/openssl/crypto/ffc/ |
H A D | ffc_params.c | 41 OPENSSL_free(params->seed); in ossl_ffc_params_cleanup() 87 if (params->seed == seed) in ossl_ffc_params_set_seed() 93 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed() 98 params->seed = NULL; in ossl_ffc_params_set_seed() 153 if (seed != NULL) in ossl_ffc_params_get_validate_params() 154 *seed = params->seed; in ossl_ffc_params_get_validate_params() 191 OPENSSL_free(dst->seed); in ossl_ffc_params_copy() 193 if (src->seed != NULL) { in ossl_ffc_params_copy() 194 dst->seed = OPENSSL_memdup(src->seed, src->seedlen); in ossl_ffc_params_copy() 198 dst->seed = NULL; in ossl_ffc_params_copy() [all …]
|
H A D | ffc_params_generate.c | 408 memcpy(buf, seed, qsize); in generate_q_fips186_2() 409 memcpy(buf2, seed, qsize); in generate_q_fips186_2() 591 if (params->seed != NULL) in ossl_ffc_params_FIPS186_4_gen_verify() 592 seed = params->seed; in ossl_ffc_params_FIPS186_4_gen_verify() 650 if (seed == NULL) { in ossl_ffc_params_FIPS186_4_gen_verify() 657 seed = OPENSSL_malloc(seedlen); in ossl_ffc_params_FIPS186_4_gen_verify() 658 if (seed == NULL) in ossl_ffc_params_FIPS186_4_gen_verify() 687 seed != params->seed, &m, res, cb)) in ossl_ffc_params_FIPS186_4_gen_verify() 711 if (seed == params->seed) { in ossl_ffc_params_FIPS186_4_gen_verify() 796 if (seed != params->seed) in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
/openssl/crypto/des/ |
H A D | qud_cksm.c | 35 long length, int out_count, DES_cblock *seed) in DES_quad_cksum() argument 47 z0 = Q_B0((*seed)[0]) | Q_B1((*seed)[1]) | Q_B2((*seed)[2]) | in DES_quad_cksum() 48 Q_B3((*seed)[3]); in DES_quad_cksum() 49 z1 = Q_B0((*seed)[4]) | Q_B1((*seed)[5]) | Q_B2((*seed)[6]) | in DES_quad_cksum() 50 Q_B3((*seed)[7]); in DES_quad_cksum()
|
/openssl/crypto/dh/ |
H A D | dh_asn1.c | 62 ASN1_BIT_STRING *seed; member 75 ASN1_SIMPLE(int_dhvparams, seed, ASN1_BIT_STRING), 120 ossl_ffc_params_set_validate_params(params, dhx->vparams->seed->data, in IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname() 121 dhx->vparams->seed->length, in IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname() 123 ASN1_BIT_STRING_free(dhx->vparams->seed); in IMPLEMENT_ASN1_ENCODE_FUNCTIONS_fname() 140 ASN1_BIT_STRING seed; in i2d_DHxparams() local 148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams() 149 seed.length = (int)seedlen; in i2d_DHxparams() 151 if (counter != -1 && seed.data != NULL && seed.length > 0) { in i2d_DHxparams() 152 seed.flags = ASN1_STRING_FLAG_BITS_LEFT; in i2d_DHxparams() [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 107 unsigned char *seed; member 145 OPENSSL_clear_free(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset() 165 if (!ossl_prov_memdup(src->seed, src->seedlen, &dest->seed, in kdf_tls1_prf_dup() 279 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive() 361 unsigned char *seed; in kdf_tls1_prf_set_ctx_params() local 372 seed = OPENSSL_clear_realloc(ctx->seed, ctx->seedlen, seedlen); in kdf_tls1_prf_set_ctx_params() 373 if (!seed) in kdf_tls1_prf_set_ctx_params() 376 ctx->seed = seed; in kdf_tls1_prf_set_ctx_params() 483 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash() 505 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_RAND-SEED-SRC.pod | 5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation 12 The seed sources used are specified at the time OpenSSL is configured for 13 building using the B<--with-rand-seed=> option. By default, operating system 39 A context for the seed source can be obtained by calling: 47 EVP_RAND_CTX *seed, *rctx; 52 /* Create and instantiate a seed source */ 54 seed = EVP_RAND_CTX_new(rand, NULL); 55 EVP_RAND_instantiate(seed, strength, 0, NULL, 0, NULL); 60 rctx = EVP_RAND_CTX_new(rand, seed); 72 EVP_RAND_CTX_free(seed);
|
H A D | EVP_RAND-JITTER.pod | 5 EVP_RAND-JITTER - The randomness seed source EVP_RAND implementation 12 This software seed source produces randomness based on tiny CPU 42 A context for the seed source can be obtained by calling: 61 EVP_RAND_CTX *seed, *rctx; 66 /* Create and instantiate a seed source */ 68 seed = EVP_RAND_CTX_new(rand, NULL); 69 EVP_RAND_instantiate(seed, strength, 0, NULL, 0, NULL); 74 rctx = EVP_RAND_CTX_new(rand, seed); 86 EVP_RAND_CTX_free(seed);
|
H A D | EVP_KDF-TLS1_PRF.pod | 43 =item "seed" (B<OSSL_KDF_PARAM_SEED>) <octet string> 45 This parameter sets the context seed. 46 The length of the context seed cannot exceed 1024 bytes; 100 The digest, secret value and seed must be set before a key is derived otherwise 109 and seed value "seed": 125 "seed", (size_t)4);
|
H A D | EVP_PKEY-FFC.pod | 23 This means that optional FFC domain parameter values for I<seed>, I<pcounter> 25 For B<DH> the I<seed> and I<pcounter> can be stored in ASN1 data 73 =item "seed" (B<OSSL_PKEY_PARAM_FFC_SEED>) <octet string> 75 An optional domain parameter I<seed> value used during generation and validation 77 For validation this needs to set the I<seed> that was produced during generation. 172 =item "seed" (B<OSSL_PKEY_PARAM_FFC_SEED>) <octet string> 174 For "fips186_4" or "fips186_2" generation this sets the I<seed> data to use 175 instead of generating a random seed internally. This should be used for 177 parameters OR it will fail if the seed did not generate valid primes.
