Home
last modified time | relevance | path

Searched refs:chain (Results 1 – 12 of 12) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_cache.c48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry()
152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot()
193 cache->chain = cur; in ssl_cache_pick_writing_slot()
213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot()
218 old = cache->chain; in ssl_cache_pick_writing_slot()
219 cache->chain = old->next; in ssl_cache_pick_writing_slot()
344 if (entry == cache->chain) { in mbedtls_ssl_cache_remove()
345 cache->chain = entry->next; in mbedtls_ssl_cache_remove()
348 for (prev = cache->chain; prev->next != NULL; prev = prev->next) { in mbedtls_ssl_cache_remove()
[all …]
H A Dctr_drbg.c168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local
232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
242 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df()
243 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df()
250 chain, chain)) != 0) { in block_cipher_df()
256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df()
313 mbedtls_platform_zeroize(chain, sizeof(chain)); in block_cipher_df()
H A Dx509_crl.c283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument
290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der()
505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument
513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse()
540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse()
560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse()
567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument
577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
H A Dx509_crt.c1313 static int mbedtls_x509_crt_parse_der_internal(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_internal() argument
1321 mbedtls_x509_crt *crt = chain, *prev = NULL; in mbedtls_x509_crt_parse_der_internal()
1356 if (crt != chain) { in mbedtls_x509_crt_parse_der_internal()
1366 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_nocopy() argument
1370 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 0, NULL, NULL); in mbedtls_x509_crt_parse_der_nocopy()
1373 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_with_ext_cb() argument
1380 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, make_copy, cb, p_ctx); in mbedtls_x509_crt_parse_der_with_ext_cb()
1383 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der() argument
1387 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 1, NULL, NULL); in mbedtls_x509_crt_parse_der()
1394 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse() argument
[all …]
H A Dssl_tls.c7755 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() argument
7861 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain()
7865 ret = mbedtls_x509_crt_parse_der_nocopy(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain()
7893 MBEDTLS_SSL_DEBUG_CRT(3, "peer certificate", chain); in ssl_parse_certificate_chain()
8019 mbedtls_x509_crt *chain = NULL; in mbedtls_ssl_parse_certificate() local
8032 chain = ssl->handshake->ecrs_peer_cert; in mbedtls_ssl_parse_certificate()
8061 chain = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in mbedtls_ssl_parse_certificate()
8062 if (chain == NULL) { in mbedtls_ssl_parse_certificate()
8072 mbedtls_x509_crt_init(chain); in mbedtls_ssl_parse_certificate()
8074 ret = ssl_parse_certificate_chain(ssl, chain); in mbedtls_ssl_parse_certificate()
[all …]
H A Dssl_misc.h1727 mbedtls_x509_crt *chain,
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dx509_crl.h109 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain,
127 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen);
144 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
H A Dx509_crt.h368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain,
453 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain,
491 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain,
529 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen);
549 int mbedtls_x509_crt_parse_file(mbedtls_x509_crt *chain, const char *path);
564 int mbedtls_x509_crt_parse_path(mbedtls_x509_crt *chain, const char *path);
H A Dssl_cache.h68 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(chain); /*!< start of the chain */
/optee_os/ldelf/
H A Dta_elf_rel.c145 uint32_t *chain = NULL; in resolve_sym_helper() local
169 chain = bucket + h->nbuckets; in resolve_sym_helper()
179 if (chain + idx > end) in resolve_sym_helper()
182 hashval = chain[idx]; in resolve_sym_helper()
199 uint32_t *chain = &bucket[nbuckets]; in resolve_sym_helper() local
206 for (n = bucket[hash % nbuckets]; n; n = chain[n]) { in resolve_sym_helper()
/optee_os/core/pta/veraison_attestation/
H A DREADME.md17 …rm Root of Trust (RoT), the PTA lacks foundational trust, which weakens the overall chain of trust.
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog3290 the peer CRT chain and session ticket twice.
4189 X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA
4213 chain was not verified due to an internal error (including in the verify
4214 callback) or chain length limitations.
4216 verification of the peer's certificate failed due to an overlong chain or
4289 * Accept empty trusted CA chain in authentication mode
4373 traversing a chain of trusted CA. The issue would cause both flags,
4740 * When verifying a certificate chain, if an intermediate certificate is
4897 chain verification.
5049 length of an X.509 verification chain.
[all …]