| /optee_os/core/drivers/ |
| H A D | riscv_zkr_rng.c | 19 uint32_t seed = 0; in seed_get_random_u16() local 29 seed = swap_csr(CSR_SEED, 0); in seed_get_random_u16() 30 opst = seed & SEED_OPST; in seed_get_random_u16() 34 *val = seed & SEED_ENTROPY; in seed_get_random_u16() 47 seed = swap_csr(CSR_SEED, 0); in seed_get_random_u16() 48 if ((seed & SEED_OPST) == SEED_OPST_ES16) { in seed_get_random_u16() 49 *val = seed & SEED_ENTROPY; in seed_get_random_u16() 61 uint16_t seed = 0; in hw_get_random_bytes() local 64 if (!seed_get_random_u16(&seed)) in hw_get_random_bytes() 66 *ptr++ = seed & 0xff; in hw_get_random_bytes() [all …]
|
| H A D | smccc_trng.c | 204 uint8_t seed[32] = { 0 }; in plat_rng_init() local 206 if (smccc_trng_read(seed, sizeof(seed))) in plat_rng_init() 209 if (crypto_rng_init(seed, sizeof(seed))) in plat_rng_init()
|
| H A D | stm32_rng.c | 464 uint8_t seed[RNG_FIFO_BYTE_DEPTH] = { }; in plat_rng_init() local 472 if (stm32_rng_read(seed, sizeof(seed))) in plat_rng_init() 475 if (crypto_rng_init(seed, sizeof(seed))) in plat_rng_init()
|
| H A D | versal_trng.c | 658 uint8_t *seed = NULL; in trng_reseed_internal_nodf() local 673 seed = entropy; in trng_reseed_internal_nodf() 676 seed = eseed; in trng_reseed_internal_nodf() 679 seed = NULL; in trng_reseed_internal_nodf() 683 trng_write32_range(trng, TRNG_EXT_SEED_0, TRNG_SEED_REGS, seed); in trng_reseed_internal_nodf() 771 uint8_t *seed = NULL; in trng_instantiate() local 813 seed = (void *)trng->usr_cfg.init_seed; in trng_instantiate() 819 if (trng_reseed_internal(trng, seed, pers, trng->usr_cfg.dfmul)) in trng_instantiate()
|
| /optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
| H A D | pkcs_1_oaep_decode.c | 33 unsigned char *DB, *seed, *mask; in pkcs_1_oaep_decode() local 68 seed = XMALLOC(hLen); in pkcs_1_oaep_decode() 69 if (DB == NULL || mask == NULL || seed == NULL) { in pkcs_1_oaep_decode() 76 if (seed != NULL) { in pkcs_1_oaep_decode() 77 XFREE(seed); in pkcs_1_oaep_decode() 99 XMEMCPY(seed, msg + x, hLen); in pkcs_1_oaep_decode() 113 seed[y] ^= mask[y]; in pkcs_1_oaep_decode() 117 if ((err = pkcs_1_mgf1(mgf_hash, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_decode() 131 if ((err = hash_memory(lparam_hash_used, lparam, lparamlen, seed, &x)) != CRYPT_OK) { in pkcs_1_oaep_decode() 136 if ((err = hash_memory(lparam_hash_used, DB, 0, seed, &x)) != CRYPT_OK) { in pkcs_1_oaep_decode() [all …]
|
| H A D | pkcs_1_oaep_encode.c | 33 unsigned char *DB, *seed, *mask; in pkcs_1_oaep_encode() local 70 seed = XMALLOC(hLen); in pkcs_1_oaep_encode() 71 if (DB == NULL || mask == NULL || seed == NULL) { in pkcs_1_oaep_encode() 78 if (seed != NULL) { in pkcs_1_oaep_encode() 79 XFREE(seed); in pkcs_1_oaep_encode() 114 if (prng_descriptor[prng_idx]->read(seed, hLen, prng) != hLen) { in pkcs_1_oaep_encode() 120 if ((err = pkcs_1_mgf1(mgf_hash, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { in pkcs_1_oaep_encode() 136 seed[y] ^= mask[y]; in pkcs_1_oaep_encode() 149 XMEMCPY(out+x, seed, hLen); in pkcs_1_oaep_encode() 160 zeromem(seed, hLen); in pkcs_1_oaep_encode() [all …]
