/mbedtls-development/library/ |
A D | ssl_cli.c | 1017 ssl->handshake->resume == 0 ) in ssl_write_client_hello() 2122 ssl->handshake->resume = 0; in ssl_parse_server_hello() 2527 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_parse_server_ecdh_params_psa() local 2546 if( ( handshake->ecdh_psa_type = in ssl_parse_server_ecdh_params_psa() 2699 ssl->handshake->pmslen = 48; in ssl_write_encrypted_pms() 2915 if( ssl->handshake->ecrs_enabled && in ssl_parse_server_key_exchange() 2964 if( ssl->handshake->ecrs_enabled ) in ssl_parse_server_key_exchange() 3531 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_write_client_key_exchange() local 3856 ssl->handshake->premaster, 32, &ssl->handshake->pmslen, in ssl_write_client_key_exchange() 3972 if( ssl->handshake->ecrs_enabled ) in ssl_write_certificate_verify() [all …]
|
A D | ssl_tls13_keys.c | 570 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls13_key_schedule_stage_application() local 581 handshake->tls1_3_master_secrets.handshake, in mbedtls_ssl_tls13_key_schedule_stage_application() 909 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls1_3_key_schedule_stage_early() local 947 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls13_generate_handshake_keys() local 974 handshake->tls1_3_master_secrets.handshake, in mbedtls_ssl_tls13_generate_handshake_keys() 1000 handshake->randbytes, in mbedtls_ssl_tls13_generate_handshake_keys() 1008 handshake->randbytes, in mbedtls_ssl_tls13_generate_handshake_keys() 1048 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_tls13_key_schedule_stage_handshake() local 1095 handshake->tls1_3_master_secrets.handshake ); in mbedtls_ssl_tls13_key_schedule_stage_handshake() 1103 handshake->tls1_3_master_secrets.handshake, md_size ); in mbedtls_ssl_tls13_key_schedule_stage_handshake() [all …]
|
A D | ssl_tls.c | 1240 ret = handshake->tls_prf( handshake->premaster, handshake->pmslen, in ssl_compute_master() 1549 ssl->handshake->pmslen = p - ssl->handshake->premaster; in mbedtls_ssl_psk_derive_premaster() 2655 ssl->handshake = NULL; in mbedtls_ssl_handshake_wrapup_free_hs_transform() 3011 if( ssl->handshake ) in ssl_handshake_init() 3050 ssl->handshake = NULL; in ssl_handshake_init() 3855 memcpy( ssl->handshake->psk, psk, ssl->handshake->psk_len ); in mbedtls_ssl_set_hs_psk() 4436 if( ssl->handshake == NULL || ssl->handshake->mtu == 0 ) in mbedtls_ssl_get_current_mtu() 5443 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in mbedtls_ssl_handshake_free() local 5445 if( handshake == NULL ) in mbedtls_ssl_handshake_free() 5505 mbedtls_platform_zeroize( handshake->psk, handshake->psk_len ); in mbedtls_ssl_handshake_free() [all …]
|
A D | ssl_srv.c | 343 if( ssl->handshake->curves != NULL ) in ssl_parse_supported_elliptic_curves() 364 ssl->handshake->curves = curves; in ssl_parse_supported_elliptic_curves() 659 ssl->handshake->resume = 1; in ssl_parse_session_ticket_ext() 996 ssl->handshake->key_cert = cur; in ssl_pick_cert() 1335 ssl->handshake->in_msg_seq++; in ssl_parse_client_hello() 2154 if( ( ssl->handshake->cli_exts & in ssl_write_supported_point_formats_ext() 2402 if( ssl->handshake->resume == 1 ) in ssl_handle_id_based_session_resumption() 2435 ssl->handshake->resume = 1; in ssl_handle_id_based_session_resumption() 2512 if( ssl->handshake->resume == 0 ) in ssl_write_server_hello() 3611 ssl->handshake->pmslen = 48; in ssl_parse_encrypted_pms() [all …]
|
