/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_asn1.c | 36 ASN1_OCTET_STRING *psk_identity; member 64 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 124 ASN1_OCTET_STRING psk_identity, psk_identity_hint; 184 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); 332 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
|
H A D | ssl_txt.c | 87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) in SSL_SESSION_print()
|
H A D | ssl_sess.c | 180 dest->psk_identity = NULL; in ssl_session_dup() 228 if (src->psk_identity) { in ssl_session_dup() 229 dest->psk_identity = OPENSSL_strdup(src->psk_identity); in ssl_session_dup() 230 if (dest->psk_identity == NULL) { in ssl_session_dup() 845 OPENSSL_free(ss->psk_identity); in SSL_SESSION_free()
|
/third_party/openssl/ssl/ |
H A D | ssl_asn1.c | 36 ASN1_OCTET_STRING *psk_identity; member 64 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 124 ASN1_OCTET_STRING psk_identity, psk_identity_hint; 184 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); 332 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity))
|
H A D | ssl_txt.c | 87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) in SSL_SESSION_print()
|
H A D | ssl_sess.c | 190 dest->psk_identity = NULL; in ssl_session_dup_intern() 235 if (src->psk_identity) { in ssl_session_dup_intern() 236 dest->psk_identity = OPENSSL_strdup(src->psk_identity); in ssl_session_dup_intern() 237 if (dest->psk_identity == NULL) { in ssl_session_dup_intern() 879 OPENSSL_free(ss->psk_identity); in SSL_SESSION_free()
|
/third_party/libcoap/src/ |
H A D | coap_session.c | 627 if (session->psk_identity) in coap_session_mfree() 628 coap_delete_bin_const(session->psk_identity); in coap_session_mfree() 1470 session->psk_identity = in coap_new_client_session_psk2() 1473 if (!session->psk_identity) { in coap_new_client_session_psk2() 1570 const coap_bin_const_t *psk_identity in coap_session_refresh_psk_identity() 1573 coap_bin_const_t *old_psk_identity = session->psk_identity; in coap_session_refresh_psk_identity() 1575 if (psk_identity && psk_identity->s) { in coap_session_refresh_psk_identity() 1576 if (session->psk_identity) { in coap_session_refresh_psk_identity() 1577 if (coap_binary_equal(session->psk_identity, psk_identit in coap_session_refresh_psk_identity() 1608 const coap_bin_const_t *psk_identity = NULL; coap_session_get_psk_identity() local [all...] |
H A D | coap_tinydtls.c | 384 const coap_bin_const_t *psk_identity; in get_psk_info() local 428 psk_identity = &cpsk_info->identity; in get_psk_info() 432 psk_identity = NULL; in get_psk_info() 435 psk_identity = coap_get_session_client_psk_identity(coap_session); in get_psk_info() 437 if (psk_identity == NULL) { in get_psk_info() 442 if (psk_identity->length > result_length) { in get_psk_info() 443 coap_log_warn("psk_identity too large, truncated to %zd bytes\n", in get_psk_info() 447 result_length = psk_identity->length; in get_psk_info() 449 memcpy(result, psk_identity->s, result_length); in get_psk_info() 486 coap_log_debug("got psk_identity in get_psk_info() [all...] |
H A D | coap_gnutls.c | 564 const coap_bin_const_t *psk_identity; in psk_client_callback() local 602 psk_identity = &cpsk_info->identity; in psk_client_callback() 605 psk_identity = coap_get_session_client_psk_identity(c_session); in psk_client_callback() 609 if (psk_identity == NULL || psk_key == NULL) { in psk_client_callback() 614 *username = gnutls_malloc(psk_identity->length+1); in psk_client_callback() 617 memcpy(*username, psk_identity->s, psk_identity->length); in psk_client_callback() 618 (*username)[psk_identity->length] = '\000'; in psk_client_callback() 1797 coap_log_debug("got psk_identity: '%.*s'\n", in psk_server_callback()
|
