| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | exchange.c | 33 EVP_KEYEXCH *exchange = OPENSSL_zalloc(sizeof(EVP_KEYEXCH)); in evp_keyexch_new() local 35 if (exchange == NULL) in evp_keyexch_new() 38 if (!CRYPTO_NEW_REF(&exchange->refcnt, 1) in evp_keyexch_new() 40 CRYPTO_FREE_REF(&exchange->refcnt); in evp_keyexch_new() 41 OPENSSL_free(exchange); in evp_keyexch_new() 44 exchange->prov = prov; in evp_keyexch_new() 46 return exchange; in evp_keyexch_new() 54 EVP_KEYEXCH *exchange = NULL; in evp_keyexch_from_algorithm() local 57 if ((exchange = evp_keyexch_new(prov)) == NULL) { in evp_keyexch_from_algorithm() 62 exchange->name_id = name_id; in evp_keyexch_from_algorithm() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | provider-keyexch.7 | 89 \& /* Key Exchange parameters */ 102 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key 103 exchange algorithms and make them available to applications via 143 A key exchange algorithm implementation may not implement all of these functions. 148 A key exchange algorithm must also implement some mechanism for generating, 154 structure for holding context information during a key exchange operation. 156 exchange operation function calls. 160 \&\fBOSSL_FUNC_keyexch_freectx()\fR is passed a pointer to the provider side key exchange 164 \&\fBOSSL_FUNC_keyexch_dupctx()\fR should duplicate the provider side key exchange context in 168 \&\fBOSSL_FUNC_keyexch_init()\fR initialises a key exchange operation given a provider side key [all …]
|
| H A D | EVP_KEYEXCH-DH.7 | 65 \&\- DH Key Exchange algorithm support 68 Key exchange support for the \fBDH\fR and \fBDHX\fR key types. 70 Please note that although both key types support the same key exchange 71 operations, they cannot be used together in a single key exchange. It 72 is not possible to use a private key of the \fBDH\fR type in key exchange 74 .SS "DH and DHX key exchange parameters" 75 .IX Subsection "DH and DHX key exchange parameters" 78 Sets the padding mode for the associated key exchange ctx. 106 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
|
| H A D | EVP_KEYEXCH-ECDH.7 | 64 EVP_KEYEXCH\-ECDH \- ECDH Key Exchange algorithm support 67 Key exchange support for the \fBECDH\fR key type. 68 .SS "ECDH Key Exchange parameters" 69 .IX Subsection "ECDH Key Exchange parameters" 72 Sets or gets the ECDH mode of operation for the associated key exchange ctx. 74 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter 76 Diffie-Hellman (CDH) variants of the key exchange algorithm. 80 given key exchange ctx. 110 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
|
| H A D | EVP_KEYEXCH-X25519.7 | 66 \&\- X25519 and X448 Key Exchange algorithm support 69 Key exchange support for the \fBX25519\fR and \fBX448\fR key types. 70 .SS "Key exchange parameters" 71 .IX Subsection "Key exchange parameters" 81 See "Common Key Exchange parameters" in \fBprovider\-keyexch\fR\|(7).
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | provider-keyexch.pod | 32 /* Key Exchange parameters */ 45 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key 46 exchange algorithms and make them available to applications via 82 A key exchange algorithm implementation may not implement all of these functions. 87 A key exchange algorithm must also implement some mechanism for generating, 94 structure for holding context information during a key exchange operation. 96 exchange operation function calls. 100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange 104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in 109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key [all …]
|
| H A D | EVP_KEYEXCH-ECDH.pod | 5 EVP_KEYEXCH-ECDH - ECDH Key Exchange algorithm support 9 Key exchange support for the B<ECDH> key type. 11 =head2 ECDH Key Exchange parameters 17 Sets or gets the ECDH mode of operation for the associated key exchange ctx. 19 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter 21 Diffie-Hellman (CDH) variants of the key exchange algorithm. 25 given key exchange ctx. 56 See L<provider-keyexch(7)/Common Key Exchange parameters>.
