| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | pem.c | 77 const unsigned char *pwd, size_t pwdlen) in pem_pbkdf1() argument 99 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 125 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 155 const unsigned char *pwd, size_t pwdlen) in pem_des_decrypt() argument 163 if ((ret = pem_pbkdf1(des_key, 8, des_iv, pwd, pwdlen)) != 0) { in pem_des_decrypt() 185 const unsigned char *pwd, size_t pwdlen) in pem_des3_decrypt() argument 193 if ((ret = pem_pbkdf1(des3_key, 24, des3_iv, pwd, pwdlen)) != 0) { in pem_des3_decrypt() 217 const unsigned char *pwd, size_t pwdlen) in pem_aes_decrypt() argument 225 if ((ret = pem_pbkdf1(aes_key, keylen, aes_iv, pwd, pwdlen)) != 0) { in pem_aes_decrypt() 269 const unsigned char *data, const unsigned char *pwd, in mbedtls_pem_read_buffer() argument [all …]
|
| D | pkcs12.c | 77 const unsigned char *pwd, size_t pwdlen, in pkcs12_pbe_derive_key_iv() argument 99 unipwd[i * 2 + 1] = pwd[i]; in pkcs12_pbe_derive_key_iv() 125 const unsigned char *pwd, size_t pwdlen, 134 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe() argument 145 pwd, pwdlen, data, len, output, SIZE_MAX, in mbedtls_pkcs12_pbe() 152 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe_ext() argument 166 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_pbe_ext() 191 if ((ret = pkcs12_pbe_derive_key_iv(pbe_params, md_type, pwd, pwdlen, in mbedtls_pkcs12_pbe_ext() 327 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_derivation() argument 349 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_derivation() [all …]
|
| D | pkparse.c | 868 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 928 pwd, pwdlen, p, len, buf, len, &outlen)) != 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 941 if ((ret = mbedtls_pkcs5_pbes2_ext(&pbe_params, MBEDTLS_PKCS5_DECRYPT, pwd, pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() 954 ((void) pwd); in mbedtls_pk_parse_key_pkcs8_encrypted_der() 975 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key() argument 999 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1029 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1084 pwd, pwdlen, f_rng, p_rng)) != 0) { in mbedtls_pk_parse_key() 1095 ((void) pwd); in mbedtls_pk_parse_key() 1117 pwd, pwdlen, f_rng, p_rng); in mbedtls_pk_parse_key() [all …]
|
| D | pkcs5.c | 106 const unsigned char *pwd, size_t pwdlen, 114 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2() argument 124 return mbedtls_pkcs5_pbes2_ext(pbe_params, mode, pwd, pwdlen, data, in mbedtls_pkcs5_pbes2() 130 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2_ext() argument 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext()
|
| D | pk_internal.h | 199 const unsigned char *pwd, size_t pwdlen,
|
| D | ssl_tls.c | 1969 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_common() argument 2011 status = psa_pake_set_password_key(&ssl->handshake->psa_pake_ctx, pwd); in mbedtls_ssl_set_hs_ecjpake_password_common() 2059 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_opaque() argument 2067 if (mbedtls_svc_key_id_is_null(pwd)) { in mbedtls_ssl_set_hs_ecjpake_password_opaque() 2071 status = mbedtls_ssl_set_hs_ecjpake_password_common(ssl, pwd); in mbedtls_ssl_set_hs_ecjpake_password_opaque()
|
| /openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
| D | pkcs12.h | 92 const unsigned char *pwd, size_t pwdlen, 141 const unsigned char *pwd, size_t pwdlen, 178 const unsigned char *pwd, size_t pwdlen,
|
| D | pkcs5.h | 85 const unsigned char *pwd, size_t pwdlen, 126 const unsigned char *pwd, size_t pwdlen,
|
| D | pem.h | 94 const unsigned char *pwd,
|
| D | pk.h | 1103 const unsigned char *pwd, size_t pwdlen,
|
| D | ssl.h | 4139 mbedtls_svc_key_id_t pwd);
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_pem.data | 30 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-EDE3-CBC,00$":"pwd":MBE… 34 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-CBC,00$":"pwd":MBEDTLS_… 38 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-128-CBC,00$":"pwd":MBED… 42 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-,00$":"pwd":MBEDTLS_ERR… 46 …EK-Info\: DES-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_DES_IN… 50 …fo\: DES-EDE3-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_DES_IN… 54 …C,AA94892A169FA426AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_AES_IN…
|
| D | test_suite_pem.function | 66 char *pwd, int res, data_t *out) 71 size_t pwd_len = strlen(pwd); 79 (unsigned char *) pwd, pwd_len, &use_len);
|
| D | test_suite_pkparse.function | 106 char *pwd = password; 111 if (strcmp(pwd, "NULL") == 0) { 112 pwd = NULL; 115 res = mbedtls_pk_parse_keyfile(&ctx, key_file, pwd,
|
| /openthread-latest/tests/toranj/ |
| D | README_CLI.md | 41 $ top_builddir=($pwd) TORANJ_CLI=1 ./tests/toranj/start.sh
|