/ssl/ |
A D | ssl_key_share.cc | 109 Array<uint8_t> secret; in Decap() local 111 !BN_bn2bin_padded(secret.data(), secret.size(), x.get())) { in Decap() 115 *out_secret = std::move(secret); in Decap() 163 Array<uint8_t> secret; in Decap() local 175 *out_secret = std::move(secret); in Decap() 221 Array<uint8_t> secret; in Encap() local 261 Array<uint8_t> secret; in Decap() local 309 Array<uint8_t> secret; in Encap() local 351 Array<uint8_t> secret; in Decap() local 402 Array<uint8_t> secret; in Encap() local [all …]
|
A D | tls13_enc.cc | 47 hs->secret.clear(); in init_key_schedule() 48 hs->secret.Resize(transcript->DigestLen()); in init_key_schedule() 57 in.size(), hs->secret.data(), hs->secret.size())) { in hkdf_extract_to_secret() 60 assert(len == hs->secret.size()); in hkdf_extract_to_secret() 135 out.data(), out.size(), digest, secret.data(), secret.size(), in hkdf_expand_label() 407 return hkdf_expand_label(secret, digest, secret, in tls13_rotate_traffic_key() 411 session, secret); in tls13_rotate_traffic_key() 467 return hkdf_expand_label(Span(session->secret), digest, session->secret, in tls13_derive_session_psk() 477 if (secret.empty()) { in tls13_export_keying_material() 528 session->secret.data(), session->secret.size(), nullptr, in tls13_psk_binder() [all …]
|
A D | t1_enc.cc | 40 Span<const uint8_t> secret, std::string_view label, in tls1_prf() argument 42 return 1 == CRYPTO_tls1_prf(digest, out.data(), out.size(), secret.data(), in tls1_prf() 43 secret.size(), label.data(), label.size(), in tls1_prf() 78 return tls1_prf(digest, out, session->secret, "key expansion", in generate_key_block() 254 return tls1_prf(digest, out_span, session->secret, label_sv, seed, {}); in SSL_export_keying_material()
|
A D | ssl_asn1.cc | 158 !CBB_add_asn1_octet_string(&session, in->secret.data(), in SSL_SESSION_to_bytes_full() 159 in->secret.size()) || in SSL_SESSION_to_bytes_full() 500 CBS session_id, secret, child; in SSL_SESSION_parse() local 504 !CBS_get_asn1(&session, &secret, CBS_ASN1_OCTETSTRING) || in SSL_SESSION_parse() 505 !ret->secret.TryCopyFrom(secret) || in SSL_SESSION_parse()
|
A D | handoff.cc | 432 !CBB_add_asn1_octet_string(&seq, hs->secret.data(), in SSL_serialize_handback() 433 hs->secret.size()) || in SSL_serialize_handback() 553 server_traffic_secret_0, secret, exporter_secret, early_traffic_secret; in SSL_apply_handback() local 562 !CBS_get_asn1(&seq, &secret, CBS_ASN1_OCTETSTRING) || in SSL_apply_handback() 705 !hs->secret.TryCopyFrom(secret) || in SSL_apply_handback() 1074 CBS ciphertext, secret; in SSL_set_handshake_hints() local 1079 !CBS_get_asn1(&key_share, &secret, CBS_ASN1_OCTETSTRING) || in SSL_set_handshake_hints() 1080 !hints_obj->key_share_secret.CopyFrom(secret)) { in SSL_set_handshake_hints()
|
A D | ssl_session.cc | 80 new_session->secret = session->secret; in SSL_SESSION_dup() 909 return session->secret.size(); in SSL_SESSION_get_master_key() 911 if (max_out > session->secret.size()) { in SSL_SESSION_get_master_key() 912 max_out = session->secret.size(); in SSL_SESSION_get_master_key() 914 OPENSSL_memcpy(out, session->secret.data(), max_out); in SSL_SESSION_get_master_key()
|
A D | tls13_server.cc | 90 Array<uint8_t> secret; in resolve_ecdhe_secret() local 96 !secret.CopyFrom(hints->key_share_secret)) { in resolve_ecdhe_secret() 105 !key_share->Encap(ciphertext.get(), &secret, &alert, peer_key) || in resolve_ecdhe_secret() 113 !hints->key_share_secret.CopyFrom(secret)) { in resolve_ecdhe_secret() 120 return tls13_advance_key_schedule(hs, secret); in resolve_ecdhe_secret() 668 ? Span(hs->new_session->secret) in do_select_session()
