Home
last modified time | relevance | path

Searched refs:prk (Results 1 – 15 of 15) sorted by relevance

/freebsd/crypto/openssl/include/internal/
H A Dhpke_util.h72 unsigned char *prk, size_t prklen,
78 const unsigned char *prk, size_t prklen,
82 unsigned char *prk, size_t prklen,
90 const unsigned char *prk, size_t prklen,
/freebsd/crypto/openssl/crypto/dsa/
H A Ddsa_key.c46 BIGNUM *prk = BN_new(); in ossl_dsa_generate_public_key() local
48 if (prk == NULL) in ossl_dsa_generate_public_key()
50 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dsa_generate_public_key()
53 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) in ossl_dsa_generate_public_key()
57 BN_clear_free(prk); in ossl_dsa_generate_public_key()
/freebsd/crypto/openssl/crypto/hpke/
H A Dhpke_util.c274 unsigned char *prk, size_t prklen, in ossl_hpke_kdf_extract() argument
278 return kdf_derive(kctx, prk, prklen, EVP_KDF_HKDF_MODE_EXTRACT_ONLY, in ossl_hpke_kdf_extract()
285 const unsigned char *prk, size_t prklen, in ossl_hpke_kdf_expand() argument
289 NULL, 0, prk, prklen, info, infolen); in ossl_hpke_kdf_expand()
296 unsigned char *prk, size_t prklen, in ossl_hpke_labeled_extract() argument
333 ret = ossl_hpke_kdf_extract(kctx, prk, prklen, salt, saltlen, in ossl_hpke_labeled_extract()
347 const unsigned char *prk, size_t prklen, in ossl_hpke_labeled_expand() argument
385 prk, prklen, labeled_info, labeled_infolen); in ossl_hpke_labeled_expand()
/freebsd/crypto/openssl/providers/implementations/kem/
H A Decx_kem.c303 uint8_t prk[EVP_MAX_MD_SIZE]; in dhkem_extract_and_expand() local
307 if (prklen > sizeof(prk)) in dhkem_extract_and_expand()
313 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, in dhkem_extract_and_expand()
316 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, in dhkem_extract_and_expand()
320 OPENSSL_cleanse(prk, prklen); in dhkem_extract_and_expand()
344 unsigned char prk[EVP_MAX_MD_SIZE]; in ossl_ecx_dhkem_derive_private() local
363 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, in ossl_ecx_dhkem_derive_private()
368 if (!ossl_hpke_labeled_expand(kdfctx, privout, info->Nsk, prk, info->Nsecret, in ossl_ecx_dhkem_derive_private()
374 OPENSSL_cleanse(prk, sizeof(prk)); in ossl_ecx_dhkem_derive_private()
H A Dec_kem.c346 uint8_t prk[EVP_MAX_MD_SIZE]; in dhkem_extract_and_expand() local
350 if (prklen > sizeof(prk)) in dhkem_extract_and_expand()
356 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, in dhkem_extract_and_expand()
359 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, in dhkem_extract_and_expand()
363 OPENSSL_cleanse(prk, prklen); in dhkem_extract_and_expand()
388 unsigned char prk[OSSL_HPKE_MAX_SECRET]; in ossl_ec_dhkem_derive_private() local
419 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, in ossl_ec_dhkem_derive_private()
427 prk, info->Nsecret, in ossl_ec_dhkem_derive_private()
443 OPENSSL_cleanse(prk, sizeof(prk)); in ossl_ec_dhkem_derive_private()
/freebsd/contrib/wpa/src/common/
H A Ddpp_crypto.c391 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
399 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
402 prk, hash_len); in dpp_derive_k1()
405 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1()
406 os_memset(prk, 0, hash_len); in dpp_derive_k1()
418 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
426 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
430 prk, hash_len); in dpp_derive_k2()
433 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2()
434 os_memset(prk, 0, hash_len); in dpp_derive_k2()
[all …]
H A Dsae.c537 u8 *prk) in hkdf_extract() argument
541 prk); in hkdf_extract()
545 prk); in hkdf_extract()
550 prk); in hkdf_extract()
556 static int hkdf_expand(size_t hash_len, const u8 *prk, size_t prk_len, in hkdf_expand() argument
562 return hmac_sha256_kdf(prk, prk_len, NULL, in hkdf_expand()
567 return hmac_sha384_kdf(prk, prk_len, NULL, in hkdf_expand()