A D | ssl_tls13_client.c | 310 MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx, in ssl_tls13_generate_and_write_ecdh_key_exchange() 392 group_id = ssl->handshake->offered_group_id; in ssl_tls13_write_key_share_ext() 459 ssl->handshake->offered_group_id = group_id; in ssl_tls13_write_key_share_ext() 480 grp_id = ssl->handshake->ecdh_ctx.grp.id; in ssl_tls13_check_ecdh_params() 482 grp_id = ssl->handshake->ecdh_ctx.grp_id; in ssl_tls13_check_ecdh_params() 497 MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx, in ssl_tls13_check_ecdh_params() 562 offered_group = ssl->handshake->offered_group_id; in ssl_tls13_parse_key_share_ext() 874 ssl->handshake->update_checksum( ssl, buf, msg_len ); in ssl_tls13_write_client_hello() 1132 ssl->handshake->ciphersuite_info = ciphersuite_info; in ssl_tls13_parse_server_hello() 1245 mbedtls_ssl_handshake_params *handshake = ssl->handshake; in ssl_tls13_finalize_server_hello() local [all …]
|
A D | ssl_msg.c | 264 ssl->handshake->mtu = 508; in ssl_double_retransmit_timeout() 2066 ssl->handshake->flight = msg; in ssl_flight_append() 2164 ssl->handshake->cur_msg = ssl->handshake->flight; in mbedtls_ssl_flight_transmit() 2165 ssl->handshake->cur_msg_p = ssl->handshake->flight->p + 12; in mbedtls_ssl_flight_transmit() 2324 ssl->handshake->flight = NULL; in mbedtls_ssl_recv_flight_completed() 2325 ssl->handshake->cur_msg = NULL; in mbedtls_ssl_recv_flight_completed() 2328 ssl->handshake->in_flight_start_seq = ssl->handshake->in_msg_seq; in mbedtls_ssl_recv_flight_completed() 2415 ssl->handshake == NULL ) in mbedtls_ssl_write_handshake_msg_ext() 2423 ssl->handshake != NULL && in mbedtls_ssl_write_handshake_msg_ext() 2859 if( ssl->handshake != NULL && in mbedtls_ssl_prepare_handshake_record() [all …]
|
A D | ssl_tls13_generic.c | 118 ssl->handshake->update_checksum( ssl, msg, msg_len ); in mbedtls_ssl_tls1_3_add_hs_msg_to_checksum() 133 ssl->handshake->update_checksum( ssl, hs_hdr, sizeof( hs_hdr ) ); in mbedtls_ssl_tls13_add_hs_hdr_to_checksum() 217 ssl->handshake->extensions_present |= MBEDTLS_SSL_EXT_SIG_ALG; in mbedtls_ssl_tls13_write_sig_alg_ext() 474 ssl->handshake->ciphersuite_info->mac, in mbedtls_ssl_tls13_process_certificate_verify() 702 if( ssl->handshake->sni_ca_chain != NULL ) in ssl_tls13_validate_certificate() 704 ca_chain = ssl->handshake->sni_ca_chain; in ssl_tls13_validate_certificate() 705 ca_crl = ssl->handshake->sni_ca_crl; in ssl_tls13_validate_certificate() 752 ssl->handshake->ciphersuite_info, in ssl_tls13_validate_certificate() 861 ssl->handshake->state_local.finished_in.digest, in ssl_tls13_preprocess_finished_message() 885 ssl->handshake->state_local.finished_in.digest; in ssl_tls13_parse_finished_message() [all …]
|
A D | ssl_misc.h | 766 unsigned char handshake[MBEDTLS_TLS1_3_MD_MAX_SIZE]; member 1213 if( ssl->handshake->psk != NULL && ssl->handshake->psk_len > 0 ) in mbedtls_ssl_get_psk() 1215 *psk = ssl->handshake->psk; in mbedtls_ssl_get_psk() 1216 *psk_len = ssl->handshake->psk_len; in mbedtls_ssl_get_psk() 1247 return( ssl->handshake->psk_opaque ); in mbedtls_ssl_get_opaque_psk() 1299 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_key() 1300 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_key() 1311 if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) in mbedtls_ssl_own_cert() 1312 key_cert = ssl->handshake->key_cert; in mbedtls_ssl_own_cert() 1732 if( ( ssl->handshake != NULL ) && ( ssl->handshake->group_list != NULL ) ) in mbedtls_ssl_get_groups() [all …]
