/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/engines/ccgost/ |
H A D | gost_keywrap.h | 19 * ukm - 8byte user key material 25 const unsigned char *ukm, 31 * ukm - 8 byte (64 bit) user key material, 38 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 5 unsigned char *ukm,
|
H A D | gost_keywrap.c | 19 * ukm - 8byte user key material 24 const unsigned char *ukm, unsigned char *outputKey) 38 if (mask & ukm[i]) { 61 * ukm - 8 byte (64 bit) user key material, 67 const unsigned char *ukm, 72 keyDiversifyCryptoPro(ctx, keyExchangeKey, ukm, kek_ukm); 74 memcpy(wrappedKey, ukm, 8); 76 gost_mac_iv(ctx, 32, ukm, sessionKey, 32, wrappedKey + 40); 97 /* First 8 bytes of wrapped Key is ukm */ 23 keyDiversifyCryptoPro(gost_ctx * ctx, const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 66 keyWrapCryptoPro(gost_ctx * ctx, const unsigned char *keyExchangeKey, const unsigned char *ukm, const unsigned char *sessionKey, unsigned char *wrappedKey) argument
|
H A D | gost2001_keyx.c | 24 const unsigned char *ukm) 35 ukm_be[7 - i] = ukm[i]; 78 * pkey ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 129 memcpy(ukm, data->shared_ukm, 8); 132 if (RAND_bytes(ukm, 8) <= 0) { 164 EVP_PKEY_get0(sec_key), ukm); 166 keyWrapCryptoPro(&cctx, shared_key, ukm, key, crypted_key); 172 if (!ASN1_OCTET_STRING_set(gkt->key_agreement_info->eph_iv, ukm, 8)) { 22 VKO_compute_key(unsigned char *shared_key, size_t shared_key_size, const EC_POINT *pub_key, EC_KEY *priv_key, const unsigned char *ukm) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/engines/ccgost/ |
H A D | gost_keywrap.h | 18 * ukm - 8byte user key material 24 const unsigned char *ukm, 30 * ukm - 8 byte (64 bit) user key material, 37 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 4 unsigned char *ukm, size_t ukm_len);
|
H A D | gost_keywrap.c | 18 * ukm - 8byte user key material 22 void keyDiversifyCryptoPro(gost_ctx *ctx,const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 38 if (mask & ukm[i]) 65 * ukm - 8 byte (64 bit) user key material, 70 int keyWrapCryptoPro(gost_ctx *ctx,const unsigned char *keyExchangeKey, const unsigned char *ukm, argument 74 keyDiversifyCryptoPro(ctx,keyExchangeKey,ukm,kek_ukm); 76 memcpy(wrappedKey,ukm,8); 78 gost_mac_iv(ctx,32,ukm,sessionKey,32,wrappedKey+40); 97 /* First 8 bytes of wrapped Key is ukm */
|
H A D | gost2001_keyx.c | 24 static int VKO_compute_key(unsigned char *shared_key,size_t shared_key_size,const EC_POINT *pub_key,EC_KEY *priv_key,const unsigned char *ukm) argument 36 ukm_be[7-i]=ukm[i]; 79 * ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 130 memcpy(ukm, data->shared_ukm,8); 135 if (RAND_bytes(ukm,8)<=0) 173 VKO_compute_key(shared_key,32,EC_KEY_get0_public_key(EVP_PKEY_get0(pubk)),EVP_PKEY_get0(sec_key),ukm); 175 keyWrapCryptoPro(&cctx,shared_key,ukm,key,crypted_key); 183 ukm,8))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/engines/ccgost/ |
H A D | gost_keywrap.h | 18 * ukm - 8byte user key material 24 const unsigned char *ukm, 30 * ukm - 8 byte (64 bit) user key material, 37 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 4 unsigned char *ukm, size_t ukm_len);
|
H A D | gost_keywrap.c | 18 * ukm - 8byte user key material 22 void keyDiversifyCryptoPro(gost_ctx *ctx,const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 38 if (mask & ukm[i]) 65 * ukm - 8 byte (64 bit) user key material, 70 int keyWrapCryptoPro(gost_ctx *ctx,const unsigned char *keyExchangeKey, const unsigned char *ukm, argument 74 keyDiversifyCryptoPro(ctx,keyExchangeKey,ukm,kek_ukm); 76 memcpy(wrappedKey,ukm,8); 78 gost_mac_iv(ctx,32,ukm,sessionKey,32,wrappedKey+40); 97 /* First 8 bytes of wrapped Key is ukm */
|
H A D | gost2001_keyx.c | 24 static int VKO_compute_key(unsigned char *shared_key,size_t shared_key_size,const EC_POINT *pub_key,EC_KEY *priv_key,const unsigned char *ukm) argument 36 ukm_be[7-i]=ukm[i]; 79 * ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 130 memcpy(ukm, data->shared_ukm,8); 135 if (RAND_bytes(ukm,8)<=0) 173 VKO_compute_key(shared_key,32,EC_KEY_get0_public_key(EVP_PKEY_get0(pubk)),EVP_PKEY_get0(sec_key),ukm); 175 keyWrapCryptoPro(&cctx,shared_key,ukm,key,crypted_key); 183 ukm,8))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/engines/ccgost/ |
H A D | gost_keywrap.h | 19 * ukm - 8byte user key material 25 const unsigned char *ukm, 31 * ukm - 8 byte (64 bit) user key material, 38 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 5 unsigned char *ukm,
|
