/mbedtls-3.5.0/tests/src/drivers/ |
D | test_driver_signature.c | 61 uint8_t *signature, in sign_hash() argument 75 signature, signature_size, signature_length); in sign_hash() 82 signature, signature_size, signature_length); in sign_hash() 96 signature, signature_size, signature_length); in sign_hash() 103 signature, signature_size, signature_length); in sign_hash() 116 (void) signature; in sign_hash() 129 const uint8_t *signature, in verify_hash() argument 142 signature, signature_length); in verify_hash() 149 signature, signature_length); in verify_hash() 163 signature, signature_length); in verify_hash() [all …]
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_lms.data | 3 # message, and verifies the signature. 8 # signs the message, and verifies the signature. 14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature 15 # uses leaf key 0, so must be the first signature generated by the key if the 16 # signature is to be reproduced. Message data is random. Note that pyhsslms 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 21 # To produce another signature with this message and key (note that the actual 22 # signature bytes will differ due to randomization): 39 # The signature uses leaf key 1, so must be the second signature generated by 40 # the key if the signature is to be reproduced. [all …]
|
D | test_suite_lmots.data | 3 # message, and verifies the signature. 8 # message, and verifies the signature. 13 # signs the message, and verifies the signature. 19 # providing direct access to the underlying OTS signature scheme. The private 24 # To produce another signature with this message and key (note that the actual 25 # signature bytes will differ due to randomization): 44 # providing direct access to the underlying OTS signature scheme. The private 49 # To produce another signature with this message and key (note that the actual 50 # signature bytes will differ due to randomization): 69 # providing direct access to the underlying OTS signature scheme. The private [all …]
|
D | test_suite_psa_crypto_metadata.data | 201 Asymmetric signature: RSA PKCS#1 v1.5 raw 205 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 209 Asymmetric signature: RSA PSS SHA-256 213 Asymmetric signature: RSA PSS-any-salt SHA-256 217 Asymmetric signature: randomized ECDSA (no hashing) 221 Asymmetric signature: SHA-256 + randomized ECDSA 225 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256 229 Asymmetric signature: pure EdDSA 233 Asymmetric signature: Ed25519ph 237 Asymmetric signature: Ed448ph [all …]
|
D | test_suite_psa_crypto_entropy.function | 74 /* This test case is only expected to pass if the signature mechanism 75 * requires randomness, either because it is a randomized signature 85 uint8_t *signature = NULL; 90 ASSERT_ALLOC(signature, signature_size); 97 signature, signature_size, 109 signature, signature_size, 117 mbedtls_free(signature);
|
D | test_suite_psa_crypto.function | 2174 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; 2195 signature, sizeof(signature), 2203 memset(signature, 0, sizeof(signature)); 2206 signature, sizeof(signature)); 2217 signature, sizeof(signature), 2225 memset(signature, 0, sizeof(signature)); 2228 signature, sizeof(signature)); 6444 unsigned char *signature = NULL; 6466 ASSERT_ALLOC(signature, signature_size); 6468 /* Perform the signature. */ [all …]
|
D | test_suite_ecdsa.function | 63 /* prepare material for signature */ 130 /* Valid signature */ 134 /* Invalid signature: wrong public key (G instead of Q) */ 251 /* generate and write signature, then read and verify it */ 308 /* prepare material for signature */ 317 /* generate and write signature, then read and verify it */ 507 /* Prepare signature R & S */
|
D | test_suite_psa_crypto_se_driver_hal.function | 449 uint8_t *signature, 471 signature, signature_size, signature_length); 483 const uint8_t *signature, 505 signature, signature_length); 1301 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1399 signature, sizeof(signature), 1406 signature, sizeof(signature), 1414 signature, signature_length)); 1418 signature, signature_length), 1421 /* Change the signature and verify again. */ [all …]
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 567 uint8_t signature[1] = { 'S' }; 600 signature, sizeof(signature), 628 const uint8_t signature[1] = { 'S' }; 660 signature, sizeof(signature))
|
/mbedtls-3.5.0/tests/include/test/drivers/ |
D | signature.h | 60 uint8_t *signature, 71 uint8_t *signature, 82 const uint8_t *signature, 92 const uint8_t *signature, 100 uint8_t *signature, size_t signature_size, size_t *signature_length); 107 uint8_t *signature, size_t signature_size, size_t *signature_length); 114 const uint8_t *signature, size_t signature_length); 121 const uint8_t *signature, size_t signature_length);
|
/mbedtls-3.5.0/library/ |
