1c6672fdcSEdison Ai // SPDX-License-Identifier: Apache-2.0 2817466cbSJens Wiklander /* 3817466cbSJens Wiklander * HMAC_DRBG implementation (NIST SP 800-90) 4817466cbSJens Wiklander * 5817466cbSJens Wiklander * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved 6817466cbSJens Wiklander * 7817466cbSJens Wiklander * Licensed under the Apache License, Version 2.0 (the "License"); you may 8817466cbSJens Wiklander * not use this file except in compliance with the License. 9817466cbSJens Wiklander * You may obtain a copy of the License at 10817466cbSJens Wiklander * 11817466cbSJens Wiklander * http://www.apache.org/licenses/LICENSE-2.0 12817466cbSJens Wiklander * 13817466cbSJens Wiklander * Unless required by applicable law or agreed to in writing, software 14817466cbSJens Wiklander * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT 15817466cbSJens Wiklander * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 16817466cbSJens Wiklander * See the License for the specific language governing permissions and 17817466cbSJens Wiklander * limitations under the License. 18817466cbSJens Wiklander * 19817466cbSJens Wiklander * This file is part of mbed TLS (https://tls.mbed.org) 20817466cbSJens Wiklander */ 21817466cbSJens Wiklander 22817466cbSJens Wiklander /* 23817466cbSJens Wiklander * The NIST SP 800-90A DRBGs are described in the following publication. 24817466cbSJens Wiklander * http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf 25817466cbSJens Wiklander * References below are based on rev. 1 (January 2012). 26817466cbSJens Wiklander */ 27817466cbSJens Wiklander 28817466cbSJens Wiklander #if !defined(MBEDTLS_CONFIG_FILE) 29817466cbSJens Wiklander #include "mbedtls/config.h" 30817466cbSJens Wiklander #else 31817466cbSJens Wiklander #include MBEDTLS_CONFIG_FILE 32817466cbSJens Wiklander #endif 33817466cbSJens Wiklander 34817466cbSJens Wiklander #if defined(MBEDTLS_HMAC_DRBG_C) 35817466cbSJens Wiklander 36817466cbSJens Wiklander #include "mbedtls/hmac_drbg.h" 37*3d3b0591SJens Wiklander #include "mbedtls/platform_util.h" 38817466cbSJens Wiklander 39817466cbSJens Wiklander #include <string.h> 40817466cbSJens Wiklander 41817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO) 42817466cbSJens Wiklander #include <stdio.h> 43817466cbSJens Wiklander #endif 44817466cbSJens Wiklander 45817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 46817466cbSJens Wiklander #if defined(MBEDTLS_PLATFORM_C) 47817466cbSJens Wiklander #include "mbedtls/platform.h" 48817466cbSJens Wiklander #else 49817466cbSJens Wiklander #include <stdio.h> 50817466cbSJens Wiklander #define mbedtls_printf printf 51817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 52817466cbSJens Wiklander #endif /* MBEDTLS_PLATFORM_C */ 53817466cbSJens Wiklander 54817466cbSJens Wiklander /* 55817466cbSJens Wiklander * HMAC_DRBG context initialization 56817466cbSJens Wiklander */ 57817466cbSJens Wiklander void mbedtls_hmac_drbg_init( mbedtls_hmac_drbg_context *ctx ) 58817466cbSJens Wiklander { 59817466cbSJens Wiklander memset( ctx, 0, sizeof( mbedtls_hmac_drbg_context ) ); 60817466cbSJens Wiklander 61817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C) 62817466cbSJens Wiklander mbedtls_mutex_init( &ctx->mutex ); 63817466cbSJens Wiklander #endif 64817466cbSJens Wiklander } 65817466cbSJens Wiklander 66817466cbSJens Wiklander /* 67817466cbSJens Wiklander * HMAC_DRBG update, using optional additional data (10.1.2.2) 68817466cbSJens Wiklander */ 69*3d3b0591SJens Wiklander int mbedtls_hmac_drbg_update_ret( mbedtls_hmac_drbg_context *ctx, 70*3d3b0591SJens Wiklander const unsigned char *additional, 71*3d3b0591SJens Wiklander size_t add_len ) 72817466cbSJens Wiklander { 73817466cbSJens Wiklander size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); 74817466cbSJens Wiklander unsigned char rounds = ( additional != NULL && add_len != 0 ) ? 