiklander FILE *f;
430817466cbSJens Wiklander unsigned char buf[MBEDTLS_HMAC_DRBG_MAX_INPUT];
431817466cbSJens Wiklander
43232b31808SJens Wiklander if ((f = fopen(path, "wb")) == NULL) {
43332b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR;
43432b31808SJens Wiklander }
435817466cbSJens Wiklander
43632b31808SJens Wiklander /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
43732b31808SJens Wiklander mbedtls_setbuf(f, NULL);
43832b31808SJens Wiklander
43932b31808SJens Wiklander if ((ret = mbedtls_hmac_drbg_random(ctx, buf, sizeof(buf))) != 0) {
440817466cbSJens Wiklander goto exit;
44132b31808SJens Wiklander }
442817466cbSJens Wiklander
44332b31808SJens Wiklander if (fwrite(buf, 1, sizeof(buf), f) != sizeof(buf)) {
444817466cbSJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR;
445817466cbSJens Wiklander goto exit;
446817466cbSJens Wiklander }
447817466cbSJens Wiklander
448817466cbSJens Wiklander ret = 0;
449817466cbSJens Wiklander
450817466cbSJens Wiklander exit:
451817466cbSJens Wiklander fclose(f);
4523d3b0591SJens Wiklander mbedtls_platform_zeroize(buf, sizeof(buf));
4533d3b0591SJens Wiklander
45432b31808SJens Wiklander return ret;
455817466cbSJens Wiklander }
456817466cbSJens Wiklander
mbedtls_hmac_drbg_update_seed_file(mbedtls_hmac_drbg_context * ctx,const char * path)457817466cbSJens Wiklander int mbedtls_hmac_drbg_update_seed_file(mbedtls_hmac_drbg_context *ctx, const char *path)
458817466cbSJens Wiklander {
4593d3b0591SJens Wiklander int ret = 0;
4603d3b0591SJens Wiklander FILE *f = NULL;
461817466cbSJens Wiklander size_t n;
462817466cbSJens Wiklander unsigned char buf[MBEDTLS_HMAC_DRBG_MAX_INPUT];
4633d3b0591SJens Wiklander unsigned char c;
464817466cbSJens Wiklander
46532b31808SJens Wiklander if ((f = fopen(path, "rb")) == NULL) {
46632b31808SJens Wiklander return MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR;
46732b31808SJens Wiklander }
46832b31808SJens Wiklander
46932b31808SJens Wiklander /* Ensure no stdio buffering of secrets, as such buffers cannot be wiped. */
47032b31808SJens Wiklander mbedtls_setbuf(f, NULL);
471817466cbSJens Wiklander
4723d3b0591SJens Wiklander n = fread(buf, 1, sizeof(buf), f);
47332b31808SJens Wiklander if (fread(&c, 1, 1, f) != 0) {
4743d3b0591SJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG;
4753d3b0591SJens Wiklander goto exit;
476817466cbSJens Wiklander }
47732b31808SJens Wiklander if (n == 0 || ferror(f)) {
4783d3b0591SJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR;
4793d3b0591SJens Wiklander goto exit;
480817466cbSJens Wiklander }
481817466cbSJens Wiklander fclose(f);
4823d3b0591SJens Wiklander f = NULL;
483817466cbSJens Wiklander
48432b31808SJens Wiklander ret = mbedtls_hmac_drbg_update(ctx, buf, n);
485817466cbSJens Wiklander
4863d3b0591SJens Wiklander exit:
4873d3b0591SJens Wiklander mbedtls_platform_zeroize(buf, sizeof(buf));
48832b31808SJens Wiklander if (f != NULL) {
4893d3b0591SJens Wiklander fclose(f);
49032b31808SJens Wiklander }
49132b31808SJens Wiklander if (ret != 0) {
49232b31808SJens Wiklander return ret;
49332b31808SJens Wiklander }
49432b31808SJens Wiklander return mbedtls_hmac_drbg_write_seed_file(ctx, path);
495817466cbSJens Wiklander }
496817466cbSJens Wiklander #endif /* MBEDTLS_FS_IO */
497817466cbSJens Wiklander
498817466cbSJens Wiklander
499817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST)
500817466cbSJens Wiklander
501*b0563631STom Van Eyck #if !defined(MBEDTLS_MD_CAN_SHA1)
502817466cbSJens Wiklander /* Dummy checkup routine */
mbedtls_hmac_drbg_self_test(int verbose)503817466cbSJens Wiklander int mbedtls_hmac_drbg_self_test(int verbose)
504817466cbSJens Wiklander {
