/openssl-master/crypto/bn/ |
A D | bn_rand.c | 24 unsigned int strength, BN_CTX *ctx) in bnrand() argument 50 b = flag == NORMAL ? RAND_bytes_ex(libctx, buf, bytes, strength) in bnrand() 63 if (RAND_bytes_ex(libctx, &c, 1, strength) <= 0) in bnrand() 103 unsigned int strength, BN_CTX *ctx) in BN_rand_ex() argument 105 return bnrand(NORMAL, rnd, bits, top, bottom, strength, ctx); in BN_rand_ex() 120 unsigned int strength, BN_CTX *ctx) in BN_priv_rand_ex() argument 122 return bnrand(PRIVATE, rnd, bits, top, bottom, strength, ctx); in BN_priv_rand_ex() 134 unsigned int strength, BN_CTX *ctx) in bnrand_range() argument 157 strength, ctx)) in bnrand_range() 203 return bnrand_range(NORMAL, r, range, strength, ctx); in BN_rand_range_ex() [all …]
|
/openssl-master/providers/implementations/rands/ |
A D | test_rng.c | 43 unsigned int strength; member 77 static int test_rng_instantiate(void *vtest, unsigned int strength, in test_rng_instantiate() argument 84 if (!test_rng_set_ctx_params(t, params) || strength > t->strength) in test_rng_instantiate() 103 unsigned int strength, int prediction_resistance, in test_rng_generate() argument 108 if (strength > t->strength || t->entropy_len - t->entropy_pos < outlen) in test_rng_generate() 126 unsigned int strength, in test_rng_nonce() argument 132 if (t->nonce == NULL || strength > t->strength) in test_rng_nonce() 150 if (p != NULL && !OSSL_PARAM_set_int(p, t->strength)) in test_rng_get_ctx_params() 182 if (p != NULL && !OSSL_PARAM_get_uint(p, &t->strength)) in test_rng_set_ctx_params()
|
A D | drbg.c | 177 drbg->strength, prediction_resistance, in ossl_drbg_get_seed() 216 if (drbg->strength > p_str) { in get_entropy() 241 bytes = drbg->parent_get_seed(drbg->parent, pout, drbg->strength, in get_entropy() 369 if (strength > drbg->strength) { in ossl_prov_drbg_instantiate() 373 min_entropy = drbg->strength; in ossl_prov_drbg_instantiate() 411 drbg->strength, in ossl_prov_drbg_instantiate() 427 min_entropy += drbg->strength / 2; in ossl_prov_drbg_instantiate() 579 entropylen = get_entropy(drbg, &entropy, drbg->strength, in ossl_prov_drbg_reseed() 638 if (strength > drbg->strength) { in ossl_prov_drbg_generate() 831 if (drbg->strength > p_str) { in ossl_rand_drbg_new() [all …]
|
A D | drbg_hmac.c | 143 static int drbg_hmac_instantiate_wrapper(void *vdrbg, unsigned int strength, in drbg_hmac_instantiate_wrapper() argument 153 return ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance, in drbg_hmac_instantiate_wrapper() 241 (void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength, in drbg_hmac_generate_wrapper() argument 246 return ossl_prov_drbg_generate(drbg, out, outlen, strength, in drbg_hmac_generate_wrapper() 385 ctx->strength = 64 * (int)(hmac->blocklen >> 3); in drbg_hmac_set_ctx_params() 386 if (ctx->strength > 256) in drbg_hmac_set_ctx_params() 387 ctx->strength = 256; in drbg_hmac_set_ctx_params() 389 ctx->min_entropylen = ctx->strength / 8; in drbg_hmac_set_ctx_params()
|
