/openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_test_common_source.c | 17 const unsigned char *secret, in eap_tls_key_derivation() argument 33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation() 41 const unsigned char *secret, in nss_keylog_export() argument 73 "%02x", secret[j]); in nss_keylog_export() 111 const unsigned char *secret, in dtls_srtp_key_derivation() argument 127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_constant_time.function | 472 size_t secret; 480 for (secret = offset_min; secret <= (size_t) offset_max; secret++) { 481 mbedtls_test_set_step((int) secret); 483 TEST_CF_SECRET(&secret, sizeof(secret)); 486 mbedtls_ct_memcpy_offset(dst, src, secret, 488 TEST_CF_PUBLIC(&secret, sizeof(secret)); 492 TEST_MEMORY_COMPARE(dst, len, src + secret, len);
|
D | test_suite_ssl.function | 1518 data_t *secret, 1546 secret->x, secret->len, 1615 data_t *secret, 1644 secret->x, secret->len, 1660 data_t *secret, 1671 secret->len == hash_len && 1679 alg, secret->x, transcript->x, transcript->len, 1694 data_t *secret, 1705 secret->len == hash_len && 1713 alg, secret->x, transcript->x, transcript->len, [all …]
|
D | test_suite_ecdh.function | 323 /* server computes shared secret */ 341 /* client computes shared secret */
|
D | test_suite_psa_crypto.data | 5278 PSA key derivation: HKDF-SHA-256, direct secret, direct output 5282 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output 5286 PSA key derivation: HKDF-SHA-256, direct secret, key output 5290 PSA key derivation: HKDF-SHA-256, direct empty secret, key output 5294 PSA key derivation: HKDF-SHA-256, missing secret, key output 5320 PSA key derivation: HKDF-SHA-256, salt after secret 5324 PSA key derivation: HKDF-SHA-256, missing secret 5336 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, direct) 5340 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, key) 5344 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, direct) [all …]
|
D | test_suite_ssl.data | 2694 # Initial secret to Early Secret 2700 # Early secret to Handshake Secret 2706 # Handshake secret to Master Secret 2712 # Server handshake traffic secret -> Server traffic key 2719 # Server handshake traffic secret -> Server traffic IV 2726 # Client handshake traffic secret -> Client traffic key 2733 # Client handshake traffic secret -> Client traffic IV 2740 # Server handshake traffic secret -> Server traffic IV 2747 # Server handshake traffic secret -> Server traffic Key 2754 # Client handshake traffic secret -> Client traffic IV [all …]
|
D | test_suite_psa_crypto_metadata.data | 363 Key type: secret for key derivation
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/include/everest/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/include/everest/vs2013/ |
D | Hacl_Curve25519.h | 18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_tls13_keys.h | 113 const unsigned char *secret, size_t secret_len, 199 const unsigned char *secret, size_t secret_len,
|
D | ssl_tls13_keys.c | 142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument 189 secret, in mbedtls_ssl_tls13_hkdf_expand_label() 223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key() argument 231 secret, secret_len, in ssl_tls13_make_traffic_key() 241 secret, secret_len, in ssl_tls13_make_traffic_key() 297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret() argument 327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret()
|
D | ecjpake.c | 97 const unsigned char *secret, in mbedtls_ecjpake_setup() argument 116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup()
|
D | ssl_tls.c | 401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen, 430 static int tls_prf_sha256(const unsigned char *secret, size_t slen, 441 static int tls_prf_sha384(const unsigned char *secret, size_t slen, 467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6747 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6777 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic() 6827 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6868 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic() 6933 static int tls_prf_sha256(const unsigned char *secret, size_t slen, in tls_prf_sha256() argument [all …]
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/p256-m/ |
D | README.md | 76 - "leak secret data when the input isn't a curve point" - this is avoided by 84 - it has no branch depending (even indirectly) on secret data; 85 - it has no memory access depending (even indirectly) on secret data. 90 In addition to avoiding branches and memory accesses depending on secret data, 120 _Note:_ p256-m also follows best practices such as securely erasing secret 139 - Cleaning up secret values from the stack before returning from a function. 222 | ECDH shared secret | 640 | 728 | 231 | ECDH shared secret | 596 | 700 | 245 | ECDH shared secret | 922 | 975 | 255 | ECDH shared secret | 144 | 177 | [all …]
|
D | p256-m.h | 58 int p256_ecdh_shared_secret(uint8_t secret[32],
|
D | p256-m.c | 1233 int p256_ecdh_shared_secret(uint8_t secret[32], in p256_ecdh_shared_secret() 1256 m256_to_bytes(secret, x, &p256_p); in p256_ecdh_shared_secret() 1257 CT_UNPOISON(secret, 32); in p256_ecdh_shared_secret()
|
/openthread-latest/third_party/tcplp/bsdtcp/ |
D | tcp_fastopen.h | 83 uint32_t secret;
|
D | tcp_fastopen.c | 419 V_tcp_fastopen_ccache.secret = arc4random(); in tcp_fastopen_init() 1096 V_tcp_fastopen_ccache.secret);
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | ecjpake.h | 115 const unsigned char *secret,
|
D | ssl.h | 1372 const unsigned char *secret, 5587 const unsigned char *secret, size_t slen,
|
/openthread-latest/third_party/mbedtls/repo/include/psa/ |
D | crypto_builtin_key_derivation.h | 78 uint8_t *MBEDTLS_PRIVATE(secret);
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/library/ |
D | Hacl_Curve25519.c | 724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/library/legacy/ |
D | Hacl_Curve25519.c | 769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument 786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | psa-transition.md | 604 …oup/group__derivation/#group__derivation_1ga0ddfbe764baba995c402b1b0ef59392e) for the secret input. 1111 …_derivation_1ga90fdd2716124d0bd258826184824675f) to calculate the shared secret from your private … 1114 …f) instead of `psa_raw_key_agreement` to use the resulting shared secret as the secret input to a … 1125 …* `mbedtls_mpi z` for the shared secret (this may be the same variable as `our_priv` when doing ep… 1129 …` on `grp`, `z` (output), `their_pub` and `our_priv`. Use the raw shared secret `z`, typically, to… 1144 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … 1159 …, then call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret. 1171 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … 1183 4. Call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret. 1194 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key … [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | tls13-support.md | 406 optional. For example, secret and key computations occur at this stage, as well 430 optional. For example, handshake secret and key computation occur at that
|