2 : 1; 75817466cbSJens Wiklander unsigned char sep[1]; 76817466cbSJens Wiklander unsigned char K[MBEDTLS_MD_MAX_SIZE]; 77*3d3b0591SJens Wiklander int ret; 78817466cbSJens Wiklander 79817466cbSJens Wiklander for( sep[0] = 0; sep[0] < rounds; sep[0]++ ) 80817466cbSJens Wiklander { 81817466cbSJens Wiklander /* Step 1 or 4 */ 82*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_reset( &ctx->md_ctx ) ) != 0 ) 83*3d3b0591SJens Wiklander goto exit; 84*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_update( &ctx->md_ctx, 85*3d3b0591SJens Wiklander ctx->V, md_len ) ) != 0 ) 86*3d3b0591SJens Wiklander goto exit; 87*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_update( &ctx->md_ctx, 88*3d3b0591SJens Wiklander sep, 1 ) ) != 0 ) 89*3d3b0591SJens Wiklander goto exit; 90817466cbSJens Wiklander if( rounds == 2 ) 91*3d3b0591SJens Wiklander { 92*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_update( &ctx->md_ctx, 93*3d3b0591SJens Wiklander additional, add_len ) ) != 0 ) 94*3d3b0591SJens Wiklander goto exit; 95*3d3b0591SJens Wiklander } 96*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_finish( &ctx->md_ctx, K ) ) != 0 ) 97*3d3b0591SJens Wiklander goto exit; 98817466cbSJens Wiklander 99817466cbSJens Wiklander /* Step 2 or 5 */ 100*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, K, md_len ) ) != 0 ) 101*3d3b0591SJens Wiklander goto exit; 102*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_update( &ctx->md_ctx, 103*3d3b0591SJens Wiklander ctx->V, md_len ) ) != 0 ) 104*3d3b0591SJens Wiklander goto exit; 105*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_finish( &ctx->md_ctx, ctx->V ) ) != 0 ) 106*3d3b0591SJens Wiklander goto exit; 107817466cbSJens Wiklander } 108*3d3b0591SJens Wiklander 109*3d3b0591SJens Wiklander exit: 110*3d3b0591SJens Wiklander mbedtls_platform_zeroize( K, sizeof( K ) ); 111*3d3b0591SJens Wiklander return( ret ); 112817466cbSJens Wiklander } 113817466cbSJens Wiklander 114*3d3b0591SJens Wiklander #if !defined(MBEDTLS_DEPRECATED_REMOVED) 115*3d3b0591SJens Wiklander void mbedtls_hmac_drbg_update( mbedtls_hmac_drbg_context *ctx, 116*3d3b0591SJens Wiklander const unsigned char *additional, 117*3d3b0591SJens Wiklander size_t add_len ) 118*3d3b0591SJens Wiklander { 119*3d3b0591SJens Wiklander (void) mbedtls_hmac_drbg_update_ret( ctx, additional, add_len ); 120*3d3b0591SJens Wiklander } 121*3d3b0591SJens Wiklander #endif /* MBEDTLS_DEPRECATED_REMOVED */ 122*3d3b0591SJens Wiklander 123817466cbSJens Wiklander /* 124817466cbSJens Wiklander * Simplified HMAC_DRBG initialisation (for use with deterministic ECDSA) 125817466cbSJens Wiklander */ 126817466cbSJens Wiklander int mbedtls_hmac_drbg_seed_buf( mbedtls_hmac_drbg_context *ctx, 127817466cbSJens Wiklander const mbedtls_md_info_t * md_info, 128817466cbSJens Wiklander const unsigned char *data, size_t data_len ) 129817466cbSJens Wiklander { 130817466cbSJens Wiklander int ret; 131817466cbSJens Wiklander 132817466cbSJens Wiklander if( ( ret = mbedtls_md_setup( &ctx->md_ctx, md_info, 1 ) ) != 0 ) 133817466cbSJens Wiklander return( ret ); 134817466cbSJens Wiklander 135817466cbSJens Wiklander /* 136817466cbSJens Wiklander * Set initial working state. 137817466cbSJens Wiklander * Use the V memory location, which is currently all 0, to initialize the 138817466cbSJens Wiklander * MD context with an all-zero key. Then set V to its initial value. 