/external/rust/android-crates-io/crates/mls-rs/src/group/ |
D | confirmation_tag.rs | 44 cipher_suite_provider: &P, in create() 46 cipher_suite_provider in create() 58 cipher_suite_provider: &P, in matches() 63 cipher_suite_provider, in matches() 74 pub(crate) async fn empty<P: CipherSuiteProvider>(cipher_suite_provider: &P) -> Self { in empty() 76 cipher_suite_provider in empty() 78 &alloc::vec![0; cipher_suite_provider.kdf_extract_size()], in empty() 98 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_confirmation_tag_matching() localVariable 111 &cipher_suite_provider, in test_confirmation_tag_matching() 120 &cipher_suite_provider, in test_confirmation_tag_matching() [all …]
|
D | message_verifier.rs | 38 cipher_suite_provider: &P, in verify_plaintext_authentication() 57 .get_membership_tag(&auth_content, context, cipher_suite_provider) in verify_plaintext_authentication() 77 cipher_suite_provider, in verify_plaintext_authentication() 102 cipher_suite_provider: &P, in verify_auth_content_signature() 122 .verify(cipher_suite_provider, &sender_public_key, &context) in verify_auth_content_signature() 328 &env.bob.group.cipher_suite_provider, in valid_plaintext_is_verified() 344 &env.bob.group.cipher_suite_provider, in valid_auth_content_is_verified() 375 &env.bob.group.cipher_suite_provider, in invalid_plaintext_is_not_verified() 392 &env.bob.group.cipher_suite_provider, in plaintext_from_member_requires_membership_tag() 409 &env.bob.group.cipher_suite_provider, in plaintext_fails_with_invalid_membership_tag() [all …]
|
D | key_schedule.rs | 110 cipher_suite_provider: &P, in from_key_schedule() 112 let joiner_seed = cipher_suite_provider in from_key_schedule() 118 cipher_suite_provider, in from_key_schedule() 128 cipher_suite_provider, in from_key_schedule() 147 cipher_suite_provider: &P, in from_joiner() 155 get_pre_epoch_secret(cipher_suite_provider, psk_secret, joiner_secret).await?; in from_joiner() 159 kdf_expand_with_label(cipher_suite_provider, &epoch_seed, b"epoch", &context, None) in from_joiner() 163 cipher_suite_provider, in from_joiner() 173 cipher_suite_provider: &P, in from_random_epoch_secret() 177 let epoch_secret = cipher_suite_provider in from_random_epoch_secret() [all …]
|
D | proposal_cache.rs | 256 cipher_suite_provider: &CSP, in apply_resolved() 297 cipher_suite_provider, in apply_resolved() 427 cipher_suite_provider: CSP, field 440 cipher_suite_provider: CSP, in new() 454 cipher_suite_provider, in new() 480 cipher_suite_provider: self.cipher_suite_provider, in with_identity_provider() 497 cipher_suite_provider: self.cipher_suite_provider, in with_user_rules() 514 cipher_suite_provider: self.cipher_suite_provider, in with_psk_storage() 547 &self.cipher_suite_provider, in receive() 574 cipher_suite_provider: &CSP, in resolve_for_commit_default() [all …]
|
D | proposal_ref.rs | 32 cipher_suite_provider: &CS, in from_content() 38 HashReference::compute(bytes, b"MLS 1.0 Proposal Reference", cipher_suite_provider) in from_content() 153 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in generate_proposal_test_cases() localVariable 158 output: ProposalRef::from_content(&cipher_suite_provider, &add) in generate_proposal_test_cases() 167 output: ProposalRef::from_content(&cipher_suite_provider, &update) in generate_proposal_test_cases() 176 output: ProposalRef::from_content(&cipher_suite_provider, &remove) in generate_proposal_test_cases() 185 output: ProposalRef::from_content(&cipher_suite_provider, &group_context_ext) in generate_proposal_test_cases()
|
D | ciphertext_processor.rs | 50 cipher_suite_provider: CP, field 60 cipher_suite_provider: CP, in new() 64 cipher_suite_provider, in new() 78 .next_message_key(&self.cipher_suite_provider, self_index, key_type) in next_encryption_key() 94 .message_key_generation(&self.cipher_suite_provider, sender, key_type, generation) in decryption_key() 126 let reuse_guard = ReuseGuard::random(&self.cipher_suite_provider) in seal() 151 &self.cipher_suite_provider, in seal() 178 &self.cipher_suite_provider, in seal() 210 &self.cipher_suite_provider, in open() 237 &self.cipher_suite_provider, in open()
