Home
last modified time | relevance | path

Searched refs:secretlen (Results 1 - 25 of 32) sorted by relevance

12

/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/
H A Dngtcp2_crypto.h146 const uint8_t *secret, size_t secretlen,
161 size_t secretlen,
175 const uint8_t *secret, size_t secretlen,
191 size_t secretlen,
346 * |secretlen| specifies the length of |secret|.
378 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen);
393 * |secretlen| specifies the length of |secret|.
425 ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen);
433 * pointed by |rx_secret|. The length of secret is |secretlen| bytes,
437 * pointed by |tx_secret|. The length of secret is |secretlen| byte
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/
H A Dshared.c48 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_expand_label()
63 return ngtcp2_crypto_hkdf_expand(dest, destlen, md, secret, secretlen, info, in ngtcp2_crypto_hkdf_expand_label()
138 const uint8_t *secret, size_t secretlen) { in ngtcp2_crypto_derive_packet_protection_key()
172 if (ngtcp2_crypto_hkdf_expand_label(key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
177 if (ngtcp2_crypto_hkdf_expand_label(iv, ivlen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
183 ngtcp2_crypto_hkdf_expand_label(hp_key, keylen, md, secret, secretlen, in ngtcp2_crypto_derive_packet_protection_key()
194 size_t secretlen) { in ngtcp2_crypto_update_traffic_secret()
197 if (ngtcp2_crypto_hkdf_expand_label(dest, secretlen, md, secret, secretlen, in ngtcp2_crypto_update_traffic_secret()
209 size_t secretlen) { in ngtcp2_crypto_derive_and_install_rx_key()
46 ngtcp2_crypto_hkdf_expand_label(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *label, size_t labellen) ngtcp2_crypto_hkdf_expand_label() argument
135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument
191 ngtcp2_crypto_update_traffic_secret(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_update_traffic_secret() argument
205 ngtcp2_crypto_derive_and_install_rx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_rx_key() argument
346 ngtcp2_crypto_derive_and_install_tx_key(ngtcp2_conn *conn, uint8_t *key, uint8_t *iv, uint8_t *hp_key, ngtcp2_crypto_level level, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_and_install_tx_key() argument
716 ngtcp2_crypto_update_key( ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret, ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_key, uint8_t *rx_iv, ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_key, uint8_t *tx_iv, const uint8_t *current_rx_secret, const uint8_t *current_tx_secret, size_t secretlen) ngtcp2_crypto_update_key() argument
796 ngtcp2_crypto_update_key_cb( ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret, ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv, ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv, const uint8_t *current_rx_secret, const uint8_t *current_tx_secret, size_t secretlen, void *user_data) ngtcp2_crypto_update_key_cb() argument
816 ngtcp2_crypto_generate_stateless_reset_token(uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_cid *cid) ngtcp2_crypto_generate_stateless_reset_token() argument
833 crypto_derive_token_key(uint8_t *key, size_t keylen, uint8_t *iv, size_t ivlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info_prefix, size_t info_prefixlen) crypto_derive_token_key() argument
896 ngtcp2_crypto_generate_retry_token( uint8_t *token, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *retry_scid, const ngtcp2_cid *odcid, ngtcp2_tstamp ts) ngtcp2_crypto_generate_retry_token() argument
973 ngtcp2_crypto_verify_retry_token( ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, uint32_t version, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, const ngtcp2_cid *dcid, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_retry_token() argument
1079 ngtcp2_crypto_generate_regular_token( uint8_t *token, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_tstamp ts) ngtcp2_crypto_generate_regular_token() argument
1150 ngtcp2_crypto_verify_regular_token(const uint8_t *token, size_t tokenlen, const uint8_t *secret, size_t secretlen, const ngtcp2_sockaddr *remote_addr, ngtcp2_socklen remote_addrlen, ngtcp2_duration timeout, ngtcp2_tstamp ts) ngtcp2_crypto_verify_regular_token() argument
[all...]
