| /optee_os/core/lib/libtomcrypt/src/pk/dsa/ |
| H A D | dsa_verify_hash.c | 24 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash_raw() argument 50 hashlen = MIN(hashlen, (unsigned long)(key->qord)); in dsa_verify_hash_raw() 56 …if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 90 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash() argument 119 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); in dsa_verify_hash()
|
| /optee_os/core/lib/libtomcrypt/src/pk/rsa/ |
| H A D | rsa_verify_hash.c | 27 const unsigned char *hash, unsigned long hashlen, in rsa_verify_hash_ex() argument 95 … err = pkcs_1_pss_decode(hash, hashlen, tmpbuf+1, x-1, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 98 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 167 (siginfo[1].size == hashlen)) { in rsa_verify_hash_ex() 170 siginfo[1].data, hash, hashlen) == 0) { in rsa_verify_hash_ex() 177 if (hashlen == outlen) { in rsa_verify_hash_ex() 179 out, hash, hashlen) == 0) { in rsa_verify_hash_ex()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | rsa.h | 855 unsigned int hashlen, 887 unsigned int hashlen, 939 unsigned int hashlen, 989 unsigned int hashlen, 1022 unsigned int hashlen, 1047 unsigned int hashlen, 1082 unsigned int hashlen, 1122 unsigned int hashlen,
|
| H A D | pkcs7.h | 226 const unsigned char *hash, size_t hashlen);
|
| H A D | pk.h | 290 mbedtls_md_type_t md_alg, unsigned int hashlen,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | rsa.c | 2121 unsigned int hashlen, in rsa_rsassa_pss_sign_no_mode_check() argument 2134 if ((md_alg != MBEDTLS_MD_NONE || hashlen != 0) && hash == NULL) { in rsa_rsassa_pss_sign_no_mode_check() 2151 if (hashlen != exp_hashlen) { in rsa_rsassa_pss_sign_no_mode_check() 2203 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check() 2235 unsigned int hashlen, in rsa_rsassa_pss_sign() argument 2246 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign() 2254 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_no_mode_check() argument 2259 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign_no_mode_check() 2270 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 2276 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext() [all …]
|
| H A D | rsa_internal.h | 116 unsigned int hashlen,
|
| H A D | ssl_tls12_client.c | 2295 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 2377 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 2388 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange() 2420 md_alg, hash, hashlen, in ssl_parse_server_key_exchange() 2425 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange() 3249 size_t hashlen; in ssl_write_certificate_verify() local 3300 ret = ssl->handshake->calc_verify(ssl, hash, &hashlen); in ssl_write_certificate_verify() 3332 hashlen = 0; in ssl_write_certificate_verify() 3342 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
|
| H A D | pkcs7.c | 736 size_t hashlen) in mbedtls_pkcs7_signed_hash_verify() argument 741 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
| H A D | ssl_tls12_server.c | 3101 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local 3136 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_prepare_server_key_exchange() 3148 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_prepare_server_key_exchange() 3176 md_alg, hash, hashlen); in ssl_prepare_server_key_exchange() 3205 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange() 4088 size_t hashlen; in ssl_parse_certificate_verify() local 4174 hashlen = 0; in ssl_parse_certificate_verify() 4222 md_alg, hash_start, hashlen, in ssl_parse_certificate_verify()
|
| H A D | ssl_misc.h | 1812 unsigned char *hash, size_t *hashlen,
|
| H A D | ssl_tls.c | 9166 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 9195 hashlen)) != PSA_SUCCESS) { in mbedtls_ssl_get_key_exchange_md_tls1_2() 9222 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 9229 *hashlen = mbedtls_md_get_size(md_info); in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
| /optee_os/core/lib/libtomcrypt/src/pk/ecc/ |
| H A D | ecc_verify_hash.c | 25 const unsigned char *hash, unsigned long hashlen, in ecc_verify_hash_ex() argument 132 if (pbits > hashlen*8) { in ecc_verify_hash_ex() 133 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_verify_hash_ex()
|
| H A D | ecc_recover_key.c | 27 const unsigned char *hash, unsigned long hashlen, in ecc_recover_key() argument 152 if (pbits > hashlen*8) { in ecc_recover_key() 153 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, hashlen)) != CRYPT_OK) … in ecc_recover_key()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_pk.h | 68 #define rsa_verify_hash(sig, siglen, hash, hashlen, hash_idx, saltlen, stat, key) \ argument 69 rsa_verify_hash_ex(sig, siglen, hash, hashlen, LTC_PKCS_1_PSS, hash_idx, saltlen, stat, key) 98 const unsigned char *hash, unsigned long hashlen, 316 const unsigned char *hash, unsigned long hashlen, 320 const unsigned char *hash, unsigned long hashlen, 464 const unsigned char *hash, unsigned long hashlen, 468 const unsigned char *hash, unsigned long hashlen,
|