| /openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
| D | ssl_helpers.c | 566 mbedtls_test_ssl_endpoint_certificate *cert = &(ep->cert); in test_ssl_endpoint_certificate_free() local 567 if (cert != NULL) { in test_ssl_endpoint_certificate_free() 568 if (cert->ca_cert != NULL) { in test_ssl_endpoint_certificate_free() 569 mbedtls_x509_crt_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 570 mbedtls_free(cert->ca_cert); in test_ssl_endpoint_certificate_free() 571 cert->ca_cert = NULL; in test_ssl_endpoint_certificate_free() 573 if (cert->cert != NULL) { in test_ssl_endpoint_certificate_free() 574 mbedtls_x509_crt_free(cert->cert); in test_ssl_endpoint_certificate_free() 575 mbedtls_free(cert->cert); in test_ssl_endpoint_certificate_free() 576 cert->cert = NULL; in test_ssl_endpoint_certificate_free() [all …]
|
| /openthread-latest/tools/tcat_ble_client/ble/ |
| D | ble_stream_secure.py | 53 self.cert = '' 60 self.cert = utils.load_cert_pem(certfile) 63 self.cert = utils.load_cert_pem(certfile) 110 cert = self.ssl_object.getpeercert(True) 111 cert_obj = load_der_x509_certificate(cert) 180 for cert in cc: 182 peer_cert_der_hex = utils.base64_string(cert.public_bytes(_ssl.ENCODING_DER))
|
| /openthread-latest/tools/tcat_ble_client/auth-generate/ |
| D | Makefile | 39 ./create-cert-tcat-device.sh $@ $(ca) 42 ./create-cert-tcat-commissioner.sh $@ $(ca) 45 ./create-cert-tcat-commissioner.sh $@ $(otherCa)
|
| /openthread-latest/third_party/mbedtls/repo/tests/data_files/ |
| D | Readme-x509.txt | 28 - enco-ca-prstr.pem: has its CN encoded as a printable string, but child cert 29 enco-cert-utf8str.pem has its issuer's CN encoded as a UTF-8 string. 32 server2-v1*.crt: EE cert (without of with chain in same file) 48 - C -> there is a CRL revoking this cert (see below) 62 - enco-cert-utf8str.pem: see enco-ca-prstr.pem above 68 - server3.crt: 1 E L: EC cert signed by RSA CA 69 - server4.crt: 2 R L: RSA cert signed by EC CA 83 -selfsigned.crt: Self-signed cert with S5 key 84 -ss-expired.crt: Self-signed cert with S5 key, expired
|
| /openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
| D | generate_tls13_compat_tests.py | 192 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] 306 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 308 cert=cert, key=key)] 428 for _, cert, key in map(lambda sig_alg: CERTIFICATES[sig_alg], self._cert_sig_algs): 429 ret += ['crt_file={cert} key_file={key}'.format(cert=cert, key=key)]
|
| /openthread-latest/src/cli/ |
| D | README_COAPS.md | 239 ### start \[check-peer-cert\|max-conn-attempts\] 243 …cert` parameter determines if the peer-certificate check is enabled (default) or disabled. The `ma… 246 - Setting `check-peer-cert` to `true`: Has the same effect as as omitting the argument, which is th… 247 - Setting `check-peer-cert` to `false`: `check-peer-cert` value is `false`, and the `max-conn-attem… 248 - Specifying a number: `check-peer-cert` is `true`, and the `max-conn-attempts` value is the number…
|
| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() argument 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() argument 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
| D | ssl_tls13_server.c | 1149 key_cert->cert); in ssl_tls13_pick_key_cert() 1156 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert() 1158 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert() 1175 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() 1178 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert() 1191 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
|
| D | ssl_misc.h | 1248 mbedtls_x509_crt *cert; /*!< cert */ member 1673 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1686 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
| D | ssl_tls12_server.c | 729 cur->cert); in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 767 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 782 ssl->handshake->key_cert->cert); in ssl_pick_cert()
|
| D | ssl_tls.c | 1839 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 1844 if (cert == NULL) { in ssl_append_key_cert() 1856 new_cert->cert = cert; in ssl_append_key_cert() 6348 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 6390 if (mbedtls_x509_crt_check_key_usage(cert, usage) != 0) { in mbedtls_ssl_check_cert_usage() 6403 if (mbedtls_x509_crt_check_extended_key_usage(cert, ext_oid, ext_len) != 0) { in mbedtls_ssl_check_cert_usage()
|
| /openthread-latest/tests/scripts/thread-cert/ |
| D | README.md | 17 ./script/test clean build cert tests/scripts/thread-cert/Cert_5_1_01_RouterAttach.py
|
| /openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
| D | pkcs7.h | 196 const mbedtls_x509_crt *cert, 225 const mbedtls_x509_crt *cert,
