/openssl/crypto/cms/ |
H A D | cms_rsa.c | 46 int labellen = 0; in rsa_cms_decrypt() local 92 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt() 102 && EVP_PKEY_CTX_set0_rsa_oaep_label(pkctx, label, labellen) <= 0) { in rsa_cms_decrypt() 122 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() local 142 labellen = EVP_PKEY_CTX_get0_rsa_oaep_label(pkctx, &label); in rsa_cms_encrypt() 143 if (labellen < 0) in rsa_cms_encrypt() 152 if (labellen > 0) { in rsa_cms_encrypt() 157 if (!ASN1_OCTET_STRING_set(los, label, labellen)) in rsa_cms_encrypt()
|
/openssl/crypto/hpke/ |
H A D | hpke_util.c | 306 size_t labellen = 0; in ossl_hpke_labeled_extract() local 313 labellen = strlen(label); in ossl_hpke_labeled_extract() 315 + suiteidlen + labellen + ikmlen; in ossl_hpke_labeled_extract() 325 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_extract() 356 size_t labellen = 0; in ossl_hpke_labeled_expand() local 363 labellen = strlen(label); in ossl_hpke_labeled_expand() 365 + protocol_labellen + suiteidlen + labellen + infolen; in ossl_hpke_labeled_expand() 376 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_expand()
|
H A D | hpke.c | 1236 const unsigned char *label, size_t labellen) in OSSL_HPKE_export() argument 1248 if (labellen > OSSL_HPKE_MAX_PARMLEN) { in OSSL_HPKE_export() 1252 if (labellen > 0 && label == NULL) { in OSSL_HPKE_export() 1283 label, labellen); in OSSL_HPKE_export()
|
/openssl/ssl/ |
H A D | tls13_enc.c | 35 const unsigned char *label, size_t labellen, in tls13_hkdf_expand_ex() argument 52 if (labellen > TLS13_MAX_LABEL_LEN) { in tls13_hkdf_expand_ex() 101 const unsigned char *label, size_t labellen, in tls13_hkdf_expand() argument 109 secret, label, labellen, data, datalen, in tls13_hkdf_expand() 354 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument 477 size_t labellen, hashlen = 0; in tls13_change_cipher_state() local 499 labellen = sizeof(client_early_traffic) - 1; in tls13_change_cipher_state() 592 labellen = sizeof(client_handshake_traffic) - 1; in tls13_change_cipher_state() 607 labellen = sizeof(client_application_traffic) - 1; in tls13_change_cipher_state() 628 labellen = sizeof(server_handshake_traffic) - 1; in tls13_change_cipher_state() [all …]
|
H A D | ssl_local.h | 2720 const unsigned char *label, size_t labellen, 2726 const unsigned char *label, size_t labellen,
|
/openssl/test/ |
H A D | tls13secretstest.c | 242 const unsigned char *label, size_t labellen, in test_secret() argument 258 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
H A D | sslapitest.c | 6476 size_t labellen; in test_export_key_mat() local 6548 labellen = LONG_LABEL_LEN; in test_export_key_mat() 6550 labellen = SMALL_LABEL_LEN; in test_export_key_mat() 6557 labellen, context, in test_export_key_mat() 6561 labellen, in test_export_key_mat() 6566 labellen, in test_export_key_mat() 6572 labellen, in test_export_key_mat() 6578 labellen, in test_export_key_mat() 6584 labellen, in test_export_key_mat() 6589 labellen, in test_export_key_mat() [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 648 const unsigned char *label, size_t labellen, in prov_tls13_hkdf_expand() argument 666 || !WPACKET_memcpy(&pkt, label, labellen) in prov_tls13_hkdf_expand() 688 size_t labellen, in prov_tls13_hkdf_generate_secret() argument 725 prefix, prefixlen, label, labellen, in prov_tls13_hkdf_generate_secret()
|
/openssl/include/openssl/ |
H A D | hpke.h | 138 size_t labellen);
|
/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 1217 size_t labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label() local 1236 labellen = rsa_params[0].return_size; in EVP_PKEY_CTX_get0_rsa_oaep_label() 1237 if (labellen > INT_MAX) in EVP_PKEY_CTX_get0_rsa_oaep_label() 1240 return (int)labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label()
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1754 size_t labellen; in tls_process_server_hello() local 1764 labellen = sizeof(labelbuffer) - 1; in tls_process_server_hello() 1766 labellen += 1; in tls_process_server_hello() 1771 labellen, NULL, 0, 0) <= 0) { in tls_process_server_hello() 3614 size_t labellen; in tls_client_key_exchange_post_work() local 3625 labellen = sizeof(labelbuffer) - 1; in tls_client_key_exchange_post_work() 3627 labellen += 1; in tls_client_key_exchange_post_work() 3631 labellen, NULL, 0, 0) <= 0) { in tls_client_key_exchange_post_work()
|
H A D | statem_srvr.c | 922 size_t labellen; in ossl_statem_server_post_work() local 932 labellen = sizeof(labelbuffer) - 1; in ossl_statem_server_post_work() 934 labellen += 1; in ossl_statem_server_post_work() 938 labellen, NULL, 0, in ossl_statem_server_post_work() 3457 size_t labellen; in tls_post_process_client_key_exchange() local 3466 labellen = sizeof(labelbuffer) - 1; in tls_post_process_client_key_exchange() 3468 labellen += 1; in tls_post_process_client_key_exchange() 3473 labellen, NULL, 0, in tls_post_process_client_key_exchange()
|
/openssl/doc/man3/ |
H A D | OSSL_HPKE_CTX_new.pod | 55 const unsigned char *label, size_t labellen); 220 I<labellen> parameters, and for the length of the string I<pskid> for HPKE 339 supplied label I<label> of size I<labellen>, to produce a secret I<secret>
|