/openssl-master/providers/implementations/kdfs/ |
A D | krb5kdf.c | 46 const unsigned char *key, size_t key_len, 54 size_t key_len; member 90 OPENSSL_clear_free(ctx->key, ctx->key_len); in krb5kdf_reset() 128 return KRB5KDF(cipher, engine, ctx->key, ctx->key_len, in krb5kdf_derive() 146 if (!krb5kdf_set_membuf(&ctx->key, &ctx->key_len, p)) in krb5kdf_set_ctx_params() 336 if (key_len != (size_t)klen) { in cipher_init() 337 ret = EVP_CIPHER_CTX_set_key_length(ctx, key_len); in cipher_init() 353 const unsigned char *key, size_t key_len, in KRB5KDF() argument 368 if (key_len != okey_len) { in KRB5KDF() 373 key_len == 24 && okey_len == 21) { in KRB5KDF() [all …]
|
A D | sshkdf.c | 36 const unsigned char *key, size_t key_len, 45 size_t key_len; member 82 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_sshkdf_reset() 127 return SSHKDF(md, ctx->key, ctx->key_len, in kdf_sshkdf_derive() 146 if (!sshkdf_set_membuf(&ctx->key, &ctx->key_len, p)) in kdf_sshkdf_set_ctx_params() 226 const unsigned char *key, size_t key_len, in SSHKDF() argument 244 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF() 272 if (!EVP_DigestUpdate(md, key, key_len)) in SSHKDF()
|
A D | hkdf.c | 50 const unsigned char *key, size_t key_len, 78 size_t key_len; member 123 OPENSSL_clear_free(ctx->key, ctx->key_len); in kdf_hkdf_reset() 176 ctx->key, ctx->key_len, ctx->info, ctx->info_len, key, keylen); in kdf_hkdf_derive() 180 ctx->key, ctx->key_len, key, keylen); in kdf_hkdf_derive() 183 return HKDF_Expand(md, ctx->key, ctx->key_len, ctx->info, in kdf_hkdf_derive() 227 OPENSSL_clear_free(ctx->key, ctx->key_len); in hkdf_common_set_ctx_params() 230 &ctx->key_len)) in hkdf_common_set_ctx_params() 661 ctx->key, ctx->key_len, in kdf_tls1_3_derive() 667 return prov_tls13_hkdf_expand(md, ctx->key, ctx->key_len, in kdf_tls1_3_derive()
|
/openssl-master/crypto/evp/ |
A D | e_rc5.c | 75 const int key_len = EVP_CIPHER_CTX_get_key_length(ctx); in r_32_12_16_init_key() local 77 if (key_len > 255 || key_len < 0) { in r_32_12_16_init_key() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
A D | cmeth_lib.c | 23 EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len) in EVP_CIPHER_meth_new() argument 30 cipher->key_len = key_len; in EVP_CIPHER_meth_new() 48 cipher->key_len)) != NULL) { in EVP_CIPHER_meth_dup()
|
A D | p_enc.c | 22 int key_len, EVP_PKEY *pubk) in EVP_PKEY_encrypt_old() argument 32 RSA_public_encrypt(key_len, key, ek, evp_pkey_get0_RSA_int(pubk), in EVP_PKEY_encrypt_old()
|
A D | evp_lib.c | 367 cipher->key_len = keylen; in evp_cipher_cache_constants() 635 return cipher->key_len; in EVP_CIPHER_get_key_length() 641 size_t v = ctx->key_len; in EVP_CIPHER_CTX_get_key_length()
|
A D | evp_local.h | 48 int key_len; /* May change for variable length cipher */ member
|
A D | evp_enc.c | 303 ctx->key_len = cipher->key_len; in evp_cipher_init_internal() 1011 c->key_len = keylen; in EVP_CIPHER_CTX_set_key_length()
|
A D | e_aes_cbc_hmac_sha1.c | 516 if (len >= 1024 && ctx->key_len == 32) { in aesni_cbc_hmac_sha1_cipher() 737 if (len >= 1024 && ctx->key_len == 32) { in aesni_cbc_hmac_sha1_cipher()
|
