/mbedtls-3.5.0/tests/suites/ |
D | test_suite_alignment.function | 15 uint8_t raw[8]; 17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) { 23 *result |= ((uint64_t) raw[i]) << (i * 8); 25 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8); 36 /* Define 64-bit aligned raw byte array */ 37 uint64_t raw[2]; 40 uint8_t *x = (uint8_t *) raw; 41 for (size_t i = 0; i < sizeof(raw); i++) { 266 /* Define 64-bit aligned raw byte array */ 267 uint64_t raw[2]; [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 37 Save maximum-size persistent raw key 41 Save larger than maximum-size persistent raw key 76 import/export persistent raw key: 1 byte 87 import/export persistent raw key file not exist: 1 byte 102 import/export persistent raw key with restart: 1 byte 113 import/export persistent raw key file not exist with restart: 1 byte
|
D | test_suite_psa_crypto_metadata.data | 201 Asymmetric signature: RSA PKCS#1 v1.5 raw 313 Key agreement: FFDH, raw output 325 Key agreement: ECDH, raw output 340 Key type: raw data
|
D | test_suite_psa_crypto_driver_wrappers.data | 17 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw 21 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw 25 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw 29 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw 73 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw 77 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw 81 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw 302 raw key agreement through driver: fake 306 raw key agreement through driver: in-driver 310 raw key agreement through driver: fallback [all …]
|
D | test_suite_psa_crypto.data | 7 PSA import/export raw: 1 bytes 10 PSA import/export raw: 1 bytes, larger buffer 13 PSA import/export raw: 2 bytes, buffer too small 28 PSA import/export raw: 1 bytes, opaque 32 PSA import/export raw: 1 bytes, larger buffer, opaque 36 PSA import/export raw: 2 bytes, buffer too small, opaque 509 PSA import: reject raw data key of length 0 513 PSA import: reject raw data key of length 0 and declared size 1 bit 517 PSA import: reject raw data key of length 0 and declared size 8 bits 597 PSA import large key: raw, 65528 bits (ok) [all …]
|
D | test_suite_pk.function | 1102 mbedtls_rsa_context raw; 1112 mbedtls_rsa_init(&raw); 1126 /* Extract key to the raw rsa context */ 1127 TEST_ASSERT(mbedtls_rsa_copy(&raw, mbedtls_pk_rsa(rsa)) == 0); 1130 TEST_ASSERT(mbedtls_pk_setup_rsa_alt(&alt, (void *) &raw, 1175 mbedtls_rsa_free(&raw);
|
D | test_suite_x509parse.function | 118 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 125 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 1220 if (cur->raw.p != NULL) {
|
D | test_suite_ssl.function | 2163 TEST_ASSERT(original.peer_cert->raw.len == 2164 restored.peer_cert->raw.len); 2165 TEST_ASSERT(memcmp(original.peer_cert->raw.p, 2166 restored.peer_cert->raw.p, 2167 original.peer_cert->raw.len) == 0); 2860 * Mode 1: Opaque PSK, then raw PSK 3245 * the raw key agreement. Flipping the first byte makes the 3271 * raw key agreement in ssl_write_client_key_exchange fail. */
|
D | test_suite_psa_crypto_storage_format.function | 179 * affected. All RSA signatures are affected except raw PKCS#1v1.5.
|
D | test_suite_entropy.function | 423 /* Check if platform NV write and raw read manipulate the same data */
|
D | test_suite_x509write.function | 82 * - 8 bytes for MBEDTLS_OID_EXTENDED_KEY_USAGE raw value
|
D | test_suite_rsa.data | 239 RSA PKCS1 Sign #8 Verify (Wrong raw hash)
|
/mbedtls-3.5.0/library/ |
D | x509_crl.c | 253 cur_entry->raw.tag = **p; in x509_get_entries() 259 cur_entry->raw.p = *p; in x509_get_entries() 260 cur_entry->raw.len = len2; in x509_get_entries() 347 crl->raw.p = p; in mbedtls_x509_crl_parse_der() 348 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der() 479 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der() 646 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info() 712 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free() 713 mbedtls_platform_zeroize(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free() 714 mbedtls_free(crl_cur->raw.p); in mbedtls_x509_crl_free()
|
D | x509_csr.c | 264 csr->raw.p = p; in mbedtls_x509_csr_parse_der() 265 csr->raw.len = len; in mbedtls_x509_csr_parse_der() 366 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der() 580 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free() 581 mbedtls_platform_zeroize(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free() 582 mbedtls_free(csr->raw.p); in mbedtls_x509_csr_free()
|
D | pkcs7.c | 578 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der() 579 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der() 584 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der() 604 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der() 764 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free() 768 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free() 782 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
|
D | x509_crt.c | 996 crt->raw.len = crt_end - buf; in x509_crt_parse_der_core() 999 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core() 1000 if (crt->raw.p == NULL) { in x509_crt_parse_der_core() 1004 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core() 1007 p += crt->raw.len - len; in x509_crt_parse_der_core() 1010 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core() 2305 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted() 2306 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted() 2841 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free() 2842 mbedtls_platform_zeroize(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free() [all …]
|
D | ssl_tls13_generic.c | 835 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body() 841 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
|
D | ssl_tls.c | 262 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy() 263 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy() 7005 n = crt->raw.len; in mbedtls_ssl_write_certificate() 7017 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate() 7055 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged() 7059 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged() 7644 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate() 7645 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate() 9013 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save() 9024 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save()
|
/mbedtls-3.5.0/include/mbedtls/ |
D | x509_crl.h | 53 mbedtls_x509_buf raw; member 77 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
D | pkcs7.h | 152 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
|
D | x509_csr.h | 51 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
|
D | x509_crt.h | 57 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
/mbedtls-3.5.0/programs/ssl/ |
D | ssl_test_lib.c | 315 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 322 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
|
/mbedtls-3.5.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 1485 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session() 1486 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session() 1494 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw 453 raw data are unchanged.) This affects the following functions: 768 - It no longer exports raw keys and IV. 777 For users which do not rely on raw keys and IV, adjusting to the new 782 Users which require access to the raw keys used to secure application 784 handshake transcript hashes which can be obtained from the raw data 991 `mbedtls_ssl_session_save()` and make copies of the raw
|