Lines Matching refs:NULL

100                             NULL);  in x25519_new_key()
108 NULL); in x448_new_key()
116 NULL); in ed25519_new_key()
124 NULL); in ed448_new_key()
132 if (ossl_prov_is_running() && key != NULL) { in ecx_has()
143 ok = ok && key->privkey != NULL; in ecx_has()
163 const unsigned char *pa = key1->haspubkey ? key1->pubkey : NULL; in ecx_match()
164 const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL; in ecx_match()
168 if (pa != NULL && pb != NULL) { in ecx_match()
183 if (pa != NULL && pb != NULL) { in ecx_match()
202 if (!ossl_prov_is_running() || key == NULL) in ecx_import()
217 if (key == NULL) in key_to_params()
226 && key->privkey != NULL in key_to_params()
240 OSSL_PARAM *params = NULL; in ecx_export()
243 if (!ossl_prov_is_running() || key == NULL) in ecx_export()
250 if (tmpl == NULL) in ecx_export()
256 if (!key_to_params(key, tmpl, NULL, include_private)) in ecx_export()
261 if (params == NULL) in ecx_export()
272 OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PUB_KEY, NULL, 0), \
273 OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_PRIV_KEY, NULL, 0)
283 return NULL; in ecx_imexport_types()
292 if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_BITS)) != NULL in ecx_get_params()
295 if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_SECURITY_BITS)) != NULL in ecx_get_params()
298 if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_MAX_SIZE)) != NULL in ecx_get_params()
301 if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY)) != NULL in ecx_get_params()
313 if (p != NULL && !OSSL_PARAM_set_int(p, approved)) in ecx_get_params()
318 return key_to_params(ecx, NULL, params, 1); in ecx_get_params()
326 OSSL_PKEY_PARAM_MANDATORY_DIGEST)) != NULL in ed_get_params()
359 OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL),
360 OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL),
361 OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL),
362 OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_MANDATORY_DIGEST, NULL, 0),
363 OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0),
370 OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL),
371 OSSL_PARAM_int(OSSL_PKEY_PARAM_SECURITY_BITS, NULL),
372 OSSL_PARAM_int(OSSL_PKEY_PARAM_MAX_SIZE, NULL),
400 ecxkey->propq = NULL; in set_property_query()
401 if (propq != NULL) { in set_property_query()
403 if (ecxkey->propq == NULL) in set_property_query()
414 if (params == NULL) in ecx_set_params()
418 if (p != NULL) { in ecx_set_params()
423 NULL)) in ecx_set_params()
426 ecxkey->privkey = NULL; in ecx_set_params()
430 if (p != NULL) { in ecx_set_params()
460 OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_ENCODED_PUBLIC_KEY, NULL, 0),
461 OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0),
494 struct ecx_gen_ctx *gctx = NULL; in ecx_gen_init()
497 return NULL; in ecx_gen_init()
499 if ((gctx = OPENSSL_zalloc(sizeof(*gctx))) != NULL) { in ecx_gen_init()
505 if (algdesc != NULL in ecx_gen_init()
514 gctx = NULL; in ecx_gen_init()
534 return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_ED25519, NULL); in ed25519_gen_init()
540 return ecx_gen_init(provctx, selection, params, ECX_KEY_TYPE_ED448, NULL); in ed448_gen_init()
548 if (gctx == NULL) in ecx_gen_set_params()
552 if (p != NULL) { in ecx_gen_set_params()
553 const char *groupname = NULL; in ecx_gen_set_params()
