| /lib/mbedtls/external/mbedtls/library/ |
| A D | hkdf.c | 44 size_t hash_len; in mbedtls_hkdf_extract() local 52 if (hash_len == 0) { in mbedtls_hkdf_extract() 57 salt_len = hash_len; in mbedtls_hkdf_extract() 67 size_t hash_len; in mbedtls_hkdf_expand() local 80 hash_len = mbedtls_md_get_size(md); in mbedtls_hkdf_expand() 82 if (prk_len < hash_len || hash_len == 0) { in mbedtls_hkdf_expand() 91 n = okm_len / hash_len; in mbedtls_hkdf_expand() 93 if (okm_len % hash_len != 0) { in mbedtls_hkdf_expand() 111 memset(t, 0, hash_len); in mbedtls_hkdf_expand() 150 where += hash_len; in mbedtls_hkdf_expand() [all …]
|
| A D | ssl_tls13_keys.c | 460 hash_len); in mbedtls_ssl_tls13_derive_early_secrets() 473 hash_len); in mbedtls_ssl_tls13_derive_early_secrets() 522 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets() 539 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets() 587 hash_len); in mbedtls_ssl_tls13_derive_application_secrets() 599 hash_len); in mbedtls_ssl_tls13_derive_application_secrets() 611 hash_len); in mbedtls_ssl_tls13_derive_application_secrets() 645 hash_len); in mbedtls_ssl_tls13_derive_resumption_master_secret() 1140 size_t hash_len; in ssl_tls13_generate_early_key() local 1341 size_t hash_len; in ssl_tls13_generate_handshake_keys() local [all …]
|
| A D | pk_wrap.c | 81 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in rsa_verify_wrap() 113 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap() 139 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in rsa_verify_wrap() 210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 262 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in rsa_sign_wrap() 629 hash, hash_len, sig, sig_len); in ecdsa_opaque_verify_wrap() 643 hash, hash_len, sig, sig_len); in ecdsa_verify_wrap() 667 hash, hash_len, sig, sig_len); in ecdsa_verify_wrap() 1197 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 1299 if (UINT_MAX < hash_len) { in rsa_alt_sign_wrap() [all …]
|
| A D | pk.c | 999 if (*hash_len != 0) { in pk_hashlen_helper() 1003 *hash_len = mbedtls_md_get_size_from_type(md_alg); in pk_hashlen_helper() 1005 if (*hash_len == 0) { in pk_hashlen_helper() 1053 pk_hashlen_helper(md_alg, &hash_len) != 0) { in mbedtls_pk_verify_restartable() 1140 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in mbedtls_pk_verify_ext() 1260 hash, hash_len, in mbedtls_pk_sign_restartable() 1279 hash, hash_len, in mbedtls_pk_sign_restartable() 1288 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign() argument 1317 return mbedtls_pk_sign(ctx, md_alg, hash, hash_len, in mbedtls_pk_sign_ext() 1365 hash, hash_len, in mbedtls_pk_sign_ext() [all …]
|
| A D | pk_wrap.h | 37 const unsigned char *hash, size_t hash_len, 42 const unsigned char *hash, size_t hash_len, 50 const unsigned char *hash, size_t hash_len, 56 const unsigned char *hash, size_t hash_len, 131 const unsigned char *hash, size_t hash_len,
|
| A D | x509write_csr.c | 146 size_t hash_len; in x509write_csr_der_internal() local 219 &hash_len) != PSA_SUCCESS) { in x509write_csr_der_internal()
|
| A D | ssl_tls13_generic.c | 1522 size_t hash_len; in mbedtls_ssl_reset_transcript_for_hrr() local 1531 &hash_len); in mbedtls_ssl_reset_transcript_for_hrr() 1540 hash_transcript[3] = (unsigned char) hash_len; in mbedtls_ssl_reset_transcript_for_hrr() 1542 hash_len += 4; in mbedtls_ssl_reset_transcript_for_hrr() 1545 hash_transcript, hash_len); in mbedtls_ssl_reset_transcript_for_hrr() 1553 ret = ssl->handshake->update_checksum(ssl, hash_transcript, hash_len); in mbedtls_ssl_reset_transcript_for_hrr()
|
| A D | x509_crt.c | 2126 size_t hash_len; in x509_crt_check_signature() local 2131 hash_len = mbedtls_md_get_size(md_info); in x509_crt_check_signature() 2146 &hash_len); in x509_crt_check_signature() 2160 child->sig_md, hash, hash_len, in x509_crt_check_signature() 2168 child->sig_md, hash, hash_len, in x509_crt_check_signature()
|
| A D | ssl_tls.c | 8528 unsigned int hash_len; in mbedtls_ssl_write_finished() local 8545 hash_len = 12; in mbedtls_ssl_write_finished() 8548 ssl->verify_data_len = hash_len; in mbedtls_ssl_write_finished() 8549 memcpy(ssl->own_verify_data, ssl->out_msg + 4, hash_len); in mbedtls_ssl_write_finished() 8552 ssl->out_msglen = 4 + hash_len; in mbedtls_ssl_write_finished() 8642 unsigned int hash_len = 12; in mbedtls_ssl_parse_finished() local 8672 if (ssl->in_hslen != mbedtls_ssl_hs_hdr_len(ssl) + hash_len) { in mbedtls_ssl_parse_finished() 8681 buf, hash_len) != 0) { in mbedtls_ssl_parse_finished() 8690 ssl->verify_data_len = hash_len; in mbedtls_ssl_parse_finished() 8691 memcpy(ssl->peer_verify_data, buf, hash_len); in mbedtls_ssl_parse_finished() [all …]
