24 #ifndef MBEDTLS_HMAC_DRBG_H 25 #define MBEDTLS_HMAC_DRBG_H 27 #if !defined(MBEDTLS_CONFIG_FILE) 30 #include MBEDTLS_CONFIG_FILE 35 #if defined(MBEDTLS_THREADING_C) 42 #define MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG -0x0003 43 #define MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG -0x0005 44 #define MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR -0x0007 45 #define MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED -0x0009 55 #if !defined(MBEDTLS_HMAC_DRBG_RESEED_INTERVAL) 56 #define MBEDTLS_HMAC_DRBG_RESEED_INTERVAL 10000 59 #if !defined(MBEDTLS_HMAC_DRBG_MAX_INPUT) 60 #define MBEDTLS_HMAC_DRBG_MAX_INPUT 256 63 #if !defined(MBEDTLS_HMAC_DRBG_MAX_REQUEST) 64 #define MBEDTLS_HMAC_DRBG_MAX_REQUEST 1024 67 #if !defined(MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT) 68 #define MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT 384 73 #define MBEDTLS_HMAC_DRBG_PR_OFF 0 74 #define MBEDTLS_HMAC_DRBG_PR_ON 1 101 #if defined(MBEDTLS_THREADING_C) 142 int (*
f_entropy)(
void *,
unsigned char *,
size_t),
144 const unsigned char *custom,
162 const unsigned char *data,
size_t data_len );
211 const unsigned char *additional,
size_t add_len );
224 const unsigned char *additional,
size_t len );
243 unsigned char *output,
size_t output_len,
244 const unsigned char *additional,
269 #if ! defined(MBEDTLS_DEPRECATED_REMOVED) 270 #if defined(MBEDTLS_DEPRECATED_WARNING) 271 #define MBEDTLS_DEPRECATED __attribute__((deprecated)) 273 #define MBEDTLS_DEPRECATED 290 const unsigned char *additional,
size_t add_len );
291 #undef MBEDTLS_DEPRECATED 294 #if defined(MBEDTLS_FS_IO) 321 #if defined(MBEDTLS_SELF_TEST) int mbedtls_hmac_drbg_seed(mbedtls_hmac_drbg_context *ctx, const mbedtls_md_info_t *md_info, int(*f_entropy)(void *, unsigned char *, size_t), void *p_entropy, const unsigned char *custom, size_t len)
HMAC_DRBG initial seeding Seed and setup entropy source for future reseeds.
#define MBEDTLS_MD_MAX_SIZE
int mbedtls_hmac_drbg_seed_buf(mbedtls_hmac_drbg_context *ctx, const mbedtls_md_info_t *md_info, const unsigned char *data, size_t data_len)
Initilisation of simpified HMAC_DRBG (never reseeds). (For use with deterministic ECDSA...
void mbedtls_hmac_drbg_set_reseed_interval(mbedtls_hmac_drbg_context *ctx, int interval)
Set the reseed interval (Default: MBEDTLS_HMAC_DRBG_RESEED_INTERVAL)
void mbedtls_hmac_drbg_free(mbedtls_hmac_drbg_context *ctx)
Free an HMAC_DRBG context.
int mbedtls_hmac_drbg_random(void *p_rng, unsigned char *output, size_t out_len)
HMAC_DRBG generate random.
Configuration options (set of defines)
int mbedtls_hmac_drbg_self_test(int verbose)
Checkup routine.
mbedtls_threading_mutex_t mutex
int(* f_entropy)(void *, unsigned char *, size_t)
unsigned char V[MBEDTLS_MD_MAX_SIZE]
Threading abstraction layer.
struct mbedtls_hmac_drbg_context mbedtls_hmac_drbg_context
#define MBEDTLS_DEPRECATED
MBEDTLS_DEPRECATED void mbedtls_hmac_drbg_update(mbedtls_hmac_drbg_context *ctx, const unsigned char *additional, size_t add_len)
HMAC_DRBG update state.
int mbedtls_hmac_drbg_update_seed_file(mbedtls_hmac_drbg_context *ctx, const char *path)
Read and update a seed file. Seed is added to this instance.
This file contains the generic message-digest wrapper.
void mbedtls_hmac_drbg_init(mbedtls_hmac_drbg_context *ctx)
HMAC_DRBG context initialization Makes the context ready for mbedtls_hmac_drbg_seed(), mbedtls_hmac_drbg_seed_buf() or mbedtls_hmac_drbg_free().
int prediction_resistance
int mbedtls_hmac_drbg_random_with_add(void *p_rng, unsigned char *output, size_t output_len, const unsigned char *additional, size_t add_len)
HMAC_DRBG generate random with additional update input.
int mbedtls_hmac_drbg_reseed(mbedtls_hmac_drbg_context *ctx, const unsigned char *additional, size_t len)
HMAC_DRBG reseeding (extracts data from entropy source)
struct mbedtls_md_info_t mbedtls_md_info_t
mbedtls_md_context_t md_ctx
int mbedtls_hmac_drbg_write_seed_file(mbedtls_hmac_drbg_context *ctx, const char *path)
Write a seed file.
int mbedtls_hmac_drbg_update_ret(mbedtls_hmac_drbg_context *ctx, const unsigned char *additional, size_t add_len)
HMAC_DRBG update state.
void mbedtls_hmac_drbg_set_entropy_len(mbedtls_hmac_drbg_context *ctx, size_t len)
Set the amount of entropy grabbed on each reseed (Default: given by the security strength, which depends on the hash used, see mbedtls_hmac_drbg_init() )
void mbedtls_hmac_drbg_set_prediction_resistance(mbedtls_hmac_drbg_context *ctx, int resistance)
Enable / disable prediction resistance (Default: Off)