Lines Matching refs:secret
28 * Given a |secret|; a |label| of length |labellen|; and |data| of length
30 * secret |outlen| bytes long and store it in the location pointed to be |out|.
34 int tls13_hkdf_expand(SSL *s, const EVP_MD *md, const unsigned char *secret,
81 (unsigned char *)secret, hashlen);
107 * Given a |secret| generate a |key| of length |keylen| bytes. Returns 1 on
110 int tls13_derive_key(SSL *s, const EVP_MD *md, const unsigned char *secret,
119 return tls13_hkdf_expand(s, md, secret, keylabel, sizeof(keylabel) - 1,
124 * Given a |secret| generate an |iv| of length |ivlen| bytes. Returns 1 on
127 int tls13_derive_iv(SSL *s, const EVP_MD *md, const unsigned char *secret,
136 return tls13_hkdf_expand(s, md, secret, ivlabel, sizeof(ivlabel) - 1,
141 const unsigned char *secret,
150 return tls13_hkdf_expand(s, md, secret, finishedlabel,
155 * Given the previous secret |prevsecret| and a new input secret |insecret| of
156 * length |insecretlen|, generate a new secret and store it in the location
224 * Given an input secret |insecret| of length |insecretlen| generate the
225 * handshake secret. This requires the early secret to already have been
238 * Given the handshake secret |prev| of length |prevlen| generate the master
239 * secret and store its length in |*secret_size|. Returns 1 on success 0 on
338 size_t labellen, unsigned char *secret,
354 secret, hashlen, 1)) {
385 if (!tls13_derive_key(s, md, secret, key, keylen)
386 || !tls13_derive_iv(s, md, secret, iv, ivlen)) {
426 unsigned char secret[EVP_MAX_MD_SIZE];
573 * traffic secret is the same as the hash for the server
574 * write/client read handshake traffic secret. However, if we
623 * client application traffic secret
633 * We also create the resumption master secret, but this time use the
651 insecret, hash, label, labellen, secret, key,
658 memcpy(s->server_app_traffic_secret, secret, hashlen);
659 /* Now we create the exporter master secret */
675 memcpy(s->client_app_traffic_secret, secret, hashlen);
677 if (!ssl_log_secret(s, log_label, secret, hashlen)) {
683 && !tls13_derive_finishedkey(s, ssl_handshake_md(s), secret,
742 OPENSSL_cleanse(secret, sizeof(secret));
757 unsigned char secret[EVP_MAX_MD_SIZE];
787 sizeof(application_traffic) - 1, secret, key,
793 memcpy(insecret, secret, hashlen);
795 /* Call Key log on successful traffic secret update */
797 if (!ssl_log_secret(s, log_label, secret, hashlen)) {
806 OPENSSL_cleanse(secret, sizeof(secret));