/openssl-master/crypto/evp/ |
A D | exchange.c | 25 if (exchange == NULL) { in evp_keyexch_new() 36 exchange->prov = prov; in evp_keyexch_new() 38 exchange->refcnt = 1; in evp_keyexch_new() 40 return exchange; in evp_keyexch_new() 140 return exchange; in evp_keyexch_from_algorithm() 153 CRYPTO_DOWN_REF(&exchange->refcnt, &i, exchange->lock); in EVP_KEYEXCH_free() 166 CRYPTO_UP_REF(&exchange->refcnt, &ref, exchange->lock); in EVP_KEYEXCH_up_ref() 289 exchange = in EVP_PKEY_derive_init_ex() 296 exchange = in EVP_PKEY_derive_init_ex() 335 ctx->op.kex.exchange = exchange; in EVP_PKEY_derive_init_ex() [all …]
|
A D | pmeth_lib.c | 388 EVP_KEYEXCH_free(ctx->op.kex.exchange); in evp_pkey_ctx_free_old_ops() 390 ctx->op.kex.exchange = NULL; in evp_pkey_ctx_free_old_ops() 504 if (pctx->op.kex.exchange != NULL) { in EVP_PKEY_CTX_dup() 505 rctx->op.kex.exchange = pctx->op.kex.exchange; in EVP_PKEY_CTX_dup() 515 EVP_KEYEXCH_free(rctx->op.kex.exchange); in EVP_PKEY_CTX_dup() 516 rctx->op.kex.exchange = NULL; in EVP_PKEY_CTX_dup() 681 && ctx->op.kex.exchange != NULL in EVP_PKEY_CTX_set_params() 725 && ctx->op.kex.exchange != NULL in EVP_PKEY_CTX_get_params() 764 && ctx->op.kex.exchange != NULL in EVP_PKEY_CTX_gettable_params() 801 && ctx->op.kex.exchange != NULL in EVP_PKEY_CTX_settable_params() [all …]
|
A D | build.info | 4 m_sigver.c pmeth_lib.c signature.c p_lib.c pmeth_gn.c exchange.c \
|
/openssl-master/doc/man3/ |
A D | EVP_KEYEXCH_free.pod | 17 void EVP_KEYEXCH_free(EVP_KEYEXCH *exchange); 18 int EVP_KEYEXCH_up_ref(EVP_KEYEXCH *exchange); 19 OSSL_PROVIDER *EVP_KEYEXCH_get0_provider(const EVP_KEYEXCH *exchange); 20 int EVP_KEYEXCH_is_a(const EVP_KEYEXCH *exchange, const char *name); 21 const char *EVP_KEYEXCH_get0_name(const EVP_KEYEXCH *exchange); 25 int EVP_KEYEXCH_names_do_all(const EVP_KEYEXCH *exchange, 49 EVP_KEYEXCH_get0_provider() returns the provider that I<exchange> was 52 EVP_KEYEXCH_is_a() checks if I<exchange> is an implementation of an 56 implementation for the given I<exchange>. Note that the I<exchange> may have 59 by the I<exchange> object and should not be freed by the caller. [all …]
|
A D | EVP_PKEY_set1_encoded_public_key.pod | 31 currently only works for those that support key exchange. Parameters are not 72 performing a key exchange operation. 74 =head2 Set up a peer's EVP_PKEY ready for a key exchange operation 78 int exchange(EVP_PKEY *ourkey, unsigned char *peer_pub, size_t peer_pub_len) 89 /* Do the key exchange here */
|
A D | SSL_CTX_set_tmp_dh_callback.pod | 8 - handle DH keys for ephemeral key exchange 37 Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these 43 Using ephemeral DH key exchange yields forward secrecy as the connection 50 In order to perform a DH key exchange the server must use a DH group
|
A D | SSL_CIPHER_get_name.pod | 75 SSL_CIPHER_get_kx_nid() returns the key exchange NID corresponding to the method 76 used by B<c>. If there is no key exchange, then B<NID_undef> is returned. 77 If any appropriate key exchange algorithm can be used (as in the case of TLS 1.3 132 =item Kx=<key exchange> 134 Key exchange method such as B<RSA>, B<ECDHE>, etc.
|
A D | DH_generate_key.pod | 6 Diffie-Hellman key exchange 29 exchange by generating private and public DH values. By calling
|
A D | BN_swap.pod | 5 BN_swap - exchange BIGNUMs
|
A D | SSL_CTX_set1_curves.pod | 81 the handshake key exchange process. For TLSv1.3 connections this typically 85 used for key exchange during the initial handshake (otherwise it is from the 119 key exchange, or NID_undef if there was no negotiated group.
