Lines Matching defs:key
277 /* Initialise a ktri based on passed certificate and key */
452 /* Encrypt content key in key transport recipient info */
489 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
499 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
514 /* Decrypt content key from KTRI */
596 OPENSSL_clear_free(ec->key, ec->keylen);
597 ec->key = ek;
628 /* For now hard code AES key wrap info */
648 unsigned char *key, size_t keylen,
721 kekri->key = key;
780 unsigned char *key, size_t keylen)
789 kekri->key = key;
816 /* Encrypt content key in KEK recipient info */
837 if (kekri->key == NULL) {
862 if (!EVP_EncryptInit_ex(ctx, cipher, NULL, kekri->key, NULL)
863 || !EVP_EncryptUpdate(ctx, wkey, &wkeylen, ec->key, ec->keylen)
887 /* Decrypt content key in KEK recipient info */
908 if (!kekri->key) {
919 /* If encrypted key length is invalid don't bother */
944 if (!EVP_DecryptInit_ex(ctx, cipher, NULL, kekri->key, NULL)
954 OPENSSL_clear_free(ec->key, ec->keylen);
955 ec->key = ukey;
1088 OPENSSL_clear_free(ec->key, ec->keylen);
1089 ec->key = NULL;
1130 /* Get BIO first to set up key */
1139 /* Now encrypt content key according to each RecipientInfo type */
1178 /* Get BIO first to set up key */
1191 /* Now encrypt content key according to each RecipientInfo type */
1287 * Get RecipientInfo type (if any) supported by a key (public or private). To
1289 * supported we assume key transport.