/openssl/crypto/rand/ |
H A D | rand_pool.c | 23 size_t min_len, size_t max_len) in ossl_rand_pool_new() argument 34 pool->max_len = (max_len > RAND_POOL_MAX_LENGTH) ? in ossl_rand_pool_new() 35 RAND_POOL_MAX_LENGTH : max_len; in ossl_rand_pool_new() 37 if (pool->alloc_len > pool->max_len) in ossl_rand_pool_new() 38 pool->alloc_len = pool->max_len; in ossl_rand_pool_new() 209 const size_t limit = pool->max_len / 2; in rand_pool_grow() 258 if (bytes_needed > pool->max_len - pool->len) { in ossl_rand_pool_bytes_needed() 283 pool->max_len = pool->len = 0; in ossl_rand_pool_bytes_needed() 293 return pool->max_len - pool->len; in ossl_rand_pool_bytes_remaining() 308 if (len > pool->max_len - pool->len) { in ossl_rand_pool_add() [all …]
|
H A D | prov_seed.c | 17 size_t min_len, size_t max_len) in ossl_rand_get_entropy() argument 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy() 48 unsigned char **pout, size_t min_len, size_t max_len, in ossl_rand_get_nonce() argument 54 pool = ossl_rand_pool_new(0, 0, min_len, max_len); in ossl_rand_get_nonce()
|
/openssl/crypto/asn1/ |
H A D | evp_asn1.c | 34 int ASN1_TYPE_get_octetstring(const ASN1_TYPE *a, unsigned char *data, int max_len) in ASN1_TYPE_get_octetstring() argument 45 if (ret < max_len) in ASN1_TYPE_get_octetstring() 48 num = max_len; in ASN1_TYPE_get_octetstring() 64 long *num, unsigned char *data, int max_len) in asn1_type_get_int_oct() argument 71 if (max_len > ret) in asn1_type_get_int_oct() 74 n = max_len; in asn1_type_get_int_oct() 110 unsigned char *data, int max_len) in ASN1_TYPE_get_int_octetstring() argument 124 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); in ASN1_TYPE_get_int_octetstring() 166 unsigned char *data, int max_len) in ossl_asn1_type_get_octetstring_int() argument 179 ret = asn1_type_get_int_oct(atmp->oct, atmp->num, num, data, max_len); in ossl_asn1_type_get_octetstring_int()
|
H A D | asn1_lib.c | 439 const char *sep, size_t max_len) in ossl_sk_ASN1_UTF8STRING2text() argument 456 if (max_len != 0 && length > max_len) in ossl_sk_ASN1_UTF8STRING2text()
|
/openssl/providers/common/ |
H A D | provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() argument 53 pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 64 size_t min_len, size_t max_len, in ossl_prov_get_nonce() argument 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/openssl/providers/implementations/include/prov/ |
H A D | seeding.h | 34 int entropy, size_t min_len, size_t max_len); 38 size_t min_len, size_t max_len,
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 15 size_t min_len, size_t max_len); 20 size_t max_len, const void *salt, size_t salt_len); 28 stored in a buffer which contains at least I<min_len> and at most I<max_len> 41 most I<max_len> bytes. The buffer address is stored in I<*pout> and the
|
/openssl/include/crypto/ |
H A D | rand.h | 113 size_t min_len, size_t max_len); 117 unsigned char **pout, size_t min_len, size_t max_len,
|
H A D | rand_pool.h | 79 size_t max_len; /* maximum number of random bytes (allocated buffer size) */ member 86 size_t min_len, size_t max_len);
|
H A D | asn1.h | 137 unsigned char *data, int max_len);
|
/openssl/providers/implementations/rands/ |
H A D | drbg.c | 147 size_t max_len, int prediction_resistance, in ossl_drbg_get_seed() argument 158 if (bytes_needed > max_len) in ossl_drbg_get_seed() 159 bytes_needed = max_len; in ossl_drbg_get_seed() 196 size_t min_len, size_t max_len, in get_entropy() argument 204 return ossl_crngt_get_entropy(drbg, pout, entropy, min_len, max_len, in get_entropy() 208 max_len); in get_entropy() 243 min_len, max_len, prediction_resistance, in get_entropy() 308 size_t min_len, size_t max_len) in prov_drbg_get_nonce() argument 342 return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, in prov_drbg_get_nonce()
