| /mbedtls/library/ |
| A D | pem.c | 77 const unsigned char *pwd, size_t pwdlen) in pem_pbkdf1() argument 99 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 125 if ((ret = mbedtls_md_update(&md5_ctx, pwd, pwdlen)) != 0) { in pem_pbkdf1() 155 const unsigned char *pwd, size_t pwdlen) in pem_des_decrypt() argument 163 if ((ret = pem_pbkdf1(des_key, 8, des_iv, pwd, pwdlen)) != 0) { in pem_des_decrypt() 185 const unsigned char *pwd, size_t pwdlen) in pem_des3_decrypt() argument 217 const unsigned char *pwd, size_t pwdlen) in pem_aes_decrypt() argument 280 ((void) pwd); in mbedtls_pem_read_buffer() 430 if (pwd == NULL) { in mbedtls_pem_read_buffer() 439 ret = pem_des3_decrypt(pem_iv, buf, len, pwd, pwdlen); in mbedtls_pem_read_buffer() [all …]
|
| A D | pkcs12.c | 77 const unsigned char *pwd, size_t pwdlen, in pkcs12_pbe_derive_key_iv() argument 99 unipwd[i * 2 + 1] = pwd[i]; in pkcs12_pbe_derive_key_iv() 125 const unsigned char *pwd, size_t pwdlen, 134 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe() argument 152 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_pbe_ext() argument 166 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_pbe_ext() 191 if ((ret = pkcs12_pbe_derive_key_iv(pbe_params, md_type, pwd, pwdlen, in mbedtls_pkcs12_pbe_ext() 327 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs12_derivation() argument 349 if (pwd == NULL && pwdlen != 0) { in mbedtls_pkcs12_derivation() 357 use_password = (pwd && pwdlen != 0); in mbedtls_pkcs12_derivation() [all …]
|
| A D | pkparse.c | 868 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 928 pwd, pwdlen, p, len, buf, len, &outlen)) != 0) { in mbedtls_pk_parse_key_pkcs8_encrypted_der() 954 ((void) pwd); in mbedtls_pk_parse_key_pkcs8_encrypted_der() 975 const unsigned char *pwd, size_t pwdlen, in mbedtls_pk_parse_key() argument 999 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1029 key, pwd, pwdlen, &len); in mbedtls_pk_parse_key() 1095 ((void) pwd); in mbedtls_pk_parse_key() 1117 pwd, pwdlen, f_rng, p_rng); in mbedtls_pk_parse_key() 1348 const char *path, const char *pwd, in mbedtls_pk_parse_keyfile() argument 1359 if (pwd == NULL) { in mbedtls_pk_parse_keyfile() [all …]
|
| A D | pkcs5.c | 106 const unsigned char *pwd, size_t pwdlen, 114 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2() argument 124 return mbedtls_pkcs5_pbes2_ext(pbe_params, mode, pwd, pwdlen, data, in mbedtls_pkcs5_pbes2() 130 const unsigned char *pwd, size_t pwdlen, in mbedtls_pkcs5_pbes2_ext() argument 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext()
|
| A D | pk_internal.h | 199 const unsigned char *pwd, size_t pwdlen,
|
| A D | ssl_tls.c | 1969 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_common() argument 2011 status = psa_pake_set_password_key(&ssl->handshake->psa_pake_ctx, pwd); in mbedtls_ssl_set_hs_ecjpake_password_common() 2059 mbedtls_svc_key_id_t pwd) in mbedtls_ssl_set_hs_ecjpake_password_opaque() argument 2067 if (mbedtls_svc_key_id_is_null(pwd)) { in mbedtls_ssl_set_hs_ecjpake_password_opaque() 2071 status = mbedtls_ssl_set_hs_ecjpake_password_common(ssl, pwd); in mbedtls_ssl_set_hs_ecjpake_password_opaque()
|
| /mbedtls/include/mbedtls/ |
| A D | pkcs12.h | 92 const unsigned char *pwd, size_t pwdlen, 141 const unsigned char *pwd, size_t pwdlen, 178 const unsigned char *pwd, size_t pwdlen,
|
| A D | pkcs5.h | 85 const unsigned char *pwd, size_t pwdlen, 126 const unsigned char *pwd, size_t pwdlen,
|
| A D | pem.h | 94 const unsigned char *pwd,
|
| A D | pk.h | 1103 const unsigned char *pwd, size_t pwdlen,
|
| A D | ssl.h | 4139 mbedtls_svc_key_id_t pwd);
|
| /mbedtls/tests/suites/ |
| A D | test_suite_pem.data | 30 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-EDE3-CBC,00$":"pwd":MBE… 34 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: DES-CBC,00$":"pwd":MBEDTLS_… 38 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-128-CBC,00$":"pwd":MBED… 42 mbedtls_pem_read_buffer:"^":"$":"^\nProc-Type\: 4,ENCRYPTED\nDEK-Info\: AES-,00$":"pwd":MBEDTLS_ERR… 46 …EK-Info\: DES-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_DES_IN… 50 …fo\: DES-EDE3-CBC,AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_DES_IN… 54 …C,AA94892A169FA426AA94892A169FA426\n\nMAAA\n-----END EC PRIVATE KEY-----":"pwd":MBEDTLS_ERR_AES_IN…
|
| A D | test_suite_pem.function | 66 char *pwd, int res, data_t *out) 71 size_t pwd_len = strlen(pwd); 79 (unsigned char *) pwd, pwd_len, &use_len);
|
| A D | test_suite_pkparse.function | 106 char *pwd = password; 111 if (strcmp(pwd, "NULL") == 0) { 112 pwd = NULL; 115 res = mbedtls_pk_parse_keyfile(&ctx, key_file, pwd,
|