Lines Matching refs:suite

52     OSSL_HPKE_SUITE suite; /* suite */  member
313 static int hpke_suite_check(OSSL_HPKE_SUITE suite, in hpke_suite_check() argument
323 if ((kem_info_ = ossl_HPKE_KEM_INFO_find_id(suite.kem_id)) == NULL) in hpke_suite_check()
325 if ((kdf_info_ = ossl_HPKE_KDF_INFO_find_id(suite.kdf_id)) == NULL) in hpke_suite_check()
327 if ((aead_info_ = ossl_HPKE_AEAD_INFO_find_id(suite.aead_id)) == NULL) in hpke_suite_check()
349 OSSL_HPKE_SUITE *suite) in hpke_random_suite() argument
359 suite->kem_id = kem_info->kem_id; in hpke_random_suite()
363 suite->kdf_id = kdf_info->kdf_id; in hpke_random_suite()
367 suite->aead_id = aead_info->aead_id; in hpke_random_suite()
390 static int hpke_expansion(OSSL_HPKE_SUITE suite, in hpke_expansion() argument
402 if (hpke_suite_check(suite, &kem_info, NULL, &aead_info) != 1) { in hpke_expansion()
466 kem_info = ossl_HPKE_KEM_INFO_find_id(ctx->suite.kem_id); in hpke_encap()
471 if (hpke_kem_id_nist_curve(ctx->suite.kem_id) == 1) { in hpke_encap()
579 kem_info = ossl_HPKE_KEM_INFO_find_id(ctx->suite.kem_id); in hpke_decap()
584 if (hpke_kem_id_nist_curve(ctx->suite.kem_id) == 1) { in hpke_decap()
668 if (ossl_HPKE_KEM_INFO_find_id(ctx->suite.kem_id) == NULL) { in hpke_do_middle()
672 aead_info = ossl_HPKE_AEAD_INFO_find_id(ctx->suite.aead_id); in hpke_do_middle()
677 kdf_info = ossl_HPKE_KDF_INFO_find_id(ctx->suite.kdf_id); in hpke_do_middle()
707 suitebuf[0] = ctx->suite.kem_id / 256; in hpke_do_middle()
708 suitebuf[1] = ctx->suite.kem_id % 256; in hpke_do_middle()
709 suitebuf[2] = ctx->suite.kdf_id / 256; in hpke_do_middle()
710 suitebuf[3] = ctx->suite.kdf_id % 256; in hpke_do_middle()
711 suitebuf[4] = ctx->suite.aead_id / 256; in hpke_do_middle()
712 suitebuf[5] = ctx->suite.aead_id % 256; in hpke_do_middle()
745 if (ctx->suite.aead_id != OSSL_HPKE_AEAD_ID_EXPORTONLY) { in hpke_do_middle()
798 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, in OSSL_HPKE_CTX_new() argument
810 if (hpke_suite_check(suite, &kem_info, &kdf_info, &aead_info) != 1) { in OSSL_HPKE_CTX_new()
827 if (suite.aead_id != OSSL_HPKE_AEAD_ID_EXPORTONLY) { in OSSL_HPKE_CTX_new()
836 ctx->suite = suite; in OSSL_HPKE_CTX_new()
982 kem_info = ossl_HPKE_KEM_INFO_find_id(ctx->suite.kem_id); in OSSL_HPKE_CTX_set1_authpub()
985 if (hpke_kem_id_nist_curve(ctx->suite.kem_id) == 1) { in OSSL_HPKE_CTX_set1_authpub()
1080 minenc = OSSL_HPKE_get_public_encap_size(ctx->suite); in OSSL_HPKE_encap()
1127 minenc = OSSL_HPKE_get_public_encap_size(ctx->suite); in OSSL_HPKE_decap()
1260 kdf_info = ossl_HPKE_KDF_INFO_find_id(ctx->suite.kdf_id); in OSSL_HPKE_export()
1272 suitebuf[0] = ctx->suite.kem_id / 256; in OSSL_HPKE_export()
1273 suitebuf[1] = ctx->suite.kem_id % 256; in OSSL_HPKE_export()
1274 suitebuf[2] = ctx->suite.kdf_id / 256; in OSSL_HPKE_export()
1275 suitebuf[3] = ctx->suite.kdf_id % 256; in OSSL_HPKE_export()
1276 suitebuf[4] = ctx->suite.aead_id / 256; in OSSL_HPKE_export()
1277 suitebuf[5] = ctx->suite.aead_id % 256; in OSSL_HPKE_export()
1290 int OSSL_HPKE_keygen(OSSL_HPKE_SUITE suite, in OSSL_HPKE_keygen() argument
1305 if (hpke_suite_check(suite, &kem_info, NULL, NULL) != 1) { in OSSL_HPKE_keygen()
1316 if (hpke_kem_id_nist_curve(suite.kem_id) == 1) { in OSSL_HPKE_keygen()
1357 int OSSL_HPKE_suite_check(OSSL_HPKE_SUITE suite) in OSSL_HPKE_suite_check() argument
1359 return hpke_suite_check(suite, NULL, NULL, NULL); in OSSL_HPKE_suite_check()
1363 OSSL_HPKE_SUITE *suite, in OSSL_HPKE_get_grease_value()
1375 || ct == NULL || ctlen == 0 || suite == NULL) { in OSSL_HPKE_get_grease_value()
1392 *suite = chosen; in OSSL_HPKE_get_grease_value()
1426 int OSSL_HPKE_str2suite(const char *str, OSSL_HPKE_SUITE *suite) in OSSL_HPKE_str2suite() argument
1428 return ossl_hpke_str2suite(str, suite); in OSSL_HPKE_str2suite()
1431 size_t OSSL_HPKE_get_ciphertext_size(OSSL_HPKE_SUITE suite, size_t clearlen) in OSSL_HPKE_get_ciphertext_size() argument
1436 if (hpke_expansion(suite, &enclen, clearlen, &cipherlen) != 1) in OSSL_HPKE_get_ciphertext_size()
1441 size_t OSSL_HPKE_get_public_encap_size(OSSL_HPKE_SUITE suite) in OSSL_HPKE_get_public_encap_size() argument
1447 if (hpke_expansion(suite, &enclen, clearlen, &cipherlen) != 1) in OSSL_HPKE_get_public_encap_size()
1452 size_t OSSL_HPKE_get_recommended_ikmelen(OSSL_HPKE_SUITE suite) in OSSL_HPKE_get_recommended_ikmelen() argument
1456 if (hpke_suite_check(suite, &kem_info, NULL, NULL) != 1) in OSSL_HPKE_get_recommended_ikmelen()