58891025ef
Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Paul Dale <paul.dale@oracle.com> GH: #4268
178 lines
5.8 KiB
C
178 lines
5.8 KiB
C
/*
|
|
* Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#ifndef HEADER_RAND_LCL_H
|
|
# define HEADER_RAND_LCL_H
|
|
|
|
# include <openssl/aes.h>
|
|
# include <openssl/evp.h>
|
|
# include <openssl/sha.h>
|
|
# include <openssl/hmac.h>
|
|
# include <openssl/ec.h>
|
|
# include "internal/rand.h"
|
|
|
|
/*
|
|
* Amount of randomness (in bytes) we want for initial seeding.
|
|
* This is based on the fact that we use AES-128 as the CRBG, and
|
|
* that we use the derivation function. If either of those changes,
|
|
* (see rand_init() in rand_lib.c), change this.
|
|
*/
|
|
# define RANDOMNESS_NEEDED 16
|
|
|
|
/* How many times to read the TSC as a randomness source. */
|
|
# define TSC_READ_COUNT 4
|
|
|
|
/* Maximum amount of randomness to hold in RAND_BYTES_BUFFER. */
|
|
# define MAX_RANDOMNESS_HELD (4 * RANDOMNESS_NEEDED)
|
|
|
|
/* Maximum count allowed in reseeding */
|
|
# define MAX_RESEED (1 << 24)
|
|
|
|
/* How often we call RAND_poll() in drbg_entropy_from_system */
|
|
# define RAND_POLL_RETRIES 8
|
|
|
|
/* Max size of entropy, addin, etc. Larger than any reasonable value */
|
|
# define DRBG_MAX_LENGTH 0x7ffffff0
|
|
|
|
|
|
/* DRBG status values */
|
|
typedef enum drbg_status_e {
|
|
DRBG_UNINITIALISED,
|
|
DRBG_READY,
|
|
DRBG_RESEED,
|
|
DRBG_ERROR
|
|
} DRBG_STATUS;
|
|
|
|
|
|
/*
|
|
* A buffer of random bytes to be fed as "entropy" into the DRBG. RAND_add()
|
|
* adds data to the buffer, and the drbg_entropy_from_system() pulls data from
|
|
* the buffer. We have a separate data structure because of the way the
|
|
* API is defined; otherwise we'd run into deadlocks (RAND_bytes ->
|
|
* RAND_DRBG_generate* -> drbg_entropy_from_system -> RAND_poll -> RAND_add ->
|
|
* drbg_add*; the functions with an asterisk lock).
|
|
*/
|
|
typedef struct rand_bytes_buffer_st {
|
|
CRYPTO_RWLOCK *lock;
|
|
unsigned char *buff;
|
|
size_t size;
|
|
size_t curr;
|
|
int secure;
|
|
} RAND_BYTES_BUFFER;
|
|
|
|
/*
|
|
* The state of a DRBG AES-CTR.
|
|
*/
|
|
typedef struct rand_drbg_ctr_st {
|
|
AES_KEY ks;
|
|
size_t keylen;
|
|
unsigned char K[32];
|
|
unsigned char V[16];
|
|
/* Temp variables used by derivation function */
|
|
AES_KEY df_ks;
|
|
AES_KEY df_kxks;
|
|
/* Temporary block storage used by ctr_df */
|
|
unsigned char bltmp[16];
|
|
size_t bltmp_pos;
|
|
unsigned char KX[48];
|
|
} RAND_DRBG_CTR;
|
|
|
|
|
|
/*
|
|
* The state of all types of DRBGs, even though we only have CTR mode
|
|
* right now.
|
|
*/
|
|
struct rand_drbg_st {
|
|
CRYPTO_RWLOCK *lock;
|
|
RAND_DRBG *parent;
|
|
int nid; /* the underlying algorithm */
|
|
int fork_count;
|
|
unsigned short flags; /* various external flags */
|
|
char secure;
|
|
/*
|
|
* This is a fixed-size buffer, but we malloc to make it a little
|
|
* harder to find; a classic security/performance trade-off.