A D | e_aes.c | 2720 HWAES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks.ks); in aes_gcm_init_key() 2733 AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks.ks); in aes_gcm_init_key() 2742 vpaes_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks.ks); in aes_gcm_init_key() 2751 AES_set_encrypt_key(key, ctx->key_len * 8, &gctx->ks.ks); in aes_gcm_init_key()
|
/openssl-master/test/ |
A D | cmactest.c | 36 int key_len; member 91 || !TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, NULL, NULL)) in test_cmac_bad() 116 if (!TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, in test_cmac_run() 126 if (!TEST_true(CMAC_Init(ctx, test[1].key, test[1].key_len, in test_cmac_run() 136 if (!TEST_true(CMAC_Init(ctx, test[2].key, test[2].key_len, NULL, NULL)) in test_cmac_run() 154 || !TEST_true(CMAC_Init(ctx, test[2].key, test[2].key_len, NULL, NULL)) in test_cmac_run() 181 if (!TEST_true(CMAC_Init(ctx, test[0].key, test[0].key_len, in test_cmac_copy()
|
A D | hmactest.c | 37 int key_len; member 94 ebcdic2ascii(test[2].key, test[2].key, test[2].key_len); in test_hmac_md5() 99 test[idx].key, test[idx].key_len, in test_hmac_md5() 146 if (!TEST_true(HMAC_Init_ex(ctx, test[4].key, test[4].key_len, EVP_sha1(), NULL)) in test_hmac_run() 158 if (!TEST_true(HMAC_Init_ex(ctx, test[5].key, test[5].key_len, EVP_sha256(), NULL)) in test_hmac_run() 168 if (!TEST_true(HMAC_Init_ex(ctx, test[6].key, test[6].key_len, NULL, NULL)) in test_hmac_run() 231 if (!TEST_true(HMAC_Init_ex(ctx, test[7].key, test[7].key_len, EVP_sha1(), NULL)) in test_hmac_copy()
|
A D | acvp_test.c | 673 const unsigned char *key, size_t key_len, in cipher_enc() argument 707 tst->key, tst->key_len, in cipher_enc_dec_test() 711 tst->key, tst->key_len, in cipher_enc_dec_test() 718 const unsigned char *key, size_t key_len, in aes_ccm_enc_dec() argument 788 tst->key, tst->key_len, in aes_ccm_enc_dec_test() 792 tst->key, tst->key_len, in aes_ccm_enc_dec_test() 797 tst->key, tst->key_len, in aes_ccm_enc_dec_test() 805 const unsigned char *key, size_t key_len, in aes_gcm_enc_dec() argument 876 tst->key, tst->key_len, in aes_gcm_enc_dec_test() 881 tst->key, tst->key_len, in aes_gcm_enc_dec_test() [all …]
|
A D | evp_test.c | 526 size_t key_len; member 617 return parse_bin(value, &cdat->key, &cdat->key_len); in cipher_test_parse() 796 if (!EVP_CIPHER_CTX_set_key_length(ctx_base, expected->key_len)) { in cipher_test_enc() 1117 size_t key_len; member 1216 return parse_bin(value, &mdata->key, &mdata->key_len); in mac_test_parse() 1549 expected->key, expected->key_len, in mac_test_run_mac() 1918 size_t key_len; member 2044 return parse_bin(value, &pdata->key, &pdata->key_len); in pbe_test_parse() 2065 if (!TEST_ptr(key = OPENSSL_malloc(expected->key_len))) { in pbe_test_run() 2073 expected->key_len, key) == 0) { in pbe_test_run() [all …]
|
/openssl-master/include/crypto/ |
A D | evp.h | 295 int key_len; member 435 key_len, iv_len, flags, init_key, cleanup, \ argument 438 nid##_##nmode, block_size, key_len, iv_len, \ 451 #define BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, \ argument 457 #define BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, \ argument 461 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 464 #define BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, \ argument 482 BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, iv_len, cbits, \ 484 BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, iv_len, cbits, \ 486 BLOCK_CIPHER_def_ecb(cname, kstruct, nid, block_size, key_len, flags, \ [all …]
