/mbedtls-latest/tests/src/drivers/ |
D | test_driver_signature.c | 48 uint8_t *signature, in sign_hash() argument 62 signature, signature_size, signature_length); in sign_hash() 69 signature, signature_size, signature_length); in sign_hash() 83 signature, signature_size, signature_length); in sign_hash() 90 signature, signature_size, signature_length); in sign_hash() 103 (void) signature; in sign_hash() 116 const uint8_t *signature, in verify_hash() argument 129 signature, signature_length); in verify_hash() 136 signature, signature_length); in verify_hash() 150 signature, signature_length); in verify_hash() [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_lms.data | 3 # message, and verifies the signature. 8 # signs the message, and verifies the signature. 14 …./framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature 15 # uses leaf key 0, so must be the first signature generated by the key if the 16 # signature is to be reproduced. Message data is random. Note that pyhsslms 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 21 # To produce another signature with this message and key (note that the actual 22 # signature bytes will differ due to randomization): 39 # The signature uses leaf key 1, so must be the second signature generated by 40 # the key if the signature is to be reproduced. [all …]
|
D | test_suite_lmots.data | 3 # message, and verifies the signature. 8 # message, and verifies the signature. 13 # signs the message, and verifies the signature. 19 # providing direct access to the underlying OTS signature scheme. The private 24 # To produce another signature with this message and key (note that the actual 25 # signature bytes will differ due to randomization): 44 # providing direct access to the underlying OTS signature scheme. The private 49 # To produce another signature with this message and key (note that the actual 50 # signature bytes will differ due to randomization): 69 # providing direct access to the underlying OTS signature scheme. The private [all …]
|
D | test_suite_psa_crypto_metadata.data | 217 Asymmetric signature: RSA PKCS#1 v1.5 raw 221 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 225 Asymmetric signature: RSA PSS SHA-256 229 Asymmetric signature: RSA PSS-any-salt SHA-256 233 Asymmetric signature: randomized ECDSA (no hashing) 237 Asymmetric signature: SHA-256 + randomized ECDSA 241 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256 245 Asymmetric signature: pure EdDSA 249 Asymmetric signature: Ed25519ph 253 Asymmetric signature: Ed448ph [all …]
|
D | test_suite_psa_crypto_entropy.function | 102 /* This test case is only expected to pass if the signature mechanism 103 * requires randomness, either because it is a randomized signature 113 uint8_t *signature = NULL; 118 TEST_CALLOC(signature, signature_size); 125 signature, signature_size, 137 signature, signature_size, 145 mbedtls_free(signature);
|
D | test_suite_psa_crypto.function | 2522 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; 2543 signature, sizeof(signature), 2551 memset(signature, 0, sizeof(signature)); 2554 signature, sizeof(signature)); 2565 signature, sizeof(signature), 2573 memset(signature, 0, sizeof(signature)); 2576 signature, sizeof(signature)); 6796 unsigned char *signature = NULL; 6818 TEST_CALLOC(signature, signature_size); 6820 /* Perform the signature. */ [all …]
|
D | test_suite_psa_crypto_se_driver_hal.function | 462 uint8_t *signature, 484 signature, signature_size, signature_length); 496 const uint8_t *signature, 518 signature, signature_length); 1316 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1414 signature, sizeof(signature), 1421 signature, sizeof(signature), 1429 signature, signature_length)); 1433 signature, signature_length), 1436 /* Change the signature and verify again. */ [all …]
|
D | test_suite_ecdsa.function | 57 /* prepare material for signature */ 124 /* Valid signature */ 128 /* Invalid signature: wrong public key (G instead of Q) */ 250 /* generate and write signature, then read and verify it */ 310 /* prepare material for signature */ 319 /* generate and write signature, then read and verify it */ 513 /* Prepare signature R & S */
|
D | test_suite_psa_crypto_util.data | 47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter) 51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter) 55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 567 uint8_t signature[1] = { 'S' }; 600 signature, sizeof(signature), 628 const uint8_t signature[1] = { 'S' }; 660 signature, sizeof(signature))
|
/mbedtls-latest/tests/include/test/drivers/ |
D | signature.h | 48 uint8_t *signature, 59 uint8_t *signature, 70 const uint8_t *signature, 80 const uint8_t *signature, 88 uint8_t *signature, size_t signature_size, size_t *signature_length); 95 uint8_t *signature, size_t signature_size, size_t *signature_length); 102 const uint8_t *signature, size_t signature_length); 109 const uint8_t *signature, size_t signature_length);
|
/mbedtls-latest/3rdparty/p256-m/ |
D | p256-m_driver_entrypoints.c | 210 uint8_t *signature, in p256_transparent_sign_hash() argument 228 int ret = p256_ecdsa_sign(signature, key_buffer, hash, hash_length); in p256_transparent_sign_hash() 243 const uint8_t *signature, in p256_verify_hash_with_public_key() argument 256 int ret = p256_ecdsa_verify(signature, public_key_p256m, hash, hash_length); in p256_verify_hash_with_public_key() 268 const uint8_t *signature, in p256_transparent_verify_hash() argument 305 signature, in p256_transparent_verify_hash()
