Home
last modified time | relevance | path

Searched refs:prk (Results 1 - 23 of 23) sorted by relevance

/third_party/mbedtls/library/
H A Dhkdf.c34 unsigned char prk[MBEDTLS_MD_MAX_SIZE]; in mbedtls_hkdf() local
36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
39 ret = mbedtls_hkdf_expand(md, prk, mbedtls_md_get_size(md), in mbedtls_hkdf()
43 mbedtls_platform_zeroize(prk, sizeof(prk)); in mbedtls_hkdf()
51 unsigned char *prk) in mbedtls_hkdf_extract()
72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
75 int mbedtls_hkdf_expand(const mbedtls_md_info_t *md, const unsigned char *prk, in mbedtls_hkdf_expand() argument
133 ret = mbedtls_md_hmac_starts(&ctx, prk, prk_len); in mbedtls_hkdf_expand()
48 mbedtls_hkdf_extract(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk) mbedtls_hkdf_extract() argument
H A Dpsa_crypto.c5627 hkdf->prk, in psa_key_derivation_hkdf_read()
6758 /* Allow only input that fits expected prk size */ in psa_hkdf_input()
6763 memcpy(hkdf->prk, data, data_length); in psa_hkdf_input()
6792 hkdf->prk, in psa_hkdf_input()
6793 sizeof(hkdf->prk), in psa_hkdf_input()
6805 memcpy(hkdf->output_block, hkdf->prk, PSA_HASH_LENGTH(hash_alg)); in psa_hkdf_input()
/third_party/node/deps/openssl/openssl/crypto/dsa/
H A Ddsa_key.c47 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local
49 if (prk == NULL) in ossl_dsa_generate_public_key()
51 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key()
54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key()
58 BN_clear_free(prk); in ossl_dsa_generate_public_key()
/third_party/openssl/crypto/dsa/
H A Ddsa_key.c47 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local
49 if (prk == NULL) in ossl_dsa_generate_public_key()
51 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key()
54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key()
58 BN_clear_free(prk); in ossl_dsa_generate_public_key()
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dhkdf.c57 unsigned char *prk, size_t prk_len);
59 const unsigned char *prk, size_t prk_len,
401 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
416 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF()
417 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF()
449 unsigned char *prk, size_t prk_len) in HKDF_Extract()
462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract()
506 const unsigned char *prk, size_ in HKDF_Expand()
446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument
505 HKDF_Expand(const EVP_MD *evp_md, const unsigned char *prk, size_t prk_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF_Expand() argument
[all...]
/third_party/openssl/providers/implementations/kdfs/
H A Dhkdf.c57 unsigned char *prk, size_t prk_len);
59 const unsigned char *prk, size_t prk_len,
401 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local
412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
416 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF()
417 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF()
449 unsigned char *prk, size_t prk_len) in HKDF_Extract()
462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract()
506 const unsigned char *prk, size_ in HKDF_Expand()
446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument
505 HKDF_Expand(const EVP_MD *evp_md, const unsigned char *prk, size_t prk_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF_Expand() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_crypto.c370 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
378 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
381 prk, hash_len); in dpp_derive_k1()
384 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
385 os_memset(prk, 0, hash_len); in dpp_derive_k1()
397 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
405 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
409 prk, hash_len); in dpp_derive_k2()
412 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
413 os_memset(prk, in dpp_derive_k2()
1120 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_derive_pmk() local
1594 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_pkex_derive_z() local
1670 u8 prk[DPP_MAX_HASH_LEN]; dpp_reconfig_derive_ke_responder() local
1769 u8 prk[DPP_MAX_HASH_LEN]; dpp_reconfig_derive_ke_initiator() local
[all...]
H A Dsae.c537 u8 *prk) in hkdf_extract()
541 prk); in hkdf_extract()
545 prk); in hkdf_extract()
550 prk); in hkdf_extract()
556 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument
562 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand()
567 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand()
573 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
535 hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, size_t num_elem, const u8 *addr[], const size_t len[], u8 *prk) hkdf_extract() argument
/third_party/mbedtls/include/mbedtls/
H A Dhkdf.h75 * fixed-length pseudorandom key \p prk.
90 * \param[out] prk A pseudorandom key of at least md.size bytes.
100 unsigned char *prk);
103 * \brief Expand the supplied \p prk into several additional pseudorandom
113 * \param prk A pseudorandom key of at least md.size bytes. \p prk is
115 * \param prk_len The length in bytes of \p prk.
128 int mbedtls_hkdf_expand(const mbedtls_md_info_t *md, const unsigned char *prk,
/third_party/libcoap/src/oscore/
H A Doscore_crypto.c102 coap_bin_const_t *prk, in oscore_hkdf_expand()
124 if (!oscore_hmac_hash(hmac_alg, prk, &data, &hkdf)) in oscore_hkdf_expand()
