| /openthread-latest/third_party/mbedtls/repo/programs/x509/ |
| D | cert_req.c | 103 unsigned char key_usage; /* key usage flags */ member 186 opt.key_usage = DFL_KEY_USAGE; in main() 324 opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; in main() 326 opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; in main() 328 opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; in main() 330 opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; in main() 332 opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; in main() 334 opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; in main() 336 opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; in main() 390 if (opt.key_usage || opt.force_key_usage == 1) { in main() [all …]
|
| D | cert_write.c | 201 unsigned char key_usage; /* key usage flags */ member 363 opt.key_usage = DFL_KEY_USAGE; in main() 479 opt.key_usage |= MBEDTLS_X509_KU_DIGITAL_SIGNATURE; in main() 481 opt.key_usage |= MBEDTLS_X509_KU_NON_REPUDIATION; in main() 483 opt.key_usage |= MBEDTLS_X509_KU_KEY_ENCIPHERMENT; in main() 485 opt.key_usage |= MBEDTLS_X509_KU_DATA_ENCIPHERMENT; in main() 487 opt.key_usage |= MBEDTLS_X509_KU_KEY_AGREEMENT; in main() 489 opt.key_usage |= MBEDTLS_X509_KU_KEY_CERT_SIGN; in main() 491 opt.key_usage |= MBEDTLS_X509_KU_CRL_SIGN; in main() 920 opt.key_usage != 0) { in main() [all …]
|
| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | x509_internal.h | 67 unsigned int *key_usage); 81 unsigned int key_usage);
|
| D | x509write_csr.c | 83 int mbedtls_x509write_csr_set_key_usage(mbedtls_x509write_csr *ctx, unsigned char key_usage) in mbedtls_x509write_csr_set_key_usage() argument 91 ret = mbedtls_asn1_write_named_bitstring(&c, buf, &key_usage, 8); in mbedtls_x509write_csr_set_key_usage()
|
| D | pk.c | 250 psa_key_usage_t key_usage; in mbedtls_pk_can_do_ext() local 302 key_usage = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_DERIVE; in mbedtls_pk_can_do_ext() 306 key_usage = PSA_KEY_USAGE_SIGN_HASH | in mbedtls_pk_can_do_ext() 315 return (key_usage & usage) == usage; in mbedtls_pk_can_do_ext() 335 key_usage = psa_get_key_usage_flags(&attributes); in mbedtls_pk_can_do_ext() 338 if ((key_usage & usage) != usage) { in mbedtls_pk_can_do_ext()
|
| D | x509write_crt.c | 282 unsigned int key_usage) in mbedtls_x509write_crt_set_key_usage() argument 298 if ((key_usage & ~allowed_bits) != 0) { in mbedtls_x509write_crt_set_key_usage() 303 MBEDTLS_PUT_UINT16_LE(key_usage, ku, 0); in mbedtls_x509write_crt_set_key_usage()
|
| D | x509.c | 1368 unsigned int *key_usage) in mbedtls_x509_get_key_usage() argument 1381 *key_usage = 0; in mbedtls_x509_get_key_usage() 1386 *key_usage = 0; in mbedtls_x509_get_key_usage() 1388 *key_usage |= (unsigned int) bs.p[i] << (8*i); in mbedtls_x509_get_key_usage() 1746 if ((key_usage) & (code)) { \ 1752 unsigned int key_usage) in mbedtls_x509_info_key_usage() argument
|
| D | x509_csr.c | 154 &csr->key_usage)) != 0) { in x509_csr_parse_extensions() 592 if ((ret = mbedtls_x509_info_key_usage(&p, &n, csr->key_usage)) != 0) { in mbedtls_x509_csr_info()
|
| D | x509_crt.c | 973 &crt->key_usage)) != 0) { in x509_get_crt_ext() 1681 if (key_usage & (code)) { \ 1857 if ((ret = mbedtls_x509_info_key_usage(&p, &n, crt->key_usage)) != 0) { in mbedtls_x509_crt_info() 1941 if (((crt->key_usage & ~may_mask) & usage_must) != usage_must) { in mbedtls_x509_crt_check_key_usage() 1947 if (((crt->key_usage & may_mask) | usage_may) != usage_may) { in mbedtls_x509_crt_check_key_usage()
|
| D | psa_crypto.c | 4909 psa_key_usage_t key_usage = 0; in psa_aead_setup() local 4928 key_usage = PSA_KEY_USAGE_ENCRYPT; in psa_aead_setup() 4930 key_usage = PSA_KEY_USAGE_DECRYPT; in psa_aead_setup() 4933 status = psa_get_and_lock_key_slot_with_policy(key, &slot, key_usage, in psa_aead_setup()
|
| /openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
