/mbedtls-latest/library/ |
D | pk_ecc.c | 121 unsigned char pub[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH]; in mbedtls_pk_ecc_set_pubkey_from_prv() 123 status = psa_export_public_key(key_id, pub, sizeof(pub), &pub_len); in mbedtls_pk_ecc_set_pubkey_from_prv() 132 return mbedtls_ecp_point_read_binary(&eck->grp, &eck->Q, pub, pub_len); in mbedtls_pk_ecc_set_pubkey_from_prv() 167 const unsigned char *pub, in pk_ecc_set_pubkey_psa_ecp_fallback() argument 172 (void) pub; in pk_ecc_set_pubkey_psa_ecp_fallback() 188 pub, pub_len); in pk_ecc_set_pubkey_psa_ecp_fallback() 204 int mbedtls_pk_ecc_set_pubkey(mbedtls_pk_context *pk, const unsigned char *pub, size_t pub_len) in mbedtls_pk_ecc_set_pubkey() argument 209 if (!PSA_ECC_FAMILY_IS_WEIERSTRASS(pk->ec_family) || *pub == 0x04) { in mbedtls_pk_ecc_set_pubkey() 216 memcpy(pk->pub_raw, pub, pub_len); in mbedtls_pk_ecc_set_pubkey() 220 int ret = pk_ecc_set_pubkey_psa_ecp_fallback(pk, pub, pub_len); in mbedtls_pk_ecc_set_pubkey() [all …]
|
D | pk_wrap.c | 444 static int rsa_check_pair_wrap(mbedtls_pk_context *pub, mbedtls_pk_context *prv, in rsa_check_pair_wrap() argument 450 return mbedtls_rsa_check_pub_priv((const mbedtls_rsa_context *) pub->pk_ctx, in rsa_check_pair_wrap() 932 static int eckey_check_pair_psa(mbedtls_pk_context *pub, mbedtls_pk_context *prv) in eckey_check_pair_psa() argument 947 if (memcmp(prv_key_buf, pub->pub_raw, pub->pub_raw_len) != 0) { in eckey_check_pair_psa() 954 static int eckey_check_pair_psa(mbedtls_pk_context *pub, mbedtls_pk_context *prv) in eckey_check_pair_psa() argument 1002 ret = mbedtls_ecp_point_write_binary(&mbedtls_pk_ec_rw(*pub)->grp, in eckey_check_pair_psa() 1003 &mbedtls_pk_ec_rw(*pub)->Q, in eckey_check_pair_psa() 1019 static int eckey_check_pair_wrap(mbedtls_pk_context *pub, mbedtls_pk_context *prv, in eckey_check_pair_wrap() argument 1025 return eckey_check_pair_psa(pub, prv); in eckey_check_pair_wrap() 1028 static int eckey_check_pair_wrap(mbedtls_pk_context *pub, mbedtls_pk_context *prv, in eckey_check_pair_wrap() argument [all …]
|
D | pk.c | 1414 int mbedtls_pk_check_pair(const mbedtls_pk_context *pub, in mbedtls_pk_check_pair() argument 1419 if (pub->pk_info == NULL || in mbedtls_pk_check_pair() 1433 if (pub->pk_info->type != MBEDTLS_PK_RSA) { in mbedtls_pk_check_pair() 1438 (pub->pk_info != prv->pk_info)) { in mbedtls_pk_check_pair() 1443 return prv->pk_info->check_pair_func((mbedtls_pk_context *) pub, in mbedtls_pk_check_pair()
|
D | pk_wrap.h | 75 int (*check_pair_func)(mbedtls_pk_context *pub, mbedtls_pk_context *prv,
|
D | pk_internal.h | 162 int mbedtls_pk_ecc_set_pubkey(mbedtls_pk_context *pk, const unsigned char *pub, size_t pub_len);
|
D | ecp.c | 3387 const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv, in mbedtls_ecp_check_pub_priv() argument 3393 if (pub->grp.id == MBEDTLS_ECP_DP_NONE || in mbedtls_ecp_check_pub_priv() 3394 pub->grp.id != prv->grp.id || in mbedtls_ecp_check_pub_priv() 3395 mbedtls_mpi_cmp_mpi(&pub->Q.X, &prv->Q.X) || in mbedtls_ecp_check_pub_priv() 3396 mbedtls_mpi_cmp_mpi(&pub->Q.Y, &prv->Q.Y) || in mbedtls_ecp_check_pub_priv() 3397 mbedtls_mpi_cmp_mpi(&pub->Q.Z, &prv->Q.Z)) { in mbedtls_ecp_check_pub_priv()
|
D | rsa.c | 1216 int mbedtls_rsa_check_pub_priv(const mbedtls_rsa_context *pub, in mbedtls_rsa_check_pub_priv() argument 1219 if (mbedtls_rsa_check_pubkey(pub) != 0 || in mbedtls_rsa_check_pub_priv() 1224 if (mbedtls_mpi_cmp_mpi(&pub->N, &prv->N) != 0 || in mbedtls_rsa_check_pub_priv() 1225 mbedtls_mpi_cmp_mpi(&pub->E, &prv->E) != 0) { in mbedtls_rsa_check_pub_priv()