|
| H A D | EVP_KEYEXCH-DH.pod | 6 - DH Key Exchange algorithm support 10 Key exchange support for the B<DH> and B<DHX> key types. 12 Please note that although both key types support the same key exchange 13 operations, they cannot be used together in a single key exchange. It 14 is not possible to use a private key of the B<DH> type in key exchange 17 =head2 DH and DHX key exchange parameters 23 Sets the padding mode for the associated key exchange ctx. 50 See L<provider-keyexch(7)/Common Key Exchange parameters>.
|
| H A D | EVP_KEYEXCH-X25519.pod | 7 - X25519 and X448 Key Exchange algorithm support 11 Key exchange support for the B<X25519> and B<X448> key types. 13 =head2 Key exchange parameters 24 See L<provider-keyexch(7)/Common Key Exchange parameters>.
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_KEYEXCH_free.pod | 17 void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange); 18 int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange); 19 OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange); 20 int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name); 21 const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange); 23 void (*fn)(EVP_KEYEXCH *exchange, void *arg), 25 int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange, 34 EVP_KEYEXCH_fetch() fetches the key exchange implementation for the given 49 EVP_KEYEXCH_get0_provider() returns the provider that I<exchange> was 52 EVP_KEYEXCH_is_a() checks if I<exchange> is an implementation of an [all …]
|
| H A D | EVP_PKEY_set1_encoded_public_key.pod | 33 support key exchange or key encapsulation. 78 performing a key exchange operation. 80 =head2 Set up a peer's EVP_PKEY ready for a key exchange operation 84 int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len) 95 /* Do the key exchange here */
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_KEYEXCH_free.3 | 76 \& void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange); 77 \& int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange); 78 \& OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange); 79 \& int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name); 80 \& const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange); 82 \& void (*fn)(EVP_KEYEXCH *exchange, void *arg), 84 \& int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange, 93 \&\fBEVP_KEYEXCH_fetch()\fR fetches the key exchange implementation for the given 108 \&\fBEVP_KEYEXCH_get0_provider()\fR returns the provider that \fIexchange\fR was 111 \&\fBEVP_KEYEXCH_is_a()\fR checks if \fIexchange\fR is an implementation of an [all …]
|
| H A D | EVP_PKEY_set1_encoded_public_key.3 | 94 support key exchange or key encapsulation. 136 performing a key exchange operation. 137 .SS "Set up a peer's EVP_PKEY ready for a key exchange operation" 138 .IX Subsection "Set up a peer's EVP_PKEY ready for a key exchange operation" 142 \& int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len) 153 \& /* Do the key exchange here */
|
| H A D | SSL_CIPHER_get_name.3 | 134 \&\fBSSL_CIPHER_get_kx_nid()\fR returns the key exchange NID corresponding to the method 135 used by \fBc\fR. If there is no key exchange, then \fBNID_undef\fR is returned. 136 If any appropriate key exchange algorithm can be used (as in the case of TLS 1.3 190 .IP "Kx=<key exchange>" 4 191 .IX Item "Kx=<key exchange>" 192 Key exchange method such as \fBRSA\fR, \fBECDHE\fR, etc.
