/freebsd/crypto/openssl/crypto/evp/ |
H A D | exchange.c | 23 EVP_KEYEXCH *exchange = OPENSSL_zalloc(sizeof(EVP_KEYEXCH)); in evp_keyexch_new() local 25 if (exchange == NULL) { in evp_keyexch_new() 30 exchange->lock = CRYPTO_THREAD_lock_new(); in evp_keyexch_new() 31 if (exchange->lock == NULL) { in evp_keyexch_new() 33 OPENSSL_free(exchange); in evp_keyexch_new() 36 exchange->prov = prov; in evp_keyexch_new() 38 exchange->refcnt = 1; in evp_keyexch_new() 40 return exchange; in evp_keyexch_new() 48 EVP_KEYEXCH *exchange = NULL; in evp_keyexch_from_algorithm() local 51 if ((exchange = evp_keyexch_new(prov)) == NULL) { in evp_keyexch_from_algorithm() [all …]
|
H A D | pmeth_lib.c | 387 if (ctx->op.kex.algctx != NULL && ctx->op.kex.exchange != NULL) in evp_pkey_ctx_free_old_ops() 388 ctx->op.kex.exchange->freectx(ctx->op.kex.algctx); in evp_pkey_ctx_free_old_ops() 389 EVP_KEYEXCH_free(ctx->op.kex.exchange); in evp_pkey_ctx_free_old_ops() 391 ctx->op.kex.exchange = NULL; in evp_pkey_ctx_free_old_ops() 505 if (pctx->op.kex.exchange != NULL) { in EVP_PKEY_CTX_dup() 506 rctx->op.kex.exchange = pctx->op.kex.exchange; in EVP_PKEY_CTX_dup() 507 if (!EVP_KEYEXCH_up_ref(rctx->op.kex.exchange)) in EVP_PKEY_CTX_dup() 511 if (!ossl_assert(pctx->op.kex.exchange != NULL)) in EVP_PKEY_CTX_dup() 514 if (pctx->op.kex.exchange->dupctx != NULL) in EVP_PKEY_CTX_dup() 516 = pctx->op.kex.exchange->dupctx(pctx->op.kex.algctx); in EVP_PKEY_CTX_dup() [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-keyexch.pod | 32 /* Key Exchange parameters */ 45 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key 46 exchange algorithms and make them available to applications via 82 A key exchange algorithm implementation may not implement all of these functions. 87 A key exchange algorithm must also implement some mechanism for generating, 94 structure for holding context information during a key exchange operation. 96 exchange operation function calls. 100 OSSL_FUNC_keyexch_freectx() is passed a pointer to the provider side key exchange 104 OSSL_FUNC_keyexch_dupctx() should duplicate the provider side key exchange context in 109 OSSL_FUNC_keyexch_init() initialises a key exchange operation given a provider side key [all …]
|
H A D | EVP_KEYEXCH-ECDH.pod | 5 EVP_KEYEXCH-ECDH - ECDH Key Exchange algorithm support 9 Key exchange support for the B<ECDH> key type. 11 =head2 ECDH Key Exchange parameters 17 Sets or gets the ECDH mode of operation for the associated key exchange ctx. 19 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter 21 Diffie-Hellman (CDH) variants of the key exchange algorithm. 25 given key exchange ctx. 36 See L<provider-keyexch(7)/Common Key Exchange parameters>. 40 See L<provider-keyexch(7)/Common Key Exchange parameters>. 44 See L<provider-keyexch(7)/Common Key Exchange parameters>. [all …]
|
H A D | EVP_KEYEXCH-DH.pod | 6 - DH Key Exchange algorithm support 10 Key exchange support for the B<DH> and B<DHX> key types. 12 Please note that although both key types support the same key exchange 13 operations, they cannot be used together in a single key exchange. It 14 is not possible to use a private key of the B<DH> type in key exchange 17 =head2 DH and DHX key exchange parameters 23 Sets the padding mode for the associated key exchange ctx. 36 See L<provider-keyexch(7)/Common Key Exchange parameters>. 40 See L<provider-keyexch(7)/Common Key Exchange parameters>. 44 See L<provider-keyexch(7)/Common Key Exchange parameters>. [all …]
|
H A D | EVP_KEYEXCH-X25519.pod | 7 - X25519 and X448 Key Exchange algorithm support 11 Key exchange support for the B<X25519> and B<X448> key types. 13 =head2 Key exchange parameters 19 See L<provider-keyexch(7)/Common Key Exchange parameters>.
