/mbedtls-development/library/ |
A D | rsa.c | 1121 unsigned int hlen; in mgf_mask() local 1198 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1209 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1214 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1225 if( ( ret = mgf_mask( output + hlen + 1, olen - hlen - 1, output + 1, hlen, in mbedtls_rsa_rsaes_oaep_encrypt() 1230 if( ( ret = mgf_mask( output + 1, hlen, output + hlen + 1, olen - hlen - 1, in mbedtls_rsa_rsaes_oaep_encrypt() 1401 if( ( ret = mgf_mask( buf + 1, hlen, buf + hlen + 1, ilen - hlen - 1, in mbedtls_rsa_rsaes_oaep_decrypt() 1404 ( ret = mgf_mask( buf + hlen + 1, ilen - hlen - 1, buf + 1, hlen, in mbedtls_rsa_rsaes_oaep_decrypt() 1815 else if( olen >= hlen + hlen + 2 ) in rsa_rsassa_pss_sign() 1871 p += hlen; in rsa_rsassa_pss_sign() [all …]
|
A D | pkcs12.c | 212 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 229 hlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs12_derivation() 231 if( hlen <= 32 ) in mbedtls_pkcs12_derivation() 263 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation() 267 use_len = ( datalen > hlen ) ? hlen : datalen; in mbedtls_pkcs12_derivation() 276 pkcs12_fill_buffer( hash_block, v, hash_output, hlen ); in mbedtls_pkcs12_derivation()
|
A D | ecdsa.c | 680 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 701 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 710 hash, hlen, f_rng, p_rng ) ); in mbedtls_ecdsa_write_signature_restartable() 714 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 733 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 743 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 751 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 758 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature() 765 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 804 if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
A D | ssl_tls13_keys.c | 297 size_t hlen, ilen; in mbedtls_ssl_tls1_3_evolve_secret() local 306 hlen = mbedtls_md_get_size( md ); in mbedtls_ssl_tls1_3_evolve_secret() 314 secret_old, hlen, in mbedtls_ssl_tls1_3_evolve_secret() 318 tmp_secret, hlen ); in mbedtls_ssl_tls1_3_evolve_secret() 330 ilen = hlen; in mbedtls_ssl_tls1_3_evolve_secret() 337 tmp_secret, hlen, in mbedtls_ssl_tls1_3_evolve_secret()
|
A D | psa_crypto_rsa.c | 466 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local 467 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len() 470 else if( room > hlen ) in rsa_pss_expected_salt_len() 471 return( hlen ); in rsa_pss_expected_salt_len()
|
A D | ssl_tls.c | 1333 size_t *hlen ) in ssl_calc_verify_tls_sha256() argument 1355 *hlen = 32; in ssl_calc_verify_tls_sha256() 1356 MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, *hlen ); in ssl_calc_verify_tls_sha256() 1368 *hlen = 32; in ssl_calc_verify_tls_sha256() 1370 MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); in ssl_calc_verify_tls_sha256() 1382 size_t *hlen ) in ssl_calc_verify_tls_sha384() argument 1404 *hlen = 48; in ssl_calc_verify_tls_sha384() 1405 MBEDTLS_SSL_DEBUG_BUF( 3, "PSA calculated verify result", hash, *hlen ); in ssl_calc_verify_tls_sha384() 1417 *hlen = 48; in ssl_calc_verify_tls_sha384() 1419 MBEDTLS_SSL_DEBUG_BUF( 3, "calculated verify result", hash, *hlen ); in ssl_calc_verify_tls_sha384()
|
/mbedtls-development/include/mbedtls/ |
A D | ecdsa.h | 309 const unsigned char *hash, size_t hlen, 356 const unsigned char *hash, size_t hlen, 390 const unsigned char *hash, size_t hlen, 425 const unsigned char *hash, size_t hlen,
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ecdsa.function | 151 size_t hlen; 166 hlen = mbedtls_md_get_size( md_info ); 171 mbedtls_ecdsa_sign_det_ext( &grp, &r, &s, &d, hash, hlen, 382 size_t hlen, slen; 396 hlen = mbedtls_md_get_size( md_info ); 407 md_alg, hash, hlen, sig, sizeof( sig ), &slen, 423 md_alg, hash, hlen, sig, sizeof( sig ), &slen,
|
A D | test_suite_pk.function | 527 size_t hlen, slen; 547 hlen = mbedtls_md_get_size( md_info ); 557 ret = mbedtls_pk_sign_restartable( &prv, md_alg, hash, hlen, 573 hash, hlen, sig, slen, &rs_ctx ); 583 hash, hlen, sig, slen, &rs_ctx ); 591 hash, hlen, sig, slen, &rs_ctx ); 601 hash, hlen, sig, slen, &rs_ctx ); 606 ret = mbedtls_pk_sign_restartable( &prv, md_alg, hash, hlen,
|