/mbedtls-latest/library/ |
D | pk_wrap.c | 74 int key_len; in rsa_verify_wrap() local 96 key_len = mbedtls_rsa_write_pubkey(rsa, buf, &p); in rsa_verify_wrap() 97 if (key_len <= 0) { in rsa_verify_wrap() 106 buf + sizeof(buf) - key_len, key_len, in rsa_verify_wrap() 178 int key_len; in mbedtls_pk_psa_rsa_sign_ext() local 194 key_len = mbedtls_rsa_write_key(rsa_ctx, buf, &p); in mbedtls_pk_psa_rsa_sign_ext() 195 if (key_len <= 0) { in mbedtls_pk_psa_rsa_sign_ext() 204 buf + MBEDTLS_PK_RSA_PRV_DER_MAX_BYTES - key_len, key_len, in mbedtls_pk_psa_rsa_sign_ext() 290 int key_len; in rsa_decrypt_wrap() local 301 key_len = mbedtls_rsa_write_key(rsa, buf, &p); in rsa_decrypt_wrap() [all …]
|
D | ssl_tls13_keys.c | 224 unsigned char *key, size_t key_len, in ssl_tls13_make_traffic_key() argument 234 key, key_len); in ssl_tls13_make_traffic_key() 268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument 275 keys->client_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 283 keys->server_write_key, key_len, in mbedtls_ssl_tls13_make_traffic_keys() 289 keys->key_len = key_len; in mbedtls_ssl_tls13_make_traffic_keys() 1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument 1115 *key_len = PSA_BITS_TO_BYTES(key_bits); in ssl_tls13_get_cipher_key_info() 1143 size_t key_len = 0; in ssl_tls13_generate_early_key() local 1153 ret = ssl_tls13_get_cipher_key_info(ciphersuite_info, &key_len, &iv_len); in ssl_tls13_generate_early_key() [all …]
|
D | nist_kw.c | 460 static const unsigned int key_len[] = { variable 601 mbedtls_printf(" KW-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 605 kw_key[i], key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 627 kw_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test() 664 mbedtls_printf(" KWP-AES-%u ", (unsigned int) key_len[i] * 8); in mbedtls_nist_kw_self_test() 668 key_len[i] * 8, 1); in mbedtls_nist_kw_self_test() 690 kwp_key[i], key_len[i] * 8, 0)) in mbedtls_nist_kw_self_test()
|
D | gcm.c | 1050 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 1055 key_len, i, "enc"); in mbedtls_gcm_self_test() 1062 key_len); in mbedtls_gcm_self_test() 1068 if (ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192) { in mbedtls_gcm_self_test() 1112 key_len, i, "dec"); in mbedtls_gcm_self_test() 1117 key_len); in mbedtls_gcm_self_test() 1151 key_len, i, "enc"); in mbedtls_gcm_self_test() 1156 key_len); in mbedtls_gcm_self_test() 1233 key_len, i, "dec"); in mbedtls_gcm_self_test() 1238 key_len); in mbedtls_gcm_self_test()
|
D | psa_crypto_ffdh.c | 170 size_t key_len = PSA_BITS_TO_BYTES(attributes->bits); in mbedtls_psa_ffdh_export_public_key() local 172 status = mbedtls_psa_ffdh_set_prime_generator(key_len, &P, &G); in mbedtls_psa_ffdh_export_public_key() 182 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&GX, data, key_len)); in mbedtls_psa_ffdh_export_public_key() 184 *data_length = key_len; in mbedtls_psa_ffdh_export_public_key()
|
D | lmots.c | 398 const unsigned char *key, size_t key_len) in mbedtls_lmots_import_public_key() argument 400 if (key_len < MBEDTLS_LMOTS_SIG_TYPE_OFFSET + MBEDTLS_LMOTS_TYPE_LEN) { in mbedtls_lmots_import_public_key() 407 if (key_len != MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type)) { in mbedtls_lmots_import_public_key() 430 size_t *key_len) in mbedtls_lmots_export_public_key() argument 453 if (key_len != NULL) { in mbedtls_lmots_export_public_key() 454 *key_len = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lmots_export_public_key()
|
D | pk_ecc.c | 48 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len) in mbedtls_pk_ecc_set_key() argument 70 status = psa_import_key(&attributes, key, key_len, &pk->priv_id); in mbedtls_pk_ecc_set_key() 76 int ret = mbedtls_ecp_read_key(eck->grp.id, eck, key, key_len); in mbedtls_pk_ecc_set_key()
|
D | pk.c | 1151 int key_len; in mbedtls_pk_verify_ext() local 1161 key_len = mbedtls_rsa_write_pubkey(mbedtls_pk_rsa(*ctx), buf, &p); in mbedtls_pk_verify_ext() 1163 if (key_len < 0) { in mbedtls_pk_verify_ext() 1164 return key_len; in mbedtls_pk_verify_ext() 1172 buf + sizeof(buf) - key_len, key_len, in mbedtls_pk_verify_ext()
