/openthread-3.7.0/src/cli/ |
D | README_COAPS.md | 20 > coaps psk <your-psk> <your-psk-id> 94 - [psk](#psk-psk-pskid) 116 psk 190 ### psk \<psk\> \<pskid\> 194 - psk: pre-shared key 198 > coaps psk 123 pskid
|
/openthread-3.7.0/third_party/mbedtls/repo/programs/fuzz/ |
D | fuzz_client.c | 22 const unsigned char psk[] = { variable 100 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 24 const unsigned char psk[] = { variable 159 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in LLVMFuzzerTestOneInput()
|
/openthread-3.7.0/third_party/mbedtls/repo/library/ |
D | ssl_tls13_server.c | 384 ret = mbedtls_ssl_set_hs_psk(ssl, ssl->conf->psk, ssl->conf->psk_len); in ssl_tls13_offered_psks_check_identity_match() 413 unsigned char *psk; in ssl_tls13_offered_psks_check_binder_match() local 429 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in ssl_tls13_offered_psks_check_binder_match() 435 psk, psk_len, psk_type, in ssl_tls13_offered_psks_check_binder_match() 439 mbedtls_free((void *) psk); in ssl_tls13_offered_psks_check_binder_match() 523 struct psk_attributes *psk) in ssl_tls13_parse_pre_shared_key_ext() argument 603 &psk->type, &session); in ssl_tls13_parse_pre_shared_key_ext() 610 switch (psk->type) { in ssl_tls13_parse_pre_shared_key_ext() 631 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE; in ssl_tls13_parse_pre_shared_key_ext() 636 psk->key_exchange_mode = MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL; in ssl_tls13_parse_pre_shared_key_ext() [all …]
|
D | ssl_tls13_keys.c | 836 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument 871 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1281 unsigned char *psk = NULL; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1292 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1301 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1305 mbedtls_free((void *) psk); in mbedtls_ssl_tls13_key_schedule_stage_early() 1841 unsigned char **psk, in mbedtls_ssl_tls13_export_handshake_psk() argument 1849 *psk = NULL; in mbedtls_ssl_tls13_export_handshake_psk() 1861 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1862 if (*psk == NULL) { in mbedtls_ssl_tls13_export_handshake_psk() [all …]
|
D | ssl_tls13_client.c | 724 const unsigned char **psk, in ssl_tls13_ticket_get_psk() argument 735 *psk = session->resumption_key; in ssl_tls13_ticket_get_psk() 762 const unsigned char **psk, in ssl_tls13_psk_get_psk() argument 771 *psk = ssl->conf->psk; in ssl_tls13_psk_get_psk() 828 const unsigned char *psk, in ssl_tls13_write_binder() argument 858 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1004 const unsigned char *psk; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1015 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1019 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1028 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() [all …]
|
D | ssl_tls13_keys.h | 482 unsigned char const *psk, size_t psk_len, 645 unsigned char **psk,
|
D | ssl_misc.h | 816 unsigned char *psk; /*!< PSK from the callback */ member 1543 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument 1545 if (ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0) { in mbedtls_ssl_get_psk() 1546 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1548 } else if (ssl->conf->psk != NULL && ssl->conf->psk_len > 0) { in mbedtls_ssl_get_psk() 1549 *psk = ssl->conf->psk; in mbedtls_ssl_get_psk() 1552 *psk = NULL; in mbedtls_ssl_get_psk()
|
D | ssl_tls.c | 2124 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2141 if (conf->psk != NULL) { in ssl_conf_remove_psk() 2142 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2143 conf->psk = NULL; in ssl_conf_remove_psk() 2184 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument 2195 if (psk == NULL) { in mbedtls_ssl_conf_psk() 2205 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2209 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2233 if (ssl->handshake->psk != NULL) { in ssl_remove_psk() 2234 mbedtls_zeroize_and_free(ssl->handshake->psk, in ssl_remove_psk() [all …]
|
D | ssl_tls12_server.c | 98 if (conf->psk != NULL && conf->psk_len != 0) { in ssl_conf_has_psk_or_cb()
|
