Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 22 of 22) sorted by relevance

/net-tools-latest/tinydtls-0.8.2/
Dcrypto.c184 const unsigned char *key, size_t keylen, in dtls_p_hash() argument
196 hmac_a = dtls_hmac_new(key, keylen); in dtls_p_hash()
207 hmac_p = dtls_hmac_new(key, keylen); in dtls_p_hash()
214 dtls_hmac_init(hmac_p, key, keylen); in dtls_p_hash()
226 dtls_hmac_init(hmac_a, key, keylen); in dtls_p_hash()
231 dtls_hmac_init(hmac_p, key, keylen); in dtls_p_hash()
249 dtls_prf(const unsigned char *key, size_t keylen, in dtls_prf() argument
258 key, keylen, in dtls_prf()
318 dtls_psk_pre_master_secret(unsigned char *key, size_t keylen, in dtls_psk_pre_master_secret() argument
322 if (result_len < (2 * (sizeof(uint16) + keylen))) { in dtls_psk_pre_master_secret()
[all …]
Duthash.h82 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument
87 HASH_FCN(keyptr,keylen, (head)->hh.tbl->num_buckets, _hf_hashv, _hf_bkt); \
90 keyptr,keylen,out); \
155 (add)->hh.keylen = keylen_in; \
326 #define HASH_BER(key,keylen,num_bkts,hashv,bkt) \ argument
328 unsigned _hb_keylen=keylen; \
338 #define HASH_SAX(key,keylen,num_bkts,hashv,bkt) \ argument
343 for(_sx_i=0; _sx_i < keylen; _sx_i++) \
348 #define HASH_FNV(key,keylen,num_bkts,hashv,bkt) \ argument
353 for(_fn_i=0; _fn_i < keylen; _fn_i++) \
[all …]
Dcrypto.h206 const unsigned char *key, size_t keylen,
217 size_t dtls_prf(const unsigned char *key, size_t keylen,
267 unsigned char *key, size_t keylen,
291 unsigned char *key, size_t keylen,
306 int dtls_psk_pre_master_secret(unsigned char *key, size_t keylen,
Dconfigure5053 keylen = length(key)
5056 line = substr(line, 1, len) "" value "" substr(line, len + keylen + 3)
5060 len += 1 + keylen
/net-tools-latest/mbedtls-2.4.0/programs/aes/
Daescrypt2.c78 size_t keylen; in main() local
160 keylen = fread( key, 1, sizeof( key ), fkey ); in main()
168 keylen = 0; in main()
171 keylen < (int) sizeof( key ) ) in main()
173 key[keylen++] = (unsigned char) n; in main()
179 keylen = strlen( argv[4] ); in main()
181 if( keylen > (int) sizeof( key ) ) in main()
182 keylen = (int) sizeof( key ); in main()
184 memcpy( key, argv[4], keylen ); in main()
271 mbedtls_md_update( &sha_ctx, key, keylen ); in main()
[all …]
Dcrypt_and_hash.c78 size_t keylen, ilen, olen; in main() local
199 keylen = fread( key, 1, sizeof( key ), fkey ); in main()
207 keylen = 0; in main()
210 keylen < (int) sizeof( key ) ) in main()
212 key[keylen++] = (unsigned char) n; in main()
218 keylen = strlen( argv[6] ); in main()
220 if( keylen > (int) sizeof( key ) ) in main()
221 keylen = (int) sizeof( key ); in main()
223 memcpy( key, argv[6], keylen ); in main()
301 mbedtls_md_update( &md_ctx, key, keylen ); in main()
[all …]
/net-tools-latest/mbedtls-2.4.0/library/
Dpkparse.c644 size_t keylen ) in pk_parse_key_pkcs1_der() argument
651 end = p + keylen; in pk_parse_key_pkcs1_der()
725 size_t keylen ) in pk_parse_key_sec1_der() argument
732 unsigned char *end = p + keylen; in pk_parse_key_sec1_der()
851 size_t keylen ) in pk_parse_key_pkcs8_unencrypted_der() argument
857 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der()
939 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_encrypted_der() argument
955 end = p + keylen; in pk_parse_key_pkcs8_encrypted_der()
1060 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument
1074 if( keylen == 0 || key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key()
[all …]
Dpem.c85 static void pem_pbkdf1( unsigned char *key, size_t keylen, in pem_pbkdf1() argument
103 if( keylen <= 16 ) in pem_pbkdf1()
105 memcpy( key, md5sum, keylen ); in pem_pbkdf1()
124 if( keylen < 32 ) in pem_pbkdf1()
125 use_len = keylen - 16; in pem_pbkdf1()
183 static void pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument
192 pem_pbkdf1( aes_key, keylen, aes_iv, pwd, pwdlen ); in pem_aes_decrypt()
194 mbedtls_aes_setkey_dec( &aes_ctx, aes_key, keylen * 8 ); in pem_aes_decrypt()
