Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 20 of 20) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/library/
Dpkparse.c430 unsigned char *key, size_t keylen, const unsigned char *end, in pk_parse_key_rfc8410_der() argument
436 if ((ret = mbedtls_asn1_get_tag(&key, (key + keylen), &len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pk_parse_key_rfc8410_der()
605 const unsigned char *key, size_t keylen, in pk_parse_key_sec1_der() argument
614 unsigned char *end = p + keylen; in pk_parse_key_sec1_der()
744 const unsigned char *key, size_t keylen, in pk_parse_key_pkcs8_unencrypted_der() argument
751 unsigned char *end = p + keylen; in pk_parse_key_pkcs8_unencrypted_der()
847 if (end != (key + keylen)) { in pk_parse_key_pkcs8_unencrypted_der()
867 unsigned char *key, size_t keylen, in mbedtls_pk_parse_key_pkcs8_encrypted_der() argument
883 end = p + keylen; in mbedtls_pk_parse_key_pkcs8_encrypted_der()
974 const unsigned char *key, size_t keylen, in mbedtls_pk_parse_key() argument
[all …]
Dpem.c75 static int pem_pbkdf1(unsigned char *key, size_t keylen, in pem_pbkdf1() argument
109 if (keylen <= 16) { in pem_pbkdf1()
110 memcpy(key, md5sum, keylen); in pem_pbkdf1()
136 if (keylen < 32) { in pem_pbkdf1()
137 use_len = keylen - 16; in pem_pbkdf1()
215 static int pem_aes_decrypt(unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument
225 if ((ret = pem_pbkdf1(aes_key, keylen, aes_iv, pwd, pwdlen)) != 0) { in pem_aes_decrypt()
229 if ((ret = mbedtls_aes_setkey_dec(&aes_ctx, aes_key, keylen * 8)) != 0) { in pem_aes_decrypt()
237 mbedtls_platform_zeroize(aes_key, keylen); in pem_aes_decrypt()
Dpkcs5.c42 int *keylen, mbedtls_md_type_t *md_type) in pkcs5_parse_pbkdf2_params() argument
78 if ((ret = mbedtls_asn1_get_int(&p, end, keylen)) != 0) { in pkcs5_parse_pbkdf2_params()
135 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2_ext() local
172 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2_ext()
195 keylen = (int) mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in mbedtls_pkcs5_pbes2_ext()
220 salt.len, iterations, keylen, in mbedtls_pkcs5_pbes2_ext()
229 if ((ret = mbedtls_cipher_setkey(&cipher_ctx, key, 8 * keylen, in mbedtls_pkcs5_pbes2_ext()
Drsa_internal.h34 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen);
50 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen);
Dpkcs12.c78 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument
102 if ((ret = mbedtls_pkcs12_derivation(key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv()
157 int ret, keylen = 0; in mbedtls_pkcs12_pbe_ext() local
175 keylen = (int) mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in mbedtls_pkcs12_pbe_ext()
192 key, keylen, in mbedtls_pkcs12_pbe_ext()
203 if ((ret = mbedtls_cipher_setkey(&cipher_ctx, key, 8 * keylen, in mbedtls_pkcs12_pbe_ext()
Dmd.c969 int mbedtls_md_hmac_starts(mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen) in mbedtls_md_hmac_starts() argument
979 if (keylen > (size_t) ctx->md_info->block_size) { in mbedtls_md_hmac_starts()
983 if ((ret = mbedtls_md_update(ctx, key, keylen)) != 0) { in mbedtls_md_hmac_starts()
990 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts()
1000 mbedtls_xor(ipad, ipad, key, keylen); in mbedtls_md_hmac_starts()
1001 mbedtls_xor(opad, opad, key, keylen); in mbedtls_md_hmac_starts()
1073 const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument
1090 if ((ret = mbedtls_md_hmac_starts(&ctx, key, keylen)) != 0) { in mbedtls_md_hmac()
Dpk_internal.h198 unsigned char *key, size_t keylen,
Dcmac.c348 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument
365 ret = mbedtls_cipher_cmac_starts(&ctx, key, keylen); in mbedtls_cipher_cmac()
Drsa.c78 int mbedtls_rsa_parse_key(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen) in mbedtls_rsa_parse_key() argument
88 end = p + keylen; in mbedtls_rsa_parse_key()
226 int mbedtls_rsa_parse_pubkey(mbedtls_rsa_context *rsa, const unsigned char *key, size_t keylen) in mbedtls_rsa_parse_pubkey() argument
