/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 146 const uint8_t *secret, size_t secretlen, 161 size_t secretlen, 175 const uint8_t *secret, size_t secretlen, 191 size_t secretlen, 346 * |secretlen| specifies the length of |secret|. 378 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen); 393 * |secretlen| specifies the length of |secret|. 425 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen); 433 * pointed by |rx_secret|. The length of secret is |secretlen| bytes, 437 * pointed by |tx_secret|. The length of secret is |secretlen| byte [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 48 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_expand_label() 63 return ngtcp2_crypto_hkdf_expand(dest, destlen, md, secret, secretlen, info, in ngtcp2_crypto_hkdf_expand_label() 138 const uint8_t *secret, size_t secretlen) { in ngtcp2_crypto_derive_packet_protection_key() 172 if (ngtcp2_crypto_hkdf_expand_label(key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 177 if (ngtcp2_crypto_hkdf_expand_label(iv, ivlen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 183 ngtcp2_crypto_hkdf_expand_label(hp_key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key() 194 size_t secretlen) { in ngtcp2_crypto_update_traffic_secret() 197 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret() 209 size_t secretlen) { in ngtcp2_crypto_derive_and_install_rx_key() 46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument 135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument 191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument 205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument 346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument 716 ngtcp2_crypto_update_key( ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret, ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_key, uint8_t *rx_iv, ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_key, uint8_t *tx_iv, const uint8_t *current_rx_secret, const uint8_t *current_tx_secret, size_t secretlen) ngtcp2_crypto_update_key() argument 796 ngtcp2_crypto_update_key_cb( ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret, ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv, ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv, const uint8_t *current_rx_secret, const uint8_t *current_tx_secret, size_t secretlen, void *user_data) ngtcp2_crypto_update_key_cb() argument 816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument 833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument 896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument 973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument 1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument 1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument [all...] |
H A D | shared.h | 157 size_t secretlen); 164 * its length is given in |secretlen|. The length of new key is the 174 size_t secretlen);
|
/third_party/nghttp2/src/ |
H A D | shrpx_quic.h | 109 size_t secretlen); 114 const uint8_t *secret, size_t secretlen); 119 const uint8_t *secret, size_t secretlen); 122 size_t salen, const uint8_t *secret, size_t secretlen); 125 socklen_t salen, const uint8_t *secret, size_t secretlen); 129 size_t secretlen,
|
H A D | shrpx_quic.cc | 286 size_t secretlen) { in generate_quic_stateless_reset_token() 287 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token() 298 const uint8_t *secret, size_t secretlen) { in generate_retry_token() 304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token() 317 const uint8_t *secret, size_t secretlen) { in verify_retry_token() 324 secretlen, version, sa, salen, &dcid, in verify_retry_token() 333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token() 339 token, secret, secretlen, sa, salen, t); in generate_token() 350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token() 355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, s in verify_token() 284 generate_quic_stateless_reset_token(uint8_t *token, const ngtcp2_cid &cid, const uint8_t *secret, size_t secretlen) generate_quic_stateless_reset_token() argument 295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument 314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument 332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument 349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument 364 generate_quic_connection_id_encryption_key(uint8_t *key, size_t keylen, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) generate_quic_connection_id_encryption_key() argument [all...] |
/third_party/curl/lib/vtls/ |
H A D | keylog.c | 125 const unsigned char *secret, size_t secretlen) in Curl_tls_keylog_write() 137 if(pos > KEYLOG_LABEL_MAXLEN || !secretlen || secretlen > SECRET_MAXLEN) { in Curl_tls_keylog_write() 153 for(i = 0; i < secretlen; i++) { in Curl_tls_keylog_write() 123 Curl_tls_keylog_write(const char *label, const unsigned char client_random[CLIENT_RANDOM_SIZE], const unsigned char *secret, size_t secretlen) Curl_tls_keylog_write() argument
