| /optee_os/core/lib/libtomcrypt/src/prngs/ |
| H A D | yarrow.c | 30 int yarrow_start(prng_state *prng) in yarrow_start() argument 34 LTC_ARGCHK(prng != NULL); in yarrow_start() 35 prng->ready = 0; in yarrow_start() 40 prng->u.yarrow.cipher = register_cipher(&rijndael_enc_desc); in yarrow_start() 42 prng->u.yarrow.cipher = register_cipher(&aes_enc_desc); in yarrow_start() 44 prng->u.yarrow.cipher = register_cipher(&rijndael_desc); in yarrow_start() 46 prng->u.yarrow.cipher = register_cipher(&aes_desc); in yarrow_start() 49 prng->u.yarrow.cipher = register_cipher(&blowfish_desc); in yarrow_start() 51 prng->u.yarrow.cipher = register_cipher(&twofish_desc); in yarrow_start() 53 prng->u.yarrow.cipher = register_cipher(&rc6_desc); in yarrow_start() [all …]
|
| H A D | fortuna.c | 68 static void s_fortuna_update_iv(prng_state *prng) in s_fortuna_update_iv() argument 73 IV = prng->u.fortuna.IV; in s_fortuna_update_iv() 108 static int s_fortuna_reseed(prng_state *prng) in s_fortuna_reseed() argument 117 if (now == prng->u.fortuna.wd) { in s_fortuna_reseed() 121 if (++prng->u.fortuna.wd < LTC_FORTUNA_WD) { in s_fortuna_reseed() 128 if ((err = sha256_process(&md, prng->u.fortuna.K, 32)) != CRYPT_OK) { in s_fortuna_reseed() 133 reset_cnt = prng->u.fortuna.reset_cnt + 1; in s_fortuna_reseed() 138 if ((err = sha256_done(&prng->u.fortuna.pool[x], tmp)) != CRYPT_OK) { in s_fortuna_reseed() 148 if ((err = sha256_init(&prng->u.fortuna.pool[x])) != CRYPT_OK) { in s_fortuna_reseed() 158 if ((err = sha256_done(&md, prng->u.fortuna.K)) != CRYPT_OK) { in s_fortuna_reseed() [all …]
|
| H A D | chacha20.c | 31 int chacha20_prng_start(prng_state *prng) in chacha20_prng_start() argument 33 LTC_ARGCHK(prng != NULL); in chacha20_prng_start() 34 prng->ready = 0; in chacha20_prng_start() 35 XMEMSET(&prng->u.chacha.ent, 0, sizeof(prng->u.chacha.ent)); in chacha20_prng_start() 36 prng->u.chacha.idx = 0; in chacha20_prng_start() 37 LTC_MUTEX_INIT(&prng->lock) in chacha20_prng_start() 48 int chacha20_prng_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) in chacha20_prng_add_entropy() argument 54 LTC_ARGCHK(prng != NULL); in chacha20_prng_add_entropy() 58 LTC_MUTEX_LOCK(&prng->lock); in chacha20_prng_add_entropy() 59 if (prng->ready) { in chacha20_prng_add_entropy() [all …]
|
| H A D | sober128.c | 33 int sober128_start(prng_state *prng) in sober128_start() argument 35 LTC_ARGCHK(prng != NULL); in sober128_start() 36 prng->ready = 0; in sober128_start() 37 XMEMSET(&prng->u.sober128.ent, 0, sizeof(prng->u.sober128.ent)); in sober128_start() 38 prng->u.sober128.idx = 0; in sober128_start() 39 LTC_MUTEX_INIT(&prng->lock) in sober128_start() 50 int sober128_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) in sober128_add_entropy() argument 56 LTC_ARGCHK(prng != NULL); in sober128_add_entropy() 60 LTC_MUTEX_LOCK(&prng->lock); in sober128_add_entropy() 61 if (prng->ready) { in sober128_add_entropy() [all …]
|
| H A D | rc4.c | 31 int rc4_start(prng_state *prng) in rc4_start() argument 33 LTC_ARGCHK(prng != NULL); in rc4_start() 34 prng->ready = 0; in rc4_start() 36 prng->u.rc4.s.x = 0; in rc4_start() 38 XMEMSET(&prng->u.rc4.s.buf, 0, sizeof(prng->u.rc4.s.buf)); in rc4_start() 39 LTC_MUTEX_INIT(&prng->lock) in rc4_start() 50 int rc4_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) in rc4_add_entropy() argument 56 LTC_ARGCHK(prng != NULL); in rc4_add_entropy() 60 LTC_MUTEX_LOCK(&prng->lock); in rc4_add_entropy() 61 if (prng->ready) { in rc4_add_entropy() [all …]
|
| H A D | sprng.c | 35 int sprng_start(prng_state *prng) in sprng_start() argument 37 LTC_UNUSED_PARAM(prng); in sprng_start() 48 int sprng_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) in sprng_add_entropy() argument 52 LTC_UNUSED_PARAM(prng); in sprng_add_entropy() 61 int sprng_ready(prng_state *prng) in sprng_ready() argument 63 LTC_UNUSED_PARAM(prng); in sprng_ready() 74 unsigned long sprng_read(unsigned char *out, unsigned long outlen, prng_state *prng) in sprng_read() argument 77 LTC_UNUSED_PARAM(prng); in sprng_read() 86 int sprng_done(prng_state *prng) in sprng_done() argument 88 LTC_UNUSED_PARAM(prng); in sprng_done() [all …]
