/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_keywrap.h | 19 * ukm - 8byte user key material 25 const unsigned char *ukm, 31 * ukm - 8 byte (64 bit) user key material, 38 const unsigned char *ukm,
|
H A D | gost2001_keyx.h | 5 unsigned char *ukm,
|
H A D | gost_keywrap.c | 19 * ukm - 8byte user key material 24 const unsigned char *ukm, unsigned char *outputKey) 38 if (mask & ukm[i]) { 61 * ukm - 8 byte (64 bit) user key material, 67 const unsigned char *ukm, 72 keyDiversifyCryptoPro(ctx, keyExchangeKey, ukm, kek_ukm); 74 memcpy(wrappedKey, ukm, 8); 76 gost_mac_iv(ctx, 32, ukm, sessionKey, 32, wrappedKey + 40); 97 /* First 8 bytes of wrapped Key is ukm */ 23 keyDiversifyCryptoPro(gost_ctx * ctx, const unsigned char *inputKey, const unsigned char *ukm, unsigned char *outputKey) argument 66 keyWrapCryptoPro(gost_ctx * ctx, const unsigned char *keyExchangeKey, const unsigned char *ukm, const unsigned char *sessionKey, unsigned char *wrappedKey) argument
|
H A D | gost2001_keyx.c | 24 const unsigned char *ukm) 35 ukm_be[7 - i] = ukm[i]; 78 * pkey ukm is in the algorithm specific context data 123 unsigned char ukm[8], shared_key[32], crypted_key[44]; local 129 memcpy(ukm, data->shared_ukm, 8); 132 if (RAND_bytes(ukm, 8) <= 0) { 166 EVP_PKEY_get0(sec_key), ukm); 168 keyWrapCryptoPro(&cctx, shared_key, ukm, key, crypted_key); 174 if (!ASN1_OCTET_STRING_set(gkt->key_agreement_info->eph_iv, ukm, 8)) { 22 VKO_compute_key(unsigned char *shared_key, size_t shared_key_size, const EC_POINT *pub_key, EC_KEY *priv_key, const unsigned char *ukm) argument
|
H A D | gost94_keyx.c | 101 unsigned char shared_key[32], ukm[8], crypted_key[44]; local 141 memcpy(ukm, data->shared_ukm, 8); 143 if (RAND_bytes(ukm, 8) <= 0) { 152 keyWrapCryptoPro(&cctx, shared_key, ukm, key, crypted_key); 158 if (!ASN1_OCTET_STRING_set(gkt->key_agreement_info->eph_iv, ukm, 8)) {
|
/freebsd-11-stable/crypto/openssl/crypto/dh/ |
H A D | dh_kdf.c | 93 const unsigned char *ukm, size_t ukmlen) 113 if (ukm) { 116 ukm_oct.data = (unsigned char *)ukm; 143 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) 155 derlen = dh_sharedinfo_encode(&der, &ctr, key_oid, outlen, ukm, ukmlen); 91 dh_sharedinfo_encode(unsigned char **pder, unsigned char **pctr, ASN1_OBJECT *key_oid, size_t outlen, const unsigned char *ukm, size_t ukmlen) argument 140 DH_KDF_X9_42(unsigned char *out, size_t outlen, const unsigned char *Z, size_t Zlen, ASN1_OBJECT *key_oid, const unsigned char *ukm, size_t ukmlen, const EVP_MD *md) argument
|
H A D | dh_ameth.c | 719 ASN1_OCTET_STRING *ukm; local 727 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 773 if (ukm) { 774 dukmlen = ASN1_STRING_length(ukm); 775 dukm = BUF_memdup(ASN1_STRING_data(ukm), dukmlen); 831 ASN1_OCTET_STRING *ukm; local 891 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) 920 if (ukm) { 921 dukmlen = ASN1_STRING_length(ukm); 922 dukm = BUF_memdup(ASN1_STRING_data(ukm), dukmle [all...] |
H A D | dh.h | 265 const unsigned char *ukm, size_t ukmlen, const EVP_MD *md);
|
/freebsd-11-stable/crypto/openssl/crypto/ec/ |
H A D | ec_ameth.c | 740 ASN1_OCTET_STRING *ukm; local 747 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) 778 plen = CMS_SharedInfo_encode(&der, kekalg, ukm, keylen); 834 ASN1_OCTET_STRING *ukm; local 903 if (!CMS_RecipientInfo_kari_get0_alg(ri, &talg, &ukm)) 934 penclen = CMS_SharedInfo_encode(&penc, wrap_alg, ukm, keylen);
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_asn1.c | 215 ASN1_EXP_OPT(CMS_KeyAgreeRecipientInfo, ukm, ASN1_OCTET_STRING, 1), 432 ASN1_OCTET_STRING *ukm, int keylen) 455 ecsi.entityUInfo = ukm;
|
H A D | cms_lcl.h | 207 ASN1_OCTET_STRING *ukm; member in struct:CMS_KeyAgreeRecipientInfo_st
|
H A D | cms_kari.c | 85 *pukm = ri->d.kari->ukm;
|
H A D | cms.h | 374 ASN1_OCTET_STRING *ukm, int keylen);
|