/openssl/crypto/rand/ |
H A D | rand_pool.c | 32 pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ? in ossl_rand_pool_new() 33 RAND_POOL_MAX_LENGTH : max_len; in ossl_rand_pool_new() 35 if (pool->alloc_len > pool->max_len) in ossl_rand_pool_new() 36 pool->alloc_len = pool->max_len; in ossl_rand_pool_new() 203 const size_t limit = pool->max_len / 2; in rand_pool_grow() 250 if (bytes_needed > pool->max_len - pool->len) { in ossl_rand_pool_bytes_needed() 256 pool->max_len, pool->len); in ossl_rand_pool_bytes_needed() 279 pool->max_len = pool->len = 0; in ossl_rand_pool_bytes_needed() 289 return pool->max_len - pool->len; in ossl_rand_pool_bytes_remaining() 304 if (len > pool->max_len - pool->len) { in ossl_rand_pool_add() [all …]
|
H A D | prov_seed.c | 20 size_t min_len, size_t max_len) in ossl_rand_get_entropy() argument 26 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy() 46 size_t min_len, size_t max_len) in ossl_rand_get_user_entropy() argument 51 return evp_rand_get_seed(rng, pout, entropy, min_len, max_len, in ossl_rand_get_user_entropy() 54 return ossl_rand_get_entropy(ctx, pout, entropy, min_len, max_len); in ossl_rand_get_user_entropy() 76 size_t min_len, ossl_unused size_t max_len, in ossl_rand_get_nonce() argument 82 pool = ossl_rand_pool_new(0, 0, min_len, max_len); in ossl_rand_get_nonce() 102 size_t min_len, size_t max_len, in ossl_rand_get_user_nonce() argument 109 return ossl_rand_get_nonce(ctx, pout, min_len, max_len, salt, salt_len); in ossl_rand_get_user_nonce()
|
/openssl/ssl/quic/ |
H A D | quic_rstream.c | 98 size_t max_len; in read_internal() local 103 if (max_len < l) { in read_internal() 104 memcpy(buf, data, max_len); in read_internal() 105 size -= max_len; in read_internal() 106 buf += max_len; in read_internal() 107 readbytes_ += max_len; in read_internal() 108 l -= max_len; in read_internal() 196 size_t rec_len_, max_len; in ossl_quic_rstream_get_record() local 217 &max_len); in ossl_quic_rstream_get_record() 220 if (max_len < rec_len_) { in ossl_quic_rstream_get_record() [all …]
|
H A D | quic_sstream.c | 98 uint64_t max_len; in ossl_quic_sstream_get_stream_frame() local 131 max_len = range->range.end - range->range.start + 1; in ossl_quic_sstream_get_stream_frame() 134 if (total_len >= max_len) in ossl_quic_sstream_get_stream_frame() 147 if (total_len + src_len > max_len) in ossl_quic_sstream_get_stream_frame() 148 src_len = (size_t)(max_len - total_len); in ossl_quic_sstream_get_stream_frame()
|
/openssl/crypto/asn1/ |
H A D | evp_asn1.c | 34 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) in ASN1_TYPE_get_octetstring() argument 45 if (ret < max_len) in ASN1_TYPE_get_octetstring() 48 num = max_len; in ASN1_TYPE_get_octetstring() 64 long *num, unsigned char *data, int max_len) in asn1_type_get_int_oct() argument 71 if (max_len > ret) in asn1_type_get_int_oct() 74 n = max_len; in asn1_type_get_int_oct() 110 unsigned char *data, int max_len) in ASN1_TYPE_get_int_octetstring() argument 124 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); in ASN1_TYPE_get_int_octetstring() 166 unsigned char *data, int max_len) in ossl_asn1_type_get_octetstring_int() argument 179 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); in ossl_asn1_type_get_octetstring_int()
|
H A D | asn1_lib.c | 436 const char *sep, size_t max_len) in ossl_sk_ASN1_UTF8STRING2text() argument 453 if (max_len != 0 && length > max_len) in ossl_sk_ASN1_UTF8STRING2text()
|
/openssl/providers/common/ |
H A D | provider_seeding.c | 83 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() argument 88 return c_get_user_entropy(handle, pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 90 return c_get_entropy(handle, pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 106 size_t min_len, size_t max_len, in ossl_prov_get_nonce() argument 112 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 114 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/openssl/include/crypto/ |
H A D | rand.h | 113 size_t min_len, size_t max_len); 116 size_t min_len, size_t max_len); 122 unsigned char **pout, size_t min_len, size_t max_len, 125 size_t min_len, size_t max_len,
|
H A D | rand_pool.h | 79 size_t max_len; /* maximum number of random bytes (allocated buffer size) */ member 86 size_t min_len, size_t max_len);
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 17 size_t min_len, size_t max_len); 20 size_t min_len, size_t max_len); 27 size_t max_len, const void *salt, size_t salt_len); 29 size_t min_len, size_t max_len, 40 stored in a buffer which contains at least I<min_len> and at most I<max_len> 62 most I<max_len> bytes. The buffer address is stored in I<*pout> and the
