/mbedtls-latest/programs/ssl/ |
D | ssl_test_common_source.c | 17 const unsigned char *secret, in eap_tls_key_derivation() argument 33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation() 41 const unsigned char *secret, in nss_keylog_export() argument 73 "%02x", secret[j]); in nss_keylog_export() 111 const unsigned char *secret, in dtls_srtp_key_derivation() argument 127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_constant_time.function | 472 size_t secret; 480 for (secret = offset_min; secret <= (size_t) offset_max; secret++) { 481 mbedtls_test_set_step((int) secret); 483 TEST_CF_SECRET(&secret, sizeof(secret)); 486 mbedtls_ct_memcpy_offset(dst, src, secret, 488 TEST_CF_PUBLIC(&secret, sizeof(secret)); 492 TEST_MEMORY_COMPARE(dst, len, src + secret, len);
|
D | test_suite_ssl.function | 1518 data_t *secret, 1546 secret->x, secret->len, 1615 data_t *secret, 1644 secret->x, secret->len, 1660 data_t *secret, 1671 secret->len == hash_len && 1679 alg, secret->x, transcript->x, transcript->len, 1694 data_t *secret, 1705 secret->len == hash_len && 1713 alg, secret->x, transcript->x, transcript->len, [all …]
|
D | test_suite_ecdh.function | 323 /* server computes shared secret */ 341 /* client computes shared secret */
|
D | test_suite_psa_crypto.data | 5294 PSA key derivation: HKDF-SHA-256, direct secret, direct output 5298 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output 5302 PSA key derivation: HKDF-SHA-256, direct secret, key output 5306 PSA key derivation: HKDF-SHA-256, direct empty secret, key output 5310 PSA key derivation: HKDF-SHA-256, missing secret, key output 5336 PSA key derivation: HKDF-SHA-256, salt after secret 5340 PSA key derivation: HKDF-SHA-256, missing secret 5352 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, direct) 5356 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, key) 5360 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, direct) [all …]
|
D | test_suite_ssl.data | 2694 # Initial secret to Early Secret 2700 # Early secret to Handshake Secret 2706 # Handshake secret to Master Secret 2712 # Server handshake traffic secret -> Server traffic key 2719 # Server handshake traffic secret -> Server traffic IV 2726 # Client handshake traffic secret -> Client traffic key 2733 # Client handshake traffic secret -> Client traffic IV 2740 # Server handshake traffic secret -> Server traffic IV 2747 # Server handshake traffic secret -> Server traffic Key 2754 # Client handshake traffic secret -> Client traffic IV [all …]
|
D | test_suite_psa_crypto_metadata.data | 363 Key type: secret for key derivation
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 76 - "leak secret data when the input isn't a curve point" - this is avoided by 84 - it has no branch depending (even indirectly) on secret data; 85 - it has no memory access depending (even indirectly) on secret data. 90 In addition to avoiding branches and memory accesses depending on secret data, 120 _Note:_ p256-m also follows best practices such as securely erasing secret 139 - Cleaning up secret values from the stack before returning from a function. 222 | ECDH shared secret | 640 | 728 | 231 | ECDH shared secret | 596 | 700 | 245 | ECDH shared secret | 922 | 975 | 255 | ECDH shared secret | 144 | 177 | [all …]
|
D | p256-m.h | 58 int p256_ecdh_shared_secret(uint8_t secret[32],
|
D | p256-m.c | 1233 int p256_ecdh_shared_secret(uint8_t secret[32], in p256_ecdh_shared_secret() 1256 m256_to_bytes(secret, x, &p256_p); in p256_ecdh_shared_secret() 1257 CT_UNPOISON(secret, 32); in p256_ecdh_shared_secret()
|
/mbedtls-latest/library/ |
D | ssl_tls13_keys.h | 113 const unsigned char *secret, size_t secret_len, 199 const unsigned char *secret, size_t secret_len,
|
D | ssl_tls13_keys.c | 142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument 189 secret, in mbedtls_ssl_tls13_hkdf_expand_label() 223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key() argument 231 secret, secret_len, in ssl_tls13_make_traffic_key() 241 secret, secret_len, in ssl_tls13_make_traffic_key() 297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret() argument 327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret()
|
D | ssl_tls.c | 401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen, 430 static int tls_prf_sha256(const unsigned char *secret, size_t slen, 441 static int tls_prf_sha384(const unsigned char *secret, size_t slen, 467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6712 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6742 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic() 6792 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6833 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic() 6898 static int tls_prf_sha256(const unsigned char *secret, size_t slen, in tls_prf_sha256() argument [all …]
|
D | ecjpake.c | 97 const unsigned char *secret, in mbedtls_ecjpake_setup() argument 116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup()
|
D | psa_crypto.c | 5559 if (operation->ctx.tls12_prf.secret != NULL) { 5560 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.secret, 5771 tls12_prf->secret, 5815 tls12_prf->secret, 6964 prf->secret = mbedtls_calloc(1, data_length); 6965 if (prf->secret == NULL) { 6969 memcpy(prf->secret, data, data_length);
|
/mbedtls-latest/3rdparty/everest/include/everest/vs2013/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/mbedtls-latest/3rdparty/everest/include/everest/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/mbedtls-latest/include/mbedtls/ |
D | ecjpake.h | 115 const unsigned char *secret,
|
D | ssl.h | 1372 const unsigned char *secret, 5650 const unsigned char *secret, size_t slen,
|
/mbedtls-latest/include/psa/ |
D | crypto_builtin_key_derivation.h | 78 uint8_t *MBEDTLS_PRIVATE(secret);
|
/mbedtls-latest/3rdparty/everest/library/ |
D | Hacl_Curve25519.c | 724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/mbedtls-latest/3rdparty/everest/library/legacy/ |
D | Hacl_Curve25519.c | 769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 604 …oup/group__derivation/#group__derivation_1ga0ddfbe764baba995c402b1b0ef59392e) for the secret input. 1111 …_derivation_1ga90fdd2716124d0bd258826184824675f) to calculate the shared secret from your private … 1114 …f) instead of `psa_raw_key_agreement` to use the resulting shared secret as the secret input to a … 1125 …* `mbedtls_mpi z` for the shared secret (this may be the same variable as `our_priv` when doing ep… 1129 …` on `grp`, `z` (output), `their_pub` and `our_priv`. Use the raw shared secret `z`, typically, to… 1144 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … 1159 …, then call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret. 1171 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … 1183 4. Call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret. 1194 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … [all …]
|
D | 3.0-migration-guide.md | 485 and ECDH that compute the shared secret; the scalar multiplication functions in 769 - A secret type parameter has been added to identify which key 770 is being exported. For TLS 1.2, only the master secret is 783 traffic may derive those by hand based on the master secret and the
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 406 optional. For example, secret and key computations occur at this stage, as well 430 optional. For example, handshake secret and key computation occur at that
|