ON Semiconductor / mbed-os

Dependents:   mbed-TFT-example-NCS36510 mbed-Accelerometer-example-NCS36510 mbed-Accelerometer-example-NCS36510

Committer:
group-onsemi
Date:
Wed Jan 25 20:34:15 2017 +0000
Revision:
0:098463de4c5d
Initial commit

Who changed what in which revision?

UserRevisionLine numberNew contents of line
group-onsemi 0:098463de4c5d 1 /*
group-onsemi 0:098463de4c5d 2 * CTR_DRBG implementation based on AES-256 (NIST SP 800-90)
group-onsemi 0:098463de4c5d 3 *
group-onsemi 0:098463de4c5d 4 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
group-onsemi 0:098463de4c5d 5 * SPDX-License-Identifier: Apache-2.0
group-onsemi 0:098463de4c5d 6 *
group-onsemi 0:098463de4c5d 7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
group-onsemi 0:098463de4c5d 8 * not use this file except in compliance with the License.
group-onsemi 0:098463de4c5d 9 * You may obtain a copy of the License at
group-onsemi 0:098463de4c5d 10 *
group-onsemi 0:098463de4c5d 11 * http://www.apache.org/licenses/LICENSE-2.0
group-onsemi 0:098463de4c5d 12 *
group-onsemi 0:098463de4c5d 13 * Unless required by applicable law or agreed to in writing, software
group-onsemi 0:098463de4c5d 14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
group-onsemi 0:098463de4c5d 15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
group-onsemi 0:098463de4c5d 16 * See the License for the specific language governing permissions and
group-onsemi 0:098463de4c5d 17 * limitations under the License.
group-onsemi 0:098463de4c5d 18 *
group-onsemi 0:098463de4c5d 19 * This file is part of mbed TLS (https://tls.mbed.org)
group-onsemi 0:098463de4c5d 20 */
group-onsemi 0:098463de4c5d 21 /*
group-onsemi 0:098463de4c5d 22 * The NIST SP 800-90 DRBGs are described in the following publucation.
group-onsemi 0:098463de4c5d 23 *
group-onsemi 0:098463de4c5d 24 * http://csrc.nist.gov/publications/nistpubs/800-90/SP800-90revised_March2007.pdf
group-onsemi 0:098463de4c5d 25 */
group-onsemi 0:098463de4c5d 26
group-onsemi 0:098463de4c5d 27 #if !defined(MBEDTLS_CONFIG_FILE)
group-onsemi 0:098463de4c5d 28 #include "mbedtls/config.h"
group-onsemi 0:098463de4c5d 29 #else
group-onsemi 0:098463de4c5d 30 #include MBEDTLS_CONFIG_FILE
group-onsemi 0:098463de4c5d 31 #endif
group-onsemi 0:098463de4c5d 32
group-onsemi 0:098463de4c5d 33 #if defined(MBEDTLS_CTR_DRBG_C)
group-onsemi 0:098463de4c5d 34
group-onsemi 0:098463de4c5d 35 #include "mbedtls/ctr_drbg.h"
group-onsemi 0:098463de4c5d 36
group-onsemi 0:098463de4c5d 37 #include <string.h>
group-onsemi 0:098463de4c5d 38
group-onsemi 0:098463de4c5d 39 #if defined(MBEDTLS_FS_IO)
group-onsemi 0:098463de4c5d 40 #include <stdio.h>
group-onsemi 0:098463de4c5d 41 #endif
group-onsemi 0:098463de4c5d 42
group-onsemi 0:098463de4c5d 43 #if defined(MBEDTLS_SELF_TEST)
group-onsemi 0:098463de4c5d 44 #if defined(MBEDTLS_PLATFORM_C)
group-onsemi 0:098463de4c5d 45 #include "mbedtls/platform.h"
group-onsemi 0:098463de4c5d 46 #else
group-onsemi 0:098463de4c5d 47 #include <stdio.h>
group-onsemi 0:098463de4c5d 48 #define mbedtls_printf printf
group-onsemi 0:098463de4c5d 49 #endif /* MBEDTLS_PLATFORM_C */
group-onsemi 0:098463de4c5d 50 #endif /* MBEDTLS_SELF_TEST */
group-onsemi 0:098463de4c5d 51
group-onsemi 0:098463de4c5d 52 /* Implementation that should never be optimized out by the compiler */
group-onsemi 0:098463de4c5d 53 static void mbedtls_zeroize( void *v, size_t n ) {
group-onsemi 0:098463de4c5d 54 volatile unsigned char *p = v; while( n-- ) *p++ = 0;
group-onsemi 0:098463de4c5d 55 }
group-onsemi 0:098463de4c5d 56
group-onsemi 0:098463de4c5d 57 /*
group-onsemi 0:098463de4c5d 58 * CTR_DRBG context initialization
group-onsemi 0:098463de4c5d 59 */
group-onsemi 0:098463de4c5d 60 void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx )
group-onsemi 0:098463de4c5d 61 {
group-onsemi 0:098463de4c5d 62 memset( ctx, 0, sizeof( mbedtls_ctr_drbg_context ) );
group-onsemi 0:098463de4c5d 63
group-onsemi 0:098463de4c5d 64 #if defined(MBEDTLS_THREADING_C)
group-onsemi 0:098463de4c5d 65 mbedtls_mutex_init( &ctx->mutex );
group-onsemi 0:098463de4c5d 66 #endif
group-onsemi 0:098463de4c5d 67 }
group-onsemi 0:098463de4c5d 68
group-onsemi 0:098463de4c5d 69 /*
group-onsemi 0:098463de4c5d 70 * Non-public function wrapped by mbedtls_ctr_drbg_seed(). Necessary to allow
