Home
last modified time | relevance | path

Searched full:exchange (Results 1 – 25 of 814) sorted by relevance

12345678910>>...33

/freebsd/crypto/openssl/crypto/evp/
H A Dexchange.c33 EVP_KEYEXCH *exchange = OPENSSL_zalloc(sizeof(EVP_KEYEXCH)); in evp_keyexch_new() local
35 if (exchange == NULL) in evp_keyexch_new()
38 if (!CRYPTO_NEW_REF(&exchange->refcnt, 1) in evp_keyexch_new()
40 CRYPTO_FREE_REF(&exchange->refcnt); in evp_keyexch_new()
41 OPENSSL_free(exchange); in evp_keyexch_new()
44 exchange->prov = prov; in evp_keyexch_new()
46 return exchange; in evp_keyexch_new()
54 EVP_KEYEXCH *exchange = NULL; in evp_keyexch_from_algorithm() local
57 if ((exchange = evp_keyexch_new(prov)) == NULL) { in evp_keyexch_from_algorithm()
62 exchange->name_id = name_id; in evp_keyexch_from_algorithm()
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A Dprovider-keyexch.789 \& /* Key Exchange parameters */
102 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
103 exchange algorithms and make them available to applications via
143 A key exchange algorithm implementation may not implement all of these functions.
148 A key exchange algorithm must also implement some mechanism for generating,
154 structure for holding context information during a key exchange operation.
156 exchange operation function calls.
160 \&\fBOSSL_FUNC_keyexch_freectx()\fR is passed a pointer to the provider side key exchange
164 \&\fBOSSL_FUNC_keyexch_dupctx()\fR should duplicate the provider side key exchange context in
168 \&\fBOSSL_FUNC_keyexch_init()\fR initialises a key exchange operation given a provider side key
[all …]
H A DEVP_KEYEXCH-DH.765 \&\- DH Key Exchange algorithm support
68 Key exchange support for the \fBDH\fR and \fBDHX\fR key types.
70 Please note that although both key types support the same key exchange
71 operations, they cannot be used together in a single key exchange. It
72 is not possible to use a private key of the \fBDH\fR type in key exchange
74 .SS "DH and DHX key exchange parameters"
75 .IX Subsection "DH and DHX key exchange parameters"
78 Sets the padding mode for the associated key exchange ctx.
106 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
H A DEVP_KEYEXCH-ECDH.764 EVP_KEYEXCH\-ECDH \- ECDH Key Exchange algorithm support
67 Key exchange support for the \fBECDH\fR key type.
68 .SS "ECDH Key Exchange parameters"
69 .IX Subsection "ECDH Key Exchange parameters"
72 Sets or gets the ECDH mode of operation for the associated key exchange ctx.
74 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter
76 Diffie-Hellman (CDH) variants of the key exchange algorithm.
80 given key exchange ctx.
110 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
H A DEVP_KEYEXCH-X25519.766 \&\- X25519 and X448 Key Exchange algorithm support
69 Key exchange support for the \fBX25519\fR and \fBX448\fR key types.
70 .SS "Key exchange parameters"
71 .IX Subsection "Key exchange parameters"
81 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
/freebsd/crypto/openssl/doc/man7/
H A Dprovider-keyexch.pod32 /* Key Exchange parameters */
45 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key
46 exchange algorithms and make them available to applications via
82 A key exchange algorithm implementation may not implement all of these functions.
87 A key exchange algorithm must also implement some mechanism for generating,
94 structure for holding context information during a key exchange operation.
96 exchange operation function calls.
100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange
104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in
109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key
[all …]
H A DEVP_KEYEXCH-ECDH.pod5 EVP_KEYEXCH-ECDH - ECDH Key Exchange algorithm support
9 Key exchange support for the B<ECDH> key type.
11 =head2 ECDH Key Exchange parameters
17 Sets or gets the ECDH mode of operation for the associated key exchange ctx.
19 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter
21 Diffie-Hellman (CDH) variants of the key exchange algorithm.
25 given key exchange ctx.
