Home
last modified time | relevance | path

Searched refs:key_len (Results 1 – 15 of 15) sorted by relevance

/mbedtls-development/tests/scripts/
A Dgen_gcm_encrypt.pl62 my $key_len = get_suite_val("Keylen");
63 next if ($key_len !~ /\d+/);
79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
A Dgen_gcm_decrypt.pl79 my $key_len = get_suite_val("Keylen");
80 next if ($key_len !~ /\d+/);
96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
/mbedtls-development/tests/suites/
A Dtest_suite_aes.function120 size_t key_len, src_len, dst_len, data_unit_len;
128 key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
129 TEST_ASSERT( key_len % 2 == 0 );
137 TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == 0 );
164 size_t key_len, src_len, dst_len, data_unit_len;
172 key = mbedtls_test_unhexify_alloc( hex_key_string, &key_len );
173 TEST_ASSERT( key_len % 2 == 0 );
181 TEST_ASSERT( mbedtls_aes_xts_setkey_dec( &ctx, key, key_len * 8 ) == 0 );
220 size_t key_len = size;
224 TEST_ASSERT( mbedtls_aes_xts_setkey_enc( &ctx, key, key_len * 8 ) == retval );
[all …]
A Dtest_suite_pkcs5.function12 int it_cnt, int key_len, data_t * result_key_string )
25 it_cnt, key_len, key ) == 0 );
28 key_len, result_key_string->len ) == 0 );
A Dtest_suite_cipher.function343 void enc_dec_buf( int cipher_id, char * cipher_string, int key_len,
378 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
379 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
476 void enc_fail( int cipher_id, int pad_mode, int key_len, int length_val,
505 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx, key, key_len, MBEDTLS_ENCRYPT ) );
597 void enc_dec_buf_multipart( int cipher_id, int key_len, int first_length_val,
638 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_dec, key, key_len, MBEDTLS_DECRYPT ) );
639 TEST_ASSERT( 0 == mbedtls_cipher_setkey( &ctx_enc, key, key_len, MBEDTLS_ENCRYPT ) );
A Dtest_suite_ssl.function3739 keys.key_len,
3743 keys.key_len,
3987 keys.key_len = server_write_key->len;
/mbedtls-development/library/
A Dnist_kw.c522 static const unsigned int key_len[KW_TESTS] = { 16, 24, 32 }; variable
616 mbedtls_printf( " KW-AES-%u ", (unsigned int) key_len[i] * 8 ); in mbedtls_nist_kw_self_test()
619 kw_key[i], key_len[i] * 8, 1 ); in mbedtls_nist_kw_self_test()
641 kw_key[i], key_len[i] * 8, 0 ) ) in mbedtls_nist_kw_self_test()
671 mbedtls_printf( " KWP-AES-%u ", (unsigned int) key_len[i] * 8 ); in mbedtls_nist_kw_self_test()
674 key_len[i] * 8, 1 ); in mbedtls_nist_kw_self_test()
696 kwp_key[i], key_len[i] * 8, 0 ) ) in mbedtls_nist_kw_self_test()
A Dgcm.c896 int key_len = 128 + 64 * j; in mbedtls_gcm_self_test() local
904 key_len, i, "enc" ); in mbedtls_gcm_self_test()
908 key_len ); in mbedtls_gcm_self_test()
914 if( ret == MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED && key_len == 192 ) in mbedtls_gcm_self_test()
961 key_len, i, "dec" ); in mbedtls_gcm_self_test()
965 key_len ); in mbedtls_gcm_self_test()
997 key_len, i, "enc" ); in mbedtls_gcm_self_test()
1001 key_len ); in mbedtls_gcm_self_test()
1071 key_len, i, "dec" ); in mbedtls_gcm_self_test()
1075 key_len ); in mbedtls_gcm_self_test()
A Dssl_tls13_keys.c203 size_t slen, size_t key_len, size_t iv_len, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
212 keys->client_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys()
220 keys->server_write_key, key_len ); in mbedtls_ssl_tls1_3_make_traffic_keys()
240 keys->key_len = key_len; in mbedtls_ssl_tls1_3_make_traffic_keys()
1024 traffic_keys->key_len); in mbedtls_ssl_tls13_generate_handshake_keys()
1028 traffic_keys->key_len); in mbedtls_ssl_tls13_generate_handshake_keys()
A Dpk_wrap.c566 int key_len; in ecdsa_verify_wrap() local
586 key_len = mbedtls_pk_write_pubkey( &p, buf, &key ); in ecdsa_verify_wrap()
587 if( key_len <= 0 ) in ecdsa_verify_wrap()
595 buf + sizeof( buf ) - key_len, key_len, in ecdsa_verify_wrap()
A Dssl_tls13_keys.h154 size_t slen, size_t key_len, size_t iv_len,
A Dssl_misc.h503 size_t key_len; /*!< The length of client_write_key and member
/mbedtls-development/include/mbedtls/
A Dcmac.h197 int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len,
/mbedtls-development/docs/
A Dgetting_started.md75 void import_a_key(const uint8_t *key, size_t key_len)
98 status = psa_import_key(&attributes, key, key_len, &key);
128 void sign_a_message_using_rsa(const uint8_t *key, size_t key_len)
157 status = psa_import_key(&attributes, key, key_len, &key);
203 void encrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
235 status = psa_import_key(&attributes, key, key_len, &key);
288 void decrypt_with_symmetric_ciphers(const uint8_t *key, size_t key_len)
319 status = psa_import_key(&attributes, key, key_len, &key);
/mbedtls-development/programs/ssl/
A Dssl_server2.c845 size_t key_len; member
910 key_hex, &new->key_len ) != 0 ) in psk_parse()
943 return( mbedtls_ssl_set_hs_psk( ssl, cur->key, cur->key_len ) ); in psk_callback()
2965 cur_psk->key_len ); in main()

Completed in 29 milliseconds