Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 24 of 24) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/library/
Dssl_tls13_keys.c135 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument
175 secret, slen, in mbedtls_ssl_tls1_3_hkdf_expand_label()
245 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_derive_secret() argument
281 secret, slen, in mbedtls_ssl_tls1_3_derive_secret()
Dssl_tls13_keys.h111 const unsigned char *secret, size_t slen,
195 const unsigned char *secret, size_t slen,
Dssl_tls.c269 static int ssl3_prf( const unsigned char *secret, size_t slen, in ssl3_prf() argument
301 if( ( ret = mbedtls_sha1_update_ret( &sha1, secret, slen ) ) != 0 ) in ssl3_prf()
310 if( ( ret = mbedtls_md5_update_ret( &md5, secret, slen ) ) != 0 ) in ssl3_prf()
330 static int tls1_prf( const unsigned char *secret, size_t slen, in tls1_prf() argument
356 S1 = secret; in tls1_prf()
357 S2 = secret + slen - hs; in tls1_prf()
502 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
532 status = psa_import_key( &key_attributes, secret, slen, &master_key ); in tls_prf_generic()
576 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
616 mbedtls_md_hmac_starts( &md_ctx, secret, slen ); in tls_prf_generic()
[all …]
Decjpake.c105 const unsigned char *secret, in mbedtls_ecjpake_setup() argument
113 ECJPAKE_VALIDATE_RET( secret != NULL || len == 0 ); in mbedtls_ecjpake_setup()
122 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) ); in mbedtls_ecjpake_setup()
Decp.c170 const mbedtls_mpi *secret, size_t secret_len ) in ecp_drbg_seed() argument
184 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, in ecp_drbg_seed()
235 const mbedtls_mpi *secret, size_t secret_len ) in ecp_drbg_seed() argument
246 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, in ecp_drbg_seed()
Dssl_msg.c480 const unsigned char *secret, in ssl_mac() argument
504 mbedtls_md_update( md_ctx, secret, md_size ); in ssl_mac()
512 mbedtls_md_update( md_ctx, secret, md_size ); in ssl_mac()
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/include/everest/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/include/everest/vs2010/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/
Decjpake.h130 const unsigned char *secret,
Dssl_internal.h377 typedef int mbedtls_ssl_tls_prf_cb( const unsigned char *secret, size_t slen,
Dssl.h4343 const unsigned char *secret, size_t slen,
/openthread-2.7.6/third_party/mbedtls/repo/docs/architecture/
Dtls13-experimental.md46 * The traffic {Key,IV} generation from secret
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ssl.function3683 data_t *secret,
3709 secret->x, secret->len,
3768 data_t *secret,
3795 secret->x, secret->len,
3808 data_t *secret,
3816 secret->len ? secret->x : NULL,
3826 void ssl_tls_prf( int type, data_t * secret, data_t * random,
3839 TEST_ASSERT( mbedtls_ssl_tls_prf( type, secret->x, secret->len,
4524 size_t secret;
4532 for( secret = offset_min; secret <= (size_t) offset_max; secret++ )
[all …]
Dtest_suite_ecdh.function427 /* server computes shared secret */
444 /* client computes shared secret */
Dtest_suite_psa_crypto_metadata.data250 Key type: secret for key derivation
Dtest_suite_psa_crypto_metadata.function439 /* Shared secret derivation properties */
Dtest_suite_psa_crypto.data2144 PSA key derivation: HKDF-SHA-256, direct secret, direct output
2148 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output
2152 PSA key derivation: HKDF-SHA-256, direct secret, key output
2156 PSA key derivation: HKDF-SHA-256, direct empty secret, key output
2210 PSA key derivation: TLS 1.2 PRF SHA-256, direct secret
2214 PSA key derivation: TLS 1.2 PRF SHA-256, direct empty secret
2348 # Label: "master secret"
Dtest_suite_ssl.data10403 # Initial secret to Early Secret
10409 # Early secret to Handshake Secret
10414 # Handshake secret to Master Secret
10419 # Server handshake traffic secret -> Server traffic key
10425 # Server handshake traffic secret -> Server traffic IV
10431 # Client handshake traffic secret -> Client traffic key
10437 # Client handshake traffic secret -> Client traffic IV
10443 # Server handshake traffic secret -> Server traffic IV
10449 # Server handshake traffic secret -> Server traffic Key
10455 # Client handshake traffic secret -> Client traffic IV
[all …]
Dtest_suite_psa_crypto.function943 /* Just the secret value */
4827 // When taking a private key as secret input, use key agreement
4828 // to add the shared secret to the derivation
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/library/legacy/
DHacl_Curve25519.c769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/library/
DHacl_Curve25519.c724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/openthread-2.7.6/third_party/mbedtls/repo/programs/
DREADME.md8 …file encryption and authentication with a key derived from a low-entropy secret, demonstrating the…
9 … build a secure encryption mechanism. To derive a key from a low-entropy secret such as a password…
/openthread-2.7.6/third_party/mbedtls/repo/docs/
Dgetting_started.md566 1. Provide a secret with `psa_key_derivation_input_key()`, referencing a key that
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog612 predictable shared secret if a hardware accelerator failed and the other
1215 worked if the same secret (for example a HTTP Cookie) has been repeatedly
1228 the same secret (for example a HTTP Cookie) has been repeatedly sent over
2183 * Added a key extraction callback to accees the master secret and key
2792 * Fix possible miscomputation of the premaster secret with DHE-PSK key