Home
last modified time | relevance | path

Searched refs:ukm (Results 1 – 21 of 21) sorted by relevance

/openssl/crypto/dh/
H A Ddh_kdf.c30 const unsigned char *ukm, size_t ukmlen, in ossl_dh_kdf_X9_42_asn1() argument
51 if (ukm != NULL) in ossl_dh_kdf_X9_42_asn1()
53 (unsigned char *)ukm, ukmlen); in ossl_dh_kdf_X9_42_asn1()
68 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument
78 ukm, ukmlen, md, libctx, NULL); in DH_KDF_X9_42()
/openssl/crypto/cms/
H A Dcms_dh.c85 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local
94 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info()
143 if (ukm != NULL) { in dh_cms_set_shared_info()
144 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info()
145 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info()
201 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local
266 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt()
295 if (ukm != NULL) { in dh_cms_encrypt()
296 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt()
297 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
H A Dcms_ec.c163 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local
171 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
203 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info()
260 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local
320 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt()
351 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
H A Dcms_asn1.c179 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1),
404 ASN1_OCTET_STRING *ukm, int keylen)
427 ecsi.entityUInfo = ukm;
H A Dcms_local.h171 ASN1_OCTET_STRING *ukm; member
H A Dcms_kari.c39 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
/openssl/doc/man7/
H A DEVP_KDF-X942-ASN1.pod51 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
122 unsignred char ukm[64];
125 if (RAND_bytes(ukm, sizeof(ukm)) <= 0)
139 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
H A DEVP_KEYEXCH-ECDH.pod42 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
83 /* It is assumed that the host_key, peer_pub_key and ukm are set up */
85 unsigned char *ukm, size_t ukm_len)
104 ukm, ukm_len);
H A DEVP_KEYEXCH-DH.pod42 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
H A Dprovider-keyexch.pod194 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
199 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
H A Dprovider-kdf.pod216 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
H A Dossl-guide-migration.pod1782 See the "kdf-ukm" item in L<EVP_KEYEXCH-DH(7)/DH key exchange parameters> and
/openssl/crypto/evp/
H A Dec_ctrl.c210 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() argument
224 (void *)ukm, in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
235 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
H A Ddh_ctrl.c290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_dh_kdf_ukm() argument
307 (void *)ukm, in EVP_PKEY_CTX_set0_dh_kdf_ukm()
315 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_dh_kdf_ukm()
/openssl/include/openssl/
H A Ddh.h59 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
62 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
261 const unsigned char *ukm,
H A Dec.h47 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm,
51 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
H A Dcms.h.in399 ASN1_OCTET_STRING *ukm, int keylen);
/openssl/include/crypto/
H A Ddh.h56 const unsigned char *ukm, size_t ukmlen,
/openssl/doc/man3/
H A DEVP_PKEY_CTX_ctrl.pod159 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
173 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
189 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
193 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
558 EVP_PKEY_CTX_set0_dh_kdf_ukm() sets the user key material to I<ukm> and its
563 free the original memory pointed to by I<ukm>.
631 EVP_PKEY_CTX_set0_ecdh_kdf_ukm() sets the user key material to I<ukm> for ECDH
634 should not free the original memory pointed to by I<ukm>.
/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_x942.txt91 # Fail if both acvp and ukm values are specified.
/openssl/crypto/err/
H A Dopenssl.txt1100 PROV_R_INVALID_UKM_LENGTH:200:invalid ukm length

Completed in 37 milliseconds