|
D | secret_tree.rs | 131 cipher_suite_provider: &P, in message_key_generation() 138 .get_message_key(cipher_suite_provider, generation) in message_key_generation() 143 .get_message_key(cipher_suite_provider, generation) in message_key_generation() 178 cipher_suite_provider: &P, in consume_node() 188 kdf_expand_with_label(cipher_suite_provider, &secret, b"tree", b"left", None) in consume_node() 192 kdf_expand_with_label(cipher_suite_provider, &secret, b"tree", b"right", None) in consume_node() 389 cipher_suite_provider: &P, in new() 398 let secret = kdf_expand_with_label(cipher_suite_provider, secret, label, &[], None) in new() 413 cipher_suite_provider: &P, in get_message_key() 438 self.next_message_key(cipher_suite_provider)?; in get_message_key() [all …]
|
D | mod.rs | 261 cipher_suite_provider: <C::CryptoProvider as CryptoProvider>::CipherSuiteProvider, field 293 let cipher_suite_provider = cipher_suite_provider(config.crypto_provider(), cipher_suite)?; in new() localVariable 296 &cipher_suite_provider, in new() 307 &cipher_suite_provider, in new() 324 let tree_hash = public_tree.tree_hash(&cipher_suite_provider).await?; in new() 327 cipher_suite_provider in new() 328 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in new() 349 &cipher_suite_provider, in new() 358 &cipher_suite_provider, in new() 363 &cipher_suite_provider, in new() [all …]
|
D | util.rs | 139 cipher_suite_provider: &P, in transcript_hashes() 144 cipher_suite_provider, in transcript_hashes() 157 cipher_suite_provider, in transcript_hashes() 192 pub(crate) fn cipher_suite_provider<P>( in cipher_suite_provider() function 200 .cipher_suite_provider(cipher_suite) in cipher_suite_provider()
|
/external/rust/android-crates-io/crates/mls-rs/src/tree_kem/ |
D | tree_validator.rs | 35 cipher_suite_provider: &'a CSP, field 40 cipher_suite_provider: &'a CSP, in new() 47 cipher_suite_provider, in new() 52 cipher_suite_provider, in new() 60 tree.validate_parent_hashes(self.cipher_suite_provider) in validate() 80 let tree_hash = tree.tree_hash(self.cipher_suite_provider).await?; in validate_tree_hash() 196 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in get_valid_tree() localVariable 208 &cipher_suite_provider, in get_valid_tree() 223 &cipher_suite_provider, in get_valid_tree() 236 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_valid_tree() localVariable [all …]
|
D | leaf_node_validator.rs | 46 cipher_suite_provider: &'a CP, field 53 cipher_suite_provider: &'a CP, in new() 58 cipher_suite_provider, in new() 193 self.cipher_suite_provider, in check_if_valid() 270 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_basic_add_validation() localVariable 275 LeafNodeValidator::new(&cipher_suite_provider, &BasicIdentityProvider, None); in test_basic_add_validation() 286 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_failed_validation() localVariable 290 LeafNodeValidator::new(&cipher_suite_provider, &FailureIdentityProvider, None); in test_failed_validation() 301 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_basic_update_validation() localVariable 308 &cipher_suite_provider, in test_basic_update_validation() [all …]
|
D | mod.rs | 223 cipher_suite_provider: &CP, in add_leaves() 235 self.update_hashes(&added, cipher_suite_provider).await?; in add_leaves() 269 cipher_suite_provider: &CP, in apply_update_path() 315 self.update_parent_hashes(sender, true, cipher_suite_provider) in apply_update_path() 339 cipher_suite_provider: &CP, in batch_edit() 511 self.update_hashes(&updated_leaves, cipher_suite_provider) in batch_edit() 524 cipher_suite_provider: &CP, in batch_edit_lite() 572 self.update_hashes(&updated_leaves, cipher_suite_provider) in batch_edit_lite() 633 cipher_suite_provider: &CP, in update_leaf() 649 cipher_suite_provider, in update_leaf() [all …]
|
