Home
last modified time | relevance | path

Searched refs:m_CK (Results 1 – 7 of 7) sorted by relevance

/dports/security/i2pd/i2pd-2.40.0/libi2pd/
H A DTunnelConfig.cpp148 if (!DecryptECIES (m_CK, nonce, record, TUNNEL_BUILD_RECORD_SIZE, record)) in DecryptBuildResponseRecord()
177 i2p::crypto::HKDF (m_CK, nullptr, 0, "SMTunnelReplyKey", m_CK); in CreateBuildRequestRecord()
178 memcpy (replyKey, m_CK + 32, 32); in CreateBuildRequestRecord()
179 i2p::crypto::HKDF (m_CK, nullptr, 0, "SMTunnelLayerKey", m_CK); in CreateBuildRequestRecord()
180 memcpy (layerKey, m_CK + 32, 32); in CreateBuildRequestRecord()
183 i2p::crypto::HKDF (m_CK, nullptr, 0, "TunnelLayerIVKey", m_CK); in CreateBuildRequestRecord()
184 memcpy (ivKey, m_CK + 32, 32); in CreateBuildRequestRecord()
185 …i2p::crypto::HKDF (m_CK, nullptr, 0, "RGarlicKeyAndTag", m_CK); // OTBRM garlic key m_CK + 32, tag… in CreateBuildRequestRecord()
188 memcpy (ivKey, m_CK, 32); // last HKDF in CreateBuildRequestRecord()
218 memcpy (&tag, m_CK, 8); in GetGarlicKey()
[all …]
H A DI2NPProtocol.cpp413 … noiseState.m_H, 32, noiseState.m_CK, nonce, reply, TUNNEL_BUILD_RECORD_SIZE, true)) // encrypt in HandleBuildRequestRecords()
562 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelReplyKey", noiseState.m_CK); in HandleShortTunnelBuildMsg()
563 memcpy (replyKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg()
564 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelLayerKey", noiseState.m_CK); in HandleShortTunnelBuildMsg()
565 memcpy (layerKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg()
569 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "TunnelLayerIVKey", noiseState.m_CK); in HandleShortTunnelBuildMsg()
570 memcpy (ivKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg()
573 memcpy (ivKey, noiseState.m_CK , 32); in HandleShortTunnelBuildMsg()
626 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "RGarlicKeyAndTag", noiseState.m_CK); in HandleShortTunnelBuildMsg()
628 memcpy (&tag, noiseState.m_CK, 8); in HandleShortTunnelBuildMsg()
[all …]
H A DECIESX25519AEADRatchetSession.cpp222 tagsetNsr->DHInitialize (m_CK, tagsetKey); // tagset_nsr = DH_INITIALIZE(chainKey, tagsetKey) in InitNewSessionTagset()
252 …if (!i2p::crypto::AEADChaCha20Poly1305 (buf, 32, m_H, 32, m_CK + 32, nonce, fs, 32, false)) // dec… in HandleNewIncomingSession()
484 …if (!i2p::crypto::AEADChaCha20Poly1305 (fs, 32, m_H, 32, m_CK + 32, nonce, out + offset, 48, true)… in NewOutgoingSessionMessage()
501 …if (!i2p::crypto::AEADChaCha20Poly1305 (payload, len, m_H, 32, m_CK + 32, nonce, out + offset, len… in NewOutgoingSessionMessage()
568 i2p::crypto::HKDF (m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64) in NewSessionReplyMessage()
571 receiveTagset->DHInitialize (m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab) in NewSessionReplyMessage()
574 m_SendTagset->DHInitialize (m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba) in NewSessionReplyMessage()
657 i2p::crypto::HKDF (m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64) in HandleNewOutgoingSessionReply()
663 m_SendTagset->DHInitialize (m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab) in HandleNewOutgoingSessionReply()
666 receiveTagset->DHInitialize (m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba) in HandleNewOutgoingSessionReply()
[all …]
H A DNTCP2.h90 const uint8_t * GetK () const { return m_CK + 32; }; in GetK()
91 const uint8_t * GetCK () const { return m_CK; }; in GetCK()
H A DCrypto.cpp1310 HKDF (m_CK, sharedSecret, 32, "", m_CK); in MixKey()
1318 memcpy (state.m_CK, ck, 32); in InitNoiseState()
H A DCrypto.h317 uint8_t m_H[32] /*h*/, m_CK[64] /*[ck, k]*/; member
H A DRouterContext.cpp899 m_CurrentNoiseState.m_CK + 32, nonce, data, clearTextSize, false)) // decrypt in DecryptECIESTunnelBuildRecord()