/mbedtls-development/library/ |
A D | base64.c | 80 const unsigned char *src, size_t slen ) in mbedtls_base64_encode() argument 86 if( slen == 0 ) in mbedtls_base64_encode() 92 n = slen / 3 + ( slen % 3 != 0 ); in mbedtls_base64_encode() 108 n = ( slen / 3 ) * 3; in mbedtls_base64_encode() 124 if( i < slen ) in mbedtls_base64_encode() 127 C2 = ( ( i + 1 ) < slen ) ? *src++ : 0; in mbedtls_base64_encode() 133 if( ( i + 1 ) < slen ) in mbedtls_base64_encode() 190 for( i = n = 0; i < slen; i++ ) in mbedtls_base64_decode() 194 while( i < slen && src[i] == ' ' ) in mbedtls_base64_decode() 201 if( i == slen ) in mbedtls_base64_decode() [all …]
|
A D | ecdsa.c | 652 size_t *slen ) in ecdsa_signature_to_asn1() argument 670 *slen = len; in ecdsa_signature_to_asn1() 681 unsigned char *sig, size_t sig_size, size_t *slen, in mbedtls_ecdsa_write_signature_restartable() argument 691 ECDSA_VALIDATE_RET( slen != NULL ); in mbedtls_ecdsa_write_signature_restartable() 719 MBEDTLS_MPI_CHK( ecdsa_signature_to_asn1( &r, &s, sig, sig_size, slen ) ); in mbedtls_ecdsa_write_signature_restartable() 741 ECDSA_VALIDATE_RET( slen != NULL ); in mbedtls_ecdsa_write_signature() 743 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 752 const unsigned char *sig, size_t slen ) in mbedtls_ecdsa_read_signature() argument 758 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature() 766 const unsigned char *sig, size_t slen, in mbedtls_ecdsa_read_signature_restartable() argument [all …]
|
A D | ssl_tls13_keys.h | 116 const unsigned char *secret, size_t slen, 154 size_t slen, size_t key_len, size_t iv_len, 200 const unsigned char *secret, size_t slen,
|
A D | ssl_tls13_keys.c | 138 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_hkdf_expand_label() argument 178 secret, slen, in mbedtls_ssl_tls1_3_hkdf_expand_label() 203 size_t slen, size_t key_len, size_t iv_len, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 209 client_secret, slen, in mbedtls_ssl_tls1_3_make_traffic_keys() 217 server_secret, slen, in mbedtls_ssl_tls1_3_make_traffic_keys() 225 client_secret, slen, in mbedtls_ssl_tls1_3_make_traffic_keys() 233 server_secret, slen, in mbedtls_ssl_tls1_3_make_traffic_keys() 248 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls1_3_derive_secret() argument 284 secret, slen, in mbedtls_ssl_tls1_3_derive_secret()
|
A D | bignum.c | 576 size_t i, j, slen, n; in mbedtls_mpi_read_string() local 600 slen = strlen( s ); in mbedtls_mpi_read_string() 773 size_t slen; in mbedtls_mpi_read_file() local 791 slen = strlen( s ); in mbedtls_mpi_read_file() 795 if( slen > 0 && s[slen - 1] == '\n' ) { slen--; s[slen] = '\0'; } in mbedtls_mpi_read_file() 796 if( slen > 0 && s[slen - 1] == '\r' ) { slen--; s[slen] = '\0'; } in mbedtls_mpi_read_file() 798 p = s + slen; in mbedtls_mpi_read_file() 830 slen = strlen( s ); in mbedtls_mpi_write_file() 831 s[slen++] = '\r'; in mbedtls_mpi_write_file() 832 s[slen++] = '\n'; in mbedtls_mpi_write_file() [all …]
|
A D | pkcs5.c | 220 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 248 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
|
