/mbedtls-latest/library/ |
D | base64.c | 62 const unsigned char *src, size_t slen) in mbedtls_base64_encode() argument 68 if (slen == 0) { in mbedtls_base64_encode() 73 n = slen / 3 + (slen % 3 != 0); in mbedtls_base64_encode() 87 n = (slen / 3) * 3; in mbedtls_base64_encode() 102 if (i < slen) { in mbedtls_base64_encode() 104 C2 = ((i + 1) < slen) ? *src++ : 0; in mbedtls_base64_encode() 110 if ((i + 1) < slen) { in mbedtls_base64_encode() 129 const unsigned char *src, size_t slen) in mbedtls_base64_decode() argument 140 for (i = n = 0; i < slen; i++) { in mbedtls_base64_decode() 143 while (i < slen && src[i] == ' ') { in mbedtls_base64_decode() [all …]
|
D | bignum.c | 516 size_t i, j, slen, n; in mbedtls_mpi_read_string() local 537 slen = strlen(s); in mbedtls_mpi_read_string() 540 if (slen > SIZE_MAX >> 2) { in mbedtls_mpi_read_string() 544 n = BITS_TO_LIMBS(slen << 2); in mbedtls_mpi_read_string() 549 for (i = slen, j = 0; i > 0; i--, j++) { in mbedtls_mpi_read_string() 556 for (i = 0; i < slen; i++) { in mbedtls_mpi_read_string() 703 size_t slen; in mbedtls_mpi_read_file() local 720 slen = strlen(s); in mbedtls_mpi_read_file() 721 if (slen == sizeof(s) - 2) { in mbedtls_mpi_read_file() 725 if (slen > 0 && s[slen - 1] == '\n') { in mbedtls_mpi_read_file() [all …]
|
D | ecdsa.c | 611 size_t *slen) in ecdsa_signature_to_asn1() argument 631 *slen = len; in ecdsa_signature_to_asn1() 642 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature_restartable() argument 676 MBEDTLS_MPI_CHK(ecdsa_signature_to_asn1(&r, &s, sig, sig_size, slen)); in mbedtls_ecdsa_write_signature_restartable() 691 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature() argument 696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 705 const unsigned char *sig, size_t slen) in mbedtls_ecdsa_read_signature() argument 708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 716 const unsigned char *sig, size_t slen, in mbedtls_ecdsa_read_signature_restartable() argument 721 const unsigned char *end = sig + slen; in mbedtls_ecdsa_read_signature_restartable()
|
D | pkcs5.c | 270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() argument 298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac() 360 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac() 371 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac_ext() argument 389 ret = pkcs5_pbkdf2_hmac(&md_ctx, password, plen, salt, slen, in mbedtls_pkcs5_pbkdf2_hmac_ext()
|
D | rsa.c | 1619 size_t slen, mbedtls_md_type_t md_alg) in mgf_mask() argument 1658 if ((ret = mbedtls_md_update(&md_ctx, src, slen)) != 0) { in mgf_mask() 1695 const unsigned char *salt, size_t slen, in hash_mprime() argument 1721 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime() 2124 size_t slen, min_slen, hlen, offset = 0; in rsa_rsassa_pss_sign_no_mode_check() local 2172 slen = hlen; in rsa_rsassa_pss_sign_no_mode_check() 2174 slen = olen - hlen - 2; in rsa_rsassa_pss_sign_no_mode_check() 2179 slen = (size_t) saltlen; in rsa_rsassa_pss_sign_no_mode_check() 2186 p += olen - hlen - slen - 2; in rsa_rsassa_pss_sign_no_mode_check() 2191 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check() [all …]
|
D | psa_crypto_rsa.c | 461 int slen = rsa_pss_expected_salt_len(alg, rsa, hash_length); in mbedtls_psa_rsa_verify_hash() local 467 slen, in mbedtls_psa_rsa_verify_hash()
|
D | ssl_tls.c | 401 typedef int (*tls_prf_fn)(const unsigned char *secret, size_t slen, 430 static int tls_prf_sha256(const unsigned char *secret, size_t slen, 441 static int tls_prf_sha384(const unsigned char *secret, size_t slen, 467 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument 491 return tls_prf(secret, slen, label, random, rlen, dstbuf, dlen); in mbedtls_ssl_tls_prf() 6712 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6736 if (slen != 0) { in tls_prf_generic() 6742 status = psa_import_key(&key_attributes, secret, slen, &master_key); in tls_prf_generic() 6792 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 6833 ret = mbedtls_md_hmac_starts(&md_ctx, secret, slen); in tls_prf_generic() [all …]
|
D | ssl_misc.h | 581 typedef int mbedtls_ssl_tls_prf_cb(const unsigned char *secret, size_t slen,
|
/mbedtls-latest/include/mbedtls/ |
D | ecdsa.h | 475 unsigned char *sig, size_t sig_size, size_t *slen, 522 unsigned char *sig, size_t sig_size, size_t *slen, 556 const unsigned char *sig, size_t slen); 591 const unsigned char *sig, size_t slen,
|
D | base64.h | 46 const unsigned char *src, size_t slen); 66 const unsigned char *src, size_t slen);
|
D | pkcs5.h | 151 size_t plen, const unsigned char *salt, size_t slen, 177 size_t slen,
|
D | ssl.h | 5650 const unsigned char *secret, size_t slen,
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ecdsa.function | 437 size_t slen; 450 slen = sizeof(sig); 459 &slen, 466 TEST_ASSERT(slen == sig_check->len); 467 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0); 481 &slen,
|
D | test_suite_pk.function | 1242 size_t slen; 1261 slen = sizeof(sig); 1265 sig, sizeof(sig), &slen, 1271 TEST_ASSERT(slen == sig_check->len); 1272 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0); 1280 hash->x, hash->len, sig, slen, &rs_ctx); 1290 hash->x, hash->len, sig, slen, &rs_ctx); 1299 hash->x, hash->len, sig, slen, &rs_ctx); 1303 slen = sizeof(sig); 1305 sig, sizeof(sig), &slen,
|
D | test_suite_psa_crypto.data | 4618 PSA verify hash: RSA-1024 PSS SHA-256, slen=0 (bad) 4622 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=0 4626 PSA verify hash: RSA-1024 PSS SHA-256, slen=31 (bad) 4630 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=31 4634 PSA verify hash: RSA-1024 PSS SHA-256, slen=32 4638 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=32 4642 PSA verify hash: RSA-1024 PSS SHA-256, slen=94 (bad) 4646 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=94 4650 PSA verify hash: RSA-1024 PSS SHA-512, slen=61 (bad) 4654 PSA verify hash: RSA-1024 PSS-any-salt SHA-512, slen=61 [all …]
|