Searched refs:EVP_PKEY_derive (Results 1 – 25 of 39) sorted by relevance
12
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_derive.pod | 5 EVP_PKEY_derive_init, EVP_PKEY_derive_set_peer, EVP_PKEY_derive - derive public key algorithm share… 13 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 23 The EVP_PKEY_derive() derives a shared secret using B<ctx>. 36 The function EVP_PKEY_derive() can be called more than once on the same 41 EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1 for success and 0 68 if (EVP_PKEY_derive(ctx, NULL, &skeylen) <= 0) 76 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0)
|
D | EVP_PKEY_CTX_set_hkdf_md.pod | 43 This is the default mode. Calling L<EVP_PKEY_derive(3)> on an EVP_PKEY_CTX set 53 In this mode calling L<EVP_PKEY_derive(3)> will just perform the extract 62 In this mode calling L<EVP_PKEY_derive(3)> will just perform the expand 108 parameter to the L<EVP_PKEY_derive(3)> function. 112 desired length, and pass that buffer to L<EVP_PKEY_derive(3)> along with (a 144 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) 155 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 23 using L<EVP_PKEY_derive(3)>. 62 EVP_PKEY_derive() function. Since the output length is variable, setting 91 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) 98 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_size.pod | 23 L<EVP_PKEY_encrypt(3)>, L<EVP_PKEY_decrypt(3)>, L<EVP_PKEY_derive(3)>. 69 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_CTX_set1_pbe_pass.pod | 59 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_CTX_set_scrypt_N.pod | 75 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_decrypt.pod | 90 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_verify.pod | 88 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_encrypt.pod | 95 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 83 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_verify_recover.pod | 99 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_sign.pod | 100 L<EVP_PKEY_derive(3)>
|
D | EVP_PKEY_keygen.pod | 188 L<EVP_PKEY_derive(3)>
|
/third_party/openssl/test/ |
D | pkey_meth_kdf_test.c | 42 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf() 87 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_hkdf() 140 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt() 148 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt()
|
D | bad_dtls_test.c | 78 EVP_PKEY_derive(pctx, out, &outlen); in do_PRF()
|
/third_party/openssl/doc/man7/ |
D | scrypt.pod | 39 length parameter to the L<EVP_PKEY_derive(3)> function. 70 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { 71 error("EVP_PKEY_derive"); 104 L<EVP_PKEY_derive(3)>
|
D | X25519.pod | 55 The key derivation example in L<EVP_PKEY_derive(3)> can be used with 62 L<EVP_PKEY_derive(3)>,
|
D | evp.pod | 41 =item For key agreement see L<EVP_PKEY_derive(3)> 101 L<EVP_PKEY_derive(3)>,
|
D | RSA-PSS.pod | 50 L<EVP_PKEY_derive(3)>
|
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/ |
D | key_agreement.cc | 109 if (EVP_PKEY_derive(ctx, NULL, &len) <= 0) { 125 if (EVP_PKEY_derive(ctx, secret, &len) <= 0) {
|
/third_party/openssl/crypto/evp/ |
D | pmeth_fn.c | 284 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) in EVP_PKEY_derive() function
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 97 || EVP_PKEY_derive(pctx, out, &outlen) <= 0; in tls13_hkdf_expand() 241 || EVP_PKEY_derive(pctx, outsecret, &mdlen) in tls13_generate_secret()
|
/third_party/openssl/crypto/cms/ |
D | cms_kari.c | 200 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
|
/third_party/openssl/apps/ |
D | pkeyutl.c | 519 rv = EVP_PKEY_derive(ctx, out, poutlen); in do_keyop()
|
D | speed.c | 1186 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop() 3024 EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 || /* determine max length */ in speed_main() 3041 !EVP_PKEY_derive(test_ctx, NULL, &test_outlen) || /* determine max length */ in speed_main() 3042 !EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) || /* compute a*B */ in speed_main() 3043 !EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) || /* compute b*A */ in speed_main()
|
12