Lines Matching defs:key

513     if (setup_data->pki_key.key.pem.public_cert &&
514 setup_data->pki_key.key.pem.public_cert[0] &&
515 setup_data->pki_key.key.pem.private_key &&
516 setup_data->pki_key.key.pem.private_key[0]) {
522 setup_data->pki_key.key.pem.public_cert);
531 setup_data->pki_key.key.pem.private_key, NULL);
534 setup_data->pki_key.key.pem.private_key,
555 if (setup_data->pki_key.key.pem.ca_file &&
556 setup_data->pki_key.key.pem.ca_file[0]) {
559 setup_data->pki_key.key.pem.ca_file);
569 if (setup_data->pki_key.key.pem_buf.public_cert &&
570 setup_data->pki_key.key.pem_buf.public_cert_len &&
571 setup_data->pki_key.key.pem_buf.private_key &&
572 setup_data->pki_key.key.pem_buf.private_key_len) {
579 length = setup_data->pki_key.key.pem_buf.public_cert_len;
580 if (setup_data->pki_key.key.pem_buf.public_cert[length-1] != '\000') {
587 memcpy(buffer, setup_data->pki_key.key.pem_buf.public_cert, length);
594 setup_data->pki_key.key.pem_buf.public_cert,
595 setup_data->pki_key.key.pem_buf.public_cert_len);
603 length = setup_data->pki_key.key.pem_buf.private_key_len;
604 if (setup_data->pki_key.key.pem_buf.private_key[length-1] != '\000') {
611 memcpy(buffer, setup_data->pki_key.key.pem_buf.private_key, length);
624 setup_data->pki_key.key.pem_buf.private_key,
625 setup_data->pki_key.key.pem_buf.private_key_len, NULL, 0);
628 setup_data->pki_key.key.pem_buf.private_key,
629 setup_data->pki_key.key.pem_buf.private_key_len,
651 if (setup_data->pki_key.key.pem_buf.ca_cert &&
652 setup_data->pki_key.key.pem_buf.ca_cert_len) {
657 length = setup_data->pki_key.key.pem_buf.ca_cert_len;
658 if (setup_data->pki_key.key.pem_buf.ca_cert[length-1] != '\000') {
665 memcpy(buffer, setup_data->pki_key.key.pem_buf.ca_cert, length);
672 setup_data->pki_key.key.pem_buf.ca_cert,
673 setup_data->pki_key.key.pem_buf.ca_cert_len);
684 if (setup_data->pki_key.key.asn1.public_cert &&
685 setup_data->pki_key.key.asn1.public_cert_len &&
686 setup_data->pki_key.key.asn1.private_key &&
687 setup_data->pki_key.key.asn1.private_key_len > 0) {
692 (const unsigned char *)setup_data->pki_key.key.asn1.public_cert,
693 setup_data->pki_key.key.asn1.public_cert_len);
702 (const unsigned char *)setup_data->pki_key.key.asn1.private_key,
703 setup_data->pki_key.key.asn1.private_key_len, NULL, 0);
706 (const unsigned char *)setup_data->pki_key.key.asn1.private_key,
707 setup_data->pki_key.key.asn1.private_key_len, NULL, 0, coap_rng,
728 if (setup_data->pki_key.key.asn1.ca_cert &&
729 setup_data->pki_key.key.asn1.ca_cert_len > 0) {
732 (const unsigned char *)setup_data->pki_key.key.asn1.ca_cert,
733 setup_data->pki_key.key.asn1.ca_cert_len);
748 coap_log_err("***setup_pki: (D)TLS: Unknown key type %d\n",
933 &m_context->psk_sni_entry_list[i].psk_info.key);
935 m_context->psk_sni_entry_list[i].psk_info.key.s,
936 m_context->psk_sni_entry_list[i].psk_info.key.length);
1151 coap_log_info("Setting PSK key\n");
2793 uint8_t key[COAP_CRYPTO_MAX_KEY_SIZE]; /* buffer for normalizing the key
2794 according to its key length */
2796 memset(key, 0, sizeof(key));
2813 if ((klen > (int)(sizeof(key) * 8)) || (key_length > sizeof(key))) {
2814 coap_log_crit("coap_crypto: cannot set key\n");
2817 memcpy(key, key_data, key_length);
2818 C(mbedtls_cipher_setkey(ctx, key, klen, mode));
2854 ccm->key.s,
2855 ccm->key.length,
2939 ccm->key.s,
2940 ccm->key.length,
2996 coap_bin_const_t *key,
3007 assert(key);
3025 C(mbedtls_md_hmac_starts(&ctx, key->s, key->length));