Home
last modified time | relevance | path

Searched refs:cipher_suite_provider (Results 1 – 25 of 54) sorted by relevance

123

/external/rust/android-crates-io/crates/mls-rs/src/group/
Dconfirmation_tag.rs44 cipher_suite_provider: &P, in create()
46 cipher_suite_provider in create()
58 cipher_suite_provider: &P, in matches()
63 cipher_suite_provider, in matches()
74 pub(crate) async fn empty<P: CipherSuiteProvider>(cipher_suite_provider: &P) -> Self { in empty()
76 cipher_suite_provider in empty()
78 &alloc::vec![0; cipher_suite_provider.kdf_extract_size()], in empty()
98 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_confirmation_tag_matching() localVariable
111 &cipher_suite_provider, in test_confirmation_tag_matching()
120 &cipher_suite_provider, in test_confirmation_tag_matching()
[all …]
Dmessage_verifier.rs38 cipher_suite_provider: &P, in verify_plaintext_authentication()
57 .get_membership_tag(&auth_content, context, cipher_suite_provider) in verify_plaintext_authentication()
77 cipher_suite_provider, in verify_plaintext_authentication()
102 cipher_suite_provider: &P, in verify_auth_content_signature()
122 .verify(cipher_suite_provider, &sender_public_key, &context) in verify_auth_content_signature()
328 &env.bob.group.cipher_suite_provider, in valid_plaintext_is_verified()
344 &env.bob.group.cipher_suite_provider, in valid_auth_content_is_verified()
375 &env.bob.group.cipher_suite_provider, in invalid_plaintext_is_not_verified()
392 &env.bob.group.cipher_suite_provider, in plaintext_from_member_requires_membership_tag()
409 &env.bob.group.cipher_suite_provider, in plaintext_fails_with_invalid_membership_tag()
[all …]
Dkey_schedule.rs110 cipher_suite_provider: &P, in from_key_schedule()
112 let joiner_seed = cipher_suite_provider in from_key_schedule()
118 cipher_suite_provider, in from_key_schedule()
128 cipher_suite_provider, in from_key_schedule()
147 cipher_suite_provider: &P, in from_joiner()
155 get_pre_epoch_secret(cipher_suite_provider, psk_secret, joiner_secret).await?; in from_joiner()
159 kdf_expand_with_label(cipher_suite_provider, &epoch_seed, b"epoch", &context, None) in from_joiner()
163 cipher_suite_provider, in from_joiner()
173 cipher_suite_provider: &P, in from_random_epoch_secret()
177 let epoch_secret = cipher_suite_provider in from_random_epoch_secret()
[all …]
Dproposal_cache.rs256 cipher_suite_provider: &CSP, in apply_resolved()
297 cipher_suite_provider, in apply_resolved()
427 cipher_suite_provider: CSP, field
440 cipher_suite_provider: CSP, in new()
454 cipher_suite_provider, in new()
480 cipher_suite_provider: self.cipher_suite_provider, in with_identity_provider()
497 cipher_suite_provider: self.cipher_suite_provider, in with_user_rules()
514 cipher_suite_provider: self.cipher_suite_provider, in with_psk_storage()
547 &self.cipher_suite_provider, in receive()
574 cipher_suite_provider: &CSP, in resolve_for_commit_default()
[all …]
Dproposal_ref.rs32 cipher_suite_provider: &CS, in from_content()
38 HashReference::compute(bytes, b"MLS 1.0 Proposal Reference", cipher_suite_provider) in from_content()
153 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in generate_proposal_test_cases() localVariable
158 output: ProposalRef::from_content(&cipher_suite_provider, &add) in generate_proposal_test_cases()
167 output: ProposalRef::from_content(&cipher_suite_provider, &update) in generate_proposal_test_cases()
176 output: ProposalRef::from_content(&cipher_suite_provider, &remove) in generate_proposal_test_cases()
185 output: ProposalRef::from_content(&cipher_suite_provider, &group_context_ext) in generate_proposal_test_cases()
Dciphertext_processor.rs50 cipher_suite_provider: CP, field
60 cipher_suite_provider: CP, in new()
64 cipher_suite_provider, in new()
78 .next_message_key(&self.cipher_suite_provider, self_index, key_type) in next_encryption_key()
94 .message_key_generation(&self.cipher_suite_provider, sender, key_type, generation) in decryption_key()
126 let reuse_guard = ReuseGuard::random(&self.cipher_suite_provider) in seal()