573 return hmac_sha512_kdf(prk, prk_len, NULL, in hkdf_expand()
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dhkdf.c62 unsigned char *prk, size_t prk_len);
64 const unsigned char *prk, size_t prk_len,
460 unsigned char prk[EVP_MAX_MD_SIZE]; in HKDF() local
471 salt, salt_len, ikm, ikm_len, prk, prk_len)) in HKDF()
475 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); in HKDF()
476 OPENSSL_cleanse(prk, sizeof(prk)); in HKDF()
508 unsigned char *prk, size_t prk_len) in HKDF_Extract() argument
520 salt_len, ikm, ikm_len, prk, EVP_MD_get_size(evp_md), NULL) in HKDF_Extract()
564 const unsigned char *prk, size_t prk_len, in HKDF_Expand() argument
590 if (!HMAC_Init_ex(hmac, prk, prk_len, evp_md, NULL)) in HKDF_Expand()
/freebsd/crypto/openssl/crypto/dh/
H A Ddh_key.c233 BIGNUM *prk = BN_new(); in ossl_dh_generate_public_key() local
236 if (prk == NULL) in ossl_dh_generate_public_key()
253 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); in ossl_dh_generate_public_key()
256 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, in ossl_dh_generate_public_key()
261 BN_clear_free(prk); in ossl_dh_generate_public_key()
/freebsd/crypto/openssl/test/
H A Dtls13secretstest.c242 static int test_secret(SSL_CONNECTION *s, unsigned char *prk, in test_secret() argument
259 if (!tls13_hkdf_expand(s, md, prk, label, labellen, hash, hashsize, in test_secret()
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_module_tests.c2066 u8 prk[SHA256_MAC_LEN]; in test_extract_expand_hkdf() local
2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) in test_extract_expand_hkdf()
2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { in test_extract_expand_hkdf()
H A Dcrypto_openssl.c4753 const u8 *ikm, size_t ikm_len, u8 *prk) in hpke_labeled_extract() argument
4806 res = EVP_MAC_final(hctx, prk, &mlen, mdlen); in hpke_labeled_extract()
4827 res = HMAC_Final(hctx, prk, &mdlen); in hpke_labeled_extract()
4837 hpke_labeled_expand(struct hpke_context *ctx, bool kem, const u8 *prk, in hpke_labeled_expand() argument
4905 if (EVP_MAC_init(hctx, prk, mdlen, params) != 1) in hpke_labeled_expand()
4921 if (HMAC_Init_ex(hctx, prk, mdlen, in hpke_labeled_expand()
/freebsd/tests/sys/kern/
H A Dptrace_test.c4428 struct procctl_reaper_kill prk; in ATF_TC_BODY() local
4459 memset(&prk, 0, sizeof(prk)); in ATF_TC_BODY()
4460 prk.rk_sig = SIGTERM; in ATF_TC_BODY()
4461 error = procctl(P_PID, getpid(), PROC_REAP_KILL, &prk); in ATF_TC_BODY()
4463 REQUIRE_EQ(1u, prk.rk_killed); in ATF_TC_BODY()
4464 REQUIRE_EQ(-1, prk.rk_fpid); in ATF_TC_BODY()
/freebsd/contrib/wpa/src/rsn_supp/
H A Dwpa.c6495 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_resp() local
6604 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
6607 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
6610 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_resp()
6616 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp()
6621 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
6624 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
6627 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp()
6629 forced_memzero(prk, SHA512_MAC_LEN); in owe_process_assoc_resp()
/freebsd/contrib/wpa/src/ap/
H A Dieee802_11.c3615 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; in owe_process_assoc_req() local
3716 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
3719 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
3722 wpabuf_head(secret), wpabuf_len(secret), prk); in owe_process_assoc_req()
3728 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_req()
3735 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()
3740 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
3743 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
3746 res = hmac_sha512_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_req()
3748 os_memset(prk, 0, SHA512_MAC_LEN); in owe_process_assoc_req()