|
| H A D | rng_make_prng.c | 24 int rng_make_prng(int bits, int wprng, prng_state *prng, in rng_make_prng() argument 31 LTC_ARGCHK(prng != NULL); in rng_make_prng() 46 if ((err = prng_descriptor[wprng]->start(prng)) != CRYPT_OK) { in rng_make_prng() 61 if ((err = prng_descriptor[wprng]->pimport(buf, bytes, prng)) != CRYPT_OK) { in rng_make_prng() 65 if ((err = prng_descriptor[wprng]->add_entropy(buf, bytes, prng)) != CRYPT_OK) { in rng_make_prng() 69 if ((err = prng_descriptor[wprng]->ready(prng)) != CRYPT_OK) { in rng_make_prng()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_prng.h | 84 int (*start)(prng_state *prng); 91 int (*add_entropy)(const unsigned char *in, unsigned long inlen, prng_state *prng); 96 int (*ready)(prng_state *prng); 103 unsigned long (*read)(unsigned char *out, unsigned long outlen, prng_state *prng); 108 int (*done)(prng_state *prng); 115 int (*pexport)(unsigned char *out, unsigned long *outlen, prng_state *prng); 122 int (*pimport)(const unsigned char *in, unsigned long inlen, prng_state *prng); 130 int yarrow_start(prng_state *prng); 131 int yarrow_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng); 132 int yarrow_ready(prng_state *prng); [all …]
|
| H A D | tomcrypt_pk.h | 20 int rand_prime(void *N, long len, prng_state *prng, int wprng); 47 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key); 48 int rsa_make_key_ubin_e(prng_state *prng, int wprng, int size, 59 #define rsa_encrypt_key(in, inlen, out, outlen, lparam, lparamlen, prng, prng_idx, hash_idx, key) \ argument 60 …rsa_encrypt_key_ex(in, inlen, out, outlen, lparam, lparamlen, prng, prng_idx, hash_idx, -1, LTC_PK… 65 #define rsa_sign_hash(in, inlen, out, outlen, prng, prng_idx, hash_idx, saltlen, key) \ argument 66 rsa_sign_hash_ex(in, inlen, out, outlen, LTC_PKCS_1_PSS, prng, prng_idx, hash_idx, saltlen, key) 78 prng_state *prng, int prng_idx, 93 prng_state *prng, int prng_idx, 149 int dh_generate_key(prng_state *prng, int wprng, dh_key *key); [all …]
|
| H A D | tomcrypt_pkcs.h | 35 prng_state *prng, 51 unsigned long modulus_bitlen, prng_state *prng, 64 unsigned long saltlen, prng_state *prng,
|
| /optee_os/core/drivers/qcom/prng/ |
| H A D | prng.c | 21 } prng = { variable 30 if (!prng.va) in hw_get_random_bytes() 37 if (!(io_read32(prng.va + SEC_PRNG_STATUS) & in hw_get_random_bytes() 41 while ((val = io_read32(prng.va + SEC_PRNG_DATA_OUT)) == 0) in hw_get_random_bytes() 55 if (!core_mmu_add_mapping(MEM_AREA_IO_SEC, prng.pa, SEC_PRNG_REG_SIZE)) in qcom_prng_init() 58 prng.va = (vaddr_t)phys_to_virt_io(prng.pa, SEC_PRNG_REG_SIZE); in qcom_prng_init() 59 if (!prng.va) in qcom_prng_init()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_make_key.c | 21 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument 26 if ((err = ecc_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; } in ecc_make_key() 30 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_curve *cu) in ecc_make_key_ex() argument 34 if ((err = ecc_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; } in ecc_make_key_ex() 38 int ecc_generate_key(prng_state *prng, int wprng, ecc_key *key) in ecc_generate_key() argument 53 if ((err = rand_bn_upto(key->k, key->dp.order, prng, wprng)) != CRYPT_OK) { in ecc_generate_key()
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | tomcrypt.c | 21 static int prng_crypto_start(prng_state *prng __unused) in prng_crypto_start() 28 prng_state *prng __unused) in prng_crypto_add_entropy() 34 static int prng_crypto_ready(prng_state *prng __unused) in prng_crypto_ready() 40 prng_state *prng __unused) in prng_crypto_read() 48 static int prng_crypto_done(prng_state *prng __unused) in prng_crypto_done() 55 prng_state *prng __unused) in prng_crypto_export() 62 prng_state *prng __unused) in prng_crypto_import()
|
| /optee_os/core/lib/libtomcrypt/src/misc/crypt/ |