151 &self.cipher_suite_provider, in seal()
178 &self.cipher_suite_provider, in seal()
210 &self.cipher_suite_provider, in open()
237 &self.cipher_suite_provider, in open()
Dsecret_tree.rs131 cipher_suite_provider: &P, in message_key_generation()
138 .get_message_key(cipher_suite_provider, generation) in message_key_generation()
143 .get_message_key(cipher_suite_provider, generation) in message_key_generation()
178 cipher_suite_provider: &P, in consume_node()
188 kdf_expand_with_label(cipher_suite_provider, &secret, b"tree", b"left", None) in consume_node()
192 kdf_expand_with_label(cipher_suite_provider, &secret, b"tree", b"right", None) in consume_node()
389 cipher_suite_provider: &P, in new()
398 let secret = kdf_expand_with_label(cipher_suite_provider, secret, label, &[], None) in new()
413 cipher_suite_provider: &P, in get_message_key()
438 self.next_message_key(cipher_suite_provider)?; in get_message_key()
[all …]
Dmod.rs261 cipher_suite_provider: <C::CryptoProvider as CryptoProvider>::CipherSuiteProvider, field
293 let cipher_suite_provider = cipher_suite_provider(config.crypto_provider(), cipher_suite)?; in new() localVariable
296 &cipher_suite_provider, in new()
307 &cipher_suite_provider, in new()
324 let tree_hash = public_tree.tree_hash(&cipher_suite_provider).await?; in new()
327 cipher_suite_provider in new()
328 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in new()
349 &cipher_suite_provider, in new()
358 &cipher_suite_provider, in new()
363 &cipher_suite_provider, in new()
[all …]
Dutil.rs139 cipher_suite_provider: &P, in transcript_hashes()
144 cipher_suite_provider, in transcript_hashes()
157 cipher_suite_provider, in transcript_hashes()
192 pub(crate) fn cipher_suite_provider<P>( in cipher_suite_provider() function
200 .cipher_suite_provider(cipher_suite) in cipher_suite_provider()
/external/rust/android-crates-io/crates/mls-rs/src/tree_kem/
Dtree_validator.rs35 cipher_suite_provider: &'a CSP, field
40 cipher_suite_provider: &'a CSP, in new()
47 cipher_suite_provider, in new()
52 cipher_suite_provider, in new()
60 tree.validate_parent_hashes(self.cipher_suite_provider) in validate()
80 let tree_hash = tree.tree_hash(self.cipher_suite_provider).await?; in validate_tree_hash()
196 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in get_valid_tree() localVariable
208 &cipher_suite_provider, in get_valid_tree()
223 &cipher_suite_provider, in get_valid_tree()
236 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_valid_tree() localVariable
[all …]
Dleaf_node_validator.rs46 cipher_suite_provider: &'a CP, field
53 cipher_suite_provider: &'a CP, in new()
58 cipher_suite_provider, in new()
193 self.cipher_suite_provider, in check_if_valid()
270 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_basic_add_validation() localVariable
275 LeafNodeValidator::new(&cipher_suite_provider, &BasicIdentityProvider, None); in test_basic_add_validation()
286 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_failed_validation() localVariable
290 LeafNodeValidator::new(&cipher_suite_provider, &FailureIdentityProvider, None); in test_failed_validation()
301 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_basic_update_validation() localVariable
308 &cipher_suite_provider, in test_basic_update_validation()
[all …]
Dmod.rs223 cipher_suite_provider: &CP, in add_leaves()
235 self.update_hashes(&added, cipher_suite_provider).await?; in add_leaves()
269 cipher_suite_provider: &CP, in apply_update_path()
315 self.update_parent_hashes(sender, true, cipher_suite_provider) in apply_update_path()
339 cipher_suite_provider: &CP, in batch_edit()
511 self.update_hashes(&updated_leaves, cipher_suite_provider) in batch_edit()
524 cipher_suite_provider: &CP, in batch_edit_lite()
572 self.update_hashes(&updated_leaves, cipher_suite_provider) in batch_edit_lite()
633 cipher_suite_provider: &CP, in update_leaf()
649 cipher_suite_provider, in update_leaf()
[all …]
Dpath_secret.rs58 cipher_suite_provider: &P, in random()
60 cipher_suite_provider in random()
61 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in random()
