/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecc.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 46 Derive=ALICE_cf_c2pnb163v1 52 Derive=BOB_cf_c2pnb163v1 58 Derive=ALICE_cf_c2pnb163v1 65 Derive=BOB_cf_c2pnb163v1 78 Derive=BOB_cf_c2pnb163v1 86 Derive=ALICE_cf_c2pnb163v1 124 Derive=ALICE_cf_c2pnb163v2 130 Derive=BOB_cf_c2pnb163v2 136 Derive=ALICE_cf_c2pnb163v2 [all …]
|
H A D | evppkey_ecdh.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 55 Derive=ALICE_secp112r1 61 Derive=BOB_secp112r1 100 Derive=ALICE_secp112r2 107 Derive=BOB_secp112r2 145 Derive=ALICE_secp128r1 152 Derive=BOB_secp128r1 191 Derive=ALICE_secp128r2 198 Derive=BOB_secp128r2 239 Derive=ALICE_secp160k1 [all …]
|
H A D | evppkey_brainpool.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 43 Derive=ALICE_cf_brainpoolP160r1 48 Derive=BOB_cf_brainpoolP160r1 81 Derive=ALICE_cf_brainpoolP160t1 86 Derive=BOB_cf_brainpoolP160t1 121 Derive=ALICE_cf_brainpoolP192r1 126 Derive=BOB_cf_brainpoolP192r1 161 Derive=ALICE_cf_brainpoolP192t1 166 Derive=BOB_cf_brainpoolP192t1 201 Derive=ALICE_cf_brainpoolP224r1 [all …]
|
H A D | evppkey_kas.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 48 Derive=KAS-ECC-CDH_P-192_C0 54 Derive=KAS-ECC-CDH_P-192_C0 83 Derive=KAS-ECC-CDH_P-192_C1 112 Derive=KAS-ECC-CDH_P-192_C2 141 Derive=KAS-ECC-CDH_P-192_C3 170 Derive=KAS-ECC-CDH_P-192_C4 199 Derive=KAS-ECC-CDH_P-192_C5 228 Derive=KAS-ECC-CDH_P-192_C6 257 Derive=KAS-ECC-CDH_P-192_C7 [all …]
|
H A D | evppkey_ecx.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 59 Derive=Alice-25519 63 Derive=Bob-25519 67 Derive=Alice-25519-Raw 71 Derive=Bob-25519-Raw 131 Derive=Alice-448 135 Derive=Bob-448 139 Derive=Alice-448-Raw 143 Derive=Bob-448-Raw 148 Derive=Alice-448-Raw [all …]
|
H A D | evppkey_dh.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 141 Derive=ALICE_dh2048 147 Derive=BOB_dh2048 153 Derive=BOB_dh2048 159 Derive=ALICE_dh2048 165 Derive=ALICE_dh2048
|
H A D | evppkey_ffdhe.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 83 Derive=ffdhe2048-1 87 Derive=ffdhe2048-2 91 Derive=ffdhe2048-1 99 Derive=ffdhe2048-1 110 Derive=ffdhe2048-2 193 Derive=ffdhe3072-1 197 Derive=ffdhe3072-2 293 Derive=ffdhe4096-1 297 Derive=ffdhe4096-2 [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | life_cycle-pkey.7 | 158 .IP "derive" 4 159 .IX Item "derive" 160 This state represents the \s-1PKEY\s0 when it is ready to derive a shared secret. 198 …| derive | | | | EVP_PKEY_verify … 254 …d digest verify verify encrypt decrypt derive encapsulate … 274 … derive derive derive derive derive derive derive … 275 …r derive 276 … derive 291 …d digest verify verify encrypt decrypt derive encapsulate … 293 …d digest verify verify encrypt decrypt derive encapsulate … [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 31 =item derive 33 This state represents the PKEY when it is ready to derive a shared secret. 85 …| derive | | | | EVP_PKEY_verify … 149 …d digest verify verify encrypt decrypt derive encapsulate … 169 … derive derive derive derive derive derive derive … 170 …r derive 171 … derive 186 …d digest verify verify encrypt decrypt derive encapsulate … 188 …d digest verify verify encrypt decrypt derive encapsulate … 190 …d digest verify verify encrypt decrypt derive encapsulate … [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_BytesToKey.pod | 19 the cipher to derive the key and IV for. B<md> is the message digest to use. 22 B<datal> bytes which is used to derive the keying data. B<count> is the 28 A typical application of this function is to derive keying material for an 37 otherwise a non standard extension is used to derive the extra data.
