Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 32) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/programs/ssl/
Dssl_test_common_source.c17 const unsigned char *secret, in eap_tls_key_derivation() argument
33 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in eap_tls_key_derivation()
41 const unsigned char *secret, in nss_keylog_export() argument
73 "%02x", secret[j]); in nss_keylog_export()
111 const unsigned char *secret, in dtls_srtp_key_derivation() argument
127 memcpy(keys->master_secret, secret, sizeof(keys->master_secret)); in dtls_srtp_key_derivation()
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_constant_time.function472 size_t secret;
480 for (secret = offset_min; secret <= (size_t) offset_max; secret++) {
481 mbedtls_test_set_step((int) secret);
483 TEST_CF_SECRET(&secret, sizeof(secret));
486 mbedtls_ct_memcpy_offset(dst, src, secret,
488 TEST_CF_PUBLIC(&secret, sizeof(secret));
492 TEST_MEMORY_COMPARE(dst, len, src + secret, len);
Dtest_suite_ssl.function1518 data_t *secret,
1546 secret->x, secret->len,
1615 data_t *secret,
1644 secret->x, secret->len,
1660 data_t *secret,
1671 secret->len == hash_len &&
1679 alg, secret->x, transcript->x, transcript->len,
1694 data_t *secret,
1705 secret->len == hash_len &&
1713 alg, secret->x, transcript->x, transcript->len,
[all …]
Dtest_suite_ecdh.function323 /* server computes shared secret */
341 /* client computes shared secret */
Dtest_suite_psa_crypto.data5278 PSA key derivation: HKDF-SHA-256, direct secret, direct output
5282 PSA key derivation: HKDF-SHA-256, direct empty secret, direct output
5286 PSA key derivation: HKDF-SHA-256, direct secret, key output
5290 PSA key derivation: HKDF-SHA-256, direct empty secret, key output
5294 PSA key derivation: HKDF-SHA-256, missing secret, key output
5320 PSA key derivation: HKDF-SHA-256, salt after secret
5324 PSA key derivation: HKDF-SHA-256, missing secret
5336 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, direct)
5340 PSA key derivation: HKDF-SHA-256, duplicate secret step (direct, key)
5344 PSA key derivation: HKDF-SHA-256, duplicate secret step (key, direct)
[all …]
Dtest_suite_ssl.data2694 # Initial secret to Early Secret
2700 # Early secret to Handshake Secret
2706 # Handshake secret to Master Secret
2712 # Server handshake traffic secret -> Server traffic key
2719 # Server handshake traffic secret -> Server traffic IV
2726 # Client handshake traffic secret -> Client traffic key
2733 # Client handshake traffic secret -> Client traffic IV
2740 # Server handshake traffic secret -> Server traffic IV
2747 # Server handshake traffic secret -> Server traffic Key
2754 # Client handshake traffic secret -> Client traffic IV
[all …]
Dtest_suite_psa_crypto_metadata.data363 Key type: secret for key derivation
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/include/everest/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/include/everest/vs2013/
DHacl_Curve25519.h18 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint);
/openthread-latest/third_party/mbedtls/repo/library/
Dssl_tls13_keys.h113 const unsigned char *secret, size_t secret_len,
199 const unsigned char *secret, size_t secret_len,
Dssl_tls13_keys.c142 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_hkdf_expand_label() argument
189 secret, in mbedtls_ssl_tls13_hkdf_expand_label()
223 const unsigned char *secret, size_t secret_len, in ssl_tls13_make_traffic_key() argument
231 secret, secret_len, in ssl_tls13_make_traffic_key()
241 secret, secret_len, in ssl_tls13_make_traffic_key()
297 const unsigned char *secret, size_t secret_len, in mbedtls_ssl_tls13_derive_secret() argument
327 secret, secret_len, in mbedtls_ssl_tls13_derive_secret()
Decjpake.c97 const unsigned char *secret, in mbedtls_ecjpake_setup() argument
116 MBEDTLS_MPI_CHK(mbedtls_mpi_read_binary(&ctx->s, secret, len)); in mbedtls_ecjpake_setup()
Dssl_tls.c401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen,
430 static int tls_prf_sha256(const unsigned char *secret, size_t slen,
441 static int tls_prf_sha384(const unsigned char *secret, size_t slen,
467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument
491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf()
6747 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6777 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic()
6827 const unsigned char *secret, size_t slen, in tls_prf_generic() argument
6868 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic()
6933 static int tls_prf_sha256(const unsigned char *secret, size_t slen, in tls_prf_sha256() argument
[all …]
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/p256-m/
DREADME.md76 - "leak secret data when the input isn't a curve point" - this is avoided by
84 - it has no branch depending (even indirectly) on secret data;
85 - it has no memory access depending (even indirectly) on secret data.
90 In addition to avoiding branches and memory accesses depending on secret data,
120 _Note:_ p256-m also follows best practices such as securely erasing secret
139 - Cleaning up secret values from the stack before returning from a function.
222 | ECDH shared secret | 640 | 728 |
231 | ECDH shared secret | 596 | 700 |
245 | ECDH shared secret | 922 | 975 |
255 | ECDH shared secret | 144 | 177 |
[all …]
Dp256-m.h58 int p256_ecdh_shared_secret(uint8_t secret[32],
Dp256-m.c1233 int p256_ecdh_shared_secret(uint8_t secret[32], in p256_ecdh_shared_secret()
1256 m256_to_bytes(secret, x, &p256_p); in p256_ecdh_shared_secret()
1257 CT_UNPOISON(secret, 32); in p256_ecdh_shared_secret()
/openthread-latest/third_party/tcplp/bsdtcp/
Dtcp_fastopen.h83 uint32_t secret;
Dtcp_fastopen.c419 V_tcp_fastopen_ccache.secret = arc4random(); in tcp_fastopen_init()
1096 V_tcp_fastopen_ccache.secret);
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Decjpake.h115 const unsigned char *secret,
Dssl.h1372 const unsigned char *secret,
5587 const unsigned char *secret, size_t slen,
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto_builtin_key_derivation.h78 uint8_t *MBEDTLS_PRIVATE(secret);
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/library/
DHacl_Curve25519.c724 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/openthread-latest/third_party/mbedtls/repo/3rdparty/everest/library/legacy/
DHacl_Curve25519.c769 void Hacl_Curve25519_crypto_scalarmult(uint8_t *mypublic, uint8_t *secret, uint8_t *basepoint) in Hacl_Curve25519_crypto_scalarmult() argument
786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
/openthread-latest/third_party/mbedtls/repo/docs/
Dpsa-transition.md604 …oup/group__derivation/#group__derivation_1ga0ddfbe764baba995c402b1b0ef59392e) for the secret input.
1111 …_derivation_1ga90fdd2716124d0bd258826184824675f) to calculate the shared secret from your private …
1114 …f) instead of `psa_raw_key_agreement` to use the resulting shared secret as the secret input to a …
1125 …* `mbedtls_mpi z` for the shared secret (this may be the same variable as `our_priv` when doing ep…
1129 …` on `grp`, `z` (output), `their_pub` and `our_priv`. Use the raw shared secret `z`, typically, to…
1144 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
1159 …, then call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret.
1171 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
1183 4. Call `mbedtls_ecdh_calc_secret` or `mbedtls_dhm_calc_secret` to calculate the shared secret.
1194 …Alternatively, call `psa_key_derivation_key_agreement` to use the shared secret directly in a key …
[all …]
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dtls13-support.md406 optional. For example, secret and key computations occur at this stage, as well
430 optional. For example, handshake secret and key computation occur at that

12