|
A D | ssl_transcript.cc | 215 if (!tls1_prf(Digest(), Span(out, kFinishedLen), session->secret, label, in GetFinishedMAC()
|
A D | handshake_server.cc | 1469 hs->new_session->secret.ResizeForOverwrite(SSL3_MASTER_SECRET_SIZE); in do_read_client_key_exchange() 1470 if (!tls1_generate_master_secret(hs, Span(hs->new_session->secret), in do_read_client_key_exchange() 1479 CONSTTIME_DECLASSIFY(hs->new_session->secret.data(), in do_read_client_key_exchange() 1480 hs->new_session->secret.size()); in do_read_client_key_exchange()
|
A D | internal.h | 503 Span<const uint8_t> secret, std::string_view label, 1230 Span<const uint8_t> secret, 1723 InplaceVector<uint8_t, SSL_MAX_MD_SIZE> secret; member 2322 Span<const uint8_t> secret); 4121 bssl::InplaceVector<uint8_t, SSL_MAX_MASTER_KEY_LENGTH> secret; member
|
A D | handshake.cc | 438 if (!ssl_log_secret(ssl, "CLIENT_RANDOM", session->secret)) { in ssl_send_finished()
|
A D | ssl_test.cc | 6930 Span<const uint8_t> secret) { in SetReadSecret() argument 6960 levels_[level].read_secret.assign(secret.begin(), secret.end()); in SetReadSecret() 6966 Span<const uint8_t> secret) { in SetWriteSecret() argument 6982 levels_[level].write_secret.assign(secret.begin(), secret.end()); in SetWriteSecret() 7302 const uint8_t *secret, size_t secret_len) { in SetReadSecretCallback() argument 7304 Span(secret, secret_len)); in SetReadSecretCallback() 7309 const uint8_t *secret, size_t secret_len) { in SetWriteSecretCallback() argument 7311 Span(secret, secret_len)); in SetWriteSecretCallback() 10182 std::vector<uint8_t> client_random, secret; in TEST_P() local 10184 ASSERT_TRUE(DecodeLowerHex(&secret, secret_hex)); in TEST_P() [all …]
|
/ssl/test/runner/ |
A D | prf.go | 46 s1 = secret[0 : (len(secret)+1)/2] 47 s2 = secret[len(secret)/2:] 53 h := hmac.New(hash, secret) 77 func prf10(result, secret, label, seed []byte) { argument 85 s1, s2 := splitPreMasterSecret(secret) 97 return func(result, secret, label, seed []byte) { 102 pHash(result, secret, labelAndSeed, hashFunc) 189 ret.secret = make([]byte, ret.hash.Size()) 228 secret []byte member 345 h.secret, err = hkdf.Extract(h.suite.hash().New, ikm, h.secret) [all …]
|
A D | key_agreement.go | 244 encap(config *Config, peerKey []byte) (ciphertext []byte, secret []byte, err error) 247 decap(config *Config, ciphertext []byte) (secret []byte, err error) 318 secret, err = e.decap(config, peerKey) 325 func (e *ecdhKEM) decap(config *Config, ciphertext []byte) (secret []byte, err error) { 327 secret = make([]byte, 32) 378 func (e *kyberKEM) decap(config *Config, ciphertext []byte) (secret []byte, err error) { 421 secret, ciphertext = key.Encapsulate() 462 secret, ciphertext = key.Encapsulate() 551 ciphertext, secret, err = t.kem.encap(config, peerKey) 814 ciphertext, secret, err := ka.kem.encap(config, ka.peerKey) [all …]
|
A D | mock_quic_transport.go | 110 secret := value[:len(m.readSecret)] 112 if !bytes.Equal(secret, m.readSecret) { 113 return 0, nil, fmt.Errorf("secrets don't match: got %x but expected %x", secret, m.readSecret)
|
A D | ticket.go | 25 secret []byte member 46 addUint16LengthPrefixedBytes(msg, s.secret) 108 !readUint16LengthPrefixedBytes(&reader, &s.secret) ||
|
