/third_party/openssl/crypto/engine/ |
D | eng_openssl.c | 451 OSSL_HMAC_PKEY_CTX *hctx; in ossl_hmac_init() local 453 if ((hctx = OPENSSL_zalloc(sizeof(*hctx))) == NULL) { in ossl_hmac_init() 457 hctx->ktmp.type = V_ASN1_OCTET_STRING; in ossl_hmac_init() 458 hctx->ctx = HMAC_CTX_new(); in ossl_hmac_init() 459 if (hctx->ctx == NULL) { in ossl_hmac_init() 460 OPENSSL_free(hctx); in ossl_hmac_init() 463 EVP_PKEY_CTX_set_data(ctx, hctx); in ossl_hmac_init() 499 OSSL_HMAC_PKEY_CTX *hctx = EVP_PKEY_CTX_get_data(ctx); in ossl_hmac_cleanup() local 501 if (hctx) { in ossl_hmac_cleanup() 502 HMAC_CTX_free(hctx->ctx); in ossl_hmac_cleanup() [all …]
|
/third_party/node/deps/openssl/openssl/crypto/engine/ |
D | eng_openssl.c | 451 OSSL_HMAC_PKEY_CTX *hctx; in ossl_hmac_init() local 453 if ((hctx = OPENSSL_zalloc(sizeof(*hctx))) == NULL) { in ossl_hmac_init() 457 hctx->ktmp.type = V_ASN1_OCTET_STRING; in ossl_hmac_init() 458 hctx->ctx = HMAC_CTX_new(); in ossl_hmac_init() 459 if (hctx->ctx == NULL) { in ossl_hmac_init() 460 OPENSSL_free(hctx); in ossl_hmac_init() 463 EVP_PKEY_CTX_set_data(ctx, hctx); in ossl_hmac_init() 499 OSSL_HMAC_PKEY_CTX *hctx = EVP_PKEY_CTX_get_data(ctx); in ossl_hmac_cleanup() local 501 if (hctx) { in ossl_hmac_cleanup() 502 HMAC_CTX_free(hctx->ctx); in ossl_hmac_cleanup() [all …]
|
/third_party/openssl/providers/implementations/kdfs/ |
D | pbkdf2.c | 284 HMAC_CTX *hctx_tpl = NULL, *hctx = NULL; in pbkdf2_derive() local 321 hctx = HMAC_CTX_new(); in pbkdf2_derive() 322 if (hctx == NULL) in pbkdf2_derive() 337 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 339 if (!HMAC_Update(hctx, salt, saltlen) in pbkdf2_derive() 340 || !HMAC_Update(hctx, itmp, 4) in pbkdf2_derive() 341 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() 345 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 347 if (!HMAC_Update(hctx, digtmp, mdlen) in pbkdf2_derive() 348 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
D | pbkdf2.c | 284 HMAC_CTX *hctx_tpl = NULL, *hctx = NULL; in pbkdf2_derive() local 321 hctx = HMAC_CTX_new(); in pbkdf2_derive() 322 if (hctx == NULL) in pbkdf2_derive() 337 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 339 if (!HMAC_Update(hctx, salt, saltlen) in pbkdf2_derive() 340 || !HMAC_Update(hctx, itmp, 4) in pbkdf2_derive() 341 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() 345 if (!HMAC_CTX_copy(hctx, hctx_tpl)) in pbkdf2_derive() 347 if (!HMAC_Update(hctx, digtmp, mdlen) in pbkdf2_derive() 348 || !HMAC_Final(hctx, digtmp, NULL)) in pbkdf2_derive() [all …]
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 16 EVP_CIPHER_CTX *ctx, EVP_MAC_CTX *hctx, int enc)); 25 EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc)); 51 Before the callback function is started I<ctx> and I<hctx> have been 59 I<iv>, and set the cipher context I<ctx> and the hash context I<hctx>. 79 digest for I<hctx> need to be set using L<EVP_MAC_CTX_set_params(3)> with the 93 This indicates that the I<ctx> and I<hctx> have been set and the session can 101 This indicates that the I<ctx> and I<hctx> have been set and the session can 122 Before this callback function is started I<hctx> will have been 125 The I<hctx> key material can be set using L<HMAC_Init_ex(3)>. 159 EVP_MAC_CTX *hctx, int enc) [all …]
