Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 36) sorted by relevance

12

/mbedtls-development/tests/src/drivers/
A Dtest_driver_signature.c53 uint8_t *signature, in sign_hash() argument
104 (void)signature; in sign_hash()
118 const uint8_t *signature, in verify_hash() argument
162 (void)signature; in verify_hash()
176 uint8_t *signature, in mbedtls_test_transparent_signature_sign_message() argument
220 uint8_t *signature, in mbedtls_test_opaque_signature_sign_message() argument
230 (void) signature; in mbedtls_test_opaque_signature_sign_message()
244 const uint8_t *signature, in mbedtls_test_transparent_signature_verify_message() argument
284 (void) signature; in mbedtls_test_opaque_signature_verify_message()
330 (void) signature; in mbedtls_test_opaque_signature_sign_hash()
[all …]
/mbedtls-development/tests/include/test/drivers/
A Dsignature.h60 uint8_t *signature,
71 uint8_t *signature,
82 const uint8_t *signature,
92 const uint8_t *signature,
100 uint8_t *signature, size_t signature_size, size_t *signature_length );
107 uint8_t *signature, size_t signature_size, size_t *signature_length );
114 const uint8_t *signature, size_t signature_length );
121 const uint8_t *signature, size_t signature_length );
/mbedtls-development/library/
A Dpsa_crypto_ecp.c419 signature, in ecdsa_sign_hash()
422 signature + curve_bytes, in ecdsa_sign_hash()
440 const uint8_t *signature, size_t signature_length ) in ecdsa_verify_hash() argument
469 signature, in ecdsa_verify_hash()
472 signature + curve_bytes, in ecdsa_verify_hash()
555 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_ecdsa_verify_hash() argument
560 signature, signature_length ) ); in mbedtls_psa_ecdsa_verify_hash()
632 (void)signature; in mbedtls_transparent_test_driver_ecdsa_sign_hash()
643 const uint8_t *signature, size_t signature_length ) in mbedtls_transparent_test_driver_ecdsa_verify_hash() argument
649 signature, signature_length ) ); in mbedtls_transparent_test_driver_ecdsa_verify_hash()
[all …]
A Dpsa_crypto_rsa.c417 signature ); in rsa_sign_hash()
435 signature ); in rsa_sign_hash()
481 const uint8_t *signature, size_t signature_length ) in rsa_verify_hash() argument
516 signature ); in rsa_verify_hash()
611 signature, signature_size, signature_length ) ); in mbedtls_psa_rsa_sign_hash()
618 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_rsa_verify_hash() argument
624 signature, signature_length ) ); in mbedtls_psa_rsa_verify_hash()
693 (void)signature; in mbedtls_transparent_test_driver_rsa_sign_hash()
704 const uint8_t *signature, size_t signature_length ) in mbedtls_transparent_test_driver_rsa_verify_hash() argument
712 signature, signature_length ) ); in mbedtls_transparent_test_driver_rsa_verify_hash()
[all …]
A Dpsa_crypto_ecp.h185 uint8_t *signature, size_t signature_size, size_t *signature_length );
220 const uint8_t *signature, size_t signature_length );
246 uint8_t *signature, size_t signature_size, size_t *signature_length );
252 const uint8_t *signature, size_t signature_length );
A Dpsa_crypto_rsa.h177 uint8_t *signature, size_t signature_size, size_t *signature_length );
213 const uint8_t *signature, size_t signature_length );
240 uint8_t *signature, size_t signature_size, size_t *signature_length );
246 const uint8_t *signature, size_t signature_length );
A Dpsa_crypto_core.h418 uint8_t *signature, size_t signature_size, size_t *signature_length );
455 const uint8_t *signature, size_t signature_length );
494 uint8_t *signature, size_t signature_size, size_t *signature_length );
529 const uint8_t *signature, size_t signature_length );
A Dpsa_crypto_driver_wrappers.c78 uint8_t *signature, in psa_driver_wrapper_sign_message() argument
100 signature, in psa_driver_wrapper_sign_message()
121 signature, in psa_driver_wrapper_sign_message()
141 signature, in psa_driver_wrapper_sign_message()
153 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument
174 signature, in psa_driver_wrapper_verify_message()
194 signature, in psa_driver_wrapper_verify_message()
213 signature, in psa_driver_wrapper_verify_message()
275 signature, in psa_driver_wrapper_sign_hash()
323 signature, signature_length ) ); in psa_driver_wrapper_verify_hash()
[all …]
A Dpsa_crypto_driver_wrappers.h38 uint8_t *signature,
49 const uint8_t *signature,
56 uint8_t *signature, size_t signature_size, size_t *signature_length );
62 const uint8_t *signature, size_t signature_length );
A Dpsa_crypto.c2733 memset( signature, '!', signature_size ); in psa_sign_internal()
2776 signature, signature_length ); in psa_verify_internal()
2783 signature, signature_length ); in psa_verify_internal()
2799 uint8_t *signature, in psa_sign_message_builtin() argument
2847 const uint8_t *signature, in psa_verify_message_builtin() argument
2868 signature, signature_length ); in psa_verify_message_builtin()
2883 signature, signature_length ); in psa_verify_message()
2937 (void)signature; in psa_sign_hash_builtin()
2948 uint8_t *signature, in psa_sign_hash() argument
3008 (void)signature; in psa_verify_hash_builtin()
[all …]
/mbedtls-development/tests/suites/
A Dtest_suite_psa_crypto_metadata.data197 Asymmetric signature: RSA PKCS#1 v1.5 raw
201 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
