<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.13"/> <meta name="viewport" content="width=device-width, initial-scale=1"/> <title>mbed TLS v2.7.6: pkcs12.h File Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td id="projectalign" style="padding-left: 0.5em;"> <div id="projectname">mbed TLS v2.7.6 </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.13 --> <script type="text/javascript" src="menudata.js"></script> <script type="text/javascript" src="menu.js"></script> <script type="text/javascript"> $(function() { initMenu('',false,false,'search.php','Search'); }); </script> <div id="main-nav"></div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_d44c64559bbebec7f509842c48db8b23.html">include</a></li><li class="navelem"><a class="el" href="dir_b4d146e9a6d8dd56ed4afb2480a97fd3.html">mbedtls</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="summary"> <a href="#define-members">Macros</a> | <a href="#func-members">Functions</a> </div> <div class="headertitle"> <div class="title">pkcs12.h File Reference</div> </div> </div><!--header--> <div class="contents"> <p>PKCS#12 Personal Information Exchange Syntax. <a href="#details">More...</a></p> <div class="textblock"><code>#include "<a class="el" href="md_8h_source.html">md.h</a>"</code><br /> <code>#include "<a class="el" href="cipher_8h_source.html">cipher.h</a>"</code><br /> <code>#include "<a class="el" href="asn1_8h_source.html">asn1.h</a>"</code><br /> <code>#include <stddef.h></code><br /> </div><div class="textblock"><div class="dynheader"> Include dependency graph for pkcs12.h:</div> <div class="dyncontent"> <div class="center"><img src="pkcs12_8h__incl.png" border="0" usemap="#pkcs12_8h" alt=""/></div> <map name="pkcs12_8h" id="pkcs12_8h"> <area shape="rect" id="node2" href="md_8h.html" title="The generic message-digest wrapper. " alt="" coords="27,155,90,181"/> <area shape="rect" id="node7" href="cipher_8h.html" title="The generic cipher wrapper. " alt="" coords="114,155,217,181"/> <area shape="rect" id="node8" href="asn1_8h.html" title="Generic ASN.1 parsing. " alt="" coords="239,80,321,107"/> <area shape="rect" id="node4" href="config_8h.html" title="Configuration options (set of defines) " alt="" coords="217,229,319,256"/> <area shape="rect" id="node5" href="check__config_8h.html" title="Consistency checks for configuration options. " alt="" coords="187,304,349,331"/> <area shape="rect" id="node9" href="bignum_8h.html" title="Multi-precision integer library. " alt="" coords="343,155,446,181"/> </map> </div> </div> <p><a href="pkcs12_8h_source.html">Go to the source code of this file.</a></p> <table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a> Macros</h2></td></tr> <tr class="memitem:ac856f81d3cbc3baeaa848b33d991209b"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ac856f81d3cbc3baeaa848b33d991209b">MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA</a>   -0x1F80</td></tr> <tr class="separator:ac856f81d3cbc3baeaa848b33d991209b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae887e38a4caab392fc5086bcceed7af9"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ae887e38a4caab392fc5086bcceed7af9">MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE</a>   -0x1F00</td></tr> <tr class="separator:ae887e38a4caab392fc5086bcceed7af9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a92e9101410d452e508c88a7231e23996"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a92e9101410d452e508c88a7231e23996">MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT</a>   -0x1E80</td></tr> <tr class="separator:a92e9101410d452e508c88a7231e23996"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ab3313f9e7321d23b3af93e97a544ffdb"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ab3313f9e7321d23b3af93e97a544ffdb">MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH</a>   -0x1E00</td></tr> <tr class="separator:ab3313f9e7321d23b3af93e97a544ffdb"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ad9b0f41c74cd6a8e072c84b5d310b331"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ad9b0f41c74cd6a8e072c84b5d310b331">MBEDTLS_PKCS12_DERIVE_KEY</a>   1</td></tr> <tr class="separator:ad9b0f41c74cd6a8e072c84b5d310b331"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ad8ac9a220c8d237a9a5bc972daed1c13"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ad8ac9a220c8d237a9a5bc972daed1c13">MBEDTLS_PKCS12_DERIVE_IV</a>   