Home
last modified time | relevance | path

Searched refs:ciphersuite (Results 1 – 12 of 12) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_tls13_client.c671 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite) in ssl_tls13_get_ciphersuite_hash_alg() argument
674 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in ssl_tls13_get_ciphersuite_hash_alg()
700 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite); in ssl_tls13_early_data_has_valid_ticket()
716 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_identity()
735 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite); in ssl_tls13_ticket_get_psk()
1278 ssl->session_negotiate->ciphersuite); in mbedtls_ssl_tls13_finalize_client_hello()
1690 (cipher_suite != ssl->session_negotiate->ciphersuite)) { in ssl_tls13_parse_server_hello()
1981 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id; in ssl_tls13_postprocess_hrr()
2239 ssl->session_negotiate->ciphersuite) { in ssl_tls13_process_encrypted_extensions()
2264 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_process_encrypted_extensions()
[all …]
H A Dssl_tls13_keys.h517 int ciphersuite,
H A Dssl_tls13_server.c618 psk_ciphersuite_id = session.ciphersuite; in ssl_tls13_parse_pre_shared_key_ext()
1456 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id; in ssl_tls13_parse_client_hello()
1783 ssl->session_negotiate->ciphersuite = psk.ciphersuite_info->id; in ssl_tls13_parse_client_hello()
1849 ssl->session_negotiate->ciphersuite) { in ssl_tls13_check_early_data_requirements()
2326 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_tls13_write_server_hello_body()
2331 ssl->session_negotiate->ciphersuite), in ssl_tls13_write_server_hello_body()
2332 ssl->session_negotiate->ciphersuite)); in ssl_tls13_write_server_hello_body()
3225 session->ciphersuite = ciphersuite_info->id; in ssl_tls13_prepare_new_session_ticket()
H A Dssl_tls.c422 int ciphersuite,
1755 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite); in mbedtls_ssl_set_session()
1761 session->ciphersuite)); in mbedtls_ssl_set_session()
3160 return ssl->session->ciphersuite; in mbedtls_ssl_get_ciphersuite_id_from_ssl()
3169 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite); in mbedtls_ssl_get_ciphersuite()
4392 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 0); in ssl_session_save()
4483 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_session_load()
5391 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite); in ssl_context_load()
5402 ssl->session->ciphersuite, in ssl_context_load()
7262 ssl->session_negotiate->ciphersuite, in mbedtls_ssl_derive_keys()
[all …]
H A Dssl_tls13_keys.c926 int endpoint, int ciphersuite, in mbedtls_ssl_tls13_populate_transform() argument
953 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite); in mbedtls_ssl_tls13_populate_transform()
956 ciphersuite)); in mbedtls_ssl_tls13_populate_transform()
H A Dssl_tls12_server.c1636 ssl->session_negotiate->ciphersuite = ciphersuites[i]; in ssl_parse_client_hello()
1726 ssl->session_negotiate->ciphersuite); in ssl_write_encrypt_then_mac_ext()
2121 if (session->ciphersuite != session_tmp.ciphersuite) { in ssl_handle_id_based_session_resumption()
2284 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0); in ssl_write_server_hello()
2289 … mbedtls_ssl_get_ciphersuite_name(ssl->session_negotiate->ciphersuite))); in ssl_write_server_hello()
2328 mbedtls_ssl_ciphersuite_from_id(ssl->session_negotiate->ciphersuite); in ssl_write_server_hello()
H A Dssl_ciphersuites.c1862 const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite) in mbedtls_ssl_ciphersuite_from_id() argument
1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id()
H A Dssl_tls12_client.c1372 ssl->session_negotiate->ciphersuite != i || in ssl_parse_server_hello()
1380 ssl->session_negotiate->ciphersuite = i; in ssl_parse_server_hello()
1409 ssl->session_negotiate->ciphersuite) { in ssl_parse_server_hello()
1415 ssl->session_negotiate->ciphersuite); in ssl_parse_server_hello()
H A Dssl_misc.h1744 const mbedtls_ssl_ciphersuite_t *ciphersuite,
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dssl.h1302 int MBEDTLS_PRIVATE(ciphersuite); /*!< chosen ciphersuite */
2830 return session->MBEDTLS_PRIVATE(ciphersuite); in mbedtls_ssl_session_get_ciphersuite_id()
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog515 session-id length, and ciphersuite-id members of
517 Add new accessor to expose the ciphersuite-id of
1422 * Add accessor to obtain ciphersuite id from ssl context.
1423 * Add accessors to get members from ciphersuite info.
1522 mbedtls_pk_setup_opaque()) is provisioned, and a static ECDH ciphersuite
1628 * Ensure that TLS 1.2 ciphersuite/certificate and key selection takes into
2106 using a CCM-8 ciphersuite than a CBC ciphersuite with truncated HMAC.
3429 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
3588 * Add ecc extensions only if an ecc based ciphersuite is used.
3696 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,
[all …]
H A DREADME.md248 - `tests/compat.sh` tests interoperability of every ciphersuite with other implementations.