|
H A D | keylog.h | 50 const unsigned char *secret, size_t secretlen);
|
/third_party/node/deps/openssl/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() 259 if (outlen == NULL && secretlen == NULL) in rsasve_generate() 263 if (secretlen != NULL) in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 280 if (secretlen != NULL) in rsasve_generate() 281 *secretlen = nlen; in rsasve_generate() 320 unsigned char *secret, size_t *secretlen) in rsakem_generate() 326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate() 244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument 319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
|
/third_party/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 246 unsigned char *secret, size_t *secretlen) in rsasve_generate() 259 if (outlen == NULL && secretlen == NULL) in rsasve_generate() 263 if (secretlen != NULL) in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 280 if (secretlen != NULL) in rsasve_generate() 281 *secretlen = nlen; in rsasve_generate() 320 unsigned char *secret, size_t *secretlen) in rsakem_generate() 326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate() 244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument 319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/wolfssl/ |
H A D | wolfssl.c | 210 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 212 if (wolfSSL_quic_hkdf_extract(dest, md->native_handle, secret, secretlen, in ngtcp2_crypto_hkdf_extract() 221 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand() 224 secretlen, info, infolen) != WOLFSSL_SUCCESS) { in ngtcp2_crypto_hkdf_expand() 232 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf() 234 if (wolfSSL_quic_hkdf(dest, destlen, md->native_handle, secret, secretlen, in ngtcp2_crypto_hkdf() 441 const uint8_t *tx_secret, size_t secretlen) { in set_encryption_secrets() 448 wolfssl_level, rx_secret ? secretlen : 0, in set_encryption_secrets() 449 tx_secret ? secretlen : 0); in set_encryption_secrets() 452 rx_secret, secretlen) ! in set_encryption_secrets() 209 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 219 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 230 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 438 set_encryption_secrets(WOLFSSL *ssl, WOLFSSL_ENCRYPTION_LEVEL wolfssl_level, const uint8_t *rx_secret, const uint8_t *tx_secret, size_t secretlen) set_encryption_secrets() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
H A D | boringssl.c | 284 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract() 299 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand() 303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand() 312 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf() 316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf() 541 size_t secretlen) { in set_read_secret() 549 secret, secretlen) != 0) { in set_read_secret() 558 size_t secretlen) { in set_write_secret() 566 secret, secretlen) ! in set_write_secret() 283 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 297 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 310 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 539 set_read_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_read_secret() argument 556 set_write_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_write_secret() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 326 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 338 secretlen), in ngtcp2_crypto_hkdf_extract() 368 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_extract() 381 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand() 393 secretlen), in ngtcp2_crypto_hkdf_expand() 421 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_expand() 435 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf() 445 secretlen), in ngtcp2_crypto_hkdf() 476 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf() 730 const uint8_t *tx_secret, size_t secretlen) { in set_encryption_secrets() 325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument 728 set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level, const uint8_t *rx_secret, const uint8_t *tx_secret, size_t secretlen) set_encryption_secrets() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 243 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract() 248 ikm = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_extract() 259 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand() 263 prk = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_expand() 275 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf() 282 ikm = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf() 566 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_server_cb() local 573 secret, secretlen) != 0) { in update_traffic_key_server_cb() 594 secret, secretlen) != 0) { in update_traffic_key_server_cb() 611 size_t secretlen in update_traffic_key_cb() local 242 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument 257 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument 273 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument [all...] |
