/mbedtls-latest/library/ |
D | rsa.c | 2116 unsigned int hashlen, in rsa_rsassa_pss_sign_no_mode_check() argument 2129 if ((md_alg != MBEDTLS_MD_NONE || hashlen != 0) && hash == NULL) { in rsa_rsassa_pss_sign_no_mode_check() 2146 if (hashlen != exp_hashlen) { in rsa_rsassa_pss_sign_no_mode_check() 2198 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check() 2227 unsigned int hashlen, in rsa_rsassa_pss_sign() argument 2238 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign() 2246 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_no_mode_check() argument 2251 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign_no_mode_check() 2262 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 2268 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext() [all …]
|
D | ssl_tls12_client.c | 2295 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 2377 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 2388 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange() 2420 md_alg, hash, hashlen, in ssl_parse_server_key_exchange() 2425 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange() 3249 size_t hashlen; in ssl_write_certificate_verify() local 3300 ret = ssl->handshake->calc_verify(ssl, hash, &hashlen); in ssl_write_certificate_verify() 3332 hashlen = 0; in ssl_write_certificate_verify() 3342 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
|
D | rsa_internal.h | 116 unsigned int hashlen,
|
D | ssl_tls12_server.c | 3123 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local 3158 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_prepare_server_key_exchange() 3170 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_prepare_server_key_exchange() 3198 md_alg, hash, hashlen); in ssl_prepare_server_key_exchange() 3227 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange() 4110 size_t hashlen; in ssl_parse_certificate_verify() local 4196 hashlen = 0; in ssl_parse_certificate_verify() 4244 md_alg, hash_start, hashlen, in ssl_parse_certificate_verify()
|
D | pkcs7.c | 736 size_t hashlen) in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
D | ssl_misc.h | 1789 unsigned char *hash, size_t *hashlen,
|
D | ssl_tls.c | 9105 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 9134 hashlen)) != PSA_SUCCESS) { in mbedtls_ssl_get_key_exchange_md_tls1_2() 9161 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 9168 *hashlen = mbedtls_md_get_size(md_info); in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
/mbedtls-latest/include/mbedtls/ |
D | rsa.h | 855 unsigned int hashlen, 887 unsigned int hashlen, 939 unsigned int hashlen, 989 unsigned int hashlen, 1022 unsigned int hashlen, 1047 unsigned int hashlen, 1082 unsigned int hashlen, 1122 unsigned int hashlen,
|
D | pkcs7.h | 226 const unsigned char *hash, size_t hashlen);
|
D | pk.h | 290 mbedtls_md_type_t md_alg, unsigned int hashlen,
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 137 - salt length can be either "standard" (<= hashlen, see note) or "any" 139 - salt length: always <= hashlen (see note) and random salt 141 - salt length: either <= hashlen (see note), or any depending on algorithm 143 Note: above, "<= hashlen" means that hashlen is used if possible, but if it 179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f). 180 The `certtool` command provided by GnuTLS seems to be picking saltlen = hashlen 182 hashlen. 256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is 257 using saltlen = hashlen. 287 all using saltlen = keylen - hashlen - 2. [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509write.function | 27 mbedtls_md_type_t md_alg, unsigned int hashlen, 31 md_alg, hashlen, hash, sig);
|
D | test_suite_pk.function | 481 mbedtls_md_type_t md_alg, unsigned int hashlen, 488 md_alg, hashlen, hash, sig);
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 448 All the functions in the RSA module that accept a `hashlen` parameter used to 450 data was signed. The `hashlen` parameter is now always the size that is read
|