Searched refs:cert (Results 1 – 7 of 7) sorted by relevance
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | pkcs11.c | 47 int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert, pkcs11h_certificate_t pkcs11_cert ) in mbedtls_pkcs11_x509_cert_bind() argument 53 if( cert == NULL ) in mbedtls_pkcs11_x509_cert_bind() 80 if( 0 != mbedtls_x509_crt_parse( cert, cert_blob, cert_blob_size ) ) in mbedtls_pkcs11_x509_cert_bind() 100 mbedtls_x509_crt cert; in mbedtls_pkcs11_priv_key_bind() local 102 mbedtls_x509_crt_init( &cert ); in mbedtls_pkcs11_priv_key_bind() 107 if( 0 != mbedtls_pkcs11_x509_cert_bind( &cert, pkcs11_cert ) ) in mbedtls_pkcs11_priv_key_bind() 110 priv_key->len = mbedtls_pk_get_len( &cert.pk ); in mbedtls_pkcs11_priv_key_bind() 116 mbedtls_x509_crt_free( &cert ); in mbedtls_pkcs11_priv_key_bind()
|
A D | ssl_srv.c | 979 cur->cert ); in ssl_pick_cert() 981 if( ! mbedtls_pk_can_do( &cur->cert->pk, pk_alg ) ) in ssl_pick_cert() 995 if( mbedtls_ssl_check_cert_usage( cur->cert, ciphersuite_info, in ssl_pick_cert() 1005 ssl_check_key_curve( &cur->cert->pk, ssl->handshake->curves ) != 0 ) in ssl_pick_cert() 1018 cur->cert->sig_md != MBEDTLS_MD_SHA1 ) in ssl_pick_cert() 1041 ssl->handshake->key_cert->cert ); in ssl_pick_cert()
|
A D | ssl_tls.c | 4334 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 4343 new_cert->cert = cert; in ssl_append_key_cert() 7397 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 7413 ((void) cert); in mbedtls_ssl_check_cert_usage() 7455 if( mbedtls_x509_crt_check_key_usage( cert, usage ) != 0 ) in mbedtls_ssl_check_cert_usage() 7476 if( mbedtls_x509_crt_check_extended_key_usage( cert, ext_oid, ext_len ) != 0 ) in mbedtls_ssl_check_cert_usage()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | pkcs11.h | 85 MBEDTLS_DEPRECATED int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert,
|
A D | ssl_internal.h | 879 mbedtls_x509_crt *cert; /*!< cert */ member 1184 return( key_cert == NULL ? NULL : key_cert->cert ); in mbedtls_ssl_own_cert() 1197 int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert,
|
A D | ssl.h | 772 mbedtls_x509_crt *cert, 838 mbedtls_x509_crt *cert,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 605 description part of the cert to the real signature. This meant that a 2766 authentication against a crafted CA cert. Cannot be triggered remotely 2852 trusted, no later cert is checked. (suggested by hannes-landeholm) 3308 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 3310 * Restore ability to locally trust a self-signed cert that is not a proper 3347 * cert_write app should use subject of issuer certificate as issuer of cert 3937 bottom-up (Peer cert depth is 0) 4465 * Before freeing a certificate, properly zero out all cert. data 4487 * Fixed a critical denial-of-service with X.509 cert. verification: 4510 * Added preliminary X.509 cert. writing by Pascal Vizeli
|
Completed in 37 milliseconds