/third_party/openssl/test/ |
H A D | pkey_meth_kdf_test.c | 48 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_tls1_prf() 49 TEST_error("EVP_PKEY_derive"); in test_kdf_tls1_prf() 102 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_hkdf() 103 TEST_error("EVP_PKEY_derive"); in test_kdf_hkdf() 161 if (EVP_PKEY_derive(pctx, out, &outlen) > 0) { in test_kdf_scrypt() 162 TEST_error("EVP_PKEY_derive should have failed"); in test_kdf_scrypt() 169 if (EVP_PKEY_derive(pctx, out, &outlen) <= 0) { in test_kdf_scrypt() 170 TEST_error("EVP_PKEY_derive"); in test_kdf_scrypt()
|
H A D | ectest.c | 2877 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &sslen), 1) in custom_params_test() 2879 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &sslen), 1)) in custom_params_test() 2884 || !TEST_int_eq(EVP_PKEY_derive(pctx2, NULL, &t), 1) in custom_params_test() 2887 || !TEST_int_eq(EVP_PKEY_derive(pctx2, buf2, &t), 1)) in custom_params_test() 2934 || !TEST_int_eq(EVP_PKEY_derive(pctx1, NULL, &t), 1) in custom_params_test() 2937 || !TEST_int_eq(EVP_PKEY_derive(pctx1, buf1, &t), 1) in custom_params_test()
|
H A D | bad_dtls_test.c | 80 EVP_PKEY_derive(pctx, out, &outlen); in do_PRF()
|
H A D | evp_test.c | 1976 if (EVP_PKEY_derive(dctx, NULL, &got_len) <= 0 in pderive_test_run() 1985 if (EVP_PKEY_derive(dctx, got, &got_len) <= 0) { in pderive_test_run() 2891 if (EVP_PKEY_derive(expected->ctx, NULL, &got_len) <= 0) { in pkey_kdf_test_run() 2899 * EVP_PKEY_derive() can cope with it. in pkey_kdf_test_run() 2911 if (EVP_PKEY_derive(expected->ctx, got, &got_len) <= 0) { in pkey_kdf_test_run()
|
/third_party/rust/crates/rust-openssl/openssl/src/ |
H A D | derive.rs | 121 /// This corresponds to [`EVP_PKEY_derive`]. 124 /// [`EVP_PKEY_derive`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_derive_init.html 128 cvt(ffi::EVP_PKEY_derive(self.0, ptr::null_mut(), &mut len)).map(|_| len) in len() 136 /// This corresponds to [`EVP_PKEY_derive`]. 138 /// [`EVP_PKEY_derive`]: https://www.openssl.org/docs/manmaster/crypto/EVP_PKEY_derive_init.html 142 cvt(ffi::EVP_PKEY_derive( in derive()
|
H A D | pkey_ctx.rs | 683 #[corresponds(EVP_PKEY_derive)] 687 cvt(ffi::EVP_PKEY_derive( in derive()
|
/third_party/openssl/demos/keyexch/ |
H A D | x25519.c | 158 if (EVP_PKEY_derive(ctx, NULL, &local_peer->secret_len) == 0) { in keyexch_x25519_after() 159 fprintf(stderr, "EVP_PKEY_derive() failed\n"); in keyexch_x25519_after() 181 if (EVP_PKEY_derive(ctx, local_peer->secret, in keyexch_x25519_after() 183 fprintf(stderr, "EVP_PKEY_derive() failed\n"); in keyexch_x25519_after()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 369 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf_extract() 423 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf_expand() 478 EVP_PKEY_derive(pctx, dest, &destlen) != 1) { in ngtcp2_crypto_hkdf()
|
/third_party/node/src/crypto/ |
H A D | crypto_hkdf.cc | 129 // the extraction step ourselves because EVP_PKEY_derive does not handle in DeriveBits() 150 if (EVP_PKEY_derive(ctx.get(), buf.data<unsigned char>(), &length) <= 0) in DeriveBits()
|
H A D | crypto_dh.cc | 633 EVP_PKEY_derive(ctx.get(), nullptr, &out_size) <= 0) in StatelessDiffieHellmanThreadsafe() 637 if (EVP_PKEY_derive(ctx.get(), out.data<unsigned char>(), &out_size) <= 0) { in StatelessDiffieHellmanThreadsafe()
|
