Home
last modified time | relevance | path

Searched refs:ukm (Results 1 – 20 of 20) sorted by relevance

/openssl-master/crypto/dh/
A Ddh_kdf.c31 const unsigned char *ukm, size_t ukmlen, in ossl_dh_kdf_X9_42_asn1() argument
50 if (ukm != NULL) in ossl_dh_kdf_X9_42_asn1()
52 (unsigned char *)ukm, ukmlen); in ossl_dh_kdf_X9_42_asn1()
67 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument
77 ukm, ukmlen, md, libctx, NULL); in DH_KDF_X9_42()
/openssl-master/crypto/cms/
A Dcms_dh.c84 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local
93 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info()
142 if (ukm != NULL) { in dh_cms_set_shared_info()
143 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info()
144 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info()
200 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local
266 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt()
295 if (ukm != NULL) { in dh_cms_encrypt()
296 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt()
297 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
A Dcms_ec.c161 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local
169 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
201 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info()
258 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local
316 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt()
347 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
A Dcms_asn1.c167 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1),
388 ASN1_OCTET_STRING *ukm, int keylen)
411 ecsi.entityUInfo = ukm;
A Dcms_local.h173 ASN1_OCTET_STRING *ukm; member
A Dcms_kari.c39 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
/openssl-master/doc/man7/
A DEVP_KDF-X942-ASN1.pod49 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
98 unsignred char ukm[64];
101 if (RAND_bytes(ukm, sizeof(ukm)) <= 0)
115 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
A DEVP_KEYEXCH-ECDH.pod56 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
61 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
82 /* It is assumed that the host_key, peer_pub_key and ukm are set up */
84 unsigned char *ukm, size_t ukm_len)
103 ukm, ukm_len);
A DEVP_KEYEXCH-DH.pod20 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
25 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
A Dprovider-kdf.pod216 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
A Dmigration_guide.pod1704 See the "kdf-ukm" item in L<EVP_KEYEXCH-DH(7)/DH key exchange parameters> and
/openssl-master/crypto/evp/
A Dec_ctrl.c210 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() argument
224 (void *)ukm, in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
235 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
A Ddh_ctrl.c290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_dh_kdf_ukm() argument
307 (void *)ukm, in EVP_PKEY_CTX_set0_dh_kdf_ukm()
315 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_dh_kdf_ukm()
/openssl-master/include/openssl/
A Ddh.h55 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
58 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
250 const unsigned char *ukm,
A Dec.h45 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm,
49 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
A Dcms.h.in384 ASN1_OCTET_STRING *ukm, int keylen);
/openssl-master/include/crypto/
A Ddh.h55 const unsigned char *ukm, size_t ukmlen,
/openssl-master/doc/man3/
A DEVP_PKEY_CTX_ctrl.pod159 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
173 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
189 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
193 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
541 EVP_PKEY_CTX_set0_dh_kdf_ukm() sets the user key material to I<ukm> and its
546 free the original memory pointed to by I<ukm>.
614 EVP_PKEY_CTX_set0_ecdh_kdf_ukm() sets the user key material to I<ukm> for ECDH
617 should not free the original memory pointed to by I<ukm>.
/openssl-master/test/recipes/30-test_evp_data/
A Devpkdf_x942.txt90 # Fail if both acvp and ukm values are specified.
/openssl-master/crypto/err/
A Dopenssl.txt1012 PROV_R_INVALID_UKM_LENGTH:200:invalid ukm length

Completed in 30 milliseconds