139817466cbSJens Wiklander */ 140*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, ctx->V, 141*3d3b0591SJens Wiklander mbedtls_md_get_size( md_info ) ) ) != 0 ) 142*3d3b0591SJens Wiklander return( ret ); 143817466cbSJens Wiklander memset( ctx->V, 0x01, mbedtls_md_get_size( md_info ) ); 144817466cbSJens Wiklander 145*3d3b0591SJens Wiklander if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, data, data_len ) ) != 0 ) 146*3d3b0591SJens Wiklander return( ret ); 147817466cbSJens Wiklander 148817466cbSJens Wiklander return( 0 ); 149817466cbSJens Wiklander } 150817466cbSJens Wiklander 151817466cbSJens Wiklander /* 152817466cbSJens Wiklander * HMAC_DRBG reseeding: 10.1.2.4 (arabic) + 9.2 (Roman) 153817466cbSJens Wiklander */ 154817466cbSJens Wiklander int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx, 155817466cbSJens Wiklander const unsigned char *additional, size_t len ) 156817466cbSJens Wiklander { 157817466cbSJens Wiklander unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; 158817466cbSJens Wiklander size_t seedlen; 159*3d3b0591SJens Wiklander int ret; 160817466cbSJens Wiklander 161817466cbSJens Wiklander /* III. Check input length */ 162817466cbSJens Wiklander if( len > MBEDTLS_HMAC_DRBG_MAX_INPUT || 163817466cbSJens Wiklander ctx->entropy_len + len > MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT ) 164817466cbSJens Wiklander { 165817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG ); 166817466cbSJens Wiklander } 167817466cbSJens Wiklander 168817466cbSJens Wiklander memset( seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT ); 169817466cbSJens Wiklander 170817466cbSJens Wiklander /* IV. Gather entropy_len bytes of entropy for the seed */ 171*3d3b0591SJens Wiklander if( ( ret = ctx->f_entropy( ctx->p_entropy, 172*3d3b0591SJens Wiklander seed, ctx->entropy_len ) ) != 0 ) 173817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED ); 174817466cbSJens Wiklander 175817466cbSJens Wiklander seedlen = ctx->entropy_len; 176817466cbSJens Wiklander 177817466cbSJens Wiklander /* 1. Concatenate entropy and additional data if any */ 178817466cbSJens Wiklander if( additional != NULL && len != 0 ) 179817466cbSJens Wiklander { 180817466cbSJens Wiklander memcpy( seed + seedlen, additional, len ); 181817466cbSJens Wiklander seedlen += len; 182817466cbSJens Wiklander } 183817466cbSJens Wiklander 184817466cbSJens Wiklander /* 2. Update state */ 185*3d3b0591SJens Wiklander if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, seed, seedlen ) ) != 0 ) 186*3d3b0591SJens Wiklander goto exit; 187817466cbSJens Wiklander 188817466cbSJens Wiklander /* 3. Reset reseed_counter */ 189817466cbSJens Wiklander ctx->reseed_counter = 1; 190817466cbSJens Wiklander 191*3d3b0591SJens Wiklander exit: 192817466cbSJens Wiklander /* 4. Done */ 193*3d3b0591SJens Wiklander mbedtls_platform_zeroize( seed, seedlen ); 194*3d3b0591SJens Wiklander return( ret ); 195817466cbSJens Wiklander } 196817466cbSJens Wiklander 197817466cbSJens Wiklander /* 198817466cbSJens Wiklander * HMAC_DRBG initialisation (10.1.2.3 + 9.1) 199817466cbSJens Wiklander */ 200817466cbSJens Wiklander int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx, 201817466cbSJens Wiklander const mbedtls_md_info_t * md_info, 202817466cbSJens Wiklander int (*f_entropy)(void *, unsigned char *, size_t), 203817466cbSJens Wiklander void *p_entropy, 204817466cbSJens Wiklander const unsigned char *custom, 205817466cbSJens Wiklander size_t len ) 206817466cbSJens Wiklander { 207817466cbSJens Wiklander int ret; 208817466cbSJens Wiklander size_t entropy_len, md_size; 209817466cbSJens Wiklander 210817466cbSJens Wiklander if( ( ret = mbedtls_md_setup( &ctx->md_ctx, md_info, 1 ) ) != 0 ) 211817466cbSJens Wiklander return( ret ); 212817466cbSJens Wiklander 213817466cbSJens Wiklander md_size = mbedtls_md_get_size( md_info ); 214817466cbSJens Wiklander 215817466cbSJens Wiklander /* 216817466cbSJens Wiklander * Set initial working state. 217817466cbSJens Wiklander * Use the V memory location, which is currently all 0, to initialize the 218817466cbSJens Wiklander * MD context with an all-zero key. Then set V to its initial value. 