Lines Matching refs:ciphersuite
417 int ciphersuite,
1764 mbedtls_ssl_ciphersuite_from_id(session->ciphersuite);
1769 MBEDTLS_SSL_DEBUG_MSG(4, ("%d is not a valid TLS 1.3 ciphersuite.",
1770 session->ciphersuite));
3099 return ssl->session->ciphersuite;
3108 return mbedtls_ssl_get_ciphersuite_name(ssl->session->ciphersuite);
4276 * uint16_t ciphersuite;
4323 * TLS version identifier, endpoint, ciphersuite
4327 + 2; /* ciphersuite */
4331 MBEDTLS_PUT_UINT16_BE(session->ciphersuite, p, 0);
4415 * TLS version identifier, endpoint, ciphersuite
4422 session->ciphersuite = MBEDTLS_GET_UINT16_BE(p, 0);
5085 /* We must be using an AEAD ciphersuite */
5330 prf_func = ssl_tls12prf_from_cs(ssl->session->ciphersuite);
5341 ssl->session->ciphersuite,
6349 const mbedtls_ssl_ciphersuite_t *ciphersuite,
6360 switch (ciphersuite->key_exchange) {
6959 * - hash associated with the ciphersuite (only used by TLS 1.2)
7238 ssl->session_negotiate->ciphersuite,
7613 * ciphersuite if we don't have a certificate. */
8542 * ciphersuite does this (and this is unlikely to change as activity has
8724 * Helper to get TLS 1.2 PRF from ciphersuite
8776 * - [in] ciphersuite
8790 int ciphersuite,
8849 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite);
8851 MBEDTLS_SSL_DEBUG_MSG(1, ("ciphersuite info for %d not found",
8852 ciphersuite));
8930 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite = %s",
8931 mbedtls_ssl_get_ciphersuite_name(ciphersuite)));
9530 /* Don't suggest PSK-based ciphersuite if no PSK is available. */