66 pub fn empty<P: CipherSuiteProvider>(cipher_suite_provider: &P) -> Self { in empty()
68 PathSecret::from(vec![0u8; cipher_suite_provider.kdf_extract_size()]) in empty()
100 cipher_suite_provider: &'a P, field
106 pub fn new(cipher_suite_provider: &'a P) -> Self { in new()
108 cipher_suite_provider, in new()
114 pub fn starting_with(cipher_suite_provider: &'a P, secret: PathSecret) -> Self { in starting_with()
117 ..Self::new(cipher_suite_provider) in starting_with()
[all …]
Dkem.rs69 cipher_suite_provider: &P, in encap()
81 let mut secret_generator = PathSecretGenerator::new(cipher_suite_provider); in encap()
89 secret.to_hpke_key_pair(cipher_suite_provider).await?; in encap()
104 .update_parent_hashes(self_index, false, cipher_suite_provider) in encap()
113 cipher_suite_provider, in encap()
128 .sign(cipher_suite_provider, &signer, context) in encap()
138 .update_hashes(&[self_index], cipher_suite_provider) in encap()
143 .tree_hash(cipher_suite_provider) in encap()
153 cipher_suite_provider, in encap()
250 cipher_suite_provider: &CP, in decap()
[all …]
Dtree_utils.rs91 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_fully_populated_tree() localVariable
97 tree.add_leaves(key_packages, &BasicIdentityProvider, &cipher_suite_provider) in print_fully_populated_tree()
116 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_tree_blank_leaves() localVariable
123 .add_leaves(key_packages, &BasicIdentityProvider, &cipher_suite_provider) in print_tree_blank_leaves()
130 &cipher_suite_provider, in print_tree_blank_leaves()
150 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in print_tree_unmerged_leaves_on_parent() localVariable
159 &cipher_suite_provider, in print_tree_unmerged_leaves_on_parent()
174 &cipher_suite_provider, in print_tree_unmerged_leaves_on_parent()
Dparent_hash.rs71 cipher_suite_provider: &P, in new()
84 let hash = cipher_suite_provider in new()
118 cipher_suite_provider: &P, in parent_hash_for_leaf()
131 cipher_suite_provider, in parent_hash_for_leaf()
151 cipher_suite_provider: &P, in update_parent_hashes()
154 self.update_hashes(&[index], cipher_suite_provider).await?; in update_parent_hashes()
157 .parent_hash_for_leaf(cipher_suite_provider, index) in update_parent_hashes()
177 self.update_hashes(&[index], cipher_suite_provider).await in update_parent_hashes()
183 cipher_suite_provider: &P, in validate_parent_hashes()
185 let original_hashes = self.compute_original_hashes(cipher_suite_provider).await?; in validate_parent_hashes()
[all …]
Dupdate_path.rs45 cipher_suite_provider: &CSP, in validate_update_path()
54 cipher_suite_provider, in validate_update_path()
191 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_valid_leaf_node() localVariable
196 &cipher_suite_provider, in test_valid_leaf_node()
213 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_key_package() localVariable
219 &cipher_suite_provider, in test_invalid_key_package()
232 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in validating_path_fails_with_different_identity() localVariable
238 &cipher_suite_provider, in validating_path_fails_with_different_identity()
251 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in validating_path_fails_with_same_hpke_key() localVariable
264 &cipher_suite_provider, in validating_path_fails_with_same_hpke_key()
Dtree_hash.rs81 cipher_suite_provider: &P, in tree_hash()
83 self.initialize_hashes(cipher_suite_provider).await?; in tree_hash()
94 cipher_suite_provider: &P, in update_hashes()
116 cipher_suite_provider, in update_hashes()
125 async fn initialize_hashes<P>(&mut self, cipher_suite_provider: &P) -> Result<(), MlsError> in initialize_hashes()
138 cipher_suite_provider, in initialize_hashes()
271 cipher_suite_provider: &P, in tree_hash()
286 hashes[2 * **l as usize] = TreeHash(hash_for_leaf(*l, leaf, cipher_suite_provider).await?); in tree_hash()
297 cipher_suite_provider, in tree_hash()
319 cipher_suite_provider: &P, in hash_for_leaf()
[all …]
Dleaf_node.rs64 cipher_suite_provider: &CSP, in generate()
