Home
last modified time | relevance | path

Searched refs:psk_identity (Results 1 - 25 of 36) sorted by relevance

12

/third_party/node/deps/openssl/openssl/ssl/
H A Dssl_asn1.c36 ASN1_OCTET_STRING *psk_identity; member
64 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8),
124 ASN1_OCTET_STRING psk_identity, psk_identity_hint;
184 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity);
332 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
H A Dssl_txt.c87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) in SSL_SESSION_print()
H A Dssl_sess.c180 dest->psk_identity = NULL; in ssl_session_dup()
228 if (src->psk_identity) { in ssl_session_dup()
229 dest->psk_identity = OPENSSL_strdup(src->psk_identity); in ssl_session_dup()
230 if (dest->psk_identity == NULL) { in ssl_session_dup()
845 OPENSSL_free(ss->psk_identity); in SSL_SESSION_free()
/third_party/openssl/ssl/
H A Dssl_asn1.c36 ASN1_OCTET_STRING *psk_identity; member
64 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8),
124 ASN1_OCTET_STRING psk_identity, psk_identity_hint;
184 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity);
332 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
H A Dssl_txt.c87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) in SSL_SESSION_print()
H A Dssl_sess.c190 dest->psk_identity = NULL; in ssl_session_dup_intern()
235 if (src->psk_identity) { in ssl_session_dup_intern()
236 dest->psk_identity = OPENSSL_strdup(src->psk_identity); in ssl_session_dup_intern()
237 if (dest->psk_identity == NULL) { in ssl_session_dup_intern()
879 OPENSSL_free(ss->psk_identity); in SSL_SESSION_free()
/third_party/libcoap/src/
H A Dcoap_session.c627 if (session->psk_identity) in coap_session_mfree()
628 coap_delete_bin_const(session->psk_identity); in coap_session_mfree()
1470 session->psk_identity = in coap_new_client_session_psk2()
1473 if (!session->psk_identity) { in coap_new_client_session_psk2()
1570 const coap_bin_const_t *psk_identity in coap_session_refresh_psk_identity()
1573 coap_bin_const_t *old_psk_identity = session->psk_identity; in coap_session_refresh_psk_identity()
1575 if (psk_identity && psk_identity->s) { in coap_session_refresh_psk_identity()
1576 if (session->psk_identity) { in coap_session_refresh_psk_identity()
1577 if (coap_binary_equal(session->psk_identity, psk_identit in coap_session_refresh_psk_identity()
1608 const coap_bin_const_t *psk_identity = NULL; coap_session_get_psk_identity() local
[all...]
H A Dcoap_tinydtls.c384 const coap_bin_const_t *psk_identity; in get_psk_info() local
428 psk_identity = &cpsk_info->identity; in get_psk_info()
432 psk_identity = NULL; in get_psk_info()
435 psk_identity = coap_get_session_client_psk_identity(coap_session); in get_psk_info()
437 if (psk_identity == NULL) { in get_psk_info()
442 if (psk_identity->length > result_length) { in get_psk_info()
443 coap_log_warn("psk_identity too large, truncated to %zd bytes\n", in get_psk_info()
447 result_length = psk_identity->length; in get_psk_info()
449 memcpy(result, psk_identity->s, result_length); in get_psk_info()
486 coap_log_debug("got psk_identity in get_psk_info()
[all...]
H A Dcoap_gnutls.c564 const coap_bin_const_t *psk_identity; in psk_client_callback() local
602 psk_identity = &cpsk_info->identity; in psk_client_callback()
605 psk_identity = coap_get_session_client_psk_identity(c_session); in psk_client_callback()
609 if (psk_identity == NULL || psk_key == NULL) { in psk_client_callback()
614 *username = gnutls_malloc(psk_identity->length+1); in psk_client_callback()
617 memcpy(*username, psk_identity->s, psk_identity->length); in psk_client_callback()
618 (*username)[psk_identity->length] = '\000'; in psk_client_callback()
1797 coap_log_debug("got psk_identity: '%.*s'\n", in psk_server_callback()
H A Dcoap_openssl.c507 const coap_bin_const_t *psk_identity; in coap_dtls_psk_client_callback() local
