Sophie

Sophie

distrib > Mageia > 6 > x86_64 > media > core-updates > by-pkgid > f835bee5b8b7ec08e20fae17cab51e63 > files > 422

lib64mbedtls-devel-2.7.3-1.mga6.x86_64.rpm

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/>
<meta http-equiv="X-UA-Compatible" content="IE=9"/>
<meta name="generator" content="Doxygen 1.8.13"/>
<meta name="viewport" content="width=device-width, initial-scale=1"/>
<title>mbed TLS v2.7.3: pkcs12.h File Reference</title>
<link href="tabs.css" rel="stylesheet" type="text/css"/>
<script type="text/javascript" src="jquery.js"></script>
<script type="text/javascript" src="dynsections.js"></script>
<link href="doxygen.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="top"><!-- do not remove this div, it is closed by doxygen! -->
<div id="titlearea">
<table cellspacing="0" cellpadding="0">
 <tbody>
 <tr style="height: 56px;">
  <td id="projectalign" style="padding-left: 0.5em;">
   <div id="projectname">mbed TLS v2.7.3
   </div>
  </td>
 </tr>
 </tbody>
</table>
</div>
<!-- end header part -->
<!-- Generated by Doxygen 1.8.13 -->
<script type="text/javascript" src="menudata.js"></script>
<script type="text/javascript" src="menu.js"></script>
<script type="text/javascript">
$(function() {
  initMenu('',false,false,'search.php','Search');
});
</script>
<div id="main-nav"></div>
<div id="nav-path" class="navpath">
  <ul>
<li class="navelem"><a class="el" href="dir_d44c64559bbebec7f509842c48db8b23.html">include</a></li><li class="navelem"><a class="el" href="dir_b4d146e9a6d8dd56ed4afb2480a97fd3.html">mbedtls</a></li>  </ul>
</div>
</div><!-- top -->
<div class="header">
  <div class="summary">
<a href="#define-members">Macros</a> &#124;
<a href="#func-members">Functions</a>  </div>
  <div class="headertitle">
<div class="title">pkcs12.h File Reference</div>  </div>
</div><!--header-->
<div class="contents">

