Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 56) sorted by relevance

123

/mbedtls-latest/tests/src/drivers/
Dtest_driver_signature.c48 uint8_t *signature, in sign_hash() argument
62 signature, signature_size, signature_length); in sign_hash()
69 signature, signature_size, signature_length); in sign_hash()
83 signature, signature_size, signature_length); in sign_hash()
90 signature, signature_size, signature_length); in sign_hash()
103 (void) signature; in sign_hash()
116 const uint8_t *signature, in verify_hash() argument
129 signature, signature_length); in verify_hash()
136 signature, signature_length); in verify_hash()
150 signature, signature_length); in verify_hash()
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_lms.data3 # message, and verifies the signature.
8 # signs the message, and verifies the signature.
14 …./framework/data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
15 # uses leaf key 0, so must be the first signature generated by the key if the
16 # signature is to be reproduced. Message data is random. Note that pyhsslms
18 # word at the start of the key/sig. We strip these 4 bytes from the signature
21 # To produce another signature with this message and key (note that the actual
22 # signature bytes will differ due to randomization):
39 # The signature uses leaf key 1, so must be the second signature generated by
40 # the key if the signature is to be reproduced.
[all …]
Dtest_suite_lmots.data3 # message, and verifies the signature.
8 # message, and verifies the signature.
13 # signs the message, and verifies the signature.
19 # providing direct access to the underlying OTS signature scheme. The private
24 # To produce another signature with this message and key (note that the actual
25 # signature bytes will differ due to randomization):
44 # providing direct access to the underlying OTS signature scheme. The private
49 # To produce another signature with this message and key (note that the actual
50 # signature bytes will differ due to randomization):
69 # providing direct access to the underlying OTS signature scheme. The private
[all …]
Dtest_suite_psa_crypto_metadata.data217 Asymmetric signature: RSA PKCS#1 v1.5 raw
221 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
225 Asymmetric signature: RSA PSS SHA-256
229 Asymmetric signature: RSA PSS-any-salt SHA-256
233 Asymmetric signature: randomized ECDSA (no hashing)
237 Asymmetric signature: SHA-256 + randomized ECDSA
241 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
245 Asymmetric signature: pure EdDSA
249 Asymmetric signature: Ed25519ph
253 Asymmetric signature: Ed448ph
[all …]
Dtest_suite_psa_crypto_entropy.function102 /* This test case is only expected to pass if the signature mechanism
103 * requires randomness, either because it is a randomized signature
113 uint8_t *signature = NULL;
118 TEST_CALLOC(signature, signature_size);
125 signature, signature_size,
137 signature, signature_size,
145 mbedtls_free(signature);
Dtest_suite_psa_crypto.function2522 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 };
2543 signature, sizeof(signature),
2551 memset(signature, 0, sizeof(signature));
2554 signature, sizeof(signature));
2565 signature, sizeof(signature),
2573 memset(signature, 0, sizeof(signature));
2576 signature, sizeof(signature));
6796 unsigned char *signature = NULL;
6818 TEST_CALLOC(signature, signature_size);
6820 /* Perform the signature. */
[all …]
Dtest_suite_psa_crypto_se_driver_hal.function462 uint8_t *signature,
484 signature, signature_size, signature_length);
496 const uint8_t *signature,
518 signature, signature_length);
1316 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1414 signature, sizeof(signature),
1421 signature, sizeof(signature),
1429 signature, signature_length));
1433 signature, signature_length),
1436 /* Change the signature and verify again. */
[all …]
Dtest_suite_ecdsa.function57 /* prepare material for signature */
124 /* Valid signature */
128 /* Invalid signature: wrong public key (G instead of Q) */
250 /* generate and write signature, then read and verify it */
310 /* prepare material for signature */
319 /* generate and write signature, then read and verify it */
513 /* Prepare signature R & S */
Dtest_suite_psa_crypto_util.data47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter)
51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter)
55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer)
59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
Dtest_suite_psa_crypto_se_driver_hal_mocks.function567 uint8_t signature[1] = { 'S' };
600 signature, sizeof(signature),
628 const uint8_t signature[1] = { 'S' };
660 signature, sizeof(signature))
/mbedtls-latest/tests/include/test/drivers/
Dsignature.h48 uint8_t *signature,
59 uint8_t *signature,
70 const uint8_t *signature,
80 const uint8_t *signature,
88 uint8_t *signature, size_t signature_size, size_t *signature_length);
95 uint8_t *signature, size_t signature_size, size_t *signature_length);
102 const uint8_t *signature, size_t signature_length);
109 const uint8_t *signature, size_t signature_length);
/mbedtls-latest/3rdparty/p256-m/
Dp256-m_driver_entrypoints.c210 uint8_t *signature, in p256_transparent_sign_hash() argument
228 int ret = p256_ecdsa_sign(signature, key_buffer, hash, hash_length); in p256_transparent_sign_hash()
243 const uint8_t *signature, in p256_verify_hash_with_public_key() argument
256 int ret = p256_ecdsa_verify(signature, public_key_p256m, hash, hash_length); in p256_verify_hash_with_public_key()
