Home
last modified time | relevance | path

Searched refs:hash_len (Results 1 – 19 of 19) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/library/
Dhkdf.c44 size_t hash_len; in mbedtls_hkdf_extract() local
50 hash_len = mbedtls_md_get_size(md); in mbedtls_hkdf_extract()
52 if (hash_len == 0) { in mbedtls_hkdf_extract()
57 salt_len = hash_len; in mbedtls_hkdf_extract()
67 size_t hash_len; in mbedtls_hkdf_expand() local
80 hash_len = mbedtls_md_get_size(md); in mbedtls_hkdf_expand()
82 if (prk_len < hash_len || hash_len == 0) { in mbedtls_hkdf_expand()
91 n = okm_len / hash_len; in mbedtls_hkdf_expand()
93 if (okm_len % hash_len != 0) { in mbedtls_hkdf_expand()
111 memset(t, 0, hash_len); in mbedtls_hkdf_expand()
[all …]
Dssl_tls13_keys.c430 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_derive_early_secrets() local
455 early_secret, hash_len, in mbedtls_ssl_tls13_derive_early_secrets()
460 hash_len); in mbedtls_ssl_tls13_derive_early_secrets()
468 early_secret, hash_len, in mbedtls_ssl_tls13_derive_early_secrets()
473 hash_len); in mbedtls_ssl_tls13_derive_early_secrets()
488 size_t const hash_len = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_derive_handshake_secrets() local
517 handshake_secret, hash_len, in mbedtls_ssl_tls13_derive_handshake_secrets()
522 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets()
534 handshake_secret, hash_len, in mbedtls_ssl_tls13_derive_handshake_secrets()
539 hash_len); in mbedtls_ssl_tls13_derive_handshake_secrets()
[all …]
Dpk_wrap.c66 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument
81 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in rsa_verify_wrap()
113 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap()
131 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument
139 if (md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len) { in rsa_verify_wrap()
149 (unsigned int) hash_len, in rsa_verify_wrap()
170 const unsigned char *hash, size_t hash_len, in mbedtls_pk_psa_rsa_sign_ext() argument
210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext()
231 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument
250 return mbedtls_pk_psa_rsa_sign_ext(psa_alg, pk->pk_ctx, hash, hash_len, in rsa_sign_wrap()
[all …]
Dpk.c997 static inline int pk_hashlen_helper(mbedtls_md_type_t md_alg, size_t *hash_len) in pk_hashlen_helper() argument
999 if (*hash_len != 0) { in pk_hashlen_helper()
1003 *hash_len = mbedtls_md_get_size_from_type(md_alg); in pk_hashlen_helper()
1005 if (*hash_len == 0) { in pk_hashlen_helper()
1044 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() argument
1048 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_restartable()
1053 pk_hashlen_helper(md_alg, &hash_len) != 0) { in mbedtls_pk_verify_restartable()
1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable()
1085 return ctx->pk_info->verify_func(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify_restartable()
1093 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument
[all …]
Dpk_wrap.h37 const unsigned char *hash, size_t hash_len,
42 const unsigned char *hash, size_t hash_len,
50 const unsigned char *hash, size_t hash_len,
56 const unsigned char *hash, size_t hash_len,
131 const unsigned char *hash, size_t hash_len,
Dx509write_csr.c146 size_t hash_len; in x509write_csr_der_internal() local
219 &hash_len) != PSA_SUCCESS) { in x509write_csr_der_internal()
Dssl_tls13_generic.c1522 size_t hash_len; in mbedtls_ssl_reset_transcript_for_hrr() local
1531 &hash_len); in mbedtls_ssl_reset_transcript_for_hrr()
1540 hash_transcript[3] = (unsigned char) hash_len; in mbedtls_ssl_reset_transcript_for_hrr()
1542 hash_len += 4; in mbedtls_ssl_reset_transcript_for_hrr()
1545 hash_transcript, hash_len); in mbedtls_ssl_reset_transcript_for_hrr()