|
/openssl/providers/implementations/include/prov/ |
H A D | seeding.h | 23 int entropy, size_t min_len, size_t max_len); 27 size_t min_len, size_t max_len,
|
/openssl/providers/implementations/rands/ |
H A D | drbg.c | 146 size_t max_len, int prediction_resistance, in ossl_drbg_get_seed() argument 157 if (bytes_needed > max_len) in ossl_drbg_get_seed() 158 bytes_needed = max_len; in ossl_drbg_get_seed() 193 size_t min_len, size_t max_len, in get_entropy() argument 205 max_len); in get_entropy() 239 min_len, max_len, prediction_resistance, in get_entropy() 300 size_t min_len, size_t max_len) in prov_drbg_get_nonce() argument 335 return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, in prov_drbg_get_nonce()
|
H A D | test_rng.c | 289 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument 297 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed()
|
H A D | seed_src.c | 176 int entropy, size_t min_len, size_t max_len, in seed_get_seed() argument 185 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in seed_get_seed()
|
H A D | fips_crng_test.c | 284 size_t max_len, in crng_test_get_seed() argument 297 min_len, max_len); in crng_test_get_seed() 309 min_len, max_len, prediction_resistance, in crng_test_get_seed()
|
H A D | seed_src_jitter.c | 263 size_t max_len, in jitter_get_seed() argument 274 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in jitter_get_seed()
|
/openssl/crypto/ec/ |
H A D | ec_mult.c | 420 size_t max_len = 0; in ossl_ec_wNAF_mul() local 537 if (wNAF_len[i] > max_len) in ossl_ec_wNAF_mul() 538 max_len = wNAF_len[i]; in ossl_ec_wNAF_mul() 567 if (tmp_len <= max_len) { in ossl_ec_wNAF_mul() 632 if (wNAF_len[i] > max_len) in ossl_ec_wNAF_mul() 633 max_len = wNAF_len[i]; in ossl_ec_wNAF_mul() 711 for (k = max_len - 1; k >= 0; k--) { in ossl_ec_wNAF_mul()
|
/openssl/crypto/ |
H A D | params.c | 1306 size_t *max_len, size_t *used_len, in get_string_internal() argument 1344 *max_len = alloc_sz; in get_string_internal() 1347 if (*max_len < sz) { in get_string_internal() 1355 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len) in OSSL_PARAM_get_utf8_string() argument 1357 int ret = get_string_internal(p, (void **)val, &max_len, NULL, in OSSL_PARAM_get_utf8_string() 1375 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1377 if (data_length >= max_len) { in OSSL_PARAM_get_utf8_string() 1386 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len, in OSSL_PARAM_get_octet_string() argument 1389 return get_string_internal(p, val, &max_len, used_len, in OSSL_PARAM_get_octet_string()
|
/openssl/include/internal/ |
H A D | ring_buf.h | 148 size_t *max_len) in ring_buf_get_ptr() argument 156 *max_len = r->alloc - idx; in ring_buf_get_ptr()
|
H A D | packet_quic.h | 133 __owur int WPACKET_start_quic_sub_packet_bound(WPACKET *pkt, size_t max_len);
|
/openssl/include/openssl/ |
H A D | params.h | 134 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len); 137 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len,
|
H A D | core_dispatch.h | 200 size_t min_len, size_t max_len)) 203 size_t min_len, size_t max_len)) 210 size_t max_len, const void *salt, 214 size_t max_len, const void *salt, 527 int entropy, size_t min_len, size_t max_len,
|
/openssl/crypto/evp/ |
H A D | evp_rand.c | 704 size_t min_len, size_t max_len, in evp_rand_get_seed_locked() argument 711 entropy, min_len, max_len, in evp_rand_get_seed_locked() 719 int entropy, size_t min_len, size_t max_len, in evp_rand_get_seed() argument 729 entropy, min_len, max_len, in evp_rand_get_seed()
|
/openssl/crypto/bio/ |
H A D | bss_dgram_pair.c | 64 size_t max_len = r->len - r->idx[idx]; in ring_buf_head_tail() local 66 if (idx == 0 && max_len > r->len - r->count) in ring_buf_head_tail() 67 max_len = r->len - r->count; in ring_buf_head_tail() 68 if (idx == 1 && max_len > r->count) in ring_buf_head_tail() 69 max_len = r->count; in ring_buf_head_tail() 72 *len = max_len; in ring_buf_head_tail()
|
/openssl/doc/man3/ |
H A D | OSSL_PARAM_int.pod | 88 size_t max_len); 92 size_t max_len, size_t *used_len); 243 The string is stored into I<*val> with a size limit of I<max_len>, 247 terminating NUL byte) and I<max_len> is ignored. 264 The OCTETs are either stored into I<*val> with a length limit of I<max_len> or, 266 I<max_len> is ignored. I<*used_len> is populated with the number of OCTETs
|