/openssl/crypto/ffc/ |
H A D | ffc_params.c | 35 OPENSSL_clear_free(params->seed, params->seedlen); in ossl_ffc_params_cleanup() 92 if (seed != NULL && seedlen > 0) { in ossl_ffc_params_set_seed() 93 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed() 96 params->seedlen = seedlen; in ossl_ffc_params_set_seed() 99 params->seedlen = 0; in ossl_ffc_params_set_seed() 143 if (!ossl_ffc_params_set_seed(params, seed, seedlen)) in ossl_ffc_params_set_validate_params() 155 if (seedlen != NULL) in ossl_ffc_params_get_validate_params() 156 *seedlen = params->seedlen; in ossl_ffc_params_get_validate_params() 192 dst->seedlen = src->seedlen; in ossl_ffc_params_copy() 194 dst->seed = OPENSSL_memdup(src->seed, src->seedlen); in ossl_ffc_params_copy() [all …]
|
H A D | ffc_params_generate.c | 169 || !EVP_DigestUpdate(mctx, seed, seedlen) in generate_canonical_g() 342 if (!EVP_Digest(seed, seedlen, md, NULL, evpmd, NULL)) in generate_q_fips186_4() 524 size_t seedlen = 0; in ossl_ffc_params_FIPS186_4_gen_verify() local 587 seedlen = params->seedlen; in ossl_ffc_params_FIPS186_4_gen_verify() 588 if (seedlen == 0) in ossl_ffc_params_FIPS186_4_gen_verify() 589 seedlen = (size_t)mdsize; in ossl_ffc_params_FIPS186_4_gen_verify() 641 if ((seedlen * 8) < N) { in ossl_ffc_params_FIPS186_4_gen_verify() 646 seed_tmp = OPENSSL_malloc(seedlen); in ossl_ffc_params_FIPS186_4_gen_verify() 657 seed = OPENSSL_malloc(seedlen); in ossl_ffc_params_FIPS186_4_gen_verify() 699 memcpy(seed_tmp, seed, seedlen); in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 108 size_t seedlen; member 145 OPENSSL_clear_free(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset() 165 if (!ossl_prov_memdup(src->seed, src->seedlen, &dest->seed, in kdf_tls1_prf_dup() 166 &dest->seedlen)) in kdf_tls1_prf_dup() 263 if (ctx->seedlen == 0) { in kdf_tls1_prf_derive() 279 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive() 362 size_t seedlen; in kdf_tls1_prf_set_ctx_params() local 368 seedlen = safe_add_size_t(ctx->seedlen, sz, &err); in kdf_tls1_prf_set_ctx_params() 372 seed = OPENSSL_clear_realloc(ctx->seed, ctx->seedlen, seedlen); in kdf_tls1_prf_set_ctx_params() 378 memcpy(ctx->seed + ctx->seedlen, val, sz); in kdf_tls1_prf_set_ctx_params() [all …]
|
/openssl/providers/implementations/rands/ |
H A D | drbg_hash.c | 81 size_t outlen = drbg->seedlen; in hash_df() 154 assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); in add_bytes() 156 d = &dst[drbg->seedlen - 1]; in add_bytes() 167 for (i = drbg->seedlen - inlen; i > 0; --i, d--) { in add_bytes() 185 && EVP_DigestUpdate(ctx, hash->V, drbg->seedlen) in add_hash_to_v() 216 memcpy(hash->vtmp, hash->V, drbg->seedlen); in hash_gen() 310 memcpy(hash->V, hash->C, drbg->seedlen); in drbg_hash_reseed() 358 && add_bytes(drbg, hash->V, hash->C, drbg->seedlen) in drbg_hash_generate() 430 ctx->seedlen = HASH_PRNG_MAX_SEEDLEN; in drbg_hash_new() 537 ctx->seedlen = HASH_PRNG_MAX_SEEDLEN; in drbg_hash_set_ctx_params_locked() [all …]
|
H A D | drbg_local.h | 161 size_t seedlen; member
|
H A D | drbg_ctr.c | 295 ctr_XOR(ctr, ctr->KX, drbg->seedlen); in ctr_update() 544 const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; in drbg_ctr_init_lengths() 585 drbg->seedlen = keylen + 16; in drbg_ctr_init()
|
H A D | drbg_hmac.c | 443 ctx->seedlen = hmac->blocklen; in drbg_hmac_set_ctx_params_locked()
|
/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 64 size_t seedlen; member 451 size_t seedlen) in dsa_set_gen_seed() argument 453 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed() 455 gctx->seedlen = 0; in dsa_set_gen_seed() 456 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed() 457 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed() 460 gctx->seedlen = seedlen; in dsa_set_gen_seed() 650 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen() 698 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
