Lines Matching defs:hash
1203 /* Heap allocate and translate sig_hashes from internal hash identifiers to
1244 unsigned char hash = mbedtls_ssl_hash_from_md_alg(*md);
1245 if (hash == MBEDTLS_SSL_HASH_NONE) {
1249 *p = ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA);
1253 *p = ((hash << 8) | MBEDTLS_SSL_SIG_RSA);
6118 mbedtls_md_type_t mbedtls_ssl_md_alg_from_hash(unsigned char hash)
6120 switch (hash) {
6598 * HashAlgorithm hash;
6862 * Compute P_<hash>(secret, label + random)[0..dlen]
6959 * - hash associated with the ciphersuite (only used by TLS 1.2)
6966 mbedtls_md_type_t hash)
6969 if (hash == MBEDTLS_MD_SHA384) {
6977 (void) hash;
6985 (void) hash;
7060 MBEDTLS_SSL_DEBUG_BUF(3, "session hash for extended master secret",
7289 unsigned char *hash,
7304 status = psa_hash_finish(&cloned_op, hash, buffer_size, hlen);
7309 MBEDTLS_SSL_DEBUG_BUF(3, "PSA calculated verify result", hash, *hlen);
7319 unsigned char *hash,
7341 ret = mbedtls_md_finish(&cloned_ctx, hash);
7348 MBEDTLS_SSL_DEBUG_BUF(3, "calculated verify result", hash, *hlen);
7359 unsigned char *hash,
7364 hash, hlen);
7367 hash, hlen);
7374 unsigned char *hash,
7379 hash, hlen);
7382 hash, hlen);
8385 * hash = PRF( master, finished_label,
9328 unsigned char *hash, size_t *hashlen,
9356 if ((status = psa_hash_finish(&hash_operation, hash, PSA_HASH_MAX_SIZE,
9384 unsigned char *hash, size_t *hashlen,
9420 if ((ret = mbedtls_md_finish(&ctx, hash)) != 0) {
9439 /* Find the preferred hash for a given signature algorithm. */
9571 * HashAlgorithm hash;