A D | drbg_hash.c | 266 static int drbg_hash_instantiate_wrapper(void *vdrbg, unsigned int strength, in drbg_hash_instantiate_wrapper() argument 276 return ossl_prov_drbg_instantiate(drbg, strength, prediction_resistance, in drbg_hash_instantiate_wrapper() 353 (void *vdrbg, unsigned char *out, size_t outlen, unsigned int strength, in drbg_hash_generate_wrapper() argument 358 return ossl_prov_drbg_generate(drbg, out, outlen, strength, in drbg_hash_generate_wrapper() 479 ctx->strength = 64 * (hash->blocklen >> 3); in drbg_hash_set_ctx_params() 480 if (ctx->strength > 256) in drbg_hash_set_ctx_params() 481 ctx->strength = 256; in drbg_hash_set_ctx_params() 487 ctx->min_entropylen = ctx->strength / 8; in drbg_hash_set_ctx_params()
|
A D | drbg_local.h | 129 unsigned int strength; member 195 int ossl_prov_drbg_instantiate(PROV_DRBG *drbg, unsigned int strength, 206 unsigned int strength, int prediction_resistance,
|
A D | seed_src.c | 71 static int seed_src_instantiate(void *vseed, unsigned int strength, in seed_src_instantiate() argument 91 unsigned int strength, in seed_src_generate() argument 107 pool = ossl_rand_pool_new(strength, 1, outlen, outlen); in seed_src_generate()
|
/openssl-master/providers/common/ |
A D | securitycheck.c | 96 int nid, strength; in ossl_ec_check_key() local 122 strength = EC_GROUP_order_bits(group) / 2; in ossl_ec_check_key() 124 if (strength < 80) { in ossl_ec_check_key() 133 if (protect && strength < 112) { in ossl_ec_check_key()
|
/openssl-master/crypto/evp/ |
A D | evp_rand.c | 502 (EVP_RAND_CTX *ctx, unsigned int strength, int prediction_resistance, in evp_rand_instantiate_locked() argument 505 return ctx->meth->instantiate(ctx->algctx, strength, prediction_resistance, in evp_rand_instantiate_locked() 509 int EVP_RAND_instantiate(EVP_RAND_CTX *ctx, unsigned int strength, in EVP_RAND_instantiate() argument 518 res = evp_rand_instantiate_locked(ctx, strength, prediction_resistance, in EVP_RAND_instantiate() 541 size_t outlen, unsigned int strength, in evp_rand_generate_locked() argument 558 if (!ctx->meth->generate(ctx->algctx, out, chunk, strength, in evp_rand_generate_locked() 573 unsigned int strength, int prediction_resistance, in EVP_RAND_generate() argument 580 res = evp_rand_generate_locked(ctx, out, outlen, strength, in EVP_RAND_generate() 613 unsigned int strength = 0; in evp_rand_strength_locked() local 615 params[0] = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_STRENGTH, &strength); in evp_rand_strength_locked() [all …]
|
/openssl-master/doc/man3/ |
A D | BN_rand.pod | 15 unsigned int strength, BN_CTX *ctx); 19 unsigned int strength, BN_CTX *ctx); 22 int BN_rand_range_ex(BIGNUM *rnd, const BIGNUM *range, unsigned int strength, 26 int BN_priv_rand_range_ex(BIGNUM *rnd, const BIGNUM *range, unsigned int strength, 40 number of I<bits> in length and security strength at least I<strength> bits 62 number I<rnd>, of security stength at least I<strength> bits,
|
A D | RAND_bytes.pod | 16 unsigned int strength); 18 unsigned int strength); 39 RAND_priv_bytes() except that they both take additional I<strength> and 40 I<ctx> parameters. The bytes genreated will have a security strength of at 41 least I<strength> bits.
