/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | pkcs11.c | 47 int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert, pkcs11h_certificate_t pkcs11_cert ) in mbedtls_pkcs11_x509_cert_bind() argument 53 if( cert == NULL ) in mbedtls_pkcs11_x509_cert_bind() 80 if( 0 != mbedtls_x509_crt_parse( cert, cert_blob, cert_blob_size ) ) in mbedtls_pkcs11_x509_cert_bind() 100 mbedtls_x509_crt cert; in mbedtls_pkcs11_priv_key_bind() local 102 mbedtls_x509_crt_init( &cert ); in mbedtls_pkcs11_priv_key_bind() 107 if( 0 != mbedtls_pkcs11_x509_cert_bind( &cert, pkcs11_cert ) ) in mbedtls_pkcs11_priv_key_bind() 110 priv_key->len = mbedtls_pk_get_len( &cert.pk ); in mbedtls_pkcs11_priv_key_bind() 116 mbedtls_x509_crt_free( &cert ); in mbedtls_pkcs11_priv_key_bind()
|
D | ssl_srv.c | 959 cur->cert ); in ssl_pick_cert() 961 if( ! mbedtls_pk_can_do( &cur->cert->pk, pk_alg ) ) in ssl_pick_cert() 975 if( mbedtls_ssl_check_cert_usage( cur->cert, ciphersuite_info, in ssl_pick_cert() 985 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert() 998 cur->cert->sig_md != MBEDTLS_MD_SHA1 ) in ssl_pick_cert() 1021 ssl->handshake->key_cert->cert ); in ssl_pick_cert()
|
D | ssl_tls.c | 4222 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 4231 new_cert->cert = cert; in ssl_append_key_cert() 7340 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 7356 ((void) cert); in mbedtls_ssl_check_cert_usage() 7398 if( mbedtls_x509_crt_check_key_usage( cert, usage ) != 0 ) in mbedtls_ssl_check_cert_usage() 7419 if( mbedtls_x509_crt_check_extended_key_usage( cert, ext_oid, ext_len ) != 0 ) in mbedtls_ssl_check_cert_usage()
|
/openthread-2.7.6/tests/scripts/ |
D | Makefile.am | 34 thread-cert \ 45 thread-cert \
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/ |
D | Readme-x509.txt | 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert 29 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string. 32 server2-v1*.crt: EE cert (without of with chain in same file) 48 - C -> there is a CRL revoking this cert (see below) 62 - enco-cert-utf8str.pem: see enco-ca-prstr.pem above 68 - server3.crt: 1 E L: EC cert signed by RSA CA 69 - server4.crt: 2 R L: RSA cert signed by EC CA 79 -selfsigned.crt: Self-signed cert with S5 key 80 -ss-expired.crt: Self-signed cert with S5 key, expired
|
D | Makefile | 183 enco-cert-utf8str.pem: rsa_pkcs1_1024_clear.pem 187 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_… 190 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_… 1077 …$(OPENSSL) ca -gencrl -batch -cert $(test_ca_crt) -keyfile $(test_ca_key_file_rsa) -key $(test_ca_…
|
/openthread-2.7.6/tests/scripts/thread-cert/ |
D | README.md | 17 ./script/test clean build cert tests/scripts/thread-cert/Cert_5_1_01_RouterAttach.py
|
/openthread-2.7.6/script/ |
D | test | 223 export PYTHONPATH=tests/scripts/thread-cert 241 export PYTHONPATH=tests/scripts/thread-cert 244 python3 tests/scripts/thread-cert/run_cert_suite.py --multiply "${MULTIPLY:-1}" "$@" 310 python3 ./tests/scripts/thread-cert/pktverify/verify.py "$1" 590 cert)
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_x509parse.data | 3 x509_cert_info:"data_files/server1.crt":"cert. version \: 3\nserial number \: 01\nissuer na… 7 x509_cert_info:"data_files/server1.crt.der":"cert. version \: 3\nserial number \: 01\nissue… 11 x509_cert_info:"data_files/server2.crt":"cert. version \: 3\nserial number \: 02\nissuer na… 15 x509_cert_info:"data_files/server2.crt.der":"cert. version \: 3\nserial number \: 02\nissue… 19 x509_cert_info:"data_files/test-ca.crt":"cert. version \: 3\nserial number \: 03\nissuer na… 23 x509_cert_info:"data_files/test-ca.crt.der":"cert. version \: 3\nserial number \: 03\nissue… 27 x509_cert_info:"data_files/cert_md2.crt":"cert. version \: 3\nserial number \: 09\nissuer n… 31 x509_cert_info:"data_files/cert_md4.crt":"cert. version \: 3\nserial number \: 05\nissuer n… 35 x509_cert_info:"data_files/cert_md5.crt":"cert. version \: 3\nserial number \: 06\nissuer n… 39 x509_cert_info:"data_files/cert_sha1.crt":"cert. version \: 3\nserial number \: 07\nissuer … [all …]
