/external/rust/crates/ring/src/ |
D | hkdf.rs | 79 let prk = hmac::sign(salt, secret); in extract() localVariable 80 Prk(hmac::Key::new(salt.algorithm(), prk.as_ref())) in extract() 93 prk: okm.prk, in from() 137 prk: self, in expand() 148 prk: okm.prk, in from() 162 prk: &'a Prk, field 184 fill_okm(self.prk, self.info, out, self.len_cached) in fill() 189 prk: &Prk, in fill_okm() 198 let digest_alg = prk.0.algorithm().digest_algorithm(); in fill_okm() 201 let mut ctx = hmac::Context::with_key(&prk.0); in fill_okm() [all …]
|
/external/python/cryptography/tests/hazmat/primitives/ |
D | test_concatkdf.py | 40 prk = binascii.unhexlify( 53 assert ckdf.derive(prk) == okm 56 prk = binascii.unhexlify( 69 assert ckdf.derive(bytearray(prk)) == okm 72 prk = binascii.unhexlify( 85 assert ckdf.verify(prk, okm) is None 88 prk = binascii.unhexlify( 100 ckdf.verify(prk, b"wrong key") 159 prk = binascii.unhexlify( 175 assert ckdf.derive(prk) == okm [all …]
|
D | test_hkdf.py | 193 prk = binascii.unhexlify( 203 assert binascii.hexlify(hkdf.derive(prk)) == okm 206 prk = bytearray(binascii.unhexlify( 216 assert binascii.hexlify(hkdf.derive(prk)) == okm 219 prk = binascii.unhexlify( 229 assert hkdf.verify(prk, binascii.unhexlify(okm)) is None 232 prk = binascii.unhexlify( 240 hkdf.verify(prk, b"wrong key")
|
D | utils.py | 332 prk = hkdf._extract(binascii.unhexlify(params["ikm"])) 334 assert prk == binascii.unhexlify(params["prk"])
|
/external/rust/crates/ring/tests/ |
D | hkdf_tests.rs | 83 let prk = salt.extract(&[]); // TODO: enforce minimum length. in hkdf_output_len_tests() localVariable 87 let okm = prk.expand(&[b"info"], My(0)).unwrap(); in hkdf_output_len_tests() 96 let okm = prk.expand(&[b"info"], My(max_out_len)).unwrap(); in hkdf_output_len_tests() 103 assert!(prk.expand(&[b"info"], My(max_out_len + 1)).is_err()); in hkdf_output_len_tests() 108 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests() 115 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests() 122 let okm = prk.expand(&[b"info"], My(2)).unwrap(); in hkdf_output_len_tests()
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf_test.cc | 34 const uint8_t prk[EVP_MAX_MD_SIZE]; member 254 uint8_t prk[EVP_MAX_MD_SIZE]; in TEST() local 256 ASSERT_TRUE(HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, in TEST() 258 EXPECT_EQ(Bytes(test->prk, test->prk_len), Bytes(prk, prk_len)); in TEST() 261 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST()
|
D | hkdf.c | 30 uint8_t prk[EVP_MAX_MD_SIZE]; in HKDF() local 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 60 const uint8_t *prk, size_t prk_len, const uint8_t *info, in HKDF_expand() argument 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF_expand()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hkdf/ |
D | hkdf_test.cc | 34 const uint8_t prk[EVP_MAX_MD_SIZE]; member 254 uint8_t prk[EVP_MAX_MD_SIZE]; in TEST() local 256 ASSERT_TRUE(HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, in TEST() 258 EXPECT_EQ(Bytes(test->prk, test->prk_len), Bytes(prk, prk_len)); in TEST() 261 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST()
|
D | hkdf.c | 30 uint8_t prk[EVP_MAX_MD_SIZE]; in HKDF() local 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 60 const uint8_t *prk, size_t prk_len, const uint8_t *info, in HKDF_expand() argument 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF_expand()
|
/external/boringssl/src/ssl/test/runner/hpke/ |
D | kem.go | 50 func labeledExpand(kdfHash crypto.Hash, prk, suiteID, label, info []byte, length int) []byte { argument 63 reader := hkdf.Expand(kdfHash.New, prk, labeledInfo) 135 prk := labeledExtract(kdfHash, nil, suite, []byte("eae_prk"), dh) 136 return labeledExpand(kdfHash, prk, suite, []byte("shared_secret"), kemContext, 32)
|
/external/wpa_supplicant_8/src/common/ |