|
H A D | test_rng.c | 231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument 239 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed()
|
H A D | crngt.c | 99 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() argument 139 if (bytes_needed > max_len) in ossl_crngt_get_entropy()
|
H A D | seed_src.c | 178 int entropy, size_t min_len, size_t max_len, in seed_get_seed() argument 194 if (bytes_needed > max_len) { in seed_get_seed()
|
H A D | drbg_local.h | 254 int entropy, size_t min_len, size_t max_len,
|
/openssl/crypto/ec/ |
H A D | ec_mult.c | 426 size_t max_len = 0; in ossl_ec_wNAF_mul() local 545 if (wNAF_len[i] > max_len) in ossl_ec_wNAF_mul() 546 max_len = wNAF_len[i]; in ossl_ec_wNAF_mul() 575 if (tmp_len <= max_len) { in ossl_ec_wNAF_mul() 641 if (wNAF_len[i] > max_len) in ossl_ec_wNAF_mul() 642 max_len = wNAF_len[i]; in ossl_ec_wNAF_mul() 722 for (k = max_len - 1; k >= 0; k--) { in ossl_ec_wNAF_mul()
|
/openssl/crypto/ |
H A D | params.c | 1252 size_t *max_len, size_t *used_len, in get_string_internal() argument 1292 *max_len = alloc_sz; in get_string_internal() 1295 if (*max_len < sz) { in get_string_internal() 1303 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len) in OSSL_PARAM_get_utf8_string() argument 1305 int ret = get_string_internal(p, (void **)val, &max_len, NULL, in OSSL_PARAM_get_utf8_string() 1323 if (data_length >= max_len) in OSSL_PARAM_get_utf8_string() 1325 if (data_length >= max_len) { in OSSL_PARAM_get_utf8_string() 1334 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len, in OSSL_PARAM_get_octet_string() argument 1337 return get_string_internal(p, val, &max_len, used_len, in OSSL_PARAM_get_octet_string()
|
H A D | packet.c | 531 int WPACKET_start_quic_sub_packet_bound(WPACKET *pkt, size_t max_len) in WPACKET_start_quic_sub_packet_bound() argument 533 size_t enclen = ossl_quic_vlint_encode_len(max_len); in WPACKET_start_quic_sub_packet_bound()
|
/openssl/include/openssl/ |
H A D | params.h | 131 int OSSL_PARAM_get_utf8_string(const OSSL_PARAM *p, char **val, size_t max_len); 134 int OSSL_PARAM_get_octet_string(const OSSL_PARAM *p, void **val, size_t max_len,
|
H A D | core_dispatch.h | 190 size_t min_len, size_t max_len)) 195 size_t max_len, const void *salt, 500 int entropy, size_t min_len, size_t max_len,
|
/openssl/doc/man3/ |
H A D | OSSL_PARAM_int.pod | 88 size_t max_len); 92 size_t max_len, size_t *used_len); 243 The string is stored into I<*val> with a size limit of I<max_len>, 247 terminating NUL byte) and I<max_len> is ignored. 264 The OCTETs are either stored into I<*val> with a length limit of I<max_len> or, 266 I<max_len> is ignored. I<*used_len> is populated with the number of OCTETs
|
/openssl/include/internal/ |
H A D | cryptlib.h | 155 const char *sep, size_t max_len);
|
/openssl/ssl/statem/ |
H A D | statem_dtls.c | 437 size_t max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; in dtls1_max_handshake_message_len() local 438 if (max_len < s->max_cert_list) in dtls1_max_handshake_message_len() 440 return max_len; in dtls1_max_handshake_message_len()
|
/openssl/doc/man7/ |
H A D | provider-rand.pod | 44 int entropy, size_t min_len, size_t max_len, 124 and I<max_len> inclusive bytes in total. If I<prediction_resistance> is
|
H A D | provider-base.pod | 78 size_t min_len, size_t max_len); 82 unsigned char **pout, size_t min_len, size_t max_len, 301 output will have at least I<min_len> and at most I<max_len> bytes. 314 most I<max_len> bytes. The buffer address is stored in I<*pout> and the
|