/mbedtls-latest/tests/suites/ |
D | test_suite_alignment.function | 15 uint8_t raw[8] = { 0 }; 17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) { 23 *result |= ((uint64_t) raw[i]) << ((olen - i - 1) * 8); 33 /* Define 64-bit aligned raw byte array */ 34 uint64_t raw[2]; 37 uint8_t *x = (uint8_t *) raw; 38 for (size_t i = 0; i < sizeof(raw); i++) { 57 /* Define expected result by manually aligning the raw bytes, and 62 memcpy(&raw_aligned_64, ((uint8_t *) &raw) + offset, size / 8); 248 /* Define 64-bit aligned raw byte array */ [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 37 Save maximum-size persistent raw key 41 Save larger than maximum-size persistent raw key 76 import/export persistent raw key: 1 byte 87 import/export persistent raw key file not exist: 1 byte 102 import/export persistent raw key with restart: 1 byte 113 import/export persistent raw key file not exist with restart: 1 byte
|
D | test_suite_psa_crypto_util.data | 47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter) 51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter) 55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer) 109 ECDSA DER -> Raw, 256bit, r size 1 byte larger than allowed for output raw coordinate
|
D | test_suite_psa_crypto_metadata.data | 217 Asymmetric signature: RSA PKCS#1 v1.5 raw 329 Key agreement: FFDH, raw output 341 Key agreement: ECDH, raw output 356 Key type: raw data
|
D | test_suite_psa_crypto_driver_wrappers.data | 20 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw 24 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw 28 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw 32 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw 76 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw 80 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw 84 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw 306 raw key agreement through driver: fake 310 raw key agreement through driver: in-driver 314 raw key agreement through driver: fallback [all …]
|
D | test_suite_psa_crypto.data | 7 PSA import/export raw: 1 bytes 10 PSA import/export raw: 1 bytes, larger buffer 13 PSA import/export raw: 2 bytes, buffer too small 28 PSA import/export raw: 1 bytes, opaque 32 PSA import/export raw: 1 bytes, larger buffer, opaque 36 PSA import/export raw: 2 bytes, buffer too small, opaque 663 PSA import: reject raw data key of length 0 667 PSA import: reject raw data key of length 0 and declared size 1 bit 671 PSA import: reject raw data key of length 0 and declared size 8 bits 751 PSA import large key: raw, 65528 bits (ok) [all …]
|
D | test_suite_x509parse.function | 122 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 129 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 1379 if (cur->raw.p != NULL) { 1405 if (cur->raw.p != NULL) {
|
D | test_suite_pk.function | 1719 mbedtls_rsa_context raw; 1727 mbedtls_rsa_init(&raw); 1741 /* Extract key to the raw rsa context */ 1742 TEST_ASSERT(mbedtls_rsa_copy(&raw, mbedtls_pk_rsa(rsa)) == 0); 1745 TEST_ASSERT(mbedtls_pk_setup_rsa_alt(&alt, (void *) &raw, 1801 mbedtls_rsa_free(&raw);
|
/mbedtls-latest/library/ |
D | x509_crl.c | 242 cur_entry->raw.tag = **p; in x509_get_entries() 248 cur_entry->raw.p = *p; in x509_get_entries() 249 cur_entry->raw.len = len2; in x509_get_entries() 336 crl->raw.p = p; in mbedtls_x509_crl_parse_der() 337 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der() 468 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der() 634 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info() 699 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free() 700 mbedtls_zeroize_and_free(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free()
|
D | psa_util.c | 433 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, in mbedtls_ecdsa_raw_to_der() argument 452 memcpy(r, raw, coordinate_len); in mbedtls_ecdsa_raw_to_der() 453 memcpy(s, raw + coordinate_len, coordinate_len); in mbedtls_ecdsa_raw_to_der() 508 unsigned char *raw, size_t coordinate_size) in convert_der_to_raw_single_int() argument 547 memcpy(raw + padding_len, p, unpadded_len); in convert_der_to_raw_single_int() 554 unsigned char *raw, size_t raw_size, size_t *raw_len) in mbedtls_ecdsa_der_to_raw() argument 602 memcpy(raw, raw_tmp, 2 * coordinate_size); in mbedtls_ecdsa_der_to_raw()
|
D | x509_csr.c | 297 csr->raw.p = p; in mbedtls_x509_csr_parse_der_internal() 298 csr->raw.len = len; in mbedtls_x509_csr_parse_der_internal() 399 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der_internal() 632 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free() 633 mbedtls_zeroize_and_free(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free()
|
D | pkcs7.c | 566 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der() 567 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der() 572 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der() 592 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der() 752 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free() 756 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free() 770 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
|
D | x509_crt.c | 1114 crt->raw.len = (size_t) (crt_end - buf); in x509_crt_parse_der_core() 1117 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core() 1118 if (crt->raw.p == NULL) { in x509_crt_parse_der_core() 1122 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core() 1125 p += crt->raw.len - len; in x509_crt_parse_der_core() 1128 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core() 2456 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted() 2457 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted() 3248 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free() 3249 mbedtls_zeroize_and_free(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free()
|
D | ssl_tls.c | 259 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy() 260 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy() 3449 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save() 3460 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save() 7599 n = crt->raw.len; in mbedtls_ssl_write_certificate() 7611 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate() 7649 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged() 7653 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged() 8048 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate() 8049 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate()
|
D | ssl_tls13_generic.c | 796 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body() 802 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
|
/mbedtls-latest/include/mbedtls/ |
D | psa_util.h | 165 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, 182 unsigned char *raw, size_t raw_size, size_t *raw_len);
|
D | x509_crl.h | 41 mbedtls_x509_buf raw; member 65 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
D | pkcs7.h | 139 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
|
D | x509_csr.h | 39 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
|
D | x509.h | 241 mbedtls_x509_buf raw; member
|
D | x509_crt.h | 44 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
/mbedtls-latest/programs/ssl/ |
D | ssl_test_lib.c | 335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw 453 raw data are unchanged.) This affects the following functions: 768 - It no longer exports raw keys and IV. 777 For users which do not rely on raw keys and IV, adjusting to the new 782 Users which require access to the raw keys used to secure application 784 handshake transcript hashes which can be obtained from the raw data 991 `mbedtls_ssl_session_save()` and make copies of the raw
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 1727 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session() 1728 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session() 1736 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 334 const unsigned char *raw, size_t raw_len, 338 unsigned char *raw, size_t raw_size, size_t *raw_len); 343 …raw direction because the DER format lacks leading zeros, so something else needs to convey the si…
|