Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 29) sorted by relevance

12

/ssl/
A Dssl_key_share.cc109 Array<uint8_t> secret; in Decap() local
111 !BN_bn2bin_padded(secret.data(), secret.size(), x.get())) { in Decap()
115 *out_secret = std::move(secret); in Decap()
163 Array<uint8_t> secret; in Decap() local
175 *out_secret = std::move(secret); in Decap()
221 Array<uint8_t> secret; in Encap() local
261 Array<uint8_t> secret; in Decap() local
309 Array<uint8_t> secret; in Encap() local
351 Array<uint8_t> secret; in Decap() local
402 Array<uint8_t> secret; in Encap() local
[all …]
A Dtls13_enc.cc47 hs->secret.clear(); in init_key_schedule()
48 hs->secret.Resize(transcript->DigestLen()); in init_key_schedule()
57 in.size(), hs->secret.data(), hs->secret.size())) { in hkdf_extract_to_secret()
60 assert(len == hs->secret.size()); in hkdf_extract_to_secret()
135 out.data(), out.size(), digest, secret.data(), secret.size(), in hkdf_expand_label()
407 return hkdf_expand_label(secret, digest, secret, in tls13_rotate_traffic_key()
411 session, secret); in tls13_rotate_traffic_key()
467 return hkdf_expand_label(Span(session->secret), digest, session->secret, in tls13_derive_session_psk()
477 if (secret.empty()) { in tls13_export_keying_material()
528 session->secret.data(), session->secret.size(), nullptr, in tls13_psk_binder()
[all …]
A Dt1_enc.cc40 Span<const uint8_t> secret, std::string_view label, in tls1_prf() argument
42 return 1 == CRYPTO_tls1_prf(digest, out.data(), out.size(), secret.data(), in tls1_prf()
43 secret.size(), label.data(), label.size(), in tls1_prf()
78 return tls1_prf(digest, out, session->secret, "key expansion", in generate_key_block()
254 return tls1_prf(digest, out_span, session->secret, label_sv, seed, {}); in SSL_export_keying_material()
A Dssl_asn1.cc158 !CBB_add_asn1_octet_string(&session, in->secret.data(), in SSL_SESSION_to_bytes_full()
159 in->secret.size()) || in SSL_SESSION_to_bytes_full()
500 CBS session_id, secret, child; in SSL_SESSION_parse() local
504 !CBS_get_asn1(&session, &secret, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse()
505 !ret->secret.TryCopyFrom(secret) || in SSL_SESSION_parse()
A Dhandoff.cc432 !CBB_add_asn1_octet_string(&seq, hs->secret.data(), in SSL_serialize_handback()
433 hs->secret.size()) || in SSL_serialize_handback()
553 server_traffic_secret_0, secret, exporter_secret, early_traffic_secret; in SSL_apply_handback() local
562 !CBS_get_asn1(&seq, &secret, CBS_ASN1_OCTETSTRING) || in SSL_apply_handback()
705 !hs->secret.TryCopyFrom(secret) || in SSL_apply_handback()
1074 CBS ciphertext, secret; in SSL_set_handshake_hints() local
1079 !CBS_get_asn1(&key_share, &secret, CBS_ASN1_OCTETSTRING) || in SSL_set_handshake_hints()
1080 !hints_obj->key_share_secret.CopyFrom(secret)) { in SSL_set_handshake_hints()
A Dssl_session.cc80 new_session->secret = session->secret; in SSL_SESSION_dup()
909 return session->secret.size(); in SSL_SESSION_get_master_key()
911 if (max_out > session->secret.size()) { in SSL_SESSION_get_master_key()
912 max_out = session->secret.size(); in SSL_SESSION_get_master_key()
914 OPENSSL_memcpy(out, session->secret.data(), max_out); in SSL_SESSION_get_master_key()
A Dtls13_server.cc90 Array<uint8_t> secret; in resolve_ecdhe_secret() local
96 !secret.CopyFrom(hints->key_share_secret)) { in resolve_ecdhe_secret()
105 !key_share->Encap(ciphertext.get(), &secret, &alert, peer_key) || in resolve_ecdhe_secret()
