/mbedtls-development/tests/suites/ |
A D | test_suite_ecdsa.function | 198 memset( sig, 0x2a, sizeof( sig ) ); 224 sig[0]++; 227 sig[0]--; 230 sig[10]++; 233 sig[10]--; 258 memset( sig, 0x2a, sizeof( sig ) ); 288 sig[0]++; 291 sig[0]--; 349 sig->x[sig->len - 1]++; 355 sig->x[sig->len - 1]--; [all …]
|
A D | test_suite_pk.function | 534 memset( sig, 0, sizeof( sig ) ); 588 sig[0]++; 594 sig[0]--; 644 memset( sig, 0, sizeof sig ); 676 sig, sizeof sig, &sig_len, 839 memset( sig, 0, sizeof sig ); 856 sig, sizeof sig, &sig_len, 885 memset( sig, 0, sizeof sig ); 912 sig, sizeof sig, &sig_len, 917 sig, sizeof sig, &sig_len, [all …]
|
A D | test_suite_x509write.function | 20 const unsigned char *hash, unsigned char *sig ) 23 md_alg, hashlen, hash, sig ) ); 58 csr.sig.p, csr.sig.len ) != 0 )
|
/mbedtls-development/library/ |
A D | pk_wrap.c | 127 hash, sig ) ); in rsa_sign_wrap() 284 sig, sig_size, sig_len, in eckey_sign_wrap() 611 p = (unsigned char*) sig; in ecdsa_verify_wrap() 627 if( p != sig + sig_len ) in ecdsa_verify_wrap() 678 hash, hash_len, sig, sig_len, in ecdsa_verify_rs_wrap() 820 unsigned char sig[MBEDTLS_MPI_MAX_SIZE]; in rsa_alt_check_pair() local 832 sig, sizeof( sig ), &sig_len, in rsa_alt_check_pair() 1002 unsigned char *p = sig + buf_len; in pk_ecdsa_sig_asn1_from_psa() 1011 memmove( sig, p, len ); in pk_ecdsa_sig_asn1_from_psa() 1029 ((void) sig); in pk_opaque_sign_wrap() [all …]
|
A D | ecdsa.c | 277 ECDSA_RS_ENTER( sig ); in ecdsa_sign_restartable() 285 pk = &rs_ctx->sig->k; in ecdsa_sign_restartable() 286 pr = &rs_ctx->sig->r; in ecdsa_sign_restartable() 381 ECDSA_RS_LEAVE( sig ); in ecdsa_sign_restartable() 669 memcpy( sig, p, len ); in ecdsa_signature_to_asn1() 740 ECDSA_VALIDATE_RET( sig != NULL ); in mbedtls_ecdsa_write_signature() 756 ECDSA_VALIDATE_RET( sig != NULL ); in mbedtls_ecdsa_read_signature() 776 ECDSA_VALIDATE_RET( sig != NULL ); in mbedtls_ecdsa_read_signature_restartable() 897 ctx->sig = NULL; in mbedtls_ecdsa_restart_init() 918 mbedtls_free( ctx->sig ); in mbedtls_ecdsa_restart_free() [all …]
|
A D | pk.c | 278 const unsigned char *sig, size_t sig_len, in mbedtls_pk_verify_restartable() argument 284 PK_VALIDATE_RET( sig != NULL ); in mbedtls_pk_verify_restartable() 317 sig, sig_len ) ); in mbedtls_pk_verify_restartable() 325 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify() argument 337 const unsigned char *sig, size_t sig_len ) in mbedtls_pk_verify_ext() argument 342 PK_VALIDATE_RET( sig != NULL ); in mbedtls_pk_verify_ext() 373 sig ); in mbedtls_pk_verify_ext() 406 PK_VALIDATE_RET( sig != NULL ); in mbedtls_pk_sign_restartable() 425 sig, sig_size, sig_len, in mbedtls_pk_sign_restartable() 442 sig, sig_size, sig_len, in mbedtls_pk_sign_restartable() [all …]
|
A D | pk_wrap.h | 47 const unsigned char *sig, size_t sig_len ); 52 unsigned char *sig, size_t sig_size, size_t *sig_len, 60 const unsigned char *sig, size_t sig_len, 66 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
A D | x509write_csr.c | 139 unsigned char *sig, size_t sig_size, in x509write_csr_der_internal() argument 239 sig, sig_size, &sig_len, in x509write_csr_der_internal() 272 sig, sig_len ) ); in x509write_csr_der_internal() 301 unsigned char *sig; in mbedtls_x509write_csr_der() local 303 if( ( sig = mbedtls_calloc( 1, MBEDTLS_PK_SIGNATURE_MAX_SIZE ) ) == NULL ) in mbedtls_x509write_csr_der() 309 sig, MBEDTLS_PK_SIGNATURE_MAX_SIZE, in mbedtls_x509write_csr_der() 312 mbedtls_free( sig ); in mbedtls_x509write_csr_der()
|
