/mbedtls-development/programs/psa/ |
A D | key_ladder_demo.sh | 42 "$program" wrap master=master.key label=hello label=world \ 47 "$program" unwrap master=master.key label=hello label=world \ 54 …ram" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow label=orld 58 "$program" save master=master.key label=hello \ 61 "$program" unwrap master=hello.key label=world \
|
/mbedtls-development/library/ |
A D | ssl_tls13_keys.h | 117 const unsigned char *label, size_t llen, 201 const unsigned char *label, size_t llen,
|
A D | ssl_tls13_keys.c | 98 const unsigned char *label, size_t llen, in ssl_tls1_3_hkdf_encode_label() argument 124 memcpy( p, label, llen ); in ssl_tls1_3_hkdf_encode_label() 139 const unsigned char *label, size_t llen, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 172 label, llen, in mbedtls_ssl_tls1_3_hkdf_expand_label() 249 const unsigned char *label, size_t llen, in mbedtls_ssl_tls1_3_derive_secret() argument 285 label, llen, in mbedtls_ssl_tls1_3_derive_secret()
|
A D | ssl_tls.c | 385 const char *label, in tls_prf_generic() argument 423 (size_t) strlen( label ), in tls_prf_generic() 459 const char *label, in tls_prf_generic() argument 479 tmp_len = md_len + strlen( label ) + rlen; in tls_prf_generic() 487 nb = strlen( label ); in tls_prf_generic() 488 memcpy( tmp + md_len, label, nb ); in tls_prf_generic() 531 const char *label, in tls_prf_sha256() argument 536 label, random, rlen, dstbuf, dlen ) ); in tls_prf_sha256() 542 const char *label, in tls_prf_sha384() argument 613 const char *label, in mbedtls_ssl_tls_prf() argument [all …]
|
A D | rsa.c | 1170 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_encrypt() argument 1185 RSA_VALIDATE_RET( label_len == 0 || label != NULL ); in mbedtls_rsa_rsaes_oaep_encrypt() 1212 if( ( ret = mbedtls_md( md_info, label, label_len, p ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1340 const unsigned char *label, size_t label_len, in mbedtls_rsa_rsaes_oaep_decrypt() argument 1357 RSA_VALIDATE_RET( label_len == 0 || label != NULL ); in mbedtls_rsa_rsaes_oaep_decrypt() 1414 if( ( ret = mbedtls_md( md_info, label, label_len, lhash ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_decrypt()
|
A D | psa_crypto.c | 4323 if( operation->ctx.tls12_prf.label != NULL ) in psa_key_derivation_abort() 4325 mbedtls_platform_zeroize( operation->ctx.tls12_prf.label, in psa_key_derivation_abort() 4327 mbedtls_free( operation->ctx.tls12_prf.label ); in psa_key_derivation_abort() 4500 tls12_prf->label, in psa_key_derivation_tls12_prf_generate_next_block() 4536 status = psa_mac_update( &hmac, tls12_prf->label, tls12_prf->label_length ); in psa_key_derivation_tls12_prf_generate_next_block() 5008 prf->label = mbedtls_calloc( 1, data_length ); in psa_tls12_prf_set_label() 5009 if( prf->label == NULL ) in psa_tls12_prf_set_label() 5012 memcpy( prf->label, data, data_length ); in psa_tls12_prf_set_label()
|
A D | ssl_misc.h | 464 const char *label,
|
/mbedtls-development/include/mbedtls/ |
A D | rsa.h | 660 const unsigned char *label, size_t label_len, 777 const unsigned char *label, size_t label_len,
|
A D | ssl.h | 4509 const char *label,
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto.function | 5515 data_t *label, 5551 label->x, label->len, 5559 if( label->len == 0 ) 5633 label->x, label->len, 5642 label->x, label->len, 5667 data_t *label, 5698 label->x, label->len, 5707 if( label->len == 0 ) 5735 data_t *label, 5762 label->x, label->len, [all …]
|
A D | test_suite_ssl.function | 4066 char *label, data_t *result_str, int exp_ret ) 4465 /* The goto below is used to avoid an "unused label" warning.*/ 4483 /* The goto below is used to avoid an "unused label" warning.*/ 4493 /* The goto below is used to avoid an "unused label" warning.*/ 4514 /* The goto below is used to avoid an "unused label" warning.*/ 4526 /* The goto below is used to avoid an "unused label" warning.*/ 4538 /* The goto below is used to avoid an "unused label" warning.*/ 4552 /* The goto below is used to avoid an "unused label" warning.*/ 4604 /* The goto below is used to avoid an "unused label" warning.*/ 4625 /* The goto below is used to avoid an "unused label" warning.*/ [all …]
|
A D | test_suite_psa_crypto.data | 4050 PSA encrypt: RSA OAEP-SHA-256, good, with label 4058 PSA encrypt: RSA OAEP-SHA-384, good, with label 4102 PSA encrypt-decrypt: RSA OAEP-SHA-256, with label 4130 PSA decrypt: RSA OAEP-SHA-256, 0 bytes, with label 4138 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, with label 4150 PSA decrypt: RSA OAEP-SHA-256, 30 bytes, wrong label (empty) 4349 PSA key derivation: HKDF-SHA-256, reject label step 4365 PSA key derivation: TLS 1.2 PRF SHA-256, missing label 4397 PSA key derivation: TLS 1.2 PRF SHA-256, label first 4401 PSA key derivation: TLS 1.2 PRF SHA-256, early label [all …]
|
A D | test_suite_psa_crypto_se_driver_hal.function | 56 * label `exit`. 74 * jump directly to the `exit` label. If this returns any other
|
A D | test_suite_psa_crypto_metadata.function | 528 * asymmetric_signature_algorithm. Pacify -Werror=unused-label. */
|
A D | test_suite_asn1parse.function | 742 goto exit; /* Silence unused label warning */
|
A D | test_suite_ssl.data | 6095 ssl_tls_prf:MBEDTLS_SSL_TLS_PRF_NONE:"":"":"test tls_prf label":"":MBEDTLS_ERR_SSL_FEATURE_UNAVAILA… 6099 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"a4206a36eef93f49… 6103 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"7f9998393198a02c… 6107 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"a4206a36eef93f49… 6111 …7890abcdef1234567890abcdef1234567890abcdef1234567890abcdef":"test tls_prf label":"7f9998393198a02c…
|
/mbedtls-development/include/psa/ |
A D | crypto_struct.h | 232 uint8_t *MBEDTLS_PRIVATE(label);
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 597 …for individual keys. The representation of a key is an identifier such as label or slot number. Th… 651 … element and the driver only needs to store a label for the key, use `"base_size"` as the size of … 692 …ains an internal identifier for the key. This may be, for example, a unique label or a slot number.
|
/mbedtls-development/docs/architecture/testing/ |
A D | invasive-testing.md | 288 …rogram must clean up after itself. Use the cleanup code (after the `exit` label in test functions)…
|
/mbedtls-development/doxygen/ |
A D | mbedtls.doxyfile | 543 # documentation sections, marked by \if section-label ... \endif 544 # and \cond section-label ... \endcond blocks.
|