Lines Matching refs:NULL

87     return kem_info != NULL && kem_info->groupname != NULL;  in hpke_kem_id_nist_curve()
109 EVP_PKEY *ret = NULL; in evp_pkey_new_raw_nist_public_key()
115 if (cctx == NULL in evp_pkey_new_raw_nist_public_key()
123 return NULL; in evp_pkey_new_raw_nist_public_key()
147 EVP_CIPHER_CTX *ctx = NULL; in hpke_aead_dec()
157 if ((ctx = EVP_CIPHER_CTX_new()) == NULL) in hpke_aead_dec()
160 if (EVP_DecryptInit_ex(ctx, hctx->aead_ciph, NULL, NULL, NULL) != 1) { in hpke_aead_dec()
165 hctx->noncelen, NULL) != 1) { in hpke_aead_dec()
170 if (EVP_DecryptInit_ex(ctx, NULL, NULL, hctx->key, iv) != 1) { in hpke_aead_dec()
175 if (aadlen != 0 && aad != NULL) { in hpke_aead_dec()
176 if (EVP_DecryptUpdate(ctx, NULL, &len, aad, aadlen) != 1) { in hpke_aead_dec()
223 EVP_CIPHER_CTX *ctx = NULL; in hpke_aead_enc()
238 if ((ctx = EVP_CIPHER_CTX_new()) == NULL) in hpke_aead_enc()
241 if (EVP_EncryptInit_ex(ctx, hctx->aead_ciph, NULL, NULL, NULL) != 1) { in hpke_aead_enc()
246 hctx->noncelen, NULL) != 1) { in hpke_aead_enc()
251 if (EVP_EncryptInit_ex(ctx, NULL, NULL, hctx->key, iv) != 1) { in hpke_aead_enc()
256 if (aadlen != 0 && aad != NULL) { in hpke_aead_enc()
257 if (EVP_EncryptUpdate(ctx, NULL, &len, aad, aadlen) != 1) { in hpke_aead_enc()
323 if ((kem_info_ = ossl_HPKE_KEM_INFO_find_id(suite.kem_id)) == NULL) in hpke_suite_check()
325 if ((kdf_info_ = ossl_HPKE_KDF_INFO_find_id(suite.kdf_id)) == NULL) in hpke_suite_check()
327 if ((aead_info_ = ossl_HPKE_AEAD_INFO_find_id(suite.aead_id)) == NULL) in hpke_suite_check()
330 if (kem_info != NULL) in hpke_suite_check()
332 if (kdf_info != NULL) in hpke_suite_check()
334 if (aead_info != NULL) in hpke_suite_check()
351 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in hpke_random_suite()
352 const OSSL_HPKE_KDF_INFO *kdf_info = NULL; in hpke_random_suite()
353 const OSSL_HPKE_AEAD_INFO *aead_info = NULL; in hpke_random_suite()
357 if (kem_info == NULL) in hpke_random_suite()
361 if (kdf_info == NULL) in hpke_random_suite()
365 if (aead_info == NULL) in hpke_random_suite()
395 const OSSL_HPKE_AEAD_INFO *aead_info = NULL; in hpke_expansion()
396 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in hpke_expansion()
398 if (cipherlen == NULL || enclen == NULL) { in hpke_expansion()
402 if (hpke_suite_check(suite, &kem_info, NULL, &aead_info) != 1) { in hpke_expansion()
424 if (ctx == NULL || blen < sizeof(seq_copy) || blen != ctx->noncelen) in hpke_seqnonce2buf()
452 EVP_PKEY_CTX *pctx = NULL; in hpke_encap()
453 EVP_PKEY *pkR = NULL; in hpke_encap()
454 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in hpke_encap()
456 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0 in hpke_encap()
457 || pub == NULL || publen == 0) { in hpke_encap()
461 if (ctx->shared_secret != NULL) { in hpke_encap()
467 if (kem_info == NULL) { in hpke_encap()
480 if (pkR == NULL) { in hpke_encap()
485 if (pctx == NULL) { in hpke_encap()
492 if (ctx->ikme != NULL) { in hpke_encap()
511 if (EVP_PKEY_encapsulate(pctx, NULL, &lenclen, NULL, &lsslen) != 1) { in hpke_encap()