/third_party/openssl/test/ |
H A D | evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; in kem_rsa_gen_recover() local 540 &secretlen), 1) in kem_rsa_gen_recover() 541 && TEST_int_eq(ctlen, secretlen) in kem_rsa_gen_recover() 544 &secretlen), 1) in kem_rsa_gen_recover() 552 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover() 596 size_t ctlen = 0, secretlen = 0; in kem_rsa_params() local 614 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params() 619 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params() 625 /* Test secretlen is optional */ in kem_rsa_params() 630 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, NULL, NULL, &secretlen), in kem_rsa_params() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | kdf_exch.c | 94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument 107 *secretlen = kdfsize; in kdf_derive() 123 *secretlen = outlen; in kdf_derive()
|
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 138 *secretlen = ecxctx->keylen; in ecx_derive() 180 *secretlen = ecxctx->keylen; in ecx_derive()
|
H A D | dh_exch.c | 143 unsigned char *secret, size_t *secretlen, in dh_plain_derive() 158 *secretlen = dhsize; in dh_plain_derive() 174 *secretlen = ret; in dh_plain_derive() 179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive() 187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 142 dh_plain_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen, unsigned int pad) dh_plain_derive() argument 178 dh_X9_42_kdf_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen) dh_X9_42_kdf_derive() argument
|
/third_party/openssl/providers/implementations/exchange/ |
H A D | kdf_exch.c | 94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument 107 *secretlen = kdfsize; in kdf_derive() 123 *secretlen = outlen; in kdf_derive()
|
H A D | ecx_exch.c | 116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument 138 *secretlen = ecxctx->keylen; in ecx_derive() 180 *secretlen = ecxctx->keylen; in ecx_derive()
|
H A D | dh_exch.c | 143 unsigned char *secret, size_t *secretlen, in dh_plain_derive() 158 *secretlen = dhsize; in dh_plain_derive() 174 *secretlen = ret; in dh_plain_derive() 179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive() 187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive() 142 dh_plain_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen, unsigned int pad) dh_plain_derive() argument 178 dh_X9_42_kdf_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen) dh_X9_42_kdf_derive() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_crypto.h | 97 * |secretlen|, the |key| of length |keylen| and the |iv| of length 98 * |ivlen| are copied to |*pckm|. If |secretlen| == 0, the function 103 size_t secretlen, 112 int ngtcp2_crypto_km_nocopy_new(ngtcp2_crypto_km **pckm, size_t secretlen,
|
H A D | ngtcp2_crypto.c | 36 size_t secretlen, in ngtcp2_crypto_km_new() 40 int rv = ngtcp2_crypto_km_nocopy_new(pckm, secretlen, ivlen, mem); in ngtcp2_crypto_km_new() 45 if (secretlen) { in ngtcp2_crypto_km_new() 46 memcpy((*pckm)->secret.base, secret, secretlen); in ngtcp2_crypto_km_new() 56 int ngtcp2_crypto_km_nocopy_new(ngtcp2_crypto_km **pckm, size_t secretlen, in ngtcp2_crypto_km_nocopy_new() argument 61 len = sizeof(ngtcp2_crypto_km) + secretlen + ivlen; in ngtcp2_crypto_km_nocopy_new() 70 (*pckm)->secret.len = secretlen; in ngtcp2_crypto_km_nocopy_new() 71 p += secretlen; in ngtcp2_crypto_km_nocopy_new() 35 ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret, size_t secretlen, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *iv, size_t ivlen, const ngtcp2_mem *mem) ngtcp2_crypto_km_new() argument
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | kem.c | 188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate() 207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate() 216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate() 221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate() 234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate() 186 EVP_PKEY_encapsulate(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) EVP_PKEY_encapsulate() argument 215 EVP_PKEY_decapsulate(EVP_PKEY_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *in, size_t inlen) EVP_PKEY_decapsulate() argument
|
/third_party/openssl/crypto/evp/ |
H A D | kem.c | 188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate() 207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate() 216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate() 221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate() 234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate() 186 EVP_PKEY_encapsulate(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) EVP_PKEY_encapsulate() argument 215 EVP_PKEY_decapsulate(EVP_PKEY_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *in, size_t inlen) EVP_PKEY_decapsulate() argument
|
/third_party/node/src/crypto/ |
H A D | crypto_common.h | 34 size_t secretlen);
|