Searched refs:ciphersuite (Results 1 – 12 of 12) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_tls13_client.c | 671 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument 674 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg() 700 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket() 716 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity() 735 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk() 1278 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello() 1690 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello() 1981 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr() 2239 ssl->session_negotiate->ciphersuite) { in ssl_tls13_process_encrypted_extensions() 2264 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_process_encrypted_extensions() [all …]
|
| H A D | ssl_tls13_keys.h | 517 int ciphersuite,
|
| H A D | ssl_tls13_server.c | 618 psk_ciphersuite_id = session.ciphersuite; in ssl_tls13_parse_pre_shared_key_ext() 1456 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_parse_client_hello() 1783 ssl->session_negotiate->ciphersuite = psk.ciphersuite_info->id; in ssl_tls13_parse_client_hello() 1849 ssl->session_negotiate->ciphersuite) { in ssl_tls13_check_early_data_requirements() 2326 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body() 2331 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body() 2332 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body() 3225 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
|
| H A D | ssl_tls.c | 422 int ciphersuite, 1755 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session() 1761 session->ciphersuite)); in mbedtls_ssl_set_session() 3160 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl() 3169 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite() 4392 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 0); in ssl_session_save() 4483 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_session_load() 5391 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load() 5402 ssl->session->ciphersuite, in ssl_context_load() 7262 ssl->session_negotiate->ciphersuite, in mbedtls_ssl_derive_keys() [all …]
|
| H A D | ssl_tls13_keys.c | 926 int endpoint, int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument 953 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform() 956 ciphersuite)); in mbedtls_ssl_tls13_populate_transform()
|
| H A D | ssl_tls12_server.c | 1636 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello() 1726 ssl->session_negotiate->ciphersuite); in ssl_write_encrypt_then_mac_ext() 2121 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption() 2284 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_write_server_hello() 2289 … mbedtls_ssl_get_ciphersuite_name(ssl->session_negotiate->ciphersuite))); in ssl_write_server_hello() 2328 mbedtls_ssl_ciphersuite_from_id(ssl->session_negotiate->ciphersuite); in ssl_write_server_hello()
|
| H A D | ssl_ciphersuites.c | 1862 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument 1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
|
| H A D | ssl_tls12_client.c | 1372 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello() 1380 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello() 1409 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello() 1415 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello()
|
| H A D | ssl_misc.h | 1744 const mbedtls_ssl_ciphersuite_t *ciphersuite,
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ssl.h | 1302 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */ 2830 return session->MBEDTLS_PRIVATE(ciphersuite); in mbedtls_ssl_session_get_ciphersuite_id()
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 515 session-id length, and ciphersuite-id members of 517 Add new accessor to expose the ciphersuite-id of 1422 * Add accessor to obtain ciphersuite id from ssl context. 1423 * Add accessors to get members from ciphersuite info. 1522 mbedtls_pk_setup_opaque()) is provisioned, and a static ECDH ciphersuite 1628 * Ensure that TLS 1.2 ciphersuite/certificate and key selection takes into 2106 using a CCM-8 ciphersuite than a CBC ciphersuite with truncated HMAC. 3429 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker 3588 * Add ecc extensions only if an ecc based ciphersuite is used. 3696 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously, [all …]
|
| H A D | README.md | 248 - `tests/compat.sh` tests interoperability of every ciphersuite with other implementations.
|