H A Dshared.h157 size_t secretlen);
164 * its length is given in |secretlen|. The length of new key is the
174 size_t secretlen);
/third_party/nghttp2/src/
H A Dshrpx_quic.h109 size_t secretlen);
114 const uint8_t *secret, size_t secretlen);
119 const uint8_t *secret, size_t secretlen);
122 size_t salen, const uint8_t *secret, size_t secretlen);
125 socklen_t salen, const uint8_t *secret, size_t secretlen);
129 size_t secretlen,
H A Dshrpx_quic.cc286 size_t secretlen) { in generate_quic_stateless_reset_token()
287 if (ngtcp2_crypto_generate_stateless_reset_token(token, secret, secretlen, in generate_quic_stateless_reset_token()
298 const uint8_t *secret, size_t secretlen) { in generate_retry_token()
304 token, secret, secretlen, version, sa, salen, &retry_scid, &odcid, t); in generate_retry_token()
317 const uint8_t *secret, size_t secretlen) { in verify_retry_token()
324 secretlen, version, sa, salen, &dcid, in verify_retry_token()
333 size_t salen, const uint8_t *secret, size_t secretlen) { in generate_token()
339 token, secret, secretlen, sa, salen, t); in generate_token()
350 socklen_t salen, const uint8_t *secret, size_t secretlen) { in verify_token()
355 if (ngtcp2_crypto_verify_regular_token(token, tokenlen, secret, secretlen, s in verify_token()
284 generate_quic_stateless_reset_token(uint8_t *token, const ngtcp2_cid &cid, const uint8_t *secret, size_t secretlen) generate_quic_stateless_reset_token() argument
295 generate_retry_token(uint8_t *token, size_t &tokenlen, uint32_t version, const sockaddr *sa, socklen_t salen, const ngtcp2_cid &retry_scid, const ngtcp2_cid &odcid, const uint8_t *secret, size_t secretlen) generate_retry_token() argument
314 verify_retry_token(ngtcp2_cid &odcid, const uint8_t *token, size_t tokenlen, uint32_t version, const ngtcp2_cid &dcid, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_retry_token() argument
332 generate_token(uint8_t *token, size_t &tokenlen, const sockaddr *sa, size_t salen, const uint8_t *secret, size_t secretlen) generate_token() argument
349 verify_token(const uint8_t *token, size_t tokenlen, const sockaddr *sa, socklen_t salen, const uint8_t *secret, size_t secretlen) verify_token() argument
364 generate_quic_connection_id_encryption_key(uint8_t *key, size_t keylen, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) generate_quic_connection_id_encryption_key() argument
[all...]
/third_party/curl/lib/vtls/
H A Dkeylog.c125 const unsigned char *secret, size_t secretlen) in Curl_tls_keylog_write()
137 if(pos > KEYLOG_LABEL_MAXLEN || !secretlen || secretlen > SECRET_MAXLEN) { in Curl_tls_keylog_write()
153 for(i = 0; i < secretlen; i++) { in Curl_tls_keylog_write()
123 Curl_tls_keylog_write(const char *label, const unsigned char client_random[CLIENT_RANDOM_SIZE], const unsigned char *secret, size_t secretlen) Curl_tls_keylog_write() argument
H A Dkeylog.h50 const unsigned char *secret, size_t secretlen);
/third_party/node/deps/openssl/openssl/providers/implementations/kem/
H A Drsa_kem.c246 unsigned char *secret, size_t *secretlen) in rsasve_generate()
259 if (outlen == NULL && secretlen == NULL) in rsasve_generate()
263 if (secretlen != NULL) in rsasve_generate()
264 *secretlen = nlen; in rsasve_generate()
280 if (secretlen != NULL) in rsasve_generate()
281 *secretlen = nlen; in rsasve_generate()
320 unsigned char *secret, size_t *secretlen) in rsakem_generate()
326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument
319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
/third_party/openssl/providers/implementations/kem/
H A Drsa_kem.c246 unsigned char *secret, size_t *secretlen) in rsasve_generate()
259 if (outlen == NULL && secretlen == NULL) in rsasve_generate()
263 if (secretlen != NULL) in rsasve_generate()
264 *secretlen = nlen; in rsasve_generate()
280 if (secretlen != NULL) in rsasve_generate()
281 *secretlen = nlen; in rsasve_generate()
320 unsigned char *secret, size_t *secretlen) in rsakem_generate()
326 return rsasve_generate(prsactx, out, outlen, secret, secretlen); in rsakem_generate()
244 rsasve_generate(PROV_RSA_CTX *prsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsasve_generate() argument
319 rsakem_generate(void *vprsactx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) rsakem_generate() argument
/third_party/node/deps/ngtcp2/ngtcp2/crypto/wolfssl/
H A Dwolfssl.c210 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract()
212 if (wolfSSL_quic_hkdf_extract(dest, md->native_handle, secret, secretlen, in ngtcp2_crypto_hkdf_extract()
