2011-08-25 12:41:19 -07:00
|
|
|
/* random.h
|
2011-02-05 11:14:47 -08:00
|
|
|
*
|
2014-04-11 15:58:58 -06:00
|
|
|
* Copyright (C) 2006-2014 wolfSSL Inc.
|
2011-02-05 11:14:47 -08:00
|
|
|
*
|
|
|
|
* This file is part of CyaSSL.
|
|
|
|
*
|
|
|
|
* CyaSSL is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* CyaSSL is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
2014-04-11 15:58:58 -06:00
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
2011-02-05 11:14:47 -08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef CTAO_CRYPT_RANDOM_H
|
|
|
|
#define CTAO_CRYPT_RANDOM_H
|
|
|
|
|
2012-11-27 22:17:25 -08:00
|
|
|
#include <cyassl/ctaocrypt/types.h>
|
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
|
|
|
#ifdef NO_SHA256
|
|
|
|
#error "Hash DRBG requires SHA-256."
|
|
|
|
#endif /* NO_SHA256 */
|
|
|
|
|
2012-11-30 15:45:43 -08:00
|
|
|
#include <cyassl/ctaocrypt/sha256.h>
|
2014-05-07 11:54:12 -07:00
|
|
|
#else /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
#include <cyassl/ctaocrypt/arc4.h>
|
|
|
|
#endif /* HAVE_HASHDRBG || NO_RC4 */
|
2011-02-05 11:14:47 -08:00
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(USE_WINDOWS_API)
|
|
|
|
#if defined(_WIN64)
|
|
|
|
typedef unsigned __int64 ProviderHandle;
|
|
|
|
/* type HCRYPTPROV, avoid #include <windows.h> */
|
|
|
|
#else
|
|
|
|
typedef unsigned long ProviderHandle;
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* OS specific seeder */
|
|
|
|
typedef struct OS_Seed {
|
|
|
|
#if defined(USE_WINDOWS_API)
|
|
|
|
ProviderHandle handle;
|
|
|
|
#else
|
|
|
|
int fd;
|
|
|
|
#endif
|
|
|
|
} OS_Seed;
|
|
|
|
|
2012-11-27 22:17:25 -08:00
|
|
|
|
2011-04-26 15:41:16 -07:00
|
|
|
CYASSL_LOCAL
|
2011-02-05 11:14:47 -08:00
|
|
|
int GenerateSeed(OS_Seed* os, byte* seed, word32 sz);
|
|
|
|
|
2013-05-16 09:47:27 -07:00
|
|
|
#if defined(CYASSL_MDK_ARM)
|
|
|
|
#undef RNG
|
|
|
|
#define RNG CyaSSL_RNG /* for avoiding name conflict in "stm32f2xx.h" */
|
|
|
|
#endif
|
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
|
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
|
|
|
|
|
|
|
|
|
|
|
#define DRBG_SEED_LEN (440/8)
|
|
|
|
|
|
|
|
|
2014-07-29 15:19:51 -07:00
|
|
|
struct DRBG; /* Private DRBG state */
|
|
|
|
|
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
/* Hash-based Deterministic Random Bit Generator */
|
|
|
|
typedef struct RNG {
|
|
|
|
OS_Seed seed;
|
2014-07-29 15:19:51 -07:00
|
|
|
struct DRBG* drbg;
|
2014-05-14 15:25:55 -07:00
|
|
|
byte status;
|
2014-05-07 11:54:12 -07:00
|
|
|
} RNG;
|
|
|
|
|
|
|
|
|
|
|
|
#else /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
|
2011-02-05 11:14:47 -08:00
|
|
|
|
2013-01-29 16:22:49 -08:00
|
|
|
#define CYASSL_RNG_CAVIUM_MAGIC 0xBEEF0004
|
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
/* secure Random Number Generator */
|
2013-05-16 09:47:27 -07:00
|
|
|
|
|
|
|
|
2011-02-05 11:14:47 -08:00
|
|
|
typedef struct RNG {
|
|
|
|
OS_Seed seed;
|
|
|
|
Arc4 cipher;
|
2013-01-29 16:22:49 -08:00
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
int devId; /* nitrox device id */
|
|
|
|
word32 magic; /* using cavium magic */
|
|
|
|
#endif
|
2011-02-05 11:14:47 -08:00
|
|
|
} RNG;
|
|
|
|
|
2013-01-29 16:22:49 -08:00
|
|
|
|
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
CYASSL_API int InitRngCavium(RNG*, int);
|
|
|
|
#endif
|
|
|
|
|
2012-11-27 22:17:25 -08:00
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
#endif /* HAVE_HASH_DRBG || NO_RC4 */
|
2013-05-16 09:47:27 -07:00
|
|
|
|
2011-02-05 11:14:47 -08:00
|
|
|
|
2011-04-26 15:41:16 -07:00
|
|
|
CYASSL_API int InitRng(RNG*);
|
2014-04-14 16:28:43 -03:00
|
|
|
CYASSL_API int RNG_GenerateBlock(RNG*, byte*, word32 sz);
|
|
|
|
CYASSL_API int RNG_GenerateByte(RNG*, byte*);
|
2011-02-05 11:14:47 -08:00
|
|
|
|
2014-05-07 11:54:12 -07:00
|
|
|
|
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
2014-05-14 15:25:55 -07:00
|
|
|
CYASSL_API int FreeRng(RNG*);
|
|
|
|
CYASSL_API int RNG_HealthTest(int reseed,
|
|
|
|
const byte* entropyA, word32 entropyASz,
|
|
|
|
const byte* entropyB, word32 entropyBSz,
|
2014-10-31 14:05:13 -06:00
|
|
|
byte* output, word32 outputSz);
|
2014-05-07 11:54:12 -07:00
|
|
|
#endif /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
|
2011-02-05 11:14:47 -08:00
|
|
|
|
2014-05-14 15:25:55 -07:00
|
|
|
#ifdef HAVE_FIPS
|
|
|
|
/* fips wrapper calls, user can call direct */
|
|
|
|
CYASSL_API int InitRng_fips(RNG* rng);
|
|
|
|
CYASSL_API int FreeRng_fips(RNG* rng);
|
|
|
|
CYASSL_API int RNG_GenerateBlock_fips(RNG* rng, byte* buf, word32 bufSz);
|
|
|
|
CYASSL_API int RNG_HealthTest_fips(int reseed,
|
|
|
|
const byte* entropyA, word32 entropyASz,
|
|
|
|
const byte* entropyB, word32 entropyBSz,
|
2014-10-31 14:05:13 -06:00
|
|
|
byte* output, word32 outputSz);
|
2014-05-14 15:25:55 -07:00
|
|
|
#ifndef FIPS_NO_WRAPPERS
|
|
|
|
/* if not impl or fips.c impl wrapper force fips calls if fips build */
|
|
|
|
#define InitRng InitRng_fips
|
|
|
|
#define FreeRng FreeRng_fips
|
|
|
|
#define RNG_GenerateBlock RNG_GenerateBlock_fips
|
|
|
|
#define RNG_HealthTest RNG_HealthTest_fips
|
|
|
|
#endif /* FIPS_NO_WRAPPERS */
|
|
|
|
#endif /* HAVE_FIPS */
|
|
|
|
|
|
|
|
|
2011-02-05 11:14:47 -08:00
|
|
|
#ifdef __cplusplus
|
|
|
|
} /* extern "C" */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* CTAO_CRYPT_RANDOM_H */
|
|
|
|
|