Home
last modified time | relevance | path

Searched refs:ikm2 (Results 1 – 23 of 23) sorted by relevance

/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
66 if (ikm2) { in tls13_HkdfExtract()
69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
93 ikm2 = newIkm2; in tls13_HkdfExtract()
105 if (!ikm2) { in tls13_HkdfExtract()
117 ikm2 = newIkm2; in tls13_HkdfExtract()
119 PORT_Assert(ikm2); in tls13_HkdfExtract()
122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/www/firefox/firefox-99.0/security/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
66 if (ikm2) { in tls13_HkdfExtract()
69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
93 ikm2 = newIkm2; in tls13_HkdfExtract()
105 if (!ikm2) { in tls13_HkdfExtract()
117 ikm2 = newIkm2; in tls13_HkdfExtract()
119 PORT_Assert(ikm2); in tls13_HkdfExtract()
122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/security/ca_root_nss/nss-3.71/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
66 if (ikm2) { in tls13_HkdfExtract()
69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
93 ikm2 = newIkm2; in tls13_HkdfExtract()
105 if (!ikm2) { in tls13_HkdfExtract()
117 ikm2 = newIkm2; in tls13_HkdfExtract()
119 PORT_Assert(ikm2); in tls13_HkdfExtract()
122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/security/nss/nss-3.76.1/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
66 if (ikm2) { in tls13_HkdfExtract()
69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
93 ikm2 = newIkm2; in tls13_HkdfExtract()
105 if (!ikm2) { in tls13_HkdfExtract()
117 ikm2 = newIkm2; in tls13_HkdfExtract()
119 PORT_Assert(ikm2); in tls13_HkdfExtract()
122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
66 if (ikm2) { in tls13_HkdfExtract()
69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
93 ikm2 = newIkm2; in tls13_HkdfExtract()
105 if (!ikm2) { in tls13_HkdfExtract()
117 ikm2 = newIkm2; in tls13_HkdfExtract()
119 PORT_Assert(ikm2); in tls13_HkdfExtract()
122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ssl/
H A Dtls13hkdf.c34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument
65 if (ikm2) { in tls13_HkdfExtract()
68 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract()
92 ikm2 = newIkm2; in tls13_HkdfExtract()
104 if (!ikm2) { in tls13_HkdfExtract()
146 ikm2 = newIkm2; in tls13_HkdfExtract()
148 PORT_Assert(ikm2); in tls13_HkdfExtract()
151 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
153 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, &paramsi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ssl/
H A Dtls13hkdf.c45 PK11SymKey *ikm2; in tls13_HkdfExtract() local
99 ikm2 = zeroKey; in tls13_HkdfExtract()
101 ikm2 = ikm2in; in tls13_HkdfExtract()
103 PORT_Assert(ikm2); in tls13_HkdfExtract()
106 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
108 prk = PK11_Derive(ikm2, kTlsHkdfInfo[baseHash].pkcs11Mech, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ssl/
H A Dtls13hkdf.c45 PK11SymKey *ikm2; in tls13_HkdfExtract() local
99 ikm2 = zeroKey; in tls13_HkdfExtract()
101 ikm2 = ikm2in; in tls13_HkdfExtract()
103 PORT_Assert(ikm2); in tls13_HkdfExtract()
106 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract()
108 prk = PK11_Derive(ikm2, kTlsHkdfInfo[baseHash].pkcs11Mech, in tls13_HkdfExtract()
H A Dtls13hkdf.h20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/
H A Dcrypto_module_tests.c2099 u8 ikm2[80] = { in test_extract_expand_hkdf() local
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
/dports/net/hostapd/hostapd-2.9/src/crypto/
H A Dcrypto_module_tests.c1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local
2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_module_tests.c1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local
2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/
H A Dcrypto_module_tests.c2099 u8 ikm2[80] = { in test_extract_expand_hkdf() local
2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_module_tests.c1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local
2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
/dports/www/firefox-legacy/firefox-52.8.0esr/dom/push/
H A DPushCrypto.jsm388 .then(ikm2 => new hkdf(salt, ikm2));
/dports/chinese/wenju/wenju-1.6/src/tim/tables/
H A Dbxm.tim4218 ikm2=以来