Home
last modified time | relevance | path

Searched full:derive (Results 1 – 25 of 616) sorted by relevance

12345678910>>...25

/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecc.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
46 Derive=ALICE_cf_c2pnb163v1
52 Derive=BOB_cf_c2pnb163v1
58 Derive=ALICE_cf_c2pnb163v1
65 Derive=BOB_cf_c2pnb163v1
78 Derive=BOB_cf_c2pnb163v1
86 Derive=ALICE_cf_c2pnb163v1
124 Derive=ALICE_cf_c2pnb163v2
130 Derive=BOB_cf_c2pnb163v2
136 Derive=ALICE_cf_c2pnb163v2
[all …]
H A Devppkey_ecdh.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
55 Derive=ALICE_secp112r1
61 Derive=BOB_secp112r1
100 Derive=ALICE_secp112r2
107 Derive=BOB_secp112r2
145 Derive=ALICE_secp128r1
152 Derive=BOB_secp128r1
191 Derive=ALICE_secp128r2
198 Derive=BOB_secp128r2
239 Derive=ALICE_secp160k1
[all …]
H A Devppkey_brainpool.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
43 Derive=ALICE_cf_brainpoolP160r1
48 Derive=BOB_cf_brainpoolP160r1
81 Derive=ALICE_cf_brainpoolP160t1
86 Derive=BOB_cf_brainpoolP160t1
121 Derive=ALICE_cf_brainpoolP192r1
126 Derive=BOB_cf_brainpoolP192r1
161 Derive=ALICE_cf_brainpoolP192t1
166 Derive=BOB_cf_brainpoolP192t1
201 Derive=ALICE_cf_brainpoolP224r1
[all …]
H A Devppkey_kas.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
48 Derive=KAS-ECC-CDH_P-192_C0
54 Derive=KAS-ECC-CDH_P-192_C0
83 Derive=KAS-ECC-CDH_P-192_C1
112 Derive=KAS-ECC-CDH_P-192_C2
141 Derive=KAS-ECC-CDH_P-192_C3
170 Derive=KAS-ECC-CDH_P-192_C4
199 Derive=KAS-ECC-CDH_P-192_C5
228 Derive=KAS-ECC-CDH_P-192_C6
257 Derive=KAS-ECC-CDH_P-192_C7
[all …]
H A Devppkey_dh.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
141 Derive=ALICE_dh2048
147 Derive=BOB_dh2048
153 Derive=BOB_dh2048
159 Derive=ALICE_dh2048
165 Derive=ALICE_dh2048
H A Devppkey_ecx.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
61 Derive=Alice-25519
68 Derive=Alice-25519
74 Derive=Bob-25519
79 Derive=Alice-25519-Raw
84 Derive=Bob-25519-Raw
145 Derive=Alice-448
152 Derive=Alice-448
158 Derive=Bob-448
163 Derive=Alice-448-Raw
[all …]
H A Devppkey_ffdhe.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
83 Derive=ffdhe2048-1
87 Derive=ffdhe2048-2
91 Derive=ffdhe2048-1
99 Derive=ffdhe2048-1
110 Derive=ffdhe2048-2
193 Derive=ffdhe3072-1
197 Derive=ffdhe3072-2
293 Derive=ffdhe4096-1
297 Derive=ffdhe4096-2
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dlife_cycle-pkey.782 .IP derive 4
83 .IX Item "derive"
84 This state represents the PKEY when it is ready to derive a shared secret.
122 …| derive | | | | EVP_PKEY_verify …
178 …d digest verify verify encrypt decrypt derive encapsulate …
198derive derive derive derive derive derive derive
199 …r derive
200derive
215 …d digest verify verify encrypt decrypt derive encapsulate …
217 …d digest verify verify encrypt decrypt derive encapsulate …
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dlife_cycle-pkey.pod31 =item derive
33 This state represents the PKEY when it is ready to derive a shared secret.
85 …| derive | | | | EVP_PKEY_verify …
149 …d digest verify verify encrypt decrypt derive encapsulate …
169derive derive derive derive derive derive derive
170 …r derive
171derive
186 …d digest verify verify encrypt decrypt derive encapsulate …
188 …d digest verify verify encrypt decrypt derive encapsulate …
190 …d digest verify verify encrypt decrypt derive encapsulate …
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_BytesToKey.pod19 the cipher to derive the key and IV for. B<md> is the message digest to use.
22 B<datal> bytes which is used to derive the keying data. B<count> is the
28 A typical application of this function is to derive keying material for an
37 otherwise a non standard extension is used to derive the extra data.
/freebsd/crypto/openssl/doc/life-cycles/
H A Dpkey.dot12 derive [fontcolor="#FEA303", color="#FEA303"]
35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"];
36derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
/freebsd/crypto/krb5/src/lib/crypto/krb/
H A Denc_rc4.c37 /* Derive a usage key from a session key and krb5 usage constant. */
67 /* Derive an encryption key from a usage key and (typically) checksum. */
177 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_encrypt()
201 /* Derive the encryption key from the usage key and checksum. */ in krb5int_arcfour_encrypt()
259 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_decrypt()
264 /* Derive the encryption key from the usage key and checksum. */ in krb5int_arcfour_decrypt()
330 /* Derive a usage key from the session key and usage. */ in krb5int_arcfour_gsscrypt()
335 /* Derive the encryption key from the usage key and kd_data. */ in krb5int_arcfour_gsscrypt()
H A Denc_dk_cmac.c52 /* Derive encryption and integrity keys for CMAC-using enctypes. */
64 /* Derive the encryption key. */ in derive_keys()
72 /* Derive the integrity key. */ in derive_keys()
109 /* Derive the encryption and integrity keys. */ in krb5int_dk_cmac_encrypt()
157 /* Derive the encryption and integrity keys. */ in krb5int_dk_cmac_decrypt()
