/ssl/test/runner/ |
A D | key_agreement.go | 106 if len(ckx.ciphertext) < 2 { 110 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 114 ciphertext := ckx.ciphertext[2:] 553 ciphertext = t.transform(ciphertext) 775 if len(ckx.ciphertext) == 0 || int(ckx.ciphertext[0]) != len(ckx.ciphertext)-1 { 820 ckx.ciphertext = make([]byte, 1+len(ciphertext)) 821 ckx.ciphertext[0] = byte(len(ciphertext)) 822 copy(ckx.ciphertext[1:], ciphertext) 922 identityLen := (int(ckx.ciphertext[0]) << 8) | int(ckx.ciphertext[1]) 939 newCkx.ciphertext = ckx.ciphertext[2+identityLen:] [all …]
|
A D | shim_ticket.go | 112 ciphertext := out[len(name)+len(iv):] 113 cbc.CryptBlocks(ciphertext, ciphertext)
|
A D | ticket.go | 214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size] 215 plaintext := make([]byte, len(ciphertext)) 216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
A D | handshake_messages.go | 2400 ciphertext []byte member 2409 addUint24LengthPrefixedBytes(msg, m.ciphertext) 2423 m.ciphertext = data[4:]
|
A D | handshake_server.go | 1011 ciphertext, ecdheSecret, err := kem.encap(config, peerKey) 1027 keyExchange: ciphertext, 1034 keyExchange: ciphertext,
|
/ssl/ |
A D | ssl_key_share.cc | 80 Span<const uint8_t> ciphertext) override { in Decap() argument 92 if (ciphertext.empty() || ciphertext[0] != POINT_CONVERSION_UNCOMPRESSED || in Decap() 160 Span<const uint8_t> ciphertext) override { in Decap() argument 168 if (ciphertext.size() != 32 || // in Decap() 258 Span<const uint8_t> ciphertext) override { in Decap() argument 348 Span<const uint8_t> ciphertext) override { in Decap() argument 357 if (ciphertext.size() != in Decap() 406 uint8_t ciphertext[MLKEM1024_CIPHERTEXT_BYTES]; in Encap() local 408 if (!CBB_add_bytes(out_ciphertext, ciphertext, sizeof(ciphertext))) { in Encap() 416 Span<const uint8_t> ciphertext) override { in Decap() argument [all …]
|
A D | extensions.cc | 2306 CBS ciphertext; in ssl_ext_key_share_parse_serverhello() local 2309 !CBS_get_u16_length_prefixed(contents, &ciphertext) || in ssl_ext_key_share_parse_serverhello() 2326 if (!key_share->Decap(out_secret, out_alert, ciphertext)) { in ssl_ext_key_share_parse_serverhello() 2415 CBB entry, ciphertext; in ssl_ext_key_share_add_serverhello() local 2419 !CBB_add_u16_length_prefixed(&entry, &ciphertext) || in ssl_ext_key_share_add_serverhello() 2420 !CBB_add_bytes(&ciphertext, hs->key_share_ciphertext.data(), in ssl_ext_key_share_add_serverhello() 4288 auto ciphertext = ticket.subspan(SSL_TICKET_KEY_NAME_LEN + iv_len); in decrypt_ticket_with_cipher_ctx() local 4291 if (!plaintext.CopyFrom(ciphertext)) { in decrypt_ticket_with_cipher_ctx() 4295 if (ciphertext.size() >= INT_MAX) { in decrypt_ticket_with_cipher_ctx() 4298 if (!plaintext.InitForOverwrite(ciphertext.size())) { in decrypt_ticket_with_cipher_ctx() [all …]
|
A D | tls13_server.cc | 101 ScopedCBB ciphertext; in resolve_ecdhe_secret() local 104 !CBB_init(ciphertext.get(), 32) || in resolve_ecdhe_secret() 105 !key_share->Encap(ciphertext.get(), &secret, &alert, peer_key) || in resolve_ecdhe_secret() 106 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
|
A D | handoff.cc | 1074 CBS ciphertext, secret; in SSL_set_handshake_hints() local 1077 !CBS_get_asn1(&key_share, &ciphertext, CBS_ASN1_OCTETSTRING) || in SSL_set_handshake_hints() 1078 !hints_obj->key_share_ciphertext.CopyFrom(ciphertext) || in SSL_set_handshake_hints()
|
A D | handshake_server.cc | 1394 CBS ciphertext; in do_read_client_key_exchange() local 1395 if (!CBS_get_u8_length_prefixed(&client_key_exchange, &ciphertext) || in do_read_client_key_exchange() 1404 if (!hs->key_shares[0]->Decap(&premaster_secret, &alert, ciphertext)) { in do_read_client_key_exchange()
|
A D | internal.h | 931 Span<const uint8_t> ciphertext) = 0;
|
A D | ssl_test.cc | 3838 const uint8_t *ciphertext = ticket + 16 + 16; in GetServerTicketTime() local 3848 !EVP_DecryptUpdate(ctx.get(), plaintext.get(), &len1, ciphertext, in GetServerTicketTime()
|
/ssl/test/runner/kyber/ |
A D | kyber_test.go | 41 var ciphertext *[CiphertextSize]byte 65 ciphertext = priv.Encap(sharedSecret, &hashedEntropy) 67 priv.Decap(decapSharedSecret, ciphertext) 84 if !bytes.Equal(ciphertext[:], value) { 85 t.Errorf("bad 'ct' value on line %d:\nwant: %x\ncalc: %x", lineNo, value, ciphertext[:]) 113 ciphertext := priv.Encap(sharedSecret[:], &encapEntropy) 114 h.Write(ciphertext[:]) 118 priv.Decap(decapSharedSecret[:], ciphertext)
|
A D | kyber.go | 536 ciphertext := pub.encryptCPA(entropy, (*[32]byte)(prekeyAndRandomness[32:])) 537 ciphertextHash := sha3.Sum256(ciphertext[:]) 540 return ciphertext 572 func (priv *PrivateKey) decryptCPA(ciphertext *[CiphertextSize]byte) [32]byte { 574 u.decode(ciphertext[:], du) 579 v.decode(ciphertext[compressedVectorSize:], dv) 592 func (priv *PrivateKey) Decap(outSharedSecret []byte, ciphertext *[CiphertextSize]byte) { 593 decrypted := priv.decryptCPA(ciphertext) 599 equal := subtle.ConstantTimeCompare(ciphertext[:], expectedCiphertext[:]) 604 ciphertextHash := sha3.Sum256(ciphertext[:])
|
/ssl/test/runner/hpke/ |
A D | hpke_test.go | 59 ciphertext := senderContext.Seal(plaintext, nil) 60 decrypted, err := receiverContext.Open(ciphertext, nil) 160 ciphertext := senderContext.Seal(e.Plaintext, e.AdditionalData) 161 checkBytesEqual(t, "ciphertext", ciphertext, e.Ciphertext) 163 decrypted, err := receiverContext.Open(ciphertext, e.AdditionalData)
|
A D | hpke.go | 142 ciphertext := c.aead.Seal(nil, c.computeNonce(), plaintext, additionalData) 144 return ciphertext 147 func (c *Context) Open(ciphertext, additionalData []byte) ([]byte, error) { 148 plaintext, err := c.aead.Open(nil, c.computeNonce(), ciphertext, additionalData)
|