|
A D | EVP_RAND.pod | 53 int EVP_RAND_instantiate(EVP_RAND_CTX *ctx, unsigned int strength, 59 unsigned int strength, int prediction_resistance, 130 then instantiates the RAND I<ctx> with a minimum security strength 131 of <strength> and personalisation string I<pstr> of length <pstr_len>. 141 produced will meet the security I<strength>. 212 EVP_RAND_get_strength() returns the security strength of the RAND I<ctx>. 268 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 270 Returns the bit strength of the random number generator. 372 EVP_RAND_get_strength() returns the strength of the random number generator
|
/openssl-master/doc/man7/ |
A D | EVP_RAND-TEST-RAND.pod | 27 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 80 unsigned int strength = 48; 86 *p++ = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_STRENGTH, &strength); 92 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 94 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0);
|
A D | EVP_RAND-SEED-SRC.pod | 29 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 50 unsigned int strength = 128; 66 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 68 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0);
|
A D | EVP_RAND-HASH-DRBG.pod | 25 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 68 unsigned int strength = 128; 76 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 78 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0);
|
A D | EVP_RAND-HMAC-DRBG.pod | 25 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 70 unsigned int strength = 128; 79 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 81 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0);
|
A D | EVP_RAND-CTR-DRBG.pod | 25 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 74 unsigned int strength = 128; 83 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 85 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0);
|
A D | provider-rand.pod | 27 int OSSL_FUNC_rand_instantiate(void *ctx, unsigned int strength, 33 unsigned int strength, int prediction_resistance, 41 int strength, size_t min_noncelen, 99 security I<strength>. In addition, I<prediction_resistance> can be requested. 110 I<out>. The generated bytes will meet the specified security I<strength> and, 117 OSSL_FUNC_rand_nonce() is used to generate a nonce of the given I<strength> with a 190 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 192 Returns the bit strength of the random number generator.
|
/openssl-master/ssl/ |
A D | tls_srp.c | 47 ctx->srp_ctx.strength = SRP_MINIMAL_N; in ssl_ctx_srp_ctx_free_intern() 75 s->srp_ctx.strength = SRP_MINIMAL_N; in ssl_srp_ctx_free_intern() 108 s->srp_ctx.strength = ctx->srp_ctx.strength; in ssl_srp_ctx_init_intern() 172 ctx->srp_ctx.strength = SRP_MINIMAL_N; in ssl_ctx_srp_ctx_init_intern() 396 if (BN_num_bits(srp->N) < srp->strength) { in srp_verify_server_param() 480 int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength) in SSL_CTX_set_srp_strength() argument 482 return tls1_ctx_ctrl(ctx, SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH, strength, in SSL_CTX_set_srp_strength()
|
/openssl-master/include/openssl/ |
A D | rand.h | 69 unsigned int strength); 76 unsigned int strength);
|
/openssl-master/fuzz/ |
A D | fuzz_rand.c | 41 ossl_unused unsigned int strength, in fuzz_rand_instantiate() argument 59 ossl_unused unsigned int strength, in fuzz_rand_generate() argument
|
/openssl-master/providers/fips/ |
A D | self_test_kats.c | 257 unsigned int strength = 256; in self_test_drbg() local 275 &strength); in self_test_drbg() 288 strength = EVP_RAND_get_strength(drbg); in self_test_drbg() 305 if (!EVP_RAND_instantiate(test, strength, 0, NULL, 0, drbg_params)) in self_test_drbg() 307 if (!EVP_RAND_instantiate(drbg, strength, 0, t->persstr, t->persstrlen, in self_test_drbg() 318 if (!EVP_RAND_generate(drbg, out, t->expectedlen, strength, in self_test_drbg() 334 if (!EVP_RAND_generate(drbg, out, t->expectedlen, strength, in self_test_drbg()
|
/openssl-master/crypto/rsa/ |
A D | rsa_local.h | 165 int ossl_rsa_sp800_56b_validate_strength(int nbits, int strength); 182 int strength, int nbits);
|
/openssl-master/test/testutil/ |
A D | fake_random.c | 50 static int fake_rand_instantiate(void *vrng, ossl_unused unsigned int strength, in fake_rand_instantiate() argument 71 unsigned int strength, int prediction_resistance, in fake_rand_generate() argument
|
/openssl-master/test/ |
A D | provfetchtest.c | 99 static int dummy_rand_instantiate(void *vdrbg, unsigned int strength, in dummy_rand_instantiate() argument 113 unsigned int strength, int prediction_resistance, in dummy_rand_generate() argument
|