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | pkey.dot | 12 derive [fontcolor="#FEA303", color="#FEA303"] 35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"]; 36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
|
/freebsd/contrib/googletest/googletest/samples/ |
H A D | sample5_unittest.cc | 58 // other fixtures derive from, therefore there is no test case with 61 // Later, we will derive multiple test fixtures from QuickTest. 84 // We derive a fixture named IntegerFunctionTest from the QuickTest 132 // we derive another fixture from QuickTest. 185 // If necessary, you can derive further test fixtures from a derived 186 // fixture itself. For example, you can derive another fixture from
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-pkeyutl.1 | 163 [\fB\-derive\fR] 258 .IP "\fB\-derive\fR" 4 259 .IX Item "-derive" 260 Derive a shared secret using the peer key. 401 The \s-1EC\s0 algorithm supports sign, verify and derive operations. The sign and 402 verify operations use \s-1ECDSA\s0 and derive uses \s-1ECDH. SHA1\s0 is assumed by default for 461 Derive a shared secret value: 464 \& openssl pkeyutl \-derive \-inkey key.pem \-peerkey pubkey.pem \-out secret 475 Derive a key using \fBscrypt\fR where the password is read from command line: 482 Derive using the same algorithm, but read key from environment variable \s-1MYPASS:\s0
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | exchange.c | 81 if (exchange->derive != NULL) in evp_keyexch_from_algorithm() 83 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm() 130 * a complete set of "exchange" functions: init, derive, newctx, in evp_keyexch_from_algorithm() 242 * Try to derive the supported exch from |ctx->keymgmt|. in EVP_PKEY_derive_init_ex() 362 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex() 440 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex() 522 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive() 527 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive() 533 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
|
H A D | kdf_meth.c | 103 if (kdf->derive != NULL) in evp_kdf_from_algorithm() 105 kdf->derive = OSSL_FUNC_kdf_derive(fns); in evp_kdf_from_algorithm() 146 * a derive function, and a complete set of context management in evp_kdf_from_algorithm()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 30 [B<-derive>] 144 =item B<-derive> 146 Derive a shared secret using the peer key. 307 The EC algorithm supports sign, verify and derive operations. The sign and 308 verify operations use ECDSA and derive uses ECDH. SHA1 is assumed by default for 369 Derive a shared secret value: 371 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret 379 Derive a key using B<scrypt> where the password is read from command line: 384 Derive using the same algorithm, but read key from environment variable MYPASS:
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_BytesToKey.3 | 154 the cipher to derive the key and \s-1IV\s0 for. \fBmd\fR is the message digest to use. 157 \&\fBdatal\fR bytes which is used to derive the keying data. \fBcount\fR is the 162 A typical application of this function is to derive keying material for an 171 otherwise a non standard extension is used to derive the extra data.
|
/freebsd/sys/contrib/device-tree/Bindings/pwm/ |
H A D | pwm-rockchip.txt | 12 - There is one clock that's used both to derive the functional clock 15 - "pwm": This is used to derive the functional clock.
|
H A D | pwm-rockchip.yaml | 73 - description: Used to derive the functional clock for the device. 90 Used both to derive the functional clock
|
/freebsd/sys/contrib/device-tree/Bindings/iio/adc/ |
H A D | palmas-gpadc.txt | 27 Values are rounded to derive 0uA, 5uA, 15uA, 20uA. 29 Values are rounded to derive 0uA, 10uA, 400uA, 800uA.
|
/freebsd/sys/contrib/device-tree/Bindings/sound/ |
H A D | fsl,esai.txt | 31 derive HCK, SCK and FS. 33 derive HCK, SCK and FS.
|
/freebsd/contrib/wpa/src/pasn/ |
H A D | pasn_responder.c | 103 /* Process the commit message and derive the PMK */ in pasn_wd_handle_sae_commit() 278 "PASN: SAE: Cannot derive wrapped data"); in pasn_get_wrapped_data() 340 /* TODO: Derive PMK based on wrapped data */ in pasn_derive_keys() 354 wpa_printf(MSG_DEBUG, "PASN: Failed to derive PTK"); in pasn_derive_keys() 363 "PASN: Failed to derive LTF keyseed"); in pasn_derive_keys() 473 /* No need to derive PMK if PMKSA is given */ in handle_auth_pasn_resp() 752 wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); in handle_auth_pasn_1() 881 wpa_printf(MSG_DEBUG, "PASN: Failed to derive keys"); in handle_auth_pasn_1()
|
/freebsd/share/man/man4/ |
H A D | liquidio.4 | 93 Use 0 to derive autoconfigures based on the number of 99 Use 0 to derive autoconfigures based on the number of
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | sha256-prf.c | 27 * This function is used to derive new, cryptographically separate keys from a 49 * This function is used to derive new, cryptographically separate keys from a
|
H A D | sha384-prf.c | 27 * This function is used to derive new, cryptographically separate keys from a 49 * This function is used to derive new, cryptographically separate keys from a
|