A D | conn.go | 327 …newEpoch := hc.newEpochState(epoch, deriveTrafficAEAD(version, suite, secret, side, hc.isDTLS), ni… 329 sn_key := hkdfExpandLabel(suite.hash(), secret, []byte("sn"), nil, suite.keyLen, hc.isDTLS) 342 hc.trafficSecret = secret 836 func (c *Conn) useInTrafficSecret(epoch uint16, version uint16, suite *cipherSuite, secret []byte) … 849 c.config.Bugs.MockQUICTransport.readSecret = secret 852 c.in.useTrafficSecret(version, suite, secret, side, epoch) 857 func (c *Conn) useOutTrafficSecret(epoch uint16, version uint16, suite *cipherSuite, secret []byte)… 872 c.config.Bugs.MockQUICTransport.writeSecret = secret 875 c.out.useTrafficSecret(version, suite, secret, side, epoch) 1946 func (c *Conn) exportKeyingMaterialTLS13(length int, secret, label, context []byte) []byte { [all …]
|
A D | handshake_client.go | 247 finishedHash.addEntropy(session.secret) 1164 pskSecret = hs.session.secret 2219 hs.masterSecret = hs.session.secret 2272 secret: hs.masterSecret, 2505 …binder := computePSKBinder(session.secret, version, isDTLS, resumptionPSKBinderLabel, session.ciph…
|
A D | handshake_server.go | 681 hs.finishedHash.addEntropy(hs.sessionState.secret) 1902 hs.masterSecret = hs.sessionState.secret 2211 secret: hs.masterSecret, 2447 …binder := computePSKBinder(sessionState.secret, version, isDTLS, resumptionPSKBinderLabel, pskCiph…
|
A D | common.go | 370 secret []byte // Secret associated with the session member
|
/ssl/test/ |
A D | mock_quic_transport.cc | 31 const uint8_t *secret, in SetReadSecret() argument 35 read_levels_[level].secret.assign(secret, secret + secret_len); in SetReadSecret() 45 write_levels_[level].secret.assign(secret, secret + secret_len); in SetWriteSecret() 130 const std::vector<uint8_t> &secret = read_levels_[level].secret; in ReadHeader() local 131 std::vector<uint8_t> read_secret(secret.size()); in ReadHeader() 132 if (remaining_bytes < secret.size()) { in ReadHeader() 136 remaining_bytes -= secret.size(); in ReadHeader() 141 if (read_secret != secret) { in ReadHeader() 243 const std::vector<uint8_t> &secret = write_levels_[level].secret; in WriteRecord() local 244 size_t tlv_len = secret.size() + len; in WriteRecord() [all …]
|
A D | mock_quic_transport.h | 29 const SSL_CIPHER *cipher, const uint8_t *secret, 32 const SSL_CIPHER *cipher, const uint8_t *secret, 67 std::vector<uint8_t> secret; member
|
A D | test_config.cc | 1886 const SSL_CIPHER *cipher, const uint8_t *secret, in SetQuicReadSecret() argument 1893 return quic_transport->SetReadSecret(level, cipher, secret, secret_len); in SetQuicReadSecret() 1897 const SSL_CIPHER *cipher, const uint8_t *secret, in SetQuicWriteSecret() argument 1904 return quic_transport->SetWriteSecret(level, cipher, secret, secret_len); in SetQuicWriteSecret()
|
/ssl/test/runner/kyber/ |
A D | kyber.go | 498 var secret, error vector 499 secret.generateSecretEta2(&counter, entropy) 501 secret.ntt() 510 u.mult(&pub.m, &secret) 515 v.innerProduct(&pub.t, &secret) 600 var secret [32]byte 601 for i := range secret { 602 …secret[i] = byte(subtle.ConstantTimeSelect(equal, int(prekeyAndRandomness[i]), int(priv.foFailureS… 607 shake.Write(secret[:])
|
/ssl/test/runner/hpke/ |
A D | hpke.go | 71 type GenerateKeyPairFunc func() (public []byte, secret []byte, e error) 221 secret := labeledExtract(kdfHash, sharedSecret, suiteID, []byte("secret"), psk) 222 …key := labeledExpand(kdfHash, secret, suiteID, []byte("key"), keyScheduleContext, expectedKeyLengt… 229 …baseNonce := labeledExpand(kdfHash, secret, suiteID, []byte("base_nonce"), keyScheduleContext, aea… 230 …exporterSecret := labeledExpand(kdfHash, secret, suiteID, []byte("exp"), keyScheduleContext, kdfHa…
|