aboutsummaryrefslogtreecommitdiff
path: root/lib/mbedtls-2.27.0/programs/random
diff options
context:
space:
mode:
authorAdam Harrison <adamdharrison@gmail.com>2022-11-26 16:20:59 -0500
committerAdam Harrison <adamdharrison@gmail.com>2022-11-29 18:39:46 -0500
commitfc0c4ed9a3103e0e6534311923668879fc8e0875 (patch)
tree6e7723c3f45d39f06c243d9c18a3c038da948793 /lib/mbedtls-2.27.0/programs/random
parent3836606e2b735ba7b2dc0f580231843660587fb4 (diff)
downloadlite-xl-plugin-manager-fc0c4ed9a3103e0e6534311923668879fc8e0875.tar.gz
lite-xl-plugin-manager-fc0c4ed9a3103e0e6534311923668879fc8e0875.zip
Removed openssl, and curl, and added mbedded tls.curl-removal
Almost fully removed curl, needs more testing. Fixed most issues, now trying to cross compile. Fix? Sigh.
Diffstat (limited to 'lib/mbedtls-2.27.0/programs/random')
-rw-r--r--lib/mbedtls-2.27.0/programs/random/CMakeLists.txt14
-rw-r--r--lib/mbedtls-2.27.0/programs/random/gen_entropy.c102
-rw-r--r--lib/mbedtls-2.27.0/programs/random/gen_random_ctr_drbg.c135
-rw-r--r--lib/mbedtls-2.27.0/programs/random/gen_random_havege.c107
4 files changed, 358 insertions, 0 deletions
diff --git a/lib/mbedtls-2.27.0/programs/random/CMakeLists.txt b/lib/mbedtls-2.27.0/programs/random/CMakeLists.txt
new file mode 100644
index 0000000..8df8365
--- /dev/null
+++ b/lib/mbedtls-2.27.0/programs/random/CMakeLists.txt
@@ -0,0 +1,14 @@
+set(executables
+ gen_entropy
+ gen_random_ctr_drbg
+ gen_random_havege
+)
+
+foreach(exe IN LISTS executables)
+ add_executable(${exe} ${exe}.c $<TARGET_OBJECTS:mbedtls_test>)
+ target_link_libraries(${exe} ${mbedcrypto_target})
+endforeach()
+
+install(TARGETS ${executables}
+ DESTINATION "bin"
+ PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ WORLD_EXECUTE)
diff --git a/lib/mbedtls-2.27.0/programs/random/gen_entropy.c b/lib/mbedtls-2.27.0/programs/random/gen_entropy.c
new file mode 100644
index 0000000..0f27aaa
--- /dev/null
+++ b/lib/mbedtls-2.27.0/programs/random/gen_entropy.c
@@ -0,0 +1,102 @@
+/**
+ * \brief Use and generate multiple entropies calls into a file
+ *
+ * Copyright The Mbed TLS Contributors
+ * SPDX-License-Identifier: Apache-2.0
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may
+ * not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#if !defined(MBEDTLS_CONFIG_FILE)
+#include "mbedtls/config.h"
+#else
+#include MBEDTLS_CONFIG_FILE
+#endif
+
+#if defined(MBEDTLS_PLATFORM_C)
+#include "mbedtls/platform.h"
+#else
+#include <stdio.h>
+#include <stdlib.h>
+#define mbedtls_fprintf fprintf
+#define mbedtls_printf printf
+#define mbedtls_exit exit
+#define MBEDTLS_EXIT_SUCCESS EXIT_SUCCESS
+#define MBEDTLS_EXIT_FAILURE EXIT_FAILURE
+#endif /* MBEDTLS_PLATFORM_C */
+
+#if defined(MBEDTLS_ENTROPY_C) && defined(MBEDTLS_FS_IO)
+#include "mbedtls/entropy.h"
+
+#include <stdio.h>
+#endif
+
+#if !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_FS_IO)
+int main( void )
+{
+ mbedtls_printf("MBEDTLS_ENTROPY_C and/or MBEDTLS_FS_IO not defined.\n");
+ mbedtls_exit( 0 );
+}
+#else
+
+
+int main( int argc, char *argv[] )
+{
+ FILE *f;
+ int i, k, ret = 1;
+ int exit_code = MBEDTLS_EXIT_FAILURE;
+ mbedtls_entropy_context entropy;
+ unsigned char buf[MBEDTLS_ENTROPY_BLOCK_SIZE];
+
+ if( argc < 2 )
+ {
+ mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] );
+ mbedtls_exit( exit_code );
+ }
+
+ if( ( f = fopen( argv[1], "wb+" ) ) == NULL )
