Searched refs:derivation (Results 1 – 12 of 12) sorted by relevance
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto.data | 5007 Crypto derivation operation object initializers zero properly 5010 PSA key derivation setup: HKDF-SHA-256, good case 5014 PSA key derivation setup: HKDF-SHA-512, good case 5018 PSA key derivation setup: TLS 1.2 PRF SHA-256, good case 5022 PSA key derivation setup: TLS 1.2 ECJPAKE to PMS 5026 PSA key derivation setup: not a key derivation algorithm (HMAC) 5030 PSA key derivation setup: algorithm from bad hash 5034 PSA key derivation setup: bad algorithm 5038 PSA key derivation: HKDF-SHA-256, good case, direct output 5042 PSA key derivation: HKDF-SHA-256, good case, omitted salt [all …]
|
D | test_suite_psa_crypto_metadata.data | 269 Key derivation: HKDF using SHA-256 273 Key derivation: HKDF using SHA-384 277 Key derivation: HKDF-Extract using SHA-256 281 Key derivation: HKDF-Extract using SHA-384 285 Key derivation: HKDF-Expand using SHA-256 289 Key derivation: HKDF-Expand using SHA-384 293 Key derivation: TLS1.2 ECJPAKE-to-PMS 297 Key derivation: TLS 1.2 PRF using SHA-256 301 Key derivation: TLS 1.2 PRF using SHA-384 305 Key derivation: TLS 1.2 PSK-to-MS using SHA-256 [all …]
|
D | test_suite_psa_crypto_pake.data | 121 PSA PAKE: force early key derivation 1 125 PSA PAKE: force early key derivation 2
|
D | test_suite_psa_crypto_se_driver_hal.function | 724 /* Try the key in a plain key derivation. */ 736 * part of a derivation operation and standalone. */
|
D | test_suite_psa_crypto_metadata.function | 601 /* Shared secret derivation properties */
|
D | test_suite_ssl.data | 3118 SSL TLS 1.3 Key schedule: Early secrets derivation helper 3123 SSL TLS 1.3 Key schedule: Handshake secrets derivation helper 3188 SSL TLS 1.3 Key schedule: Application secrets derivation helper 3193 SSL TLS 1.3 Key schedule: Resumption secrets derivation helper
|
D | test_suite_psa_crypto.function | 8496 // to add the shared secret to the derivation 8566 /* valid key derivation */ 8789 /* For output key derivation secret must be provided using
|
/mbedtls-3.5.0/library/ |
D | ssl_tls.c | 6028 static psa_status_t setup_psa_key_derivation(psa_key_derivation_operation_t *derivation, in setup_psa_key_derivation() argument 6040 status = psa_key_derivation_setup(derivation, alg); in setup_psa_key_derivation() 6046 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation() 6054 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation() 6064 derivation, PSA_KEY_DERIVATION_INPUT_SECRET, in setup_psa_key_derivation() 6068 derivation, PSA_KEY_DERIVATION_INPUT_SECRET, key); in setup_psa_key_derivation() 6074 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation() 6084 status = psa_key_derivation_set_capacity(derivation, capacity); in setup_psa_key_derivation() 6104 psa_key_derivation_operation_t derivation = in tls_prf_generic() local 6132 status = setup_psa_key_derivation(&derivation, in tls_prf_generic() [all …]
|
/mbedtls-3.5.0/include/psa/ |
D | crypto_se_driver.h | 1325 const psa_drv_se_key_derivation_t *MBEDTLS_PRIVATE(derivation);
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-driver-interface.md | 232 * `"key_agreement"`: key agreement without a subsequent key derivation. Called by `psa_raw_key_agre… 308 * Type `"key_derivation_operation_t"`: the type of a key derivation operation context. 318 * `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API. 513 TODO: derivation, copy 924 TODO: derivation, copy 1120 #### Mixing drivers in key derivation
|
/mbedtls-3.5.0/ |
D | ChangeLog | 128 * The key derivation algorithm PSA_ALG_TLS12_ECJPAKE_TO_PMS cannot be 311 * Add an ad-hoc key derivation function handling EC J-PAKE to PMS 314 using PSA_ALG_TLS12_ECJPAKE_TO_PMS as the key derivation algorithm. 474 * Add support for psa crypto key derivation for elliptic curve 1484 in combined key agreement and derivation operations, as long as the key 1564 agreement and subsequent key derivation operation to be used as a key 1987 * Key derivation inputs in the PSA API can now either come from a key object 1998 key derivation function, use a buffer instead (this is now always 2756 * Implement the HMAC-based extract-and-expand key derivation function 4743 * PKCS#12 PBE and derivation functions [all …]
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 179 removed. The primes from RFC 5114 are deprecated because their derivation is not
|