Home
last modified time | relevance | path

Searched refs:seedlen (Results 1 – 25 of 36) sorted by relevance

12

/freebsd/crypto/openssl/crypto/ffc/
H A Dffc_params.c35 OPENSSL_clear_free(params->seed, params->seedlen); in ossl_ffc_params_cleanup()
83 const unsigned char *seed, size_t seedlen) in ossl_ffc_params_set_seed() argument
91 if (seed != NULL && seedlen > 0) { in ossl_ffc_params_set_seed()
92 params->seed = OPENSSL_memdup(seed, seedlen); in ossl_ffc_params_set_seed()
95 params->seedlen = seedlen; in ossl_ffc_params_set_seed()
98 params->seedlen = 0; in ossl_ffc_params_set_seed()
140 size_t seedlen, int counter) in ossl_ffc_params_set_validate_params() argument
142 if (!ossl_ffc_params_set_seed(params, seed, seedlen)) in ossl_ffc_params_set_validate_params()
149 unsigned char **seed, size_t *seedlen, in ossl_ffc_params_get_validate_params() argument
154 if (seedlen != NULL) in ossl_ffc_params_get_validate_params()
[all …]
H A Dffc_params_generate.c135 int gindex, unsigned char *seed, size_t seedlen) in generate_canonical_g() argument
169 || !EVP_DigestUpdate(mctx, seed, seedlen) in generate_canonical_g()
314 int qsize, unsigned char *seed, size_t seedlen, in generate_q_fips186_4() argument
335 && RAND_bytes_ex(libctx, seed, seedlen, 0) <= 0) in generate_q_fips186_4()
342 if (!EVP_Digest(seed, seedlen, md, NULL, evpmd, NULL)) in generate_q_fips186_4()
524 size_t seedlen = 0; in ossl_ffc_params_FIPS186_4_gen_verify() local
587 seedlen = params->seedlen; in ossl_ffc_params_FIPS186_4_gen_verify()
588 if (seedlen == 0) in ossl_ffc_params_FIPS186_4_gen_verify()
589 seedlen = (size_t)mdsize; in ossl_ffc_params_FIPS186_4_gen_verify()
641 if ((seedlen * 8) < N) { in ossl_ffc_params_FIPS186_4_gen_verify()
[all …]
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dtls1_prf.c108 size_t seedlen; member
145 OPENSSL_clear_free(ctx->seed, ctx->seedlen); in kdf_tls1_prf_reset()
165 if (!ossl_prov_memdup(src->seed, src->seedlen, &dest->seed, in kdf_tls1_prf_dup()
166 &dest->seedlen)) in kdf_tls1_prf_dup()
190 int ems_approved = (ctx->seedlen < TLS_MD_MASTER_SECRET_CONST_SIZE in fips_ems_check_passed()
264 if (ctx->seedlen == 0) { in kdf_tls1_prf_derive()
280 ctx->seed, ctx->seedlen, in kdf_tls1_prf_derive()
364 size_t seedlen; in kdf_tls1_prf_set_ctx_params() local
370 seedlen = safe_add_size_t(ctx->seedlen, sz, &err); in kdf_tls1_prf_set_ctx_params()
374 seed = OPENSSL_clear_realloc(ctx->seed, ctx->seedlen, seedlen); in kdf_tls1_prf_set_ctx_params()
[all …]
/freebsd/crypto/openssl/providers/implementations/rands/
H A Ddrbg_hash.c84 size_t outlen = drbg->seedlen; in hash_df()
157 assert(drbg->seedlen >= 1 && inlen >= 1 && inlen <= drbg->seedlen); in add_bytes()
159 d = &dst[drbg->seedlen - 1]; in add_bytes()
170 for (i = drbg->seedlen - inlen; i > 0; --i, d--) { in add_bytes()
188 && EVP_DigestUpdate(ctx, hash->V, drbg->seedlen) in add_hash_to_v()
219 memcpy(hash->vtmp, hash->V, drbg->seedlen); in hash_gen()
223 || !EVP_DigestUpdate(hash->ctx, hash->vtmp, drbg->seedlen)) in hash_gen()
268 && hash_df1(drbg, hash->C, 0x00, hash->V, drbg->seedlen); in drbg_hash_instantiate()
310 if (!hash_df(drbg, hash->C, 0x01, hash->V, drbg->seedlen, ent, ent_len, in drbg_hash_reseed()
313 memcpy(hash->V, hash->C, drbg->seedlen); in drbg_hash_reseed()
