/mbedtls-3.4.0/tests/src/drivers/ |
D | test_driver_signature.c | 61 uint8_t *signature, in sign_hash() argument 77 signature, signature_size, signature_length ) ); in sign_hash() 84 signature, signature_size, signature_length ) ); in sign_hash() 103 signature, signature_size, signature_length ) ); in sign_hash() 110 signature, signature_size, signature_length ) ); in sign_hash() 125 (void)signature; in sign_hash() 138 const uint8_t *signature, in verify_hash() argument 153 signature, signature_length ) ); in verify_hash() 160 signature, signature_length ) ); in verify_hash() 179 signature, signature_length ) ); in verify_hash() [all …]
|
/mbedtls-3.4.0/tests/suites/ |
D | test_suite_lms.data | 3 # message, and verifies the signature. 8 # signs the message, and verifies the signature. 14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature 15 # uses leaf key 0, so must be the first signature generated by the key if the 16 # signature is to be reproduced. Message data is random. Note that pyhsslms 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 21 # To produce another signature with this message and key (note that the actual 22 # signature bytes will differ due to randomization): 39 # The signature uses leaf key 1, so must be the second signature generated by 40 # the key if the signature is to be reproduced. [all …]
|
D | test_suite_lmots.data | 3 # message, and verifies the signature. 8 # message, and verifies the signature. 13 # signs the message, and verifies the signature. 19 # providing direct access to the underlying OTS signature scheme. The private 24 # To produce another signature with this message and key (note that the actual 25 # signature bytes will differ due to randomization): 44 # providing direct access to the underlying OTS signature scheme. The private 49 # To produce another signature with this message and key (note that the actual 50 # signature bytes will differ due to randomization): 69 # providing direct access to the underlying OTS signature scheme. The private [all …]
|
D | test_suite_psa_crypto_metadata.data | 197 Asymmetric signature: RSA PKCS#1 v1.5 raw 201 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 205 Asymmetric signature: RSA PSS SHA-256 209 Asymmetric signature: RSA PSS-any-salt SHA-256 213 Asymmetric signature: randomized ECDSA (no hashing) 217 Asymmetric signature: SHA-256 + randomized ECDSA 221 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256 225 Asymmetric signature: pure EdDSA 229 Asymmetric signature: Ed25519ph 233 Asymmetric signature: Ed448ph [all …]
|
D | test_suite_psa_crypto_entropy.function | 72 /* This test case is only expected to pass if the signature mechanism 73 * requires randomness, either because it is a randomized signature 83 uint8_t *signature = NULL; 88 ASSERT_ALLOC( signature, signature_size ); 95 signature, signature_size, 107 signature, signature_size, 115 mbedtls_free( signature );
|
D | test_suite_ecdsa.function | 63 /* prepare material for signature */ 131 /* Valid signature */ 135 /* Invalid signature: wrong public key (G instead of Q) */ 252 /* generate and write signature, then read and verify it */ 307 /* prepare material for signature */ 316 /* generate and write signature, then read and verify it */ 488 /* Prepare signature R & S */
|
D | test_suite_psa_crypto_se_driver_hal.function | 451 uint8_t *signature, 473 signature, signature_size, signature_length ); 485 const uint8_t *signature, 507 signature, signature_length ); 1293 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1395 signature, sizeof( signature ), 1402 signature, sizeof( signature ), 1410 signature, signature_length ) ); 1414 signature, signature_length ), 1417 /* Change the signature and verify again. */ [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 580 uint8_t signature[1] = {'S'}; 613 signature, sizeof( signature ), 641 const uint8_t signature[1] = {'S'}; 673 signature, sizeof( signature ) )
|
D | test_suite_lms.function | 111 /* Altering first signature byte must cause verification failure */ 117 /* Altering last signature byte must cause verification failure */
|
D | test_suite_psa_crypto.function | 2234 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; 2255 signature, sizeof( signature ), 2262 memset( signature, 0, sizeof( signature ) ); 2265 signature, sizeof( signature ) ); 2276 signature, sizeof( signature ), 2283 memset( signature, 0, sizeof( signature ) ); 2286 signature, sizeof( signature ) ); 6583 unsigned char *signature = NULL; 6605 ASSERT_ALLOC( signature, signature_size ); 6607 /* Perform the signature. */ [all …]
|
/mbedtls-3.4.0/tests/include/test/drivers/ |
D | signature.h | 60 uint8_t *signature, 71 uint8_t *signature, 82 const uint8_t *signature, 92 const uint8_t *signature, 100 uint8_t *signature, size_t signature_size, size_t *signature_length ); 107 uint8_t *signature, size_t signature_size, size_t *signature_length ); 114 const uint8_t *signature, size_t signature_length ); 121 const uint8_t *signature, size_t signature_length );
|
/mbedtls-3.4.0/library/ |
