| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | rsa.c | 1625 unsigned int hlen; in mgf_mask() local 1643 hlen = mbedtls_md_get_size(md_info); in mgf_mask() 1652 use_len = hlen; in mgf_mask() 1653 if (dlen < hlen) { in mgf_mask() 1696 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument 1720 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime() 1774 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1780 hlen = mbedtls_md_get_size_from_type((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt() 1781 if (hlen == 0) { in mbedtls_rsa_rsaes_oaep_encrypt() 1788 if (ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2) { in mbedtls_rsa_rsaes_oaep_encrypt() [all …]
|
| H A D | pkcs12.c | 271 int use_password, size_t hlen, size_t v) in calculate_hashes() argument 314 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes() 342 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 360 hlen = mbedtls_md_get_size_from_type(md_type); in mbedtls_pkcs12_derivation() 362 if (hlen <= 32) { in mbedtls_pkcs12_derivation() 381 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation() 386 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation() 396 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation()
|
| H A D | ecdsa.c | 641 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 658 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 667 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable() 671 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 690 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 704 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 715 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 747 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
| H A D | psa_crypto_rsa.c | 403 int hlen = (int) hash_length; // known to fit in rsa_pss_expected_salt_len() local 404 int room = klen - 2 - hlen; in rsa_pss_expected_salt_len() 407 } else if (room > hlen) { in rsa_pss_expected_salt_len() 408 return hlen; in rsa_pss_expected_salt_len()
|
| H A D | ssl_tls13_keys.c | 343 size_t hlen; in mbedtls_ssl_tls13_evolve_secret() local 356 hlen = PSA_HASH_LENGTH(hash_alg); in mbedtls_ssl_tls13_evolve_secret() 363 secret_old, hlen, in mbedtls_ssl_tls13_evolve_secret() 367 tmp_secret, hlen); in mbedtls_ssl_tls13_evolve_secret() 380 l_input_len = hlen; in mbedtls_ssl_tls13_evolve_secret() 393 hlen); in mbedtls_ssl_tls13_evolve_secret()
|
| H A D | ssl_tls.c | 7314 size_t *hlen) in ssl_calc_verify_tls_psa() argument 7328 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen); in ssl_calc_verify_tls_psa() 7333 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen); in ssl_calc_verify_tls_psa() 7344 size_t *hlen) in ssl_calc_verify_tls_legacy() argument 7370 *hlen = mbedtls_md_get_size(mbedtls_md_info_from_ctx(hs_ctx)); in ssl_calc_verify_tls_legacy() 7372 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen); in ssl_calc_verify_tls_legacy() 7384 size_t *hlen) in ssl_calc_verify_tls_sha256() argument 7388 hash, hlen); in ssl_calc_verify_tls_sha256() 7391 hash, hlen); in ssl_calc_verify_tls_sha256() 7399 size_t *hlen) in ssl_calc_verify_tls_sha384() argument [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | ecdsa.h | 476 const unsigned char *hash, size_t hlen, 524 const unsigned char *hash, size_t hlen, 558 const unsigned char *hash, size_t hlen, 593 const unsigned char *hash, size_t hlen,
|
| /optee_os/core/tee/ |
| H A D | tee_svc_cryp.c | 3081 size_t hlen = 0; in syscall_hash_final() local 3097 res = get_user_u64_as_size_t(&hlen, hash_len); in syscall_hash_final() 3105 (uaddr_t)hash, hlen); in syscall_hash_final() 3133 res = crypto_hash_final(cs->ctx, hash, hlen); in syscall_hash_final() 3141 if (hlen < hash_size) { in syscall_hash_final() 3165 if (hlen < hash_size) { in syscall_hash_final()
|