<p>PKCS#12 Personal Information Exchange Syntax.  
<a href="#details">More...</a></p>
<div class="textblock"><code>#include &quot;<a class="el" href="md_8h_source.html">md.h</a>&quot;</code><br />
<code>#include &quot;<a class="el" href="cipher_8h_source.html">cipher.h</a>&quot;</code><br />
<code>#include &quot;<a class="el" href="asn1_8h_source.html">asn1.h</a>&quot;</code><br />
<code>#include &lt;stddef.h&gt;</code><br />
</div><div class="textblock"><div class="dynheader">
Include dependency graph for pkcs12.h:</div>
<div class="dyncontent">
<div class="center"><img src="pkcs12_8h__incl.png" border="0" usemap="#pkcs12_8h" alt=""/></div>
<map name="pkcs12_8h" id="pkcs12_8h">
</map>
</div>
</div>
<p><a href="pkcs12_8h_source.html">Go to the source code of this file.</a></p>
<table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="define-members"></a>
Macros</h2></td></tr>
<tr class="memitem:ac856f81d3cbc3baeaa848b33d991209b"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ac856f81d3cbc3baeaa848b33d991209b">MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA</a>&#160;&#160;&#160;-0x1F80</td></tr>
<tr class="separator:ac856f81d3cbc3baeaa848b33d991209b"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae887e38a4caab392fc5086bcceed7af9"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ae887e38a4caab392fc5086bcceed7af9">MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE</a>&#160;&#160;&#160;-0x1F00</td></tr>
<tr class="separator:ae887e38a4caab392fc5086bcceed7af9"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a92e9101410d452e508c88a7231e23996"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a92e9101410d452e508c88a7231e23996">MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT</a>&#160;&#160;&#160;-0x1E80</td></tr>
<tr class="separator:a92e9101410d452e508c88a7231e23996"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ab3313f9e7321d23b3af93e97a544ffdb"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ab3313f9e7321d23b3af93e97a544ffdb">MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH</a>&#160;&#160;&#160;-0x1E00</td></tr>
<tr class="separator:ab3313f9e7321d23b3af93e97a544ffdb"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ad9b0f41c74cd6a8e072c84b5d310b331"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ad9b0f41c74cd6a8e072c84b5d310b331">MBEDTLS_PKCS12_DERIVE_KEY</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:ad9b0f41c74cd6a8e072c84b5d310b331"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ad8ac9a220c8d237a9a5bc972daed1c13"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ad8ac9a220c8d237a9a5bc972daed1c13">MBEDTLS_PKCS12_DERIVE_IV</a>&#160;&#160;&#160;2</td></tr>
<tr class="separator:ad8ac9a220c8d237a9a5bc972daed1c13"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a91d3d19fb1a5cd18648f363eff8617ec"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a91d3d19fb1a5cd18648f363eff8617ec">MBEDTLS_PKCS12_DERIVE_MAC_KEY</a>&#160;&#160;&#160;3</td></tr>
<tr class="separator:a91d3d19fb1a5cd18648f363eff8617ec"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a41364d57177059b3ffb3167139e741b4"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a41364d57177059b3ffb3167139e741b4">MBEDTLS_PKCS12_PBE_DECRYPT</a>&#160;&#160;&#160;0</td></tr>
<tr class="separator:a41364d57177059b3ffb3167139e741b4"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:ae833899c432600a15030b761d1e34d44"><td class="memItemLeft" align="right" valign="top">#define&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#ae833899c432600a15030b761d1e34d44">MBEDTLS_PKCS12_PBE_ENCRYPT</a>&#160;&#160;&#160;1</td></tr>
<tr class="separator:ae833899c432600a15030b761d1e34d44"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table><table class="memberdecls">
<tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a>
Functions</h2></td></tr>
<tr class="memitem:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#af865b866a1e1b6f5513f5904f1fdf2fa">mbedtls_pkcs12_pbe_sha1_rc4_128</a> (<a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *pbe_params, int mode, const unsigned char *pwd, size_t pwdlen, const unsigned char *input, size_t len, unsigned char *output)</td></tr>
<tr class="memdesc:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="mdescLeft">&#160;</td><td class="mdescRight">PKCS12 Password Based function (encryption / decryption) for pbeWithSHAAnd128BitRC4.  <a href="#af865b866a1e1b6f5513f5904f1fdf2fa">More...</a><br /></td></tr>
<tr class="separator:af865b866a1e1b6f5513f5904f1fdf2fa"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#aeca4c569f386fd7ece7fcfb4efc95a29">mbedtls_pkcs12_pbe</a> (<a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *pbe_params, int mode, <a class="el" href="cipher_8h.html#a00c5885f1ea7279c5a7d8e12e596569d">mbedtls_cipher_type_t</a> cipher_type, <a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> md_type, const unsigned char *pwd, size_t pwdlen, const unsigned char *input, size_t len, unsigned char *output)</td></tr>
<tr class="memdesc:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="mdescLeft">&#160;</td><td class="mdescRight">PKCS12 Password Based function (encryption / decryption) for cipher-based and mbedtls_md-based PBE's.  <a href="#aeca4c569f386fd7ece7fcfb4efc95a29">More...</a><br /></td></tr>
<tr class="separator:aeca4c569f386fd7ece7fcfb4efc95a29"><td class="memSeparator" colspan="2">&#160;</td></tr>
<tr class="memitem:a5e58a53e1f2194583f1e48fc2ffef627"><td class="memItemLeft" align="right" valign="top">int&#160;</td><td class="memItemRight" valign="bottom"><a class="el" href="pkcs12_8h.html#a5e58a53e1f2194583f1e48fc2ffef627">mbedtls_pkcs12_derivation</a> (unsigned char *data, size_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, <a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a> <a class="el" href="md_8h.html#a36c5d8bda1905e0434708f0ef5912dda">mbedtls_md</a>, int id, int iterations)</td></tr>
<tr class="memdesc:a5e58a53e1f2194583f1e48fc2ffef627"><td class="mdescLeft">&#160;</td><td class="mdescRight">The PKCS#12 derivation function uses a password and a salt to produce pseudo-random bits for a particular "purpose".  <a href="#a5e58a53e1f2194583f1e48fc2ffef627">More...</a><br /></td></tr>
<tr class="separator:a5e58a53e1f2194583f1e48fc2ffef627"><td class="memSeparator" colspan="2">&#160;</td></tr>
</table>
<a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2>
<div class="textblock"><p>PKCS#12 Personal Information Exchange Syntax. </p>