|
/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 63 unsigned char *db, *seed; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() local 110 seed = to + 1; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 122 if (RAND_bytes_ex(libctx, seed, mdlen, 0) <= 0) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 131 if (PKCS1_MGF1(dbmask, dbmask_len, seed, mdlen, mgf1md) < 0) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 142 seed[i] ^= seedmask[i]; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 181 unsigned char *db = NULL, *em = NULL, seed[EVP_MAX_MD_SIZE], in RSA_padding_check_PKCS1_OAEP_mgf1() local 258 if (PKCS1_MGF1(seed, mdlen, maskeddb, dblen, mgf1md)) in RSA_padding_check_PKCS1_OAEP_mgf1() 261 seed[i] ^= maskedseed[i]; in RSA_padding_check_PKCS1_OAEP_mgf1() 263 if (PKCS1_MGF1(db, dblen, seed, mdlen, mgf1md)) in RSA_padding_check_PKCS1_OAEP_mgf1() 336 OPENSSL_cleanse(seed, sizeof(seed)); in RSA_padding_check_PKCS1_OAEP_mgf1() [all …]
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 17 unsigned char *seed, int seedlen); 31 and any seed is reset. 33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>. 34 If a seed is already set it is appended to the existing value. 42 The B<type> parameters "secret" and "seed" use the supplied B<value> parameter 43 as a secret or seed value. 53 The digest, secret value and seed must be set before a key is derived or an 74 and seed value "seed": 87 if (EVP_PKEY_CTX_add1_tls1_prf_seed(pctx, "seed", 4) <= 0)
|
H A D | RAND_set_DRBG_type.pod | 15 int RAND_set_seed_source_type(OSSL_LIB_CTX *ctx, const char *seed, 27 RAND_set_seed_source_type() specifies the seed source that will be used 28 within the library context I<ctx>. The seed source of name I<seed> 29 with properties I<propq> will be fetched and used to seed the primary 44 The default seed source can be configured when OpenSSL is compiled by
|
H A D | RAND_add.pod | 30 These functions can be used to seed the random generator and to check its 33 (L<RAND_OpenSSL(3)>) is not necessary (but allowed), since it does (re-)seed 41 RAND_poll() uses the system's capabilities to seed the random generator using 66 usage by the random seed sources. Some seed sources maintain open file 83 RAND_poll() returns 1 if it generated seed data, 0 otherwise.
