Home
last modified time | relevance | path

Searched refs:key_usage (Results 1 – 20 of 20) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/programs/x509/
Dcert_req.c103 unsigned char key_usage; /* key usage flags */ member
186 opt.key_usage = DFL_KEY_USAGE; in main()
324 opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; in main()
326 opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; in main()
328 opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; in main()
330 opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; in main()
332 opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; in main()
334 opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; in main()
336 opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; in main()
390 if (opt.key_usage || opt.force_key_usage == 1) { in main()
[all …]
Dcert_write.c201 unsigned char key_usage; /* key usage flags */ member
363 opt.key_usage = DFL_KEY_USAGE; in main()
479 opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; in main()
481 opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; in main()
483 opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; in main()
485 opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; in main()
487 opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; in main()
489 opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; in main()
491 opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; in main()
920 opt.key_usage != 0) { in main()
[all …]
/openthread-latest/third_party/mbedtls/repo/library/
Dx509_internal.h67 unsigned int *key_usage);
81 unsigned int key_usage);
Dx509write_csr.c83 int mbedtls_x509write_csr_set_key_usage(mbedtls_x509write_csr *ctx, unsigned char key_usage) in mbedtls_x509write_csr_set_key_usage() argument
91 ret = mbedtls_asn1_write_named_bitstring(&c, buf, &key_usage, 8); in mbedtls_x509write_csr_set_key_usage()
Dpk.c250 psa_key_usage_t key_usage; in mbedtls_pk_can_do_ext() local
302 key_usage = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_DERIVE; in mbedtls_pk_can_do_ext()
306 key_usage = PSA_KEY_USAGE_SIGN_HASH | in mbedtls_pk_can_do_ext()
315 return (key_usage & usage) == usage; in mbedtls_pk_can_do_ext()
335 key_usage = psa_get_key_usage_flags(&attributes); in mbedtls_pk_can_do_ext()
338 if ((key_usage & usage) != usage) { in mbedtls_pk_can_do_ext()
Dx509write_crt.c282 unsigned int key_usage) in mbedtls_x509write_crt_set_key_usage() argument
298 if ((key_usage & ~allowed_bits) != 0) { in mbedtls_x509write_crt_set_key_usage()
303 MBEDTLS_PUT_UINT16_LE(key_usage, ku, 0); in mbedtls_x509write_crt_set_key_usage()
Dx509.c1368 unsigned int *key_usage) in mbedtls_x509_get_key_usage() argument
1381 *key_usage = 0; in mbedtls_x509_get_key_usage()
1386 *key_usage = 0; in mbedtls_x509_get_key_usage()
1388 *key_usage |= (unsigned int) bs.p[i] << (8*i); in mbedtls_x509_get_key_usage()
1746 if ((key_usage) & (code)) { \
1752 unsigned int key_usage) in mbedtls_x509_info_key_usage() argument
Dx509_csr.c154 &csr->key_usage)) != 0) { in x509_csr_parse_extensions()
592 if ((ret = mbedtls_x509_info_key_usage(&p, &n, csr->key_usage)) != 0) { in mbedtls_x509_csr_info()
Dx509_crt.c973 &crt->key_usage)) != 0) { in x509_get_crt_ext()
1681 if (key_usage & (code)) { \
1857 if ((ret = mbedtls_x509_info_key_usage(&p, &n, crt->key_usage)) != 0) { in mbedtls_x509_crt_info()
1941 if (((crt->key_usage & ~may_mask) & usage_must) != usage_must) { in mbedtls_x509_crt_check_key_usage()
1947 if (((crt->key_usage & may_mask) | usage_may) != usage_may) { in mbedtls_x509_crt_check_key_usage()
Dpsa_crypto.c4909 psa_key_usage_t key_usage = 0; in psa_aead_setup() local
4928 key_usage = PSA_KEY_USAGE_ENCRYPT; in psa_aead_setup()
4930 key_usage = PSA_KEY_USAGE_DECRYPT; in psa_aead_setup()
4933 status = psa_get_and_lock_key_slot_with_policy(key, &slot, key_usage, in psa_aead_setup()
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dx509_csr.h49 unsigned int key_usage; /**< Optional key usage extension value: See the values in x509.h */ member
280 int mbedtls_x509write_csr_set_key_usage(mbedtls_x509write_csr *ctx, unsigned char key_usage);
Dx509_crt.h76 …unsigned int MBEDTLS_PRIVATE(key_usage); /**< Optional key usage extension value: See the valu…
1127 unsigned int key_usage);
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_x509write.data25 Certificate Request check Server1 key_usage
27 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_…
29 Certificate Request check opaque Server1 key_usage
33 Certificate Request check Server1 key_usage empty
45 Certificate Request check Server1 key_usage + ns_cert_type
49 Certificate Request check Server5 ECDSA, key_usage
57 Certificate Request check opaque Server5 ECDSA, key_usage
81 Certificate write check Server1 SHA1, key_usage
83 … MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"data_files/server1.key_usage.crt":0:0:"data_f…
109 Certificate write check Server1 SHA1, RSA_ALT, key_usage
[all …]
Dtest_suite_x509write.function144 int key_usage, int set_key_usage, int cert_type,
215 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0);
282 void x509_csr_check_opaque(char *key_file, int md_type, int key_usage,
314 if (key_usage != 0) {
315 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0);
344 int md_type, int key_usage, int set_key_usage,
492 TEST_ASSERT(mbedtls_x509write_crt_set_key_usage(&crt, key_usage) == 0);
Dtest_suite_psa_crypto_persistent_key.function48 int key_usage, int key_alg, int key_alg2)
58 psa_set_key_usage_flags(&attributes, key_usage);
Dtest_suite_pk.function768 void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg,
780 psa_set_key_usage_flags(&attributes, key_usage);
2591 psa_key_usage_t key_usage = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_VERIFY_HASH |
2609 key_usage |= PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT;
2614 key_type, key_usage, key_alg, &priv_key_id));
Dtest_suite_x509parse.data115 x509_cert_info:"data_files/parse_input/server1.key_usage.crt":"cert. version \: 3\nserial numbe…
2766 x509_check_key_usage:"data_files/server1.key_usage.crt":0:0
2770 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0
2774 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X…
2778 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X…
2782 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_…
2786 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X5…
2790 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X…
/openthread-latest/third_party/mbedtls/repo/tests/data_files/
DMakefile1456 server1.req.key_usage: server1.key
1457 …$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_enc…
1458 all_final += server1.req.key_usage
1461 …$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_enc…
1549 server5.ku-%.crt: SERVER5_EXT_OPTS=key_usage=$(SERVER5_KEY_USAGE)
1640 parse_input/server1.key_usage.crt: parse_input/server1.req.sha256
1641 server1.key_usage.crt: server1.req.sha256
1642 parse_input/server1.key_usage.crt server1.key_usage.crt: $(test_ca_crt) $(test_ca_key_file_rsa)
1643 parse_input/server1.key_usage.crt server1.key_usage.crt:
1644 …a) version=1 not_before=20190210144406 not_after=20290210144406 md=SHA1 key_usage=digital_signatur…
[all …]
DReadme-x509.txt64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
118 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
/openthread-latest/third_party/mbedtls/repo/
DChangeLog4493 * x509_crt.key_usage changed from unsigned char to unsigned int.
5098 * Certificate Request (CSR) generation with extensions (key_usage,