113 !hints->key_share_secret.CopyFrom(secret)) { in resolve_ecdhe_secret()
120 return tls13_advance_key_schedule(hs, secret); in resolve_ecdhe_secret()
668 ? Span(hs->new_session->secret) in do_select_session()
A Dssl_transcript.cc215 if (!tls1_prf(Digest(), Span(out, kFinishedLen), session->secret, label, in GetFinishedMAC()
A Dhandshake_server.cc1469 hs->new_session->secret.ResizeForOverwrite(SSL3_MASTER_SECRET_SIZE); in do_read_client_key_exchange()
1470 if (!tls1_generate_master_secret(hs, Span(hs->new_session->secret), in do_read_client_key_exchange()
1479 CONSTTIME_DECLASSIFY(hs->new_session->secret.data(), in do_read_client_key_exchange()
1480 hs->new_session->secret.size()); in do_read_client_key_exchange()
A Dinternal.h503 Span<const uint8_t> secret, std::string_view label,
1230 Span<const uint8_t> secret,
1723 InplaceVector<uint8_t, SSL_MAX_MD_SIZE> secret; member
2322 Span<const uint8_t> secret);
4121 bssl::InplaceVector<uint8_t, SSL_MAX_MASTER_KEY_LENGTH> secret; member
A Dhandshake.cc438 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->secret)) { in ssl_send_finished()
A Dssl_test.cc6930 Span<const uint8_t> secret) { in SetReadSecret() argument
6960 levels_[level].read_secret.assign(secret.begin(), secret.end()); in SetReadSecret()
6966 Span<const uint8_t> secret) { in SetWriteSecret() argument
6982 levels_[level].write_secret.assign(secret.begin(), secret.end()); in SetWriteSecret()
7302 const uint8_t *secret, size_t secret_len) { in SetReadSecretCallback() argument
7304 Span(secret, secret_len)); in SetReadSecretCallback()
7309 const uint8_t *secret, size_t secret_len) { in SetWriteSecretCallback() argument
7311 Span(secret, secret_len)); in SetWriteSecretCallback()
10182 std::vector<uint8_t> client_random, secret; in TEST_P() local
10184 ASSERT_TRUE(DecodeLowerHex(&secret, secret_hex)); in TEST_P()
[all …]
/ssl/test/runner/
A Dprf.go46 s1 = secret[0 : (len(secret)+1)/2]
47 s2 = secret[len(secret)/2:]
53 h := hmac.New(hash, secret)
77 func prf10(result, secret, label, seed []byte) { argument
85 s1, s2 := splitPreMasterSecret(secret)
97 return func(result, secret, label, seed []byte) {
102 pHash(result, secret, labelAndSeed, hashFunc)
189 ret.secret = make([]byte, ret.hash.Size())
228 secret []byte member
345 h.secret, err = hkdf.Extract(h.suite.hash().New, ikm, h.secret)
[all …]
A Dkey_agreement.go244 encap(config *Config, peerKey []byte) (ciphertext []byte, secret []byte, err error)
247 decap(config *Config, ciphertext []byte) (secret []byte, err error)
318 secret, err = e.decap(config, peerKey)
325 func (e *ecdhKEM) decap(config *Config, ciphertext []byte) (secret []byte, err error) {
327 secret = make([]byte, 32)
378 func (e *kyberKEM) decap(config *Config, ciphertext []byte) (secret []byte, err error) {
421 secret, ciphertext = key.Encapsulate()
462 secret, ciphertext = key.Encapsulate()
551 ciphertext, secret, err = t.kem.encap(config, peerKey)
814 ciphertext, secret, err := ka.kem.encap(config, ka.peerKey)
[all …]
A Dmock_quic_transport.go110 secret := value[:len(m.readSecret)]
112 if !bytes.Equal(secret, m.readSecret) {
113 return 0, nil, fmt.Errorf("secrets don't match: got %x but expected %x", secret, m.readSecret)
A Dticket.go25 secret []byte member
46 addUint16LengthPrefixedBytes(msg, s.secret)
108 !readUint16LengthPrefixedBytes(&reader, &s.secret) ||
A Dconn.go327 …newEpoch := hc.newEpochState(epoch, deriveTrafficAEAD(version, suite, secret, side, hc.isDTLS), ni…
