Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 19 of 19) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/library/
Dpkcs11.c47 int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert, pkcs11h_certificate_t pkcs11_cert ) in mbedtls_pkcs11_x509_cert_bind() argument
53 if( cert == NULL ) in mbedtls_pkcs11_x509_cert_bind()
80 if( 0 != mbedtls_x509_crt_parse( cert, cert_blob, cert_blob_size ) ) in mbedtls_pkcs11_x509_cert_bind()
100 mbedtls_x509_crt cert; in mbedtls_pkcs11_priv_key_bind() local
102 mbedtls_x509_crt_init( &cert ); in mbedtls_pkcs11_priv_key_bind()
107 if( 0 != mbedtls_pkcs11_x509_cert_bind( &cert, pkcs11_cert ) ) in mbedtls_pkcs11_priv_key_bind()
110 priv_key->len = mbedtls_pk_get_len( &cert.pk ); in mbedtls_pkcs11_priv_key_bind()
116 mbedtls_x509_crt_free( &cert ); in mbedtls_pkcs11_priv_key_bind()
Dssl_srv.c959 cur->cert ); in ssl_pick_cert()
961 if( ! mbedtls_pk_can_do( &cur->cert->pk, pk_alg ) ) in ssl_pick_cert()
975 if( mbedtls_ssl_check_cert_usage( cur->cert, ciphersuite_info, in ssl_pick_cert()
985 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert()
998 cur->cert->sig_md != MBEDTLS_MD_SHA1 ) in ssl_pick_cert()
1021 ssl->handshake->key_cert->cert ); in ssl_pick_cert()
Dssl_tls.c4222 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument
4231 new_cert->cert = cert; in ssl_append_key_cert()
7340 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument
7356 ((void) cert); in mbedtls_ssl_check_cert_usage()
7398 if( mbedtls_x509_crt_check_key_usage( cert, usage ) != 0 ) in mbedtls_ssl_check_cert_usage()
7419 if( mbedtls_x509_crt_check_extended_key_usage( cert, ext_oid, ext_len ) != 0 ) in mbedtls_ssl_check_cert_usage()
/openthread-2.7.6/tests/scripts/
DMakefile.am34 thread-cert \
45 thread-cert \
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert
29 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string.
32 server2-v1*.crt: EE cert (without of with chain in same file)
48 - C -> there is a CRL revoking this cert (see below)
62 - enco-cert-utf8str.pem: see enco-ca-prstr.pem above
68 - server3.crt: 1 E L: EC cert signed by RSA CA
69 - server4.crt: 2 R L: RSA cert signed by EC CA
79 -selfsigned.crt: Self-signed cert with S5 key
80 -ss-expired.crt: Self-signed cert with S5 key, expired
DMakefile183 enco-cert-utf8str.pem: rsa_pkcs1_1024_clear.pem
187 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_…
190 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_…
1077 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_…
/openthread-2.7.6/tests/scripts/thread-cert/
DREADME.md17 ./script/test clean build cert tests/scripts/thread-cert/Cert_5_1_01_RouterAttach.py
/openthread-2.7.6/script/
Dtest223 export PYTHONPATH=tests/scripts/thread-cert
241 export PYTHONPATH=tests/scripts/thread-cert
244 python3 tests/scripts/thread-cert/run_cert_suite.py --multiply "${MULTIPLY:-1}" "$@"
310 python3 ./tests/scripts/thread-cert/pktverify/verify.py "$1"
590 cert)
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_x509parse.data3 x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer na…
7 x509_cert_info:"data_files/server1.crt.der":"cert. version \: 3\nserial number \: 01\nissue…
11 x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer na…
15 x509_cert_info:"data_files/server2.crt.der":"cert. version \: 3\nserial number \: 02\nissue…
19 x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer na…
23 x509_cert_info:"data_files/test-ca.crt.der":"cert. version \: 3\nserial number \: 03\nissue…
27 x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer n…
31 x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer n…
35 x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer n…
39 x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer …
[all …]
Dtest_suite_ssl.function738 mbedtls_x509_crt cert;
753 mbedtls_endpoint_certificate cert;
766 mbedtls_endpoint_certificate *cert;
773 cert = &( ep->cert );
774 mbedtls_x509_crt_init( &( cert->ca_cert ) );
775 mbedtls_x509_crt_init( &( cert->cert ) );
776 mbedtls_pk_init( &( cert->pkey ) );
782 ret = mbedtls_x509_crt_parse_der( &( cert->ca_cert ),
794 ret = mbedtls_x509_crt_parse( &( cert->cert ),
799 ret = mbedtls_pk_parse_key( &( cert->pkey ),
[all …]
Dtest_suite_debug.data42 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
46 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
Dtest_suite_ssl.data10567 Session serialization, save-load: no ticket, no cert
10570 Session serialization, save-load: small ticket, no cert
10574 Session serialization, save-load: large ticket, no cert
10578 Session serialization, save-load: no ticket, cert
10582 Session serialization, save-load: small ticket, cert
10586 Session serialization, save-load: large ticket, cert
10590 Session serialization, load-save: no ticket, no cert
10593 Session serialization, load-save: small ticket, no cert
10597 Session serialization, load-save: large ticket, no cert
10601 Session serialization, load-save: no ticket, cert
[all …]
Dtest_suite_x509parse.function1043 * plus one "end-entity" cert (nb_int + 1) */
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/
Dpkcs11.h85 MBEDTLS_DEPRECATED int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert,
Dssl_internal.h860 mbedtls_x509_crt *cert; /*!< cert */ member
1142 return( key_cert == NULL ? NULL : key_cert->cert ); in mbedtls_ssl_own_cert()
1154 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert,
Dssl.h707 mbedtls_x509_crt *cert,
773 mbedtls_x509_crt *cert,
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/
Dssl_server2.c1125 mbedtls_x509_crt *cert; member
1139 mbedtls_x509_crt_free( cur->cert ); in sni_free()
1140 mbedtls_free( cur->cert ); in sni_free()
1195 if( ( new->cert = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ) ) == NULL || in sni_parse()
1199 mbedtls_x509_crt_init( new->cert ); in sni_parse()
1202 if( mbedtls_x509_crt_parse_file( new->cert, crt_file ) != 0 || in sni_parse()
1269 return( mbedtls_ssl_set_hs_own_cert( ssl, cur->cert, cur->key ) ); in sni_callback()
1447 mbedtls_x509_crt *cert; /*!< Certificate corresponding to the key */ member
1471 mbedtls_x509_crt *cert, in ssl_async_set_key() argument
1478 ctx->slots[ctx->slots_used].cert = cert; in ssl_async_set_key()
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog79 description part of the cert to the real signature. This meant that a
2240 authentication against a crafted CA cert. Cannot be triggered remotely
2326 trusted, no later cert is checked. (suggested by hannes-landeholm)
2782 * Restore ability to use a v1 cert as a CA if trusted locally. (This had
2784 * Restore ability to locally trust a self-signed cert that is not a proper
2821 * cert_write app should use subject of issuer certificate as issuer of cert
3411 bottom-up (Peer cert depth is 0)
3939 * Before freeing a certificate, properly zero out all cert. data
3961 * Fixed a critical denial-of-service with X.509 cert. verification:
3984 * Added preliminary X.509 cert. writing by Pascal Vizeli
/openthread-2.7.6/
Dconfigure.ac1026 tests/scripts/thread-cert/Makefile