/openthread-3.7.0/third_party/mbedtls/repo/programs/ssl/ |
D | mini_client.c | 65 const unsigned char psk[] = { variable 193 mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk), in main()
|
D | ssl_client2.c | 488 const char *psk; /* the pre-shared key */ member 788 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 931 opt.psk = DFL_PSK; in main() 1137 opt.psk = q; in main() 1467 if (strlen(opt.psk)) { in main() 1468 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 1469 opt.psk, &psk_len) != 0) { in main() 1478 if (opt.psk == NULL) { in main() 1993 status = psa_import_key(&key_attributes, psk, psk_len, &slot); in main() 2009 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
|
D | ssl_server2.c | 635 const char *psk; /* the pre-shared key */ member 1312 unsigned char *psk, in psa_setup_psk_key_slot() argument 1323 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1519 unsigned char psk[MBEDTLS_PSK_MAX_LEN]; in main() local 1706 opt.psk = DFL_PSK; in main() 1944 opt.psk = q; in main() 2344 if (strlen(opt.psk) == 0) { in main() 2444 if (mbedtls_test_unhexify(psk, sizeof(psk), in main() 2445 opt.psk, &psk_len) != 0) { in main() 3179 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main() [all …]
|
/openthread-3.7.0/third_party/mbedtls/repo/scripts/ |
D | footprint.sh | 106 doit psk configs/config-ccm-psk-tls1_2.h
|
/openthread-3.7.0/third_party/tcplp/bsdtcp/ |
D | tcp_fastopen.c | 244 uint8_t psk[TCP_FASTOPEN_MAX_PSKS][TCP_FASTOPEN_KEY_LEN]; 530 tcp_fastopen_addpsk_locked(uint8_t *psk) 536 memcpy(V_tcp_fastopen_keys.psk[V_tcp_fastopen_keys.newest_psk], psk, 590 tcp_fastopen_make_psk_cookie(uint8_t *psk, uint8_t *cookie, uint8_t cookie_len) 596 SipHash_SetKey(&ctx, psk); 614 V_tcp_fastopen_keys.psk[psk_index],
|
/openthread-3.7.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl.h | 1594 unsigned char *MBEDTLS_PRIVATE(psk); /*!< The raw pre-shared key. This field should 3631 const unsigned char *psk, size_t psk_len, 3673 mbedtls_svc_key_id_t psk, 3695 const unsigned char *psk, size_t psk_len); 3719 mbedtls_svc_key_id_t psk);
|
/openthread-3.7.0/src/ncp/ |
D | ncp_base_ftd.cpp | 766 const char *psk; in HandlePropertyInsert() local 791 SuccessOrExit(error = mDecoder.ReadUtf8(psk)); in HandlePropertyInsert() 795 error = otCommissionerAddJoinerWithDiscerner(mInstance, &discerner, psk, timeout); in HandlePropertyInsert() 799 error = otCommissionerAddJoiner(mInstance, eui64, psk, timeout); in HandlePropertyInsert()
|
D | ncp_base_mtd.cpp | 1530 const uint8_t *psk; in DecodeOperationalDataset() local 1533 SuccessOrExit(error = mDecoder.ReadData(psk, len)); in DecodeOperationalDataset() 1535 memcpy(aDataset.mPskc.m8, psk, OT_PSKC_MAX_SIZE); in DecodeOperationalDataset() 1747 const char *psk = nullptr; in HandlePropertySet() local 1762 SuccessOrExit(error = mDecoder.ReadUtf8(psk)); in HandlePropertySet() 1809 …error = otJoinerStart(mInstance, psk, provisioningUrl, vendorName, vendorModel, vendorSwVersion, v… in HandlePropertySet()
|
/openthread-3.7.0/tests/scripts/thread-cert/ |
D | node.py | 1019 def commissioner_add_joiner(self, addr, psk): argument 1020 cmd = 'commissioner joiner add %s %s' % (addr, psk) 3077 def coaps_start_psk(self, psk, pskIdentity): argument 3078 cmd = 'coaps psk %s %s' % (psk, pskIdentity)
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/ |
D | 3.0-migration-guide.md | 809 calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times 813 users calling `mbedtls_ssl_conf_[opaque_]psk()` multiple times should
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.function | 1796 data_t *psk, 1815 psk->x, psk->len,
|
D | test_suite_ssl.data | 471 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, no psk
|
/openthread-3.7.0/tools/otci/otci/ |
D | otci.py | 1501 def joiner_start(self, psk: str, provisioning_url: Optional[str] = None):
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/ |
D | ssl-opt.sh | 532 *[-_\ =]psk*|*[-_\ =]PSK*)
|
/openthread-3.7.0/third_party/mbedtls/repo/ |
D | ChangeLog | 399 and the ephemeral or psk-ephemeral key exchange mode are enabled. 1534 * Modify semantics of `mbedtls_ssl_conf_[opaque_]psk()`: 1537 `mbedtls_ssl_conf_[opaque_]psk()` more than once will fail,
|