520 if (ctx->shared_secret == NULL) in hpke_encap()
527 ctx->shared_secret = NULL; in hpke_encap()
552 EVP_PKEY_CTX *pctx = NULL; in hpke_decap()
553 EVP_PKEY *spub = NULL; in hpke_decap()
557 if (ctx == NULL || enc == NULL || enclen == 0 || priv == NULL) { in hpke_decap()
561 if (ctx->shared_secret != NULL) { in hpke_decap()
567 if (pctx == NULL) { in hpke_decap()
577 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in hpke_decap()
580 if (kem_info == NULL) { in hpke_decap()
596 if (spub == NULL) { in hpke_decap()
610 if (EVP_PKEY_decapsulate(pctx, NULL, &lsslen, enc, enclen) != 1) { in hpke_decap()
615 if (ctx->shared_secret == NULL) in hpke_decap()
630 ctx->shared_secret = NULL; in hpke_decap()
655 const OSSL_HPKE_AEAD_INFO *aead_info = NULL; in hpke_do_middle()
656 const OSSL_HPKE_KDF_INFO *kdf_info = NULL; in hpke_do_middle()
659 EVP_KDF_CTX *kctx = NULL; in hpke_do_middle()
661 const char *mdname = NULL; in hpke_do_middle()
664 if (ctx->exportersec != NULL) { in hpke_do_middle()
668 if (ossl_HPKE_KEM_INFO_find_id(ctx->suite.kem_id) == NULL) { in hpke_do_middle()
673 if (aead_info == NULL) { in hpke_do_middle()
678 if (kdf_info == NULL) { in hpke_do_middle()
695 if (ctx->psk == NULL || ctx->psklen == 0 || ctx->pskid == NULL) { in hpke_do_middle()
701 if (kctx == NULL) { in hpke_do_middle()
705 pskidlen = (ctx->psk == NULL ? 0 : strlen(ctx->pskid)); in hpke_do_middle()
715 NULL, 0, OSSL_HPKE_SEC51LABEL, in hpke_do_middle()
723 NULL, 0, OSSL_HPKE_SEC51LABEL, in hpke_do_middle()
749 if (ctx->nonce == NULL) in hpke_do_middle()
761 if (ctx->key == NULL) in hpke_do_middle()
774 if (ctx->exportersec == NULL) in hpke_do_middle()
801 OSSL_HPKE_CTX *ctx = NULL; in OSSL_HPKE_CTX_new()
808 return NULL; in OSSL_HPKE_CTX_new()
812 return NULL; in OSSL_HPKE_CTX_new()
819 if (ctx == NULL) in OSSL_HPKE_CTX_new()
820 return NULL; in OSSL_HPKE_CTX_new()
822 if (propq != NULL) { in OSSL_HPKE_CTX_new()
824 if (ctx->propq == NULL) in OSSL_HPKE_CTX_new()
829 if (ctx->aead_ciph == NULL) { in OSSL_HPKE_CTX_new()
845 return NULL; in OSSL_HPKE_CTX_new()
850 if (ctx == NULL) in OSSL_HPKE_CTX_free()
872 if (ctx == NULL || pskid == NULL || psk == NULL || psklen == 0) { in OSSL_HPKE_CTX_set1_psk()
900 if (ctx->psk == NULL) in OSSL_HPKE_CTX_set1_psk()
905 if (ctx->pskid == NULL) { in OSSL_HPKE_CTX_set1_psk()
907 ctx->psk = NULL; in OSSL_HPKE_CTX_set1_psk()
917 if (ctx == NULL || ikme == NULL) { in OSSL_HPKE_CTX_set1_ikme()
931 if (ctx->ikme == NULL) in OSSL_HPKE_CTX_set1_ikme()
939 if (ctx == NULL || priv == NULL) { in OSSL_HPKE_CTX_set1_authpriv()
954 if (ctx->authpriv == NULL) in OSSL_HPKE_CTX_set1_authpriv()
963 EVP_PKEY *pubp = NULL; in OSSL_HPKE_CTX_set1_authpub()
964 unsigned char *lpub = NULL; in OSSL_HPKE_CTX_set1_authpub()
966 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in OSSL_HPKE_CTX_set1_authpub()
968 if (ctx == NULL || pub == NULL || publen == 0) { in OSSL_HPKE_CTX_set1_authpub()
983 if (kem_info == NULL) in OSSL_HPKE_CTX_set1_authpub()
995 if (pubp == NULL) { in OSSL_HPKE_CTX_set1_authpub()
1005 if (lpub == NULL) in OSSL_HPKE_CTX_set1_authpub()
