| /freebsd/crypto/openssl/include/internal/ |
| H A D | hpke_util.h | 72 unsigned char *prk, size_t prklen, 78 const unsigned char *prk, size_t prklen, 82 unsigned char *prk, size_t prklen, 90 const unsigned char *prk, size_t prklen,
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_key.c | 46 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local 48 if (prk == NULL) in ossl_dsa_generate_public_key() 50 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key() 53 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key() 57 BN_clear_free(prk); in ossl_dsa_generate_public_key()
|
| /freebsd/crypto/openssl/crypto/hpke/ |
| H A D | hpke_util.c | 274 unsigned char *prk, size_t prklen, in ossl_hpke_kdf_extract() argument 278 return kdf_derive(kctx, prk, prklen, EVP_KDF_HKDF_MODE_EXTRACT_ONLY, in ossl_hpke_kdf_extract() 285 const unsigned char *prk, size_t prklen, in ossl_hpke_kdf_expand() argument 289 NULL, 0, prk, prklen, info, infolen); in ossl_hpke_kdf_expand() 296 unsigned char *prk, size_t prklen, in ossl_hpke_labeled_extract() argument 333 ret = ossl_hpke_kdf_extract(kctx, prk, prklen, salt, saltlen, in ossl_hpke_labeled_extract() 347 const unsigned char *prk, size_t prklen, in ossl_hpke_labeled_expand() argument 385 prk, prklen, labeled_info, labeled_infolen); in ossl_hpke_labeled_expand()
|
| /freebsd/crypto/openssl/providers/implementations/kem/ |
| H A D | ecx_kem.c | 303 uint8_t prk[EVP_MAX_MD_SIZE]; in dhkem_extract_and_expand() local 307 if (prklen > sizeof(prk)) in dhkem_extract_and_expand() 313 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, in dhkem_extract_and_expand() 316 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, in dhkem_extract_and_expand() 320 OPENSSL_cleanse(prk, prklen); in dhkem_extract_and_expand() 344 unsigned char prk[EVP_MAX_MD_SIZE]; in ossl_ecx_dhkem_derive_private() local 363 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, in ossl_ecx_dhkem_derive_private() 368 if (!ossl_hpke_labeled_expand(kdfctx, privout, info->Nsk, prk, info->Nsecret, in ossl_ecx_dhkem_derive_private() 374 OPENSSL_cleanse(prk, sizeof(prk)); in ossl_ecx_dhkem_derive_private()
|
| H A D | ec_kem.c | 346 uint8_t prk[EVP_MAX_MD_SIZE]; in dhkem_extract_and_expand() local 350 if (prklen > sizeof(prk)) in dhkem_extract_and_expand() 356 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, in dhkem_extract_and_expand() 359 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, in dhkem_extract_and_expand() 363 OPENSSL_cleanse(prk, prklen); in dhkem_extract_and_expand() 388 unsigned char prk[OSSL_HPKE_MAX_SECRET]; in ossl_ec_dhkem_derive_private() local 419 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, in ossl_ec_dhkem_derive_private() 427 prk, info->Nsecret, in ossl_ec_dhkem_derive_private() 443 OPENSSL_cleanse(prk, sizeof(prk)); in ossl_ec_dhkem_derive_private()
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | dpp_crypto.c | 391 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 399 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 402 prk, hash_len); in dpp_derive_k1() 405 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1() 406 os_memset(prk, 0, hash_len); in dpp_derive_k1() 418 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 426 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 430 prk, hash_len); in dpp_derive_k2() 433 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2() 434 os_memset(prk, 0, hash_len); in dpp_derive_k2() [all …]
|
| H A D | sae.c | 537 u8 *prk) in hkdf_extract() argument 541 prk); in hkdf_extract() 545 prk); in hkdf_extract() 550 prk); in hkdf_extract() 556 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument 562 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand() 567 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand() 573 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
|
| /freebsd/crypto/openssl/providers/implementations/kdfs/ |
| H A D | hkdf.c | 62 unsigned char *prk, size_t prk_len); 64 const unsigned char *prk, size_t prk_len, 460 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local 471 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF() 475 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF() 476 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF() 508 unsigned char *prk, size_t prk_len) in HKDF_Extract() argument 520 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract() 564 const unsigned char *prk, size_t prk_len, in HKDF_Expand() argument 590 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL)) in HKDF_Expand()
|
| /freebsd/crypto/openssl/crypto/dh/ |
| H A D | dh_key.c | 233 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local 236 if (prk == NULL) in ossl_dh_generate_public_key() 253 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key() 256 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key() 261 BN_clear_free(prk); in ossl_dh_generate_public_key()
|
| /freebsd/crypto/openssl/test/ |
| H A D | tls13secretstest.c | 242 static int test_secret(SSL_CONNECTION *s, unsigned char *prk, in test_secret() argument 259 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | crypto_module_tests.c | 2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local 2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf() 2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf() 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf() 2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
|
| H A D | crypto_openssl.c | 4753 const u8 *ikm, size_t ikm_len, u8 *prk) in hpke_labeled_extract() argument 4806 res = EVP_MAC_final(hctx, prk, &mlen, mdlen); in hpke_labeled_extract() 4827 res = HMAC_Final(hctx, prk, &mdlen); in hpke_labeled_extract() 4837 hpke_labeled_expand(struct hpke_context *ctx, bool kem, const u8 *prk, in hpke_labeled_expand() argument 4905 if (EVP_MAC_init(hctx, prk, mdlen, params) != 1) in hpke_labeled_expand() 4921 if (HMAC_Init_ex(hctx, prk, mdlen, in hpke_labeled_expand()
|
| /freebsd/tests/sys/kern/ |
| H A D | ptrace_test.c | 4428 struct procctl_reaper_kill prk; in ATF_TC_BODY() local 4459 memset(&prk, 0, sizeof(prk)); in ATF_TC_BODY() 4460 prk.rk_sig = SIGTERM; in ATF_TC_BODY() 4461 error = procctl(P_PID, getpid(), PROC_REAP_KILL, &prk); in ATF_TC_BODY() 4463 REQUIRE_EQ(1u, prk.rk_killed); in ATF_TC_BODY() 4464 REQUIRE_EQ(-1, prk.rk_fpid); in ATF_TC_BODY()
|
| /freebsd/contrib/wpa/src/rsn_supp/ |
| H A D | wpa.c | 6495 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local 6604 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 6607 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 6610 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp() 6616 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp() 6621 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 6624 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 6627 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 6629 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
|
| /freebsd/contrib/wpa/src/ap/ |
| H A D | ieee802_11.c | 3615 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local 3716 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 3719 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 3722 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req() 3728 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req() 3735 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req() 3740 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 3743 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 3746 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req() 3748 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
|