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | provider-keyexch.7 | 165 \& /* Key Exchange parameters */ 178 The key exchange (\s-1OSSL_OP_KEYEXCH\s0) operation enables providers to implement key 179 exchange algorithms and make them available to applications via 219 A key exchange algorithm implementation may not implement all of these functions. 224 A key exchange algorithm must also implement some mechanism for generating, 230 structure for holding context information during a key exchange operation. 232 exchange operation function calls. 236 \&\fBOSSL_FUNC_keyexch_freectx()\fR is passed a pointer to the provider side key exchange 240 \&\fBOSSL_FUNC_keyexch_dupctx()\fR should duplicate the provider side key exchange context in 244 \&\fBOSSL_FUNC_keyexch_init()\fR initialises a key exchange operation given a provider side key [all …]
|
H A D | EVP_KEYEXCH-ECDH.7 | 140 EVP_KEYEXCH\-ECDH \- ECDH Key Exchange algorithm support 143 Key exchange support for the \fB\s-1ECDH\s0\fR key type. 144 .SS "\s-1ECDH\s0 Key Exchange parameters" 145 .IX Subsection "ECDH Key Exchange parameters" 149 Sets or gets the \s-1ECDH\s0 mode of operation for the associated key exchange ctx. 151 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter 153 Diffie-Hellman (\s-1CDH\s0) variants of the key exchange algorithm. 157 given key exchange ctx. 168 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). 172 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). [all …]
|
H A D | EVP_KEYEXCH-DH.7 | 141 \&\- DH Key Exchange algorithm support 144 Key exchange support for the \fB\s-1DH\s0\fR key type. 145 .SS "\s-1DH\s0 key exchange parameters" 146 .IX Subsection "DH key exchange parameters" 150 Sets the padding mode for the associated key exchange ctx. 163 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). 167 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). 171 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). 175 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7). 179 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
|
H A D | EVP_KEYEXCH-X25519.7 | 142 \&\- X25519 and X448 Key Exchange algorithm support 145 Key exchange support for the \fBX25519\fR and \fBX448\fR key types. 146 .SS "Key exchange parameters" 147 .IX Subsection "Key exchange parameters" 151 See \*(L"Common Key Exchange parameters\*(R" in \fBprovider\-keyexch\fR\|(7).
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_KEYEXCH_free.pod | 17 void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange); 18 int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange); 19 OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange); 20 int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name); 21 const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange); 23 void (*fn)(EVP_KEYEXCH *exchange, void *arg), 25 int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange, 34 EVP_KEYEXCH_fetch() fetches the key exchange implementation for the given 49 EVP_KEYEXCH_get0_provider() returns the provider that I<exchange> was 52 EVP_KEYEXCH_is_a() checks if I<exchange> is an implementation of an [all …]
|
H A D | EVP_PKEY_set1_encoded_public_key.pod | 31 currently only works for those that support key exchange. Parameters are not 72 performing a key exchange operation. 74 =head2 Set up a peer's EVP_PKEY ready for a key exchange operation 78 int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len) 89 /* Do the key exchange here */
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_KEYEXCH_free.3 | 152 \& void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange); 153 \& int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange); 154 \& OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange); 155 \& int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name); 156 \& const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange); 158 \& void (*fn)(EVP_KEYEXCH *exchange, void *arg), 160 \& int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange, 169 \&\fBEVP_KEYEXCH_fetch()\fR fetches the key exchange implementation for the given 184 \&\fBEVP_KEYEXCH_get0_provider()\fR returns the provider that \fIexchange\fR was 187 \&\fBEVP_KEYEXCH_is_a()\fR checks if \fIexchange\fR is an implementation of an [all …]
|
H A D | EVP_PKEY_set1_encoded_public_key.3 | 168 currently only works for those that support key exchange. Parameters are not 206 performing a key exchange operation. 207 .SS "Set up a peer's \s-1EVP_PKEY\s0 ready for a key exchange operation" 208 .IX Subsection "Set up a peer's EVP_PKEY ready for a key exchange operation" 212 \& int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len) 223 \& /* Do the key exchange here */