|
D | test_suite_ssl.function | 738 mbedtls_x509_crt cert; 753 mbedtls_endpoint_certificate cert; 766 mbedtls_endpoint_certificate *cert; 773 cert = &( ep->cert ); 774 mbedtls_x509_crt_init( &( cert->ca_cert ) ); 775 mbedtls_x509_crt_init( &( cert->cert ) ); 776 mbedtls_pk_init( &( cert->pkey ) ); 782 ret = mbedtls_x509_crt_parse_der( &( cert->ca_cert ), 794 ret = mbedtls_x509_crt_parse( &( cert->cert ), 799 ret = mbedtls_pk_parse_key( &( cert->pkey ), [all …]
|
D | test_suite_debug.data | 42 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n… 46 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
|
D | test_suite_ssl.data | 10567 Session serialization, save-load: no ticket, no cert 10570 Session serialization, save-load: small ticket, no cert 10574 Session serialization, save-load: large ticket, no cert 10578 Session serialization, save-load: no ticket, cert 10582 Session serialization, save-load: small ticket, cert 10586 Session serialization, save-load: large ticket, cert 10590 Session serialization, load-save: no ticket, no cert 10593 Session serialization, load-save: small ticket, no cert 10597 Session serialization, load-save: large ticket, no cert 10601 Session serialization, load-save: no ticket, cert [all …]
|
D | test_suite_x509parse.function | 1043 * plus one "end-entity" cert (nb_int + 1) */
|
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/ |
D | pkcs11.h | 85 MBEDTLS_DEPRECATED int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert,
|
D | ssl_internal.h | 860 mbedtls_x509_crt *cert; /*!< cert */ member 1142 return( key_cert == NULL ? NULL : key_cert->cert ); in mbedtls_ssl_own_cert() 1154 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert,
|
D | ssl.h | 707 mbedtls_x509_crt *cert, 773 mbedtls_x509_crt *cert,
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_server2.c | 1125 mbedtls_x509_crt *cert; member 1139 mbedtls_x509_crt_free( cur->cert ); in sni_free() 1140 mbedtls_free( cur->cert ); in sni_free() 1195 if( ( new->cert = mbedtls_calloc( 1, sizeof( mbedtls_x509_crt ) ) ) == NULL || in sni_parse() 1199 mbedtls_x509_crt_init( new->cert ); in sni_parse() 1202 if( mbedtls_x509_crt_parse_file( new->cert, crt_file ) != 0 || in sni_parse() 1269 return( mbedtls_ssl_set_hs_own_cert( ssl, cur->cert, cur->key ) ); in sni_callback() 1447 mbedtls_x509_crt *cert; /*!< Certificate corresponding to the key */ member 1471 mbedtls_x509_crt *cert, in ssl_async_set_key() argument 1478 ctx->slots[ctx->slots_used].cert = cert; in ssl_async_set_key() [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 79 description part of the cert to the real signature. This meant that a 2240 authentication against a crafted CA cert. Cannot be triggered remotely 2326 trusted, no later cert is checked. (suggested by hannes-landeholm) 2782 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 2784 * Restore ability to locally trust a self-signed cert that is not a proper 2821 * cert_write app should use subject of issuer certificate as issuer of cert 3411 bottom-up (Peer cert depth is 0) 3939 * Before freeing a certificate, properly zero out all cert. data 3961 * Fixed a critical denial-of-service with X.509 cert. verification: 3984 * Added preliminary X.509 cert. writing by Pascal Vizeli
|
/openthread-2.7.6/ |
D | configure.ac | 1026 tests/scripts/thread-cert/Makefile
|