572 || groupname == NULL in ecx_gen_set_params()
579 if (p != NULL) { in ecx_gen_set_params()
584 if (gctx->propq == NULL) in ecx_gen_set_params()
588 if (p != NULL) { in ecx_gen_set_params()
589 if (p->data_size != 0 && p->data != NULL) { in ecx_gen_set_params()
591 gctx->dhkem_ikm = NULL; in ecx_gen_set_params()
605 OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0), in ecx_gen_settable_params()
606 OSSL_PARAM_utf8_string(OSSL_KDF_PARAM_PROPERTIES, NULL, 0), in ecx_gen_settable_params()
607 OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_DHKEM_IKM, NULL, 0), in ecx_gen_settable_params()
624 OSSL_SELF_TEST *st = NULL; in ecd_fips140_pairwise_test()
625 OSSL_CALLBACK *cb = NULL; in ecd_fips140_pairwise_test()
626 void *cbarg = NULL; in ecd_fips140_pairwise_test()
643 if (st == NULL) in ecd_fips140_pairwise_test()
652 ecx->privkey, 0, 0, 0, NULL, 0, in ecd_fips140_pairwise_test()
656 ecx->pubkey, ecx->privkey, NULL, 0, in ecd_fips140_pairwise_test()
665 0, 0, 0, NULL, 0, ecx->libctx, in ecd_fips140_pairwise_test()
669 ecx->pubkey, NULL, 0, 0, ecx->propq); in ecd_fips140_pairwise_test()
686 if (gctx == NULL) in ecx_gen()
687 return NULL; in ecx_gen()
689 gctx->propq)) == NULL) { in ecx_gen()
691 return NULL; in ecx_gen()
698 if ((privkey = ossl_ecx_key_allocate_privkey(key)) == NULL) { in ecx_gen()
703 if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { in ecx_gen()
744 return NULL; in ecx_gen()
777 ECX_KEY *key = NULL; in ed25519_gen()
802 return NULL; in ed25519_gen()
811 ECX_KEY *key = NULL; in ed448_gen()
835 return NULL; in ed448_gen()
853 ECX_KEY *key = NULL; in ecx_load()
859 *(ECX_KEY **)reference = NULL; in ecx_load()
862 return NULL; in ecx_load()
869 return NULL; in ecx_dup()
961 ok = ok && ecx->privkey != NULL; in ecx_validate()
1037 unsigned char *privkey = NULL, *pubkey; in MAKE_KEYMGMT_FUNCTIONS()
1039 if (key == NULL) { in MAKE_KEYMGMT_FUNCTIONS()
1051 if (privkey == NULL) { in MAKE_KEYMGMT_FUNCTIONS()
1057 if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { in MAKE_KEYMGMT_FUNCTIONS()
1080 return NULL; in MAKE_KEYMGMT_FUNCTIONS()
1094 unsigned char *privkey = NULL, *pubkey; in s390x_ecx_keygen448()
1096 if (key == NULL) { in s390x_ecx_keygen448()
1108 if (privkey == NULL) { in s390x_ecx_keygen448()
1114 if (gctx->dhkem_ikm != NULL && gctx->dhkem_ikmlen != 0) { in s390x_ecx_keygen448()
1136 return NULL; in s390x_ecx_keygen448()
1154 unsigned char *privkey = NULL, *pubkey; in s390x_ecd_keygen25519()
1156 EVP_MD *sha = NULL; in s390x_ecd_keygen25519()
1159 if (key == NULL) { in s390x_ecd_keygen25519()
1171 if (privkey == NULL) { in s390x_ecd_keygen25519()
1180 if (sha == NULL) in s390x_ecd_keygen25519()
1182 j = EVP_Digest(privkey, 32, buff, &sz, sha, NULL); in s390x_ecd_keygen25519()
1200 return NULL; in s390x_ecd_keygen25519()
1222 unsigned char *privkey = NULL, *pubkey; in s390x_ecd_keygen448()
1223 EVP_MD_CTX *hashctx = NULL; in s390x_ecd_keygen448()
1224 EVP_MD *shake = NULL; in s390x_ecd_keygen448()
1226 if (key == NULL) { in s390x_ecd_keygen448()
1238 if (privkey == NULL) { in s390x_ecd_keygen448()
1244 if (shake == NULL) in s390x_ecd_keygen448()
1250 if (hashctx == NULL) in s390x_ecd_keygen448()
1252 if (EVP_DigestInit_ex(hashctx, shake, NULL) != 1) in s390x_ecd_keygen448()
1276 return NULL; in s390x_ecd_keygen448()