2011-08-25 23:41:19 +04:00
|
|
|
/* random.h
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
2014-04-12 01:58:58 +04:00
|
|
|
* Copyright (C) 2006-2014 wolfSSL Inc.
|
2011-02-05 22:14:47 +03:00
|
|
|
*
|
|
|
|
* This file is part of CyaSSL.
|
|
|
|
*
|
|
|
|
* CyaSSL is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* CyaSSL is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
2014-04-12 01:58:58 +04:00
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
2011-02-05 22:14:47 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef CTAO_CRYPT_RANDOM_H
|
|
|
|
#define CTAO_CRYPT_RANDOM_H
|
|
|
|
|
2012-11-28 10:17:25 +04:00
|
|
|
#include <cyassl/ctaocrypt/types.h>
|
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
|
|
|
#ifdef NO_SHA256
|
|
|
|
#error "Hash DRBG requires SHA-256."
|
|
|
|
#endif /* NO_SHA256 */
|
|
|
|
|
2012-12-01 03:45:43 +04:00
|
|
|
#include <cyassl/ctaocrypt/sha256.h>
|
2014-05-07 22:54:12 +04:00
|
|
|
#else /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
#include <cyassl/ctaocrypt/arc4.h>
|
|
|
|
#endif /* HAVE_HASHDRBG || NO_RC4 */
|
2011-02-05 22:14:47 +03:00
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#if defined(USE_WINDOWS_API)
|
|
|
|
#if defined(_WIN64)
|
|
|
|
typedef unsigned __int64 ProviderHandle;
|
|
|
|
/* type HCRYPTPROV, avoid #include <windows.h> */
|
|
|
|
#else
|
|
|
|
typedef unsigned long ProviderHandle;
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* OS specific seeder */
|
|
|
|
typedef struct OS_Seed {
|
|
|
|
#if defined(USE_WINDOWS_API)
|
|
|
|
ProviderHandle handle;
|
|
|
|
#else
|
|
|
|
int fd;
|
|
|
|
#endif
|
|
|
|
} OS_Seed;
|
|
|
|
|
2012-11-28 10:17:25 +04:00
|
|
|
|
2011-04-27 02:41:16 +04:00
|
|
|
CYASSL_LOCAL
|
2011-02-05 22:14:47 +03:00
|
|
|
int GenerateSeed(OS_Seed* os, byte* seed, word32 sz);
|
|
|
|
|
2013-05-16 20:47:27 +04:00
|
|
|
#if defined(CYASSL_MDK_ARM)
|
|
|
|
#undef RNG
|
|
|
|
#define RNG CyaSSL_RNG /* for avoiding name conflict in "stm32f2xx.h" */
|
|
|
|
#endif
|
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
|
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
|
|
|
|
|
|
|
|
|
|
|
#define DRBG_SEED_LEN (440/8)
|
|
|
|
|
|
|
|
|
2014-07-30 02:19:51 +04:00
|
|
|
struct DRBG; /* Private DRBG state */
|
|
|
|
|
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
/* Hash-based Deterministic Random Bit Generator */
|
|
|
|
typedef struct RNG {
|
|
|
|
OS_Seed seed;
|
2014-07-30 02:19:51 +04:00
|
|
|
struct DRBG* drbg;
|
2014-05-15 02:25:55 +04:00
|
|
|
byte status;
|
2014-05-07 22:54:12 +04:00
|
|
|
} RNG;
|
|
|
|
|
|
|
|
|
|
|
|
#else /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2013-01-30 04:22:49 +04:00
|
|
|
#define CYASSL_RNG_CAVIUM_MAGIC 0xBEEF0004
|
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
/* secure Random Number Generator */
|
2013-05-16 20:47:27 +04:00
|
|
|
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
typedef struct RNG {
|
|
|
|
OS_Seed seed;
|
|
|
|
Arc4 cipher;
|
2013-01-30 04:22:49 +04:00
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
int devId; /* nitrox device id */
|
|
|
|
word32 magic; /* using cavium magic */
|
|
|
|
#endif
|
2011-02-05 22:14:47 +03:00
|
|
|
} RNG;
|
|
|
|
|
2013-01-30 04:22:49 +04:00
|
|
|
|
|
|
|
#ifdef HAVE_CAVIUM
|
|
|
|
CYASSL_API int InitRngCavium(RNG*, int);
|
|
|
|
#endif
|
|
|
|
|
2012-11-28 10:17:25 +04:00
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
#endif /* HAVE_HASH_DRBG || NO_RC4 */
|
2013-05-16 20:47:27 +04:00
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2011-04-27 02:41:16 +04:00
|
|
|
CYASSL_API int InitRng(RNG*);
|
2014-04-14 23:28:43 +04:00
|
|
|
CYASSL_API int RNG_GenerateBlock(RNG*, byte*, word32 sz);
|
|
|
|
CYASSL_API int RNG_GenerateByte(RNG*, byte*);
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2014-05-07 22:54:12 +04:00
|
|
|
|
|
|
|
#if defined(HAVE_HASHDRBG) || defined(NO_RC4)
|
2014-05-15 02:25:55 +04:00
|
|
|
CYASSL_API int FreeRng(RNG*);
|
|
|
|
CYASSL_API int RNG_HealthTest(int reseed,
|
|
|
|
const byte* entropyA, word32 entropyASz,
|
|
|
|
const byte* entropyB, word32 entropyBSz,
|
2014-10-31 23:05:13 +03:00
|
|
|
byte* output, word32 outputSz);
|
2014-05-07 22:54:12 +04:00
|
|
|
#endif /* HAVE_HASHDRBG || NO_RC4 */
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
|
2014-05-15 02:25:55 +04:00
|
|
|
#ifdef HAVE_FIPS
|
|
|
|
/* fips wrapper calls, user can call direct */
|
|
|
|
CYASSL_API int InitRng_fips(RNG* rng);
|
|
|
|
CYASSL_API int FreeRng_fips(RNG* rng);
|
|
|
|
CYASSL_API int RNG_GenerateBlock_fips(RNG* rng, byte* buf, word32 bufSz);
|
|
|
|
CYASSL_API int RNG_HealthTest_fips(int reseed,
|
|
|
|
const byte* entropyA, word32 entropyASz,
|
|
|
|
const byte* entropyB, word32 entropyBSz,
|
2014-10-31 23:05:13 +03:00
|
|
|
byte* output, word32 outputSz);
|
2014-05-15 02:25:55 +04:00
|
|
|
#ifndef FIPS_NO_WRAPPERS
|
|
|
|
/* if not impl or fips.c impl wrapper force fips calls if fips build */
|
|
|
|
#define InitRng InitRng_fips
|
|
|
|
#define FreeRng FreeRng_fips
|
|
|
|
#define RNG_GenerateBlock RNG_GenerateBlock_fips
|
|
|
|
#define RNG_HealthTest RNG_HealthTest_fips
|
|
|
|
#endif /* FIPS_NO_WRAPPERS */
|
|
|
|
#endif /* HAVE_FIPS */
|
|
|
|
|
|
|
|
|
2011-02-05 22:14:47 +03:00
|
|
|
#ifdef __cplusplus
|
|
|
|
} /* extern "C" */
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* CTAO_CRYPT_RANDOM_H */
|
|
|
|
|