Home
last modified time | relevance | path

Searched refs:EVP_PKEY_derive (Results 1 – 25 of 49) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_derive.pod6 EVP_PKEY_derive_set_peer_ex, EVP_PKEY_derive_set_peer, EVP_PKEY_derive
18 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
38 EVP_PKEY_derive() derives a shared secret using I<ctx>.
51 The function EVP_PKEY_derive() can be called more than once on the same
56 EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1
84 if (EVP_PKEY_derive(ctx, NULL, &skeylen) <= 0)
92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0)
109 The EVP_PKEY_derive_init(), EVP_PKEY_derive_set_peer() and EVP_PKEY_derive()
H A DEVP_PKEY_CTX_set_hkdf_md.pod43 This is the default mode. Calling L<EVP_PKEY_derive(3)> on an EVP_PKEY_CTX set
53 In this mode calling L<EVP_PKEY_derive(3)> will just perform the extract
62 In this mode calling L<EVP_PKEY_derive(3)> will just perform the expand
106 parameter to the L<EVP_PKEY_derive(3)> function.
110 desired length, and pass that buffer to L<EVP_PKEY_derive(3)> along with (a
142 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0)
153 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod23 using L<EVP_PKEY_derive(3)>.
60 EVP_PKEY_derive() function. Since the output length is variable, setting
89 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0)
96 L<EVP_PKEY_derive(3)>
H A DDH_generate_key.pod26 and L<EVP_PKEY_derive(3)>.
64 L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_get_size.pod28 L<EVP_PKEY_encrypt(3)>, L<EVP_PKEY_decrypt(3)>, L<EVP_PKEY_derive(3)>.
74 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_set1_encoded_public_key.pod71 See L<EVP_PKEY_derive_init(3)> and L<EVP_PKEY_derive(3)> for information about
121 L<EVP_PKEY_derive_init(3)>, L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_CTX_set1_pbe_pass.pod55 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_scrypt_N.pod76 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_params.pod80 L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_decrypt.pod100 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_verify.pod96 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_encrypt.pod103 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod94 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_sign.pod108 L<EVP_PKEY_derive(3)>
/freebsd/crypto/openssl/test/
H A Dpkey_meth_kdf_test.c61 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf()
62 TEST_error("EVP_PKEY_derive"); in test_kdf_tls1_prf()
128 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt()
129 TEST_error("EVP_PKEY_derive"); in test_kdf_scrypt()
187 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt()
188 TEST_error("EVP_PKEY_derive should have failed"); in test_kdf_scrypt()
195 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) {
196 TEST_error("EVP_PKEY_derive"); in setup_tests()
/freebsd/contrib/libfido2/src/
H A Decdh.c64 if (EVP_PKEY_derive(ctx, key, &keylen) < 1) { in hkdf_sha256()
140 if (EVP_PKEY_derive(ctx, NULL, &secret->len) <= 0 || in do_ecdh()
142 EVP_PKEY_derive(ctx, secret->ptr, &secret->len) <= 0) { in do_ecdh()
/freebsd/crypto/openssl/demos/keyexch/
H A Dx25519.c158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after()
181 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after()
/freebsd/crypto/openssl/doc/man7/
H A DX25519.pod55 The key derivation example in L<EVP_PKEY_derive(3)> can be used with
62 L<EVP_PKEY_derive(3)>,
H A Devp.pod42 =item For key agreement see L<EVP_PKEY_derive(3)>
103 L<EVP_PKEY_derive(3)>,
H A DEVP_KEYEXCH-DH.pod106 EVP_PKEY_derive(dctx, NULL, &secret_len);
109 EVP_PKEY_derive(dctx, secret, &secret_len);
H A DRSA-PSS.pod50 L<EVP_PKEY_derive(3)>
H A DEVP_KEYEXCH-ECDH.pod93 EVP_PKEY_derive(dctx, secret, &secret_len);
/freebsd/contrib/libfido2/fuzz/
H A Dwrapped.sym50 EVP_PKEY_derive
/freebsd/crypto/openssl/doc/life-cycles/
H A Dpkey.dot36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
/freebsd/crypto/openssl/apps/
H A Dspeed.c979 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop()
1086 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop()
2842 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main()
2861 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main()
2862 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main()
2863 … || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main()
3263 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main()
3276 if (EVP_PKEY_derive(ffdh_ctx, in speed_main()
3296 EVP_PKEY_derive(test_ctx, NULL, &test_out) <= 0 || in speed_main()
3297 EVP_PKEY_derive(test_ctx, loopargs[i].secret_ff_b, &test_out) <= 0 || in speed_main()

12