/openssl/apps/ |
H A D | ts.c | 560 ASN1_INTEGER *nonce = NULL; in create_nonce() local 572 if ((nonce = ASN1_INTEGER_new()) == NULL) in create_nonce() 574 OPENSSL_free(nonce->data); in create_nonce() 575 nonce->length = len - i; in create_nonce() 576 nonce->data = app_malloc(nonce->length + 1, "nonce buffer"); in create_nonce() 577 memcpy(nonce->data, buf + i, nonce->length); in create_nonce() 578 return nonce; in create_nonce() 582 ASN1_INTEGER_free(nonce); in create_nonce()
|
/openssl/providers/implementations/rands/ |
H A D | drbg.c | 352 unsigned char *nonce = NULL, *entropy = NULL; in ossl_prov_drbg_instantiate() local 392 nonce = OPENSSL_malloc(noncelen); in ossl_prov_drbg_instantiate() 393 if (nonce == NULL) { in ossl_prov_drbg_instantiate() 397 if (noncelen != drbg->parent_nonce(drbg->parent, nonce, in ossl_prov_drbg_instantiate() 420 noncelen = prov_drbg_get_nonce(drbg, &nonce, drbg->min_noncelen, in ossl_prov_drbg_instantiate() 447 if (!drbg->instantiate(drbg, entropy, entropylen, nonce, noncelen, in ossl_prov_drbg_instantiate() 461 if (nonce != NULL) in ossl_prov_drbg_instantiate() 462 ossl_prov_cleanup_nonce(drbg->provctx, nonce, noncelen); in ossl_prov_drbg_instantiate() 788 const unsigned char *nonce, size_t noncelen, in ossl_rand_drbg_new() argument
|
H A D | drbg_local.h | 76 const unsigned char *nonce, size_t noncelen, 183 const unsigned char *nonce, size_t noncelen,
|
H A D | drbg_hmac.c | 116 const unsigned char *nonce, size_t nonce_len, in ossl_drbg_hmac_init() argument 129 return drbg_hmac_update(hmac, ent, ent_len, nonce, nonce_len, pstr, in ossl_drbg_hmac_init() 134 const unsigned char *nonce, size_t nonce_len, in drbg_hmac_instantiate() argument 138 nonce, nonce_len, pstr, pstr_len); in drbg_hmac_instantiate()
|
H A D | drbg_ctr.c | 264 const unsigned char *nonce, size_t noncelen) in ctr_update() argument 290 if (in1 != NULL || nonce != NULL || in2 != NULL) in ctr_update() 291 if (!ctr_df(ctr, in1, in1len, nonce, noncelen, in2, in2len)) in ctr_update() 309 const unsigned char *nonce, size_t noncelen, in drbg_ctr_instantiate() argument 323 if (!ctr_update(drbg, entropy, entropylen, pers, perslen, nonce, noncelen)) in drbg_ctr_instantiate()
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-armv4.pl | 342 my ($ctx,$mac,$nonce)=map("r$_",(0..2)); 366 ldr $g0,[$nonce,#0] 371 ldr $g1,[$nonce,#4] 376 ldr $g2,[$nonce,#8] 381 ldr $g3,[$nonce,#12] 1195 ldr $g0,[$nonce,#0] 1198 ldr $g1,[$nonce,#4] 1201 ldr $g2,[$nonce,#8] 1204 ldr $g3,[$nonce,#12]
|
H A D | poly1305-sparcv9.pl | 372 my ($mac,$nonce) = ($inp,$len); 394 ld [$nonce+0],$r0 ! load nonce 396 ld [$nonce+4],$r1 398 ld [$nonce+8],$r2 400 ld [$nonce+12],$r3 919 my ($mac,$nonce)=($inp,$len); 971 ld [$nonce+0],$d0 ! load nonce 975 ld [$nonce+4],$d1 979 ld [$nonce+8],$d2 981 ld [$nonce+12],$d3
|
H A D | poly1305-ppcfp.pl | 550 my ($mac,$nonce)=($inp,$len); 613 lwz $d0,0($nonce) # load nonce 617 lwz $d1,4($nonce) 621 lwz $d2,8($nonce) 623 lwz $d3,12($nonce) 656 ld $d2,0($nonce) # load nonce 657 ld $d3,8($nonce)
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_ctx_set1_caPubs.pod | 29 const ASN1_OCTET_STRING *nonce); 53 ossl_cmp_ctx_set1_recipNonce() sets the given recipient nonce in the context.
