Home
last modified time | relevance | path

Searched refs:raw (Results 1 – 25 of 38) sorted by relevance

12

/mbedtls/tests/suites/
A Dtest_suite_alignment.function15 uint8_t raw[8] = { 0 };
17 if (mbedtls_test_unhexify(raw, sizeof(raw), hex_string, &olen) != 0) {
33 /* Define 64-bit aligned raw byte array */
34 uint64_t raw[2];
37 uint8_t *x = (uint8_t *) raw;
38 for (size_t i = 0; i < sizeof(raw); i++) {
248 /* Define 64-bit aligned raw byte array */
249 uint64_t raw[2];
251 uint8_t *x = (uint8_t *) raw;
252 for (size_t i = 0; i < sizeof(raw); i++) {
[all …]
A Dtest_suite_psa_crypto_persistent_key.data37 Save maximum-size persistent raw key
41 Save larger than maximum-size persistent raw key
76 import/export persistent raw key: 1 byte
87 import/export persistent raw key file not exist: 1 byte
102 import/export persistent raw key with restart: 1 byte
113 import/export persistent raw key file not exist with restart: 1 byte
A Dtest_suite_psa_crypto_util.data37 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter)
41 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter)
45 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer)
49 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
89 ECDSA DER -> Raw, 256bit, r size 1 byte larger than allowed for output raw coordinate
A Dtest_suite_psa_crypto_metadata.data217 Asymmetric signature: RSA PKCS#1 v1.5 raw
329 Key agreement: FFDH, raw output
341 Key agreement: ECDH, raw output
356 Key type: raw data
A Dtest_suite_psa_crypto_driver_wrappers.data17 sign_hash transparent driver: in driver RSA PKCS#1 v1.5, raw
21 sign_hash transparent driver: fallback RSA PKCS#1 v1.5, raw
25 sign_hash transparent driver: error RSA PKCS#1 v1.5, raw
29 sign_hash transparent driver: fake RSA PKCS#1 v1.5, raw
73 verify_hash transparent driver: in driver Key Pair RSA PKCS#1 v1.5 raw
77 verify_hash transparent driver: fallback Key Pair RSA PKCS#1 v1.5 raw
81 verify_hash transparent driver: error Key Pair RSA PKCS#1 v1.5 raw
302 raw key agreement through driver: fake
306 raw key agreement through driver: in-driver
310 raw key agreement through driver: fallback
[all …]
A Dtest_suite_psa_crypto.data7 PSA import/export raw: 1 bytes
10 PSA import/export raw: 1 bytes, larger buffer
13 PSA import/export raw: 2 bytes, buffer too small
28 PSA import/export raw: 1 bytes, opaque
1220 PSA key policy: raw agreement, key permits raw agreement, but algorithm is not raw
1244 Copy key: raw, 1 byte
1339 Copy key: raw, 1 byte, opaque
1435 Copy fail: raw data, no COPY flag
4330 PSA sign hash: RSA PKCS#1 v1.5, raw
7083 PSA key derivation: raw data, 8 bits
[all …]
A Dtest_suite_x509parse.function117 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
124 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) {
1366 if (cur->raw.p != NULL) {
1392 if (cur->raw.p != NULL) {
/mbedtls/library/
A Dx509_crl.c242 cur_entry->raw.tag = **p; in x509_get_entries()
248 cur_entry->raw.p = *p; in x509_get_entries()
249 cur_entry->raw.len = len2; in x509_get_entries()
336 crl->raw.p = p; in mbedtls_x509_crl_parse_der()
337 crl->raw.len = buflen; in mbedtls_x509_crl_parse_der()
468 end = crl->raw.p + crl->raw.len; in mbedtls_x509_crl_parse_der()
634 while (entry != NULL && entry->raw.len != 0) { in mbedtls_x509_crl_info()
699 if (crl_cur->raw.p != NULL) { in mbedtls_x509_crl_free()
700 mbedtls_zeroize_and_free(crl_cur->raw.p, crl_cur->raw.len); in mbedtls_x509_crl_free()
A Dpsa_util.c433 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, in mbedtls_ecdsa_raw_to_der() argument
449 memcpy(r, raw, coordinate_len); in mbedtls_ecdsa_raw_to_der()
450 memcpy(s, raw + coordinate_len, coordinate_len); in mbedtls_ecdsa_raw_to_der()
505 unsigned char *raw, size_t coordinate_size) in convert_der_to_raw_single_int() argument
544 memcpy(raw + padding_len, p, unpadded_len); in convert_der_to_raw_single_int()
551 unsigned char *raw, size_t raw_size, size_t *raw_len) in mbedtls_ecdsa_der_to_raw() argument
596 memcpy(raw, raw_tmp, 2 * coordinate_size); in mbedtls_ecdsa_der_to_raw()
A Dx509_csr.c297 csr->raw.p = p; in mbedtls_x509_csr_parse_der_internal()
298 csr->raw.len = len; in mbedtls_x509_csr_parse_der_internal()
399 end = csr->raw.p + csr->raw.len; in mbedtls_x509_csr_parse_der_internal()
