Lines Matching refs:PKEY
5 life_cycle-pkey - The PKEY algorithm life-cycle
15 This state represents the PKEY before it has been allocated. It is the
20 This state represents the PKEY after it has been allocated.
24 This state represents the PKEY when it is ready to perform a private key decapsulation
29 This state represents the PKEY when it is ready to decrypt some ciphertext.
33 This state represents the PKEY when it is ready to derive a shared secret.
37 This state represents the PKEY when it is ready to perform a private key signature
42 This state represents the PKEY when it is ready to perform a public key encapsulation
47 This state represents the PKEY when it is ready to encrypt some plaintext.
51 This state represents the PKEY when it is ready to generate a new public/private key.
55 This state represents the PKEY when it is ready to generate key parameters.
59 This state represents the PKEY when it is ready to verify a public key signature.
63 This state represents the PKEY when it is ready to recover a public key signature data.
67 This state is entered when the PKEY is freed. It is the terminal state
74 The usual life-cycle of a PKEY object is illustrated:
702 The provider PKEY interface was introduced in OpenSSL 3.0.