<p class="definition">Definition in file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>
</div><h2 class="groupheader">Macro Definition Documentation</h2>
<a id="ac856f81d3cbc3baeaa848b33d991209b"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ac856f81d3cbc3baeaa848b33d991209b">&#9670;&nbsp;</a></span>MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA&#160;&#160;&#160;-0x1F80</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>Bad input parameters to function. </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00033">33</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="ae887e38a4caab392fc5086bcceed7af9"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ae887e38a4caab392fc5086bcceed7af9">&#9670;&nbsp;</a></span>MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE&#160;&#160;&#160;-0x1F00</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>Feature not available, e.g. unsupported encryption scheme. </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00034">34</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="ab3313f9e7321d23b3af93e97a544ffdb"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ab3313f9e7321d23b3af93e97a544ffdb">&#9670;&nbsp;</a></span>MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH&#160;&#160;&#160;-0x1E00</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>Given private key password does not allow for correct decryption. </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00036">36</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="a92e9101410d452e508c88a7231e23996"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a92e9101410d452e508c88a7231e23996">&#9670;&nbsp;</a></span>MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT&#160;&#160;&#160;-0x1E80</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>PBE ASN.1 data not as expected. </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00035">35</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="ad8ac9a220c8d237a9a5bc972daed1c13"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ad8ac9a220c8d237a9a5bc972daed1c13">&#9670;&nbsp;</a></span>MBEDTLS_PKCS12_DERIVE_IV</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_PKCS12_DERIVE_IV&#160;&#160;&#160;2</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>initialization vector </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00039">39</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="ad9b0f41c74cd6a8e072c84b5d310b331"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ad9b0f41c74cd6a8e072c84b5d310b331">&#9670;&nbsp;</a></span>MBEDTLS_PKCS12_DERIVE_KEY</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_PKCS12_DERIVE_KEY&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>encryption/decryption key </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00038">38</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="a91d3d19fb1a5cd18648f363eff8617ec"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a91d3d19fb1a5cd18648f363eff8617ec">&#9670;&nbsp;</a></span>MBEDTLS_PKCS12_DERIVE_MAC_KEY</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_PKCS12_DERIVE_MAC_KEY&#160;&#160;&#160;3</td>
        </tr>
      </table>
</div><div class="memdoc">
<p>integrity / MAC key </p>

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00040">40</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="a41364d57177059b3ffb3167139e741b4"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a41364d57177059b3ffb3167139e741b4">&#9670;&nbsp;</a></span>MBEDTLS_PKCS12_PBE_DECRYPT</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_PKCS12_PBE_DECRYPT&#160;&#160;&#160;0</td>
        </tr>
      </table>
</div><div class="memdoc">

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00042">42</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<a id="ae833899c432600a15030b761d1e34d44"></a>
<h2 class="memtitle"><span class="permalink"><a href="#ae833899c432600a15030b761d1e34d44">&#9670;&nbsp;</a></span>MBEDTLS_PKCS12_PBE_ENCRYPT</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">#define MBEDTLS_PKCS12_PBE_ENCRYPT&#160;&#160;&#160;1</td>
        </tr>
      </table>
</div><div class="memdoc">

<p class="definition">Definition at line <a class="el" href="pkcs12_8h_source.html#l00043">43</a> of file <a class="el" href="pkcs12_8h_source.html">pkcs12.h</a>.</p>

</div>
</div>
<h2 class="groupheader">Function Documentation</h2>
<a id="a5e58a53e1f2194583f1e48fc2ffef627"></a>
<h2 class="memtitle"><span class="permalink"><a href="#a5e58a53e1f2194583f1e48fc2ffef627">&#9670;&nbsp;</a></span>mbedtls_pkcs12_derivation()</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int mbedtls_pkcs12_derivation </td>
          <td>(</td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>data</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>datalen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>pwd</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>pwdlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>salt</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>saltlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a>&#160;</td>
          <td class="paramname"><em>mbedtls_md</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>id</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>iterations</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>The PKCS#12 derivation function uses a password and a salt to produce pseudo-random bits for a particular "purpose". </p>
<p>Depending on the given id, this function can produce an encryption/decryption key, an nitialization vector or an integrity key.</p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">data</td><td>buffer to store the derived data in </td></tr>
    <tr><td class="paramname">datalen</td><td>length to fill </td></tr>
    <tr><td class="paramname">pwd</td><td>password to use (may be NULL if no password is used) </td></tr>
    <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr>
    <tr><td class="paramname">salt</td><td>salt buffer to use </td></tr>
    <tr><td class="paramname">saltlen</td><td>length of the salt </td></tr>
    <tr><td class="paramname">mbedtls_md</td><td>mbedtls_md type to use during the derivation </td></tr>
    <tr><td class="paramname">id</td><td>id that describes the purpose (can be MBEDTLS_PKCS12_DERIVE_KEY, MBEDTLS_PKCS12_DERIVE_IV or MBEDTLS_PKCS12_DERIVE_MAC_KEY) </td></tr>
    <tr><td class="paramname">iterations</td><td>number of iterations</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MD, BIGNUM type error. </dd></dl>