+ {
+ mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] );
+ mbedtls_exit( exit_code );
+ }
+
+ mbedtls_entropy_init( &entropy );
+
+ for( i = 0, k = 768; i < k; i++ )
+ {
+ ret = mbedtls_entropy_func( &entropy, buf, sizeof( buf ) );
+ if( ret != 0 )
+ {
+ mbedtls_printf( " failed\n ! mbedtls_entropy_func returned -%04X\n",
+ (unsigned int) ret );
+ goto cleanup;
+ }
+
+ fwrite( buf, 1, sizeof( buf ), f );
+
+ mbedtls_printf( "Generating %ldkb of data in file '%s'... %04.1f" \
+ "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k );
+ fflush( stdout );
+ }
+
+ exit_code = MBEDTLS_EXIT_SUCCESS;
+
+cleanup:
+ mbedtls_printf( "\n" );
+
+ fclose( f );
+ mbedtls_entropy_free( &entropy );
+
+ mbedtls_exit( exit_code );
+}
+#endif /* MBEDTLS_ENTROPY_C */
diff --git a/lib/mbedtls-2.27.0/programs/random/gen_random_ctr_drbg.c b/lib/mbedtls-2.27.0/programs/random/gen_random_ctr_drbg.c
new file mode 100644
index 0000000..158a312
--- /dev/null
+++ b/lib/mbedtls-2.27.0/programs/random/gen_random_ctr_drbg.c
@@ -0,0 +1,135 @@
+/**
+ * \brief Use and generate random data into a file via the CTR_DBRG based on AES
+ *
+ * Copyright The Mbed TLS Contributors
+ * SPDX-License-Identifier: Apache-2.0
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may
+ * not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#if !defined(MBEDTLS_CONFIG_FILE)
+#include "mbedtls/config.h"
+#else
+#include MBEDTLS_CONFIG_FILE
+#endif
+
+#if defined(MBEDTLS_PLATFORM_C)
+#include "mbedtls/platform.h"
+#else
+#include <stdio.h>
+#include <stdlib.h>
+#define mbedtls_fprintf fprintf
+#define mbedtls_printf printf
+#define mbedtls_exit exit
+#define MBEDTLS_EXIT_SUCCESS EXIT_SUCCESS
+#define MBEDTLS_EXIT_FAILURE EXIT_FAILURE
+#endif /* MBEDTLS_PLATFORM_C */
+
+#if defined(MBEDTLS_CTR_DRBG_C) && defined(MBEDTLS_ENTROPY_C) && \
+ defined(MBEDTLS_FS_IO)
+#include "mbedtls/entropy.h"
+#include "mbedtls/ctr_drbg.h"
+
+#include <stdio.h>
+#endif
+
+#if !defined(MBEDTLS_CTR_DRBG_C) || !defined(MBEDTLS_ENTROPY_C) || \
+ !defined(MBEDTLS_FS_IO)
+int main( void )
+{
+ mbedtls_printf("MBEDTLS_CTR_DRBG_C and/or MBEDTLS_ENTROPY_C and/or MBEDTLS_FS_IO not defined.\n");
+ mbedtls_exit( 0 );
+}
+#else
+
+
+int main( int argc, char *argv[] )
+{
+ FILE *f;
+ int i, k, ret = 1;
+ int exit_code = MBEDTLS_EXIT_FAILURE;
+ mbedtls_ctr_drbg_context ctr_drbg;
+ mbedtls_entropy_context entropy;
+ unsigned char buf[1024];
+
+ mbedtls_ctr_drbg_init( &ctr_drbg );
+
+ if( argc < 2 )
+ {
+ mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] );
+ mbedtls_exit( exit_code );
+ }
+
+ if( ( f = fopen( argv[1], "wb+" ) ) == NULL )
+ {
+ mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] );
+ mbedtls_exit( exit_code );
+ }
+
+ mbedtls_entropy_init( &entropy );
+ ret = mbedtls_ctr_drbg_seed( &ctr_drbg, mbedtls_entropy_func, &entropy, (const unsigned char *) "RANDOM_GEN", 10 );
+ if( ret != 0 )
+ {
+ mbedtls_printf( "failed in mbedtls_ctr_drbg_seed: %d\n", ret );
+ goto cleanup;
+ }
+ mbedtls_ctr_drbg_set_prediction_resistance( &ctr_drbg, MBEDTLS_CTR_DRBG_PR_OFF );
+
+#if defined(MBEDTLS_FS_IO)
+ ret = mbedtls_ctr_drbg_update_seed_file( &ctr_drbg, "seedfile" );
+
+ if( ret == MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR )
+ {
+ mbedtls_printf( "Failed to open seedfile. Generating one.\n" );