|
| /freebsd/contrib/bearssl/tools/ |
| H A D | names.c | 161 "ECDH key exchange (EC cert), AES-128/GCM (TLS 1.2+)" 167 "ECDH key exchange (RSA cert), AES-128/GCM (TLS 1.2+)" 173 "ECDH key exchange (EC cert), AES-256/GCM (TLS 1.2+)" 179 "ECDH key exchange (RSA cert), AES-256/GCM (TLS 1.2+)" 185 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)" 191 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)" 197 "ECDH key exchange (EC cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)" 203 "ECDH key exchange (RSA cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)" 209 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-1" 215 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-1" [all …]
|
| /freebsd/crypto/openssl/demos/keyexch/ |
| H A D | x25519.c | 16 * This is a demonstration of key exchange using X25519. 60 * Prepare for X25519 key exchange. The public key to be sent to the remote peer 113 * Complete X25519 key exchange. remote_peer_pubk_data should be the 32 byte 138 /* Create key exchange context. */ in keyexch_x25519_after() 223 * Each peer uses the other peer's public key to perform key exchange. in keyexch_x25519() 237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519() 267 /* Test X25519 key exchange with known result. */ in main() 268 printf("Key exchange using known answer (deterministic):\n"); in main() 272 /* Test X25519 key exchange with random keys. */ in main() 273 printf("Key exchange using random keys:\n"); in main()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/renameat2/ |
| H A D | renameat2_exchange.ksh | 45 # Self-exchange is a no-op. 49 # Basic exchange. 54 # And exchange back. 59 # Exchange with a bad path should fail.
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL.agent | 10 exchange (as per RFC4253 section 7.2) and the host key used for that 11 exchange. This binding is verifiable at the agent by including the 24 identifier' is the exchange hash derived from the initial key 25 exchange, 'signature' is the server's signature of the session 28 exchange. 'is_forwarding' is a flag indicating whether this connection
|
| H A D | moduli.5 | 27 in the Diffie-Hellman Group Exchange key exchange method. 107 When performing Diffie-Hellman Group Exchange, 125 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
|
| /freebsd/contrib/libcxxrt/ |
| H A D | atomic.h | 78 * Atomically exchange with the specified memory order. 80 T exchange(T v, memory_order order = memory_order::seqcst) 82 return ATOMIC_BUILTIN(exchange)(&val, v, order); 86 * Atomically exchange with the specified memory order.
|
| /freebsd/contrib/llvm-project/clang/lib/Interpreter/ |
| H A D | Value.cpp | 177 Interp = std::exchange(RHS.Interp, nullptr); in Value() 178 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in Value() 180 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in Value() 181 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in Value() 208 Interp = std::exchange(RHS.Interp, nullptr); in operator =() 209 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in operator =() 210 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in operator =() 211 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in operator =()
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | audit_plugin.h | 145 * Log AS exchange event. 153 * and port, and stage of the AS exchange 167 * Log TGS exchange event. 175 * ID, client address and port, and stage of the TGS exchange 196 * and port, and stage of the TGS exchange 219 * port, and stage of the TGS exchange 242 * port, and stage of the TGS exchange,
|
| /freebsd/share/man/man5/ |
| H A D | moduli.5 | 28 in the Diffie-Hellman Group Exchange key exchange method. 108 When performing Diffie-Hellman Group Exchange, 121 .%T "Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol"
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-list.1 | 87 [\fB\-key\-exchange\-algorithms\fR] 145 .IP "Key exchange algorithms (KEX)" 4 146 .IX Item "Key exchange algorithms (KEX)" 219 The options \fBkey-exchange-algorithms\fR, \fBkem-algorithms\fR, 230 .IP \fB\-key\-exchange\-algorithms\fR 4 231 .IX Item "-key-exchange-algorithms" 232 Display a list of key exchange algorithms.
|
| /freebsd/contrib/llvm-project/libcxx/include/__stop_token/ |
| H A D | atomic_unique_lock.h | 118 __current_state, // if __state_ has the same value of __current_state, lock bit must be zero before exchange and in __lock_impl() 119 // we are good to lock/exchange and return. If _state has a different value, because other in __lock_impl() 120 // threads locked it between the `break` statement above and this statement, exchange will fail in __lock_impl() 125 __locked_ordering, // sucessful exchange order. Usually it should be std::memory_order_acquire. in __lock_impl() 127 std::memory_order_relaxed // fail to exchange order. We don't need any ordering as we are going back to the in __lock_impl()
|