|
D | p256-m_driver_entrypoints.h | 174 uint8_t *signature, 216 const uint8_t *signature,
|
/mbedtls-latest/library/ |
D | psa_crypto_driver_wrappers.h | 163 uint8_t *signature, in psa_driver_wrapper_sign_message() argument 188 signature, in psa_driver_wrapper_sign_message() 203 signature, in psa_driver_wrapper_sign_message() 215 signature, in psa_driver_wrapper_sign_message() 231 signature, in psa_driver_wrapper_sign_message() 253 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument 277 signature, in psa_driver_wrapper_verify_message() 291 signature, in psa_driver_wrapper_verify_message() 302 signature, in psa_driver_wrapper_verify_message() 316 signature, in psa_driver_wrapper_verify_message() [all …]
|
D | psa_crypto_core.h | 479 uint8_t *signature, size_t signature_size, size_t *signature_length); 516 const uint8_t *signature, size_t signature_length); 555 uint8_t *signature, size_t signature_size, size_t *signature_length); 590 const uint8_t *signature, size_t signature_length); 823 uint8_t *signature, size_t signature_size, 885 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto.c | 2998 uint8_t *signature, argument 3040 signature, signature_size, signature_length); 3046 signature, signature_size, signature_length); 3051 psa_wipe_tag_output_buffer(signature, status, signature_size, 3064 const uint8_t *signature, argument 3090 signature, signature_length); 3095 signature, signature_length); 3111 uint8_t *signature, argument 3133 signature, signature_size, signature_length); 3149 LOCAL_OUTPUT_DECLARE(signature_external, signature); [all …]
|
D | psa_crypto_ecp.c | 369 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument 418 signature, in mbedtls_psa_ecdsa_sign_hash() 421 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash() 455 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument 483 signature, in mbedtls_psa_ecdsa_verify_hash() 490 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
|
D | psa_crypto_rsa.c | 320 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument 356 signature); in mbedtls_psa_rsa_sign_hash() 371 signature); in mbedtls_psa_rsa_sign_hash() 419 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument 453 signature); in mbedtls_psa_rsa_verify_hash() 468 signature); in mbedtls_psa_rsa_verify_hash()
|
D | psa_crypto_ecp.h | 182 uint8_t *signature, size_t signature_size, size_t *signature_length); 217 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_rsa.h | 169 uint8_t *signature, size_t signature_size, size_t *signature_length); 205 const uint8_t *signature, size_t signature_length);
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 27 operations that should use PSA do not (signature generation & verification) as 95 As standardized, the signature scheme takes several parameters, in addition to 112 - signature: `mbedtls_rsa_rsassa_pss_sign()` 116 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()` 129 - signature: not supported 138 - signature generation: 156 encoded as part of the key, and of the signature. If both encoding are 158 value from the signature parameters is used. 168 - verifying the signature on a certificate from its parent; 169 - verifying the signature on a CRL from the issuing CA. [all …]
|
D | psa-legacy-bridges.md | 122 * RSA: PKCS#1v1.5 signature, PSS signature, PKCS#1v1.5 encryption, OAEP encryption. 123 * ECC: ECDSA signature (randomized or deterministic), ECDH key agreement (via `mbedtls_pk_ec`). 141 …rministic is made at compile time. For RSA, the choice of encryption or signature algorithm is mad… 183 The pk module uses signature formats intended for X.509. The PSA module uses the simplest sensible … 190 …TLS 4.x and perhaps beyond. We will at least add EdDSA support, and its signature encoding is the … 192 …signature format, parametrized by the algorithm. However, it is difficult to predict exactly what … 194 …signature field) or X.509 (the signature is inside a BITSTRING, not directly in a SEQUENCE). So th… 251 …signature or for encryption. Between algorithms of the same nature, there is no way to distinguish… 285 …m the RSA key's parameters. (Note that `PSA_ALG_ANY_HASH` is only allowed in signature algorithms.) 326 #### API to convert between signature formats [all …]
|
/mbedtls-latest/include/psa/ |
D | crypto.h | 2893 uint8_t *signature, 2945 const uint8_t *signature, 2998 uint8_t *signature, 3049 const uint8_t *signature, 4717 uint8_t *signature, size_t signature_size, 4838 const uint8_t *signature, size_t signature_length);
|
/mbedtls-latest/tests/src/ |
D | psa_exercise_key.c | 361 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 362 size_t signature_length = sizeof(signature); in exercise_signature_key() 374 signature, sizeof(signature), in exercise_signature_key() 390 signature, signature_length); in exercise_signature_key() 401 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 403 size_t signature_length = sizeof(signature); in exercise_signature_key() 408 signature, sizeof(signature), in exercise_signature_key() 424 signature, signature_length); in exercise_signature_key()
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 119 uint8_t *signature, 141 signature, 162 signature, 182 signature, 194 const uint8_t *signature, 215 signature, 235 signature, 254 signature, 262 uint8_t *signature, size_t signature_size, size_t *signature_length ) 280 signature, signature_size, signature_length ) ); [all …]
|