221 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand()
224 secretlen, info, infolen) != WOLFSSL_SUCCESS) { in ngtcp2_crypto_hkdf_expand()
232 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf()
234 if (wolfSSL_quic_hkdf(dest, destlen, md->native_handle, secret, secretlen, in ngtcp2_crypto_hkdf()
441 const uint8_t *tx_secret, size_t secretlen) { in set_encryption_secrets()
448 wolfssl_level, rx_secret ? secretlen : 0, in set_encryption_secrets()
449 tx_secret ? secretlen : 0); in set_encryption_secrets()
452 rx_secret, secretlen) ! in set_encryption_secrets()
209 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument
219 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument
230 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
438 set_encryption_secrets(WOLFSSL *ssl, WOLFSSL_ENCRYPTION_LEVEL wolfssl_level, const uint8_t *rx_secret, const uint8_t *tx_secret, size_t secretlen) set_encryption_secrets() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/
H A Dboringssl.c284 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract()
289 if (HKDF_extract(dest, &destlen, prf, secret, secretlen, salt, saltlen) != in ngtcp2_crypto_hkdf_extract()
299 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand()
303 if (HKDF_expand(dest, destlen, prf, secret, secretlen, info, infolen) != 1) { in ngtcp2_crypto_hkdf_expand()
312 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf()
316 if (HKDF(dest, destlen, prf, secret, secretlen, salt, saltlen, info, in ngtcp2_crypto_hkdf()
541 size_t secretlen) { in set_read_secret()
549 secret, secretlen) != 0) { in set_read_secret()
558 size_t secretlen) { in set_write_secret()
566 secret, secretlen) ! in set_write_secret()
283 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument
297 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument
310 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
539 set_read_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_read_secret() argument
556 set_write_secret(SSL *ssl, enum ssl_encryption_level_t bssl_level, const SSL_CIPHER *cipher, const uint8_t *secret, size_t secretlen) set_write_secret() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/
H A Dopenssl.c326 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract()
338 secretlen), in ngtcp2_crypto_hkdf_extract()
368 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_extract()
381 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand()
393 secretlen), in ngtcp2_crypto_hkdf_expand()
421 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf_expand()
435 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf()
445 secretlen), in ngtcp2_crypto_hkdf()
476 EVP_PKEY_CTX_set1_hkdf_key(pctx, secret, (int)secretlen) != 1 || in ngtcp2_crypto_hkdf()
730 const uint8_t *tx_secret, size_t secretlen) { in set_encryption_secrets()
325 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument
379 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument
433 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
728 set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level, const uint8_t *rx_secret, const uint8_t *tx_secret, size_t secretlen) set_encryption_secrets() argument
[all...]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/
H A Dpicotls.c243 const uint8_t *secret, size_t secretlen, in ngtcp2_crypto_hkdf_extract()
248 ikm = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_extract()
259 size_t secretlen, const uint8_t *info, in ngtcp2_crypto_hkdf_expand()
263 prk = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_expand()
275 size_t secretlen, const uint8_t *salt, size_t saltlen, in ngtcp2_crypto_hkdf()
282 ikm = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf()
566 size_t secretlen = cipher->hash->digest_size; in update_traffic_key_server_cb() local
573 secret, secretlen) != 0) { in update_traffic_key_server_cb()
594 secret, secretlen) != 0) { in update_traffic_key_server_cb()
611 size_t secretlen in update_traffic_key_cb() local
242 ngtcp2_crypto_hkdf_extract(uint8_t *dest, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen) ngtcp2_crypto_hkdf_extract() argument
257 ngtcp2_crypto_hkdf_expand(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf_expand() argument
273 ngtcp2_crypto_hkdf(uint8_t *dest, size_t destlen, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen, const uint8_t *salt, size_t saltlen, const uint8_t *info, size_t infolen) ngtcp2_crypto_hkdf() argument
[all...]
