Home
last modified time | relevance | path

Searched refs:prk (Results 1 – 21 of 21) sorted by relevance

/third_party/mbedtls/tests/suites/
Dtest_suite_hkdf.function39 unsigned char *prk = NULL;
51 prk = mbedtls_test_unhexify_alloc( hex_prk_string, &prk_len );
56 ASSERT_COMPARE( output_prk, output_prk_len, prk, prk_len );
61 mbedtls_free(prk);
73 unsigned char *prk = NULL;
83 prk = mbedtls_test_unhexify_alloc( hex_prk_string, &prk_len );
89 ret = mbedtls_hkdf_expand( md, prk, prk_len, info, info_len,
96 mbedtls_free(prk);
108 unsigned char *prk = NULL;
116 prk = mbedtls_calloc( MBEDTLS_MD_MAX_SIZE, 1 );
[all …]
/third_party/mbedtls/library/
Dhkdf.c34 unsigned char prk[MBEDTLS_MD_MAX_SIZE]; in mbedtls_hkdf() local
36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf()
40 ret = mbedtls_hkdf_expand( md, prk, mbedtls_md_get_size( md ), in mbedtls_hkdf()
44 mbedtls_platform_zeroize( prk, sizeof( prk ) ); in mbedtls_hkdf()
52 unsigned char *prk ) in mbedtls_hkdf_extract() argument
76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
79 int mbedtls_hkdf_expand( const mbedtls_md_info_t *md, const unsigned char *prk, in mbedtls_hkdf_expand() argument
144 ret = mbedtls_md_hmac_starts( &ctx, prk, prk_len ); in mbedtls_hkdf_expand()
Dpsa_crypto.c4481 hkdf->prk, in psa_key_derivation_hkdf_read()
4995 hkdf->prk, in psa_hkdf_input()
4996 sizeof( hkdf->prk ), in psa_hkdf_input()
/third_party/openssl/crypto/dsa/
Ddsa_key.c52 BIGNUM *prk = BN_new(); in dsa_builtin_keygen() local
54 if (prk == NULL) in dsa_builtin_keygen()
56 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in dsa_builtin_keygen()
58 if (!BN_mod_exp(pub_key, dsa->g, prk, dsa->p, ctx)) { in dsa_builtin_keygen()
59 BN_free(prk); in dsa_builtin_keygen()
63 BN_free(prk); in dsa_builtin_keygen()
/third_party/openssl/crypto/kdf/
Dhkdf.c29 unsigned char *prk, size_t *prk_len);
32 const unsigned char *prk, size_t prk_len,
263 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local
267 if (!HKDF_Extract(evp_md, salt, salt_len, key, key_len, prk, &prk_len)) in HKDF()
270 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF()
271 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF()
279 unsigned char *prk, size_t *prk_len) in HKDF_Extract() argument
283 if (!HMAC(evp_md, salt, salt_len, key, key_len, prk, &tmp_len)) in HKDF_Extract()
287 return prk; in HKDF_Extract()
291 const unsigned char *prk, size_t prk_len, in HKDF_Expand() argument
[all …]
/third_party/openssl/crypto/dh/
Ddh_key.c168 BIGNUM *prk = BN_new(); in generate_key() local
170 if (prk == NULL) in generate_key()
172 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in generate_key()
174 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, prk, dh->p, ctx, mont)) { in generate_key()
175 BN_clear_free(prk); in generate_key()
179 BN_clear_free(prk); in generate_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Ddpp_crypto.c370 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
378 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
381 prk, hash_len); in dpp_derive_k1()
384 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
385 os_memset(prk, 0, hash_len); in dpp_derive_k1()
397 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
405 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
409 prk, hash_len); in dpp_derive_k2()
412 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
413 os_memset(prk, 0, hash_len); in dpp_derive_k2()
[all …]
Dsae.c535 u8 *prk) in hkdf_extract() argument
539 prk); in hkdf_extract()
543 prk); in hkdf_extract()
548 prk); in hkdf_extract()
554 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument
560 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand()
565 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand()
571 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
/third_party/mbedtls/include/mbedtls/
Dhkdf.h100 unsigned char *prk );
128 int mbedtls_hkdf_expand( const mbedtls_md_info_t *md, const unsigned char *prk,
/third_party/openssl/test/
Dtls13secretstest.c221 static int test_secret(SSL *s, unsigned char *prk, in test_secret() argument
238 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dcrypto_module_tests.c2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dcrypto_module_tests.c1917 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2009 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2011 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2026 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Ddpp.c1522 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
1530 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
1533 prk, hash_len); in dpp_derive_k1()
1536 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
1537 os_memset(prk, 0, hash_len); in dpp_derive_k1()
1550 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
1558 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
1562 prk, hash_len); in dpp_derive_k2()
1565 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
1566 os_memset(prk, 0, hash_len); in dpp_derive_k2()
[all …]
/third_party/mbedtls/include/psa/
Dcrypto_struct.h197 uint8_t MBEDTLS_PRIVATE(prk)[PSA_HASH_MAX_SIZE];
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dwpa.c4565 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
4674 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4677 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4680 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
4686 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp()
4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
4694 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
4697 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
4699 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa.c5077 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
5186 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5189 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5192 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5198 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp()
5203 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5206 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5209 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5211 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dieee802_11.c2663 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
2751 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2754 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2757 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
2763 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
2770 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
2775 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
2778 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
2781 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
2783 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dieee802_11.c4180 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
4268 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4271 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4274 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4280 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
4287 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
4292 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4295 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4298 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4300 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
/third_party/skia/third_party/externals/icu/source/data/misc/
DsupplementalData.txt6548 "prk~r",
/third_party/icu/icu4c/source/data/misc/
DsupplementalData.txt6548 "prk~r",
/third_party/flutter/skia/third_party/externals/icu/source/data/misc/
DsupplementalData.txt6303 "prk~r",