H A D | coap_openssl.c | 507 const coap_bin_const_t *psk_identity; in coap_dtls_psk_client_callback() local 539 psk_identity = &cpsk_info->identity; in coap_dtls_psk_client_callback() 542 psk_identity = coap_get_session_client_psk_identity(c_session); in coap_dtls_psk_client_callback() 546 if (psk_identity == NULL || psk_key == NULL) { in coap_dtls_psk_client_callback() 555 if (psk_identity->length > max_identity_len) { in coap_dtls_psk_client_callback() 556 coap_log_warn("psk_identity too large, truncated to %d bytes\n", in coap_dtls_psk_client_callback() 560 max_identity_len = (unsigned int)psk_identity->length; in coap_dtls_psk_client_callback() 562 memcpy(identity, psk_identity->s, max_identity_len); in coap_dtls_psk_client_callback() 601 coap_log_debug("got psk_identity: '%.*s'\n", in coap_dtls_psk_server_callback()
|
H A D | coap_mbedtls.c | 274 coap_log_debug("got psk_identity: '%.*s'\n", in psk_server_callback() 1149 const coap_bin_const_t *psk_identity; local 1154 psk_identity = coap_get_session_client_psk_identity(c_session); 1155 if (psk_key == NULL || psk_identity == NULL) { 1161 psk_key->length, psk_identity->s, 1162 psk_identity->length)) != 0) {
|
/third_party/libcoap/include/coap3/ |
H A D | coap_session_internal.h | 118 coap_bin_const_t *psk_identity; /**< If client, this field contains the member 295 * Note: A copy of @p psk_identity is maintained in the session by libcoap. 298 * @param psk_identity If NULL, the pre-shared identity will revert to the 304 const coap_bin_const_t *psk_identity);
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_client2.c | 171 " psk_identity=%%s default: \"Client_identity\"\n" 489 const char *psk_identity; /* the pre-shared key identity */ member 938 opt.psk_identity = DFL_PSK_IDENTITY; in main() 1149 else if (strcmp(p, "psk_identity") == 0) { in main() 1150 opt.psk_identity = q; in main() 2000 (const unsigned char *) opt.psk_identity, in main() 2001 strlen(opt.psk_identity))) != 0) { in main() 2010 (const unsigned char *) opt.psk_identity, in main() 2011 strlen(opt.psk_identity)); in main()
|
H A D | ssl_server2.c | 247 " psk_identity=%%s default: \"Client_identity\"\n" 636 const char *psk_identity; /* the pre-shared key identity */ member 1714 opt.psk_identity = DFL_PSK_IDENTITY; in main() 1958 else if (strcmp(p, "psk_identity") == 0) { in main() 1959 opt.psk_identity = q; in main() 3179 if (strlen(opt.psk) != 0 && strlen(opt.psk_identity) != 0) { in main() 3190 (const unsigned char *) opt.psk_identity, in main() 3191 strlen(opt.psk_identity))) != 0) { in main() 3200 (const unsigned char *) opt.psk_identity, in main() 3201 strlen(opt.psk_identity)); in main() [all...] |
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 2013 const char *psk_identity = "foo"; in mbedtls_test_ssl_perform_handshake() local 2101 (const unsigned char *) psk_identity, in mbedtls_test_ssl_perform_handshake() 2102 strlen(psk_identity)) == 0); in mbedtls_test_ssl_perform_handshake() 2107 (const unsigned char *) psk_identity, in mbedtls_test_ssl_perform_handshake() 2108 strlen(psk_identity)) == 0); in mbedtls_test_ssl_perform_handshake()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | s_server.c | 118 static char *psk_identity = "Client_identity"; variable 153 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb() 155 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb() 199 if (strlen(psk_identity) != identity_len in psk_find_session_cb() 200 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb() 894 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"}, 1431 psk_identity = opt_arg(); in s_server_main()
|
H A D | s_client.c | 93 static char *psk_identity = "Client_identity"; variable 119 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); in psk_client_cb() 209 *id = (unsigned char *)psk_identity; in psk_use_session_cb() 210 *idlen = strlen(psk_identity); in psk_use_session_cb() 546 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"}, 1160 psk_identity = opt_arg(); in s_client_main()
|