</div>
</div>
<a id="aeca4c569f386fd7ece7fcfb4efc95a29"></a>
<h2 class="memtitle"><span class="permalink"><a href="#aeca4c569f386fd7ece7fcfb4efc95a29">&#9670;&nbsp;</a></span>mbedtls_pkcs12_pbe()</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int mbedtls_pkcs12_pbe </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *&#160;</td>
          <td class="paramname"><em>pbe_params</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="cipher_8h.html#a00c5885f1ea7279c5a7d8e12e596569d">mbedtls_cipher_type_t</a>&#160;</td>
          <td class="paramname"><em>cipher_type</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype"><a class="el" href="md_8h.html#a219313cb40503ec3e34a857ab98b2296">mbedtls_md_type_t</a>&#160;</td>
          <td class="paramname"><em>md_type</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>pwd</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>pwdlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>PKCS12 Password Based function (encryption / decryption) for cipher-based and mbedtls_md-based PBE's. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">pbe_params</td><td>an ASN1 buffer containing the pkcs-12PbeParams structure </td></tr>
    <tr><td class="paramname">mode</td><td>either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT </td></tr>
    <tr><td class="paramname">cipher_type</td><td>the cipher used </td></tr>
    <tr><td class="paramname">md_type</td><td>the mbedtls_md used </td></tr>
    <tr><td class="paramname">pwd</td><td>the password used (may be NULL if no password is used) </td></tr>
    <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr>
    <tr><td class="paramname">input</td><td>the input data </td></tr>
    <tr><td class="paramname">len</td><td>data length </td></tr>
    <tr><td class="paramname">output</td><td>the output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MBEDTLS_ERR_XXX code </dd></dl>

</div>
</div>
<a id="af865b866a1e1b6f5513f5904f1fdf2fa"></a>
<h2 class="memtitle"><span class="permalink"><a href="#af865b866a1e1b6f5513f5904f1fdf2fa">&#9670;&nbsp;</a></span>mbedtls_pkcs12_pbe_sha1_rc4_128()</h2>

<div class="memitem">
<div class="memproto">
      <table class="memname">
        <tr>
          <td class="memname">int mbedtls_pkcs12_pbe_sha1_rc4_128 </td>
          <td>(</td>
          <td class="paramtype"><a class="el" href="structmbedtls__asn1__buf.html">mbedtls_asn1_buf</a> *&#160;</td>
          <td class="paramname"><em>pbe_params</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">int&#160;</td>
          <td class="paramname"><em>mode</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>pwd</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>pwdlen</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">const unsigned char *&#160;</td>
          <td class="paramname"><em>input</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">size_t&#160;</td>
          <td class="paramname"><em>len</em>, </td>
        </tr>
        <tr>
          <td class="paramkey"></td>
          <td></td>
          <td class="paramtype">unsigned char *&#160;</td>
          <td class="paramname"><em>output</em>&#160;</td>
        </tr>
        <tr>
          <td></td>
          <td>)</td>
          <td></td><td></td>
        </tr>
      </table>
</div><div class="memdoc">

<p>PKCS12 Password Based function (encryption / decryption) for pbeWithSHAAnd128BitRC4. </p>
<dl class="params"><dt>Parameters</dt><dd>
  <table class="params">
    <tr><td class="paramname">pbe_params</td><td>an ASN1 buffer containing the pkcs-12PbeParams structure </td></tr>
    <tr><td class="paramname">mode</td><td>either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT </td></tr>
    <tr><td class="paramname">pwd</td><td>the password used (may be NULL if no password is used) </td></tr>
    <tr><td class="paramname">pwdlen</td><td>length of the password (may be 0) </td></tr>
    <tr><td class="paramname">input</td><td>the input data </td></tr>
    <tr><td class="paramname">len</td><td>data length </td></tr>
    <tr><td class="paramname">output</td><td>the output buffer</td></tr>
  </table>
  </dd>
</dl>
<dl class="section return"><dt>Returns</dt><dd>0 if successful, or a MBEDTLS_ERR_XXX code </dd></dl>

</div>
</div>
</div><!-- contents -->
<!-- start footer part -->
<hr class="footer"/><address class="footer"><small>
Generated on Tue May 8 2018 21:08:41 for mbed TLS v2.7.3 by &#160;<a href="http://www.doxygen.org/index.html">
<img class="footer" src="doxygen.png" alt="doxygen"/>
</a> 1.8.13
</small></address>
</body>
</html>