group-onsemi 0:098463de4c5d 71 * NIST tests to succeed (which require known length fixed entropy)
group-onsemi 0:098463de4c5d 72 */
group-onsemi 0:098463de4c5d 73 int mbedtls_ctr_drbg_seed_entropy_len(
group-onsemi 0:098463de4c5d 74 mbedtls_ctr_drbg_context *ctx,
group-onsemi 0:098463de4c5d 75 int (*f_entropy)(void *, unsigned char *, size_t),
group-onsemi 0:098463de4c5d 76 void *p_entropy,
group-onsemi 0:098463de4c5d 77 const unsigned char *custom,
group-onsemi 0:098463de4c5d 78 size_t len,
group-onsemi 0:098463de4c5d 79 size_t entropy_len )
group-onsemi 0:098463de4c5d 80 {
group-onsemi 0:098463de4c5d 81 int ret;
group-onsemi 0:098463de4c5d 82 unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
group-onsemi 0:098463de4c5d 83
group-onsemi 0:098463de4c5d 84 memset( key, 0, MBEDTLS_CTR_DRBG_KEYSIZE );
group-onsemi 0:098463de4c5d 85
group-onsemi 0:098463de4c5d 86 mbedtls_aes_init( &ctx->aes_ctx );
group-onsemi 0:098463de4c5d 87
group-onsemi 0:098463de4c5d 88 ctx->f_entropy = f_entropy;
group-onsemi 0:098463de4c5d 89 ctx->p_entropy = p_entropy;
group-onsemi 0:098463de4c5d 90
group-onsemi 0:098463de4c5d 91 ctx->entropy_len = entropy_len;
group-onsemi 0:098463de4c5d 92 ctx->reseed_interval = MBEDTLS_CTR_DRBG_RESEED_INTERVAL;
group-onsemi 0:098463de4c5d 93
group-onsemi 0:098463de4c5d 94 /*
group-onsemi 0:098463de4c5d 95 * Initialize with an empty key
group-onsemi 0:098463de4c5d 96 */
group-onsemi 0:098463de4c5d 97 mbedtls_aes_setkey_enc( &ctx->aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS );
group-onsemi 0:098463de4c5d 98
group-onsemi 0:098463de4c5d 99 if( ( ret = mbedtls_ctr_drbg_reseed( ctx, custom, len ) ) != 0 )
group-onsemi 0:098463de4c5d 100 return( ret );
group-onsemi 0:098463de4c5d 101
group-onsemi 0:098463de4c5d 102 return( 0 );
group-onsemi 0:098463de4c5d 103 }
group-onsemi 0:098463de4c5d 104
group-onsemi 0:098463de4c5d 105 int mbedtls_ctr_drbg_seed( mbedtls_ctr_drbg_context *ctx,
group-onsemi 0:098463de4c5d 106 int (*f_entropy)(void *, unsigned char *, size_t),
group-onsemi 0:098463de4c5d 107 void *p_entropy,
group-onsemi 0:098463de4c5d 108 const unsigned char *custom,
group-onsemi 0:098463de4c5d 109 size_t len )
group-onsemi 0:098463de4c5d 110 {
group-onsemi 0:098463de4c5d 111 return( mbedtls_ctr_drbg_seed_entropy_len( ctx, f_entropy, p_entropy, custom, len,
group-onsemi 0:098463de4c5d 112 MBEDTLS_CTR_DRBG_ENTROPY_LEN ) );
group-onsemi 0:098463de4c5d 113 }
group-onsemi 0:098463de4c5d 114
group-onsemi 0:098463de4c5d 115 void mbedtls_ctr_drbg_free( mbedtls_ctr_drbg_context *ctx )
group-onsemi 0:098463de4c5d 116 {
group-onsemi 0:098463de4c5d 117 if( ctx == NULL )
group-onsemi 0:098463de4c5d 118 return;
group-onsemi 0:098463de4c5d 119
group-onsemi 0:098463de4c5d 120 #if defined(MBEDTLS_THREADING_C)
group-onsemi 0:098463de4c5d 121 mbedtls_mutex_free( &ctx->mutex );
group-onsemi 0:098463de4c5d 122 #endif
group-onsemi 0:098463de4c5d 123 mbedtls_aes_free( &ctx->aes_ctx );
group-onsemi 0:098463de4c5d 124 mbedtls_zeroize( ctx, sizeof( mbedtls_ctr_drbg_context ) );
group-onsemi 0:098463de4c5d 125 }
group-onsemi 0:098463de4c5d 126
group-onsemi 0:098463de4c5d 127 void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx, int resistance )
group-onsemi 0:098463de4c5d 128 {
group-onsemi 0:098463de4c5d 129 ctx->prediction_resistance = resistance;
group-onsemi 0:098463de4c5d 130 }
group-onsemi 0:098463de4c5d 131
group-onsemi 0:098463de4c5d 132 void mbedtls_ctr_drbg_set_entropy_len( mbedtls_ctr_drbg_context *ctx, size_t len )
group-onsemi 0:098463de4c5d 133 {
group-onsemi 0:098463de4c5d 134 ctx->entropy_len = len;
group-onsemi 0:098463de4c5d 135 }
group-onsemi 0:098463de4c5d 136
group-onsemi 0:098463de4c5d 137 void mbedtls_ctr_drbg_set_reseed_interval( mbedtls_ctr_drbg_context *ctx, int interval )
group-onsemi 0:098463de4c5d 138 {
group-onsemi 0:098463de4c5d 139 ctx->reseed_interval = interval;
group-onsemi 0:098463de4c5d 140 }
group-onsemi 0:098463de4c5d 141
group-onsemi 0:098463de4c5d 142 static int block_cipher_df( unsigned char *output,
group-onsemi 0:098463de4c5d 143 const unsigned char *data, size_t data_len )
group-onsemi 0:098463de4c5d 144 {
group-onsemi 0:098463de4c5d 145 unsigned char buf[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16];
