Home
last modified time | relevance | path

Searched refs:prk (Results 1 – 25 of 26) sorted by relevance

12

/external/rust/crates/ring/src/
Dhkdf.rs79 let prk = hmac::sign(salt, secret); in extract() localVariable
80 Prk(hmac::Key::new(salt.algorithm(), prk.as_ref())) in extract()
93 prk: okm.prk, in from()
137 prk: self, in expand()
148 prk: okm.prk, in from()
162 prk: &'a Prk, field
184 fill_okm(self.prk, self.info, out, self.len_cached) in fill()
189 prk: &Prk, in fill_okm()
198 let digest_alg = prk.0.algorithm().digest_algorithm(); in fill_okm()
201 let mut ctx = hmac::Context::with_key(&prk.0); in fill_okm()
[all …]
/external/python/cryptography/tests/hazmat/primitives/
Dtest_concatkdf.py40 prk = binascii.unhexlify(
53 assert ckdf.derive(prk) == okm
56 prk = binascii.unhexlify(
69 assert ckdf.derive(bytearray(prk)) == okm
72 prk = binascii.unhexlify(
85 assert ckdf.verify(prk, okm) is None
88 prk = binascii.unhexlify(
100 ckdf.verify(prk, b"wrong key")
159 prk = binascii.unhexlify(
175 assert ckdf.derive(prk) == okm
[all …]
Dtest_hkdf.py193 prk = binascii.unhexlify(
203 assert binascii.hexlify(hkdf.derive(prk)) == okm
206 prk = bytearray(binascii.unhexlify(
216 assert binascii.hexlify(hkdf.derive(prk)) == okm
219 prk = binascii.unhexlify(
229 assert hkdf.verify(prk, binascii.unhexlify(okm)) is None
232 prk = binascii.unhexlify(
240 hkdf.verify(prk, b"wrong key")
Dutils.py332 prk = hkdf._extract(binascii.unhexlify(params["ikm"]))
334 assert prk == binascii.unhexlify(params["prk"])
/external/rust/crates/ring/tests/
Dhkdf_tests.rs83 let prk = salt.extract(&[]); // TODO: enforce minimum length. in hkdf_output_len_tests() localVariable
87 let okm = prk.expand(&[b"info"], My(0)).unwrap(); in hkdf_output_len_tests()
96 let okm = prk.expand(&[b"info"], My(max_out_len)).unwrap(); in hkdf_output_len_tests()
103 assert!(prk.expand(&[b"info"], My(max_out_len + 1)).is_err()); in hkdf_output_len_tests()
108 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests()
115 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests()
122 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests()
/external/boringssl/src/crypto/hkdf/
Dhkdf_test.cc34 const uint8_t prk[EVP_MAX_MD_SIZE]; member
254 uint8_t prk[EVP_MAX_MD_SIZE]; in TEST() local
256 ASSERT_TRUE(HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, in TEST()
258 EXPECT_EQ(Bytes(test->prk, test->prk_len), Bytes(prk, prk_len)); in TEST()
261 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST()
Dhkdf.c30 uint8_t prk[EVP_MAX_MD_SIZE]; in HKDF() local
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF()
60 const uint8_t *prk, size_t prk_len, const uint8_t *info, in HKDF_expand() argument
78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF_expand()
/external/rust/crates/quiche/deps/boringssl/src/crypto/hkdf/
Dhkdf_test.cc34 const uint8_t prk[EVP_MAX_MD_SIZE]; member
254 uint8_t prk[EVP_MAX_MD_SIZE]; in TEST() local
256 ASSERT_TRUE(HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, in TEST()
258 EXPECT_EQ(Bytes(test->prk, test->prk_len), Bytes(prk, prk_len)); in TEST()
261 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST()
Dhkdf.c30 uint8_t prk[EVP_MAX_MD_SIZE]; in HKDF() local
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF()
35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF()
60 const uint8_t *prk, size_t prk_len, const uint8_t *info, in HKDF_expand() argument
78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF_expand()
/external/boringssl/src/ssl/test/runner/hpke/
Dkem.go50 func labeledExpand(kdfHash crypto.Hash, prk, suiteID, label, info []byte, length int) []byte { argument
63 reader := hkdf.Expand(kdfHash.New, prk, labeledInfo)
135 prk := labeledExtract(kdfHash, nil, suite, []byte("eae_prk"), dh)
136 return labeledExpand(kdfHash, prk, suite, []byte("shared_secret"), kemContext, 32)
/external/wpa_supplicant_8/src/common/
Ddpp_crypto.c775 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