|
/third_party/openssl/ssl/statem/ |
D | extensions_srvr.c | 692 EVP_MD_CTX *hctx; in tls_parse_ctos_cookie() local 723 hctx = EVP_MD_CTX_create(); in tls_parse_ctos_cookie() 728 if (hctx == NULL || pkey == NULL) { in tls_parse_ctos_cookie() 729 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 736 if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", s->ctx->libctx, in tls_parse_ctos_cookie() 738 || EVP_DigestSign(hctx, hmac, &hmaclen, data, in tls_parse_ctos_cookie() 741 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 747 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 1726 EVP_MD_CTX *hctx; in tls_construct_stoc_cookie() local 1800 hctx = EVP_MD_CTX_create(); in tls_construct_stoc_cookie() [all …]
|
D | statem_srvr.c | 3671 SSL_HMAC *hctx = NULL; in construct_stateless_ticket() local 3700 hctx = ssl_hmac_new(tctx); in construct_stateless_ticket() 3701 if (ctx == NULL || hctx == NULL) { in construct_stateless_ticket() 3751 ssl_hmac_get0_EVP_MAC_CTX(hctx), in construct_stateless_ticket() 3757 ssl_hmac_get0_HMAC_CTX(hctx), 1); in construct_stateless_ticket() 3778 ssl_hmac_free(hctx); in construct_stateless_ticket() 3805 || !ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in construct_stateless_ticket() 3838 || !ssl_hmac_update(hctx, in construct_stateless_ticket() 3842 || !ssl_hmac_final(hctx, macdata1, &hlen, EVP_MAX_MD_SIZE) in construct_stateless_ticket() 3860 ssl_hmac_free(hctx); in construct_stateless_ticket()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | extensions_srvr.c | 692 EVP_MD_CTX *hctx; in tls_parse_ctos_cookie() local 723 hctx = EVP_MD_CTX_create(); in tls_parse_ctos_cookie() 728 if (hctx == NULL || pkey == NULL) { in tls_parse_ctos_cookie() 729 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 736 if (EVP_DigestSignInit_ex(hctx, NULL, "SHA2-256", s->ctx->libctx, in tls_parse_ctos_cookie() 738 || EVP_DigestSign(hctx, hmac, &hmaclen, data, in tls_parse_ctos_cookie() 741 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 747 EVP_MD_CTX_free(hctx); in tls_parse_ctos_cookie() 1760 EVP_MD_CTX *hctx; in tls_construct_stoc_cookie() local 1834 hctx = EVP_MD_CTX_create(); in tls_construct_stoc_cookie() [all …]
|
D | statem_srvr.c | 3692 SSL_HMAC *hctx = NULL; in construct_stateless_ticket() local 3721 hctx = ssl_hmac_new(tctx); in construct_stateless_ticket() 3722 if (ctx == NULL || hctx == NULL) { in construct_stateless_ticket() 3772 ssl_hmac_get0_EVP_MAC_CTX(hctx), in construct_stateless_ticket() 3778 ssl_hmac_get0_HMAC_CTX(hctx), 1); in construct_stateless_ticket() 3799 ssl_hmac_free(hctx); in construct_stateless_ticket() 3826 || !ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in construct_stateless_ticket() 3859 || !ssl_hmac_update(hctx, in construct_stateless_ticket() 3863 || !ssl_hmac_final(hctx, macdata1, &hlen, EVP_MAX_MD_SIZE) in construct_stateless_ticket() 3881 ssl_hmac_free(hctx); in construct_stateless_ticket()
|
/third_party/node/src/crypto/ |
D | crypto_context.h | 129 HMAC_CTX* hctx, 136 HMAC_CTX* hctx,
|
D | crypto_context.cc | 1169 HMAC_CTX* hctx, in TicketKeyCallback() argument 1242 HMAC_Init_ex(hctx, in TicketKeyCallback() 1270 HMAC_CTX* hctx, in TicketCompatibilityCallback() argument 1280 HMAC_Init_ex(hctx, in TicketCompatibilityCallback() 1297 HMAC_Init_ex(hctx, sc->ticket_key_hmac_, sizeof(sc->ticket_key_hmac_), in TicketCompatibilityCallback()
