| /src/crypto/external/bsd/openssl.old/dist/crypto/dsa/ |
| dsa_key.c | 52 BIGNUM *prk = BN_new(); local 54 if (prk == NULL) 56 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 58 if (!BN_mod_exp(pub_key, dsa->g, prk, dsa->p, ctx)) { 59 BN_free(prk); 62 /* We MUST free prk before any further use of priv_key */ 63 BN_free(prk);
|
| /src/crypto/external/bsd/openssl/dist/crypto/dsa/ |
| dsa_key.c | 47 BIGNUM *prk = BN_new(); local 49 if (prk == NULL) 51 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 54 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) 58 BN_clear_free(prk);
|
| /src/sbin/cgdconfig/ |
| hkdf_hmac_sha256.c | 105 const void *prk, size_t prklen, 119 hmacsha256_init(&hmacsha256, prk, prklen); 169 const uint8_t *prk; member in struct:__anon636 184 .prk = (const uint8_t[]) { 212 .prk = (const uint8_t[]) { 243 .prk = (const uint8_t[]) { 257 if (hkdf_hmac_sha256(okm, C[i].L, C[i].prk, C[i].prklen,
|
| /src/crypto/external/apache2/openssl/dist/crypto/dsa/ |
| dsa_key.c | 46 BIGNUM *prk = BN_new(); local 48 if (prk == NULL) 50 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 53 if (!BN_mod_exp(pub_key, dsa->params.g, prk, dsa->params.p, ctx)) 57 BN_clear_free(prk);
|
| /src/crypto/external/apache2/openssl/dist/crypto/dh/ |
| dh_key.c | 233 BIGNUM *prk = BN_new(); local 236 if (prk == NULL) 253 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 256 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, 261 BN_clear_free(prk);
|
| /src/crypto/external/bsd/openssl/dist/crypto/dh/ |
| dh_key.c | 229 BIGNUM *prk = BN_new(); local 232 if (prk == NULL) 249 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 252 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->params.g, prk, dh->params.p, 257 BN_clear_free(prk);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dh/ |
| dh_key.c | 168 BIGNUM *prk = BN_new(); local 170 if (prk == NULL) 172 BN_with_flags(prk, priv_key, BN_FLG_CONSTTIME); 174 if (!dh->meth->bn_mod_exp(dh, pub_key, dh->g, prk, dh->p, ctx, mont)) { 175 BN_clear_free(prk); 178 /* We MUST free prk before any further use of priv_key */ 179 BN_clear_free(prk);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/kdf/ |
| hkdf.c | 29 unsigned char *prk, size_t *prk_len); 32 const unsigned char *prk, size_t prk_len, 263 unsigned char prk[EVP_MAX_MD_SIZE]; local 267 if (!HKDF_Extract(evp_md, salt, salt_len, key, key_len, prk, &prk_len)) 270 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); 271 OPENSSL_cleanse(prk, sizeof(prk)); 279 unsigned char *prk, size_t *prk_len) 283 if (!HMAC(evp_md, salt, salt_len, key, key_len, prk, &tmp_len)) 287 return prk; [all...] |
| /src/sys/crypto/aes/arch/arm/ |
| aes_neon.c | 249 aes_schedule_low_round(uint8x16_t rk, uint8x16_t prk) 253 /* smear prk */ 254 prk ^= vextq_u8(vdupq_n_u8(0), prk, 12); 255 prk ^= vextq_u8(vdupq_n_u8(0), prk, 8); 256 prk ^= s63; 263 return rk ^ prk; 267 aes_schedule_round(uint8x16_t rk, uint8x16_t prk, uint8x16_t *rcon_rot) 272 prk ^= vextq_u8(*rcon_rot, vdupq_n_u8(0), 15) 366 uint8x16_t prk; \/* previous round key *\/ local 458 uint8x16_t prk; \/* previous round key *\/ local [all...] |
| /src/sys/crypto/aes/arch/x86/ |
| aes_ssse3.c | 208 aes_schedule_low_round(__m128i rk, __m128i prk) 212 /* smear prk */ 213 prk ^= _mm_slli_si128(prk, 4); 214 prk ^= _mm_slli_si128(prk, 8); 215 prk ^= s63.m; 222 return rk ^ prk; 226 aes_schedule_round(__m128i rk, __m128i prk, __m128i *rcon_rot) 230 prk ^= _mm_alignr_epi8(_mm_setzero_si128(), *rcon_rot, 15) 312 __m128i prk; \/* previous round key *\/ local 401 __m128i prk; \/* previous round key *\/ local [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| hkdf.c | 62 unsigned char *prk, size_t prk_len); 64 const unsigned char *prk, size_t prk_len, 450 * HKDF-Extract(salt, IKM) -> PRK 452 * HKDF-Expand(PRK, info, L) -> OKM 460 unsigned char prk[EVP_MAX_MD_SIZE]; local 469 /* Step 1: HKDF-Extract(salt, IKM) -> PRK */ 471 salt, salt_len, ikm, ikm_len, prk, prk_len)) 474 /* Step 2: HKDF-Expand(PRK, info, L) -> OKM */ 475 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); 476 OPENSSL_cleanse(prk, sizeof(prk)) [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kem/ |