|
/openssl/crypto/ts/ |
H A D | ts_rsp_print.c | 154 if (a->nonce == NULL) in TS_TST_INFO_print_bio() 157 TS_ASN1_INTEGER_print_bio(bio, a->nonce); in TS_TST_INFO_print_bio()
|
H A D | ts_asn1.c | 49 ASN1_OPT(TS_REQ, nonce, ASN1_INTEGER), 94 ASN1_OPT(TS_TST_INFO, nonce, ASN1_INTEGER),
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_ccm.h | 36 } nonce; member
|
H A D | cipher_chacha20_poly1305.h | 22 unsigned int nonce[12 / 4]; member
|
H A D | cipher_aes_gcm_siv_hw.c | 59 memcpy(&data.block[sizeof(data.counter)], ctx->nonce, NONCE_SIZE); in aes_gcm_siv_initkey() 193 S_s[i] ^= ctx->nonce[i]; in aes_gcm_siv_encrypt() 258 S_s[i] ^= ctx->nonce[i]; in aes_gcm_siv_decrypt()
|
H A D | cipher_aes_gcm_siv.c | 110 if (ivlen != sizeof(ctx->nonce)) { in ossl_aes_gcm_siv_init() 114 memcpy(ctx->nonce, iv, sizeof(ctx->nonce)); in ossl_aes_gcm_siv_init()
|
H A D | cipher_aes_gcm_siv.h | 46 uint8_t nonce[NONCE_SIZE]; /* from user */ member
|
/openssl/providers/implementations/include/prov/ |
H A D | hmac_drbg.h | 27 const unsigned char *nonce, size_t nonce_len,
|
/openssl/crypto/ |
H A D | deterministic_nonce.c | 133 const unsigned char *nonce, size_t noncelen, in kdf_setup() argument 155 (void *)nonce, noncelen); in kdf_setup()
|
/openssl/crypto/evp/ |
H A D | evp_rand.c | 38 OSSL_FUNC_rand_nonce_fn *nonce; member 177 if (rand->nonce != NULL) in evp_rand_from_algorithm() 179 rand->nonce = OSSL_FUNC_rand_nonce(fns); in evp_rand_from_algorithm() 649 if (ctx->meth->nonce == NULL) in evp_rand_nonce_locked() 651 if (ctx->meth->nonce(ctx->algctx, out, str, outlen, outlen)) in evp_rand_nonce_locked()
|
H A D | e_aes.c | 986 } nonce; member 1795 ctx->aes.ccm.nonce.g[1] = mlen; in s390x_aes_ccm_setiv() 1796 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l); in s390x_aes_ccm_setiv() 1876 flags = ctx->aes.ccm.nonce.b[0]; in s390x_aes_ccm() 1883 ctx->aes.ccm.nonce.b[0] = l; in s390x_aes_ccm() 1891 n |= ctx->aes.ccm.nonce.b[i]; in s390x_aes_ccm() 1892 ctx->aes.ccm.nonce.b[i] = 0; in s390x_aes_ccm() 1895 n |= ctx->aes.ccm.nonce.b[15]; in s390x_aes_ccm() 1896 ctx->aes.ccm.nonce.b[15] = 1; in s390x_aes_ccm() 1947 ctx->aes.ccm.nonce.b[i] = 0; in s390x_aes_ccm() [all …]
|
/openssl/crypto/poly1305/ |
H A D | poly1305_ieee754.c | 430 void poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) in poly1305_emit() 479 g0 = (u32)(t = (u64)g0 + nonce[0]); in poly1305_emit() 480 g1 = (u32)(t = (u64)g1 + (t >> 32) + nonce[1]); in poly1305_emit() 481 g2 = (u32)(t = (u64)g2 + (t >> 32) + nonce[2]); in poly1305_emit() 482 g3 = (u32)(t = (u64)g3 + (t >> 32) + nonce[3]); in poly1305_emit()
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ECDSA.pod | 69 =item "nonce-type" (B<OSSL_SIGNATURE_PARAM_NONCE_TYPE>) <unsigned integer> 88 =item "nonce-type" (B<OSSL_SIGNATURE_PARAM_NONCE_TYPE>) <unsigned integer>
|
H A D | EVP_SIGNATURE-DSA.pod | 76 =item "nonce-type" (B<OSSL_SIGNATURE_PARAM_NONCE_TYPE>) <unsigned integer> 97 =item "nonce-type" (B<OSSL_SIGNATURE_PARAM_NONCE_TYPE>) <unsigned integer>
|
/openssl/crypto/hpke/ |
H A D | hpke.c | 63 unsigned char *nonce; /* aead base nonce */ member 433 buf[i] ^= ctx->nonce[i]; in hpke_seqnonce2buf() 748 ctx->nonce = OPENSSL_malloc(ctx->noncelen); in hpke_do_middle() 749 if (ctx->nonce == NULL) in hpke_do_middle() 751 if (ossl_hpke_labeled_expand(kctx, ctx->nonce, ctx->noncelen, in hpke_do_middle() 859 OPENSSL_clear_free(ctx->nonce, ctx->noncelen); in OSSL_HPKE_CTX_free() 1173 if (ctx->key == NULL || ctx->nonce == NULL) { in OSSL_HPKE_seal() 1215 if (ctx->key == NULL || ctx->nonce == NULL) { in OSSL_HPKE_open()
|
/openssl/doc/man1/ |
H A D | openssl-ocsp.pod.in | 22 [B<-nonce>] 146 =item B<-nonce>, B<-no_nonce> 148 Add an OCSP nonce extension to a request or disable OCSP nonce addition. 150 nonce is added: using the B<-nonce> option will force addition of a nonce. 152 a nonce is automatically added specifying B<-no_nonce> overrides this. 247 Don't attempt to verify the OCSP response signature or the nonce
|