Searched refs:peer (Results 1 – 5 of 5) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup() 197 if (peer == NULL) { in mbedtls_psa_pake_setup() 214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup() 241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
| H A D | psa_crypto.c | 8688 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer() 8871 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer() 8872 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer() 8879 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer() 8979 mbedtls_free(inputs.peer); in psa_pake_complete_inputs() 9291 if (operation->data.inputs.peer != NULL) { in psa_pake_abort() 9292 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
|
| H A D | ssl_tls.c | 1974 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local 1991 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 1996 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common() 2005 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
|
| /optee_os/lib/libmbedtls/mbedtls/include/psa/ |
| H A D | crypto_extra.h | 1097 uint8_t *MBEDTLS_PRIVATE(peer);
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 623 tickets compared to peer using a millisecond clock (observed with GnuTLS). 922 * Fix the J-PAKE driver interface for user and peer to accept any values 1177 * Allow setting user and peer identifiers for EC J-PAKE operation 1640 * Fix a TLS 1.3 handshake failure when the peer Finished message has not 3218 incoming record with the correct connection data even after the peer has 3260 client programs to fail at the peer's certificate verification 3294 mbedtls_ssl_session structure which otherwise stores the peer's 3333 the peer CRT chain and session ticket twice. 3608 with the peer, as well as by a new per-connection MTU option, set using 3748 deep copy of the session, and the peer certificate is not lost. Fixes #926. [all …]
|