/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 569 mbedtls_test_ssl_endpoint_certificate *cert = &(ep->cert); in test_ssl_endpoint_certificate_free() local 570 if (cert != NULL) { in test_ssl_endpoint_certificate_free() 571 if (cert->ca_cert != NULL) { in test_ssl_endpoint_certificate_free() 572 mbedtls_x509_crt_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 573 mbedtls_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 574 cert->ca_cert = NULL; in test_ssl_endpoint_certificate_free() 576 if (cert->cert != NULL) { in test_ssl_endpoint_certificate_free() 577 mbedtls_x509_crt_free(cert->cert); in test_ssl_endpoint_certificate_free() 578 mbedtls_free(cert->cert); in test_ssl_endpoint_certificate_free() 579 cert->cert = NULL; in test_ssl_endpoint_certificate_free() [all …]
|
/mbedtls-latest/tests/scripts/ |
D | generate_tls13_compat_tests.py | 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 308 cert=cert, key=key)] 428 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 429 ret += ['crt_file={cert} key_file={key}'.format(cert=cert, key=key)]
|
/mbedtls-latest/library/ |
D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() argument 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() argument 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
D | ssl_tls13_server.c | 1148 key_cert->cert); in ssl_tls13_pick_key_cert() 1155 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert() 1157 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert() 1174 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() 1177 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert() 1190 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
|
D | ssl_misc.h | 1248 mbedtls_x509_crt *cert; /*!< cert */ member 1673 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1720 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
D | ssl_tls12_server.c | 729 cur->cert); in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 769 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 784 ssl->handshake->key_cert->cert); in ssl_pick_cert()
|
D | ssl_tls.c | 1825 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 1830 if (cert == NULL) { in ssl_append_key_cert() 1842 new_cert->cert = cert; in ssl_append_key_cert() 9704 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 9762 if (mbedtls_x509_crt_check_key_usage(cert, usage) != 0) { in mbedtls_ssl_check_cert_usage() 9779 if (mbedtls_x509_crt_check_extended_key_usage(cert, ext_oid, ext_len) != 0) { in mbedtls_ssl_check_cert_usage()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.data | 3 x509_cert_info:"../framework/data_files/parse_input/server1.crt":"cert. version \: 3\nserial nu… 7 x509_cert_info:"../framework/data_files/parse_input/server1.crt.der":"cert. version \: 3\nseria… 11 x509_cert_info:"../framework/data_files/parse_input/server2.crt":"cert. version \: 3\nserial nu… 15 x509_cert_info:"../framework/data_files/parse_input/server2.crt.der":"cert. version \: 3\nseria… 19 x509_cert_info:"../framework/data_files/parse_input/test-ca.crt":"cert. version \: 3\nserial nu… 23 x509_cert_info:"../framework/data_files/parse_input/test-ca.crt.der":"cert. version \: 3\nseria… 27 x509_cert_info:"../framework/data_files/parse_input/cert_md5.crt":"cert. version \: 3\nserial n… 31 x509_cert_info:"../framework/data_files/parse_input/cert_sha1.crt":"cert. version \: 3\nserial … 35 x509_cert_info:"../framework/data_files/parse_input/cert_sha224.crt":"cert. version \: 3\nseria… 39 x509_cert_info:"../framework/data_files/parse_input/cert_sha256.crt":"cert. version \: 3\nseria… [all …]
|
D | test_suite_ssl.data | 2949 Session serialization, save-load: no ticket, no cert 2953 Session serialization, save-load: small ticket, no cert 2957 Session serialization, save-load: large ticket, no cert 2961 Session serialization, save-load: no ticket, cert 2965 Session serialization, save-load: small ticket, cert 2969 Session serialization, save-load: large ticket, cert 2989 Session serialization, load-save: no ticket, no cert 2993 Session serialization, load-save: small ticket, no cert 2997 Session serialization, load-save: large ticket, no cert 3001 Session serialization, load-save: no ticket, cert [all …]
|
D | test_suite_debug.data | 63 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n… 67 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
|
D | test_suite_x509parse.function | 1439 * plus one "end-entity" cert (nb_int + 1) */
|
D | test_suite_pkcs7.data | 21 PKCS7 Signed Data Parse Fail with corrupted cert #5.0
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 751 mbedtls_x509_crt *cert; member 764 mbedtls_x509_crt_free(cur->cert); in sni_free() 765 mbedtls_free(cur->cert); in sni_free() 819 if ((new->cert = mbedtls_calloc(1, sizeof(mbedtls_x509_crt))) == NULL || in sni_parse() 824 mbedtls_x509_crt_init(new->cert); in sni_parse() 827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse() 932 return mbedtls_ssl_set_hs_own_cert(ssl, cur->cert, cur->key); in cert_callback() 1086 mbedtls_x509_crt *cert; /*!< Certificate corresponding to the key */ member 1109 mbedtls_x509_crt *cert, in ssl_async_set_key() argument 1117 ctx->slots[ctx->slots_used].cert = cert; in ssl_async_set_key() [all …]
|
/mbedtls-latest/include/mbedtls/ |
D | pkcs7.h | 196 const mbedtls_x509_crt *cert, 225 const mbedtls_x509_crt *cert,
|
D | ssl.h | 1015 mbedtls_x509_crt *cert, 1081 mbedtls_x509_crt *cert,
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 189 mbedtls_x509_crt *cert; member 201 mbedtls_test_ssl_endpoint_certificate cert; member
|
/mbedtls-latest/ |
D | ChangeLog | 825 * Add parsing of V3 extensions (key usage, Netscape cert-type, 1245 * Provide mechanism to reset handshake cert list by calling 1248 cert callback (mbedtls_ssl_conf_cert_cb()) during handshake. 2301 description part of the cert to the real signature. This meant that a 4462 authentication against a crafted CA cert. Cannot be triggered remotely 4548 trusted, no later cert is checked. (suggested by hannes-landeholm) 5004 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 5006 * Restore ability to locally trust a self-signed cert that is not a proper 5043 * cert_write app should use subject of issuer certificate as issuer of cert 5633 bottom-up (Peer cert depth is 0) [all …]
|