/mbedtls-latest/programs/x509/ |
D | cert_write.c | 191 const char *serial; /* serial number string (decimal) */ member 308 unsigned char serial[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN]; in main() local 330 memset(serial, 0, sizeof(serial)); in main() 358 opt.serial = DFL_SERIAL; in main() 410 opt.serial = q; in main() 696 ret = mbedtls_test_unhexify(serial, sizeof(serial), in main() 699 ret = parse_serial_decimal_format(serial, sizeof(serial), in main() 700 opt.serial, &serial_len); in main() 848 ret = mbedtls_x509write_crt_set_serial_raw(&crt, serial, serial_len); in main()
|
/mbedtls-latest/library/ |
D | x509write_crt.c | 98 const mbedtls_mpi *serial) in mbedtls_x509write_crt_set_serial() argument 104 tmp_len = mbedtls_mpi_size(serial); in mbedtls_x509write_crt_set_serial() 111 ret = mbedtls_mpi_write_binary(serial, ctx->serial, tmp_len); in mbedtls_x509write_crt_set_serial() 121 unsigned char *serial, size_t serial_len) in mbedtls_x509write_crt_set_serial_raw() argument 128 memcpy(ctx->serial, serial, serial_len); in mbedtls_x509write_crt_set_serial_raw() 556 ctx->serial, ctx->serial_len)); in mbedtls_x509write_crt_der()
|
D | x509.c | 64 mbedtls_x509_buf *serial) in mbedtls_x509_get_serial() argument 79 serial->tag = *(*p)++; in mbedtls_x509_get_serial() 81 if ((ret = mbedtls_asn1_get_len(p, end, &serial->len)) != 0) { in mbedtls_x509_get_serial() 85 serial->p = *p; in mbedtls_x509_get_serial() 86 *p += serial->len; in mbedtls_x509_get_serial() 945 int mbedtls_x509_serial_gets(char *buf, size_t size, const mbedtls_x509_buf *serial) in mbedtls_x509_serial_gets() argument 954 nr = (serial->len <= 32) in mbedtls_x509_serial_gets() 955 ? serial->len : 28; in mbedtls_x509_serial_gets() 958 if (i == 0 && nr > 1 && serial->p[i] == 0x0) { in mbedtls_x509_serial_gets() 963 serial->p[i], (i < nr - 1) ? ":" : ""); in mbedtls_x509_serial_gets() [all …]
|
D | ssl_cookie.c | 69 ctx->serial = 0; in mbedtls_ssl_cookie_init() 211 t = ctx->serial++; in mbedtls_ssl_cookie_write() 363 cur_time = ctx->serial; in mbedtls_ssl_cookie_check()
|
D | x509_crt.c | 1154 (ret = mbedtls_x509_get_serial(&p, end, &crt->serial)) != 0 || in x509_crt_parse_der_core() 1776 ret = mbedtls_x509_serial_gets(p, n, &crt->serial); in mbedtls_x509_crt_info() 1994 while (cur != NULL && cur->serial.len != 0) { in mbedtls_x509_crt_is_revoked() 1995 if (crt->serial.len == cur->serial.len && in mbedtls_x509_crt_is_revoked() 1996 memcmp(crt->serial.p, cur->serial.p, crt->serial.len) == 0) { in mbedtls_x509_crt_is_revoked()
|
D | x509_internal.h | 42 mbedtls_x509_buf *serial);
|
D | x509_crl.c | 252 if ((ret = mbedtls_x509_get_serial(p, end2, &cur_entry->serial)) != 0) { in x509_get_entries() 639 ret = mbedtls_x509_serial_gets(p, n, &entry->serial); in mbedtls_x509_crl_info()
|
D | pkcs7.c | 321 ret = mbedtls_x509_get_serial(p, end_issuer_and_sn, &signer->serial); in pkcs7_get_signer_info()
|
/mbedtls-latest/include/mbedtls/ |
D | x509_crt.h | 48 mbedtls_x509_buf serial; /**< Unique id for certificate issued by a specific CA. */ member 219 unsigned char MBEDTLS_PRIVATE(serial)[MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN]; 970 mbedtls_x509write_cert *ctx, const mbedtls_mpi *serial); 987 unsigned char *serial, size_t serial_len);
|
D | ssl_cookie.h | 52 unsigned long MBEDTLS_PRIVATE(serial); /*!< serial number for expiration */
|
D | x509_crl.h | 43 mbedtls_x509_buf serial; member
|
D | pkcs7.h | 110 mbedtls_x509_buf MBEDTLS_PRIVATE(serial);
|
D | x509.h | 373 int mbedtls_x509_serial_gets(char *buf, size_t size, const mbedtls_x509_buf *serial);
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.data | 91 … hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 31323334… 95 … hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 31323380… 127 … hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 31323334… 199 …e \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 31323334… 203 …e \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 31323380… 223 …e \: hardware module name \: hardware type \: 1.3.6.1.4.1.17.3, hardware serial number \: 31323334… 395 … hardware type \: 1.3.6.1.4.1.17.3\n hardware serial number \: 31323380… 1187 …ED:"depth 1 - serial C1\:43\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test E… 1191 …rt":"../framework/data_files/server5-selfsigned.crt":"NULL":0:"depth 0 - serial 53\:A2\:CB\:4B\:12… 1195 …r5-ss-expired.crt":"NULL":MBEDTLS_ERR_X509_CERT_VERIFY_FAILED:"depth 0 - serial D8\:64\:61\:05\:E3… [all …]
|
D | test_suite_x509parse.function | 212 ret = mbedtls_snprintf(p, n, "depth %d - serial ", certificate_depth); 215 ret = mbedtls_x509_serial_gets(p, n, &crt->serial); 261 ret = mbedtls_snprintf(p, n, ", hardware serial number : "); 1689 data_t *serial, 1727 if (serial->len > 0) { 1731 serial->x, serial->len), 0); 1732 TEST_EQUAL(crt.authority_key_id.authorityCertSerialNumber.len, serial->len);
|
D | test_suite_x509write.data | 145 Certificate write check Server1 SHA1, Full length serial 151 …":MBEDTLS_MD_SHA1:0:0:"NULL":0:0:1:-1:"../framework/data_files/server1.80serial.crt":0:0:"../frame… 153 Certificate write check Server1 SHA1, All 0xFF full length serial 266 Check max serial length
|
D | test_suite_debug.data | 63 …9)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\nMyFile(0999)\: serial number \: 01\n… 67 …9)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\nMyFile(0999)\: serial number \: C1\:…
|
D | test_suite_pkcs7.data | 109 PKCS7 Signed Data Parse Failure Corrupt signerInfo.serial #15.2
|
/mbedtls-latest/ |
D | ChangeLog | 907 * mbedtls_x509write_crt_set_serial() now explicitly rejects serial numbers 969 - now it accepts the serial number in 2 different formats: decimal and 971 - "serial" is used for the decimal format and it's limted in size to 1161 serial numbers are now rendered in hex format. Fixes #6262. 5859 * If certificate serial is longer than 32 octets, serial number is now 5863 * Corrected removal of leading "00:" in printing serial numbers in 6182 serial number, setup correct server port in the ssl client example
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 449 …s of buffers can either be leaked by the program through printing to the serial port or set to fix…
|