Home
last modified time | relevance | path

Searched refs:kem (Results 1 – 25 of 45) sorted by relevance

12

/external/boringssl/src/crypto/hpke/
Dhpke.c47 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret,
154 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument
179 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed()
204 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap()
229 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument
231 size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_public_key_len() argument
232 return kem->public_key_len; in EVP_HPKE_KEM_public_key_len()
235 size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_private_key_len() argument
236 return kem->private_key_len; in EVP_HPKE_KEM_private_key_len()
239 size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem) { return kem->enc_len; } in EVP_HPKE_KEM_enc_len() argument
[all …]
Dhpke_test.cc60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local
71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify()
79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
/external/cronet/third_party/boringssl/src/crypto/hpke/
Dhpke.c47 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret,
154 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument
179 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed()
204 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap()
229 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument
231 size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_public_key_len() argument
232 return kem->public_key_len; in EVP_HPKE_KEM_public_key_len()
235 size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_private_key_len() argument
236 return kem->private_key_len; in EVP_HPKE_KEM_private_key_len()
239 size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem) { return kem->enc_len; } in EVP_HPKE_KEM_enc_len() argument
[all …]
Dhpke_test.cc60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local
71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify()
79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
/external/rust/crates/quiche/deps/boringssl/src/crypto/hpke/
Dhpke.c46 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret,
153 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument
178 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed()
203 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap()
227 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument
261 int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, in EVP_HPKE_KEY_init() argument
264 key->kem = kem; in EVP_HPKE_KEY_init()
265 if (!kem->init_key(key, priv_key, priv_key_len)) { in EVP_HPKE_KEY_init()
266 key->kem = NULL; in EVP_HPKE_KEY_init()
272 int EVP_HPKE_KEY_generate(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEY_generate() argument
[all …]
Dhpke_test.cc60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local
71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify()
79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
/external/cronet/third_party/boringssl/src/include/openssl/
Dhpke.h52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem);
60 OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem);
68 OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem);
76 OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem);
148 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem,
154 const EVP_HPKE_KEM *kem);
225 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
235 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
334 const EVP_HPKE_KEM *kem; member
345 const EVP_HPKE_KEM *kem; member
/external/boringssl/src/include/openssl/
Dhpke.h52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem);
60 OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem);
68 OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem);
76 OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem);
148 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem,
154 const EVP_HPKE_KEM *kem);
225 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
235 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
334 const EVP_HPKE_KEM *kem; member
345 const EVP_HPKE_KEM *kem; member
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Dhpke.h52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem);
119 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem,
125 const EVP_HPKE_KEM *kem);
205 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
215 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead,
320 const EVP_HPKE_KEM *kem; member
/external/cldr/common/testData/transforms/
Dam-Latn-t-am-m0-bgn.txt355 ከሚቃረኑ kemīk’arenu
356 ከሚነሳሳ kemīnesasa
357 ከሚኖርበት kemīnoribeti
358 ከሚደረግ kemīderegi
359 ከሚጥሱ kemīt’isu
/external/boringssl/src/ssl/test/runner/
