/openthread-3.4.0/third_party/mbedtls/repo/library/ |
D | pk_wrap.c | 79 const unsigned char *sig, size_t sig_len ) in rsa_verify_wrap() argument 90 if( sig_len < rsa_len ) in rsa_verify_wrap() 103 if( sig_len > rsa_len ) in rsa_verify_wrap() 111 unsigned char *sig, size_t *sig_len, in rsa_sign_wrap() argument 121 *sig_len = mbedtls_rsa_get_len( rsa ); in rsa_sign_wrap() 235 const unsigned char *sig, size_t sig_len ); 239 unsigned char *sig, size_t *sig_len, 244 const unsigned char *sig, size_t sig_len ) in eckey_verify_wrap() argument 252 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap() 261 unsigned char *sig, size_t *sig_len, in eckey_sign_wrap() argument [all …]
|
D | pkcs11.c | 172 size_t sig_len = 0, asn_len = 0, oid_size = 0; in mbedtls_pkcs11_sign() local 195 sig_len = ctx->len; in mbedtls_pkcs11_sign() 196 if( hashlen > sig_len || asn_len > sig_len || in mbedtls_pkcs11_sign() 197 hashlen + asn_len > sig_len ) in mbedtls_pkcs11_sign() 230 asn_len + hashlen, sig, &sig_len ) != CKR_OK ) in mbedtls_pkcs11_sign()
|
D | pk.c | 281 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 305 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx ); in mbedtls_pk_verify_restartable() 320 sig, sig_len ) ); in mbedtls_pk_verify_restartable() 328 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument 331 sig, sig_len, NULL ) ); in mbedtls_pk_verify() 340 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument 369 if( sig_len < mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 381 if( sig_len > mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext() 394 return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); in mbedtls_pk_verify_ext() 403 unsigned char *sig, size_t *sig_len, in mbedtls_pk_sign_restartable() argument [all …]
|
D | x509write_csr.c | 147 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 237 if( ( ret = mbedtls_pk_sign( ctx->key, ctx->md_alg, hash, 0, sig, &sig_len, in x509write_csr_der_internal() 270 sig, sig_len ) ); in x509write_csr_der_internal()
|
D | x509write_crt.c | 335 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local 476 hash, 0, sig, &sig_len, in mbedtls_x509write_crt_der() 492 sig_oid, sig_oid_len, sig, sig_len ) ); in mbedtls_x509write_crt_der()
|
D | rsa.c | 2193 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local 2204 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2213 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2214 ( encoded_expected = mbedtls_calloc( 1, sig_len ) ) == NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2220 if( ( ret = rsa_rsassa_pkcs1_v15_encode( md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2239 sig_len ) ) != 0 ) in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2249 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2255 mbedtls_platform_zeroize( encoded_expected, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
D | ssl_cli.c | 3245 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 3321 sig_len = ( p[0] << 8 ) | p[1]; in ssl_parse_server_key_exchange() 3324 if( p != end - sig_len ) in ssl_parse_server_key_exchange() 3334 MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len ); in ssl_parse_server_key_exchange() 3403 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange()
|
D | ssl_srv.c | 4410 size_t i, sig_len; in ssl_parse_certificate_verify() local 4568 sig_len = ( ssl->in_msg[i] << 8 ) | ssl->in_msg[i+1]; in ssl_parse_certificate_verify() 4571 if( i + sig_len != ssl->in_hslen ) in ssl_parse_certificate_verify() 4585 ssl->in_msg + i, sig_len ) ) != 0 ) in ssl_parse_certificate_verify()
|
/openthread-3.4.0/third_party/mbedtls/repo/include/mbedtls/ |
D | pk_internal.h | 51 const unsigned char *sig, size_t sig_len ); 56 unsigned char *sig, size_t *sig_len, 64 const unsigned char *sig, size_t sig_len, 70 unsigned char *sig, size_t *sig_len,
|
D | pk.h | 441 const unsigned char *sig, size_t sig_len ); 466 const unsigned char *sig, size_t sig_len, 501 const unsigned char *sig, size_t sig_len ); 535 unsigned char *sig, size_t *sig_len, 569 unsigned char *sig, size_t *sig_len,
|
/openthread-3.4.0/third_party/mbedtls/repo/programs/pkey/ |
D | ecdsa.c | 112 size_t sig_len; in main() local 187 sig, &sig_len, in main() 193 mbedtls_printf( " ok (signature length = %u)\n", (unsigned int) sig_len ); in main() 195 dump_buf( " + Signature: ", sig, sig_len ); in main() 227 sig, sig_len ) ) != 0 ) in main()
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ecdsa.function | 390 size_t sig_len, i; 405 sig, &sig_len, &mbedtls_test_rnd_pseudo_rand, 408 sig, sig_len ) == 0 ); 411 for( i = sig_len; i < sizeof( sig ); i++ ) 416 sig, sig_len - 1 ) != 0 ); 418 sig, sig_len + 1 ) != 0 ); 423 sig, sig_len ) != 0 ); 429 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED ); 433 sig[sig_len - 1]++; 435 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED ); [all …]
|
D | test_suite_pk.function | 886 size_t sig_len, hash_len; 915 hash, hash_len, sig, &sig_len, 918 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE ); 920 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; 923 hash, hash_len, sig, sig_len ) == verify_ret ); 929 hash, hash_len, sig, sig_len ) != 0 ); 934 hash, hash_len, sig, sig_len ) != 0 ); 939 sig, &sig_len, 943 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE ); 945 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; [all …]
|
/openthread-3.4.0/third_party/mbedtls/repo/programs/test/ |
D | benchmark.c | 876 size_t sig_len; in main() local 897 tmp, &sig_len, myrand, NULL ) ); in main() 913 tmp, &sig_len, myrand, NULL ) != 0 ) in main() 923 tmp, sig_len ) ); in main()
|