Searched refs:derive (Results 1 – 25 of 42) sorted by relevance
12
/openssl/doc/life-cycles/ |
H A D | pkey.dot | 12 derive [fontcolor="#FEA303", color="#FEA303"] 35 newed -> derive [label="EVP_PKEY_derive_init", fontcolor="#FEA303", color="#FEA303"]; 36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
|
/openssl/doc/man7/ |
H A D | life_cycle-pkey.pod | 31 =item derive 169 … derive derive derive derive derive derive derive … 211 <th style="border:1px solid" align="center">derive</th> 431 <td style="border:1px solid" align="center">derive</td> 432 <td style="border:1px solid" align="center">derive</td> 433 <td style="border:1px solid" align="center">derive</td> 434 <td style="border:1px solid" align="center">derive</td> 435 <td style="border:1px solid" align="center">derive</td> 436 <td style="border:1px solid" align="center">derive</td> 437 <td style="border:1px solid" align="center">derive</td> [all …]
|
H A D | EVP_KDF-X942-CONCAT.pod | 10 used for key agreement to derive a key using input such as a shared secret key
|
H A D | EVP_KEYEXCH-DH.pod | 82 To derive a shared secret on the host using the host's key and the peer's public 113 Very similar code can be used by the peer to derive the same shared secret
|
H A D | EVP_KDF-PVKKDF.pod | 40 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KDF-ARGON2.pod | 76 The number of lanes is used to derive the key. It is possible to specify 123 /* derive result */
|
H A D | EVP_KDF-PBKDF1.pod | 45 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KDF-PKCS12KDF.pod | 52 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KDF-KRB5KDF.pod | 12 in RFC 3961, section 5.1 and is used by Krb5 to derive session keys.
|
H A D | EVP_KDF-PBKDF2.pod | 78 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_KEYEXCH-ECDH.pod | 80 To derive a shared secret on the host using the host's key and the peer's public
|
H A D | EVP_KDF-X963.pod | 11 derive a key using input such as a shared secret key and shared info.
|
/openssl/crypto/evp/ |
H A D | exchange.c | 87 if (exchange->derive != NULL) in evp_keyexch_from_algorithm() 89 exchange->derive = OSSL_FUNC_keyexch_derive(fns); in evp_keyexch_from_algorithm() 372 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive_init_ex() 452 || !(ctx->pmeth->derive != NULL in EVP_PKEY_derive_set_peer_ex() 532 ret = ctx->op.kex.exchange->derive(ctx->op.kex.algctx, key, pkeylen, in EVP_PKEY_derive() 537 if (ctx->pmeth == NULL || ctx->pmeth->derive == NULL) { in EVP_PKEY_derive() 543 return ctx->pmeth->derive(ctx, key, pkeylen); in EVP_PKEY_derive()
|
H A D | kdf_meth.c | 101 if (kdf->derive != NULL) in evp_kdf_from_algorithm() 103 kdf->derive = OSSL_FUNC_kdf_derive(fns); in evp_kdf_from_algorithm()
|
H A D | kdf_lib.c | 144 return ctx->meth->derive(ctx->algctx, key, keylen, params); in EVP_KDF_derive()
|
H A D | evp_local.h | 152 OSSL_FUNC_keyexch_derive_fn *derive; member
|
/openssl/doc/man3/ |
H A D | EVP_BytesToKey.pod | 19 the cipher to derive the key and IV for. B<md> is the message digest to use. 22 B<datal> bytes which is used to derive the keying data. B<count> is the 28 A typical application of this function is to derive keying material for an 37 otherwise a non standard extension is used to derive the extra data.
|
H A D | EVP_PKEY_meth_new.pod | 114 int (*derive) (EVP_PKEY_CTX *ctx, 349 int (*derive) (EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 351 The derive_init() and derive() methods are used to derive the shared secret
|
H A D | PKCS5_PBKDF2_HMAC.pod | 47 A typical application of this function is to derive keying material for an
|
H A D | EVP_PKEY_derive.pod | 7 - derive public key algorithm shared secret
|
H A D | EVP_PKEY_decapsulate.pod | 39 Instead, the shared secret must be used to derive a key that is used to
|
H A D | PKCS12_key_gen_utf8_ex.pod | 102 A typical application of this function is to derive keying material for an
|
/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 207 static int derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, in derive() function 356 ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, in kbkdf_derive()
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 29 [B<-derive>] 184 =item B<-derive> 226 Decode an encapsulated secret, with the use of a B<-private> key, to derive the 431 The EC algorithm supports sign, verify and derive operations. The sign and 432 verify operations use ECDSA and derive uses ECDH. SHA256 is assumed by default 519 openssl pkeyutl -derive -inkey key.pem -peerkey pubkey.pem -out secret
|
H A D | openssl-enc.pod.in | 119 The password to derive the key from. This is for compatibility with previous 124 Read the password to derive the key from the first line of I<filename>. 137 This option enables the use of PBKDF2 algorithm to derive the key. 263 A password will be prompted for to derive the key and IV if necessary.
|
Completed in 42 milliseconds
12