Skip to content

Commit

Permalink
crypto: drbg - prepare for async seeding
Browse files Browse the repository at this point in the history
In order to prepare for the addition of the asynchronous seeding call,
the invocation of seeding the DRBG is moved out into a helper function.

In addition, a block of memory is allocated during initialization time
that will be used as a scratchpad for obtaining entropy. That scratchpad
is used for the initial seeding operation as well as by the
asynchronous seeding call. The memory must be zeroized every time the
DRBG seeding call succeeds to avoid entropy data lingering in memory.

CC: Andreas Steffen <[email protected]>
CC: Theodore Ts'o <[email protected]>
CC: Sandy Harris <[email protected]>
Signed-off-by: Stephan Mueller <[email protected]>
Signed-off-by: Herbert Xu <[email protected]>
  • Loading branch information
smuellerDD authored and herbertx committed May 27, 2015
1 parent 16b369a commit 3d6a5f7
Show file tree
Hide file tree
Showing 2 changed files with 56 additions and 27 deletions.
81 changes: 54 additions & 27 deletions crypto/drbg.c
Original file line number Diff line number Diff line change
Expand Up @@ -1041,6 +1041,21 @@ static struct drbg_state_ops drbg_hash_ops = {
* Functions common for DRBG implementations
******************************************************************/

static inline int __drbg_seed(struct drbg_state *drbg, struct list_head *seed,
int reseed)
{
int ret = drbg->d_ops->update(drbg, seed, reseed);

if (ret)
return ret;

drbg->seeded = true;
/* 10.1.1.2 / 10.1.1.3 step 5 */
drbg->reseed_ctr = 1;

return ret;
}

/*
* Seeding or reseeding of the DRBG
*
Expand All @@ -1056,8 +1071,6 @@ static int drbg_seed(struct drbg_state *drbg, struct drbg_string *pers,
bool reseed)
{
int ret = 0;
unsigned char *entropy = NULL;
size_t entropylen = 0;
struct drbg_string data1;
LIST_HEAD(seedlist);

Expand All @@ -1073,26 +1086,10 @@ static int drbg_seed(struct drbg_state *drbg, struct drbg_string *pers,
drbg->test_data.len);
pr_devel("DRBG: using test entropy\n");
} else {
/*
* Gather entropy equal to the security strength of the DRBG.
* With a derivation function, a nonce is required in addition
* to the entropy. A nonce must be at least 1/2 of the security
* strength of the DRBG in size. Thus, entropy * nonce is 3/2
* of the strength. The consideration of a nonce is only
* applicable during initial seeding.
*/
entropylen = drbg_sec_strength(drbg->core->flags);
if (!entropylen)
return -EFAULT;
if (!reseed)
entropylen = ((entropylen + 1) / 2) * 3;
pr_devel("DRBG: (re)seeding with %zu bytes of entropy\n",
entropylen);
entropy = kzalloc(entropylen, GFP_KERNEL);
if (!entropy)
return -ENOMEM;
get_random_bytes(entropy, entropylen);
drbg_string_fill(&data1, entropy, entropylen);
drbg->seed_buf_len);
get_random_bytes(drbg->seed_buf, drbg->seed_buf_len);
drbg_string_fill(&data1, drbg->seed_buf, drbg->seed_buf_len);
}
list_add_tail(&data1.list, &seedlist);

Expand All @@ -1111,16 +1108,24 @@ static int drbg_seed(struct drbg_state *drbg, struct drbg_string *pers,
memset(drbg->C, 0, drbg_statelen(drbg));
}

ret = drbg->d_ops->update(drbg, &seedlist, reseed);
ret = __drbg_seed(drbg, &seedlist, reseed);

/*
* Clear the initial entropy buffer as the async call may not overwrite
* that buffer for quite some time.
*/
memzero_explicit(drbg->seed_buf, drbg->seed_buf_len);
if (ret)
goto out;

drbg->seeded = true;
/* 10.1.1.2 / 10.1.1.3 step 5 */
drbg->reseed_ctr = 1;
/*
* For all subsequent seeding calls, we only need the seed buffer
* equal to the security strength of the DRBG. We undo the calculation
* in drbg_alloc_state.
*/
if (!reseed)
drbg->seed_buf_len = drbg->seed_buf_len / 3 * 2;

out:
kzfree(entropy);
return ret;
}

Expand All @@ -1143,6 +1148,8 @@ static inline void drbg_dealloc_state(struct drbg_state *drbg)
drbg->prev = NULL;
drbg->fips_primed = false;
#endif
kzfree(drbg->seed_buf);
drbg->seed_buf = NULL;
}

/*
Expand Down Expand Up @@ -1204,6 +1211,26 @@ static inline int drbg_alloc_state(struct drbg_state *drbg)
if (!drbg->scratchpad)
goto err;
}

/*
* Gather entropy equal to the security strength of the DRBG.
* With a derivation function, a nonce is required in addition
* to the entropy. A nonce must be at least 1/2 of the security
* strength of the DRBG in size. Thus, entropy * nonce is 3/2
* of the strength. The consideration of a nonce is only
* applicable during initial seeding.
*/
drbg->seed_buf_len = drbg_sec_strength(drbg->core->flags);
if (!drbg->seed_buf_len) {
ret = -EFAULT;
goto err;
}
/* ensure we have sufficient buffer space for initial seed */
drbg->seed_buf_len = ((drbg->seed_buf_len + 1) / 2) * 3;
drbg->seed_buf = kzalloc(drbg->seed_buf_len, GFP_KERNEL);
if (!drbg->seed_buf)
goto err;

return 0;

err:
Expand Down
2 changes: 2 additions & 0 deletions include/crypto/drbg.h
Original file line number Diff line number Diff line change
Expand Up @@ -119,6 +119,8 @@ struct drbg_state {
bool fips_primed; /* Continuous test primed? */
unsigned char *prev; /* FIPS 140-2 continuous test value */
#endif
u8 *seed_buf; /* buffer holding the seed */
size_t seed_buf_len;
const struct drbg_state_ops *d_ops;
const struct drbg_core *core;
struct drbg_string test_data;
Expand Down

0 comments on commit 3d6a5f7

Please sign in to comment.