Home
last modified time | relevance | path

Searched refs:hash_len (Results 1 – 8 of 8) sorted by relevance

/net-tools-3.6.0/mbedtls-2.4.0/library/
Dpk_wrap.c72 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument
82 (unsigned int) hash_len, hash, sig ) ) != 0 ) in rsa_verify_wrap()
92 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument
99 md_alg, (unsigned int) hash_len, hash, sig ) ); in rsa_sign_wrap()
198 const unsigned char *hash, size_t hash_len,
202 const unsigned char *hash, size_t hash_len,
207 const unsigned char *hash, size_t hash_len, in eckey_verify_wrap() argument
216 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap()
224 const unsigned char *hash, size_t hash_len, in eckey_sign_wrap() argument
234 ret = ecdsa_sign_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len, in eckey_sign_wrap()
[all …]
Dpk.c160 static inline int pk_hashlen_helper( mbedtls_md_type_t md_alg, size_t *hash_len ) in pk_hashlen_helper() argument
164 if( *hash_len != 0 ) in pk_hashlen_helper()
170 *hash_len = mbedtls_md_get_size( md_info ); in pk_hashlen_helper()
178 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument
182 pk_hashlen_helper( md_alg, &hash_len ) != 0 ) in mbedtls_pk_verify()
188 return( ctx->pk_info->verify_func( ctx->pk_ctx, md_alg, hash, hash_len, in mbedtls_pk_verify()
197 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument
222 md_alg, (unsigned int) hash_len, hash, in mbedtls_pk_verify_ext()
242 return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); in mbedtls_pk_verify_ext()
249 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign() argument
[all …]
Dssl_tls.c585 size_t hash_len; in mbedtls_ssl_derive_keys() local
598 hash_len = 48; in mbedtls_ssl_derive_keys()
602 hash_len = 32; in mbedtls_ssl_derive_keys()
606 hash_len = 36; in mbedtls_ssl_derive_keys()
608 MBEDTLS_SSL_DEBUG_BUF( 3, "session hash", session_hash, hash_len ); in mbedtls_ssl_derive_keys()
612 session_hash, hash_len, in mbedtls_ssl_derive_keys()
5029 int ret, hash_len; in mbedtls_ssl_write_finished() local
5052 hash_len = ( ssl->minor_ver == MBEDTLS_SSL_MINOR_VERSION_0 ) ? 36 : 12; in mbedtls_ssl_write_finished()
5055 ssl->verify_data_len = hash_len; in mbedtls_ssl_write_finished()
5056 memcpy( ssl->own_verify_data, ssl->out_msg + 4, hash_len ); in mbedtls_ssl_write_finished()
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/
Dpk_internal.h51 const unsigned char *hash, size_t hash_len,
56 const unsigned char *hash, size_t hash_len,
Dpk.h284 const unsigned char *hash, size_t hash_len,
318 const unsigned char *hash, size_t hash_len,
346 const unsigned char *hash, size_t hash_len,
/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs1_v21.function227 size_t msg_len, hash_len;
247 hash_len = 0;
252 hash_len = msg_len;
256 msg_digest_id, hash_len, hash_result,
260 msg_digest_id, hash_len, hash_result,
Dtest_suite_pk.function170 size_t hash_len;
192 hash_len = 0;
197 hash_len = msg_len;
213 digest, hash_result, hash_len,
228 size_t hash_len, sig_len, key_len;
232 memset( hash, 0, sizeof( hash ) ); hash_len = unhexify(hash, hash_str);
246 hash, hash_len, sig, sig_len ) == ret );
Dtest_suite_rsa.function127 int hash_len;
157 hash_len = unhexify( hash_result, hash_result_string );
159 …ctx, &rnd_pseudo_rand, &rnd_info, MBEDTLS_RSA_PRIVATE, MBEDTLS_MD_NONE, hash_len, hash_result, out…
173 hash_len, hash_result, output ) == 0 );
197 size_t hash_len, olen;
212 hash_len = unhexify( hash_result, hash_result_string );
215 …sa_pkcs1_verify( &ctx, NULL, NULL, MBEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_len, hash_result, res…
226 ok = olen == hash_len && memcmp( output, hash_result, olen ) == 0;