Home
last modified time | relevance | path

Searched refs:mbedtls_pk_parse_key (Results 1 – 18 of 18) sorted by relevance

/mbedtls-3.6.0/tests/suites/
Dtest_suite_pkparse.function149 TEST_ASSERT(mbedtls_pk_parse_key(&pk, buf->x, buf->len, NULL, 0,
191 TEST_EQUAL(mbedtls_pk_parse_key(&pk, input_key->x, input_key->len, NULL, 0,
Dtest_suite_pk.function483 TEST_ASSERT(mbedtls_pk_parse_key(&pk, NULL, 0, NULL, 1,
503 TEST_ASSERT(mbedtls_pk_parse_key(&pk,
/mbedtls-3.6.0/programs/fuzz/
Dfuzz_privkey.c47 ret = mbedtls_pk_parse_key(&pk, Data, Size, NULL, 0, in LLVMFuzzerTestOneInput()
Dfuzz_dtlsserver.c84 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
Dfuzz_server.c93 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
/mbedtls-3.6.0/programs/ssl/
Dssl_fork_server.c147 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Dssl_server.c149 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Ddtls_server.c164 ret = mbedtls_pk_parse_key(&pkey, in main()
Dssl_pthread_server.c374 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Dssl_mail_client.c523 ret = mbedtls_pk_parse_key(&pkey, in main()
Dssl_server2.c2601 if ((ret = mbedtls_pk_parse_key(&pkey, in main()
2619 if ((ret = mbedtls_pk_parse_key(&pkey2, in main()
Dssl_client2.c1674 { ret = mbedtls_pk_parse_key(&pkey, in main()
/mbedtls-3.6.0/include/mbedtls/
Dpk.h869 int mbedtls_pk_parse_key(mbedtls_pk_context *ctx,
/mbedtls-3.6.0/library/
Dpkparse.c127 ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng); in mbedtls_pk_parse_keyfile()
129 ret = mbedtls_pk_parse_key(ctx, buf, n, in mbedtls_pk_parse_keyfile()
1529 int mbedtls_pk_parse_key(mbedtls_pk_context *pk, in mbedtls_pk_parse_key() function
Dpsa_crypto_rsa.c72 mbedtls_pk_parse_key(&ctx, data, data_length, NULL, 0, in mbedtls_psa_rsa_load_representation()
/mbedtls-3.6.0/tests/src/test_helpers/
Dssl_helpers.c646 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
659 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
674 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
687 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
/mbedtls-3.6.0/
DChangeLog292 * mbedtls_pk_parse_key() now rejects trailing garbage in encrypted keys.
999 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a
1320 mbedtls_pk_parse_key(), mbedtls_pk_parse_keyfile().
2087 mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a
2263 * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
2266 * Fix a bug in mbedtls_pk_parse_key() that would cause it to
3045 mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid
3989 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
4185 * Functions mbedtls_x509_xxx_parse(), mbedtls_pk_parse_key(),
/mbedtls-3.6.0/docs/
D3.0-migration-guide.md500 `mbedtls_pk_check_pair()`, `mbedtls_pk_parse_key()`, and