Searched refs:CTR_DRBG_ENTROPY_LEN (Results 1 - 3 of 3) sorted by relevance

/fuchsia/zircon/third_party/ulib/uboringssl/crypto/fipsmodule/rand/
H A Dinternal.h55 #define CTR_DRBG_ENTROPY_LEN 48 macro
58 // CTR_DRBG_init initialises |*drbg| given |CTR_DRBG_ENTROPY_LEN| bytes of
60 // |CTR_DRBG_ENTROPY_LEN| bytes in length. It returns one on success and zero
63 const uint8_t entropy[CTR_DRBG_ENTROPY_LEN],
67 // CTR_DRBG_reseed reseeds |drbg| given |CTR_DRBG_ENTROPY_LEN| bytes of entropy
68 // in |entropy| and, optionally, up to |CTR_DRBG_ENTROPY_LEN| bytes of
71 const uint8_t entropy[CTR_DRBG_ENTROPY_LEN],
75 // CTR_DRBG_generate processes to up |CTR_DRBG_ENTROPY_LEN| bytes of additional
H A Dctrdrbg.c31 const uint8_t entropy[CTR_DRBG_ENTROPY_LEN],
34 if (personalization_len > CTR_DRBG_ENTROPY_LEN) {
38 uint8_t seed_material[CTR_DRBG_ENTROPY_LEN];
39 OPENSSL_memcpy(seed_material, entropy, CTR_DRBG_ENTROPY_LEN);
49 static const uint8_t kInitMask[CTR_DRBG_ENTROPY_LEN] = {
67 OPENSSL_COMPILE_ASSERT(CTR_DRBG_ENTROPY_LEN % AES_BLOCK_SIZE == 0,
79 // Per section 10.2.1.2, |data_len| must be |CTR_DRBG_ENTROPY_LEN|. Here, we
82 if (data_len > CTR_DRBG_ENTROPY_LEN) {
86 uint8_t temp[CTR_DRBG_ENTROPY_LEN];
87 for (size_t i = 0; i < CTR_DRBG_ENTROPY_LEN;
[all...]
H A Drand.c178 uint8_t seed[CTR_DRBG_ENTROPY_LEN]) {
189 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * FIPS_OVERREAD];
215 OPENSSL_memcpy(seed, entropy, CTR_DRBG_ENTROPY_LEN);
218 for (size_t j = 0; j < CTR_DRBG_ENTROPY_LEN; j++) {
219 seed[j] ^= entropy[CTR_DRBG_ENTROPY_LEN * i + j];
227 uint8_t seed[CTR_DRBG_ENTROPY_LEN]) {
230 CRYPTO_sysrand(seed, CTR_DRBG_ENTROPY_LEN);
277 uint8_t seed[CTR_DRBG_ENTROPY_LEN];
300 uint8_t seed[CTR_DRBG_ENTROPY_LEN];

Completed in 74 milliseconds