Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 25) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_pkcs12.data1 PKCS#12 derive key: MD5: Zero length password and hash
5 PKCS#12 derive key: MD5: NULL password and hash
9 PKCS#12 derive key: MD5: Zero length password
13 PKCS#12 derive key: MD5: NULL password
17 PKCS#12 derive key: MD5: Invalid length NULL password
33 PKCS#12 derive key: MD5: Valid password and salt
Dtest_suite_pem.data66 # 1. generate the key (password="password"; IV=0x3132333435363738 in hex or "12345678" as string)
72 …00000000000\n\n333hxynfxEdXrSHQfIabxQ==\n-----END EC PRIVATE KEY-----":"password":MBEDTLS_ERR_PEM_…
79 …00000000000\n\n5wA/XVXHuMsQAAOGFQmK0g==\n-----END EC PRIVATE KEY-----":"password":MBEDTLS_ERR_PEM_…
86 …ES-CBC,3132333435363738\n\n6a+B2WineBM=\n-----END EC PRIVATE KEY-----":"password":MBEDTLS_ERR_PEM_…
Dtest_suite_pkcs12.function27 unsigned char *password = NULL;
36 password = password_arg->x;
51 password,
Dtest_suite_psa_crypto_pake.function609 const uint8_t password[] = "abcd";
627 PSA_ASSERT(psa_import_key(&attributes, password, sizeof(password),
986 const char *password = "password";
1007 PSA_ASSERT(psa_import_key(&attributes, (uint8_t *) password, strlen(password), &key));
1022 TEST_EQUAL(password_len_ret, strlen(password));
1036 TEST_MEMORY_COMPARE(password_ret, buffer_len_ret, password, strlen(password));
Dtest_suite_pkparse.function114 void pk_parse_keyfile_rsa(char *key_file, char *password, int result)
118 char *pwd = password;
238 void pk_parse_keyfile_ec(char *key_file, char *password, int result)
246 res = mbedtls_pk_parse_keyfile(&ctx, key_file, password,
Dtest_suite_psa_crypto_pake.data33 PSA PAKE: wrong password key type
37 PSA PAKE: wrong password key usage
233 PSA PAKE: input getters: password
Dtest_suite_psa_crypto_metadata.data366 Key type: password
369 Key type: password hash
Dtest_suite_pkcs5.data261 PBES2 Decrypt (bad password)
Dtest_suite_psa_crypto.data5537 PSA key derivation: PBKDF2-HMAC-SHA256, good case, DERIVE key as password, key output
5545 PSA key derivation: PBKDF2-HMAC-SHA256, password missing
5549 PSA key derivation: PBKDF2-HMAC-SHA256, salt and password before cost
5553 PSA key derivation: PBKDF2-HMAC-SHA256, password before cost
5557 PSA key derivation: PBKDF2-HMAC-SHA256, password bad key type
5561 PSA key derivation: PBKDF2-HMAC-SHA256, direct password, direct output
5565 PSA key derivation: PBKDF2-HMAC-SHA256, direct empty password, direct output
5569 PSA key derivation: PBKDF2-HMAC-SHA256, direct password, key output
5613 PSA key derivation: PBKDF2-AES-CMAC-PRF-128, good case, DERIVE key as password, key output
5621 PSA key derivation: PBKDF2-AES-CMAC-PRF-128, password missing
[all …]
Dtest_suite_pkparse.data1 Parse RSA Key #1 (No password when required)
5 Parse RSA Key #2 (Correct password)
9 Parse RSA Key #3 (Wrong password)
Dtest_suite_ssl.function3500 /* test with empty password or unitialized password key (depending on use_opaque_arg) */
Dtest_suite_ssl.data3271 EC-JPAKE set password
3275 EC-JPAKE set opaque password
/mbedtls-latest/library/
Dpsa_crypto_pake.c138 operation->password, in psa_pake_ecjpake_setup()
141 mbedtls_platform_zeroize(operation->password, operation->password_len); in psa_pake_ecjpake_setup()
184 operation->password = mbedtls_calloc(1, password_len); in mbedtls_psa_pake_setup()
185 if (operation->password == NULL) { in mbedtls_psa_pake_setup()
202 status = psa_crypto_driver_pake_get_password(inputs, operation->password, in mbedtls_psa_pake_setup()
550 mbedtls_zeroize_and_free(operation->password, operation->password_len); in mbedtls_psa_pake_abort()
551 operation->password = NULL; in mbedtls_psa_pake_abort()
Dpkcs5.c269 const unsigned char *password, in pkcs5_pbkdf2_hmac() argument
292 if ((ret = mbedtls_md_hmac_starts(ctx, password, plen)) != 0) { in pkcs5_pbkdf2_hmac()
359 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac() argument
364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac()
370 const unsigned char *password, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument
389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
Dpsa_crypto.c5949 pbkdf2->password,
5981 pbkdf2->password,
7285 pbkdf2->password,
7292 pbkdf2->password,
8410 memcpy(buffer, inputs->password, inputs->password_len);
8539 mbedtls_svc_key_id_t password) argument
8551 status = psa_get_and_lock_key_slot_with_policy(password, &slot,
8566 operation->data.inputs.password = mbedtls_calloc(1, slot->key.bytes);
8567 if (operation->data.inputs.password == NULL) {
8572 memcpy(operation->data.inputs.password, slot->key.data, slot->key.bytes);
[all …]
/mbedtls-latest/programs/pkey/
Dkey_app.c127 const char *password; /* password for the private key */ member
176 opt.password = DFL_PASSWORD; in main()
197 opt.password = q; in main()
206 if (strlen(opt.password) && strlen(opt.password_file)) { in main()
233 opt.password = buf; in main()
250 ret = mbedtls_pk_parse_keyfile(&pk, opt.filename, opt.password, in main()
/mbedtls-latest/programs/x509/
Dcert_req.c98 const char *password; /* password for the key file */ member
182 opt.password = DFL_PASSWORD; in main()
202 opt.password = q; in main()
455 ret = mbedtls_pk_parse_keyfile(&key, opt.filename, opt.password, in main()
/mbedtls-latest/include/mbedtls/
Dpkcs5.h150 const unsigned char *password,
174 const unsigned char *password,
Dpk.h1175 const char *path, const char *password,
/mbedtls-latest/include/psa/
Dcrypto_extra.h1298 mbedtls_svc_key_id_t password);
1798 uint8_t *MBEDTLS_PRIVATE(password);
Dcrypto_builtin_key_derivation.h110 uint8_t MBEDTLS_PRIVATE(password)[PSA_HMAC_MAX_HASH_BLOCK_SIZE];
Dcrypto_builtin_composites.h194 uint8_t *MBEDTLS_PRIVATE(password);
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md592 … Collected inputs are available for drivers via get-data functions for `password`, `role` and `cip…
595 …es whether to dispatch a PAKE operation to a driver based on the location of the provided password.
598 1. If the location of the `password` is the local storage
601 2. If the location of the `password` is the location of a secure element
/mbedtls-latest/
DChangeLog867 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2
1454 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a
1606 pkcs12 functions when the password is empty. Fix the documentation to
2497 example applications which allows to provide a password for the key file
2499 these applications with password-protected key files. Analogously but for
2501 set a password for the key file provided through the existing key_file2
4444 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
4779 * Fix bug in ssl_mail_client when password is longer that username (found
/mbedtls-latest/docs/
Dpsa-transition.md618 …i/group/group__derivation/#group__derivation_1ga0ddfbe764baba995c402b1b0ef59392e) for the password.