|
A D | SSL_CTX_set_tmp_ecdh.pod | 6 - handle ECDH keys for ephemeral key exchange
|
A D | SSL_CTX_set_srp_password.pod | 74 If not satisfied by the server key exchange the connection will be rejected. 83 This callback should setup the server for the key exchange by calling 88 The callback should return B<SSL_ERROR_NONE> to proceed with the server key exchange,
|
A D | SSL_get_peer_tmp_key.pod | 19 used during key exchange. For example, if ECDHE is in use, then this represents
|
A D | SSL_get_peer_signature_nid.pod | 37 uses RSA key exchange or is anonymous), the TLS version is below 1.2 or
|
A D | RAND_get0_primary.pod | 58 It is also possible to exchange the reseeding callbacks entirely.
|
/openssl-master/doc/man7/ |
A D | provider-keyexch.pod | 45 The key exchange (OSSL_OP_KEYEXCH) operation enables providers to implement key 46 exchange algorithms and make them available to applications via 87 A key exchange algorithm must also implement some mechanism for generating, 94 structure for holding context information during a key exchange operation. 96 exchange operation function calls. 120 It is also passed a previously initialised key exchange context in the I<ctx> 128 A previously initialised key exchange context is passed in the I<ctx> 139 given provider side key exchange context I<ctx> to I<params>, 145 given provider side key exchange context I<ctx> into I<params>, 175 Sets the padding mode for the associated key exchange ctx. [all …]
|
A D | EVP_KEYEXCH-ECDH.pod | 9 Key exchange support for the B<ECDH> key type. 17 Sets or gets the ECDH mode of operation for the associated key exchange ctx. 19 In the context of an Elliptic Curve Diffie-Hellman key exchange, this parameter 21 Diffie-Hellman (CDH) variants of the key exchange algorithm. 25 given key exchange ctx. 37 exchange ctx. 42 associated with the given key exchange ctx. 48 exchange ctx. 53 associated with the given key exchange ctx. 59 Function associated with the given key exchange ctx. [all …]
|
A D | EVP_KEYEXCH-DH.pod | 10 Key exchange support for the B<DH> key type. 12 =head2 DH key exchange parameters 23 Function associated with the given key exchange ctx. 28 Key Derivation Function associated with the given key exchange ctx. Providers
|
A D | EVP_KEYEXCH-X25519.pod | 11 Key exchange support for the B<X25519> and B<X448> key types. 13 =head2 Key exchange parameters
|
A D | EVP_PKEY-X25519.pod | 31 with other key exchange algorithms and is typically not needed.
|
/openssl-master/providers/implementations/ |
A D | build.info | 1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
|
/openssl-master/doc/man1/ |
A D | openssl-list.pod.in | 32 [B<-key-exchange-algorithms>] 139 The options B<key-exchange-algorithms>, B<kem-algorithms>, 150 =item B<-key-exchange-algorithms> 152 Display a list of key exchange algorithms.
|
/openssl-master/doc/internal/man3/ |
A D | evp_md_get_number.pod | 19 int evp_keyexch_get_number(const EVP_KEYEXCH *exchange); 57 Returns the internal dynamic number assigned to the I<exchange>.
|
/openssl-master/test/ssl-tests/ |
A D | 20-cert-select.cnf | 17 test-12 = 12-RSA key exchange with all RSA certificate types 38 test-33 = 33-RSA key exchange with only RSA-PSS certificate 446 [12-RSA key exchange with all RSA certificate types] 447 ssl_conf = 12-RSA key exchange with all RSA certificate types-ssl 449 [12-RSA key exchange with all RSA certificate types-ssl] 453 [12-RSA key exchange with all RSA certificate types-server] 460 [12-RSA key exchange with all RSA certificate types-client] 1089 [33-RSA key exchange with only RSA-PSS certificate] 1092 [33-RSA key exchange with only RSA-PSS certificate-ssl] 1096 [33-RSA key exchange with only RSA-PSS certificate-server] [all …]
|
/openssl-master/providers/ |
A D | fips.module.sources | 197 crypto/evp/exchange.c 533 providers/implementations/exchange/dh_exch.c 534 providers/implementations/exchange/ecdh_exch.c 535 providers/implementations/exchange/ecx_exch.c 536 providers/implementations/exchange/kdf_exch.c
|