1553 ret = ssl->handshake->update_checksum(ssl, hash_transcript, hash_len); in mbedtls_ssl_reset_transcript_for_hrr()
Dx509_crt.c2126 size_t hash_len; in x509_crt_check_signature() local
2131 hash_len = mbedtls_md_get_size(md_info); in x509_crt_check_signature()
2146 &hash_len); in x509_crt_check_signature()
2160 child->sig_md, hash, hash_len, in x509_crt_check_signature()
2168 child->sig_md, hash, hash_len, in x509_crt_check_signature()
Dssl_tls.c8528 unsigned int hash_len; in mbedtls_ssl_write_finished() local
8545 hash_len = 12; in mbedtls_ssl_write_finished()
8548 ssl->verify_data_len = hash_len; in mbedtls_ssl_write_finished()
8549 memcpy(ssl->own_verify_data, ssl->out_msg + 4, hash_len); in mbedtls_ssl_write_finished()
8552 ssl->out_msglen = 4 + hash_len; in mbedtls_ssl_write_finished()
8642 unsigned int hash_len = 12; in mbedtls_ssl_parse_finished() local
8672 if (ssl->in_hslen != mbedtls_ssl_hs_hdr_len(ssl) + hash_len) { in mbedtls_ssl_parse_finished()
8681 buf, hash_len) != 0) { in mbedtls_ssl_parse_finished()
8690 ssl->verify_data_len = hash_len; in mbedtls_ssl_parse_finished()
8691 memcpy(ssl->peer_verify_data, buf, hash_len); in mbedtls_ssl_parse_finished()
[all …]
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/
Dpk.h744 const unsigned char *hash, size_t hash_len,
769 const unsigned char *hash, size_t hash_len,
806 const unsigned char *hash, size_t hash_len,
842 const unsigned char *hash, size_t hash_len,
878 const unsigned char *hash, size_t hash_len,
914 const unsigned char *hash, size_t hash_len,
Dssl.h1018 size_t hash_len);
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_hkdf.data1 HKDF extract fails with hash_len of 0
7 HKDF expand fails with hash_len of 0
10 HKDF expand fails with prk_len < hash_len
13 HKDF expand fails with okm_len / hash_len > 255
Dtest_suite_hkdf.function100 void test_hkdf_extract_ret(int hash_len, int ret)
111 fake_md_info.size = hash_len;
127 void test_hkdf_expand_ret(int hash_len, int prk_len, int okm_len, int ret)
138 fake_md_info.size = hash_len;
Dtest_suite_pk.function1344 size_t hash_len = sizeof(hash);
1377 hash, hash_len,
1388 hash, hash_len, sig, sig_len) == verify_ret);
1393 hash, hash_len, sig, sig_len) != 0);
1398 hash, hash_len, sig, sig_len) != 0);
1402 TEST_ASSERT(mbedtls_pk_sign(&pk, MBEDTLS_MD_SHA256, hash, hash_len,
1413 hash, hash_len, sig, sig_len, rs_ctx) == verify_ret);
1689 size_t hash_len = UINT_MAX + 1, sig_len = UINT_MAX + 1;
1703 MBEDTLS_MD_NONE, hash, hash_len, sig, sig_len),
1707 TEST_EQUAL(mbedtls_pk_verify(&pk, MBEDTLS_MD_NONE, hash, hash_len,
[all …]
Dtest_suite_ssl.function1669 size_t const hash_len = PSA_HASH_LENGTH(alg);
1671 secret->len == hash_len &&
1672 transcript->len == hash_len &&
1673 traffic_expected->len == hash_len &&
1674 exporter_expected->len == hash_len);
1682 TEST_MEMORY_COMPARE(secrets.client_early_traffic_secret, hash_len,
1684 TEST_MEMORY_COMPARE(secrets.early_exporter_master_secret, hash_len,
1703 size_t const hash_len = PSA_HASH_LENGTH(alg);
1705 secret->len == hash_len &&
1706 transcript->len == hash_len &&
[all …]
Dtest_suite_psa_crypto.function3210 size_t hash_len;
3242 hash, sizeof(hash), &hash_len));
3256 hash, sizeof(hash), &hash_len));
3276 hash, sizeof(hash), &hash_len),
3283 hash, sizeof(hash), &hash_len));
3285 hash, sizeof(hash), &hash_len),
3294 hash, sizeof(hash), &hash_len),
3350 size_t hash_len;
3357 hash, expected_size - 1, &hash_len),
3375 size_t hash_len;
[all …]
Dtest_suite_pk.data617 RSA hash_len overflow (size_t vs unsigned int)
/openthread-latest/third_party/mbedtls/repo/programs/ssl/
Dssl_server2.c1224 size_t hash_len) in ssl_async_sign() argument
1228 hash, hash_len); in ssl_async_sign()
/openthread-latest/third_party/mbedtls/repo/docs/
D3.0-migration-guide.md460 …ture functions in the PK module no longer accept 0 as the `hash_len` parameter. The `hash_len` par…