|
| H A D | pkcs_1_mgf1.c | 22 const unsigned char *seed, unsigned long seedlen, in pkcs_1_mgf1() argument 31 LTC_ARGCHK(seed != NULL); in pkcs_1_mgf1() 67 if ((err = hash_descriptor[hash_idx]->process(md, seed, seedlen)) != CRYPT_OK) { in pkcs_1_mgf1()
|
| /optee_os/core/arch/arm/plat-rcar/ |
| H A D | main.c | 80 unsigned long seed = 0; in plat_get_aslr_seed() local 83 if (crypto_rng_read(&seed, sizeof(seed))) in plat_get_aslr_seed() 86 return seed; in plat_get_aslr_seed()
|
| /optee_os/core/drivers/crypto/crypto_api/acipher/ |
| H A D | rsamgf.c | 26 mgf_data->mask.length, mgf_data->seed.length); in drvcrypt_rsa_mgf1() 56 ret = crypto_hash_update(ctx, mgf_data->seed.data, in drvcrypt_rsa_mgf1() 57 mgf_data->seed.length); in drvcrypt_rsa_mgf1() 80 ret = crypto_hash_update(ctx, mgf_data->seed.data, in drvcrypt_rsa_mgf1() 81 mgf_data->seed.length); in drvcrypt_rsa_mgf1()
|
| H A D | rsassa.c | 451 mgf_data.seed.data = hash.data; in emsa_pss_encode() 452 mgf_data.seed.length = hash.length; in emsa_pss_encode() 594 mgf_data.seed.data = hash.data; in emsa_pss_verify() 595 mgf_data.seed.length = hash.length; in emsa_pss_verify()
|
| /optee_os/core/drivers/crypto/caam/acipher/ |
| H A D | caam_prime_dsa.c | 46 static void do_desc_prime_q(uint32_t *desc, struct caambuf *seed, in do_desc_prime_q() argument 86 if (seed->length > 16) { in do_desc_prime_q() 93 RND, seed->length - 16)); in do_desc_prime_q() 97 MSG, RND, seed->length)); in do_desc_prime_q() 100 caam_desc_add_word(desc, MOVE(C1_ALIGN, OFIFO, 0, seed->length)); in do_desc_prime_q() 101 caam_desc_add_word(desc, FIFO_ST(CLASS_NO, MSG_DATA, seed->length)); in do_desc_prime_q() 102 caam_desc_add_ptr(desc, seed->paddr); in do_desc_prime_q() 206 struct caambuf *seed, struct prime_data_dsa *prime, in do_desc_gen_x() argument 252 FIFO_LD(CLASS_1, PKHA_N, NOACTION, seed->length)); in do_desc_gen_x() 265 FIFO_LD(CLASS_1, PKHA_A, NOACTION, seed->length)); in do_desc_gen_x() [all …]
|
| H A D | caam_rsa.c | 775 struct caambuf seed = { }; in do_oaep_decoding() local 849 retstatus = caam_calloc_align_buf(&seed, rsa_data->digest_size); in do_oaep_decoding() 895 mgf_data.seed.data = maskedDB.data; in do_oaep_decoding() 896 mgf_data.seed.length = maskedDB.length; in do_oaep_decoding() 897 mgf_data.mask.data = seed.data; in do_oaep_decoding() 898 mgf_data.mask.length = seed.length; in do_oaep_decoding() 910 mod_op.n.length = seed.length; in do_oaep_decoding() 913 mod_op.b.data = seed.data; in do_oaep_decoding() 914 mod_op.b.length = seed.length; in do_oaep_decoding() 915 mod_op.result.data = seed.data; in do_oaep_decoding() [all …]
|
| /optee_os/core/arch/riscv/kernel/ |
| H A D | boot.c | 302 unsigned long seed = 0; in get_aslr_seed() local 305 res = hw_get_random_bytes(&seed, sizeof(seed)); in get_aslr_seed() 310 return seed; in get_aslr_seed()
|
| H A D | csr_detect.S | 72 detect_csr_by_csrrw seed, a1, a2, a3
