/third_party/mbedtls/library/ |
H A D | hkdf.c | 34 unsigned char prk[MBEDTLS_MD_MAX_SIZE]; in mbedtls_hkdf() local 36 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 39 ret = mbedtls_hkdf_expand(md, prk, mbedtls_md_get_size(md), in mbedtls_hkdf() 43 mbedtls_platform_zeroize(prk, sizeof(prk)); in mbedtls_hkdf() 51 unsigned char *prk) in mbedtls_hkdf_extract() 72 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract() 75 int mbedtls_hkdf_expand(const mbedtls_md_info_t *md, const unsigned char *prk, in mbedtls_hkdf_expand() argument 133 ret = mbedtls_md_hmac_starts(&ctx, prk, prk_len); in mbedtls_hkdf_expand() 48 mbedtls_hkdf_extract(const mbedtls_md_info_t *md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk) mbedtls_hkdf_extract() argument
|
H A D | psa_crypto.c | 5627 hkdf->prk, in psa_key_derivation_hkdf_read() 6758 /* Allow only input that fits expected prk size */ in psa_hkdf_input() 6763 memcpy(hkdf->prk, data, data_length); in psa_hkdf_input() 6792 hkdf->prk, in psa_hkdf_input() 6793 sizeof(hkdf->prk), in psa_hkdf_input() 6805 memcpy(hkdf->output_block, hkdf->prk, PSA_HASH_LENGTH(hash_alg)); in psa_hkdf_input()
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
H A D | dsa_key.c | 47 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local 49 if (prk == NULL) in ossl_dsa_generate_public_key() 51 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key() 54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key() 58 BN_clear_free(prk); in ossl_dsa_generate_public_key()
|
/third_party/openssl/crypto/dsa/ |
H A D | dsa_key.c | 47 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local 49 if (prk == NULL) in ossl_dsa_generate_public_key() 51 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key() 54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key() 58 BN_clear_free(prk); in ossl_dsa_generate_public_key()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 57 unsigned char *prk, size_t prk_len); 59 const unsigned char *prk, size_t prk_len, 401 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 416 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF() 417 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF() 449 unsigned char *prk, size_t prk_len) in HKDF_Extract() 462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() 506 const unsigned char *prk, size_ in HKDF_Expand() 446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument 505 HKDF_Expand(const EVP_MD *evp_md, const unsigned char *prk, size_t prk_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF_Expand() argument [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 57 unsigned char *prk, size_t prk_len); 59 const unsigned char *prk, size_t prk_len, 401 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local 412 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 416 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF() 417 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF() 449 unsigned char *prk, size_t prk_len) in HKDF_Extract() 462 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() 506 const unsigned char *prk, size_ in HKDF_Expand() 446 HKDF_Extract(OSSL_LIB_CTX *libctx, const EVP_MD *evp_md, const unsigned char *salt, size_t salt_len, const unsigned char *ikm, size_t ikm_len, unsigned char *prk, size_t prk_len) HKDF_Extract() argument 505 HKDF_Expand(const EVP_MD *evp_md, const unsigned char *prk, size_t prk_len, const unsigned char *info, size_t info_len, unsigned char *okm, size_t okm_len) HKDF_Expand() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 370 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 378 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 381 prk, hash_len); in dpp_derive_k1() 384 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1() 385 os_memset(prk, 0, hash_len); in dpp_derive_k1() 397 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 405 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 409 prk, hash_len); in dpp_derive_k2() 412 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2() 413 os_memset(prk, in dpp_derive_k2() 1120 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_derive_pmk() local 1594 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_pkex_derive_z() local 1670 u8 prk[DPP_MAX_HASH_LEN]; dpp_reconfig_derive_ke_responder() local 1769 u8 prk[DPP_MAX_HASH_LEN]; dpp_reconfig_derive_ke_initiator() local [all...] |
H A D | sae.c | 537 u8 *prk) in hkdf_extract() 541 prk); in hkdf_extract() 545 prk); in hkdf_extract() 550 prk); in hkdf_extract() 556 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument 562 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand() 567 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand() 573 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand() 535 hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, size_t num_elem, const u8 *addr[], const size_t len[], u8 *prk) hkdf_extract() argument
|
/third_party/mbedtls/include/mbedtls/ |
H A D | hkdf.h | 75 * fixed-length pseudorandom key \p prk. 90 * \param[out] prk A pseudorandom key of at least md.size bytes. 100 unsigned char *prk); 103 * \brief Expand the supplied \p prk into several additional pseudorandom 113 * \param prk A pseudorandom key of at least md.size bytes. \p prk is 115 * \param prk_len The length in bytes of \p prk. 128 int mbedtls_hkdf_expand(const mbedtls_md_info_t *md, const unsigned char *prk,
|
/third_party/libcoap/src/oscore/ |
H A D | oscore_crypto.c | 102 coap_bin_const_t *prk, in oscore_hkdf_expand() 124 if (!oscore_hmac_hash(hmac_alg, prk, &data, &hkdf)) in oscore_hkdf_expand() 136 if (!oscore_hmac_hash(hmac_alg, prk, &data, &hkdf)) in oscore_hkdf_expand() 101 oscore_hkdf_expand(cose_hkdf_alg_t hkdf_alg, coap_bin_const_t *prk, uint8_t *info, size_t info_len, uint8_t *okm, size_t okm_len) oscore_hkdf_expand() argument
