Searched refs:mbedtls_pk_verify_ext (Results 1 – 9 of 9) sorted by relevance
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_pk.function | 318 mbedtls_pk_verify_ext(pk_type, NULL, 323 mbedtls_pk_verify_ext(pk_type, NULL, 401 TEST_ASSERT(mbedtls_pk_verify_ext(MBEDTLS_PK_NONE, options, 599 ret = mbedtls_pk_verify_ext(pk_type, options, &pk, 610 * However, currently `mbedtls_pk_verify_ext()` may use either the 1076 TEST_ASSERT(mbedtls_pk_verify_ext(MBEDTLS_PK_RSASSA_PSS, NULL, &pk, 1365 TEST_ASSERT(mbedtls_pk_verify_ext(key_pk_type, options, &pk, md_alg, 1442 TEST_EQUAL(mbedtls_pk_verify_ext(key_pk_type, options, &pk, md_alg,
|
D | test_suite_x509write.function | 62 if (mbedtls_pk_verify_ext(csr.sig_pk, csr.sig_opts, &csr.pk,
|
/mbedtls-3.5.0/include/mbedtls/ |
D | pk.h | 541 int mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options,
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 122 - verification: `mbedtls_pk_verify_ext()` 163 The verification is done using `mbedtls_pk_verify_ext()`. 166 `mbedtls_pk_verify_ext()` uses encoding hash = mgf1 hash, it looks like all
|
/mbedtls-3.5.0/library/ |
D | pk.c | 481 int mbedtls_pk_verify_ext(mbedtls_pk_type_t type, const void *options, in mbedtls_pk_verify_ext() function
|
D | x509_crt.c | 1943 if (mbedtls_pk_verify_ext(crl_list->sig_pk, crl_list->sig_opts, &ca->pk, in x509_crt_verifycrl() 2024 return mbedtls_pk_verify_ext(child->sig_pk, child->sig_opts, &parent->pk, in x509_crt_check_signature()
|
D | ssl_tls13_generic.c | 262 if ((ret = mbedtls_pk_verify_ext(sig_alg, options, in ssl_tls13_parse_certificate_verify()
|
D | ssl_tls12_client.c | 2411 ret = mbedtls_pk_verify_ext(pk_alg, &rsassa_pss_options, in ssl_parse_server_key_exchange()
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 464 * `mbedtls_pk_verify_ext`
|