Searched refs:mbedtls_pk_parse_key (Results 1 – 21 of 21) sorted by relevance
/openthread-2.7.6/third_party/mbedtls/repo/programs/fuzz/ |
D | fuzz_privkey.c | 20 ret = mbedtls_pk_parse_key( &pk, Data, Size, NULL, 0 ); in LLVMFuzzerTestOneInput()
|
D | fuzz_dtlsserver.c | 55 if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 66 if (mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
/openthread-2.7.6/src/core/crypto/ |
D | ecdsa.cpp | 89 …VerifyOrExit(mbedtls_pk_parse_key(pk, mDerBytes, mDerLength, nullptr, 0) == 0, error = kErrorParse… in Parse() 223 VerifyOrExit(mbedtls_pk_parse_key(&pkCtx, aPrivateKey, aPrivateKeyLength, nullptr, 0) == 0, in Sign()
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_pkparse.function | 123 TEST_ASSERT( mbedtls_pk_parse_key( &pk, buf->x, buf->len, NULL, 0 ) == result );
|
D | test_suite_pk.function | 299 TEST_ASSERT( mbedtls_pk_parse_key( &pk, NULL, 0, NULL, 1 ) == 315 TEST_ASSERT( mbedtls_pk_parse_key( &pk, 547 mbedtls_pk_parse_key( NULL, 551 mbedtls_pk_parse_key( &pk,
|
D | test_suite_ssl.function | 799 ret = mbedtls_pk_parse_key( &( cert->pkey ), 811 ret = mbedtls_pk_parse_key( &( cert->pkey ), 826 ret = mbedtls_pk_parse_key( &( cert->pkey ), 838 ret = mbedtls_pk_parse_key( &( cert->pkey ),
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_server.c | 155 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | dtls_server.c | 169 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_fork_server.c | 168 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_pthread_server.c | 391 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_mail_client.c | 563 ret = mbedtls_pk_parse_key( &pkey, (const unsigned char *) mbedtls_test_cli_key, in main()
|
D | ssl_server2.c | 2990 if( ( ret = mbedtls_pk_parse_key( &pkey, in main() 3009 if( ( ret = mbedtls_pk_parse_key( &pkey2, in main()
|
D | ssl_client2.c | 2195 ret = mbedtls_pk_parse_key( &pkey, in main()
|
/openthread-2.7.6/third_party/mbedtls/repo/include/mbedtls/ |
D | pk.h | 674 int mbedtls_pk_parse_key( mbedtls_pk_context *ctx,
|
D | compat-1.3.h | 2148 #define pk_parse_key mbedtls_pk_parse_key
|
/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | pkparse.c | 139 ret = mbedtls_pk_parse_key( ctx, buf, n, NULL, 0 ); in mbedtls_pk_parse_keyfile() 141 ret = mbedtls_pk_parse_key( ctx, buf, n, in mbedtls_pk_parse_keyfile() 1214 int mbedtls_pk_parse_key( mbedtls_pk_context *pk, in mbedtls_pk_parse_key() function
|
D | psa_crypto.c | 559 mbedtls_pk_parse_key( &ctx, data, data_length, NULL, 0 ) ); in psa_load_rsa_representation()
|
/openthread-2.7.6/src/core/meshcop/ |
D | dtls.cpp | 379 … rval = mbedtls_pk_parse_key(&mPrivateKey, static_cast<const unsigned char *>(mPrivateKeySrc), in SetApplicationCoapSecureKeys()
|
/openthread-2.7.6/third_party/mbedtls/repo/scripts/data_files/ |
D | rename-1.3-2.0.txt | 1758 pk_parse_key mbedtls_pk_parse_key
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 320 mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a 496 * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some 499 * Fix a bug in mbedtls_pk_parse_key() that would cause it to 1278 mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid 2222 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 2418 * Functions mbedtls_x509_xxx_parse(), mbedtls_pk_parse_key(),
|