/freebsd/crypto/openssl/crypto/ffc/ |
H A D | ffc_params.c | 76 const unsigned char *seed, size_t seedlen) in ossl_ffc_params_set_seed() argument 87 if (seed != NULL && seedlen > 0) { in ossl_ffc_params_set_seed() 88 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed() 91 params->seedlen = seedlen; in ossl_ffc_params_set_seed() 94 params->seedlen = 0; in ossl_ffc_params_set_seed() 137 size_t seedlen, int counter) in ossl_ffc_params_set_validate_params() argument 139 if (!ossl_ffc_params_set_seed(params, seed, seedlen)) in ossl_ffc_params_set_validate_params() 146 unsigned char **seed, size_t *seedlen, in ossl_ffc_params_get_validate_params() argument 151 if (seedlen != NULL) in ossl_ffc_params_get_validate_params() 152 *seedlen = params->seedlen; in ossl_ffc_params_get_validate_params() [all …]
|
H A D | ffc_params_generate.c | 135 int gindex, unsigned char *seed, size_t seedlen) in generate_canonical_g() argument 169 || !EVP_DigestUpdate(mctx, seed, seedlen) in generate_canonical_g() 314 int qsize, unsigned char *seed, size_t seedlen, in generate_q_fips186_4() argument 332 && RAND_bytes_ex(libctx, seed, seedlen, 0) <= 0) in generate_q_fips186_4() 339 if (!EVP_Digest(seed, seedlen, md, NULL, evpmd, NULL)) in generate_q_fips186_4() 521 size_t seedlen = 0; in ossl_ffc_params_FIPS186_4_gen_verify() local 584 seedlen = params->seedlen; in ossl_ffc_params_FIPS186_4_gen_verify() 585 if (seedlen == 0) in ossl_ffc_params_FIPS186_4_gen_verify() 586 seedlen = (size_t)mdsize; in ossl_ffc_params_FIPS186_4_gen_verify() 638 if ((seedlen * 8) < N) { in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
/freebsd/crypto/openssl/providers/implementations/rands/ |
H A D | drbg_hash.c | 44 /* Determine what seedlen to use based on the block length */ 79 size_t outlen = drbg->seedlen; in hash_df() 83 * seedlen bytes which is always less than the maximum permitted. in hash_df() 142 * where dst size is drbg->seedlen, and inlen <= drbg->seedlen. 152 assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); in add_bytes() 154 d = &dst[drbg->seedlen - 1]; in add_bytes() 165 for (i = drbg->seedlen - inlen; i > 0; --i, d--) { in add_bytes() 174 /* V = (V + Hash(inbyte || V || [additional_input]) mod (2^seedlen) */ [all...] |
H A D | drbg_ctr.c | 255 * of seedlen, however other uses of this algorithm pad the input with 293 ctr_XOR(ctr, ctr->KX, drbg->seedlen); in ctr_update() 513 const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; in drbg_ctr_init_lengths() 554 drbg->seedlen = keylen + 16; in drbg_ctr_init()
|
H A D | drbg_local.h | 167 size_t seedlen; member
|
H A D | drbg_hmac.c | 389 ctx->seedlen = hmac->blocklen; in drbg_hmac_set_ctx_params()
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 95 size_t seedlen; member 131 OPENSSL_cleanse(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset() 152 if (ctx->seedlen == 0) { in kdf_tls1_prf_derive() 163 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive() 204 const void *q = ctx->seed + ctx->seedlen; in kdf_tls1_prf_set_ctx_params() 210 TLS1_PRF_MAXBUF - ctx->seedlen, in kdf_tls1_prf_set_ctx_params() 213 ctx->seedlen += sz; in kdf_tls1_prf_set_ctx_params()
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 61 size_t seedlen; member 447 size_t seedlen) in dsa_set_gen_seed() argument 449 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed() 451 gctx->seedlen = 0; in dsa_set_gen_seed() 452 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed() 453 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed() 456 gctx->seedlen = seedlen; in dsa_set_gen_seed() 584 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen() 633 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
|
