5 const struct _prng_descriptor yarrow_desc =
14 int yarrow_start(prng_state *prng)
18 _ARGCHK(prng != NULL);
20 /* these are the default hash/cipher combo used */
22 prng->yarrow.cipher = register_cipher(&rijndael_desc);
23 #elif defined(NOEKEON)
24 prng->yarrow.cipher = register_cipher(&noekeon_desc);
25 #elif defined(BLOWFISH)
26 prng->yarrow.cipher = register_cipher(&blowfish_desc);
27 #elif defined(TWOFISH)
28 prng->yarrow.cipher = register_cipher(&twofish_desc);
30 prng->yarrow.cipher = register_cipher(&cast5_desc);
32 prng->yarrow.cipher = register_cipher(&saferp_desc);
34 prng->yarrow.cipher = register_cipher(&rc5_desc);
36 prng->yarrow.cipher = register_cipher(&rc6_desc);
38 prng->yarrow.cipher = register_cipher(&xtea_desc);
40 prng->yarrow.cipher = register_cipher(&rc2_desc);
42 prng->yarrow.cipher = register_cipher(&des3_desc);
44 #error YARROW needs at least one CIPHER
46 if ((err = cipher_is_valid(prng->yarrow.cipher)) != CRYPT_OK) {
51 prng->yarrow.hash = register_hash(&sha256_desc);
53 prng->yarrow.hash = register_hash(&sha512_desc);
55 prng->yarrow.hash = register_hash(&sha384_desc);
57 prng->yarrow.hash = register_hash(&sha1_desc);
59 prng->yarrow.hash = register_hash(&tiger_desc);
61 prng->yarrow.hash = register_hash(&md5_desc);
63 prng->yarrow.hash = register_hash(&md4_desc);
65 prng->yarrow.hash = register_hash(&md2_desc);
67 #error YARROW needs at least one HASH
69 if ((err = hash_is_valid(prng->yarrow.hash)) != CRYPT_OK) {
73 /* zero the memory used */
74 zeromem(prng->yarrow.pool, sizeof(prng->yarrow.pool));
79 int yarrow_add_entropy(const unsigned char *buf, unsigned long len, prng_state *prng)
85 _ARGCHK(prng != NULL);
87 if ((err = hash_is_valid(prng->yarrow.hash)) != CRYPT_OK) {
92 hash_descriptor[prng->yarrow.hash].init(&md);
94 /* hash the current pool */
95 hash_descriptor[prng->yarrow.hash].process(&md, prng->yarrow.pool, hash_descriptor[prng->yarrow.hash].hashsize);
97 /* add the new entropy */
98 hash_descriptor[prng->yarrow.hash].process(&md, buf, len);
101 hash_descriptor[prng->yarrow.hash].done(&md, prng->yarrow.pool);
106 int yarrow_ready(prng_state *prng)
110 _ARGCHK(prng != NULL);
112 if ((err = hash_is_valid(prng->yarrow.hash)) != CRYPT_OK) {
116 if ((err = cipher_is_valid(prng->yarrow.cipher)) != CRYPT_OK) {
120 /* setup CTR mode using the "pool" as the key */
121 ks = (int)hash_descriptor[prng->yarrow.hash].hashsize;
122 if ((err = cipher_descriptor[prng->yarrow.cipher].keysize(&ks)) != CRYPT_OK) {
126 if ((err = ctr_start(prng->yarrow.cipher, prng->yarrow.pool, prng->yarrow.pool, ks, 0, &prng->yarrow.ctr)) != CRYPT_OK) {
132 unsigned long yarrow_read(unsigned char *buf, unsigned long len, prng_state *prng)
134 _ARGCHK(buf != NULL);
135 _ARGCHK(prng != NULL);
137 /* put buf in predictable state first */
140 /* now randomize it */
141 if (ctr_encrypt(buf, buf, len, &prng->yarrow.ctr) != CRYPT_OK) {