Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 – 13 of 13) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/tests/
DDescriptions.txt14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS
16 For each ciphersuite/version/side/authmode it performs a full handshake
Dssl-opt.sh252 ciphersuite="${1##*\ force_ciphersuite=}"
253 ciphersuite="${ciphersuite%%[!-0-9A-Z_a-z]*}"
262 requires_ciphersuite_enabled "$ciphersuite"
266 unset ciphersuite
/openthread-2.7.6/third_party/mbedtls/repo/library/
Dssl_cache.c81 if( session->ciphersuite != entry->session.ciphersuite || in mbedtls_ssl_cache_get()
Dssl_tls.c828 int ciphersuite, in ssl_populate_transform() argument
889 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id( ciphersuite ); in ssl_populate_transform()
893 ciphersuite ) ); in ssl_populate_transform()
944 mbedtls_ssl_get_ciphersuite_name( ciphersuite ) ) ); in ssl_populate_transform()
1619 ssl->session_negotiate->ciphersuite, in mbedtls_ssl_derive_keys()
4976 return mbedtls_ssl_get_ciphersuite_name( ssl->session->ciphersuite ); in mbedtls_ssl_get_ciphersuite()
5369 *p++ = (unsigned char)( ( session->ciphersuite >> 8 ) & 0xFF ); in ssl_session_save()
5370 *p++ = (unsigned char)( ( session->ciphersuite ) & 0xFF ); in ssl_session_save()
5570 session->ciphersuite = ( p[0] << 8 ) | p[1]; in ssl_session_load()
6599 ssl->session->ciphersuite, in ssl_context_load()
[all …]
Dssl_srv.c1386 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello_v2()
2250 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello()
2383 ssl->session_negotiate->ciphersuite ) ) == NULL || in ssl_write_encrypt_then_mac_ext()
2922 *p++ = (unsigned char)( ssl->session_negotiate->ciphersuite >> 8 ); in ssl_write_server_hello()
2923 *p++ = (unsigned char)( ssl->session_negotiate->ciphersuite ); in ssl_write_server_hello()
2927 mbedtls_ssl_get_ciphersuite_name( ssl->session_negotiate->ciphersuite ) ) ); in ssl_write_server_hello()
2976 mbedtls_ssl_ciphersuite_from_id( ssl->session_negotiate->ciphersuite ) ) ) in ssl_write_server_hello()
Dssl_cli.c2274 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello()
2284 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello()
2328 ssl->session_negotiate->ciphersuite ) in ssl_parse_server_hello()
2335 ssl->session_negotiate->ciphersuite ); in ssl_parse_server_hello()
Dssl_ciphersuites.c2249 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id( int ciphersuite ) in mbedtls_ssl_ciphersuite_from_id() argument
2255 if( cur->id == ciphersuite ) in mbedtls_ssl_ciphersuite_from_id()
/openthread-2.7.6/src/cli/
DREADME_COAPS.md11 ### Configure DTLS ciphersuite.
187 Set DTLS ciphersuite to `TLS_PSK_WITH_AES_128_CCM_8`.
256 Set DTLS ciphersuite to `TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8`.
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/
Dssl_internal.h1155 const mbedtls_ssl_ciphersuite_t *ciphersuite,
Dssl.h915 int ciphersuite; /*!< chosen ciphersuite */ member
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog1014 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
1173 * Add ecc extensions only if an ecc based ciphersuite is used.
1281 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,
1376 * Fix a client-side bug in the validation of the server's ciphersuite choice
1377 which could potentially lead to the client accepting a ciphersuite it didn't
1378 offer or a ciphersuite that cannot be used with the TLS or DTLS version
2473 default ciphersuite list returned by ssl_list_ciphersuites()
2642 while using the default ciphersuite list.
2644 ciphersuite/certificate.
2968 * Support for adhering to client ciphersuite order preference
[all …]
DREADME.md184 - `tests/compat.sh` tests interoperability of every ciphersuite with other implementations.
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ssl.function1447 session->ciphersuite = 0xabcd;
3887 TEST_ASSERT( original.ciphersuite == restored.ciphersuite );