/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs5.data | 25 PBES2 Decrypt (bad params tag) 41 PBES2 Decrypt (bad PBKDF2 params: not a sequence) 45 PBES2 Decrypt (bad PBKDF2 params: overlong) 49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 53 PBES2 Decrypt (bad PBKDF2 params salt: overlong) 57 PBES2 Decrypt (bad PBKDF2 params iter: not an int) 61 PBES2 Decrypt (bad PBKDF2 params iter: overlong) 65 PBES2 Decrypt (OK, PBKDF2 params explicit keylen) 69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong) 73 PBES2 Decrypt (OK, PBKDF2 params explicit prf_alg) [all …]
|
D | test_suite_pkcs5.function | 54 mbedtls_asn1_buf params; 58 params.tag = params_tag; 59 params.p = unhexify_alloc( params_hex, ¶ms.len ); 66 my_ret = mbedtls_pkcs5_pbes2( ¶ms, MBEDTLS_PKCS5_DECRYPT, 74 mbedtls_free( params.p );
|
D | main_test.function | 93 int dispatch_test(int cnt, char *params[50]) 97 ((void) params); 110 params[0] ); 155 int parse_arguments( char *buf, size_t len, char *params[50] ) 161 params[cnt++] = cur; 176 params[cnt++] = cur; 187 p = params[i]; 188 q = params[i]; 262 char *params[50]; 368 cnt = parse_arguments( buf, strlen(buf), params ); [all …]
|
D | test_suite_x509parse.function | 633 mbedtls_x509_buf params; 637 params.p = unhexify_alloc( hex_params, ¶ms.len ); 638 params.tag = params_tag; 640 my_ret = mbedtls_x509_get_rsassa_pss_params( ¶ms, &my_msg_md, &my_mgf_md, 653 mbedtls_free( params.p );
|
D | test_suite_dhm.function | 37 * Set params
|
D | test_suite_x509parse.data | 827 X509 Certificate ASN1 (TBSCertificate, alg with params) 830 X509 Certificate ASN1 (TBSCertificate, correct alg data, no params unknown version) 849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params) 1364 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag) 1367 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a) 1370 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b) 1373 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID) 1376 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID) 1379 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL) 1383 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag) [all …]
|
/net-tools-3.6.0/mbedtls-2.4.0/library/ |
D | asn1parse.c | 293 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ) in mbedtls_asn1_get_alg() argument 316 mbedtls_zeroize( params, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg() 320 params->tag = **p; in mbedtls_asn1_get_alg() 323 if( ( ret = mbedtls_asn1_get_len( p, end, ¶ms->len ) ) != 0 ) in mbedtls_asn1_get_alg() 326 params->p = *p; in mbedtls_asn1_get_alg() 327 *p += params->len; in mbedtls_asn1_get_alg() 340 mbedtls_asn1_buf params; in mbedtls_asn1_get_alg_null() local 342 memset( ¶ms, 0, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg_null() 344 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, ¶ms ) ) != 0 ) in mbedtls_asn1_get_alg_null() 347 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 ) in mbedtls_asn1_get_alg_null()
|
D | pkparse.c | 174 mbedtls_asn1_buf *params ) in pk_get_ecparams() argument 179 params->tag = **p; in pk_get_ecparams() 180 if( params->tag != MBEDTLS_ASN1_OID in pk_get_ecparams() 182 && params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) in pk_get_ecparams() 190 if( ( ret = mbedtls_asn1_get_tag( p, end, ¶ms->len, params->tag ) ) != 0 ) in pk_get_ecparams() 195 params->p = *p; in pk_get_ecparams() 196 *p += params->len; in pk_get_ecparams() 225 static int pk_group_from_specified( const mbedtls_asn1_buf *params, mbedtls_ecp_group *grp ) in pk_group_from_specified() argument 228 unsigned char *p = params->p; in pk_group_from_specified() 229 const unsigned char * const end = params->p + params->len; in pk_group_from_specified() [all …]
|
D | pkcs5.c | 54 static int pkcs5_parse_pbkdf2_params( const mbedtls_asn1_buf *params, in pkcs5_parse_pbkdf2_params() argument 60 unsigned char *p = params->p; in pkcs5_parse_pbkdf2_params() 61 const unsigned char *end = params->p + params->len; in pkcs5_parse_pbkdf2_params() 63 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs5_parse_pbkdf2_params()
|
D | pkcs12.c | 55 static int pkcs12_parse_pbe_params( mbedtls_asn1_buf *params, in pkcs12_parse_pbe_params() argument 59 unsigned char **p = ¶ms->p; in pkcs12_parse_pbe_params() 60 const unsigned char *end = params->p + params->len; in pkcs12_parse_pbe_params() 69 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs12_parse_pbe_params()
|
D | x509.c | 134 mbedtls_x509_buf *alg, mbedtls_x509_buf *params ) in mbedtls_x509_get_alg() argument 138 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, params ) ) != 0 ) in mbedtls_x509_get_alg() 213 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params, in mbedtls_x509_get_rsassa_pss_params() argument 229 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in mbedtls_x509_get_rsassa_pss_params() 233 p = (unsigned char *) params->p; in mbedtls_x509_get_rsassa_pss_params() 234 end = p + params->len; in mbedtls_x509_get_rsassa_pss_params()
|
D | ssl_cli.c | 2346 unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); local 2347 size_t params_len = p - params; 2431 mbedtls_md5_update( &mbedtls_md5, params, params_len ); 2436 mbedtls_sha1_update( &mbedtls_sha1, params, params_len ); 2472 mbedtls_md_update( &ctx, params, params_len );
|
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/ |
D | x509.h | 286 mbedtls_x509_buf *alg, mbedtls_x509_buf *params ); 288 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params,
|
D | asn1.h | 292 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params );
|