H A D | crypto_ec.cc | 505 EVP_PKEY_derive(ctx.get(), nullptr, &len) <= 0) { in DeriveBits() 511 if (EVP_PKEY_derive(ctx.get(), buf.data<unsigned char>(), &len) <= 0) { in DeriveBits()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | speed.c | 885 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop() 992 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop() 2624 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main() 2636 * we try this here and assume that further EVP_PKEY_derive calls in speed_main() 2643 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main() 2644 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main() 2645 || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main() 3045 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main() 3058 if (EVP_PKEY_derive(ffdh_ctx, in speed_main() 3078 EVP_PKEY_derive(test_ct in speed_main() [all...] |
H A D | pkeyutl.c | 704 rv = EVP_PKEY_derive(ctx, out, poutlen); in do_keyop()
|
/third_party/openssl/apps/ |
H A D | speed.c | 885 EVP_PKEY_derive(ffdh_ctx, derived_secret, &outlen); in FFDH_derive_key_loop() 992 EVP_PKEY_derive(ctx, derived_secret, outlen); in ECDH_EVP_derive_key_loop() 2610 || EVP_PKEY_derive(ctx, NULL, &outlen) <= 0 /* determine max length */ in speed_main() 2622 * we try this here and assume that further EVP_PKEY_derive calls in speed_main() 2629 || EVP_PKEY_derive(test_ctx, NULL, &test_outlen) <= 0 /* determine max length */ in speed_main() 2630 || EVP_PKEY_derive(ctx, loopargs[i].secret_a, &outlen) <= 0 /* compute a*B */ in speed_main() 2631 || EVP_PKEY_derive(test_ctx, loopargs[i].secret_b, &test_outlen) <= 0 /* compute b*A */ in speed_main() 3031 if (EVP_PKEY_derive(ffdh_ctx, NULL, &secret_size) <= 0) { in speed_main() 3044 if (EVP_PKEY_derive(ffdh_ctx, in speed_main() 3064 EVP_PKEY_derive(test_ct in speed_main() [all...] |
H A D | pkeyutl.c | 704 rv = EVP_PKEY_derive(ctx, out, poutlen); in do_keyop()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | exchange.c | 505 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) in EVP_PKEY_derive() function
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_kari.c | 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
|
/third_party/openssl/crypto/cms/ |
H A D | cms_kari.c | 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) in cms_kek_cipher()
|
/third_party/openssl/crypto/evp/ |
H A D | exchange.c | 505 int EVP_PKEY_derive(EVP_PKEY_CTX *ctx, unsigned char *key, size_t *pkeylen) in EVP_PKEY_derive() function
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
H A D | evp.rs | 531 pub fn EVP_PKEY_derive(ctx: *mut EVP_PKEY_CTX, key: *mut c_uchar, size: *mut size_t) -> c_int; in EVP_PKEY_derive() functions
|
/third_party/node/deps/openssl/openssl/providers/fips/ |
H A D | self_test_kats.c | 416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
|
/third_party/openssl/providers/fips/ |
H A D | self_test_kats.c | 416 || EVP_PKEY_derive(dctx, secret, &secret_len) <= 0) in self_test_ka()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_openssl.c | 2146 EVP_PKEY_derive(ctx, NULL, &secret_len) != 1) { in crypto_ecdh_set_peerkey() 2148 "OpenSSL: EVP_PKEY_derive(1) failed: %s", in crypto_ecdh_set_peerkey() 2156 if (EVP_PKEY_derive(ctx, wpabuf_put(secret, 0), &secret_len) != 1) { in crypto_ecdh_set_peerkey() 2158 "OpenSSL: EVP_PKEY_derive(2) failed: %s", in crypto_ecdh_set_peerkey() 2164 "OpenSSL: EVP_PKEY_derive(2) changed secret_len %d -> %d", in crypto_ecdh_set_peerkey()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | s3_lib.c | 4808 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) { in ssl_derive() 4822 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) { in ssl_derive()
|
/third_party/openssl/ssl/ |
H A D | s3_lib.c | 4808 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) { in ssl_derive() 4822 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) { in ssl_derive()
|