/openthread-latest/third_party/mbedtls/repo/library/ |
D | pkparse.c | 430 unsigned char *key, size_t keylen, const unsigned char *end, in pk_parse_key_rfc8410_der() argument 436 if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pk_parse_key_rfc8410_der() 605 const unsigned char *key, size_t keylen, in pk_parse_key_sec1_der() argument 614 unsigned char *end = p + keylen; in pk_parse_key_sec1_der() 744 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_unencrypted_der() argument 751 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der() 847 if (end != (key + keylen)) { in pk_parse_key_pkcs8_unencrypted_der() 867 unsigned char *key, size_t keylen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument 883 end = p + keylen; in mbedtls_pk_parse_key_pkcs8_encrypted_der() 974 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument [all …]
|
D | pem.c | 75 static int pem_pbkdf1(unsigned char *key, size_t keylen, in pem_pbkdf1() argument 109 if (keylen <= 16) { in pem_pbkdf1() 110 memcpy(key, md5sum, keylen); in pem_pbkdf1() 136 if (keylen < 32) { in pem_pbkdf1() 137 use_len = keylen - 16; in pem_pbkdf1() 215 static int pem_aes_decrypt(unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument 225 if ((ret = pem_pbkdf1(aes_key, keylen, aes_iv, pwd, pwdlen)) != 0) { in pem_aes_decrypt() 229 if ((ret = mbedtls_aes_setkey_dec(&aes_ctx, aes_key, keylen * 8)) != 0) { in pem_aes_decrypt() 237 mbedtls_platform_zeroize(aes_key, keylen); in pem_aes_decrypt()
|
D | pkcs5.c | 42 int *keylen, mbedtls_md_type_t *md_type) in pkcs5_parse_pbkdf2_params() argument 78 if ((ret = mbedtls_asn1_get_int(&p, end, keylen)) != 0) { in pkcs5_parse_pbkdf2_params() 135 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2_ext() local 172 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2_ext() 195 keylen = (int) mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in mbedtls_pkcs5_pbes2_ext() 220 salt.len, iterations, keylen, in mbedtls_pkcs5_pbes2_ext() 229 if ((ret = mbedtls_cipher_setkey(&cipher_ctx, key, 8 * keylen, in mbedtls_pkcs5_pbes2_ext()
|
D | rsa_internal.h | 34 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen); 50 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen);
|
D | pkcs12.c | 78 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument 102 if ((ret = mbedtls_pkcs12_derivation(key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv() 157 int ret, keylen = 0; in mbedtls_pkcs12_pbe_ext() local 175 keylen = (int) mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in mbedtls_pkcs12_pbe_ext() 192 key, keylen, in mbedtls_pkcs12_pbe_ext() 203 if ((ret = mbedtls_cipher_setkey(&cipher_ctx, key, 8 * keylen, in mbedtls_pkcs12_pbe_ext()
|
D | md.c | 969 int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen) in mbedtls_md_hmac_starts() argument 979 if (keylen > (size_t) ctx->md_info->block_size) { in mbedtls_md_hmac_starts() 983 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) { in mbedtls_md_hmac_starts() 990 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts() 1000 mbedtls_xor(ipad, ipad, key, keylen); in mbedtls_md_hmac_starts() 1001 mbedtls_xor(opad, opad, key, keylen); in mbedtls_md_hmac_starts() 1073 const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument 1090 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) { in mbedtls_md_hmac()
|
D | pk_internal.h | 198 unsigned char *key, size_t keylen,
|
D | cmac.c | 348 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument 365 ret = mbedtls_cipher_cmac_starts(&ctx, key, keylen); in mbedtls_cipher_cmac()
|
D | rsa.c | 78 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen) in mbedtls_rsa_parse_key() argument 88 end = p + keylen; in mbedtls_rsa_parse_key() 226 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen) in mbedtls_rsa_parse_pubkey() argument 229 unsigned char *end = (unsigned char *) (key + keylen); in mbedtls_rsa_parse_pubkey()
