Home
last modified time | relevance | path

Searched refs:sig_len (Results 1 – 14 of 14) sorted by relevance

/openthread-3.4.0/third_party/mbedtls/repo/library/
Dpk_wrap.c79 const unsigned char *sig, size_t sig_len ) in rsa_verify_wrap() argument
90 if( sig_len < rsa_len ) in rsa_verify_wrap()
103 if( sig_len > rsa_len ) in rsa_verify_wrap()
111 unsigned char *sig, size_t *sig_len, in rsa_sign_wrap() argument
121 *sig_len = mbedtls_rsa_get_len( rsa ); in rsa_sign_wrap()
235 const unsigned char *sig, size_t sig_len );
239 unsigned char *sig, size_t *sig_len,
244 const unsigned char *sig, size_t sig_len ) in eckey_verify_wrap() argument
252 ret = ecdsa_verify_wrap( &ecdsa, md_alg, hash, hash_len, sig, sig_len ); in eckey_verify_wrap()
261 unsigned char *sig, size_t *sig_len, in eckey_sign_wrap() argument
[all …]
Dpkcs11.c172 size_t sig_len = 0, asn_len = 0, oid_size = 0; in mbedtls_pkcs11_sign() local
195 sig_len = ctx->len; in mbedtls_pkcs11_sign()
196 if( hashlen > sig_len || asn_len > sig_len || in mbedtls_pkcs11_sign()
197 hashlen + asn_len > sig_len ) in mbedtls_pkcs11_sign()
230 asn_len + hashlen, sig, &sig_len ) != CKR_OK ) in mbedtls_pkcs11_sign()
Dpk.c281 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument
305 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx ); in mbedtls_pk_verify_restartable()
320 sig, sig_len ) ); in mbedtls_pk_verify_restartable()
328 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument
331 sig, sig_len, NULL ) ); in mbedtls_pk_verify()
340 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument
369 if( sig_len < mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext()
381 if( sig_len > mbedtls_pk_get_len( ctx ) ) in mbedtls_pk_verify_ext()
394 return( mbedtls_pk_verify( ctx, md_alg, hash, hash_len, sig, sig_len ) ); in mbedtls_pk_verify_ext()
403 unsigned char *sig, size_t *sig_len, in mbedtls_pk_sign_restartable() argument
[all …]
Dx509write_csr.c147 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local
237 if( ( ret = mbedtls_pk_sign( ctx->key, ctx->md_alg, hash, 0, sig, &sig_len, in x509write_csr_der_internal()
270 sig, sig_len ) ); in x509write_csr_der_internal()
Dx509write_crt.c335 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local
476 hash, 0, sig, &sig_len, in mbedtls_x509write_crt_der()
492 sig_oid, sig_oid_len, sig, sig_len ) ); in mbedtls_x509write_crt_der()
Drsa.c2193 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local
2204 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2213 if( ( encoded = mbedtls_calloc( 1, sig_len ) ) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2214 ( encoded_expected = mbedtls_calloc( 1, sig_len ) ) == NULL ) in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2220 if( ( ret = rsa_rsassa_pkcs1_v15_encode( md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2239 sig_len ) ) != 0 ) in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2249 mbedtls_platform_zeroize( encoded, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
2255 mbedtls_platform_zeroize( encoded_expected, sig_len ); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
Dssl_cli.c3245 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local
3321 sig_len = ( p[0] << 8 ) | p[1]; in ssl_parse_server_key_exchange()
3324 if( p != end - sig_len ) in ssl_parse_server_key_exchange()
3334 MBEDTLS_SSL_DEBUG_BUF( 3, "signature", p, sig_len ); in ssl_parse_server_key_exchange()
3403 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange()
Dssl_srv.c4410 size_t i, sig_len; in ssl_parse_certificate_verify() local
4568 sig_len = ( ssl->in_msg[i] << 8 ) | ssl->in_msg[i+1]; in ssl_parse_certificate_verify()
4571 if( i + sig_len != ssl->in_hslen ) in ssl_parse_certificate_verify()
4585 ssl->in_msg + i, sig_len ) ) != 0 ) in ssl_parse_certificate_verify()
/openthread-3.4.0/third_party/mbedtls/repo/include/mbedtls/
Dpk_internal.h51 const unsigned char *sig, size_t sig_len );
56 unsigned char *sig, size_t *sig_len,
64 const unsigned char *sig, size_t sig_len,
70 unsigned char *sig, size_t *sig_len,
Dpk.h441 const unsigned char *sig, size_t sig_len );
466 const unsigned char *sig, size_t sig_len,
501 const unsigned char *sig, size_t sig_len );
535 unsigned char *sig, size_t *sig_len,
569 unsigned char *sig, size_t *sig_len,
/openthread-3.4.0/third_party/mbedtls/repo/programs/pkey/
Decdsa.c112 size_t sig_len; in main() local
187 sig, &sig_len, in main()
193 mbedtls_printf( " ok (signature length = %u)\n", (unsigned int) sig_len ); in main()
195 dump_buf( " + Signature: ", sig, sig_len ); in main()
227 sig, sig_len ) ) != 0 ) in main()
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ecdsa.function390 size_t sig_len, i;
405 sig, &sig_len, &mbedtls_test_rnd_pseudo_rand,
408 sig, sig_len ) == 0 );
411 for( i = sig_len; i < sizeof( sig ); i++ )
416 sig, sig_len - 1 ) != 0 );
418 sig, sig_len + 1 ) != 0 );
423 sig, sig_len ) != 0 );
429 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
433 sig[sig_len - 1]++;
435 sig, sig_len ) == MBEDTLS_ERR_ECP_VERIFY_FAILED );
[all …]
Dtest_suite_pk.function886 size_t sig_len, hash_len;
915 hash, hash_len, sig, &sig_len,
918 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE );
920 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE;
923 hash, hash_len, sig, sig_len ) == verify_ret );
929 hash, hash_len, sig, sig_len ) != 0 );
934 hash, hash_len, sig, sig_len ) != 0 );
939 sig, &sig_len,
943 TEST_ASSERT( sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE );
945 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE;
[all …]
/openthread-3.4.0/third_party/mbedtls/repo/programs/test/
Dbenchmark.c876 size_t sig_len; in main() local
897 tmp, &sig_len, myrand, NULL ) ); in main()
913 tmp, &sig_len, myrand, NULL ) != 0 ) in main()
923 tmp, sig_len ) ); in main()