/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | ecdsa.h | 372 const unsigned char *hash, size_t hlen, 418 const unsigned char *hash, size_t hlen, 475 const unsigned char *hash, size_t hlen, 510 const unsigned char *hash, size_t hlen, 545 const unsigned char *hash, size_t hlen,
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ssl_tls13_keys.c | 294 size_t hlen, ilen; in mbedtls_ssl_tls1_3_evolve_secret() local 303 hlen = mbedtls_md_get_size( md ); in mbedtls_ssl_tls1_3_evolve_secret() 311 secret_old, hlen, in mbedtls_ssl_tls1_3_evolve_secret() 315 tmp_secret, hlen ); in mbedtls_ssl_tls1_3_evolve_secret() 327 ilen = hlen; in mbedtls_ssl_tls1_3_evolve_secret() 334 tmp_secret, hlen, in mbedtls_ssl_tls1_3_evolve_secret()
|
A D | rsa.c | 1098 unsigned int hlen; in mgf_mask() local 1181 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1192 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1197 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1208 if( ( ret = mgf_mask( output + hlen + 1, olen - hlen - 1, output + 1, hlen, in mbedtls_rsa_rsaes_oaep_encrypt() 1213 if( ( ret = mgf_mask( output + 1, hlen, output + hlen + 1, olen - hlen - 1, in mbedtls_rsa_rsaes_oaep_encrypt() 1415 if( ( ret = mgf_mask( buf + 1, hlen, buf + hlen + 1, ilen - hlen - 1, in mbedtls_rsa_rsaes_oaep_decrypt() 1418 ( ret = mgf_mask( buf + hlen + 1, ilen - hlen - 1, buf + 1, hlen, in mbedtls_rsa_rsaes_oaep_decrypt() 1639 else if( olen >= hlen + hlen + 2 ) in rsa_rsassa_pss_sign() 1695 p += hlen; in rsa_rsassa_pss_sign() [all …]
|
A D | pkcs12.c | 273 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 299 hlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs12_derivation() 301 if( hlen <= 32 ) in mbedtls_pkcs12_derivation() 346 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation() 350 use_len = ( datalen > hlen ) ? hlen : datalen; in mbedtls_pkcs12_derivation() 359 pkcs12_fill_buffer( hash_block, v, hash_output, hlen ); in mbedtls_pkcs12_derivation()
|
A D | ecdsa.c | 751 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 769 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 778 hash, hlen, f_rng, p_rng ) ); in mbedtls_ecdsa_write_signature_restartable() 801 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 811 ctx, md_alg, hash, hlen, sig, slen, f_rng, p_rng, NULL ) ); in mbedtls_ecdsa_write_signature() 817 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_det() argument 834 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 841 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature() 848 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 887 if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
A D | ssl_tls.c | 1815 size_t *hlen ) in ssl_calc_verify_ssl() argument 1853 *hlen = 36; in ssl_calc_verify_ssl() 1855 MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); in ssl_calc_verify_ssl() 1868 size_t *hlen ) in ssl_calc_verify_tls() argument 1884 *hlen = 36; in ssl_calc_verify_tls() 1900 size_t *hlen ) in ssl_calc_verify_tls_sha256() argument 1922 *hlen = 32; in ssl_calc_verify_tls_sha256() 1935 *hlen = 32; in ssl_calc_verify_tls_sha256() 1949 size_t *hlen ) in ssl_calc_verify_tls_sha384() argument 1971 *hlen = 48; in ssl_calc_verify_tls_sha384() [all …]
|
/optee_os-3.20.0/core/tee/ |
A D | tee_svc_cryp.c | 2885 size_t hlen = 0; in syscall_hash_final() local 2901 res = get_user_u64_as_size_t(&hlen, hash_len); in syscall_hash_final() 2909 (uaddr_t)hash, hlen); in syscall_hash_final() 2925 if (hlen < hash_size) { in syscall_hash_final() 2945 if (hlen < hash_size) { in syscall_hash_final()
|