/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | ssl_tls13_keys.c | 135 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 175 secret, slen, in mbedtls_ssl_tls1_3_hkdf_expand_label() 245 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_derive_secret() argument 281 secret, slen, in mbedtls_ssl_tls1_3_derive_secret()
|
D | ssl_tls13_keys.h | 111 const unsigned char *secret, size_t slen, 195 const unsigned char *secret, size_t slen,
|
D | ssl_tls.c | 269 static int ssl3_prf( const unsigned char *secret, size_t slen, in ssl3_prf() argument 301 if( ( ret = mbedtls_sha1_update_ret( &sha1, secret, slen ) ) != 0 ) in ssl3_prf() 310 if( ( ret = mbedtls_md5_update_ret( &md5, secret, slen ) ) != 0 ) in ssl3_prf() 330 static int tls1_prf( const unsigned char *secret, size_t slen, in tls1_prf() argument 356 S1 = secret; in tls1_prf() 357 S2 = secret + slen - hs; in tls1_prf() 502 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 532 status = psa_import_key( &key_attributes, secret, slen, &master_key ); in tls_prf_generic() 576 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 616 mbedtls_md_hmac_starts( &md_ctx, secret, slen ); in tls_prf_generic() [all …]
|
D | ecjpake.c | 105 const unsigned char *secret, in mbedtls_ecjpake_setup() argument 113 ECJPAKE_VALIDATE_RET( secret != NULL || len == 0 ); in mbedtls_ecjpake_setup() 122 MBEDTLS_MPI_CHK( mbedtls_mpi_read_binary( &ctx->s, secret, len ) ); in mbedtls_ecjpake_setup()
|
D | ecp.c | 170 const mbedtls_mpi *secret, size_t secret_len ) in ecp_drbg_seed() argument 184 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, in ecp_drbg_seed() 235 const mbedtls_mpi *secret, size_t secret_len ) in ecp_drbg_seed() argument 246 MBEDTLS_MPI_CHK( mbedtls_mpi_write_binary( secret, in ecp_drbg_seed()
|
D | ssl_msg.c | 480 const unsigned char *secret, in ssl_mac() argument 504 mbedtls_md_update( md_ctx, secret, md_size ); in ssl_mac() 512 mbedtls_md_update( md_ctx, secret, md_size ); in ssl_mac()
|
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/include/everest/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/include/everest/vs2010/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/ |
D | ecjpake.h | 130 const unsigned char *secret,
|
D | ssl_internal.h | 377 typedef int mbedtls_ssl_tls_prf_cb( const unsigned char *secret, size_t slen,
|
D | ssl.h | 4343 const unsigned char *secret, size_t slen,
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/architecture/ |
D | tls13-experimental.md | 46 * The traffic {Key,IV} generation from secret
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.function | 3683 data_t *secret, 3709 secret->x, secret->len, 3768 data_t *secret, 3795 secret->x, secret->len, 3808 data_t *secret, 3816 secret->len ? secret->x : NULL, 3826 void ssl_tls_prf( int type, data_t * secret, data_t * random, 3839 TEST_ASSERT( mbedtls_ssl_tls_prf( type, secret->x, secret->len, 4524 size_t secret; 4532 for( secret = offset_min; secret <= (size_t) offset_max; secret++ ) [all …]
|
D | test_suite_ecdh.function | 427 /* server computes shared secret */ 444 /* client computes shared secret */
|
D | test_suite_psa_crypto_metadata.data | 250 Key type: secret for key derivation
|
D | test_suite_psa_crypto_metadata.function | 439 /* Shared secret derivation properties */
|
D | test_suite_psa_crypto.data | 2144 PSA key derivation: HKDF-SHA-256, direct secret, direct output 2148 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output 2152 PSA key derivation: HKDF-SHA-256, direct secret, key output 2156 PSA key derivation: HKDF-SHA-256, direct empty secret, key output 2210 PSA key derivation: TLS 1.2 PRF SHA-256, direct secret 2214 PSA key derivation: TLS 1.2 PRF SHA-256, direct empty secret 2348 # Label: "master secret"
|
D | test_suite_ssl.data | 10403 # Initial secret to Early Secret 10409 # Early secret to Handshake Secret 10414 # Handshake secret to Master Secret 10419 # Server handshake traffic secret -> Server traffic key 10425 # Server handshake traffic secret -> Server traffic IV 10431 # Client handshake traffic secret -> Client traffic key 10437 # Client handshake traffic secret -> Client traffic IV 10443 # Server handshake traffic secret -> Server traffic IV 10449 # Server handshake traffic secret -> Server traffic Key 10455 # Client handshake traffic secret -> Client traffic IV [all …]
|
D | test_suite_psa_crypto.function | 943 /* Just the secret value */ 4827 // When taking a private key as secret input, use key agreement 4828 // to add the shared secret to the derivation
|
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/library/legacy/ |
D | Hacl_Curve25519.c | 769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/openthread-2.7.6/third_party/mbedtls/repo/3rdparty/everest/library/ |
D | Hacl_Curve25519.c | 724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ |
D | README.md | 8 …file encryption and authentication with a key derived from a low-entropy secret, demonstrating the… 9 … build a secure encryption mechanism. To derive a key from a low-entropy secret such as a password…
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 566 1. Provide a secret with `psa_key_derivation_input_key()`, referencing a key that
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 612 predictable shared secret if a hardware accelerator failed and the other 1215 worked if the same secret (for example a HTTP Cookie) has been repeatedly 1228 the same secret (for example a HTTP Cookie) has been repeatedly sent over 2183 * Added a key extraction callback to accees the master secret and key 2792 * Fix possible miscomputation of the premaster secret with DHE-PSK key
|