xref: /aosp_15_r20/external/mbedtls/tests/include/test/random.h (revision 62c56f9862f102b96d72393aff6076c951fb8148)
1*62c56f98SSadaf Ebrahimi /**
2*62c56f98SSadaf Ebrahimi  * \file random.h
3*62c56f98SSadaf Ebrahimi  *
4*62c56f98SSadaf Ebrahimi  * \brief   This file contains the prototypes of helper functions to generate
5*62c56f98SSadaf Ebrahimi  *          random numbers for the purpose of testing.
6*62c56f98SSadaf Ebrahimi  */
7*62c56f98SSadaf Ebrahimi 
8*62c56f98SSadaf Ebrahimi /*
9*62c56f98SSadaf Ebrahimi  *  Copyright The Mbed TLS Contributors
10*62c56f98SSadaf Ebrahimi  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
11*62c56f98SSadaf Ebrahimi  */
12*62c56f98SSadaf Ebrahimi 
13*62c56f98SSadaf Ebrahimi #ifndef TEST_RANDOM_H
14*62c56f98SSadaf Ebrahimi #define TEST_RANDOM_H
15*62c56f98SSadaf Ebrahimi 
16*62c56f98SSadaf Ebrahimi #include "mbedtls/build_info.h"
17*62c56f98SSadaf Ebrahimi 
18*62c56f98SSadaf Ebrahimi #include <stddef.h>
19*62c56f98SSadaf Ebrahimi #include <stdint.h>
20*62c56f98SSadaf Ebrahimi 
21*62c56f98SSadaf Ebrahimi typedef struct {
22*62c56f98SSadaf Ebrahimi     unsigned char *buf; /* Pointer to a buffer of length bytes. */
23*62c56f98SSadaf Ebrahimi     size_t length;
24*62c56f98SSadaf Ebrahimi     /* If fallback_f_rng is NULL, fail after delivering length bytes. */
25*62c56f98SSadaf Ebrahimi     int (*fallback_f_rng)(void *, unsigned char *, size_t);
26*62c56f98SSadaf Ebrahimi     void *fallback_p_rng;
27*62c56f98SSadaf Ebrahimi } mbedtls_test_rnd_buf_info;
28*62c56f98SSadaf Ebrahimi 
29*62c56f98SSadaf Ebrahimi /**
30*62c56f98SSadaf Ebrahimi  * Info structure for the pseudo random function
31*62c56f98SSadaf Ebrahimi  *
32*62c56f98SSadaf Ebrahimi  * Key should be set at the start to a test-unique value.
33*62c56f98SSadaf Ebrahimi  * Do not forget endianness!
34*62c56f98SSadaf Ebrahimi  * State( v0, v1 ) should be set to zero.
35*62c56f98SSadaf Ebrahimi  */
36*62c56f98SSadaf Ebrahimi typedef struct {
37*62c56f98SSadaf Ebrahimi     uint32_t key[16];
38*62c56f98SSadaf Ebrahimi     uint32_t v0, v1;
39*62c56f98SSadaf Ebrahimi } mbedtls_test_rnd_pseudo_info;
40*62c56f98SSadaf Ebrahimi 
41*62c56f98SSadaf Ebrahimi /**
42*62c56f98SSadaf Ebrahimi  * This function just returns data from rand().
43*62c56f98SSadaf Ebrahimi  * Although predictable and often similar on multiple
44*62c56f98SSadaf Ebrahimi  * runs, this does not result in identical random on
45*62c56f98SSadaf Ebrahimi  * each run. So do not use this if the results of a
46*62c56f98SSadaf Ebrahimi  * test depend on the random data that is generated.
47*62c56f98SSadaf Ebrahimi  *
48*62c56f98SSadaf Ebrahimi  * rng_state shall be NULL.
49*62c56f98SSadaf Ebrahimi  */
50*62c56f98SSadaf Ebrahimi int mbedtls_test_rnd_std_rand(void *rng_state,
51*62c56f98SSadaf Ebrahimi                               unsigned char *output,
52*62c56f98SSadaf Ebrahimi                               size_t len);
53*62c56f98SSadaf Ebrahimi 
54*62c56f98SSadaf Ebrahimi /**
55*62c56f98SSadaf Ebrahimi  * This function only returns zeros.
56*62c56f98SSadaf Ebrahimi  *
57*62c56f98SSadaf Ebrahimi  * \p rng_state shall be \c NULL.
58*62c56f98SSadaf Ebrahimi  */
59*62c56f98SSadaf Ebrahimi int mbedtls_test_rnd_zero_rand(void *rng_state,
60*62c56f98SSadaf Ebrahimi                                unsigned char *output,
61*62c56f98SSadaf Ebrahimi                                size_t len);
62*62c56f98SSadaf Ebrahimi 
63*62c56f98SSadaf Ebrahimi /**
64*62c56f98SSadaf Ebrahimi  * This function returns random data based on a buffer it receives.
65*62c56f98SSadaf Ebrahimi  *
66*62c56f98SSadaf Ebrahimi  * \p rng_state shall be a pointer to a #mbedtls_test_rnd_buf_info structure.
67*62c56f98SSadaf Ebrahimi  *
68*62c56f98SSadaf Ebrahimi  * The number of bytes released from the buffer on each call to
69*62c56f98SSadaf Ebrahimi  * the random function is specified by \p len.
70*62c56f98SSadaf Ebrahimi  *
71*62c56f98SSadaf Ebrahimi  * After the buffer is empty, this function will call the fallback RNG in the
72*62c56f98SSadaf Ebrahimi  * #mbedtls_test_rnd_buf_info structure if there is one, and
73*62c56f98SSadaf Ebrahimi  * will return #MBEDTLS_ERR_ENTROPY_SOURCE_FAILED otherwise.
74*62c56f98SSadaf Ebrahimi  */
75*62c56f98SSadaf Ebrahimi int mbedtls_test_rnd_buffer_rand(void *rng_state,
76*62c56f98SSadaf Ebrahimi                                  unsigned char *output,
77*62c56f98SSadaf Ebrahimi                                  size_t len);
78*62c56f98SSadaf Ebrahimi 
79*62c56f98SSadaf Ebrahimi /**
80*62c56f98SSadaf Ebrahimi  * This function returns random based on a pseudo random function.
81*62c56f98SSadaf Ebrahimi  * This means the results should be identical on all systems.
82*62c56f98SSadaf Ebrahimi  * Pseudo random is based on the XTEA encryption algorithm to
83*62c56f98SSadaf Ebrahimi  * generate pseudorandom.
84*62c56f98SSadaf Ebrahimi  *
85*62c56f98SSadaf Ebrahimi  * \p rng_state shall be a pointer to a #mbedtls_test_rnd_pseudo_info structure.
86*62c56f98SSadaf Ebrahimi  */
87*62c56f98SSadaf Ebrahimi int mbedtls_test_rnd_pseudo_rand(void *rng_state,
88*62c56f98SSadaf Ebrahimi                                  unsigned char *output,
89*62c56f98SSadaf Ebrahimi                                  size_t len);
90*62c56f98SSadaf Ebrahimi 
91*62c56f98SSadaf Ebrahimi #endif /* TEST_RANDOM_H */
92