group-onsemi 0:098463de4c5d 146 unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
group-onsemi 0:098463de4c5d 147 unsigned char key[MBEDTLS_CTR_DRBG_KEYSIZE];
group-onsemi 0:098463de4c5d 148 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE];
group-onsemi 0:098463de4c5d 149 unsigned char *p, *iv;
group-onsemi 0:098463de4c5d 150 mbedtls_aes_context aes_ctx;
group-onsemi 0:098463de4c5d 151
group-onsemi 0:098463de4c5d 152 int i, j;
group-onsemi 0:098463de4c5d 153 size_t buf_len, use_len;
group-onsemi 0:098463de4c5d 154
group-onsemi 0:098463de4c5d 155 if( data_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
group-onsemi 0:098463de4c5d 156 return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
group-onsemi 0:098463de4c5d 157
group-onsemi 0:098463de4c5d 158 memset( buf, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT + MBEDTLS_CTR_DRBG_BLOCKSIZE + 16 );
group-onsemi 0:098463de4c5d 159 mbedtls_aes_init( &aes_ctx );
group-onsemi 0:098463de4c5d 160
group-onsemi 0:098463de4c5d 161 /*
group-onsemi 0:098463de4c5d 162 * Construct IV (16 bytes) and S in buffer
group-onsemi 0:098463de4c5d 163 * IV = Counter (in 32-bits) padded to 16 with zeroes
group-onsemi 0:098463de4c5d 164 * S = Length input string (in 32-bits) || Length of output (in 32-bits) ||
group-onsemi 0:098463de4c5d 165 * data || 0x80
group-onsemi 0:098463de4c5d 166 * (Total is padded to a multiple of 16-bytes with zeroes)
group-onsemi 0:098463de4c5d 167 */
group-onsemi 0:098463de4c5d 168 p = buf + MBEDTLS_CTR_DRBG_BLOCKSIZE;
group-onsemi 0:098463de4c5d 169 *p++ = ( data_len >> 24 ) & 0xff;
group-onsemi 0:098463de4c5d 170 *p++ = ( data_len >> 16 ) & 0xff;
group-onsemi 0:098463de4c5d 171 *p++ = ( data_len >> 8 ) & 0xff;
group-onsemi 0:098463de4c5d 172 *p++ = ( data_len ) & 0xff;
group-onsemi 0:098463de4c5d 173 p += 3;
group-onsemi 0:098463de4c5d 174 *p++ = MBEDTLS_CTR_DRBG_SEEDLEN;
group-onsemi 0:098463de4c5d 175 memcpy( p, data, data_len );
group-onsemi 0:098463de4c5d 176 p[data_len] = 0x80;
group-onsemi 0:098463de4c5d 177
group-onsemi 0:098463de4c5d 178 buf_len = MBEDTLS_CTR_DRBG_BLOCKSIZE + 8 + data_len + 1;
group-onsemi 0:098463de4c5d 179
group-onsemi 0:098463de4c5d 180 for( i = 0; i < MBEDTLS_CTR_DRBG_KEYSIZE; i++ )
group-onsemi 0:098463de4c5d 181 key[i] = i;
group-onsemi 0:098463de4c5d 182
group-onsemi 0:098463de4c5d 183 mbedtls_aes_setkey_enc( &aes_ctx, key, MBEDTLS_CTR_DRBG_KEYBITS );
group-onsemi 0:098463de4c5d 184
group-onsemi 0:098463de4c5d 185 /*
group-onsemi 0:098463de4c5d 186 * Reduce data to MBEDTLS_CTR_DRBG_SEEDLEN bytes of data
group-onsemi 0:098463de4c5d 187 */
group-onsemi 0:098463de4c5d 188 for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
group-onsemi 0:098463de4c5d 189 {
group-onsemi 0:098463de4c5d 190 p = buf;
group-onsemi 0:098463de4c5d 191 memset( chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE );
group-onsemi 0:098463de4c5d 192 use_len = buf_len;
group-onsemi 0:098463de4c5d 193
group-onsemi 0:098463de4c5d 194 while( use_len > 0 )
group-onsemi 0:098463de4c5d 195 {
group-onsemi 0:098463de4c5d 196 for( i = 0; i < MBEDTLS_CTR_DRBG_BLOCKSIZE; i++ )
group-onsemi 0:098463de4c5d 197 chain[i] ^= p[i];
group-onsemi 0:098463de4c5d 198 p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
group-onsemi 0:098463de4c5d 199 use_len -= ( use_len >= MBEDTLS_CTR_DRBG_BLOCKSIZE ) ?
group-onsemi 0:098463de4c5d 200 MBEDTLS_CTR_DRBG_BLOCKSIZE : use_len;
group-onsemi 0:098463de4c5d 201
group-onsemi 0:098463de4c5d 202 mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, chain, chain );
group-onsemi 0:098463de4c5d 203 }
group-onsemi 0:098463de4c5d 204
group-onsemi 0:098463de4c5d 205 memcpy( tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE );
group-onsemi 0:098463de4c5d 206
group-onsemi 0:098463de4c5d 207 /*
group-onsemi 0:098463de4c5d 208 * Update IV
group-onsemi 0:098463de4c5d 209 */
group-onsemi 0:098463de4c5d 210 buf[3]++;
group-onsemi 0:098463de4c5d 211 }
group-onsemi 0:098463de4c5d 212
group-onsemi 0:098463de4c5d 213 /*
group-onsemi 0:098463de4c5d 214 * Do final encryption with reduced data
group-onsemi 0:098463de4c5d 215 */
group-onsemi 0:098463de4c5d 216 mbedtls_aes_setkey_enc( &aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS );
group-onsemi 0:098463de4c5d 217 iv = tmp + MBEDTLS_CTR_DRBG_KEYSIZE;