|
| /lib/libavb/ |
| A D | avb_crypto.c | 311 {.padding = NULL, .padding_len = 0, .hash_len = 0}, 315 .hash_len = AVB_SHA256_DIGEST_SIZE}, 319 .hash_len = AVB_SHA256_DIGEST_SIZE}, 323 .hash_len = AVB_SHA256_DIGEST_SIZE}, 327 .hash_len = AVB_SHA512_DIGEST_SIZE}, 331 .hash_len = AVB_SHA512_DIGEST_SIZE}, 335 .hash_len = AVB_SHA512_DIGEST_SIZE},
|
| A D | avb_crypto.h | 100 size_t hash_len; member
|
| A D | avb_vbmeta_image.c | 144 if (h.hash_size != algorithm->hash_len) { in avb_vbmeta_image_verify()
|
| /lib/rsa/ |
| A D | rsa-verify.c | 64 const uint8_t *hash, int hash_len) in padding_pkcs_15_verify() argument 122 int hash_len = checksum->checksum_len; in mask_generation_function1() local 131 tmp = malloc(hash_len); in mask_generation_function1() 177 region[1].size = hash_len; in compute_hash_prime() 215 int db_len = msg_len - hash_len - 1; in padding_pss_verify() 218 int h_len = hash_len; in padding_pss_verify() 232 hprime = malloc(hash_len); in padding_pss_verify() 287 hash, hash_len, in padding_pss_verify() 291 ret = memcmp(h, hprime, hash_len); in padding_pss_verify() 335 int hash_len; in rsa_verify_key() local [all …]
|
| /lib/mbedtls/external/mbedtls/include/mbedtls/ |
| A D | pk.h | 744 const unsigned char *hash, size_t hash_len, 769 const unsigned char *hash, size_t hash_len, 806 const unsigned char *hash, size_t hash_len, 842 const unsigned char *hash, size_t hash_len, 878 const unsigned char *hash, size_t hash_len, 914 const unsigned char *hash, size_t hash_len,
|
| A D | ssl.h | 1018 size_t hash_len);
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_hkdf.data | 1 HKDF extract fails with hash_len of 0 7 HKDF expand fails with hash_len of 0 10 HKDF expand fails with prk_len < hash_len 13 HKDF expand fails with okm_len / hash_len > 255
|
| A D | test_suite_hkdf.function | 100 void test_hkdf_extract_ret(int hash_len, int ret) 111 fake_md_info.size = hash_len; 127 void test_hkdf_expand_ret(int hash_len, int prk_len, int okm_len, int ret) 138 fake_md_info.size = hash_len;
|
| A D | test_suite_pk.function | 1344 size_t hash_len = sizeof(hash); 1377 hash, hash_len, 1689 size_t hash_len = UINT_MAX + 1, sig_len = UINT_MAX + 1; 1713 MBEDTLS_MD_NONE, hash, hash_len, 1719 TEST_EQUAL(mbedtls_pk_sign(&pk, MBEDTLS_MD_NONE, hash, hash_len, 2002 size_t hash_len = mbedtls_md_get_size_from_type(md_alg); 2021 TEST_ASSERT(hash_len != 0); 2022 rsassa_pss_options.expected_salt_len = hash_len; 2045 size_t hash_len = PSA_HASH_LENGTH(psa_md_alg); 2114 TEST_ASSERT(hash_len != 0); [all …]
|
| A D | test_suite_ssl.function | 1669 size_t const hash_len = PSA_HASH_LENGTH(alg); 1674 exporter_expected->len == hash_len); 1703 size_t const hash_len = PSA_HASH_LENGTH(alg); 1705 secret->len == hash_len && 1708 server_expected->len == hash_len); 1738 size_t const hash_len = PSA_HASH_LENGTH(alg); 1774 size_t const hash_len = PSA_HASH_LENGTH(alg); 1805 size_t const hash_len = PSA_HASH_LENGTH(alg); 1807 transcript->len == hash_len && 1808 binder_expected->len == hash_len); [all …]
|
| A D | test_suite_psa_crypto.function | 3210 size_t hash_len; 3242 hash, sizeof(hash), &hash_len)); 3256 hash, sizeof(hash), &hash_len)); 3276 hash, sizeof(hash), &hash_len), 3283 hash, sizeof(hash), &hash_len)); 3285 hash, sizeof(hash), &hash_len), 3294 hash, sizeof(hash), &hash_len), 3350 size_t hash_len; 3375 size_t hash_len; 3383 hash, sizeof(hash), &hash_len)); [all …]
|
| /lib/efi_loader/ |
| A D | efi_signature.c | 131 int ret, hash_len; in efi_hash_regions() local 136 hash_len = algo_to_len(hash_algo); in efi_hash_regions() 137 if (!hash_len) in efi_hash_regions() 141 *hash = calloc(1, hash_len); in efi_hash_regions() 153 *len = hash_len; in efi_hash_regions() 157 *hash, hash_len, false); in efi_hash_regions()
|
| A D | efi_image_loader.c | 531 int hash_len, ret; in efi_image_verify_digest() local 550 &hash_len)) in efi_image_verify_digest() 554 if (ctx.digest_len != hash_len || memcmp(ctx.digest, hash, hash_len)) in efi_image_verify_digest()
|
| /lib/ |
| A D | tpm-v2.c | 1177 return hash_algo_list[i].hash_len; in tpm2_algorithm_to_len()
|
| /lib/mbedtls/external/mbedtls/programs/ssl/ |
| A D | ssl_server2.c | 1224 size_t hash_len) in ssl_async_sign() argument 1228 hash, hash_len); in ssl_async_sign()
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | 3.0-migration-guide.md | 460 …ture functions in the PK module no longer accept 0 as the `hash_len` parameter. The `hash_len` par…
|