205 Asymmetric signature: RSA PSS SHA-256
209 Asymmetric signature: RSA PSS-any-salt SHA-256
213 Asymmetric signature: randomized ECDSA (no hashing)
217 Asymmetric signature: SHA-256 + randomized ECDSA
225 Asymmetric signature: pure EdDSA
229 Asymmetric signature: Ed25519ph
233 Asymmetric signature: Ed448ph
237 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash
[all …]
A Dtest_suite_psa_crypto_entropy.function72 /* This test case is only expected to pass if the signature mechanism
73 * requires randomness, either because it is a randomized signature
83 uint8_t *signature = NULL;
88 ASSERT_ALLOC( signature, signature_size );
95 signature, signature_size,
107 signature, signature_size,
115 mbedtls_free( signature );
A Dtest_suite_psa_crypto_se_driver_hal_mocks.function580 uint8_t signature[1] = {'S'};
613 signature, sizeof( signature ),
641 const uint8_t signature[1] = {'S'};
673 signature, sizeof( signature ) )
A Dtest_suite_psa_crypto_se_driver_hal.function447 uint8_t *signature,
481 const uint8_t *signature,
503 signature, signature_length );
1284 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1386 signature, sizeof( signature ),
1393 signature, sizeof( signature ),
1405 signature, signature_length ),
1408 /* Change the signature and verify again. */
1409 signature[0] ^= 1;
1412 signature, signature_length ),
[all …]
A Dtest_suite_psa_crypto.function1409 signature, sizeof( signature ),
1416 memset( signature, 0, sizeof( signature ) );
1419 signature, sizeof( signature ) );
1430 signature, sizeof( signature ),
1437 memset( signature, 0, sizeof( signature ) );
1440 signature, sizeof( signature ) );
5090 mbedtls_free( signature );
5135 mbedtls_free( signature );
5206 mbedtls_free( signature );
5321 mbedtls_free( signature );
[all …]
A Dtest_suite_ecdsa.function57 /* prepare material for signature */
205 /* generate and write signature, then read and verify it */
260 /* prepare material for signature */
269 /* generate and write signature, then read and verify it */
A Dtest_suite_psa_crypto.data947 PSA key policy: asymmetric signature, alg=0 in policy
951 PSA key policy: asymmetric signature, sign but not verify
955 PSA key policy: asymmetric signature, verify but not sign
963 PSA key policy: msg asymmetric signature, sign | verify
2510 PSA AEAD decrypt: AES-CCM, invalid signature
2514 PSA AEAD decrypt: AES-CCM, invalid signature, T=4
2690 PSA AEAD decrypt, AES-GCM, invalid signature
3270 PSA Multipart AEAD verify, AES - GCM, invalid signature
3458 PSA signature size: RSA keypair, 1024 bits, PSS
3962 PSA verify message: RSA PSS SHA-256, good signature, 128 bytes (signature size)
[all …]
A Dtest_suite_random.data53 PSA classic wrapper: ECDSA signature (SECP256R1)
A Dtest_suite_psa_crypto_driver_wrappers.function23 uint8_t signature[64];
49 signature, sizeof( signature ),
54 ASSERT_COMPARE( signature, signature_length,
137 uint8_t signature[64];
163 signature, sizeof( signature ),
168 ASSERT_COMPARE( signature, signature_length,
A Dtest_suite_pkcs1_v21.data807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
867 RSASSA-PSS Verification of OpenSSL-generated signature RSA-1032, SHA-512
/mbedtls-development/tests/src/
A Dpsa_exercise_key.c304 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local
305 size_t signature_length = sizeof( signature ); in exercise_signature_key()
329 signature, sizeof( signature ), in exercise_signature_key()
341 signature, signature_length ), in exercise_signature_key()
349 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local
351 size_t signature_length = sizeof( signature ); in exercise_signature_key()
357 signature, sizeof( signature ), in exercise_signature_key()
369 signature, signature_length ), in exercise_signature_key()
/mbedtls-development/docs/
A Duse-psa-crypto.md46 Limitations: only for private keys, only ECC. (That is, only ECDSA signature
60 - `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature
120 Scope: `mbedtls_pk_verify()` will call to PSA for ECDSA signature
125 Use in TLS and X.509: in all places where an ECDSA signature is verified.
150 parent's signature;
184 signature generation is only covered if using `mbedtls_pk_setup_opaque()`.)
202 - RSA PKCS#1 v1.5 signature generation (from PSA-held keys)
203 - RSA PKCS#1 v1.5 signature verification
204 - RSA-PSS signature verification
A Dgetting_started.md117 …encrypting, decrypting, signing and verifying messages using public key signature algorithms, such…
119 **Prerequisites to performing asymmetric signature operations:**
123 * Usage flag `PSA_KEY_USAGE_VERIFY_HASH` to allow signature verification.
124 * Algorithm set to the desired signature algorithm.
136 uint8_t signature[PSA_SIGNATURE_MAX_SIZE] = {0};
166 signature, sizeof(signature),
/mbedtls-development/include/psa/
A Dcrypto.h2925 uint8_t * signature,
2977 const uint8_t * signature,
3030 uint8_t *signature,
3081 const uint8_t *signature,
/mbedtls-development/tests/data_files/
A DReadme-x509.txt57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash
76 -badsign.crt: S5 with corrupted signature
85 -badsign.crt: S7 with corrupted signature + I1
99 -badsign.crt: S10 with corrupted signature

Completed in 66 milliseconds

12