Home
last modified time | relevance | path

Searched refs:seedlen (Results 1 – 25 of 29) sorted by relevance

12

/freebsd/crypto/openssl/crypto/ffc/
H A Dffc_params.c76 const unsigned char *seed, size_t seedlen) in ossl_ffc_params_set_seed() argument
87 if (seed != NULL && seedlen > 0) { in ossl_ffc_params_set_seed()
88 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed()
91 params->seedlen = seedlen; in ossl_ffc_params_set_seed()
94 params->seedlen = 0; in ossl_ffc_params_set_seed()
137 size_t seedlen, int counter) in ossl_ffc_params_set_validate_params() argument
139 if (!ossl_ffc_params_set_seed(params, seed, seedlen)) in ossl_ffc_params_set_validate_params()
146 unsigned char **seed, size_t *seedlen, in ossl_ffc_params_get_validate_params() argument
151 if (seedlen != NULL) in ossl_ffc_params_get_validate_params()
152 *seedlen = params->seedlen; in ossl_ffc_params_get_validate_params()
[all …]
H A Dffc_params_generate.c135 int gindex, unsigned char *seed, size_t seedlen) in generate_canonical_g() argument
169 || !EVP_DigestUpdate(mctx, seed, seedlen) in generate_canonical_g()
314 int qsize, unsigned char *seed, size_t seedlen, in generate_q_fips186_4() argument
332 && RAND_bytes_ex(libctx, seed, seedlen, 0) <= 0) in generate_q_fips186_4()
339 if (!EVP_Digest(seed, seedlen, md, NULL, evpmd, NULL)) in generate_q_fips186_4()
521 size_t seedlen = 0; in ossl_ffc_params_FIPS186_4_gen_verify() local
584 seedlen = params->seedlen; in ossl_ffc_params_FIPS186_4_gen_verify()
585 if (seedlen == 0) in ossl_ffc_params_FIPS186_4_gen_verify()
586 seedlen = (size_t)mdsize; in ossl_ffc_params_FIPS186_4_gen_verify()
638 if ((seedlen * 8) < N) { in ossl_ffc_params_FIPS186_4_gen_verify()
[all …]
/freebsd/crypto/openssl/providers/implementations/rands/
H A Ddrbg_hash.c44 /* Determine what seedlen to use based on the block length */
79 size_t outlen = drbg->seedlen; in hash_df()
83 * seedlen bytes which is always less than the maximum permitted. in hash_df()
142 * where dst size is drbg->seedlen, and inlen <= drbg->seedlen.
152 assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); in add_bytes()
154 d = &dst[drbg->seedlen - 1]; in add_bytes()
165 for (i = drbg->seedlen - inlen; i > 0; --i, d--) { in add_bytes()
174 /* V = (V + Hash(inbyte || V || [additional_input]) mod (2^seedlen) */
[all...]
H A Ddrbg_ctr.c255 * of seedlen, however other uses of this algorithm pad the input with
293 ctr_XOR(ctr, ctr->KX, drbg->seedlen); in ctr_update()
513 const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; in drbg_ctr_init_lengths()
554 drbg->seedlen = keylen + 16; in drbg_ctr_init()
H A Ddrbg_local.h167 size_t seedlen; member
H A Ddrbg_hmac.c389 ctx->seedlen = hmac->blocklen; in drbg_hmac_set_ctx_params()
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dtls1_prf.c95 size_t seedlen; member
131 OPENSSL_cleanse(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset()
152 if (ctx->seedlen == 0) { in kdf_tls1_prf_derive()
163 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive()
204 const void *q = ctx->seed + ctx->seedlen; in kdf_tls1_prf_set_ctx_params()
210 TLS1_PRF_MAXBUF - ctx->seedlen, in kdf_tls1_prf_set_ctx_params()
213 ctx->seedlen += sz; in kdf_tls1_prf_set_ctx_params()
/freebsd/crypto/openssl/providers/implementations/keymgmt/
H A Ddsa_kmgmt.c61 size_t seedlen; member
447 size_t seedlen) in dsa_set_gen_seed() argument
449 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed()
451 gctx->seedlen = 0; in dsa_set_gen_seed()
452 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed()
453 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed()
456 gctx->seedlen = seedlen; in dsa_set_gen_seed()
584 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen()
633 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
H A Ddh_kmgmt.c64 size_t seedlen; member
509 size_t seedlen) in dh_set_gen_seed() argument