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | p256-m.h | 45 int p256_gen_keypair(uint8_t priv[32], uint8_t pub[64]); 59 const uint8_t priv[32], const uint8_t pub[64]); 89 int p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64], 104 int p256_validate_pubkey(const uint8_t pub[64]); 129 int p256_public_from_private(uint8_t pub[64], const uint8_t priv[32]);
|
D | p256-m.c | 1212 int p256_gen_keypair(uint8_t priv[32], uint8_t pub[64]) in p256_gen_keypair() 1220 point_to_bytes(pub, x, y); in p256_gen_keypair() 1397 int p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64], in p256_ecdsa_verify() 1436 ret = point_from_bytes(px, py, pub); in p256_ecdsa_verify() 1475 int p256_validate_pubkey(const uint8_t pub[64]) in p256_validate_pubkey() 1478 int ret = point_from_bytes(x, y, pub); in p256_validate_pubkey() 1492 int p256_public_from_private(uint8_t pub[64], const uint8_t priv[32]) in p256_public_from_private() 1510 point_to_bytes(pub, x, y); in p256_public_from_private()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ecdsa.data | 365 ECDSA verify invalid pub key (not on curve), zero bytes of data 369 ECDSA verify invalid pub key (not on curve), one byte of data 373 ECDSA verify invalid pub key (not on curve), r=1, s=1 377 ECDSA verify invalid pub key (also not on curve), r=1, s=1 381 ECDSA verify invalid pub key (not on curve), r=12345, s=1 385 ECDSA verify invalid pub key (not on curve), r=1, s=12345 389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data 393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data 397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data 401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data [all …]
|
D | test_suite_pk.function | 995 mbedtls_pk_context pub, prv, alt; 1002 mbedtls_pk_init(&pub); 1016 TEST_ASSERT(mbedtls_pk_parse_public_keyfile(&pub, pub_file) == 0); 1021 TEST_ASSERT(mbedtls_pk_check_pair(&pub, &prv, 1030 TEST_ASSERT(mbedtls_pk_check_pair(&pub, &alt, 1047 TEST_EQUAL(mbedtls_pk_check_pair(&pub, &prv, mbedtls_test_rnd_std_rand, 1050 TEST_EQUAL(mbedtls_pk_check_pair(&pub, &prv, mbedtls_test_rnd_std_rand, 1059 mbedtls_pk_free(&pub); 1240 mbedtls_pk_context prv, pub; 1246 mbedtls_pk_init(&pub); [all …]
|
D | test_suite_lms.data | 25 # * cp ../framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_pub tmp/lms.pub 78 # * cp ../framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8 tmp/lms.pub 106 # * cp ../framework/data_files/lms_hash-sigs_sha256_m32_h5_lmots_sha256_n32_w8_pub tmp/lms.pub 136 # * cp ../framework/data_files/lms_hash-sigs_sha256_m32_h5_lmots_sha256_n32_w8_pub tmp/lms.pub
|
D | test_suite_rsa.function | 684 mbedtls_rsa_context pub, prv; 686 mbedtls_rsa_init(&pub); 689 pub.len = mod / 8; 693 TEST_ASSERT(mbedtls_test_read_mpi(&pub.N, input_Npub) == 0); 696 TEST_ASSERT(mbedtls_test_read_mpi(&pub.E, input_Epub) == 0); 730 TEST_ASSERT(mbedtls_rsa_check_pub_priv(&pub, &prv) == result); 733 mbedtls_rsa_free(&pub);
|
D | test_suite_ecp.function | 976 mbedtls_ecp_keypair pub, prv; 979 mbedtls_ecp_keypair_init(&pub); 984 TEST_ASSERT(mbedtls_ecp_group_load(&pub.grp, id_pub) == 0); 986 TEST_ASSERT(mbedtls_ecp_point_read_string(&pub.Q, 16, Qx_pub, Qy_pub) == 0); 994 TEST_ASSERT(mbedtls_ecp_check_pub_priv(&pub, &prv, 998 mbedtls_ecp_keypair_free(&pub);
|
/mbedtls-latest/include/mbedtls/ |
D | rsa.h | 537 int mbedtls_rsa_check_pub_priv(const mbedtls_rsa_context *pub,
|
D | pk.h | 992 int mbedtls_pk_check_pair(const mbedtls_pk_context *pub,
|
D | ecp.h | 1453 const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv,
|
/mbedtls-latest/ |
D | ChangeLog | 4944 * Made buffer size in pk_write_(pub)key_pem() more dynamic, eg smaller if
|