Home
last modified time | relevance | path

Searched full:exchange (Results 1 – 25 of 747) sorted by relevance

12345678910>>...30

/freebsd/crypto/openssl/crypto/evp/
H A Dexchange.c23 EVP_KEYEXCH *exchange = OPENSSL_zalloc(sizeof(EVP_KEYEXCH)); in evp_keyexch_new() local
25 if (exchange == NULL) { in evp_keyexch_new()
30 exchange->lock = CRYPTO_THREAD_lock_new(); in evp_keyexch_new()
31 if (exchange->lock == NULL) { in evp_keyexch_new()
33 OPENSSL_free(exchange); in evp_keyexch_new()
36 exchange->prov = prov; in evp_keyexch_new()
38 exchange->refcnt = 1; in evp_keyexch_new()
40 return exchange; in evp_keyexch_new()
48 EVP_KEYEXCH *exchange = NULL; in evp_keyexch_from_algorithm() local
51 if ((exchange = evp_keyexch_new(prov)) == NULL) { in evp_keyexch_from_algorithm()
[all …]
H A Dpmeth_lib.c387 if (ctx->op.kex.algctx != NULL && ctx->op.kex.exchange != NULL) in evp_pkey_ctx_free_old_ops()
388 ctx->op.kex.exchange->freectx(ctx->op.kex.algctx); in evp_pkey_ctx_free_old_ops()
389 EVP_KEYEXCH_free(ctx->op.kex.exchange); in evp_pkey_ctx_free_old_ops()
391 ctx->op.kex.exchange = NULL; in evp_pkey_ctx_free_old_ops()
505 if (pctx->op.kex.exchange != NULL) { in EVP_PKEY_CTX_dup()
506 rctx->op.kex.exchange = pctx->op.kex.exchange; in EVP_PKEY_CTX_dup()
507 if (!EVP_KEYEXCH_up_ref(rctx->op.kex.exchange)) in EVP_PKEY_CTX_dup()
511 if (!ossl_assert(pctx->op.kex.exchange != NULL)) in EVP_PKEY_CTX_dup()
514 if (pctx->op.kex.exchange->dupctx != NULL) in EVP_PKEY_CTX_dup()
516 = pctx->op.kex.exchange->dupctx(pctx->op.kex.algctx); in EVP_PKEY_CTX_dup()
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-keyexch.pod32 /* Key Exchange parameters */
45 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
46 exchange algorithms and make them available to applications via
82 A key exchange algorithm implementation may not implement all of these functions.
87 A key exchange algorithm must also implement some mechanism for generating,
94 structure for holding context information during a key exchange operation.
96 exchange operation function calls.
100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange
104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in
109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key
[all …]
H A DEVP_KEYEXCH-ECDH.pod5 EVP_KEYEXCH-ECDH - ECDH Key Exchange algorithm support
9 Key exchange support for the B<ECDH> key type.
11 =head2 ECDH Key Exchange parameters
17 Sets or gets the ECDH mode of operation for the associated key exchange ctx.
19 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter
21 Diffie-Hellman (CDH) variants of the key exchange algorithm.
25 given key exchange ctx.
36 See L<provider-keyexch(7)/Common Key Exchange parameters>.
40 See L<provider-keyexch(7)/Common Key Exchange parameters>.
44 See L<provider-keyexch(7)/Common Key Exchange parameters>.
[all …]
H A DEVP_KEYEXCH-DH.pod6 - DH Key Exchange algorithm support
10 Key exchange support for the B<DH> and B<DHX> key types.
12 Please note that although both key types support the same key exchange
13 operations, they cannot be used together in a single key exchange. It
14 is not possible to use a private key of the B<DH> type in key exchange
17 =head2 DH and DHX key exchange parameters
23 Sets the padding mode for the associated key exchange ctx.
36 See L<provider-keyexch(7)/Common Key Exchange parameters>.
40 See L<provider-keyexch(7)/Common Key Exchange parameters>.
44 See L<provider-keyexch(7)/Common Key Exchange parameters>.
[all …]
H A DEVP_KEYEXCH-X25519.pod7 - X25519 and X448 Key Exchange algorithm support
11 Key exchange support for the B<X25519> and B<X448> key types.
13 =head2 Key exchange parameters
19 See L<provider-keyexch(7)/Common Key Exchange parameters>.
/freebsd/secure/lib/libcrypto/man/man7/
H A Dprovider-keyexch.7165 \& /* Key Exchange parameters */
178 The key exchange (\s-1OSSL_OP_KEYEXCH\s0) operation enables providers to implement key
179 exchange algorithms and make them available to applications via
219 A key exchange algorithm implementation may not implement all of these functions.
224 A key exchange algorithm must also implement some mechanism for generating,
230 structure for holding context information during a key exchange operation.
