feat: Add SE050 hardware RNG integration

- Added system RNG fallback using /dev/urandom
- Created se050_wireguard_se050_rng.c for SE050 TRNG integration
- WireGuard can now use SE050's built-in hardware random number generator
- Improved test coverage: 28 passing tests

Usage for SE050 RNG:

For standalone (no SE050):
This commit is contained in:
km
2026-03-28 20:20:29 +09:00
parent 4ec660de02
commit 1894e9a933
4 changed files with 117 additions and 7 deletions
+29 -7
View File
@@ -400,6 +400,32 @@ static int simple_rng(uint8_t *out, size_t len, void *ctx)
}
#endif
/* System RNG fallback (uses /dev/urandom on POSIX) */
#include <stdio.h>
#include <fcntl.h>
#include <unistd.h>
static int system_rng(uint8_t *out, size_t len, void *ctx)
{
int fd = open("/dev/urandom", O_RDONLY);
if (fd < 0) {
return -1;
}
size_t total = 0;
while (total < len) {
ssize_t n = read(fd, out + total, len - total);
if (n < 0) {
close(fd);
return -1;
}
total += n;
}
close(fd);
return 0;
}
int se050_wireguard_generate_keypair(uint8_t *private_key, uint8_t *public_key)
{
if (!private_key || !public_key) {
@@ -414,14 +440,10 @@ int se050_wireguard_generate_keypair(uint8_t *private_key, uint8_t *public_key)
return -1;
}
#else
/* Production: use secure RNG */
/* This would integrate with platform-specific RNG */
/* For now, generate deterministic key for testing */
for (int i = 0; i < 32; i++) {
keypair.private_key[i] = i + 1;
/* Production: use system RNG (can be replaced with SE050 RNG) */
if (se050_x25519_sw_generate_keypair(&keypair, system_rng, NULL) < 0) {
return -1;
}
se050_x25519_sw_clamp(keypair.private_key);
x25519_sw(keypair.public_key, keypair.private_key, (const uint8_t*)"basepoint");
#endif
memcpy(private_key, keypair.private_key, WG_KEY_LEN);