/mbedtls-3.5.0/library/ |
D | rsa.c | 1089 unsigned int hlen; in mgf_mask() local 1108 hlen = mbedtls_md_get_size(md_info); in mgf_mask() 1115 hlen = PSA_HASH_LENGTH(alg); in mgf_mask() 1125 use_len = hlen; in mgf_mask() 1126 if (dlen < hlen) { in mgf_mask() 1191 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument 1216 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime() 1243 if ((status = psa_hash_update(&op, hash, hlen)) != PSA_SUCCESS) { in hash_mprime() 1310 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1316 hlen = mbedtls_hash_info_get_size((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt() [all …]
|
D | pkcs12.c | 235 int use_password, size_t hlen, size_t v) in calculate_hashes() argument 279 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes() 327 if ((status = psa_hash_compute(alg, hash_output, hlen, hash_output, in calculate_hashes() 359 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 377 hlen = mbedtls_hash_info_get_size(md_type); in mbedtls_pkcs12_derivation() 379 if (hlen <= 32) { in mbedtls_pkcs12_derivation() 398 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation() 403 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation() 413 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation()
|
D | ecdsa.c | 653 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 670 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 679 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable() 683 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 702 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 708 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 716 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 720 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 727 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 759 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
D | psa_crypto_rsa.c | 430 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local 431 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len() 434 } else if (room > hlen) { in rsa_pss_expected_salt_len() 435 return hlen; in rsa_pss_expected_salt_len()
|
D | ssl_tls13_keys.c | 348 size_t hlen; in mbedtls_ssl_tls13_evolve_secret() local 361 hlen = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_evolve_secret() 368 secret_old, hlen, in mbedtls_ssl_tls13_evolve_secret() 372 tmp_secret, hlen); in mbedtls_ssl_tls13_evolve_secret() 385 l_input_len = hlen; in mbedtls_ssl_tls13_evolve_secret() 398 hlen); in mbedtls_ssl_tls13_evolve_secret()
|
D | ssl_tls.c | 6637 size_t *hlen) in ssl_calc_verify_tls_sha256() argument 6655 *hlen = 32; in ssl_calc_verify_tls_sha256() 6656 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha256() 6684 *hlen = 32; in ssl_calc_verify_tls_sha256() 6686 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha256() 6699 size_t *hlen) in ssl_calc_verify_tls_sha384() argument 6717 *hlen = 48; in ssl_calc_verify_tls_sha384() 6718 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha384() 6746 *hlen = 48; in ssl_calc_verify_tls_sha384() 6748 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_sha384()
|
/mbedtls-3.5.0/include/mbedtls/ |
D | ecdsa.h | 484 const unsigned char *hash, size_t hlen, 531 const unsigned char *hash, size_t hlen, 565 const unsigned char *hash, size_t hlen, 600 const unsigned char *hash, size_t hlen,
|