|
static int | x509_profile_check_md_alg (const mbedtls_x509_crt_profile *profile, mbedtls_md_type_t md_alg) |
|
static int | x509_profile_check_pk_alg (const mbedtls_x509_crt_profile *profile, mbedtls_pk_type_t pk_alg) |
|
static int | x509_profile_check_key (const mbedtls_x509_crt_profile *profile, mbedtls_pk_type_t pk_alg, const mbedtls_pk_context *pk) |
|
static int | x509_get_version (unsigned char **p, const unsigned char *end, int *ver) |
|
static int | x509_get_dates (unsigned char **p, const unsigned char *end, mbedtls_x509_time *from, mbedtls_x509_time *to) |
|
static int | x509_get_uid (unsigned char **p, const unsigned char *end, mbedtls_x509_buf *uid, int n) |
|
static int | x509_get_basic_constraints (unsigned char **p, const unsigned char *end, int *ca_istrue, int *max_pathlen) |
|
static int | x509_get_ns_cert_type (unsigned char **p, const unsigned char *end, unsigned char *ns_cert_type) |
|
static int | x509_get_key_usage (unsigned char **p, const unsigned char *end, unsigned int *key_usage) |
|
static int | x509_get_ext_key_usage (unsigned char **p, const unsigned char *end, mbedtls_x509_sequence *ext_key_usage) |
|
static int | x509_get_subject_alt_name (unsigned char **p, const unsigned char *end, mbedtls_x509_sequence *subject_alt_name) |
|
static int | x509_get_crt_ext (unsigned char **p, const unsigned char *end, mbedtls_x509_crt *crt) |
|
static int | x509_crt_parse_der_core (mbedtls_x509_crt *crt, const unsigned char *buf, size_t buflen) |
|
int | mbedtls_x509_crt_parse_der (mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen) |
| Parse a single DER formatted certificate and add it to the chained list. More...
|
|
int | mbedtls_x509_crt_parse (mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen) |
| Parse one or more certificates and add them to the chained list. Parses permissively. If some certificates can be parsed, the result is the number of failed certificates it encountered. If none complete correctly, the first error is returned. More...
|
|
int | mbedtls_x509_crt_parse_file (mbedtls_x509_crt *chain, const char *path) |
| Load one or more certificates and add them to the chained list. Parses permissively. If some certificates can be parsed, the result is the number of failed certificates it encountered. If none complete correctly, the first error is returned. More...
|
|
int | mbedtls_x509_crt_parse_path (mbedtls_x509_crt *chain, const char *path) |
| Load one or more certificate files from a path and add them to the chained list. Parses permissively. If some certificates can be parsed, the result is the number of failed certificates it encountered. If none complete correctly, the first error is returned. More...
|
|
static int | x509_info_subject_alt_name (char **buf, size_t *size, const mbedtls_x509_sequence *subject_alt_name) |
|
static int | x509_info_cert_type (char **buf, size_t *size, unsigned char ns_cert_type) |
|
static int | x509_info_key_usage (char **buf, size_t *size, unsigned int key_usage) |
|
static int | x509_info_ext_key_usage (char **buf, size_t *size, const mbedtls_x509_sequence *extended_key_usage) |
|
int | mbedtls_x509_crt_info (char *buf, size_t size, const char *prefix, const mbedtls_x509_crt *crt) |
| Returns an informational string about the certificate. More...
|
|
int | mbedtls_x509_crt_verify_info (char *buf, size_t size, const char *prefix, uint32_t flags) |
| Returns an informational string about the verification status of a certificate. More...
|
|
int | mbedtls_x509_crt_check_key_usage (const mbedtls_x509_crt *crt, unsigned int usage) |
| Check usage of certificate against keyUsage extension. More...
|
|
int | mbedtls_x509_crt_check_extended_key_usage (const mbedtls_x509_crt *crt, const char *usage_oid, size_t usage_len) |
| Check usage of certificate against extentedJeyUsage. More...
|
|
int | mbedtls_x509_crt_is_revoked (const mbedtls_x509_crt *crt, const mbedtls_x509_crl *crl) |
| Verify the certificate revocation status. More...
|
|
static int | x509_crt_verifycrl (mbedtls_x509_crt *crt, mbedtls_x509_crt *ca, mbedtls_x509_crl *crl_list, const mbedtls_x509_crt_profile *profile) |
|
static int | x509_memcasecmp (const void *s1, const void *s2, size_t len) |
|
static int | x509_check_wildcard (const char *cn, mbedtls_x509_buf *name) |
|
static int | x509_string_cmp (const mbedtls_x509_buf *a, const mbedtls_x509_buf *b) |
|
static int | x509_name_cmp (const mbedtls_x509_name *a, const mbedtls_x509_name *b) |
|
static int | x509_crt_check_parent (const mbedtls_x509_crt *child, const mbedtls_x509_crt *parent, int top, int bottom) |
|
static int | x509_crt_verify_top (mbedtls_x509_crt *child, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, int path_cnt, int self_cnt, uint32_t *flags, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) |
|
static int | x509_crt_verify_child (mbedtls_x509_crt *child, mbedtls_x509_crt *parent, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, int path_cnt, int self_cnt, uint32_t *flags, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) |
|
int | mbedtls_x509_crt_verify (mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const char *cn, uint32_t *flags, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) |
| Verify the certificate signature. More...
|
|
int | mbedtls_x509_crt_verify_with_profile (mbedtls_x509_crt *crt, mbedtls_x509_crt *trust_ca, mbedtls_x509_crl *ca_crl, const mbedtls_x509_crt_profile *profile, const char *cn, uint32_t *flags, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy) |
| Verify the certificate signature according to profile. More...
|
|
void | mbedtls_x509_crt_init (mbedtls_x509_crt *crt) |
| Initialize a certificate (chain) More...
|
|
void | mbedtls_x509_crt_free (mbedtls_x509_crt *crt) |
| Unallocate all certificate data. More...
|
|