/openthread-latest/third_party/mbedtls/repo/library/ |
D | pk_wrap.c | 67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument 92 if (sig_len < rsa_len) { in rsa_verify_wrap() 114 sig, sig_len); in rsa_verify_wrap() 132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument 144 if (sig_len < rsa_len) { in rsa_verify_wrap() 159 if (sig_len > rsa_len) { in rsa_verify_wrap() 172 size_t *sig_len) in mbedtls_pk_psa_rsa_sign_ext() argument 188 *sig_len = mbedtls_rsa_get_len(rsa_ctx); in mbedtls_pk_psa_rsa_sign_ext() 189 if (sig_size < *sig_len) { in mbedtls_pk_psa_rsa_sign_ext() 211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext() [all …]
|
D | pk_wrap.h | 38 const unsigned char *sig, size_t sig_len); 43 unsigned char *sig, size_t sig_size, size_t *sig_len, 51 const unsigned char *sig, size_t sig_len, 57 unsigned char *sig, size_t sig_size, size_t *sig_len, 133 size_t *sig_len);
|
D | pk.c | 1045 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1086 sig, sig_len); in mbedtls_pk_verify_restartable() 1094 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() argument 1097 sig, sig_len, NULL); in mbedtls_pk_verify() 1106 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() argument 1126 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1188 signature_length = sig_len > mbedtls_pk_get_len(ctx) ? in mbedtls_pk_verify_ext() 1189 mbedtls_pk_get_len(ctx) : sig_len; in mbedtls_pk_verify_ext() 1194 if (status == PSA_SUCCESS && sig_len > mbedtls_pk_get_len(ctx)) { in mbedtls_pk_verify_ext() [all …]
|
D | x509write_csr.c | 142 size_t pub_len = 0, sig_and_oid_len = 0, sig_len; in x509write_csr_der_internal() local 229 sig, sig_size, &sig_len, in x509write_csr_der_internal() 261 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
|
D | lmots.h | 280 unsigned char *sig, size_t sig_size, size_t *sig_len);
|
D | lmots.c | 689 unsigned char *sig, size_t sig_size, size_t *sig_len) in mbedtls_lmots_sign() argument 764 if (sig_len != NULL) { in mbedtls_lmots_sign() 765 *sig_len = MBEDTLS_LMOTS_SIG_LEN(ctx->params.type); in mbedtls_lmots_sign()
|
D | x509write_crt.c | 432 size_t sub_len = 0, pub_len = 0, sig_and_oid_len = 0, sig_len; in mbedtls_x509write_crt_der() local 617 hash, hash_length, sig, sizeof(sig), &sig_len, in mbedtls_x509write_crt_der() 633 sig, sig_len, pk_alg)); in mbedtls_x509write_crt_der()
|
D | lms.c | 691 size_t *sig_len) in mbedtls_lms_sign() argument 752 if (sig_len != NULL) { in mbedtls_lms_sign() 753 *sig_len = MBEDTLS_LMS_SIG_LEN(ctx->params.type, ctx->params.otstype); in mbedtls_lms_sign()
|
D | rsa.c | 2681 size_t sig_len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() local 2688 sig_len = ctx->len; in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2694 if ((encoded = mbedtls_calloc(1, sig_len)) == NULL || in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2695 (encoded_expected = mbedtls_calloc(1, sig_len)) == NULL) { in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2700 if ((ret = rsa_rsassa_pkcs1_v15_encode(md_alg, hashlen, hash, sig_len, in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2719 sig_len)) != 0) { in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2727 mbedtls_zeroize_and_free(encoded, sig_len); in mbedtls_rsa_rsassa_pkcs1_v15_verify() 2731 mbedtls_zeroize_and_free(encoded_expected, sig_len); in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
D | ssl_tls12_client.c | 2293 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 2357 sig_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_parse_server_key_exchange() 2360 if (p != end - sig_len) { in ssl_parse_server_key_exchange() 2369 MBEDTLS_SSL_DEBUG_BUF(3, "signature", p, sig_len); in ssl_parse_server_key_exchange() 2419 p, sig_len); in ssl_parse_server_key_exchange() 2423 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange()
|
D | ssl_tls12_server.c | 4100 size_t i, sig_len; in ssl_parse_certificate_verify() local 4218 sig_len = MBEDTLS_GET_UINT16_BE(ssl->in_msg, i); in ssl_parse_certificate_verify() 4221 if (i + sig_len != ssl->in_hslen) { in ssl_parse_certificate_verify() 4238 ssl->in_msg + i, sig_len)) != 0) { in ssl_parse_certificate_verify()
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ecdsa.function | 236 size_t sig_len, i; 253 sig, sizeof(sig), &sig_len, 257 sig, sig_len) == 0); 260 for (i = sig_len; i < sizeof(sig); i++) { 266 sig, sig_len - 1) != 0); 268 sig, sig_len + 1) != 0); 273 sig, sig_len) != 0); 279 sig, sig_len) == MBEDTLS_ERR_ECP_VERIFY_FAILED); 283 sig[sig_len - 1]++; 285 sig, sig_len) == MBEDTLS_ERR_ECP_VERIFY_FAILED); [all …]
|
D | test_suite_pk.function | 1158 int salt_len, int sig_len, 1189 result_str->x, sig_len); 1342 size_t sig_len; 1378 sig, sizeof(sig), &sig_len, 1382 TEST_ASSERT(sig_len <= MBEDTLS_PK_SIGNATURE_MAX_SIZE); 1384 sig_len = MBEDTLS_PK_SIGNATURE_MAX_SIZE; 1388 hash, hash_len, sig, sig_len) == verify_ret); 1393 hash, hash_len, sig, sig_len) != 0); 1398 hash, hash_len, sig, sig_len) != 0); 1403 sig, sizeof(sig), &sig_len, [all …]
|
D | test_suite_pk.data | 565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long) 569 Verify ext RSA #14 (PKCS1 v2.1, salt_len = ANY, sig_len too long) 573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short) 577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short) 581 Verify ext RSA #17 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too short) 585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short) 589 Verify ext RSA #19 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too long) 593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
|
/openthread-latest/third_party/mbedtls/repo/programs/pkey/ |
D | ecdsa.c | 89 size_t sig_len; in main() local 163 sig, sizeof(sig), &sig_len, in main() 168 mbedtls_printf(" ok (signature length = %u)\n", (unsigned int) sig_len); in main() 170 dump_buf(" + Signature: ", sig, sig_len); in main() 200 sig, sig_len)) != 0) { in main()
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | pk.h | 745 const unsigned char *sig, size_t sig_len); 770 const unsigned char *sig, size_t sig_len, 807 const unsigned char *sig, size_t sig_len); 843 unsigned char *sig, size_t sig_size, size_t *sig_len, 879 unsigned char *sig, size_t sig_size, size_t *sig_len, 915 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
D | lms.h | 433 size_t *sig_len);
|
/openthread-latest/third_party/mbedtls/repo/programs/test/ |
D | benchmark.c | 1133 size_t sig_len; in main() local 1157 tmp, sizeof(tmp), &sig_len, myrand, in main() 1174 tmp, sizeof(tmp), &sig_len, myrand, NULL) != 0) { in main() 1182 tmp, sig_len)); in main()
|