Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 30) sorted by relevance

12

/mbedtls-latest/programs/ssl/
Dssl_test_common_source.c17 const unsigned char *secret, in eap_tls_key_derivation() argument
33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation()
41 const unsigned char *secret, in nss_keylog_export() argument
73 "%02x", secret[j]); in nss_keylog_export()
111 const unsigned char *secret, in dtls_srtp_key_derivation() argument
127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
/mbedtls-latest/tests/suites/
Dtest_suite_constant_time.function472 size_t secret;
480 for (secret = offset_min; secret <= (size_t) offset_max; secret++) {
481 mbedtls_test_set_step((int) secret);
483 TEST_CF_SECRET(&secret, sizeof(secret));
486 mbedtls_ct_memcpy_offset(dst, src, secret,
488 TEST_CF_PUBLIC(&secret, sizeof(secret));
492 TEST_MEMORY_COMPARE(dst, len, src + secret, len);
Dtest_suite_ssl.function1518 data_t *secret,
1546 secret->x, secret->len,
1615 data_t *secret,
1644 secret->x, secret->len,
1660 data_t *secret,
1671 secret->len == hash_len &&
1679 alg, secret->x, transcript->x, transcript->len,
1694 data_t *secret,
1705 secret->len == hash_len &&
1713 alg, secret->x, transcript->x, transcript->len,
[all …]
Dtest_suite_ecdh.function323 /* server computes shared secret */
341 /* client computes shared secret */
Dtest_suite_psa_crypto.data5294 PSA key derivation: HKDF-SHA-256, direct secret, direct output
5298 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output
5302 PSA key derivation: HKDF-SHA-256, direct secret, key output
5306 PSA key derivation: HKDF-SHA-256, direct empty secret, key output
5310 PSA key derivation: HKDF-SHA-256, missing secret, key output
5336 PSA key derivation: HKDF-SHA-256, salt after secret
5340 PSA key derivation: HKDF-SHA-256, missing secret
5352 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, direct)
5356 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, key)
5360 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, direct)
[all …]
Dtest_suite_ssl.data2694 # Initial secret to Early Secret
2700 # Early secret to Handshake Secret
2706 # Handshake secret to Master Secret
2712 # Server handshake traffic secret -> Server traffic key
2719 # Server handshake traffic secret -> Server traffic IV
2726 # Client handshake traffic secret -> Client traffic key
2733 # Client handshake traffic secret -> Client traffic IV
2740 # Server handshake traffic secret -> Server traffic IV
2747 # Server handshake traffic secret -> Server traffic Key
2754 # Client handshake traffic secret -> Client traffic IV
[all …]
Dtest_suite_psa_crypto_metadata.data363 Key type: secret for key derivation
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md76 - "leak secret data when the input isn't a curve point" - this is avoided by
84 - it has no branch depending (even indirectly) on secret data;
85 - it has no memory access depending (even indirectly) on secret data.
90 In addition to avoiding branches and memory accesses depending on secret data,
120 _Note:_ p256-m also follows best practices such as securely erasing secret
139 - Cleaning up secret values from the stack before returning from a function.
222 | ECDH shared secret | 640 | 728 |
231 | ECDH shared secret | 596 | 700 |
245 | ECDH shared secret | 922 | 975 |
255 | ECDH shared secret | 144 | 177 |
[all …]
Dp256-m.h58 int p256_ecdh_shared_secret(uint8_t secret[32],
Dp256-m.c1233 int p256_ecdh_shared_secret(uint8_t secret[32], in p256_ecdh_shared_secret()
1256 m256_to_bytes(secret, x, &p256_p); in p256_ecdh_shared_secret()
1257 CT_UNPOISON(secret, 32); in p256_ecdh_shared_secret()
/mbedtls-latest/library/
Dssl_tls13_keys.h113 const unsigned char *secret, size_t secret_len,
199 const unsigned char *secret, size_t secret_len,
Dssl_tls13_keys.c142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument
189 secret, in mbedtls_ssl_tls13_hkdf_expand_label()
223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key() argument
231 secret, secret_len, in ssl_tls13_make_traffic_key()
241 secret, secret_len, in ssl_tls13_make_traffic_key()
297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret() argument
327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret()
Dssl_tls.c401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen,
430 static int tls_prf_sha256(const unsigned char *secret, size_t slen,
441 static int tls_prf_sha384(const unsigned char *secret, size_t slen,
467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument
491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6712 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6742 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic()
6792 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6833 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic()
6898 static int tls_prf_sha256(const unsigned char *secret, size_t slen, in tls_prf_sha256() argument
[all …]
Decjpake.c97 const unsigned char *secret, in mbedtls_ecjpake_setup() argument
116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup()
Dpsa_crypto.c5559 if (operation->ctx.tls12_prf.secret != NULL) {
5560 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.secret,
5771 tls12_prf->secret,
5815 tls12_prf->secret,
6964 prf->secret = mbedtls_calloc(1, data_length);
6965 if (prf->secret == NULL) {
6969 memcpy(prf->secret, data, data_length);
/mbedtls-latest/3rdparty/everest/include/everest/vs2013/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/mbedtls-latest/3rdparty/everest/include/everest/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/mbedtls-latest/include/mbedtls/
Decjpake.h115 const unsigned char *secret,
Dssl.h1372 const unsigned char *secret,
5650 const unsigned char *secret, size_t slen,
/mbedtls-latest/include/psa/
Dcrypto_builtin_key_derivation.h78 uint8_t *MBEDTLS_PRIVATE(secret);
/mbedtls-latest/3rdparty/everest/library/
DHacl_Curve25519.c724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/mbedtls-latest/3rdparty/everest/library/legacy/
DHacl_Curve25519.c769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/mbedtls-latest/docs/
Dpsa-transition.md604 …oup/group__derivation/#group__derivation_1ga0ddfbe764baba995c402b1b0ef59392e) for the secret input.
1111 …_derivation_1ga90fdd2716124d0bd258826184824675f) to calculate the shared secret from your private …
1114 …f) instead of `psa_raw_key_agreement` to use the resulting shared secret as the secret input to a …
1125 …* `mbedtls_mpi z` for the shared secret (this may be the same variable as `our_priv` when doing ep…
1129 …` on `grp`, `z` (output), `their_pub` and `our_priv`. Use the raw shared secret `z`, typically, to…
1144 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
1159 …, then call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret.
1171 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
1183 4. Call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret.
1194 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
[all …]
D3.0-migration-guide.md485 and ECDH that compute the shared secret; the scalar multiplication functions in
769 - A secret type parameter has been added to identify which key
770 is being exported. For TLS 1.2, only the master secret is
783 traffic may derive those by hand based on the master secret and the
/mbedtls-latest/docs/architecture/
Dtls13-support.md406 optional. For example, secret and key computations occur at this stage, as well
430 optional. For example, handshake secret and key computation occur at that

12