/openthread-latest/third_party/mbedtls/repo/programs/psa/ |
D | key_ladder_demo.c | 161 FILE *key_file = NULL; in save_key() local 166 SYS_CHECK((key_file = fopen(output_file_name, "wb")) != NULL); in save_key() 168 mbedtls_setbuf(key_file, NULL); in save_key() 169 SYS_CHECK(fwrite(key_data, 1, key_size, key_file) == key_size); in save_key() 170 SYS_CHECK(fclose(key_file) == 0); in save_key() 171 key_file = NULL; in save_key() 174 if (key_file != NULL) { in save_key() 175 fclose(key_file); in save_key() 220 FILE *key_file = NULL; in import_key_from_file() local 223 SYS_CHECK((key_file = fopen(key_file_name, "rb")) != NULL); in import_key_from_file() [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_pkwrite.function | 68 static void pk_write_check_common(char *key_file, int is_public_key, int is_der) 85 TEST_EQUAL(mbedtls_pk_load_file(key_file, &check_buf, &check_buf_len), 0); 104 TEST_EQUAL(mbedtls_pk_parse_public_keyfile(&key, key_file), 0); 106 TEST_EQUAL(mbedtls_pk_parse_keyfile(&key, key_file, NULL, 154 void pk_write_pubkey_check(char *key_file, int is_der) 156 pk_write_check_common(key_file, 1, is_der); 162 void pk_write_key_check(char *key_file, int is_der) 164 pk_write_check_common(key_file, 0, is_der);
|
D | test_suite_pkparse.function | 102 void pk_parse_keyfile_rsa(char *key_file, char *password, int result) 115 res = mbedtls_pk_parse_keyfile(&ctx, key_file, pwd, 149 void pk_parse_public_keyfile_rsa(char *key_file, int result) 157 res = mbedtls_pk_parse_public_keyfile(&ctx, key_file); 186 void pk_parse_public_keyfile_ec(char *key_file, int result) 194 res = mbedtls_pk_parse_public_keyfile(&ctx, key_file); 226 void pk_parse_keyfile_ec(char *key_file, char *password, int result) 234 res = mbedtls_pk_parse_keyfile(&ctx, key_file, password,
|
D | test_suite_x509write.function | 143 void x509_csr_check(char *key_file, char *cert_req_check_file, int md_type, 208 TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL, 282 void x509_csr_check_opaque(char *key_file, int md_type, int key_usage, 301 TEST_ASSERT(mbedtls_pk_parse_keyfile(&key, key_file, NULL,
|
/openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_mail_client.c | 135 const char *key_file; /* the file with the client key */ member 395 opt.key_file = DFL_KEY_FILE; in main() 437 opt.key_file = q; in main() 516 if (strlen(opt.key_file)) { in main() 517 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, "", in main()
|
D | ssl_client2.c | 479 const char *key_file; /* the file with the client key */ member 928 opt.key_file = DFL_KEY_FILE; in main() 1110 opt.key_file = q; in main() 1745 if (strcmp(opt.key_file, "none") == 0) { in main() 1749 if (strlen(opt.key_file)) { in main() 1750 ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, opt.key_pwd, rng_get, &rng); in main() 1784 strlen(opt.key_file) || strlen(opt.key_opaque_alg1) ? in main() 1961 strcmp(opt.key_file, "none") != 0) { in main()
|
D | ssl_server2.c | 618 const char *key_file; /* the file with the server key */ member 794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 812 GET_ITEM(key_file); in sni_parse() 828 mbedtls_pk_parse_keyfile(new->key, key_file, "", rng_get, &rng) != 0) { in sni_parse() 1696 opt.key_file = DFL_KEY_FILE; in main() 1891 opt.key_file = q; in main() 2629 if (strlen(opt.key_file) && strcmp(opt.key_file, "none") != 0) { in main() 2631 if ((ret = mbedtls_pk_parse_keyfile(&pkey, opt.key_file, in main() 2667 strcmp(opt.key_file, "none") != 0 && in main()
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 2303 specified through the existing key_file argument. This allows the use of
|