2</td></tr> <tr class="separator:ad8ac9a220c8d237a9a5bc972daed1c13"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a91d3d19fb1a5cd18648f363eff8617ec"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a91d3d19fb1a5cd18648f363eff8617ec">MBEDTLS_PKCS12_DERIVE_MAC_KEY</a>   3</td></tr> <tr class="separator:a91d3d19fb1a5cd18648f363eff8617ec"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a41364d57177059b3ffb3167139e741b4"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a41364d57177059b3ffb3167139e741b4">MBEDTLS_PKCS12_PBE_DECRYPT</a>   0</td></tr> <tr class="separator:a41364d57177059b3ffb3167139e741b4"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae833899c432600a15030b761d1e34d44"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ae833899c432600a15030b761d1e34d44">MBEDTLS_PKCS12_PBE_ENCRYPT</a>   1</td></tr> <tr class="separator:ae833899c432600a15030b761d1e34d44"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a> Functions</h2></td></tr> <tr class="memitem:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#af865b866a1e1b6f5513f5904f1fdf2fa">mbedtls_pkcs12_pbe_sha1_rc4_128</a> (<a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *pbe_params, int mode, const unsigned char *pwd, size_t pwdlen, const unsigned char *input, size_t len, unsigned char *output)</td></tr> <tr class="memdesc:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="mdescLeft"> </td><td class="mdescRight">PKCS12 Password Based function (encryption / decryption) for pbeWithSHAAnd128BitRC4. <a href="#af865b866a1e1b6f5513f5904f1fdf2fa">More...</a><br /></td></tr> <tr class="separator:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#aeca4c569f386fd7ece7fcfb4efc95a29">mbedtls_pkcs12_pbe</a> (<a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *pbe_params, int mode, <a class="el" href="cipher_8h.html#a00c5885f1ea7279c5a7d8e12e596569d">mbedtls_cipher_type_t</a> cipher_type, <a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *input, size_t len, unsigned char *output)</td></tr> <tr class="memdesc:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="mdescLeft"> </td><td class="mdescRight">PKCS12 Password Based function (encryption / decryption) for cipher-based and mbedtls_md-based PBE's. <a href="#aeca4c569f386fd7ece7fcfb4efc95a29">More...</a><br /></td></tr> <tr class="separator:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a5e58a53e1f2194583f1e48fc2ffef627"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a5e58a53e1f2194583f1e48fc2ffef627">mbedtls_pkcs12_derivation</a> (unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, <a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> <a class="el" href="md_8h.html#a36c5d8bda1905e0434708f0ef5912dda">mbedtls_md</a>, int id, int iterations)</td></tr> <tr class="memdesc:a5e58a53e1f2194583f1e48fc2ffef627"><td class="mdescLeft"> </td><td class="mdescRight">The PKCS#12 derivation function uses a password and a salt to produce pseudo-random bits for a particular "purpose". <a href="#a5e58a53e1f2194583f1e48fc2ffef627">More...</a><br /></td></tr> <tr class="separator:a5e58a53e1f2194583f1e48fc2ffef627"><td class="memSeparator" colspan="2"> </td></tr> </table> <a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2> <div class="textblock"><p>PKCS#12 Personal Information Exchange Syntax. </p> <p class="definition">Definition in file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div><h2 class="groupheader">Macro Definition Documentation</h2> <a id="ac856f81d3cbc3baeaa848b33d991209b"></a> <h2 class="memtitle"><span class="permalink"><a href="#ac856f81d3cbc3baeaa848b33d991209b">◆ </a></span>MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA   -0x1F80</td> </tr> </table> </div><div class="memdoc"> <p>Bad input parameters to function. </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00033">33</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="ae887e38a4caab392fc5086bcceed7af9"></a> <h2 class="memtitle"><span class="permalink"><a href="#ae887e38a4caab392fc5086bcceed7af9">◆ </a></span>MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE   -0x1F00</td> </tr> </table> </div><div class="memdoc"> <p>Feature not available, e.g. unsupported encryption scheme. </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00034">34</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="ab3313f9e7321d23b3af93e97a544ffdb"></a> <h2 