/third_party/node/deps/openssl/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 41 ECX_KEY *peerkey; member 110 ossl_ecx_key_free(ecxctx->peerkey); in ecx_set_peer() 111 ecxctx->peerkey = key; in ecx_set_peer() 126 || ecxctx->peerkey == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 158 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 174 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 189 ossl_ecx_key_free(ecxctx->peerkey); in ecx_freectx() 215 if (dstctx->peerkey ! in ecx_dupctx() [all...] |
/third_party/openssl/providers/implementations/exchange/ |
H A D | ecx_exch.c | 41 ECX_KEY *peerkey; member 110 ossl_ecx_key_free(ecxctx->peerkey); in ecx_set_peer() 111 ecxctx->peerkey = key; in ecx_set_peer() 126 || ecxctx->peerkey == NULL) { in ecx_derive() 150 if (s390x_x25519_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 158 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 166 if (s390x_x448_mul(secret, ecxctx->peerkey->pubkey, in ecx_derive() 174 ecxctx->peerkey->pubkey) == 0) { in ecx_derive() 189 ossl_ecx_key_free(ecxctx->peerkey); in ecx_freectx() 215 if (dstctx->peerkey ! in ecx_dupctx() [all...] |
/third_party/openssl/test/ |
H A D | tls-provider.c | 228 XORKEY *peerkey; member 261 pxorctx->peerkey = vpeerkey; in xor_set_peer() 271 if (pxorctx->key == NULL || pxorctx->peerkey == NULL) in xor_derive() 282 secret[i] = pxorctx->key->privkey[i] ^ pxorctx->peerkey->pubkey[i]; in xor_derive() 400 XORKEY *peerkey = NULL; in xor_decapsulate() local 413 peerkey = xor_newdata(pxorctx->provctx); in xor_decapsulate() 414 if (peerkey == NULL) in xor_decapsulate() 416 memcpy(peerkey->pubkey, ct, XOR_KEY_SIZE); in xor_decapsulate() 422 || !xor_set_peer(derivectx, peerkey) in xor_decapsulate() 429 xor_freedata(peerkey); in xor_decapsulate() [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | pkeyutl.c | 75 {"peerkey", OPT_PEERKEY, 's', "Peer key file used in key derivation"}, 121 const char *peerkey = NULL; in pkeyutl_main() local 160 peerkey = opt_arg(); in pkeyutl_main() 293 } else if (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE) { in pkeyutl_main() 295 "%s: no peer key given (-peerkey parameter).\n", prog); in pkeyutl_main() 312 if (peerkey != NULL && !setup_peer(ctx, peerform, peerkey, e)) { in pkeyutl_main()
|
/third_party/openssl/apps/ |
H A D | pkeyutl.c | 75 {"peerkey", OPT_PEERKEY, 's', "Peer key file used in key derivation"}, 121 const char *peerkey = NULL; in pkeyutl_main() local 160 peerkey = opt_arg(); in pkeyutl_main() 293 } else if (peerkey != NULL && pkey_op != EVP_PKEY_OP_DERIVE) { in pkeyutl_main() 295 "%s: no peer key given (-peerkey parameter).\n", prog); in pkeyutl_main() 312 if (peerkey != NULL && !setup_peer(ctx, peerform, peerkey, e)) { in pkeyutl_main()
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | exchange.c | 485 EVP_PKEY_free(ctx->peerkey); in EVP_PKEY_derive_set_peer_ex() 486 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer_ex() 491 ctx->peerkey = NULL; in EVP_PKEY_derive_set_peer_ex()
|
H A D | pmeth_lib.c | 426 EVP_PKEY_free(ctx->peerkey); in EVP_PKEY_CTX_free() 598 if (pctx->peerkey != NULL) in EVP_PKEY_CTX_dup() 599 EVP_PKEY_up_ref(pctx->peerkey); in EVP_PKEY_CTX_dup() 600 rctx->peerkey = pctx->peerkey; in EVP_PKEY_CTX_dup() 1658 return ctx->peerkey; in EVP_PKEY_CTX_get0_peerkey()
|
/third_party/openssl/crypto/evp/ |
H A D | exchange.c | 485 EVP_PKEY_free(ctx->peerkey); in EVP_PKEY_derive_set_peer_ex() 486 ctx->peerkey = peer; in EVP_PKEY_derive_set_peer_ex() 491 ctx->peerkey = NULL; in EVP_PKEY_derive_set_peer_ex()
|
H A D | pmeth_lib.c | 425 EVP_PKEY_free(ctx->peerkey); in EVP_PKEY_CTX_free() 597 if (pctx->peerkey != NULL) in EVP_PKEY_CTX_dup() 598 EVP_PKEY_up_ref(pctx->peerkey); in EVP_PKEY_CTX_dup() 599 rctx->peerkey = pctx->peerkey; in EVP_PKEY_CTX_dup() 1657 return ctx->peerkey; in EVP_PKEY_CTX_get0_peerkey()
