Home
last modified time | relevance | path

Searched refs:hlen (Results 1 – 9 of 9) sorted by relevance

/mbedtls-3.6.0/library/
Drsa.c1250 unsigned int hlen; in mgf_mask() local
1268 hlen = mbedtls_md_get_size(md_info); in mgf_mask()
1277 use_len = hlen; in mgf_mask()
1278 if (dlen < hlen) { in mgf_mask()
1321 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument
1345 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime()
1399 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local
1405 hlen = mbedtls_md_get_size_from_type((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt()
1406 if (hlen == 0) { in mbedtls_rsa_rsaes_oaep_encrypt()
1413 if (ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2) { in mbedtls_rsa_rsaes_oaep_encrypt()
[all …]
Dpkcs12.c281 int use_password, size_t hlen, size_t v) in calculate_hashes() argument
324 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes()
352 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local
370 hlen = mbedtls_md_get_size_from_type(md_type); in mbedtls_pkcs12_derivation()
372 if (hlen <= 32) { in mbedtls_pkcs12_derivation()
391 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation()
396 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation()
406 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation()
Decdsa.c641 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument
658 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable()
667 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable()
671 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable()
690 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument
696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature()
704 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument
708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature()
715 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument
747 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable()
[all …]
Dpsa_crypto_rsa.c425 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local
426 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len()
429 } else if (room > hlen) { in rsa_pss_expected_salt_len()
430 return hlen; in rsa_pss_expected_salt_len()
Dssl_tls13_keys.c355 size_t hlen; in mbedtls_ssl_tls13_evolve_secret() local
368 hlen = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_evolve_secret()
375 secret_old, hlen, in mbedtls_ssl_tls13_evolve_secret()
379 tmp_secret, hlen); in mbedtls_ssl_tls13_evolve_secret()
392 l_input_len = hlen; in mbedtls_ssl_tls13_evolve_secret()
405 hlen); in mbedtls_ssl_tls13_evolve_secret()
Dssl_tls.c6613 size_t *hlen) in ssl_calc_verify_tls_psa() argument
6627 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa()
6632 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_psa()
6643 size_t *hlen) in ssl_calc_verify_tls_legacy() argument
6669 *hlen = mbedtls_md_get_size(mbedtls_md_info_from_ctx(hs_ctx)); in ssl_calc_verify_tls_legacy()
6671 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_legacy()
6683 size_t *hlen) in ssl_calc_verify_tls_sha256() argument
6687 hash, hlen); in ssl_calc_verify_tls_sha256()
6690 hash, hlen); in ssl_calc_verify_tls_sha256()
6698 size_t *hlen) in ssl_calc_verify_tls_sha384() argument
[all …]
/mbedtls-3.6.0/include/mbedtls/
Decdsa.h474 const unsigned char *hash, size_t hlen,
521 const unsigned char *hash, size_t hlen,
555 const unsigned char *hash, size_t hlen,
590 const unsigned char *hash, size_t hlen,
/mbedtls-3.6.0/3rdparty/p256-m/p256-m/
Dp256-m.h75 const uint8_t *hash, size_t hlen);
90 const uint8_t *hash, size_t hlen);
Dp256-m.c1298 const uint8_t *h, size_t hlen) in ecdsa_m256_from_hash() argument
1302 if (hlen < 32) { in ecdsa_m256_from_hash()
1306 for (unsigned i = 0; i < hlen; i++) in ecdsa_m256_from_hash()
1307 p[32 - hlen + i] = h[i]; in ecdsa_m256_from_hash()
1324 const uint8_t *hash, size_t hlen) in p256_ecdsa_sign() argument
1365 ecdsa_m256_from_hash(t3, hash, hlen); /* t3 = e */ in p256_ecdsa_sign()
1398 const uint8_t *hash, size_t hlen) in p256_ecdsa_verify() argument
1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify()