Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 5 of 5) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_pake.c160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local
196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup()
197 if (peer == NULL) { in mbedtls_psa_pake_setup()
214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup()
241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
H A Dpsa_crypto.c8688 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer()
8871 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer()
8872 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer()
8879 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer()
8979 mbedtls_free(inputs.peer); in psa_pake_complete_inputs()
9291 if (operation->data.inputs.peer != NULL) { in psa_pake_abort()
9292 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
H A Dssl_tls.c1974 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local
1991 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
1996 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
2005 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_extra.h1097 uint8_t *MBEDTLS_PRIVATE(peer);
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog623 tickets compared to peer using a millisecond clock (observed with GnuTLS).
922 * Fix the J-PAKE driver interface for user and peer to accept any values
1177 * Allow setting user and peer identifiers for EC J-PAKE operation
1640 * Fix a TLS 1.3 handshake failure when the peer Finished message has not
3218 incoming record with the correct connection data even after the peer has
3260 client programs to fail at the peer's certificate verification
3294 mbedtls_ssl_session structure which otherwise stores the peer's
3333 the peer CRT chain and session ticket twice.
3608 with the peer, as well as by a new per-connection MTU option, set using
3748 deep copy of the session, and the peer certificate is not lost. Fixes #926.
[all …]