group-onsemi 0:098463de4c5d 218 p = output;
group-onsemi 0:098463de4c5d 219
group-onsemi 0:098463de4c5d 220 for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
group-onsemi 0:098463de4c5d 221 {
group-onsemi 0:098463de4c5d 222 mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, iv, iv );
group-onsemi 0:098463de4c5d 223 memcpy( p, iv, MBEDTLS_CTR_DRBG_BLOCKSIZE );
group-onsemi 0:098463de4c5d 224 p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
group-onsemi 0:098463de4c5d 225 }
group-onsemi 0:098463de4c5d 226
group-onsemi 0:098463de4c5d 227 mbedtls_aes_free( &aes_ctx );
group-onsemi 0:098463de4c5d 228
group-onsemi 0:098463de4c5d 229 return( 0 );
group-onsemi 0:098463de4c5d 230 }
group-onsemi 0:098463de4c5d 231
group-onsemi 0:098463de4c5d 232 static int ctr_drbg_update_internal( mbedtls_ctr_drbg_context *ctx,
group-onsemi 0:098463de4c5d 233 const unsigned char data[MBEDTLS_CTR_DRBG_SEEDLEN] )
group-onsemi 0:098463de4c5d 234 {
group-onsemi 0:098463de4c5d 235 unsigned char tmp[MBEDTLS_CTR_DRBG_SEEDLEN];
group-onsemi 0:098463de4c5d 236 unsigned char *p = tmp;
group-onsemi 0:098463de4c5d 237 int i, j;
group-onsemi 0:098463de4c5d 238
group-onsemi 0:098463de4c5d 239 memset( tmp, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
group-onsemi 0:098463de4c5d 240
group-onsemi 0:098463de4c5d 241 for( j = 0; j < MBEDTLS_CTR_DRBG_SEEDLEN; j += MBEDTLS_CTR_DRBG_BLOCKSIZE )
group-onsemi 0:098463de4c5d 242 {
group-onsemi 0:098463de4c5d 243 /*
group-onsemi 0:098463de4c5d 244 * Increase counter
group-onsemi 0:098463de4c5d 245 */
group-onsemi 0:098463de4c5d 246 for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
group-onsemi 0:098463de4c5d 247 if( ++ctx->counter[i - 1] != 0 )
group-onsemi 0:098463de4c5d 248 break;
group-onsemi 0:098463de4c5d 249
group-onsemi 0:098463de4c5d 250 /*
group-onsemi 0:098463de4c5d 251 * Crypt counter block
group-onsemi 0:098463de4c5d 252 */
group-onsemi 0:098463de4c5d 253 mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, p );
group-onsemi 0:098463de4c5d 254
group-onsemi 0:098463de4c5d 255 p += MBEDTLS_CTR_DRBG_BLOCKSIZE;
group-onsemi 0:098463de4c5d 256 }
group-onsemi 0:098463de4c5d 257
group-onsemi 0:098463de4c5d 258 for( i = 0; i < MBEDTLS_CTR_DRBG_SEEDLEN; i++ )
group-onsemi 0:098463de4c5d 259 tmp[i] ^= data[i];
group-onsemi 0:098463de4c5d 260
group-onsemi 0:098463de4c5d 261 /*
group-onsemi 0:098463de4c5d 262 * Update key and counter
group-onsemi 0:098463de4c5d 263 */
group-onsemi 0:098463de4c5d 264 mbedtls_aes_setkey_enc( &ctx->aes_ctx, tmp, MBEDTLS_CTR_DRBG_KEYBITS );
group-onsemi 0:098463de4c5d 265 memcpy( ctx->counter, tmp + MBEDTLS_CTR_DRBG_KEYSIZE, MBEDTLS_CTR_DRBG_BLOCKSIZE );
group-onsemi 0:098463de4c5d 266
group-onsemi 0:098463de4c5d 267 return( 0 );
group-onsemi 0:098463de4c5d 268 }
group-onsemi 0:098463de4c5d 269
group-onsemi 0:098463de4c5d 270 void mbedtls_ctr_drbg_update( mbedtls_ctr_drbg_context *ctx,
group-onsemi 0:098463de4c5d 271 const unsigned char *additional, size_t add_len )
group-onsemi 0:098463de4c5d 272 {
group-onsemi 0:098463de4c5d 273 unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
group-onsemi 0:098463de4c5d 274
group-onsemi 0:098463de4c5d 275 if( add_len > 0 )
group-onsemi 0:098463de4c5d 276 {
group-onsemi 0:098463de4c5d 277 /* MAX_INPUT would be more logical here, but we have to match
group-onsemi 0:098463de4c5d 278 * block_cipher_df()'s limits since we can't propagate errors */
group-onsemi 0:098463de4c5d 279 if( add_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
group-onsemi 0:098463de4c5d 280 add_len = MBEDTLS_CTR_DRBG_MAX_SEED_INPUT;
group-onsemi 0:098463de4c5d 281
group-onsemi 0:098463de4c5d 282 block_cipher_df( add_input, additional, add_len );
group-onsemi 0:098463de4c5d 283 ctr_drbg_update_internal( ctx, add_input );
group-onsemi 0:098463de4c5d 284 }
group-onsemi 0:098463de4c5d 285 }
group-onsemi 0:098463de4c5d 286
group-onsemi 0:098463de4c5d 287 int mbedtls_ctr_drbg_reseed( mbedtls_ctr_drbg_context *ctx,
group-onsemi 0:098463de4c5d 288 const unsigned char *additional, size_t len )
group-onsemi 0:098463de4c5d 289 {
group-onsemi 0:098463de4c5d 290 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT];
group-onsemi 0:098463de4c5d 291 size_t seedlen = 0;
group-onsemi 0:098463de4c5d 292
