/openssl/crypto/cms/ |
H A D | cms_rsa.c | 44 int labellen = 0; in rsa_cms_decrypt() local 90 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt() 100 && EVP_PKEY_CTX_set0_rsa_oaep_label(pkctx, label, labellen) <= 0) in rsa_cms_decrypt() 117 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() local 137 labellen = EVP_PKEY_CTX_get0_rsa_oaep_label(pkctx, &label); in rsa_cms_encrypt() 138 if (labellen < 0) in rsa_cms_encrypt() 147 if (labellen > 0) { in rsa_cms_encrypt() 152 if (!ASN1_OCTET_STRING_set(los, label, labellen)) { in rsa_cms_encrypt()
|
/openssl/ssl/ |
H A D | tls13_enc.c | 36 const unsigned char *label, size_t labellen, in tls13_hkdf_expand() argument 55 if (labellen > TLS13_MAX_LABEL_LEN) { in tls13_hkdf_expand() 88 (unsigned char *)label, labellen); in tls13_hkdf_expand() 346 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument 363 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, in derive_secret_key_and_iv() 461 size_t labellen, hashlen = 0; in tls13_change_cipher_state() local 503 labellen = sizeof(client_early_traffic) - 1; in tls13_change_cipher_state() 586 labellen = sizeof(client_handshake_traffic) - 1; in tls13_change_cipher_state() 601 labellen = sizeof(client_application_traffic) - 1; in tls13_change_cipher_state() 618 labellen = sizeof(server_handshake_traffic) - 1; in tls13_change_cipher_state() [all …]
|
H A D | ssl_local.h | 2693 const unsigned char *label, size_t labellen,
|
/openssl/test/ |
H A D | tls13secretstest.c | 238 const unsigned char *label, size_t labellen, in test_secret() argument 254 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
H A D | sslapitest.c | 6005 size_t labellen; in test_export_key_mat() local 6077 labellen = LONG_LABEL_LEN; in test_export_key_mat() 6079 labellen = SMALL_LABEL_LEN; in test_export_key_mat() 6084 labellen, context, in test_export_key_mat() 6088 labellen, in test_export_key_mat() 6093 labellen, in test_export_key_mat() 6097 labellen, in test_export_key_mat() 6103 labellen, in test_export_key_mat() 6108 labellen, in test_export_key_mat()
|
/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 578 const unsigned char *label, size_t labellen, in prov_tls13_hkdf_expand() argument 596 || !WPACKET_memcpy(&pkt, label, labellen) in prov_tls13_hkdf_expand() 618 size_t labellen, in prov_tls13_hkdf_generate_secret() argument 655 prefix, prefixlen, label, labellen, in prov_tls13_hkdf_generate_secret()
|
/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 1116 size_t labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label() local 1135 labellen = rsa_params[0].return_size; in EVP_PKEY_CTX_get0_rsa_oaep_label() 1136 if (labellen > INT_MAX) in EVP_PKEY_CTX_get0_rsa_oaep_label() 1139 return (int)labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label()
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1684 size_t labellen; in tls_process_server_hello() local 1694 labellen = sizeof(labelbuffer) - 1; in tls_process_server_hello() 1696 labellen += 1; in tls_process_server_hello() 1701 labellen, NULL, 0, 0) <= 0) { in tls_process_server_hello() 3405 size_t labellen; in tls_client_key_exchange_post_work() local 3416 labellen = sizeof(labelbuffer) - 1; in tls_client_key_exchange_post_work() 3418 labellen += 1; in tls_client_key_exchange_post_work() 3422 labellen, NULL, 0, 0) <= 0) { in tls_client_key_exchange_post_work()
|
H A D | statem_srvr.c | 859 size_t labellen; in ossl_statem_server_post_work() local 869 labellen = sizeof(labelbuffer) - 1; in ossl_statem_server_post_work() 871 labellen += 1; in ossl_statem_server_post_work() 875 labellen, NULL, 0, in ossl_statem_server_post_work() 3387 size_t labellen; in tls_post_process_client_key_exchange() local 3396 labellen = sizeof(labelbuffer) - 1; in tls_post_process_client_key_exchange() 3398 labellen += 1; in tls_post_process_client_key_exchange() 3403 labellen, NULL, 0, in tls_post_process_client_key_exchange()
|