505817466cbSJens Wiklander (void) verbose;
50632b31808SJens Wiklander return 0;
507817466cbSJens Wiklander }
508817466cbSJens Wiklander #else
509817466cbSJens Wiklander
510817466cbSJens Wiklander #define OUTPUT_LEN 80
511817466cbSJens Wiklander
512817466cbSJens Wiklander /* From a NIST PR=true test vector */
513817466cbSJens Wiklander static const unsigned char entropy_pr[] = {
514817466cbSJens Wiklander 0xa0, 0xc9, 0xab, 0x58, 0xf1, 0xe2, 0xe5, 0xa4, 0xde, 0x3e, 0xbd, 0x4f,
515817466cbSJens Wiklander 0xf7, 0x3e, 0x9c, 0x5b, 0x64, 0xef, 0xd8, 0xca, 0x02, 0x8c, 0xf8, 0x11,
516817466cbSJens Wiklander 0x48, 0xa5, 0x84, 0xfe, 0x69, 0xab, 0x5a, 0xee, 0x42, 0xaa, 0x4d, 0x42,
517817466cbSJens Wiklander 0x17, 0x60, 0x99, 0xd4, 0x5e, 0x13, 0x97, 0xdc, 0x40, 0x4d, 0x86, 0xa3,
51832b31808SJens Wiklander 0x7b, 0xf5, 0x59, 0x54, 0x75, 0x69, 0x51, 0xe4
51932b31808SJens Wiklander };
520817466cbSJens Wiklander static const unsigned char result_pr[OUTPUT_LEN] = {
521817466cbSJens Wiklander 0x9a, 0x00, 0xa2, 0xd0, 0x0e, 0xd5, 0x9b, 0xfe, 0x31, 0xec, 0xb1, 0x39,
522817466cbSJens Wiklander 0x9b, 0x60, 0x81, 0x48, 0xd1, 0x96, 0x9d, 0x25, 0x0d, 0x3c, 0x1e, 0x94,
523817466cbSJens Wiklander 0x10, 0x10, 0x98, 0x12, 0x93, 0x25, 0xca, 0xb8, 0xfc, 0xcc, 0x2d, 0x54,
524817466cbSJens Wiklander 0x73, 0x19, 0x70, 0xc0, 0x10, 0x7a, 0xa4, 0x89, 0x25, 0x19, 0x95, 0x5e,
525817466cbSJens Wiklander 0x4b, 0xc6, 0x00, 0x1d, 0x7f, 0x4e, 0x6a, 0x2b, 0xf8, 0xa3, 0x01, 0xab,
526817466cbSJens Wiklander 0x46, 0x05, 0x5c, 0x09, 0xa6, 0x71, 0x88, 0xf1, 0xa7, 0x40, 0xee, 0xf3,
52732b31808SJens Wiklander 0xe1, 0x5c, 0x02, 0x9b, 0x44, 0xaf, 0x03, 0x44
52832b31808SJens Wiklander };
529817466cbSJens Wiklander
530817466cbSJens Wiklander /* From a NIST PR=false test vector */
531817466cbSJens Wiklander static const unsigned char entropy_nopr[] = {
532817466cbSJens Wiklander 0x79, 0x34, 0x9b, 0xbf, 0x7c, 0xdd, 0xa5, 0x79, 0x95, 0x57, 0x86, 0x66,
533817466cbSJens Wiklander 0x21, 0xc9, 0x13, 0x83, 0x11, 0x46, 0x73, 0x3a, 0xbf, 0x8c, 0x35, 0xc8,
534817466cbSJens Wiklander 0xc7, 0x21, 0x5b, 0x5b, 0x96, 0xc4, 0x8e, 0x9b, 0x33, 0x8c, 0x74, 0xe3,
53532b31808SJens Wiklander 0xe9, 0x9d, 0xfe, 0xdf
53632b31808SJens Wiklander };
537817466cbSJens Wiklander static const unsigned char result_nopr[OUTPUT_LEN] = {
538817466cbSJens Wiklander 0xc6, 0xa1, 0x6a, 0xb8, 0xd4, 0x20, 0x70, 0x6f, 0x0f, 0x34, 0xab, 0x7f,
539817466cbSJens Wiklander 0xec, 0x5a, 0xdc, 0xa9, 0xd8, 0xca, 0x3a, 0x13, 0x3e, 0x15, 0x9c, 0xa6,
540817466cbSJens Wiklander 0xac, 0x43, 0xc6, 0xf8, 0xa2, 0xbe, 0x22, 0x83, 0x4a, 0x4c, 0x0a, 0x0a,
541817466cbSJens Wiklander 0xff, 0xb1, 0x0d, 0x71, 0x94, 0xf1, 0xc1, 0xa5, 0xcf, 0x73, 0x22, 0xec,
542817466cbSJens Wiklander 0x1a, 0xe0, 0x96, 0x4e, 0xd4, 0xbf, 0x12, 0x27, 0x46, 0xe0, 0x87, 0xfd,
543817466cbSJens Wiklander 0xb5, 0xb3, 0xe9, 0x1b, 0x34, 0x93, 0xd5, 0xbb, 0x98, 0xfa, 0xed, 0x49,
54432b31808SJens Wiklander 0xe8, 0x5f, 0x13, 0x0f, 0xc8, 0xa4, 0x59, 0xb7
54532b31808SJens Wiklander };
546817466cbSJens Wiklander
547817466cbSJens Wiklander /* "Entropy" from buffer */
548817466cbSJens Wiklander static size_t test_offset;
hmac_drbg_self_test_entropy(void * data,unsigned char * buf,size_t len)549817466cbSJens Wiklander static int hmac_drbg_self_test_entropy(void *data,
550817466cbSJens Wiklander unsigned char *buf, size_t len)
551817466cbSJens Wiklander {
552817466cbSJens Wiklander const unsigned char *p = data;
553817466cbSJens Wiklander memcpy(buf, p + test_offset, len);
554817466cbSJens Wiklander test_offset += len;
55532b31808SJens Wiklander return 0;
556817466cbSJens Wiklander }
557817466cbSJens Wiklander
558817466cbSJens Wiklander #define CHK(c) if ((c) != 0) \
559817466cbSJens Wiklander { \