| H A D | crypt_register_prng.c | 15 int register_prng(const struct ltc_prng_descriptor *prng) in register_prng() argument 19 LTC_ARGCHK(prng != NULL); in register_prng() 24 if (prng_descriptor[x] == prng) { in register_prng() 33 prng_descriptor[x] = prng; in register_prng()
|
| H A D | crypt_unregister_prng.c | 15 int unregister_prng(const struct ltc_prng_descriptor *prng) in unregister_prng() argument 19 LTC_ARGCHK(prng != NULL); in unregister_prng() 24 if (prng_descriptor[x] == prng) { in unregister_prng()
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_make_key.c | 12 static int s_rsa_make_key(prng_state *prng, int wprng, int size, void *e, rsa_key *key) in s_rsa_make_key() argument 33 if ((err = rand_prime( p, size/2, prng, wprng)) != CRYPT_OK) { goto cleanup; } in s_rsa_make_key() 40 if ((err = rand_prime( q, size/2, prng, wprng)) != CRYPT_OK) { goto cleanup; } in s_rsa_make_key() 92 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument 106 err = s_rsa_make_key(prng, wprng, size, tmp_e, key); in rsa_make_key() 123 int rsa_make_key_ubin_e(prng_state *prng, int wprng, int size, in rsa_make_key_ubin_e() argument 134 err = rsa_make_key_bn_e(prng, wprng, size, tmp_e, key); in rsa_make_key_ubin_e() 150 int rsa_make_key_bn_e(prng_state *prng, int wprng, int size, void *e, rsa_key *key) in rsa_make_key_bn_e() argument 157 err = s_rsa_make_key(prng, wprng, size, e, key); in rsa_make_key_bn_e()
|
| H A D | rsa_encrypt_key.c | 30 prng_state *prng, int prng_idx, in rsa_encrypt_key_ex() argument 75 lparamlen, modulus_bitlen, prng, prng_idx, mgf_hash, in rsa_encrypt_key_ex() 83 modulus_bitlen, prng, prng_idx, in rsa_encrypt_key_ex()
|
| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_make_key.c | 21 int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size, dsa_key *key) in dsa_make_key() argument 25 …if ((err = dsa_generate_pqg(prng, wprng, group_size, modulus_size, key)) != CRYPT_OK) { return err… in dsa_make_key() 26 if ((err = dsa_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; } in dsa_make_key()
|
| H A D | dsa_generate_key.c | 19 int dsa_generate_key(prng_state *prng, int wprng, dsa_key *key) in dsa_generate_key() argument 30 if ((err = rand_bn_upto(key->x, key->q, prng, wprng)) != CRYPT_OK) { return err; } in dsa_generate_key()
|
| H A D | dsa_sign_hash.c | 25 prng_state *prng, int wprng, const dsa_key *key) in dsa_sign_hash_raw() argument 61 … if ((err = rand_bn_bits(k, qbits, prng, wprng)) != CRYPT_OK) { goto error; } in dsa_sign_hash_raw() 114 prng_state *prng, int wprng, const dsa_key *key) in dsa_sign_hash() argument 128 if ((err = dsa_sign_hash_raw(in, inlen, r, s, prng, wprng, key)) != CRYPT_OK) { in dsa_sign_hash()
|
| /optee_os/core/lib/libtomcrypt/src/math/ |
| H A D | rand_bn.c | 10 int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng) in rand_bn_bits() argument 28 if (prng_descriptor[wprng]->read(buf, bytes, prng) != (unsigned long)bytes) { in rand_bn_bits() 50 int rand_bn_upto(void *N, void *limit, prng_state *prng, int wprng) in rand_bn_upto() argument 59 res = rand_bn_bits(N, bits, prng, wprng); in rand_bn_upto()
|
| /optee_os/core/drivers/qcom/ |
| H A D | sub.mk | 8 srcs-$(CFG_QCOM_PRNG) += prng/prng.c
|
| /optee_os/core/lib/libtomcrypt/src/pk/pkcs1/ |
| H A D | pkcs_1_v1_5_encode.c | 29 prng_state *prng, in pkcs_1_v1_5_encode() argument 73 if (prng_descriptor[prng_idx]->read(ps, ps_len, prng) != ps_len) { in pkcs_1_v1_5_encode() 81 if (prng_descriptor[prng_idx]->read(&ps[i], 1, prng) != 1) { in pkcs_1_v1_5_encode()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ed25519/ |
| H A D | ed25519_make_key.c | 19 int ed25519_make_key(prng_state *prng, int wprng, curve25519_key *key) in ed25519_make_key() argument 25 if ((err = tweetnacl_crypto_sign_keypair(prng, wprng, key->pub, key->priv)) != CRYPT_OK) { in ed25519_make_key()
|
| /optee_os/core/lib/libtomcrypt/src/pk/x25519/ |
| H A D | x25519_make_key.c | 19 int x25519_make_key(prng_state *prng, int wprng, curve25519_key *key) in x25519_make_key() argument 29 if (prng_descriptor[wprng]->read(key->priv, sizeof(key->priv), prng) != sizeof(key->priv)) { in x25519_make_key()
|