Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 46) sorted by relevance

12

/mbedtls-3.5.0/tests/src/drivers/
Dtest_driver_signature.c61 uint8_t *signature, in sign_hash() argument
75 signature, signature_size, signature_length); in sign_hash()
82 signature, signature_size, signature_length); in sign_hash()
96 signature, signature_size, signature_length); in sign_hash()
103 signature, signature_size, signature_length); in sign_hash()
116 (void) signature; in sign_hash()
129 const uint8_t *signature, in verify_hash() argument
142 signature, signature_length); in verify_hash()
149 signature, signature_length); in verify_hash()
163 signature, signature_length); in verify_hash()
[all …]
/mbedtls-3.5.0/tests/suites/
Dtest_suite_lms.data3 # message, and verifies the signature.
8 # signs the message, and verifies the signature.
14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
15 # uses leaf key 0, so must be the first signature generated by the key if the
16 # signature is to be reproduced. Message data is random. Note that pyhsslms
18 # word at the start of the key/sig. We strip these 4 bytes from the signature
21 # To produce another signature with this message and key (note that the actual
22 # signature bytes will differ due to randomization):
39 # The signature uses leaf key 1, so must be the second signature generated by
40 # the key if the signature is to be reproduced.
[all …]
Dtest_suite_lmots.data3 # message, and verifies the signature.
8 # message, and verifies the signature.
13 # signs the message, and verifies the signature.
19 # providing direct access to the underlying OTS signature scheme. The private
24 # To produce another signature with this message and key (note that the actual
25 # signature bytes will differ due to randomization):
44 # providing direct access to the underlying OTS signature scheme. The private
49 # To produce another signature with this message and key (note that the actual
50 # signature bytes will differ due to randomization):
69 # providing direct access to the underlying OTS signature scheme. The private
[all …]
Dtest_suite_psa_crypto_metadata.data201 Asymmetric signature: RSA PKCS#1 v1.5 raw
205 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
209 Asymmetric signature: RSA PSS SHA-256
213 Asymmetric signature: RSA PSS-any-salt SHA-256
217 Asymmetric signature: randomized ECDSA (no hashing)
221 Asymmetric signature: SHA-256 + randomized ECDSA
225 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
229 Asymmetric signature: pure EdDSA
233 Asymmetric signature: Ed25519ph
237 Asymmetric signature: Ed448ph
[all …]
Dtest_suite_psa_crypto_entropy.function74 /* This test case is only expected to pass if the signature mechanism
75 * requires randomness, either because it is a randomized signature
85 uint8_t *signature = NULL;
90 ASSERT_ALLOC(signature, signature_size);
97 signature, signature_size,
109 signature, signature_size,
117 mbedtls_free(signature);
Dtest_suite_psa_crypto.function2174 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 };
2195 signature, sizeof(signature),
2203 memset(signature, 0, sizeof(signature));
2206 signature, sizeof(signature));
2217 signature, sizeof(signature),
2225 memset(signature, 0, sizeof(signature));
2228 signature, sizeof(signature));
6444 unsigned char *signature = NULL;
6466 ASSERT_ALLOC(signature, signature_size);
6468 /* Perform the signature. */
[all …]
Dtest_suite_ecdsa.function63 /* prepare material for signature */
130 /* Valid signature */
134 /* Invalid signature: wrong public key (G instead of Q) */
251 /* generate and write signature, then read and verify it */
308 /* prepare material for signature */
317 /* generate and write signature, then read and verify it */
507 /* Prepare signature R & S */
Dtest_suite_psa_crypto_se_driver_hal.function449 uint8_t *signature,
471 signature, signature_size, signature_length);
483 const uint8_t *signature,
505 signature, signature_length);
1301 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1399 signature, sizeof(signature),
1406 signature, sizeof(signature),
1414 signature, signature_length));
1418 signature, signature_length),
1421 /* Change the signature and verify again. */
[all …]
Dtest_suite_psa_crypto_se_driver_hal_mocks.function567 uint8_t signature[1] = { 'S' };
600 signature, sizeof(signature),
628 const uint8_t signature[1] = { 'S' };
660 signature, sizeof(signature))
/mbedtls-3.5.0/tests/include/test/drivers/
Dsignature.h60 uint8_t *signature,
71 uint8_t *signature,
82 const uint8_t *signature,
92 const uint8_t *signature,
100 uint8_t *signature, size_t signature_size, size_t *signature_length);
107 uint8_t *signature, size_t signature_size, size_t *signature_length);
114 const uint8_t *signature, size_t signature_length);
121 const uint8_t *signature, size_t signature_length);
/mbedtls-3.5.0/library/
Dpsa_crypto_core.h413 uint8_t *signature, size_t signature_size, size_t *signature_length);
450 const uint8_t *signature, size_t signature_length);
489 uint8_t *signature, size_t signature_size, size_t *signature_length);