group-onsemi 0:098463de4c5d 293 if( ctx->entropy_len + len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT )
group-onsemi 0:098463de4c5d 294 return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
group-onsemi 0:098463de4c5d 295
group-onsemi 0:098463de4c5d 296 memset( seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT );
group-onsemi 0:098463de4c5d 297
group-onsemi 0:098463de4c5d 298 /*
group-onsemi 0:098463de4c5d 299 * Gather entropy_len bytes of entropy to seed state
group-onsemi 0:098463de4c5d 300 */
group-onsemi 0:098463de4c5d 301 if( 0 != ctx->f_entropy( ctx->p_entropy, seed,
group-onsemi 0:098463de4c5d 302 ctx->entropy_len ) )
group-onsemi 0:098463de4c5d 303 {
group-onsemi 0:098463de4c5d 304 return( MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED );
group-onsemi 0:098463de4c5d 305 }
group-onsemi 0:098463de4c5d 306
group-onsemi 0:098463de4c5d 307 seedlen += ctx->entropy_len;
group-onsemi 0:098463de4c5d 308
group-onsemi 0:098463de4c5d 309 /*
group-onsemi 0:098463de4c5d 310 * Add additional data
group-onsemi 0:098463de4c5d 311 */
group-onsemi 0:098463de4c5d 312 if( additional && len )
group-onsemi 0:098463de4c5d 313 {
group-onsemi 0:098463de4c5d 314 memcpy( seed + seedlen, additional, len );
group-onsemi 0:098463de4c5d 315 seedlen += len;
group-onsemi 0:098463de4c5d 316 }
group-onsemi 0:098463de4c5d 317
group-onsemi 0:098463de4c5d 318 /*
group-onsemi 0:098463de4c5d 319 * Reduce to 384 bits
group-onsemi 0:098463de4c5d 320 */
group-onsemi 0:098463de4c5d 321 block_cipher_df( seed, seed, seedlen );
group-onsemi 0:098463de4c5d 322
group-onsemi 0:098463de4c5d 323 /*
group-onsemi 0:098463de4c5d 324 * Update state
group-onsemi 0:098463de4c5d 325 */
group-onsemi 0:098463de4c5d 326 ctr_drbg_update_internal( ctx, seed );
group-onsemi 0:098463de4c5d 327 ctx->reseed_counter = 1;
group-onsemi 0:098463de4c5d 328
group-onsemi 0:098463de4c5d 329 return( 0 );
group-onsemi 0:098463de4c5d 330 }
group-onsemi 0:098463de4c5d 331
group-onsemi 0:098463de4c5d 332 int mbedtls_ctr_drbg_random_with_add( void *p_rng,
group-onsemi 0:098463de4c5d 333 unsigned char *output, size_t output_len,
group-onsemi 0:098463de4c5d 334 const unsigned char *additional, size_t add_len )
group-onsemi 0:098463de4c5d 335 {
group-onsemi 0:098463de4c5d 336 int ret = 0;
group-onsemi 0:098463de4c5d 337 mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
group-onsemi 0:098463de4c5d 338 unsigned char add_input[MBEDTLS_CTR_DRBG_SEEDLEN];
group-onsemi 0:098463de4c5d 339 unsigned char *p = output;
group-onsemi 0:098463de4c5d 340 unsigned char tmp[MBEDTLS_CTR_DRBG_BLOCKSIZE];
group-onsemi 0:098463de4c5d 341 int i;
group-onsemi 0:098463de4c5d 342 size_t use_len;
group-onsemi 0:098463de4c5d 343
group-onsemi 0:098463de4c5d 344 if( output_len > MBEDTLS_CTR_DRBG_MAX_REQUEST )
group-onsemi 0:098463de4c5d 345 return( MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG );
group-onsemi 0:098463de4c5d 346
group-onsemi 0:098463de4c5d 347 if( add_len > MBEDTLS_CTR_DRBG_MAX_INPUT )
group-onsemi 0:098463de4c5d 348 return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
group-onsemi 0:098463de4c5d 349
group-onsemi 0:098463de4c5d 350 memset( add_input, 0, MBEDTLS_CTR_DRBG_SEEDLEN );
group-onsemi 0:098463de4c5d 351
group-onsemi 0:098463de4c5d 352 if( ctx->reseed_counter > ctx->reseed_interval ||
group-onsemi 0:098463de4c5d 353 ctx->prediction_resistance )
group-onsemi 0:098463de4c5d 354 {
group-onsemi 0:098463de4c5d 355 if( ( ret = mbedtls_ctr_drbg_reseed( ctx, additional, add_len ) ) != 0 )
group-onsemi 0:098463de4c5d 356 return( ret );
group-onsemi 0:098463de4c5d 357
group-onsemi 0:098463de4c5d 358 add_len = 0;
group-onsemi 0:098463de4c5d 359 }
group-onsemi 0:098463de4c5d 360
group-onsemi 0:098463de4c5d 361 if( add_len > 0 )
group-onsemi 0:098463de4c5d 362 {
group-onsemi 0:098463de4c5d 363 block_cipher_df( add_input, additional, add_len );
group-onsemi 0:098463de4c5d 364 ctr_drbg_update_internal( ctx, add_input );
group-onsemi 0:098463de4c5d 365 }
group-onsemi 0:098463de4c5d 366
group-onsemi 0:098463de4c5d 367 while( output_len > 0 )
group-onsemi 0:098463de4c5d 368 {
group-onsemi 0:098463de4c5d 369 /*
group-onsemi 0:098463de4c5d 370 * Increase counter
group-onsemi 0:098463de4c5d 371 */
group-onsemi 0:098463de4c5d 372 for( i = MBEDTLS_CTR_DRBG_BLOCKSIZE; i > 0; i-- )
