Lines Matching refs:key
158 memset(sessionPtrs[sessionId], 0, sizeof *sessionPtrs[sessionId]); // Zero out key data.
165 * Derives keys for encryption and signing from the encrypted session key.
169 * @return A Boolean value indicating whether key derivation was successful.
176 unsigned char key[KEY_SIZE];
182 pSession->encryptedSessionKeyLength, pData->key, KEY_SIZE);
184 if (AES_set_encrypt_key(pData->key, KEY_SIZE_IN_BITS, &pData->sessionRoundKeys) != 0) {
187 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key.
189 AES_encrypt(pData->value, pData->key, &pData->sessionRoundKeys);
190 if (AES_set_encrypt_key(pData->key, KEY_SIZE_IN_BITS,
194 // Encrypt the 16-byte value {1, 0, ..., 0} to produce the signing key.
196 AES_encrypt(pData->value, pData->key, &pData->sessionRoundKeys);
198 HMAC_Init_ex(&pSession->signingContext, pData->key, KEY_SIZE, EVP_sha1(), NULL);
205 memset(pData, 0, sizeof pData); // Zero out key data.
246 // The first 16 bytes of the encrypted session key is used as the nonce.