/mbedtls-3.6.0/library/ |
D | rsa.c | 1250 unsigned int hlen; in mgf_mask() local 1268 hlen = mbedtls_md_get_size(md_info); in mgf_mask() 1277 use_len = hlen; in mgf_mask() 1278 if (dlen < hlen) { in mgf_mask() 1321 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument 1345 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime() 1399 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1405 hlen = mbedtls_md_get_size_from_type((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt() 1406 if (hlen == 0) { in mbedtls_rsa_rsaes_oaep_encrypt() 1413 if (ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2) { in mbedtls_rsa_rsaes_oaep_encrypt() [all …]
|
D | pkcs12.c | 281 int use_password, size_t hlen, size_t v) in calculate_hashes() argument 324 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes() 352 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 370 hlen = mbedtls_md_get_size_from_type(md_type); in mbedtls_pkcs12_derivation() 372 if (hlen <= 32) { in mbedtls_pkcs12_derivation() 391 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation() 396 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation() 406 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation()
|
D | ecdsa.c | 641 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 658 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 667 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable() 671 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 690 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 704 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 715 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 747 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
D | psa_crypto_rsa.c | 425 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local 426 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len() 429 } else if (room > hlen) { in rsa_pss_expected_salt_len() 430 return hlen; in rsa_pss_expected_salt_len()
|
D | ssl_tls13_keys.c | 355 size_t hlen; in mbedtls_ssl_tls13_evolve_secret() local 368 hlen = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_evolve_secret() 375 secret_old, hlen, in mbedtls_ssl_tls13_evolve_secret() 379 tmp_secret, hlen); in mbedtls_ssl_tls13_evolve_secret() 392 l_input_len = hlen; in mbedtls_ssl_tls13_evolve_secret() 405 hlen); in mbedtls_ssl_tls13_evolve_secret()
|
D | ssl_tls.c | 6613 size_t *hlen) in ssl_calc_verify_tls_psa() argument 6627 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa() 6632 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_psa() 6643 size_t *hlen) in ssl_calc_verify_tls_legacy() argument 6669 *hlen = mbedtls_md_get_size(mbedtls_md_info_from_ctx(hs_ctx)); in ssl_calc_verify_tls_legacy() 6671 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_legacy() 6683 size_t *hlen) in ssl_calc_verify_tls_sha256() argument 6687 hash, hlen); in ssl_calc_verify_tls_sha256() 6690 hash, hlen); in ssl_calc_verify_tls_sha256() 6698 size_t *hlen) in ssl_calc_verify_tls_sha384() argument [all …]
|
/mbedtls-3.6.0/include/mbedtls/ |
D | ecdsa.h | 474 const unsigned char *hash, size_t hlen, 521 const unsigned char *hash, size_t hlen, 555 const unsigned char *hash, size_t hlen, 590 const unsigned char *hash, size_t hlen,
|
/mbedtls-3.6.0/3rdparty/p256-m/p256-m/ |
D | p256-m.h | 75 const uint8_t *hash, size_t hlen); 90 const uint8_t *hash, size_t hlen);
|
D | p256-m.c | 1298 const uint8_t *h, size_t hlen) in ecdsa_m256_from_hash() argument 1302 if (hlen < 32) { in ecdsa_m256_from_hash() 1306 for (unsigned i = 0; i < hlen; i++) in ecdsa_m256_from_hash() 1307 p[32 - hlen + i] = h[i]; in ecdsa_m256_from_hash() 1324 const uint8_t *hash, size_t hlen) in p256_ecdsa_sign() argument 1365 ecdsa_m256_from_hash(t3, hash, hlen); /* t3 = e */ in p256_ecdsa_sign() 1398 const uint8_t *hash, size_t hlen) in p256_ecdsa_verify() argument 1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify()
|