/mbedtls-development/tests/scripts/ |
A D | gen_gcm_encrypt.pl | 62 my $key_len = get_suite_val("Keylen"); 63 next if ($key_len !~ /\d+/); 79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
A D | gen_gcm_decrypt.pl | 79 my $key_len = get_suite_val("Keylen"); 80 next if ($key_len !~ /\d+/); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/mbedtls-development/tests/suites/ |
A D | test_suite_aes.function | 120 size_t key_len, src_len, dst_len, data_unit_len; 128 key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len ); 129 TEST_ASSERT( key_len % 2 == 0 ); 137 TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == 0 ); 164 size_t key_len, src_len, dst_len, data_unit_len; 172 key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len ); 173 TEST_ASSERT( key_len % 2 == 0 ); 181 TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == 0 ); 220 size_t key_len = size; 224 TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == retval ); [all …]
|
A D | test_suite_pkcs5.function | 12 int it_cnt, int key_len, data_t * result_key_string ) 25 it_cnt, key_len, key ) == 0 ); 28 key_len, result_key_string->len ) == 0 );
|
A D | test_suite_cipher.function | 343 void enc_dec_buf( int cipher_id, char * cipher_string, int key_len, 378 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) ); 379 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) ); 476 void enc_fail( int cipher_id, int pad_mode, int key_len, int length_val, 505 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) ); 597 void enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val, 638 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) ); 639 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
|
A D | test_suite_ssl.function | 3739 keys.key_len, 3743 keys.key_len, 3987 keys.key_len = server_write_key->len;
|
/mbedtls-development/library/ |
A D | nist_kw.c | 522 static const unsigned int key_len[KW_TESTS] = { 16, 24, 32 }; variable 616 mbedtls_printf( " KW-AES-%u ", (unsigned int) key_len[i] * 8 ); in mbedtls_nist_kw_self_test() 619 kw_key[i], key_len[i] * 8, 1 ); in mbedtls_nist_kw_self_test() 641 kw_key[i], key_len[i] * 8, 0 ) ) in mbedtls_nist_kw_self_test() 671 mbedtls_printf( " KWP-AES-%u ", (unsigned int) key_len[i] * 8 ); in mbedtls_nist_kw_self_test() 674 key_len[i] * 8, 1 ); in mbedtls_nist_kw_self_test() 696 kwp_key[i], key_len[i] * 8, 0 ) ) in mbedtls_nist_kw_self_test()
|
A D | gcm.c | 896 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local 904 key_len, i, "enc" ); in mbedtls_gcm_self_test() 908 key_len ); in mbedtls_gcm_self_test() 914 if( ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192 ) in mbedtls_gcm_self_test() 961 key_len, i, "dec" ); in mbedtls_gcm_self_test() 965 key_len ); in mbedtls_gcm_self_test() 997 key_len, i, "enc" ); in mbedtls_gcm_self_test() 1001 key_len ); in mbedtls_gcm_self_test() 1071 key_len, i, "dec" ); in mbedtls_gcm_self_test() 1075 key_len ); in mbedtls_gcm_self_test()
|
A D | ssl_tls13_keys.c | 203 size_t slen, size_t key_len, size_t iv_len, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 212 keys->client_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 220 keys->server_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 240 keys->key_len = key_len; in mbedtls_ssl_tls1_3_make_traffic_keys() 1024 traffic_keys->key_len); in mbedtls_ssl_tls13_generate_handshake_keys() 1028 traffic_keys->key_len); in mbedtls_ssl_tls13_generate_handshake_keys()
|
A D | pk_wrap.c | 566 int key_len; in ecdsa_verify_wrap() local 586 key_len = mbedtls_pk_write_pubkey( &p, buf, &key ); in ecdsa_verify_wrap() 587 if( key_len <= 0 ) in ecdsa_verify_wrap() 595 buf + sizeof( buf ) - key_len, key_len, in ecdsa_verify_wrap()
|
A D | ssl_tls13_keys.h | 154 size_t slen, size_t key_len, size_t iv_len,
|
A D | ssl_misc.h | 503 size_t key_len; /*!< The length of client_write_key and member
|
/mbedtls-development/include/mbedtls/ |
A D | cmac.h | 197 int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len,
|
/mbedtls-development/docs/ |
A D | getting_started.md | 75 void import_a_key(const uint8_t *key, size_t key_len) 98 status = psa_import_key(&attributes, key, key_len, &key); 128 void sign_a_message_using_rsa(const uint8_t *key, size_t key_len) 157 status = psa_import_key(&attributes, key, key_len, &key); 203 void encrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len) 235 status = psa_import_key(&attributes, key, key_len, &key); 288 void decrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len) 319 status = psa_import_key(&attributes, key, key_len, &key);
|
/mbedtls-development/programs/ssl/ |
A D | ssl_server2.c | 845 size_t key_len; member 910 key_hex, &new->key_len ) != 0 ) in psk_parse() 943 return( mbedtls_ssl_set_hs_psk( ssl, cur->key, cur->key_len ) ); in psk_callback() 2965 cur_psk->key_len ); in main()
|