• Home
  • Raw
  • Download

Lines Matching +full:out +full:- +full:null

7 //     https://www.apache.org/licenses/LICENSE-2.0
16 // algorithms used are SHA512, HKDF-SHA512, and ECDSA P384-SHA384.
35 static int hmac(uint8_t k[64], uint8_t in[64], uint8_t *out, in hmac() argument
40 goto out; in hmac()
44 if (1 != HMAC_Init_ex(&ctx, k, 64, EVP_sha512(), NULL /* impl */)) { in hmac()
45 goto out; in hmac()
48 goto out; in hmac()
50 ret = HMAC_Final(&ctx, out, &out_len); in hmac()
53 out: in hmac()
58 const uint8_t *in3, unsigned int in3_len, uint8_t out[64]) { in hmac3()
63 if (1 != HMAC_Init_ex(&ctx, k, 64, EVP_sha512(), NULL /* impl */)) { in hmac3()
64 goto out; in hmac3()
67 goto out; in hmac3()
70 goto out; in hmac3()
72 if (in3 != NULL && in3_len > 0) { in hmac3()
74 goto out; in hmac3()
78 ret = HMAC_Final(&ctx, out, &out_len); in hmac3()
81 out: in hmac3()
89 BIGNUM *candidate = NULL; in derivePrivateKey()
117 if (1 != hmac3(k, v, 0x00, NULL, 0, k)) { in derivePrivateKey()
120 candidate = BN_bin2bn(temp, private_key_len, NULL); in derivePrivateKey()
126 goto out; in derivePrivateKey()
130 candidate = NULL; in derivePrivateKey()
131 out: in derivePrivateKey()
139 EC_POINT *publicKey = NULL; in P384KeypairFromSeed()
140 BIGNUM *pD = NULL; in P384KeypairFromSeed()
141 BIGNUM *x = NULL; in P384KeypairFromSeed()
142 BIGNUM *y = NULL; in P384KeypairFromSeed()
146 goto out; in P384KeypairFromSeed()
150 goto out; in P384KeypairFromSeed()
154 goto out; in P384KeypairFromSeed()
160 goto out; in P384KeypairFromSeed()
163 goto out; in P384KeypairFromSeed()
166 goto out; in P384KeypairFromSeed()
168 if (1 != EC_POINT_mul(group, publicKey, pD, NULL, NULL, NULL)) { in P384KeypairFromSeed()
169 goto out; in P384KeypairFromSeed()
173 goto out; in P384KeypairFromSeed()
177 goto out; in P384KeypairFromSeed()
179 if (1 != EC_POINT_get_affine_coordinates_GFp(group, publicKey, x, y, NULL)) { in P384KeypairFromSeed()
180 goto out; in P384KeypairFromSeed()
183 goto out; in P384KeypairFromSeed()
187 goto out; in P384KeypairFromSeed()
191 out: in P384KeypairFromSeed()
205 BIGNUM *pD = NULL; in P384Sign()
206 EC_KEY *key = NULL; in P384Sign()
208 ECDSA_SIG *sig = NULL; in P384Sign()
210 pD = BN_bin2bn(private_key, P384_PRIVATE_KEY_SIZE, NULL); in P384Sign()
212 goto out; in P384Sign()
216 goto out; in P384Sign()
219 goto out; in P384Sign()
224 goto out; in P384Sign()
226 if (1 != BN_bn2bin_padded(&signature[0], P384_SIGNATURE_SIZE / 2, sig->r)) { in P384Sign()
227 goto out; in P384Sign()
230 P384_SIGNATURE_SIZE / 2, sig->s)) { in P384Sign()
231 goto out; in P384Sign()
235 out: in P384Sign()
247 EC_KEY *key = NULL; in P384Verify()
248 BIGNUM *bn_ret = NULL; in P384Verify()
249 BIGNUM *x = NULL; in P384Verify()
250 BIGNUM *y = NULL; in P384Verify()
251 ECDSA_SIG *sig = NULL; in P384Verify()
256 goto out; in P384Verify()
260 goto out; in P384Verify()
264 goto out; in P384Verify()
268 goto out; in P384Verify()
273 goto out; in P384Verify()
276 goto out; in P384Verify()
281 goto out; in P384Verify()
283 bn_ret = BN_bin2bn(&signature[0], P384_SIGNATURE_SIZE / 2, sig->r); in P384Verify()
285 goto out; in P384Verify()
288 P384_SIGNATURE_SIZE / 2, sig->s); in P384Verify()
290 goto out; in P384Verify()
294 out: in P384Verify()