D | path_secret.rs | 58 cipher_suite_provider: &P, in random() 60 cipher_suite_provider in random() 61 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in random() 66 pub fn empty<P: CipherSuiteProvider>(cipher_suite_provider: &P) -> Self { in empty() 68 PathSecret::from(vec![0u8; cipher_suite_provider.kdf_extract_size()]) in empty() 100 cipher_suite_provider: &'a P, field 106 pub fn new(cipher_suite_provider: &'a P) -> Self { in new() 108 cipher_suite_provider, in new() 114 pub fn starting_with(cipher_suite_provider: &'a P, secret: PathSecret) -> Self { in starting_with() 117 ..Self::new(cipher_suite_provider) in starting_with() [all …]
|
D | kem.rs | 69 cipher_suite_provider: &P, in encap() 81 let mut secret_generator = PathSecretGenerator::new(cipher_suite_provider); in encap() 89 secret.to_hpke_key_pair(cipher_suite_provider).await?; in encap() 104 .update_parent_hashes(self_index, false, cipher_suite_provider) in encap() 113 cipher_suite_provider, in encap() 128 .sign(cipher_suite_provider, &signer, context) in encap() 138 .update_hashes(&[self_index], cipher_suite_provider) in encap() 143 .tree_hash(cipher_suite_provider) in encap() 153 cipher_suite_provider, in encap() 250 cipher_suite_provider: &CP, in decap() [all …]
|
D | tree_utils.rs | 91 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_fully_populated_tree() localVariable 97 tree.add_leaves(key_packages, &BasicIdentityProvider, &cipher_suite_provider) in print_fully_populated_tree() 116 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_tree_blank_leaves() localVariable 123 .add_leaves(key_packages, &BasicIdentityProvider, &cipher_suite_provider) in print_tree_blank_leaves() 130 &cipher_suite_provider, in print_tree_blank_leaves() 150 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_tree_unmerged_leaves_on_parent() localVariable 159 &cipher_suite_provider, in print_tree_unmerged_leaves_on_parent() 174 &cipher_suite_provider, in print_tree_unmerged_leaves_on_parent()
|
D | parent_hash.rs | 71 cipher_suite_provider: &P, in new() 84 let hash = cipher_suite_provider in new() 118 cipher_suite_provider: &P, in parent_hash_for_leaf() 131 cipher_suite_provider, in parent_hash_for_leaf() 151 cipher_suite_provider: &P, in update_parent_hashes() 154 self.update_hashes(&[index], cipher_suite_provider).await?; in update_parent_hashes() 157 .parent_hash_for_leaf(cipher_suite_provider, index) in update_parent_hashes() 177 self.update_hashes(&[index], cipher_suite_provider).await in update_parent_hashes() 183 cipher_suite_provider: &P, in validate_parent_hashes() 185 let original_hashes = self.compute_original_hashes(cipher_suite_provider).await?; in validate_parent_hashes() [all …]
|
D | update_path.rs | 45 cipher_suite_provider: &CSP, in validate_update_path() 54 cipher_suite_provider, in validate_update_path() 191 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_valid_leaf_node() localVariable 196 &cipher_suite_provider, in test_valid_leaf_node() 213 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_key_package() localVariable 219 &cipher_suite_provider, in test_invalid_key_package() 232 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in validating_path_fails_with_different_identity() localVariable 238 &cipher_suite_provider, in validating_path_fails_with_different_identity() 251 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in validating_path_fails_with_same_hpke_key() localVariable 264 &cipher_suite_provider, in validating_path_fails_with_same_hpke_key()
|
D | tree_hash.rs | 81 cipher_suite_provider: &P, in tree_hash() 83 self.initialize_hashes(cipher_suite_provider).await?; in tree_hash() 94 cipher_suite_provider: &P, in update_hashes() 116 cipher_suite_provider, in update_hashes() 125 async fn initialize_hashes<P>(&mut self, cipher_suite_provider: &P) -> Result<(), MlsError> in initialize_hashes() 138 cipher_suite_provider, in initialize_hashes() 271 cipher_suite_provider: &P, in tree_hash() 286 hashes[2 * **l as usize] = TreeHash(hash_for_leaf(*l, leaf, cipher_suite_provider).await?); in tree_hash() 297 cipher_suite_provider, in tree_hash() 319 cipher_suite_provider: &P, in hash_for_leaf() [all …]
|