|
H A D | dh_kmgmt.c | 65 size_t seedlen; member 512 size_t seedlen) in dh_set_gen_seed() argument 514 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_set_gen_seed() 516 gctx->seedlen = 0; in dh_set_gen_seed() 517 if (seed != NULL && seedlen > 0) { in dh_set_gen_seed() 518 gctx->seed = OPENSSL_memdup(seed, seedlen); in dh_set_gen_seed() 521 gctx->seedlen = seedlen; in dh_set_gen_seed() 751 if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dh_gen() 818 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_gen_cleanup()
|
/openssl/include/internal/ |
H A D | ffc.h | 102 size_t seedlen; member 133 const unsigned char *seed, size_t seedlen); 144 size_t seedlen, int counter); 146 unsigned char **seed, size_t *seedlen,
|
/openssl/demos/pkey/ |
H A D | EVP_PKEY_DSA_paramvalidate.c | 115 size_t seedlen; in main() local 117 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main() 160 (void *)seed, seedlen); in main()
|
H A D | dsa.inc | 118 size_t seedlen; 130 sizeof(seed), &seedlen) > 0) { 132 BIO_dump(bio, seed, seedlen);
|
/openssl/crypto/dh/ |
H A D | dh_asn1.c | 141 size_t seedlen = 0; in i2d_DHxparams() local 148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams() 149 seed.length = (int)seedlen; in i2d_DHxparams()
|
/openssl/providers/implementations/kem/ |
H A D | ec_kem.c | 462 size_t seedlen = ikmlen; in derivekey() local 472 if (seed == NULL || seedlen == 0) { in derivekey() 473 seedlen = ctx->info->Nsk; in derivekey() 474 if (seedlen > sizeof(tmpbuf)) in derivekey() 476 if (RAND_priv_bytes_ex(ctx->libctx, tmpbuf, seedlen, 0) <= 0) in derivekey() 480 ret = ossl_ec_generate_key_dhkem(key, seed, seedlen); in derivekey() 483 OPENSSL_cleanse(seed, seedlen); in derivekey()
|
H A D | ecx_kem.c | 393 size_t seedlen = ikmlen; in derivekey() local 405 if (seed == NULL || seedlen == 0) { in derivekey() 411 seedlen = info->Nsk; in derivekey() 413 if (!ossl_ecx_dhkem_derive_private(key, privkey, seed, seedlen)) in derivekey() 425 OPENSSL_cleanse(seed, seedlen); in derivekey()
|
/openssl/crypto/evp/ |
H A D | dsa_ctrl.c | 61 size_t seedlen) in EVP_PKEY_CTX_set_dsa_paramgen_seed() argument 70 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dsa_paramgen_seed()
|
H A D | dh_ctrl.c | 65 size_t seedlen) in EVP_PKEY_CTX_set_dh_paramgen_seed() argument 74 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dh_paramgen_seed()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 17 unsigned char *seed, int seedlen); 33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>.
|
/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 351 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument 374 || !EVP_DigestUpdate(c, seed, seedlen) in PKCS1_MGF1()
|
/openssl/include/openssl/ |
H A D | kdf.h | 103 const unsigned char *seed, int seedlen);
|
H A D | dsa.h | 52 size_t seedlen);
|
H A D | dh.h | 42 size_t seedlen);
|
H A D | rsa.h | 401 const unsigned char *seed, long seedlen,
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-DH.pod | 246 size_t seedlen = ...; /* by other means, required */ 258 extra_params[0] = OSSL_PARAM_construct_octet_string("seed", seed, seedlen);
|
/openssl/test/ |
H A D | acvp_test.c | 601 size_t plen = 0, qlen = 0, seedlen = 0; in dsa_paramgen_test() local 622 &seed, &seedlen)) in dsa_paramgen_test() 629 test_output_memory("domainSeed", seed, seedlen); in dsa_paramgen_test()
|