/net-tools-latest/tinydtls-0.8.2/ |
D | crypto.c | 184 const unsigned char *key, size_t keylen, in dtls_p_hash() argument 196 hmac_a = dtls_hmac_new(key, keylen); in dtls_p_hash() 207 hmac_p = dtls_hmac_new(key, keylen); in dtls_p_hash() 214 dtls_hmac_init(hmac_p, key, keylen); in dtls_p_hash() 226 dtls_hmac_init(hmac_a, key, keylen); in dtls_p_hash() 231 dtls_hmac_init(hmac_p, key, keylen); in dtls_p_hash() 249 dtls_prf(const unsigned char *key, size_t keylen, in dtls_prf() argument 258 key, keylen, in dtls_prf() 318 dtls_psk_pre_master_secret(unsigned char *key, size_t keylen, in dtls_psk_pre_master_secret() argument 322 if (result_len < (2 * (sizeof(uint16) + keylen))) { in dtls_psk_pre_master_secret() [all …]
|
D | uthash.h | 82 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 87 HASH_FCN(keyptr,keylen, (head)->hh.tbl->num_buckets, _hf_hashv, _hf_bkt); \ 90 keyptr,keylen,out); \ 155 (add)->hh.keylen = keylen_in; \ 326 #define HASH_BER(key,keylen,num_bkts,hashv,bkt) \ argument 328 unsigned _hb_keylen=keylen; \ 338 #define HASH_SAX(key,keylen,num_bkts,hashv,bkt) \ argument 343 for(_sx_i=0; _sx_i < keylen; _sx_i++) \ 348 #define HASH_FNV(key,keylen,num_bkts,hashv,bkt) \ argument 353 for(_fn_i=0; _fn_i < keylen; _fn_i++) \ [all …]
|
D | crypto.h | 206 const unsigned char *key, size_t keylen, 217 size_t dtls_prf(const unsigned char *key, size_t keylen, 267 unsigned char *key, size_t keylen, 291 unsigned char *key, size_t keylen, 306 int dtls_psk_pre_master_secret(unsigned char *key, size_t keylen,
|
D | configure | 5053 keylen = length(key) 5056 line = substr(line, 1, len) "" value "" substr(line, len + keylen + 3) 5060 len += 1 + keylen
|
/net-tools-latest/mbedtls-2.4.0/programs/aes/ |
D | aescrypt2.c | 78 size_t keylen; in main() local 160 keylen = fread( key, 1, sizeof( key ), fkey ); in main() 168 keylen = 0; in main() 171 keylen < (int) sizeof( key ) ) in main() 173 key[keylen++] = (unsigned char) n; in main() 179 keylen = strlen( argv[4] ); in main() 181 if( keylen > (int) sizeof( key ) ) in main() 182 keylen = (int) sizeof( key ); in main() 184 memcpy( key, argv[4], keylen ); in main() 271 mbedtls_md_update( &sha_ctx, key, keylen ); in main() [all …]
|
D | crypt_and_hash.c | 78 size_t keylen, ilen, olen; in main() local 199 keylen = fread( key, 1, sizeof( key ), fkey ); in main() 207 keylen = 0; in main() 210 keylen < (int) sizeof( key ) ) in main() 212 key[keylen++] = (unsigned char) n; in main() 218 keylen = strlen( argv[6] ); in main() 220 if( keylen > (int) sizeof( key ) ) in main() 221 keylen = (int) sizeof( key ); in main() 223 memcpy( key, argv[6], keylen ); in main() 301 mbedtls_md_update( &md_ctx, key, keylen ); in main() [all …]
|
/net-tools-latest/mbedtls-2.4.0/library/ |
D | pkparse.c | 644 size_t keylen ) in pk_parse_key_pkcs1_der() argument 651 end = p + keylen; in pk_parse_key_pkcs1_der() 725 size_t keylen ) in pk_parse_key_sec1_der() argument 732 unsigned char *end = p + keylen; in pk_parse_key_sec1_der() 851 size_t keylen ) in pk_parse_key_pkcs8_unencrypted_der() argument 857 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der() 939 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_encrypted_der() argument 955 end = p + keylen; in pk_parse_key_pkcs8_encrypted_der() 1060 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument 1074 if( keylen == 0 || key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() [all …]
|
D | pem.c | 85 static void pem_pbkdf1( unsigned char *key, size_t keylen, in pem_pbkdf1() argument 103 if( keylen <= 16 ) in pem_pbkdf1() 105 memcpy( key, md5sum, keylen ); in pem_pbkdf1() 124 if( keylen < 32 ) in pem_pbkdf1() 125 use_len = keylen - 16; in pem_pbkdf1() 183 static void pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument 192 pem_pbkdf1( aes_key, keylen, aes_iv, pwd, pwdlen ); in pem_aes_decrypt() 194 mbedtls_aes_setkey_dec( &aes_ctx, aes_key, keylen * 8 ); in pem_aes_decrypt() 199 mbedtls_zeroize( aes_key, keylen ); in pem_aes_decrypt()
