Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 25 of 42) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_lmots.function6 static int check_lmots_private_key_for_leak(unsigned char *sig)
13 TEST_EQUAL(sig[idx], 0x7E);
36 unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)];
45 msg->x, msg->len, sig, sizeof(sig), NULL), 0);
46 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0);
59 unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)];
68 NULL, 0, sig, sizeof(sig), NULL), 0);
69 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, NULL, 0, sig, sizeof(sig)), 0);
78 void lmots_verify_test(data_t *msg, data_t *sig, data_t *pub_key,
89 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc);
[all …]
Dtest_suite_ecdsa.function235 unsigned char sig[200];
243 memset(sig, 0x2a, sizeof(sig));
253 sig, sizeof(sig), &sig_len,
257 sig, sig_len) == 0);
260 for (i = sig_len; i < sizeof(sig); i++) {
261 TEST_ASSERT(sig[i] == 0x2a);
266 sig, sig_len - 1) != 0);
268 sig, sig_len + 1) != 0);
271 sig[0]++;
273 sig, sig_len) != 0);
[all …]
Dtest_suite_lms.function16 unsigned char sig[MBEDTLS_LMS_SIG_LEN(MBEDTLS_LMS_SHA256_M32_H10, MBEDTLS_LMOTS_SHA256_N32_W8)];
32 msg->x, msg->len, sig, sizeof(sig),
35 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, msg->x, msg->len, sig,
36 sizeof(sig)), 0);
49 unsigned char sig[MBEDTLS_LMS_SIG_LEN(MBEDTLS_LMS_SHA256_M32_H10, MBEDTLS_LMOTS_SHA256_N32_W8)];
65 NULL, 0, sig, sizeof(sig),
68 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, NULL, 0, sig,
69 sizeof(sig)), 0);
78 void lms_verify_test(data_t *msg, data_t *sig, data_t *pub_key,
89 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc);
[all …]
Dtest_suite_lms.data18 # word at the start of the key/sig. We strip these 4 bytes from the signature
58 # "levels" word at the start of the key/sig. We strip these 4 bytes from the
67 # * rm message.bin.sig
69 # * rm message.bin.sig
71 # * cat message.bin.sig | xxd
76 # * echo -n -e "\0\0\0\0" > message.bin.sig; cat sig.bin >> message.bin.sig (restore the
90 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from
100 # * cat message.bin.sig | xxd
104 # * echo -n -e "\0\0\0\0" > message.bin.sig; cat sig.bin >> message.bin.sig (restore the
118 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from
[all …]
Dtest_suite_pk.function482 const unsigned char *hash, unsigned char *sig)
488 md_alg, hashlen, hash, sig);
1199 data_t *sig, int ret)
1224 hash->x, hash->len, sig->x, sig->len) == ret);
1241 unsigned char sig[MBEDTLS_ECDSA_MAX_LEN];
1249 memset(sig, 0, sizeof(sig));
1261 slen = sizeof(sig);
1265 sig, sizeof(sig), &slen,
1272 TEST_ASSERT(memcmp(sig, sig_check->x, slen) == 0);
1280 hash->x, hash->len, sig, slen, &rs_ctx);
[all …]
Dtest_suite_ecdsa.data389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data
393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data
397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data
405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data
409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data
413 ECDSA verify valid public key, correct sig, 0 bytes of data
417 ECDSA verify valid pub key, correct sig, 1 byte of data
421 ECDSA verify valid pub key, correct sig, 32 bytes of data
Dtest_suite_lmots.data37 # sig = ots_private_key.sign(message)
38 # print('lmots_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), ots_public_key.pubkey…
62 #sig = ots_private_key.sign(message)
63 #print('lmots_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), ots_public_key.pubkey.…
85 #sig = ots_private_key.sign(message)
86 #print('lmots_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), ots_public_key.pubkey.…
/mbedtls-latest/library/
Dpk_wrap.c67 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument
114 sig, sig_len); in rsa_verify_wrap()
132 const unsigned char *sig, size_t sig_len) in rsa_verify_wrap() argument