[all …]
H A Ddrbg_local.h151 size_t seedlen; member
H A Ddrbg_ctr.c300 ctr_XOR(ctr, ctr->KX, drbg->seedlen); in ctr_update()
548 const size_t len = ctr->keylen > 0 ? drbg->seedlen : DRBG_MAX_LENGTH; in drbg_ctr_init_lengths()
589 drbg->seedlen = keylen + 16; in drbg_ctr_init()
/freebsd/crypto/openssl/providers/implementations/keymgmt/
H A Dml_kem_kmgmt.c242 size_t prvlen = 0, seedlen = 0; in ml_kem_export() local
273 seedlen = ML_KEM_SEED_BYTES; in ml_kem_export()
274 if ((seedenc = OPENSSL_secure_zalloc(seedlen)) == NULL in ml_kem_export()
275 || !ossl_ml_kem_encode_seed(seedenc, seedlen, key)) in ml_kem_export()
298 tmpl, params, OSSL_PKEY_PARAM_ML_KEM_SEED, seedenc, seedlen)) in ml_kem_export()
322 OPENSSL_secure_clear_free(seedenc, seedlen); in ml_kem_export()
385 size_t publen = 0, prvlen = 0, seedlen = 0, puboff; in ml_kem_key_fromdata() local
405 && OSSL_PARAM_get_octet_string_ptr(p, &seedenc, &seedlen) != 1) in ml_kem_key_fromdata()
407 if (seedlen != 0 && seedlen != ML_KEM_SEED_BYTES) { in ml_kem_key_fromdata()
432 if (seedlen == 0 && publen == 0 && prvlen == 0) { in ml_kem_key_fromdata()
[all …]
H A Ddsa_kmgmt.c64 size_t seedlen; member
449 size_t seedlen) in dsa_set_gen_seed() argument
451 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_set_gen_seed()
453 gctx->seedlen = 0; in dsa_set_gen_seed()
454 if (seed != NULL && seedlen > 0) { in dsa_set_gen_seed()
455 gctx->seed = OPENSSL_memdup(seed, seedlen); in dsa_set_gen_seed()
458 gctx->seedlen = seedlen; in dsa_set_gen_seed()
647 && !ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dsa_gen()
696 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dsa_gen_cleanup()
H A Ddh_kmgmt.c67 size_t seedlen; member
511 size_t seedlen) in dh_set_gen_seed() argument
513 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_set_gen_seed()
515 gctx->seedlen = 0; in dh_set_gen_seed()
516 if (seed != NULL && seedlen > 0) { in dh_set_gen_seed()
517 gctx->seed = OPENSSL_memdup(seed, seedlen); in dh_set_gen_seed()
520 gctx->seedlen = seedlen; in dh_set_gen_seed()
749 if (!ossl_ffc_params_set_seed(ffc, gctx->seed, gctx->seedlen)) in dh_gen()
825 OPENSSL_clear_free(gctx->seed, gctx->seedlen); in dh_gen_cleanup()
/freebsd/crypto/openssl/include/internal/
H A Dffc.h102 size_t seedlen; member
133 const unsigned char *seed, size_t seedlen);
144 size_t seedlen, int counter);
146 unsigned char **seed, size_t *seedlen,
/freebsd/crypto/krb5/src/plugins/preauth/spake/
H A Dutil.c157 size_t hashlen, seedlen, keylen, nblocks, i; in derive_key() local
181 ret = krb5_c_keylengths(context, ikey->enctype, &seedlen, &keylen); in derive_key()
184 nblocks = (seedlen + hashlen - 1) / hashlen; in derive_key()
201 d = make_data(seed.data, seedlen); in derive_key()
/freebsd/crypto/openssl/demos/pkey/
H A DEVP_PKEY_DSA_paramvalidate.c114 size_t seedlen; in main() local
116 if (!OPENSSL_hexstr2buf_ex(seed, sizeof(seed), &seedlen, hexseed, '\0')) in main()
159 (void *)seed, seedlen); in main()
H A Ddsa.inc118 size_t seedlen;
130 sizeof(seed), &seedlen) > 0) {
132 BIO_dump(bio, seed, seedlen);
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_asn1.c141 size_t seedlen = 0; in i2d_DHxparams() local
148 ossl_ffc_params_get_validate_params(params, &seed.data, &seedlen, &counter); in i2d_DHxparams()