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | hpre_rsa.c | 110 static TEE_Result mgf_process(size_t digest_size, uint8_t *seed, in mgf_process() argument 123 mgf.seed.data = seed; in mgf_process() 124 mgf.seed.length = seed_len; in mgf_process() 409 uint8_t *seed, uint8_t *db, in rsa_oaep_fill_maskdb() argument 418 ret = mgf_process(lhash_len, seed, lhash_len, seed_mgf, db_len, in rsa_oaep_fill_maskdb() 429 uint8_t *seed, uint8_t *em) in rsa_oaep_fill_maskseed() argument 446 return xor_process(seed, mask_db_mgf, mask_seed, lhash_len); in rsa_oaep_fill_maskseed() 454 uint8_t seed[OAEP_MAX_HASH_LEN] = { }; in rsa_oaep_encode() local 464 ret = hw_get_random_bytes(seed, lhash_len); in rsa_oaep_encode() 468 ret = rsa_oaep_fill_maskdb(rsa_data, seed, db, em + lhash_len + 1); in rsa_oaep_encode() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | hmac_drbg.c | 138 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local 158 memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT); in hmac_drbg_reseed_core() 162 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core() 178 seed + seedlen, in hmac_drbg_reseed_core() 189 memcpy(seed + seedlen, additional, len); in hmac_drbg_reseed_core() 194 if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) { in hmac_drbg_reseed_core() 203 mbedtls_platform_zeroize(seed, seedlen); in hmac_drbg_reseed_core()
|
| H A D | ctr_drbg.c | 452 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local 466 memset(seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT); in mbedtls_ctr_drbg_reseed_internal() 469 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal() 476 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal() 484 memcpy(seed + seedlen, additional, len); in mbedtls_ctr_drbg_reseed_internal() 489 if ((ret = block_cipher_df(seed, seed, seedlen)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 494 if ((ret = ctr_drbg_update_internal(ctx, seed)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 500 mbedtls_platform_zeroize(seed, sizeof(seed)); in mbedtls_ctr_drbg_reseed_internal()
|
| H A D | lmots.h | 229 const unsigned char *seed,
|
| H A D | psa_crypto_storage.h | 384 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed,
|
| /optee_os/core/arch/arm/kernel/ |
| H A D | link_dummies_init.c | 23 core_init_mmu_map(unsigned long seed __unused, in core_init_mmu_map()
|
| H A D | boot.c | 1243 const uint64_t *seed = NULL; in get_aslr_seed() local 1266 seed = fdt_getprop(fdt, offs, "kaslr-seed", &len); in get_aslr_seed() 1267 if (!seed || len != sizeof(*seed)) { in get_aslr_seed() 1272 return fdt64_to_cpu(fdt64_ld(seed)); in get_aslr_seed()
|
| /optee_os/core/arch/arm/mm/ |
| H A D | core_mmu.c | 228 vaddr_t arch_aslr_base_addr(vaddr_t start_addr, uint64_t seed, in arch_aslr_base_addr() argument 231 vaddr_t base_addr = start_addr + seed; in arch_aslr_base_addr()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pkcs.h | 24 const unsigned char *seed, unsigned long seedlen,
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_builtin_key_derivation.h | 80 uint8_t *MBEDTLS_PRIVATE(seed);
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | lms.h | 368 void *p_rng, const unsigned char *seed,
|