/mbedtls-3.5.0/tests/ |
D | Descriptions.txt | 14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/mbedtls-3.5.0/tests/scripts/ |
D | generate_tls13_compat_tests.py | 79 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, argument 85 if ciphersuite: 86 self.add_ciphersuites(ciphersuite) 463 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 467 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
|
/mbedtls-3.5.0/library/ |
D | ssl_tls13_client.c | 666 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument 669 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg() 698 ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 714 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 733 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk() 1274 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello() 1706 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello() 1919 ssl->session_negotiate->ciphersuite)) { in ssl_tls13_postprocess_server_hello() 1992 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_postprocess_server_hello() 2023 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr() [all …]
|
D | ssl_tls13_server.c | 437 if (cipher_suite != session->ciphersuite) { in ssl_tls13_select_ciphersuite_for_resumption() 636 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_pre_shared_key_ext() 1394 ssl->session_negotiate->ciphersuite = cipher_suite; in ssl_tls13_parse_client_hello() 2083 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body() 2088 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body() 2089 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body() 2732 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
|
D | ssl_tls13_keys.h | 529 int ciphersuite,
|
D | ssl_tls.c | 411 int ciphersuite, 1753 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session() 1759 session->ciphersuite)); in mbedtls_ssl_set_session() 2537 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 1); in ssl_tls13_session_save() 2597 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 1); in ssl_tls13_session_load() 3291 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl() 3300 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite() 4660 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load() 4671 ssl->session->ciphersuite, in ssl_context_load() 5698 const mbedtls_ssl_ciphersuite_t *ciphersuite, in mbedtls_ssl_check_cert_usage() argument [all …]
|
D | ssl_tls12_server.c | 1653 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello() 1743 ssl->session_negotiate->ciphersuite); in ssl_write_encrypt_then_mac_ext() 2135 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption() 2277 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_write_server_hello() 2282 … mbedtls_ssl_get_ciphersuite_name(ssl->session_negotiate->ciphersuite))); in ssl_write_server_hello() 2320 mbedtls_ssl_ciphersuite_from_id(ssl->session_negotiate->ciphersuite); in ssl_write_server_hello()
|
D | ssl_tls13_keys.c | 918 int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument 945 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform() 948 ciphersuite)); in mbedtls_ssl_tls13_populate_transform()
|
D | ssl_ciphersuites.c | 1873 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument 1878 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
|
D | ssl_tls12_client.c | 1371 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello() 1379 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello() 1408 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello() 1414 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello()
|
D | ssl_misc.h | 1670 const mbedtls_ssl_ciphersuite_t *ciphersuite,
|
/mbedtls-3.5.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 1448 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session() 1546 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session() 1942 TEST_EQUAL(server.ssl.session->ciphersuite, in mbedtls_test_ssl_perform_handshake()
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_ssl.function | 1952 void ssl_tls13_record_protection(int ciphersuite, 2003 ciphersuite, &keys, NULL) == 0); 2006 ciphersuite, &keys, NULL) == 0); 2149 TEST_ASSERT(original.ciphersuite == restored.ciphersuite); 2208 TEST_ASSERT(original.ciphersuite == restored.ciphersuite);
|
/mbedtls-3.5.0/ |
D | ChangeLog | 453 * Add accessor to obtain ciphersuite id from ssl context. 454 * Add accessors to get members from ciphersuite info. 553 mbedtls_pk_setup_opaque()) is provisioned, and a static ECDH ciphersuite 659 * Ensure that TLS 1.2 ciphersuite/certificate and key selection takes into 1137 using a CCM-8 ciphersuite than a CBC ciphersuite with truncated HMAC. 2460 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker 2619 * Add ecc extensions only if an ecc based ciphersuite is used. 2727 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously, 2822 * Fix a client-side bug in the validation of the server's ciphersuite choice 2823 which could potentially lead to the client accepting a ciphersuite it didn't [all …]
|
D | README.md | 244 - `tests/compat.sh` tests interoperability of every ciphersuite with other implementations.
|
/mbedtls-3.5.0/include/mbedtls/ |
D | ssl.h | 1199 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 684 CCM-8 ciphersuite. 827 If you were using a ciphersuite without encryption, you just have to
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-driver-interface.md | 333 - if there is a transparent driver for the specified ciphersuite, the core calls that driver's `"pa…
|