/third_party/openssl/apps/ |
H A D | s_server.c | 118 static char *psk_identity = "Client_identity"; variable 153 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb() 155 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb() 199 if (strlen(psk_identity) != identity_len in psk_find_session_cb() 200 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb() 894 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"}, 1431 psk_identity = opt_arg(); in s_server_main()
|
H A D | s_client.c | 93 static char *psk_identity = "Client_identity"; variable 119 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); in psk_client_cb() 209 *id = (unsigned char *)psk_identity; in psk_use_session_cb() 210 *idlen = strlen(psk_identity); in psk_use_session_cb() 546 {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity"}, 1160 psk_identity = opt_arg(); in s_client_main()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ssl.h | 1604 unsigned char *MBEDTLS_PRIVATE(psk_identity); /*!< The PSK identity for PSK negotiation. 3617 * \param psk_identity The pointer to the pre-shared key identity. 3632 const unsigned char *psk_identity, size_t psk_identity_len); 3659 * \param psk_identity The pointer to the pre-shared key identity. 3674 const unsigned char *psk_identity,
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 2113 if (conf->psk_identity == NULL || in mbedtls_ssl_conf_has_static_psk() 2148 if (conf->psk_identity != NULL) { in ssl_conf_remove_psk() 2149 mbedtls_free(conf->psk_identity); in ssl_conf_remove_psk() 2150 conf->psk_identity = NULL; in ssl_conf_remove_psk() 2161 unsigned char const *psk_identity, in ssl_conf_set_psk_identity() 2165 if (psk_identity == NULL || in ssl_conf_set_psk_identity() 2172 conf->psk_identity = mbedtls_calloc(1, psk_identity_len); in ssl_conf_set_psk_identity() 2173 if (conf->psk_identity == NULL) { in ssl_conf_set_psk_identity() 2178 memcpy(conf->psk_identity, psk_identity, con in ssl_conf_set_psk_identity() 2160 ssl_conf_set_psk_identity(mbedtls_ssl_config *conf, unsigned char const *psk_identity, size_t psk_identity_len) ssl_conf_set_psk_identity() argument 2183 mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len) mbedtls_ssl_conf_psk() argument 2305 mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf, mbedtls_svc_key_id_t psk, const unsigned char *psk_identity, size_t psk_identity_len) mbedtls_ssl_conf_psk_opaque() argument [all...] |
H A D | ssl_tls13_server.c | 380 if (ssl->conf->psk_identity != NULL && in ssl_tls13_offered_psks_check_identity_match() 382 mbedtls_ct_memcmp(ssl->conf->psk_identity, in ssl_tls13_offered_psks_check_identity_match()
|
H A D | ssl_tls12_server.c | 87 if (conf->psk_identity_len == 0 || conf->psk_identity == NULL) { in ssl_conf_has_psk_or_cb() 3638 mbedtls_ct_memcmp(ssl->conf->psk_identity, *p, n) != 0) { in ssl_parse_client_psk_identity()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_srvr.c | 2824 PACKET psk_identity; in tls_process_cke_psk_preamble() local 2826 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { in tls_process_cke_psk_preamble() 2830 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { in tls_process_cke_psk_preamble() 2839 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { in tls_process_cke_psk_preamble() 2844 psklen = s->psk_server_callback(s, s->session->psk_identity, in tls_process_cke_psk_preamble()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_srvr.c | 2803 PACKET psk_identity; in tls_process_cke_psk_preamble() local 2805 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { in tls_process_cke_psk_preamble() 2809 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { in tls_process_cke_psk_preamble() 2818 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { in tls_process_cke_psk_preamble() 2823 psklen = s->psk_server_callback(s, s->session->psk_identity, in tls_process_cke_psk_preamble()
|