1 /* fips/rand/fips_drbg_lib.c */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
5 /* ====================================================================
6 * Copyright (c) 2011 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
54 #define OPENSSL_FIPSAPI
57 #include <openssl/crypto.h>
58 #include <openssl/evp.h>
59 #include <openssl/aes.h>
60 #include <openssl/fips_rand.h>
61 #include "fips_rand_lcl.h"
63 /* Support framework for SP800-90 DRBGs */
65 DRBG_CTX *FIPS_drbg_new(int type, unsigned int flags)
69 dctx = OPENSSL_malloc(sizeof(DRBG_CTX));
70 memset(dctx, 0, sizeof(DRBG_CTX));
71 dctx->status = DRBG_STATUS_UNINITIALISED;
74 rv = fips_drbg_hash_init(dctx);
76 rv = fips_drbg_ctr_init(dctx);
79 /* Fatal: cannot initialiase DRBG */
91 int FIPS_drbg_instantiate(DRBG_CTX *dctx,
93 const unsigned char *pers, size_t perslen)
95 size_t entlen, noncelen;
97 if (perslen > dctx->max_pers)
100 if (dctx->status != DRBG_STATUS_UNINITIALISED)
106 dctx->status = DRBG_STATUS_ERROR;
108 entlen = dctx->get_entropy(dctx, dctx->entropy, dctx->strength,
109 dctx->min_entropy, dctx->max_entropy);
111 if (entlen < dctx->min_entropy || entlen > dctx->max_entropy)
114 if (dctx->max_nonce > 0)
117 noncelen = dctx->get_nonce(dctx, dctx->nonce,
119 dctx->min_nonce, dctx->max_nonce);
121 if (noncelen < dctx->min_nonce || noncelen > dctx->max_nonce)
128 if (!dctx->instantiate(dctx,
129 dctx->entropy, entlen,
130 dctx->nonce, noncelen,
135 dctx->status = DRBG_STATUS_READY;
136 dctx->reseed_counter = 1;
140 OPENSSL_cleanse(dctx->entropy, sizeof(dctx->entropy));
141 OPENSSL_cleanse(dctx->nonce, sizeof(dctx->nonce));
143 if (dctx->status == DRBG_STATUS_READY)
150 int FIPS_drbg_reseed(DRBG_CTX *dctx,
151 const unsigned char *adin, size_t adinlen)
154 if (dctx->status != DRBG_STATUS_READY
155 && dctx->status != DRBG_STATUS_RESEED)
163 else if (adinlen > dctx->max_adin);
169 dctx->status = DRBG_STATUS_ERROR;
171 entlen = dctx->get_entropy(dctx, dctx->entropy, dctx->strength,
172 dctx->min_entropy, dctx->max_entropy);
174 if (entlen < dctx->min_entropy || entlen > dctx->max_entropy)
177 if (!dctx->reseed(dctx, dctx->entropy, entlen, adin, adinlen))
180 dctx->status = DRBG_STATUS_READY;
181 dctx->reseed_counter = 1;
183 OPENSSL_cleanse(dctx->entropy, sizeof(dctx->entropy));
184 if (dctx->status == DRBG_STATUS_READY)
190 int FIPS_drbg_generate(DRBG_CTX *dctx, unsigned char *out, size_t outlen,
191 int prediction_resistance,
192 const unsigned char *adin, size_t adinlen)
194 if (outlen > dctx->max_request)
199 if (dctx->status == DRBG_STATUS_RESEED || prediction_resistance)
201 if (!FIPS_drbg_reseed(dctx, adin, adinlen))
206 if (dctx->status != DRBG_STATUS_READY)
211 if (!dctx->generate(dctx, out, outlen, adin, adinlen))
214 dctx->status = DRBG_STATUS_ERROR;
217 if (dctx->reseed_counter > dctx->reseed_interval)
218 dctx->status = DRBG_STATUS_RESEED;
220 dctx->reseed_counter++;