219817466cbSJens Wiklander */ 220*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, ctx->V, md_size ) ) != 0 ) 221*3d3b0591SJens Wiklander return( ret ); 222817466cbSJens Wiklander memset( ctx->V, 0x01, md_size ); 223817466cbSJens Wiklander 224817466cbSJens Wiklander ctx->f_entropy = f_entropy; 225817466cbSJens Wiklander ctx->p_entropy = p_entropy; 226817466cbSJens Wiklander 227817466cbSJens Wiklander ctx->reseed_interval = MBEDTLS_HMAC_DRBG_RESEED_INTERVAL; 228817466cbSJens Wiklander 229817466cbSJens Wiklander /* 230817466cbSJens Wiklander * See SP800-57 5.6.1 (p. 65-66) for the security strength provided by 231817466cbSJens Wiklander * each hash function, then according to SP800-90A rev1 10.1 table 2, 232817466cbSJens Wiklander * min_entropy_len (in bits) is security_strength. 233817466cbSJens Wiklander * 234817466cbSJens Wiklander * (This also matches the sizes used in the NIST test vectors.) 235817466cbSJens Wiklander */ 236817466cbSJens Wiklander entropy_len = md_size <= 20 ? 16 : /* 160-bits hash -> 128 bits */ 237817466cbSJens Wiklander md_size <= 28 ? 24 : /* 224-bits hash -> 192 bits */ 238817466cbSJens Wiklander 32; /* better (256+) -> 256 bits */ 239817466cbSJens Wiklander 240817466cbSJens Wiklander /* 241817466cbSJens Wiklander * For initialisation, use more entropy to emulate a nonce 242817466cbSJens Wiklander * (Again, matches test vectors.) 243817466cbSJens Wiklander */ 244817466cbSJens Wiklander ctx->entropy_len = entropy_len * 3 / 2; 245817466cbSJens Wiklander 246817466cbSJens Wiklander if( ( ret = mbedtls_hmac_drbg_reseed( ctx, custom, len ) ) != 0 ) 247817466cbSJens Wiklander return( ret ); 248817466cbSJens Wiklander 249817466cbSJens Wiklander ctx->entropy_len = entropy_len; 250817466cbSJens Wiklander 251817466cbSJens Wiklander return( 0 ); 252817466cbSJens Wiklander } 253817466cbSJens Wiklander 254817466cbSJens Wiklander /* 255817466cbSJens Wiklander * Set prediction resistance 256817466cbSJens Wiklander */ 257817466cbSJens Wiklander void mbedtls_hmac_drbg_set_prediction_resistance( mbedtls_hmac_drbg_context *ctx, 258817466cbSJens Wiklander int resistance ) 259817466cbSJens Wiklander { 260817466cbSJens Wiklander ctx->prediction_resistance = resistance; 261817466cbSJens Wiklander } 262817466cbSJens Wiklander 263817466cbSJens Wiklander /* 264817466cbSJens Wiklander * Set entropy length grabbed for reseeds 265817466cbSJens Wiklander */ 266817466cbSJens Wiklander void mbedtls_hmac_drbg_set_entropy_len( mbedtls_hmac_drbg_context *ctx, size_t len ) 267817466cbSJens Wiklander { 268817466cbSJens Wiklander ctx->entropy_len = len; 269817466cbSJens Wiklander } 270817466cbSJens Wiklander 271817466cbSJens Wiklander /* 272817466cbSJens Wiklander * Set reseed interval 273817466cbSJens Wiklander */ 274817466cbSJens Wiklander void mbedtls_hmac_drbg_set_reseed_interval( mbedtls_hmac_drbg_context *ctx, int interval ) 275817466cbSJens Wiklander { 276817466cbSJens Wiklander ctx->reseed_interval = interval; 277817466cbSJens Wiklander } 278817466cbSJens Wiklander 279817466cbSJens Wiklander /* 280817466cbSJens Wiklander * HMAC_DRBG random function with optional additional data: 281817466cbSJens Wiklander * 10.1.2.5 (arabic) + 9.3 (Roman) 282817466cbSJens Wiklander */ 283817466cbSJens Wiklander int mbedtls_hmac_drbg_random_with_add( void *p_rng, 284817466cbSJens Wiklander unsigned char *output, size_t out_len, 285817466cbSJens Wiklander const unsigned char *additional, size_t add_len ) 286817466cbSJens Wiklander { 287817466cbSJens Wiklander int ret; 288817466cbSJens Wiklander mbedtls_hmac_drbg_context *ctx = (mbedtls_hmac_drbg_context *) p_rng; 289817466cbSJens Wiklander size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); 290817466cbSJens Wiklander size_t left = out_len; 291817466cbSJens Wiklander unsigned char *out = output; 292817466cbSJens Wiklander 293817466cbSJens Wiklander /* II. Check request length */ 294817466cbSJens