|
D | ssl_tls.c | 8809 size_t keylen; in ssl_tls12_populate_transform() local 8941 keylen = PSA_BITS_TO_BYTES(key_bits); in ssl_tls12_populate_transform() 8943 keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in ssl_tls12_populate_transform() 9053 (unsigned) keylen, in ssl_tls12_populate_transform() 9064 key2 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform() 9071 memcpy(transform->iv_enc, key2 + keylen, iv_copy_len); in ssl_tls12_populate_transform() 9072 memcpy(transform->iv_dec, key2 + keylen + iv_copy_len, in ssl_tls12_populate_transform() 9078 key1 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform() 9086 memcpy(transform->iv_dec, key1 + keylen, iv_copy_len); in ssl_tls12_populate_transform() 9087 memcpy(transform->iv_enc, key1 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
|
/openthread-latest/third_party/mbedtls/repo/programs/aes/ |
D | crypt_and_hash.c | 64 size_t keylen, ilen, olen; in main() local 179 keylen = fread(key, 1, sizeof(key), fkey); in main() 184 keylen = 0; in main() 187 keylen < (int) sizeof(key)) { in main() 188 key[keylen++] = (unsigned char) n; in main() 192 keylen = strlen(argv[6]); in main() 194 if (keylen > (int) sizeof(key)) { in main() 195 keylen = (int) sizeof(key); in main() 198 memcpy(key, argv[6], keylen); in main() 293 if (mbedtls_md_update(&md_ctx, key, keylen) != 0) { in main() [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_md.data | 527 HMAC-SHA3-224: NIST example #1: keylen<blocklen 531 HMAC-SHA3-224: NIST example #2: keylen=blocklen 535 HMAC-SHA3-224: NIST example #3: keylen>blocklen 539 HMAC-SHA3-224: NIST example #4: keylen<blocklen, with truncated tag 543 HMAC-SHA3-256: NIST example #1: keylen<blocklen 547 HMAC-SHA3-256: NIST example #2: keylen=blocklen 551 HMAC-SHA3-256: NIST example #3: keylen>blocklen 555 HMAC-SHA3-256: NIST example #4: keylen<blocklen, with truncated tag 559 HMAC-SHA3-384: NIST example #1: keylen<blocklen 563 HMAC-SHA3-384: NIST example #2: keylen=blocklen [all …]
|
D | test_suite_pkcs5.data | 209 PBES2 Decrypt (OK, PBKDF2 params explicit keylen) 213 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
|
D | test_suite_cipher.function | 1223 size_t keylen = 0; 1233 keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info); 1234 TEST_CALLOC(key, keylen/8); 1235 memset(key, 0, keylen/8); 1239 TEST_EQUAL(0, mbedtls_cipher_setkey(&ctx, key, keylen,
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | md.h | 431 size_t keylen); 518 int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
|
D | cmac.h | 198 const unsigned char *key, size_t keylen,
|
D | pk.h | 1102 const unsigned char *key, size_t keylen, 1136 const unsigned char *key, size_t keylen);
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 1271 size_t keylen, maclen, ivlen = 0; in mbedtls_test_ssl_build_transforms() local 1292 keylen = key_bits / 8; in mbedtls_test_ssl_build_transforms() 1296 CHK((key0 = mbedtls_calloc(1, keylen + 1)) != NULL); in mbedtls_test_ssl_build_transforms() 1297 CHK((key1 = mbedtls_calloc(1, keylen + 1)) != NULL); in mbedtls_test_ssl_build_transforms() 1298 memset(key0, 0x1, keylen); in mbedtls_test_ssl_build_transforms() 1299 memset(key1, 0x2, keylen); in mbedtls_test_ssl_build_transforms() 1328 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms() 1332 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms() 1336 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms() 1340 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms()
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f). 256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is 287 all using saltlen = keylen - hashlen - 2. 313 all using saltlen = keylen - hashlen - 2.
|
/openthread-latest/third_party/tcplp/bsdtcp/ |
D | tcp_fastopen.c | 298 SYSCTL_INT(_net_inet_tcp_fastopen, OID_AUTO, keylen,
|