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_seed.c | 50 IMPLEMENT_generic_cipher(seed, SEED, ecb, ECB, 0, 128, 128, 0, block) 52 IMPLEMENT_generic_cipher(seed, SEED, cbc, CBC, 0, 128, 128, 128, block) 54 IMPLEMENT_generic_cipher(seed, SEED, ofb128, OFB, 0, 128, 8, 128, stream) 56 IMPLEMENT_generic_cipher(seed, SEED, cfb128, CFB, 0, 128, 8, 128, stream)
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_kdf_tls1_prf.txt | 19 Ctrl.label = seed:master secret 27 Ctrl.label = seed:key expansion 44 Ctrl.label = seed:master secret 52 Ctrl.label = seed:key expansion 61 Ctrl.label = seed:key expansion 77 Ctrl.label = seed:extended master secret 90 Ctrl.label = seed:extended master secret 105 Ctrl.label = seed:extended master secret 116 Ctrl.label = seed:extended master secret 131 Ctrl.label = seed:extended master secret
|
H A D | evpkdf_tls12_prf.txt | 20 Ctrl.label = seed:master secret 29 Ctrl.label = seed:key expansion 39 Ctrl.label = seed:key expansion 57 Ctrl.label = seed:master secret 71 Ctrl.label = seed:master secret 81 Ctrl.label = seed:extended master secret 94 Ctrl.label = seed:extended master secret 109 Ctrl.label = seed:extended master secret 121 Ctrl.label = seed:extended master secret 136 Ctrl.label = seed:extended master secret
|
/openssl/apps/ |
H A D | version.c | 51 int ret = 1, dirty = 0, seed = 0; in version_main() local 94 dirty = seed = 1; in version_main() 108 seed = options = cflags = version = date = platform in version_main() 142 if (seed) { in version_main()
|
/openssl/demos/pkey/ |
H A D | EVP_PKEY_DSA_paramvalidate.c | 114 unsigned char seed[64]; in main() local 117 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main() 160 (void *)seed, seedlen); in main()
|
/openssl/crypto/ec/ |
H A D | ec_asn1.c | 66 ASN1_BIT_STRING *seed; member 354 if (group->seed) { in ec_asn1_group2curve() 355 if (!curve->seed) in ec_asn1_group2curve() 361 if (!ASN1_BIT_STRING_set(curve->seed, group->seed, in ec_asn1_group2curve() 367 ASN1_BIT_STRING_free(curve->seed); in ec_asn1_group2curve() 368 curve->seed = NULL; in ec_asn1_group2curve() 687 if (params->curve->seed != NULL) { in EC_GROUP_new_from_ecparameters() 698 OPENSSL_free(ret->seed); in EC_GROUP_new_from_ecparameters() 699 if ((ret->seed = OPENSSL_malloc(params->curve->seed->length)) == NULL) in EC_GROUP_new_from_ecparameters() 701 memcpy(ret->seed, params->curve->seed->data, in EC_GROUP_new_from_ecparameters() [all …]
|
/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 63 unsigned char *seed; /* optional FIPS186-4 param for testing */ member 450 static int dsa_set_gen_seed(struct dsa_gen_ctx *gctx, unsigned char *seed, in dsa_set_gen_seed() argument 453 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed() 454 gctx->seed = NULL; in dsa_set_gen_seed() 456 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed() 457 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed() 458 if (gctx->seed == NULL) in dsa_set_gen_seed() 649 if (gctx->seed != NULL in dsa_gen() 650 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen() 698 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
|
/openssl/test/testutil/ |
H A D | driver.c | 46 static int seed = 0; variable 96 seed = s; in set_seed() 97 if (seed <= 0) in set_seed() 98 seed = (int)time(NULL); in set_seed() 99 test_random_seed(seed); in set_seed() 272 test_printf_tapout("# OPENSSL_TEST_RAND_ORDER=%d\n", seed); in test_verdict() 274 test_printf_tapout("# OPENSSL_TEST_RAND_SEED=%d\n", seed); in test_verdict()
|
/openssl/crypto/rand/ |
H A D | rand_lib.c | 264 if (meth != NULL && meth->seed != NULL) { in RAND_seed() 265 meth->seed(buf, num); in RAND_seed() 407 EVP_RAND_CTX *seed; member 503 EVP_RAND_CTX_free(dgbl->seed); in ossl_rand_ctx_free() 649 ret = dgbl->seed; in ossl_rand_get0_seed_noncreating() 772 if (dgbl->seed == NULL) { in RAND_get0_primary() 774 dgbl->seed = rand_new_seed(ctx); in RAND_get0_primary() 781 ret = rand_new_crngt(ctx, dgbl->seed); in RAND_get0_primary() 783 ret = rand_new_drbg(ctx, dgbl->seed, PRIMARY_RESEED_INTERVAL, in RAND_get0_primary() 1012 if (dgbl->seed != NULL) { in RAND_set_seed_source_type() [all …]
|
/openssl/crypto/seed/ |
H A D | build.info | 2 $ALL=seed.c seed_ecb.c seed_cbc.c seed_cfb.c seed_ofb.c 7 # seed functions, so we must include them directly in liblegacy.a
|
/openssl/include/internal/ |
H A D | ffc.h | 100 unsigned char *seed; member 133 const unsigned char *seed, size_t seedlen); 143 const unsigned char *seed, 146 unsigned char **seed, size_t *seedlen,
|
/openssl/ |
H A D | NOTES-NONSTOP.md | 11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script. 15 specify the `--with-rand-seed=egd` option to the `./Configure` script. 136 ./Configure nonstop-nsx_64 --with-rand-seed=rdcpu 229 --with-rand-seed=rdcpu ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 232 --with-rand-seed=rdcpu ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 235 --with-rand-seed=rdcpu ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 242 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 245 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 248 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 251 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} [all …]
|