Searched refs:cert (Results 1 – 8 of 8) sorted by relevance
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | pkcs7.h | 196 const mbedtls_x509_crt *cert, 225 const mbedtls_x509_crt *cert,
|
| H A D | ssl.h | 1065 mbedtls_x509_crt *cert, 1131 mbedtls_x509_crt *cert,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | pkcs7.c | 643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() argument 650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify() 659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify() 660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify() 723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() argument 730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify() 734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
| H A D | ssl_tls13_server.c | 1148 key_cert->cert); in ssl_tls13_pick_key_cert() 1155 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert() 1157 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert() 1174 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert() 1177 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert() 1190 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
|
| H A D | ssl_misc.h | 1253 mbedtls_x509_crt *cert; /*!< cert */ member 1696 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert() 1743 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
| H A D | ssl_tls12_server.c | 729 cur->cert); in ssl_pick_cert() 737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert() 743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert() 758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert() 769 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert() 784 ssl->handshake->key_cert->cert); in ssl_pick_cert()
|
| H A D | ssl_tls.c | 1838 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument 1843 if (cert == NULL) { in ssl_append_key_cert() 1855 new_cert->cert = cert; in ssl_append_key_cert() 9765 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument 9823 if (mbedtls_x509_crt_check_key_usage(cert, usage) != 0) { in mbedtls_ssl_check_cert_usage() 9840 if (mbedtls_x509_crt_check_extended_key_usage(cert, ext_oid, ext_len) != 0) { in mbedtls_ssl_check_cert_usage()
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 1018 * Add parsing of V3 extensions (key usage, Netscape cert-type, 1438 * Provide mechanism to reset handshake cert list by calling 1441 cert callback (mbedtls_ssl_conf_cert_cb()) during handshake. 2494 description part of the cert to the real signature. This meant that a 4655 authentication against a crafted CA cert. Cannot be triggered remotely 4741 trusted, no later cert is checked. (suggested by hannes-landeholm) 5197 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 5199 * Restore ability to locally trust a self-signed cert that is not a proper 5236 * cert_write app should use subject of issuer certificate as issuer of cert 5826 bottom-up (Peer cert depth is 0) [all …]
|