524 const uint8_t *signature, size_t signature_length);
757 uint8_t *signature, size_t signature_size,
819 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_driver_wrappers.c169 uint8_t *signature, in psa_driver_wrapper_sign_message() argument
194 signature, in psa_driver_wrapper_sign_message()
209 signature, in psa_driver_wrapper_sign_message()
223 signature, in psa_driver_wrapper_sign_message()
238 signature, in psa_driver_wrapper_sign_message()
262 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument
286 signature, in psa_driver_wrapper_verify_message()
300 signature, in psa_driver_wrapper_verify_message()
313 signature, in psa_driver_wrapper_verify_message()
327 signature, in psa_driver_wrapper_verify_message()
[all …]
Dpsa_crypto_driver_wrappers.h43 uint8_t *signature,
54 const uint8_t *signature,
61 uint8_t *signature, size_t signature_size, size_t *signature_length);
67 const uint8_t *signature, size_t signature_length);
87 uint8_t *signature, size_t signature_size,
98 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_ecp.c340 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument
389 signature, in mbedtls_psa_ecdsa_sign_hash()
392 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash()
426 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument
454 signature, in mbedtls_psa_ecdsa_verify_hash()
461 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
Dpsa_crypto_rsa.c347 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument
383 signature); in mbedtls_psa_rsa_sign_hash()
398 signature); in mbedtls_psa_rsa_sign_hash()
446 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument
480 signature); in mbedtls_psa_rsa_verify_hash()
495 signature); in mbedtls_psa_rsa_verify_hash()
Dpsa_crypto_ecp.h194 uint8_t *signature, size_t signature_size, size_t *signature_length);
229 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_rsa.h177 uint8_t *signature, size_t signature_size, size_t *signature_length);
213 const uint8_t *signature, size_t signature_length);
Dpsa_crypto.c2761 uint8_t *signature, argument
2807 signature, signature_size, signature_length);
2813 signature, signature_size, signature_length);
2818 psa_wipe_tag_output_buffer(signature, status, signature_size,
2831 const uint8_t *signature, argument
2861 signature, signature_length);
2866 signature, signature_length);
2882 uint8_t *signature, argument
2904 signature, signature_size, signature_length);
2914 uint8_t *signature, argument
[all …]
Dpkcs7.c236 mbedtls_pkcs7_buf *signature) in pkcs7_get_signature() argument
246 signature->tag = MBEDTLS_ASN1_OCTET_STRING; in pkcs7_get_signature()
247 signature->len = len; in pkcs7_get_signature()
248 signature->p = *p; in pkcs7_get_signature()
/mbedtls-3.5.0/tests/src/
Dpsa_exercise_key.c301 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
302 size_t signature_length = sizeof(signature); in exercise_signature_key()
325 signature, sizeof(signature), in exercise_signature_key()
336 signature, signature_length), in exercise_signature_key()
343 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
345 size_t signature_length = sizeof(signature); in exercise_signature_key()
350 signature, sizeof(signature), in exercise_signature_key()
361 signature, signature_length), in exercise_signature_key()
/mbedtls-3.5.0/docs/architecture/psa-migration/
Dpsa-limitations.md23 operations that should use PSA do not (signature generation & verification) as
87 As standardized, the signature scheme takes several parameters, in addition to
104 - signature: `mbedtls_rsa_rsassa_pss_sign()`
108 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()`
121 - signature: not supported
130 - signature generation:
148 encoded as part of the key, and of the signature. If both encoding are
150 value from the signature parameters is used.
160 - verifying the signature on a certificate from its parent;
161 - verifying the signature on a CRL from the issuing CA.
[all …]
/mbedtls-3.5.0/include/psa/
Dcrypto.h2895 uint8_t *signature,
2947 const uint8_t *signature,
3000 uint8_t *signature,
3051 const uint8_t *signature,
4437 uint8_t *signature, size_t signature_size,
4558 const uint8_t *signature, size_t signature_length);
/mbedtls-3.5.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.c.jinja132 uint8_t *signature,
154 signature,
175 signature,
195 signature,
207 const uint8_t *signature,
228 signature,
248 signature,
267 signature,
275 uint8_t *signature, size_t signature_size, size_t *signature_length )
293 signature, signature_size, signature_length ) );
[all …]
/mbedtls-3.5.0/tests/data_files/
DReadme-x509.txt57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash
76 -badsign.crt: S5 with corrupted signature
85 -badsign.crt: S7 with corrupted signature + I1
99 -badsign.crt: S10 with corrupted signature
/mbedtls-3.5.0/docs/
Duse-psa-crypto.md19 - asymmetric signature verification & generation;
36 operations. (That is, signature generation, and for RSA decryption too.)
49 - `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature

12