Lines Matching refs:macctx
44 struct blake2_mac_data_st *macctx;
49 macctx = OPENSSL_zalloc(sizeof(*macctx));
50 if (macctx != NULL) {
51 BLAKE2_PARAM_INIT(&macctx->params);
54 return macctx;
75 struct blake2_mac_data_st *macctx = vmacctx;
77 if (macctx != NULL) {
78 OPENSSL_cleanse(macctx->key, sizeof(macctx->key));
79 OPENSSL_free(macctx);
85 struct blake2_mac_data_st *macctx = vmacctx;
87 return macctx->params.digest_length;
90 static int blake2_setkey(struct blake2_mac_data_st *macctx,
97 memcpy(macctx->key, key, keylen);
100 memset(macctx->key + keylen, 0, BLAKE2_KEYBYTES - keylen);
101 BLAKE2_PARAM_SET_KEY_LENGTH(&macctx->params, (uint8_t)keylen);
108 struct blake2_mac_data_st *macctx = vmacctx;
110 if (!ossl_prov_is_running() || !blake2_mac_set_ctx_params(macctx, params))
113 if (!blake2_setkey(macctx, key, keylen))
115 } else if (macctx->params.key_length == 0) {
120 return BLAKE2_INIT_KEY(&macctx->ctx, &macctx->params, macctx->key);
126 struct blake2_mac_data_st *macctx = vmacctx;
131 return BLAKE2_UPDATE(&macctx->ctx, data, datalen);
138 struct blake2_mac_data_st *macctx = vmacctx;
143 *outl = blake2_mac_size(macctx);
144 return BLAKE2_FINAL(out, &macctx->ctx);
191 struct blake2_mac_data_st *macctx = vmacctx;
206 BLAKE2_PARAM_SET_DIGEST_LENGTH(&macctx->params, (uint8_t)size);
210 && !blake2_setkey(macctx, p->data, p->data_size))
223 BLAKE2_PARAM_SET_PERSONAL(&macctx->params, p->data, p->data_size);
235 BLAKE2_PARAM_SET_SALT(&macctx->params, p->data, p->data_size);