H A D | dh_kmgmt.c | 64 size_t seedlen; member 509 size_t seedlen) in dh_set_gen_seed() argument 511 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_set_gen_seed() 513 gctx->seedlen = 0; in dh_set_gen_seed() 514 if (seed != NULL && seedlen > 0) { in dh_set_gen_seed() 515 gctx->seed = OPENSSL_memdup(seed, seedlen); in dh_set_gen_seed() 518 gctx->seedlen = seedlen; in dh_set_gen_seed() 732 if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dh_gen() 801 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_gen_cleanup()
|
/freebsd/crypto/openssl/include/internal/ |
H A D | ffc.h | 102 size_t seedlen; member 133 const unsigned char *seed, size_t seedlen); 144 size_t seedlen, int counter); 146 unsigned char **seed, size_t *seedlen,
|
/freebsd/crypto/openssl/demos/pkey/ |
H A D | EVP_PKEY_DSA_paramvalidate.c | 115 size_t seedlen; in main() local 117 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main() 160 (void *)seed, seedlen); in main()
|
H A D | dsa.inc | 118 size_t seedlen; 130 sizeof(seed), &seedlen) > 0) { 132 BIO_dump(bio, seed, seedlen);
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_asn1.c | 141 size_t seedlen = 0; in i2d_DHxparams() local 148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams() 149 seed.length = (int)seedlen; in i2d_DHxparams()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | dsa_ctrl.c | 61 size_t seedlen) in EVP_PKEY_CTX_set_dsa_paramgen_seed() argument 70 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dsa_paramgen_seed()
|
H A D | dh_ctrl.c | 65 size_t seedlen) in EVP_PKEY_CTX_set_dh_paramgen_seed() argument 74 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dh_paramgen_seed()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 17 unsigned char *seed, int seedlen); 33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>.
|
/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 333 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument 356 || !EVP_DigestUpdate(c, seed, seedlen) in PKCS1_MGF1()
|
/freebsd/crypto/libecc/src/examples/sig/rsa/ |
H A D | rsa.h | 141 const u8 *forced_seed, u32 seedlen); 150 const u8 *forced_seed, u32 seedlen);
|
H A D | rsa.c | 1137 const u8 *forced_seed, u32 seedlen) in rsaes_pkcs1_v1_5_encrypt() argument 1168 MUST_HAVE((seedlen == (k - mlen - 3)), ret, err); in rsaes_pkcs1_v1_5_encrypt() 1170 for(i = 0; i < seedlen; i++){ in rsaes_pkcs1_v1_5_encrypt() 1173 ret = local_memcpy(&em[2], forced_seed, seedlen); EG(ret, err); in rsaes_pkcs1_v1_5_encrypt() 1302 const u8 *forced_seed, u32 seedlen) in rsaes_oaep_encrypt() argument 1370 MUST_HAVE((seedlen == hlen), ret, err); in rsaes_oaep_encrypt() 1371 ret = local_memcpy(seed, forced_seed, seedlen); EG(ret, err); in rsaes_oaep_encrypt()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | kdf.h | 103 const unsigned char *seed, int seedlen);
|
H A D | dsa.h | 37 size_t seedlen);
|
H A D | dh.h | 38 size_t seedlen);
|
/freebsd/crypto/libecc/src/sig/ |
H A D | bip0340.c | 697 …TE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_one_scalar(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_one_scalar() argument 704 MUST_HAVE((seedlen == SHA256_DIGEST_SIZE) && (scalar_len <= CHACHA20_MAX_ASKED_LEN), ret, err); in _bip0340_compute_batch_csprng_one_scalar() 717 …IBUTE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_scalars(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_scalars() argument 734 ret = _bip0340_compute_batch_csprng_one_scalar(seed, seedlen, in _bip0340_compute_batch_csprng_scalars() 761 u8 p_len, u8 *seed, u32 seedlen) in _bip0340_compute_batch_csprng_seed() argument 779 MUST_HAVE((seedlen == hm->digest_size), ret, err); in _bip0340_compute_batch_csprng_seed()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-DH.pod | 246 size_t seedlen = ...; /* by other means, required */ 258 extra_params[0] = OSSL_PARAM_construct_octet_string("seed", seed, seedlen);
|
/freebsd/crypto/openssl/test/ |
H A D | acvp_test.c | 415 size_t plen = 0, qlen = 0, seedlen = 0; in dsa_paramgen_test() local 428 &seed, &seedlen)) in dsa_paramgen_test() 436 test_output_memory("domainSeed", seed, seedlen); in dsa_paramgen_test()
|