Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 21 of 21) sorted by relevance

/mbedtls-3.5.0/library/
Dpk_wrap.c211 int key_len; in rsa_verify_wrap() local
229 key_len = mbedtls_pk_write_pubkey_der(&key, buf, sizeof(buf)); in rsa_verify_wrap()
230 if (key_len <= 0) { in rsa_verify_wrap()
239 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap()
310 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local
323 key_len = mbedtls_pk_write_key_der(&key, buf, sizeof(buf)); in mbedtls_pk_psa_rsa_sign_ext()
324 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext()
332 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_psa_rsa_sign_ext()
411 int key_len; in rsa_decrypt_wrap() local
431 key_len = mbedtls_pk_write_key_der(&key, buf, sizeof(buf)); in rsa_decrypt_wrap()
[all …]
Dssl_tls13_keys.c229 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument
239 key, key_len); in ssl_tls13_make_traffic_key()
273 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument
280 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
288 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys()
294 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys()
1084 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument
1104 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info()
1132 size_t key_len; in ssl_tls13_generate_early_key() local
1141 ret = ssl_tls13_get_cipher_key_info(ciphersuite_info, &key_len, &iv_len); in ssl_tls13_generate_early_key()
[all …]
Dpk.c525 int key_len; in mbedtls_pk_verify_ext() local
535 key_len = mbedtls_pk_write_pubkey(&p, buf, ctx); in mbedtls_pk_verify_ext()
537 if (key_len < 0) { in mbedtls_pk_verify_ext()
538 return key_len; in mbedtls_pk_verify_ext()
546 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_verify_ext()
920 int key_len; in mbedtls_pk_wrap_as_opaque()
924 key_len = mbedtls_pk_write_key_der(pk, buf, sizeof(buf)); in mbedtls_pk_wrap_as_opaque()
925 if (key_len <= 0) { in mbedtls_pk_wrap_as_opaque()
940 buf + sizeof(buf) - key_len, in mbedtls_pk_wrap_as_opaque()
941 key_len, key); in mbedtls_pk_wrap_as_opaque()
Dnist_kw.c474 static const unsigned int key_len[KW_TESTS] = { 16, 24, 32 }; variable
567 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
571 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
593 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
623 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test()
627 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test()
649 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
Dgcm.c888 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local
895 key_len, i, "enc"); in mbedtls_gcm_self_test()
900 key_len); in mbedtls_gcm_self_test()
906 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test()
950 key_len, i, "dec"); in mbedtls_gcm_self_test()
955 key_len); in mbedtls_gcm_self_test()
989 key_len, i, "enc"); in mbedtls_gcm_self_test()
994 key_len); in mbedtls_gcm_self_test()
1071 key_len, i, "dec"); in mbedtls_gcm_self_test()
1076 key_len); in mbedtls_gcm_self_test()
Dlmots.c428 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() argument
430 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key()
438 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key()
461 size_t *key_len) in mbedtls_lmots_export_public_key() argument
486 if (key_len != NULL) { in mbedtls_lmots_export_public_key()
487 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key()
Dlmots.h152 size_t *key_len);
Dlms.c277 size_t key_size, size_t *key_len) in mbedtls_lms_export_public_key() argument
300 if (key_len != NULL) { in mbedtls_lms_export_public_key()
301 *key_len = MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lms_export_public_key()
Dssl_tls13_keys.h166 size_t key_len, size_t iv_len,
Dssl_tls12_server.c2570 size_t key_len; in ssl_get_ecdh_params_from_cert() local
2634 key_len = PSA_BITS_TO_BYTES(key->grp.pbits); in ssl_get_ecdh_params_from_cert()
2635 ret = mbedtls_ecp_write_key(key, buf, key_len); in ssl_get_ecdh_params_from_cert()
2640 status = psa_import_key(&key_attributes, buf, key_len, in ssl_get_ecdh_params_from_cert()
Dssl_misc.h617 size_t key_len; /*!< The length of client_write_key and member
/mbedtls-3.5.0/tests/scripts/
Dgen_gcm_encrypt.pl62 my $key_len = get_suite_val("Keylen");
63 next if ($key_len !~ /\d+/);
79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
Dgen_gcm_decrypt.pl79 my $key_len = get_suite_val("Keylen");
80 next if ($key_len !~ /\d+/);
96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
/mbedtls-3.5.0/tests/suites/
Dtest_suite_pkcs5.function13 int it_cnt, int key_len, data_t *result_key_string)
20 it_cnt, key_len, key) == 0);
23 key_len, result_key_string->len) == 0);
Dtest_suite_aes.function174 size_t key_len, src_len, dst_len, data_unit_len;
182 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len);
183 TEST_ASSERT(key_len % 2 == 0);
191 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == 0);
218 size_t key_len, src_len, dst_len, data_unit_len;
226 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len);
227 TEST_ASSERT(key_len % 2 == 0);
235 TEST_ASSERT(mbedtls_aes_xts_setkey_dec(&ctx, key, key_len * 8) == 0);
275 size_t key_len = size;
279 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == retval);
[all …]
Dtest_suite_cipher.function358 void enc_dec_buf(int cipher_id, char *cipher_string, int key_len,
393 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT));
394 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT));
497 void enc_fail(int cipher_id, int pad_mode, int key_len, int length_val,
526 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx, key, key_len, MBEDTLS_ENCRYPT));
636 void enc_dec_buf_multipart(int cipher_id, int key_len, int first_length_val,
677 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT));
678 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT));
Dtest_suite_ssl.function1722 keys.key_len,
1726 keys.key_len,
1995 keys.key_len = server_write_key->len;
/mbedtls-3.5.0/programs/cipher/
Dcipher_aead_demo.c156 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local
157 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
/mbedtls-3.5.0/include/mbedtls/
Dcmac.h213 int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
Dlms.h310 size_t *key_len);
/mbedtls-3.5.0/programs/ssl/
Dssl_server2.c948 size_t key_len; member
1013 key_hex, &new->key_len) != 0) { in psk_parse()
1045 return mbedtls_ssl_set_hs_psk(ssl, cur->key, cur->key_len); in psk_callback()
3195 cur_psk->key_len); in main()