Home
last modified time | relevance | path

Searched refs:chain (Results 1 – 17 of 17) sorted by relevance

/mbedtls-latest/library/
Dssl_cache.c48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry()
152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
193 cache->chain = cur; in ssl_cache_pick_writing_slot()
213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot()
218 old = cache->chain; in ssl_cache_pick_writing_slot()
219 cache->chain = old->next; in ssl_cache_pick_writing_slot()
344 if (entry == cache->chain) { in mbedtls_ssl_cache_remove()
345 cache->chain = entry->next; in mbedtls_ssl_cache_remove()
348 for (prev = cache->chain; prev->next != NULL; prev = prev->next) { in mbedtls_ssl_cache_remove()
[all …]
Dctr_drbg.c168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local
232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
242 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df()
243 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df()
250 chain, chain)) != 0) { in block_cipher_df()
256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
313 mbedtls_platform_zeroize(chain, sizeof(chain)); in block_cipher_df()
Dx509_crl.c283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument
290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der()
505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument
513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse()
540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse()
560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse()
567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument
577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
Dx509_crt.c1313 static int mbedtls_x509_crt_parse_der_internal(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_internal() argument
1321 mbedtls_x509_crt *crt = chain, *prev = NULL; in mbedtls_x509_crt_parse_der_internal()
1356 if (crt != chain) { in mbedtls_x509_crt_parse_der_internal()
1366 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_nocopy() argument
1370 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 0, NULL, NULL); in mbedtls_x509_crt_parse_der_nocopy()
1373 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_with_ext_cb() argument
1380 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, make_copy, cb, p_ctx); in mbedtls_x509_crt_parse_der_with_ext_cb()
1383 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der() argument
1387 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 1, NULL, NULL); in mbedtls_x509_crt_parse_der()
1394 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse() argument
[all …]
Dssl_tls.c7696 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() argument
7802 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain()
7806 ret = mbedtls_x509_crt_parse_der_nocopy(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain()
7834 MBEDTLS_SSL_DEBUG_CRT(3, "peer certificate", chain); in ssl_parse_certificate_chain()
7960 mbedtls_x509_crt *chain = NULL; in mbedtls_ssl_parse_certificate() local
7973 chain = ssl->handshake->ecrs_peer_cert; in mbedtls_ssl_parse_certificate()
8002 chain = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in mbedtls_ssl_parse_certificate()
8003 if (chain == NULL) { in mbedtls_ssl_parse_certificate()
8013 mbedtls_x509_crt_init(chain); in mbedtls_ssl_parse_certificate()
8015 ret = ssl_parse_certificate_chain(ssl, chain); in mbedtls_ssl_parse_certificate()
[all …]
Dssl_misc.h1704 mbedtls_x509_crt *chain,
/mbedtls-latest/include/mbedtls/
Dx509_crt.h368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain,
453 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain,
491 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain,
529 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen);
549 int mbedtls_x509_crt_parse_file(mbedtls_x509_crt *chain, const char *path);
564 int mbedtls_x509_crt_parse_path(mbedtls_x509_crt *chain, const char *path);
Dx509_crl.h109 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain,
127 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen);
144 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
Dssl_cache.h68 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(chain); /*!< start of the chain */
/mbedtls-latest/tests/suites/
Dtest_suite_x509parse.function1369 mbedtls_x509_crt chain, *cur;
1372 mbedtls_x509_crt_init(&chain);
1375 TEST_EQUAL(mbedtls_x509_crt_parse_file(&chain, crt_path), ret);
1378 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) {
1387 mbedtls_x509_crt_free(&chain);
1395 mbedtls_x509_crt chain, *cur;
1398 mbedtls_x509_crt_init(&chain);
1401 TEST_EQUAL(mbedtls_x509_crt_parse_path(&chain, crt_path), ret);
1404 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) {
1413 mbedtls_x509_crt_free(&chain);
[all …]
Dtest_suite_x509parse.data650 X509 CRT verification #8c (Expired Cert, longer chain)
654 X509 CRT verification #8d (Future Cert, longer chain)
922 X509 CRT verification #72 (v1 chain)
924 x509_verify:"../framework/data_files/server2-v1-chain.crt":"../framework/data_files/test-ca-v1.crt"…
986 X509 CRT verification #88 (Spurious cert in the chain)
990 X509 CRT verification #89 (Spurious cert later in the chain)
2616 X509 CRT verify long chain (max intermediate CA, trusted)
2620 X509 CRT verify long chain (max intermediate CA, untrusted)
2624 X509 CRT verify long chain (max intermediate CA + 1)
2628 X509 CRT verify chain #1 (zero pathlen intermediate)
[all …]
/mbedtls-latest/docs/
Duse-psa-crypto.md48 - X.509 certificate chain verification.
/mbedtls-latest/programs/
DREADME.md109 * [`x509/cert_app.c`](x509/cert_app.c): connects to a TLS server and verifies its certificate chain.
/mbedtls-latest/docs/architecture/
Dalternative-implementations.md54 …k of an inner function and then copy the context upwards through the call chain, or applications w…
/mbedtls-latest/
DChangeLog3097 the peer CRT chain and session ticket twice.
3996 X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA
4020 chain was not verified due to an internal error (including in the verify
4021 callback) or chain length limitations.
4023 verification of the peer's certificate failed due to an overlong chain or
4096 * Accept empty trusted CA chain in authentication mode
4180 traversing a chain of trusted CA. The issue would cause both flags,
4547 * When verifying a certificate chain, if an intermediate certificate is
4704 chain verification.
4856 length of an X.509 verification chain.
[all …]
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md184 certificate chain).
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md265 … all there is, and it doesn't matter (from an API perspective) exactly what call chain leads to it.