Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
32bda2b2
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
接近 2 年 前同步成功
通知
12
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
32bda2b2
编写于
2月 18, 2018
作者:
K
Kurt Roeckx
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Switch the DRBGs from AES-128-CTR to AES-256-CTR
Reviewed-by:
N
Dr. Matthias St. Pierre
<
Matthias.St.Pierre@ncp-e.com
>
GH: #5401
上级
649cfb5c
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
13 addition
and
5 deletion
+13
-5
include/internal/rand.h
include/internal/rand.h
+13
-5
未找到文件。
include/internal/rand.h
浏览文件 @
32bda2b2
...
@@ -15,14 +15,22 @@
...
@@ -15,14 +15,22 @@
/*
/*
* Default security strength (in the sense of [NIST SP 800-90Ar1])
* Default security strength (in the sense of [NIST SP 800-90Ar1])
* of the default OpenSSL DRBG, and the corresponding NID.
*
*
* Currently supported values: 128, 192, 256
* NIST SP 800-90Ar1 supports the strength of the DRBG being smaller than that
* of the cipher by collecting less entropy. The current DRBG implemantion does
* not take RAND_DRBG_STRENGTH into account and sets the strength of the DRBG
* to that of the cipher.
*
*
* TODO(DRBG): would be nice to have the strength configurable
* RAND_DRBG_STRENGTH is currently only used for the legacy RAND
* implementation.
*
* Currently supported ciphers are: NID_aes_128_ctr, NID_aes_192_ctr and
* NID_aes_256_ctr
*
* TODO(DRBG): would be nice to have the NID and strength configurable
*/
*/
# define RAND_DRBG_STRENGTH
128
# define RAND_DRBG_STRENGTH
256
# define RAND_DRBG_NID NID_aes_
128
_ctr
# define RAND_DRBG_NID NID_aes_
256
_ctr
/*
/*
* Object lifetime functions.
* Object lifetime functions.
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录