/external/boringssl/src/crypto/hpke/ |
D | hpke.c | 47 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, 154 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument 179 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed() 204 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap() 229 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument 231 size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_public_key_len() argument 232 return kem->public_key_len; in EVP_HPKE_KEM_public_key_len() 235 size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_private_key_len() argument 236 return kem->private_key_len; in EVP_HPKE_KEM_private_key_len() 239 size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem) { return kem->enc_len; } in EVP_HPKE_KEM_enc_len() argument [all …]
|
D | hpke_test.cc | 60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local 71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify() 79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
|
/external/cronet/third_party/boringssl/src/crypto/hpke/ |
D | hpke.c | 47 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, 154 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument 179 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed() 204 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap() 229 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument 231 size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_public_key_len() argument 232 return kem->public_key_len; in EVP_HPKE_KEM_public_key_len() 235 size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEM_private_key_len() argument 236 return kem->private_key_len; in EVP_HPKE_KEM_private_key_len() 239 size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem) { return kem->enc_len; } in EVP_HPKE_KEM_enc_len() argument [all …]
|
D | hpke_test.cc | 60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local 71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify() 79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hpke/ |
D | hpke.c | 46 int (*encap_with_seed)(const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, 153 const EVP_HPKE_KEM *kem, uint8_t *out_shared_secret, in x25519_encap_with_seed() argument 178 if (!dhkem_extract_and_expand(kem->id, EVP_sha256(), out_shared_secret, in x25519_encap_with_seed() 203 if (!dhkem_extract_and_expand(key->kem->id, EVP_sha256(), out_shared_secret, in x25519_decap() 227 uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem) { return kem->id; } in EVP_HPKE_KEM_id() argument 261 int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, in EVP_HPKE_KEY_init() argument 264 key->kem = kem; in EVP_HPKE_KEY_init() 265 if (!kem->init_key(key, priv_key, priv_key_len)) { in EVP_HPKE_KEY_init() 266 key->kem = NULL; in EVP_HPKE_KEY_init() 272 int EVP_HPKE_KEY_generate(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem) { in EVP_HPKE_KEY_generate() argument [all …]
|
D | hpke_test.cc | 60 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in Verify() local 71 sender_ctx.get(), enc, &enc_len, sizeof(enc), kem, kdf, aead, in Verify() 79 ASSERT_TRUE(EVP_HPKE_KEY_init(base_key.get(), kem, secret_key_r_.data(), in Verify()
|
/external/cronet/third_party/boringssl/src/include/openssl/ |
D | hpke.h | 52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem); 60 OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem); 68 OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem); 76 OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem); 148 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, 154 const EVP_HPKE_KEM *kem); 225 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 235 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 334 const EVP_HPKE_KEM *kem; member 345 const EVP_HPKE_KEM *kem; member
|
/external/boringssl/src/include/openssl/ |
D | hpke.h | 52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem); 60 OPENSSL_EXPORT size_t EVP_HPKE_KEM_public_key_len(const EVP_HPKE_KEM *kem); 68 OPENSSL_EXPORT size_t EVP_HPKE_KEM_private_key_len(const EVP_HPKE_KEM *kem); 76 OPENSSL_EXPORT size_t EVP_HPKE_KEM_enc_len(const EVP_HPKE_KEM *kem); 148 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, 154 const EVP_HPKE_KEM *kem); 225 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 235 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 334 const EVP_HPKE_KEM *kem; member 345 const EVP_HPKE_KEM *kem; member
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | hpke.h | 52 OPENSSL_EXPORT uint16_t EVP_HPKE_KEM_id(const EVP_HPKE_KEM *kem); 119 OPENSSL_EXPORT int EVP_HPKE_KEY_init(EVP_HPKE_KEY *key, const EVP_HPKE_KEM *kem, 125 const EVP_HPKE_KEM *kem); 205 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 215 const EVP_HPKE_KEM *kem, const EVP_HPKE_KDF *kdf, const EVP_HPKE_AEAD *aead, 320 const EVP_HPKE_KEM *kem; member
|
/external/cldr/common/testData/transforms/ |
D | am-Latn-t-am-m0-bgn.txt | 355 ከሚቃረኑ kemīk’arenu 356 ከሚነሳሳ kemīnesasa 357 ከሚኖርበት kemīnoribeti 358 ከሚደረግ kemīderegi 359 ከሚጥሱ kemīt’isu
