/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_kdf.c | 31 const unsigned char *ukm, size_t ukmlen, in ossl_dh_kdf_X9_42_asn1() argument 52 if (ukm != NULL) in ossl_dh_kdf_X9_42_asn1() 54 (unsigned char *)ukm, ukmlen); in ossl_dh_kdf_X9_42_asn1() 69 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument 79 ukm, ukmlen, md, libctx, NULL); in DH_KDF_X9_42()
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_dh.c | 84 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local 93 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info() 142 if (ukm != NULL) { in dh_cms_set_shared_info() 143 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info() 144 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info() 200 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local 266 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt() 295 if (ukm != NULL) { in dh_cms_encrypt() 296 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt() 297 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
|
H A D | cms_ec.c | 162 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local 170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 202 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info() 259 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local 320 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt() 351 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
|
H A D | cms_asn1.c | 167 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1), 388 ASN1_OCTET_STRING *ukm, int keylen) 411 ecsi.entityUInfo = ukm;
|
H A D | cms_local.h | 173 ASN1_OCTET_STRING *ukm; member
|
H A D | cms_kari.c | 39 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-X942-ASN1.pod | 49 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string> 98 unsignred char ukm[64]; 101 if (RAND_bytes(ukm, sizeof(ukm)) <= 0) 115 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
|
H A D | EVP_KEYEXCH-ECDH.pod | 50 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string> 67 /* It is assumed that the host_key, peer_pub_key and ukm are set up */ 69 unsigned char *ukm, size_t ukm_len) 88 ukm, ukm_len);
|
H A D | provider-keyexch.pod | 194 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string> 199 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
|
H A D | EVP_KEYEXCH-DH.pod | 50 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
|
H A D | provider-kdf.pod | 216 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
|
H A D | migration_guide.pod | 1761 See the "kdf-ukm" item in L<EVP_KEYEXCH-DH(7)/DH key exchange parameters> and
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 210 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() argument 224 (void *)ukm, in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() 235 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
|
H A D | dh_ctrl.c | 290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_dh_kdf_ukm() argument 307 (void *)ukm, in EVP_PKEY_CTX_set0_dh_kdf_ukm() 315 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_dh_kdf_ukm()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | dh.h | 55 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 58 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 254 const unsigned char *ukm,
|
H A D | ec.h | 47 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, 51 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
|
H A D | cms.h.in | 384 ASN1_OCTET_STRING *ukm, int keylen);
|
H A D | cms.h | 482 ASN1_OCTET_STRING *ukm, int keylen);
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | dh.h | 56 const unsigned char *ukm, size_t ukmlen,
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_ctrl.pod | 159 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 173 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len); 189 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 193 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm); 541 EVP_PKEY_CTX_set0_dh_kdf_ukm() sets the user key material to I<ukm> and its 546 free the original memory pointed to by I<ukm>. 614 EVP_PKEY_CTX_set0_ecdh_kdf_ukm() sets the user key material to I<ukm> for ECDH 617 should not free the original memory pointed to by I<ukm>.
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_x942.txt | 90 # Fail if both acvp and ukm values are specified.
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.txt | 1027 PROV_R_INVALID_UKM_LENGTH:200:invalid ukm length
|