/dports/security/i2pd/i2pd-2.40.0/libi2pd/ |
H A D | TunnelConfig.cpp | 148 if (!DecryptECIES (m_CK, nonce, record, TUNNEL_BUILD_RECORD_SIZE, record)) in DecryptBuildResponseRecord() 177 i2p::crypto::HKDF (m_CK, nullptr, 0, "SMTunnelReplyKey", m_CK); in CreateBuildRequestRecord() 178 memcpy (replyKey, m_CK + 32, 32); in CreateBuildRequestRecord() 179 i2p::crypto::HKDF (m_CK, nullptr, 0, "SMTunnelLayerKey", m_CK); in CreateBuildRequestRecord() 180 memcpy (layerKey, m_CK + 32, 32); in CreateBuildRequestRecord() 183 i2p::crypto::HKDF (m_CK, nullptr, 0, "TunnelLayerIVKey", m_CK); in CreateBuildRequestRecord() 184 memcpy (ivKey, m_CK + 32, 32); in CreateBuildRequestRecord() 185 …i2p::crypto::HKDF (m_CK, nullptr, 0, "RGarlicKeyAndTag", m_CK); // OTBRM garlic key m_CK + 32, tag… in CreateBuildRequestRecord() 188 memcpy (ivKey, m_CK, 32); // last HKDF in CreateBuildRequestRecord() 218 memcpy (&tag, m_CK, 8); in GetGarlicKey() [all …]
|
H A D | I2NPProtocol.cpp | 413 … noiseState.m_H, 32, noiseState.m_CK, nonce, reply, TUNNEL_BUILD_RECORD_SIZE, true)) // encrypt in HandleBuildRequestRecords() 562 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelReplyKey", noiseState.m_CK); in HandleShortTunnelBuildMsg() 563 memcpy (replyKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg() 564 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "SMTunnelLayerKey", noiseState.m_CK); in HandleShortTunnelBuildMsg() 565 memcpy (layerKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg() 569 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "TunnelLayerIVKey", noiseState.m_CK); in HandleShortTunnelBuildMsg() 570 memcpy (ivKey, noiseState.m_CK + 32, 32); in HandleShortTunnelBuildMsg() 573 memcpy (ivKey, noiseState.m_CK , 32); in HandleShortTunnelBuildMsg() 626 i2p::crypto::HKDF (noiseState.m_CK, nullptr, 0, "RGarlicKeyAndTag", noiseState.m_CK); in HandleShortTunnelBuildMsg() 628 memcpy (&tag, noiseState.m_CK, 8); in HandleShortTunnelBuildMsg() [all …]
|
H A D | ECIESX25519AEADRatchetSession.cpp | 222 tagsetNsr->DHInitialize (m_CK, tagsetKey); // tagset_nsr = DH_INITIALIZE(chainKey, tagsetKey) in InitNewSessionTagset() 252 …if (!i2p::crypto::AEADChaCha20Poly1305 (buf, 32, m_H, 32, m_CK + 32, nonce, fs, 32, false)) // dec… in HandleNewIncomingSession() 484 …if (!i2p::crypto::AEADChaCha20Poly1305 (fs, 32, m_H, 32, m_CK + 32, nonce, out + offset, 48, true)… in NewOutgoingSessionMessage() 501 …if (!i2p::crypto::AEADChaCha20Poly1305 (payload, len, m_H, 32, m_CK + 32, nonce, out + offset, len… in NewOutgoingSessionMessage() 568 i2p::crypto::HKDF (m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64) in NewSessionReplyMessage() 571 receiveTagset->DHInitialize (m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab) in NewSessionReplyMessage() 574 m_SendTagset->DHInitialize (m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba) in NewSessionReplyMessage() 657 i2p::crypto::HKDF (m_CK, nullptr, 0, "", keydata); // keydata = HKDF(chainKey, ZEROLEN, "", 64) in HandleNewOutgoingSessionReply() 663 m_SendTagset->DHInitialize (m_CK, keydata); // tagset_ab = DH_INITIALIZE(chainKey, k_ab) in HandleNewOutgoingSessionReply() 666 receiveTagset->DHInitialize (m_CK, keydata + 32); // tagset_ba = DH_INITIALIZE(chainKey, k_ba) in HandleNewOutgoingSessionReply() [all …]
|
H A D | NTCP2.h | 90 const uint8_t * GetK () const { return m_CK + 32; }; in GetK() 91 const uint8_t * GetCK () const { return m_CK; }; in GetCK()
|
H A D | Crypto.cpp | 1310 HKDF (m_CK, sharedSecret, 32, "", m_CK); in MixKey() 1318 memcpy (state.m_CK, ck, 32); in InitNoiseState()
|
H A D | Crypto.h | 317 uint8_t m_H[32] /*h*/, m_CK[64] /*[ck, k]*/; member
|
H A D | RouterContext.cpp | 899 m_CurrentNoiseState.m_CK + 32, nonce, data, clearTextSize, false)) // decrypt in DecryptECIESTunnelBuildRecord()
|