| D | x509_csr.h | 49 unsigned int key_usage; /**< Optional key usage extension value: See the values in x509.h */ member 280 int mbedtls_x509write_csr_set_key_usage(mbedtls_x509write_csr *ctx, unsigned char key_usage);
|
| D | x509_crt.h | 76 …unsigned int MBEDTLS_PRIVATE(key_usage); /**< Optional key usage extension value: See the valu… 1127 unsigned int key_usage);
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_x509write.data | 25 Certificate Request check Server1 key_usage 27 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_… 29 Certificate Request check opaque Server1 key_usage 33 Certificate Request check Server1 key_usage empty 45 Certificate Request check Server1 key_usage + ns_cert_type 49 Certificate Request check Server5 ECDSA, key_usage 57 Certificate Request check opaque Server5 ECDSA, key_usage 81 Certificate write check Server1 SHA1, key_usage 83 … MBEDTLS_X509_KU_KEY_ENCIPHERMENT:1:"NULL":0:0:1:-1:"data_files/server1.key_usage.crt":0:0:"data_f… 109 Certificate write check Server1 SHA1, RSA_ALT, key_usage [all …]
|
| D | test_suite_x509write.function | 144 int key_usage, int set_key_usage, int cert_type, 215 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0); 282 void x509_csr_check_opaque(char *key_file, int md_type, int key_usage, 314 if (key_usage != 0) { 315 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0); 344 int md_type, int key_usage, int set_key_usage, 492 TEST_ASSERT(mbedtls_x509write_crt_set_key_usage(&crt, key_usage) == 0);
|
| D | test_suite_psa_crypto_persistent_key.function | 48 int key_usage, int key_alg, int key_alg2) 58 psa_set_key_usage_flags(&attributes, key_usage);
|
| D | test_suite_pk.function | 768 void pk_can_do_ext(int opaque_key, int key_type, int key_usage, int key_alg, 780 psa_set_key_usage_flags(&attributes, key_usage); 2591 psa_key_usage_t key_usage = PSA_KEY_USAGE_SIGN_HASH | PSA_KEY_USAGE_VERIFY_HASH | 2609 key_usage |= PSA_KEY_USAGE_ENCRYPT | PSA_KEY_USAGE_DECRYPT; 2614 key_type, key_usage, key_alg, &priv_key_id));
|
| D | test_suite_x509parse.data | 115 x509_cert_info:"data_files/parse_input/server1.key_usage.crt":"cert. version \: 3\nserial numbe… 2766 x509_check_key_usage:"data_files/server1.key_usage.crt":0:0 2770 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE:0 2774 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN:MBEDTLS_ERR_X… 2778 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X… 2782 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_CERT_SIGN|MBEDTLS_X509_… 2786 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_KEY_ENCIPHERMENT|MBEDTLS_X5… 2790 x509_check_key_usage:"data_files/server1.key_usage.crt":MBEDTLS_X509_KU_DIGITAL_SIGNATURE|MBEDTLS_X…
|
| /openthread-latest/third_party/mbedtls/repo/tests/data_files/ |
| D | Makefile | 1456 server1.req.key_usage: server1.key 1457 …$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_enc… 1458 all_final += server1.req.key_usage 1461 …$(MBEDTLS_CERT_REQ) output_file=$@ filename=$< key_usage=digital_signature,non_repudiation,key_enc… 1549 server5.ku-%.crt: SERVER5_EXT_OPTS=key_usage=$(SERVER5_KEY_USAGE) 1640 parse_input/server1.key_usage.crt: parse_input/server1.req.sha256 1641 server1.key_usage.crt: server1.req.sha256 1642 parse_input/server1.key_usage.crt server1.key_usage.crt: $(test_ca_crt) $(test_ca_key_file_rsa) 1643 parse_input/server1.key_usage.crt server1.key_usage.crt: 1644 …a) version=1 not_before=20190210144406 not_after=20290210144406 md=SHA1 key_usage=digital_signatur… [all …]
|
| D | Readme-x509.txt | 64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt 118 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
|
| /openthread-latest/third_party/mbedtls/repo/ |
| D | ChangeLog | 4493 * x509_crt.key_usage changed from unsigned char to unsigned int. 5098 * Certificate Request (CSR) generation with extensions (key_usage,
|