|
/third_party/node/deps/openssl/openssl/crypto/dh/ |
H A D | dh_key.c | 229 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local 232 if (prk == NULL) in ossl_dh_generate_public_key() 249 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key() 252 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key() 257 BN_clear_free(prk); in ossl_dh_generate_public_key()
|
/third_party/openssl/crypto/dh/ |
H A D | dh_key.c | 230 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local 233 if (prk == NULL) in ossl_dh_generate_public_key() 250 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key() 253 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key() 258 BN_clear_free(prk); in ossl_dh_generate_public_key()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 261 ptls_iovec_t prk, infov; in ngtcp2_crypto_hkdf_expand() local 263 prk = ptls_iovec_init(secret, secretlen); in ngtcp2_crypto_hkdf_expand() 266 if (ptls_hkdf_expand(md->native_handle, dest, destlen, prk, infov) != 0) { in ngtcp2_crypto_hkdf_expand() 277 ptls_iovec_t saltv, ikm, prk, infov; in ngtcp2_crypto_hkdf() local 288 prk = ptls_iovec_init(prkbuf, algo->digest_size); in ngtcp2_crypto_hkdf() 291 if (ptls_hkdf_expand(algo, dest, destlen, prk, infov) != 0) { in ngtcp2_crypto_hkdf()
|
/third_party/libcoap/include/oscore/ |
H A D | oscore_crypto.h | 104 * @param prk Usually ouptut from HKDF-Extract(). 113 coap_bin_const_t *prk,
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_builtin_key_derivation.h | 41 uint8_t MBEDTLS_PRIVATE(prk)[PSA_HASH_MAX_SIZE]; 91 /* `HMAC_hash( prk, A( i ) + seed )` in the notation of RFC 5246, Sect. 5. */
|
/third_party/openssl/test/ |
H A D | tls13secretstest.c | 229 static int test_secret(SSL *s, unsigned char *prk, in test_secret() argument 246 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.c | 1522 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 1530 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 1533 prk, hash_len); in dpp_derive_k1() 1536 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1() 1537 os_memset(prk, 0, hash_len); in dpp_derive_k1() 1550 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 1558 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 1562 prk, hash_len); in dpp_derive_k2() 1565 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2() 1566 os_memset(prk, in dpp_derive_k2() 1582 u8 prk[DPP_MAX_HASH_LEN]; dpp_derive_ke() local 6379 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_derive_pmk() local 7174 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; dpp_pkex_derive_z() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ieee802_11.c | 2663 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local 2704 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_req() 2751 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 2754 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 2757 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 2763 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req() 2765 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_req() 2770 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req() 2775 res = hmac_sha256_kdf(prk, hash_le in owe_process_assoc_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 4565 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local 4628 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_resp() 4674 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 4677 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 4680 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 4686 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp() 4688 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_resp() 4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 4694 res = hmac_sha384_kdf(prk, hash_le in owe_process_assoc_resp() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_module_tests.c | 1917 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local 2009 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf() 2011 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf() 2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf() 2026 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_module_tests.c | 2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local 2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf() 2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf() 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf() 2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ieee802_11.c | 4204 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local 4245 /* prk = HKDF-extract(C | A | group, z) */ in owe_process_assoc_req() 4292 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4295 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4298 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4304 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req() 4306 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ in owe_process_assoc_req() 4311 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req() 4316 res = hmac_sha256_kdf(prk, hash_le in owe_process_assoc_req() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.c | 6299 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; 6362 /* prk = HKDF-extract(C | A | group, z) */ 6408 wpabuf_head(secret), wpabuf_len(secret), prk); 6411 wpabuf_head(secret), wpabuf_len(secret), prk); 6414 wpabuf_head(secret), wpabuf_len(secret), prk); 6420 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); 6422 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ 6425 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, 6428 res = hmac_sha384_kdf(prk, hash_le [all...] |