| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | ssl_cache.c | 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 193 cache->chain = cur; in ssl_cache_pick_writing_slot() 213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot() 218 old = cache->chain; in ssl_cache_pick_writing_slot() 219 cache->chain = old->next; in ssl_cache_pick_writing_slot() 344 if (entry == cache->chain) { in mbedtls_ssl_cache_remove() 345 cache->chain = entry->next; in mbedtls_ssl_cache_remove() 348 for (prev = cache->chain; prev->next != NULL; prev = prev->next) { in mbedtls_ssl_cache_remove() [all …]
|
| H A D | ctr_drbg.c | 168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local 232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 242 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df() 243 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df() 250 chain, chain)) != 0) { in block_cipher_df() 256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 313 mbedtls_platform_zeroize(chain, sizeof(chain)); in block_cipher_df()
|
| H A D | x509_crl.c | 283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument 290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der() 505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument 513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse() 540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse() 560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse() 567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument 577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
|
| H A D | x509_crt.c | 1313 static int mbedtls_x509_crt_parse_der_internal(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_internal() argument 1321 mbedtls_x509_crt *crt = chain, *prev = NULL; in mbedtls_x509_crt_parse_der_internal() 1356 if (crt != chain) { in mbedtls_x509_crt_parse_der_internal() 1366 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_nocopy() argument 1370 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 0, NULL, NULL); in mbedtls_x509_crt_parse_der_nocopy() 1373 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der_with_ext_cb() argument 1380 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, make_copy, cb, p_ctx); in mbedtls_x509_crt_parse_der_with_ext_cb() 1383 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse_der() argument 1387 return mbedtls_x509_crt_parse_der_internal(chain, buf, buflen, 1, NULL, NULL); in mbedtls_x509_crt_parse_der() 1394 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, in mbedtls_x509_crt_parse() argument [all …]
|
| H A D | ssl_tls.c | 7755 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() argument 7861 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7865 ret = mbedtls_x509_crt_parse_der_nocopy(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7893 MBEDTLS_SSL_DEBUG_CRT(3, "peer certificate", chain); in ssl_parse_certificate_chain() 8019 mbedtls_x509_crt *chain = NULL; in mbedtls_ssl_parse_certificate() local 8032 chain = ssl->handshake->ecrs_peer_cert; in mbedtls_ssl_parse_certificate() 8061 chain = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in mbedtls_ssl_parse_certificate() 8062 if (chain == NULL) { in mbedtls_ssl_parse_certificate() 8072 mbedtls_x509_crt_init(chain); in mbedtls_ssl_parse_certificate() 8074 ret = ssl_parse_certificate_chain(ssl, chain); in mbedtls_ssl_parse_certificate() [all …]
|
| H A D | ssl_misc.h | 1727 mbedtls_x509_crt *chain,
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | x509_crl.h | 109 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, 127 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen); 144 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
|
| H A D | x509_crt.h | 368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, 453 int mbedtls_x509_crt_parse_der_with_ext_cb(mbedtls_x509_crt *chain, 491 int mbedtls_x509_crt_parse_der_nocopy(mbedtls_x509_crt *chain, 529 int mbedtls_x509_crt_parse(mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen); 549 int mbedtls_x509_crt_parse_file(mbedtls_x509_crt *chain, const char *path); 564 int mbedtls_x509_crt_parse_path(mbedtls_x509_crt *chain, const char *path);
|
| H A D | ssl_cache.h | 68 mbedtls_ssl_cache_entry *MBEDTLS_PRIVATE(chain); /*!< start of the chain */
|
| /optee_os/ldelf/ |
| H A D | ta_elf_rel.c | 145 uint32_t *chain = NULL; in resolve_sym_helper() local 169 chain = bucket + h->nbuckets; in resolve_sym_helper() 179 if (chain + idx > end) in resolve_sym_helper() 182 hashval = chain[idx]; in resolve_sym_helper() 199 uint32_t *chain = &bucket[nbuckets]; in resolve_sym_helper() local 206 for (n = bucket[hash % nbuckets]; n; n = chain[n]) { in resolve_sym_helper()
|
| /optee_os/core/pta/veraison_attestation/ |
| H A D | README.md | 17 …rm Root of Trust (RoT), the PTA lacks foundational trust, which weakens the overall chain of trust.
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 3290 the peer CRT chain and session ticket twice. 4189 X.509 certificate chain had more than MBEDTLS_X509_MAX_INTERMEDIATE_CA 4213 chain was not verified due to an internal error (including in the verify 4214 callback) or chain length limitations. 4216 verification of the peer's certificate failed due to an overlong chain or 4289 * Accept empty trusted CA chain in authentication mode 4373 traversing a chain of trusted CA. The issue would cause both flags, 4740 * When verifying a certificate chain, if an intermediate certificate is 4897 chain verification. 5049 length of an X.509 verification chain. [all …]
|