56 See L<provider-keyexch(7)/Common Key Exchange parameters>.
H A DEVP_KEYEXCH-DH.pod6 - DH Key Exchange algorithm support
10 Key exchange support for the B<DH> and B<DHX> key types.
12 Please note that although both key types support the same key exchange
13 operations, they cannot be used together in a single key exchange. It
14 is not possible to use a private key of the B<DH> type in key exchange
17 =head2 DH and DHX key exchange parameters
23 Sets the padding mode for the associated key exchange ctx.
50 See L<provider-keyexch(7)/Common Key Exchange parameters>.
H A DEVP_KEYEXCH-X25519.pod7 - X25519 and X448 Key Exchange algorithm support
11 Key exchange support for the B<X25519> and B<X448> key types.
13 =head2 Key exchange parameters
24 See L<provider-keyexch(7)/Common Key Exchange parameters>.
/freebsd/crypto/openssl/doc/man3/
H A DEVP_KEYEXCH_free.pod17 void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange);
18 int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange);
19 OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange);
20 int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name);
21 const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange);
23 void (*fn)(EVP_KEYEXCH *exchange, void *arg),
25 int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange,
34 EVP_KEYEXCH_fetch() fetches the key exchange implementation for the given
49 EVP_KEYEXCH_get0_provider() returns the provider that I<exchange> was
52 EVP_KEYEXCH_is_a() checks if I<exchange> is an implementation of an
[all …]
H A DEVP_PKEY_set1_encoded_public_key.pod33 support key exchange or key encapsulation.
78 performing a key exchange operation.
80 =head2 Set up a peer's EVP_PKEY ready for a key exchange operation
84 int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len)
95 /* Do the key exchange here */
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_KEYEXCH_free.376 \& void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange);
77 \& int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange);
78 \& OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange);
79 \& int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name);
80 \& const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange);
82 \& void (*fn)(EVP_KEYEXCH *exchange, void *arg),
84 \& int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange,
93 \&\fBEVP_KEYEXCH_fetch()\fR fetches the key exchange implementation for the given
108 \&\fBEVP_KEYEXCH_get0_provider()\fR returns the provider that \fIexchange\fR was
111 \&\fBEVP_KEYEXCH_is_a()\fR checks if \fIexchange\fR is an implementation of an
[all …]
H A DEVP_PKEY_set1_encoded_public_key.394 support key exchange or key encapsulation.
136 performing a key exchange operation.
137 .SS "Set up a peer's EVP_PKEY ready for a key exchange operation"
138 .IX Subsection "Set up a peer's EVP_PKEY ready for a key exchange operation"
142 \& int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len)
153 \& /* Do the key exchange here */
H A DSSL_CIPHER_get_name.3134 \&\fBSSL_CIPHER_get_kx_nid()\fR returns the key exchange NID corresponding to the method
135 used by \fBc\fR. If there is no key exchange, then \fBNID_undef\fR is returned.
136 If any appropriate key exchange algorithm can be used (as in the case of TLS 1.3
190 .IP "Kx=<key exchange>" 4
191 .IX Item "Kx=<key exchange>"
192 Key exchange method such as \fBRSA\fR, \fBECDHE\fR, etc.
/freebsd/contrib/bearssl/tools/
H A Dnames.c161 "ECDH key exchange (EC cert), AES-128/GCM (TLS 1.2+)"
167 "ECDH key exchange (RSA cert), AES-128/GCM (TLS 1.2+)"
173 "ECDH key exchange (EC cert), AES-256/GCM (TLS 1.2+)"
179 "ECDH key exchange (RSA cert), AES-256/GCM (TLS 1.2+)"
185 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)"
191 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)"
197 "ECDH key exchange (EC cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)"
203 "ECDH key exchange (RSA cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)"
209 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-1"
215 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-1"
[all …]
/freebsd/crypto/openssl/demos/keyexch/
H A Dx25519.c16 * This is a demonstration of key exchange using X25519.
