Searched refs:mbedtls_pk_parse_key (Results 1 – 18 of 18) sorted by relevance
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_pkparse.function | 149 TEST_ASSERT(mbedtls_pk_parse_key(&pk, buf->x, buf->len, NULL, 0, 191 TEST_EQUAL(mbedtls_pk_parse_key(&pk, input_key->x, input_key->len, NULL, 0,
|
D | test_suite_pk.function | 483 TEST_ASSERT(mbedtls_pk_parse_key(&pk, NULL, 0, NULL, 1, 503 TEST_ASSERT(mbedtls_pk_parse_key(&pk,
|
/mbedtls-3.6.0/programs/fuzz/ |
D | fuzz_privkey.c | 47 ret = mbedtls_pk_parse_key(&pk, Data, Size, NULL, 0, in LLVMFuzzerTestOneInput()
|
D | fuzz_dtlsserver.c | 84 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 93 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
/mbedtls-3.6.0/programs/ssl/ |
D | ssl_fork_server.c | 147 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_server.c | 149 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | dtls_server.c | 164 ret = mbedtls_pk_parse_key(&pkey, in main()
|
D | ssl_pthread_server.c | 374 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_mail_client.c | 523 ret = mbedtls_pk_parse_key(&pkey, in main()
|
D | ssl_server2.c | 2601 if ((ret = mbedtls_pk_parse_key(&pkey, in main() 2619 if ((ret = mbedtls_pk_parse_key(&pkey2, in main()
|
D | ssl_client2.c | 1674 { ret = mbedtls_pk_parse_key(&pkey, in main()
|
/mbedtls-3.6.0/include/mbedtls/ |
D | pk.h | 869 int mbedtls_pk_parse_key(mbedtls_pk_context *ctx,
|
/mbedtls-3.6.0/library/ |
D | pkparse.c | 127 ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng); in mbedtls_pk_parse_keyfile() 129 ret = mbedtls_pk_parse_key(ctx, buf, n, in mbedtls_pk_parse_keyfile() 1529 int mbedtls_pk_parse_key(mbedtls_pk_context *pk, in mbedtls_pk_parse_key() function
|
D | psa_crypto_rsa.c | 72 mbedtls_pk_parse_key(&ctx, data, data_length, NULL, 0, in mbedtls_psa_rsa_load_representation()
|
/mbedtls-3.6.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 646 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 659 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 674 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 687 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
|
/mbedtls-3.6.0/ |
D | ChangeLog | 292 * mbedtls_pk_parse_key() now rejects trailing garbage in encrypted keys. 999 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a 1320 mbedtls_pk_parse_key(), mbedtls_pk_parse_keyfile(). 2087 mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a 2263 * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some 2266 * Fix a bug in mbedtls_pk_parse_key() that would cause it to 3045 mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid 3989 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 4185 * Functions mbedtls_x509_xxx_parse(), mbedtls_pk_parse_key(),
|
/mbedtls-3.6.0/docs/ |
D | 3.0-migration-guide.md | 500 `mbedtls_pk_check_pair()`, `mbedtls_pk_parse_key()`, and
|