199 mbedtls_zeroize( aes_key, keylen ); in pem_aes_decrypt()
Dpkcs5.c56 int *keylen, mbedtls_md_type_t *md_type ) in pkcs5_parse_pbkdf2_params() argument
87 if( ( ret = mbedtls_asn1_get_int( &p, end, keylen ) ) != 0 ) in pkcs5_parse_pbkdf2_params()
116 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2() local
151 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2()
178 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs5_pbes2()
195 iterations, keylen, key ) ) != 0 ) in mbedtls_pkcs5_pbes2()
203 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs5_pbes2()
Dpkcs12.c93 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument
114 if( ( ret = mbedtls_pkcs12_derivation( key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv()
182 int ret, keylen = 0; in mbedtls_pkcs12_pbe() local
193 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs12_pbe()
196 key, keylen, in mbedtls_pkcs12_pbe()
207 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs12_pbe()
Dmd.c330 int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ) in mbedtls_md_hmac_starts() argument
339 if( keylen > (size_t) ctx->md_info->block_size ) in mbedtls_md_hmac_starts()
342 ctx->md_info->update_func( ctx->md_ctx, key, keylen ); in mbedtls_md_hmac_starts()
345 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts()
355 for( i = 0; i < keylen; i++ ) in mbedtls_md_hmac_starts()
413 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument
428 mbedtls_md_hmac_starts( &ctx, key, keylen ); in mbedtls_md_hmac()
Darc4.c72 unsigned int keylen ) in mbedtls_arc4_setup() argument
89 if( k >= keylen ) k = 0; in mbedtls_arc4_setup()
Dcmac.c390 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument
405 ret = mbedtls_cipher_cmac_starts( &ctx, key, keylen ); in mbedtls_cipher_cmac()
Dssl_tls.c203 size_t keylen,
678 transform->keylen = cipher_info->key_bitlen / 8; in mbedtls_ssl_derive_keys()
766 transform->keylen, transform->minlen, transform->ivlen, in mbedtls_ssl_derive_keys()
776 key2 = keyblk + transform->maclen * 2 + transform->keylen; in mbedtls_ssl_derive_keys()
786 memcpy( transform->iv_enc, key2 + transform->keylen, iv_copy_len ); in mbedtls_ssl_derive_keys()
787 memcpy( transform->iv_dec, key2 + transform->keylen + iv_copy_len, in mbedtls_ssl_derive_keys()
795 key1 = keyblk + transform->maclen * 2 + transform->keylen; in mbedtls_ssl_derive_keys()
806 memcpy( transform->iv_dec, key1 + transform->keylen, iv_copy_len ); in mbedtls_ssl_derive_keys()
807 memcpy( transform->iv_enc, key1 + transform->keylen + iv_copy_len, in mbedtls_ssl_derive_keys()
852 if( ( ret = mbedtls_ssl_hw_record_init( ssl, key1, key2, transform->keylen, in mbedtls_ssl_derive_keys()
[all …]
/net-tools-latest/libcoap/include/coap/
Duthash.h103 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument
108 HASH_FCN(keyptr,keylen, (head)->hh.tbl->num_buckets, _hf_hashv, _hf_bkt); \
111 keyptr,keylen,out); \
187 (add)->hh.keylen = (unsigned)(keylen_in); \
364 #define HASH_BER(key,keylen,num_bkts,hashv,bkt) \ argument
366 unsigned _hb_keylen=keylen; \
376 #define HASH_SAX(key,keylen,num_bkts,hashv,bkt) \ argument
381 for(_sx_i=0; _sx_i < keylen; _sx_i++) \
386 #define HASH_FNV(key,keylen,num_bkts,hashv,bkt) \ argument
391 for(_fn_i=0; _fn_i < keylen; _fn_i++) { \
[all …]
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/
Dmd.h286 size_t keylen );
343 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
Darc4.h75 unsigned int keylen );
Dcmac.h131 const unsigned char *key, size_t keylen,
Dpk.h451 const unsigned char *key, size_t keylen,
472 const unsigned char *key, size_t keylen );
Dssl.h908 size_t keylen,
1215 size_t keylen,
Dssl_internal.h277 unsigned int keylen; /*!< symmetric key length (bytes) */ member
/net-tools-latest/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs5.data65 PBES2 Decrypt (OK, PBKDF2 params explicit keylen)
69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)