Searched refs:derive_array (Results 1 – 8 of 8) sorted by relevance
43 server3.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>(), in full_integration_state_machine()44 client2.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>() in full_integration_state_machine()50 .derive_array::<32>(), in full_integration_state_machine()54 .derive_array::<32>() in full_integration_state_machine()79 server3.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>(), in full_integration_state_machine_public_key_in_protobuf()80 client2.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>() in full_integration_state_machine_public_key_in_protobuf()86 .derive_array::<32>(), in full_integration_state_machine_public_key_in_protobuf()90 .derive_array::<32>() in full_integration_state_machine_public_key_in_protobuf()115 server3.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>(), in full_integration_state_machine_multiple_next_protocols_sort()116 client2.completed_handshake().auth_string::<CryptoProviderImpl>().derive_array::<32>() in full_integration_state_machine_multiple_next_protocols_sort()[all …]
104 &self.hkdf.derive_array(b"V0 LDT key").expect("LDT key is a valid length"), in v0_ldt_key()116 self.hkdf.derive_array(b"V0 Metadata nonce").expect("Nonce is a valid length") in v0_metadata_nonce()124 self.hkdf.derive_array(b"V1 Metadata nonce").expect("Nonce is a valid length") in v1_metadata_nonce()269 pub fn derive_array<const N: usize>(&self, info: &[u8]) -> Option<[u8; N]> { in derive_array() method277 self.derive_array(info).expect("HMAC-SHA256 keys are a valid length").into() in derive_hmac_sha256_key()282 self.derive_array(info).expect("AES128 keys are a valid length").into() in derive_aes128_key()
157 let key_seed: [u8; 32] = test_vector_seed_hkdf.derive_array("key seed"); in gen_test_vectors()158 let v0_adv_salt: [u8; 2] = test_vector_seed_hkdf.derive_array("legacy adv salt"); in gen_test_vectors()159 let v0_identity_token: [u8; 14] = test_vector_seed_hkdf.derive_array("v0 identity token"); in gen_test_vectors()161 test_vector_seed_hkdf.derive_array("v1 section extended salt"); in gen_test_vectors()163 test_vector_seed_hkdf.derive_array("v1 mic section short salt"); in gen_test_vectors()
152 V1IdentityToken::from(test_vector_seed_hkdf.derive_array("identity token")); in gen_mic_encrypted_test_vectors()153 let key_seed = test_vector_seed_hkdf.derive_array("key seed"); in gen_mic_encrypted_test_vectors()167 v1_salt::ExtendedV1Salt::from(test_vector_seed_hkdf.derive_array::<16>("salt")); in gen_mic_encrypted_test_vectors()
68 pub fn derive_array<const N: usize>(&self, description: &str) -> [u8; N] { in derive_array() method88 let num = u64::from_be_bytes(self.derive_array(description)); in derive_range_element()
105 let key_seed: [u8; 32] = test_vector_seed_hkdf.derive_array("key seed"); in gen_test_vectors()114 let salt = V0Salt::from(test_vector_seed_hkdf.derive_array("salt")); in gen_test_vectors()
196 handshake.next_protocol_secret::<C>().derive_array::<AES_256_KEY_SIZE>().unwrap(); in from_initiator_handshake()212 handshake.next_protocol_secret::<C>().derive_array::<AES_256_KEY_SIZE>().unwrap(); in from_responder_handshake()
658 pub fn derive_array<const N: usize>(&self) -> Option<[u8; N]> { in derive_array() method