560817466cbSJens Wiklander if (verbose != 0) \
561817466cbSJens Wiklander mbedtls_printf("failed\n"); \
56232b31808SJens Wiklander return 1; \
563817466cbSJens Wiklander }
564817466cbSJens Wiklander
565817466cbSJens Wiklander /*
566817466cbSJens Wiklander * Checkup routine for HMAC_DRBG with SHA-1
567817466cbSJens Wiklander */
mbedtls_hmac_drbg_self_test(int verbose)568817466cbSJens Wiklander int mbedtls_hmac_drbg_self_test(int verbose)
569817466cbSJens Wiklander {
570817466cbSJens Wiklander mbedtls_hmac_drbg_context ctx;
571817466cbSJens Wiklander unsigned char buf[OUTPUT_LEN];
572817466cbSJens Wiklander const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
573817466cbSJens Wiklander
574817466cbSJens Wiklander mbedtls_hmac_drbg_init(&ctx);
575817466cbSJens Wiklander
576817466cbSJens Wiklander /*
577817466cbSJens Wiklander * PR = True
578817466cbSJens Wiklander */
57932b31808SJens Wiklander if (verbose != 0) {
580817466cbSJens Wiklander mbedtls_printf(" HMAC_DRBG (PR = True) : ");
58132b31808SJens Wiklander }
582817466cbSJens Wiklander
583817466cbSJens Wiklander test_offset = 0;
584817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_seed(&ctx, md_info,
585817466cbSJens Wiklander hmac_drbg_self_test_entropy, (void *) entropy_pr,
586817466cbSJens Wiklander NULL, 0));
587817466cbSJens Wiklander mbedtls_hmac_drbg_set_prediction_resistance(&ctx, MBEDTLS_HMAC_DRBG_PR_ON);
588817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_random(&ctx, buf, OUTPUT_LEN));
589817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_random(&ctx, buf, OUTPUT_LEN));
590817466cbSJens Wiklander CHK(memcmp(buf, result_pr, OUTPUT_LEN));
591817466cbSJens Wiklander mbedtls_hmac_drbg_free(&ctx);
592817466cbSJens Wiklander
593817466cbSJens Wiklander mbedtls_hmac_drbg_free(&ctx);
594817466cbSJens Wiklander
59532b31808SJens Wiklander if (verbose != 0) {
596817466cbSJens Wiklander mbedtls_printf("passed\n");
59732b31808SJens Wiklander }
598817466cbSJens Wiklander
599817466cbSJens Wiklander /*
600817466cbSJens Wiklander * PR = False
601817466cbSJens Wiklander */
60232b31808SJens Wiklander if (verbose != 0) {
603817466cbSJens Wiklander mbedtls_printf(" HMAC_DRBG (PR = False) : ");
60432b31808SJens Wiklander }
605817466cbSJens Wiklander
606817466cbSJens Wiklander mbedtls_hmac_drbg_init(&ctx);
607817466cbSJens Wiklander
608817466cbSJens Wiklander test_offset = 0;
609817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_seed(&ctx, md_info,
610817466cbSJens Wiklander hmac_drbg_self_test_entropy, (void *) entropy_nopr,
611817466cbSJens Wiklander NULL, 0));
612817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_reseed(&ctx, NULL, 0));
613817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_random(&ctx, buf, OUTPUT_LEN));
614817466cbSJens Wiklander CHK(mbedtls_hmac_drbg_random(&ctx, buf, OUTPUT_LEN));
615817466cbSJens Wiklander CHK(memcmp(buf, result_nopr, OUTPUT_LEN));
616817466cbSJens Wiklander mbedtls_hmac_drbg_free(&ctx);
617817466cbSJens Wiklander
618817466cbSJens Wiklander mbedtls_hmac_drbg_free(&ctx);
619817466cbSJens Wiklander
62032b31808SJens Wiklander if (verbose != 0) {
621817466cbSJens Wiklander mbedtls_printf("passed\n");
62232b31808SJens Wiklander }
623817466cbSJens Wiklander
62432b31808SJens Wiklander if (verbose != 0) {
625817466cbSJens Wiklander mbedtls_printf("\n");
62632b31808SJens Wiklander }
627817466cbSJens Wiklander
62832b31808SJens Wiklander return 0;
629817466cbSJens Wiklander }
630*b0563631STom Van Eyck #endif /* MBEDTLS_MD_CAN_SHA1 */
631817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */
632817466cbSJens Wiklander
633817466cbSJens Wiklander #endif /* MBEDTLS_HMAC_DRBG_C */
634