A D | rsa.c | 1116 size_t slen, mbedtls_md_context_t *md_ctx ) in mgf_mask() argument 1141 if( ( ret = mbedtls_md_update( md_ctx, src, slen ) ) != 0 ) in mgf_mask() 1767 size_t slen, min_slen, hlen, offset = 0; in rsa_rsassa_pss_sign() local 1816 slen = hlen; in rsa_rsassa_pss_sign() 1818 slen = olen - hlen - 2; in rsa_rsassa_pss_sign() 1826 slen = (size_t) saltlen; in rsa_rsassa_pss_sign() 1833 p += olen - hlen - slen - 2; in rsa_rsassa_pss_sign() 1838 if( ( ret = f_rng( p_rng, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign() 1841 p += slen; in rsa_rsassa_pss_sign() 1854 if( ( ret = mbedtls_md_update( &md_ctx, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign()
|
A D | psa_crypto_rsa.c | 527 int slen = rsa_pss_expected_salt_len( alg, rsa, hash_length ); in rsa_verify_hash() local 533 slen, in rsa_verify_hash()
|
A D | ssl_tls.c | 384 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 407 if( slen != 0 ) in tls_prf_generic() 458 const unsigned char *secret, size_t slen, in tls_prf_generic() argument 498 mbedtls_md_hmac_starts( &md_ctx, secret, slen ); in tls_prf_generic() 530 static int tls_prf_sha256( const unsigned char *secret, size_t slen, in tls_prf_sha256() argument 535 return( tls_prf_generic( MBEDTLS_MD_SHA256, secret, slen, in tls_prf_sha256() 541 static int tls_prf_sha384( const unsigned char *secret, size_t slen, in tls_prf_sha384() argument 546 return( tls_prf_generic( MBEDTLS_MD_SHA384, secret, slen, in tls_prf_sha384() 612 const unsigned char *secret, size_t slen, in mbedtls_ssl_tls_prf() argument 637 return( tls_prf( secret, slen, label, random, rlen, dstbuf, dlen ) ); in mbedtls_ssl_tls_prf() [all …]
|
A D | ssl_misc.h | 463 typedef int mbedtls_ssl_tls_prf_cb( const unsigned char *secret, size_t slen,
|
/mbedtls-development/include/mbedtls/ |
A D | ecdsa.h | 310 unsigned char *sig, size_t sig_size, size_t *slen, 357 unsigned char *sig, size_t sig_size, size_t *slen, 391 const unsigned char *sig, size_t slen ); 426 const unsigned char *sig, size_t slen,
|
A D | base64.h | 58 const unsigned char *src, size_t slen ); 78 const unsigned char *src, size_t slen );
|
A D | pkcs5.h | 88 size_t plen, const unsigned char *salt, size_t slen,
|
A D | ssl.h | 4508 const unsigned char *secret, size_t slen,
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ecdsa.function | 382 size_t hlen, slen; 403 slen = sizeof( sig ); 407 md_alg, hash, hlen, sig, sizeof( sig ), &slen, 412 TEST_ASSERT( slen == sig_check->len ); 413 TEST_ASSERT( memcmp( sig, sig_check->x, slen ) == 0 ); 423 md_alg, hash, hlen, sig, sizeof( sig ), &slen,
|
A D | test_suite_pk.function | 527 size_t hlen, slen; 554 slen = sizeof( sig ); 558 sig, sizeof( sig ), &slen, 564 TEST_ASSERT( slen == sig_check->len ); 565 TEST_ASSERT( memcmp( sig, sig_check->x, slen ) == 0 ); 573 hash, hlen, sig, slen, &rs_ctx ); 583 hash, hlen, sig, slen, &rs_ctx ); 591 hash, hlen, sig, slen, &rs_ctx ); 601 hash, hlen, sig, slen, &rs_ctx ); 605 slen = sizeof( sig ); [all …]
|
A D | test_suite_psa_crypto.data | 3674 PSA verify hash: RSA-1024 PSS SHA-256, slen=0 (bad) 3678 PSA verify hash: RSA-1024 PSS-any-salt SHA-256, slen=0 3682 PSA verify hash: RSA-1024 PSS SHA-256, slen=31 (bad) 3690 PSA verify hash: RSA-1024 PSS SHA-256, slen=32 3698 PSA verify hash: RSA-1024 PSS SHA-256, slen=94 (bad) 3706 PSA verify hash: RSA-1024 PSS SHA-512, slen=61 (bad) 3714 PSA verify hash: RSA-1024 PSS SHA-512, slen=62 3722 PSA verify hash: RSA-528 PSS SHA-512, slen=0 3726 PSA verify hash: RSA-528 PSS-any-salt SHA-512, slen=0 3938 PSA verify message: RSA-1024 PSS SHA-256, slen=0 (bad) [all …]
|