| /third_party/libcoap/src/ |
| D | coap_openssl.c | 140 coap_dtls_pki_t setup_data; member 425 coap_dtls_cpsk_t *setup_data; in coap_dtls_psk_client_callback() local 434 setup_data = &c_session->cpsk_setup_data; in coap_dtls_psk_client_callback() 449 if (setup_data->validate_ih_call_back) { in coap_dtls_psk_client_callback() 454 setup_data->validate_ih_call_back(&lhint, in coap_dtls_psk_client_callback() 456 setup_data->ih_call_back_arg); in coap_dtls_psk_client_callback() 503 coap_dtls_spsk_t *setup_data; in coap_dtls_psk_server_callback() local 510 setup_data = &c_session->context->spsk_setup_data; in coap_dtls_psk_server_callback() 526 if (setup_data->validate_id_call_back) { in coap_dtls_psk_server_callback() 531 setup_data->validate_id_call_back(&lidentity, in coap_dtls_psk_server_callback() [all …]
|
| D | coap_gnutls.c | 118 coap_dtls_pki_t setup_data; member 242 const coap_dtls_pki_t* setup_data, in coap_dtls_context_set_pki() argument 248 if (!g_context || !setup_data) in coap_dtls_context_set_pki() 251 g_context->setup_data = *setup_data; in coap_dtls_context_set_pki() 252 if (!g_context->setup_data.verify_peer_cert) { in coap_dtls_context_set_pki() 254 g_context->setup_data.check_common_ca = 0; in coap_dtls_context_set_pki() 255 if (g_context->setup_data.is_rpk_not_cert) { in coap_dtls_context_set_pki() 257 g_context->setup_data.allow_self_signed = 0; in coap_dtls_context_set_pki() 258 g_context->setup_data.allow_expired_certs = 0; in coap_dtls_context_set_pki() 259 g_context->setup_data.cert_chain_validation = 0; in coap_dtls_context_set_pki() [all …]
|
| D | coap_mbedtls.c | 124 coap_dtls_pki_t setup_data; member 218 coap_dtls_spsk_t *setup_data; in psk_server_callback() local 229 setup_data = &c_session->context->spsk_setup_data; in psk_server_callback() 231 if (setup_data->validate_id_call_back) { in psk_server_callback() 236 setup_data->validate_id_call_back(&lidentity, in psk_server_callback() 238 setup_data->id_call_back_arg); in psk_server_callback() 306 coap_dtls_pki_t *setup_data = &m_context->setup_data; in cert_verify_callback_mbedtls() local 315 if (setup_data->allow_expired_certs) { in cert_verify_callback_mbedtls() 324 if (setup_data->allow_expired_certs) { in cert_verify_callback_mbedtls() 333 if (setup_data->allow_bad_md_hash) { in cert_verify_callback_mbedtls() [all …]
|
| D | coap_tinydtls.c | 33 coap_dtls_pki_t setup_data; member 381 if (t_context && t_context->setup_data.validate_cn_call_back) { in verify_ecdsa_key() 409 if (!t_context->setup_data.validate_cn_call_back(COAP_DTLS_RPK_CERT_CN, in verify_ecdsa_key() 410 buf, p-buf, c_session, 0, 1, t_context->setup_data.cn_call_back_arg)) { in verify_ecdsa_key() 974 const coap_dtls_pki_t* setup_data, in coap_dtls_context_set_pki() argument 984 if (!setup_data) in coap_dtls_context_set_pki() 986 if (setup_data->version != COAP_DTLS_PKI_SETUP_VERSION) in coap_dtls_context_set_pki() 988 if (!setup_data->is_rpk_not_cert) { in coap_dtls_context_set_pki() 1005 t_context->setup_data = *setup_data; in coap_dtls_context_set_pki() 1008 switch (setup_data->pki_key.key_type) { in coap_dtls_context_set_pki() [all …]
|
| D | coap_session.c | 993 coap_dtls_cpsk_t setup_data; in coap_new_client_session_psk() local 995 memset (&setup_data, 0, sizeof(setup_data)); in coap_new_client_session_psk() 998 setup_data.psk_info.identity.s = (const uint8_t *)identity; in coap_new_client_session_psk() 999 setup_data.psk_info.identity.length = strlen(identity); in coap_new_client_session_psk() 1003 setup_data.psk_info.key.s = key; in coap_new_client_session_psk() 1004 setup_data.psk_info.key.length = key_len; in coap_new_client_session_psk() 1008 proto, &setup_data); in coap_new_client_session_psk() 1016 coap_dtls_cpsk_t *setup_data in coap_new_client_session_psk2() argument 1024 session->cpsk_setup_data = *setup_data; in coap_new_client_session_psk2() 1025 if (setup_data->psk_info.identity.s) { in coap_new_client_session_psk2() [all …]
|
| D | coap_notls.c | 37 const coap_dtls_pki_t* setup_data COAP_UNUSED, in coap_dtls_context_set_pki() 53 coap_dtls_cpsk_t* setup_data COAP_UNUSED in coap_dtls_context_set_cpsk() 60 coap_dtls_spsk_t* setup_data COAP_UNUSED in coap_dtls_context_set_spsk()
|
| D | net.c | 392 coap_dtls_spsk_t setup_data; in coap_context_set_psk() local 394 memset (&setup_data, 0, sizeof(setup_data)); in coap_context_set_psk() 396 setup_data.psk_info.hint.s = (const uint8_t *)hint; in coap_context_set_psk() 397 setup_data.psk_info.hint.length = strlen(hint); in coap_context_set_psk() 401 setup_data.psk_info.key.s = key; in coap_context_set_psk() 402 setup_data.psk_info.key.length = key_len; in coap_context_set_psk() 405 return coap_context_set_psk2(ctx, &setup_data); in coap_context_set_psk() 409 coap_dtls_spsk_t *setup_data in coap_context_set_psk2() argument 411 if (!setup_data) in coap_context_set_psk2() 414 ctx->spsk_setup_data = *setup_data; in coap_context_set_psk2() [all …]
|
| /third_party/libcoap/include/coap3/ |
| D | coap_dtls_internal.h | 57 coap_dtls_spsk_t *setup_data); 72 coap_dtls_cpsk_t *setup_data); 93 const coap_dtls_pki_t *setup_data,
|
| D | coap_session.h | 276 coap_dtls_cpsk_t *setup_data 319 coap_dtls_pki_t *setup_data
|
| D | net.h | 179 coap_dtls_spsk_t *setup_data); 192 const coap_dtls_pki_t *setup_data);
|
| D | coap_dtls.h | 93 coap_dtls_pki_t *setup_data);
|
| /third_party/libcoap/man/ |
| D | coap_encryption.txt.in | 186 * in setup_data->ih_call_back_arg 309 * in setup_data->id_call_back_arg 351 * in setup_data->sni_call_back_arg 570 * in setup_data->cn_call_back_arg 613 * in setup_data->sni_call_back_arg 648 * @param setup_data A structure containing setup data originally passed into 653 coap_dtls_pki_t *setup_data); 862 * in setup_data->cn_call_back_arg 911 * in setup_data->sni_call_back_arg
|
| D | coap_endpoint_server.txt.in | 34 coap_dtls_spsk_t *setup_data);*
|
| /third_party/libbpf/.github/actions/build-selftests/ |
| D | vmlinux.h | 1582 __u64 setup_data; member 21289 struct setup_data { struct 90768 struct setup_data data;
|