/openssl/crypto/cms/ |
H A D | cms_rsa.c | 46 int labellen = 0; in rsa_cms_decrypt() local 92 labellen = plab->parameter->value.octet_string->length; in rsa_cms_decrypt() 102 && EVP_PKEY_CTX_set0_rsa_oaep_label(pkctx, label, labellen) <= 0) { in rsa_cms_decrypt() 122 int pad_mode = RSA_PKCS1_PADDING, rv = 0, labellen; in rsa_cms_encrypt() local 142 labellen = EVP_PKEY_CTX_get0_rsa_oaep_label(pkctx, &label); in rsa_cms_encrypt() 143 if (labellen < 0) in rsa_cms_encrypt() 152 if (labellen > 0) { in rsa_cms_encrypt() 157 if (!ASN1_OCTET_STRING_set(los, label, labellen)) in rsa_cms_encrypt()
|
/openssl/crypto/hpke/ |
H A D | hpke_util.c | 306 size_t labellen = 0; in ossl_hpke_labeled_extract() local 313 labellen = strlen(label); in ossl_hpke_labeled_extract() 315 + suiteidlen + labellen + ikmlen; in ossl_hpke_labeled_extract() 325 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_extract() 356 size_t labellen = 0; in ossl_hpke_labeled_expand() local 363 labellen = strlen(label); in ossl_hpke_labeled_expand() 365 + protocol_labellen + suiteidlen + labellen + infolen; in ossl_hpke_labeled_expand() 376 || !WPACKET_memcpy(&pkt, label, labellen) in ossl_hpke_labeled_expand()
|
H A D | hpke.c | 1237 const unsigned char *label, size_t labellen) in OSSL_HPKE_export() argument 1249 if (labellen > OSSL_HPKE_MAX_PARMLEN) { in OSSL_HPKE_export() 1253 if (labellen > 0 && label == NULL) { in OSSL_HPKE_export() 1284 label, labellen); in OSSL_HPKE_export()
|
/openssl/ssl/ |
H A D | tls13_enc.c | 35 const unsigned char *label, size_t labellen, in tls13_hkdf_expand_ex() argument 52 if (labellen > TLS13_MAX_LABEL_LEN) { in tls13_hkdf_expand_ex() 101 const unsigned char *label, size_t labellen, in tls13_hkdf_expand() argument 109 secret, label, labellen, data, datalen, in tls13_hkdf_expand() 354 size_t labellen, unsigned char *secret, in derive_secret_key_and_iv() argument 477 size_t labellen, hashlen = 0; in tls13_change_cipher_state() local 499 labellen = sizeof(client_early_traffic) - 1; in tls13_change_cipher_state() 592 labellen = sizeof(client_handshake_traffic) - 1; in tls13_change_cipher_state() 607 labellen = sizeof(client_application_traffic) - 1; in tls13_change_cipher_state() 628 labellen = sizeof(server_handshake_traffic) - 1; in tls13_change_cipher_state() [all …]
|
H A D | ssl_local.h | 2736 const unsigned char *label, size_t labellen, 2742 const unsigned char *label, size_t labellen,
|
/openssl/test/ |
H A D | tls13secretstest.c | 242 const unsigned char *label, size_t labellen, in test_secret() argument 258 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
H A D | sslapitest.c | 6476 size_t labellen; in test_export_key_mat() local 6548 labellen = LONG_LABEL_LEN; in test_export_key_mat() 6550 labellen = SMALL_LABEL_LEN; in test_export_key_mat() 6557 labellen, context, in test_export_key_mat() 6561 labellen, in test_export_key_mat() 6566 labellen, in test_export_key_mat() 6572 labellen, in test_export_key_mat() 6578 labellen, in test_export_key_mat() 6584 labellen, in test_export_key_mat() 6589 labellen, in test_export_key_mat() [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 648 const unsigned char *label, size_t labellen, in prov_tls13_hkdf_expand() argument 666 || !WPACKET_memcpy(&pkt, label, labellen) in prov_tls13_hkdf_expand() 688 size_t labellen, in prov_tls13_hkdf_generate_secret() argument 725 prefix, prefixlen, label, labellen, in prov_tls13_hkdf_generate_secret()
|
/openssl/include/openssl/ |
H A D | hpke.h | 138 size_t labellen);
|
/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 1217 size_t labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label() local 1236 labellen = rsa_params[0].return_size; in EVP_PKEY_CTX_get0_rsa_oaep_label() 1237 if (labellen > INT_MAX) in EVP_PKEY_CTX_get0_rsa_oaep_label() 1240 return (int)labellen; in EVP_PKEY_CTX_get0_rsa_oaep_label()
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1755 size_t labellen; in tls_process_server_hello() local 1765 labellen = sizeof(labelbuffer) - 1; in tls_process_server_hello() 1767 labellen += 1; in tls_process_server_hello() 1772 labellen, NULL, 0, 0) <= 0) { in tls_process_server_hello() 3615 size_t labellen; in tls_client_key_exchange_post_work() local 3626 labellen = sizeof(labelbuffer) - 1; in tls_client_key_exchange_post_work() 3628 labellen += 1; in tls_client_key_exchange_post_work() 3632 labellen, NULL, 0, 0) <= 0) { in tls_client_key_exchange_post_work()
|
H A D | statem_srvr.c | 922 size_t labellen; in ossl_statem_server_post_work() local 932 labellen = sizeof(labelbuffer) - 1; in ossl_statem_server_post_work() 934 labellen += 1; in ossl_statem_server_post_work() 938 labellen, NULL, 0, in ossl_statem_server_post_work() 3460 size_t labellen; in tls_post_process_client_key_exchange() local 3469 labellen = sizeof(labelbuffer) - 1; in tls_post_process_client_key_exchange() 3471 labellen += 1; in tls_post_process_client_key_exchange() 3476 labellen, NULL, 0, in tls_post_process_client_key_exchange()
|
/openssl/doc/man3/ |
H A D | OSSL_HPKE_CTX_new.pod | 55 const unsigned char *label, size_t labellen); 220 I<labellen> parameters, and for the length of the string I<pskid> for HPKE 339 supplied label I<label> of size I<labellen>, to produce a secret I<secret>
|