| /freebsd/crypto/openssl/crypto/ffc/ |
| H A D | ffc_params.c | 35 OPENSSL_clear_free(params->seed, params->seedlen); in ossl_ffc_params_cleanup() 83 const unsigned char *seed, size_t seedlen) in ossl_ffc_params_set_seed() argument 91 if (seed != NULL && seedlen > 0) { in ossl_ffc_params_set_seed() 92 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed() 95 params->seedlen = seedlen; in ossl_ffc_params_set_seed() 98 params->seedlen = 0; in ossl_ffc_params_set_seed() 140 size_t seedlen, int counter) in ossl_ffc_params_set_validate_params() argument 142 if (!ossl_ffc_params_set_seed(params, seed, seedlen)) in ossl_ffc_params_set_validate_params() 149 unsigned char **seed, size_t *seedlen, in ossl_ffc_params_get_validate_params() argument 154 if (seedlen != NULL) in ossl_ffc_params_get_validate_params() [all …]
|
| H A D | ffc_params_generate.c | 135 int gindex, unsigned char *seed, size_t seedlen) in generate_canonical_g() argument 169 || !EVP_DigestUpdate(mctx, seed, seedlen) in generate_canonical_g() 314 int qsize, unsigned char *seed, size_t seedlen, in generate_q_fips186_4() argument 335 && RAND_bytes_ex(libctx, seed, seedlen, 0) <= 0) in generate_q_fips186_4() 342 if (!EVP_Digest(seed, seedlen, md, NULL, evpmd, NULL)) in generate_q_fips186_4() 524 size_t seedlen = 0; in ossl_ffc_params_FIPS186_4_gen_verify() local 587 seedlen = params->seedlen; in ossl_ffc_params_FIPS186_4_gen_verify() 588 if (seedlen == 0) in ossl_ffc_params_FIPS186_4_gen_verify() 589 seedlen = (size_t)mdsize; in ossl_ffc_params_FIPS186_4_gen_verify() 641 if ((seedlen * 8) < N) { in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/kdfs/ |
| H A D | tls1_prf.c | 108 size_t seedlen; member 145 OPENSSL_clear_free(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset() 165 if (!ossl_prov_memdup(src->seed, src->seedlen, &dest->seed, in kdf_tls1_prf_dup() 166 &dest->seedlen)) in kdf_tls1_prf_dup() 190 int ems_approved = (ctx->seedlen < TLS_MD_MASTER_SECRET_CONST_SIZE in fips_ems_check_passed() 264 if (ctx->seedlen == 0) { in kdf_tls1_prf_derive() 280 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive() 364 size_t seedlen; in kdf_tls1_prf_set_ctx_params() local 370 seedlen = safe_add_size_t(ctx->seedlen, sz, &err); in kdf_tls1_prf_set_ctx_params() 374 seed = OPENSSL_clear_realloc(ctx->seed, ctx->seedlen, seedlen); in kdf_tls1_prf_set_ctx_params() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/rands/ |
| H A D | drbg_hash.c | 84 size_t outlen = drbg->seedlen; in hash_df() 157 assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); in add_bytes() 159 d = &dst[drbg->seedlen - 1]; in add_bytes() 170 for (i = drbg->seedlen - inlen; i > 0; --i, d--) { in add_bytes() 188 && EVP_DigestUpdate(ctx, hash->V, drbg->seedlen) in add_hash_to_v() 219 memcpy(hash->vtmp, hash->V, drbg->seedlen); in hash_gen() 223 || !EVP_DigestUpdate(hash->ctx, hash->vtmp, drbg->seedlen)) in hash_gen() 268 && hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen); in drbg_hash_instantiate() 310 if (!hash_df(drbg, hash->C, 0x01, hash->V, drbg->seedlen, ent, ent_len, in drbg_hash_reseed() 313 memcpy(hash->V, hash->C, drbg->seedlen); in drbg_hash_reseed() [all …]
|
| H A D | drbg_local.h | 151 size_t seedlen; member
|
| H A D | drbg_ctr.c | 300 ctr_XOR(ctr, ctr->KX, drbg->seedlen); in ctr_update() 548 const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; in drbg_ctr_init_lengths() 589 drbg->seedlen = keylen + 16; in drbg_ctr_init()
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | ml_kem_kmgmt.c | 242 size_t prvlen = 0, seedlen = 0; in ml_kem_export() local 273 seedlen = ML_KEM_SEED_BYTES; in ml_kem_export() 274 if ((seedenc = OPENSSL_secure_zalloc(seedlen)) == NULL in ml_kem_export() 275 || !ossl_ml_kem_encode_seed(seedenc, seedlen, key)) in ml_kem_export() 298 tmpl, params, OSSL_PKEY_PARAM_ML_KEM_SEED, seedenc, seedlen)) in ml_kem_export() 322 OPENSSL_secure_clear_free(seedenc, seedlen); in ml_kem_export() 385 size_t publen = 0, prvlen = 0, seedlen = 0, puboff; in ml_kem_key_fromdata() local 405 && OSSL_PARAM_get_octet_string_ptr(p, &seedenc, &seedlen) != 1) in ml_kem_key_fromdata() 407 if (seedlen != 0 && seedlen != ML_KEM_SEED_BYTES) { in ml_kem_key_fromdata() 432 if (seedlen == 0 && publen == 0 && prvlen == 0) { in ml_kem_key_fromdata() [all …]
|
| H A D | dsa_kmgmt.c | 64 size_t seedlen; member 449 size_t seedlen) in dsa_set_gen_seed() argument 451 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed() 453 gctx->seedlen = 0; in dsa_set_gen_seed() 454 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed() 455 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed() 458 gctx->seedlen = seedlen; in dsa_set_gen_seed() 647 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen() 696 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
|