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecx_meth.c | 729 const ECX_KEY *ecxkey, *peerkey; in validate_ecx_derive() local 731 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in validate_ecx_derive() 736 peerkey = evp_pkey_get_legacy(ctx->peerkey); in validate_ecx_derive() 741 if (peerkey == NULL) { in validate_ecx_derive() 746 *pubkey = peerkey->pubkey; in validate_ecx_derive()
|
H A D | ec_pmeth.c | 177 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in pkey_ec_derive() 181 eckeypub = EVP_PKEY_get0_EC_KEY(ctx->peerkey); in pkey_ec_derive()
|
/third_party/openssl/crypto/ec/ |
H A D | ecx_meth.c | 729 const ECX_KEY *ecxkey, *peerkey; in validate_ecx_derive() local 731 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in validate_ecx_derive() 736 peerkey = evp_pkey_get_legacy(ctx->peerkey); in validate_ecx_derive() 741 if (peerkey == NULL) { in validate_ecx_derive() 746 *pubkey = peerkey->pubkey; in validate_ecx_derive()
|
H A D | ec_pmeth.c | 177 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in pkey_ec_derive() 181 eckeypub = EVP_PKEY_get0_EC_KEY(ctx->peerkey); in pkey_ec_derive()
|
/third_party/node/deps/openssl/openssl/providers/fips/ |
H A D | self_test_kats.c | 367 EVP_PKEY *pkey = NULL, *peerkey = NULL; in self_test_ka() local 406 || EVP_PKEY_fromdata(kactx, &peerkey, EVP_PKEY_KEYPAIR, params_peer) <= 0) in self_test_ka() 415 || EVP_PKEY_derive_set_peer(dctx, peerkey) <= 0 in self_test_ka() 428 EVP_PKEY_free(peerkey); in self_test_ka()
|
/third_party/openssl/providers/fips/ |
H A D | self_test_kats.c | 367 EVP_PKEY *pkey = NULL, *peerkey = NULL; in self_test_ka() local 406 || EVP_PKEY_fromdata(kactx, &peerkey, EVP_PKEY_KEYPAIR, params_peer) <= 0) in self_test_ka() 415 || EVP_PKEY_derive_set_peer(dctx, peerkey) <= 0 in self_test_ka() 428 EVP_PKEY_free(peerkey); in self_test_ka()
|
/third_party/node/deps/openssl/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 407 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in pkey_dh_derive() 412 dhpub = EVP_PKEY_get0_DH(ctx->peerkey); in pkey_dh_derive()
|
/third_party/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 407 if (ctx->pkey == NULL || ctx->peerkey == NULL) { in pkey_dh_derive() 412 dhpub = EVP_PKEY_get0_DH(ctx->peerkey); in pkey_dh_derive()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_openssl.c | 2093 EVP_PKEY *peerkey = NULL; in crypto_ecdh_set_peerkey() local 2139 peerkey = EVP_PKEY_new(); in crypto_ecdh_set_peerkey() 2140 if (!peerkey || EVP_PKEY_set1_EC_KEY(peerkey, eckey) != 1) in crypto_ecdh_set_peerkey() 2145 EVP_PKEY_derive_set_peer(ctx, peerkey) != 1 || in crypto_ecdh_set_peerkey() 2174 EVP_PKEY_free(peerkey); in crypto_ecdh_set_peerkey()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_openssl.c | 2207 EVP_PKEY *peerkey = NULL; in crypto_ecdh_set_peerkey() local 2253 peerkey = EVP_PKEY_new(); in crypto_ecdh_set_peerkey() 2254 if (!peerkey || EVP_PKEY_set1_EC_KEY(peerkey, eckey) != 1) in crypto_ecdh_set_peerkey() 2259 EVP_PKEY_derive_set_peer(ctx, peerkey) != 1 || in crypto_ecdh_set_peerkey() 2288 EVP_PKEY_free(peerkey); in crypto_ecdh_set_peerkey()
|
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | evp.h | 27 EVP_PKEY *peerkey; member
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | evp.h | 119 EVP_PKEY *peerkey; member
|
/third_party/openssl/include/crypto/ |
H A D | evp.h | 119 EVP_PKEY *peerkey; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | config.c | 2119 wpa_printf(MSG_INFO, "NOTE: Obsolete peerkey parameter ignored"); in wpa_config_parse_peerkey() 2323 { FUNC(peerkey) /* obsolete - removed */ },
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | config.c | 2428 wpa_printf(MSG_INFO, "NOTE: Obsolete peerkey parameter ignored"); in wpa_config_parse_peerkey() 2676 { FUNC(peerkey) /* obsolete - removed */ },
|