/openssl/doc/man3/ |
H A D | EVP_PKEY_derive.pod | 6 EVP_PKEY_derive_set_peer_ex, EVP_PKEY_derive_set_peer, EVP_PKEY_derive 18 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *keylen); 38 EVP_PKEY_derive() derives a shared secret using I<ctx>. 51 The function EVP_PKEY_derive() can be called more than once on the same 56 EVP_PKEY_derive_init() and EVP_PKEY_derive() return 1 84 if (EVP_PKEY_derive(ctx, NULL, &skeylen) <= 0) 92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0) 109 The EVP_PKEY_derive_init(), EVP_PKEY_derive_set_peer() and EVP_PKEY_derive()
|
H A D | EVP_PKEY_CTX_set_hkdf_md.pod | 43 This is the default mode. Calling L<EVP_PKEY_derive(3)> on an EVP_PKEY_CTX set 53 In this mode calling L<EVP_PKEY_derive(3)> will just perform the extract 62 In this mode calling L<EVP_PKEY_derive(3)> will just perform the expand 106 parameter to the L<EVP_PKEY_derive(3)> function. 110 desired length, and pass that buffer to L<EVP_PKEY_derive(3)> along with (a 142 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) 153 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 23 using L<EVP_PKEY_derive(3)>. 60 EVP_PKEY_derive() function. Since the output length is variable, setting 89 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) 96 L<EVP_PKEY_derive(3)>
|
H A D | DH_generate_key.pod | 26 and L<EVP_PKEY_derive(3)>. 64 L<EVP_PKEY_derive(3)>,
|
H A D | EVP_PKEY_get_size.pod | 29 L<EVP_PKEY_encrypt(3)>, L<EVP_PKEY_decrypt(3)>, L<EVP_PKEY_derive(3)>. 78 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_set1_encoded_public_key.pod | 71 See L<EVP_PKEY_derive_init(3)> and L<EVP_PKEY_derive(3)> for information about 121 L<EVP_PKEY_derive_init(3)>, L<EVP_PKEY_derive(3)>,
|
H A D | EVP_PKEY_CTX_set1_pbe_pass.pod | 55 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_CTX_set_scrypt_N.pod | 76 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_CTX_set_params.pod | 80 L<EVP_PKEY_derive(3)>,
|
H A D | EVP_PKEY_encrypt.pod | 103 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 94 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_decrypt.pod | 121 L<EVP_PKEY_derive(3)>
|
H A D | EVP_PKEY_verify_recover.pod | 124 L<EVP_PKEY_derive(3)>
|
/openssl/test/ |
H A D | pkey_meth_kdf_test.c | 61 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf() 128 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_hkdf() 187 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt() 195 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt()
|
H A D | bad_dtls_test.c | 80 EVP_PKEY_derive(pctx, out, &outlen); in do_PRF()
|
H A D | ectest.c | 2989 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) in custom_params_test() 2991 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) in custom_params_test() 2996 || !TEST_int_eq(EVP_PKEY_derive(pctx2, NULL, &t), 1) in custom_params_test() 2999 || !TEST_int_eq(EVP_PKEY_derive(pctx2, buf2, &t), 1)) in custom_params_test() 3046 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &t), 1) in custom_params_test() 3049 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &t), 1) in custom_params_test()
|
/openssl/demos/keyexch/ |
H A D | ecdh.c | 149 if (EVP_PKEY_derive(derivectx, NULL, &secretlen) <= 0) in generate_secret() 160 if (EVP_PKEY_derive(derivectx, secret, &secretlen) <= 0) in generate_secret()
|
H A D | x25519.c | 158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after() 181 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after()
|
/openssl/doc/man7/ |
H A D | X25519.pod | 55 The key derivation example in L<EVP_PKEY_derive(3)> can be used with 62 L<EVP_PKEY_derive(3)>,
|
H A D | EVP_KEYEXCH-DH.pod | 104 EVP_PKEY_derive(dctx, NULL, &secret_len); 107 EVP_PKEY_derive(dctx, secret, &secret_len);
|
H A D | evp.pod | 42 =item For key agreement see L<EVP_PKEY_derive(3)> 103 L<EVP_PKEY_derive(3)>,
|
H A D | RSA-PSS.pod | 50 L<EVP_PKEY_derive(3)>
|
H A D | EVP_KEYEXCH-ECDH.pod | 109 EVP_PKEY_derive(dctx, secret, &secret_len);
|
/openssl/doc/life-cycles/ |
H A D | pkey.dot | 36 …derive -> derive [label="EVP_PKEY_derive\nEVP_PKEY_derive_set_peer", fontcolor="#FEA303", color="#…
|
/openssl/apps/ |
H A D | speed.c | 1173 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop() 1279 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop() 3550 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main() 3569 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main() 3570 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main() 3571 … || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main() 3968 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main() 3981 if (EVP_PKEY_derive(ffdh_ctx, in speed_main() 4001 EVP_PKEY_derive(test_ctx, NULL, &test_out) <= 0 || in speed_main() 4002 EVP_PKEY_derive(test_ctx, loopargs[i].secret_ff_b, &test_out) <= 0 || in speed_main()
|