Home | History | Annotate | Download | only in runner

Lines Matching full:hash

13 	"hash"
24 func pHash(result, secret, seed []byte, hash func() hash.Hash) {
25 h := hmac.New(hash, secret)
68 func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
133 return prf12(suite.hash().New)
192 ret.hash = cipherSuite.hash()
194 ret.client = ret.hash.New()
195 ret.server = ret.hash.New()
198 ret.prf = prf12(ret.hash.New)
200 ret.secret = make([]byte, ret.hash.Size())
203 ret.hash = crypto.MD5SHA1
219 // A finishedHash calculates the hash of a set of handshake messages suitable
222 hash crypto.Hash
224 client hash.Hash
225 server hash.Hash
227 // Prior to TLS 1.2, an additional MD5 hash is required.
228 clientMD5 hash.Hash
229 serverMD5 hash.Hash
246 data.addU24(h.hash.Size())
248 h.client = h.hash.New()
249 h.server = h.hash.New()
286 func finishedSum30(md5, sha1 hash.Hash, masterSecret []byte, magic []byte) []byte {
331 clientFinishedKey := hkdfExpandLabel(h.hash, baseKey, finishedLabel, nil, h.hash.Size())
332 finishedHMAC := hmac.New(h.hash.New, clientFinishedKey)
350 serverFinishedKey := hkdfExpandLabel(h.hash, baseKey, finishedLabel, nil, h.hash.Size())
351 finishedHMAC := hmac.New(h.hash.New, serverFinishedKey)
356 // hashForClientCertificateSSL3 returns the hash to be signed for client
366 // hashForChannelID returns the hash to be signed for TLS Channel
368 // hash. Otherwise, it is nil.
370 hash := sha256.New()
371 hash.Write(channelIDLabel)
373 hash.Write(channelIDResumeLabel)
374 hash.Write(resumeHash)
376 hash.Write(h.Sum())
377 return hash.Sum(nil)
390 return make([]byte, h.hash.Size())
395 h.secret = hkdfExtract(h.hash.New, h.secret, ikm)
399 h.secret = hkdfExpandLabel(h.hash, h.secret, []byte("derived"), h.hash.New().Sum(nil), h.hash.Size())
404 func hkdfExpandLabel(hash crypto.Hash, secret, label, hashValue []byte, length int) []byte {
422 return hkdfExpand(hash.New, secret, hkdfLabel, length)
425 // appendContextHashes returns the concatenation of the handshake hash and the
426 // resumption context hash, as used in TLS 1.3.
452 return hkdfExpandLabel(h.hash, h.secret, label, h.appendContextHashes(nil), h.hash.Size())
466 b := make([]byte, paddingLen, paddingLen+len(context)+1+2*h.hash.Size())
491 key := hkdfExpandLabel(suite.hash(), secret, keyTLS13, nil, suite.keyLen)
492 iv := hkdfExpandLabel(suite.hash(), secret, ivTLS13, nil, suite.ivLen(version))
497 func updateTrafficSecret(hash crypto.Hash, version uint16, secret []byte) []byte {
498 return hkdfExpandLabel(hash, secret, applicationTrafficLabel, nil, hash.Size())
515 hash := suite.hash()
516 return hkdfExpandLabel(hash, masterSecret, resumptionPSKLabel, nonce, hash.Size())