memcpy(cctx->V, cctx->K + 24, 8);
}
- if (dctx->flags & DRBG_FLAG_CTR_USE_DF)
+ if (dctx->xflags & DRBG_FLAG_CTR_USE_DF)
{
/* If no input reuse existing derived value */
if (in1 || nonce || in2)
{
ctr_Update(dctx, adin, adinlen, NULL, 0, NULL, 0);
/* This means we reuse derived value */
- if (dctx->flags & DRBG_FLAG_CTR_USE_DF)
+ if (dctx->xflags & DRBG_FLAG_CTR_USE_DF)
{
adin = NULL;
adinlen = 1;
for (;;)
{
inc_128(cctx);
- if (!(dctx->flags & DRBG_FLAG_TEST) && !dctx->lb_valid)
+ if (!(dctx->xflags & DRBG_FLAG_TEST) && !dctx->lb_valid)
{
AES_encrypt(cctx->V, dctx->lb, &cctx->ks);
dctx->lb_valid = 1;
dctx->blocklength = 16;
dctx->seedlen = keylen + 16;
- if (dctx->flags & DRBG_FLAG_CTR_USE_DF)
+ if (dctx->xflags & DRBG_FLAG_CTR_USE_DF)
{
/* df initialisation */
static unsigned char df_key[32] =