150 hash, sig)) != 0) { in rsa_verify_wrap()
171 unsigned char *sig, size_t sig_size, in mbedtls_pk_psa_rsa_sign_ext() argument
211 sig, sig_size, sig_len); in mbedtls_pk_psa_rsa_sign_ext()
232 unsigned char *sig, size_t sig_size, size_t *sig_len, in rsa_sign_wrap() argument
251 sig, sig_size, sig_len); in rsa_sign_wrap()
256 unsigned char *sig, size_t sig_size, size_t *sig_len, in rsa_sign_wrap() argument
274 hash, sig); in rsa_sign_wrap()
[all …]
Decdsa.c270 ECDSA_RS_ENTER(sig); in mbedtls_ecdsa_sign_restartable()
273 if (rs_ctx != NULL && rs_ctx->sig != NULL) { in mbedtls_ecdsa_sign_restartable()
275 p_sign_tries = &rs_ctx->sig->sign_tries; in mbedtls_ecdsa_sign_restartable()
276 p_key_tries = &rs_ctx->sig->key_tries; in mbedtls_ecdsa_sign_restartable()
277 pk = &rs_ctx->sig->k; in mbedtls_ecdsa_sign_restartable()
278 pr = &rs_ctx->sig->r; in mbedtls_ecdsa_sign_restartable()
281 if (rs_ctx->sig->state == ecdsa_sig_mul) { in mbedtls_ecdsa_sign_restartable()
284 if (rs_ctx->sig->state == ecdsa_sig_modn) { in mbedtls_ecdsa_sign_restartable()
311 if (rs_ctx != NULL && rs_ctx->sig != NULL) { in mbedtls_ecdsa_sign_restartable()
312 rs_ctx->sig->state = ecdsa_sig_mul; in mbedtls_ecdsa_sign_restartable()
[all …]
Dpk.c1041 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument
1065 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable()
1082 sig, sig_len); in mbedtls_pk_verify_restartable()
1090 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify() argument
1093 sig, sig_len, NULL); in mbedtls_pk_verify()
1102 const unsigned char *sig, size_t sig_len) in mbedtls_pk_verify_ext() argument
1122 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext()
1187 hash_len, sig, signature_length); in mbedtls_pk_verify_ext()
1210 sig); in mbedtls_pk_verify_ext()
1232 unsigned char *sig, size_t sig_size, size_t *sig_len, in mbedtls_pk_sign_restartable() argument
[all …]
Dlms.c303 const unsigned char *sig, size_t sig_size) in mbedtls_lms_verify() argument
338 if (MBEDTLS_GET_UINT32_BE(sig, SIG_OTS_SIG_OFFSET + MBEDTLS_LMOTS_SIG_TYPE_OFFSET) in mbedtls_lms_verify()
347 if (MBEDTLS_GET_UINT32_BE(sig, SIG_TYPE_OFFSET(ctx->params.otstype)) in mbedtls_lms_verify()
353 q_leaf_identifier = MBEDTLS_GET_UINT32_BE(sig, SIG_Q_LEAF_ID_OFFSET); in mbedtls_lms_verify()
368 sig + SIG_OTS_SIG_OFFSET, in mbedtls_lms_verify()
392 left_node = sig + SIG_PATH_OFFSET(ctx->params.otstype) + in mbedtls_lms_verify()
397 right_node = sig + SIG_PATH_OFFSET(ctx->params.otstype) + in mbedtls_lms_verify()
698 unsigned int msg_size, unsigned char *sig, size_t sig_size, in mbedtls_lms_sign() argument
742 sig + SIG_OTS_SIG_OFFSET, in mbedtls_lms_sign()
750 MBEDTLS_PUT_UINT32_BE(ctx->params.type, sig, SIG_TYPE_OFFSET(ctx->params.otstype)); in mbedtls_lms_sign()
[all …]
Drsa.c2119 unsigned char *sig) in rsa_rsassa_pss_sign_no_mode_check() argument
2122 unsigned char *p = sig; in rsa_rsassa_pss_sign_no_mode_check()
2182 memset(sig, 0, olen); in rsa_rsassa_pss_sign_no_mode_check()
2209 ret = mgf_mask(sig + offset, olen - hlen - 1 - offset, p, hlen, hash_id); in rsa_rsassa_pss_sign_no_mode_check()
2215 sig[0] &= 0xFF >> (olen * 8 - msb); in rsa_rsassa_pss_sign_no_mode_check()
2220 return mbedtls_rsa_private(ctx, f_rng, p_rng, sig, sig); in rsa_rsassa_pss_sign_no_mode_check()
2230 unsigned char *sig) in rsa_rsassa_pss_sign() argument
2239 sig); in rsa_rsassa_pss_sign()
2248 unsigned char *sig) in mbedtls_rsa_rsassa_pss_sign_no_mode_check() argument
2251 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign_no_mode_check()
[all …]
Dlmots.c463 const unsigned char *sig, in mbedtls_lmots_calculate_public_key_candidate() argument
483 sig + MBEDTLS_LMOTS_SIG_C_RANDOM_OFFSET, in mbedtls_lmots_calculate_public_key_candidate()
490 sig + MBEDTLS_LMOTS_SIG_SIGNATURE_OFFSET(params->type), in mbedtls_lmots_calculate_public_key_candidate()
