Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 19 of 19) sorted by relevance

/mbedtls-3.6.0/library/
Dssl_tls13_keys.c848 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument
883 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder()
1293 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local
1304 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early()
1313 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early()
1317 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early()
1853 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument
1861 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk()
1873 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk()
1874 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk()
[all …]
Dssl_tls13_client.c726 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument
737 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk()
764 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument
773 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk()
830 const unsigned char *psk, in ssl_tls13_write_binder() argument
860 psk, psk_len, psk_type, in ssl_tls13_write_binder()
1020 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local
1031 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
1035 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
1044 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
[all …]
Dssl_misc.h784 unsigned char *psk; /*!< PSK from the callback */ member
1511 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument
1513 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk()
1514 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk()
1516 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk()
1517 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk()
1520 *psk = NULL; in mbedtls_ssl_get_psk()
Dssl_tls13_keys.h482 unsigned char const *psk, size_t psk_len,
645 unsigned char **psk,
Dssl_tls.c2096 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk()
2113 if (conf->psk != NULL) { in ssl_conf_remove_psk()
2114 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk()
2115 conf->psk = NULL; in ssl_conf_remove_psk()
2156 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument
2167 if (psk == NULL) { in mbedtls_ssl_conf_psk()
2177 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk()
2181 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk()
2205 if (ssl->handshake->psk != NULL) { in ssl_remove_psk()
2206 mbedtls_zeroize_and_free(ssl->handshake->psk, in ssl_remove_psk()
[all …]
Dssl_tls13_server.c298 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match()
319 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local
331 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match()
337 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match()
341 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match()
688 not_using_psk = (ssl->handshake->psk == NULL); in ssl_tls13_write_server_pre_shared_key_ext()
Dssl_tls12_server.c98 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
/mbedtls-3.6.0/programs/fuzz/
Dfuzz_client.c24 const unsigned char psk[] = { variable
102 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
Dfuzz_server.c26 const unsigned char psk[] = { variable
161 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
/mbedtls-3.6.0/programs/ssl/
Dmini_client.c65 const unsigned char psk[] = { variable
193 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
Dssl_client2.c488 const char *psk; /* the pre-shared key */ member
733 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local
901 opt.psk = DFL_PSK; in main()
1062 opt.psk = q; in main()
1388 if (strlen(opt.psk)) { in main()
1389 if (mbedtls_test_unhexify(psk, sizeof(psk), in main()
1390 opt.psk, &psk_len) != 0) { in main()
1399 if (opt.psk == NULL) { in main()
1915 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main()
1931 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
Dssl_server2.c630 const char *psk; /* the pre-shared key */ member
1304 unsigned char *psk, in psa_setup_psk_key_slot() argument
1315 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot()
1468 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local
1683 opt.psk = DFL_PSK; in main()
1873 opt.psk = q; in main()
2266 if (strlen(opt.psk) == 0) { in main()
2366 if (mbedtls_test_unhexify(psk, sizeof(psk), in main()
2367 opt.psk, &psk_len) != 0) { in main()
3103 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main()
[all …]
/mbedtls-3.6.0/scripts/
Dfootprint.sh106 doit psk configs/config-ccm-psk-tls1_2.h
/mbedtls-3.6.0/include/mbedtls/
Dssl.h1515 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should
3462 const unsigned char *psk, size_t psk_len,
3504 mbedtls_svc_key_id_t psk,
3526 const unsigned char *psk, size_t psk_len);
3550 mbedtls_svc_key_id_t psk);
/mbedtls-3.6.0/tests/suites/
Dtest_suite_ssl.function1744 data_t *psk,
1763 psk->x, psk->len,
Dtest_suite_ssl.data471 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
/mbedtls-3.6.0/docs/
D3.0-migration-guide.md809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times
813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
/mbedtls-3.6.0/tests/
Dssl-opt.sh479 *[-_\ =]psk*|*[-_\ =]PSK*)
/mbedtls-3.6.0/
DChangeLog139 and the ephemeral or psk-ephemeral key exchange mode are enabled.
1274 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`:
1277 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,