Home
last modified time | relevance | path

Searched refs:params (Results 1 – 14 of 14) sorted by relevance

/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs5.data25 PBES2 Decrypt (bad params tag)
41 PBES2 Decrypt (bad PBKDF2 params: not a sequence)
45 PBES2 Decrypt (bad PBKDF2 params: overlong)
49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
53 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
57 PBES2 Decrypt (bad PBKDF2 params iter: not an int)
61 PBES2 Decrypt (bad PBKDF2 params iter: overlong)
65 PBES2 Decrypt (OK, PBKDF2 params explicit keylen)
69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
73 PBES2 Decrypt (OK, PBKDF2 params explicit prf_alg)
[all …]
Dtest_suite_pkcs5.function54 mbedtls_asn1_buf params;
58 params.tag = params_tag;
59 params.p = unhexify_alloc( params_hex, &params.len );
66 my_ret = mbedtls_pkcs5_pbes2( &params, MBEDTLS_PKCS5_DECRYPT,
74 mbedtls_free( params.p );
Dmain_test.function93 int dispatch_test(int cnt, char *params[50])
97 ((void) params);
110 params[0] );
155 int parse_arguments( char *buf, size_t len, char *params[50] )
161 params[cnt++] = cur;
176 params[cnt++] = cur;
187 p = params[i];
188 q = params[i];
262 char *params[50];
368 cnt = parse_arguments( buf, strlen(buf), params );
[all …]
Dtest_suite_x509parse.function633 mbedtls_x509_buf params;
637 params.p = unhexify_alloc( hex_params, &params.len );
638 params.tag = params_tag;
640 my_ret = mbedtls_x509_get_rsassa_pss_params( &params, &my_msg_md, &my_mgf_md,
653 mbedtls_free( params.p );
Dtest_suite_dhm.function37 * Set params
Dtest_suite_x509parse.data827 X509 Certificate ASN1 (TBSCertificate, alg with params)
830 X509 Certificate ASN1 (TBSCertificate, correct alg data, no params unknown version)
849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params)
1364 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag)
1367 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a)
1370 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b)
1373 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID)
1376 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID)
1379 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL)
1383 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag)
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/library/
Dasn1parse.c293 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ) in mbedtls_asn1_get_alg() argument
316 mbedtls_zeroize( params, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg()
320 params->tag = **p; in mbedtls_asn1_get_alg()
323 if( ( ret = mbedtls_asn1_get_len( p, end, &params->len ) ) != 0 ) in mbedtls_asn1_get_alg()
326 params->p = *p; in mbedtls_asn1_get_alg()
327 *p += params->len; in mbedtls_asn1_get_alg()
340 mbedtls_asn1_buf params; in mbedtls_asn1_get_alg_null() local
342 memset( &params, 0, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg_null()
344 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, &params ) ) != 0 ) in mbedtls_asn1_get_alg_null()
347 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 ) in mbedtls_asn1_get_alg_null()
Dpkparse.c174 mbedtls_asn1_buf *params ) in pk_get_ecparams() argument
179 params->tag = **p; in pk_get_ecparams()
180 if( params->tag != MBEDTLS_ASN1_OID in pk_get_ecparams()
182 && params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) in pk_get_ecparams()
190 if( ( ret = mbedtls_asn1_get_tag( p, end, &params->len, params->tag ) ) != 0 ) in pk_get_ecparams()
195 params->p = *p; in pk_get_ecparams()
196 *p += params->len; in pk_get_ecparams()
225 static int pk_group_from_specified( const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp ) in pk_group_from_specified() argument
228 unsigned char *p = params->p; in pk_group_from_specified()
229 const unsigned char * const end = params->p + params->len; in pk_group_from_specified()
[all …]
Dpkcs5.c54 static int pkcs5_parse_pbkdf2_params( const mbedtls_asn1_buf *params, in pkcs5_parse_pbkdf2_params() argument
60 unsigned char *p = params->p; in pkcs5_parse_pbkdf2_params()
61 const unsigned char *end = params->p + params->len; in pkcs5_parse_pbkdf2_params()
63 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs5_parse_pbkdf2_params()
Dpkcs12.c55 static int pkcs12_parse_pbe_params( mbedtls_asn1_buf *params, in pkcs12_parse_pbe_params() argument
59 unsigned char **p = &params->p; in pkcs12_parse_pbe_params()
60 const unsigned char *end = params->p + params->len; in pkcs12_parse_pbe_params()
69 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs12_parse_pbe_params()
Dx509.c134 mbedtls_x509_buf *alg, mbedtls_x509_buf *params ) in mbedtls_x509_get_alg() argument
138 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, params ) ) != 0 ) in mbedtls_x509_get_alg()
213 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params, in mbedtls_x509_get_rsassa_pss_params() argument
229 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in mbedtls_x509_get_rsassa_pss_params()
233 p = (unsigned char *) params->p; in mbedtls_x509_get_rsassa_pss_params()
234 end = p + params->len; in mbedtls_x509_get_rsassa_pss_params()
Dssl_cli.c2346 unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); local
2347 size_t params_len = p - params;
2431 mbedtls_md5_update( &mbedtls_md5, params, params_len );
2436 mbedtls_sha1_update( &mbedtls_sha1, params, params_len );
2472 mbedtls_md_update( &ctx, params, params_len );
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/
Dx509.h286 mbedtls_x509_buf *alg, mbedtls_x509_buf *params );
288 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params,
Dasn1.h292 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params );