Home
last modified time | relevance | path

Searched refs:ext (Results 1 – 12 of 12) sorted by relevance

/mbedtls-development/library/
A Dx509_create.c321 mbedtls_asn1_named_data *ext ) in x509_write_extension() argument
326 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start, ext->val.p + 1, in x509_write_extension()
327 ext->val.len - 1 ) ); in x509_write_extension()
328 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, ext->val.len - 1 ) ); in x509_write_extension()
331 if( ext->val.p[0] != 0 ) in x509_write_extension()
336 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_raw_buffer( p, start, ext->oid.p, in x509_write_extension()
337 ext->oid.len ) ); in x509_write_extension()
338 MBEDTLS_ASN1_CHK_ADD( len, mbedtls_asn1_write_len( p, start, ext->oid.len ) ); in x509_write_extension()
A Dx509_crl.c97 mbedtls_x509_buf *ext ) in x509_get_crl_ext() argument
108 if( ( ret = mbedtls_x509_get_ext( p, end, ext, 0 ) ) != 0 ) in x509_get_crl_ext()
111 end = ext->p + ext->len; in x509_get_crl_ext()
177 mbedtls_x509_buf *ext ) in x509_get_crl_entry_ext() argument
186 ext->tag = **p; in x509_get_crl_entry_ext()
187 ext->p = *p; in x509_get_crl_entry_ext()
193 if( ( ret = mbedtls_asn1_get_tag( p, end, &ext->len, in x509_get_crl_entry_ext()
198 ext->p = NULL; in x509_get_crl_entry_ext()
204 end = *p + ext->len; in x509_get_crl_entry_ext()
206 if( end != *p + ext->len ) in x509_get_crl_entry_ext()
A Dssl_srv.c1127 unsigned char *buf, *p, *ext; in ssl_parse_client_hello() local
1583 ext = buf + ext_offset + 2; in ssl_parse_client_hello()
1596 ext_id = ( ( ext[0] << 8 ) | ( ext[1] ) ); in ssl_parse_client_hello()
1597 ext_size = ( ( ext[2] << 8 ) | ( ext[3] ) ); in ssl_parse_client_hello()
1614 ret = ssl_parse_servername_ext( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
1670 ret = ssl_parse_ecjpake_kkpp( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
1690 ret = ssl_parse_cid_ext( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
1710 ret = ssl_parse_extended_ms_ext( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
1730 ret = ssl_parse_alpn_ext( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
1740 ret = ssl_parse_use_srtp_ext( ssl, ext + 4, ext_size ); in ssl_parse_client_hello()
[all …]
A Dssl_cli.c1909 unsigned char *buf, *ext; in ssl_parse_server_hello() local
2212 ext = buf + 40 + n; in ssl_parse_server_hello()
2219 unsigned int ext_id = ( ( ext[0] << 8 ) in ssl_parse_server_hello()
2220 | ( ext[1] ) ); in ssl_parse_server_hello()
2221 unsigned int ext_size = ( ( ext[2] << 8 ) in ssl_parse_server_hello()
2222 | ( ext[3] ) ); in ssl_parse_server_hello()
2253 ext + 4, ext_size ) ) != 0 ) in ssl_parse_server_hello()
2266 ext + 4, in ssl_parse_server_hello()
2280 ext + 4, ext_size ) ) != 0 ) in ssl_parse_server_hello()
2294 ext + 4, ext_size ) ) != 0 ) in ssl_parse_server_hello()
[all …]
A Dx509.c706 mbedtls_x509_buf *ext, int tag ) in mbedtls_x509_get_ext() argument
714 ret = mbedtls_asn1_get_tag( p, end, &ext->len, in mbedtls_x509_get_ext()
719 ext->tag = MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | tag; in mbedtls_x509_get_ext()
720 ext->p = *p; in mbedtls_x509_get_ext()
721 end = *p + ext->len; in mbedtls_x509_get_ext()
/mbedtls-development/tests/suites/
A Dtest_suite_pk.data167 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK)
171 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message)
175 Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK)
179 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
183 Verify ext RSA #5 (PKCS1 v2.1, wrong salt_len)
187 Verify ext RSA #6 (PKCS1 v2.1, MGF1 alg != MSG hash alg)
195 Verify ext RSA #8 (PKCS1 v2.1, RSASSA-PSS without options)
199 Verify ext RSA #9 (PKCS1 v1.5, RSA with options)
203 Verify ext RSA #10 (PKCS1 v1.5, RSA without options)
207 Verify ext RSA #11 (PKCS1 v2.1, asking for ECDSA)
[all …]
A Dtest_suite_pkcs1_v21.data807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
831 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large)
835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
[all …]
A Dtest_suite_x509parse.data1541 X509 CRT ASN1 (TBSCertificate v3, ext SubjectAlternativeName malformed)
1605 X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag)
1609 X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing)
1613 X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding)
1617 X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds)
1621 X509 CRT ASN1 (TBS, inv v3Ext, first ext empty)
1625 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag)
1629 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing)
1633 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding)
1637 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds)
/mbedtls-development/scripts/
A Dgenerate_visualc_files.pl154 my ($path, $template, $dir, $ext) = @_;
175 content_to_file( $content, "$dir/$appname.$ext" );
/mbedtls-development/tests/scripts/
A Dcheck_files.py157 _root, ext = os.path.splitext(filepath)
158 return ext in ('.bat', '.dsp', '.dsw', '.sln', '.vcxproj')
/mbedtls-development/include/mbedtls/
A Dx509.h335 mbedtls_x509_buf *ext, int tag );
/mbedtls-development/doxygen/
A Dmbedtls.doxyfile248 # using this tag. The format is ext=language, where ext is a file extension,
782 # using *.ext= (so without naming a filter). This option only has effect when

Completed in 38 milliseconds