/openssl-master/doc/man3/ |
A D | EVP_PKEY_decapsulate.pod | 14 unsigned char *secret, size_t *secretlen, 27 is written to the I<*secretlen> parameter. If I<secret> is not B<NULL> and the 29 the amount of data written to I<secretlen>. 54 size_t secretlen = 0; 68 if (EVP_PKEY_decapsulate(ctx, NULL, &secretlen, in, inlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 75 /* Decapsulated secret data is secretlen bytes long */ 76 if (EVP_PKEY_decapsulaterctx, secret, &secretlen, in, inlen) <= 0)
|
A D | EVP_PKEY_encapsulate.pod | 54 size_t secretlen = 0, outlen = 0; 67 if (EVP_PKEY_encapsulate(ctx, NULL, &outlen, NULL, &secretlen) <= 0) 71 secret = OPENSSL_malloc(secretlen); 80 if (EVP_PKEY_encapsulate(ctx, out, &outlen, secret, &secretlen) <= 0)
|
/openssl-master/providers/implementations/kem/ |
A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() argument 259 if (outlen == NULL && secretlen == NULL) in rsasve_generate() 263 if (secretlen != NULL) in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 280 if (secretlen != NULL) in rsasve_generate() 281 *secretlen = nlen; in rsasve_generate() 320 unsigned char *secret, size_t *secretlen) in rsakem_generate() argument 326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
|
/openssl-master/test/ |
A D | evp_libctx_test.c | 532 size_t ctlen = 0, unwraplen = 0, secretlen = 0; in kem_rsa_gen_recover() local 541 &secretlen), 1) in kem_rsa_gen_recover() 542 && TEST_int_eq(ctlen, secretlen) in kem_rsa_gen_recover() 545 &secretlen), 1) in kem_rsa_gen_recover() 553 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover() 597 size_t ctlen = 0, secretlen = 0; in kem_rsa_params() local 615 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params() 631 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, NULL, NULL, &secretlen), 1) in kem_rsa_params() 632 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, NULL, secret, &secretlen), 1) in kem_rsa_params() 647 && TEST_int_eq(secretlen, 256) in kem_rsa_params() [all …]
|
A D | tls-provider.c | 263 static int xor_derive(void *vpxorctx, unsigned char *secret, size_t *secretlen, in xor_derive() argument 272 *secretlen = XOR_KEY_SIZE; in xor_derive()
|
/openssl-master/providers/implementations/exchange/ |
A D | dh_exch.c | 143 unsigned char *secret, size_t *secretlen, in dh_plain_derive() argument 158 *secretlen = dhsize; in dh_plain_derive() 174 *secretlen = ret; in dh_plain_derive() 179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive() argument 187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
|
A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 138 *secretlen = ecxctx->keylen; in ecx_derive() 180 *secretlen = ecxctx->keylen; in ecx_derive()
|
A D | kdf_exch.c | 91 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument 100 *secretlen = EVP_KDF_CTX_get_kdf_size(pkdfctx->kdfctx); in kdf_derive()
|
/openssl-master/crypto/evp/ |
A D | kem.c | 188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate() argument 207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate() 216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate() argument 221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate() 234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate()
|
/openssl-master/doc/man7/ |
A D | provider-kem.pod | 29 unsigned char *secret, size_t *secretlen); 138 I<*secretlen>. 142 written to I<*secretlen>.
|
A D | provider-keyexch.pod | 29 int OSSL_FUNC_keyexch_derive(void *ctx, unsigned char *secret, size_t *secretlen, 132 The length of the shared secret should be written to I<*secretlen>. 134 written to I<*secretlen>.
|
/openssl-master/include/openssl/ |
A D | core_dispatch.h | 664 size_t *secretlen, size_t outlen)) 825 size_t *secretlen))
|