136 if (!oscore_hmac_hash(hmac_alg, prk, &data, &hkdf)) in oscore_hkdf_expand()
101 oscore_hkdf_expand(cose_hkdf_alg_t hkdf_alg, coap_bin_const_t *prk, uint8_t *info, size_t info_len, uint8_t *okm, size_t okm_len) oscore_hkdf_expand() argument
/third_party/node/deps/openssl/openssl/crypto/dh/
H A Ddh_key.c229 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local
232 if (prk == NULL) in ossl_dh_generate_public_key()
249 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key()
252 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key()
257 BN_clear_free(prk); in ossl_dh_generate_public_key()
/third_party/openssl/crypto/dh/
H A Ddh_key.c230 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local
233 if (prk == NULL) in ossl_dh_generate_public_key()
250 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key()
253 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key()
258 BN_clear_free(prk); in ossl_dh_generate_public_key()
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/
H A Dpicotls.c261 ptls_iovec_t prk, infov; in ngtcp2_crypto_hkdf_expand() local
263 prk = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_expand()
266 if (ptls_hkdf_expand(md->native_handle, dest, destlen, prk, infov) != 0) { in ngtcp2_crypto_hkdf_expand()
277 ptls_iovec_t saltv, ikm, prk, infov; in ngtcp2_crypto_hkdf() local
288 prk = ptls_iovec_init(prkbuf, algo->digest_size); in ngtcp2_crypto_hkdf()
291 if (ptls_hkdf_expand(algo, dest, destlen, prk, infov) != 0) { in ngtcp2_crypto_hkdf()
/third_party/libcoap/include/oscore/
H A Doscore_crypto.h104 * @param prk Usually ouptut from HKDF-Extract().
113 coap_bin_const_t *prk,
/third_party/mbedtls/include/psa/
H A Dcrypto_builtin_key_derivation.h41 uint8_t MBEDTLS_PRIVATE(prk)[PSA_HASH_MAX_SIZE];
91 /* `HMAC_hash( prk, A( i ) + seed )` in the notation of RFC 5246, Sect. 5. */
/third_party/openssl/test/
H A Dtls13secretstest.c229 static int test_secret(SSL *s, unsigned char *prk, in test_secret() argument
246 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddpp.c1522 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
1530 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
1533 prk, hash_len); in dpp_derive_k1()
1536 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
1537 os_memset(prk, 0, hash_len); in dpp_derive_k1()
1550 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
1558 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
1562 prk, hash_len); in dpp_derive_k2()
1565 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
1566 os_memset(prk, in dpp_derive_k2()
1582 u8 prk[DPP_MAX_HASH_LEN]; dpp_derive_ke() local
6379 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_derive_pmk() local
7174 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_pkex_derive_z() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dieee802_11.c2663 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
2704 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_req()
2751 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2754 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2757 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2763 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
2765 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_req()
2770 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
2775 res = hmac_sha256_kdf(prk, hash_le in owe_process_assoc_req()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
H A Dwpa.c4565 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
4628 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_resp()
4674 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4677 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4680 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4686 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp()
4688 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_resp()
4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
4694 res = hmac_sha384_kdf(prk, hash_le in owe_process_assoc_resp()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_module_tests.c1917 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2009 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2011 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2026 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_module_tests.c2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dieee802_11.c4204 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
4245 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_req()
4292 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4295 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4298 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4304 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
4306 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_req()
4311 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
4316 res = hmac_sha256_kdf(prk, hash_le in owe_process_assoc_req()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
H A Dwpa.c6299 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN];
6362 /* prk = HKDF-extract(C | A | group, z) */
6408 wpabuf_head(secret), wpabuf_len(secret), prk);
6411 wpabuf_head(secret), wpabuf_len(secret), prk);
6414 wpabuf_head(secret), wpabuf_len(secret), prk);
6420 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len);
6422 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */
6425 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info,
6428 res = hmac_sha384_kdf(prk, hash_le
[all...]

Completed in 93 milliseconds