group-onsemi 0:098463de4c5d 373 if( ++ctx->counter[i - 1] != 0 )
group-onsemi 0:098463de4c5d 374 break;
group-onsemi 0:098463de4c5d 375
group-onsemi 0:098463de4c5d 376 /*
group-onsemi 0:098463de4c5d 377 * Crypt counter block
group-onsemi 0:098463de4c5d 378 */
group-onsemi 0:098463de4c5d 379 mbedtls_aes_crypt_ecb( &ctx->aes_ctx, MBEDTLS_AES_ENCRYPT, ctx->counter, tmp );
group-onsemi 0:098463de4c5d 380
group-onsemi 0:098463de4c5d 381 use_len = ( output_len > MBEDTLS_CTR_DRBG_BLOCKSIZE ) ? MBEDTLS_CTR_DRBG_BLOCKSIZE :
group-onsemi 0:098463de4c5d 382 output_len;
group-onsemi 0:098463de4c5d 383 /*
group-onsemi 0:098463de4c5d 384 * Copy random block to destination
group-onsemi 0:098463de4c5d 385 */
group-onsemi 0:098463de4c5d 386 memcpy( p, tmp, use_len );
group-onsemi 0:098463de4c5d 387 p += use_len;
group-onsemi 0:098463de4c5d 388 output_len -= use_len;
group-onsemi 0:098463de4c5d 389 }
group-onsemi 0:098463de4c5d 390
group-onsemi 0:098463de4c5d 391 ctr_drbg_update_internal( ctx, add_input );
group-onsemi 0:098463de4c5d 392
group-onsemi 0:098463de4c5d 393 ctx->reseed_counter++;
group-onsemi 0:098463de4c5d 394
group-onsemi 0:098463de4c5d 395 return( 0 );
group-onsemi 0:098463de4c5d 396 }
group-onsemi 0:098463de4c5d 397
group-onsemi 0:098463de4c5d 398 int mbedtls_ctr_drbg_random( void *p_rng, unsigned char *output, size_t output_len )
group-onsemi 0:098463de4c5d 399 {
group-onsemi 0:098463de4c5d 400 int ret;
group-onsemi 0:098463de4c5d 401 mbedtls_ctr_drbg_context *ctx = (mbedtls_ctr_drbg_context *) p_rng;
group-onsemi 0:098463de4c5d 402
group-onsemi 0:098463de4c5d 403 #if defined(MBEDTLS_THREADING_C)
group-onsemi 0:098463de4c5d 404 if( ( ret = mbedtls_mutex_lock( &ctx->mutex ) ) != 0 )
group-onsemi 0:098463de4c5d 405 return( ret );
group-onsemi 0:098463de4c5d 406 #endif
group-onsemi 0:098463de4c5d 407
group-onsemi 0:098463de4c5d 408 ret = mbedtls_ctr_drbg_random_with_add( ctx, output, output_len, NULL, 0 );
group-onsemi 0:098463de4c5d 409
group-onsemi 0:098463de4c5d 410 #if defined(MBEDTLS_THREADING_C)
group-onsemi 0:098463de4c5d 411 if( mbedtls_mutex_unlock( &ctx->mutex ) != 0 )
group-onsemi 0:098463de4c5d 412 return( MBEDTLS_ERR_THREADING_MUTEX_ERROR );
group-onsemi 0:098463de4c5d 413 #endif
group-onsemi 0:098463de4c5d 414
group-onsemi 0:098463de4c5d 415 return( ret );
group-onsemi 0:098463de4c5d 416 }
group-onsemi 0:098463de4c5d 417
group-onsemi 0:098463de4c5d 418 #if defined(MBEDTLS_FS_IO)
group-onsemi 0:098463de4c5d 419 int mbedtls_ctr_drbg_write_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
group-onsemi 0:098463de4c5d 420 {
group-onsemi 0:098463de4c5d 421 int ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
group-onsemi 0:098463de4c5d 422 FILE *f;
group-onsemi 0:098463de4c5d 423 unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
group-onsemi 0:098463de4c5d 424
group-onsemi 0:098463de4c5d 425 if( ( f = fopen( path, "wb" ) ) == NULL )
group-onsemi 0:098463de4c5d 426 return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
group-onsemi 0:098463de4c5d 427
group-onsemi 0:098463de4c5d 428 if( ( ret = mbedtls_ctr_drbg_random( ctx, buf, MBEDTLS_CTR_DRBG_MAX_INPUT ) ) != 0 )
group-onsemi 0:098463de4c5d 429 goto exit;
group-onsemi 0:098463de4c5d 430
group-onsemi 0:098463de4c5d 431 if( fwrite( buf, 1, MBEDTLS_CTR_DRBG_MAX_INPUT, f ) != MBEDTLS_CTR_DRBG_MAX_INPUT )
group-onsemi 0:098463de4c5d 432 {
group-onsemi 0:098463de4c5d 433 ret = MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR;
group-onsemi 0:098463de4c5d 434 goto exit;
group-onsemi 0:098463de4c5d 435 }
group-onsemi 0:098463de4c5d 436
group-onsemi 0:098463de4c5d 437 ret = 0;
group-onsemi 0:098463de4c5d 438
group-onsemi 0:098463de4c5d 439 exit:
group-onsemi 0:098463de4c5d 440 fclose( f );
group-onsemi 0:098463de4c5d 441 return( ret );
group-onsemi 0:098463de4c5d 442 }
group-onsemi 0:098463de4c5d 443
group-onsemi 0:098463de4c5d 444 int mbedtls_ctr_drbg_update_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path )
group-onsemi 0:098463de4c5d 445 {
group-onsemi 0:098463de4c5d 446 FILE *f;
group-onsemi 0:098463de4c5d 447 size_t n;
group-onsemi 0:098463de4c5d 448 unsigned char buf[ MBEDTLS_CTR_DRBG_MAX_INPUT ];
group-onsemi 0:098463de4c5d 449
group-onsemi 0:098463de4c5d 450 if( ( f = fopen( path, "rb" ) ) == NULL )
