Lines Matching refs:ciphersuite

669 static psa_algorithm_t ssl_tls13_get_ciphersuite_hash_alg(int ciphersuite)
672 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(ciphersuite);
699 mbedtls_ssl_tls13_cipher_suite_is_offered(ssl, session->ciphersuite);
715 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite);
734 *hash_alg = ssl_tls13_get_ciphersuite_hash_alg(session->ciphersuite);
1116 1, ("Invalid ciphersuite for external psk."));
1260 * Early data are going to be encrypted using the ciphersuite
1264 * with a selected ciphersuite different from the ciphersuite
1268 * encrypted using a different ciphersuite than the one used for
1272 ssl->session_negotiate->ciphersuite);
1669 * Check whether this ciphersuite is valid and offered.
1679 * ciphersuite in this server hello is not the same as the one
1684 (cipher_suite != ssl->session_negotiate->ciphersuite)) {
1689 MBEDTLS_SSL_DEBUG_MSG(1, ("invalid ciphersuite(%04x) parameter",
1698 MBEDTLS_SSL_DEBUG_MSG(3, ("server hello, chosen ciphersuite: ( %04x ) - %s",
1975 ssl->session_negotiate->ciphersuite = ssl->handshake->ciphersuite_info->id;
2227 * - the selected ciphersuite for the handshake is the ciphersuite
2233 ssl->session_negotiate->ciphersuite) {
2250 * `ssl->session_negotiate->ciphersuite` still contains at this point the
2251 * identifier of the ciphersuite associated with the ticket. This is that
2253 * it to check that the ciphersuite selected for the handshake is the
2254 * ticket ciphersuite (see above). This information is not needed
2255 * anymore thus we can now set it to the identifier of the ciphersuite
2258 ssl->session_negotiate->ciphersuite = handshake->ciphersuite_info->id;
2951 ciphersuite_info = mbedtls_ssl_ciphersuite_from_id(session->ciphersuite);