Home
last modified time | relevance | path

Searched refs:hlen (Results 1 – 7 of 7) sorted by relevance

/mbedtls-3.5.0/library/
Drsa.c1089 unsigned int hlen; in mgf_mask() local
1108 hlen = mbedtls_md_get_size(md_info); in mgf_mask()
1115 hlen = PSA_HASH_LENGTH(alg); in mgf_mask()
1125 use_len = hlen; in mgf_mask()
1126 if (dlen < hlen) { in mgf_mask()
1191 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument
1216 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime()
1243 if ((status = psa_hash_update(&op, hash, hlen)) != PSA_SUCCESS) { in hash_mprime()
1310 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local
1316 hlen = mbedtls_hash_info_get_size((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt()
[all …]
Dpkcs12.c235 int use_password, size_t hlen, size_t v) in calculate_hashes() argument
279 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes()
327 if ((status = psa_hash_compute(alg, hash_output, hlen, hash_output, in calculate_hashes()
359 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local
377 hlen = mbedtls_hash_info_get_size(md_type); in mbedtls_pkcs12_derivation()
379 if (hlen <= 32) { in mbedtls_pkcs12_derivation()
398 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation()
403 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation()
413 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation()
Decdsa.c653 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument
670 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable()
679 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable()
683 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable()
702 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument
708 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature()
716 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument
720 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature()
727 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument
759 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable()
[all …]
Dpsa_crypto_rsa.c430 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local
431 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len()
434 } else if (room > hlen) { in rsa_pss_expected_salt_len()
435 return hlen; in rsa_pss_expected_salt_len()
Dssl_tls13_keys.c348 size_t hlen; in mbedtls_ssl_tls13_evolve_secret() local
361 hlen = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_evolve_secret()
368 secret_old, hlen, in mbedtls_ssl_tls13_evolve_secret()
372 tmp_secret, hlen); in mbedtls_ssl_tls13_evolve_secret()
385 l_input_len = hlen; in mbedtls_ssl_tls13_evolve_secret()
398 hlen); in mbedtls_ssl_tls13_evolve_secret()
Dssl_tls.c6637 size_t *hlen) in ssl_calc_verify_tls_sha256() argument
6655 *hlen = 32; in ssl_calc_verify_tls_sha256()
6656 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha256()
6684 *hlen = 32; in ssl_calc_verify_tls_sha256()
6686 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha256()
6699 size_t *hlen) in ssl_calc_verify_tls_sha384() argument
6717 *hlen = 48; in ssl_calc_verify_tls_sha384()
6718 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha384()
6746 *hlen = 48; in ssl_calc_verify_tls_sha384()
6748 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha384()
/mbedtls-3.5.0/include/mbedtls/
Decdsa.h484 const unsigned char *hash, size_t hlen,
531 const unsigned char *hash, size_t hlen,
565 const unsigned char *hash, size_t hlen,
600 const unsigned char *hash, size_t hlen,