Home
last modified time | relevance | path

Searched refs:EVP_PKEY_derive (Results 1 - 25 of 32) sorted by relevance

12

/third_party/openssl/test/
H A Dpkey_meth_kdf_test.c48 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf()
49 TEST_error("EVP_PKEY_derive"); in test_kdf_tls1_prf()
102 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_hkdf()
103 TEST_error("EVP_PKEY_derive"); in test_kdf_hkdf()
161 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt()
162 TEST_error("EVP_PKEY_derive should have failed"); in test_kdf_scrypt()
169 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt()
170 TEST_error("EVP_PKEY_derive"); in test_kdf_scrypt()
H A Dectest.c2877 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) in custom_params_test()
2879 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) in custom_params_test()
2884 || !TEST_int_eq(EVP_PKEY_derive(pctx2, NULL, &t), 1) in custom_params_test()
2887 || !TEST_int_eq(EVP_PKEY_derive(pctx2, buf2, &t), 1)) in custom_params_test()
2934 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &t), 1) in custom_params_test()
2937 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &t), 1) in custom_params_test()
H A Dbad_dtls_test.c80 EVP_PKEY_derive(pctx, out, &outlen); in do_PRF()
H A Devp_test.c1976 if (EVP_PKEY_derive(dctx, NULL, &got_len) <= 0 in pderive_test_run()
1985 if (EVP_PKEY_derive(dctx, got, &got_len) <= 0) { in pderive_test_run()
2891 if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) { in pkey_kdf_test_run()
2899 * EVP_PKEY_derive() can cope with it. in pkey_kdf_test_run()
2911 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) { in pkey_kdf_test_run()
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dderive.rs121 /// This corresponds to [`EVP_PKEY_derive`].
124 /// [`EVP_PKEY_derive`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_derive_init.html
128 cvt(ffi::EVP_PKEY_derive(self.0, ptr::null_mut(), &mut len)).map(|_| len) in len()
136 /// This corresponds to [`EVP_PKEY_derive`].
138 /// [`EVP_PKEY_derive`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_derive_init.html
142 cvt(ffi::EVP_PKEY_derive( in derive()
H A Dpkey_ctx.rs683 #[corresponds(EVP_PKEY_derive)]
687 cvt(ffi::EVP_PKEY_derive( in derive()
/third_party/openssl/demos/keyexch/
H A Dx25519.c158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after()
159 fprintf(stderr, "EVP_PKEY_derive() failed\n"); in keyexch_x25519_after()
181 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after()
183 fprintf(stderr, "EVP_PKEY_derive() failed\n"); in keyexch_x25519_after()
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/
H A Dopenssl.c369 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf_extract()
423 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf_expand()
478 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf()
/third_party/node/src/crypto/
H A Dcrypto_hkdf.cc129 // the extraction step ourselves because EVP_PKEY_derive does not handle in DeriveBits()
150 if (EVP_PKEY_derive(ctx.get(), buf.data<unsigned char>(), &length) <= 0) in DeriveBits()
H A Dcrypto_dh.cc633 EVP_PKEY_derive(ctx.get(), nullptr, &out_size) <= 0) in StatelessDiffieHellmanThreadsafe()
637 if (EVP_PKEY_derive(ctx.get(), out.data<unsigned char>(), &out_size) <= 0) { in StatelessDiffieHellmanThreadsafe()
H A Dcrypto_ec.cc505 EVP_PKEY_derive(ctx.get(), nullptr, &len) <= 0) { in DeriveBits()
511 if (EVP_PKEY_derive(ctx.get(), buf.data<unsigned char>(), &len) <= 0) { in DeriveBits()
/third_party/node/deps/openssl/openssl/apps/
H A Dspeed.c885 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop()
992 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop()
2624 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main()
2636 * we try this here and assume that further EVP_PKEY_derive calls in speed_main()
2643 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main()
2644 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main()
2645 || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main()
3045 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main()
3058 if (EVP_PKEY_derive(ffdh_ctx, in speed_main()
3078 EVP_PKEY_derive(test_ct in speed_main()
[all...]
H A Dpkeyutl.c704 rv = EVP_PKEY_derive(ctx, out, poutlen); in do_keyop()
/third_party/openssl/apps/
H A Dspeed.c885 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop()
992 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop()
2610 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main()
2622 * we try this here and assume that further EVP_PKEY_derive calls in speed_main()
2629 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main()
2630 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main()
2631 || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main()
3031 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main()
3044 if (EVP_PKEY_derive(ffdh_ctx, in speed_main()
3064 EVP_PKEY_derive(test_ct in speed_main()
[all...]
H A Dpkeyutl.c704 rv = EVP_PKEY_derive(ctx, out, poutlen); in do_keyop()
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dexchange.c505 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) in EVP_PKEY_derive() function
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_kari.c225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
/third_party/openssl/crypto/cms/
H A Dcms_kari.c225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
/third_party/openssl/crypto/evp/
H A Dexchange.c505 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) in EVP_PKEY_derive() function
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Devp.rs531 pub fn EVP_PKEY_derive(ctx: *mut EVP_PKEY_CTX, key: *mut c_uchar, size: *mut size_t) -> c_int; in EVP_PKEY_derive() functions
/third_party/node/deps/openssl/openssl/providers/fips/
H A Dself_test_kats.c416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
/third_party/openssl/providers/fips/
H A Dself_test_kats.c416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_openssl.c2146 EVP_PKEY_derive(ctx, NULL, &secret_len) != 1) { in crypto_ecdh_set_peerkey()
2148 "OpenSSL: EVP_PKEY_derive(1) failed: %s", in crypto_ecdh_set_peerkey()
2156 if (EVP_PKEY_derive(ctx, wpabuf_put(secret, 0), &secret_len) != 1) { in crypto_ecdh_set_peerkey()
2158 "OpenSSL: EVP_PKEY_derive(2) failed: %s", in crypto_ecdh_set_peerkey()
2164 "OpenSSL: EVP_PKEY_derive(2) changed secret_len %d -> %d", in crypto_ecdh_set_peerkey()
/third_party/node/deps/openssl/openssl/ssl/
H A Ds3_lib.c4808 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) { in ssl_derive()
4822 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) { in ssl_derive()
/third_party/openssl/ssl/
H A Ds3_lib.c4808 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) { in ssl_derive()
4822 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) { in ssl_derive()

Completed in 50 milliseconds

12