/third_party/openssl/ssl/ |
D | ssl_asn1.c | 36 ASN1_OCTET_STRING *psk_identity; member 63 ASN1_EXP_OPT(SSL_SESSION_ASN1, psk_identity, ASN1_OCTET_STRING, 8), 122 ASN1_OCTET_STRING psk_identity, psk_identity_hint; in i2d_SSL_SESSION() local 180 ssl_session_sinit(&as.psk_identity, &psk_identity, in->psk_identity); in i2d_SSL_SESSION() 325 if (!ssl_session_strndup(&ret->psk_identity, as->psk_identity)) in d2i_SSL_SESSION()
|
D | ssl_txt.c | 87 if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0) in SSL_SESSION_print()
|
D | ssl_sess.c | 122 dest->psk_identity = NULL; in ssl_session_dup() 166 if (src->psk_identity) { in ssl_session_dup() 167 dest->psk_identity = OPENSSL_strdup(src->psk_identity); in ssl_session_dup() 168 if (dest->psk_identity == NULL) { in ssl_session_dup() 769 OPENSSL_free(ss->psk_identity); in SSL_SESSION_free()
|
/third_party/openssl/test/ossl_shim/ |
D | ossl_shim.cc | 273 if (config->psk_identity.empty()) { in PskClientCallback() 279 strcmp(hint, config->psk_identity.c_str()) != 0) { in PskClientCallback() 285 if (config->psk_identity.size() >= max_identity_len || in PskClientCallback() 291 BUF_strlcpy(out_identity, config->psk_identity.c_str(), in PskClientCallback() 301 if (strcmp(identity, config->psk_identity.c_str()) != 0) { in PskServerCallback() 962 if (!config->psk_identity.empty() && in DoExchange() 963 !SSL_use_psk_identity_hint(ssl.get(), config->psk_identity.c_str())) { in DoExchange()
|
D | test_config.h | 49 std::string psk_identity; member
|
D | test_config.cc | 102 { "-psk-identity", &TestConfig::psk_identity },
|
/third_party/libcoap/src/ |
D | coap_tinydtls.c | 256 if (coap_session->psk_identity) { in get_psk_info() 257 coap_delete_bin_const(coap_session->psk_identity); in get_psk_info() 260 coap_session->psk_identity = coap_new_bin_const(psk_info->identity.s, identity_length); in get_psk_info() 300 if (coap_session->psk_identity) in get_psk_info() 301 coap_delete_bin_const(coap_session->psk_identity); in get_psk_info() 302 coap_session->psk_identity = coap_new_bin_const(id, id_len); in get_psk_info()
|
D | coap_session.c | 205 if (session->psk_identity) in coap_session_mfree() 206 coap_free(session->psk_identity); in coap_session_mfree() 1026 session->psk_identity = in coap_new_client_session_psk2() 1029 if (!session->psk_identity) { in coap_new_client_session_psk2()
|
D | coap_openssl.c | 465 if (c_session->psk_identity) { in coap_dtls_psk_client_callback() 466 coap_delete_bin_const(c_session->psk_identity); in coap_dtls_psk_client_callback() 469 c_session->psk_identity = coap_new_bin_const(psk_info->identity.s, identity_len); in coap_dtls_psk_client_callback() 518 if (c_session->psk_identity) in coap_dtls_psk_server_callback() 519 coap_delete_bin_const(c_session->psk_identity); in coap_dtls_psk_server_callback() 520 c_session->psk_identity = coap_new_bin_const((const uint8_t *)identity, in coap_dtls_psk_server_callback()
|
D | net.c | 308 if (session->psk_identity && session->psk_key) { in coap_get_session_client_psk() 309 if (session->psk_identity->length <= max_identity_len && in coap_get_session_client_psk() 311 memcpy(identity, session->psk_identity->s, session->psk_identity->length); in coap_get_session_client_psk() 313 *identity_len = session->psk_identity->length; in coap_get_session_client_psk()
|
D | coap_gnutls.c | 1815 if (c_session->psk_identity) in psk_server_callback() 1816 coap_delete_bin_const(c_session->psk_identity); in psk_server_callback() 1817 c_session->psk_identity = coap_new_bin_const((const uint8_t *)identity, in psk_server_callback()
|
/third_party/libcoap/include/coap3/ |
D | coap_session_internal.h | 91 coap_bin_const_t *psk_identity; /**< If client, this field contains the member
|
/third_party/mbedtls/library/ |
