kemri->ukm = ASN1_OCTET_STRING_new();
if (kemri->ukm == NULL)
return 0;
- ASN1_OCTET_STRING_set(kemri->ukm, ukm, ukmLength);
- return 1;
+ return ASN1_OCTET_STRING_set(kemri->ukm, ukm, ukmLength);
}
static EVP_KDF_CTX *create_kdf_ctx(CMS_KEMRecipientInfo *kemri)
rv = 1;
err:
OPENSSL_free(out);
- OPENSSL_cleanse(kek, keklen);
+ OPENSSL_cleanse(kek, sizeof(kek));
EVP_CIPHER_CTX_reset(kemri->ctx);
EVP_PKEY_CTX_free(kemri->pctx);
kemri->pctx = NULL;
(PROV_CIPHER_HW_CHACHA20_POLY1305 *)ctx->base.hw;
struct chacha20_poly1305_set_ctx_params_st p;
- if (ctx == NULL || !chacha20_poly1305_set_ctx_params_decoder(params, &p))
+ if (!chacha20_poly1305_set_ctx_params_decoder(params, &p))
return 0;
size_t size = 0;
int md_size;
- if (hmac == NULL || !hmac_drbg_kdf_set_ctx_params_decoder(params, &p))
+ if (!hmac_drbg_kdf_set_ctx_params_decoder(params, &p))
return 0;
if (p.ent != NULL) {
struct kbkdf_set_ctx_params_st p;
const char *s;
- if (ctx == NULL || !kbkdf_set_ctx_params_decoder(params, &p))
+ if (!kbkdf_set_ctx_params_decoder(params, &p))
return 0;
if (!OSSL_FIPS_IND_SET_CTX_FROM_PARAM(ctx, OSSL_FIPS_IND_SETTABLE0, p.ind_k))
KRB5KDF_CTX *ctx = vctx;
OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !krb5kdf_set_ctx_params_decoder(params, &p))
+ if (!krb5kdf_set_ctx_params_decoder(params, &p))
return 0;
if (!ossl_prov_cipher_load(&ctx->cipher, p.cipher, p.propq, p.engine, provctx))
KDF_PBKDF1 *ctx = vctx;
OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !pbkdf1_set_ctx_params_decoder(params, &p))
+ if (!pbkdf1_set_ctx_params_decoder(params, &p))
return 0;
if (!ossl_prov_digest_load(&ctx->digest, p.digest,
uint64_t iter;
const EVP_MD *md;
- if (ctx == NULL || !pbkdf2_set_ctx_params_decoder(params, &p))
+ if (!pbkdf2_set_ctx_params_decoder(params, &p))
return 0;
if (p.digest != NULL) {
KDF_PKCS12 *ctx = vctx;
OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !pkcs12_set_ctx_params_decoder(params, &p))
+ if (!pkcs12_set_ctx_params_decoder(params, &p))
return 0;
if (!ossl_prov_digest_load(&ctx->digest, p.digest,
KDF_PVK *ctx = vctx;
OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !pvk_set_ctx_params_decoder(params, &p))
+ if (!pvk_set_ctx_params_decoder(params, &p))
return 0;
if (!ossl_prov_digest_load(&ctx->digest, p.digest, p.propq, p.engine,
KDF_SSHKDF *ctx = vctx;
OSSL_LIB_CTX *provctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !sshkdf_set_ctx_params_decoder(params, &p))
+ if (!sshkdf_set_ctx_params_decoder(params, &p))
return 0;
if (!OSSL_FIPS_IND_SET_CTX_FROM_PARAM(ctx, OSSL_FIPS_IND_SETTABLE0, p.ind_d))
TLS1_PRF *ctx = vctx;
OSSL_LIB_CTX *libctx = PROV_LIBCTX_OF(ctx->provctx);
- if (ctx == NULL || !tls1prf_set_ctx_params_decoder(params, &p))
+ if (!tls1prf_set_ctx_params_decoder(params, &p))
return 0;
if (!OSSL_FIPS_IND_SET_CTX_FROM_PARAM(ctx, OSSL_FIPS_IND_SETTABLE0, p.ind_e))
const EVP_MD *md;
size_t id;
- if (ctx == NULL || !sshkdf_set_ctx_params_decoder(params, &p))
+ if (!sshkdf_set_ctx_params_decoder(params, &p))
return 0;
if (!OSSL_FIPS_IND_SET_CTX_FROM_PARAM(ctx, OSSL_FIPS_IND_SETTABLE0, p.ind_k))
size_t pk_len = 0, sk_len = 0, seed_len = 0;
struct ml_dsa_key_type_params_st p;
- if (key == NULL || !ml_dsa_key_type_params_decoder(params, &p))
+ if (!ml_dsa_key_type_params_decoder(params, &p))
return 0;
if (p.pubkey != NULL) {
const ML_KEM_VINFO *v = ossl_ml_kem_key_vinfo(key);
struct ml_kem_get_params_st p;
- if (key == NULL || !ml_kem_get_params_decoder(params, &p))
+ if (!ml_kem_get_params_decoder(params, &p))
return 0;
if (p.bits != NULL && !OSSL_PARAM_set_size_t(p.bits, v->bits))
size_t publen = key->minfo->pubkey_bytes + key->xinfo->pubkey_bytes;
size_t prvlen = key->minfo->prvkey_bytes + key->xinfo->prvkey_bytes;
- if (key == NULL || !mlx_get_params_decoder(params, &p))
+ if (!mlx_get_params_decoder(params, &p))
return 0;
/* The reported "bit" count is those of the ML-KEM key */