|
| D | ssl.h | 1015 mbedtls_x509_crt *cert, 1081 mbedtls_x509_crt *cert,
|
| /openthread-latest/script/ |
| D | test | 293 export PYTHONPATH=tests/scripts/thread-cert 312 export PYTHONPATH=tests/scripts/thread-cert 318 …./tests/scripts/thread-cert/run_cert_suite.py --run-directory ot_testing --multiply "${MULTIPLY:-1… 426 ./tests/scripts/thread-cert/pktverify/verify.py "$1" 706 cert)
|
| /openthread-latest/tests/toranj/ |
| D | README_CLI.md | 167 ## `toranj-cli` and `thread-cert` test framework 169 …cert` scripts (in `tests/scripts/thread-cert`) also use CLI commands. However, these two test fram… 174 - `thread-cert` test cases can run quickly (due to virtual time emulation), but the test script its…
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_x509parse.data | 3 x509_cert_info:"data_files/parse_input/server1.crt":"cert. version \: 3\nserial number \: 0… 7 x509_cert_info:"data_files/parse_input/server1.crt.der":"cert. version \: 3\nserial number … 11 x509_cert_info:"data_files/parse_input/server2.crt":"cert. version \: 3\nserial number \: 0… 15 x509_cert_info:"data_files/parse_input/server2.crt.der":"cert. version \: 3\nserial number … 19 x509_cert_info:"data_files/parse_input/test-ca.crt":"cert. version \: 3\nserial number \: 0… 23 x509_cert_info:"data_files/parse_input/test-ca.crt.der":"cert. version \: 3\nserial number … 27 x509_cert_info:"data_files/parse_input/cert_md5.crt":"cert. version \: 3\nserial number \: … 31 x509_cert_info:"data_files/parse_input/cert_sha1.crt":"cert. version \: 3\nserial number \:… 35 x509_cert_info:"data_files/parse_input/cert_sha224.crt":"cert. version \: 3\nserial number … 39 x509_cert_info:"data_files/parse_input/cert_sha256.crt":"cert. version \: 3\nserial number … [all …]
|
| D | test_suite_debug.data | 63 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n… 67 ….crt":"MyFile":999:"PREFIX_":"MyFile(0999)\: PREFIX_ #1\:\nMyFile(0999)\: cert. version \: 3\n…
|
| D | test_suite_ssl.data | 2949 Session serialization, save-load: no ticket, no cert 2953 Session serialization, save-load: small ticket, no cert 2957 Session serialization, save-load: large ticket, no cert 2961 Session serialization, save-load: no ticket, cert 2965 Session serialization, save-load: small ticket, cert 2969 Session serialization, save-load: large ticket, cert 2989 Session serialization, load-save: no ticket, no cert 2993 Session serialization, load-save: small ticket, no cert 2997 Session serialization, load-save: large ticket, no cert 3001 Session serialization, load-save: no ticket, cert [all …]
|
| /openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
| D | ssl_server2.c | 751 mbedtls_x509_crt *cert; member 764 mbedtls_x509_crt_free(cur->cert); in sni_free() 765 mbedtls_free(cur->cert); in sni_free() 819 if ((new->cert = mbedtls_calloc(1, sizeof(mbedtls_x509_crt))) == NULL || in sni_parse() 824 mbedtls_x509_crt_init(new->cert); in sni_parse() 827 if (mbedtls_x509_crt_parse_file(new->cert, crt_file) != 0 || in sni_parse() 932 return mbedtls_ssl_set_hs_own_cert(ssl, cur->cert, cur->key); in cert_callback() 1086 mbedtls_x509_crt *cert; /*!< Certificate corresponding to the key */ member 1109 mbedtls_x509_crt *cert, in ssl_async_set_key() argument 1117 ctx->slots[ctx->slots_used].cert = cert; in ssl_async_set_key() [all …]
|
| /openthread-latest/tools/tcat_ble_client/ |
| D | README.md | 63 poetry run python3 bbtc.py --cert_path ./auth-cert/CommCert2 --name 'Thread BLE' 66 The `auth-cert` directory contains some other identities too, for testing purposes. Refer to Thread…
|
| D | GENERATING_CERTIFICATES.md | 24 …d for the TCAT Commissioner and Device identities in the `auth` and `auth-cert` directories! The C…
|
| /openthread-latest/tests/scripts/thread-cert/border_router/ |
| D | README.md | 23 TEST_CASE=./tests/scripts/thread-cert/border_router/test_advertising_proxy.py
|
| /openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
| D | ssl_helpers.h | 189 mbedtls_x509_crt *cert; member 201 mbedtls_test_ssl_endpoint_certificate cert; member
|
| /openthread-latest/src/core/meshcop/ |
| D | secure_transport.cpp | 1282 const mbedtls_x509_crt *cert; in GetThreadAttributeFromPeerCertificate() local 1285 cert = mbedtls_ssl_get_peer_cert(&session->mSsl); in GetThreadAttributeFromPeerCertificate() 1286 …error = GetThreadAttributeFromCertificate(cert, aThreadOidDescriptor, aAttributeBuffer, aAttribute… in GetThreadAttributeFromPeerCertificate() 1298 const mbedtls_x509_crt *cert = &mEcdheEcdsaInfo.mOwnCert; in GetThreadAttributeFromOwnCertificate() local 1300 …return GetThreadAttributeFromCertificate(cert, aThreadOidDescriptor, aAttributeBuffer, aAttributeL… in GetThreadAttributeFromOwnCertificate()
|