15 + EVP_add_kdf(&pbkdf2_kdf_meth); 16 + #ifndef OPENSSL_NO_SCRYPT 17 + EVP_add_kdf(&scrypt_kdf_meth); 18 + #endif 19 + EVP_add_kdf(&tls1_prf_kdf_meth); 20 + EVP_add_kdf(&hkdf_kdf_meth); 21 + EVP_add_kdf(&sshkdf_kdf_meth); 22 + EVP_add_kdf(&ss_kdf...
if C.go_openssl_EVP_PKEY_derive_wrapper(ctx, base(result), outLen).result != 1 { @@ -106,3 +109,52 @@ func TLS1PRF(result, secret, label, seed []byte, fh func() hash.Hash) error { } return nil } // fetchTLS1PRF3 fetches the TLS1-PRF KDF algorithm. // It is safe to...
> EVP_KDF_ctrl > 0000000000000000 DF *UND* 0000000000000000 OPENSSL_1_1_1b > EVP_KDF_CTX_new_id > 0000000000000000 DF *UND* 0000000000000000 OPENSSL_1_1_1b > EVP_KDF_CTX_free > 0000000000000000 DF *UND* 0000000000000000 OPENSSL_1_1_1b > EVP_KDF_derive > > # objdump -TC libssl.so....
params[1] = OSSL_PARAM_construct_utf8_string(OSSL_EXCHANGE_PARAM_KDF_DIGEST, "SHA1", 0); params[2] = OSSL_PARAM_construct_end(); if (EVP_PKEY_derive_init_ex(ctx, params) <= 0) exit(10); // // if (EVP_PKEY_derive_init(ctx) <= 0) // exit(10); if (EVP_PKEY_derive_se...
EVP_KDF_derive localhost ~/src/sentrypeer [main*]$ objdump -TC /usr/lib/libcrypto.so.1.1 |grep EVP_KDF 000efce0 g DF .text 00000087 OPENSSL_1_1_1b EVP_KDF_ctrl 000efd70 g DF .text 000000aa OPENSSL_1_1_1b EVP_KDF_ctrl_str 000eeaa0 g DF .text 00000021 OPENSSL_1_1_1b ...
,'/../lib' -lruby -lvirt -lm -lc" //usr/lib64/libk5crypto.so.3: undefined reference to `EVP_KDF_derive@OPENSSL_1_1_1b' //usr/lib64/libk5crypto.so.3: undefined reference to `EVP_KDF_ctrl@OPENSSL_1_1_1b' //usr/lib64/libk5crypto.so.3: undefined reference to `EVP_KDF_...
0000000000172990 T EVP_KDF_derive 0000000000172780 T EVP_KDF_reset 0000000000172960 T EVP_KDF_size 00000000001727b0 T EVP_KDF_vctrl However, with our own build, EVP_KDF is not found: $ nm -gD libcrypto.so.1.1 | grep EVP_KDF So, the question is: what configuration settings are necessary...
193 193 EVP_KDF_CTX_free(kctx); 194 194 return 0; @@ -361,7 +361,7 @@ static int derive_secret_key_and_iv(SSL_CONNECTION *s, const EVP_MD *md, 361 361 int mode, mac_mdleni; 362 362 363 363 /* Ensure cast to size_t is safe */ 364 - if (!ossl_assert(hashlen...
We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly Cancel Create saved search Sign in Sign up Reseting focus {...
else if (strcmp(name, "ecdh_kdf_md") == 0) 38 changes: 22 additions & 16 deletions 38 doc/man3/EVP_PKEY_CTX_ctrl.pod Original file line numberDiff line numberDiff line change @@ -9,6 +9,8 @@ EVP_PKEY_CTX_md, EVP_PKEY_CTX_set_signature_md, EVP_PKEY_CTX_get_signature_md...