Lines Matching refs:ciphersuite

683  * Try picking a certificate for this ciphersuite,
719 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite requires certificate"));
791 * Check if a given ciphersuite is suitable for use with our config/keys/etc
810 MBEDTLS_SSL_DEBUG_MSG(3, ("trying ciphersuite: %#04x (%s)",
815 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: version"));
822 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: ecjpake "
834 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: "
841 /* If the ciphersuite requires a pre-shared key and we don't
845 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no pre-shared key"));
852 * Final check: if ciphersuite requires us to have a
855 * - try the next ciphersuite if we don't
859 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: "
866 /* If the ciphersuite requires signing, check whether
872 MBEDTLS_SSL_DEBUG_MSG(3, ("ciphersuite mismatch: no suitable hash algorithm "
1138 * .. . .. ciphersuite list length (2 bytes)
1139 * .. . .. ciphersuite list
1591 * Search for a matching ciphersuite
1654 MBEDTLS_SSL_DEBUG_MSG(2, ("selected ciphersuite: %s", ciphersuite_info->name));
1656 ssl->session_negotiate->ciphersuite = ciphersuites[i];
1742 * with Associated Data (AEAD) ciphersuite, it MUST NOT send an
1746 ssl->session_negotiate->ciphersuite);
2141 if (session->ciphersuite != session_tmp.ciphersuite) {
2290 * 39+n . 40+n chosen ciphersuite
2304 MBEDTLS_PUT_UINT16_BE(ssl->session_negotiate->ciphersuite, p, 0);
2308 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen ciphersuite: %s",
2309 mbedtls_ssl_get_ciphersuite_name(ssl->session_negotiate->ciphersuite)));
2348 mbedtls_ssl_ciphersuite_from_id(ssl->session_negotiate->ciphersuite);
2818 * Part 1: Provide key exchange parameters for chosen ciphersuite.