/mbedtls-latest/library/ |
D | ssl_cache.c | 46 mbedtls_ssl_cache_entry *cur; in ssl_cache_find_entry() local 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 51 (int) (t - cur->timestamp) > cache->timeout) { in ssl_cache_find_entry() 56 if (session_id_len != cur->session_id_len || in ssl_cache_find_entry() 57 memcmp(session_id, cur->session_id, in ssl_cache_find_entry() 58 cur->session_id_len) != 0) { in ssl_cache_find_entry() 65 if (cur != NULL) { in ssl_cache_find_entry() 66 *dst = cur; in ssl_cache_find_entry() 141 mbedtls_ssl_cache_entry *cur, *last; in ssl_cache_pick_writing_slot() local 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() [all …]
|
D | memory_buffer_alloc.c | 95 memory_header *cur = heap.first; in debug_chain() local 98 while (cur != NULL) { in debug_chain() 99 debug_header(cur); in debug_chain() 100 cur = cur->next; in debug_chain() 104 cur = heap.first_free; in debug_chain() 106 while (cur != NULL) { in debug_chain() 107 debug_header(cur); in debug_chain() 108 cur = cur->next_free; in debug_chain() 155 memory_header *prv = heap.first, *cur; in verify_chain() local 173 cur = heap.first->next; in verify_chain() [all …]
|
D | asn1parse.c | 304 mbedtls_asn1_sequence *cur; member 314 mbedtls_asn1_sequence *cur = in asn1_get_sequence_of_cb() local 315 cb_ctx->cur; in asn1_get_sequence_of_cb() 317 if (cur->buf.p != NULL) { in asn1_get_sequence_of_cb() 318 cur->next = in asn1_get_sequence_of_cb() 321 if (cur->next == NULL) { in asn1_get_sequence_of_cb() 325 cur = cur->next; in asn1_get_sequence_of_cb() 328 cur->buf.p = start; in asn1_get_sequence_of_cb() 329 cur->buf.len = len; in asn1_get_sequence_of_cb() 330 cur->buf.tag = tag; in asn1_get_sequence_of_cb() [all …]
|
D | x509write.c | 45 const mbedtls_x509_san_list *cur; in mbedtls_x509_write_set_san_common() local 52 for (cur = san_list; cur != NULL; cur = cur->next) { in mbedtls_x509_write_set_san_common() 54 switch (cur->node.type) { in mbedtls_x509_write_set_san_common() 63 CHECK_OVERFLOW_ADD(buflen, cur->node.san.unstructured_name.len); in mbedtls_x509_write_set_san_common() 68 const mbedtls_asn1_named_data *chunk = &cur->node.san.directory_name; in mbedtls_x509_write_set_san_common() 98 cur = san_list; in mbedtls_x509_write_set_san_common() 100 while (cur != NULL) { in mbedtls_x509_write_set_san_common() 102 switch (cur->node.type) { in mbedtls_x509_write_set_san_common() 109 (const unsigned char *) cur->node.san.unstructured_name.p; in mbedtls_x509_write_set_san_common() 110 size_t unstructured_name_len = cur->node.san.unstructured_name.len; in mbedtls_x509_write_set_san_common() [all …]
|
D | asn1write.c | 380 mbedtls_asn1_named_data *cur; in mbedtls_asn1_store_named_data() local 382 if ((cur = asn1_find_named_data(*head, oid, oid_len)) == NULL) { in mbedtls_asn1_store_named_data() 385 cur = (mbedtls_asn1_named_data *) mbedtls_calloc(1, in mbedtls_asn1_store_named_data() 387 if (cur == NULL) { in mbedtls_asn1_store_named_data() 391 cur->oid.len = oid_len; in mbedtls_asn1_store_named_data() 392 cur->oid.p = mbedtls_calloc(1, oid_len); in mbedtls_asn1_store_named_data() 393 if (cur->oid.p == NULL) { in mbedtls_asn1_store_named_data() 394 mbedtls_free(cur); in mbedtls_asn1_store_named_data() 398 memcpy(cur->oid.p, oid, oid_len); in mbedtls_asn1_store_named_data() 400 cur->val.len = val_len; in mbedtls_asn1_store_named_data() [all …]
|