60 * Prepare for X25519 key exchange. The public key to be sent to the remote peer
113 * Complete X25519 key exchange. remote_peer_pubk_data should be the 32 byte
138 /* Create key exchange context. */ in keyexch_x25519_after()
223 * Each peer uses the other peer's public key to perform key exchange. in keyexch_x25519()
237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519()
267 /* Test X25519 key exchange with known result. */ in main()
268 printf("Key exchange using known answer (deterministic):\n"); in main()
272 /* Test X25519 key exchange with random keys. */ in main()
273 printf("Key exchange using random keys:\n"); in main()
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/renameat2/
H A Drenameat2_exchange.ksh45 # Self-exchange is a no-op.
49 # Basic exchange.
54 # And exchange back.
59 # Exchange with a bad path should fail.
/freebsd/crypto/openssh/
H A DPROTOCOL.agent10 exchange (as per RFC4253 section 7.2) and the host key used for that
11 exchange. This binding is verifiable at the agent by including the
24 identifier' is the exchange hash derived from the initial key
25 exchange, 'signature' is the server's signature of the session
28 exchange. 'is_forwarding' is a flag indicating whether this connection
H A Dmoduli.527 in the Diffie-Hellman Group Exchange key exchange method.
107 When performing Diffie-Hellman Group Exchange,
125 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
/freebsd/contrib/libcxxrt/
H A Datomic.h78 * Atomically exchange with the specified memory order.
80 T exchange(T v, memory_order order = memory_order::seqcst)
82 return ATOMIC_BUILTIN(exchange)(&val, v, order);
86 * Atomically exchange with the specified memory order.
/freebsd/contrib/llvm-project/clang/lib/Interpreter/
H A DValue.cpp177 Interp = std::exchange(RHS.Interp, nullptr); in Value()
178 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in Value()
180 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in Value()
181 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in Value()
208 Interp = std::exchange(RHS.Interp, nullptr); in operator =()
209 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in operator =()
210 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in operator =()
211 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in operator =()
/freebsd/crypto/krb5/src/include/krb5/
H A Daudit_plugin.h145 * Log AS exchange event.
153 * and port, and stage of the AS exchange
167 * Log TGS exchange event.
175 * ID, client address and port, and stage of the TGS exchange
196 * and port, and stage of the TGS exchange
219 * port, and stage of the TGS exchange
242 * port, and stage of the TGS exchange,
/freebsd/share/man/man5/
H A Dmoduli.528 in the Diffie-Hellman Group Exchange key exchange method.
108 When performing Diffie-Hellman Group Exchange,
121 .%T "Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol"
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-list.187 [\fB\-key\-exchange\-algorithms\fR]
145 .IP "Key exchange algorithms (KEX)" 4
146 .IX Item "Key exchange algorithms (KEX)"
219 The options \fBkey-exchange-algorithms\fR, \fBkem-algorithms\fR,
230 .IP \fB\-key\-exchange\-algorithms\fR 4
231 .IX Item "-key-exchange-algorithms"
232 Display a list of key exchange algorithms.
/freebsd/contrib/llvm-project/libcxx/include/__stop_token/
H A Datomic_unique_lock.h118 __current_state, // if __state_ has the same value of __current_state, lock bit must be zero before exchange and in __lock_impl()
119 // we are good to lock/exchange and return. If _state has a different value, because other in __lock_impl()
120 // threads locked it between the `break` statement above and this statement, exchange will fail in __lock_impl()
125 __locked_ordering, // sucessful exchange order. Usually it should be std::memory_order_acquire. in __lock_impl()
127 std::memory_order_relaxed // fail to exchange order. We don't need any ordering as we are going back to the in __lock_impl()

12345678910>>...33