Home
last modified time | relevance | path

Searched refs:cert (Results 1 – 8 of 8) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dpkcs7.h196 const mbedtls_x509_crt *cert,
225 const mbedtls_x509_crt *cert,
H A Dssl.h1065 mbedtls_x509_crt *cert,
1131 mbedtls_x509_crt *cert,
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dpkcs7.c643 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_data_or_hash_verify() argument
650 mbedtls_pk_context pk_cxt = cert->pk; in mbedtls_pkcs7_data_or_hash_verify()
659 if (mbedtls_x509_time_is_past(&cert->valid_to) || in mbedtls_pkcs7_data_or_hash_verify()
660 mbedtls_x509_time_is_future(&cert->valid_from)) { in mbedtls_pkcs7_data_or_hash_verify()
723 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_data_verify() argument
730 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, data, datalen, 0); in mbedtls_pkcs7_signed_data_verify()
734 const mbedtls_x509_crt *cert, in mbedtls_pkcs7_signed_hash_verify() argument
741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
H A Dssl_tls13_server.c1148 key_cert->cert); in ssl_tls13_pick_key_cert()
1155 key_cert->cert, MBEDTLS_X509_KU_DIGITAL_SIGNATURE) != 0 || in ssl_tls13_pick_key_cert()
1157 key_cert->cert, MBEDTLS_OID_SERVER_AUTH, in ssl_tls13_pick_key_cert()
1174 *sig_alg, &key_cert->cert->pk) in ssl_tls13_pick_key_cert()
1177 mbedtls_pk_can_do_ext(&key_cert->cert->pk, psa_alg, in ssl_tls13_pick_key_cert()
1190 ssl->handshake->key_cert->cert); in ssl_tls13_pick_key_cert()
H A Dssl_misc.h1253 mbedtls_x509_crt *cert; /*!< cert */ member
1696 return key_cert == NULL ? NULL : key_cert->cert; in mbedtls_ssl_own_cert()
1743 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
H A Dssl_tls12_server.c729 cur->cert); in ssl_pick_cert()
737 mbedtls_pk_can_do_ext(&cur->cert->pk, pk_alg, pk_usage)); in ssl_pick_cert()
743 key_type_matches = mbedtls_pk_can_do(&cur->cert->pk, pk_alg); in ssl_pick_cert()
758 if (mbedtls_ssl_check_cert_usage(cur->cert, ciphersuite_info, in ssl_pick_cert()
769 ssl_check_key_curve(&cur->cert->pk, in ssl_pick_cert()
784 ssl->handshake->key_cert->cert); in ssl_pick_cert()
H A Dssl_tls.c1838 mbedtls_x509_crt *cert, in ssl_append_key_cert() argument
1843 if (cert == NULL) { in ssl_append_key_cert()
1855 new_cert->cert = cert; in ssl_append_key_cert()
9765 int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert, in mbedtls_ssl_check_cert_usage() argument
9823 if (mbedtls_x509_crt_check_key_usage(cert, usage) != 0) { in mbedtls_ssl_check_cert_usage()
9840 if (mbedtls_x509_crt_check_extended_key_usage(cert, ext_oid, ext_len) != 0) { in mbedtls_ssl_check_cert_usage()
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog1018 * Add parsing of V3 extensions (key usage, Netscape cert-type,
1438 * Provide mechanism to reset handshake cert list by calling
1441 cert callback (mbedtls_ssl_conf_cert_cb()) during handshake.
2494 description part of the cert to the real signature. This meant that a
4655 authentication against a crafted CA cert. Cannot be triggered remotely
4741 trusted, no later cert is checked. (suggested by hannes-landeholm)
5197 * Restore ability to use a v1 cert as a CA if trusted locally. (This had
5199 * Restore ability to locally trust a self-signed cert that is not a proper
5236 * cert_write app should use subject of issuer certificate as issuer of cert
5826 bottom-up (Peer cert depth is 0)
[all …]