|
/openssl-master/providers/implementations/macs/ |
A D | kmac_prov.c | 122 size_t key_len; member 151 OPENSSL_cleanse(kctx->key, kctx->key_len); in kmac_free() 233 dst->key_len = src->key_len; in kmac_dup() 236 memcpy(dst->key, src->key, src->key_len); in kmac_dup() 256 if (!kmac_bytepad_encode_key(kctx->key, sizeof(kctx->key), &kctx->key_len, in kmac_setkey() 282 } else if (kctx->key_len == 0) { in kmac_init() 320 && EVP_DigestUpdate(ctx, kctx->key, kctx->key_len); in kmac_init()
|
/openssl-master/doc/man3/ |
A D | HMAC.pod | 23 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, 34 int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int key_len, 51 int HMAC_Init(HMAC_CTX *ctx, const void *key, int key_len, 62 I<key_len> bytes long. The I<key> may also be NULL with I<key_len> being 0. 104 function I<evp_md> and the key I<key> which is I<key_len> bytes
|
A D | EVP_CIPHER_meth_new.pod | 24 EVP_CIPHER *EVP_CIPHER_meth_new(int cipher_type, int block_size, int key_len);
|
/openssl-master/engines/ |
A D | e_padlock.c | 608 int key_len = EVP_CIPHER_CTX_get_key_length(ctx) * 8; in padlock_aes_init_key() local 622 cdata->cword.b.rounds = 10 + (key_len - 128) / 32; in padlock_aes_init_key() 623 cdata->cword.b.ksize = (key_len - 128) / 64; in padlock_aes_init_key() 625 switch (key_len) { in padlock_aes_init_key() 646 AES_set_decrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key() 648 AES_set_encrypt_key(key, key_len, &cdata->ks); in padlock_aes_init_key()
|
/openssl-master/include/openssl/ |
A D | hmac.h | 54 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/openssl-master/crypto/hmac/ |
A D | hmac.c | 221 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, in HMAC() argument 232 key, key_len, data, data_len, in HMAC()
|
/openssl-master/doc/man7/ |
A D | EVP_MAC-KMAC.pod | 78 const unsigned char *key, size_t key_len, 104 (void *)key, key_len);
|
/openssl-master/apps/ |
A D | s_client.c | 102 long key_len; in psk_client_cb() local 127 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_client_cb() 133 if (max_psk_len > INT_MAX || key_len > (long)max_psk_len) { in psk_client_cb() 136 max_psk_len, key_len); in psk_client_cb() 141 memcpy(psk, key, key_len); in psk_client_cb() 145 BIO_printf(bio_c_out, "created PSK len=%ld\n", key_len); in psk_client_cb() 147 return key_len; in psk_client_cb() 169 long key_len; in psk_use_session_cb() local 170 unsigned char *key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_use_session_cb() 188 || !SSL_SESSION_set1_master_key(usesess, key, key_len) in psk_use_session_cb()
|
A D | s_server.c | 128 long key_len = 0; in psk_server_cb() local 162 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_server_cb() 168 if (key_len > (int)max_psk_len) { in psk_server_cb() 171 max_psk_len, key_len); in psk_server_cb() 176 memcpy(psk, key, key_len); in psk_server_cb() 180 BIO_printf(bio_s_out, "fetched PSK len=%ld\n", key_len); in psk_server_cb() 181 return key_len; in psk_server_cb() 196 long key_len; in psk_find_session_cb() local 211 key = OPENSSL_hexstr2buf(psk_key, &key_len); in psk_find_session_cb() 228 || !SSL_SESSION_set1_master_key(tmpsess, key, key_len) in psk_find_session_cb()
|