|
/external/boringssl/src/ssl/test/runner/ |
D | key_agreement.go | 491 kem kemImplementation member 520 if ka.kem, ok = kemForCurveID(curveid, config); !ok { 525 publicKey, err := ka.kem.generate(config.rand()) 551 return ka.kem.decap(ckx.ciphertext[1:]) 565 if ka.kem, ok = kemForCurveID(curveID, config); !ok { 583 if ka.kem == nil { 587 ciphertext, secret, err := ka.kem.encap(config.rand(), ka.peerKey)
|
D | handshake_client.go | 646 kem, ok := kemForCurveID(curveID, c.config) 650 publicKey, err := kem.generate(c.config.rand()) 666 hs.keyShares[curveID] = kem 1125 kem, ok := hs.keyShares[hs.serverHello.keyShare.group] 1133 ecdheSecret, err = kem.decap(hs.serverHello.keyShare.keyExchange) 1532 kem, ok := kemForCurveID(group, c.config) 1536 publicKey, err := kem.generate(c.config.rand()) 1540 hs.keyShares[group] = kem
|
D | handshake_server.go | 960 kem, ok := kemForCurveID(selectedCurve, config) 980 ciphertext, ecdheSecret, err := kem.encap(config.rand(), peerKey)
|
/external/cronet/third_party/boringssl/src/ssl/test/runner/ |
D | key_agreement.go | 491 kem kemImplementation member 520 if ka.kem, ok = kemForCurveID(curveid, config); !ok { 525 publicKey, err := ka.kem.generate(config.rand()) 551 return ka.kem.decap(ckx.ciphertext[1:]) 565 if ka.kem, ok = kemForCurveID(curveID, config); !ok { 583 if ka.kem == nil { 587 ciphertext, secret, err := ka.kem.encap(config.rand(), ka.peerKey)
|
D | handshake_client.go | 646 kem, ok := kemForCurveID(curveID, c.config) 650 publicKey, err := kem.generate(c.config.rand()) 666 hs.keyShares[curveID] = kem 1125 kem, ok := hs.keyShares[hs.serverHello.keyShare.group] 1133 ecdheSecret, err = kem.decap(hs.serverHello.keyShare.keyExchange) 1532 kem, ok := kemForCurveID(group, c.config) 1536 publicKey, err := kem.generate(c.config.rand()) 1540 hs.keyShares[group] = kem
|
D | handshake_server.go | 960 kem, ok := kemForCurveID(selectedCurve, config) 980 ciphertext, ecdheSecret, err := kem.encap(config.rand(), peerKey)
|
/external/cronet/net/third_party/quiche/src/quiche/oblivious_http/common/ |
D | oblivious_http_header_key_config.cc | 103 auto kem = CheckKemId(kem_id_); in GetHpkeKem() local 104 QUICHE_CHECK_OK(kem.status()); in GetHpkeKem() 105 return kem.value(); in GetHpkeKem()
|
/external/icu/icu4c/source/data/curr/ |
D | hu.txt | 120 "Bolgár kemény leva", 272 "Csehszlovák kemény korona", 1108 "Jugoszláv kemény dínár", 1372 one{"Bolgár kemény leva"} 1373 other{"Bolgár kemény leva"} 1508 one{"csehszlovák kemény korona"} 1509 other{"csehszlovák kemény korona"} 2192 one{"jugoszláv kemény dinár (1966–1990)"} 2193 other{"jugoszláv kemény dinár (1966–1990)"}
|
/external/cronet/third_party/icu/source/data/curr/ |
D | hu.txt | 120 "Bolgár kemény leva", 272 "Csehszlovák kemény korona", 1108 "Jugoszláv kemény dínár", 1372 one{"Bolgár kemény leva"} 1373 other{"Bolgár kemény leva"} 1508 one{"csehszlovák kemény korona"} 1509 other{"csehszlovák kemény korona"} 2192 one{"jugoszláv kemény dinár (1966–1990)"} 2193 other{"jugoszláv kemény dinár (1966–1990)"}
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 4705 static size_t hpke_suite_id(struct hpke_context *ctx, bool kem, u8 *suite_id) in hpke_suite_id() argument 4709 if (kem) { in hpke_suite_id() 4724 static int hpke_labeled_extract(struct hpke_context *ctx, bool kem, in hpke_labeled_extract() argument 4732 unsigned int mdlen = kem ? ctx->kem_n_h : ctx->n_h; in hpke_labeled_extract() 4750 suite_id_len = hpke_suite_id(ctx, kem, suite_id); in hpke_labeled_extract() 4762 (char *) EVP_MD_get0_name(kem ? ctx->kem_h : ctx->kdf_h), 0); in hpke_labeled_extract() 4791 res = HMAC_Init_ex(hctx, salt, salt_len, kem ? ctx->kem_h : ctx->kdf_h, in hpke_labeled_extract() 4811 hpke_labeled_expand(struct hpke_context *ctx, bool kem, const u8 *prk, in hpke_labeled_expand() argument 4838 suite_id_len = hpke_suite_id(ctx, kem, suite_id); in hpke_labeled_expand() 4863 (char *) EVP_MD_get0_name(kem ? ctx->kem_h : ctx->kdf_h), 0); in hpke_labeled_expand() [all …]
|
/external/cronet/third_party/boringssl/src/ssl/ |
D | handshake_client.cc | 1483 bssl::UniquePtr<SSLKeyShare> kem = in do_send_client_key_exchange() local 1486 if (!kem || !kem->Encap(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange()
|
D | encrypted_client_hello.cc | 658 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local 678 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()
|
/external/boringssl/src/ssl/ |
D | handshake_client.cc | 1487 bssl::UniquePtr<SSLKeyShare> kem = in do_send_client_key_exchange() local 1490 if (!kem || !kem->Encap(&child, &pms, &alert, hs->peer_key)) { in do_send_client_key_exchange()
|
D | encrypted_client_hello.cc | 658 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local 678 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | encrypted_client_hello.cc | 684 const EVP_HPKE_KEM *kem = EVP_hpke_x25519_hkdf_sha256(); in ssl_select_ech_config() local 702 out_enc.size(), kem, kdf, aead, ech_config.public_key.data(), in ssl_select_ech_config()
|