|
/mbedtls-development/docs/ |
A D | use-psa-crypto.md | 81 exchanges will result in a handshake failure with the handshake function 136 ### TLS: handshake hashes and PRF computed with PSA 139 - the running handshake hashes;
|
A D | 3.0-migration-guide.md | 756 handshake transcript hashes which can be obtained from the raw data
|
/mbedtls-development/tests/ |
A D | Descriptions.txt | 16 For each ciphersuite/version/side/authmode it performs a full handshake
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 54 encompassing low-level details such as record parsing, handshake reassembly, and 93 message. In practice, this means that the handshake will fail if the MVP 99 message, it aborts the handshake with an handshake_failure closure alert 151 re-initiate a server handshake. 223 handshake fails due to incompatibility with the capabilities of the 356 writing TLS handshake message) there is no need to define a macro for it.
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ssl.data | 106 Test moving clients handshake to state: HELLO_REQUEST 109 Test moving clients handshake to state: CLIENT_HELLO 112 Test moving clients handshake to state: SERVER_HELLO 139 Test moving clients handshake to state: CLIENT_FINISHED 148 Test moving clients handshake to state: FLUSH_BUFFERS 154 Test moving clients handshake to state: HANDSHAKE_OVER 157 Test moving servers handshake to state: HELLO_REQUEST 160 Test moving servers handshake to state: CLIENT_HELLO 163 Test moving servers handshake to state: SERVER_HELLO 199 Test moving servers handshake to state: FLUSH_BUFFERS [all …]
|
A D | test_suite_ssl.function | 995 * This function moves ssl handshake from \p ssl to prescribed \p state. 1017 /* If /p second_ssl ends the handshake procedure before /p ssl then 1677 /* forced_ciphersuite needs to last until the end of the handshake */ 1971 /* After calling this function for the server, it only sends a handshake 4563 srv_pattern.pattern = cli_pattern.pattern = "found fragmented DTLS handshake"; 4580 /* Test if the server received a fragmented handshake */ 4585 /* Test if the client received a fragmented handshake */ 4909 TEST_ASSERT( ssl.handshake != NULL && ssl.handshake->group_list != NULL ); 4912 …TEST_EQUAL( ssl.handshake->group_list[ARRAY_LENGTH( iana_tls_group_list ) - 1], MBEDTLS_SSL_IANA_T… 4915 TEST_EQUAL( iana_tls_group_list[i], ssl.handshake->group_list[i] );
|
/mbedtls-development/ |
A D | ChangeLog | 462 * during the TLS handshake. 1662 * Zeroize memory used for buffering or reassembling handshake messages 1733 * Add support for buffering out-of-order handshake messages in DTLS. 1777 * Add support for buffering of out-of-order handshake messages. 2288 * Fix handling of handshake messages in mbedtls_ssl_read() in case 2294 * Add size-checks for record and handshake message content, securing 2353 (the default), the handshake was correctly aborted). 2856 handshake with the same context. (See RFC 6347 section 4.2.8.) 3793 "triple handshake" attack when authentication mode is optional (the 4261 after the handshake. [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | ssl.h | 1486 mbedtls_ssl_handshake_params *MBEDTLS_PRIVATE(handshake); /*!< params required only during
|
/mbedtls-development/programs/ssl/ |
A D | ssl_server2.c | 3088 goto handshake; in main() 3171 handshake: in main()
|