Home
last modified time | relevance | path

Searched refs:peer (Results 1 – 5 of 5) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpsa_crypto_pake.c160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local
196 peer = mbedtls_calloc(1, peer_len); in mbedtls_psa_pake_setup()
197 if (peer == NULL) { in mbedtls_psa_pake_setup()
214 status = psa_crypto_driver_pake_get_peer(inputs, peer, in mbedtls_psa_pake_setup()
241 memcmp(peer, jpake_server_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
245 memcmp(peer, jpake_client_id, actual_peer_len) == 0) { in mbedtls_psa_pake_setup()
261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
H A Dpsa_crypto.c8668 memcpy(peer_id, inputs->peer, inputs->peer_len); in psa_crypto_driver_pake_get_peer()
8851 operation->data.inputs.peer = mbedtls_calloc(1, peer_id_len); in psa_pake_set_peer()
8852 if (operation->data.inputs.peer == NULL) { in psa_pake_set_peer()
8859 memcpy(operation->data.inputs.peer, peer_id, peer_id_len); in psa_pake_set_peer()
8959 mbedtls_free(inputs.peer); in psa_pake_complete_inputs()
9271 if (operation->data.inputs.peer != NULL) { in psa_pake_abort()
9272 mbedtls_free(operation->data.inputs.peer); in psa_pake_abort()
H A Dssl_tls.c1974 const uint8_t *peer = NULL; in mbedtls_ssl_set_hs_ecjpake_password_common() local
1991 peer = jpake_client_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
1996 peer = jpake_server_id; in mbedtls_ssl_set_hs_ecjpake_password_common()
2005 status = psa_pake_set_peer(&ssl->handshake->psa_pake_ctx, peer, peer_len); in mbedtls_ssl_set_hs_ecjpake_password_common()
/optee_os/lib/libmbedtls/mbedtls/include/psa/
H A Dcrypto_extra.h1070 uint8_t *MBEDTLS_PRIVATE(peer);
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog580 tickets compared to peer using a millisecond clock (observed with GnuTLS).
879 * Fix the J-PAKE driver interface for user and peer to accept any values
1134 * Allow setting user and peer identifiers for EC J-PAKE operation
1597 * Fix a TLS 1.3 handshake failure when the peer Finished message has not
3175 incoming record with the correct connection data even after the peer has
3217 client programs to fail at the peer's certificate verification
3251 mbedtls_ssl_session structure which otherwise stores the peer's
3290 the peer CRT chain and session ticket twice.
3565 with the peer, as well as by a new per-connection MTU option, set using
3705 deep copy of the session, and the peer certificate is not lost. Fixes #926.
[all …]