|
/third_party/node/deps/openssl/openssl/ssl/ |
D | t1_lib.c | 1814 SSL_HMAC *hctx = NULL; in tls_decrypt_ticket() local 1844 hctx = ssl_hmac_new(tctx); in tls_decrypt_ticket() 1845 if (hctx == NULL) { in tls_decrypt_ticket() 1867 ssl_hmac_get0_EVP_MAC_CTX(hctx), in tls_decrypt_ticket() 1874 ctx, ssl_hmac_get0_HMAC_CTX(hctx), 0); in tls_decrypt_ticket() 1899 || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in tls_decrypt_ticket() 1917 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket() 1936 if (ssl_hmac_update(hctx, etick, eticklen) <= 0 in tls_decrypt_ticket() 1937 || ssl_hmac_final(hctx, tick_hmac, NULL, sizeof(tick_hmac)) <= 0) { in tls_decrypt_ticket() 2000 ssl_hmac_free(hctx); in tls_decrypt_ticket()
|
D | ssl_local.h | 1056 EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc); 1060 EVP_CIPHER_CTX *ectx, EVP_MAC_CTX *hctx,
|
/third_party/openssl/ssl/ |
D | t1_lib.c | 1793 SSL_HMAC *hctx = NULL; in tls_decrypt_ticket() local 1823 hctx = ssl_hmac_new(tctx); in tls_decrypt_ticket() 1824 if (hctx == NULL) { in tls_decrypt_ticket() 1846 ssl_hmac_get0_EVP_MAC_CTX(hctx), in tls_decrypt_ticket() 1853 ctx, ssl_hmac_get0_HMAC_CTX(hctx), 0); in tls_decrypt_ticket() 1878 || ssl_hmac_init(hctx, tctx->ext.secure->tick_hmac_key, in tls_decrypt_ticket() 1896 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket() 1915 if (ssl_hmac_update(hctx, etick, eticklen) <= 0 in tls_decrypt_ticket() 1916 || ssl_hmac_final(hctx, tick_hmac, NULL, sizeof(tick_hmac)) <= 0) { in tls_decrypt_ticket() 1979 ssl_hmac_free(hctx); in tls_decrypt_ticket()
|
D | ssl_local.h | 1047 EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc); 1051 EVP_CIPHER_CTX *ectx, EVP_MAC_CTX *hctx,
|
/third_party/nghttp2/src/ |
D | shrpx_tls.cc | 538 EVP_MAC_CTX *hctx, in ticket_key_cb() argument 540 HMAC_CTX *hctx, in ticket_key_cb() 584 if (!EVP_MAC_CTX_set_params(hctx, params.data())) { in ticket_key_cb() 591 HMAC_Init_ex(hctx, key.data.hmac_key.data(), key.hmac_keylen, key.hmac, in ticket_key_cb() 629 if (!EVP_MAC_CTX_set_params(hctx, params.data())) { in ticket_key_cb() 636 HMAC_Init_ex(hctx, key.data.hmac_key.data(), key.hmac_keylen, key.hmac, in ticket_key_cb()
|
/third_party/openssl/test/helpers/ |
D | handshake.c | 328 EVP_MAC_CTX *hctx, int enc) in broken_session_ticket_cb() argument 336 EVP_MAC_CTX *hctx, int enc) in do_not_call_session_ticket_cb() argument
|
/third_party/openssl/test/ |
D | sslapitest.c | 7839 HMAC_CTX *hctx, int enc) in tick_key_cb() argument 7866 || !HMAC_Init_ex(hctx, tick_hmac_key, sizeof(tick_hmac_key), sha256, in tick_key_cb() 7881 EVP_CIPHER_CTX *ctx, EVP_MAC_CTX *hctx, int enc) in tick_key_evp_cb() argument 7905 || !EVP_MAC_init(hctx, tick_hmac_key, sizeof(tick_hmac_key), in tick_key_evp_cb()
|
/third_party/libbpf/.github/actions/build-selftests/ |
D | vmlinux.h | 56608 struct blk_mq_hw_ctx *hctx; member 57001 struct blk_mq_hw_ctx *hctx; member 57006 struct blk_mq_hw_ctx *hctx; member 57017 struct blk_mq_hw_ctx *hctx; member 57035 struct blk_mq_hw_ctx *hctx; member 58093 struct blk_mq_hw_ctx *hctx; member
|