D | x509_crt.c | 746 mbedtls_asn1_sequence *cur = certificate_policies; in x509_get_certificate_policies() local 803 if (cur->buf.p != NULL) { in x509_get_certificate_policies() 804 if (cur->next != NULL) { in x509_get_certificate_policies() 808 cur->next = mbedtls_calloc(1, sizeof(mbedtls_asn1_sequence)); in x509_get_certificate_policies() 810 if (cur->next == NULL) { in x509_get_certificate_policies() 815 cur = cur->next; in x509_get_certificate_policies() 818 buf = &(cur->buf); in x509_get_certificate_policies() 848 cur->next = NULL; in x509_get_certificate_policies() 1695 const mbedtls_x509_sequence *cur = extended_key_usage; in x509_info_ext_key_usage() local 1698 while (cur != NULL) { in x509_info_ext_key_usage() [all …]
|
D | x509_create.c | 103 const x509_attr_descriptor_t *cur; in x509_attr_descr_from_name() local 105 for (cur = x509_attrs; cur->name != NULL; cur++) { in x509_attr_descr_from_name() 106 if (cur->name_len == name_len && in x509_attr_descr_from_name() 107 strncmp(cur->name, name, name_len) == 0) { in x509_attr_descr_from_name() 112 if (cur->name == NULL) { in x509_attr_descr_from_name() 116 return cur; in x509_attr_descr_from_name() 346 mbedtls_asn1_named_data *cur = in mbedtls_x509_string_to_names() local 352 if (cur == NULL) { in mbedtls_x509_string_to_names() 357 cur->val.tag = tag; in mbedtls_x509_string_to_names() 383 mbedtls_asn1_named_data *cur; in mbedtls_x509_set_extension() local [all …]
|
D | net_sockets.c | 162 struct addrinfo hints, *addr_list, *cur; in mbedtls_net_connect() local 180 for (cur = addr_list; cur != NULL; cur = cur->ai_next) { in mbedtls_net_connect() 181 ctx->fd = (int) socket(cur->ai_family, cur->ai_socktype, in mbedtls_net_connect() 182 cur->ai_protocol); in mbedtls_net_connect() 188 if (connect(ctx->fd, cur->ai_addr, MSVC_INT_CAST cur->ai_addrlen) == 0) { in mbedtls_net_connect() 208 struct addrinfo hints, *addr_list, *cur; in mbedtls_net_bind() local 229 for (cur = addr_list; cur != NULL; cur = cur->ai_next) { in mbedtls_net_bind() 230 ctx->fd = (int) socket(cur->ai_family, cur->ai_socktype, in mbedtls_net_bind() 231 cur->ai_protocol); in mbedtls_net_bind() 245 if (bind(ctx->fd, cur->ai_addr, MSVC_INT_CAST cur->ai_addrlen) != 0) { in mbedtls_net_bind()
|
D | x509.c | 408 mbedtls_x509_name *cur) in x509_get_attr_type_value() argument 427 oid = &cur->oid; in x509_get_attr_type_value() 450 val = &cur->val; in x509_get_attr_type_value() 465 cur->next = NULL; in x509_get_attr_type_value() 499 mbedtls_x509_name *cur) in mbedtls_x509_get_name() argument 504 mbedtls_x509_name *head = cur; in mbedtls_x509_get_name() 520 if ((ret = x509_get_attr_type_value(p, end_set, cur)) != 0) { in mbedtls_x509_get_name() 529 cur->next_merged = 1; in mbedtls_x509_get_name() 531 cur->next = mbedtls_calloc(1, sizeof(mbedtls_x509_name)); in mbedtls_x509_get_name() 533 if (cur->next == NULL) { in mbedtls_x509_get_name() [all …]
|
D | oid.c | 49 const mbedtls_oid_descriptor_t *cur = \ 52 while (cur->asn1 != NULL) { \ 53 if (cur->asn1_len == oid->len && \ 54 memcmp(cur->asn1, oid->p, oid->len) == 0) { \ 58 cur = (const mbedtls_oid_descriptor_t *) p; \ 114 const TYPE_T *cur = (LIST); \ 115 while (cur->descriptor.asn1 != NULL) { \ 116 if (cur->ATTR1 == (ATTR1)) { \ 117 *oid = cur->descriptor.asn1; \ 118 *olen = cur->descriptor.asn1_len; \ [all …]
|