73 let (secret_key, public_key) = cipher_suite_provider in generate()
87 leaf_node.grease(cipher_suite_provider)?; in generate()
91 cipher_suite_provider, in generate()
103 cipher_suite_provider: &P, in update()
110 let (secret, public) = cipher_suite_provider in update()
120 self.grease(cipher_suite_provider)?; in update()
127 cipher_suite_provider, in update()
140 cipher_suite_provider: &P, in commit()
147 let (secret, public) = cipher_suite_provider in commit()
[all …]
Dprivate.rs44 cipher_suite_provider: &P, in update_secrets()
60 PathSecretGenerator::starting_with(cipher_suite_provider, path_secret); in update_secrets()
80 let (secret_key, public_key) = secret.to_hpke_key_pair(cipher_suite_provider).await?; in update_secrets()
162 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in update_secrets_setup() localVariable
187 &cipher_suite_provider, in update_secrets_setup()
203 &cipher_suite_provider, in update_secrets_setup()
/external/rust/android-crates-io/crates/mls-rs/src/key_package/
Dgenerator.rs32 pub cipher_suite_provider: &'a CP, field
83 .sign(self.cipher_suite_provider, self.signing_key, &()) in sign()
96 .cipher_suite_provider in generate()
107 self.cipher_suite_provider, in generate()
117 cipher_suite: self.cipher_suite_provider.cipher_suite(), in generate()
124 package.grease(self.cipher_suite_provider)?; in generate()
128 let reference = package.to_reference(self.cipher_suite_provider).await?; in generate()
185 let cipher_suite_provider = test_cipher_suite_provider(cipher_suite); in test_key_generation() localVariable
196 cipher_suite_provider: &cipher_suite_provider, in test_key_generation()
245 let sealed = cipher_suite_provider in test_key_generation()
[all …]
/external/rust/android-crates-io/crates/mls-rs/src/
Dsigner.rs257 let Some(cipher_suite_provider) = try_test_cipher_suite_provider(one_case.cipher_suite) in test_signatures()
276 .sign(&cipher_suite_provider, &signature_key, &one_case.context) in test_signatures()
281 .verify(&cipher_suite_provider, &public_key, &one_case.context) in test_signatures()
293 .verify(&cipher_suite_provider, &public_key, &one_case.context) in test_signatures()
301 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_signature() localVariable
303 let (correct_secret, _) = cipher_suite_provider in test_invalid_signature()
307 let (_, incorrect_public) = cipher_suite_provider in test_invalid_signature()
318 .sign(&cipher_suite_provider, &correct_secret, &vec![]) in test_invalid_signature()
323 .verify(&cipher_suite_provider, &incorrect_public, &vec![]) in test_invalid_signature()
331 let cipher_suite_provider = test_cipher_suite_provider(TEST_CIPHER_SUITE); in test_invalid_context() localVariable
[all …]
Dpsk.rs99 cipher_suite_provider: &P, in random()
101 Ok(Self(cipher_suite_provider.random_bytes_vec( in random()
102 cipher_suite_provider.kdf_extract_size(), in random()
163 cipher_suite_provider: &P, in make_external_psk_id()
166 cipher_suite_provider in make_external_psk_id()
167 .random_bytes_vec(cipher_suite_provider.kdf_extract_size()) in make_external_psk_id()
/external/rust/android-crates-io/crates/mls-rs/src/group/ciphertext_processor/
Dsender_data_key.rs51 cipher_suite_provider: &'a CP, field
59 .field("cipher_suite_provider", self.cipher_suite_provider) in fmt()
69 cipher_suite_provider: &'a CP, in new()
73 let extract_size = cipher_suite_provider.kdf_extract_size(); in new()
79 cipher_suite_provider, in new()
83 Some(cipher_suite_provider.aead_key_size()), in new()
88 cipher_suite_provider, in new()
92 Some(cipher_suite_provider.aead_nonce_size()), in new()
99 cipher_suite_provider, in new()
109 self.cipher_suite_provider in seal()
[all …]
/external/rust/android-crates-io/crates/mls-rs/src/psk/
Dsecret.rs69 cipher_suite_provider: &P, in calculate()
72 let mut psk_secret = PskSecret::new(cipher_suite_provider); in calculate()
83 let psk_extracted = cipher_suite_provider in calculate()
85 &vec![0; cipher_suite_provider.kdf_extract_size()], in calculate()
92 cipher_suite_provider, in calculate()
100 psk_secret = cipher_suite_provider in calculate()

123