229 unsigned char *end = (unsigned char *) (key + keylen); in mbedtls_rsa_parse_pubkey()
Dssl_tls.c8809 size_t keylen; in ssl_tls12_populate_transform() local
8941 keylen = PSA_BITS_TO_BYTES(key_bits); in ssl_tls12_populate_transform()
8943 keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info) / 8; in ssl_tls12_populate_transform()
9053 (unsigned) keylen, in ssl_tls12_populate_transform()
9064 key2 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform()
9071 memcpy(transform->iv_enc, key2 + keylen, iv_copy_len); in ssl_tls12_populate_transform()
9072 memcpy(transform->iv_dec, key2 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
9078 key1 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform()
9086 memcpy(transform->iv_dec, key1 + keylen, iv_copy_len); in ssl_tls12_populate_transform()
9087 memcpy(transform->iv_enc, key1 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
/openthread-latest/third_party/mbedtls/repo/programs/aes/
Dcrypt_and_hash.c64 size_t keylen, ilen, olen; in main() local
179 keylen = fread(key, 1, sizeof(key), fkey); in main()
184 keylen = 0; in main()
187 keylen < (int) sizeof(key)) { in main()
188 key[keylen++] = (unsigned char) n; in main()
192 keylen = strlen(argv[6]); in main()
194 if (keylen > (int) sizeof(key)) { in main()
195 keylen = (int) sizeof(key); in main()
198 memcpy(key, argv[6], keylen); in main()
293 if (mbedtls_md_update(&md_ctx, key, keylen) != 0) { in main()
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_md.data527 HMAC-SHA3-224: NIST example #1: keylen<blocklen
531 HMAC-SHA3-224: NIST example #2: keylen=blocklen
535 HMAC-SHA3-224: NIST example #3: keylen>blocklen
539 HMAC-SHA3-224: NIST example #4: keylen<blocklen, with truncated tag
543 HMAC-SHA3-256: NIST example #1: keylen<blocklen
547 HMAC-SHA3-256: NIST example #2: keylen=blocklen
551 HMAC-SHA3-256: NIST example #3: keylen>blocklen
555 HMAC-SHA3-256: NIST example #4: keylen<blocklen, with truncated tag
559 HMAC-SHA3-384: NIST example #1: keylen<blocklen
563 HMAC-SHA3-384: NIST example #2: keylen=blocklen
[all …]
Dtest_suite_pkcs5.data209 PBES2 Decrypt (OK, PBKDF2 params explicit keylen)
213 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
Dtest_suite_cipher.function1223 size_t keylen = 0;
1233 keylen = mbedtls_cipher_info_get_key_bitlen(cipher_info);
1234 TEST_CALLOC(key, keylen/8);
1235 memset(key, 0, keylen/8);
1239 TEST_EQUAL(0, mbedtls_cipher_setkey(&ctx, key, keylen,
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dmd.h431 size_t keylen);
518 int mbedtls_md_hmac(const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
Dcmac.h198 const unsigned char *key, size_t keylen,
Dpk.h1102 const unsigned char *key, size_t keylen,
1136 const unsigned char *key, size_t keylen);
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/
Dssl_helpers.c1271 size_t keylen, maclen, ivlen = 0; in mbedtls_test_ssl_build_transforms() local
1292 keylen = key_bits / 8; in mbedtls_test_ssl_build_transforms()
1296 CHK((key0 = mbedtls_calloc(1, keylen + 1)) != NULL); in mbedtls_test_ssl_build_transforms()
1297 CHK((key1 = mbedtls_calloc(1, keylen + 1)) != NULL); in mbedtls_test_ssl_build_transforms()
1298 memset(key0, 0x1, keylen); in mbedtls_test_ssl_build_transforms()
1299 memset(key1, 0x2, keylen); in mbedtls_test_ssl_build_transforms()
1328 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms()
1332 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms()
1336 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms()
1340 (keylen << 3 > INT_MAX) ? INT_MAX : (int) keylen << 3, in mbedtls_test_ssl_build_transforms()
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f).
256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is
287 all using saltlen = keylen - hashlen - 2.
313 all using saltlen = keylen - hashlen - 2.
/openthread-latest/third_party/tcplp/bsdtcp/
Dtcp_fastopen.c298 SYSCTL_INT(_net_inet_tcp_fastopen, OID_AUTO, keylen,