/mbedtls-latest/library/ |
D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 197 if (peer == NULL) { in mbedtls_psa_pake_setup() 214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup() 241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
D | psa_crypto.c | 8472 memcpy(peer_id, inputs->peer, inputs->peer_len); 8651 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); 8652 if (operation->data.inputs.peer == NULL) { 8659 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); 8759 mbedtls_free(inputs.peer); 9071 if (operation->data.inputs.peer != NULL) { 9072 mbedtls_free(operation->data.inputs.peer);
|
D | ssl_tls.c | 1961 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1978 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 1983 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 1992 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_pake.data | 45 PSA PAKE: set empty peer 53 PSA PAKE: set invalid peer 61 PSA PAKE: peer already set 65 PSA PAKE: user and peer both servers 69 PSA PAKE: user and peer both clients 242 PSA PAKE: input getters: peer
|
D | test_suite_psa_crypto_pake.function | 63 /* The only two JPAKE user/peer identifiers supported for the time being. */ 611 uint8_t *peer = (uint8_t *) peer_arg; 639 TEST_EQUAL(psa_pake_set_peer(&operation, peer, peer_len), 671 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len), 677 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_peer(&operation, peer, peer_len), 1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes 1162 uint8_t *peer = (uint8_t *) peers[i]; 1177 PSA_ASSERT(psa_pake_set_peer(&operation, peer, peer_len)); 1196 TEST_MEMORY_COMPARE(peer_ret, buffer_len_ret, peer, peer_len);
|
D | test_suite_ecjpake.function | 65 /* Load my private and public keys, and peer's public keys */
|
D | test_suite_psa_crypto_driver_wrappers.function | 9 /* The only two JPAKE user/peer identifiers supported for the time being. */
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 334 if (socket->peer != NULL) { in mbedtls_test_mock_socket_close() 335 memset(socket->peer, 0, sizeof(*socket->peer)); in mbedtls_test_mock_socket_close() 371 peer1->peer = peer2; in mbedtls_test_mock_socket_connect() 372 peer2->peer = peer1; in mbedtls_test_mock_socket_connect()
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 1128 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These… 1138 …* `their_pub`: a buffer of the same size, to hold the peer's key. This can be the same as `our_pub… 1142 4. Send `our_pub` to the peer. Retrieve the peer's public key and import it into `their_pub`. These… 1157 2. Send the ServerKeyExchange message to the peer. 1158 3. Retrieve the peer's public key. 1159 4. Call `mbedtls_ecdh_read_public` or `mbedtls_dhm_read_public` on the peer's public key, then call… 1168 2. Send the ServerKeyExchange message to the peer. 1169 3. Retrieve the peer's public key. 1176 …ty that receives a message indicating both the choice of curve or group, and the peer's public key. 1178 …TLS ServerKeyExchange message received from the peer, which encodes the selected curve/group and t… [all …]
|
D | 3.0-migration-guide.md | 705 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support 714 AES-GCM, AES-CCM or ChachaPoly for example) and if your peer doesn't support 825 and if your peer doesn't support any, encourage them to upgrade their software.
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 160 struct mbedtls_test_mock_socket *peer; member
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | p256-m.c | 1234 const uint8_t priv[32], const uint8_t peer[64]) in p256_ecdh_shared_secret() 1248 ret = point_from_bytes(px, py, peer); in p256_ecdh_shared_secret()
|
D | README.md | 183 certificates (otherwise, add one 'verify' for each link in the peer's 285 function doesn't include validation of the peer's public key, which should be
|
/mbedtls-latest/include/psa/ |
D | crypto_extra.h | 1802 uint8_t *MBEDTLS_PRIVATE(peer);
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 368 The sending of data to the peer only occurs in `mbedtls_ssl_handshake_step`
|
/mbedtls-latest/ |
D | ChangeLog | 387 tickets compared to peer using a millisecond clock (observed with GnuTLS). 686 * Fix the J-PAKE driver interface for user and peer to accept any values 941 * Allow setting user and peer identifiers for EC J-PAKE operation 1404 * Fix a TLS 1.3 handshake failure when the peer Finished message has not 2982 incoming record with the correct connection data even after the peer has 3024 client programs to fail at the peer's certificate verification 3058 mbedtls_ssl_session structure which otherwise stores the peer's 3097 the peer CRT chain and session ticket twice. 3372 with the peer, as well as by a new per-connection MTU option, set using 3512 deep copy of the session, and the peer certificate is not lost. Fixes #926. [all …]
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 729 * `PSA_JPAKE_X1_STEP_KEY_SHARE` Round 1: input key share from peer (for ephemeral private key X… 732 * `PSA_JPAKE_X2_STEP_KEY_SHARE` Round 1: input key share from peer (for ephemeral private key X… 735 * `PSA_JPAKE_X4S_STEP_KEY_SHARE` Round 2: input X4S key from peer
|