/ssl/test/runner/hpke/ |
A D | hpke_test.go | 45 senderContext, enc, err := SetupBaseSenderX25519(HKDFSHA256, AES256GCM, publicKeyR, nil, nil) 50 receiverContext, err := SetupBaseReceiverX25519(HKDFSHA256, AES256GCM, enc, secretKeyR, nil) 119 var enc []byte 124 …senderContext, enc, err = SetupBaseSenderX25519(testVec.KDF, testVec.AEAD, testVec.PublicKeyR, tes… 132 checkBytesEqual(t, "sender enc", enc, testVec.Enc) 134 …receiverContext, err = SetupBaseReceiverX25519(testVec.KDF, testVec.AEAD, enc, testVec.SecretKeyR,… 140 …senderContext, enc, err = SetupPSKSenderX25519(testVec.KDF, testVec.AEAD, testVec.PublicKeyR, test… 148 checkBytesEqual(t, "sender enc", enc, testVec.Enc) 150 …receiverContext, err = SetupPSKReceiverX25519(testVec.KDF, testVec.AEAD, enc, testVec.SecretKeyR, …
|
A D | hpke.go | 89 …blicKeyR, info []byte, ephemKeygen GenerateKeyPairFunc) (context *Context, enc []byte, err error) { 90 sharedSecret, enc, err := x25519Encap(publicKeyR, ephemKeygen) 100 func SetupBaseReceiverX25519(kdfID, aeadID uint16, enc, secretKeyR, info []byte) (context *Context,… argument 101 sharedSecret, err := x25519Decap(enc, secretKeyR) 110 …fo, psk, pskID []byte, ephemKeygen GenerateKeyPairFunc) (context *Context, enc []byte, err error) { 111 sharedSecret, enc, err := x25519Encap(publicKeyR, ephemKeygen) 121 func SetupPSKReceiverX25519(kdfID, aeadID uint16, enc, secretKeyR, info, psk, pskID []byte) (contex… argument 122 sharedSecret, err := x25519Decap(enc, secretKeyR)
|
A D | kem.go | 113 func x25519Decap(enc, secretKeyR []byte) ([]byte, error) { argument 114 dh, err := curve25519.X25519(secretKeyR, enc) 125 return extractAndExpand(dh, enc, publicKeyR[:]), nil 128 func extractAndExpand(dh, enc, publicKeyR []byte) []byte { argument 130 kemContext = append(kemContext, enc...)
|
/ssl/ |
A D | encrypted_client_hello.cc | 557 Span<const uint8_t> enc) const { in SetupContext() 589 get_ech_aead(aead_id), enc.data(), in SetupContext() 590 enc.size(), CBB_data(info_cbb.get()), in SetupContext() 738 uint8_t enc[X25519_PUBLIC_VALUE_LEN]; in setup_ech_grease() local 740 X25519_keypair(enc, private_key_unused); in setup_ech_grease() 766 !CBB_add_bytes(&enc_cbb, enc, sizeof(enc)) || in setup_ech_grease() 776 bool ssl_encrypt_client_hello(SSL_HANDSHAKE *hs, Span<const uint8_t> enc) { in ssl_encrypt_client_hello() argument 859 !CBB_add_bytes(&enc_cbb, enc.data(), enc.size()) || in ssl_encrypt_client_hello()
|
A D | ssl_cipher.cc | 1441 const char *kx, *au, *enc, *mac; in SSL_CIPHER_description() local 1495 enc = "3DES(168)"; in SSL_CIPHER_description() 1499 enc = "AES(128)"; in SSL_CIPHER_description() 1503 enc = "AES(256)"; in SSL_CIPHER_description() 1507 enc = "AESGCM(128)"; in SSL_CIPHER_description() 1511 enc = "AESGCM(256)"; in SSL_CIPHER_description() 1515 enc = "ChaCha20-Poly1305"; in SSL_CIPHER_description() 1519 enc = "unknown"; in SSL_CIPHER_description() 1552 kx, au, enc, mac); in SSL_CIPHER_description()
|
A D | tls13_server.cc | 805 CBS enc, payload; in do_read_second_client_hello() local 811 !CBS_get_u16_length_prefixed(&ech_body, &enc) || in do_read_second_client_hello() 822 config_id != hs->ech_config_id || CBS_len(&enc) > 0) { in do_read_second_client_hello()
|
A D | handshake_server.cc | 414 CBS enc, payload; in decrypt_ech() local 418 !CBS_get_u16_length_prefixed(&body, &enc) || in decrypt_ech() 439 !config->SetupContext(hs->ech_hpke_ctx.get(), kdf_id, aead_id, enc)) { in decrypt_ech()
|
A D | internal.h | 1294 Span<const uint8_t> enc) const; 1387 bool ssl_encrypt_client_hello(SSL_HANDSHAKE *hs, Span<const uint8_t> enc); 3856 EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc) = nullptr;
|
/ssl/test/runner/ |
A D | handshake_client.go | 911 …akeState) encryptClientHello(hello, innerHello *clientHelloMsg, configID uint8, enc []byte) error { 929 enc = enc[:1] 948 enc: enc,
|
A D | handshake_messages.go | 144 enc []byte member 358 addUint16LengthPrefixedBytes(body, m.echOuter.enc) 907 !readUint16LengthPrefixedBytes(&body, &echOuter.enc) ||
|
A D | handshake_server.go | 222 …r = hpke.SetupBaseReceiverX25519(echOuter.kdfID, echOuter.aeadID, echOuter.enc, candidate.Key, inf… 834 if len(newClientHello.echOuter.enc) != 0 {
|