Lines Matching refs:key
158 memset(sessionPtrs[sessionId], 0, sizeof *sessionPtrs[sessionId]); // Zero out key data.
165 * Derives keys for encryption and signing from the encrypted session key.
169 * @return A Boolean value indicating whether key derivation was successful.
176 unsigned char key[KEY_SIZE];
185 pSession->encryptedSessionKeyLength, pData->key, KEY_SIZE);
187 if (AES_set_encrypt_key(pData->key, KEY_SIZE_IN_BITS, &pData->sessionRoundKeys) != 0) {
190 // Encrypt the 16-byte value {0, 0, ..., 0} to produce the encryption key.
192 AES_encrypt(pData->value, pData->key, &pData->sessionRoundKeys);
193 if (AES_set_encrypt_key(pData->key, KEY_SIZE_IN_BITS,
197 // Encrypt the 16-byte value {1, 0, ..., 0} to produce the signing key.
199 AES_encrypt(pData->value, pData->key, &pData->sessionRoundKeys);
201 HMAC_Init_ex(&pSession->signingContext, pData->key, KEY_SIZE, EVP_sha1(), NULL);
208 memset(pData, 0, kSize); // Zero out key data.
249 // The first 16 bytes of the encrypted session key is used as the nonce.