/mbedtls-development/library/ |
A D | pk_wrap.c | 90 if( sig_len < rsa_len ) in rsa_verify_wrap() 103 if( sig_len > rsa_len ) in rsa_verify_wrap() 121 *sig_len = mbedtls_rsa_get_len( rsa ); in rsa_sign_wrap() 122 if( sig_size < *sig_len ) in rsa_sign_wrap() 627 if( p != sig + sig_len ) in ecdsa_verify_wrap() 678 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 791 if( *sig_len > sig_size ) in rsa_alt_sign_wrap() 822 size_t sig_len = 0; in rsa_alt_check_pair() local 1001 const size_t rs_len = *sig_len / 2; in pk_ecdsa_sig_asn1_from_psa() 1012 *sig_len = len; in pk_ecdsa_sig_asn1_from_psa() [all …]
|
A D | pk.c | 278 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 317 sig, sig_len ) ); in mbedtls_pk_verify_restartable() 325 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument 328 sig, sig_len, NULL ) ); in mbedtls_pk_verify() 337 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument 366 if( sig_len < mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 377 if( sig_len > mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 399 unsigned char *sig, size_t sig_size, size_t *sig_len, in mbedtls_pk_sign_restartable() argument 425 sig, sig_size, sig_len, in mbedtls_pk_sign_restartable() 442 sig, sig_size, sig_len, in mbedtls_pk_sign_restartable() [all …]
|
A D | pk_wrap.h | 47 const unsigned char *sig, size_t sig_len ); 52 unsigned char *sig, size_t sig_size, size_t *sig_len, 60 const unsigned char *sig, size_t sig_len, 66 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
A D | x509write_csr.c | 148 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 239 sig, sig_size, &sig_len, in x509write_csr_der_internal() 272 sig, sig_len ) ); in x509write_csr_der_internal()
|
A D | x509write_crt.c | 335 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local 476 hash, 0, sig, sizeof( sig ), &sig_len, in mbedtls_x509write_crt_der() 492 sig_oid, sig_oid_len, sig, sig_len ) ); in mbedtls_x509write_crt_der()
|
A D | rsa.c | 2337 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local 2346 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2352 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2353 ( encoded_expected = mbedtls_calloc( 1, sig_len ) ) == NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2359 if( ( ret = rsa_rsassa_pkcs1_v15_encode( md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2376 sig_len ) ) != 0 ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2386 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2392 mbedtls_platform_zeroize( encoded_expected, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
A D | ssl_cli.c | 3083 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 3143 sig_len = ( p[0] << 8 ) | p[1]; in ssl_parse_server_key_exchange() 3146 if( p != end - sig_len ) in ssl_parse_server_key_exchange() 3156 MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len ); in ssl_parse_server_key_exchange() 3210 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange()
|
A D | ssl_srv.c | 4011 size_t i, sig_len; in ssl_parse_certificate_verify() local 4151 sig_len = ( ssl->in_msg[i] << 8 ) | ssl->in_msg[i+1]; in ssl_parse_certificate_verify() 4154 if( i + sig_len != ssl->in_hslen ) in ssl_parse_certificate_verify() 4168 ssl->in_msg + i, sig_len ) ) != 0 ) in ssl_parse_certificate_verify()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ecdsa.function | 193 size_t sig_len, i; 211 sig, sig_len ) == 0 ); 219 sig, sig_len - 1 ) != 0 ); 226 sig, sig_len ) != 0 ); 236 sig[sig_len - 1]++; 239 sig[sig_len - 1]--; 253 size_t sig_len, i; 275 sig, sig_len ) == 0 ); 290 sig, sig_len ) != 0 ); 300 sig[sig_len - 1]++; [all …]
|
A D | test_suite_pk.function | 624 size_t sig_len; 657 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; 676 sig, sizeof sig, &sig_len, 682 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; 832 size_t hash_len = SIZE_MAX, sig_len = SIZE_MAX; 856 sig, sizeof sig, &sig_len, 878 size_t sig_len, ciph_len, test_len; 912 sig, sizeof sig, &sig_len, 917 sig, sizeof sig, &sig_len, 920 TEST_ASSERT( sig_len == RSA_KEY_LEN ); [all …]
|
/mbedtls-development/programs/pkey/ |
A D | ecdsa.c | 108 size_t sig_len; in main() local 183 sig, sizeof( sig ), &sig_len, in main() 189 mbedtls_printf( " ok (signature length = %u)\n", (unsigned int) sig_len ); in main() 191 dump_buf( " + Signature: ", sig, sig_len ); in main() 223 sig, sig_len ) ) != 0 ) in main()
|
/mbedtls-development/include/mbedtls/ |
A D | pk.h | 443 const unsigned char *sig, size_t sig_len ); 468 const unsigned char *sig, size_t sig_len, 503 const unsigned char *sig, size_t sig_len ); 535 unsigned char *sig, size_t sig_size, size_t *sig_len, 570 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
/mbedtls-development/programs/test/ |
A D | benchmark.c | 1068 size_t sig_len; in main() local 1089 tmp, sizeof( tmp ), &sig_len, myrand, NULL ) ); in main() 1105 tmp, sizeof( tmp ), &sig_len, myrand, NULL ) != 0 ) in main() 1115 tmp, sig_len ) ); in main()
|