Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 46) sorted by relevance

12

/mbedtls-3.4.0/tests/src/drivers/
Dtest_driver_signature.c61 uint8_t *signature, in sign_hash() argument
77 signature, signature_size, signature_length ) ); in sign_hash()
84 signature, signature_size, signature_length ) ); in sign_hash()
103 signature, signature_size, signature_length ) ); in sign_hash()
110 signature, signature_size, signature_length ) ); in sign_hash()
125 (void)signature; in sign_hash()
138 const uint8_t *signature, in verify_hash() argument
153 signature, signature_length ) ); in verify_hash()
160 signature, signature_length ) ); in verify_hash()
179 signature, signature_length ) ); in verify_hash()
[all …]
/mbedtls-3.4.0/tests/suites/
Dtest_suite_lms.data3 # message, and verifies the signature.
8 # signs the message, and verifies the signature.
14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
15 # uses leaf key 0, so must be the first signature generated by the key if the
16 # signature is to be reproduced. Message data is random. Note that pyhsslms
18 # word at the start of the key/sig. We strip these 4 bytes from the signature
21 # To produce another signature with this message and key (note that the actual
22 # signature bytes will differ due to randomization):
39 # The signature uses leaf key 1, so must be the second signature generated by
40 # the key if the signature is to be reproduced.
[all …]
Dtest_suite_lmots.data3 # message, and verifies the signature.
8 # message, and verifies the signature.
13 # signs the message, and verifies the signature.
19 # providing direct access to the underlying OTS signature scheme. The private
24 # To produce another signature with this message and key (note that the actual
25 # signature bytes will differ due to randomization):
44 # providing direct access to the underlying OTS signature scheme. The private
49 # To produce another signature with this message and key (note that the actual
50 # signature bytes will differ due to randomization):
69 # providing direct access to the underlying OTS signature scheme. The private
[all …]
Dtest_suite_psa_crypto_metadata.data197 Asymmetric signature: RSA PKCS#1 v1.5 raw
201 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
205 Asymmetric signature: RSA PSS SHA-256
209 Asymmetric signature: RSA PSS-any-salt SHA-256
213 Asymmetric signature: randomized ECDSA (no hashing)
217 Asymmetric signature: SHA-256 + randomized ECDSA
221 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
225 Asymmetric signature: pure EdDSA
229 Asymmetric signature: Ed25519ph
233 Asymmetric signature: Ed448ph
[all …]
Dtest_suite_psa_crypto_entropy.function72 /* This test case is only expected to pass if the signature mechanism
73 * requires randomness, either because it is a randomized signature
83 uint8_t *signature = NULL;
88 ASSERT_ALLOC( signature, signature_size );
95 signature, signature_size,
107 signature, signature_size,
115 mbedtls_free( signature );
Dtest_suite_ecdsa.function63 /* prepare material for signature */
131 /* Valid signature */
135 /* Invalid signature: wrong public key (G instead of Q) */
252 /* generate and write signature, then read and verify it */
307 /* prepare material for signature */
316 /* generate and write signature, then read and verify it */
488 /* Prepare signature R & S */
Dtest_suite_psa_crypto_se_driver_hal.function451 uint8_t *signature,
473 signature, signature_size, signature_length );
485 const uint8_t *signature,
507 signature, signature_length );
1293 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1395 signature, sizeof( signature ),
1402 signature, sizeof( signature ),
1410 signature, signature_length ) );
1414 signature, signature_length ),
1417 /* Change the signature and verify again. */
[all …]
Dtest_suite_psa_crypto_se_driver_hal_mocks.function580 uint8_t signature[1] = {'S'};
613 signature, sizeof( signature ),
641 const uint8_t signature[1] = {'S'};
673 signature, sizeof( signature ) )
Dtest_suite_lms.function111 /* Altering first signature byte must cause verification failure */
117 /* Altering last signature byte must cause verification failure */
Dtest_suite_psa_crypto.function2234 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0};
2255 signature, sizeof( signature ),
2262 memset( signature, 0, sizeof( signature ) );
2265 signature, sizeof( signature ) );
2276 signature, sizeof( signature ),
2283 memset( signature, 0, sizeof( signature ) );
2286 signature, sizeof( signature ) );
6583 unsigned char *signature = NULL;
6605 ASSERT_ALLOC( signature, signature_size );
6607 /* Perform the signature. */
[all …]
/mbedtls-3.4.0/tests/include/test/drivers/
Dsignature.h60 uint8_t *signature,
71 uint8_t *signature,
82 const uint8_t *signature,
92 const uint8_t *signature,
100 uint8_t *signature, size_t signature_size, size_t *signature_length );
107 uint8_t *signature, size_t signature_size, size_t *signature_length );
114 const uint8_t *signature, size_t signature_length );
121 const uint8_t *signature, size_t signature_length );
/mbedtls-3.4.0/library/
Dpsa_crypto_core.h420 uint8_t *signature, size_t signature_size, size_t *signature_length );