D | leaf_node.rs | 64 cipher_suite_provider: &CSP, in generate() 73 let (secret_key, public_key) = cipher_suite_provider in generate() 87 leaf_node.grease(cipher_suite_provider)?; in generate() 91 cipher_suite_provider, in generate() 103 cipher_suite_provider: &P, in update() 110 let (secret, public) = cipher_suite_provider in update() 120 self.grease(cipher_suite_provider)?; in update() 127 cipher_suite_provider, in update() 140 cipher_suite_provider: &P, in commit() 147 let (secret, public) = cipher_suite_provider in commit() [all …]
|
D | private.rs | 44 cipher_suite_provider: &P, in update_secrets() 60 PathSecretGenerator::starting_with(cipher_suite_provider, path_secret); in update_secrets() 80 let (secret_key, public_key) = secret.to_hpke_key_pair(cipher_suite_provider).await?; in update_secrets() 162 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in update_secrets_setup() localVariable 187 &cipher_suite_provider, in update_secrets_setup() 203 &cipher_suite_provider, in update_secrets_setup()
|
/external/rust/android-crates-io/crates/mls-rs/src/key_package/ |
D | generator.rs | 32 pub cipher_suite_provider: &'a CP, field 83 .sign(self.cipher_suite_provider, self.signing_key, &()) in sign() 96 .cipher_suite_provider in generate() 107 self.cipher_suite_provider, in generate() 117 cipher_suite: self.cipher_suite_provider.cipher_suite(), in generate() 124 package.grease(self.cipher_suite_provider)?; in generate() 128 let reference = package.to_reference(self.cipher_suite_provider).await?; in generate() 185 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_key_generation() localVariable 196 cipher_suite_provider: &cipher_suite_provider, in test_key_generation() 245 let sealed = cipher_suite_provider in test_key_generation() [all …]
|
/external/rust/android-crates-io/crates/mls-rs/src/ |
D | signer.rs | 257 let Some(cipher_suite_provider) = try_test_cipher_suite_provider(one_case.cipher_suite) in test_signatures() 276 .sign(&cipher_suite_provider, &signature_key, &one_case.context) in test_signatures() 281 .verify(&cipher_suite_provider, &public_key, &one_case.context) in test_signatures() 293 .verify(&cipher_suite_provider, &public_key, &one_case.context) in test_signatures() 301 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_signature() localVariable 303 let (correct_secret, _) = cipher_suite_provider in test_invalid_signature() 307 let (_, incorrect_public) = cipher_suite_provider in test_invalid_signature() 318 .sign(&cipher_suite_provider, &correct_secret, &vec![]) in test_invalid_signature() 323 .verify(&cipher_suite_provider, &incorrect_public, &vec![]) in test_invalid_signature() 331 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_context() localVariable [all …]
|
D | psk.rs | 99 cipher_suite_provider: &P, in random() 101 Ok(Self(cipher_suite_provider.random_bytes_vec( in random() 102 cipher_suite_provider.kdf_extract_size(), in random() 163 cipher_suite_provider: &P, in make_external_psk_id() 166 cipher_suite_provider in make_external_psk_id() 167 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in make_external_psk_id()
|
/external/rust/android-crates-io/crates/mls-rs/src/group/ciphertext_processor/ |
D | sender_data_key.rs | 51 cipher_suite_provider: &'a CP, field 59 .field("cipher_suite_provider", self.cipher_suite_provider) in fmt() 69 cipher_suite_provider: &'a CP, in new() 73 let extract_size = cipher_suite_provider.kdf_extract_size(); in new() 79 cipher_suite_provider, in new() 83 Some(cipher_suite_provider.aead_key_size()), in new() 88 cipher_suite_provider, in new() 92 Some(cipher_suite_provider.aead_nonce_size()), in new() 99 cipher_suite_provider, in new() 109 self.cipher_suite_provider in seal() [all …]
|
/external/rust/android-crates-io/crates/mls-rs/src/psk/ |
D | secret.rs | 69 cipher_suite_provider: &P, in calculate() 72 let mut psk_secret = PskSecret::new(cipher_suite_provider); in calculate() 83 let psk_extracted = cipher_suite_provider in calculate() 85 &vec![0; cipher_suite_provider.kdf_extract_size()], in calculate() 92 cipher_suite_provider, in calculate() 100 psk_secret = cipher_suite_provider in calculate()
|