/mbedtls-development/programs/aes/ |
A D | crypt_and_hash.c | 86 size_t keylen, ilen, olen; in main() local 207 keylen = fread( key, 1, sizeof( key ), fkey ); in main() 215 keylen = 0; in main() 218 keylen < (int) sizeof( key ) ) in main() 220 key[keylen++] = (unsigned char) n; in main() 226 keylen = strlen( argv[6] ); in main() 228 if( keylen > (int) sizeof( key ) ) in main() 229 keylen = (int) sizeof( key ); in main() 231 memcpy( key, argv[6], keylen ); in main() 307 mbedtls_md_update( &md_ctx, key, keylen ); in main() [all …]
|
/mbedtls-development/library/ |
A D | pkparse.c | 717 end = p + keylen; in pk_parse_key_pkcs1_der() 871 unsigned char *end = p + keylen; in pk_parse_key_sec1_der() 1119 end = p + keylen; in pk_parse_key_pkcs8_encrypted_der() 1218 if( keylen == 0 ) in mbedtls_pk_parse_key() 1227 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1258 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1289 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1312 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key() 1436 if( keylen == 0 ) in mbedtls_pk_parse_public_key() 1444 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_public_key() [all …]
|
A D | pkcs5.c | 55 int *keylen, mbedtls_md_type_t *md_type ) in pkcs5_parse_pbkdf2_params() argument 87 if( ( ret = mbedtls_asn1_get_int( &p, end, keylen ) ) != 0 ) in pkcs5_parse_pbkdf2_params() 114 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2() local 150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 177 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs5_pbes2() 194 iterations, keylen, key ) ) != 0 ) in mbedtls_pkcs5_pbes2() 202 if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, in mbedtls_pkcs5_pbes2()
|
A D | pem.c | 76 static int pem_pbkdf1( unsigned char *key, size_t keylen, in pem_pbkdf1() argument 99 if( keylen <= 16 ) in pem_pbkdf1() 101 memcpy( key, md5sum, keylen ); in pem_pbkdf1() 122 if( keylen < 32 ) in pem_pbkdf1() 123 use_len = keylen - 16; in pem_pbkdf1() 196 static int pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument 206 if( ( ret = pem_pbkdf1( aes_key, keylen, aes_iv, pwd, pwdlen ) ) != 0 ) in pem_aes_decrypt() 209 if( ( ret = mbedtls_aes_setkey_dec( &aes_ctx, aes_key, keylen * 8 ) ) != 0 ) in pem_aes_decrypt() 216 mbedtls_platform_zeroize( aes_key, keylen ); in pem_aes_decrypt()
|
A D | pkcs12.c | 82 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument 103 if( ( ret = mbedtls_pkcs12_derivation( key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv() 130 int ret, keylen = 0; in mbedtls_pkcs12_pbe() local 141 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs12_pbe() 144 key, keylen, in mbedtls_pkcs12_pbe() 155 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs12_pbe()
|
A D | md.c | 625 int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ) in mbedtls_md_hmac_starts() argument 635 if( keylen > (size_t) ctx->md_info->block_size ) in mbedtls_md_hmac_starts() 639 if( ( ret = mbedtls_md_update( ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac_starts() 644 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts() 654 for( i = 0; i < keylen; i++ ) in mbedtls_md_hmac_starts() 720 const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument 735 if( ( ret = mbedtls_md_hmac_starts( &ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac()
|
A D | ssl_tls13_keys.c | 945 size_t keylen, ivlen; in mbedtls_ssl_tls13_generate_handshake_keys() local 954 keylen = cipher_info->key_bitlen >> 3; in mbedtls_ssl_tls13_generate_handshake_keys() 1015 md_size, keylen, ivlen, traffic_keys ); in mbedtls_ssl_tls13_generate_handshake_keys() 1136 size_t keylen, ivlen; in mbedtls_ssl_tls13_generate_application_keys() local 1144 keylen = cipher_info->key_bitlen / 8; in mbedtls_ssl_tls13_generate_application_keys() 1178 md_size, keylen, ivlen, traffic_keys ); in mbedtls_ssl_tls13_generate_application_keys() 1216 traffic_keys->client_write_key, keylen ); in mbedtls_ssl_tls13_generate_application_keys() 1218 traffic_keys->server_write_key, keylen ); in mbedtls_ssl_tls13_generate_application_keys()
|
A D | cmac.c | 374 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument 389 ret = mbedtls_cipher_cmac_starts( &ctx, key, keylen ); in mbedtls_cipher_cmac()
|
A D | ssl_tls.c | 691 size_t keylen; in ssl_tls12_populate_transform() local 794 keylen = mbedtls_cipher_info_get_key_bitlen( cipher_info ) / 8; in ssl_tls12_populate_transform() 896 (unsigned) keylen, in ssl_tls12_populate_transform() 908 key2 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform() 918 memcpy( transform->iv_enc, key2 + keylen, iv_copy_len ); in ssl_tls12_populate_transform() 919 memcpy( transform->iv_dec, key2 + keylen + iv_copy_len, in ssl_tls12_populate_transform() 927 key1 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform() 938 memcpy( transform->iv_dec, key1 + keylen, iv_copy_len ); in ssl_tls12_populate_transform() 939 memcpy( transform->iv_enc, key1 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
|
/mbedtls-development/include/mbedtls/ |
A D | md.h | 356 size_t keylen ); 439 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
|
A D | cmac.h | 175 const unsigned char *key, size_t keylen,
|
A D | pk.h | 700 const unsigned char *key, size_t keylen, 727 const unsigned char *key, size_t keylen );
|
/mbedtls-development/tests/suites/ |
A D | test_suite_pkcs5.data | 153 PBES2 Decrypt (OK, PBKDF2 params explicit keylen) 157 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
|
A D | test_suite_ssl.function | 1199 size_t keylen, maclen, ivlen; 1224 keylen = cipher_info->key_bitlen / 8; 1225 /* Allocate `keylen + 1` bytes to ensure that we get 1227 * `keylen == 0` in the case of the NULL cipher. */ 1228 CHK( ( key0 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL ); 1229 CHK( ( key1 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL ); 1230 memset( key0, 0x1, keylen ); 1231 memset( key1, 0x2, keylen ); 1254 keylen << 3, MBEDTLS_ENCRYPT ) == 0 ); 1256 keylen << 3, MBEDTLS_DECRYPT ) == 0 ); [all …]
|