/mbedtls-development/library/ |
A D | hkdf.c | 58 size_t hash_len; in mbedtls_hkdf_extract() local 67 if( hash_len == 0 ) in mbedtls_hkdf_extract() 73 salt_len = hash_len; in mbedtls_hkdf_extract() 83 size_t hash_len; in mbedtls_hkdf_expand() local 97 hash_len = mbedtls_md_get_size( md ); in mbedtls_hkdf_expand() 99 if( prk_len < hash_len || hash_len == 0 ) in mbedtls_hkdf_expand() 110 n = okm_len / hash_len; in mbedtls_hkdf_expand() 112 if( okm_len % hash_len != 0 ) in mbedtls_hkdf_expand() 133 memset( t, 0, hash_len ); in mbedtls_hkdf_expand() 178 where += hash_len; in mbedtls_hkdf_expand() [all …]
|
A D | pk_wrap.c | 78 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 86 if( md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len ) in rsa_verify_wrap() 110 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 117 if( md_alg == MBEDTLS_MD_NONE && UINT_MAX < hash_len ) in rsa_sign_wrap() 251 const unsigned char *hash, size_t hash_len, 273 const unsigned char *hash, size_t hash_len, in eckey_sign_wrap() argument 619 hash, hash_len, in ecdsa_verify_wrap() 678 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 784 if( UINT_MAX < hash_len ) in rsa_alt_sign_wrap() 1028 ((void) hash_len); in pk_opaque_sign_wrap() [all …]
|
A D | pk.c | 238 if( *hash_len != 0 ) in pk_hashlen_helper() 244 *hash_len = mbedtls_md_get_size( md_info ); in pk_hashlen_helper() 277 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() argument 287 pk_hashlen_helper( md_alg, &hash_len ) != 0 ) in mbedtls_pk_verify_restartable() 324 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument 336 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument 398 const unsigned char *hash, size_t hash_len, in mbedtls_pk_sign_restartable() argument 409 pk_hashlen_helper( md_alg, &hash_len ) != 0 ) in mbedtls_pk_sign_restartable() 424 hash, hash_len, in mbedtls_pk_sign_restartable() 441 hash, hash_len, in mbedtls_pk_sign_restartable() [all …]
|
A D | pk_wrap.h | 46 const unsigned char *hash, size_t hash_len, 51 const unsigned char *hash, size_t hash_len, 59 const unsigned char *hash, size_t hash_len, 65 const unsigned char *hash, size_t hash_len,
|
A D | x509write_csr.c | 153 size_t hash_len; in x509write_csr_der_internal() local 228 if( psa_hash_finish( &hash_operation, hash, sizeof( hash ), &hash_len ) in x509write_csr_der_internal()
|
A D | ssl_tls.c | 2738 int ret, hash_len; in mbedtls_ssl_write_finished() local 2752 hash_len = 12; in mbedtls_ssl_write_finished() 2755 ssl->verify_data_len = hash_len; in mbedtls_ssl_write_finished() 2756 memcpy( ssl->own_verify_data, ssl->out_msg + 4, hash_len ); in mbedtls_ssl_write_finished() 2759 ssl->out_msglen = 4 + hash_len; in mbedtls_ssl_write_finished() 2850 unsigned int hash_len; in mbedtls_ssl_parse_finished() local 2871 hash_len = 12; in mbedtls_ssl_parse_finished() 2880 if( ssl->in_hslen != mbedtls_ssl_hs_hdr_len( ssl ) + hash_len ) in mbedtls_ssl_parse_finished() 2889 buf, hash_len ) != 0 ) in mbedtls_ssl_parse_finished() 2898 ssl->verify_data_len = hash_len; in mbedtls_ssl_parse_finished() [all …]
|
A D | x509_crt.c | 2425 size_t hash_len; in x509_crt_check_signature() local 2429 hash_len = mbedtls_md_get_size( md_info ); in x509_crt_check_signature() 2447 if( psa_hash_finish( &hash_operation, hash, sizeof( hash ), &hash_len ) in x509_crt_check_signature() 2461 child->sig_md, hash, hash_len, in x509_crt_check_signature() 2469 child->sig_md, hash, hash_len, in x509_crt_check_signature()
|
/mbedtls-development/include/mbedtls/ |
A D | pk.h | 442 const unsigned char *hash, size_t hash_len, 467 const unsigned char *hash, size_t hash_len, 502 const unsigned char *hash, size_t hash_len, 534 const unsigned char *hash, size_t hash_len, 569 const unsigned char *hash, size_t hash_len,
|
A D | ssl.h | 901 size_t hash_len );
|
/mbedtls-development/tests/suites/ |
A D | test_suite_hkdf.data | 1 HKDF extract fails with hash_len of 0 7 HKDF expand fails with hash_len of 0 10 HKDF expand fails with prk_len < hash_len 13 HKDF expand fails with okm_len / hash_len > 255
|
A D | test_suite_hkdf.function | 103 void test_hkdf_extract_ret( int hash_len, int ret ) 114 fake_md_info.size = hash_len; 130 void test_hkdf_expand_ret( int hash_len, int prk_len, int okm_len, int ret ) 141 fake_md_info.size = hash_len;
|
A D | test_suite_pkcs1_v21.function | 236 size_t hash_len; 260 hash_len = mbedtls_md_get_size( md_info ); 265 hash_len = message_str->len; 269 hash_len, hash_result, 272 TEST_ASSERT( mbedtls_rsa_rsassa_pss_verify_ext( &ctx, msg_digest_id, hash_len,
|
A D | test_suite_pk.function | 439 size_t hash_len; 458 hash_len = mbedtls_md_get_size( md_info ); 463 hash_len = message_str->len; 479 digest, hash_result, hash_len, 626 size_t hash_len = sizeof( hash ); 650 hash, hash_len, 666 hash, hash_len, sig, sig_len ) != 0 ); 671 hash, hash_len, sig, sig_len ) != 0 ); 832 size_t hash_len = SIZE_MAX, sig_len = SIZE_MAX; 848 MBEDTLS_MD_NONE, hash, hash_len, sig, sig_len ) == [all …]
|
A D | test_suite_psa_crypto.function | 1947 size_t hash_len; 1979 hash, sizeof( hash ), &hash_len ) ); 1993 hash, sizeof( hash ), &hash_len ) ); 2013 hash, sizeof( hash ), &hash_len ), 2020 hash, sizeof( hash ), &hash_len ) ); 2022 hash, sizeof( hash ), &hash_len ), 2031 hash, sizeof( hash ), &hash_len ), 2086 size_t hash_len; 2111 size_t hash_len; 2119 hash, sizeof( hash ), &hash_len ) ); [all …]
|
A D | test_suite_pk.data | 235 RSA hash_len overflow (size_t vs unsigned int)
|
/mbedtls-development/programs/ssl/ |
A D | ssl_server2.c | 1122 size_t hash_len ) in ssl_async_sign() argument 1126 hash, hash_len ) ); in ssl_async_sign()
|
/mbedtls-development/docs/ |
A D | 3.0-migration-guide.md | 432 …ture functions in the PK module no longer accept 0 as the `hash_len` parameter. The `hash_len` par…
|