• Home
  • Raw
  • Download

Lines Matching refs:digest

80 static bool hkdf_expand_label(Span<uint8_t> out, const EVP_MD *digest,  in hkdf_expand_label()  argument
103 return HKDF_expand(out.data(), out.size(), digest, secret.data(), in hkdf_expand_label()
152 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_set_traffic_key() local
158 if (!hkdf_expand_label(key, digest, traffic_secret, label_to_span("key"), in tls13_set_traffic_key()
167 if (!hkdf_expand_label(iv, digest, traffic_secret, label_to_span("iv"), in tls13_set_traffic_key()
340 const EVP_MD *digest = ssl_session_get_digest(SSL_get_session(ssl)); in tls13_rotate_traffic_key() local
341 return hkdf_expand_label(secret, digest, secret, in tls13_rotate_traffic_key()
367 const EVP_MD *digest, uint16_t version, in tls13_verify_data() argument
371 auto key = MakeSpan(key_buf, EVP_MD_size(digest)); in tls13_verify_data()
373 if (!hkdf_expand_label(key, digest, secret, in tls13_verify_data()
375 HMAC(digest, key.data(), key.size(), context.data(), context.size(), out, in tls13_verify_data()
402 const EVP_MD *digest = ssl_session_get_digest(session); in tls13_derive_session_psk() local
406 return hkdf_expand_label(session_key, digest, session_key, in tls13_derive_session_psk()
422 const EVP_MD *digest = ssl_session_get_digest(SSL_get_session(ssl)); in tls13_export_keying_material() local
428 if (!EVP_Digest(context.data(), context.size(), hash_buf, &hash_len, digest, in tls13_export_keying_material()
430 !EVP_Digest(nullptr, 0, export_context_buf, &export_context_len, digest, in tls13_export_keying_material()
438 auto derived_secret = MakeSpan(derived_secret_buf, EVP_MD_size(digest)); in tls13_export_keying_material()
439 return hkdf_expand_label(derived_secret, digest, secret, label, in tls13_export_keying_material()
441 hkdf_expand_label(out, digest, derived_secret, in tls13_export_keying_material()
448 const EVP_MD *digest, Span<const uint8_t> psk, in tls13_psk_binder() argument
452 if (!EVP_Digest(NULL, 0, binder_context, &binder_context_len, digest, NULL)) { in tls13_psk_binder()
458 if (!HKDF_extract(early_secret, &early_secret_len, digest, psk.data(), in tls13_psk_binder()
464 auto binder_key = MakeSpan(binder_key_buf, EVP_MD_size(digest)); in tls13_psk_binder()
465 if (!hkdf_expand_label(binder_key, digest, in tls13_psk_binder()
469 !tls13_verify_data(out, out_len, digest, version, binder_key, context)) { in tls13_psk_binder()
473 assert(*out_len == EVP_MD_size(digest)); in tls13_psk_binder()
478 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, const EVP_MD *digest, in hash_transcript_and_truncated_client_hello() argument
488 if (!hs->transcript.CopyToHashContext(ctx.get(), digest) || in hash_transcript_and_truncated_client_hello()
500 const EVP_MD *digest = ssl_session_get_digest(ssl->session.get()); in tls13_write_psk_binder() local
501 size_t hash_len = EVP_MD_size(digest); in tls13_write_psk_binder()
509 hs, context, &context_len, digest, msg, in tls13_write_psk_binder()
512 ssl->session->ssl_version, digest, in tls13_write_psk_binder()