149 seed.length = (int)seedlen; in i2d_DHxparams()
/freebsd/crypto/openssl/providers/implementations/kem/
H A Dec_kem.c463 size_t seedlen = ikmlen; in derivekey() local
473 if (seed == NULL || seedlen == 0) { in derivekey()
474 seedlen = ctx->info->Nsk; in derivekey()
475 if (seedlen > sizeof(tmpbuf)) in derivekey()
477 if (RAND_priv_bytes_ex(ctx->libctx, tmpbuf, seedlen, 0) <= 0) in derivekey()
481 ret = ossl_ec_generate_key_dhkem(key, seed, seedlen); in derivekey()
484 OPENSSL_cleanse(seed, seedlen); in derivekey()
H A Decx_kem.c394 size_t seedlen = ikmlen; in derivekey() local
406 if (seed == NULL || seedlen == 0) { in derivekey()
412 seedlen = info->Nsk; in derivekey()
414 if (!ossl_ecx_dhkem_derive_private(key, privkey, seed, seedlen)) in derivekey()
426 OPENSSL_cleanse(seed, seedlen); in derivekey()
/freebsd/crypto/openssl/crypto/evp/
H A Ddsa_ctrl.c61 size_t seedlen) in EVP_PKEY_CTX_set_dsa_paramgen_seed() argument
70 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dsa_paramgen_seed()
H A Ddh_ctrl.c65 size_t seedlen) in EVP_PKEY_CTX_set_dh_paramgen_seed() argument
74 (void *)seed, seedlen); in EVP_PKEY_CTX_set_dh_paramgen_seed()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod17 unsigned char *seed, int seedlen);
33 EVP_PKEY_CTX_add1_tls1_prf_seed() sets the seed to B<seedlen> bytes of B<seed>.
/freebsd/crypto/libecc/src/examples/sig/rsa/
H A Drsa.h141 const u8 *forced_seed, u32 seedlen);
150 const u8 *forced_seed, u32 seedlen);
H A Drsa.c1137 const u8 *forced_seed, u32 seedlen) in rsaes_pkcs1_v1_5_encrypt() argument
1168 MUST_HAVE((seedlen == (k - mlen - 3)), ret, err); in rsaes_pkcs1_v1_5_encrypt()
1170 for(i = 0; i < seedlen; i++){ in rsaes_pkcs1_v1_5_encrypt()
1173 ret = local_memcpy(&em[2], forced_seed, seedlen); EG(ret, err); in rsaes_pkcs1_v1_5_encrypt()
1302 const u8 *forced_seed, u32 seedlen) in rsaes_oaep_encrypt() argument
1370 MUST_HAVE((seedlen == hlen), ret, err); in rsaes_oaep_encrypt()
1371 ret = local_memcpy(seed, forced_seed, seedlen); EG(ret, err); in rsaes_oaep_encrypt()
/freebsd/crypto/openssl/crypto/rsa/
H A Drsa_oaep.c351 const unsigned char *seed, long seedlen, const EVP_MD *dgst) in PKCS1_MGF1() argument
374 || !EVP_DigestUpdate(c, seed, seedlen) in PKCS1_MGF1()
/freebsd/crypto/openssl/include/openssl/
H A Dkdf.h103 const unsigned char *seed, int seedlen);
/freebsd/crypto/openssl/include/crypto/
H A Dml_kem.h241 ML_KEM_KEY *ossl_ml_kem_set_seed(const uint8_t *seed, size_t seedlen,
/freebsd/crypto/libecc/src/sig/
H A Dbip0340.c697 …TE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_one_scalar(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_one_scalar() argument
704 MUST_HAVE((seedlen == SHA256_DIGEST_SIZE) && (scalar_len <= CHACHA20_MAX_ASKED_LEN), ret, err); in _bip0340_compute_batch_csprng_one_scalar()
717 …IBUTE_WARN_UNUSED_RET static int _bip0340_compute_batch_csprng_scalars(const u8 *seed, u32 seedlen, in _bip0340_compute_batch_csprng_scalars() argument
734 ret = _bip0340_compute_batch_csprng_one_scalar(seed, seedlen, in _bip0340_compute_batch_csprng_scalars()
761 u8 p_len, u8 *seed, u32 seedlen) in _bip0340_compute_batch_csprng_seed() argument
779 MUST_HAVE((seedlen == hm->digest_size), ret, err); in _bip0340_compute_batch_csprng_seed()

12