D | ssl_tls.c | 3788 if( conf->psk_identity != NULL ) in ssl_conf_remove_psk() 3790 mbedtls_free( conf->psk_identity ); in ssl_conf_remove_psk() 3791 conf->psk_identity = NULL; in ssl_conf_remove_psk() 3801 unsigned char const *psk_identity, in ssl_conf_set_psk_identity() argument 3805 if( psk_identity == NULL || in ssl_conf_set_psk_identity() 3812 conf->psk_identity = mbedtls_calloc( 1, psk_identity_len ); in ssl_conf_set_psk_identity() 3813 if( conf->psk_identity == NULL ) in ssl_conf_set_psk_identity() 3817 memcpy( conf->psk_identity, psk_identity, conf->psk_identity_len ); in ssl_conf_set_psk_identity() 3824 const unsigned char *psk_identity, size_t psk_identity_len ) in mbedtls_ssl_conf_psk() argument 3846 ret = ssl_conf_set_psk_identity( conf, psk_identity, psk_identity_len ); in mbedtls_ssl_conf_psk() [all …]
|
D | ssl_cli.c | 58 if( conf->psk_identity == NULL || in ssl_conf_has_static_psk() 78 if( conf->psk_identity == NULL || in ssl_conf_has_static_raw_psk() 3717 ssl->conf->psk_identity, in ssl_write_client_key_exchange()
|
D | ssl_srv.c | 155 if( conf->psk_identity_len == 0 || conf->psk_identity == NULL ) in ssl_conf_has_psk_or_cb() 3661 mbedtls_ct_memcmp( ssl->conf->psk_identity, *p, n ) != 0 ) in ssl_parse_client_psk_identity()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_client2.c | 470 const char *psk_identity; /* the pre-shared key identity */ member 838 opt.psk_identity = DFL_PSK_IDENTITY; in main() 996 opt.psk_identity = q; in main() 1929 (const unsigned char *) opt.psk_identity, in main() 1930 strlen( opt.psk_identity ) ) ) != 0 ) in main() 1942 (const unsigned char *) opt.psk_identity, in main() 1943 strlen( opt.psk_identity ) ); in main()
|
D | ssl_server2.c | 593 const char *psk_identity; /* the pre-shared key identity */ member 1519 opt.psk_identity = DFL_PSK_IDENTITY; in main() 1700 opt.psk_identity = q; in main() 2918 if( strlen( opt.psk ) != 0 && strlen( opt.psk_identity ) != 0 ) in main() 2932 (const unsigned char *) opt.psk_identity, in main() 2933 strlen( opt.psk_identity ) ) ) != 0 ) in main() 2945 (const unsigned char *) opt.psk_identity, in main() 2946 strlen( opt.psk_identity ) ); in main()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1401 unsigned char *MBEDTLS_PRIVATE(psk_identity); /*!< The PSK identity for PSK negotiation. 3004 const unsigned char *psk_identity, size_t psk_identity_len ); 3046 const unsigned char *psk_identity,
|
/third_party/openssl/apps/ |
D | s_server.c | 123 static char *psk_identity = "Client_identity"; variable 156 if (strcmp(identity, psk_identity) != 0) { in psk_server_cb() 158 " (got '%s' expected '%s')\n", identity, psk_identity); in psk_server_cb() 202 if (strlen(psk_identity) != identity_len in psk_find_session_cb() 203 || memcmp(psk_identity, identity, identity_len) != 0) { in psk_find_session_cb() 1411 psk_identity = opt_arg(); in s_server_main()
|
D | s_client.c | 116 static char *psk_identity = "Client_identity"; variable 142 ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity); in psk_client_cb() 232 *id = (unsigned char *)psk_identity; in psk_use_session_cb() 233 *idlen = strlen(psk_identity); in psk_use_session_cb() 1239 psk_identity = opt_arg(); in s_client_main()
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 2934 PACKET psk_identity; in tls_process_cke_psk_preamble() local 2936 if (!PACKET_get_length_prefixed_2(pkt, &psk_identity)) { in tls_process_cke_psk_preamble() 2941 if (PACKET_remaining(&psk_identity) > PSK_MAX_IDENTITY_LEN) { in tls_process_cke_psk_preamble() 2952 if (!PACKET_strndup(&psk_identity, &s->session->psk_identity)) { in tls_process_cke_psk_preamble() 2958 psklen = s->psk_server_callback(s, s->session->psk_identity, in tls_process_cke_psk_preamble()
|
D | statem_clnt.c | 2939 OPENSSL_free(s->session->psk_identity); in tls_construct_cke_psk_preamble() 2940 s->session->psk_identity = tmpidentity; in tls_construct_cke_psk_preamble()
|
/third_party/openssl/doc/man1/ |
D | s_server.pod | 158 [B<-psk_identity val>] 644 =item B<-psk_identity val>
|
D | s_client.pod | 85 [B<-psk_identity identity>] 456 =item B<-psk_identity identity>
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ssl.function | 1682 const char *psk_identity = "foo"; 1794 (const unsigned char *) psk_identity, 1795 strlen( psk_identity ) ) == 0 ); 1799 (const unsigned char *) psk_identity, 1800 strlen( psk_identity ) ) == 0 );
|