/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 66 if (ikm2) { in tls13_HkdfExtract() 69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 93 ikm2 = newIkm2; in tls13_HkdfExtract() 105 if (!ikm2) { in tls13_HkdfExtract() 117 ikm2 = newIkm2; in tls13_HkdfExtract() 119 PORT_Assert(ikm2); in tls13_HkdfExtract() 122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/www/firefox/firefox-99.0/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 66 if (ikm2) { in tls13_HkdfExtract() 69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 93 ikm2 = newIkm2; in tls13_HkdfExtract() 105 if (!ikm2) { in tls13_HkdfExtract() 117 ikm2 = newIkm2; in tls13_HkdfExtract() 119 PORT_Assert(ikm2); in tls13_HkdfExtract() 122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 66 if (ikm2) { in tls13_HkdfExtract() 69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 93 ikm2 = newIkm2; in tls13_HkdfExtract() 105 if (!ikm2) { in tls13_HkdfExtract() 117 ikm2 = newIkm2; in tls13_HkdfExtract() 119 PORT_Assert(ikm2); in tls13_HkdfExtract() 122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/security/nss/nss-3.76.1/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 66 if (ikm2) { in tls13_HkdfExtract() 69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 93 ikm2 = newIkm2; in tls13_HkdfExtract() 105 if (!ikm2) { in tls13_HkdfExtract() 117 ikm2 = newIkm2; in tls13_HkdfExtract() 119 PORT_Assert(ikm2); in tls13_HkdfExtract() 122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 66 if (ikm2) { in tls13_HkdfExtract() 69 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 93 ikm2 = newIkm2; in tls13_HkdfExtract() 105 if (!ikm2) { in tls13_HkdfExtract() 117 ikm2 = newIkm2; in tls13_HkdfExtract() 119 PORT_Assert(ikm2); in tls13_HkdfExtract() 122 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 124 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 34 tls13_HkdfExtract(PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash, in tls13_HkdfExtract() argument 65 if (ikm2) { in tls13_HkdfExtract() 68 ikm2, ikm1, &newIkm2, &newIkm1); in tls13_HkdfExtract() 92 ikm2 = newIkm2; in tls13_HkdfExtract() 104 if (!ikm2) { in tls13_HkdfExtract() 146 ikm2 = newIkm2; in tls13_HkdfExtract() 148 PORT_Assert(ikm2); in tls13_HkdfExtract() 151 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 153 prk = PK11_Derive(ikm2, CKM_HKDF_DERIVE, ¶msi, CKM_HKDF_DERIVE, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 45 PK11SymKey *ikm2; in tls13_HkdfExtract() local 99 ikm2 = zeroKey; in tls13_HkdfExtract() 101 ikm2 = ikm2in; in tls13_HkdfExtract() 103 PORT_Assert(ikm2); in tls13_HkdfExtract() 106 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 108 prk = PK11_Derive(ikm2, kTlsHkdfInfo[baseHash].pkcs11Mech, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/ssl/ |
H A D | tls13hkdf.c | 45 PK11SymKey *ikm2; in tls13_HkdfExtract() local 99 ikm2 = zeroKey; in tls13_HkdfExtract() 101 ikm2 = ikm2in; in tls13_HkdfExtract() 103 PORT_Assert(ikm2); in tls13_HkdfExtract() 106 PRINT_KEY(50, (NULL, "HKDF Extract: IKM2", ikm2)); in tls13_HkdfExtract() 108 prk = PK11_Derive(ikm2, kTlsHkdfInfo[baseHash].pkcs11Mech, in tls13_HkdfExtract()
|
H A D | tls13hkdf.h | 20 PK11SymKey *ikm1, PK11SymKey *ikm2, SSLHashType baseHash,
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/ |
H A D | crypto_module_tests.c | 2099 u8 ikm2[80] = { in test_extract_expand_hkdf() local 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
|
/dports/net/hostapd/hostapd-2.9/src/crypto/ |
H A D | crypto_module_tests.c | 1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local 2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_module_tests.c | 1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local 2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/ |
H A D | crypto_module_tests.c | 2099 u8 ikm2[80] = { in test_extract_expand_hkdf() local 2173 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_module_tests.c | 1950 u8 ikm2[80] = { in test_extract_expand_hkdf() local 2024 if (hmac_sha256(salt2, sizeof(salt2), ikm2, sizeof(ikm2), prk) < 0) in test_extract_expand_hkdf()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/dom/push/ |
H A D | PushCrypto.jsm | 388 .then(ikm2 => new hkdf(salt, ikm2));
|
/dports/chinese/wenju/wenju-1.6/src/tim/tables/ |
H A D | bxm.tim | 4218 ikm2=以来
|