Home
last modified time | relevance | path

Searched refs:mbedtls_pk_parse_key (Results 1 – 21 of 21) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/programs/fuzz/
Dfuzz_privkey.c20 ret = mbedtls_pk_parse_key( &pk, Data, Size, NULL, 0 ); in LLVMFuzzerTestOneInput()
Dfuzz_dtlsserver.c55 if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
Dfuzz_server.c66 if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
/openthread-2.7.6/src/core/crypto/
Decdsa.cpp89 …VerifyOrExit(mbedtls_pk_parse_key(pk, mDerBytes, mDerLength, nullptr, 0) == 0, error = kErrorParse… in Parse()
223 VerifyOrExit(mbedtls_pk_parse_key(&pkCtx, aPrivateKey, aPrivateKeyLength, nullptr, 0) == 0, in Sign()
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_pkparse.function123 TEST_ASSERT( mbedtls_pk_parse_key( &pk, buf->x, buf->len, NULL, 0 ) == result );
Dtest_suite_pk.function299 TEST_ASSERT( mbedtls_pk_parse_key( &pk, NULL, 0, NULL, 1 ) ==
315 TEST_ASSERT( mbedtls_pk_parse_key( &pk,
547 mbedtls_pk_parse_key( NULL,
551 mbedtls_pk_parse_key( &pk,
Dtest_suite_ssl.function799 ret = mbedtls_pk_parse_key( &( cert->pkey ),
811 ret = mbedtls_pk_parse_key( &( cert->pkey ),
826 ret = mbedtls_pk_parse_key( &( cert->pkey ),
838 ret = mbedtls_pk_parse_key( &( cert->pkey ),
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/
Dssl_server.c155 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Ddtls_server.c169 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Dssl_fork_server.c168 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Dssl_pthread_server.c391 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
Dssl_mail_client.c563 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_cli_key, in main()
Dssl_server2.c2990 if( ( ret = mbedtls_pk_parse_key( &pkey, in main()
3009 if( ( ret = mbedtls_pk_parse_key( &pkey2, in main()
Dssl_client2.c2195 ret = mbedtls_pk_parse_key( &pkey, in main()
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/
Dpk.h674 int mbedtls_pk_parse_key( mbedtls_pk_context *ctx,
Dcompat-1.3.h2148 #define pk_parse_key mbedtls_pk_parse_key
/openthread-2.7.6/third_party/mbedtls/repo/library/
Dpkparse.c139 ret = mbedtls_pk_parse_key( ctx, buf, n, NULL, 0 ); in mbedtls_pk_parse_keyfile()
141 ret = mbedtls_pk_parse_key( ctx, buf, n, in mbedtls_pk_parse_keyfile()
1214 int mbedtls_pk_parse_key( mbedtls_pk_context *pk, in mbedtls_pk_parse_key() function
Dpsa_crypto.c559 mbedtls_pk_parse_key( &ctx, data, data_length, NULL, 0 ) ); in psa_load_rsa_representation()
/openthread-2.7.6/src/core/meshcop/
Ddtls.cpp379 … rval = mbedtls_pk_parse_key(&mPrivateKey, static_cast<const unsigned char *>(mPrivateKeySrc), in SetApplicationCoapSecureKeys()
/openthread-2.7.6/third_party/mbedtls/repo/scripts/data_files/
Drename-1.3-2.0.txt1758 pk_parse_key mbedtls_pk_parse_key
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog320 mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a
496 * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some
499 * Fix a bug in mbedtls_pk_parse_key() that would cause it to
1278 mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid
2222 mbedtls_pk_parse_key(file)() when the password is > 129 bytes.
2418 * Functions mbedtls_x509_xxx_parse(), mbedtls_pk_parse_key(),