Home
last modified time | relevance | path

Searched refs:keylen (Results 1 – 14 of 14) sorted by relevance

/mbedtls-development/programs/aes/
A Dcrypt_and_hash.c86 size_t keylen, ilen, olen; in main() local
207 keylen = fread( key, 1, sizeof( key ), fkey ); in main()
215 keylen = 0; in main()
218 keylen < (int) sizeof( key ) ) in main()
220 key[keylen++] = (unsigned char) n; in main()
226 keylen = strlen( argv[6] ); in main()
228 if( keylen > (int) sizeof( key ) ) in main()
229 keylen = (int) sizeof( key ); in main()
231 memcpy( key, argv[6], keylen ); in main()
307 mbedtls_md_update( &md_ctx, key, keylen ); in main()
[all …]
/mbedtls-development/library/
A Dpkparse.c717 end = p + keylen; in pk_parse_key_pkcs1_der()
871 unsigned char *end = p + keylen; in pk_parse_key_sec1_der()
1119 end = p + keylen; in pk_parse_key_pkcs8_encrypted_der()
1218 if( keylen == 0 ) in mbedtls_pk_parse_key()
1227 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key()
1258 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key()
1289 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key()
1312 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_key()
1436 if( keylen == 0 ) in mbedtls_pk_parse_public_key()
1444 if( key[keylen - 1] != '\0' ) in mbedtls_pk_parse_public_key()
[all …]
A Dpkcs5.c55 int *keylen, mbedtls_md_type_t *md_type ) in pkcs5_parse_pbkdf2_params() argument
87 if( ( ret = mbedtls_asn1_get_int( &p, end, keylen ) ) != 0 ) in pkcs5_parse_pbkdf2_params()
114 int ret, iterations = 0, keylen = 0; in mbedtls_pkcs5_pbes2() local
150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2()
177 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs5_pbes2()
194 iterations, keylen, key ) ) != 0 ) in mbedtls_pkcs5_pbes2()
202 if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, in mbedtls_pkcs5_pbes2()
A Dpem.c76 static int pem_pbkdf1( unsigned char *key, size_t keylen, in pem_pbkdf1() argument
99 if( keylen <= 16 ) in pem_pbkdf1()
101 memcpy( key, md5sum, keylen ); in pem_pbkdf1()
122 if( keylen < 32 ) in pem_pbkdf1()
123 use_len = keylen - 16; in pem_pbkdf1()
196 static int pem_aes_decrypt( unsigned char aes_iv[16], unsigned int keylen, in pem_aes_decrypt() argument
206 if( ( ret = pem_pbkdf1( aes_key, keylen, aes_iv, pwd, pwdlen ) ) != 0 ) in pem_aes_decrypt()
209 if( ( ret = mbedtls_aes_setkey_dec( &aes_ctx, aes_key, keylen * 8 ) ) != 0 ) in pem_aes_decrypt()
216 mbedtls_platform_zeroize( aes_key, keylen ); in pem_aes_decrypt()
A Dpkcs12.c82 unsigned char *key, size_t keylen, in pkcs12_pbe_derive_key_iv() argument
103 if( ( ret = mbedtls_pkcs12_derivation( key, keylen, unipwd, pwdlen * 2 + 2, in pkcs12_pbe_derive_key_iv()
130 int ret, keylen = 0; in mbedtls_pkcs12_pbe() local
141 keylen = cipher_info->key_bitlen / 8; in mbedtls_pkcs12_pbe()
144 key, keylen, in mbedtls_pkcs12_pbe()
155 …if( ( ret = mbedtls_cipher_setkey( &cipher_ctx, key, 8 * keylen, (mbedtls_operation_t) mode ) ) !=… in mbedtls_pkcs12_pbe()
A Dmd.c625 int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, size_t keylen ) in mbedtls_md_hmac_starts() argument
635 if( keylen > (size_t) ctx->md_info->block_size ) in mbedtls_md_hmac_starts()
639 if( ( ret = mbedtls_md_update( ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac_starts()
644 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts()
654 for( i = 0; i < keylen; i++ ) in mbedtls_md_hmac_starts()
720 const unsigned char *key, size_t keylen, in mbedtls_md_hmac() argument
735 if( ( ret = mbedtls_md_hmac_starts( &ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac()
A Dssl_tls13_keys.c945 size_t keylen, ivlen; in mbedtls_ssl_tls13_generate_handshake_keys() local
954 keylen = cipher_info->key_bitlen >> 3; in mbedtls_ssl_tls13_generate_handshake_keys()
1015 md_size, keylen, ivlen, traffic_keys ); in mbedtls_ssl_tls13_generate_handshake_keys()
1136 size_t keylen, ivlen; in mbedtls_ssl_tls13_generate_application_keys() local
1144 keylen = cipher_info->key_bitlen / 8; in mbedtls_ssl_tls13_generate_application_keys()
1178 md_size, keylen, ivlen, traffic_keys ); in mbedtls_ssl_tls13_generate_application_keys()
1216 traffic_keys->client_write_key, keylen ); in mbedtls_ssl_tls13_generate_application_keys()
1218 traffic_keys->server_write_key, keylen ); in mbedtls_ssl_tls13_generate_application_keys()
A Dcmac.c374 const unsigned char *key, size_t keylen, in mbedtls_cipher_cmac() argument
389 ret = mbedtls_cipher_cmac_starts( &ctx, key, keylen ); in mbedtls_cipher_cmac()
A Dssl_tls.c691 size_t keylen; in ssl_tls12_populate_transform() local
794 keylen = mbedtls_cipher_info_get_key_bitlen( cipher_info ) / 8; in ssl_tls12_populate_transform()
896 (unsigned) keylen, in ssl_tls12_populate_transform()
908 key2 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform()
918 memcpy( transform->iv_enc, key2 + keylen, iv_copy_len ); in ssl_tls12_populate_transform()
919 memcpy( transform->iv_dec, key2 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
927 key1 = keyblk + mac_key_len * 2 + keylen; in ssl_tls12_populate_transform()
938 memcpy( transform->iv_dec, key1 + keylen, iv_copy_len ); in ssl_tls12_populate_transform()
939 memcpy( transform->iv_enc, key1 + keylen + iv_copy_len, in ssl_tls12_populate_transform()
/mbedtls-development/include/mbedtls/
A Dmd.h356 size_t keylen );
439 int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen,
A Dcmac.h175 const unsigned char *key, size_t keylen,
A Dpk.h700 const unsigned char *key, size_t keylen,
727 const unsigned char *key, size_t keylen );
/mbedtls-development/tests/suites/
A Dtest_suite_pkcs5.data153 PBES2 Decrypt (OK, PBKDF2 params explicit keylen)
157 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
A Dtest_suite_ssl.function1199 size_t keylen, maclen, ivlen;
1224 keylen = cipher_info->key_bitlen / 8;
1225 /* Allocate `keylen + 1` bytes to ensure that we get
1227 * `keylen == 0` in the case of the NULL cipher. */
1228 CHK( ( key0 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
1229 CHK( ( key1 = mbedtls_calloc( 1, keylen + 1 ) ) != NULL );
1230 memset( key0, 0x1, keylen );
1231 memset( key1, 0x2, keylen );
1254 keylen << 3, MBEDTLS_ENCRYPT ) == 0 );
1256 keylen << 3, MBEDTLS_DECRYPT ) == 0 );
[all …]

Completed in 32 milliseconds