/openssl-master/crypto/engine/ |
A D | eng_openssl.c | 451 OSSL_HMAC_PKEY_CTX *hctx; in ossl_hmac_init() local 453 if ((hctx = OPENSSL_zalloc(sizeof(*hctx))) == NULL) { in ossl_hmac_init() 458 hctx->ctx = HMAC_CTX_new(); in ossl_hmac_init() 459 if (hctx->ctx == NULL) { in ossl_hmac_init() 460 OPENSSL_free(hctx); in ossl_hmac_init() 501 if (hctx) { in ossl_hmac_cleanup() 503 OPENSSL_clear_free(hctx->ktmp.data, hctx->ktmp.length); in ossl_hmac_cleanup() 504 OPENSSL_free(hctx); in ossl_hmac_cleanup() 513 if (!hctx->ktmp.data) in ossl_hmac_keygen() 572 hctx->md = p2; in ossl_hmac_ctrl() [all …]
|
/openssl-master/providers/implementations/kdfs/ |
A D | pbkdf2.c | 282 HMAC_CTX *hctx_tpl = NULL, *hctx = NULL; in pbkdf2_derive() local 319 hctx = HMAC_CTX_new(); in pbkdf2_derive() 320 if (hctx == NULL) in pbkdf2_derive() 335 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 337 if (!HMAC_Update(hctx, salt, saltlen) in pbkdf2_derive() 338 || !HMAC_Update(hctx, itmp, 4) in pbkdf2_derive() 339 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() 343 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 345 if (!HMAC_Update(hctx, digtmp, mdlen) in pbkdf2_derive() 346 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() [all …]
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 16 EVP_CIPHER_CTX *ctx, EVP_MAC_CTX *hctx, int enc)); 25 EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc)); 51 Before the callback function is started I<ctx> and I<hctx> have been 59 I<iv>, and set the cipher context I<ctx> and the hash context I<hctx>. 93 This indicates that the I<ctx> and I<hctx> have been set and the session can 101 This indicates that the I<ctx> and I<hctx> have been set and the session can 122 Before this callback function is started I<hctx> will have been 125 The I<hctx> key material can be set using L<HMAC_Init_ex(3)>. 159 EVP_MAC_CTX *hctx, int enc) 191 if (EVP_MAC_CTX_set_params(hctx, params) == 0) [all …]
|
/openssl-master/ssl/statem/ |
A D | extensions_srvr.c | 685 EVP_MD_CTX *hctx; in tls_parse_ctos_cookie() local 716 hctx = EVP_MD_CTX_create(); in tls_parse_ctos_cookie() 721 if (hctx == NULL || pkey == NULL) { in tls_parse_ctos_cookie() 722 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 731 || EVP_DigestSign(hctx, hmac, &hmaclen, data, in tls_parse_ctos_cookie() 734 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 740 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 1716 EVP_MD_CTX *hctx; in tls_construct_stoc_cookie() local 1790 hctx = EVP_MD_CTX_create(); in tls_construct_stoc_cookie() 1795 if (hctx == NULL || pkey == NULL) { in tls_construct_stoc_cookie() [all …]
|
A D | statem_srvr.c | 3659 SSL_HMAC *hctx = NULL; in construct_stateless_ticket() local 3688 hctx = ssl_hmac_new(tctx); in construct_stateless_ticket() 3689 if (ctx == NULL || hctx == NULL) { in construct_stateless_ticket() 3739 ssl_hmac_get0_EVP_MAC_CTX(hctx), in construct_stateless_ticket() 3745 ssl_hmac_get0_HMAC_CTX(hctx), 1); in construct_stateless_ticket() 3758 ssl_hmac_free(hctx); in construct_stateless_ticket() 3781 || !ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in construct_stateless_ticket() 3814 || !ssl_hmac_update(hctx, in construct_stateless_ticket() 3818 || !ssl_hmac_final(hctx, macdata1, &hlen, EVP_MAX_MD_SIZE) in construct_stateless_ticket() 3836 ssl_hmac_free(hctx); in construct_stateless_ticket()
|
/openssl-master/ssl/ |
A D | t1_lib.c | 1787 SSL_HMAC *hctx = NULL; in tls_decrypt_ticket() local 1817 hctx = ssl_hmac_new(tctx); in tls_decrypt_ticket() 1818 if (hctx == NULL) { in tls_decrypt_ticket() 1840 ssl_hmac_get0_EVP_MAC_CTX(hctx), in tls_decrypt_ticket() 1847 ctx, ssl_hmac_get0_HMAC_CTX(hctx), 0); in tls_decrypt_ticket() 1872 || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in tls_decrypt_ticket() 1890 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket() 1904 if (ssl_hmac_update(hctx, etick, eticklen) <= 0 in tls_decrypt_ticket() 1905 || ssl_hmac_final(hctx, tick_hmac, NULL, sizeof(tick_hmac)) <= 0) { in tls_decrypt_ticket() 1968 ssl_hmac_free(hctx); in tls_decrypt_ticket()
|
A D | ssl_local.h | 1041 EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc); 1045 EVP_CIPHER_CTX *ectx, EVP_MAC_CTX *hctx,
|
/openssl-master/test/helpers/ |
A D | handshake.c | 320 EVP_MAC_CTX *hctx, int enc) in broken_session_ticket_cb() argument 328 EVP_MAC_CTX *hctx, int enc) in do_not_call_session_ticket_cb() argument
|
/openssl-master/test/ |
A D | sslapitest.c | 7515 HMAC_CTX *hctx, int enc) in tick_key_cb() argument 7529 || !HMAC_Init_ex(hctx, tick_hmac_key, sizeof(tick_hmac_key), sha256, in tick_key_cb() 7544 EVP_CIPHER_CTX *ctx, EVP_MAC_CTX *hctx, int enc) in tick_key_evp_cb() argument 7560 || !EVP_MAC_init(hctx, tick_hmac_key, sizeof(tick_hmac_key), in tick_key_evp_cb()
|