1028 if (ctx == NULL || seq == NULL) { in OSSL_HPKE_CTX_get_seq()
1038 if (ctx == NULL) { in OSSL_HPKE_CTX_set_seq()
1063 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0 in OSSL_HPKE_encap()
1064 || pub == NULL || publen == 0) { in OSSL_HPKE_encap()
1076 if (infolen > 0 && info == NULL) { in OSSL_HPKE_encap()
1085 if (ctx->shared_secret != NULL) { in OSSL_HPKE_encap()
1111 if (ctx == NULL || enc == NULL || enclen == 0 || recippriv == NULL) { in OSSL_HPKE_decap()
1123 if (infolen > 0 && info == NULL) { in OSSL_HPKE_decap()
1132 if (ctx->shared_secret != NULL) { in OSSL_HPKE_decap()
1159 if (ctx == NULL || ct == NULL || ctlen == NULL || *ctlen == 0 in OSSL_HPKE_seal()
1160 || pt == NULL || ptlen == 0) { in OSSL_HPKE_seal()
1172 if (ctx->key == NULL || ctx->nonce == NULL) { in OSSL_HPKE_seal()
1201 if (ctx == NULL || pt == NULL || ptlen == NULL || *ptlen == 0 in OSSL_HPKE_open()
1202 || ct == NULL || ctlen == 0) { in OSSL_HPKE_open()
1214 if (ctx->key == NULL || ctx->nonce == NULL) { in OSSL_HPKE_open()
1239 EVP_KDF_CTX *kctx = NULL; in OSSL_HPKE_export()
1241 const char *mdname = NULL; in OSSL_HPKE_export()
1242 const OSSL_HPKE_KDF_INFO *kdf_info = NULL; in OSSL_HPKE_export()
1244 if (ctx == NULL || secret == NULL || secretlen == 0) { in OSSL_HPKE_export()
1252 if (labellen > 0 && label == NULL) { in OSSL_HPKE_export()
1256 if (ctx->exportersec == NULL) { in OSSL_HPKE_export()
1261 if (kdf_info == NULL) { in OSSL_HPKE_export()
1267 if (kctx == NULL) { in OSSL_HPKE_export()
1296 EVP_PKEY_CTX *pctx = NULL; in OSSL_HPKE_keygen()
1297 EVP_PKEY *skR = NULL; in OSSL_HPKE_keygen()
1298 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in OSSL_HPKE_keygen()
1301 if (pub == NULL || publen == NULL || *publen == 0 || priv == NULL) { in OSSL_HPKE_keygen()
1305 if (hpke_suite_check(suite, &kem_info, NULL, NULL) != 1) { in OSSL_HPKE_keygen()
1309 if ((ikmlen > 0 && ikm == NULL) in OSSL_HPKE_keygen()
1310 || (ikmlen == 0 && ikm != NULL) in OSSL_HPKE_keygen()
1323 if (pctx == NULL in OSSL_HPKE_keygen()
1328 if (ikm != NULL) in OSSL_HPKE_keygen()
1341 pctx = NULL; in OSSL_HPKE_keygen()
1359 return hpke_suite_check(suite, NULL, NULL, NULL); in OSSL_HPKE_suite_check()
1370 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in OSSL_HPKE_get_grease_value()
1371 const OSSL_HPKE_AEAD_INFO *aead_info = NULL; in OSSL_HPKE_get_grease_value()
1372 EVP_PKEY *fakepriv = NULL; in OSSL_HPKE_get_grease_value()
1374 if (enc == NULL || enclen == 0 in OSSL_HPKE_get_grease_value()
1375 || ct == NULL || ctlen == 0 || suite == NULL) { in OSSL_HPKE_get_grease_value()
1379 if (suite_in == NULL) { in OSSL_HPKE_get_grease_value()
1388 if (hpke_suite_check(chosen, &kem_info, NULL, &aead_info) != 1) { in OSSL_HPKE_get_grease_value()
1411 if (OSSL_HPKE_keygen(chosen, enc, enclen, &fakepriv, NULL, 0, in OSSL_HPKE_get_grease_value()
1454 const OSSL_HPKE_KEM_INFO *kem_info = NULL; in OSSL_HPKE_get_recommended_ikmelen()
1456 if (hpke_suite_check(suite, &kem_info, NULL, NULL) != 1) in OSSL_HPKE_get_recommended_ikmelen()
1458 if (kem_info == NULL) in OSSL_HPKE_get_recommended_ikmelen()