/mbedtls-3.5.0/library/ |
D | pk_wrap.c | 211 int key_len; in rsa_verify_wrap() local 229 key_len = mbedtls_pk_write_pubkey_der(&key, buf, sizeof(buf)); in rsa_verify_wrap() 230 if (key_len <= 0) { in rsa_verify_wrap() 239 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap() 310 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local 323 key_len = mbedtls_pk_write_key_der(&key, buf, sizeof(buf)); in mbedtls_pk_psa_rsa_sign_ext() 324 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext() 332 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_psa_rsa_sign_ext() 411 int key_len; in rsa_decrypt_wrap() local 431 key_len = mbedtls_pk_write_key_der(&key, buf, sizeof(buf)); in rsa_decrypt_wrap() [all …]
|
D | ssl_tls13_keys.c | 229 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument 239 key, key_len); in ssl_tls13_make_traffic_key() 273 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument 280 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 288 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 294 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 1084 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument 1104 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info() 1132 size_t key_len; in ssl_tls13_generate_early_key() local 1141 ret = ssl_tls13_get_cipher_key_info(ciphersuite_info, &key_len, &iv_len); in ssl_tls13_generate_early_key() [all …]
|
D | pk.c | 525 int key_len; in mbedtls_pk_verify_ext() local 535 key_len = mbedtls_pk_write_pubkey(&p, buf, ctx); in mbedtls_pk_verify_ext() 537 if (key_len < 0) { in mbedtls_pk_verify_ext() 538 return key_len; in mbedtls_pk_verify_ext() 546 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_verify_ext() 920 int key_len; in mbedtls_pk_wrap_as_opaque() 924 key_len = mbedtls_pk_write_key_der(pk, buf, sizeof(buf)); in mbedtls_pk_wrap_as_opaque() 925 if (key_len <= 0) { in mbedtls_pk_wrap_as_opaque() 940 buf + sizeof(buf) - key_len, in mbedtls_pk_wrap_as_opaque() 941 key_len, key); in mbedtls_pk_wrap_as_opaque()
|
D | nist_kw.c | 474 static const unsigned int key_len[KW_TESTS] = { 16, 24, 32 }; variable 567 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 571 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 593 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test() 623 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 627 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 649 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
|
D | gcm.c | 888 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 895 key_len, i, "enc"); in mbedtls_gcm_self_test() 900 key_len); in mbedtls_gcm_self_test() 906 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test() 950 key_len, i, "dec"); in mbedtls_gcm_self_test() 955 key_len); in mbedtls_gcm_self_test() 989 key_len, i, "enc"); in mbedtls_gcm_self_test() 994 key_len); in mbedtls_gcm_self_test() 1071 key_len, i, "dec"); in mbedtls_gcm_self_test() 1076 key_len); in mbedtls_gcm_self_test()
|
D | lmots.c | 428 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() argument 430 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key() 438 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key() 461 size_t *key_len) in mbedtls_lmots_export_public_key() argument 486 if (key_len != NULL) { in mbedtls_lmots_export_public_key() 487 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key()
|
D | lmots.h | 152 size_t *key_len);
|
D | lms.c | 277 size_t key_size, size_t *key_len) in mbedtls_lms_export_public_key() argument 300 if (key_len != NULL) { in mbedtls_lms_export_public_key() 301 *key_len = MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lms_export_public_key()
|
D | ssl_tls13_keys.h | 166 size_t key_len, size_t iv_len,
|
D | ssl_tls12_server.c | 2570 size_t key_len; in ssl_get_ecdh_params_from_cert() local 2634 key_len = PSA_BITS_TO_BYTES(key->grp.pbits); in ssl_get_ecdh_params_from_cert() 2635 ret = mbedtls_ecp_write_key(key, buf, key_len); in ssl_get_ecdh_params_from_cert() 2640 status = psa_import_key(&key_attributes, buf, key_len, in ssl_get_ecdh_params_from_cert()
|
D | ssl_misc.h | 617 size_t key_len; /*!< The length of client_write_key and member
|
/mbedtls-3.5.0/tests/scripts/ |
D | gen_gcm_encrypt.pl | 62 my $key_len = get_suite_val("Keylen"); 63 next if ($key_len !~ /\d+/); 79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
D | gen_gcm_decrypt.pl | 79 my $key_len = get_suite_val("Keylen"); 80 next if ($key_len !~ /\d+/); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_pkcs5.function | 13 int it_cnt, int key_len, data_t *result_key_string) 20 it_cnt, key_len, key) == 0); 23 key_len, result_key_string->len) == 0);
|
D | test_suite_aes.function | 174 size_t key_len, src_len, dst_len, data_unit_len; 182 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 183 TEST_ASSERT(key_len % 2 == 0); 191 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == 0); 218 size_t key_len, src_len, dst_len, data_unit_len; 226 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 227 TEST_ASSERT(key_len % 2 == 0); 235 TEST_ASSERT(mbedtls_aes_xts_setkey_dec(&ctx, key, key_len * 8) == 0); 275 size_t key_len = size; 279 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == retval); [all …]
|
D | test_suite_cipher.function | 358 void enc_dec_buf(int cipher_id, char *cipher_string, int key_len, 393 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT)); 394 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT)); 497 void enc_fail(int cipher_id, int pad_mode, int key_len, int length_val, 526 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx, key, key_len, MBEDTLS_ENCRYPT)); 636 void enc_dec_buf_multipart(int cipher_id, int key_len, int first_length_val, 677 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT)); 678 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT));
|
D | test_suite_ssl.function | 1722 keys.key_len, 1726 keys.key_len, 1995 keys.key_len = server_write_key->len;
|
/mbedtls-3.5.0/programs/cipher/ |
D | cipher_aead_demo.c | 156 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local 157 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
|
/mbedtls-3.5.0/include/mbedtls/ |
D | cmac.h | 213 int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
|
D | lms.h | 310 size_t *key_len);
|
/mbedtls-3.5.0/programs/ssl/ |
D | ssl_server2.c | 948 size_t key_len; member 1013 key_hex, &new->key_len) != 0) { in psk_parse() 1045 return mbedtls_ssl_set_hs_psk(ssl, cur->key, cur->key_len); in psk_callback() 3195 cur_psk->key_len); in main()
|