/freebsd/crypto/openssl/test/ |
H A D | evp_kdf_test.c | 74 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0) in test_kdf_tls1_prf() 112 && TEST_int_eq(EVP_KDF_derive(kctx, out, 0, NULL), 0); in test_kdf_tls1_prf_zero_output_size() 130 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0); in test_kdf_tls1_prf_empty_secret() 148 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0); in test_kdf_tls1_prf_1byte_secret() 168 && TEST_int_eq(EVP_KDF_derive(kctx, out, sizeof(out), NULL), 0); in test_kdf_tls1_prf_empty_seed() 186 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0); in test_kdf_tls1_prf_1byte_seed() 234 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0) in test_kdf_hkdf() 334 if (!TEST_int_eq(EVP_KDF_derive(kctx, out, sizeof(out), params), 0)) in test_kdf_hkdf_derive_set_params_fail() 415 && TEST_int_eq(EVP_KDF_derive(kctx, out, 0, NULL), 0); in test_kdf_hkdf_zero_output_size() 433 && TEST_int_gt(EVP_KDF_derive(kctx, out, sizeof(out), params), 0); in test_kdf_hkdf_empty_key() [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 74 parameter to the L<EVP_KDF_derive(3)> function. 97 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 98 error("EVP_KDF_derive"); 126 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 127 error("EVP_KDF_derive"); 154 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 155 error("EVP_KDF_derive"); 171 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-HKDF.pod | 54 This is the default mode. Calling L<EVP_KDF_derive(3)> on an EVP_KDF_CTX set 64 In this mode calling L<EVP_KDF_derive(3)> will just perform the extract 74 In this mode calling L<EVP_KDF_derive(3)> will just perform the expand 93 parameter to the L<EVP_KDF_derive(3)> function. When using 122 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 123 error("EVP_KDF_derive"); 139 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-KB.pod | 81 parameter to the L<EVP_KDF_derive(3)> function. 111 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 112 error("EVP_KDF_derive"); 141 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 142 error("EVP_KDF_derive"); 155 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-X963.pod | 52 parameter to the L<EVP_KDF_derive(3)> function. 75 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 76 error("EVP_KDF_derive"); 92 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-TLS1_PRF.pod | 60 EVP_KDF_derive() function. 83 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 84 error("EVP_KDF_derive"); 98 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-TLS13_KDF.pod | 61 In this mode calling L<EVP_KDF_derive(3)> will just perform the extract 71 In this mode calling L<EVP_KDF_derive(3)> will just perform the expand 87 The I<OSSL_PARAM> array passed to L<EVP_KDF_derive(3)> or 97 I<keylen> parameter to the L<EVP_KDF_derive(3)> function. When using 115 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-KRB5KDF.pod | 50 parameter to the L<EVP_KDF_derive(3)> function, and MUST match the key 57 cipher, and pass that buffer to the L<EVP_KDF_derive(3)> function along 84 if (EVP_KDF_derive(kctx, out, outlen, params) <= 0) 98 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-SSHKDF.pod | 93 parameter to the L<EVP_KDF_derive(3)> function. 97 L<EVP_KDF_derive(3)> function along with the desired length. 129 if (EVP_KDF_derive(kctx, out, outlen, params) <= 0) 144 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-X942-ASN1.pod | 88 parameter to the L<EVP_KDF_derive(3)> function. 118 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) 119 error("EVP_KDF_derive"); 135 L<EVP_KDF_derive(3)>,
|
H A D | EVP_KDF-SCRYPT.pod | 79 "keylen" parameter to the L<EVP_KDF_derive(3)> function. 103 if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) { 104 error("EVP_KDF_derive"); 134 L<EVP_KDF_derive(3)>,
|
H A D | life_cycle-kdf.pod | 51 | EVP_KDF_derive | 53 EVP_KDF_derive +-------------------+ | 79 EVP_KDF_derive deriving deriving 104 <tr><th style="border:1px solid" align="left">EVP_KDF_derive</th>
|
/freebsd/crypto/openssl/doc/life-cycles/ |
H A D | kdf.dot | 10 newed -> deriving [label="EVP_KDF_derive"]; 11 deriving -> deriving [label="EVP_KDF_derive", style=dashed];
|
/freebsd/crypto/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 45 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_ecdh_kdf_X9_63()
|
/freebsd/crypto/openssl/demos/kdf/ |
H A D | pbkdf2.c | 101 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
|
H A D | hkdf.c | 88 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
|
H A D | scrypt.c | 104 if (EVP_KDF_derive(kctx, out, sizeof(out), params) != 1) { in main()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_KDF.pod | 7 EVP_KDF_CTX_reset, EVP_KDF_derive, 29 int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen, 62 passing them as part of the EVP_KDF_derive() call or using calls 63 to EVP_KDF_CTX_set_params() before calling EVP_KDF_derive() to derive 105 EVP_KDF_derive() processes any parameters in I<Params> and then derives
|
/freebsd/crypto/openssl/crypto/dh/ |
H A D | dh_kdf.c | 58 ret = EVP_KDF_derive(kctx, out, outlen, params) > 0; in ossl_dh_kdf_X9_42_asn1()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | pbe_scrypt.c | 83 if (EVP_KDF_derive(kctx, key, keylen, params) != 1) in EVP_PBE_scrypt_ex()
|
H A D | p5_crpt.c | 97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex()
|
H A D | kdf_lib.c | 140 int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen, in EVP_KDF_derive() function
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | kdf.h | 44 int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen,
|
/freebsd/crypto/openssl/crypto/pkcs12/ |
H A D | p12_key.c | 121 if (EVP_KDF_derive(ctx, out, (size_t)n, params)) { in PKCS12_key_gen_uni_ex()
|
/freebsd/crypto/openssl/providers/implementations/exchange/ |
H A D | kdf_exch.c | 123 ret = EVP_KDF_derive(pkdfctx->kdfctx, secret, outlen, NULL); in kdf_derive()
|