Home
last modified time | relevance | path

Searched refs:raw (Results 1 – 25 of 37) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_alignment.function15 uint8_t raw[8] = { 0 };
17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) {
23 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8);
33 /* Define 64-bit aligned raw byte array */
34 uint64_t raw[2];
37 uint8_t *x = (uint8_t *) raw;
38 for (size_t i = 0; i < sizeof(raw); i++) {
57 /* Define expected result by manually aligning the raw bytes, and
62 memcpy(&raw_aligned_64, ((uint8_t *) &raw) + offset, size / 8);
248 /* Define 64-bit aligned raw byte array */
[all …]
Dtest_suite_psa_crypto_persistent_key.data37 Save maximum-size persistent raw key
41 Save larger than maximum-size persistent raw key
76 import/export persistent raw key: 1 byte
87 import/export persistent raw key file not exist: 1 byte
102 import/export persistent raw key with restart: 1 byte
113 import/export persistent raw key file not exist with restart: 1 byte
Dtest_suite_psa_crypto_util.data47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter)
51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter)
55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer)
59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
109 ECDSA DER -> Raw, 256bit, r size 1 byte larger than allowed for output raw coordinate
Dtest_suite_psa_crypto_metadata.data217 Asymmetric signature: RSA PKCS#1 v1.5 raw
329 Key agreement: FFDH, raw output
341 Key agreement: ECDH, raw output
356 Key type: raw data
Dtest_suite_psa_crypto_driver_wrappers.data20 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw
24 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw
28 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw
32 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw
76 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw
80 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw
84 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw
306 raw key agreement through driver: fake
310 raw key agreement through driver: in-driver
314 raw key agreement through driver: fallback
[all …]
Dtest_suite_psa_crypto.data7 PSA import/export raw: 1 bytes
10 PSA import/export raw: 1 bytes, larger buffer
13 PSA import/export raw: 2 bytes, buffer too small
28 PSA import/export raw: 1 bytes, opaque
32 PSA import/export raw: 1 bytes, larger buffer, opaque
36 PSA import/export raw: 2 bytes, buffer too small, opaque
663 PSA import: reject raw data key of length 0
667 PSA import: reject raw data key of length 0 and declared size 1 bit
671 PSA import: reject raw data key of length 0 and declared size 8 bits
751 PSA import large key: raw, 65528 bits (ok)
[all …]
Dtest_suite_x509parse.function122 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
129 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
1379 if (cur->raw.p != NULL) {
1405 if (cur->raw.p != NULL) {
Dtest_suite_pk.function1719 mbedtls_rsa_context raw;
1727 mbedtls_rsa_init(&raw);
1741 /* Extract key to the raw rsa context */
1742 TEST_ASSERT(mbedtls_rsa_copy(&raw, mbedtls_pk_rsa(rsa)) == 0);
1745 TEST_ASSERT(mbedtls_pk_setup_rsa_alt(&alt, (void *) &raw,
1801 mbedtls_rsa_free(&raw);
/mbedtls-latest/library/
Dx509_crl.c242 cur_entry->raw.tag = **p; in x509_get_entries()
248 cur_entry->raw.p = *p; in x509_get_entries()
249 cur_entry->raw.len = len2; in x509_get_entries()
336 crl->raw.p = p; in mbedtls_x509_crl_parse_der()
337 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der()
468 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der()
634 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info()
699 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free()
700 mbedtls_zeroize_and_free(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free()
Dpsa_util.c433 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, in mbedtls_ecdsa_raw_to_der() argument
452 memcpy(r, raw, coordinate_len); in mbedtls_ecdsa_raw_to_der()
453 memcpy(s, raw + coordinate_len, coordinate_len); in mbedtls_ecdsa_raw_to_der()
508 unsigned char *raw, size_t coordinate_size) in convert_der_to_raw_single_int() argument
547 memcpy(raw + padding_len, p, unpadded_len); in convert_der_to_raw_single_int()
554 unsigned char *raw, size_t raw_size, size_t *raw_len) in mbedtls_ecdsa_der_to_raw() argument
602 memcpy(raw, raw_tmp, 2 * coordinate_size); in mbedtls_ecdsa_der_to_raw()
Dx509_csr.c297 csr->raw.p = p; in mbedtls_x509_csr_parse_der_internal()
298 csr->raw.len = len; in mbedtls_x509_csr_parse_der_internal()
399 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der_internal()
632 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free()
633 mbedtls_zeroize_and_free(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free()
Dpkcs7.c566 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der()
567 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der()
572 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der()
592 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der()
752 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free()
756 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free()
770 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
Dx509_crt.c1114 crt->raw.len = (size_t) (crt_end - buf); in x509_crt_parse_der_core()
1117 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core()
1118 if (crt->raw.p == NULL) { in x509_crt_parse_der_core()
1122 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core()
1125 p += crt->raw.len - len; in x509_crt_parse_der_core()
1128 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core()
2456 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted()
2457 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted()
3248 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free()
3249 mbedtls_zeroize_and_free(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free()
Dssl_tls.c259 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy()
260 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy()
3449 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save()
3460 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save()
7599 n = crt->raw.len; in mbedtls_ssl_write_certificate()
7611 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate()
7649 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged()
7653 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged()
8048 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate()
8049 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate()
Dssl_tls13_generic.c796 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body()
802 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
/mbedtls-latest/include/mbedtls/
Dpsa_util.h165 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len,
182 unsigned char *raw, size_t raw_size, size_t *raw_len);
Dx509_crl.h41 mbedtls_x509_buf raw; member
65 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
Dpkcs7.h139 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
Dx509_csr.h39 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
Dx509.h241 mbedtls_x509_buf raw; member
Dx509_crt.h44 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
/mbedtls-latest/programs/ssl/
Dssl_test_lib.c335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
/mbedtls-latest/docs/
D3.0-migration-guide.md449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw
453 raw data are unchanged.) This affects the following functions:
768 - It no longer exports raw keys and IV.
777 For users which do not rely on raw keys and IV, adjusting to the new
782 Users which require access to the raw keys used to secure application
784 handshake transcript hashes which can be obtained from the raw data
991 `mbedtls_ssl_session_save()` and make copies of the raw
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c1727 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session()
1728 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
1736 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md334 const unsigned char *raw, size_t raw_len,
338 unsigned char *raw, size_t raw_size, size_t *raw_len);
343raw direction because the DER format lacks leading zeros, so something else needs to convey the si…

12