Home
last modified time | relevance | path

Searched refs:hashlen (Results 1 – 14 of 14) sorted by relevance

/mbedtls-latest/library/
Drsa.c2116 unsigned int hashlen, in rsa_rsassa_pss_sign_no_mode_check() argument
2129 if ((md_alg != MBEDTLS_MD_NONE || hashlen != 0) && hash == NULL) { in rsa_rsassa_pss_sign_no_mode_check()
2146 if (hashlen != exp_hashlen) { in rsa_rsassa_pss_sign_no_mode_check()
2198 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check()
2227 unsigned int hashlen, in rsa_rsassa_pss_sign() argument
2238 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign()
2246 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_no_mode_check() argument
2251 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign_no_mode_check()
2262 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument
2268 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext()
[all …]
Dssl_tls12_client.c2295 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local
2377 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange()
2388 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange()
2420 md_alg, hash, hashlen, in ssl_parse_server_key_exchange()
2425 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange()
3249 size_t hashlen; in ssl_write_certificate_verify() local
3300 ret = ssl->handshake->calc_verify(ssl, hash, &hashlen); in ssl_write_certificate_verify()
3332 hashlen = 0; in ssl_write_certificate_verify()
3342 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
Drsa_internal.h116 unsigned int hashlen,
Dssl_tls12_server.c3123 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local
3158 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_prepare_server_key_exchange()
3170 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_prepare_server_key_exchange()
3198 md_alg, hash, hashlen); in ssl_prepare_server_key_exchange()
3227 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange()
4110 size_t hashlen; in ssl_parse_certificate_verify() local
4196 hashlen = 0; in ssl_parse_certificate_verify()
4244 md_alg, hash_start, hashlen, in ssl_parse_certificate_verify()
Dpkcs7.c736 size_t hashlen) in mbedtls_pkcs7_signed_hash_verify() argument
741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
Dssl_misc.h1789 unsigned char *hash, size_t *hashlen,
Dssl_tls.c9105 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument
9134 hashlen)) != PSA_SUCCESS) { in mbedtls_ssl_get_key_exchange_md_tls1_2()
9161 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument
9168 *hashlen = mbedtls_md_get_size(md_info); in mbedtls_ssl_get_key_exchange_md_tls1_2()
/mbedtls-latest/include/mbedtls/
Drsa.h855 unsigned int hashlen,
887 unsigned int hashlen,
939 unsigned int hashlen,
989 unsigned int hashlen,
1022 unsigned int hashlen,
1047 unsigned int hashlen,
1082 unsigned int hashlen,
1122 unsigned int hashlen,
Dpkcs7.h226 const unsigned char *hash, size_t hashlen);
Dpk.h290 mbedtls_md_type_t md_alg, unsigned int hashlen,
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md137 - salt length can be either "standard" (<= hashlen, see note) or "any"
139 - salt length: always <= hashlen (see note) and random salt
141 - salt length: either <= hashlen (see note), or any depending on algorithm
143 Note: above, "<= hashlen" means that hashlen is used if possible, but if it
179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f).
180 The `certtool` command provided by GnuTLS seems to be picking saltlen = hashlen
182 hashlen.
256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is
257 using saltlen = hashlen.
287 all using saltlen = keylen - hashlen - 2.
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_x509write.function27 mbedtls_md_type_t md_alg, unsigned int hashlen,
31 md_alg, hashlen, hash, sig);
Dtest_suite_pk.function481 mbedtls_md_type_t md_alg, unsigned int hashlen,
488 md_alg, hashlen, hash, sig);
/mbedtls-latest/docs/
D3.0-migration-guide.md448 All the functions in the RSA module that accept a `hashlen` parameter used to
450 data was signed. The `hashlen` parameter is now always the size that is read