H A Denc_etm.c53 /* Derive encryption and integrity keys for CMAC-using enctypes. */
66 /* Derive the encryption key. */ in derive_keys()
74 /* Derive the integrity key. */ in derive_keys()
171 /* Derive the encryption and integrity keys. */ in krb5int_etm_encrypt()
232 /* Derive the encryption and integrity keys. */ in krb5int_etm_decrypt()
H A DMakefile.in25 derive.o \
81 $(OUTPRE)derive.$(OBJEXT) \
137 $(srcdir)/derive.c \
/freebsd/contrib/googletest/googletest/samples/
H A Dsample5_unittest.cc58 // other fixtures derive from, therefore there is no test case with
61 // Later, we will derive multiple test fixtures from QuickTest.
84 // We derive a fixture named IntegerFunctionTest from the QuickTest
132 // we derive another fixture from QuickTest.
185 // If necessary, you can derive further test fixtures from a derived
186 // fixture itself. For example, you can derive another fixture from
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_BytesToKey.378 the cipher to derive the key and IV for. \fBmd\fR is the message digest to use.
81 \&\fBdatal\fR bytes which is used to derive the keying data. \fBcount\fR is the
86 A typical application of this function is to derive keying material for an
95 otherwise a non standard extension is used to derive the extra data.
/freebsd/crypto/openssl/crypto/evp/
H A Dexchange.c87 if (exchange->derive != NULL) in evp_keyexch_from_algorithm()
89 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm()
136 * a complete set of "exchange" functions: init, derive, newctx, in evp_keyexch_from_algorithm()
248 * Try to derive the supported exch from |ctx->keymgmt|. in EVP_PKEY_derive_init_ex()
372 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex()
455 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex()
537 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive()
542 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive()
548 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
/freebsd/crypto/openssl/ssl/quic/
H A Dquic_record_shared.c138 /* Derive "quic iv" key. */ in el_setup_keyslot()
148 /* Derive "quic key" key. */ in el_setup_keyslot()
264 /* Derive "quic hp" key. */ in ossl_qrl_enc_level_set_provide_secret()
282 /* Derive "quic ku" key (the epoch 1 secret). */ in ossl_qrl_enc_level_set_provide_secret()
300 /* Derive NEXT "quic ku" key (the epoch 2 secret). */ in ossl_qrl_enc_level_set_provide_secret()
377 /* Derive NEXT "quic ku" key (the epoch n+1 secret). */ in ossl_qrl_enc_level_set_key_update()
450 /* Derive NEXT "quic ku" key (the epoch n+1 secret). */ in ossl_qrl_enc_level_set_key_cooldown_done()
H A Dquic_record_util.c76 /* Salt used to derive Initial packet protection keys (RFC 9001 Section 5.2). */
109 /* Derive initial secret from destination connection ID. */ in ossl_quic_provide_initial_secret()
120 /* Derive "client in" secret. */ in ossl_quic_provide_initial_secret()
133 /* Derive "server in" secret. */ in ossl_quic_provide_initial_secret()
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-pkeyutl.186 [\fB\-derive\fR]
224 .IP \fB\-derive\fR 4
225 .IX Item "-derive"
226 Derive a shared secret using own private (EC)DH key and peer key.
262 Decode an encapsulated secret, with the use of a \fB\-private\fR key, to derive the
447 The EC algorithm supports sign, verify and derive operations. The sign and
448 verify operations use ECDSA and derive uses ECDH. SHA256 is assumed by default
620 Derive a shared secret value:
623 \& openssl pkeyutl \-derive \-inkey key.pem \-peerkey pubkey.pem \-out secret
634 Derive a key using \fBscrypt\fR where the password is read from command line:
[all …]
/freebsd/crypto/openssl/demos/keyexch/
H A Decdh.c22 * to the other peer. A peer can then derive the same shared secret using their
144 * pass the secret to a KDF to derive additional key data from the secret. in generate_secret()
156 * Derive the shared secret. In this example 32 bytes are generated. in generate_secret()
197 * derive a shared secret in main()
/freebsd/sys/contrib/device-tree/Bindings/pwm/
H A Dpwm-rockchip.txt12 - There is one clock that's used both to derive the functional clock
15 - "pwm": This is used to derive the functional clock.
/freebsd/sys/contrib/device-tree/Bindings/iio/adc/
H A Dpalmas-gpadc.txt27 Values are rounded to derive 0uA, 5uA, 15uA, 20uA.
29 Values are rounded to derive 0uA, 10uA, 400uA, 800uA.
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in29 [B<-derive>]
184 =item B<-derive>
186 Derive a shared secret using own private (EC)DH key and peer key.
226 Decode an encapsulated secret, with the use of a B<-private> key, to derive the
431 The EC algorithm supports sign, verify and derive operations. The sign and
432 verify operations use ECDSA and derive uses ECDH. SHA256 is assumed by default
607 Derive a shared secret value:
609 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
617 Derive a key using B<scrypt> where the password is read from command line:
622 Derive using the same algorithm, but read key from environment variable MYPASS:

12345678910>>...25