Home
last modified time | relevance | path

Searched refs:psk (Results 1 – 19 of 19) sorted by relevance

/mbedtls-latest/library/
Dssl_tls13_server.c385 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match()
414 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local
430 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match()
436 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match()
440 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match()
524 struct psk_attributes *psk) in ssl_tls13_parse_pre_shared_key_ext() argument
602 &psk->type, &session); in ssl_tls13_parse_pre_shared_key_ext()
609 switch (psk->type) { in ssl_tls13_parse_pre_shared_key_ext()
630 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE; in ssl_tls13_parse_pre_shared_key_ext()
635 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL; in ssl_tls13_parse_pre_shared_key_ext()
[all …]
Dssl_tls13_keys.c836 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument
871 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder()
1281 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local
1292 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early()
1301 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early()
1305 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early()
1841 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument
1849 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk()
1861 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk()
1862 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk()
[all …]
Dssl_tls13_client.c724 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument
735 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk()
762 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument
771 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk()
828 const unsigned char *psk, in ssl_tls13_write_binder() argument
858 psk, psk_len, psk_type, in ssl_tls13_write_binder()
1004 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local
1015 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
1019 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
1028 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext()
[all …]
Dssl_misc.h816 unsigned char *psk; /*!< PSK from the callback */ member
1543 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument
1545 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk()
1546 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk()
1548 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk()
1549 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk()
1552 *psk = NULL; in mbedtls_ssl_get_psk()
Dssl_tls.c2110 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk()
2127 if (conf->psk != NULL) { in ssl_conf_remove_psk()
2128 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk()
2129 conf->psk = NULL; in ssl_conf_remove_psk()
2170 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument
2181 if (psk == NULL) { in mbedtls_ssl_conf_psk()
2191 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk()
2195 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk()
2219 if (ssl->handshake->psk != NULL) { in ssl_remove_psk()
2220 mbedtls_zeroize_and_free(ssl->handshake->psk, in ssl_remove_psk()
[all …]
Dssl_tls13_keys.h482 unsigned char const *psk, size_t psk_len,
645 unsigned char **psk,
Dssl_tls12_server.c98 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
/mbedtls-latest/programs/fuzz/
Dfuzz_client.c22 const unsigned char psk[] = { variable
100 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
Dfuzz_server.c24 const unsigned char psk[] = { variable
159 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
/mbedtls-latest/programs/ssl/
Dmini_client.c65 const unsigned char psk[] = { variable
193 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
Dssl_client2.c490 const char *psk; /* the pre-shared key */ member
791 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local
940 opt.psk = DFL_PSK; in main()
1147 opt.psk = q; in main()
1482 if (strlen(opt.psk)) { in main()
1483 if (mbedtls_test_unhexify(psk, sizeof(psk), in main()
1484 opt.psk, &psk_len) != 0) { in main()
1493 if (opt.psk == NULL) { in main()
2012 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main()
2028 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
Dssl_server2.c635 const char *psk; /* the pre-shared key */ member
1312 unsigned char *psk, in psa_setup_psk_key_slot() argument
1323 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot()
1520 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local
1715 opt.psk = DFL_PSK; in main()
1953 opt.psk = q; in main()
2353 if (strlen(opt.psk) == 0) { in main()
2453 if (mbedtls_test_unhexify(psk, sizeof(psk), in main()
2454 opt.psk, &psk_len) != 0) { in main()
3188 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main()
[all …]
/mbedtls-latest/scripts/
Dfootprint.sh106 doit psk configs/config-ccm-psk-tls1_2.h
/mbedtls-latest/include/mbedtls/
Dssl.h1600 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should
3646 const unsigned char *psk, size_t psk_len,
3688 mbedtls_svc_key_id_t psk,
3710 const unsigned char *psk, size_t psk_len);
3734 mbedtls_svc_key_id_t psk);
/mbedtls-latest/docs/
D3.0-migration-guide.md809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times
813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
/mbedtls-latest/tests/suites/
Dtest_suite_ssl.function1796 data_t *psk,
1815 psk->x, psk->len,
Dtest_suite_ssl.data471 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
/mbedtls-latest/tests/
Dssl-opt.sh572 *[-_\ =]psk*|*[-_\ =]PSK*)
/mbedtls-latest/
DChangeLog594 and the ephemeral or psk-ephemeral key exchange mode are enabled.
1729 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`:
1732 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,