|
D | pkcs5.c | 56 int *keylen, mbedtls_md_type_t *md_type ) in pkcs5_parse_pbkdf2_params() argument 87 if( ( ret = mbedtls_asn1_get_int( &p, end, keylen ) ) != 0 ) in pkcs5_parse_pbkdf2_params() 116 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2() local 151 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 178 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs5_pbes2() 195 iterations, keylen, key ) ) != 0 ) in mbedtls_pkcs5_pbes2() 203 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs5_pbes2()
|
D | pkcs12.c | 93 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument 114 if( ( ret = mbedtls_pkcs12_derivation( key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv() 182 int ret, keylen = 0; in mbedtls_pkcs12_pbe() local 193 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs12_pbe() 196 key, keylen, in mbedtls_pkcs12_pbe() 207 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs12_pbe()
|
D | md.c | 330 int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ) in mbedtls_md_hmac_starts() argument 339 if( keylen > (size_t) ctx->md_info->block_size ) in mbedtls_md_hmac_starts() 342 ctx->md_info->update_func( ctx->md_ctx, key, keylen ); in mbedtls_md_hmac_starts() 345 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts() 355 for( i = 0; i < keylen; i++ ) in mbedtls_md_hmac_starts() 413 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument 428 mbedtls_md_hmac_starts( &ctx, key, keylen ); in mbedtls_md_hmac()
|
D | arc4.c | 72 unsigned int keylen ) in mbedtls_arc4_setup() argument 89 if( k >= keylen ) k = 0; in mbedtls_arc4_setup()
|
D | cmac.c | 390 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument 405 ret = mbedtls_cipher_cmac_starts( &ctx, key, keylen ); in mbedtls_cipher_cmac()
|
D | ssl_tls.c | 203 size_t keylen, 678 transform->keylen = cipher_info->key_bitlen / 8; in mbedtls_ssl_derive_keys() 766 transform->keylen, transform->minlen, transform->ivlen, in mbedtls_ssl_derive_keys() 776 key2 = keyblk + transform->maclen * 2 + transform->keylen; in mbedtls_ssl_derive_keys() 786 memcpy( transform->iv_enc, key2 + transform->keylen, iv_copy_len ); in mbedtls_ssl_derive_keys() 787 memcpy( transform->iv_dec, key2 + transform->keylen + iv_copy_len, in mbedtls_ssl_derive_keys() 795 key1 = keyblk + transform->maclen * 2 + transform->keylen; in mbedtls_ssl_derive_keys() 806 memcpy( transform->iv_dec, key1 + transform->keylen, iv_copy_len ); in mbedtls_ssl_derive_keys() 807 memcpy( transform->iv_enc, key1 + transform->keylen + iv_copy_len, in mbedtls_ssl_derive_keys() 852 if( ( ret = mbedtls_ssl_hw_record_init( ssl, key1, key2, transform->keylen, in mbedtls_ssl_derive_keys() [all …]
|
/net-tools-latest/libcoap/include/coap/ |
D | uthash.h | 103 #define HASH_FIND(hh,head,keyptr,keylen,out) \ argument 108 HASH_FCN(keyptr,keylen, (head)->hh.tbl->num_buckets, _hf_hashv, _hf_bkt); \ 111 keyptr,keylen,out); \ 187 (add)->hh.keylen = (unsigned)(keylen_in); \ 364 #define HASH_BER(key,keylen,num_bkts,hashv,bkt) \ argument 366 unsigned _hb_keylen=keylen; \ 376 #define HASH_SAX(key,keylen,num_bkts,hashv,bkt) \ argument 381 for(_sx_i=0; _sx_i < keylen; _sx_i++) \ 386 #define HASH_FNV(key,keylen,num_bkts,hashv,bkt) \ argument 391 for(_fn_i=0; _fn_i < keylen; _fn_i++) { \ [all …]
|
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/ |
D | md.h | 286 size_t keylen ); 343 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
|
D | arc4.h | 75 unsigned int keylen );
|
D | cmac.h | 131 const unsigned char *key, size_t keylen,
|
D | pk.h | 451 const unsigned char *key, size_t keylen, 472 const unsigned char *key, size_t keylen );
|
D | ssl.h | 908 size_t keylen, 1215 size_t keylen,
|
D | ssl_internal.h | 277 unsigned int keylen; /*!< symmetric key length (bytes) */ member
|
/net-tools-latest/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs5.data | 65 PBES2 Decrypt (OK, PBKDF2 params explicit keylen) 69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
|