/net-tools-latest/mbedtls-2.4.0/tests/suites/ |
D | test_suite_aes.function | 19 int key_len; 27 key_len = unhexify( key_str, hex_key_string ); 30 TEST_ASSERT( mbedtls_aes_setkey_enc( &ctx, key_str, key_len * 8 ) == setkey_result ); 53 int key_len; 61 key_len = unhexify( key_str, hex_key_string ); 64 TEST_ASSERT( mbedtls_aes_setkey_dec( &ctx, key_str, key_len * 8 ) == setkey_result ); 89 int key_len, data_len; 98 key_len = unhexify( key_str, hex_key_string ); 102 mbedtls_aes_setkey_enc( &ctx, key_str, key_len * 8 ); 127 int key_len, data_len; [all …]
|
D | test_suite_blowfish.function | 19 int key_len; 27 key_len = unhexify( key_str, hex_key_string ); 30 TEST_ASSERT( mbedtls_blowfish_setkey( &ctx, key_str, key_len * 8 ) == setkey_result ); 53 int key_len; 61 key_len = unhexify( key_str, hex_key_string ); 64 TEST_ASSERT( mbedtls_blowfish_setkey( &ctx, key_str, key_len * 8 ) == setkey_result ); 89 int key_len, data_len; 98 key_len = unhexify( key_str, hex_key_string ); 102 mbedtls_blowfish_setkey( &ctx, key_str, key_len * 8 ); 128 int key_len, data_len; [all …]
|
D | test_suite_camellia.function | 19 int key_len; 27 key_len = unhexify( key_str, hex_key_string ); 30 TEST_ASSERT( mbedtls_camellia_setkey_enc( &ctx, key_str, key_len * 8 ) == setkey_result ); 53 int key_len; 61 key_len = unhexify( key_str, hex_key_string ); 64 TEST_ASSERT( mbedtls_camellia_setkey_dec( &ctx, key_str, key_len * 8 ) == setkey_result ); 89 int key_len, data_len; 98 key_len = unhexify( key_str, hex_key_string ); 102 mbedtls_camellia_setkey_enc( &ctx, key_str, key_len * 8 ); 127 int key_len, data_len; [all …]
|
D | test_suite_gcm.function | 26 unsigned int key_len; 40 key_len = unhexify( key_str, hex_key_string ); 45 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str, key_len * 8 ) == init_result ); 76 unsigned int key_len; 90 key_len = unhexify( key_str, hex_key_string ); 96 TEST_ASSERT( mbedtls_gcm_setkey( &ctx, cipher_id, key_str, key_len * 8 ) == init_result );
|
D | test_suite_arc4.function | 18 int src_len, key_len; 28 key_len = unhexify( key_str, hex_key_string ); 30 mbedtls_arc4_setup(&ctx, key_str, key_len);
|
D | test_suite_ccm.function | 89 size_t key_len, msg_len, iv_len, add_len, tag_len, result_len; 99 key_len = unhexify( key, key_hex ); 106 TEST_ASSERT( mbedtls_ccm_setkey( &ctx, cipher_id, key, key_len * 8 ) == 0 ); 135 size_t key_len, msg_len, iv_len, add_len, result_len; 147 key_len = unhexify( key, key_hex ); 165 TEST_ASSERT( mbedtls_ccm_setkey( &ctx, cipher_id, key, key_len * 8 ) == 0 );
|
D | test_suite_cipher.function | 133 void enc_dec_buf( int cipher_id, char *cipher_string, int key_len, 166 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) ); 167 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) ); 258 void enc_fail( int cipher_id, int pad_mode, int key_len, 287 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) ); 360 void enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val, 398 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) ); 399 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) ); 467 size_t key_len, iv_len, cipher_len, clear_len; 485 key_len = unhexify( key, hex_key ); [all …]
|
D | test_suite_pkcs5.function | 12 char *hex_salt_string, int it_cnt, int key_len, 39 it_cnt, key_len, key ) == 0 ); 41 hexify( dst_str, key, key_len );
|
D | test_suite_md.function | 301 int key_len, src_len; 314 key_len = unhexify( key_str, hex_key_string ); 317 TEST_ASSERT ( mbedtls_md_hmac( md_info, key_str, key_len, src_str, src_len, output ) == 0 ); 333 int key_len, src_len, halfway; 350 key_len = unhexify( key_str, hex_key_string ); 354 TEST_ASSERT ( 0 == mbedtls_md_hmac_starts( &ctx, key_str, key_len ) );
|
D | test_suite_pk.function | 228 size_t hash_len, sig_len, key_len; 234 memset( key, 0, sizeof( key ) ); key_len = unhexify(key, key_str); 243 key, key_len ) == 0 );
|
/net-tools-latest/mbedtls-2.4.0/tests/scripts/ |
D | gen_gcm_encrypt.pl | 47 my $key_len = get_suite_val("Keylen"); 48 next if ($key_len !~ /\d+/); 64 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
D | gen_gcm_decrypt.pl | 64 my $key_len = get_suite_val("Keylen"); 65 next if ($key_len !~ /\d+/); 81 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/net-tools-latest/mbedtls-2.4.0/library/ |
D | gcm.c | 749 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 755 key_len, i, "enc" ); in mbedtls_gcm_self_test() 757 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 782 key_len, i, "dec" ); in mbedtls_gcm_self_test() 784 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 809 key_len, i, "enc" ); in mbedtls_gcm_self_test() 811 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 876 key_len, i, "dec" ); in mbedtls_gcm_self_test() 878 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
|
D | pkcs5.c | 329 static const uint32_t key_len[MAX_TESTS] = variable 379 slen[i], it_cnt[i], key_len[i], key ); in mbedtls_pkcs5_self_test() 381 memcmp( result_key[i], key, key_len[i] ) != 0 ) in mbedtls_pkcs5_self_test()
|
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/ |
D | cmac.h | 148 int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len,
|
/net-tools-latest/mbedtls-2.4.0/programs/ssl/ |
D | ssl_server2.c | 681 size_t key_len; member 728 if( unhexify( new->key, key_hex, &new->key_len ) != 0 ) in psk_parse() 756 return( mbedtls_ssl_set_hs_psk( ssl, cur->key, cur->key_len ) ); in psk_callback()
|