/mbedtls-latest/programs/ |
D | Makefile | 38 pkey/dh_client \ 39 pkey/dh_genprime \ 40 pkey/dh_server \ 41 pkey/ecdh_curve25519 \ 42 pkey/ecdsa \ 43 pkey/gen_key \ 44 pkey/key_app \ 45 pkey/key_app_writer \ 46 pkey/mpi_demo \ 47 pkey/pk_decrypt \ [all …]
|
D | .gitignore | 16 pkey/dh_client 17 pkey/dh_genprime 18 pkey/dh_server 19 pkey/ecdh_curve25519 20 pkey/ecdsa 21 pkey/gen_key 22 pkey/key_app 23 pkey/key_app_writer 24 pkey/mpi_demo 25 pkey/pk_decrypt [all …]
|
D | README.md | 20 * [`pkey/gen_key.c`](pkey/gen_key.c): generates a key for any of the supported public-key algorithm… 22 * [`pkey/key_app.c`](pkey/key_app.c): loads a PEM or DER public key or private key file and dumps i… 24 * [`pkey/key_app_writer.c`](pkey/key_app_writer.c): loads a PEM or DER public key or private key fi… 26 * [`pkey/pk_encrypt.c`](pkey/pk_encrypt.c), [`pkey/pk_decrypt.c`](pkey/pk_decrypt.c): loads a PEM o… 28 * [`pkey/pk_sign.c`](pkey/pk_sign.c), [`pkey/pk_verify.c`](pkey/pk_verify.c): loads a PEM or DER pr… 32 * [`pkey/ecdsa.c`](pkey/ecdsa.c): generates an ECDSA key, signs a fixed message and verifies the si… 34 * [`pkey/rsa_encrypt.c`](pkey/rsa_encrypt.c), [`pkey/rsa_decrypt.c`](pkey/rsa_decrypt.c): loads an … 36 * [`pkey/rsa_genkey.c`](pkey/rsa_genkey.c): generates an RSA key and writes it to a file that can b… 38 * [`pkey/rsa_sign.c`](pkey/rsa_sign.c), [`pkey/rsa_verify.c`](pkey/rsa_verify.c): loads an RSA priv… 40 * [`pkey/rsa_sign_pss.c`](pkey/rsa_sign_pss.c), [`pkey/rsa_verify_pss.c`](pkey/rsa_verify_pss.c): l… [all …]
|
D | CMakeLists.txt | 7 add_subdirectory(pkey)
|
/mbedtls-latest/programs/fuzz/ |
D | fuzz_dtlsserver.c | 24 static mbedtls_pk_context pkey; variable 53 mbedtls_pk_init(&pkey); in LLVMFuzzerTestOneInput() 82 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput() 106 if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) { in LLVMFuzzerTestOneInput() 166 mbedtls_pk_free(&pkey); in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 19 static mbedtls_pk_context pkey; variable 61 mbedtls_pk_init(&pkey); in LLVMFuzzerTestOneInput() 91 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput() 119 if (mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey) != 0) { in LLVMFuzzerTestOneInput() 204 mbedtls_pk_free(&pkey); in LLVMFuzzerTestOneInput()
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server.c | 78 mbedtls_pk_context pkey; in main() local 91 mbedtls_pk_init(&pkey); in main() 149 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main() 196 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 345 mbedtls_pk_free(&pkey); in main()
|
D | ssl_fork_server.c | 85 mbedtls_pk_context pkey; in main() local 92 mbedtls_pk_init(&pkey); in main() 147 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main() 175 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 367 mbedtls_pk_free(&pkey); in main()
|
D | dtls_server.c | 91 mbedtls_pk_context pkey; in main() local 106 mbedtls_pk_init(&pkey); in main() 164 ret = mbedtls_pk_parse_key(&pkey, in main() 216 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 385 mbedtls_pk_free(&pkey); in main()
|
D | ssl_pthread_server.c | 289 mbedtls_pk_context pkey; in main() local 373 mbedtls_pk_init(&pkey); in main() 374 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main() 411 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &srvcert, &pkey)) != 0) { in main() 467 mbedtls_pk_free(&pkey); in main()
