| /mbedtls/tests/suites/ |
| A D | test_suite_alignment.function | 15 uint8_t raw[8] = { 0 }; 17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) { 33 /* Define 64-bit aligned raw byte array */ 34 uint64_t raw[2]; 37 uint8_t *x = (uint8_t *) raw; 38 for (size_t i = 0; i < sizeof(raw); i++) { 248 /* Define 64-bit aligned raw byte array */ 249 uint64_t raw[2]; 251 uint8_t *x = (uint8_t *) raw; 252 for (size_t i = 0; i < sizeof(raw); i++) { [all …]
|
| A D | test_suite_psa_crypto_persistent_key.data | 37 Save maximum-size persistent raw key 41 Save larger than maximum-size persistent raw key 76 import/export persistent raw key: 1 byte 87 import/export persistent raw key file not exist: 1 byte 102 import/export persistent raw key with restart: 1 byte 113 import/export persistent raw key file not exist with restart: 1 byte
|
| A D | test_suite_psa_crypto_util.data | 37 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter) 41 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter) 45 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 49 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer) 89 ECDSA DER -> Raw, 256bit, r size 1 byte larger than allowed for output raw coordinate
|
| A D | test_suite_psa_crypto_metadata.data | 217 Asymmetric signature: RSA PKCS#1 v1.5 raw 329 Key agreement: FFDH, raw output 341 Key agreement: ECDH, raw output 356 Key type: raw data
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 17 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw 21 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw 25 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw 29 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw 73 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw 77 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw 81 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw 302 raw key agreement through driver: fake 306 raw key agreement through driver: in-driver 310 raw key agreement through driver: fallback [all …]
|
| A D | test_suite_psa_crypto.data | 7 PSA import/export raw: 1 bytes 10 PSA import/export raw: 1 bytes, larger buffer 13 PSA import/export raw: 2 bytes, buffer too small 28 PSA import/export raw: 1 bytes, opaque 1220 PSA key policy: raw agreement, key permits raw agreement, but algorithm is not raw 1244 Copy key: raw, 1 byte 1339 Copy key: raw, 1 byte, opaque 1435 Copy fail: raw data, no COPY flag 4330 PSA sign hash: RSA PKCS#1 v1.5, raw 7083 PSA key derivation: raw data, 8 bits [all …]
|
| A D | test_suite_x509parse.function | 117 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 124 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 1366 if (cur->raw.p != NULL) { 1392 if (cur->raw.p != NULL) {
|
| /mbedtls/library/ |
| A D | x509_crl.c | 242 cur_entry->raw.tag = **p; in x509_get_entries() 248 cur_entry->raw.p = *p; in x509_get_entries() 249 cur_entry->raw.len = len2; in x509_get_entries() 336 crl->raw.p = p; in mbedtls_x509_crl_parse_der() 337 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der() 468 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der() 634 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info() 699 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free() 700 mbedtls_zeroize_and_free(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free()
|
| A D | psa_util.c | 433 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, in mbedtls_ecdsa_raw_to_der() argument 449 memcpy(r, raw, coordinate_len); in mbedtls_ecdsa_raw_to_der() 450 memcpy(s, raw + coordinate_len, coordinate_len); in mbedtls_ecdsa_raw_to_der() 505 unsigned char *raw, size_t coordinate_size) in convert_der_to_raw_single_int() argument 544 memcpy(raw + padding_len, p, unpadded_len); in convert_der_to_raw_single_int() 551 unsigned char *raw, size_t raw_size, size_t *raw_len) in mbedtls_ecdsa_der_to_raw() argument 596 memcpy(raw, raw_tmp, 2 * coordinate_size); in mbedtls_ecdsa_der_to_raw()
|
| A D | x509_csr.c | 297 csr->raw.p = p; in mbedtls_x509_csr_parse_der_internal() 298 csr->raw.len = len; in mbedtls_x509_csr_parse_der_internal() 399 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der_internal() 632 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free() 633 mbedtls_zeroize_and_free(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free()
|
| A D | pkcs7.c | 566 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der() 567 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der() 572 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der() 592 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der() 752 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free() 756 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free() 770 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
|
| A D | x509_crt.c | 1112 crt->raw.len = (size_t) (crt_end - buf); in x509_crt_parse_der_core() 1115 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core() 1116 if (crt->raw.p == NULL) { in x509_crt_parse_der_core() 1120 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core() 1123 p += crt->raw.len - len; in x509_crt_parse_der_core() 1126 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core() 2454 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted() 2455 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted() 3246 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free() 3247 mbedtls_zeroize_and_free(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free()
|
| A D | ssl_tls.c | 259 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy() 260 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy() 3449 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save() 3460 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save() 7634 n = crt->raw.len; in mbedtls_ssl_write_certificate() 7646 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate() 7684 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged() 7688 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged() 8271 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate() 8272 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate()
|
| A D | ssl_tls13_generic.c | 897 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body() 903 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
|
| /mbedtls/include/mbedtls/ |
| A D | psa_util.h | 165 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, 182 unsigned char *raw, size_t raw_size, size_t *raw_len);
|
| A D | x509_crl.h | 41 mbedtls_x509_buf raw; member 65 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
| A D | pkcs7.h | 139 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
|
| A D | x509_csr.h | 39 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
|
| A D | x509.h | 241 mbedtls_x509_buf raw; member
|
| A D | x509_crt.h | 44 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
|
| /mbedtls/tests/data_files/ |
| A D | test_certs.h.jinja2 | 26 #define {{name}} {% raw -%} { {%- endraw %} {{ '\\' | put_to_column(position=80-11-name|length)}} 34 {% raw -%} } {%- endraw %}
|
| /mbedtls/programs/ssl/ |
| A D | ssl_test_lib.c | 335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
|
| /mbedtls/tests/src/test_helpers/ |
| A D | ssl_helpers.c | 1724 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session() 1725 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session() 1733 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
|
| /mbedtls/docs/ |
| A D | 3.0-migration-guide.md | 449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw 453 raw data are unchanged.) This affects the following functions: 768 - It no longer exports raw keys and IV. 777 For users which do not rely on raw keys and IV, adjusting to the new 782 Users which require access to the raw keys used to secure application 784 handshake transcript hashes which can be obtained from the raw data 991 `mbedtls_ssl_session_save()` and make copies of the raw
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-legacy-bridges.md | 334 const unsigned char *raw, size_t raw_len, 338 unsigned char *raw, size_t raw_size, size_t *raw_len); 343 …raw direction because the DER format lacks leading zeros, so something else needs to convey the si…
|