Home
last modified time | relevance | path

Searched refs:peer_key (Results 1 - 18 of 18) sorted by relevance

/third_party/mbedtls/tests/src/drivers/
H A Dtest_driver_key_agreement.c36 const uint8_t *peer_key, in mbedtls_test_transparent_key_agreement()
66 alg, peer_key, peer_key_length, in mbedtls_test_transparent_key_agreement()
73 alg, peer_key, peer_key_length, in mbedtls_test_transparent_key_agreement()
80 (void) peer_key; in mbedtls_test_transparent_key_agreement()
93 peer_key, peer_key_length, in mbedtls_test_transparent_key_agreement()
100 peer_key, in mbedtls_test_transparent_key_agreement()
111 (void) peer_key; in mbedtls_test_transparent_key_agreement()
129 const uint8_t *peer_key, in mbedtls_test_opaque_key_agreement()
139 (void) peer_key; in mbedtls_test_opaque_key_agreement()
31 mbedtls_test_transparent_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_transparent_key_agreement() argument
124 mbedtls_test_opaque_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_opaque_key_agreement() argument
/third_party/mbedtls/tests/include/test/drivers/
H A Dkey_agreement.h56 const uint8_t *peer_key,
67 const uint8_t *peer_key,
/third_party/mbedtls/3rdparty/p256-m/
H A Dp256-m_driver_entrypoints.c173 const uint8_t *peer_key, in p256_transparent_key_agreement()
194 const uint8_t *peer_key_p256m = peer_key + 1; in p256_transparent_key_agreement()
168 p256_transparent_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) p256_transparent_key_agreement() argument
H A Dp256-m_driver_entrypoints.h114 * \param[in] peer_key The buffer containing the peer's public
116 * \param[in] peer_key_length Size of the \p peer_key buffer in
136 const uint8_t *peer_key,
/third_party/mbedtls/library/
H A Dpsa_crypto_ffdh.h18 * \param[in] peer_key The buffer containing the key context
20 * \param[in] peer_key_length Size of the \p peer_key buffer in
42 const uint8_t *peer_key,
H A Dpsa_crypto_ffdh.c259 const uint8_t *peer_key, in mbedtls_psa_ffdh_key_agreement()
295 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&GY, peer_key, in mbedtls_psa_ffdh_key_agreement()
257 mbedtls_psa_ffdh_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *peer_key, size_t peer_key_length, const uint8_t *key_buffer, size_t key_buffer_size, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_psa_ffdh_key_agreement() argument
H A Dpsa_crypto_ecp.h247 * \param[in] peer_key The buffer containing the key context
249 * \param[in] peer_key_length Size of the \p peer_key buffer in
264 * or \p peer_key is not valid for \p alg or not compatible with
276 psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length,
H A Dpsa_crypto_ecp.c524 psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, in mbedtls_psa_key_agreement_ecdh()
552 peer_key, in mbedtls_psa_key_agreement_ecdh()
521 mbedtls_psa_key_agreement_ecdh( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_psa_key_agreement_ecdh() argument
H A Dpsa_crypto_driver_wrappers.c2188 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, in psa_driver_wrapper_key_agreement()
2201 status = mbedtls_test_transparent_key_agreement(attributes, key_buffer, key_buffer_size, alg, peer_key, in psa_driver_wrapper_key_agreement()
2211 status = p256_transparent_key_agreement(attributes, key_buffer, key_buffer_size, alg, peer_key, in psa_driver_wrapper_key_agreement()
2222 psa_key_agreement_raw_builtin(attributes, key_buffer, key_buffer_size, alg, peer_key, peer_key_length, in psa_driver_wrapper_key_agreement()
2228 return (mbedtls_test_opaque_key_agreement(attributes, key_buffer, key_buffer_size, alg, peer_key, in psa_driver_wrapper_key_agreement()
2238 (void)peer_key; in psa_driver_wrapper_key_agreement()
2187 psa_driver_wrapper_key_agreement(const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) psa_driver_wrapper_key_agreement() argument
H A Dpsa_crypto_core.h578 * \param[in] peer_key The buffer containing the key context
580 * \param[in] peer_key_length Size of the \p peer_key buffer in
595 * or \p peer_key is not valid for \p alg or not compatible with
613 const uint8_t *peer_key,
H A Dpsa_crypto.c7458 const uint8_t *peer_key, in psa_key_agreement_raw_builtin()
7469 peer_key, peer_key_length, in psa_key_agreement_raw_builtin()
7478 peer_key, in psa_key_agreement_raw_builtin()
7491 (void) peer_key; in psa_key_agreement_raw_builtin()
7508 const uint8_t *peer_key, in psa_key_agreement_raw_internal()