|
/freebsd/contrib/bearssl/tools/ |
H A D | names.c | 161 "ECDH key exchange (EC cert), AES-128/GCM (TLS 1.2+)" 167 "ECDH key exchange (RSA cert), AES-128/GCM (TLS 1.2+)" 173 "ECDH key exchange (EC cert), AES-256/GCM (TLS 1.2+)" 179 "ECDH key exchange (RSA cert), AES-256/GCM (TLS 1.2+)" 185 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)" 191 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-256 (TLS 1.2+)" 197 "ECDH key exchange (EC cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)" 203 "ECDH key exchange (RSA cert), AES-256/CBC + HMAC/SHA-384 (TLS 1.2+)" 209 "ECDH key exchange (EC cert), AES-128/CBC + HMAC/SHA-1" 215 "ECDH key exchange (RSA cert), AES-128/CBC + HMAC/SHA-1" [all …]
|
/freebsd/crypto/openssl/demos/keyexch/ |
H A D | x25519.c | 16 * This is a demonstration of key exchange using X25519. 60 * Prepare for X25519 key exchange. The public key to be sent to the remote peer 113 * Complete X25519 key exchange. remote_peer_pubk_data should be the 32 byte 138 /* Create key exchange context. */ in keyexch_x25519_after() 223 * Each peer uses the other peer's public key to perform key exchange. in keyexch_x25519() 237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519() 267 /* Test X25519 key exchange with known result. */ in main() 268 printf("Key exchange using known answer (deterministic):\n"); in main() 272 /* Test X25519 key exchange with random keys. */ in main() 273 printf("Key exchange using random keys:\n"); in main()
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/renameat2/ |
H A D | renameat2_exchange.ksh | 44 # Self-exchange is a no-op. 48 # Basic exchange. 53 # And exchange back. 58 # Exchange with a bad path should fail.
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.agent | 10 exchange (as per RFC4253 section 7.2) and the host key used for that 11 exchange. This binding is verifiable at the agent by including the 24 identifier' is the exchange hash derived from the initial key 25 exchange, 'signature' is the server's signature of the session 28 exchange. 'is_forwarding' is a flag indicating whether this connection
|
H A D | moduli.5 | 27 in the Diffie-Hellman Group Exchange key exchange method. 107 When performing Diffie-Hellman Group Exchange, 125 .%T Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
|
/freebsd/contrib/libcxxrt/ |
H A D | atomic.h | 78 * Atomically exchange with the specified memory order. 80 T exchange(T v, memory_order order = memory_order::seqcst) 82 return ATOMIC_BUILTIN(exchange)(&val, v, order); 86 * Atomically exchange with the specified memory order.
|
/freebsd/contrib/llvm-project/clang/lib/Interpreter/ |
H A D | Value.cpp | 177 Interp = std::exchange(RHS.Interp, nullptr); in Value() 178 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in Value() 180 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in Value() 181 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in Value() 208 Interp = std::exchange(RHS.Interp, nullptr); in operator =() 209 OpaqueType = std::exchange(RHS.OpaqueType, nullptr); in operator =() 210 ValueKind = std::exchange(RHS.ValueKind, K_Unspecified); in operator =() 211 IsManuallyAlloc = std::exchange(RHS.IsManuallyAlloc, false); in operator =()
|
/freebsd/share/man/man5/ |
H A D | moduli.5 | 28 in the Diffie-Hellman Group Exchange key exchange method. 108 When performing Diffie-Hellman Group Exchange, 121 .%T "Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol"
|
/freebsd/contrib/llvm-project/libcxx/include/__stop_token/ |
H A D | atomic_unique_lock.h | 118 __current_state, // if __state_ has the same value of __current_state, lock bit must be zero before exchange and in __lock_impl() 119 // we are good to lock/exchange and return. If _state has a different value, because other in __lock_impl() 120 // threads locked it between the `break` statement above and this statement, exchange will fail in __lock_impl() 125 __locked_ordering, // sucessful exchange order. Usually it should be std::memory_order_acquire. in __lock_impl() 127 std::memory_order_relaxed // fail to exchange order. We don't need any ordering as we are going back to the in __lock_impl()
|
/freebsd/sys/contrib/device-tree/Bindings/fpga/ |
H A D | xilinx-pr-decoupler.txt | 10 Xilinx LogiCORE Dynamic Function eXchange(DFX) AXI shutdown manager 13 The Dynamic Function eXchange AXI shutdown manager prevents AXI traffic 46 Dynamic Function eXchange AXI shutdown manager:
|
/freebsd/contrib/tcsh/nls/russian/ |
H A D | set3 | 31 29 Exchange the cursor and mark 38 36 Exchange the two characters before the cursor 70 68 Exchange the character to the left of the cursor with the one under 71 69 Exchange the two characters before the cursor
|