D | dpp_crypto.c | 775 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 783 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 786 prk, hash_len); in dpp_derive_k1() 789 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1() 790 os_memset(prk, 0, hash_len); in dpp_derive_k1() 802 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 810 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 814 prk, hash_len); in dpp_derive_k2() 817 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2() 818 os_memset(prk, 0, hash_len); in dpp_derive_k2() [all …]
|
D | sae.c | 535 u8 *prk) in hkdf_extract() argument 539 prk); in hkdf_extract() 543 prk); in hkdf_extract() 548 prk); in hkdf_extract() 554 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument 560 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand() 565 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand() 571 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
|
/external/scapy/scapy/layers/tls/crypto/ |
D | hkdf.py | 32 def expand(self, prk, info, L): argument 35 return hkdf.derive(prk)
|
/external/rust/crates/quiche/src/ |
D | crypto.rs | 359 fn derive_client_initial_secret(prk: &hkdf::Prk, out: &mut [u8]) -> Result<()> { in derive_client_initial_secret() 361 hkdf_expand_label(prk, LABEL, out) in derive_client_initial_secret() 364 fn derive_server_initial_secret(prk: &hkdf::Prk, out: &mut [u8]) -> Result<()> { in derive_server_initial_secret() 366 hkdf_expand_label(prk, LABEL, out) in derive_server_initial_secret() 415 prk: &hkdf::Prk, label: &[u8], out: &mut [u8], in hkdf_expand_label() 424 prk.expand(&info, ArbitraryOutputLen(out.len())) in hkdf_expand_label()
|
/external/boringssl/src/crypto/hpke/ |
D | hpke.c | 89 size_t out_len, const uint8_t *prk, in hpke_labeled_expand() argument 101 HKDF_expand(out_key, out_len, hkdf_md, prk, prk_len, in hpke_labeled_expand() 111 uint8_t prk[EVP_MAX_MD_SIZE]; in hpke_extract_and_expand() local 114 if (!hpke_labeled_extract(hkdf_md, prk, &prk_len, NULL, 0, kX25519SuiteID, in hpke_extract_and_expand() 120 if (!hpke_labeled_expand(hkdf_md, out_key, out_len, prk, prk_len, in hpke_extract_and_expand()
|
/external/boringssl/src/include/openssl/ |
D | hkdf.h | 53 const EVP_MD *digest, const uint8_t *prk,
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | hkdf.h | 53 const EVP_MD *digest, const uint8_t *prk,
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local 2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf() 2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf() 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf() 2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 5086 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local 5195 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 5198 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 5201 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 5207 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp() 5212 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 5215 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 5218 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 5220 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
|
/external/cldr/tools/java/org/unicode/cldr/util/data/external/ |
D | alternate_language_names.txt | 472 prk ; Va
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11.c | 4046 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local 4134 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4137 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4140 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 4146 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req() 4153 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req() 4158 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 4161 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 4164 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 4166 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
|
/external/cldr/tools/java/org/unicode/cldr/util/data/languages/ |
D | entityToCode.tsv | 1056 http://www.wikidata.org/entity/Q3363719 prk
|
/external/icu/icu4c/source/data/misc/ |
D | supplementalData.txt | 6548 "prk~r",
|
/external/cldr/tools/java/org/unicode/cldr/util/data/ |
D | iso-639-3_Name_Index.tab | 5604 prk Parauk Parauk
|
D | iso-639-3.tab | 5355 prk I L Parauk
|