/openthread-latest/third_party/mbedtls/repo/programs/fuzz/ |
D | fuzz_privkey.c | 45 ret = mbedtls_pk_parse_key(&pk, Data, Size, NULL, 0, in LLVMFuzzerTestOneInput()
|
D | fuzz_dtlsserver.c | 82 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
D | fuzz_server.c | 91 if (mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in LLVMFuzzerTestOneInput()
|
/openthread-latest/src/core/crypto/ |
D | crypto_platform.cpp | 536 VerifyOrExit(mbedtls_pk_parse_key(&pk, aKeyPair->mDerBytes, aKeyPair->mDerLength, nullptr, 0, in otPlatCryptoEcdsaGetPublicKey() 540 …VerifyOrExit(mbedtls_pk_parse_key(&pk, aKeyPair->mDerBytes, aKeyPair->mDerLength, nullptr, 0) == 0, in otPlatCryptoEcdsaGetPublicKey() 579 VerifyOrExit(mbedtls_pk_parse_key(&pk, aKeyPair->mDerBytes, aKeyPair->mDerLength, nullptr, 0, in otPlatCryptoEcdsaSign() 583 …VerifyOrExit(mbedtls_pk_parse_key(&pk, aKeyPair->mDerBytes, aKeyPair->mDerLength, nullptr, 0) == 0, in otPlatCryptoEcdsaSign()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_pkparse.function | 274 TEST_ASSERT(mbedtls_pk_parse_key(&pk, buf->x, buf->len, NULL, 0, 316 TEST_EQUAL(mbedtls_pk_parse_key(&pk, input_key->x, input_key->len, NULL, 0,
|
D | test_suite_pk.function | 950 TEST_ASSERT(mbedtls_pk_parse_key(&pk, NULL, 0, NULL, 1, 970 TEST_ASSERT(mbedtls_pk_parse_key(&pk,
|
/openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_fork_server.c | 147 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_server.c | 149 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | dtls_server.c | 164 ret = mbedtls_pk_parse_key(&pkey, in main()
|
D | ssl_pthread_server.c | 374 ret = mbedtls_pk_parse_key(&pkey, (const unsigned char *) mbedtls_test_srv_key, in main()
|
D | ssl_mail_client.c | 523 ret = mbedtls_pk_parse_key(&pkey, in main()
|
D | ssl_server2.c | 2679 if ((ret = mbedtls_pk_parse_key(&pkey, in main() 2697 if ((ret = mbedtls_pk_parse_key(&pkey2, in main()
|
D | ssl_client2.c | 1753 { ret = mbedtls_pk_parse_key(&pkey, in main()
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | pkparse.c | 973 int mbedtls_pk_parse_key(mbedtls_pk_context *pk, in mbedtls_pk_parse_key() function 1360 ret = mbedtls_pk_parse_key(ctx, buf, n, NULL, 0, f_rng, p_rng); in mbedtls_pk_parse_keyfile() 1362 ret = mbedtls_pk_parse_key(ctx, buf, n, in mbedtls_pk_parse_keyfile()
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | pk.h | 1101 int mbedtls_pk_parse_key(mbedtls_pk_context *ctx,
|
/openthread-latest/src/cli/ |
D | cli_tcp.cpp | 165 …int rv = mbedtls_pk_parse_key(&mPKey, reinterpret_cast<const unsigned char *>(sSrvKey), sSrvKeyLen… in Process() 168 …int rv = mbedtls_pk_parse_key(&mPKey, reinterpret_cast<const unsigned char *>(sSrvKey), sSrvKeyLen… in Process()
|
/openthread-latest/src/core/meshcop/ |
D | secure_transport.cpp | 450 … rval = mbedtls_pk_parse_key(&mPrivateKey, static_cast<const unsigned char *>(mPrivateKeySrc), in SetApplicationSecureKeys() 454 … rval = mbedtls_pk_parse_key(&mPrivateKey, static_cast<const unsigned char *>(mPrivateKeySrc), in SetApplicationSecureKeys()
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 636 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 649 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 664 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init() 677 ret = mbedtls_pk_parse_key( in mbedtls_test_ssl_endpoint_certificate_init()
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 552 * mbedtls_pk_parse_key() now rejects trailing garbage in encrypted keys. 1259 * In mbedtls_pk_parse_key(), if no password is provided, don't allocate a 1580 mbedtls_pk_parse_key(), mbedtls_pk_parse_keyfile(). 2347 mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a 2523 * Fix a bug in mbedtls_pk_parse_key() that would cause it to accept some 2526 * Fix a bug in mbedtls_pk_parse_key() that would cause it to 3305 mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid 4249 mbedtls_pk_parse_key(file)() when the password is > 129 bytes. 4445 * Functions mbedtls_x509_xxx_parse(), mbedtls_pk_parse_key(),
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | 3.0-migration-guide.md | 500 `mbedtls_pk_check_pair()`, `mbedtls_pk_parse_key()`, and
|
D | psa-transition.md | 784 …This function has the same basic goal as the PK parse functions (`mbedtls_pk_parse_key`, `mbedtls_… 829 mbedtls_pk_parse_key(&pk, key_buffer, key_buffer_length, NULL, 0,
|
/openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
D | all.sh | 1627 not grep mbedtls_pk_parse_key library/pkparse.o
|