232 exchange operation function calls.
236 \&\fBOSSL_FUNC_keyexch_freectx()\fR is passed a pointer to the provider side key exchange
240 \&\fBOSSL_FUNC_keyexch_dupctx()\fR should duplicate the provider side key exchange context in
244 \&\fBOSSL_FUNC_keyexch_init()\fR initialises a key exchange operation given a provider side key
[all …]
H A DEVP_KEYEXCH-ECDH.7140 EVP_KEYEXCH\-ECDH \- ECDH Key Exchange algorithm support
143 Key exchange support for the \fB\s-1ECDH\s0\fR key type.
144 .SS "\s-1ECDH\s0 Key Exchange parameters"
145 .IX Subsection "ECDH Key Exchange parameters"
149 Sets or gets the \s-1ECDH\s0 mode of operation for the associated key exchange ctx.
151 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter
153 Diffie-Hellman (\s-1CDH\s0) variants of the key exchange algorithm.
157 given key exchange ctx.
168 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
172 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
[all …]
H A DEVP_KEYEXCH-DH.7141 \&\- DH Key Exchange algorithm support
144 Key exchange support for the \fB\s-1DH\s0\fR key type.
145 .SS "\s-1DH\s0 key exchange parameters"
146 .IX Subsection "DH key exchange parameters"
150 Sets the padding mode for the associated key exchange ctx.
163 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
167 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
171 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
175 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
179 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
H A DEVP_KEYEXCH-X25519.7142 \&\- X25519 and X448 Key Exchange algorithm support
145 Key exchange support for the \fBX25519\fR and \fBX448\fR key types.
146 .SS "Key exchange parameters"
147 .IX Subsection "Key exchange parameters"
151 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
/freebsd/crypto/openssl/doc/man3/
H A DEVP_KEYEXCH_free.pod17 void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange);
18 int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange);
19 OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange);
20 int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name);
21 const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange);
23 void (*fn)(EVP_KEYEXCH *exchange, void *arg),
25 int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange,
34 EVP_KEYEXCH_fetch() fetches the key exchange implementation for the given
49 EVP_KEYEXCH_get0_provider() returns the provider that I<exchange> was
52 EVP_KEYEXCH_is_a() checks if I<exchange> is an implementation of an
[all …]
H A DEVP_PKEY_set1_encoded_public_key.pod31 currently only works for those that support key exchange. Parameters are not
72 performing a key exchange operation.
74 =head2 Set up a peer's EVP_PKEY ready for a key exchange operation
78 int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len)
89 /* Do the key exchange here */
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_KEYEXCH_free.3152 \& void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange);
153 \& int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange);
154 \& OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange);
155 \& int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name);
156 \& const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange);
158 \& void (*fn)(EVP_KEYEXCH *exchange, void *arg),
160 \& int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange,
169 \&\fBEVP_KEYEXCH_fetch()\fR fetches the key exchange implementation for the given
184 \&\fBEVP_KEYEXCH_get0_provider()\fR returns the provider that \fIexchange\fR was
187 \&\fBEVP_KEYEXCH_is_a()\fR checks if \fIexchange\fR is an implementation of an
[all …]
H A DEVP_PKEY_set1_encoded_public_key.3168 currently only works for those that support key exchange. Parameters are not
206 performing a key exchange operation.
