Home
last modified time | relevance | path

Searched refs:raw (Results 1 – 25 of 28) sorted by relevance

12

/mbedtls-3.5.0/tests/suites/
Dtest_suite_alignment.function15 uint8_t raw[8];
17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) {
23 *result |= ((uint64_t) raw[i]) << (i * 8);
25 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8);
36 /* Define 64-bit aligned raw byte array */
37 uint64_t raw[2];
40 uint8_t *x = (uint8_t *) raw;
41 for (size_t i = 0; i < sizeof(raw); i++) {
266 /* Define 64-bit aligned raw byte array */
267 uint64_t raw[2];
[all …]
Dtest_suite_psa_crypto_persistent_key.data37 Save maximum-size persistent raw key
41 Save larger than maximum-size persistent raw key
76 import/export persistent raw key: 1 byte
87 import/export persistent raw key file not exist: 1 byte
102 import/export persistent raw key with restart: 1 byte
113 import/export persistent raw key file not exist with restart: 1 byte
Dtest_suite_psa_crypto_metadata.data201 Asymmetric signature: RSA PKCS#1 v1.5 raw
313 Key agreement: FFDH, raw output
325 Key agreement: ECDH, raw output
340 Key type: raw data
Dtest_suite_psa_crypto_driver_wrappers.data17 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw
21 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw
25 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw
29 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw
73 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw
77 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw
81 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw
302 raw key agreement through driver: fake
306 raw key agreement through driver: in-driver
310 raw key agreement through driver: fallback
[all …]
Dtest_suite_psa_crypto.data7 PSA import/export raw: 1 bytes
10 PSA import/export raw: 1 bytes, larger buffer
13 PSA import/export raw: 2 bytes, buffer too small
28 PSA import/export raw: 1 bytes, opaque
32 PSA import/export raw: 1 bytes, larger buffer, opaque
36 PSA import/export raw: 2 bytes, buffer too small, opaque
509 PSA import: reject raw data key of length 0
513 PSA import: reject raw data key of length 0 and declared size 1 bit
517 PSA import: reject raw data key of length 0 and declared size 8 bits
597 PSA import large key: raw, 65528 bits (ok)
[all …]
Dtest_suite_pk.function1102 mbedtls_rsa_context raw;
1112 mbedtls_rsa_init(&raw);
1126 /* Extract key to the raw rsa context */
1127 TEST_ASSERT(mbedtls_rsa_copy(&raw, mbedtls_pk_rsa(rsa)) == 0);
1130 TEST_ASSERT(mbedtls_pk_setup_rsa_alt(&alt, (void *) &raw,
1175 mbedtls_rsa_free(&raw);
Dtest_suite_x509parse.function118 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
125 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
1220 if (cur->raw.p != NULL) {
Dtest_suite_ssl.function2163 TEST_ASSERT(original.peer_cert->raw.len ==
2164 restored.peer_cert->raw.len);
2165 TEST_ASSERT(memcmp(original.peer_cert->raw.p,
2166 restored.peer_cert->raw.p,
2167 original.peer_cert->raw.len) == 0);
2860 * Mode 1: Opaque PSK, then raw PSK
3245 * the raw key agreement. Flipping the first byte makes the
3271 * raw key agreement in ssl_write_client_key_exchange fail. */
Dtest_suite_psa_crypto_storage_format.function179 * affected. All RSA signatures are affected except raw PKCS#1v1.5.
Dtest_suite_entropy.function423 /* Check if platform NV write and raw read manipulate the same data */
Dtest_suite_x509write.function82 * - 8 bytes for MBEDTLS_OID_EXTENDED_KEY_USAGE raw value
Dtest_suite_rsa.data239 RSA PKCS1 Sign #8 Verify (Wrong raw hash)
/mbedtls-3.5.0/library/
Dx509_crl.c253 cur_entry->raw.tag = **p; in x509_get_entries()
259 cur_entry->raw.p = *p; in x509_get_entries()
260 cur_entry->raw.len = len2; in x509_get_entries()
347 crl->raw.p = p; in mbedtls_x509_crl_parse_der()
348 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der()
479 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der()
646 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info()
712 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free()
713 mbedtls_platform_zeroize(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free()
714 mbedtls_free(crl_cur->raw.p); in mbedtls_x509_crl_free()
Dx509_csr.c264 csr->raw.p = p; in mbedtls_x509_csr_parse_der()
265 csr->raw.len = len; in mbedtls_x509_csr_parse_der()
366 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der()
580 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free()
581 mbedtls_platform_zeroize(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free()
582 mbedtls_free(csr->raw.p); in mbedtls_x509_csr_free()
Dpkcs7.c578 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der()
579 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der()
584 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der()
604 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der()
764 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free()
768 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free()
782 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
Dx509_crt.c996 crt->raw.len = crt_end - buf; in x509_crt_parse_der_core()
999 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core()
1000 if (crt->raw.p == NULL) { in x509_crt_parse_der_core()
1004 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core()
1007 p += crt->raw.len - len; in x509_crt_parse_der_core()
1010 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core()
2305 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted()
2306 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted()
2841 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free()
2842 mbedtls_platform_zeroize(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free()
[all …]
Dssl_tls13_generic.c835 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body()
841 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
Dssl_tls.c262 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy()
263 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy()
7005 n = crt->raw.len; in mbedtls_ssl_write_certificate()
7017 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate()
7055 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged()
7059 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged()
7644 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate()
7645 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate()
9013 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save()
9024 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save()
/mbedtls-3.5.0/include/mbedtls/
Dx509_crl.h53 mbedtls_x509_buf raw; member
77 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
Dpkcs7.h152 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
Dx509_csr.h51 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
Dx509_crt.h57 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
/mbedtls-3.5.0/programs/ssl/
Dssl_test_lib.c315 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
322 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
/mbedtls-3.5.0/tests/src/test_helpers/
Dssl_helpers.c1485 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session()
1486 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
1494 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw
453 raw data are unchanged.) This affects the following functions:
768 - It no longer exports raw keys and IV.
777 For users which do not rely on raw keys and IV, adjusting to the new
782 Users which require access to the raw keys used to secure application
784 handshake transcript hashes which can be obtained from the raw data
991 `mbedtls_ssl_session_save()` and make copies of the raw

12