| ec_kem.c | 346 uint8_t prk[EVP_MAX_MD_SIZE]; local 350 if (prklen > sizeof(prk)) 356 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, 359 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, 363 OPENSSL_cleanse(prk, prklen); 388 unsigned char prk[OSSL_HPKE_MAX_SECRET]; local 419 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, 427 prk, info->Nsecret, 443 OPENSSL_cleanse(prk, sizeof(prk)); [all...] |
| ecx_kem.c | 303 uint8_t prk[EVP_MAX_MD_SIZE]; local 307 if (prklen > sizeof(prk)) 313 ret = ossl_hpke_labeled_extract(kctx, prk, prklen, 316 && ossl_hpke_labeled_expand(kctx, okm, okmlen, prk, prklen, 320 OPENSSL_cleanse(prk, prklen); 344 unsigned char prk[EVP_MAX_MD_SIZE]; local 363 if (!ossl_hpke_labeled_extract(kdfctx, prk, info->Nsecret, 368 if (!ossl_hpke_labeled_expand(kdfctx, privout, info->Nsk, prk, info->Nsecret, 374 OPENSSL_cleanse(prk, sizeof(prk)); [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| hkdf.c | 57 unsigned char *prk, size_t prk_len); 59 const unsigned char *prk, size_t prk_len, 399 * HKDF-Extract(salt, IKM) -> PRK 401 * HKDF-Expand(PRK, info, L) -> OKM 409 unsigned char prk[EVP_MAX_MD_SIZE]; local 418 /* Step 1: HKDF-Extract(salt, IKM) -> PRK */ 420 salt, salt_len, ikm, ikm_len, prk, prk_len)) 423 /* Step 2: HKDF-Expand(PRK, info, L) -> OKM */ 424 ret = HKDF_Expand(evp_md, prk, prk_len, info, info_len, okm, okm_len); 425 OPENSSL_cleanse(prk, sizeof(prk)) [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_crypto.c | 391 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 399 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) 401 wpa_hexdump_key(MSG_DEBUG, "DPP: PRK = HKDF-Extract(<>, IKM=M.x)", 402 prk, hash_len); 404 /* HKDF-Expand(PRK, info, L) */ 405 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); 406 os_memset(prk, 0, hash_len); 410 wpa_hexdump_key(MSG_DEBUG, "DPP: k1 = HKDF-Expand(PRK, info, L)", 418 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 426 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); 1144 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 1618 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; local 1693 u8 prk[DPP_MAX_HASH_LEN]; local 1794 u8 prk[DPP_MAX_HASH_LEN]; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 2066 u8 prk[SHA256_MAC_LEN]; local 2158 if (hmac_sha256(salt1, sizeof(salt1), ikm1, sizeof(ikm1), prk) < 0) 2160 if (os_memcmp(prk, prk1, SHA256_MAC_LEN) != 0) { 2161 wpa_printf(MSG_INFO, "HKDF-Extract mismatch in PRK"); 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) 2175 if (os_memcmp(prk, prk2, SHA256_MAC_LEN) != 0) { 2176 wpa_printf(MSG_INFO, "HKDF-Extract mismatch in PRK");
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 6495 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local 6558 /* prk = HKDF-extract(C | A | group, z) */ 6604 wpabuf_head(secret), wpabuf_len(secret), prk); 6607 wpabuf_head(secret), wpabuf_len(secret), prk); 6610 wpabuf_head(secret), wpabuf_len(secret), prk); 6616 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); 6618 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ 6621 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, 6624 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11.c | 3615 u8 prk[SHA512_MAC_LEN], pmkid[SHA512_MAC_LEN]; local 3669 /* prk = HKDF-extract(C | A | group, z) */ 3716 wpabuf_head(secret), wpabuf_len(secret), prk); 3719 wpabuf_head(secret), wpabuf_len(secret), prk); 3722 wpabuf_head(secret), wpabuf_len(secret), prk); 3728 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); 3730 /* PMK = HKDF-expand(prk, "OWE Key Generation", n) */ 3735 os_memset(prk, 0, SHA512_MAC_LEN); 3740 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info [all...] |