539 psk_identity = &cpsk_info->identity; in coap_dtls_psk_client_callback()
542 psk_identity = coap_get_session_client_psk_identity(c_session); in coap_dtls_psk_client_callback()
546 if (psk_identity == NULL || psk_key == NULL) { in coap_dtls_psk_client_callback()
555 if (psk_identity->length > max_identity_len) { in coap_dtls_psk_client_callback()
556 coap_log_warn("psk_identity too large, truncated to %d bytes\n", in coap_dtls_psk_client_callback()
560 max_identity_len = (unsigned int)psk_identity->length; in coap_dtls_psk_client_callback()
562 memcpy(identity, psk_identity->s, max_identity_len); in coap_dtls_psk_client_callback()
601 coap_log_debug("got psk_identity: '%.*s'\n", in coap_dtls_psk_server_callback()
H A Dcoap_mbedtls.c274 coap_log_debug("got psk_identity: '%.*s'\n", in psk_server_callback()
1149 const coap_bin_const_t *psk_identity; local
1154 psk_identity = coap_get_session_client_psk_identity(c_session);
1155 if (psk_key == NULL || psk_identity == NULL) {
1161 psk_key->length, psk_identity->s,
1162 psk_identity->length)) != 0) {
/third_party/libcoap/include/coap3/
H A Dcoap_session_internal.h118 coap_bin_const_t *psk_identity; /**< If client, this field contains the member
295 * Note: A copy of @p psk_identity is maintained in the session by libcoap.
298 * @param psk_identity If NULL, the pre-shared identity will revert to the
304 const coap_bin_const_t *psk_identity);
/third_party/mbedtls/programs/ssl/
H A Dssl_client2.c171 " psk_identity=%%s default: \"Client_identity\"\n"
489 const char *psk_identity; /* the pre-shared key identity */ member
938 opt.psk_identity = DFL_PSK_IDENTITY; in main()
1149 else if (strcmp(p, "psk_identity") == 0) { in main()
1150 opt.psk_identity = q; in main()
2000 (const unsigned char *) opt.psk_identity, in main()
2001 strlen(opt.psk_identity))) != 0) { in main()
2010 (const unsigned char *) opt.psk_identity, in main()
2011 strlen(opt.psk_identity)); in main()
H A Dssl_server2.c247 " psk_identity=%%s default: \"Client_identity\"\n"
636 const char *psk_identity; /* the pre-shared key identity */ member
1714 opt.psk_identity = DFL_PSK_IDENTITY; in main()
1958 else if (strcmp(p, "psk_identity") == 0) { in main()
1959 opt.psk_identity = q; in main()
3179 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main()
3190 (const unsigned char *) opt.psk_identity, in main()
3191 strlen(opt.psk_identity))) != 0) { in main()
3200 (const unsigned char *) opt.psk_identity, in main()
3201 strlen(opt.psk_identity)); in main()
[all...]
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c2013 const char *psk_identity = "foo"; in mbedtls_test_ssl_perform_handshake() local
2101 (const unsigned char *) psk_identity, in mbedtls_test_ssl_perform_handshake()
2102 strlen(psk_identity)) == 0); in mbedtls_test_ssl_perform_handshake()
2107 (const unsigned char *) psk_identity, in mbedtls_test_ssl_perform_handshake()
2108 strlen(psk_identity)) == 0); in mbedtls_test_ssl_perform_handshake()
/third_party/node/deps/openssl/openssl/apps/
H A Ds_server.c118 static char *psk_identity = "Client_identity"; variable
153 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb()
155 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb()
199 if (strlen(psk_identity) != identity_len in psk_find_session_cb()
200 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb()
894 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"},
1431 psk_identity = opt_arg(); in s_server_main()
H A Ds_client.c93 static char *psk_identity = "Client_identity"; variable
119 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); in psk_client_cb()
209 *id = (unsigned char *)psk_identity; in psk_use_session_cb()
210 *idlen = strlen(psk_identity); in psk_use_session_cb()
546 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"},
1160 psk_identity = opt_arg(); in s_client_main()