class="memtitle"><span class="permalink"><a href="#ab3313f9e7321d23b3af93e97a544ffdb">◆ </a></span>MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH   -0x1E00</td> </tr> </table> </div><div class="memdoc"> <p>Given private key password does not allow for correct decryption. </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00036">36</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="a92e9101410d452e508c88a7231e23996"></a> <h2 class="memtitle"><span class="permalink"><a href="#a92e9101410d452e508c88a7231e23996">◆ </a></span>MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT   -0x1E80</td> </tr> </table> </div><div class="memdoc"> <p>PBE ASN.1 data not as expected. </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00035">35</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="ad8ac9a220c8d237a9a5bc972daed1c13"></a> <h2 class="memtitle"><span class="permalink"><a href="#ad8ac9a220c8d237a9a5bc972daed1c13">◆ </a></span>MBEDTLS_PKCS12_DERIVE_IV</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_PKCS12_DERIVE_IV   2</td> </tr> </table> </div><div class="memdoc"> <p>initialization vector </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00039">39</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="ad9b0f41c74cd6a8e072c84b5d310b331"></a> <h2 class="memtitle"><span class="permalink"><a href="#ad9b0f41c74cd6a8e072c84b5d310b331">◆ </a></span>MBEDTLS_PKCS12_DERIVE_KEY</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_PKCS12_DERIVE_KEY   1</td> </tr> </table> </div><div class="memdoc"> <p>encryption/decryption key </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00038">38</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="a91d3d19fb1a5cd18648f363eff8617ec"></a> <h2 class="memtitle"><span class="permalink"><a href="#a91d3d19fb1a5cd18648f363eff8617ec">◆ </a></span>MBEDTLS_PKCS12_DERIVE_MAC_KEY</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_PKCS12_DERIVE_MAC_KEY   3</td> </tr> </table> </div><div class="memdoc"> <p>integrity / MAC key </p> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00040">40</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="a41364d57177059b3ffb3167139e741b4"></a> <h2 class="memtitle"><span class="permalink"><a href="#a41364d57177059b3ffb3167139e741b4">◆ </a></span>MBEDTLS_PKCS12_PBE_DECRYPT</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_PKCS12_PBE_DECRYPT   0</td> </tr> </table> </div><div class="memdoc"> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00042">42</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <a id="ae833899c432600a15030b761d1e34d44"></a> <h2 class="memtitle"><span class="permalink"><a href="#ae833899c432600a15030b761d1e34d44">◆ </a></span>MBEDTLS_PKCS12_PBE_ENCRYPT</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">#define MBEDTLS_PKCS12_PBE_ENCRYPT   1</td> </tr> </table> </div><div class="memdoc"> <p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00043">43</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p> </div> </div> <h2 class="groupheader">Function Documentation</h2> <a id="a5e58a53e1f2194583f1e48fc2ffef627"></a> <h2 class="memtitle"><span class="permalink"><a href="#a5e58a53e1f2194583f1e48fc2ffef627">◆ </a></span>mbedtls_pkcs12_derivation()</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int mbedtls_pkcs12_derivation </td> <td>(</td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>data</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>datalen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>pwd</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>pwdlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>salt</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>saltlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> </td> <td class="paramname"><em>mbedtls_md</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>id</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>iterations</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>The PKCS#12 derivation function uses a password and a salt to produce pseudo-random bits for a particular "purpose". </p> <p>Depending on the given id, this function can produce an encryption/decryption key, an nitialization vector or an integrity key.