/mbedtls-latest/library/ |
D | ssl_tls13_server.c | 385 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match() 414 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local 430 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match() 436 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match() 440 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match() 524 struct psk_attributes *psk) in ssl_tls13_parse_pre_shared_key_ext() argument 602 &psk->type, &session); in ssl_tls13_parse_pre_shared_key_ext() 609 switch (psk->type) { in ssl_tls13_parse_pre_shared_key_ext() 630 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE; in ssl_tls13_parse_pre_shared_key_ext() 635 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL; in ssl_tls13_parse_pre_shared_key_ext() [all …]
|
D | ssl_tls13_keys.c | 836 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument 871 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1281 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1292 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1301 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1305 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early() 1841 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument 1849 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk() 1861 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1862 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk() [all …]
|
D | ssl_tls13_client.c | 724 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument 735 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk() 762 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument 771 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk() 828 const unsigned char *psk, in ssl_tls13_write_binder() argument 858 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1004 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1015 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1019 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1028 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() [all …]
|
D | ssl_misc.h | 816 unsigned char *psk; /*!< PSK from the callback */ member 1543 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument 1545 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk() 1546 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1548 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk() 1549 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk() 1552 *psk = NULL; in mbedtls_ssl_get_psk()
|
D | ssl_tls.c | 2110 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2127 if (conf->psk != NULL) { in ssl_conf_remove_psk() 2128 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2129 conf->psk = NULL; in ssl_conf_remove_psk() 2170 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument 2181 if (psk == NULL) { in mbedtls_ssl_conf_psk() 2191 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2195 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2219 if (ssl->handshake->psk != NULL) { in ssl_remove_psk() 2220 mbedtls_zeroize_and_free(ssl->handshake->psk, in ssl_remove_psk() [all …]
|
D | ssl_tls13_keys.h | 482 unsigned char const *psk, size_t psk_len, 645 unsigned char **psk,
|
D | ssl_tls12_server.c | 98 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
|
/mbedtls-latest/programs/fuzz/ |
D | fuzz_client.c | 22 const unsigned char psk[] = { variable 100 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 24 const unsigned char psk[] = { variable 159 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
/mbedtls-latest/programs/ssl/ |
D | mini_client.c | 65 const unsigned char psk[] = { variable 193 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
|
D | ssl_client2.c | 490 const char *psk; /* the pre-shared key */ member 791 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 940 opt.psk = DFL_PSK; in main() 1147 opt.psk = q; in main() 1482 if (strlen(opt.psk)) { in main() 1483 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 1484 opt.psk, &psk_len) != 0) { in main() 1493 if (opt.psk == NULL) { in main() 2012 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main() 2028 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
|
D | ssl_server2.c | 635 const char *psk; /* the pre-shared key */ member 1312 unsigned char *psk, in psa_setup_psk_key_slot() argument 1323 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1520 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 1715 opt.psk = DFL_PSK; in main() 1953 opt.psk = q; in main() 2353 if (strlen(opt.psk) == 0) { in main() 2453 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 2454 opt.psk, &psk_len) != 0) { in main() 3188 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main() [all …]
|
/mbedtls-latest/scripts/ |
D | footprint.sh | 106 doit psk configs/config-ccm-psk-tls1_2.h
|
/mbedtls-latest/include/mbedtls/ |
D | ssl.h | 1600 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should 3646 const unsigned char *psk, size_t psk_len, 3688 mbedtls_svc_key_id_t psk, 3710 const unsigned char *psk, size_t psk_len); 3734 mbedtls_svc_key_id_t psk);
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times 813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ssl.function | 1796 data_t *psk, 1815 psk->x, psk->len,
|
D | test_suite_ssl.data | 471 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
|
/mbedtls-latest/tests/ |
D | ssl-opt.sh | 572 *[-_\ =]psk*|*[-_\ =]PSK*)
|
/mbedtls-latest/ |
D | ChangeLog | 594 and the ephemeral or psk-ephemeral key exchange mode are enabled. 1729 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`: 1732 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,
|