|
D | ssl_mail_client.c | 343 mbedtls_pk_context pkey; in main() local 358 mbedtls_pk_init(&pkey); in main() 517 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, "", in main() 523 ret = mbedtls_pk_parse_key(&pkey, in main() 585 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &clicert, &pkey)) != 0) { in main() 804 mbedtls_pk_free(&pkey); in main()
|
D | ssl_client2.c | 839 mbedtls_pk_context pkey; in main() local 892 mbedtls_pk_init(&pkey); in main() 1765 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, opt.key_pwd, rng_get, &rng); in main() 1768 { ret = mbedtls_pk_parse_key(&pkey, in main() 1786 mbedtls_pk_get_type(&pkey)) == 0) { in main() 1787 ret = pk_wrap_as_opaque(&pkey, psa_alg, psa_alg2, usage, &key_slot); in main() 1800 mbedtls_pk_get_name(&pkey) : "none"); in main() 1981 if ((ret = mbedtls_ssl_conf_own_cert(&conf, &clicert, &pkey)) != 0) { in main() 3161 mbedtls_pk_free(&pkey); in main()
|
D | ssl_server2.c | 1543 mbedtls_pk_context pkey; in main() local 1640 mbedtls_pk_init(&pkey); in main() 2640 if ((ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, in main() 2688 if ((ret = mbedtls_pk_parse_key(&pkey, in main() 2727 mbedtls_pk_get_type(&pkey)) == 0) { in main() 2728 ret = pk_wrap_as_opaque(&pkey, psa_alg, psa_alg2, psa_usage, &key_slot); in main() 2757 key_cert_init ? mbedtls_pk_get_name(&pkey) : "none", in main() 3080 mbedtls_pk_context *pk = &pkey; in main() 4246 mbedtls_pk_free(&pkey); in main()
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 581 if (cert->pkey != NULL) { in test_ssl_endpoint_certificate_free() 583 if (mbedtls_pk_get_type(cert->pkey) == MBEDTLS_PK_OPAQUE) { in test_ssl_endpoint_certificate_free() 584 psa_destroy_key(cert->pkey->priv_id); in test_ssl_endpoint_certificate_free() 587 mbedtls_pk_free(cert->pkey); in test_ssl_endpoint_certificate_free() 588 mbedtls_free(cert->pkey); in test_ssl_endpoint_certificate_free() 589 cert->pkey = NULL; in test_ssl_endpoint_certificate_free() 613 TEST_CALLOC(cert->pkey, 1); in mbedtls_test_ssl_endpoint_certificate_init() 617 mbedtls_pk_init(cert->pkey); in mbedtls_test_ssl_endpoint_certificate_init() 640 cert->pkey, in mbedtls_test_ssl_endpoint_certificate_init() 653 cert->pkey, in mbedtls_test_ssl_endpoint_certificate_init() [all …]
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 190 mbedtls_pk_context *pkey; member
|
/mbedtls-latest/tests/suites/ |
D | test_suite_pk.function | 2015 unsigned char pkey[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE]; 2037 pkey_start = pkey + sizeof(pkey); 2038 ret = mbedtls_rsa_write_pubkey(mbedtls_pk_rsa(pk), pkey, &pkey_start); 2043 pkey_start = pkey + sizeof(pkey) - pkey_len;
|
D | test_suite_rsa.data | 154 # The test data has been generated by signing a test file using `programs/pkey/rsa_sign` after maki…
|
/mbedtls-latest/ |
D | ChangeLog | 3171 programs/pkey/gen_key which previously led to compilation failure 3952 * Fix error message in programs/pkey/gen_key.c. Found and fixed by Chris Xue. 3953 * Fix programs/pkey/dh_server.c so that it actually works with dh_client.c. 4540 * Fix memory corruption in pkey programs (found by yankuncheng) (#210)
|