Lines Matching refs:len
83 size_t *len, int *pk_alg) in get_plain_pk_from_asn1() argument
92 *len = 0U; in get_plain_pk_from_asn1()
99 ret = mbedtls_asn1_get_tag(&p, end, len, in get_plain_pk_from_asn1()
105 end = p + *len; in get_plain_pk_from_asn1()
113 if ((strlen(MBEDTLS_OID_EC_GRP_SECP256R1) == alg_params.len) && in get_plain_pk_from_asn1()
114 (memcmp(MBEDTLS_OID_EC_GRP_SECP256R1, alg_params.p, alg_params.len) == 0)) { in get_plain_pk_from_asn1()
116 } else if ((strlen(OID_EC_GRP_BP256T1) == alg_params.len) && in get_plain_pk_from_asn1()
117 (memcmp(OID_EC_GRP_BP256T1, alg_params.p, alg_params.len) == 0)) { in get_plain_pk_from_asn1()
125 ret = mbedtls_asn1_get_bitstring_null(&p, end, len); in get_plain_pk_from_asn1()
132 if ((*len < 1U) || (p[0] != MBEDTLS_ASN1_OCTET_STRING)) { in get_plain_pk_from_asn1()
137 *len = *len - 1U; in get_plain_pk_from_asn1()
173 size_t len; in crypto_convert_pk() local
176 ret = get_plain_pk_from_asn1(full_pk_ptr, full_pk_len, hashed_pk_ptr, &len, NULL); in crypto_convert_pk()
178 *hashed_pk_len = (unsigned int)len; in crypto_convert_pk()
237 size_t len; in crypto_convert_pk() local
241 ret = get_plain_pk_from_asn1(full_pk_ptr, full_pk_len, &plain_pk, &len, &curve_id); in crypto_convert_pk()
242 if ((ret != 0) || (len > CRYPTO_PUBKEY_MAX_SIZE)) { in crypto_convert_pk()
249 memcpy(st_pk + sizeof(cid), plain_pk, len); in crypto_convert_pk()
252 *hashed_pk_len = (unsigned int)(len + sizeof(cid)); in crypto_convert_pk()
263 size_t len; in get_plain_digest_from_asn1() local
272 ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_CONSTRUCTED | in get_plain_digest_from_asn1()
289 ret = mbedtls_asn1_get_tag(&p, end, &len, MBEDTLS_ASN1_OCTET_STRING); in get_plain_digest_from_asn1()
295 if (len != BOOT_API_SHA256_DIGEST_SIZE_IN_BYTES) { in get_plain_digest_from_asn1()
300 *out_len = len; in get_plain_digest_from_asn1()
314 size_t len; in crypto_verify_signature() local
351 ret = get_plain_pk_from_asn1(pk_ptr, pk_len, &pk_ptr, &len, &curve_id); in crypto_verify_signature()
358 if (len != sizeof(my_pk)) { in crypto_verify_signature()
359 VERBOSE("%s: pk_len=%zu sizeof(my_pk)=%zu)\n", __func__, len, sizeof(my_pk)); in crypto_verify_signature()
371 ret = mbedtls_asn1_get_bitstring_null(&p, end, &len); in crypto_verify_signature()
414 if (cur->buf.len > bignum_len) { in crypto_verify_signature()
416 skip = cur->buf.len - bignum_len; in crypto_verify_signature()
417 } else if (cur->buf.len < bignum_len) { in crypto_verify_signature()
419 seek += (bignum_len % cur->buf.len); in crypto_verify_signature()
422 if (seek + cur->buf.len > sizeof(sig) + skip) { in crypto_verify_signature()
426 memcpy(sig + seek, cur->buf.p + skip, cur->buf.len - skip); in crypto_verify_signature()
454 size_t len; in crypto_verify_hash() local
458 digest_info_len, &p, &len, in crypto_verify_hash()
460 if ((ret != 0) || (md_alg != MBEDTLS_MD_SHA256) || (len != sizeof(calc_hash))) { in crypto_verify_hash()
465 digest_info_len = len; in crypto_verify_hash()
485 static int derive_key(uint8_t *key, size_t *key_len, size_t len, in derive_key() argument
498 for (i = 0U, j = len; j < 32U; in derive_key()
624 static int crypto_auth_decrypt(enum crypto_dec_algo dec_algo, void *data_ptr, size_t len, in crypto_auth_decrypt() argument
643 rc = stm32_decrypt_aes_gcm(data_ptr, len, key, key_len, key_flags, in crypto_auth_decrypt()