/openthread-latest/third_party/mbedtls/repo/tests/ |
D | Descriptions.txt | 14 GnuTLS (and ourselves!) for every common ciphersuite, in every TLS 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
D | generate_tls13_compat_tests.py | 68 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, argument 74 if ciphersuite: 75 self.add_ciphersuites(ciphersuite) 485 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | ssl_tls13_client.c | 669 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument 672 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg() 699 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 715 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 734 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk() 1272 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello() 1684 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello() 1975 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr() 2233 ssl->session_negotiate->ciphersuite) { in ssl_tls13_process_encrypted_extensions() 2258 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_process_encrypted_extensions() [all …]
|
D | ssl_tls13_keys.h | 517 int ciphersuite,
|
D | ssl_tls13_server.c | 619 psk_ciphersuite_id = session.ciphersuite; in ssl_tls13_parse_pre_shared_key_ext() 1445 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_parse_client_hello() 1772 ssl->session_negotiate->ciphersuite = psk.ciphersuite_info->id; in ssl_tls13_parse_client_hello() 1838 ssl->session_negotiate->ciphersuite) { in ssl_tls13_check_early_data_requirements() 2314 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body() 2319 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body() 2320 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body() 3213 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
|
D | ssl_tls.c | 417 int ciphersuite, 1764 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session() 1770 session->ciphersuite)); in mbedtls_ssl_set_session() 3099 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl() 3108 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite() 4331 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 0); in ssl_session_save() 4422 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_session_load() 5330 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load() 5341 ssl->session->ciphersuite, in ssl_context_load() 6349 const mbedtls_ssl_ciphersuite_t *ciphersuite, in mbedtls_ssl_check_cert_usage() argument [all …]
|
D | ssl_tls13_keys.c | 926 int endpoint, int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument 953 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform() 956 ciphersuite)); in mbedtls_ssl_tls13_populate_transform()
|
D | ssl_tls12_server.c | 1656 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello() 1746 ssl->session_negotiate->ciphersuite); in ssl_write_encrypt_then_mac_ext() 2141 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption() 2304 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_write_server_hello() 2309 … mbedtls_ssl_get_ciphersuite_name(ssl->session_negotiate->ciphersuite))); in ssl_write_server_hello() 2348 mbedtls_ssl_ciphersuite_from_id(ssl->session_negotiate->ciphersuite); in ssl_write_server_hello()
|
D | ssl_ciphersuites.c | 1862 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument 1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
|
D | ssl_tls12_client.c | 1370 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello() 1378 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello() 1407 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello() 1413 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello()
|
D | ssl_misc.h | 1687 const mbedtls_ssl_ciphersuite_t *ciphersuite,
|
/openthread-latest/src/cli/ |
D | README_COAPS.md | 11 ### Configure DTLS ciphersuite. 192 Set DTLS ciphersuite to `TLS_PSK_WITH_AES_128_CCM_8`. 296 Set DTLS ciphersuite to `TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8`.
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl.h | 1252 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */ 2726 return session->MBEDTLS_PRIVATE(ciphersuite); in mbedtls_ssl_session_get_ciphersuite_id()
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 1687 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls12_populate_session() 1793 session->ciphersuite = 0xabcd; in mbedtls_test_ssl_tls13_populate_session() 2179 TEST_EQUAL(server.ssl.session->ciphersuite, in mbedtls_test_ssl_perform_handshake()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.function | 1829 void ssl_tls13_record_protection(int ciphersuite, 1879 ciphersuite, &keys, NULL) == 0); 1882 ciphersuite, &keys, NULL) == 0); 2038 TEST_ASSERT(original.ciphersuite == restored.ciphersuite); 2096 TEST_ASSERT(original.ciphersuite == restored.ciphersuite);
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 128 session-id length, and ciphersuite-id members of 130 Add new accessor to expose the ciphersuite-id of 1034 * Add accessor to obtain ciphersuite id from ssl context. 1035 * Add accessors to get members from ciphersuite info. 1134 mbedtls_pk_setup_opaque()) is provisioned, and a static ECDH ciphersuite 1240 * Ensure that TLS 1.2 ciphersuite/certificate and key selection takes into 1718 using a CCM-8 ciphersuite than a CBC ciphersuite with truncated HMAC. 3041 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker 3200 * Add ecc extensions only if an ecc based ciphersuite is used. 3308 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously, [all …]
|
D | README.md | 248 - `tests/compat.sh` tests interoperability of every ciphersuite with other implementations.
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | 3.0-migration-guide.md | 684 CCM-8 ciphersuite. 827 If you were using a ciphersuite without encryption, you just have to
|
/openthread-latest/third_party/mbedtls/repo/docs/proposed/ |
D | psa-driver-interface.md | 599 - if there is a transparent driver for the specified ciphersuite, the core calls that driver's `"pa…
|