Lines Matching refs:secret
5497 if (operation->ctx.tls12_prf.secret != NULL) {
5498 mbedtls_zeroize_and_free(operation->ctx.tls12_prf.secret,
5692 * PRF(secret, label, seed) = P_<hash>(secret, label + seed)
5694 * P_hash(secret, seed) = HMAC_hash(secret, A(1) + seed) +
5695 * HMAC_hash(secret, A(2) + seed) +
5696 * HMAC_hash(secret, A(3) + seed) + ...
5699 * A(i) = HMAC_hash(secret, A(i-1))
5702 * `HMAC_hash(secret, A(i) + seed)` from which the output
5709 tls12_prf->secret,
5717 /* A(1) = HMAC_hash(secret, A(0)), where A(0) = seed. (The RFC overloads
5733 /* A(i) = HMAC_hash(secret, A(i-1)) */
5750 /* Calculate HMAC_hash(secret, A(i) + label + seed). */
5753 tls12_prf->secret,
6885 prf->secret = mbedtls_calloc(1, data_length);
6886 if (prf->secret == NULL) {
6890 memcpy(prf->secret, data, data_length);
6965 * The premaster secret is formed as follows: if the PSK is N octets
6970 * In a DHE-PSK, RSA-PSK, ECDHE-PSK the premaster secret is formed as
6971 * follows: concatenate a uint16 with the length of the other secret,
6972 * the other secret itself, uint16 with the length of PSK, and the
7247 * Non-secret inputs must have the type #PSA_KEY_TYPE_RAW_DATA.
7248 * Both secret and non-secret inputs can alternatively have the type
7541 /* Step 1: run the secret agreement algorithm to generate the shared
7542 * secret. */
7554 * the shared secret. A shared secret is permitted wherever a key