Home
last modified time | relevance | path

Searched refs:handshake (Results 1 – 17 of 17) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/library/
Dssl_cli.c422 if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 ) in ssl_write_ecjpake_kkpp_ext()
438 if( ssl->handshake->ecjpake_cache == NULL || in ssl_write_ecjpake_kkpp_ext()
439 ssl->handshake->ecjpake_cache_len == 0 ) in ssl_write_ecjpake_kkpp_ext()
443 ret = mbedtls_ecjpake_write_round_one( &ssl->handshake->ecjpake_ctx, in ssl_write_ecjpake_kkpp_ext()
453 ssl->handshake->ecjpake_cache = mbedtls_calloc( 1, kkpp_len ); in ssl_write_ecjpake_kkpp_ext()
454 if( ssl->handshake->ecjpake_cache == NULL ) in ssl_write_ecjpake_kkpp_ext()
460 memcpy( ssl->handshake->ecjpake_cache, p + 2, kkpp_len ); in ssl_write_ecjpake_kkpp_ext()
461 ssl->handshake->ecjpake_cache_len = kkpp_len; in ssl_write_ecjpake_kkpp_ext()
467 kkpp_len = ssl->handshake->ecjpake_cache_len; in ssl_write_ecjpake_kkpp_ext()
470 memcpy( p + 2, ssl->handshake->ecjpake_cache, kkpp_len ); in ssl_write_ecjpake_kkpp_ext()
[all …]
Dssl_tls.c709 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in ssl_use_opaque_psk()
916 if( ssl->handshake->cid_in_use == MBEDTLS_SSL_CID_ENABLED ) in ssl_populate_transform()
925 transform->out_cid_len = ssl->handshake->peer_cid_len; in ssl_populate_transform()
926 memcpy( transform->out_cid, ssl->handshake->peer_cid, in ssl_populate_transform()
927 ssl->handshake->peer_cid_len ); in ssl_populate_transform()
1383 static int ssl_set_handshake_prfs( mbedtls_ssl_handshake_params *handshake, in ssl_set_handshake_prfs() argument
1394 handshake->tls_prf = ssl3_prf; in ssl_set_handshake_prfs()
1395 handshake->calc_verify = ssl_calc_verify_ssl; in ssl_set_handshake_prfs()
1396 handshake->calc_finished = ssl_calc_finished_ssl; in ssl_set_handshake_prfs()
1403 handshake->tls_prf = tls1_prf; in ssl_set_handshake_prfs()
[all …]
Dssl_srv.c175 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in ssl_use_opaque_psk()
299 mbedtls_ssl_sig_hash_set_add( &ssl->handshake->hash_algs, sig_cur, md_cur ); in ssl_parse_signature_algorithms_ext()
343 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves()
364 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves()
407 ssl->handshake->ecdh_ctx.point_format = p[0]; in ssl_parse_supported_point_formats()
410 ssl->handshake->ecjpake_ctx.point_format = p[0]; in ssl_parse_supported_point_formats()
432 if( mbedtls_ecjpake_check( &ssl->handshake->ecjpake_ctx ) != 0 ) in ssl_parse_ecjpake_kkpp()
438 if( ( ret = mbedtls_ecjpake_read_round_one( &ssl->handshake->ecjpake_ctx, in ssl_parse_ecjpake_kkpp()
448 ssl->handshake->cli_exts |= MBEDTLS_TLS_EXT_ECJPAKE_KKPP_OK; in ssl_parse_ecjpake_kkpp()
534 ssl->handshake->cid_in_use = MBEDTLS_SSL_CID_ENABLED; in ssl_parse_cid_ext()
[all …]
Dssl_msg.c261 if( ssl->handshake->retransmit_timeout >= ssl->conf->hs_timeout_max ) in ssl_double_retransmit_timeout()
270 if( ssl->handshake->retransmit_timeout != ssl->conf->hs_timeout_min ) in ssl_double_retransmit_timeout()
272 ssl->handshake->mtu = 508; in ssl_double_retransmit_timeout()
273 MBEDTLS_SSL_DEBUG_MSG( 2, ( "mtu autoreduction to %d bytes", ssl->handshake->mtu ) ); in ssl_double_retransmit_timeout()
276 new_timeout = 2 * ssl->handshake->retransmit_timeout; in ssl_double_retransmit_timeout()
279 if( new_timeout < ssl->handshake->retransmit_timeout || in ssl_double_retransmit_timeout()
285 ssl->handshake->retransmit_timeout = new_timeout; in ssl_double_retransmit_timeout()
287 ssl->handshake->retransmit_timeout ) ); in ssl_double_retransmit_timeout()
294 ssl->handshake->retransmit_timeout = ssl->conf->hs_timeout_min; in ssl_reset_retransmit_timeout()
296 ssl->handshake->retransmit_timeout ) ); in ssl_reset_retransmit_timeout()
[all …]
/openthread-2.7.6/tests/scripts/thread-cert/
DCert_8_1_02_Commissioning.py87 …_cpkts2.range(_cpkts.index).filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).mu…
91 …_cpkts2.index).filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).must_ne…
92 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None)
96 …_cpkts2.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next().must_verif…
97 lambda p: p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie)
101 lambda p: p.dtls.handshake.type ==
105 …_cpkts2.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE]).must_next().mus…
