/mbedtls-3.6.0/library/ |
D | ssl_tls13_keys.c | 848 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument 883 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1293 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1304 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1313 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1317 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early() 1853 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument 1861 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk() 1873 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1874 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk() [all …]
|
D | ssl_tls13_client.c | 726 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument 737 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk() 764 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument 773 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk() 830 const unsigned char *psk, in ssl_tls13_write_binder() argument 860 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1020 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1031 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1035 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1044 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() [all …]
|
D | ssl_misc.h | 784 unsigned char *psk; /*!< PSK from the callback */ member 1511 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument 1513 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk() 1514 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1516 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk() 1517 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk() 1520 *psk = NULL; in mbedtls_ssl_get_psk()
|
D | ssl_tls13_keys.h | 482 unsigned char const *psk, size_t psk_len, 645 unsigned char **psk,
|
D | ssl_tls.c | 2096 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2113 if (conf->psk != NULL) { in ssl_conf_remove_psk() 2114 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2115 conf->psk = NULL; in ssl_conf_remove_psk() 2156 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument 2167 if (psk == NULL) { in mbedtls_ssl_conf_psk() 2177 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2181 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2205 if (ssl->handshake->psk != NULL) { in ssl_remove_psk() 2206 mbedtls_zeroize_and_free(ssl->handshake->psk, in ssl_remove_psk() [all …]
|
D | ssl_tls13_server.c | 298 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match() 319 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local 331 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match() 337 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match() 341 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match() 688 not_using_psk = (ssl->handshake->psk == NULL); in ssl_tls13_write_server_pre_shared_key_ext()
|
D | ssl_tls12_server.c | 98 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
|
/mbedtls-3.6.0/programs/fuzz/ |
D | fuzz_client.c | 24 const unsigned char psk[] = { variable 102 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 26 const unsigned char psk[] = { variable 161 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
/mbedtls-3.6.0/programs/ssl/ |
D | mini_client.c | 65 const unsigned char psk[] = { variable 193 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
|
D | ssl_client2.c | 488 const char *psk; /* the pre-shared key */ member 733 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 901 opt.psk = DFL_PSK; in main() 1062 opt.psk = q; in main() 1388 if (strlen(opt.psk)) { in main() 1389 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 1390 opt.psk, &psk_len) != 0) { in main() 1399 if (opt.psk == NULL) { in main() 1915 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main() 1931 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
|
D | ssl_server2.c | 630 const char *psk; /* the pre-shared key */ member 1304 unsigned char *psk, in psa_setup_psk_key_slot() argument 1315 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1468 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 1683 opt.psk = DFL_PSK; in main() 1873 opt.psk = q; in main() 2266 if (strlen(opt.psk) == 0) { in main() 2366 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 2367 opt.psk, &psk_len) != 0) { in main() 3103 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main() [all …]
|
/mbedtls-3.6.0/scripts/ |
D | footprint.sh | 106 doit psk configs/config-ccm-psk-tls1_2.h
|
/mbedtls-3.6.0/include/mbedtls/ |
D | ssl.h | 1515 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should 3462 const unsigned char *psk, size_t psk_len, 3504 mbedtls_svc_key_id_t psk, 3526 const unsigned char *psk, size_t psk_len); 3550 mbedtls_svc_key_id_t psk);
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_ssl.function | 1744 data_t *psk, 1763 psk->x, psk->len,
|
D | test_suite_ssl.data | 471 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
|
/mbedtls-3.6.0/docs/ |
D | 3.0-migration-guide.md | 809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times 813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
|
/mbedtls-3.6.0/tests/ |
D | ssl-opt.sh | 479 *[-_\ =]psk*|*[-_\ =]PSK*)
|
/mbedtls-3.6.0/ |
D | ChangeLog | 139 and the ephemeral or psk-ephemeral key exchange mode are enabled. 1274 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`: 1277 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,
|