/third_party/openssl/test/
H A Devp_libctx_test.c531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; in kem_rsa_gen_recover() local
540 &secretlen), 1) in kem_rsa_gen_recover()
541 && TEST_int_eq(ctlen, secretlen) in kem_rsa_gen_recover()
544 &secretlen), 1) in kem_rsa_gen_recover()
552 && TEST_mem_eq(unwrap, unwraplen, secret, secretlen); in kem_rsa_gen_recover()
596 size_t ctlen = 0, secretlen = 0; in kem_rsa_params() local
614 && TEST_int_eq(EVP_PKEY_decapsulate(pubctx, secret, &secretlen, ct, in kem_rsa_params()
619 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params()
625 /* Test secretlen is optional */ in kem_rsa_params()
630 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, NULL, NULL, NULL, &secretlen), in kem_rsa_params()
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/exchange/
H A Dkdf_exch.c94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument
107 *secretlen = kdfsize; in kdf_derive()
123 *secretlen = outlen; in kdf_derive()
H A Decx_exch.c116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
138 *secretlen = ecxctx->keylen; in ecx_derive()
180 *secretlen = ecxctx->keylen; in ecx_derive()
H A Ddh_exch.c143 unsigned char *secret, size_t *secretlen, in dh_plain_derive()
158 *secretlen = dhsize; in dh_plain_derive()
174 *secretlen = ret; in dh_plain_derive()
179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive()
187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
142 dh_plain_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen, unsigned int pad) dh_plain_derive() argument
178 dh_X9_42_kdf_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen) dh_X9_42_kdf_derive() argument
/third_party/openssl/providers/implementations/exchange/
H A Dkdf_exch.c94 static int kdf_derive(void *vpkdfctx, unsigned char *secret, size_t *secretlen, in kdf_derive() argument
107 *secretlen = kdfsize; in kdf_derive()
123 *secretlen = outlen; in kdf_derive()
H A Decx_exch.c116 static int ecx_derive(void *vecxctx, unsigned char *secret, size_t *secretlen, in ecx_derive() argument
138 *secretlen = ecxctx->keylen; in ecx_derive()
180 *secretlen = ecxctx->keylen; in ecx_derive()
H A Ddh_exch.c143 unsigned char *secret, size_t *secretlen, in dh_plain_derive()
158 *secretlen = dhsize; in dh_plain_derive()
174 *secretlen = ret; in dh_plain_derive()
179 size_t *secretlen, size_t outlen) in dh_X9_42_kdf_derive()
187 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
215 *secretlen = pdhctx->kdf_outlen; in dh_X9_42_kdf_derive()
142 dh_plain_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen, unsigned int pad) dh_plain_derive() argument
178 dh_X9_42_kdf_derive(void *vpdhctx, unsigned char *secret, size_t *secretlen, size_t outlen) dh_X9_42_kdf_derive() argument
/third_party/node/deps/ngtcp2/ngtcp2/lib/
H A Dngtcp2_crypto.h97 * |secretlen|, the |key| of length |keylen| and the |iv| of length
98 * |ivlen| are copied to |*pckm|. If |secretlen| == 0, the function
103 size_t secretlen,
112 int ngtcp2_crypto_km_nocopy_new(ngtcp2_crypto_km **pckm, size_t secretlen,
H A Dngtcp2_crypto.c36 size_t secretlen, in ngtcp2_crypto_km_new()
40 int rv = ngtcp2_crypto_km_nocopy_new(pckm, secretlen, ivlen, mem); in ngtcp2_crypto_km_new()
45 if (secretlen) { in ngtcp2_crypto_km_new()
46 memcpy((*pckm)->secret.base, secret, secretlen); in ngtcp2_crypto_km_new()
56 int ngtcp2_crypto_km_nocopy_new(ngtcp2_crypto_km **pckm, size_t secretlen, in ngtcp2_crypto_km_nocopy_new() argument
61 len = sizeof(ngtcp2_crypto_km) + secretlen + ivlen; in ngtcp2_crypto_km_nocopy_new()
70 (*pckm)->secret.len = secretlen; in ngtcp2_crypto_km_nocopy_new()
71 p += secretlen; in ngtcp2_crypto_km_nocopy_new()
35 ngtcp2_crypto_km_new(ngtcp2_crypto_km **pckm, const uint8_t *secret, size_t secretlen, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *iv, size_t ivlen, const ngtcp2_mem *mem) ngtcp2_crypto_km_new() argument
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dkem.c188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate()
207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate()
216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate()
221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate()
234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate()
186 EVP_PKEY_encapsulate(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) EVP_PKEY_encapsulate() argument
215 EVP_PKEY_decapsulate(EVP_PKEY_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *in, size_t inlen) EVP_PKEY_decapsulate() argument
/third_party/openssl/crypto/evp/
H A Dkem.c188 unsigned char *secret, size_t *secretlen) in EVP_PKEY_encapsulate()
207 out, outlen, secret, secretlen); in EVP_PKEY_encapsulate()
216 unsigned char *secret, size_t *secretlen, in EVP_PKEY_decapsulate()
221 || (secret == NULL && secretlen == NULL)) in EVP_PKEY_decapsulate()
234 secret, secretlen, in, inlen); in EVP_PKEY_decapsulate()
186 EVP_PKEY_encapsulate(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen) EVP_PKEY_encapsulate() argument
215 EVP_PKEY_decapsulate(EVP_PKEY_CTX *ctx, unsigned char *secret, size_t *secretlen, const unsigned char *in, size_t inlen) EVP_PKEY_decapsulate() argument
/third_party/node/src/crypto/
H A Dcrypto_common.h34 size_t secretlen);

Completed in 17 milliseconds

12