106 lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and set(
DCert_8_1_01_Commissioning.py173 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
182 filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).\
184 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None)
193 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
194 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie
203 p.dtls.handshake.type == [HANDSHAKE_SERVER_HELLO,
216 p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and\
DCert_8_1_06_Commissioning.py141 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
150 filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_HELLO_VERIFY_REQUEST]).\
152 _pkt.must_verify(lambda p: p.dtls.handshake.cookie is not None)
161 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
162 p.dtls.handshake.cookie == _pkt.dtls.handshake.cookie
171 p.dtls.handshake.type == [HANDSHAKE_SERVER_HELLO,
184 p.dtls.handshake.type == [HANDSHAKE_CLIENT_KEY_EXCHANGE] and\
DCert_8_2_02_JoinerRouter.py116 pkts.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next()
DCert_8_2_01_JoinerRouter.py124 pkts.filter(lambda p: p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO]).must_next()
DCert_8_2_05_JoinerRouter.py177 p.dtls.handshake.type == [HANDSHAKE_CLIENT_HELLO] and\
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/
Dssl_internal.h1039 if( ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0 ) in mbedtls_ssl_get_psk()
1041 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk()
1042 *psk_len = ssl->handshake->psk_len; in mbedtls_ssl_get_psk()
1072 if( ! mbedtls_svc_key_id_is_null( ssl->handshake->psk_opaque ) ) in mbedtls_ssl_get_opaque_psk()
1073 return( ssl->handshake->psk_opaque ); in mbedtls_ssl_get_opaque_psk()
1125 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_key()
1126 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_key()
1137 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_cert()
1138 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_cert()
Dssl.h1242 mbedtls_ssl_handshake_params *handshake; /*!< params required only during member
/openthread-2.7.6/third_party/mbedtls/repo/tests/
DDescriptions.txt16 For each ciphersuite/version/side/authmode it performs a full handshake
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ssl.data94 Test moving clients handshake to state: HELLO_REQUEST
97 Test moving clients handshake to state: CLIENT_HELLO
100 Test moving clients handshake to state: SERVER_HELLO
103 Test moving clients handshake to state: SERVER_CERTIFICATE
106 Test moving clients handshake to state: SERVER_KEY_EXCHANGE
109 Test moving clients handshake to state: CERTIFICATE_REQUEST
112 Test moving clients handshake to state: SERVER_HELLO_DONE
115 Test moving clients handshake to state: CLIENT_CERTIFICATE
118 Test moving clients handshake to state: CLIENT_KEY_EXCHANGE
121 Test moving clients handshake to state: CERTIFICATE_VERIFY
[all …]
Dtest_suite_ssl.function989 * This function moves ssl handshake from \p ssl to prescribed \p state.
1011 /* If /p second_ssl ends the handshake procedure before /p ssl then
1681 /* forced_ciphersuite needs to last until the end of the handshake */
1979 /* After calling this function for the server, it only sends a handshake
4335 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake";
4352 /* Test if the server received a fragmented handshake */
4357 /* Test if the client received a fragmented handshake */
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog389 dropped. As a consequence, the TLS handshake now fails when the output
744 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes,
767 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes,
1086 * Zeroize memory used for buffering or reassembling handshake messages
1148 * Add support for fragmentation of outgoing DTLS handshake messages. This
1153 handshake when flights do not get through (RFC 6347, section 4.1.1.1,
1157 * Add support for buffering out-of-order handshake messages in DTLS.
1180 * Fix a bug that caused SSL/TLS clients to incorrectly abort the handshake
1201 * Add support for buffering of out-of-order handshake messages.
1529 In the context of SSL, this resulted in handshake failure. Reported by
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/
Dssl_server2.c3615 goto handshake; in main()
3698 handshake: in main()