Wiklander if( out_len > MBEDTLS_HMAC_DRBG_MAX_REQUEST ) 295817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG ); 296817466cbSJens Wiklander 297817466cbSJens Wiklander /* III. Check input length */ 298817466cbSJens Wiklander if( add_len > MBEDTLS_HMAC_DRBG_MAX_INPUT ) 299817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG ); 300817466cbSJens Wiklander 301817466cbSJens Wiklander /* 1. (aka VII and IX) Check reseed counter and PR */ 302817466cbSJens Wiklander if( ctx->f_entropy != NULL && /* For no-reseeding instances */ 303817466cbSJens Wiklander ( ctx->prediction_resistance == MBEDTLS_HMAC_DRBG_PR_ON || 304817466cbSJens Wiklander ctx->reseed_counter > ctx->reseed_interval ) ) 305817466cbSJens Wiklander { 306817466cbSJens Wiklander if( ( ret = mbedtls_hmac_drbg_reseed( ctx, additional, add_len ) ) != 0 ) 307817466cbSJens Wiklander return( ret ); 308817466cbSJens Wiklander 309817466cbSJens Wiklander add_len = 0; /* VII.4 */ 310817466cbSJens Wiklander } 311817466cbSJens Wiklander 312817466cbSJens Wiklander /* 2. Use additional data if any */ 313817466cbSJens Wiklander if( additional != NULL && add_len != 0 ) 314*3d3b0591SJens Wiklander { 315*3d3b0591SJens Wiklander if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, 316*3d3b0591SJens Wiklander additional, add_len ) ) != 0 ) 317*3d3b0591SJens Wiklander goto exit; 318*3d3b0591SJens Wiklander } 319817466cbSJens Wiklander 320817466cbSJens Wiklander /* 3, 4, 5. Generate bytes */ 321817466cbSJens Wiklander while( left != 0 ) 322817466cbSJens Wiklander { 323817466cbSJens Wiklander size_t use_len = left > md_len ? md_len : left; 324817466cbSJens Wiklander 325*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_reset( &ctx->md_ctx ) ) != 0 ) 326*3d3b0591SJens Wiklander goto exit; 327*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_update( &ctx->md_ctx, 328*3d3b0591SJens Wiklander ctx->V, md_len ) ) != 0 ) 329*3d3b0591SJens Wiklander goto exit; 330*3d3b0591SJens Wiklander if( ( ret = mbedtls_md_hmac_finish( &ctx->md_ctx, ctx->V ) ) != 0 ) 331*3d3b0591SJens Wiklander goto exit; 332817466cbSJens Wiklander 333817466cbSJens Wiklander memcpy( out, ctx->V, use_len ); 334817466cbSJens Wiklander out += use_len; 335817466cbSJens Wiklander left -= use_len; 336817466cbSJens Wiklander } 337817466cbSJens Wiklander 338817466cbSJens Wiklander /* 6. Update */ 339*3d3b0591SJens Wiklander if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, 340*3d3b0591SJens Wiklander additional, add_len ) ) != 0 ) 341*3d3b0591SJens Wiklander goto exit; 342817466cbSJens Wiklander 343817466cbSJens Wiklander /* 7. Update reseed counter */ 344817466cbSJens Wiklander ctx->reseed_counter++; 345817466cbSJens Wiklander 346*3d3b0591SJens Wiklander exit: 347817466cbSJens Wiklander /* 8. Done */ 348*3d3b0591SJens Wiklander return( ret ); 349817466cbSJens Wiklander } 350817466cbSJens Wiklander 351817466cbSJens Wiklander /* 352817466cbSJens Wiklander * HMAC_DRBG random function 353817466cbSJens Wiklander */ 354817466cbSJens Wiklander int mbedtls_hmac_drbg_random( void *p_rng, unsigned char *output, size_t out_len ) 355817466cbSJens Wiklander { 356817466cbSJens Wiklander int ret; 357817466cbSJens Wiklander mbedtls_hmac_drbg_context *ctx = (mbedtls_hmac_drbg_context *) p_rng; 358817466cbSJens Wiklander 359817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C) 360817466cbSJens Wiklander if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 ) 361817466cbSJens Wiklander return( ret ); 362817466cbSJens Wiklander #endif 363817466cbSJens Wiklander 364817466cbSJens Wiklander ret = mbedtls_hmac_drbg_random_with_add( ctx, output, out_len, NULL, 0 ); 365817466cbSJens Wiklander 366817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C) 367817466cbSJens Wiklander if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 ) 368817466cbSJens