632 if (csr->raw.p != NULL) { in mbedtls_x509_csr_free()
633 mbedtls_zeroize_and_free(csr->raw.p, csr->raw.len); in mbedtls_x509_csr_free()
A Dpkcs7.c566 pkcs7->raw.p = p = mbedtls_calloc(1, buflen); in mbedtls_pkcs7_parse_der()
567 if (pkcs7->raw.p == NULL) { in mbedtls_pkcs7_parse_der()
572 pkcs7->raw.len = buflen; in mbedtls_pkcs7_parse_der()
592 p = pkcs7->raw.p; in mbedtls_pkcs7_parse_der()
752 if (pkcs7 == NULL || pkcs7->raw.p == NULL) { in mbedtls_pkcs7_free()
756 mbedtls_free(pkcs7->raw.p); in mbedtls_pkcs7_free()
770 pkcs7->raw.p = NULL; in mbedtls_pkcs7_free()
A Dx509_crt.c1112 crt->raw.len = (size_t) (crt_end - buf); in x509_crt_parse_der_core()
1115 crt->raw.p = p = mbedtls_calloc(1, crt->raw.len); in x509_crt_parse_der_core()
1116 if (crt->raw.p == NULL) { in x509_crt_parse_der_core()
1120 memcpy(crt->raw.p, buf, crt->raw.len); in x509_crt_parse_der_core()
1123 p += crt->raw.len - len; in x509_crt_parse_der_core()
1126 crt->raw.p = (unsigned char *) buf; in x509_crt_parse_der_core()
2454 if (crt->raw.len == cur->raw.len && in x509_crt_check_ee_locally_trusted()
2455 memcmp(crt->raw.p, cur->raw.p, crt->raw.len) == 0) { in x509_crt_check_ee_locally_trusted()
3246 if (cert_cur->raw.p != NULL && cert_cur->own_buffer) { in mbedtls_x509_crt_free()
3247 mbedtls_zeroize_and_free(cert_cur->raw.p, cert_cur->raw.len); in mbedtls_x509_crt_free()
A Dssl_tls.c259 if ((ret = mbedtls_x509_crt_parse_der(dst->peer_cert, src->peer_cert->raw.p, in mbedtls_ssl_session_copy()
260 src->peer_cert->raw.len)) != 0) { in mbedtls_ssl_session_copy()
3449 cert_len = session->peer_cert->raw.len; in ssl_tls12_session_save()
3460 memcpy(p, session->peer_cert->raw.p, cert_len); in ssl_tls12_session_save()
7634 n = crt->raw.len; in mbedtls_ssl_write_certificate()
7646 i += 3; memcpy(ssl->out_msg + i, crt->raw.p, n); in mbedtls_ssl_write_certificate()
7684 if (peer_crt->raw.len != crt_buf_len) { in ssl_check_peer_crt_unchanged()
7688 return memcmp(peer_crt->raw.p, crt_buf, peer_crt->raw.len); in ssl_check_peer_crt_unchanged()
8271 crt_start = chain->raw.p; in mbedtls_ssl_parse_certificate()
8272 crt_len = chain->raw.len; in mbedtls_ssl_parse_certificate()
A Dssl_tls13_generic.c897 size_t cert_data_len = crt->raw.len; in ssl_tls13_write_certificate_body()
903 memcpy(p, crt->raw.p, cert_data_len); in ssl_tls13_write_certificate_body()
/mbedtls/include/mbedtls/
A Dpsa_util.h165 int mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len,
182 unsigned char *raw, size_t raw_size, size_t *raw_len);
A Dx509_crl.h41 mbedtls_x509_buf raw; member
65 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
A Dpkcs7.h139 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
A Dx509_csr.h39 mbedtls_x509_buf raw; /**< The raw CSR data (DER). */ member
A Dx509.h241 mbedtls_x509_buf raw; member
A Dx509_crt.h44 mbedtls_x509_buf raw; /**< The raw certificate data (DER). */ member
/mbedtls/tests/data_files/
A Dtest_certs.h.jinja226 #define {{name}} {% raw -%} { {%- endraw %} {{ '\\' | put_to_column(position=80-11-name|length)}}
34 {% raw -%} } {%- endraw %}
/mbedtls/programs/ssl/
A Dssl_test_lib.c335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback()
/mbedtls/tests/src/test_helpers/
A Dssl_helpers.c1724 psa_alg, tmp_crt.raw.p, in mbedtls_test_ssl_tls12_populate_session()
1725 tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
1733 tmp_crt.raw.p, tmp_crt.raw.len, in mbedtls_test_ssl_tls12_populate_session()
/mbedtls/docs/
A D3.0-migration-guide.md449 ignore it unless the `md_alg` parameter was `MBEDTLS_MD_NONE`, indicating raw
453 raw data are unchanged.) This affects the following functions:
768 - It no longer exports raw keys and IV.
777 For users which do not rely on raw keys and IV, adjusting to the new
782 Users which require access to the raw keys used to secure application
784 handshake transcript hashes which can be obtained from the raw data
991 `mbedtls_ssl_session_save()` and make copies of the raw
/mbedtls/docs/architecture/psa-migration/
A Dpsa-legacy-bridges.md334 const unsigned char *raw, size_t raw_len,
338 unsigned char *raw, size_t raw_size, size_t *raw_len);
343raw direction because the DER format lacks leading zeros, so something else needs to convey the si…

Completed in 84 milliseconds

12