| /crypto/rand/ |
| A D | rand_uniform.c | 41 if (RAND_bytes_ex(ctx, (unsigned char *)&rand, sizeof(rand), 0) <= 0) { in ossl_rand_uniform_uint32() 77 if (RAND_bytes_ex(ctx, (unsigned char *)&rand, sizeof(rand), 0) <= 0) { in ossl_rand_uniform_uint32()
|
| A D | rand_lib.c | 460 int RAND_bytes_ex(OSSL_LIB_CTX *ctx, unsigned char *buf, size_t num, in RAND_bytes_ex() function 501 return RAND_bytes_ex(NULL, buf, (size_t)num, 0); in RAND_bytes()
|
| /crypto/asn1/ |
| A D | p5_pbev2.c | 86 else if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) 216 } else if (RAND_bytes_ex(libctx, osalt->data, saltlen, 0) <= 0) { in PKCS5_pbkdf2_set_ex()
|
| A D | p5_pbe.c | 58 else if (RAND_bytes_ex(ctx, sstr, saltlen, 0) <= 0)
|
| A D | asn_mime.c | 282 if (RAND_bytes_ex(libctx, (unsigned char *)bound, 32, 0) <= 0) in SMIME_write_ASN1_ex()
|
| /crypto/bn/ |
| A D | bn_rand.c | 48 b = flag == NORMAL ? RAND_bytes_ex(libctx, buf, bytes, strength) in bnrand() 61 if (RAND_bytes_ex(libctx, &c, 1, strength) <= 0) in bnrand()
|
| /crypto/rsa/ |
| A D | rsa_pk1.c | 148 if (RAND_bytes_ex(libctx, p, j, 0) <= 0) in ossl_rsa_padding_add_PKCS1_type_2_ex() 153 if (RAND_bytes_ex(libctx, p, 1, 0) <= 0) in ossl_rsa_padding_add_PKCS1_type_2_ex()
|
| A D | rsa_oaep.c | 122 if (RAND_bytes_ex(libctx, seed, mdlen, 0) <= 0) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex()
|
| A D | rsa_pss.c | 242 if (RAND_bytes_ex(rsa->libctx, salt, sLen, 0) <= 0) in ossl_rsa_padding_add_PKCS1_PSS_mgf1()
|
| /crypto/cms/ |
| A D | cms_pwri.c | 107 if (RAND_bytes_ex(ossl_cms_ctx_get0_libctx(cms_ctx), iv, ivlen, 0) <= 0) in CMS_add0_recipient_password() 293 && RAND_bytes_ex(ossl_cms_ctx_get0_libctx(cms_ctx), out + 4 + inlen, in kek_wrap_key()
|
| A D | cms_enc.c | 97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) in ossl_cms_EncryptedContent_init_bio()
|
| A D | cms_ess.c | 135 if (RAND_bytes_ex(libctx, rr->signedContentIdentifier->data, 32, in CMS_ReceiptRequest_create0_ex()
|
| /crypto/crmf/ |
| A D | crmf_pbm.c | 44 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new()
|
| /crypto/pkcs12/ |
| A D | p12_mutl.c | 414 if (RAND_bytes_ex(p12->authsafes->ctx.libctx, p12->mac->salt->data, in pkcs12_setup_mac() 478 if (RAND_bytes_ex(NULL, known_salt, saltlen, 0) <= 0) { in PKCS12_set_pbmac1_pbkdf2()
|
| /crypto/cmp/ |
| A D | cmp_hdr.c | 121 if (bytes == NULL || RAND_bytes_ex(ctx->libctx, bytes, len, 0) <= 0) in set_random()
|
| /crypto/srp/ |
| A D | srp_vfy.c | 657 if (RAND_bytes_ex(libctx, tmp2, SRP_RANDOM_SALT_LEN, 0) <= 0) in SRP_create_verifier_ex() 739 if (RAND_bytes_ex(libctx, tmp2, SRP_RANDOM_SALT_LEN, 0) <= 0) in SRP_create_verifier_BN_ex()
|
| /crypto/ffc/ |
| A D | ffc_params_generate.c | 335 && RAND_bytes_ex(libctx, seed, seedlen, 0) <= 0) in generate_q_fips186_4() 405 if (generate_seed && RAND_bytes_ex(libctx, seed, qsize, 0) <= 0) in generate_q_fips186_2()
|
| /crypto/slh_dsa/ |
| A D | slh_dsa_key.c | 365 || RAND_bytes_ex(lib_ctx, pub, pk_seed_len, 0) <= 0) in ossl_slh_dsa_generate_key()
|
| /crypto/ml_kem/ |
| A D | ml_kem.c | 1998 if (RAND_bytes_ex(key->libctx, r, ML_KEM_RANDOM_BYTES, in ossl_ml_kem_encap_rand() 2025 (void)RAND_bytes_ex(key->libctx, shared_secret, in ossl_ml_kem_decap()
|
| /crypto/pem/ |
| A D | pvkfmt.c | 1074 if (RAND_bytes_ex(libctx, p, PVK_SALTLEN, 0) <= 0) in i2b_PVK()
|
| /crypto/pkcs7/ |
| A D | pk7_doit.c | 334 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) in PKCS7_dataInit()
|
| /crypto/hpke/ |
| A D | hpke.c | 1420 if (RAND_bytes_ex(libctx, ct, ctlen, 0) <= 0) { in OSSL_HPKE_get_grease_value()
|