Searched refs:context_len (Results 1 - 21 of 21) sorted by relevance

/freebsd-13-stable/crypto/openssl/crypto/ec/curve448/
H A Dcurve448_local.h21 const uint8_t *context, size_t context_len);
25 const uint8_t *context, size_t context_len);
29 const uint8_t *context, size_t context_len);
33 size_t context_len);
H A Deddsa.c51 size_t context_len)
61 if (context_len > UINT8_MAX)
66 dom[1] = (uint8_t)context_len;
71 || !EVP_DigestUpdate(hashctx, context, context_len))
136 size_t context_len)
164 if (!hash_init_with_dom(hashctx, prehashed, 0, context, context_len)
205 if (!hash_init_with_dom(hashctx, prehashed, 0, context, context_len)
240 size_t context_len)
243 context_len);
251 uint8_t context_len)
48 hash_init_with_dom(EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len) argument
130 c448_ed448_sign( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len) argument
235 c448_ed448_sign_prehash( uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len) argument
246 c448_ed448_verify( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len) argument
328 c448_ed448_verify_prehash( const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len) argument
338 ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument
347 ED448_verify(const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len) argument
355 ED448ph_sign(uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len) argument
364 ED448ph_verify(const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len) argument
[all...]
H A Ded448.h55 * context_len (in): Length of the context.
67 size_t context_len);
79 * context_len (in): Length of the context.
91 size_t context_len);
105 * context_len (in): Length of the context.
117 uint8_t context_len);
130 * context_len (in): Length of the context.
141 uint8_t context_len);
/freebsd-13-stable/contrib/bearssl/src/ssl/
H A Dssl_keyexport.c47 const void *context, size_t context_len)
63 br_enc16be(tmp, (unsigned)context_len);
67 chunks[3].len = context_len;
45 br_ssl_key_export(br_ssl_engine_context *cc, void *dst, size_t len, const char *label, const void *context, size_t context_len) argument
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_tls_common.h83 size_t context_len, size_t len);
H A Deap_server_tls.c362 size_t context_len = 0; local
370 context_len = 1;
375 context, context_len,
397 size_t context_len = 0; local
405 context_len = 1;
410 context, context_len,
H A Deap_server_tls_common.c111 size_t context_len, size_t len)
120 context, context_len, out, len)) {
109 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, const u8 *context, size_t context_len, size_t len) argument
/freebsd-13-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h22 const u8 *context, size_t context_len,
H A Dtlsv1_client.h22 const u8 *context, size_t context_len,
H A Dtlsv1_client.c518 * @context_len: The length of the context value
526 const u8 *context, size_t context_len,
536 if (context_len > 65535)
540 seed_len += 2 + context_len;
558 WPA_PUT_BE16(pos, context_len);
560 os_memcpy(pos, context, context_len);
525 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) argument
H A Dtlsv1_server.c466 * @context_len: The length of the context value
474 const u8 *context, size_t context_len,
484 if (context_len > 65535)
488 seed_len += 2 + context_len;
506 WPA_PUT_BE16(pos, context_len);
508 os_memcpy(pos, context, context_len);
473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) argument
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dtls_none.c98 size_t context_len, u8 *out, size_t out_len)
96 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
H A Dtls_internal.c416 size_t context_len, int server_random_first,
436 context_len, server_random_first,
443 context_len, server_random_first,
457 size_t context_len, u8 *out, size_t out_len)
459 return tls_connection_prf(tls_ctx, conn, label, context, context_len,
414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) argument
455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
H A Dtls.h388 * @context_len: The length of the context value
395 * (including the case of empty context with context_len == 0).
401 size_t context_len,
H A Dtls_gnutls.c902 size_t context_len, u8 *out, size_t out_len)
909 context_len, (const char *) context,
900 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
H A Dtls_wolfssl.c1991 size_t context_len, u8 *out, size_t out_len)
1989 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
H A Dtls_openssl.c4042 size_t context_len, u8 *out, size_t out_len)
4046 os_strlen(label), context, context_len,
4040 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) argument
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Deap_tls_common.h105 size_t context_len, size_t len);
H A Deap_tls.c179 size_t context_len = 0; local
191 context_len = 1;
206 context, context_len,
H A Deap_tls_common.c362 * @context_len: The length of the context value
376 size_t context_len, size_t len)
385 context, context_len, out, len)) {
374 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, const u8 *context, size_t context_len, size_t len) argument
/freebsd-13-stable/contrib/bearssl/inc/
H A Dbearssl_ssl.h2251 * used; otherwise, the `context_len` bytes located at the address
2255 * `context_len` to 0.
2265 * \param context_len context length (in bytes).
2270 const void *context, size_t context_len);

Completed in 221 milliseconds