Wiklander return( MBEDTLS_ERR_THREADING_MUTEX_ERROR ); 369817466cbSJens Wiklander #endif 370817466cbSJens Wiklander 371817466cbSJens Wiklander return( ret ); 372817466cbSJens Wiklander } 373817466cbSJens Wiklander 374817466cbSJens Wiklander /* 375817466cbSJens Wiklander * Free an HMAC_DRBG context 376817466cbSJens Wiklander */ 377817466cbSJens Wiklander void mbedtls_hmac_drbg_free( mbedtls_hmac_drbg_context *ctx ) 378817466cbSJens Wiklander { 379817466cbSJens Wiklander if( ctx == NULL ) 380817466cbSJens Wiklander return; 381817466cbSJens Wiklander 382817466cbSJens Wiklander #if defined(MBEDTLS_THREADING_C) 383817466cbSJens Wiklander mbedtls_mutex_free( &ctx->mutex ); 384817466cbSJens Wiklander #endif 385817466cbSJens Wiklander mbedtls_md_free( &ctx->md_ctx ); 386*3d3b0591SJens Wiklander mbedtls_platform_zeroize( ctx, sizeof( mbedtls_hmac_drbg_context ) ); 387817466cbSJens Wiklander } 388817466cbSJens Wiklander 389817466cbSJens Wiklander #if defined(MBEDTLS_FS_IO) 390817466cbSJens Wiklander int mbedtls_hmac_drbg_write_seed_file( mbedtls_hmac_drbg_context *ctx, const char *path ) 391817466cbSJens Wiklander { 392817466cbSJens Wiklander int ret; 393817466cbSJens Wiklander FILE *f; 394817466cbSJens Wiklander unsigned char buf[ MBEDTLS_HMAC_DRBG_MAX_INPUT ]; 395817466cbSJens Wiklander 396817466cbSJens Wiklander if( ( f = fopen( path, "wb" ) ) == NULL ) 397817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR ); 398817466cbSJens Wiklander 399817466cbSJens Wiklander if( ( ret = mbedtls_hmac_drbg_random( ctx, buf, sizeof( buf ) ) ) != 0 ) 400817466cbSJens Wiklander goto exit; 401817466cbSJens Wiklander 402817466cbSJens Wiklander if( fwrite( buf, 1, sizeof( buf ), f ) != sizeof( buf ) ) 403817466cbSJens Wiklander { 404817466cbSJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR; 405817466cbSJens Wiklander goto exit; 406817466cbSJens Wiklander } 407817466cbSJens Wiklander 408817466cbSJens Wiklander ret = 0; 409817466cbSJens Wiklander 410817466cbSJens Wiklander exit: 411817466cbSJens Wiklander fclose( f ); 412*3d3b0591SJens Wiklander mbedtls_platform_zeroize( buf, sizeof( buf ) ); 413*3d3b0591SJens Wiklander 414817466cbSJens Wiklander return( ret ); 415817466cbSJens Wiklander } 416817466cbSJens Wiklander 417817466cbSJens Wiklander int mbedtls_hmac_drbg_update_seed_file( mbedtls_hmac_drbg_context *ctx, const char *path ) 418817466cbSJens Wiklander { 419*3d3b0591SJens Wiklander int ret = 0; 420*3d3b0591SJens Wiklander FILE *f = NULL; 421817466cbSJens Wiklander size_t n; 422817466cbSJens Wiklander unsigned char buf[ MBEDTLS_HMAC_DRBG_MAX_INPUT ]; 423*3d3b0591SJens Wiklander unsigned char c; 424817466cbSJens Wiklander 425817466cbSJens Wiklander if( ( f = fopen( path, "rb" ) ) == NULL ) 426817466cbSJens Wiklander return( MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR ); 427817466cbSJens Wiklander 428*3d3b0591SJens Wiklander n = fread( buf, 1, sizeof( buf ), f ); 429*3d3b0591SJens Wiklander if( fread( &c, 1, 1, f ) != 0 ) 430817466cbSJens Wiklander { 431*3d3b0591SJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG; 432*3d3b0591SJens Wiklander goto exit; 433817466cbSJens Wiklander } 434*3d3b0591SJens Wiklander if( n == 0 || ferror( f ) ) 435817466cbSJens Wiklander { 436*3d3b0591SJens Wiklander ret = MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR; 437*3d3b0591SJens Wiklander goto exit; 438817466cbSJens Wiklander } 439817466cbSJens Wiklander fclose( f ); 440*3d3b0591SJens Wiklander f = NULL; 441817466cbSJens Wiklander 442*3d3b0591SJens Wiklander ret = mbedtls_hmac_drbg_update_ret( ctx, buf, n ); 443817466cbSJens Wiklander 444*3d3b0591SJens Wiklander exit: 445*3d3b0591SJens Wiklander mbedtls_platform_zeroize( buf, sizeof( buf ) ); 446*3d3b0591SJens Wiklander if( f != NULL ) 447*3d3b0591SJens Wiklander fclose( f ); 448*3d3b0591SJens Wiklander if( ret != 0 ) 449*3d3b0591SJens Wiklander return( ret ); 450817466cbSJens Wiklander return( mbedtls_hmac_drbg_write_seed_file( ctx, path ) ); 451817466cbSJens Wiklander } 452817466cbSJens Wiklander #endif /* MBEDTLS_FS_IO */ 453817466cbSJens Wiklander 454817466cbSJens Wiklander 455817466cbSJens Wiklander #if defined(MBEDTLS_SELF_TEST) 456817466cbSJens Wiklander 457817466cbSJens Wiklander #if !defined(MBEDTLS_SHA1_C) 458817466cbSJens Wiklander /* Dummy checkup routine */ 459817466cbSJens Wiklander int mbedtls_hmac_drbg_self_test( int verbose ) 460817466cbSJens Wiklander { 461817466cbSJens Wiklander (void) verbose; 462817466cbSJens Wiklander return( 0 ); 463817466cbSJens Wiklander } 464817466cbSJens Wiklander #else 465817466cbSJens Wiklander 466817466cbSJens Wiklander #define OUTPUT_LEN 80 467817466cbSJens Wiklander 468817466cbSJens Wiklander /* From a NIST PR=true test vector */ 469817466cbSJens Wiklander static const unsigned char entropy_pr[] = { 470817466cbSJens Wiklander 0xa0, 0xc9, 0xab, 0x58, 0xf1, 0xe2, 0xe5, 0xa4, 0xde, 0x3e, 0xbd, 0x4f, 471817466cbSJens Wiklander 0xf7, 0x3e, 0x9c, 0x5b, 0x64, 0xef, 0xd8, 0xca, 0x02, 0x8c, 0xf8, 0x11, 472817466cbSJens Wiklander 0x48, 0xa5, 0x84, 0xfe, 0x69, 0xab, 0x5a, 0xee, 0x42, 0xaa, 0x4d, 0x42, 473817466cbSJens Wiklander 0x17, 0x60, 0x99, 0xd4, 0x5e, 0x13, 0x97, 0xdc, 0x40, 0x4d, 0x86, 0xa3, 474817466cbSJens Wiklander 0x7b, 0xf5, 0x59, 0x54, 0x75, 0x69, 0x51, 0xe4 }; 475817466cbSJens Wiklander static const unsigned char result_pr[OUTPUT_LEN] = { 476817466cbSJens Wiklander 0x9a, 0x00, 0xa2, 0xd0, 0x0e, 0xd5, 0x9b, 0xfe, 0x31, 0xec, 0xb1, 0x39, 477817466cbSJens Wiklander 0x9b, 0x60, 0x81, 0x48, 0xd1, 0x96, 0x9d, 0x25, 0x0d, 0x3c, 0x1e, 0x94, 478817466cbSJens Wiklander 0x10, 0x10, 0x98, 0x12, 0x93, 0x25, 0xca, 0xb8, 0xfc, 0xcc, 0x2d, 0x54, 479817466cbSJens Wiklander 0x73, 0x19, 0x70, 0xc0, 0x10, 0x7a, 0xa4, 0x89, 0x25, 0x19, 0x95, 0x5e, 480817466cbSJens Wiklander 0x4b, 0xc6, 0x00, 0x1d, 0x7f, 0x4e, 0x6a, 0x2b, 0xf8, 0xa3, 0x01, 0xab, 481817466cbSJens Wiklander 0x46, 0x05, 0x5c, 0x09, 0xa6, 0x71, 0x88, 0xf1, 0xa7, 0x40, 0xee, 0xf3, 482817466cbSJens Wiklander 0xe1, 0x5c, 0x02, 0x9b, 0x44, 0xaf, 0x03, 0x44 }; 483817466cbSJens Wiklander 484817466cbSJens Wiklander /* From a NIST PR=false test vector */ 485817466cbSJens Wiklander static const unsigned char entropy_nopr[] = { 486817466cbSJens Wiklander 0x79, 0x34, 0x9b, 0xbf, 0x7c, 0xdd, 0xa5, 0x79, 0x95, 0x57, 0x86, 0x66, 487817466cbSJens Wiklander 0x21, 0xc9, 0x13, 0x83, 0x11, 0x46, 0x73, 0x3a, 0xbf, 0x8c, 0x35, 0xc8, 488817466cbSJens Wiklander 0xc7, 0x21, 0x5b, 0x5b, 0x96, 0xc4, 0x8e, 0x9b, 0x33, 0x8c, 0x74, 0xe3, 489817466cbSJens Wiklander 0xe9, 0x9d, 0xfe, 0xdf }; 490817466cbSJens Wiklander static const unsigned char result_nopr[OUTPUT_LEN] = { 491817466cbSJens Wiklander 0xc6, 0xa1, 0x6a, 0xb8, 0xd4, 0x20, 0x70, 0x6f, 0x0f, 0x34, 0xab, 0x7f, 492817466cbSJens Wiklander 0xec, 0x5a, 0xdc, 0xa9, 0xd8, 0xca, 0x3a, 0x13, 0x3e, 0x15, 0x9c, 0xa6, 493817466cbSJens Wiklander 0xac, 0x43, 0xc6, 0xf8, 0xa2, 0xbe, 0x22, 0x83, 0x4a, 0x4c, 0x0a, 0x0a, 494817466cbSJens Wiklander 0xff, 0xb1, 0x0d, 0x71, 0x94, 0xf1, 0xc1, 0xa5, 0xcf, 0x73, 0x22, 0xec, 495817466cbSJens Wiklander 0x1a, 0xe0, 0x96, 0x4e, 0xd4, 0xbf, 0x12, 0x27, 0x46, 0xe0, 0x87, 0xfd, 496817466cbSJens Wiklander 0xb5, 0xb3, 0xe9, 0x1b, 0x34, 0x93, 0xd5, 0xbb, 0x98, 0xfa, 0xed, 0x49, 497817466cbSJens Wiklander 0xe8, 0x5f, 0x13, 0x0f, 0xc8, 0xa4, 0x59, 0xb7 }; 498817466cbSJens Wiklander 499817466cbSJens Wiklander /* "Entropy" from buffer */ 500817466cbSJens Wiklander static size_t test_offset; 501817466cbSJens Wiklander static int hmac_drbg_self_test_entropy( void *data, 502817466cbSJens Wiklander unsigned char *buf, size_t len ) 503817466cbSJens Wiklander { 504817466cbSJens Wiklander const unsigned char *p = data; 505817466cbSJens Wiklander