Buckets:
| /* | |
| * Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved. | |
| * | |
| * Licensed under the Apache License 2.0 (the "License"). You may not use | |
| * this file except in compliance with the License. You can obtain a copy | |
| * in the file LICENSE in the source distribution or at | |
| * https://www.openssl.org/source/license.html | |
| */ | |
| extern "C" { | |
| int EVP_KDF_up_ref(EVP_KDF *kdf); | |
| void EVP_KDF_free(EVP_KDF *kdf); | |
| EVP_KDF *EVP_KDF_fetch(OSSL_LIB_CTX *libctx, const char *algorithm, | |
| const char *properties); | |
| EVP_KDF_CTX *EVP_KDF_CTX_new(EVP_KDF *kdf); | |
| void EVP_KDF_CTX_free(EVP_KDF_CTX *ctx); | |
| EVP_KDF_CTX *EVP_KDF_CTX_dup(const EVP_KDF_CTX *src); | |
| const char *EVP_KDF_get0_description(const EVP_KDF *kdf); | |
| int EVP_KDF_is_a(const EVP_KDF *kdf, const char *name); | |
| const char *EVP_KDF_get0_name(const EVP_KDF *kdf); | |
| const OSSL_PROVIDER *EVP_KDF_get0_provider(const EVP_KDF *kdf); | |
| const EVP_KDF *EVP_KDF_CTX_kdf(EVP_KDF_CTX *ctx); | |
| void EVP_KDF_CTX_reset(EVP_KDF_CTX *ctx); | |
| size_t EVP_KDF_CTX_get_kdf_size(EVP_KDF_CTX *ctx); | |
| int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen, | |
| const OSSL_PARAM params[]); | |
| int EVP_KDF_CTX_set_SKEY(EVP_KDF_CTX *ctx, EVP_SKEY *key, const char *paramname); | |
| EVP_SKEY *EVP_KDF_derive_SKEY(EVP_KDF_CTX *ctx, EVP_SKEYMGMT *mgmt, | |
| const char *key_type, const char *propquery, | |
| size_t keylen, const OSSL_PARAM params[]); | |
| int EVP_KDF_get_params(EVP_KDF *kdf, OSSL_PARAM params[]); | |
| int EVP_KDF_CTX_get_params(EVP_KDF_CTX *ctx, OSSL_PARAM params[]); | |
| int EVP_KDF_CTX_set_params(EVP_KDF_CTX *ctx, const OSSL_PARAM params[]); | |
| const OSSL_PARAM *EVP_KDF_gettable_params(const EVP_KDF *kdf); | |
| const OSSL_PARAM *EVP_KDF_gettable_ctx_params(const EVP_KDF *kdf); | |
| const OSSL_PARAM *EVP_KDF_settable_ctx_params(const EVP_KDF *kdf); | |
| const OSSL_PARAM *EVP_KDF_CTX_gettable_params(EVP_KDF_CTX *ctx); | |
| const OSSL_PARAM *EVP_KDF_CTX_settable_params(EVP_KDF_CTX *ctx); | |
| void EVP_KDF_do_all_provided(OSSL_LIB_CTX *libctx, | |
| void (*fn)(EVP_KDF *kdf, void *arg), | |
| void *arg); | |
| int EVP_KDF_names_do_all(const EVP_KDF *kdf, | |
| void (*fn)(const char *name, void *data), | |
| void *data); | |
| /**** The legacy PKEY-based KDF API follows. ****/ | |
| int EVP_PKEY_CTX_set_tls1_prf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); | |
| int EVP_PKEY_CTX_set1_tls1_prf_secret(EVP_PKEY_CTX *pctx, | |
| const unsigned char *sec, int seclen); | |
| int EVP_PKEY_CTX_add1_tls1_prf_seed(EVP_PKEY_CTX *pctx, | |
| const unsigned char *seed, int seedlen); | |
| int EVP_PKEY_CTX_set_hkdf_md(EVP_PKEY_CTX *ctx, const EVP_MD *md); | |
| int EVP_PKEY_CTX_set1_hkdf_salt(EVP_PKEY_CTX *ctx, | |
| const unsigned char *salt, int saltlen); | |
| int EVP_PKEY_CTX_set1_hkdf_key(EVP_PKEY_CTX *ctx, | |
| const unsigned char *key, int keylen); | |
| int EVP_PKEY_CTX_add1_hkdf_info(EVP_PKEY_CTX *ctx, | |
| const unsigned char *info, int infolen); | |
| int EVP_PKEY_CTX_set_hkdf_mode(EVP_PKEY_CTX *ctx, int mode); | |
| int EVP_PKEY_CTX_set1_pbe_pass(EVP_PKEY_CTX *ctx, const char *pass, | |
| int passlen); | |
| int EVP_PKEY_CTX_set1_scrypt_salt(EVP_PKEY_CTX *ctx, | |
| const unsigned char *salt, int saltlen); | |
| int EVP_PKEY_CTX_set_scrypt_N(EVP_PKEY_CTX *ctx, uint64_t n); | |
| int EVP_PKEY_CTX_set_scrypt_r(EVP_PKEY_CTX *ctx, uint64_t r); | |
| int EVP_PKEY_CTX_set_scrypt_p(EVP_PKEY_CTX *ctx, uint64_t p); | |
| int EVP_PKEY_CTX_set_scrypt_maxmem_bytes(EVP_PKEY_CTX *ctx, | |
| uint64_t maxmem_bytes); | |
| } | |
Xet Storage Details
- Size:
- 5.18 kB
- Xet hash:
- 4cfde7a1ded66845e0261e3980d806e22a832434d7400a228696957d17bab800
·
Xet efficiently stores files, intelligently splitting them into unique chunks and accelerating uploads and downloads. More info.