/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | life_cycle-pkey.pod | 31 =item derive 33 This state represents the PKEY when it is ready to derive a shared secret. 85 …| derive | | | | EVP_PKEY_verify … 149 …d digest verify verify encrypt decrypt derive encapsulate … 169 … derive derive derive derive derive derive derive … 170 …r derive 171 … derive 186 …d digest verify verify encrypt decrypt derive encapsulate … 188 …d digest verify verify encrypt decrypt derive encapsulate … 190 …d digest verify verify encrypt decrypt derive encapsulate … [all …]
|
H A D | EVP_KDF-X942-CONCAT.pod | 10 used for key agreement to derive a key using input such as a shared secret key
|
H A D | EVP_KDF-PBKDF1.pod | 45 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KDF-PKCS12KDF.pod | 52 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KDF-X963.pod | 11 derive a key using input such as a shared secret key and shared info.
|
H A D | EVP_KDF-PBKDF2.pod | 67 A typical application of this algorithm is to derive keying material for an
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/life-cycles/ |
H A D | pkey.dot | 12 derive [fontcolor="#FEA303", color="#FEA303"] 35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"]; 36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | exchange.c | 81 if (exchange->derive != NULL) in evp_keyexch_from_algorithm() 83 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm() 362 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex() 440 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex() 522 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive() 527 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive() 533 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
|
H A D | kdf_meth.c | 103 if (kdf->derive != NULL) in evp_kdf_from_algorithm() 105 kdf->derive = OSSL_FUNC_kdf_derive(fns); in evp_kdf_from_algorithm()
|
H A D | kdf_lib.c | 146 return ctx->meth->derive(ctx->algctx, key, keylen, params); in EVP_KDF_derive()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | EVP_BytesToKey.pod | 19 the cipher to derive the key and IV for. B<md> is the message digest to use. 22 B<datal> bytes which is used to derive the keying data. B<count> is the 28 A typical application of this function is to derive keying material for an 37 otherwise a non standard extension is used to derive the extra data.
|
H A D | EVP_PKEY_meth_new.pod | 110 int (*derive) (EVP_PKEY_CTX *ctx, 342 int (*derive) (EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 344 The derive_init() and derive() methods are used to derive the shared secret
|
H A D | PKCS5_PBKDF2_HMAC.pod | 47 A typical application of this function is to derive keying material for an
|
H A D | EVP_PKEY_derive.pod | 5 EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public key algorithm share…
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | EVP_BytesToKey.pod | 19 the cipher to derive the key and IV for. B<md> is the message digest to use. 22 B<datal> bytes which is used to derive the keying data. B<count> is the 28 A typical application of this function is to derive keying material for an 37 otherwise a non standard extension is used to derive the extra data.
|
H A D | PKCS5_PBKDF2_HMAC.pod | 47 A typical application of this function is to derive keying material for an
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | pmeth_fn.c | 207 if (!ctx || !ctx->pmeth || !ctx->pmeth->derive) { in EVP_PKEY_derive_init() 225 || !(ctx->pmeth->derive || ctx->pmeth->encrypt || ctx->pmeth->decrypt) in EVP_PKEY_derive_set_peer() 286 if (!ctx || !ctx->pmeth || !ctx->pmeth->derive) { in EVP_PKEY_derive() 296 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
|
H A D | pmeth_lib.c | 229 dst->derive = src->derive; in EVP_PKEY_meth_copy() 626 int (*derive) (EVP_PKEY_CTX *ctx, in EVP_PKEY_meth_set_derive() 631 pmeth->derive = derive; in EVP_PKEY_meth_set_derive() 836 *pderive = pmeth->derive; in EVP_PKEY_meth_get_derive()
|
/netbsd-src/games/warp/ |
H A D | config.h.SH | 61 * gethostname() routine to derive the host name. See also DOUNAME 66 * uname() routine to derive the host name. See also GETHOSTNAME and 72 * to derive the host name. See also GETHOSTNAME and DOUNAME.
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | pkeyutl.pod | 28 [B<-derive>] 122 =item B<-derive> 290 The EC algorithm supports sign, verify and derive operations. The sign and 291 verify operations use ECDSA and derive uses ECDH. SHA1 is assumed by default for 319 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
|
H A D | enc.pod | 105 The password to derive the key from. This is for compatibility with previous 110 Read the password to derive the key from the first line of B<filename>. 123 This option enables the use of PBKDF2 algorithm to derive the key. 224 A password will be prompted for to derive the key and IV if necessary.
|
/netbsd-src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
H A D | kbkdf.c | 151 static int derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, in derive() function 258 ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, in kbkdf_derive()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 30 [B<-derive>] 144 =item B<-derive> 307 The EC algorithm supports sign, verify and derive operations. The sign and 308 verify operations use ECDSA and derive uses ECDH. SHA1 is assumed by default for 371 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
|
/netbsd-src/external/bsd/libevent/dist/include/ |
H A D | include.am | 40 ## the source header filename to derive the installed header filename.
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | PROTOCOL.key | 61 The KDF is used to derive a key, IV (and other values required by
|