A D | rsa.c | 1765 unsigned char *p = sig; in rsa_rsassa_pss_sign() 1776 RSA_VALIDATE_RET( sig != NULL ); in rsa_rsassa_pss_sign() 1829 memset( sig, 0, olen ); in rsa_rsassa_pss_sign() 1880 return mbedtls_rsa_private( ctx, f_rng, p_rng, sig, sig ); in rsa_rsassa_pss_sign() 2070 RSA_VALIDATE_RET( sig != NULL ); in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2109 memcpy( sig, sig_try, ctx->len ); in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2134 RSA_VALIDATE_RET( sig != NULL ); in mbedtls_rsa_pkcs1_sign() 2180 RSA_VALIDATE_RET( sig != NULL ); in mbedtls_rsa_rsassa_pss_verify_ext() 2308 RSA_VALIDATE_RET( sig != NULL ); in mbedtls_rsa_rsassa_pss_verify() 2341 RSA_VALIDATE_RET( sig != NULL ); in mbedtls_rsa_rsassa_pkcs1_v15_verify() [all …]
|
A D | x509write_crt.c | 334 unsigned char sig[MBEDTLS_PK_SIGNATURE_MAX_SIZE]; in mbedtls_x509write_crt_der() local 476 hash, 0, sig, sizeof( sig ), &sig_len, in mbedtls_x509write_crt_der() 492 sig_oid, sig_oid_len, sig, sig_len ) ); in mbedtls_x509write_crt_der()
|
A D | x509.c | 629 int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig ) in mbedtls_x509_get_sig() argument 644 sig->tag = tag_type; in mbedtls_x509_get_sig() 645 sig->len = len; in mbedtls_x509_get_sig() 646 sig->p = *p; in mbedtls_x509_get_sig()
|
A D | x509_create.c | 291 unsigned char *sig, size_t size ) in mbedtls_x509_write_sig() argument 301 memcpy( *p, sig, len ); in mbedtls_x509_write_sig()
|
A D | x509_crt.c | 1328 if( ( ret = mbedtls_x509_get_sig( &p, end, &crt->sig ) ) != 0 ) in x509_crt_parse_der_core() 2386 crl_list->sig.p, crl_list->sig.len ) != 0 ) in x509_crt_verifycrl() 2462 child->sig.p, child->sig.len, &rs_ctx->pk ) ); in x509_crt_check_signature() 2470 child->sig.p, child->sig.len ) ); in x509_crt_check_signature()
|
A D | x509_csr.c | 238 if( ( ret = mbedtls_x509_get_sig( &p, end, &csr->sig ) ) != 0 ) in mbedtls_x509_csr_parse_der()
|
A D | x509_crl.c | 515 if( ( ret = mbedtls_x509_get_sig( &p, end, &crl->sig ) ) != 0 ) in mbedtls_x509_crl_parse_der()
|
A D | ssl_misc.h | 1261 mbedtls_pk_type_t mbedtls_ssl_pk_alg_from_sig( unsigned char sig );
|
/mbedtls-development/programs/pkey/ |
A D | ecdsa.c | 107 unsigned char sig[MBEDTLS_ECDSA_MAX_LEN]; in main() local 116 memset( sig, 0, sizeof( sig ) ); in main() 183 sig, sizeof( sig ), &sig_len, in main() 191 dump_buf( " + Signature: ", sig, sig_len ); in main() 223 sig, sig_len ) ) != 0 ) in main()
|
/mbedtls-development/include/mbedtls/ |
A D | rsa.h | 823 unsigned char *sig ); 855 unsigned char *sig ); 907 unsigned char *sig ); 956 unsigned char *sig ); 988 const unsigned char *sig ); 1013 const unsigned char *sig ); 1048 const unsigned char *sig ); 1090 const unsigned char *sig );
|
A D | ecdsa.h | 110 mbedtls_ecdsa_restart_sig_ctx *MBEDTLS_PRIVATE(sig); /*!< ecdsa_sign() sub-context */ 310 unsigned char *sig, size_t sig_size, size_t *slen, 357 unsigned char *sig, size_t sig_size, size_t *slen, 391 const unsigned char *sig, size_t slen ); 426 const unsigned char *sig, size_t slen,
|
A D | pk.h | 255 const unsigned char *hash, unsigned char *sig ); 443 const unsigned char *sig, size_t sig_len ); 468 const unsigned char *sig, size_t sig_len, 503 const unsigned char *sig, size_t sig_len ); 535 unsigned char *sig, size_t sig_size, size_t *sig_len, 570 unsigned char *sig, size_t sig_size, size_t *sig_len,
|
A D | x509.h | 326 int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig ); 352 unsigned char *sig, size_t size );
|
A D | x509_crl.h | 97 mbedtls_x509_buf MBEDTLS_PRIVATE(sig);
|
A D | x509_csr.h | 63 mbedtls_x509_buf MBEDTLS_PRIVATE(sig);
|
A D | x509_crt.h | 93 …mbedtls_x509_buf MBEDTLS_PRIVATE(sig); /**< Signature: hash of the tbs part signed w…
|
/mbedtls-development/programs/ssl/ |
A D | ssl_server2.c | 958 void term_handler( int sig ) in term_handler() argument 960 ((void) sig); in term_handler()
|