Searched refs:peer (Results 1 – 5 of 5) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 197 if (peer == NULL) { in mbedtls_psa_pake_setup() 214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup() 241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
| H A D | psa_crypto.c | 8668 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer() 8851 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer() 8852 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer() 8859 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer() 8959 mbedtls_free(inputs.peer); in psa_pake_complete_inputs() 9271 if (operation->data.inputs.peer != NULL) { in psa_pake_abort() 9272 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
|
| H A D | ssl_tls.c | 1974 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1991 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 1996 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 2005 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 1070 uint8_t *MBEDTLS_PRIVATE(peer);
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 580 tickets compared to peer using a millisecond clock (observed with GnuTLS). 879 * Fix the J-PAKE driver interface for user and peer to accept any values 1134 * Allow setting user and peer identifiers for EC J-PAKE operation 1597 * Fix a TLS 1.3 handshake failure when the peer Finished message has not 3175 incoming record with the correct connection data even after the peer has 3217 client programs to fail at the peer's certificate verification 3251 mbedtls_ssl_session structure which otherwise stores the peer's 3290 the peer CRT chain and session ticket twice. 3565 with the peer, as well as by a new per-connection MTU option, set using 3705 deep copy of the session, and the peer certificate is not lost. Fixes #926. [all …]
|