457 const uint8_t *signature, size_t signature_length );
496 uint8_t *signature, size_t signature_size, size_t *signature_length );
531 const uint8_t *signature, size_t signature_length );
Dpsa_crypto_driver_wrappers.c162 uint8_t *signature, in psa_driver_wrapper_sign_message() argument
187 signature, in psa_driver_wrapper_sign_message()
202 signature, in psa_driver_wrapper_sign_message()
216 signature, in psa_driver_wrapper_sign_message()
231 signature, in psa_driver_wrapper_sign_message()
255 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument
279 signature, in psa_driver_wrapper_verify_message()
293 signature, in psa_driver_wrapper_verify_message()
306 signature, in psa_driver_wrapper_verify_message()
320 signature, in psa_driver_wrapper_verify_message()
[all …]
Dpsa_crypto_ecp.c337 uint8_t *signature, size_t signature_size, size_t *signature_length ) in mbedtls_psa_ecdsa_sign_hash() argument
389 signature, in mbedtls_psa_ecdsa_sign_hash()
392 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash()
410 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_ecdsa_verify_hash() argument
439 signature, in mbedtls_psa_ecdsa_verify_hash()
442 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
Dpsa_crypto_rsa.c352 uint8_t *signature, size_t signature_size, size_t *signature_length ) in mbedtls_psa_rsa_sign_hash() argument
389 signature ); in mbedtls_psa_rsa_sign_hash()
407 signature ); in mbedtls_psa_rsa_sign_hash()
453 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_rsa_verify_hash() argument
488 signature ); in mbedtls_psa_rsa_verify_hash()
506 signature ); in mbedtls_psa_rsa_verify_hash()
Dpsa_crypto_ecp.h185 uint8_t *signature, size_t signature_size, size_t *signature_length );
220 const uint8_t *signature, size_t signature_length );
Dpsa_crypto_rsa.h177 uint8_t *signature, size_t signature_size, size_t *signature_length );
213 const uint8_t *signature, size_t signature_length );
Dpsa_crypto_driver_wrappers.h43 uint8_t *signature,
54 const uint8_t *signature,
61 uint8_t *signature, size_t signature_size, size_t *signature_length );
67 const uint8_t *signature, size_t signature_length );
Dpsa_crypto.c2686 uint8_t * signature, in psa_sign_internal() argument
2731 signature, signature_size, signature_length ); in psa_sign_internal()
2739 signature, signature_size, signature_length ); in psa_sign_internal()
2749 memset( signature + *signature_length, '!', in psa_sign_internal()
2752 memset( signature, '!', signature_size ); in psa_sign_internal()
2766 const uint8_t * signature, in psa_verify_internal() argument
2795 signature, signature_length ); in psa_verify_internal()
2802 signature, signature_length ); in psa_verify_internal()
2818 uint8_t *signature, in psa_sign_message_builtin() argument
2840 signature, signature_size, signature_length ); in psa_sign_message_builtin()
[all …]
Dpkcs7.c238 mbedtls_pkcs7_buf *signature ) in pkcs7_get_signature() argument
247 signature->tag = MBEDTLS_ASN1_OCTET_STRING; in pkcs7_get_signature()
248 signature->len = len; in pkcs7_get_signature()
249 signature->p = *p; in pkcs7_get_signature()
/mbedtls-3.4.0/tests/src/
Dpsa_exercise_key.c315 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local
316 size_t signature_length = sizeof( signature ); in exercise_signature_key()
340 signature, sizeof( signature ), in exercise_signature_key()
352 signature, signature_length ), in exercise_signature_key()
360 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local
362 size_t signature_length = sizeof( signature ); in exercise_signature_key()
368 signature, sizeof( signature ), in exercise_signature_key()
380 signature, signature_length ), in exercise_signature_key()
/mbedtls-3.4.0/docs/architecture/psa-migration/
Dpsa-limitations.md84 As standardized, the signature scheme takes several parameters, in addition to
101 - signature: `mbedtls_rsa_rsassa_pss_sign()`
105 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()`
118 - signature: not supported
127 - signature generation:
145 encoded as part of the key, and of the signature. If both encoding are
147 value from the signature parameters is used.
157 - verifying the signature on a certificate from its parent;
158 - verifying the signature on a CRL from the issuing CA.
178 addition to indirect use via X.509). It has two sets of three signature
[all …]
/mbedtls-3.4.0/include/psa/
Dcrypto.h2895 uint8_t * signature,
2947 const uint8_t * signature,
3000 uint8_t *signature,
3051 const uint8_t *signature,
/mbedtls-3.4.0/tests/data_files/
DReadme-x509.txt57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash
76 -badsign.crt: S5 with corrupted signature
85 -badsign.crt: S7 with corrupted signature + I1
99 -badsign.crt: S10 with corrupted signature
/mbedtls-3.4.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.c.jinja131 uint8_t *signature,
153 signature,
174 signature,
194 signature,
206 const uint8_t *signature,
227 signature,
247 signature,
266 signature,
274 uint8_t *signature, size_t signature_size, size_t *signature_length )
292 signature, signature_size, signature_length ) );
[all …]

12