D | psa_crypto_core.h | 413 uint8_t *signature, size_t signature_size, size_t *signature_length); 450 const uint8_t *signature, size_t signature_length); 489 uint8_t *signature, size_t signature_size, size_t *signature_length); 524 const uint8_t *signature, size_t signature_length); 757 uint8_t *signature, size_t signature_size, 819 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_driver_wrappers.c | 169 uint8_t *signature, in psa_driver_wrapper_sign_message() argument 194 signature, in psa_driver_wrapper_sign_message() 209 signature, in psa_driver_wrapper_sign_message() 223 signature, in psa_driver_wrapper_sign_message() 238 signature, in psa_driver_wrapper_sign_message() 262 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument 286 signature, in psa_driver_wrapper_verify_message() 300 signature, in psa_driver_wrapper_verify_message() 313 signature, in psa_driver_wrapper_verify_message() 327 signature, in psa_driver_wrapper_verify_message() [all …]
|
D | psa_crypto_driver_wrappers.h | 43 uint8_t *signature, 54 const uint8_t *signature, 61 uint8_t *signature, size_t signature_size, size_t *signature_length); 67 const uint8_t *signature, size_t signature_length); 87 uint8_t *signature, size_t signature_size, 98 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_ecp.c | 340 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument 389 signature, in mbedtls_psa_ecdsa_sign_hash() 392 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash() 426 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument 454 signature, in mbedtls_psa_ecdsa_verify_hash() 461 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
|
D | psa_crypto_rsa.c | 347 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument 383 signature); in mbedtls_psa_rsa_sign_hash() 398 signature); in mbedtls_psa_rsa_sign_hash() 446 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument 480 signature); in mbedtls_psa_rsa_verify_hash() 495 signature); in mbedtls_psa_rsa_verify_hash()
|
D | psa_crypto_ecp.h | 194 uint8_t *signature, size_t signature_size, size_t *signature_length); 229 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_rsa.h | 177 uint8_t *signature, size_t signature_size, size_t *signature_length); 213 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto.c | 2761 uint8_t *signature, argument 2807 signature, signature_size, signature_length); 2813 signature, signature_size, signature_length); 2818 psa_wipe_tag_output_buffer(signature, status, signature_size, 2831 const uint8_t *signature, argument 2861 signature, signature_length); 2866 signature, signature_length); 2882 uint8_t *signature, argument 2904 signature, signature_size, signature_length); 2914 uint8_t *signature, argument [all …]
|
D | pkcs7.c | 236 mbedtls_pkcs7_buf *signature) in pkcs7_get_signature() argument 246 signature->tag = MBEDTLS_ASN1_OCTET_STRING; in pkcs7_get_signature() 247 signature->len = len; in pkcs7_get_signature() 248 signature->p = *p; in pkcs7_get_signature()
|
/mbedtls-3.5.0/tests/src/ |
D | psa_exercise_key.c | 301 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 302 size_t signature_length = sizeof(signature); in exercise_signature_key() 325 signature, sizeof(signature), in exercise_signature_key() 336 signature, signature_length), in exercise_signature_key() 343 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 345 size_t signature_length = sizeof(signature); in exercise_signature_key() 350 signature, sizeof(signature), in exercise_signature_key() 361 signature, signature_length), in exercise_signature_key()
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 23 operations that should use PSA do not (signature generation & verification) as 87 As standardized, the signature scheme takes several parameters, in addition to 104 - signature: `mbedtls_rsa_rsassa_pss_sign()` 108 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()` 121 - signature: not supported 130 - signature generation: 148 encoded as part of the key, and of the signature. If both encoding are 150 value from the signature parameters is used. 160 - verifying the signature on a certificate from its parent; 161 - verifying the signature on a CRL from the issuing CA. [all …]
|
/mbedtls-3.5.0/include/psa/ |
D | crypto.h | 2895 uint8_t *signature, 2947 const uint8_t *signature, 3000 uint8_t *signature, 3051 const uint8_t *signature, 4437 uint8_t *signature, size_t signature_size, 4558 const uint8_t *signature, size_t signature_length);
|
/mbedtls-3.5.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 132 uint8_t *signature, 154 signature, 175 signature, 195 signature, 207 const uint8_t *signature, 228 signature, 248 signature, 267 signature, 275 uint8_t *signature, size_t signature_size, size_t *signature_length ) 293 signature, signature_size, signature_length ) ); [all …]
|
/mbedtls-3.5.0/tests/data_files/ |
D | Readme-x509.txt | 57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash 76 -badsign.crt: S5 with corrupted signature 85 -badsign.crt: S7 with corrupted signature + I1 99 -badsign.crt: S10 with corrupted signature
|
/mbedtls-3.5.0/docs/ |
D | use-psa-crypto.md | 19 - asymmetric signature verification & generation; 36 operations. (That is, signature generation, and for RSA decryption too.) 49 - `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature
|