/mbedtls-latest/library/ |
D | ssl_cache.c | 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 193 cache->chain = cur; in ssl_cache_pick_writing_slot() 213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot() 218 old = cache->chain; in ssl_cache_pick_writing_slot() 219 cache->chain = old->next; in ssl_cache_pick_writing_slot() 344 if (entry == cache->chain) { in mbedtls_ssl_cache_remove() 345 cache->chain = entry->next; in mbedtls_ssl_cache_remove() 348 for (prev = cache->chain; prev->next != NULL; prev = prev->next) { in mbedtls_ssl_cache_remove() [all …]
|
D | ctr_drbg.c | 168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local 232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 242 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df() 243 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df() 250 chain, chain)) != 0) { in block_cipher_df() 256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 313 mbedtls_platform_zeroize(chain, sizeof(chain)); in block_cipher_df()
|
D | x509_crl.c | 283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument 290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der() 505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument 513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse() 540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse() 560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse() 567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument 577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
|
D | x509_crt.c | 1313 static int mbedtls_x509_crt_parse_der_internal(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_internal() argument 1321 mbedtls_x509_crt *crt = chain, *prev = NULL; in mbedtls_x509_crt_parse_der_internal() 1356 if (crt != chain) { in mbedtls_x509_crt_parse_der_internal() 1366 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_nocopy() argument 1370 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 0, NULL, NULL); in mbedtls_x509_crt_parse_der_nocopy() 1373 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_with_ext_cb() argument 1380 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, make_copy, cb, p_ctx); in mbedtls_x509_crt_parse_der_with_ext_cb() 1383 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der() argument 1387 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 1, NULL, NULL); in mbedtls_x509_crt_parse_der() 1394 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse() argument [all …]
|
D | ssl_tls.c | 7696 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() argument 7802 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7806 ret = mbedtls_x509_crt_parse_der_nocopy(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7834 MBEDTLS_SSL_DEBUG_CRT(3, "peer certificate", chain); in ssl_parse_certificate_chain() 7960 mbedtls_x509_crt *chain = NULL; in mbedtls_ssl_parse_certificate() local 7973 chain = ssl->handshake->ecrs_peer_cert; in mbedtls_ssl_parse_certificate() 8002 chain = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in mbedtls_ssl_parse_certificate() 8003 if (chain == NULL) { in mbedtls_ssl_parse_certificate() 8013 mbedtls_x509_crt_init(chain); in mbedtls_ssl_parse_certificate() 8015 ret = ssl_parse_certificate_chain(ssl, chain); in mbedtls_ssl_parse_certificate() [all …]
|
D | ssl_misc.h | 1704 mbedtls_x509_crt *chain,
|
/mbedtls-latest/include/mbedtls/ |
D | x509_crt.h | 368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, 453 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, 491 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, 529 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen); 549 int mbedtls_x509_crt_parse_file(mbedtls_x509_crt *chain, const char *path); 564 int mbedtls_x509_crt_parse_path(mbedtls_x509_crt *chain, const char *path);
|
D | x509_crl.h | 109 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, 127 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen); 144 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
|
D | ssl_cache.h | 68 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(chain); /*!< start of the chain */
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.function | 1369 mbedtls_x509_crt chain, *cur; 1372 mbedtls_x509_crt_init(&chain); 1375 TEST_EQUAL(mbedtls_x509_crt_parse_file(&chain, crt_path), ret); 1378 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { 1387 mbedtls_x509_crt_free(&chain); 1395 mbedtls_x509_crt chain, *cur; 1398 mbedtls_x509_crt_init(&chain); 1401 TEST_EQUAL(mbedtls_x509_crt_parse_path(&chain, crt_path), ret); 1404 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { 1413 mbedtls_x509_crt_free(&chain); [all …]
|
D | test_suite_x509parse.data | 650 X509 CRT verification #8c (Expired Cert, longer chain) 654 X509 CRT verification #8d (Future Cert, longer chain) 922 X509 CRT verification #72 (v1 chain) 924 x509_verify:"../framework/data_files/server2-v1-chain.crt":"../framework/data_files/test-ca-v1.crt"… 986 X509 CRT verification #88 (Spurious cert in the chain) 990 X509 CRT verification #89 (Spurious cert later in the chain) 2616 X509 CRT verify long chain (max intermediate CA, trusted) 2620 X509 CRT verify long chain (max intermediate CA, untrusted) 2624 X509 CRT verify long chain (max intermediate CA + 1) 2628 X509 CRT verify chain #1 (zero pathlen intermediate) [all …]
|
/mbedtls-latest/docs/ |
D | use-psa-crypto.md | 48 - X.509 certificate chain verification.
|
/mbedtls-latest/programs/ |
D | README.md | 109 * [`x509/cert_app.c`](x509/cert_app.c): connects to a TLS server and verifies its certificate chain.
|
/mbedtls-latest/docs/architecture/ |
D | alternative-implementations.md | 54 …k of an inner function and then copy the context upwards through the call chain, or applications w…
|
/mbedtls-latest/ |
D | ChangeLog | 3097 the peer CRT chain and session ticket twice. 3996 X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA 4020 chain was not verified due to an internal error (including in the verify 4021 callback) or chain length limitations. 4023 verification of the peer's certificate failed due to an overlong chain or 4096 * Accept empty trusted CA chain in authentication mode 4180 traversing a chain of trusted CA. The issue would cause both flags, 4547 * When verifying a certificate chain, if an intermediate certificate is 4704 chain verification. 4856 length of an X.509 verification chain. [all …]
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 184 certificate chain).
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 265 … all there is, and it doesn't matter (from an API perspective) exactly what call chain leads to it.
|