/mbedtls-3.5.0/library/ |
D | ssl_tls13_keys.c | 830 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument 865 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1269 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1280 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1289 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1293 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early() 1817 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument 1825 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk() 1837 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1838 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk() [all …]
|
D | ssl_tls13_client.c | 723 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument 734 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk() 761 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument 770 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk() 827 const unsigned char *psk, in ssl_tls13_write_binder() argument 857 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1017 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1028 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1032 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1041 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() [all …]
|
D | ssl_tls13_keys.h | 494 unsigned char const *psk, size_t psk_len, 657 unsigned char **psk,
|
D | ssl_misc.h | 799 unsigned char *psk; /*!< PSK from the callback */ member 1526 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument 1528 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk() 1529 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1531 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk() 1532 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk() 1535 *psk = NULL; in mbedtls_ssl_get_psk()
|
D | ssl_tls.c | 2113 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2130 if (conf->psk != NULL) { in ssl_conf_remove_psk() 2131 mbedtls_platform_zeroize(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2133 mbedtls_free(conf->psk); in ssl_conf_remove_psk() 2134 conf->psk = NULL; in ssl_conf_remove_psk() 2175 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument 2186 if (psk == NULL) { in mbedtls_ssl_conf_psk() 2196 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2200 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2224 if (ssl->handshake->psk != NULL) { in ssl_remove_psk() [all …]
|
D | ssl_tls13_server.c | 308 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match() 330 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local 342 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match() 348 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match() 352 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match() 699 not_using_psk = (ssl->handshake->psk == NULL); in ssl_tls13_write_server_pre_shared_key_ext()
|
D | ssl_tls12_server.c | 102 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
|
/mbedtls-3.5.0/programs/ssl/ |
D | mini_client.c | 77 const unsigned char psk[] = { variable 197 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
|
D | ssl_client2.c | 499 const char *psk; /* the pre-shared key */ member 744 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 916 opt.psk = DFL_PSK; in main() 1077 opt.psk = q; in main() 1403 if (strlen(opt.psk)) { in main() 1404 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 1405 opt.psk, &psk_len) != 0) { in main() 1414 if (opt.psk == NULL) { in main() 1970 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main() 1986 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
|
D | ssl_server2.c | 640 const char *psk; /* the pre-shared key */ member 1314 unsigned char *psk, in psa_setup_psk_key_slot() argument 1325 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1478 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 1696 opt.psk = DFL_PSK; in main() 1886 opt.psk = q; in main() 2279 if (strlen(opt.psk) == 0) { in main() 2379 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 2380 opt.psk, &psk_len) != 0) { in main() 3156 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main() [all …]
|
/mbedtls-3.5.0/programs/fuzz/ |
D | fuzz_client.c | 24 const unsigned char psk[] = { variable 95 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 26 const unsigned char psk[] = { variable 153 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
/mbedtls-3.5.0/scripts/ |
D | footprint.sh | 118 doit psk configs/config-ccm-psk-tls1_2.h
|
/mbedtls-3.5.0/include/mbedtls/ |
D | ssl.h | 1512 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should 3444 const unsigned char *psk, size_t psk_len, 3486 mbedtls_svc_key_id_t psk, 3508 const unsigned char *psk, size_t psk_len); 3532 mbedtls_svc_key_id_t psk);
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_ssl.function | 1920 data_t *psk, 1939 psk->x, psk->len,
|
D | test_suite_ssl.data | 370 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times 813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
|
/mbedtls-3.5.0/tests/ |
D | ssl-opt.sh | 465 *[-_\ =]psk*|*[-_\ =]PSK*)
|
/mbedtls-3.5.0/ |
D | ChangeLog | 953 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`: 956 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,
|