/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 14 unsigned int *id_len); 19 unsigned int id_len); 30 (of length B<id_len>) is already contained in the internal session cache 49 B<id> into and a pointer to the maximum allowed length B<id_len>. The 50 buffer at location B<id> is only guaranteed to have the size B<id_len>. 52 the callback B<must never> increase B<id_len> or write to the location 56 callback may only fill part of the possible length and leave B<id_len> 69 guarantee uniqueness, it is recommended to use the maximum B<id_len> and 102 unsigned int *id_len) 107 RAND_pseudo_bytes(id, *id_len); [all …]
|
H A D | EVP_PKEY_CTX_ctrl.pod | 175 int EVP_PKEY_CTX_set1_id(EVP_PKEY_CTX *ctx, void *id, size_t id_len); 177 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len); 628 the length I<id_len> to the library. The library takes a copy of the id so that
|
/openssl/crypto/sm2/ |
H A D | sm2_sign.c | 26 const size_t id_len, in ossl_sm2_compute_z_digest() argument 72 if (id_len >= (UINT16_MAX / 8)) { in ossl_sm2_compute_z_digest() 78 entl = (uint16_t)(8 * id_len); in ossl_sm2_compute_z_digest() 91 if (id_len > 0 && !EVP_DigestUpdate(hash, id, id_len)) { in ossl_sm2_compute_z_digest() 143 const size_t id_len, in sm2_compute_msg_hash() argument 171 if (!ossl_sm2_compute_z_digest(z, fetched_digest, id, id_len, key)) { in sm2_compute_msg_hash() 393 const size_t id_len, in ossl_sm2_do_sign() argument 399 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 416 const size_t id_len, in ossl_sm2_do_verify() argument 422 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/openssl/include/crypto/ |
H A D | sm2.h | 31 const size_t id_len, 40 const size_t id_len, 47 const size_t id_len,
|
H A D | evp.h | 894 int evp_pkey_ctx_get1_id_len_prov(EVP_PKEY_CTX *ctx, size_t *id_len);
|
/openssl/providers/implementations/signature/ |
H A D | sm2_sig.c | 90 size_t id_len; member 262 || !ossl_sm2_compute_z_digest(z, ctx->md, ctx->id, ctx->id_len, in sm2sig_compute_z_digest() 367 dstctx->id = OPENSSL_malloc(srcctx->id_len); in sm2sig_dupctx() 370 dstctx->id_len = srcctx->id_len; in sm2sig_dupctx() 371 memcpy(dstctx->id, srcctx->id, srcctx->id_len); in sm2sig_dupctx() 446 psm2ctx->id_len = tmp_idlen; in sm2sig_set_ctx_params()
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-SM2.pod | 45 EVP_PKEY_CTX_set1_id(pctx, id, id_len); 71 EVP_PKEY_CTX_set1_id(pctx, id, id_len);
|
/openssl/ssl/quic/ |
H A D | quic_wire.c | 266 if (f->conn_id.id_len > OSSL_QUIC_MAX_CONN_ID_LEN) in ossl_quic_wire_encode_frame_new_conn_id() 272 || !WPACKET_put_bytes_u8(pkt, f->conn_id.id_len) in ossl_quic_wire_encode_frame_new_conn_id() 273 || !WPACKET_memcpy(pkt, f->conn_id.id, f->conn_id.id_len) in ossl_quic_wire_encode_frame_new_conn_id() 686 f->conn_id.id_len = (unsigned char)len; in ossl_quic_wire_decode_frame_new_conn_id()
|
/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 1233 static int get1_id_data(EVP_PKEY_CTX *ctx, void *id, size_t *id_len) in get1_id_data() argument 1257 if (id_len != NULL) in get1_id_data() 1258 *id_len = tmp_id_len; in get1_id_data() 1268 int evp_pkey_ctx_get1_id_len_prov(EVP_PKEY_CTX *ctx, size_t *id_len) in evp_pkey_ctx_get1_id_len_prov() argument 1270 return get1_id_data(ctx, NULL, id_len); in evp_pkey_ctx_get1_id_len_prov() 1278 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len) in EVP_PKEY_CTX_get1_id_len() argument 1281 EVP_PKEY_CTRL_GET1_ID_LEN, 0, (void*)id_len); in EVP_PKEY_CTX_get1_id_len()
|
/openssl/include/internal/ |
H A D | quic_wire.h | 171 unsigned char id_len; /* length of id in bytes */ member
|
/openssl/test/ |
H A D | quic_wire_test.c | 735 if (!TEST_uint64_t_eq(f.conn_id.id_len, sizeof(encode_case_16_conn_id))) in encode_case_16_dec() 738 if (!TEST_mem_eq(f.conn_id.id, f.conn_id.id_len, in encode_case_16_dec()
|
/openssl/ssl/ |
H A D | ssl_sess.c | 300 unsigned int *id_len) in def_generate_session_id() argument 304 if (RAND_bytes_ex(ssl->ctx->libctx, id, *id_len, 0) <= 0) in def_generate_session_id() 306 while (SSL_has_matching_session_id(ssl, id, *id_len) && in def_generate_session_id()
|
H A D | ssl_lib.c | 979 unsigned int id_len) in SSL_has_matching_session_id() argument 991 if (sc == NULL || id_len > sizeof(r.session_id)) in SSL_has_matching_session_id() 995 r.session_id_length = id_len; in SSL_has_matching_session_id() 996 memcpy(r.session_id, id, id_len); in SSL_has_matching_session_id()
|
/openssl/apps/ |
H A D | s_server.c | 66 unsigned int *id_len); 3672 unsigned int *id_len) in generate_session_id() argument 3678 if (RAND_bytes(id, *id_len) <= 0) in generate_session_id() 3688 (session_id_prefix_len < *id_len) ? in generate_session_id() 3689 session_id_prefix_len : *id_len); in generate_session_id() 3691 while (SSL_has_matching_session_id(ssl, id, *id_len) && in generate_session_id()
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 658 * SSL_has_matching_session_id(ssl, id, *id_len) The length value passed in 664 unsigned int *id_len); 1718 unsigned int id_len);
|
H A D | evp.h | 1679 int EVP_PKEY_CTX_get1_id_len(EVP_PKEY_CTX *ctx, size_t *id_len);
|