</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">data</td><td>buffer to store the derived data in </td></tr> <tr><td class="paramname">datalen</td><td>length to fill </td></tr> <tr><td class="paramname">pwd</td><td>password to use (may be NULL if no password is used) </td></tr> <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr> <tr><td class="paramname">salt</td><td>salt buffer to use </td></tr> <tr><td class="paramname">saltlen</td><td>length of the salt </td></tr> <tr><td class="paramname">mbedtls_md</td><td>mbedtls_md type to use during the derivation </td></tr> <tr><td class="paramname">id</td><td>id that describes the purpose (can be MBEDTLS_PKCS12_DERIVE_KEY, MBEDTLS_PKCS12_DERIVE_IV or MBEDTLS_PKCS12_DERIVE_MAC_KEY) </td></tr> <tr><td class="paramname">iterations</td><td>number of iterations</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MD, BIGNUM type error. </dd></dl> </div> </div> <a id="aeca4c569f386fd7ece7fcfb4efc95a29"></a> <h2 class="memtitle"><span class="permalink"><a href="#aeca4c569f386fd7ece7fcfb4efc95a29">◆ </a></span>mbedtls_pkcs12_pbe()</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int mbedtls_pkcs12_pbe </td> <td>(</td> <td class="paramtype"><a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> * </td> <td class="paramname"><em>pbe_params</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="cipher_8h.html#a00c5885f1ea7279c5a7d8e12e596569d">mbedtls_cipher_type_t</a> </td> <td class="paramname"><em>cipher_type</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> </td> <td class="paramname"><em>md_type</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>pwd</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>pwdlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>PKCS12 Password Based function (encryption / decryption) for cipher-based and mbedtls_md-based PBE's. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">pbe_params</td><td>an ASN1 buffer containing the pkcs-12PbeParams structure </td></tr> <tr><td class="paramname">mode</td><td>either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT </td></tr> <tr><td class="paramname">cipher_type</td><td>the cipher used </td></tr> <tr><td class="paramname">md_type</td><td>the mbedtls_md used </td></tr> <tr><td class="paramname">pwd</td><td>the password used (may be NULL if no password is used) </td></tr> <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr> <tr><td class="paramname">input</td><td>the input data </td></tr> <tr><td class="paramname">len</td><td>data length </td></tr> <tr><td class="paramname">output</td><td>the output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MBEDTLS_ERR_XXX code </dd></dl> </div> </div> <a id="af865b866a1e1b6f5513f5904f1fdf2fa"></a> <h2 class="memtitle"><span class="permalink"><a href="#af865b866a1e1b6f5513f5904f1fdf2fa">◆ </a></span>mbedtls_pkcs12_pbe_sha1_rc4_128()</h2> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int mbedtls_pkcs12_pbe_sha1_rc4_128 </td> <td>(</td> <td class="paramtype"><a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> * </td> <td class="paramname"><em>pbe_params</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>mode</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>pwd</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>pwdlen</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>input</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>output</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>PKCS12 Password Based function (encryption / decryption) for pbeWithSHAAnd128BitRC4. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">pbe_params</td><td>an ASN1 buffer containing the pkcs-12PbeParams structure </td></tr> <tr><td class="paramname">mode</td><td>either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT </td></tr> <tr><td class="paramname">pwd</td><td>the password used (may be NULL if no password is used) </td></tr> <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr> <tr><td class="paramname">input</td><td>the input data </td></tr> <tr><td class="paramname">len</td><td>data length </td></tr> <tr><td class="paramname">output</td><td>the output buffer</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MBEDTLS_ERR_XXX code </dd></dl> </div> </div> </div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Fri Oct 12 2018 20:26:59 for mbed TLS v2.7.6 by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.13 </small></address> </body> </html>