Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 17 of 17) sorted by relevance

/mbedtls-latest/library/
Dpsa_crypto_pake.c160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local
196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup()
197 if (peer == NULL) { in mbedtls_psa_pake_setup()
214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup()
241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
Dpsa_crypto.c8472 memcpy(peer_id, inputs->peer, inputs->peer_len);
8651 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len);
8652 if (operation->data.inputs.peer == NULL) {
8659 memcpy(operation->data.inputs.peer, peer_id, peer_id_len);
8759 mbedtls_free(inputs.peer);
9071 if (operation->data.inputs.peer != NULL) {
9072 mbedtls_free(operation->data.inputs.peer);
Dssl_tls.c1961 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local
1978 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
1983 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
1992 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_pake.data45 PSA PAKE: set empty peer
53 PSA PAKE: set invalid peer
61 PSA PAKE: peer already set
65 PSA PAKE: user and peer both servers
69 PSA PAKE: user and peer both clients
242 PSA PAKE: input getters: peer
Dtest_suite_psa_crypto_pake.function63 /* The only two JPAKE user/peer identifiers supported for the time being. */
611 uint8_t *peer = (uint8_t *) peer_arg;
639 TEST_EQUAL(psa_pake_set_peer(&operation, peer, peer_len),
671 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len),
677 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len),
1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
1162 uint8_t *peer = (uint8_t *) peers[i];
1177 PSA_ASSERT(psa_pake_set_peer(&operation, peer, peer_len));
1196 TEST_MEMORY_COMPARE(peer_ret, buffer_len_ret, peer, peer_len);
Dtest_suite_ecjpake.function65 /* Load my private and public keys, and peer's public keys */
Dtest_suite_psa_crypto_driver_wrappers.function9 /* The only two JPAKE user/peer identifiers supported for the time being. */
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c334 if (socket->peer != NULL) { in mbedtls_test_mock_socket_close()
335 memset(socket->peer, 0, sizeof(*socket->peer)); in mbedtls_test_mock_socket_close()
371 peer1->peer = peer2; in mbedtls_test_mock_socket_connect()
372 peer2->peer = peer1; in mbedtls_test_mock_socket_connect()
/mbedtls-latest/docs/
Dpsa-transition.md1128 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These…
1138 …* `their_pub`: a buffer of the same size, to hold the peer's key. This can be the same as `our_pub…
1142 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These…
1157 2. Send the ServerKeyExchange message to the peer.
1158 3. Retrieve the peer's public key.
1159 4. Call `mbedtls_ecdh_read_public` or `mbedtls_dhm_read_public` on the peer's public key, then call…
1168 2. Send the ServerKeyExchange message to the peer.
1169 3. Retrieve the peer's public key.
1176 …ty that receives a message indicating both the choice of curve or group, and the peer's public key.
1178 …TLS ServerKeyExchange message received from the peer, which encodes the selected curve/group and t…
[all …]
D3.0-migration-guide.md705 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support
714 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support
825 and if your peer doesn't support any, encourage them to upgrade their software.
/mbedtls-latest/tests/include/test/
Dssl_helpers.h160 struct mbedtls_test_mock_socket *peer; member
/mbedtls-latest/3rdparty/p256-m/p256-m/
Dp256-m.c1234 const uint8_t priv[32], const uint8_t peer[64]) in p256_ecdh_shared_secret()
1248 ret = point_from_bytes(px, py, peer); in p256_ecdh_shared_secret()
DREADME.md183 certificates (otherwise, add one 'verify' for each link in the peer's
285 function doesn't include validation of the peer's public key, which should be
/mbedtls-latest/include/psa/
Dcrypto_extra.h1802 uint8_t *MBEDTLS_PRIVATE(peer);
/mbedtls-latest/docs/architecture/
Dtls13-support.md368 The sending of data to the peer only occurs in `mbedtls_ssl_handshake_step`
/mbedtls-latest/
DChangeLog387 tickets compared to peer using a millisecond clock (observed with GnuTLS).
686 * Fix the J-PAKE driver interface for user and peer to accept any values
941 * Allow setting user and peer identifiers for EC J-PAKE operation
1404 * Fix a TLS 1.3 handshake failure when the peer Finished message has not
2982 incoming record with the correct connection data even after the peer has
3024 client programs to fail at the peer's certificate verification
3058 mbedtls_ssl_session structure which otherwise stores the peer's
3097 the peer CRT chain and session ticket twice.
3372 with the peer, as well as by a new per-connection MTU option, set using
3512 deep copy of the session, and the peer certificate is not lost. Fixes #926.
[all …]
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md729 * `PSA_JPAKE_X1_STEP_KEY_SHARE`     Round 1: input key share from peer (for ephemeral private key X…
732 * `PSA_JPAKE_X2_STEP_KEY_SHARE`     Round 1: input key share from peer (for ephemeral private key X…
735 * `PSA_JPAKE_X4S_STEP_KEY_SHARE`    Round 2: input X4S key from peer