| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evppkey_ecc.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 46 Derive=ALICE_cf_c2pnb163v1 52 Derive=BOB_cf_c2pnb163v1 58 Derive=ALICE_cf_c2pnb163v1 65 Derive=BOB_cf_c2pnb163v1 78 Derive=BOB_cf_c2pnb163v1 86 Derive=ALICE_cf_c2pnb163v1 124 Derive=ALICE_cf_c2pnb163v2 130 Derive=BOB_cf_c2pnb163v2 136 Derive=ALICE_cf_c2pnb163v2 [all …]
|
| H A D | evppkey_ecdh.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 55 Derive=ALICE_secp112r1 61 Derive=BOB_secp112r1 100 Derive=ALICE_secp112r2 107 Derive=BOB_secp112r2 145 Derive=ALICE_secp128r1 152 Derive=BOB_secp128r1 191 Derive=ALICE_secp128r2 198 Derive=BOB_secp128r2 239 Derive=ALICE_secp160k1 [all …]
|
| H A D | evppkey_brainpool.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 43 Derive=ALICE_cf_brainpoolP160r1 48 Derive=BOB_cf_brainpoolP160r1 81 Derive=ALICE_cf_brainpoolP160t1 86 Derive=BOB_cf_brainpoolP160t1 121 Derive=ALICE_cf_brainpoolP192r1 126 Derive=BOB_cf_brainpoolP192r1 161 Derive=ALICE_cf_brainpoolP192t1 166 Derive=BOB_cf_brainpoolP192t1 201 Derive=ALICE_cf_brainpoolP224r1 [all …]
|
| H A D | evppkey_kas.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 48 Derive=KAS-ECC-CDH_P-192_C0 54 Derive=KAS-ECC-CDH_P-192_C0 83 Derive=KAS-ECC-CDH_P-192_C1 112 Derive=KAS-ECC-CDH_P-192_C2 141 Derive=KAS-ECC-CDH_P-192_C3 170 Derive=KAS-ECC-CDH_P-192_C4 199 Derive=KAS-ECC-CDH_P-192_C5 228 Derive=KAS-ECC-CDH_P-192_C6 257 Derive=KAS-ECC-CDH_P-192_C7 [all …]
|
| H A D | evppkey_dh.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 141 Derive=ALICE_dh2048 147 Derive=BOB_dh2048 153 Derive=BOB_dh2048 159 Derive=ALICE_dh2048 165 Derive=ALICE_dh2048
|
| H A D | evppkey_ecx.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 61 Derive=Alice-25519 68 Derive=Alice-25519 74 Derive=Bob-25519 79 Derive=Alice-25519-Raw 84 Derive=Bob-25519-Raw 145 Derive=Alice-448 152 Derive=Alice-448 158 Derive=Bob-448 163 Derive=Alice-448-Raw [all …]
|
| H A D | evppkey_ffdhe.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 83 Derive=ffdhe2048-1 87 Derive=ffdhe2048-2 91 Derive=ffdhe2048-1 99 Derive=ffdhe2048-1 110 Derive=ffdhe2048-2 193 Derive=ffdhe3072-1 197 Derive=ffdhe3072-2 293 Derive=ffdhe4096-1 297 Derive=ffdhe4096-2 [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | life_cycle-pkey.7 | 82 .IP derive 4 83 .IX Item "derive" 84 This state represents the PKEY when it is ready to derive a shared secret. 122 …| derive | | | | EVP_PKEY_verify … 178 …d digest verify verify encrypt decrypt derive encapsulate … 198 … derive derive derive derive derive derive derive … 199 …r derive 200 … derive 215 …d digest verify verify encrypt decrypt derive encapsulate … 217 …d digest verify verify encrypt decrypt derive encapsulate … [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | life_cycle-pkey.pod | 31 =item derive 33 This state represents the PKEY when it is ready to derive a shared secret. 85 …| derive | | | | EVP_PKEY_verify … 149 …d digest verify verify encrypt decrypt derive encapsulate … 169 … derive derive derive derive derive derive derive … 170 …r derive 171 … derive 186 …d digest verify verify encrypt decrypt derive encapsulate … 188 …d digest verify verify encrypt decrypt derive encapsulate … 190 …d digest verify verify encrypt decrypt derive encapsulate … [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_BytesToKey.pod | 19 the cipher to derive the key and IV for. B<md> is the message digest to use. 22 B<datal> bytes which is used to derive the keying data. B<count> is the 28 A typical application of this function is to derive keying material for an 37 otherwise a non standard extension is used to derive the extra data.