/third_party/openssl/apps/
H A Ds_server.c118 static char *psk_identity = "Client_identity"; variable
153 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb()
155 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb()
199 if (strlen(psk_identity) != identity_len in psk_find_session_cb()
200 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb()
894 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"},
1431 psk_identity = opt_arg(); in s_server_main()
H A Ds_client.c93 static char *psk_identity = "Client_identity"; variable
119 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); in psk_client_cb()
209 *id = (unsigned char *)psk_identity; in psk_use_session_cb()
210 *idlen = strlen(psk_identity); in psk_use_session_cb()
546 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"},
1160 psk_identity = opt_arg(); in s_client_main()
/third_party/mbedtls/include/mbedtls/
H A Dssl.h1604 unsigned char *MBEDTLS_PRIVATE(psk_identity); /*!< The PSK identity for PSK negotiation.
3617 * \param psk_identity The pointer to the pre-shared key identity.
3632 const unsigned char *psk_identity, size_t psk_identity_len);
3659 * \param psk_identity The pointer to the pre-shared key identity.
3674 const unsigned char *psk_identity,
/third_party/mbedtls/library/
H A Dssl_tls.c2113 if (conf->psk_identity == NULL || in mbedtls_ssl_conf_has_static_psk()
2148 if (conf->psk_identity != NULL) { in ssl_conf_remove_psk()
2149 mbedtls_free(conf->psk_identity); in ssl_conf_remove_psk()
2150 conf->psk_identity = NULL; in ssl_conf_remove_psk()
2161 unsigned char const *psk_identity, in ssl_conf_set_psk_identity()
2165 if (psk_identity == NULL || in ssl_conf_set_psk_identity()
2172 conf->psk_identity = mbedtls_calloc(1, psk_identity_len); in ssl_conf_set_psk_identity()
2173 if (conf->psk_identity == NULL) { in ssl_conf_set_psk_identity()
2178 memcpy(conf->psk_identity, psk_identity, con in ssl_conf_set_psk_identity()
2160 ssl_conf_set_psk_identity(mbedtls_ssl_config *conf, unsigned char const *psk_identity, size_t psk_identity_len) ssl_conf_set_psk_identity() argument
2183 mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len) mbedtls_ssl_conf_psk() argument
2305 mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf, mbedtls_svc_key_id_t psk, const unsigned char *psk_identity, size_t psk_identity_len) mbedtls_ssl_conf_psk_opaque() argument
[all...]
H A Dssl_tls13_server.c380 if (ssl->conf->psk_identity != NULL && in ssl_tls13_offered_psks_check_identity_match()
382 mbedtls_ct_memcmp(ssl->conf->psk_identity, in ssl_tls13_offered_psks_check_identity_match()
H A Dssl_tls12_server.c87 if (conf->psk_identity_len == 0 || conf->psk_identity == NULL) { in ssl_conf_has_psk_or_cb()
3638 mbedtls_ct_memcmp(ssl->conf->psk_identity, *p, n) != 0) { in ssl_parse_client_psk_identity()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_srvr.c2824 PACKET psk_identity; in tls_process_cke_psk_preamble() local
2826 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { in tls_process_cke_psk_preamble()
2830 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { in tls_process_cke_psk_preamble()
2839 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { in tls_process_cke_psk_preamble()
2844 psklen = s->psk_server_callback(s, s->session->psk_identity, in tls_process_cke_psk_preamble()
/third_party/openssl/ssl/statem/
H A Dstatem_srvr.c2803 PACKET psk_identity; in tls_process_cke_psk_preamble() local
2805 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { in tls_process_cke_psk_preamble()
2809 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { in tls_process_cke_psk_preamble()
2818 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { in tls_process_cke_psk_preamble()
2823 psklen = s->psk_server_callback(s, s->session->psk_identity, in tls_process_cke_psk_preamble()

Completed in 78 milliseconds

12