Home
last modified time | relevance | path

Searched refs:derivation (Results 1 – 12 of 12) sorted by relevance

/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto.data5007 Crypto derivation operation object initializers zero properly
5010 PSA key derivation setup: HKDF-SHA-256, good case
5014 PSA key derivation setup: HKDF-SHA-512, good case
5018 PSA key derivation setup: TLS 1.2 PRF SHA-256, good case
5022 PSA key derivation setup: TLS 1.2 ECJPAKE to PMS
5026 PSA key derivation setup: not a key derivation algorithm (HMAC)
5030 PSA key derivation setup: algorithm from bad hash
5034 PSA key derivation setup: bad algorithm
5038 PSA key derivation: HKDF-SHA-256, good case, direct output
5042 PSA key derivation: HKDF-SHA-256, good case, omitted salt
[all …]
Dtest_suite_psa_crypto_metadata.data269 Key derivation: HKDF using SHA-256
273 Key derivation: HKDF using SHA-384
277 Key derivation: HKDF-Extract using SHA-256
281 Key derivation: HKDF-Extract using SHA-384
285 Key derivation: HKDF-Expand using SHA-256
289 Key derivation: HKDF-Expand using SHA-384
293 Key derivation: TLS1.2 ECJPAKE-to-PMS
297 Key derivation: TLS 1.2 PRF using SHA-256
301 Key derivation: TLS 1.2 PRF using SHA-384
305 Key derivation: TLS 1.2 PSK-to-MS using SHA-256
[all …]
Dtest_suite_psa_crypto_pake.data121 PSA PAKE: force early key derivation 1
125 PSA PAKE: force early key derivation 2
Dtest_suite_psa_crypto_se_driver_hal.function724 /* Try the key in a plain key derivation. */
736 * part of a derivation operation and standalone. */
Dtest_suite_psa_crypto_metadata.function601 /* Shared secret derivation properties */
Dtest_suite_ssl.data3118 SSL TLS 1.3 Key schedule: Early secrets derivation helper
3123 SSL TLS 1.3 Key schedule: Handshake secrets derivation helper
3188 SSL TLS 1.3 Key schedule: Application secrets derivation helper
3193 SSL TLS 1.3 Key schedule: Resumption secrets derivation helper
Dtest_suite_psa_crypto.function8496 // to add the shared secret to the derivation
8566 /* valid key derivation */
8789 /* For output key derivation secret must be provided using
/mbedtls-3.5.0/library/
Dssl_tls.c6028 static psa_status_t setup_psa_key_derivation(psa_key_derivation_operation_t *derivation, in setup_psa_key_derivation() argument
6040 status = psa_key_derivation_setup(derivation, alg); in setup_psa_key_derivation()
6046 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation()
6054 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation()
6064 derivation, PSA_KEY_DERIVATION_INPUT_SECRET, in setup_psa_key_derivation()
6068 derivation, PSA_KEY_DERIVATION_INPUT_SECRET, key); in setup_psa_key_derivation()
6074 status = psa_key_derivation_input_bytes(derivation, in setup_psa_key_derivation()
6084 status = psa_key_derivation_set_capacity(derivation, capacity); in setup_psa_key_derivation()
6104 psa_key_derivation_operation_t derivation = in tls_prf_generic() local
6132 status = setup_psa_key_derivation(&derivation, in tls_prf_generic()
[all …]
/mbedtls-3.5.0/include/psa/
Dcrypto_se_driver.h1325 const psa_drv_se_key_derivation_t *MBEDTLS_PRIVATE(derivation);
/mbedtls-3.5.0/docs/proposed/
Dpsa-driver-interface.md232 * `"key_agreement"`: key agreement without a subsequent key derivation. Called by `psa_raw_key_agre…
308 * Type `"key_derivation_operation_t"`: the type of a key derivation operation context.
318 * `"key_derivation_abort"`: called by all key derivation functions of the PSA Cryptography API.
513 TODO: derivation, copy
924 TODO: derivation, copy
1120 #### Mixing drivers in key derivation
/mbedtls-3.5.0/
DChangeLog128 * The key derivation algorithm PSA_ALG_TLS12_ECJPAKE_TO_PMS cannot be
311 * Add an ad-hoc key derivation function handling EC J-PAKE to PMS
314 using PSA_ALG_TLS12_ECJPAKE_TO_PMS as the key derivation algorithm.
474 * Add support for psa crypto key derivation for elliptic curve
1484 in combined key agreement and derivation operations, as long as the key
1564 agreement and subsequent key derivation operation to be used as a key
1987 * Key derivation inputs in the PSA API can now either come from a key object
1998 key derivation function, use a buffer instead (this is now always
2756 * Implement the HMAC-based extract-and-expand key derivation function
4743 * PKCS#12 PBE and derivation functions
[all …]
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md179 removed. The primes from RFC 5114 are deprecated because their derivation is not