|
D | lms.c | 275 size_t key_size, size_t *key_len) in mbedtls_lms_export_public_key() argument 294 if (key_len != NULL) { in mbedtls_lms_export_public_key() 295 *key_len = MBEDTLS_LMS_PUBLIC_KEY_LEN(ctx->params.type); in mbedtls_lms_export_public_key()
|
D | lmots.h | 117 size_t *key_len);
|
D | pk_internal.h | 147 int mbedtls_pk_ecc_set_key(mbedtls_pk_context *pk, unsigned char *key, size_t key_len);
|
D | ssl_tls13_keys.h | 154 size_t key_len, size_t iv_len,
|
D | ctr_drbg.c | 37 unsigned char *key, size_t key_len) in ctr_drbg_setup_psa_context() argument 45 status = psa_import_key(&key_attr, key, key_len, &psa_ctx->key_id); in ctr_drbg_setup_psa_context()
|
D | ssl_tls12_server.c | 2599 size_t key_len; in ssl_get_ecdh_params_from_cert() local 2650 status = psa_export_key(pk->priv_id, buf, sizeof(buf), &key_len); in ssl_get_ecdh_params_from_cert() 2655 status = psa_import_key(&key_attributes, buf, key_len, in ssl_get_ecdh_params_from_cert() 2708 ret = mbedtls_ecp_write_key_ext(key, &key_len, buf, sizeof(buf)); in ssl_get_ecdh_params_from_cert() 2714 status = psa_import_key(&key_attributes, buf, key_len, in ssl_get_ecdh_params_from_cert()
|
D | ssl_misc.h | 620 size_t key_len; /*!< The length of client_write_key and member
|
/mbedtls-latest/tests/scripts/ |
D | gen_gcm_encrypt.pl | 50 my $key_len = get_suite_val("Keylen"); 51 next if ($key_len !~ /\d+/); 67 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
D | gen_gcm_decrypt.pl | 67 my $key_len = get_suite_val("Keylen"); 68 next if ($key_len !~ /\d+/); 84 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/mbedtls-latest/tests/suites/ |
D | test_suite_aes.function | 294 size_t key_len, src_len, dst_len, data_unit_len; 302 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 303 TEST_ASSERT(key_len % 2 == 0); 311 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == 0); 338 size_t key_len, src_len, dst_len, data_unit_len; 346 key = mbedtls_test_unhexify_alloc(hex_key_string, &key_len); 347 TEST_ASSERT(key_len % 2 == 0); 355 TEST_ASSERT(mbedtls_aes_xts_setkey_dec(&ctx, key, key_len * 8) == 0); 395 size_t key_len = size; 399 TEST_ASSERT(mbedtls_aes_xts_setkey_enc(&ctx, key, key_len * 8) == retval); [all …]
|
D | test_suite_pkcs5.function | 13 int it_cnt, int key_len, data_t *result_key_string) 20 it_cnt, key_len, key) == 0); 23 key_len, result_key_string->len) == 0);
|
D | test_suite_cipher.function | 365 void enc_dec_buf(int cipher_id, char *cipher_string, int key_len, 400 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT)); 401 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT)); 504 void enc_fail(int cipher_id, int pad_mode, int key_len, int length_val, 533 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx, key, key_len, MBEDTLS_ENCRYPT)); 654 void enc_dec_buf_multipart(int cipher_id, int key_len, int first_length_val, 695 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_dec, key, key_len, MBEDTLS_DECRYPT)); 696 TEST_ASSERT(0 == mbedtls_cipher_setkey(&ctx_enc, key, key_len, MBEDTLS_ENCRYPT));
|
D | test_suite_pk.function | 191 const unsigned char **key, size_t *key_len, 209 *key_len = predefined_key->priv_key_len; 224 static psa_status_t pk_psa_import_key(const unsigned char *key_data, size_t key_len, 238 status = psa_import_key(&attributes, key_data, key_len, key);
|
/mbedtls-latest/programs/cipher/ |
D | cipher_aead_demo.c | 144 int key_len = mbedtls_cipher_get_key_bitlen(ctx); in aead_prepare() local 145 CHK(mbedtls_cipher_setkey(ctx, key_bytes, key_len, MBEDTLS_ENCRYPT)); in aead_prepare()
|
/mbedtls-latest/include/mbedtls/ |
D | cmac.h | 220 int mbedtls_aes_cmac_prf_128(const unsigned char *key, size_t key_len,
|
D | lms.h | 298 size_t *key_len);
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 946 size_t key_len; member 1011 key_hex, &new->key_len) != 0) { in psk_parse() 1043 return mbedtls_ssl_set_hs_psk(ssl, cur->key, cur->key_len); in psk_callback() 3227 cur_psk->key_len); in main()
|