+ ret = mbedtls_ctr_drbg_write_seed_file( &ctr_drbg, "seedfile" );
+ if( ret != 0 )
+ {
+ mbedtls_printf( "failed in mbedtls_ctr_drbg_write_seed_file: %d\n", ret );
+ goto cleanup;
+ }
+ }
+ else if( ret != 0 )
+ {
+ mbedtls_printf( "failed in mbedtls_ctr_drbg_update_seed_file: %d\n", ret );
+ goto cleanup;
+ }
+#endif
+
+ for( i = 0, k = 768; i < k; i++ )
+ {
+ ret = mbedtls_ctr_drbg_random( &ctr_drbg, buf, sizeof( buf ) );
+ if( ret != 0 )
+ {
+ mbedtls_printf("failed!\n");
+ goto cleanup;
+ }
+
+ fwrite( buf, 1, sizeof( buf ), f );
+
+ mbedtls_printf( "Generating %ldkb of data in file '%s'... %04.1f" \
+ "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k );
+ fflush( stdout );
+ }
+
+ exit_code = MBEDTLS_EXIT_SUCCESS;
+
+cleanup:
+ mbedtls_printf("\n");
+
+ fclose( f );
+ mbedtls_ctr_drbg_free( &ctr_drbg );
+ mbedtls_entropy_free( &entropy );
+
+ mbedtls_exit( exit_code );
+}
+#endif /* MBEDTLS_CTR_DRBG_C && MBEDTLS_ENTROPY_C */
diff --git a/lib/mbedtls-2.27.0/programs/random/gen_random_havege.c b/lib/mbedtls-2.27.0/programs/random/gen_random_havege.c
new file mode 100644
index 0000000..e82e627
--- /dev/null
+++ b/lib/mbedtls-2.27.0/programs/random/gen_random_havege.c
@@ -0,0 +1,107 @@
+/**
+ * \brief Generate random data into a file
+ *
+ * Copyright The Mbed TLS Contributors
+ * SPDX-License-Identifier: Apache-2.0
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may
+ * not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#if !defined(MBEDTLS_CONFIG_FILE)
+#include "mbedtls/config.h"
+#else
+#include MBEDTLS_CONFIG_FILE
+#endif
+
+#if defined(MBEDTLS_PLATFORM_C)
+#include "mbedtls/platform.h"
+#else
+#include <stdio.h>
+#include <stdlib.h>
+#define mbedtls_fprintf fprintf
+#define mbedtls_printf printf
+#define mbedtls_exit exit
+#define MBEDTLS_EXIT_SUCCESS EXIT_SUCCESS
+#define MBEDTLS_EXIT_FAILURE EXIT_FAILURE
+#endif /* MBEDTLS_PLATFORM_C */
+
+#if defined(MBEDTLS_HAVEGE_C) && defined(MBEDTLS_FS_IO)
+#include "mbedtls/havege.h"
+
+#include <stdio.h>
+#include <time.h>
+#endif
+
+#if !defined(MBEDTLS_HAVEGE_C) || !defined(MBEDTLS_FS_IO)
+int main( void )
+{
+ mbedtls_printf("MBEDTLS_HAVEGE_C not defined.\n");
+ mbedtls_exit( 0 );
+}
+#else
+
+
+int main( int argc, char *argv[] )
+{
+ FILE *f;
+ time_t t;
+ int i, k, ret = 1;
+ int exit_code = MBEDTLS_EXIT_FAILURE;
+ mbedtls_havege_state hs;
+ unsigned char buf[1024];
+
+ if( argc < 2 )
+ {
+ mbedtls_fprintf( stderr, "usage: %s <output filename>\n", argv[0] );
+ mbedtls_exit( exit_code );
+ }
+
+ if( ( f = fopen( argv[1], "wb+" ) ) == NULL )
+ {
+ mbedtls_printf( "failed to open '%s' for writing.\n", argv[1] );
+ mbedtls_exit( exit_code );
+ }
+
+ mbedtls_havege_init( &hs );
+
+ t = time( NULL );
+
+ for( i = 0, k = 768; i < k; i++ )
+ {
+ if( ( ret = mbedtls_havege_random( &hs, buf, sizeof( buf ) ) ) != 0 )
+ {
+ mbedtls_printf( " failed\n ! mbedtls_havege_random returned -0x%04X",
+ ( unsigned int ) -ret );
+ goto exit;
+ }
+
+ fwrite( buf, sizeof( buf ), 1, f );
+
+ mbedtls_printf( "Generating %ldkb of data in file '%s'... %04.1f" \
+ "%% done\r", (long)(sizeof(buf) * k / 1024), argv[1], (100 * (float) (i + 1)) / k );
+ fflush( stdout );
+ }
+
+ if( t == time( NULL ) )
+ t--;
+
+ mbedtls_printf(" \n ");
+
+ exit_code = MBEDTLS_EXIT_SUCCESS;
+
+exit:
+ mbedtls_havege_free( &hs );
+ fclose( f );
+ mbedtls_exit( exit_code );
+}
+#endif /* MBEDTLS_HAVEGE_C */