D | ssl_msg.c | 762 unsigned char *cur = add_data; in ssl_extract_add_data_from_record() local 786 memcpy(cur, seq_num_placeholder, sizeof(seq_num_placeholder)); in ssl_extract_add_data_from_record() 787 cur += sizeof(seq_num_placeholder); in ssl_extract_add_data_from_record() 790 *cur = rec->type; in ssl_extract_add_data_from_record() 791 cur++; in ssl_extract_add_data_from_record() 794 *cur = rec->cid_len; in ssl_extract_add_data_from_record() 795 cur++; in ssl_extract_add_data_from_record() 800 memcpy(cur, rec->ctr, sizeof(rec->ctr)); in ssl_extract_add_data_from_record() 801 cur += sizeof(rec->ctr); in ssl_extract_add_data_from_record() 806 *cur = rec->type; in ssl_extract_add_data_from_record() [all …]
|
D | ssl_ciphersuites.c | 1845 const mbedtls_ssl_ciphersuite_t *cur = ciphersuite_definitions; in mbedtls_ssl_ciphersuite_from_string() local 1851 while (cur->id != 0) { in mbedtls_ssl_ciphersuite_from_string() 1852 if (0 == strcmp(cur->name, ciphersuite_name)) { in mbedtls_ssl_ciphersuite_from_string() 1853 return cur; in mbedtls_ssl_ciphersuite_from_string() 1856 cur++; in mbedtls_ssl_ciphersuite_from_string() 1864 const mbedtls_ssl_ciphersuite_t *cur = ciphersuite_definitions; in mbedtls_ssl_ciphersuite_from_id() local 1866 while (cur->id != 0) { in mbedtls_ssl_ciphersuite_from_id() 1867 if (cur->id == ciphersuite) { in mbedtls_ssl_ciphersuite_from_id() 1868 return cur; in mbedtls_ssl_ciphersuite_from_id() 1871 cur++; in mbedtls_ssl_ciphersuite_from_id() [all …]
|
D | debug.c | 364 const char *start, *cur; in debug_print_line_by_line() local 367 for (cur = text; *cur != '\0'; cur++) { in debug_print_line_by_line() 368 if (*cur == '\n') { in debug_print_line_by_line() 369 size_t len = (size_t) (cur - start) + 1; in debug_print_line_by_line() 379 start = cur + 1; in debug_print_line_by_line()
|
D | ssl_misc.h | 503 static inline int mbedtls_ssl_chk_buf_ptr(const uint8_t *cur, in mbedtls_ssl_chk_buf_ptr() argument 506 return (cur > end) || (need > (size_t) (end - cur)); in mbedtls_ssl_chk_buf_ptr() 510 const uint8_t *cur; member 516 const uint8_t *cur, const uint8_t *end, size_t need); 522 static inline int mbedtls_ssl_chk_buf_ptr(const uint8_t *cur, in mbedtls_ssl_chk_buf_ptr() argument 525 if ((cur > end) || (need > (size_t) (end - cur))) { in mbedtls_ssl_chk_buf_ptr() 526 mbedtls_ssl_set_chk_buf_ptr_fail_args(cur, end, need); in mbedtls_ssl_chk_buf_ptr() 543 #define MBEDTLS_SSL_CHK_BUF_PTR(cur, end, need) \ argument 545 if (mbedtls_ssl_chk_buf_ptr((cur), (end), (need)) != 0) \ 565 #define MBEDTLS_SSL_CHK_BUF_READ_PTR(cur, end, need) \ argument [all …]
|
D | ssl_client.c | 145 for (const char **cur = ssl->conf->alpn_list; *cur != NULL; cur++) { in ssl_write_alpn_ext() local 150 size_t protocol_name_len = strlen(*cur); in ssl_write_alpn_ext() 154 memcpy(p, *cur, protocol_name_len); in ssl_write_alpn_ext()
|
D | ssl_tls12_server.c | 690 mbedtls_ssl_key_cert *cur, *list; in ssl_pick_cert() local 726 for (cur = list; cur != NULL; cur = cur->next) { in ssl_pick_cert() 729 cur->cert); in ssl_pick_cert() 736 mbedtls_pk_can_do_ext(cur->key, pk_alg, pk_usage)) && in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 740 mbedtls_pk_can_do_ext(cur->key, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 769 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 781 if (cur != NULL) { in ssl_pick_cert() [all …]
|
/mbedtls-latest/programs/x509/ |
D | cert_req.c | 152 mbedtls_x509_san_list *cur, *prev; in main() local 243 cur = mbedtls_calloc(1, sizeof(mbedtls_x509_san_list)); in main() 244 if (cur == NULL) { in main() 249 cur->next = NULL; in main() 259 cur->node.type = MBEDTLS_X509_SAN_RFC822_NAME; in main() 261 cur->node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER; in main() 263 cur->node.type = MBEDTLS_X509_SAN_DNS_NAME; in main() 266 cur->node.type = MBEDTLS_X509_SAN_IP_ADDRESS; in main() 273 cur->node.san.unstructured_name.p = (unsigned char *) ip; in main() 274 cur->node.san.unstructured_name.len = sizeof(ip); in main() [all …]