512 const unsigned char *sig, size_t sig_size) in mbedtls_lmots_verify() argument
533 if (MBEDTLS_GET_UINT32_BE(sig, MBEDTLS_LMOTS_SIG_TYPE_OFFSET) != MBEDTLS_LMOTS_SHA256_N32_W8) { in mbedtls_lmots_verify()
538 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify()
697 unsigned char *sig, size_t sig_size, size_t *sig_len) in mbedtls_lmots_sign() argument
744 MBEDTLS_PUT_UINT32_BE(ctx->params.type, sig, MBEDTLS_LMOTS_SIG_TYPE_OFFSET); in mbedtls_lmots_sign()
751 ret = (*mbedtls_lmots_sign_private_key_invalidated_hook)(sig); in mbedtls_lmots_sign()
765 memcpy(sig + MBEDTLS_LMOTS_SIG_C_RANDOM_OFFSET, tmp_c_random, in mbedtls_lmots_sign()
[all …]
Dpk_wrap.h38 const unsigned char *sig, size_t sig_len);
43 unsigned char *sig, size_t sig_size, size_t *sig_len,
51 const unsigned char *sig, size_t sig_len,
57 unsigned char *sig, size_t sig_size, size_t *sig_len,
132 unsigned char *sig, size_t sig_size,
Dx509write_csr.c137 unsigned char *sig, size_t sig_size, in x509write_csr_der_internal() argument
233 sig, sig_size, &sig_len, in x509write_csr_der_internal()
265 sig, sig_len, pk_alg)); in x509write_csr_der_internal()
294 unsigned char *sig; in mbedtls_x509write_csr_der() local
296 if ((sig = mbedtls_calloc(1, MBEDTLS_PK_SIGNATURE_MAX_SIZE)) == NULL) { in mbedtls_x509write_csr_der()
301 sig, MBEDTLS_PK_SIGNATURE_MAX_SIZE, in mbedtls_x509write_csr_der()
304 mbedtls_free(sig); in mbedtls_x509write_csr_der()
Dlmots.h147 const unsigned char *sig,
180 size_t msg_size, const unsigned char *sig,
280 unsigned char *sig, size_t sig_size, size_t *sig_len);
Dx509_internal.h35 int mbedtls_x509_get_sig(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig);
60 unsigned char *sig, size_t size,
Dx509write_crt.c428 unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE]; in mbedtls_x509write_crt_der() local
621 hash, hash_length, sig, sizeof(sig), &sig_len, in mbedtls_x509write_crt_der()
637 sig, sig_len, pk_alg)); in mbedtls_x509write_crt_der()
/mbedtls-latest/programs/pkey/
Decdsa.c88 unsigned char sig[MBEDTLS_ECDSA_MAX_LEN]; in main() local
97 memset(sig, 0, sizeof(sig)); in main()
163 sig, sizeof(sig), &sig_len, in main()
170 dump_buf(" + Signature: ", sig, sig_len); in main()
200 sig, sig_len)) != 0) { in main()
/mbedtls-latest/include/mbedtls/
Drsa.h857 unsigned char *sig);
889 unsigned char *sig);
942 unsigned char *sig);
991 unsigned char *sig);
1024 const unsigned char *sig);
1049 const unsigned char *sig);
1084 const unsigned char *sig);
1126 const unsigned char *sig);
Dpk.h291 const unsigned char *hash, unsigned char *sig);
753 const unsigned char *sig, size_t sig_len);
778 const unsigned char *sig, size_t sig_len,
815 const unsigned char *sig, size_t sig_len);
851 unsigned char *sig, size_t sig_size, size_t *sig_len,
887 unsigned char *sig, size_t sig_size, size_t *sig_len,
923 unsigned char *sig, size_t sig_size, size_t *sig_len,
Decdsa.h102 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */
475 unsigned char *sig, size_t sig_size, size_t *slen,
522 unsigned char *sig, size_t sig_size, size_t *slen,
556 const unsigned char *sig, size_t slen);
591 const unsigned char *sig, size_t slen,
Dlms.h322 const unsigned char *sig, size_t sig_size);
432 unsigned int msg_size, unsigned char *sig, size_t sig_size,
/mbedtls-latest/3rdparty/p256-m/p256-m/
Dp256-m.h74 int p256_ecdsa_sign(uint8_t sig[64], const uint8_t priv[32],
89 int p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64],
Dp256-m.c1323 int p256_ecdsa_sign(uint8_t sig[64], const uint8_t priv[32], in p256_ecdsa_sign()
1358 u256_to_bytes(sig, xr); in p256_ecdsa_sign()
1386 u256_to_bytes(sig, t4); in p256_ecdsa_sign()
1389 m256_to_bytes(sig + 32, t4, &p256_n); in p256_ecdsa_sign()
1397 int p256_ecdsa_verify(const uint8_t sig[64], const uint8_t pub[64], in p256_ecdsa_verify()
1409 ret = scalar_from_bytes(r, sig); in p256_ecdsa_verify()
1412 ret = scalar_from_bytes(s, sig + 32); in p256_ecdsa_verify()

12