7521 peer_key, peer_key_length, in psa_key_agreement_raw_internal()
7533 const uint8_t *peer_key, in psa_key_agreement_internal()
7545 peer_key, peer_key_length, in psa_key_agreement_internal()
7574 LOCAL_INPUT_DECLARE(peer_key_external, peer_key); in psa_key_derivation_key_agreement()
7585 LOCAL_INPUT_ALLOC(peer_key_external, peer_key_length, peer_key); in psa_key_derivation_key_agreement()
7454 psa_key_agreement_raw_builtin(const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) psa_key_agreement_raw_builtin() argument
7506 psa_key_agreement_raw_internal(psa_algorithm_t alg, psa_key_slot_t *private_key, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) psa_key_agreement_raw_internal() argument
7530 psa_key_agreement_internal(psa_key_derivation_operation_t *operation, psa_key_derivation_step_t step, psa_key_slot_t *private_key, const uint8_t *peer_key, size_t peer_key_length) psa_key_agreement_internal() argument
[all...]
H A Dpsa_crypto_driver_wrappers.h420 const uint8_t *peer_key,
H A Dssl_tls12_client.c2010 const mbedtls_ecp_keypair *peer_key = mbedtls_pk_ec_ro(*peer_pk); in ssl_get_ecdh_params_from_cert() local
2044 ret = mbedtls_ecp_point_write_binary(&peer_key->grp, &peer_key->Q, in ssl_get_ecdh_params_from_cert()
2056 if ((ret = mbedtls_ecdh_get_params(&ssl->handshake->ecdh_ctx, peer_key, in ssl_get_ecdh_params_from_cert()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddpp_crypto.c1147 struct crypto_ec_key *peer_key, u8 *pmkid) in dpp_derive_pmkid()
1157 pkx = crypto_ec_key_get_pubkey_point(peer_key, 0); in dpp_derive_pmkid()
1663 struct crypto_ec_key *own_key = NULL, *peer_key = NULL; in dpp_reconfig_derive_ke_responder() local
1682 peer_key = dpp_parse_jwk(peer_net_access_key, &curve); in dpp_reconfig_derive_ke_responder()
1683 if (!peer_key) in dpp_reconfig_derive_ke_responder()
1685 dpp_debug_print_key("DPP: Received netAccessKey", peer_key); in dpp_reconfig_derive_ke_responder()
1715 CI = crypto_ec_key_get_public_key(peer_key); in dpp_reconfig_derive_ke_responder()
1753 crypto_ec_key_deinit(peer_key); in dpp_reconfig_derive_ke_responder()
1763 struct crypto_ec_key *pr = NULL, *peer_key = NULL; in dpp_reconfig_derive_ke_initiator() local
1785 peer_key in dpp_reconfig_derive_ke_initiator()
1145 dpp_derive_pmkid(const struct dpp_curve_params *curve, struct crypto_ec_key *own_key, struct crypto_ec_key *peer_key, u8 *pmkid) dpp_derive_pmkid() argument
[all...]
H A Ddpp_i.h111 struct crypto_ec_key *peer_key, u8 *pmkid);
H A Ddpp.c3648 struct crypto_ec_key *own_key = NULL, *peer_key = NULL; in dpp_peer_intro() local
3721 peer_key = dpp_parse_jwk(netkey, &curve); in dpp_peer_intro()
3722 if (!peer_key) { in dpp_peer_intro()
3726 dpp_debug_print_key("DPP: Received netAccessKey", peer_key); in dpp_peer_intro()
3737 if (dpp_ecdh(own_key, peer_key, Nx, &Nx_len) < 0) in dpp_peer_intro()
3751 if (dpp_derive_pmkid(curve, own_key, peer_key, intro->pmkid) < 0) { in dpp_peer_intro()
3764 crypto_ec_key_deinit(peer_key); in dpp_peer_intro()
/third_party/mbedtls/include/psa/
H A Dcrypto.h3501 * a public key \p peer_key.
3522 * \param[in] peer_key Public key of the peer. The peer key must be in the
3528 * `peer_key`, `peer_key_length`) where
3531 * For example, for EC keys, this means that peer_key
3536 * \param peer_key_length Size of \p peer_key in bytes.
3544 * or \p peer_key is not valid for \c alg or not compatible with
3564 const uint8_t *peer_key,
4007 * \param[in] peer_key Public key of the peer. It must be
4012 * \param peer_key_length Size of \p peer_key in bytes.
4026 * or \p peer_key i
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Ddpp.c6405 EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid) in dpp_derive_pmkid()
6415 pkx = dpp_get_pubkey_point(peer_key, 0); in dpp_derive_pmkid()
6454 EVP_PKEY *own_key = NULL, *peer_key = NULL; in dpp_peer_intro() local
6561 peer_key = dpp_parse_jwk(netkey, &curve); in dpp_peer_intro()
6562 if (!peer_key) { in dpp_peer_intro()
6566 dpp_debug_print_key("DPP: Received netAccessKey", peer_key); in dpp_peer_intro()
6577 if (dpp_ecdh(own_key, peer_key, Nx, &Nx_len) < 0) in dpp_peer_intro()
6591 if (dpp_derive_pmkid(curve, own_key, peer_key, intro->pmkid) < 0) { in dpp_peer_intro()
6606 EVP_PKEY_free(peer_key); in dpp_peer_intro()
6404 dpp_derive_pmkid(const struct dpp_curve_params *curve, EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid) dpp_derive_pmkid() argument

Completed in 52 milliseconds