| H A D | dh_kmgmt.c | 67 size_t seedlen; member 511 size_t seedlen) in dh_set_gen_seed() argument 513 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_set_gen_seed() 515 gctx->seedlen = 0; in dh_set_gen_seed() 516 if (seed != NULL && seedlen > 0) { in dh_set_gen_seed() 517 gctx->seed = OPENSSL_memdup(seed, seedlen); in dh_set_gen_seed() 520 gctx->seedlen = seedlen; in dh_set_gen_seed() 749 if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dh_gen() 825 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_gen_cleanup()
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | ffc.h | 102 size_t seedlen; member 133 const unsigned char *seed, size_t seedlen); 144 size_t seedlen, int counter); 146 unsigned char **seed, size_t *seedlen,
|
| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | util.c | 157 size_t hashlen, seedlen, keylen, nblocks, i; in derive_key() local 181 ret = krb5_c_keylengths(context, ikey->enctype, &seedlen, &keylen); in derive_key() 184 nblocks = (seedlen + hashlen - 1) / hashlen; in derive_key() 201 d = make_data(seed.data, seedlen); in derive_key()
|
| /freebsd/crypto/openssl/demos/pkey/ |
| H A D | EVP_PKEY_DSA_paramvalidate.c | 114 size_t seedlen; in main() local 116 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main() 159 (void *)seed, seedlen); in main()
|
| H A D | dsa.inc | 118 size_t seedlen; 130 sizeof(seed), &seedlen) > 0) { 132 BIO_dump(bio, seed, seedlen);
|
| /freebsd/crypto/openssl/crypto/dh/ |
| H A D | dh_asn1.c | 141 size_t seedlen = 0; in i2d_DHxparams() local 148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams() 149 seed.length = (int)seedlen; in i2d_DHxparams()
|
| /freebsd/crypto/openssl/providers/implementations/kem/ |
| H A D | ec_kem.c | 463 size_t seedlen = ikmlen; in derivekey() local 473 if (seed == NULL || seedlen == 0) { in derivekey() 474 seedlen = ctx->info->Nsk; in derivekey() 475 if (seedlen > sizeof(tmpbuf)) in derivekey() 477 if (RAND_priv_bytes_ex(ctx->libctx, tmpbuf, seedlen, 0) <= 0) in derivekey() 481 ret = ossl_ec_generate_key_dhkem(key, seed, seedlen); in derivekey() 484 OPENSSL_cleanse(seed, seedlen); in derivekey()
|
| H A D | ecx_kem.c | 394 size_t seedlen = ikmlen; in derivekey() local 406 if (seed == NULL || seedlen == 0) { in derivekey() 412 seedlen = info->Nsk; in derivekey() 414 if (!ossl_ecx_dhkem_derive_private(key, privkey, seed, seedlen)) in derivekey() 426 OPENSSL_cleanse(seed, seedlen); in derivekey()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | dsa_ctrl.c | 61 size_t seedlen) in EVP_PKEY_CTX_set_dsa_paramgen_seed() argument 70 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dsa_paramgen_seed()
|
| H A D | dh_ctrl.c | 65 size_t seedlen) in EVP_PKEY_CTX_set_dh_paramgen_seed() argument 74 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dh_paramgen_seed()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 17 unsigned char *seed, int seedlen); 33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>.
|
| /freebsd/crypto/libecc/src/examples/sig/rsa/ |
| H A D | rsa.h | 141 const u8 *forced_seed, u32 seedlen); 150 const u8 *forced_seed, u32 seedlen);
|
| H A D | rsa.c | 1137 const u8 *forced_seed, u32 seedlen) in rsaes_pkcs1_v1_5_encrypt() argument 1168 MUST_HAVE((seedlen == (k - mlen - 3)), ret, err); in rsaes_pkcs1_v1_5_encrypt() 1170 for(i = 0; i < seedlen; i++){ in rsaes_pkcs1_v1_5_encrypt() 1173 ret = local_memcpy(&em[2], forced_seed, seedlen); EG(ret, err); in rsaes_pkcs1_v1_5_encrypt() 1302 const u8 *forced_seed, u32 seedlen) in rsaes_oaep_encrypt() argument 1370 MUST_HAVE((seedlen == hlen), ret, err); in rsaes_oaep_encrypt() 1371 ret = local_memcpy(seed, forced_seed, seedlen); EG(ret, err); in rsaes_oaep_encrypt()
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_oaep.c | 351 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument 374 || !EVP_DigestUpdate(c, seed, seedlen) in PKCS1_MGF1()
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | kdf.h | 103 const unsigned char *seed, int seedlen);
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ml_kem.h | 241 ML_KEM_KEY *ossl_ml_kem_set_seed(const uint8_t *seed, size_t seedlen,
|
| /freebsd/crypto/libecc/src/sig/ |
| H A D | bip0340.c | 697 …TE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_one_scalar(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_one_scalar() argument 704 MUST_HAVE((seedlen == SHA256_DIGEST_SIZE) && (scalar_len <= CHACHA20_MAX_ASKED_LEN), ret, err); in _bip0340_compute_batch_csprng_one_scalar() 717 …IBUTE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_scalars(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_scalars() argument 734 ret = _bip0340_compute_batch_csprng_one_scalar(seed, seedlen, in _bip0340_compute_batch_csprng_scalars() 761 u8 p_len, u8 *seed, u32 seedlen) in _bip0340_compute_batch_csprng_seed() argument 779 MUST_HAVE((seedlen == hm->digest_size), ret, err); in _bip0340_compute_batch_csprng_seed()
|