/mbedtls-development/library/ |
A D | x509_csr.c | 113 csr->raw.p = p; in mbedtls_x509_csr_parse_der() 114 csr->raw.len = len; in mbedtls_x509_csr_parse_der() 218 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der() 407 if( csr->raw.p != NULL ) in mbedtls_x509_csr_free() 409 mbedtls_platform_zeroize( csr->raw.p, csr->raw.len ); in mbedtls_x509_csr_free() 410 mbedtls_free( csr->raw.p ); in mbedtls_x509_csr_free()
|
A D | x509_crl.c | 256 cur_entry->raw.tag = **p; in x509_get_entries() 263 cur_entry->raw.p = *p; in x509_get_entries() 264 cur_entry->raw.len = len2; in x509_get_entries() 346 crl->raw.p = p; in mbedtls_x509_crl_parse_der() 347 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der() 493 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der() 666 while( entry != NULL && entry->raw.len != 0 ) in mbedtls_x509_crl_info() 747 if( crl_cur->raw.p != NULL ) in mbedtls_x509_crl_free() 749 mbedtls_platform_zeroize( crl_cur->raw.p, crl_cur->raw.len ); in mbedtls_x509_crl_free() 750 mbedtls_free( crl_cur->raw.p ); in mbedtls_x509_crl_free()
|
A D | x509_crt.c | 1126 crt->raw.len = crt_end - buf; in x509_crt_parse_der_core() 1130 crt->raw.p = p = mbedtls_calloc( 1, crt->raw.len ); in x509_crt_parse_der_core() 1131 if( crt->raw.p == NULL ) in x509_crt_parse_der_core() 1134 memcpy( crt->raw.p, buf, crt->raw.len ); in x509_crt_parse_der_core() 1137 p += crt->raw.len - len; in x509_crt_parse_der_core() 1142 crt->raw.p = (unsigned char*) buf; in x509_crt_parse_der_core() 2754 if( crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted() 2755 memcmp( crt->raw.p, cur->raw.p, crt->raw.len ) == 0 ) in x509_crt_check_ee_locally_trusted() 3336 if( cert_cur->raw.p != NULL && cert_cur->own_buffer ) in mbedtls_x509_crt_free() 3338 mbedtls_platform_zeroize( cert_cur->raw.p, cert_cur->raw.len ); in mbedtls_x509_crt_free() [all …]
|
A D | ssl_tls.c | 199 if( ( ret = mbedtls_x509_crt_parse_der( dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy() 200 src->peer_cert->raw.len ) ) != 0 ) in mbedtls_ssl_session_copy() 1709 n = crt->raw.len; in mbedtls_ssl_write_certificate() 1722 i += 3; memcpy( ssl->out_msg + i, crt->raw.p, n ); in mbedtls_ssl_write_certificate() 1759 if( peer_crt->raw.len != crt_buf_len ) in ssl_check_peer_crt_unchanged() 1762 return( memcmp( peer_crt->raw.p, crt_buf, peer_crt->raw.len ) ); in ssl_check_peer_crt_unchanged() 2349 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate() 2350 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate() 4751 cert_len = session->peer_cert->raw.len; in ssl_session_save_tls12() 4763 memcpy( p, session->peer_cert->raw.p, cert_len ); in ssl_session_save_tls12()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_persistent_key.data | 32 Save maximum-size persistent raw key 36 Save larger than maximum-size persistent raw key 71 import/export persistent raw key: 1 byte 82 import/export persistent raw key file not exist: 1 byte 97 import/export persistent raw key with restart: 1 byte 108 import/export persistent raw key file not exist with restart: 1 byte
|
A D | test_suite_psa_crypto_metadata.data | 197 Asymmetric signature: RSA PKCS#1 v1.5 raw 289 Key agreement: FFDH, raw output 301 Key agreement: ECDH, raw output 316 Key type: raw data
|
A D | test_suite_pk.function | 873 mbedtls_rsa_context raw; 881 mbedtls_rsa_init( &raw ); 895 /* Extract key to the raw rsa context */ 896 TEST_ASSERT( mbedtls_rsa_copy( &raw, mbedtls_pk_rsa( rsa ) ) == 0 ); 899 TEST_ASSERT( mbedtls_pk_setup_rsa_alt( &alt, (void *) &raw, 943 mbedtls_rsa_free( &raw );
|
A D | test_suite_psa_crypto.data | 4 PSA import/export raw: 1 bytes 7 PSA import/export raw: 1 bytes, larger buffer 10 PSA import/export raw: 2 bytes, buffer too small 25 PSA import/export raw: 1 bytes, opaque 1063 PSA key policy: raw agreement, key permits raw agreement, but algorithm is not raw 1087 Copy key: raw, 1 byte 1182 Copy key: raw, 1 byte, opaque 1278 Copy fail: raw data, no COPY flag 3518 PSA sign hash: RSA PKCS#1 v1.5, raw 4729 PSA key derivation: raw data, 8 bits [all …]
|
A D | test_suite_x509parse.function | 116 if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 ) 125 if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 ) 1028 if( cur->raw.p != NULL )
|
A D | test_suite_entropy.function | 419 /* Check if platform NV write and raw read manipulate the same data */
|
A D | test_suite_ssl.function | 1478 tmp_crt.raw.p, tmp_crt.raw.len, 4140 TEST_ASSERT( original.peer_cert->raw.len == 4141 restored.peer_cert->raw.len ); 4142 TEST_ASSERT( memcmp( original.peer_cert->raw.p, 4143 restored.peer_cert->raw.p, 4144 original.peer_cert->raw.len ) == 0 ); 4811 * Mode 1: Opaque PSK, then raw PSK
|
A D | test_suite_rsa.data | 239 RSA PKCS1 Sign #8 Verify (Wrong raw hash)
|
A D | test_suite_psa_crypto_se_driver_hal.function | 323 /* The RAM driver only works for certain key types: raw keys,
|
/mbedtls-development/programs/ssl/ |
A D | ssl_test_lib.c | 220 if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 ) in ca_callback() 229 if( mbedtls_x509_crt_parse_der( first, ca->raw.p, ca->raw.len ) != 0 ) in ca_callback()
|
/mbedtls-development/include/mbedtls/ |
A D | x509_crl.h | 54 mbedtls_x509_buf raw; member 79 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
A D | x509_csr.h | 52 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
|
A D | x509_crt.h | 57 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
/mbedtls-development/docs/ |
A D | 3.0-migration-guide.md | 421 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw 425 raw data are unchanged.) This affects the following functions: 740 - It no longer exports raw keys and IV. 749 For users which do not rely on raw keys and IV, adjusting to the new 754 Users which require access to the raw keys used to secure application 756 handshake transcript hashes which can be obtained from the raw data 963 `mbedtls_ssl_session_save()` and make copies of the raw
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 396 …he entropy is coming from a hardware peripheral, this should preferably be raw or lightly conditio… 981 … a full-entropy buffer (with data from all entropy sources already mixed), raw entropy direct from…
|
/mbedtls-development/ |
A D | ChangeLog | 142 other than raw PKCS#1 v1.5, this must match the output size of the 2694 buffer after DER certificates to be included in the raw representation. 3379 * debug_set_log_mode() added to determine raw or full logging
|