Home
last modified time | relevance | path

Searched refs:ukm (Results 1 – 22 of 22) sorted by relevance

/freebsd/crypto/openssl/crypto/dh/
H A Ddh_kdf.c31 const unsigned char *ukm, size_t ukmlen, in ossl_dh_kdf_X9_42_asn1() argument
52 if (ukm != NULL) in ossl_dh_kdf_X9_42_asn1()
54 (unsigned char *)ukm, ukmlen); in ossl_dh_kdf_X9_42_asn1()
69 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) in DH_KDF_X9_42() argument
79 ukm, ukmlen, md, libctx, NULL); in DH_KDF_X9_42()
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_dh.c84 ASN1_OCTET_STRING *ukm; in dh_cms_set_shared_info() local
93 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in dh_cms_set_shared_info()
142 if (ukm != NULL) { in dh_cms_set_shared_info()
143 dukmlen = ASN1_STRING_length(ukm); in dh_cms_set_shared_info()
144 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_set_shared_info()
200 ASN1_OCTET_STRING *ukm; in dh_cms_encrypt() local
266 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in dh_cms_encrypt()
295 if (ukm != NULL) { in dh_cms_encrypt()
296 dukmlen = ASN1_STRING_length(ukm); in dh_cms_encrypt()
297 dukm = OPENSSL_memdup(ASN1_STRING_get0_data(ukm), dukmlen); in dh_cms_encrypt()
H A Dcms_ec.c162 ASN1_OCTET_STRING *ukm; in ecdh_cms_set_shared_info() local
170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
202 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); in ecdh_cms_set_shared_info()
259 ASN1_OCTET_STRING *ukm; in ecdh_cms_encrypt() local
320 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) in ecdh_cms_encrypt()
351 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen); in ecdh_cms_encrypt()
H A Dcms_asn1.c167 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1),
388 ASN1_OCTET_STRING *ukm, int keylen)
411 ecsi.entityUInfo = ukm;
H A Dcms_local.h173 ASN1_OCTET_STRING *ukm; member
H A Dcms_kari.c39 *pukm = ri->d.kari->ukm; in CMS_RecipientInfo_kari_get0_alg()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_KDF-X942-ASN1.pod49 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
98 unsignred char ukm[64];
101 if (RAND_bytes(ukm, sizeof(ukm)) <= 0)
115 *p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
H A DEVP_KEYEXCH-ECDH.pod50 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
67 /* It is assumed that the host_key, peer_pub_key and ukm are set up */
69 unsigned char *ukm, size_t ukm_len)
88 ukm, ukm_len);
H A Dprovider-keyexch.pod194 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
199 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string ptr>
H A DEVP_KEYEXCH-DH.pod50 =item "kdf-ukm" (B<OSSL_EXCHANGE_PARAM_KDF_UKM>) <octet string>
H A Dprovider-kdf.pod216 =item "ukm" (B<OSSL_KDF_PARAM_UKM>) <octet string>
H A Dmigration_guide.pod1761 See the "kdf-ukm" item in L<EVP_KEYEXCH-DH(7)/DH key exchange parameters> and
/freebsd/crypto/openssl/crypto/evp/
H A Dec_ctrl.c210 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_ecdh_kdf_ukm() argument
224 (void *)ukm, in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
235 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_ecdh_kdf_ukm()
H A Ddh_ctrl.c290 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len) in EVP_PKEY_CTX_set0_dh_kdf_ukm() argument
307 (void *)ukm, in EVP_PKEY_CTX_set0_dh_kdf_ukm()
315 OPENSSL_free(ukm); in EVP_PKEY_CTX_set0_dh_kdf_ukm()
/freebsd/crypto/openssl/include/openssl/
H A Ddh.h55 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
58 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
254 const unsigned char *ukm,
H A Dec.h47 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm,
51 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
H A Dcms.h.in384 ASN1_OCTET_STRING *ukm, int keylen);
H A Dcms.h482 ASN1_OCTET_STRING *ukm, int keylen);
/freebsd/crypto/openssl/include/crypto/
H A Ddh.h56 const unsigned char *ukm, size_t ukmlen,
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_CTX_ctrl.pod159 int EVP_PKEY_CTX_set0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
173 int EVP_PKEY_CTX_set0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char *ukm, int len);
189 int EVP_PKEY_CTX_get0_dh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
193 int EVP_PKEY_CTX_get0_ecdh_kdf_ukm(EVP_PKEY_CTX *ctx, unsigned char **ukm);
541 EVP_PKEY_CTX_set0_dh_kdf_ukm() sets the user key material to I<ukm> and its
546 free the original memory pointed to by I<ukm>.
614 EVP_PKEY_CTX_set0_ecdh_kdf_ukm() sets the user key material to I<ukm> for ECDH
617 should not free the original memory pointed to by I<ukm>.
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpkdf_x942.txt90 # Fail if both acvp and ukm values are specified.
/freebsd/crypto/openssl/crypto/err/
H A Dopenssl.txt1027 PROV_R_INVALID_UKM_LENGTH:200:invalid ukm length