329 sn_key := hkdfExpandLabel(suite.hash(), secret, []byte("sn"), nil, suite.keyLen, hc.isDTLS)
342 hc.trafficSecret = secret
836 func (c *Conn) useInTrafficSecret(epoch uint16, version uint16, suite *cipherSuite, secret []byte) …
849 c.config.Bugs.MockQUICTransport.readSecret = secret
852 c.in.useTrafficSecret(version, suite, secret, side, epoch)
857 func (c *Conn) useOutTrafficSecret(epoch uint16, version uint16, suite *cipherSuite, secret []byte)…
872 c.config.Bugs.MockQUICTransport.writeSecret = secret
875 c.out.useTrafficSecret(version, suite, secret, side, epoch)
1946 func (c *Conn) exportKeyingMaterialTLS13(length int, secret, label, context []byte) []byte {
[all …]
A Dhandshake_client.go247 finishedHash.addEntropy(session.secret)
1164 pskSecret = hs.session.secret
2219 hs.masterSecret = hs.session.secret
2272 secret: hs.masterSecret,
2505 …binder := computePSKBinder(session.secret, version, isDTLS, resumptionPSKBinderLabel, session.ciph…
A Dhandshake_server.go681 hs.finishedHash.addEntropy(hs.sessionState.secret)
1902 hs.masterSecret = hs.sessionState.secret
2211 secret: hs.masterSecret,
2447 …binder := computePSKBinder(sessionState.secret, version, isDTLS, resumptionPSKBinderLabel, pskCiph…
A Dcommon.go370 secret []byte // Secret associated with the session member
/ssl/test/
A Dmock_quic_transport.cc31 const uint8_t *secret, in SetReadSecret() argument
35 read_levels_[level].secret.assign(secret, secret + secret_len); in SetReadSecret()
45 write_levels_[level].secret.assign(secret, secret + secret_len); in SetWriteSecret()
130 const std::vector<uint8_t> &secret = read_levels_[level].secret; in ReadHeader() local
131 std::vector<uint8_t> read_secret(secret.size()); in ReadHeader()
132 if (remaining_bytes < secret.size()) { in ReadHeader()
136 remaining_bytes -= secret.size(); in ReadHeader()
141 if (read_secret != secret) { in ReadHeader()
243 const std::vector<uint8_t> &secret = write_levels_[level].secret; in WriteRecord() local
244 size_t tlv_len = secret.size() + len; in WriteRecord()
[all …]
A Dmock_quic_transport.h29 const SSL_CIPHER *cipher, const uint8_t *secret,
32 const SSL_CIPHER *cipher, const uint8_t *secret,
67 std::vector<uint8_t> secret; member
A Dtest_config.cc1886 const SSL_CIPHER *cipher, const uint8_t *secret, in SetQuicReadSecret() argument
1893 return quic_transport->SetReadSecret(level, cipher, secret, secret_len); in SetQuicReadSecret()
1897 const SSL_CIPHER *cipher, const uint8_t *secret, in SetQuicWriteSecret() argument
1904 return quic_transport->SetWriteSecret(level, cipher, secret, secret_len); in SetQuicWriteSecret()
/ssl/test/runner/kyber/
A Dkyber.go498 var secret, error vector
499 secret.generateSecretEta2(&counter, entropy)
501 secret.ntt()
510 u.mult(&pub.m, &secret)
515 v.innerProduct(&pub.t, &secret)
600 var secret [32]byte
601 for i := range secret {
602secret[i] = byte(subtle.ConstantTimeSelect(equal, int(prekeyAndRandomness[i]), int(priv.foFailureS…
607 shake.Write(secret[:])
/ssl/test/runner/hpke/
A Dhpke.go71 type GenerateKeyPairFunc func() (public []byte, secret []byte, e error)
221 secret := labeledExtract(kdfHash, sharedSecret, suiteID, []byte("secret"), psk)
222 …key := labeledExpand(kdfHash, secret, suiteID, []byte("key"), keyScheduleContext, expectedKeyLengt…
229 …baseNonce := labeledExpand(kdfHash, secret, suiteID, []byte("base_nonce"), keyScheduleContext, aea…
230 …exporterSecret := labeledExpand(kdfHash, secret, suiteID, []byte("exp"), keyScheduleContext, kdfHa…

Completed in 106 milliseconds

12