group-onsemi 0:098463de4c5d 451 return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
group-onsemi 0:098463de4c5d 452
group-onsemi 0:098463de4c5d 453 fseek( f, 0, SEEK_END );
group-onsemi 0:098463de4c5d 454 n = (size_t) ftell( f );
group-onsemi 0:098463de4c5d 455 fseek( f, 0, SEEK_SET );
group-onsemi 0:098463de4c5d 456
group-onsemi 0:098463de4c5d 457 if( n > MBEDTLS_CTR_DRBG_MAX_INPUT )
group-onsemi 0:098463de4c5d 458 {
group-onsemi 0:098463de4c5d 459 fclose( f );
group-onsemi 0:098463de4c5d 460 return( MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG );
group-onsemi 0:098463de4c5d 461 }
group-onsemi 0:098463de4c5d 462
group-onsemi 0:098463de4c5d 463 if( fread( buf, 1, n, f ) != n )
group-onsemi 0:098463de4c5d 464 {
group-onsemi 0:098463de4c5d 465 fclose( f );
group-onsemi 0:098463de4c5d 466 return( MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR );
group-onsemi 0:098463de4c5d 467 }
group-onsemi 0:098463de4c5d 468
group-onsemi 0:098463de4c5d 469 fclose( f );
group-onsemi 0:098463de4c5d 470
group-onsemi 0:098463de4c5d 471 mbedtls_ctr_drbg_update( ctx, buf, n );
group-onsemi 0:098463de4c5d 472
group-onsemi 0:098463de4c5d 473 return( mbedtls_ctr_drbg_write_seed_file( ctx, path ) );
group-onsemi 0:098463de4c5d 474 }
group-onsemi 0:098463de4c5d 475 #endif /* MBEDTLS_FS_IO */
group-onsemi 0:098463de4c5d 476
group-onsemi 0:098463de4c5d 477 #if defined(MBEDTLS_SELF_TEST)
group-onsemi 0:098463de4c5d 478
group-onsemi 0:098463de4c5d 479 static const unsigned char entropy_source_pr[96] =
group-onsemi 0:098463de4c5d 480 { 0xc1, 0x80, 0x81, 0xa6, 0x5d, 0x44, 0x02, 0x16,
group-onsemi 0:098463de4c5d 481 0x19, 0xb3, 0xf1, 0x80, 0xb1, 0xc9, 0x20, 0x02,
group-onsemi 0:098463de4c5d 482 0x6a, 0x54, 0x6f, 0x0c, 0x70, 0x81, 0x49, 0x8b,
group-onsemi 0:098463de4c5d 483 0x6e, 0xa6, 0x62, 0x52, 0x6d, 0x51, 0xb1, 0xcb,
group-onsemi 0:098463de4c5d 484 0x58, 0x3b, 0xfa, 0xd5, 0x37, 0x5f, 0xfb, 0xc9,
group-onsemi 0:098463de4c5d 485 0xff, 0x46, 0xd2, 0x19, 0xc7, 0x22, 0x3e, 0x95,
group-onsemi 0:098463de4c5d 486 0x45, 0x9d, 0x82, 0xe1, 0xe7, 0x22, 0x9f, 0x63,
group-onsemi 0:098463de4c5d 487 0x31, 0x69, 0xd2, 0x6b, 0x57, 0x47, 0x4f, 0xa3,
group-onsemi 0:098463de4c5d 488 0x37, 0xc9, 0x98, 0x1c, 0x0b, 0xfb, 0x91, 0x31,
group-onsemi 0:098463de4c5d 489 0x4d, 0x55, 0xb9, 0xe9, 0x1c, 0x5a, 0x5e, 0xe4,
group-onsemi 0:098463de4c5d 490 0x93, 0x92, 0xcf, 0xc5, 0x23, 0x12, 0xd5, 0x56,
group-onsemi 0:098463de4c5d 491 0x2c, 0x4a, 0x6e, 0xff, 0xdc, 0x10, 0xd0, 0x68 };
group-onsemi 0:098463de4c5d 492
group-onsemi 0:098463de4c5d 493 static const unsigned char entropy_source_nopr[64] =
group-onsemi 0:098463de4c5d 494 { 0x5a, 0x19, 0x4d, 0x5e, 0x2b, 0x31, 0x58, 0x14,
group-onsemi 0:098463de4c5d 495 0x54, 0xde, 0xf6, 0x75, 0xfb, 0x79, 0x58, 0xfe,
group-onsemi 0:098463de4c5d 496 0xc7, 0xdb, 0x87, 0x3e, 0x56, 0x89, 0xfc, 0x9d,
group-onsemi 0:098463de4c5d 497 0x03, 0x21, 0x7c, 0x68, 0xd8, 0x03, 0x38, 0x20,
group-onsemi 0:098463de4c5d 498 0xf9, 0xe6, 0x5e, 0x04, 0xd8, 0x56, 0xf3, 0xa9,
group-onsemi 0:098463de4c5d 499 0xc4, 0x4a, 0x4c, 0xbd, 0xc1, 0xd0, 0x08, 0x46,
group-onsemi 0:098463de4c5d 500 0xf5, 0x98, 0x3d, 0x77, 0x1c, 0x1b, 0x13, 0x7e,
group-onsemi 0:098463de4c5d 501 0x4e, 0x0f, 0x9d, 0x8e, 0xf4, 0x09, 0xf9, 0x2e };
group-onsemi 0:098463de4c5d 502
group-onsemi 0:098463de4c5d 503 static const unsigned char nonce_pers_pr[16] =
group-onsemi 0:098463de4c5d 504 { 0xd2, 0x54, 0xfc, 0xff, 0x02, 0x1e, 0x69, 0xd2,
group-onsemi 0:098463de4c5d 505 0x29, 0xc9, 0xcf, 0xad, 0x85, 0xfa, 0x48, 0x6c };
group-onsemi 0:098463de4c5d 506
group-onsemi 0:098463de4c5d 507 static const unsigned char nonce_pers_nopr[16] =
group-onsemi 0:098463de4c5d 508 { 0x1b, 0x54, 0xb8, 0xff, 0x06, 0x42, 0xbf, 0xf5,
group-onsemi 0:098463de4c5d 509 0x21, 0xf1, 0x5c, 0x1c, 0x0b, 0x66, 0x5f, 0x3f };
group-onsemi 0:098463de4c5d 510
group-onsemi 0:098463de4c5d 511 static const unsigned char result_pr[16] =
group-onsemi 0:098463de4c5d 512 { 0x34, 0x01, 0x16, 0x56, 0xb4, 0x29, 0x00, 0x8f,
group-onsemi 0:098463de4c5d 513 0x35, 0x63, 0xec, 0xb5, 0xf2, 0x59, 0x07, 0x23 };
group-onsemi 0:098463de4c5d 514
group-onsemi 0:098463de4c5d 515 static const unsigned char result_nopr[16] =
group-onsemi 0:098463de4c5d 516 { 0xa0, 0x54, 0x30, 0x3d, 0x8a, 0x7e, 0xa9, 0x88,
group-onsemi 0:098463de4c5d 517 0x9d, 0x90, 0x3e, 0x07, 0x7c, 0x6f, 0x21, 0x8f };
