/freebsd-13-stable/crypto/openssl/crypto/ec/curve448/ |
H A D | curve448_local.h | 21 const uint8_t *context, size_t context_len); 25 const uint8_t *context, size_t context_len); 29 const uint8_t *context, size_t context_len); 33 size_t context_len);
|
H A D | eddsa.c | 51 size_t context_len) 61 if (context_len > UINT8_MAX) 66 dom[1] = (uint8_t)context_len; 71 || !EVP_DigestUpdate(hashctx, context, context_len)) 136 size_t context_len) 164 if (!hash_init_with_dom(hashctx, prehashed, 0, context, context_len) 205 if (!hash_init_with_dom(hashctx, prehashed, 0, context, context_len) 240 size_t context_len) 243 context_len); 251 uint8_t context_len) 48 hash_init_with_dom(EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len) argument 130 c448_ed448_sign( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len) argument 235 c448_ed448_sign_prehash( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len) argument 246 c448_ed448_verify( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len) argument 328 c448_ed448_verify_prehash( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len) argument 338 ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument 347 ED448_verify(const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len) argument 355 ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument 364 ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len) argument [all...] |
H A D | ed448.h | 55 * context_len (in): Length of the context. 67 size_t context_len); 79 * context_len (in): Length of the context. 91 size_t context_len); 105 * context_len (in): Length of the context. 117 uint8_t context_len); 130 * context_len (in): Length of the context. 141 uint8_t context_len);
|
/freebsd-13-stable/contrib/bearssl/src/ssl/ |
H A D | ssl_keyexport.c | 47 const void *context, size_t context_len) 63 br_enc16be(tmp, (unsigned)context_len); 67 chunks[3].len = context_len; 45 br_ssl_key_export(br_ssl_engine_context *cc, void *dst, size_t len, const char *label, const void *context, size_t context_len) argument
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_tls_common.h | 83 size_t context_len, size_t len);
|
H A D | eap_server_tls.c | 362 size_t context_len = 0; local 370 context_len = 1; 375 context, context_len, 397 size_t context_len = 0; local 405 context_len = 1; 410 context, context_len,
|
H A D | eap_server_tls_common.c | 111 size_t context_len, size_t len) 120 context, context_len, out, len)) { 109 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, const u8 *context, size_t context_len, size_t len) argument
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 22 const u8 *context, size_t context_len,
|
H A D | tlsv1_client.h | 22 const u8 *context, size_t context_len,
|
H A D | tlsv1_client.c | 518 * @context_len: The length of the context value 526 const u8 *context, size_t context_len, 536 if (context_len > 65535) 540 seed_len += 2 + context_len; 558 WPA_PUT_BE16(pos, context_len); 560 os_memcpy(pos, context, context_len); 525 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) argument
|
H A D | tlsv1_server.c | 466 * @context_len: The length of the context value 474 const u8 *context, size_t context_len, 484 if (context_len > 65535) 488 seed_len += 2 + context_len; 506 WPA_PUT_BE16(pos, context_len); 508 os_memcpy(pos, context, context_len); 473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) argument
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_none.c | 98 size_t context_len, u8 *out, size_t out_len) 96 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
|
H A D | tls_internal.c | 416 size_t context_len, int server_random_first, 436 context_len, server_random_first, 443 context_len, server_random_first, 457 size_t context_len, u8 *out, size_t out_len) 459 return tls_connection_prf(tls_ctx, conn, label, context, context_len, 414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) argument 455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
|
H A D | tls.h | 388 * @context_len: The length of the context value 395 * (including the case of empty context with context_len == 0). 401 size_t context_len,
|
H A D | tls_gnutls.c | 902 size_t context_len, u8 *out, size_t out_len) 909 context_len, (const char *) context, 900 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
|
H A D | tls_wolfssl.c | 1991 size_t context_len, u8 *out, size_t out_len) 1989 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
|
H A D | tls_openssl.c | 4042 size_t context_len, u8 *out, size_t out_len) 4046 os_strlen(label), context, context_len, 4040 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_tls_common.h | 105 size_t context_len, size_t len);
|
H A D | eap_tls.c | 179 size_t context_len = 0; local 191 context_len = 1; 206 context, context_len,
|
H A D | eap_tls_common.c | 362 * @context_len: The length of the context value 376 size_t context_len, size_t len) 385 context, context_len, out, len)) { 374 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, const u8 *context, size_t context_len, size_t len) argument
|
/freebsd-13-stable/contrib/bearssl/inc/ |
H A D | bearssl_ssl.h | 2251 * used; otherwise, the `context_len` bytes located at the address 2255 * `context_len` to 0. 2265 * \param context_len context length (in bytes). 2270 const void *context, size_t context_len);
|