Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 18 of 18) sorted by relevance

/mbedtls-latest/library/
Dpk_wrap.c67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument
92 if (sig_len < rsa_len) { in rsa_verify_wrap()
114 sig, sig_len); in rsa_verify_wrap()
132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument
144 if (sig_len < rsa_len) { in rsa_verify_wrap()
159 if (sig_len > rsa_len) { in rsa_verify_wrap()
172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext() argument
188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext()
189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext()
211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext()
[all …]
Dpk.c1041 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument
1065 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable()
1082 sig, sig_len); in mbedtls_pk_verify_restartable()
1090 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() argument
1093 sig, sig_len, NULL); in mbedtls_pk_verify()
1102 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() argument
1122 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext()
1184 signature_length = sig_len > mbedtls_pk_get_len(ctx) ? in mbedtls_pk_verify_ext()
1185 mbedtls_pk_get_len(ctx) : sig_len; in mbedtls_pk_verify_ext()
1190 if (status == PSA_SUCCESS && sig_len > mbedtls_pk_get_len(ctx)) { in mbedtls_pk_verify_ext()
[all …]
Dpk_wrap.h38 const unsigned char *sig, size_t sig_len);
43 unsigned char *sig, size_t sig_size, size_t *sig_len,
51 const unsigned char *sig, size_t sig_len,
57 unsigned char *sig, size_t sig_size, size_t *sig_len,
133 size_t *sig_len);
Dx509write_csr.c146 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local
233 sig, sig_size, &sig_len, in x509write_csr_der_internal()
265 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
Dlmots.c697 unsigned char *sig, size_t sig_size, size_t *sig_len) in mbedtls_lmots_sign() argument
772 if (sig_len != NULL) { in mbedtls_lmots_sign()
773 *sig_len = MBEDTLS_LMOTS_SIG_LEN(ctx->params.type); in mbedtls_lmots_sign()
Dx509write_crt.c436 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local
621 hash, hash_length, sig, sizeof(sig), &sig_len, in mbedtls_x509write_crt_der()
637 sig, sig_len, pk_alg)); in mbedtls_x509write_crt_der()
Dlms.c699 size_t *sig_len) in mbedtls_lms_sign() argument
760 if (sig_len != NULL) { in mbedtls_lms_sign()
761 *sig_len = MBEDTLS_LMS_SIG_LEN(ctx->params.type, ctx->params.otstype); in mbedtls_lms_sign()
Drsa.c2682 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local
2689 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2695 if ((encoded = mbedtls_calloc(1, sig_len)) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2696 (encoded_expected = mbedtls_calloc(1, sig_len)) == NULL) { in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2701 if ((ret = rsa_rsassa_pkcs1_v15_encode(md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2720 sig_len)) != 0) { in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2728 mbedtls_zeroize_and_free(encoded, sig_len); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2732 mbedtls_zeroize_and_free(encoded_expected, sig_len); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
Dlmots.h280 unsigned char *sig, size_t sig_size, size_t *sig_len);
Dssl_tls12_client.c2295 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local
2359 sig_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_parse_server_key_exchange()
2362 if (p != end - sig_len) { in ssl_parse_server_key_exchange()
2371 MBEDTLS_SSL_DEBUG_BUF(3, "signature", p, sig_len); in ssl_parse_server_key_exchange()
2421 p, sig_len); in ssl_parse_server_key_exchange()
2425 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange()
Dssl_tls12_server.c4107 size_t i, sig_len; in ssl_parse_certificate_verify() local
4225 sig_len = MBEDTLS_GET_UINT16_BE(ssl->in_msg, i); in ssl_parse_certificate_verify()
4228 if (i + sig_len != ssl->in_hslen) { in ssl_parse_certificate_verify()
4245 ssl->in_msg + i, sig_len)) != 0) { in ssl_parse_certificate_verify()
/mbedtls-latest/tests/suites/
Dtest_suite_ecdsa.function236 size_t sig_len, i;
253 sig, sizeof(sig), &sig_len,
257 sig, sig_len) == 0);
260 for (i = sig_len; i < sizeof(sig); i++) {
266 sig, sig_len - 1) != 0);
268 sig, sig_len + 1) != 0);
273 sig, sig_len) != 0);
279 sig, sig_len) == MBEDTLS_ERR_ECP_VERIFY_FAILED);
283 sig[sig_len - 1]++;
285 sig, sig_len) == MBEDTLS_ERR_ECP_VERIFY_FAILED);
[all …]
Dtest_suite_pk.function1140 int salt_len, int sig_len,
1171 result_str->x, sig_len);
1324 size_t sig_len;
1359 sig, sizeof(sig), &sig_len,
1363 TEST_ASSERT(sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE);
1365 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE;
1369 hash, hash_len, sig, sig_len) == verify_ret);
1374 hash, hash_len, sig, sig_len) != 0);
1379 hash, hash_len, sig, sig_len) != 0);
1384 sig, sizeof(sig), &sig_len,
[all …]
Dtest_suite_pk.data565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long)
569 Verify ext RSA #14 (PKCS1 v2.1, salt_len = ANY, sig_len too long)
573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short)
577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
581 Verify ext RSA #17 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too short)
585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
589 Verify ext RSA #19 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too long)
593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
/mbedtls-latest/programs/pkey/
Decdsa.c89 size_t sig_len; in main() local
163 sig, sizeof(sig), &sig_len, in main()
168 mbedtls_printf(" ok (signature length = %u)\n", (unsigned int) sig_len); in main()
170 dump_buf(" + Signature: ", sig, sig_len); in main()
200 sig, sig_len)) != 0) { in main()
/mbedtls-latest/include/mbedtls/
Dpk.h753 const unsigned char *sig, size_t sig_len);
778 const unsigned char *sig, size_t sig_len,
815 const unsigned char *sig, size_t sig_len);
851 unsigned char *sig, size_t sig_size, size_t *sig_len,
887 unsigned char *sig, size_t sig_size, size_t *sig_len,
923 unsigned char *sig, size_t sig_size, size_t *sig_len,
Dlms.h433 size_t *sig_len);
/mbedtls-latest/programs/test/
Dbenchmark.c1133 size_t sig_len; in main() local
1157 tmp, sizeof(tmp), &sig_len, myrand, in main()
1174 tmp, sizeof(tmp), &sig_len, myrand, NULL) != 0) { in main()
1182 tmp, sig_len)); in main()