/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | ssl_cli.c | 422 if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 ) in ssl_write_ecjpake_kkpp_ext() 438 if( ssl->handshake->ecjpake_cache == NULL || in ssl_write_ecjpake_kkpp_ext() 439 ssl->handshake->ecjpake_cache_len == 0 ) in ssl_write_ecjpake_kkpp_ext() 443 ret = mbedtls_ecjpake_write_round_one( &ssl->handshake->ecjpake_ctx, in ssl_write_ecjpake_kkpp_ext() 453 ssl->handshake->ecjpake_cache = mbedtls_calloc( 1, kkpp_len ); in ssl_write_ecjpake_kkpp_ext() 454 if( ssl->handshake->ecjpake_cache == NULL ) in ssl_write_ecjpake_kkpp_ext() 460 memcpy( ssl->handshake->ecjpake_cache, p + 2, kkpp_len ); in ssl_write_ecjpake_kkpp_ext() 461 ssl->handshake->ecjpake_cache_len = kkpp_len; in ssl_write_ecjpake_kkpp_ext() 467 kkpp_len = ssl->handshake->ecjpake_cache_len; in ssl_write_ecjpake_kkpp_ext() 470 memcpy( p + 2, ssl->handshake->ecjpake_cache, kkpp_len ); in ssl_write_ecjpake_kkpp_ext() [all …]
|
D | ssl_tls.c | 709 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in ssl_use_opaque_psk() 916 if( ssl->handshake->cid_in_use == MBEDTLS_SSL_CID_ENABLED ) in ssl_populate_transform() 925 transform->out_cid_len = ssl->handshake->peer_cid_len; in ssl_populate_transform() 926 memcpy( transform->out_cid, ssl->handshake->peer_cid, in ssl_populate_transform() 927 ssl->handshake->peer_cid_len ); in ssl_populate_transform() 1383 static int ssl_set_handshake_prfs( mbedtls_ssl_handshake_params *handshake, in ssl_set_handshake_prfs() argument 1394 handshake->tls_prf = ssl3_prf; in ssl_set_handshake_prfs() 1395 handshake->calc_verify = ssl_calc_verify_ssl; in ssl_set_handshake_prfs() 1396 handshake->calc_finished = ssl_calc_finished_ssl; in ssl_set_handshake_prfs() 1403 handshake->tls_prf = tls1_prf; in ssl_set_handshake_prfs() [all …]
|
D | ssl_srv.c | 175 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in ssl_use_opaque_psk() 299 mbedtls_ssl_sig_hash_set_add( &ssl->handshake->hash_algs, sig_cur, md_cur ); in ssl_parse_signature_algorithms_ext() 343 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves() 364 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves() 407 ssl->handshake->ecdh_ctx.point_format = p[0]; in ssl_parse_supported_point_formats() 410 ssl->handshake->ecjpake_ctx.point_format = p[0]; in ssl_parse_supported_point_formats() 432 if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 ) in ssl_parse_ecjpake_kkpp() 438 if( ( ret = mbedtls_ecjpake_read_round_one( &ssl->handshake->ecjpake_ctx, in ssl_parse_ecjpake_kkpp() 448 ssl->handshake->cli_exts |= MBEDTLS_TLS_EXT_ECJPAKE_KKPP_OK; in ssl_parse_ecjpake_kkpp() 534 ssl->handshake->cid_in_use = MBEDTLS_SSL_CID_ENABLED; in ssl_parse_cid_ext() [all …]
|
D | ssl_msg.c | 261 if( ssl->handshake->retransmit_timeout >= ssl->conf->hs_timeout_max ) in ssl_double_retransmit_timeout() 270 if( ssl->handshake->retransmit_timeout != ssl->conf->hs_timeout_min ) in ssl_double_retransmit_timeout() 272 ssl->handshake->mtu = 508; in ssl_double_retransmit_timeout() 273 MBEDTLS_SSL_DEBUG_MSG( 2, ( "mtu autoreduction to %d bytes", ssl->handshake->mtu ) ); in ssl_double_retransmit_timeout() 276 new_timeout = 2 * ssl->handshake->retransmit_timeout; in ssl_double_retransmit_timeout() 279 if( new_timeout < ssl->handshake->retransmit_timeout || in ssl_double_retransmit_timeout() 285 ssl->handshake->retransmit_timeout = new_timeout; in ssl_double_retransmit_timeout() 287 ssl->handshake->retransmit_timeout ) ); in ssl_double_retransmit_timeout() 294 ssl->handshake->retransmit_timeout = ssl->conf->hs_timeout_min; in ssl_reset_retransmit_timeout() 296 ssl->handshake->retransmit_timeout ) ); in ssl_reset_retransmit_timeout() [all …]
|
/openthread-2.7.6/tests/scripts/thread-cert/ |
D | Cert_8_1_02_Commissioning.py | 87 …_cpkts2.range(_cpkts.index).filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).mu… 91 …_cpkts2.index).filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).must_ne… 92 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 96 …_cpkts2.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next().must_verif… 97 lambda p: p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie) 101 lambda p: p.dtls.handshake.type == 105 …_cpkts2.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE]).must_next().mus… 106 lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and set(
