/openssl/crypto/rand/ |
H A D | prov_seed.c | 20 size_t min_len, size_t max_len) in ossl_rand_get_entropy() argument 26 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy() 46 size_t min_len, size_t max_len) in ossl_rand_get_user_entropy() argument 51 return evp_rand_get_seed(rng, pout, entropy, min_len, max_len, in ossl_rand_get_user_entropy() 54 return ossl_rand_get_entropy(ctx, pout, entropy, min_len, max_len); in ossl_rand_get_user_entropy() 76 size_t min_len, ossl_unused size_t max_len, in ossl_rand_get_nonce() argument 82 pool = ossl_rand_pool_new(0, 0, min_len, max_len); in ossl_rand_get_nonce() 102 size_t min_len, size_t max_len, in ossl_rand_get_user_nonce() argument 111 if ((buf = OPENSSL_malloc(min_len)) == NULL) in ossl_rand_get_user_nonce() 114 if (!EVP_RAND_generate(rng, buf, min_len, 0, 0, salt, salt_len)) { in ossl_rand_get_user_nonce() [all …]
|
H A D | rand_pool.c | 23 size_t min_len, size_t max_len) in ossl_rand_pool_new() argument 31 pool->min_len = min_len; in ossl_rand_pool_new() 34 pool->alloc_len = min_len < min_alloc_size ? min_alloc_size : min_len; in ossl_rand_pool_new() 79 pool->min_len = pool->max_len = pool->alloc_len = pool->len; in ossl_rand_pool_attach() 179 if (pool->len < pool->min_len) in ossl_rand_pool_entropy_available() 260 if (pool->len < pool->min_len && in ossl_rand_pool_bytes_needed() 261 bytes_needed < pool->min_len - pool->len) in ossl_rand_pool_bytes_needed() 263 bytes_needed = pool->min_len - pool->len; in ossl_rand_pool_bytes_needed()
|
/openssl/providers/common/ |
H A D | provider_seeding.c | 83 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() argument 88 return c_get_user_entropy(handle, pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 90 return c_get_entropy(handle, pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 106 size_t min_len, size_t max_len, in ossl_prov_get_nonce() argument 112 return c_get_user_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 114 return c_get_nonce(handle, pout, min_len, max_len, salt, salt_len); in ossl_prov_get_nonce()
|
/openssl/include/crypto/ |
H A D | rand.h | 113 size_t min_len, size_t max_len); 116 size_t min_len, size_t max_len); 122 unsigned char **pout, size_t min_len, size_t max_len, 125 size_t min_len, size_t max_len,
|
H A D | rand_pool.h | 78 size_t min_len; /* minimum number of random bytes requested */ member 86 size_t min_len, size_t max_len);
|
H A D | evp.h | 957 int entropy, size_t min_len, size_t max_len,
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 17 size_t min_len, size_t max_len); 20 size_t min_len, size_t max_len); 26 unsigned char **pout, size_t min_len, 29 size_t min_len, size_t max_len, 40 stored in a buffer which contains at least I<min_len> and at most I<max_len> 61 The output is stored in a buffer which contains at least I<min_len> and at
|
/openssl/providers/implementations/include/prov/ |
H A D | seeding.h | 23 int entropy, size_t min_len, size_t max_len); 27 size_t min_len, size_t max_len,
|
/openssl/providers/implementations/rands/ |
H A D | drbg.c | 145 int entropy, size_t min_len, in ossl_drbg_get_seed() argument 155 if (bytes_needed < min_len) in ossl_drbg_get_seed() 156 bytes_needed = min_len; in ossl_drbg_get_seed() 193 size_t min_len, size_t max_len, in get_entropy() argument 204 return ossl_prov_get_entropy(drbg->provctx, pout, entropy, min_len, in get_entropy() 239 min_len, max_len, prediction_resistance, in get_entropy() 300 size_t min_len, size_t max_len) in prov_drbg_get_nonce() argument 335 return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, in prov_drbg_get_nonce()
|
H A D | seed_src.c | 176 int entropy, size_t min_len, size_t max_len, in seed_get_seed() argument 185 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in seed_get_seed()
|
H A D | fips_crng_test.c | 283 int entropy, size_t min_len, in crng_test_get_seed() argument 297 min_len, max_len); in crng_test_get_seed() 309 min_len, max_len, prediction_resistance, in crng_test_get_seed()
|
H A D | seed_src_jitter.c | 258 int entropy, size_t min_len, in jitter_get_seed() argument 270 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in jitter_get_seed()
|
H A D | drbg_local.h | 253 int entropy, size_t min_len, size_t max_len,
|
H A D | test_rng.c | 289 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument
|
/openssl/crypto/evp/ |
H A D | evp_rand.c | 704 size_t min_len, size_t max_len, in evp_rand_get_seed_locked() argument 711 entropy, min_len, max_len, in evp_rand_get_seed_locked() 719 int entropy, size_t min_len, size_t max_len, in evp_rand_get_seed() argument 729 entropy, min_len, max_len, in evp_rand_get_seed()
|
/openssl/include/openssl/ |
H A D | core_dispatch.h | 200 size_t min_len, size_t max_len)) 203 size_t min_len, size_t max_len)) 209 unsigned char **pout, size_t min_len, 213 unsigned char **pout, size_t min_len, 527 int entropy, size_t min_len, size_t max_len,
|
/openssl/ssl/quic/ |
H A D | quic_record_tx.c | 605 size_t min_len, orig_data_len; in qtx_write() local 617 min_len = QUIC_MIN_VALID_PKT_LEN; in qtx_write() 620 min_len = QUIC_MIN_VALID_PKT_LEN_CRYPTO; in qtx_write() 628 if (space_left < min_len) { in qtx_write()
|
/openssl/crypto/ |
H A D | provider_core.c | 2335 size_t min_len, size_t max_len) in rand_get_entropy() argument 2338 pout, entropy, min_len, max_len); in rand_get_entropy() 2343 size_t min_len, size_t max_len) in rand_get_user_entropy() argument 2346 pout, entropy, min_len, max_len); in rand_get_user_entropy() 2365 size_t min_len, size_t max_len, in rand_get_nonce() argument 2369 pout, min_len, max_len, salt, salt_len); in rand_get_nonce() 2374 size_t min_len, size_t max_len, in rand_get_user_nonce() argument 2378 pout, min_len, max_len, salt, salt_len); in rand_get_user_nonce()
|
/openssl/crypto/pem/ |
H A D | pem_lib.c | 36 int i, min_len; in PEM_def_callback() local 58 min_len = rwflag ? MIN_LENGTH : 0; in PEM_def_callback() 60 i = EVP_read_pw_string_min(buf, min_len, num, prompt, rwflag); in PEM_def_callback()
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 78 size_t min_len, size_t max_len); 81 size_t min_len, size_t max_len); 87 unsigned char **pout, size_t min_len, size_t max_len, 90 unsigned char **pout, size_t min_len, size_t max_len, 315 output will have at least I<min_len> and at most I<max_len> bytes. 335 The output is stored in a buffer which contains at least I<min_len> and at
|
H A D | provider-rand.pod | 44 int entropy, size_t min_len, size_t max_len, 123 security level of I<entropy> bits and there will be between I<min_len>
|
/openssl/ |
H A D | CHANGES.md | 6116 there is no multiple of the block length between min_len and
|