268 const uint8_t *signature, in p256_transparent_verify_hash() argument
305 signature, in p256_transparent_verify_hash()
Dp256-m_driver_entrypoints.h174 uint8_t *signature,
216 const uint8_t *signature,
/mbedtls-latest/library/
Dpsa_crypto_driver_wrappers.h163 uint8_t *signature, in psa_driver_wrapper_sign_message() argument
188 signature, in psa_driver_wrapper_sign_message()
203 signature, in psa_driver_wrapper_sign_message()
215 signature, in psa_driver_wrapper_sign_message()
231 signature, in psa_driver_wrapper_sign_message()
253 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument
277 signature, in psa_driver_wrapper_verify_message()
291 signature, in psa_driver_wrapper_verify_message()
302 signature, in psa_driver_wrapper_verify_message()
316 signature, in psa_driver_wrapper_verify_message()
[all …]
Dpsa_crypto_core.h479 uint8_t *signature, size_t signature_size, size_t *signature_length);
516 const uint8_t *signature, size_t signature_length);
555 uint8_t *signature, size_t signature_size, size_t *signature_length);
590 const uint8_t *signature, size_t signature_length);
823 uint8_t *signature, size_t signature_size,
885 const uint8_t *signature, size_t signature_length);
Dpsa_crypto.c2998 uint8_t *signature, argument
3040 signature, signature_size, signature_length);
3046 signature, signature_size, signature_length);
3051 psa_wipe_tag_output_buffer(signature, status, signature_size,
3064 const uint8_t *signature, argument
3090 signature, signature_length);
3095 signature, signature_length);
3111 uint8_t *signature, argument
3133 signature, signature_size, signature_length);
3149 LOCAL_OUTPUT_DECLARE(signature_external, signature);
[all …]
Dpsa_crypto_ecp.c369 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument
418 signature, in mbedtls_psa_ecdsa_sign_hash()
421 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash()
455 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument
483 signature, in mbedtls_psa_ecdsa_verify_hash()
490 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
Dpsa_crypto_rsa.c320 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument
356 signature); in mbedtls_psa_rsa_sign_hash()
371 signature); in mbedtls_psa_rsa_sign_hash()
419 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument
453 signature); in mbedtls_psa_rsa_verify_hash()
468 signature); in mbedtls_psa_rsa_verify_hash()
Dpsa_crypto_ecp.h182 uint8_t *signature, size_t signature_size, size_t *signature_length);
217 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_rsa.h169 uint8_t *signature, size_t signature_size, size_t *signature_length);
205 const uint8_t *signature, size_t signature_length);
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md27 operations that should use PSA do not (signature generation & verification) as
95 As standardized, the signature scheme takes several parameters, in addition to
112 - signature: `mbedtls_rsa_rsassa_pss_sign()`
116 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()`
129 - signature: not supported
138 - signature generation:
156 encoded as part of the key, and of the signature. If both encoding are
158 value from the signature parameters is used.
168 - verifying the signature on a certificate from its parent;
169 - verifying the signature on a CRL from the issuing CA.
[all …]
Dpsa-legacy-bridges.md122 * RSA: PKCS#1v1.5 signature, PSS signature, PKCS#1v1.5 encryption, OAEP encryption.
123 * ECC: ECDSA signature (randomized or deterministic), ECDH key agreement (via `mbedtls_pk_ec`).
141 …rministic is made at compile time. For RSA, the choice of encryption or signature algorithm is mad…
183 The pk module uses signature formats intended for X.509. The PSA module uses the simplest sensible
190 …TLS 4.x and perhaps beyond. We will at least add EdDSA support, and its signature encoding is the …
192signature format, parametrized by the algorithm. However, it is difficult to predict exactly what …
194signature field) or X.509 (the signature is inside a BITSTRING, not directly in a SEQUENCE). So th…
251signature or for encryption. Between algorithms of the same nature, there is no way to distinguish…
285 …m the RSA key's parameters. (Note that `PSA_ALG_ANY_HASH` is only allowed in signature algorithms.)
326 #### API to convert between signature formats
[all …]
/mbedtls-latest/include/psa/
Dcrypto.h2893 uint8_t *signature,
2945 const uint8_t *signature,
2998 uint8_t *signature,
3049 const uint8_t *signature,
4717 uint8_t *signature, size_t signature_size,
4838 const uint8_t *signature, size_t signature_length);
/mbedtls-latest/tests/src/
Dpsa_exercise_key.c361 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
362 size_t signature_length = sizeof(signature); in exercise_signature_key()
374 signature, sizeof(signature), in exercise_signature_key()
390 signature, signature_length); in exercise_signature_key()
401 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
403 size_t signature_length = sizeof(signature); in exercise_signature_key()
408 signature, sizeof(signature), in exercise_signature_key()
424 signature, signature_length); in exercise_signature_key()
/mbedtls-latest/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja119 uint8_t *signature,
141 signature,
162 signature,
182 signature,
194 const uint8_t *signature,
215 signature,
235 signature,
254 signature,
262 uint8_t *signature, size_t signature_size, size_t *signature_length )
280 signature, signature_size, signature_length ) );
[all …]

123