|
D | Cert_8_1_01_Commissioning.py | 173 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\ 182 filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).\ 184 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 193 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\ 194 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie 203 p.dtls.handshake.type == [HANDSHAKE_SERVER_HELLO, 216 p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and\
|
D | Cert_8_1_06_Commissioning.py | 141 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\ 150 filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).\ 152 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None) 161 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\ 162 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie 171 p.dtls.handshake.type == [HANDSHAKE_SERVER_HELLO, 184 p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and\
|
D | Cert_8_2_02_JoinerRouter.py | 116 pkts.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next()
|
D | Cert_8_2_01_JoinerRouter.py | 124 pkts.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next()
|
D | Cert_8_2_05_JoinerRouter.py | 177 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
|
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl_internal.h | 1039 if( ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0 ) in mbedtls_ssl_get_psk() 1041 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1042 *psk_len = ssl->handshake->psk_len; in mbedtls_ssl_get_psk() 1072 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in mbedtls_ssl_get_opaque_psk() 1073 return( ssl->handshake->psk_opaque ); in mbedtls_ssl_get_opaque_psk() 1125 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_key() 1126 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_key() 1137 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_cert() 1138 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_cert()
|
D | ssl.h | 1242 mbedtls_ssl_handshake_params *handshake; /*!< params required only during member
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/ |
D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.data | 94 Test moving clients handshake to state: HELLO_REQUEST 97 Test moving clients handshake to state: CLIENT_HELLO 100 Test moving clients handshake to state: SERVER_HELLO 103 Test moving clients handshake to state: SERVER_CERTIFICATE 106 Test moving clients handshake to state: SERVER_KEY_EXCHANGE 109 Test moving clients handshake to state: CERTIFICATE_REQUEST 112 Test moving clients handshake to state: SERVER_HELLO_DONE 115 Test moving clients handshake to state: CLIENT_CERTIFICATE 118 Test moving clients handshake to state: CLIENT_KEY_EXCHANGE 121 Test moving clients handshake to state: CERTIFICATE_VERIFY [all …]
|
D | test_suite_ssl.function | 989 * This function moves ssl handshake from \p ssl to prescribed \p state. 1011 /* If /p second_ssl ends the handshake procedure before /p ssl then 1681 /* forced_ciphersuite needs to last until the end of the handshake */ 1979 /* After calling this function for the server, it only sends a handshake 4335 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake"; 4352 /* Test if the server received a fragmented handshake */ 4357 /* Test if the client received a fragmented handshake */
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 389 dropped. As a consequence, the TLS handshake now fails when the output 744 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes, 767 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes, 1086 * Zeroize memory used for buffering or reassembling handshake messages 1148 * Add support for fragmentation of outgoing DTLS handshake messages. This 1153 handshake when flights do not get through (RFC 6347, section 4.1.1.1, 1157 * Add support for buffering out-of-order handshake messages in DTLS. 1180 * Fix a bug that caused SSL/TLS clients to incorrectly abort the handshake 1201 * Add support for buffering of out-of-order handshake messages. 1529 In the context of SSL, this resulted in handshake failure. Reported by [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_server2.c | 3615 goto handshake; in main() 3698 handshake: in main()
|