/external/boringssl/src/ssl/ |
D | ssl_key_share.cc | 77 Span<const uint8_t> peer_key) override { in Finish() argument 100 if (peer_key.empty() || peer_key[0] != POINT_CONVERSION_UNCOMPRESSED || in Finish() 101 !EC_POINT_oct2point(group.get(), peer_point.get(), peer_key.data(), in Finish() 102 peer_key.size(), bn_ctx.get())) { in Finish() 172 Span<const uint8_t> peer_key) override { in Finish() argument 181 if (peer_key.size() != 32 || in Finish() 182 !X25519(secret.data(), private_key_, peer_key.data())) { in Finish() 239 uint8_t *out_alert, Span<const uint8_t> peer_key) override { in Accept() argument 250 if (peer_key.size() != 32 + HRSS_PUBLIC_KEY_BYTES || in Accept() 251 !HRSS_parse_public_key(&peer_public_key, peer_key.data() + 32) || in Accept() [all …]
|
D | t1_lib.cc | 2372 CBS peer_key; in ssl_ext_key_share_parse_serverhello() local 2375 !CBS_get_u16_length_prefixed(contents, &peer_key) || in ssl_ext_key_share_parse_serverhello() 2392 if (!key_share->Finish(out_secret, out_alert, peer_key)) { in ssl_ext_key_share_parse_serverhello() 2421 CBS peer_key; in ssl_ext_key_share_parse_clienthello() local 2422 CBS_init(&peer_key, NULL, 0); in ssl_ext_key_share_parse_clienthello() 2434 if (CBS_len(&peer_key) != 0) { in ssl_ext_key_share_parse_clienthello() 2440 peer_key = peer_key_tmp; in ssl_ext_key_share_parse_clienthello() 2445 if (CBS_len(&peer_key) == 0) { in ssl_ext_key_share_parse_clienthello() 2457 !key_share->Accept(public_key.get(), &secret, out_alert, peer_key) || in ssl_ext_key_share_parse_clienthello()
|
D | handshake_client.cc | 1024 !hs->peer_key.CopyFrom(point)) { in do_read_server_key_exchange() 1363 if (!hs->key_shares[0]->Accept(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange() 1374 hs->peer_key.Reset(); in do_send_client_key_exchange()
|
D | handshake_server.cc | 1334 CBS peer_key; in do_read_client_key_exchange() local 1335 if (!CBS_get_u8_length_prefixed(&client_key_exchange, &peer_key) || in do_read_client_key_exchange() 1344 if (!hs->key_shares[0]->Finish(&premaster_secret, &alert, peer_key)) { in do_read_client_key_exchange()
|
D | internal.h | 1084 uint8_t *out_alert, Span<const uint8_t> peer_key); 1091 Span<const uint8_t> peer_key) PURE_VIRTUAL; 1677 Array<uint8_t> peer_key;
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_key_share.cc | 77 Span<const uint8_t> peer_key) override { in Finish() argument 100 if (peer_key.empty() || peer_key[0] != POINT_CONVERSION_UNCOMPRESSED || in Finish() 101 !EC_POINT_oct2point(group.get(), peer_point.get(), peer_key.data(), in Finish() 102 peer_key.size(), bn_ctx.get())) { in Finish() 172 Span<const uint8_t> peer_key) override { in Finish() argument 181 if (peer_key.size() != 32 || in Finish() 182 !X25519(secret.data(), private_key_, peer_key.data())) { in Finish() 239 uint8_t *out_alert, Span<const uint8_t> peer_key) override { in Accept() argument 250 if (peer_key.size() != 32 + HRSS_PUBLIC_KEY_BYTES || in Accept() 251 !HRSS_parse_public_key(&peer_public_key, peer_key.data() + 32) || in Accept() [all …]
|
D | t1_lib.cc | 2142 CBS peer_key; in ssl_ext_key_share_parse_serverhello() local 2145 !CBS_get_u16_length_prefixed(contents, &peer_key) || in ssl_ext_key_share_parse_serverhello() 2162 if (!key_share->Finish(out_secret, out_alert, peer_key)) { in ssl_ext_key_share_parse_serverhello() 2191 CBS peer_key; in ssl_ext_key_share_parse_clienthello() local 2192 CBS_init(&peer_key, NULL, 0); in ssl_ext_key_share_parse_clienthello() 2204 if (CBS_len(&peer_key) != 0) { in ssl_ext_key_share_parse_clienthello() 2210 peer_key = peer_key_tmp; in ssl_ext_key_share_parse_clienthello() 2215 if (CBS_len(&peer_key) == 0) { in ssl_ext_key_share_parse_clienthello() 2227 !key_share->Accept(public_key.get(), &secret, out_alert, peer_key) || in ssl_ext_key_share_parse_clienthello()
|
D | handshake_client.cc | 1028 !hs->peer_key.CopyFrom(point)) { in do_read_server_key_exchange() 1367 if (!hs->key_shares[0]->Accept(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange() 1378 hs->peer_key.Reset(); in do_send_client_key_exchange()
