Home
last modified time | relevance | path

Searched refs:profile (Results 1 – 11 of 11) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/library/
Dx509_crt.c171 static int x509_profile_check_md_alg(const mbedtls_x509_crt_profile *profile, in x509_profile_check_md_alg() argument
178 if ((profile->allowed_mds & MBEDTLS_X509_ID_FLAG(md_alg)) != 0) { in x509_profile_check_md_alg()
189 static int x509_profile_check_pk_alg(const mbedtls_x509_crt_profile *profile, in x509_profile_check_pk_alg() argument
196 if ((profile->allowed_pks & MBEDTLS_X509_ID_FLAG(pk_alg)) != 0) { in x509_profile_check_pk_alg()
207 static int x509_profile_check_key(const mbedtls_x509_crt_profile *profile, in x509_profile_check_key() argument
214 if (mbedtls_pk_get_bitlen(pk) >= profile->rsa_min_bitlen) { in x509_profile_check_key()
232 if ((profile->allowed_curves & MBEDTLS_X509_ID_FLAG(gid)) != 0) { in x509_profile_check_key()
2010 const mbedtls_x509_crt_profile *profile, in x509_crt_verifycrl() argument
2045 if (x509_profile_check_md_alg(profile, crl_list->sig_md) != 0) { in x509_crt_verifycrl()
2049 if (x509_profile_check_pk_alg(profile, crl_list->sig_pk) != 0) { in x509_crt_verifycrl()
[all …]
Dssl_tls.c1820 const mbedtls_x509_crt_profile *profile) in mbedtls_ssl_conf_cert_profile() argument
1822 conf->cert_profile = profile; in mbedtls_ssl_conf_cert_profile()
/openthread-latest/third_party/mbedtls/repo/programs/test/
Ddlopen.c66 const mbedtls_x509_crt_profile *profile = in main() local
70 X509_SO_FILENAME, (unsigned) profile->allowed_mds); in main()
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_x509parse.function21 /* Test-only profile allowing all digests, PK algorithms, and curves. */
31 profile. */
709 const mbedtls_x509_crt_profile *profile;
721 profile = &mbedtls_x509_crt_profile_default;
723 profile = &mbedtls_x509_crt_profile_next;
725 profile = &mbedtls_x509_crt_profile_suiteb;
727 profile = &compat_profile;
729 profile = &profile_all;
731 TEST_FAIL("Unknown algorithm profile");
751 profile,
[all …]
Dtest_suite_x509parse.data674 X509 CRT verification #14 (Valid Cert SHA1 Digest explicitly allowed in profile)
678 X509 CRT verification #14 (Valid Cert SHA1 Digest forbidden in default profile)
1022 X509 CRT verification #96 (next profile Invalid Cert SHA224 Digest)
1026 X509 CRT verification #97 (next profile Valid Cert SHA256 Digest)
2668 X509 CRT verify chain #11 (valid chain, missing profile)
2672 X509 CRT verify chain #12 (suiteb profile, RSA root)
2676 X509 CRT verify chain #13 (RSA only profile, EC root)
2680 X509 CRT verify chain #13 (RSA only profile, EC trusted EE)
2684 X509 CRT verify chain #14 (RSA-3072 profile, root key too small)
2688 X509 CRT verify chain #15 (suiteb profile, rsa intermediate)
[all …]
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dx509_crt.h714 const mbedtls_x509_crt_profile *profile,
748 const mbedtls_x509_crt_profile *profile,
814 const mbedtls_x509_crt_profile *profile,
Dssl.h3462 const mbedtls_x509_crt_profile *profile);
4171 static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile) in mbedtls_ssl_get_srtp_profile_as_string() argument
4173 switch (profile) { in mbedtls_ssl_get_srtp_profile_as_string()
/openthread-latest/third_party/mbedtls/repo/docs/
D3.0-migration-guide.md1014profile (`mbedtls_x509_crt_profile_default`) and the default curve and hash selection in TLS have …
1022 …oved from the default profile, call `mbedtls_x509_crt_verify_with_profile` instead of `mbedtls_x50…
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dtls13-support.md75 Note that in absence of an application profile standard specifying otherwise
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md344 The primary target is a configuration like TF-M's medium profile, plus TLS with only AEAD ciphersui…
/openthread-latest/third_party/mbedtls/repo/
DChangeLog1638 verification profile.
4224 size/curve against the profile. Before that, there was no way to set a
4299 * Made X509 profile pointer const in mbedtls_ssl_conf_cert_profile() to allow
4369 * Added a concept of X.509 cerificate verification profile that controls
4772 * Optimize for RAM usage in example config.h for NSA Suite B profile.