H A D | gost_keywrap.c | 19 * ukm - 8byte user key material 24 const unsigned char *ukm, unsigned char *outputKey) 38 if (mask & ukm[i]) { 61 * ukm - 8 byte (64 bit) user key material, 67 const unsigned char *ukm, 72 keyDiversifyCryptoPro(ctx, keyExchangeKey, ukm, kek_ukm); 74 memcpy(wrappedKey, ukm, 8); 76 gost_mac_iv(ctx, 32, ukm, sessionKey, 32, wrappedKey + 40); 97 /* First 8 bytes of wrapped Key is ukm */ 23 keyDiversifyCryptoPro(gost_ctx * ctx, const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 66 keyWrapCryptoPro(gost_ctx * ctx, const unsigned char *keyExchangeKey, const unsigned char *ukm, const unsigned char *sessionKey, unsigned char *wrappedKey) argument
|
H A D | gost2001_keyx.c | 24 const unsigned char *ukm) 35 ukm_be[7 - i] = ukm[i]; 78 * pkey ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 129 memcpy(ukm, data->shared_ukm, 8); 132 if (RAND_bytes(ukm, 8) <= 0) { 164 EVP_PKEY_get0(sec_key), ukm); 166 keyWrapCryptoPro(&cctx, shared_key, ukm, key, crypted_key); 172 if (!ASN1_OCTET_STRING_set(gkt->key_agreement_info->eph_iv, ukm, 8)) { 22 VKO_compute_key(unsigned char *shared_key, size_t shared_key_size, const EC_POINT *pub_key, EC_KEY *priv_key, const unsigned char *ukm) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/engines/ccgost/ |
H A D | gost_keywrap.h | 19 * ukm - 8byte user key material 25 const unsigned char *ukm, 31 * ukm - 8 byte (64 bit) user key material, 38 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 5 unsigned char *ukm,
|
H A D | gost_keywrap.c | 19 * ukm - 8byte user key material 24 const unsigned char *ukm, unsigned char *outputKey) 38 if (mask & ukm[i]) { 61 * ukm - 8 byte (64 bit) user key material, 67 const unsigned char *ukm, 72 keyDiversifyCryptoPro(ctx, keyExchangeKey, ukm, kek_ukm); 74 memcpy(wrappedKey, ukm, 8); 76 gost_mac_iv(ctx, 32, ukm, sessionKey, 32, wrappedKey + 40); 97 /* First 8 bytes of wrapped Key is ukm */ 23 keyDiversifyCryptoPro(gost_ctx * ctx, const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 66 keyWrapCryptoPro(gost_ctx * ctx, const unsigned char *keyExchangeKey, const unsigned char *ukm, const unsigned char *sessionKey, unsigned char *wrappedKey) argument
|
H A D | gost2001_keyx.c | 24 const unsigned char *ukm) 35 ukm_be[7 - i] = ukm[i]; 78 * pkey ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 129 memcpy(ukm, data->shared_ukm, 8); 132 if (RAND_bytes(ukm, 8) <= 0) { 164 EVP_PKEY_get0(sec_key), ukm); 166 keyWrapCryptoPro(&cctx, shared_key, ukm, key, crypted_key); 172 if (!ASN1_OCTET_STRING_set(gkt->key_agreement_info->eph_iv, ukm, 8)) { 22 VKO_compute_key(unsigned char *shared_key, size_t shared_key_size, const EC_POINT *pub_key, EC_KEY *priv_key, const unsigned char *ukm) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/engines/ccgost/ |
H A D | gost_keywrap.h | 18 * ukm - 8byte user key material 24 const unsigned char *ukm, 30 * ukm - 8 byte (64 bit) user key material, 37 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 4 unsigned char *ukm, size_t ukm_len);
|
H A D | gost_keywrap.c | 18 * ukm - 8byte user key material 22 void keyDiversifyCryptoPro(gost_ctx *ctx,const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 38 if (mask & ukm[i]) 65 * ukm - 8 byte (64 bit) user key material, 70 int keyWrapCryptoPro(gost_ctx *ctx,const unsigned char *keyExchangeKey, const unsigned char *ukm, argument 74 keyDiversifyCryptoPro(ctx,keyExchangeKey,ukm,kek_ukm); 76 memcpy(wrappedKey,ukm,8); 78 gost_mac_iv(ctx,32,ukm,sessionKey,32,wrappedKey+40); 97 /* First 8 bytes of wrapped Key is ukm */
|
H A D | gost2001_keyx.c | 24 static int VKO_compute_key(unsigned char *shared_key,size_t shared_key_size,const EC_POINT *pub_key,EC_KEY *priv_key,const unsigned char *ukm) argument 36 ukm_be[7-i]=ukm[i]; 79 * ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 130 memcpy(ukm, data->shared_ukm,8); 135 if (RAND_bytes(ukm,8)<=0) 173 VKO_compute_key(shared_key,32,EC_KEY_get0_public_key(EVP_PKEY_get0(pubk)),EVP_PKEY_get0(sec_key),ukm); 175 keyWrapCryptoPro(&cctx,shared_key,ukm,key,crypted_key); 183 ukm,8))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/dh/ |
H A D | dh_kdf.c | 90 const unsigned char *ukm, size_t ukmlen) 110 if (ukm) { 113 ukm_oct.data = (unsigned char *)ukm; 140 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) 152 derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen); 88 dh_sharedinfo_encode(unsigned char **pder, unsigned char **pctr, ASN1_OBJECT *key_oid, size_t outlen, const unsigned char *ukm, size_t ukmlen) argument 137 DH_KDF_X9_42(unsigned char *out, size_t outlen, const unsigned char *Z, size_t Zlen, ASN1_OBJECT *key_oid, const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) argument
|