/mbedtls-3.7.0/library/ |
D | ssl_cache.c | 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 193 cache->chain = cur; in ssl_cache_pick_writing_slot() 213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot() 218 old = cache->chain; in ssl_cache_pick_writing_slot() 219 cache->chain = old->next; in ssl_cache_pick_writing_slot() 344 if (entry == cache->chain) { in mbedtls_ssl_cache_remove() 345 cache->chain = entry->next; in mbedtls_ssl_cache_remove() 348 for (prev = cache->chain; prev->next != NULL; prev = prev->next) { in mbedtls_ssl_cache_remove() [all …]
|
D | ctr_drbg.c | 168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local 232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 243 chain, chain)) != 0) { in block_cipher_df() 247 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df() 248 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df() 256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 313 mbedtls_platform_zeroize(chain, sizeof(chain)); in block_cipher_df()
|
D | x509_crl.c | 283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument 290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der() 505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument 513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse() 540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse() 560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse() 567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument 577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
|
D | x509_crt.c | 1311 static int mbedtls_x509_crt_parse_der_internal(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_internal() argument 1319 mbedtls_x509_crt *crt = chain, *prev = NULL; in mbedtls_x509_crt_parse_der_internal() 1354 if (crt != chain) { in mbedtls_x509_crt_parse_der_internal() 1364 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_nocopy() argument 1368 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 0, NULL, NULL); in mbedtls_x509_crt_parse_der_nocopy() 1371 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_with_ext_cb() argument 1378 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, make_copy, cb, p_ctx); in mbedtls_x509_crt_parse_der_with_ext_cb() 1381 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der() argument 1385 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 1, NULL, NULL); in mbedtls_x509_crt_parse_der() 1392 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse() argument [all …]
|
D | ssl_tls.c | 7731 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() argument 7837 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7841 ret = mbedtls_x509_crt_parse_der_nocopy(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7869 MBEDTLS_SSL_DEBUG_CRT(3, "peer certificate", chain); in ssl_parse_certificate_chain() 7933 mbedtls_x509_crt *chain, in ssl_parse_certificate_verify() argument 7968 chain, in ssl_parse_certificate_verify() 7997 chain, in ssl_parse_certificate_verify() 8021 const mbedtls_pk_context *pk = &chain->pk; in ssl_parse_certificate_verify() 8048 if (mbedtls_ssl_check_cert_usage(chain, in ssl_parse_certificate_verify() 8184 mbedtls_x509_crt *chain = NULL; in mbedtls_ssl_parse_certificate() local [all …]
|
/mbedtls-3.7.0/include/mbedtls/ |
D | x509_crl.h | 109 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, 127 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen); 144 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
|
D | x509_crt.h | 368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, 453 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, 491 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, 529 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen); 549 int mbedtls_x509_crt_parse_file(mbedtls_x509_crt *chain, const char *path); 564 int mbedtls_x509_crt_parse_path(mbedtls_x509_crt *chain, const char *path);
|
D | ssl_cache.h | 68 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(chain); /*!< start of the chain */
|
/mbedtls-3.7.0/tests/data_files/dir4/ |
D | Readme | 23 5. nonzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (v… 28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid) 33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid) 34 …tes issued before the integration will have an intermadiate self signed certificate in their chain)
|
/mbedtls-3.7.0/tests/suites/ |
D | test_suite_x509parse.function | 1356 mbedtls_x509_crt chain, *cur; 1359 mbedtls_x509_crt_init(&chain); 1362 TEST_EQUAL(mbedtls_x509_crt_parse_file(&chain, crt_path), ret); 1365 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { 1374 mbedtls_x509_crt_free(&chain); 1382 mbedtls_x509_crt chain, *cur; 1385 mbedtls_x509_crt_init(&chain); 1388 TEST_EQUAL(mbedtls_x509_crt_parse_path(&chain, crt_path), ret); 1391 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { 1400 mbedtls_x509_crt_free(&chain); [all …]
|
D | test_suite_x509parse.data | 650 X509 CRT verification #8c (Expired Cert, longer chain) 654 X509 CRT verification #8d (Future Cert, longer chain) 922 X509 CRT verification #72 (v1 chain) 924 x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NUL… 986 X509 CRT verification #88 (Spurious cert in the chain) 990 X509 CRT verification #89 (Spurious cert later in the chain) 2616 X509 CRT verify long chain (max intermediate CA, trusted) 2620 X509 CRT verify long chain (max intermediate CA, untrusted) 2624 X509 CRT verify long chain (max intermediate CA + 1) 2628 X509 CRT verify chain #1 (zero pathlen intermediate) [all …]
|
/mbedtls-3.7.0/tests/data_files/dir-maxpath/ |
D | Readme.txt | 1 These certificates form a very long chain, used to test the 8 File cNN.pem contains the chain NN.crt to 00.crt.
|
/mbedtls-3.7.0/scripts/mbedtls_dev/ |
D | bignum_common.py | 10 from itertools import chain 264 chain(test_objects, special_cases) 405 chain(test_objects, special_cases)
|
D | macro_collector.py | 204 return itertools.chain(*(
|
/mbedtls-3.7.0/tests/data_files/ |
D | Readme-x509.txt | 32 server2-v1*.crt: EE cert (without of with chain in same file)
|
D | Makefile | 2075 server2-v1-chain.crt: server2-v1.crt server1-v1.crt
|
/mbedtls-3.7.0/docs/ |
D | use-psa-crypto.md | 48 - X.509 certificate chain verification.
|
/mbedtls-3.7.0/programs/ |
D | README.md | 109 * [`x509/cert_app.c`](x509/cert_app.c): connects to a TLS server and verifies its certificate chain.
|
/mbedtls-3.7.0/docs/architecture/ |
D | alternative-implementations.md | 54 …k of an inner function and then copy the context upwards through the call chain, or applications w…
|
/mbedtls-3.7.0/ |
D | ChangeLog | 2902 the peer CRT chain and session ticket twice. 3801 X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA 3825 chain was not verified due to an internal error (including in the verify 3826 callback) or chain length limitations. 3828 verification of the peer's certificate failed due to an overlong chain or 3901 * Accept empty trusted CA chain in authentication mode 3985 traversing a chain of trusted CA. The issue would cause both flags, 4352 * When verifying a certificate chain, if an intermediate certificate is 4509 chain verification. 4661 length of an X.509 verification chain. [all …]
|
/mbedtls-3.7.0/3rdparty/p256-m/p256-m/ |
D | README.md | 184 certificate chain).
|
/mbedtls-3.7.0/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 265 … all there is, and it doesn't matter (from an API perspective) exactly what call chain leads to it.
|