Home
last modified time | relevance | path

Searched refs:derive (Results 1 – 25 of 38) sorted by relevance

12

/openssl/doc/life-cycles/
H A Dpkey.dot12 derive [fontcolor="#FEA303", color="#FEA303"]
35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"];
36derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
/openssl/doc/man7/
H A Dlife_cycle-pkey.pod31 =item derive
169derive derive derive derive derive derive derive
211 <th style="border:1px solid" align="center">derive</th>
431 <td style="border:1px solid" align="center">derive</td>
432 <td style="border:1px solid" align="center">derive</td>
433 <td style="border:1px solid" align="center">derive</td>
434 <td style="border:1px solid" align="center">derive</td>
435 <td style="border:1px solid" align="center">derive</td>
436 <td style="border:1px solid" align="center">derive</td>
437 <td style="border:1px solid" align="center">derive</td>
[all …]
H A DEVP_KDF-X942-CONCAT.pod10 used for key agreement to derive a key using input such as a shared secret key
H A DEVP_KEYEXCH-DH.pod82 To derive a shared secret on the host using the host's key and the peer's public
113 Very similar code can be used by the peer to derive the same shared secret
H A DEVP_KDF-PVKKDF.pod40 A typical application of this algorithm is to derive keying material for an
H A DEVP_KDF-ARGON2.pod76 The number of lanes is used to derive the key. It is possible to specify
123 /* derive result */
H A DEVP_KDF-PBKDF1.pod45 A typical application of this algorithm is to derive keying material for an
H A DEVP_KDF-PKCS12KDF.pod52 A typical application of this algorithm is to derive keying material for an
H A DEVP_KDF-KRB5KDF.pod12 in RFC 3961, section 5.1 and is used by Krb5 to derive session keys.
H A DEVP_KDF-PBKDF2.pod76 A typical application of this algorithm is to derive keying material for an
H A DEVP_KDF-X963.pod11 derive a key using input such as a shared secret key and shared info.
H A DEVP_KEYEXCH-ECDH.pod80 To derive a shared secret on the host using the host's key and the peer's public
H A DEVP_KDF-X942-ASN1.pod10 X942KDF-ASN1. It is used by DH KeyAgreement, to derive a key using input such as
/openssl/crypto/evp/
H A Dexchange.c76 if (exchange->derive != NULL) in evp_keyexch_from_algorithm()
78 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm()
361 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex()
441 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex()
523 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive()
528 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive()
534 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
H A Dkdf_meth.c102 if (kdf->derive != NULL) in evp_kdf_from_algorithm()
104 kdf->derive = OSSL_FUNC_kdf_derive(fns); in evp_kdf_from_algorithm()
H A Dkdf_lib.c144 return ctx->meth->derive(ctx->algctx, key, keylen, params); in EVP_KDF_derive()
H A Devp_local.h151 OSSL_FUNC_keyexch_derive_fn *derive; member
/openssl/doc/man3/
H A DEVP_BytesToKey.pod19 the cipher to derive the key and IV for. B<md> is the message digest to use.
22 B<datal> bytes which is used to derive the keying data. B<count> is the
28 A typical application of this function is to derive keying material for an
37 otherwise a non standard extension is used to derive the extra data.
H A DEVP_PKEY_meth_new.pod114 int (*derive) (EVP_PKEY_CTX *ctx,
349 int (*derive) (EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
351 The derive_init() and derive() methods are used to derive the shared secret
H A DPKCS5_PBKDF2_HMAC.pod47 A typical application of this function is to derive keying material for an
H A DEVP_PKEY_derive.pod7 - derive public key algorithm shared secret
H A DPKCS12_key_gen_utf8_ex.pod102 A typical application of this function is to derive keying material for an
/openssl/providers/implementations/kdfs/
H A Dkbkdf.c207 static int derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, in derive() function
356 ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, in kbkdf_derive()
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in31 [B<-derive>]
154 =item B<-derive>
357 The EC algorithm supports sign, verify and derive operations. The sign and
358 verify operations use ECDSA and derive uses ECDH. SHA1 is assumed by default for
421 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
H A Dopenssl-enc.pod.in117 The password to derive the key from. This is for compatibility with previous
122 Read the password to derive the key from the first line of I<filename>.
135 This option enables the use of PBKDF2 algorithm to derive the key.
246 A password will be prompted for to derive the key and IV if necessary.

Completed in 49 milliseconds

12