207 .SS "Set up a peer's \s-1EVP_PKEY\s0 ready for a key exchange operation"
208 .IX Subsection "Set up a peer's EVP_PKEY ready for a key exchange operation"
212 \& int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len)
223 \& /* Do the key exchange here */
/freebsd/contrib/bearssl/tools/
H A Dnames.c161 "ECDH key exchange (EC cert), AES-128/GCM (TLS 1.2+)"
167 "ECDH key exchange (RSA cert), AES-128/GCM (TLS 1.2+)"
173 "ECDH key exchange (EC cert), AES-256/GCM (TLS 1.2+)"
179 "ECDH key exchange (RSA cert), AES-256/GCM (TLS 1.2+)"
185 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)"
191 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)"
197 "ECDH key exchange (EC cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)"
203 "ECDH key exchange (RSA cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)"
209 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-1"
215 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-1"
[all …]
/freebsd/crypto/openssl/demos/keyexch/
H A Dx25519.c16 * This is a demonstration of key exchange using X25519.
60 * Prepare for X25519 key exchange. The public key to be sent to the remote peer
113 * Complete X25519 key exchange. remote_peer_pubk_data should be the 32 byte
138 /* Create key exchange context. */ in keyexch_x25519_after()
223 * Each peer uses the other peer's public key to perform key exchange. in keyexch_x25519()
237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519()
267 /* Test X25519 key exchange with known result. */ in main()
268 printf("Key exchange using known answer (deterministic):\n"); in main()
272 /* Test X25519 key exchange with random keys. */ in main()
273 printf("Key exchange using random keys:\n"); in main()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/renameat2/
H A Drenameat2_exchange.ksh44 # Self-exchange is a no-op.
48 # Basic exchange.
53 # And exchange back.
58 # Exchange with a bad path should fail.
/freebsd/crypto/openssh/
H A DPROTOCOL.agent10 exchange (as per RFC4253 section 7.2) and the host key used for that
11 exchange. This binding is verifiable at the agent by including the
24 identifier' is the exchange hash derived from the initial key
25 exchange, 'signature' is the server's signature of the session
28 exchange. 'is_forwarding' is a flag indicating whether this connection
H A Dmoduli.527 in the Diffie-Hellman Group Exchange key exchange method.
107 When performing Diffie-Hellman Group Exchange,
125 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
/freebsd/contrib/libcxxrt/
H A Datomic.h78 * Atomically exchange with the specified memory order.
80 T exchange(T v, memory_order order = memory_order::seqcst)
82 return ATOMIC_BUILTIN(exchange)(&val, v, order);
86 * Atomically exchange with the specified memory order.
/freebsd/contrib/llvm-project/clang/lib/Interpreter/
H A DValue.cpp177 Interp = std::exchange(RHS.Interp, nullptr); in Value()
178 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in Value()
180 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in Value()
181 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in Value()
208 Interp = std::exchange(RHS.Interp, nullptr); in operator =()
209 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in operator =()
210 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in operator =()
211 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in operator =()
/freebsd/share/man/man5/
H A Dmoduli.528 in the Diffie-Hellman Group Exchange key exchange method.
108 When performing Diffie-Hellman Group Exchange,
121 .%T "Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol"
/freebsd/contrib/llvm-project/libcxx/include/__stop_token/
H A Datomic_unique_lock.h118 __current_state, // if __state_ has the same value of __current_state, lock bit must be zero before exchange and in __lock_impl()
119 // we are good to lock/exchange and return. If _state has a different value, because other in __lock_impl()
120 // threads locked it between the `break` statement above and this statement, exchange will fail in __lock_impl()
125 __locked_ordering, // sucessful exchange order. Usually it should be std::memory_order_acquire. in __lock_impl()
127 std::memory_order_relaxed // fail to exchange order. We don't need any ordering as we are going back to the in __lock_impl()
/freebsd/sys/contrib/device-tree/Bindings/fpga/
H A Dxilinx-pr-decoupler.txt10 Xilinx LogiCORE Dynamic Function eXchange(DFX) AXI shutdown manager
13 The Dynamic Function eXchange AXI shutdown manager prevents AXI traffic
46 Dynamic Function eXchange AXI shutdown manager:
/freebsd/contrib/tcsh/nls/russian/
H A Dset331 29 Exchange the cursor and mark
38 36 Exchange the two characters before the cursor
70 68 Exchange the character to the left of the cursor with the one under
71 69 Exchange the two characters before the cursor

12345678910>>...30