memcpy( buf, p + test_offset, len ); 506817466cbSJens Wiklander test_offset += len; 507817466cbSJens Wiklander return( 0 ); 508817466cbSJens Wiklander } 509817466cbSJens Wiklander 510817466cbSJens Wiklander #define CHK( c ) if( (c) != 0 ) \ 511817466cbSJens Wiklander { \ 512817466cbSJens Wiklander if( verbose != 0 ) \ 513817466cbSJens Wiklander mbedtls_printf( "failed\n" ); \ 514817466cbSJens Wiklander return( 1 ); \ 515817466cbSJens Wiklander } 516817466cbSJens Wiklander 517817466cbSJens Wiklander /* 518817466cbSJens Wiklander * Checkup routine for HMAC_DRBG with SHA-1 519817466cbSJens Wiklander */ 520817466cbSJens Wiklander int mbedtls_hmac_drbg_self_test( int verbose ) 521817466cbSJens Wiklander { 522817466cbSJens Wiklander mbedtls_hmac_drbg_context ctx; 523817466cbSJens Wiklander unsigned char buf[OUTPUT_LEN]; 524817466cbSJens Wiklander const mbedtls_md_info_t *md_info = mbedtls_md_info_from_type( MBEDTLS_MD_SHA1 ); 525817466cbSJens Wiklander 526817466cbSJens Wiklander mbedtls_hmac_drbg_init( &ctx ); 527817466cbSJens Wiklander 528817466cbSJens Wiklander /* 529817466cbSJens Wiklander * PR = True 530817466cbSJens Wiklander */ 531817466cbSJens Wiklander if( verbose != 0 ) 532817466cbSJens Wiklander mbedtls_printf( " HMAC_DRBG (PR = True) : " ); 533817466cbSJens Wiklander 534817466cbSJens Wiklander test_offset = 0; 535817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_seed( &ctx, md_info, 536817466cbSJens Wiklander hmac_drbg_self_test_entropy, (void *) entropy_pr, 537817466cbSJens Wiklander NULL, 0 ) ); 538817466cbSJens Wiklander mbedtls_hmac_drbg_set_prediction_resistance( &ctx, MBEDTLS_HMAC_DRBG_PR_ON ); 539817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_random( &ctx, buf, OUTPUT_LEN ) ); 540817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_random( &ctx, buf, OUTPUT_LEN ) ); 541817466cbSJens Wiklander CHK( memcmp( buf, result_pr, OUTPUT_LEN ) ); 542817466cbSJens Wiklander mbedtls_hmac_drbg_free( &ctx ); 543817466cbSJens Wiklander 544817466cbSJens Wiklander mbedtls_hmac_drbg_free( &ctx ); 545817466cbSJens Wiklander 546817466cbSJens Wiklander if( verbose != 0 ) 547817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 548817466cbSJens Wiklander 549817466cbSJens Wiklander /* 550817466cbSJens Wiklander * PR = False 551817466cbSJens Wiklander */ 552817466cbSJens Wiklander if( verbose != 0 ) 553817466cbSJens Wiklander mbedtls_printf( " HMAC_DRBG (PR = False) : " ); 554817466cbSJens Wiklander 555817466cbSJens Wiklander mbedtls_hmac_drbg_init( &ctx ); 556817466cbSJens Wiklander 557817466cbSJens Wiklander test_offset = 0; 558817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_seed( &ctx, md_info, 559817466cbSJens Wiklander hmac_drbg_self_test_entropy, (void *) entropy_nopr, 560817466cbSJens Wiklander NULL, 0 ) ); 561817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_reseed( &ctx, NULL, 0 ) ); 562817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_random( &ctx, buf, OUTPUT_LEN ) ); 563817466cbSJens Wiklander CHK( mbedtls_hmac_drbg_random( &ctx, buf, OUTPUT_LEN ) ); 564817466cbSJens Wiklander CHK( memcmp( buf, result_nopr, OUTPUT_LEN ) ); 565817466cbSJens Wiklander mbedtls_hmac_drbg_free( &ctx ); 566817466cbSJens Wiklander 567817466cbSJens Wiklander mbedtls_hmac_drbg_free( &ctx ); 568817466cbSJens Wiklander 569817466cbSJens Wiklander if( verbose != 0 ) 570817466cbSJens Wiklander mbedtls_printf( "passed\n" ); 571817466cbSJens Wiklander 572817466cbSJens Wiklander if( verbose != 0 ) 573817466cbSJens Wiklander mbedtls_printf( "\n" ); 574817466cbSJens Wiklander 575817466cbSJens Wiklander return( 0 ); 576817466cbSJens Wiklander } 577817466cbSJens Wiklander #endif /* MBEDTLS_SHA1_C */ 578817466cbSJens Wiklander #endif /* MBEDTLS_SELF_TEST */ 579817466cbSJens Wiklander 580817466cbSJens Wiklander #endif /* MBEDTLS_HMAC_DRBG_C */ 581