783 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
786 prk, hash_len); in dpp_derive_k1()
789 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
790 os_memset(prk, 0, hash_len); in dpp_derive_k1()
802 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
810 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
814 prk, hash_len); in dpp_derive_k2()
817 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
818 os_memset(prk, 0, hash_len); in dpp_derive_k2()
[all …]
Dsae.c535 u8 *prk) in hkdf_extract() argument
539 prk); in hkdf_extract()
543 prk); in hkdf_extract()
548 prk); in hkdf_extract()
554 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument
560 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand()
565 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand()
571 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
/external/scapy/scapy/layers/tls/crypto/
Dhkdf.py32 def expand(self, prk, info, L): argument
35 return hkdf.derive(prk)
/external/rust/crates/quiche/src/
Dcrypto.rs359 fn derive_client_initial_secret(prk: &hkdf::Prk, out: &mut [u8]) -> Result<()> { in derive_client_initial_secret()
361 hkdf_expand_label(prk, LABEL, out) in derive_client_initial_secret()
364 fn derive_server_initial_secret(prk: &hkdf::Prk, out: &mut [u8]) -> Result<()> { in derive_server_initial_secret()
366 hkdf_expand_label(prk, LABEL, out) in derive_server_initial_secret()
415 prk: &hkdf::Prk, label: &[u8], out: &mut [u8], in hkdf_expand_label()
424 prk.expand(&info, ArbitraryOutputLen(out.len())) in hkdf_expand_label()
/external/boringssl/src/crypto/hpke/
Dhpke.c89 size_t out_len, const uint8_t *prk, in hpke_labeled_expand() argument
101 HKDF_expand(out_key, out_len, hkdf_md, prk, prk_len, in hpke_labeled_expand()
111 uint8_t prk[EVP_MAX_MD_SIZE]; in hpke_extract_and_expand() local
114 if (!hpke_labeled_extract(hkdf_md, prk, &prk_len, NULL, 0, kX25519SuiteID, in hpke_extract_and_expand()
120 if (!hpke_labeled_expand(hkdf_md, out_key, out_len, prk, prk_len, in hpke_extract_and_expand()
/external/boringssl/src/include/openssl/
Dhkdf.h53 const EVP_MD *digest, const uint8_t *prk,
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Dhkdf.h53 const EVP_MD *digest, const uint8_t *prk,
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.c5086 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
5195 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5198 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5201 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
5207 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp()
5212 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5215 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5218 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
5220 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
/external/cldr/tools/java/org/unicode/cldr/util/data/external/
Dalternate_language_names.txt472 prk ; Va
/external/wpa_supplicant_8/src/ap/
Dieee802_11.c4046 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
4134 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4137 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4140 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
4146 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
4153 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
4158 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4161 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4164 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
4166 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
/external/cldr/tools/java/org/unicode/cldr/util/data/languages/
DentityToCode.tsv1056 http://www.wikidata.org/entity/Q3363719 prk
/external/icu/icu4c/source/data/misc/
DsupplementalData.txt6548 "prk~r",
/external/cldr/tools/java/org/unicode/cldr/util/data/
Diso-639-3_Name_Index.tab5604 prk Parauk Parauk
Diso-639-3.tab5355 prk I L Parauk

12