/mbedtls-3.6.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 576 mbedtls_test_ssl_endpoint_certificate *cert = &(ep->cert); in test_ssl_endpoint_certificate_free() local 577 if (cert != NULL) { in test_ssl_endpoint_certificate_free() 578 if (cert->ca_cert != NULL) { in test_ssl_endpoint_certificate_free() 579 mbedtls_x509_crt_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 580 mbedtls_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 581 cert->ca_cert = NULL; in test_ssl_endpoint_certificate_free() 583 if (cert->cert != NULL) { in test_ssl_endpoint_certificate_free() 584 mbedtls_x509_crt_free(cert->cert); in test_ssl_endpoint_certificate_free() 585 mbedtls_free(cert->cert); in test_ssl_endpoint_certificate_free() 586 cert->cert = NULL; in test_ssl_endpoint_certificate_free() [all …]
|
/mbedtls-3.6.0/tests/scripts/ |
D | generate_tls13_compat_tests.py | 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 308 cert=cert, key=key)] 414 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 415 ret += ['crt_file={cert} key_file={key}'.format(cert=cert, key=key)]
|
/mbedtls-3.6.0/tests/data_files/ |
D | Readme-x509.txt | 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert 29 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string. 32 server2-v1*.crt: EE cert (without of with chain in same file) 48 - C -> there is a CRL revoking this cert (see below) 62 - enco-cert-utf8str.pem: see enco-ca-prstr.pem above 68 - server3.crt: 1 E L: EC cert signed by RSA CA 69 - server4.crt: 2 R L: RSA cert signed by EC CA 83 -selfsigned.crt: Self-signed cert with S5 key 84 -ss-expired.crt: Self-signed cert with S5 key, expired
|
D | Makefile | 318 enco-cert-utf8str.pem: rsa_pkcs1_1024_clear.pem 322 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_… 324 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_… 1711 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_…
|
/mbedtls-3.6.0/library/ |
D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() argument 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() argument 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
D | ssl_tls13_server.c | 1135 key_cert->cert); in ssl_tls13_pick_key_cert() 1142 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert() 1144 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert() 1161 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() 1164 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert() 1177 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
|
D | ssl_misc.h | 1216 mbedtls_x509_crt *cert; /*!< cert */ member 1641 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1654 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
D | ssl_tls12_server.c | 729 cur->cert); in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 767 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 782 ssl->handshake->key_cert->cert); in ssl_pick_cert()
|
D | ssl_tls.c | 1811 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 1816 if (cert == NULL) { in ssl_append_key_cert() 1828 new_cert->cert = cert; in ssl_append_key_cert() 5671 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 5713 if (mbedtls_x509_crt_check_key_usage(cert, usage) != 0) { in mbedtls_ssl_check_cert_usage() 5726 if (mbedtls_x509_crt_check_extended_key_usage(cert, ext_oid, ext_len) != 0) { in mbedtls_ssl_check_cert_usage()
|
/mbedtls-3.6.0/include/mbedtls/ |
D | pkcs7.h | 197 const mbedtls_x509_crt *cert, 226 const mbedtls_x509_crt *cert,
|
D | ssl.h | 971 mbedtls_x509_crt *cert, 1037 mbedtls_x509_crt *cert,
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_x509parse.data | 3 x509_cert_info:"data_files/parse_input/server1.crt":"cert. version \: 3\nserial number \: 0… 7 x509_cert_info:"data_files/parse_input/server1.crt.der":"cert. version \: 3\nserial number … 11 x509_cert_info:"data_files/parse_input/server2.crt":"cert. version \: 3\nserial number \: 0… 15 x509_cert_info:"data_files/parse_input/server2.crt.der":"cert. version \: 3\nserial number … 19 x509_cert_info:"data_files/parse_input/test-ca.crt":"cert. version \: 3\nserial number \: 0… 23 x509_cert_info:"data_files/parse_input/test-ca.crt.der":"cert. version \: 3\nserial number … 27 x509_cert_info:"data_files/parse_input/cert_md5.crt":"cert. version \: 3\nserial number \: … 31 x509_cert_info:"data_files/parse_input/cert_sha1.crt":"cert. version \: 3\nserial number \:… 35 x509_cert_info:"data_files/parse_input/cert_sha224.crt":"cert. version \: 3\nserial number … 39 x509_cert_info:"data_files/parse_input/cert_sha256.crt":"cert. version \: 3\nserial number … [all …]
|
D | test_suite_ssl.data | 2941 Session serialization, save-load: no ticket, no cert 2945 Session serialization, save-load: small ticket, no cert 2949 Session serialization, save-load: large ticket, no cert 2953 Session serialization, save-load: no ticket, cert 2957 Session serialization, save-load: small ticket, cert 2961 Session serialization, save-load: large ticket, cert 2981 Session serialization, load-save: no ticket, no cert 2985 Session serialization, load-save: small ticket, no cert 2989 Session serialization, load-save: large ticket, no cert 2993 Session serialization, load-save: no ticket, cert [all …]
|
D | test_suite_debug.data | 63 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n… 67 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
|
D | test_suite_x509parse.function | 1348 * plus one "end-entity" cert (nb_int + 1) */
|
D | test_suite_pkcs7.data | 21 PKCS7 Signed Data Parse Fail with corrupted cert #5.0
|
/mbedtls-3.6.0/programs/ssl/ |
D | ssl_server2.c | 743 mbedtls_x509_crt *cert; member 756 mbedtls_x509_crt_free(cur->cert); in sni_free() 757 mbedtls_free(cur->cert); in sni_free() 811 if ((new->cert = mbedtls_calloc(1, sizeof(mbedtls_x509_crt))) == NULL || in sni_parse() 816 mbedtls_x509_crt_init(new->cert); in sni_parse() 819 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse() 924 return mbedtls_ssl_set_hs_own_cert(ssl, cur->cert, cur->key); in cert_callback() 1078 mbedtls_x509_crt *cert; /*!< Certificate corresponding to the key */ member 1101 mbedtls_x509_crt *cert, in ssl_async_set_key() argument 1109 ctx->slots[ctx->slots_used].cert = cert; in ssl_async_set_key() [all …]
|
/mbedtls-3.6.0/tests/include/test/ |
D | ssl_helpers.h | 179 mbedtls_x509_crt *cert; member 191 mbedtls_test_ssl_endpoint_certificate cert; member
|
/mbedtls-3.6.0/ |
D | ChangeLog | 370 * Add parsing of V3 extensions (key usage, Netscape cert-type, 790 * Provide mechanism to reset handshake cert list by calling 793 cert callback (mbedtls_ssl_conf_cert_cb()) during handshake. 1846 description part of the cert to the real signature. This meant that a 4007 authentication against a crafted CA cert. Cannot be triggered remotely 4093 trusted, no later cert is checked. (suggested by hannes-landeholm) 4549 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 4551 * Restore ability to locally trust a self-signed cert that is not a proper 4588 * cert_write app should use subject of issuer certificate as issuer of cert 5178 bottom-up (Peer cert depth is 0) [all …]
|