511 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_set_gen_seed()
513 gctx->seedlen = 0; in dh_set_gen_seed()
514 if (seed != NULL && seedlen > 0) { in dh_set_gen_seed()
515 gctx->seed = OPENSSL_memdup(seed, seedlen); in dh_set_gen_seed()
518 gctx->seedlen = seedlen; in dh_set_gen_seed()
732 if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dh_gen()
801 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_gen_cleanup()
/freebsd/crypto/openssl/include/internal/
H A Dffc.h102 size_t seedlen; member
133 const unsigned char *seed, size_t seedlen);
144 size_t seedlen, int counter);
146 unsigned char **seed, size_t *seedlen,
/freebsd/crypto/openssl/demos/pkey/
H A DEVP_PKEY_DSA_paramvalidate.c115 size_t seedlen; in main() local
117 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main()
160 (void *)seed, seedlen); in main()
H A Ddsa.inc118 size_t seedlen;
130 sizeof(seed), &seedlen) > 0) {
132 BIO_dump(bio, seed, seedlen);
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_asn1.c141 size_t seedlen = 0; in i2d_DHxparams() local
148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams()
149 seed.length = (int)seedlen; in i2d_DHxparams()
/freebsd/crypto/openssl/crypto/evp/
H A Ddsa_ctrl.c61 size_t seedlen) in EVP_PKEY_CTX_set_dsa_paramgen_seed() argument
70 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dsa_paramgen_seed()
H A Ddh_ctrl.c65 size_t seedlen) in EVP_PKEY_CTX_set_dh_paramgen_seed() argument
74 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dh_paramgen_seed()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod17 unsigned char *seed, int seedlen);
33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>.
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_oaep.c333 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument
356 || !EVP_DigestUpdate(c, seed, seedlen) in PKCS1_MGF1()
/freebsd/crypto/libecc/src/examples/sig/rsa/
H A Drsa.h141 const u8 *forced_seed, u32 seedlen);
150 const u8 *forced_seed, u32 seedlen);
H A Drsa.c1137 const u8 *forced_seed, u32 seedlen) in rsaes_pkcs1_v1_5_encrypt() argument
1168 MUST_HAVE((seedlen == (k - mlen - 3)), ret, err); in rsaes_pkcs1_v1_5_encrypt()
1170 for(i = 0; i < seedlen; i++){ in rsaes_pkcs1_v1_5_encrypt()
1173 ret = local_memcpy(&em[2], forced_seed, seedlen); EG(ret, err); in rsaes_pkcs1_v1_5_encrypt()
1302 const u8 *forced_seed, u32 seedlen) in rsaes_oaep_encrypt() argument
1370 MUST_HAVE((seedlen == hlen), ret, err); in rsaes_oaep_encrypt()
1371 ret = local_memcpy(seed, forced_seed, seedlen); EG(ret, err); in rsaes_oaep_encrypt()
/freebsd/crypto/openssl/include/openssl/
H A Dkdf.h103 const unsigned char *seed, int seedlen);
H A Ddsa.h37 size_t seedlen);
H A Ddh.h38 size_t seedlen);
/freebsd/crypto/libecc/src/sig/
H A Dbip0340.c697 …TE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_one_scalar(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_one_scalar() argument
704 MUST_HAVE((seedlen == SHA256_DIGEST_SIZE) && (scalar_len <= CHACHA20_MAX_ASKED_LEN), ret, err); in _bip0340_compute_batch_csprng_one_scalar()
717 …IBUTE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_scalars(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_scalars() argument
734 ret = _bip0340_compute_batch_csprng_one_scalar(seed, seedlen, in _bip0340_compute_batch_csprng_scalars()
761 u8 p_len, u8 *seed, u32 seedlen) in _bip0340_compute_batch_csprng_seed() argument
779 MUST_HAVE((seedlen == hm->digest_size), ret, err); in _bip0340_compute_batch_csprng_seed()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_PKEY-DH.pod246 size_t seedlen = ...; /* by other means, required */
258 extra_params[0] = OSSL_PARAM_construct_octet_string("seed", seed, seedlen);
/freebsd/crypto/openssl/test/
H A Dacvp_test.c415 size_t plen = 0, qlen = 0, seedlen = 0; in dsa_paramgen_test() local
428 &seed, &seedlen)) in dsa_paramgen_test()
436 test_output_memory("domainSeed", seed, seedlen); in dsa_paramgen_test()

12