|
| /freebsd/crypto/openssl/doc/life-cycles/ |
| H A D | pkey.dot | 12 derive [fontcolor="#FEA303", color="#FEA303"] 35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"]; 36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
|
| /freebsd/crypto/krb5/src/lib/crypto/krb/ |
| H A D | enc_rc4.c | 37 /* Derive a usage key from a session key and krb5 usage constant. */ 67 /* Derive an encryption key from a usage key and (typically) checksum. */ 177 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_encrypt() 201 /* Derive the encryption key from the usage key and checksum. */ in krb5int_arcfour_encrypt() 259 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_decrypt() 264 /* Derive the encryption key from the usage key and checksum. */ in krb5int_arcfour_decrypt() 330 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_gsscrypt() 335 /* Derive the encryption key from the usage key and kd_data. */ in krb5int_arcfour_gsscrypt()
|
| H A D | enc_dk_cmac.c | 52 /* Derive encryption and integrity keys for CMAC-using enctypes. */ 64 /* Derive the encryption key. */ in derive_keys() 72 /* Derive the integrity key. */ in derive_keys() 109 /* Derive the encryption and integrity keys. */ in krb5int_dk_cmac_encrypt() 157 /* Derive the encryption and integrity keys. */ in krb5int_dk_cmac_decrypt()
|
| H A D | enc_etm.c | 53 /* Derive encryption and integrity keys for CMAC-using enctypes. */ 66 /* Derive the encryption key. */ in derive_keys() 74 /* Derive the integrity key. */ in derive_keys() 171 /* Derive the encryption and integrity keys. */ in krb5int_etm_encrypt() 232 /* Derive the encryption and integrity keys. */ in krb5int_etm_decrypt()
|
| H A D | Makefile.in | 25 derive.o \ 81 $(OUTPRE)derive.$(OBJEXT) \ 137 $(srcdir)/derive.c \
|
| /freebsd/contrib/googletest/googletest/samples/ |
| H A D | sample5_unittest.cc | 58 // other fixtures derive from, therefore there is no test case with 61 // Later, we will derive multiple test fixtures from QuickTest. 84 // We derive a fixture named IntegerFunctionTest from the QuickTest 132 // we derive another fixture from QuickTest. 185 // If necessary, you can derive further test fixtures from a derived 186 // fixture itself. For example, you can derive another fixture from
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_BytesToKey.3 | 78 the cipher to derive the key and IV for. \fBmd\fR is the message digest to use. 81 \&\fBdatal\fR bytes which is used to derive the keying data. \fBcount\fR is the 86 A typical application of this function is to derive keying material for an 95 otherwise a non standard extension is used to derive the extra data.
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | exchange.c | 87 if (exchange->derive != NULL) in evp_keyexch_from_algorithm() 89 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm() 136 * a complete set of "exchange" functions: init, derive, newctx, in evp_keyexch_from_algorithm() 248 * Try to derive the supported exch from |ctx->keymgmt|. in EVP_PKEY_derive_init_ex() 372 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex() 455 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex() 537 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive() 542 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive() 548 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
|
| /freebsd/crypto/openssl/ssl/quic/ |
| H A D | quic_record_shared.c | 138 /* Derive "quic iv" key. */ in el_setup_keyslot() 148 /* Derive "quic key" key. */ in el_setup_keyslot() 264 /* Derive "quic hp" key. */ in ossl_qrl_enc_level_set_provide_secret() 282 /* Derive "quic ku" key (the epoch 1 secret). */ in ossl_qrl_enc_level_set_provide_secret() 300 /* Derive NEXT "quic ku" key (the epoch 2 secret). */ in ossl_qrl_enc_level_set_provide_secret() 377 /* Derive NEXT "quic ku" key (the epoch n+1 secret). */ in ossl_qrl_enc_level_set_key_update() 450 /* Derive NEXT "quic ku" key (the epoch n+1 secret). */ in ossl_qrl_enc_level_set_key_cooldown_done()
|
| H A D | quic_record_util.c | 76 /* Salt used to derive Initial packet protection keys (RFC 9001 Section 5.2). */ 109 /* Derive initial secret from destination connection ID. */ in ossl_quic_provide_initial_secret() 120 /* Derive "client in" secret. */ in ossl_quic_provide_initial_secret() 133 /* Derive "server in" secret. */ in ossl_quic_provide_initial_secret()
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-pkeyutl.1 | 86 [\fB\-derive\fR] 224 .IP \fB\-derive\fR 4 225 .IX Item "-derive" 226 Derive a shared secret using own private (EC)DH key and peer key. 262 Decode an encapsulated secret, with the use of a \fB\-private\fR key, to derive the 447 The EC algorithm supports sign, verify and derive operations. The sign and 448 verify operations use ECDSA and derive uses ECDH. SHA256 is assumed by default 620 Derive a shared secret value: 623 \& openssl pkeyutl \-derive \-inkey key.pem \-peerkey pubkey.pem \-out secret 634 Derive a key using \fBscrypt\fR where the password is read from command line: [all …]
|
| /freebsd/crypto/openssl/demos/keyexch/ |
| H A D | ecdh.c | 22 * to the other peer. A peer can then derive the same shared secret using their 144 * pass the secret to a KDF to derive additional key data from the secret. in generate_secret() 156 * Derive the shared secret. In this example 32 bytes are generated. in generate_secret() 197 * derive a shared secret in main()
|
| /freebsd/sys/contrib/device-tree/Bindings/pwm/ |
| H A D | pwm-rockchip.txt | 12 - There is one clock that's used both to derive the functional clock 15 - "pwm": This is used to derive the functional clock.
|
| /freebsd/sys/contrib/device-tree/Bindings/iio/adc/ |
| H A D | palmas-gpadc.txt | 27 Values are rounded to derive 0uA, 5uA, 15uA, 20uA. 29 Values are rounded to derive 0uA, 10uA, 400uA, 800uA.
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-pkeyutl.pod.in | 29 [B<-derive>] 184 =item B<-derive> 186 Derive a shared secret using own private (EC)DH key and peer key. 226 Decode an encapsulated secret, with the use of a B<-private> key, to derive the 431 The EC algorithm supports sign, verify and derive operations. The sign and 432 verify operations use ECDSA and derive uses ECDH. SHA256 is assumed by default 607 Derive a shared secret value: 609 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret 617 Derive a key using B<scrypt> where the password is read from command line: 622 Derive using the same algorithm, but read key from environment variable MYPASS:
|