HomeSort by relevance Sort by last modified time
    Searched refs:prk (Results 1 - 5 of 5) sorted by null

  /external/boringssl/src/crypto/hkdf/
hkdf.c 30 uint8_t prk[EVP_MAX_MD_SIZE]; local
33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt,
35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) {
60 const uint8_t *prk, size_t prk_len, const uint8_t *info,
78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
hkdf_test.cc 35 const uint8_t prk[EVP_MAX_MD_SIZE]; member in struct:HKDFTestVector
255 uint8_t prk[EVP_MAX_MD_SIZE]; local
257 if (!HKDF_extract(prk, &prk_len, test->md_func(), test->ikm, test->ikm_len,
264 OPENSSL_memcmp(prk, test->prk, test->prk_len) != 0) {
265 fprintf(stderr, "%zu: Resulting PRK does not match test vector\n", i);
269 if (!HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len,
  /external/boringssl/src/ssl/test/runner/
hkdf.go 33 func hkdfExpand(hash func() hash.Hash, prk, info []byte, length int) []byte {
38 if len(prk) < hashSize {
39 panic("hkdfExpand: prk too short")
44 hmac := hmac.New(hash, prk)
hkdf_test.go 27 ikm, salt, info, prk, okm []byte
91 prk := hkdfExtract(tt.hash.New, tt.salt, tt.ikm)
92 if !bytes.Equal(prk, tt.prk) {
93 t.Errorf("%d. got hkdfExtract(%x, %x) = %x; wanted %x", i+1, tt.salt, tt.ikm, prk, tt.prk)
96 okm := hkdfExpand(tt.hash.New, tt.prk, tt.info, len(tt.okm))
98 t.Errorf("%d. got hkdfExpand(%x, %x, %d) = %x; wanted %x", i+1, tt.prk, tt.info, len(tt.okm), okm, tt.okm)
  /external/boringssl/src/include/openssl/
hkdf.h 40 /* HKDF_extract computes a HKDF PRK (as specified by RFC 5869) from initial
50 * |out_len| from the PRK |prk| and info |info| using |digest|, and outputs
53 const EVP_MD *digest, const uint8_t *prk,

Completed in 184 milliseconds