D | psa_crypto_core.h | 420 uint8_t *signature, size_t signature_size, size_t *signature_length ); 457 const uint8_t *signature, size_t signature_length ); 496 uint8_t *signature, size_t signature_size, size_t *signature_length ); 531 const uint8_t *signature, size_t signature_length );
|
D | psa_crypto_driver_wrappers.c | 162 uint8_t *signature, in psa_driver_wrapper_sign_message() argument 187 signature, in psa_driver_wrapper_sign_message() 202 signature, in psa_driver_wrapper_sign_message() 216 signature, in psa_driver_wrapper_sign_message() 231 signature, in psa_driver_wrapper_sign_message() 255 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument 279 signature, in psa_driver_wrapper_verify_message() 293 signature, in psa_driver_wrapper_verify_message() 306 signature, in psa_driver_wrapper_verify_message() 320 signature, in psa_driver_wrapper_verify_message() [all …]
|
D | psa_crypto_ecp.c | 337 uint8_t *signature, size_t signature_size, size_t *signature_length ) in mbedtls_psa_ecdsa_sign_hash() argument 389 signature, in mbedtls_psa_ecdsa_sign_hash() 392 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash() 410 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_ecdsa_verify_hash() argument 439 signature, in mbedtls_psa_ecdsa_verify_hash() 442 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
|
D | psa_crypto_rsa.c | 352 uint8_t *signature, size_t signature_size, size_t *signature_length ) in mbedtls_psa_rsa_sign_hash() argument 389 signature ); in mbedtls_psa_rsa_sign_hash() 407 signature ); in mbedtls_psa_rsa_sign_hash() 453 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_rsa_verify_hash() argument 488 signature ); in mbedtls_psa_rsa_verify_hash() 506 signature ); in mbedtls_psa_rsa_verify_hash()
|
D | psa_crypto_ecp.h | 185 uint8_t *signature, size_t signature_size, size_t *signature_length ); 220 const uint8_t *signature, size_t signature_length );
|
D | psa_crypto_rsa.h | 177 uint8_t *signature, size_t signature_size, size_t *signature_length ); 213 const uint8_t *signature, size_t signature_length );
|
D | psa_crypto_driver_wrappers.h | 43 uint8_t *signature, 54 const uint8_t *signature, 61 uint8_t *signature, size_t signature_size, size_t *signature_length ); 67 const uint8_t *signature, size_t signature_length );
|
D | psa_crypto.c | 2686 uint8_t * signature, in psa_sign_internal() argument 2731 signature, signature_size, signature_length ); in psa_sign_internal() 2739 signature, signature_size, signature_length ); in psa_sign_internal() 2749 memset( signature + *signature_length, '!', in psa_sign_internal() 2752 memset( signature, '!', signature_size ); in psa_sign_internal() 2766 const uint8_t * signature, in psa_verify_internal() argument 2795 signature, signature_length ); in psa_verify_internal() 2802 signature, signature_length ); in psa_verify_internal() 2818 uint8_t *signature, in psa_sign_message_builtin() argument 2840 signature, signature_size, signature_length ); in psa_sign_message_builtin() [all …]
|
D | pkcs7.c | 238 mbedtls_pkcs7_buf *signature ) in pkcs7_get_signature() argument 247 signature->tag = MBEDTLS_ASN1_OCTET_STRING; in pkcs7_get_signature() 248 signature->len = len; in pkcs7_get_signature() 249 signature->p = *p; in pkcs7_get_signature()
|
/mbedtls-3.4.0/tests/src/ |
D | psa_exercise_key.c | 315 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local 316 size_t signature_length = sizeof( signature ); in exercise_signature_key() 340 signature, sizeof( signature ), in exercise_signature_key() 352 signature, signature_length ), in exercise_signature_key() 360 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local 362 size_t signature_length = sizeof( signature ); in exercise_signature_key() 368 signature, sizeof( signature ), in exercise_signature_key() 380 signature, signature_length ), in exercise_signature_key()
|
/mbedtls-3.4.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 84 As standardized, the signature scheme takes several parameters, in addition to 101 - signature: `mbedtls_rsa_rsassa_pss_sign()` 105 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()` 118 - signature: not supported 127 - signature generation: 145 encoded as part of the key, and of the signature. If both encoding are 147 value from the signature parameters is used. 157 - verifying the signature on a certificate from its parent; 158 - verifying the signature on a CRL from the issuing CA. 178 addition to indirect use via X.509). It has two sets of three signature [all …]
|
/mbedtls-3.4.0/include/psa/ |
D | crypto.h | 2895 uint8_t * signature, 2947 const uint8_t * signature, 3000 uint8_t *signature, 3051 const uint8_t *signature,
|
/mbedtls-3.4.0/tests/data_files/ |
D | Readme-x509.txt | 57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash 76 -badsign.crt: S5 with corrupted signature 85 -badsign.crt: S7 with corrupted signature + I1 99 -badsign.crt: S10 with corrupted signature
|
/mbedtls-3.4.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 131 uint8_t *signature, 153 signature, 174 signature, 194 signature, 206 const uint8_t *signature, 227 signature, 247 signature, 266 signature, 274 uint8_t *signature, size_t signature_size, size_t *signature_length ) 292 signature, signature_size, signature_length ) ); [all …]
|