|
|
*/
|
|
int size;
|
|
|
|
/*
|
|
* The following parameters are setup by the per-type "init" function.
|
|
*
|
|
* Currently the only type is CTR_DRBG, its init function is ctr_init().
|
|
*
|
|
* The parameters are closely related to the ones described in
|
|
* section '10.2.1 CTR_DRBG' of [NIST SP 800-90Ar1], with one
|
|
* crucial difference: In the NIST standard, all counts are given
|
|
* in bits, whereas in OpenSSL entropy counts are given in bits
|
|
* and buffer lengths are given in bytes.
|
|
*
|
|
* Since this difference has lead to some confusion in the past,
|
|
* (see [GitHub Issue #2443], formerly [rt.openssl.org #4055])
|
|
* the 'len' suffix has been added to all buffer sizes for
|
|
* clarification.
|
|
*/
|
|
|
|
int strength;
|
|
size_t max_request;
|
|
size_t min_entropylen, max_entropylen;
|
|
size_t min_noncelen, max_noncelen;
|
|
size_t max_perslen, max_adinlen;
|
|
unsigned int reseed_counter;
|
|
unsigned int reseed_interval;
|
|
size_t seedlen;
|
|
DRBG_STATUS state;
|
|
|
|
/* Application data, mainly used in the KATs. */
|
|
CRYPTO_EX_DATA ex_data;
|
|
|
|
/* Implementation specific structures; was a union, but inline for now */
|
|
RAND_DRBG_CTR ctr;
|
|
|
|
/* Callback functions. See comments in rand_lib.c */
|
|
RAND_DRBG_get_entropy_fn get_entropy;
|
|
RAND_DRBG_cleanup_entropy_fn cleanup_entropy;
|
|
RAND_DRBG_get_nonce_fn get_nonce;
|
|
RAND_DRBG_cleanup_nonce_fn cleanup_nonce;
|
|
};
|
|
|
|
/* The global RAND method, and the global buffer and DRBG instance. */
|
|
extern RAND_METHOD rand_meth;
|
|
extern RAND_BYTES_BUFFER rand_bytes;
|
|
|
|
/* How often we've forked (only incremented in child). */
|
|
extern int rand_fork_count;
|
|
|
|
/* Hardware-based seeding functions. */
|
|
void rand_read_tsc(RAND_poll_cb rand_add, void *arg);
|
|
int rand_read_cpu(RAND_poll_cb rand_add, void *arg);
|
|
|
|
/* DRBG entropy callbacks. */
|
|
void drbg_release_entropy(RAND_DRBG *drbg, unsigned char *out, size_t outlen);
|
|
size_t drbg_entropy_from_parent(RAND_DRBG *drbg,
|
|
unsigned char **pout,
|
|
int entropy, size_t min_len, size_t max_len);
|
|
size_t drbg_entropy_from_system(RAND_DRBG *drbg,
|
|
unsigned char **pout,
|
|
int entropy, size_t min_len, size_t max_len);
|
|
|
|
/* DRBG functions implementing AES-CTR */
|
|
int ctr_init(RAND_DRBG *drbg);
|
|
int ctr_uninstantiate(RAND_DRBG *drbg);
|
|
int ctr_instantiate(RAND_DRBG *drbg,
|
|
const unsigned char *entropy, size_t entropylen,
|
|
const unsigned char *nonce, size_t noncelen,
|
|
const unsigned char *pers, size_t perslen);
|
|
int ctr_reseed(RAND_DRBG *drbg,
|
|
const unsigned char *entropy, size_t entropylen,
|
|
const unsigned char *adin, size_t adinlen);
|
|
int ctr_generate(RAND_DRBG *drbg,
|
|
unsigned char *out, size_t outlen,
|
|
const unsigned char *adin, size_t adinlen);
|
|
|
|
#endif
|