/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | pkcs11.c | 168 unsigned int hashlen, in mbedtls_pkcs11_sign() argument 191 hashlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs11_sign() 196 if( hashlen > sig_len || asn_len > sig_len || in mbedtls_pkcs11_sign() 197 hashlen + asn_len > sig_len ) in mbedtls_pkcs11_sign() 214 *p++ = (unsigned char) ( 0x08 + oid_size + hashlen ); in mbedtls_pkcs11_sign() 224 *p++ = hashlen; in mbedtls_pkcs11_sign() 227 memcpy( p, hash, hashlen ); in mbedtls_pkcs11_sign() 230 asn_len + hashlen, sig, &sig_len ) != CKR_OK ) in mbedtls_pkcs11_sign()
|
A D | rsa.c | 1599 hashlen == 0 ) || in rsa_rsassa_pss_sign() 1798 10 + hashlen < hashlen || in rsa_rsassa_pkcs1_v15_encode() 1799 10 + hashlen + oid_size < 10 + hashlen ) in rsa_rsassa_pkcs1_v15_encode() 1816 if( nb_pad < hashlen ) in rsa_rsassa_pkcs1_v15_encode() 1819 nb_pad -= hashlen; in rsa_rsassa_pkcs1_v15_encode() 1841 memcpy( p, hash, hashlen ); in rsa_rsassa_pkcs1_v15_encode() 1869 *p++ = (unsigned char) hashlen; in rsa_rsassa_pkcs1_v15_encode() 1870 memcpy( p, hash, hashlen ); in rsa_rsassa_pkcs1_v15_encode() 1871 p += hashlen; in rsa_rsassa_pkcs1_v15_encode() 1903 hashlen == 0 ) || in mbedtls_rsa_rsassa_pkcs1_v15_sign() [all …]
|
A D | ssl_cli.c | 3300 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 3398 hashlen = 36; in ssl_parse_server_key_exchange() 3411 ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 3425 MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen ); in ssl_parse_server_key_exchange() 3458 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange() 4193 size_t hashlen; in ssl_write_certificate_verify() local 4242 ssl->handshake->calc_verify( ssl, hash, &hashlen ); in ssl_write_certificate_verify() 4268 hashlen -= 16; in ssl_write_certificate_verify() 4307 hashlen = 0; in ssl_write_certificate_verify() 4323 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
|
A D | ssl_srv.c | 3515 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local 3577 hashlen = 36; in ssl_prepare_server_key_exchange() 3591 ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen, in ssl_prepare_server_key_exchange() 3606 MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen ); in ssl_prepare_server_key_exchange() 3642 md_alg, hash, hashlen ); in ssl_prepare_server_key_exchange() 3673 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange() 4483 size_t hashlen; in ssl_parse_certificate_verify() local 4559 hashlen = 36; in ssl_parse_certificate_verify() 4565 hashlen -= 16; in ssl_parse_certificate_verify() 4599 hashlen = 0; in ssl_parse_certificate_verify() [all …]
|
A D | ssl_tls.c | 7620 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 7652 hashlen ) ) != PSA_SUCCESS ) in mbedtls_ssl_get_key_exchange_md_tls1_2() 7682 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 7689 *hashlen = mbedtls_md_get_size( md_info ); in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/dsa/ |
A D | dsa_verify_hash.c | 24 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash_raw() argument 50 hashlen = MIN(hashlen, (unsigned long)(key->qord)); in dsa_verify_hash_raw() 56 …if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 90 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash() argument 119 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); in dsa_verify_hash()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/rsa/ |
A D | rsa_verify_hash.c | 27 const unsigned char *hash, unsigned long hashlen, in rsa_verify_hash_ex() argument 95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 167 (siginfo[1].size == hashlen) && in rsa_verify_hash_ex() 169 siginfo[1].data, hash, hashlen) == 0)) { in rsa_verify_hash_ex() 175 if ((hashlen == outlen) && in rsa_verify_hash_ex() 177 out, hash, hashlen) == 0)) { in rsa_verify_hash_ex()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | rsa.h | 934 unsigned int hashlen, 982 unsigned int hashlen, 1036 unsigned int hashlen, 1101 unsigned int hashlen, 1154 unsigned int hashlen, 1200 unsigned int hashlen, 1256 unsigned int hashlen, 1309 unsigned int hashlen,
|
A D | pkcs11.h | 165 unsigned int hashlen, 212 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, in mbedtls_ssl_pkcs11_sign() argument 218 hashlen, hash, sig ); in mbedtls_ssl_pkcs11_sign()
|
A D | pk.h | 229 int mode, mbedtls_md_type_t md_alg, unsigned int hashlen,
|
A D | ssl_internal.h | 1276 unsigned char *hash, size_t *hashlen,
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/pk/ecc/ |
A D | ecc_verify_hash.c | 25 const unsigned char *hash, unsigned long hashlen, in ecc_verify_hash_ex() argument 132 if (pbits > hashlen*8) { in ecc_verify_hash_ex() 133 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
A D | ecc_recover_key.c | 27 const unsigned char *hash, unsigned long hashlen, in ecc_recover_key() argument 152 if (pbits > hashlen*8) { in ecc_recover_key() 153 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_recover_key()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_pk.h | 68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument 69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key) 96 const unsigned char *hash, unsigned long hashlen, 314 const unsigned char *hash, unsigned long hashlen, 318 const unsigned char *hash, unsigned long hashlen, 462 const unsigned char *hash, unsigned long hashlen, 466 const unsigned char *hash, unsigned long hashlen,
|