|
D | handshake_server.cc | 1328 CBS peer_key; in do_read_client_key_exchange() local 1329 if (!CBS_get_u8_length_prefixed(&client_key_exchange, &peer_key) || in do_read_client_key_exchange() 1338 if (!hs->key_shares[0]->Finish(&premaster_secret, &alert, peer_key)) { in do_read_client_key_exchange()
|
D | internal.h | 1079 uint8_t *out_alert, Span<const uint8_t> peer_key); 1086 Span<const uint8_t> peer_key) PURE_VIRTUAL; 1654 Array<uint8_t> peer_key;
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | p_x25519.c | 55 const X25519_KEY *peer_key = ctx->peerkey->pkey.ptr; in pkey_x25519_derive() local 56 if (our_key == NULL || peer_key == NULL) { in pkey_x25519_derive() 71 if (!X25519(out, our_key->priv, peer_key->pub)) { in pkey_x25519_derive()
|
/external/boringssl/src/crypto/evp/ |
D | p_x25519.c | 55 const X25519_KEY *peer_key = ctx->peerkey->pkey.ptr; in pkey_x25519_derive() local 56 if (our_key == NULL || peer_key == NULL) { in pkey_x25519_derive() 71 if (!X25519(out, our_key->priv, peer_key->pub)) { in pkey_x25519_derive()
|
/external/boringssl/src/crypto/dh_extra/ |
D | dh_test.cc | 463 bssl::UniquePtr<BIGNUM> priv_key(BN_new()), peer_key(BN_new()); in TEST() local 466 ASSERT_TRUE(peer_key); in TEST() 467 ASSERT_TRUE(BN_set_word(peer_key.get(), 3)); in TEST() 477 int len = DH_compute_key(buf.data(), peer_key.get(), dh.get()); in TEST() 481 len = DH_compute_key_padded(buf.data(), peer_key.get(), dh.get()); in TEST()
|
/external/boringssl/src/tool/ |
D | speed.cc | 635 bssl::UniquePtr<EC_KEY> peer_key(EC_KEY_new_by_curve_name(nid)); in SpeedECDHCurve() local 636 if (!peer_key || in SpeedECDHCurve() 637 !EC_KEY_generate_key(peer_key.get())) { in SpeedECDHCurve() 642 EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), in SpeedECDHCurve() 649 EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), in SpeedECDHCurve()
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | speed.cc | 634 bssl::UniquePtr<EC_KEY> peer_key(EC_KEY_new_by_curve_name(nid)); in SpeedECDHCurve() local 635 if (!peer_key || in SpeedECDHCurve() 636 !EC_KEY_generate_key(peer_key.get())) { in SpeedECDHCurve() 641 EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), in SpeedECDHCurve() 648 EC_KEY_get0_group(peer_key.get()), EC_KEY_get0_public_key(peer_key.get()), in SpeedECDHCurve()
|
/external/wpa_supplicant_8/src/common/ |
D | dpp_crypto.c | 1734 EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid) in dpp_derive_pmkid() argument 1744 pkx = dpp_get_pubkey_point(peer_key, 0); in dpp_derive_pmkid() 2261 EVP_PKEY *own_key = NULL, *peer_key = NULL; in dpp_reconfig_derive_ke_responder() local 2282 peer_key = dpp_parse_jwk(peer_net_access_key, &curve); in dpp_reconfig_derive_ke_responder() 2283 if (!peer_key) in dpp_reconfig_derive_ke_responder() 2285 dpp_debug_print_key("DPP: Received netAccessKey", peer_key); in dpp_reconfig_derive_ke_responder() 2322 CI = EVP_PKEY_get0_EC_KEY(peer_key); in dpp_reconfig_derive_ke_responder() 2369 EVP_PKEY_free(peer_key); in dpp_reconfig_derive_ke_responder() 2380 EVP_PKEY *pr = NULL, *peer_key = NULL; in dpp_reconfig_derive_ke_initiator() local 2404 peer_key = dpp_parse_jwk(net_access_key, &curve); in dpp_reconfig_derive_ke_initiator() [all …]
|
D | dpp_i.h | 114 EVP_PKEY *own_key, EVP_PKEY *peer_key, u8 *pmkid);
|
D | dpp.c | 3678 EVP_PKEY *own_key = NULL, *peer_key = NULL; in dpp_peer_intro() local 3743 peer_key = dpp_parse_jwk(netkey, &curve); in dpp_peer_intro() 3744 if (!peer_key) { in dpp_peer_intro() 3748 dpp_debug_print_key("DPP: Received netAccessKey", peer_key); in dpp_peer_intro() 3759 if (dpp_ecdh(own_key, peer_key, Nx, &Nx_len) < 0) in dpp_peer_intro() 3773 if (dpp_derive_pmkid(curve, own_key, peer_key, intro->pmkid) < 0) { in dpp_peer_intro() 3786 EVP_PKEY_free(peer_key); in dpp_peer_intro()
|
/external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
D | ec.py | 171 peer_key = self._backend._lib.EC_KEY_get0_public_key( 176 z_buf, z_len, peer_key, self._ec_key, self._backend._ffi.NULL
|