/net-tools-3.6.0/mbedtls-2.4.0/library/ |
D | pk_wrap.c | 72 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 82 (unsigned int) hash_len, hash, sig ) ) != 0 ) in rsa_verify_wrap() 92 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 99 md_alg, (unsigned int) hash_len, hash, sig ) ); in rsa_sign_wrap() 198 const unsigned char *hash, size_t hash_len, 202 const unsigned char *hash, size_t hash_len, 207 const unsigned char *hash, size_t hash_len, in eckey_verify_wrap() argument 216 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap() 224 const unsigned char *hash, size_t hash_len, in eckey_sign_wrap() argument 234 ret = ecdsa_sign_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len, in eckey_sign_wrap() [all …]
|
D | pk.c | 160 static inline int pk_hashlen_helper( mbedtls_md_type_t md_alg, size_t *hash_len ) in pk_hashlen_helper() argument 164 if( *hash_len != 0 ) in pk_hashlen_helper() 170 *hash_len = mbedtls_md_get_size( md_info ); in pk_hashlen_helper() 178 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument 182 pk_hashlen_helper( md_alg, &hash_len ) != 0 ) in mbedtls_pk_verify() 188 return( ctx->pk_info->verify_func( ctx->pk_ctx, md_alg, hash, hash_len, in mbedtls_pk_verify() 197 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument 222 md_alg, (unsigned int) hash_len, hash, in mbedtls_pk_verify_ext() 242 return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); in mbedtls_pk_verify_ext() 249 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign() argument [all …]
|
D | ssl_tls.c | 585 size_t hash_len; in mbedtls_ssl_derive_keys() local 598 hash_len = 48; in mbedtls_ssl_derive_keys() 602 hash_len = 32; in mbedtls_ssl_derive_keys() 606 hash_len = 36; in mbedtls_ssl_derive_keys() 608 MBEDTLS_SSL_DEBUG_BUF( 3, "session hash", session_hash, hash_len ); in mbedtls_ssl_derive_keys() 612 session_hash, hash_len, in mbedtls_ssl_derive_keys() 5029 int ret, hash_len; in mbedtls_ssl_write_finished() local 5052 hash_len = ( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) ? 36 : 12; in mbedtls_ssl_write_finished() 5055 ssl->verify_data_len = hash_len; in mbedtls_ssl_write_finished() 5056 memcpy( ssl->own_verify_data, ssl->out_msg + 4, hash_len ); in mbedtls_ssl_write_finished() [all …]
|
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/ |
D | pk_internal.h | 51 const unsigned char *hash, size_t hash_len, 56 const unsigned char *hash, size_t hash_len,
|
D | pk.h | 284 const unsigned char *hash, size_t hash_len, 318 const unsigned char *hash, size_t hash_len, 346 const unsigned char *hash, size_t hash_len,
|
/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs1_v21.function | 227 size_t msg_len, hash_len; 247 hash_len = 0; 252 hash_len = msg_len; 256 msg_digest_id, hash_len, hash_result, 260 msg_digest_id, hash_len, hash_result,
|
D | test_suite_pk.function | 170 size_t hash_len; 192 hash_len = 0; 197 hash_len = msg_len; 213 digest, hash_result, hash_len, 228 size_t hash_len, sig_len, key_len; 232 memset( hash, 0, sizeof( hash ) ); hash_len = unhexify(hash, hash_str); 246 hash, hash_len, sig, sig_len ) == ret );
|
D | test_suite_rsa.function | 127 int hash_len; 157 hash_len = unhexify( hash_result, hash_result_string ); 159 …ctx, &rnd_pseudo_rand, &rnd_info, MBEDTLS_RSA_PRIVATE, MBEDTLS_MD_NONE, hash_len, hash_result, out… 173 hash_len, hash_result, output ) == 0 ); 197 size_t hash_len, olen; 212 hash_len = unhexify( hash_result, hash_result_string ); 215 …sa_pkcs1_verify( &ctx, NULL, NULL, MBEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_len, hash_result, res… 226 ok = olen == hash_len && memcmp( output, hash_result, olen ) == 0;
|