Searched refs:keys (Results 1 – 5 of 5) sorted by relevance
69 mbedtls_ssl_ticket_key *key = ctx->keys + index; in ssl_ticket_gen_key()102 uint32_t key_time = ctx->keys[ctx->active].generation_time; in ssl_ticket_update_keys()148 if( ( ret = mbedtls_cipher_setup( &ctx->keys[0].ctx, cipher_info ) ) != 0 || in mbedtls_ssl_ticket_setup()149 ( ret = mbedtls_cipher_setup( &ctx->keys[1].ctx, cipher_info ) ) != 0 ) in mbedtls_ssl_ticket_setup()320 key = &ctx->keys[ctx->active]; in mbedtls_ssl_ticket_write()373 for( i = 0; i < sizeof( ctx->keys ) / sizeof( *ctx->keys ); i++ ) in ssl_ticket_select_key()374 if( memcmp( name, ctx->keys[i].name, 4 ) == 0 ) in ssl_ticket_select_key()375 return( &ctx->keys[i] ); in ssl_ticket_select_key()479 mbedtls_cipher_free( &ctx->keys[0].ctx ); in mbedtls_ssl_ticket_free()480 mbedtls_cipher_free( &ctx->keys[1].ctx ); in mbedtls_ssl_ticket_free()
59 mbedtls_ssl_ticket_key keys[2]; /*!< ticket protection keys */ member
65 /* Load my private and public keys, and peer's public keys */
114 * Fix issue that caused a hang when generating RSA keys of odd bitlength169 on untrusted input or write keys of untrusted origin. Found by Guido193 minimum key size for end-entity certificates with RSA keys. Found by255 https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/335 * New server-side implementation of session tickets that rotate keys to564 * Fix bug in pk_parse_key() that caused some valid private EC keys to be626 * Add function pk_check_pair() to test if public and private keys match.722 RSA keys.738 * Blowfish in the cipher layer now supports variable length keys.874 * pk_get_size() and pk_get_len() were off by a factor 8 for RSA-alt keys.[all …]
1495 # using the <cursor keys>. Press <Enter> to select an item or <escape> to cancel1497 # search box by pressing <Shift>+<cursor down>. Also here use the <cursor keys>