|
D | cert_write.c | 314 mbedtls_x509_san_list *cur, *prev; in main() local 564 cur = mbedtls_calloc(1, sizeof(mbedtls_x509_san_list)); in main() 565 if (cur == NULL) { in main() 570 cur->next = NULL; in main() 580 cur->node.type = MBEDTLS_X509_SAN_RFC822_NAME; in main() 582 cur->node.type = MBEDTLS_X509_SAN_UNIFORM_RESOURCE_IDENTIFIER; in main() 584 cur->node.type = MBEDTLS_X509_SAN_DNS_NAME; in main() 587 cur->node.type = MBEDTLS_X509_SAN_IP_ADDRESS; in main() 594 cur->node.san.unstructured_name.p = (unsigned char *) ip; in main() 595 cur->node.san.unstructured_name.len = sizeof(ip); in main() [all …]
|
D | load_roots.c | 55 const char *const *cur; in read_certificates() local 59 for (cur = filenames; *cur != NULL; cur++) { in read_certificates() 60 ret = mbedtls_x509_crt_parse_file(&cas, *cur); in read_certificates() 66 *cur, (unsigned) -ret, error_message); in read_certificates() 69 *cur, (unsigned) -ret); in read_certificates()
|
D | cert_app.c | 266 mbedtls_x509_crt *cur = &crt; in main() local 296 while (cur != NULL) { in main() 299 cur); in main() 308 cur = cur->next; in main()
|
/mbedtls-latest/programs/test/ |
D | udp_proxy.c | 671 packet cur; in handle_message() local 679 if ((ret = mbedtls_net_recv(src, cur.buf, sizeof(cur.buf))) <= 0) { in handle_message() 684 cur.len = ret; in handle_message() 685 cur.type = msg_type(cur.buf, cur.len); in handle_message() 686 cur.way = way; in handle_message() 687 cur.dst = dst; in handle_message() 688 print_packet(&cur, NULL); in handle_message() 690 id = cur.len % sizeof(held); in handle_message() 707 if (strcmp(delay_list[delay_idx], cur.type) == 0) { in handle_message() 709 delay_packet(&cur); in handle_message() [all …]
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 761 sni_entry *cur = head, *next; in sni_free() local 763 while (cur != NULL) { in sni_free() 764 mbedtls_x509_crt_free(cur->cert); in sni_free() 765 mbedtls_free(cur->cert); in sni_free() 767 mbedtls_pk_free(cur->key); in sni_free() 768 mbedtls_free(cur->key); in sni_free() 770 mbedtls_x509_crt_free(cur->ca); in sni_free() 771 mbedtls_free(cur->ca); in sni_free() 773 mbedtls_x509_crl_free(cur->crl); in sni_free() 774 mbedtls_free(cur->crl); in sni_free() [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.function | 500 mbedtls_x509_sequence *cur = NULL; 515 cur = &crt.subject_alt_names; 516 while (cur != NULL) { 517 ret = mbedtls_x509_parse_subject_alt_name(&cur->buf, &san); 527 cur = cur->next; 1369 mbedtls_x509_crt chain, *cur; 1378 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { 1379 if (cur->raw.p != NULL) { 1395 mbedtls_x509_crt chain, *cur; 1404 for (i = 0, cur = &chain; cur != NULL; cur = cur->next) { [all …]
|
D | test_suite_asn1parse.function | 572 mbedtls_asn1_sequence *cur; 590 cur = &head; 593 TEST_ASSERT(cur != NULL); 594 TEST_EQUAL(cur->buf.tag, tag); 596 TEST_EQUAL(n, (size_t) (cur->buf.p - input->x)); 599 TEST_EQUAL(n, cur->buf.len); 603 cur = cur->next; 606 TEST_ASSERT(cur == NULL);
|
D | host_test.function | 138 char *cur = buf; 141 params[cnt++] = cur; 151 cur = p + 1; 153 params[cnt++] = cur; 207 char **cur = params; 211 while (cur < params + cnt) { 212 char *type = *cur++; 213 char *val = *cur++;
|