/mbedtls-latest/programs/psa/ |
D | key_ladder_demo.sh | 29 "$program" wrap master=master.key label=hello label=world \ 34 "$program" unwrap master=master.key label=hello label=world \ 41 …ram" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow label=orld 45 "$program" save master=master.key label=hello \ 48 "$program" unwrap master=hello.key label=world \
|
/mbedtls-latest/library/ |
D | ssl_tls13_keys.h | 114 const unsigned char *label, size_t label_len, 200 const unsigned char *label, size_t label_len,
|
D | ssl_tls13_keys.c | 101 const unsigned char *label, size_t label_len, in ssl_tls13_hkdf_encode_label() argument 127 memcpy(p, label, label_len); in ssl_tls13_hkdf_encode_label() 143 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument 176 label, label_len, in mbedtls_ssl_tls13_hkdf_expand_label() 298 const unsigned char *label, size_t label_len, in mbedtls_ssl_tls13_derive_secret() argument 328 label, label_len, in mbedtls_ssl_tls13_derive_secret()
|
D | ssl_tls.c | 402 const char *label, 431 const char *label, 442 const char *label, 468 const char *label, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6649 const unsigned char *label, size_t label_length, in setup_psa_key_derivation() argument 6692 label, label_length); in setup_psa_key_derivation() 6713 const char *label, in tls_prf_generic() argument 6752 (unsigned char const *) label, in tls_prf_generic() 6753 (size_t) strlen(label), in tls_prf_generic() [all …]
|
D | rsa.c | 1764 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_encrypt() argument 1802 ret = compute_hash((mbedtls_md_type_t) ctx->hash_id, label, label_len, p); in mbedtls_rsa_rsaes_oaep_encrypt() 1919 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_decrypt() argument 1979 label, label_len, lhash); in mbedtls_rsa_rsaes_oaep_decrypt()
|
D | psa_crypto.c | 5569 if (operation->ctx.tls12_prf.label != NULL) { 5570 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.label, 5783 tls12_prf->label, 5824 status = psa_mac_update(&hmac, tls12_prf->label, tls12_prf->label_length); 6987 prf->label = mbedtls_calloc(1, data_length); 6988 if (prf->label == NULL) { 6992 memcpy(prf->label, data, data_length);
|
D | ssl_misc.h | 582 const char *label,
|
/mbedtls-latest/include/mbedtls/ |
D | rsa.h | 685 const unsigned char *label, size_t label_len, 811 const unsigned char *label, size_t label_len,
|
D | ssl.h | 5651 const char *label,
|
/mbedtls-latest/include/psa/ |
D | crypto_builtin_key_derivation.h | 82 uint8_t *MBEDTLS_PRIVATE(label);
|
/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_driver_wrappers.function | 2506 data_t *label, 2565 label->x, label->len, 2596 label->x, label->len, 2629 data_t *label, 2673 label->x, label->len, 2700 data_t *label, 2746 label->x, label->len,
|
D | test_suite_ssl.function | 1955 char *label, data_t *result_str, int exp_ret) 1967 label, random->x, random->len, 2619 /* The goto below is used to avoid an "unused label" warning.*/ 2644 /* The goto below is used to avoid an "unused label" warning.*/ 2657 /* The goto below is used to avoid an "unused label" warning.*/ 2686 /* The goto below is used to avoid an "unused label" warning.*/ 2715 /* The goto below is used to avoid an "unused label" warning.*/ 2730 /* The goto below is used to avoid an "unused label" warning.*/ 2742 /* The goto below is used to avoid an "unused label" warning.*/ 2757 /* The goto below is used to avoid an "unused label" warning.*/ [all …]
|
D | test_suite_psa_crypto.function | 8446 data_t *label, 8482 label->x, label->len, 8492 /* If the label is empty, the test framework puts a non-null pointer 8493 * in label->x. Test that a null pointer works as well. */ 8494 if (label->len == 0) { 8501 NULL, label->len, 8530 data_t *label) 8572 label->x, label->len, 8581 label->x, label->len, 8606 data_t *label, [all …]
|
D | test_suite_psa_crypto.data | 5070 PSA encrypt: RSA OAEP-SHA-256, good, with label 5078 PSA encrypt: RSA OAEP-SHA-384, good, with label 5122 PSA encrypt-decrypt: RSA OAEP-SHA-256, with label 5150 PSA decrypt: RSA OAEP-SHA-256, 0 bytes, with label 5158 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, with label 5166 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (should be empty) 5170 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (empty) 5174 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (same length) 5376 PSA key derivation: HKDF-SHA-256, reject label step 5409 PSA key derivation: TLS 1.2 PRF SHA-256, missing label [all …]
|
D | test_suite_psa_crypto_se_driver_hal.function | 69 * label `exit`. 87 * jump directly to the `exit` label. If this returns any other
|
D | test_suite_asn1parse.function | 719 goto exit; /* Silence unused label warning */
|
D | test_suite_psa_crypto_metadata.function | 528 * asymmetric_signature_algorithm. Pacify -Werror=unused-label. */
|
D | test_suite_ssl.data | 2931 ssl_tls_prf:MBEDTLS_SSL_TLS_PRF_NONE:"":"":"test tls_prf label":"":MBEDTLS_ERR_SSL_FEATURE_UNAVAILA… 2935 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"a4206a36eef93f49… 2939 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"7f9998393198a02c… 2943 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"a4206a36eef93f49… 2947 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"7f9998393198a02c…
|
D | test_suite_pk.function | 218 /* "exit" label is to make the compiler happy. */
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 171 In the state transition diagram above, an arrow between two states `q1` and `q2` with label `f` ind… 200 …the common pattern of (un)locking the mutex and returning or jumping to an exit label upon failure.
|
/mbedtls-latest/docs/architecture/testing/ |
D | invasive-testing.md | 288 …rogram must clean up after itself. Use the cleanup code (after the `exit` label in test functions)…
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 1034 …for individual keys. The representation of a key is an identifier such as label or slot number. Th… 1088 … element and the driver only needs to store a label for the key, use `"base_size"` as the size of … 1129 …ains an internal identifier for the key. This may be, for example, a unique label or a slot number.
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 1044 …label is empty, and the same hash algorithm is used for MGF1 and to hash the label. The PSA API do…
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 575 …al_input_alloc()`. On failure, it sets an error code and jumps to an exit label. On success, it se…
|