group-onsemi 0:098463de4c5d 518
group-onsemi 0:098463de4c5d 519 static size_t test_offset;
group-onsemi 0:098463de4c5d 520 static int ctr_drbg_self_test_entropy( void *data, unsigned char *buf,
group-onsemi 0:098463de4c5d 521 size_t len )
group-onsemi 0:098463de4c5d 522 {
group-onsemi 0:098463de4c5d 523 const unsigned char *p = data;
group-onsemi 0:098463de4c5d 524 memcpy( buf, p + test_offset, len );
group-onsemi 0:098463de4c5d 525 test_offset += len;
group-onsemi 0:098463de4c5d 526 return( 0 );
group-onsemi 0:098463de4c5d 527 }
group-onsemi 0:098463de4c5d 528
group-onsemi 0:098463de4c5d 529 #define CHK( c ) if( (c) != 0 ) \
group-onsemi 0:098463de4c5d 530 { \
group-onsemi 0:098463de4c5d 531 if( verbose != 0 ) \
group-onsemi 0:098463de4c5d 532 mbedtls_printf( "failed\n" ); \
group-onsemi 0:098463de4c5d 533 return( 1 ); \
group-onsemi 0:098463de4c5d 534 }
group-onsemi 0:098463de4c5d 535
group-onsemi 0:098463de4c5d 536 /*
group-onsemi 0:098463de4c5d 537 * Checkup routine
group-onsemi 0:098463de4c5d 538 */
group-onsemi 0:098463de4c5d 539 int mbedtls_ctr_drbg_self_test( int verbose )
group-onsemi 0:098463de4c5d 540 {
group-onsemi 0:098463de4c5d 541 mbedtls_ctr_drbg_context ctx;
group-onsemi 0:098463de4c5d 542 unsigned char buf[16];
group-onsemi 0:098463de4c5d 543
group-onsemi 0:098463de4c5d 544 mbedtls_ctr_drbg_init( &ctx );
group-onsemi 0:098463de4c5d 545
group-onsemi 0:098463de4c5d 546 /*
group-onsemi 0:098463de4c5d 547 * Based on a NIST CTR_DRBG test vector (PR = True)
group-onsemi 0:098463de4c5d 548 */
group-onsemi 0:098463de4c5d 549 if( verbose != 0 )
group-onsemi 0:098463de4c5d 550 mbedtls_printf( " CTR_DRBG (PR = TRUE) : " );
group-onsemi 0:098463de4c5d 551
group-onsemi 0:098463de4c5d 552 test_offset = 0;
group-onsemi 0:098463de4c5d 553 CHK( mbedtls_ctr_drbg_seed_entropy_len( &ctx, ctr_drbg_self_test_entropy,
group-onsemi 0:098463de4c5d 554 (void *) entropy_source_pr, nonce_pers_pr, 16, 32 ) );
group-onsemi 0:098463de4c5d 555 mbedtls_ctr_drbg_set_prediction_resistance( &ctx, MBEDTLS_CTR_DRBG_PR_ON );
group-onsemi 0:098463de4c5d 556 CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
group-onsemi 0:098463de4c5d 557 CHK( mbedtls_ctr_drbg_random( &ctx, buf, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
group-onsemi 0:098463de4c5d 558 CHK( memcmp( buf, result_pr, MBEDTLS_CTR_DRBG_BLOCKSIZE ) );
group-onsemi 0:098463de4c5d 559
group-onsemi 0:098463de4c5d 560 mbedtls_ctr_drbg_free( &ctx );
group-onsemi 0:098463de4c5d 561
group-onsemi 0:098463de4c5d 562 if( verbose != 0 )
group-onsemi 0:098463de4c5d 563 mbedtls_printf( "passed\n" );
group-onsemi 0:098463de4c5d 564
group-onsemi 0:098463de4c5d 565 /*
group-onsemi 0:098463de4c5d 566 * Based on a NIST CTR_DRBG test vector (PR = FALSE)
group-onsemi 0:098463de4c5d 567 */
group-onsemi 0:098463de4c5d 568 if( verbose != 0 )
group-onsemi 0:098463de4c5d 569 mbedtls_printf( " CTR_DRBG (PR = FALSE): " );
group-onsemi 0:098463de4c5d 570
group-onsemi 0:098463de4c5d 571 mbedtls_ctr_drbg_init( &ctx );
group-onsemi 0:098463de4c5d 572
group-onsemi 0:098463de4c5d 573 test_offset = 0;
group-onsemi 0:098463de4c5d 574 CHK( mbedtls_ctr_drbg_seed_entropy_len( &ctx, ctr_drbg_self_test_entropy,
group-onsemi 0:098463de4c5d 575 (void *) entropy_source_nopr, nonce_pers_nopr, 16, 32 ) );
group-onsemi 0:098463de4c5d 576 CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
group-onsemi 0:098463de4c5d 577 CHK( mbedtls_ctr_drbg_reseed( &ctx, NULL, 0 ) );
group-onsemi 0:098463de4c5d 578 CHK( mbedtls_ctr_drbg_random( &ctx, buf, 16 ) );
group-onsemi 0:098463de4c5d 579 CHK( memcmp( buf, result_nopr, 16 ) );
group-onsemi 0:098463de4c5d 580
group-onsemi 0:098463de4c5d 581 mbedtls_ctr_drbg_free( &ctx );
group-onsemi 0:098463de4c5d 582
group-onsemi 0:098463de4c5d 583 if( verbose != 0 )
group-onsemi 0:098463de4c5d 584 mbedtls_printf( "passed\n" );
group-onsemi 0:098463de4c5d 585
group-onsemi 0:098463de4c5d 586 if( verbose != 0 )
group-onsemi 0:098463de4c5d 587 mbedtls_printf( "\n" );
group-onsemi 0:098463de4c5d 588
group-onsemi 0:098463de4c5d 589 return( 0 );
group-onsemi 0:098463de4c5d 590 }
group-onsemi 0:098463de4c5d 591 #endif /* MBEDTLS_SELF_TEST */
group-onsemi 0:098463de4c5d 592
group-onsemi 0:098463de4c5d 593 #endif /* MBEDTLS_CTR_DRBG_C */