/openssl/crypto/dh/ |
H A D | dh_kdf.c | 30 const unsigned char *ukm, size_t ukmlen, in ossl_dh_kdf_X9_42_asn1() argument 51 if (ukm != NULL) in ossl_dh_kdf_X9_42_asn1() 53 (unsigned char *)ukm, ukmlen); in ossl_dh_kdf_X9_42_asn1() 68 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument 78 ukm, ukmlen, md, libctx, NULL); in DH_KDF_X9_42()
|
/openssl/crypto/cms/ |
H A D | cms_dh.c | 85 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local 94 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info() 143 if (ukm != NULL) { in dh_cms_set_shared_info() 144 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info() 145 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info() 201 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local 266 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt() 295 if (ukm != NULL) { in dh_cms_encrypt() 296 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt() 297 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
|
H A D | cms_ec.c | 163 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local 171 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 203 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info() 260 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local 320 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt() 351 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
|
H A D | cms_asn1.c | 179 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1), 404 ASN1_OCTET_STRING *ukm, int keylen) 427 ecsi.entityUInfo = ukm;
|
H A D | cms_local.h | 171 ASN1_OCTET_STRING *ukm; member
|
H A D | cms_kari.c | 39 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-X942-ASN1.pod | 51 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string> 122 unsignred char ukm[64]; 125 if (RAND_bytes(ukm, sizeof(ukm)) <= 0) 139 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
|
H A D | EVP_KEYEXCH-ECDH.pod | 42 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string> 83 /* It is assumed that the host_key, peer_pub_key and ukm are set up */ 85 unsigned char *ukm, size_t ukm_len) 104 ukm, ukm_len);
|
H A D | EVP_KEYEXCH-DH.pod | 42 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
|
H A D | provider-keyexch.pod | 194 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string> 199 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
|
H A D | provider-kdf.pod | 216 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
|
H A D | ossl-guide-migration.pod | 1782 See the "kdf-ukm" item in L<EVP_KEYEXCH-DH(7)/DH key exchange parameters> and
|
/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 210 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() argument 224 (void *)ukm, in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() 235 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
|
H A D | dh_ctrl.c | 290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_dh_kdf_ukm() argument 307 (void *)ukm, in EVP_PKEY_CTX_set0_dh_kdf_ukm() 315 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_dh_kdf_ukm()
|
/openssl/include/openssl/ |
H A D | dh.h | 59 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 62 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 261 const unsigned char *ukm,
|
H A D | ec.h | 47 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, 51 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
|
H A D | cms.h.in | 399 ASN1_OCTET_STRING *ukm, int keylen);
|
/openssl/include/crypto/ |
H A D | dh.h | 56 const unsigned char *ukm, size_t ukmlen,
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_ctrl.pod | 159 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 173 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 189 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 193 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 558 EVP_PKEY_CTX_set0_dh_kdf_ukm() sets the user key material to I<ukm> and its 563 free the original memory pointed to by I<ukm>. 631 EVP_PKEY_CTX_set0_ecdh_kdf_ukm() sets the user key material to I<ukm> for ECDH 634 should not free the original memory pointed to by I<ukm>.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_x942.txt | 91 # Fail if both acvp and ukm values are specified.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1100 PROV_R_INVALID_UKM_LENGTH:200:invalid ukm length
|