Dkey_agreement.go491 kem kemImplementation member
520 if ka.kem, ok = kemForCurveID(curveid, config); !ok {
525 publicKey, err := ka.kem.generate(config.rand())
551 return ka.kem.decap(ckx.ciphertext[1:])
565 if ka.kem, ok = kemForCurveID(curveID, config); !ok {
583 if ka.kem == nil {
587 ciphertext, secret, err := ka.kem.encap(config.rand(), ka.peerKey)
Dhandshake_client.go646 kem, ok := kemForCurveID(curveID, c.config)
650 publicKey, err := kem.generate(c.config.rand())
666 hs.keyShares[curveID] = kem
1125 kem, ok := hs.keyShares[hs.serverHello.keyShare.group]
1133 ecdheSecret, err = kem.decap(hs.serverHello.keyShare.keyExchange)
1532 kem, ok := kemForCurveID(group, c.config)
1536 publicKey, err := kem.generate(c.config.rand())
1540 hs.keyShares[group] = kem
Dhandshake_server.go960 kem, ok := kemForCurveID(selectedCurve, config)
980 ciphertext, ecdheSecret, err := kem.encap(config.rand(), peerKey)
/external/cronet/third_party/boringssl/src/ssl/test/runner/
Dkey_agreement.go491 kem kemImplementation member
520 if ka.kem, ok = kemForCurveID(curveid, config); !ok {
525 publicKey, err := ka.kem.generate(config.rand())
551 return ka.kem.decap(ckx.ciphertext[1:])
565 if ka.kem, ok = kemForCurveID(curveID, config); !ok {
583 if ka.kem == nil {
587 ciphertext, secret, err := ka.kem.encap(config.rand(), ka.peerKey)
Dhandshake_client.go646 kem, ok := kemForCurveID(curveID, c.config)
650 publicKey, err := kem.generate(c.config.rand())
666 hs.keyShares[curveID] = kem
1125 kem, ok := hs.keyShares[hs.serverHello.keyShare.group]
1133 ecdheSecret, err = kem.decap(hs.serverHello.keyShare.keyExchange)
1532 kem, ok := kemForCurveID(group, c.config)
1536 publicKey, err := kem.generate(c.config.rand())
1540 hs.keyShares[group] = kem
Dhandshake_server.go960 kem, ok := kemForCurveID(selectedCurve, config)
980 ciphertext, ecdheSecret, err := kem.encap(config.rand(), peerKey)
/external/cronet/net/third_party/quiche/src/quiche/oblivious_http/common/
Doblivious_http_header_key_config.cc103 auto kem = CheckKemId(kem_id_); in GetHpkeKem() local
104 QUICHE_CHECK_OK(kem.status()); in GetHpkeKem()
105 return kem.value(); in GetHpkeKem()
/external/icu/icu4c/source/data/curr/
Dhu.txt120 "Bolgár kemény leva",
272 "Csehszlovák kemény korona",
1108 "Jugoszláv kemény dínár",
1372 one{"Bolgár kemény leva"}
1373 other{"Bolgár kemény leva"}
1508 one{"csehszlovák kemény korona"}
1509 other{"csehszlovák kemény korona"}
2192 one{"jugoszláv kemény dinár (1966–1990)"}
2193 other{"jugoszláv kemény dinár (1966–1990)"}
/external/cronet/third_party/icu/source/data/curr/
Dhu.txt120 "Bolgár kemény leva",
272 "Csehszlovák kemény korona",
1108 "Jugoszláv kemény dínár",
1372 one{"Bolgár kemény leva"}
1373 other{"Bolgár kemény leva"}
1508 one{"csehszlovák kemény korona"}
1509 other{"csehszlovák kemény korona"}
2192 one{"jugoszláv kemény dinár (1966–1990)"}
2193 other{"jugoszláv kemény dinár (1966–1990)"}
/external/wpa_supplicant_8/src/crypto/
Dcrypto_openssl.c4705 static size_t hpke_suite_id(struct hpke_context *ctx, bool kem, u8 *suite_id) in hpke_suite_id() argument
4709 if (kem) { in hpke_suite_id()
4724 static int hpke_labeled_extract(struct hpke_context *ctx, bool kem, in hpke_labeled_extract() argument
4732 unsigned int mdlen = kem ? ctx->kem_n_h : ctx->n_h; in hpke_labeled_extract()
4750 suite_id_len = hpke_suite_id(ctx, kem, suite_id); in hpke_labeled_extract()
4762 (char *) EVP_MD_get0_name(kem ? ctx->kem_h : ctx->kdf_h), 0); in hpke_labeled_extract()
4791 res = HMAC_Init_ex(hctx, salt, salt_len, kem ? ctx->kem_h : ctx->kdf_h, in hpke_labeled_extract()
4811 hpke_labeled_expand(struct hpke_context *ctx, bool kem, const u8 *prk, in hpke_labeled_expand() argument
4838 suite_id_len = hpke_suite_id(ctx, kem, suite_id); in hpke_labeled_expand()
4863 (char *) EVP_MD_get0_name(kem ? ctx->kem_h : ctx->kdf_h), 0); in hpke_labeled_expand()
[all …]
/external/cronet/third_party/boringssl/src/ssl/
Dhandshake_client.cc1483 bssl::UniquePtr<SSLKeyShare> kem = in do_send_client_key_exchange() local
1486 if (!kem || !kem->Encap(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange()
Dencrypted_client_hello.cc658 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local
678 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()
/external/boringssl/src/ssl/
Dhandshake_client.cc1487 bssl::UniquePtr<SSLKeyShare> kem = in do_send_client_key_exchange() local
1490 if (!kem || !kem->Encap(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange()
Dencrypted_client_hello.cc658 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local
678 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()
/external/rust/crates/quiche/deps/boringssl/src/ssl/
Dencrypted_client_hello.cc684 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local
702 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()

12