Home
last modified time | relevance | path

Searched refs:EVP_PKEY_derive (Results 1 – 25 of 45) sorted by relevance

12

/openssl/doc/man3/
H A DEVP_PKEY_derive.pod6 EVP_PKEY_derive_set_peer_ex, EVP_PKEY_derive_set_peer, EVP_PKEY_derive
18 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen);
38 EVP_PKEY_derive() derives a shared secret using I<ctx>.
51 The function EVP_PKEY_derive() can be called more than once on the same
56 EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1
84 if (EVP_PKEY_derive(ctx, NULL, &skeylen) <= 0)
92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0)
109 The EVP_PKEY_derive_init(), EVP_PKEY_derive_set_peer() and EVP_PKEY_derive()
H A DEVP_PKEY_CTX_set_hkdf_md.pod43 This is the default mode. Calling L<EVP_PKEY_derive(3)> on an EVP_PKEY_CTX set
53 In this mode calling L<EVP_PKEY_derive(3)> will just perform the extract
62 In this mode calling L<EVP_PKEY_derive(3)> will just perform the expand
106 parameter to the L<EVP_PKEY_derive(3)> function.
110 desired length, and pass that buffer to L<EVP_PKEY_derive(3)> along with (a
142 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0)
153 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod23 using L<EVP_PKEY_derive(3)>.
60 EVP_PKEY_derive() function. Since the output length is variable, setting
89 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0)
96 L<EVP_PKEY_derive(3)>
H A DDH_generate_key.pod26 and L<EVP_PKEY_derive(3)>.
64 L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_get_size.pod29 L<EVP_PKEY_encrypt(3)>, L<EVP_PKEY_decrypt(3)>, L<EVP_PKEY_derive(3)>.
78 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_set1_encoded_public_key.pod71 See L<EVP_PKEY_derive_init(3)> and L<EVP_PKEY_derive(3)> for information about
121 L<EVP_PKEY_derive_init(3)>, L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_CTX_set1_pbe_pass.pod55 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_scrypt_N.pod76 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_params.pod80 L<EVP_PKEY_derive(3)>,
H A DEVP_PKEY_encrypt.pod103 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_CTX_set_rsa_pss_keygen_md.pod94 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_decrypt.pod121 L<EVP_PKEY_derive(3)>
H A DEVP_PKEY_verify_recover.pod124 L<EVP_PKEY_derive(3)>
/openssl/test/
H A Dpkey_meth_kdf_test.c61 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf()
128 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_hkdf()
187 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt()
195 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt()
H A Dbad_dtls_test.c80 EVP_PKEY_derive(pctx, out, &outlen); in do_PRF()
H A Dectest.c2989 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) in custom_params_test()
2991 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) in custom_params_test()
2996 || !TEST_int_eq(EVP_PKEY_derive(pctx2, NULL, &t), 1) in custom_params_test()
2999 || !TEST_int_eq(EVP_PKEY_derive(pctx2, buf2, &t), 1)) in custom_params_test()
3046 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &t), 1) in custom_params_test()
3049 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &t), 1) in custom_params_test()
/openssl/demos/keyexch/
H A Decdh.c149 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0) in generate_secret()
160 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) in generate_secret()
H A Dx25519.c158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after()
181 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after()
/openssl/doc/man7/
H A DX25519.pod55 The key derivation example in L<EVP_PKEY_derive(3)> can be used with
62 L<EVP_PKEY_derive(3)>,
H A DEVP_KEYEXCH-DH.pod104 EVP_PKEY_derive(dctx, NULL, &secret_len);
107 EVP_PKEY_derive(dctx, secret, &secret_len);
H A Devp.pod42 =item For key agreement see L<EVP_PKEY_derive(3)>
103 L<EVP_PKEY_derive(3)>,
H A DRSA-PSS.pod50 L<EVP_PKEY_derive(3)>
H A DEVP_KEYEXCH-ECDH.pod109 EVP_PKEY_derive(dctx, secret, &secret_len);
/openssl/doc/life-cycles/
H A Dpkey.dot36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
/openssl/apps/
H A Dspeed.c1173 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop()
1279 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop()
3550 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main()
3569 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main()
3570 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main()
3571 … || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main()
3968 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main()
3981 if (EVP_PKEY_derive(ffdh_ctx, in speed_main()
4001 EVP_PKEY_derive(test_ctx, NULL, &test_out) <= 0 || in speed_main()
4002 EVP_PKEY_derive(test_ctx, loopargs[i].secret_ff_b, &test_out) <= 0 || in speed_main()

Completed in 59 milliseconds

12