/mbedtls-development/tests/src/drivers/ |
A D | test_driver_signature.c | 53 uint8_t *signature, in sign_hash() argument 104 (void)signature; in sign_hash() 118 const uint8_t *signature, in verify_hash() argument 162 (void)signature; in verify_hash() 176 uint8_t *signature, in mbedtls_test_transparent_signature_sign_message() argument 220 uint8_t *signature, in mbedtls_test_opaque_signature_sign_message() argument 230 (void) signature; in mbedtls_test_opaque_signature_sign_message() 244 const uint8_t *signature, in mbedtls_test_transparent_signature_verify_message() argument 284 (void) signature; in mbedtls_test_opaque_signature_verify_message() 330 (void) signature; in mbedtls_test_opaque_signature_sign_hash() [all …]
|
/mbedtls-development/tests/include/test/drivers/ |
A D | signature.h | 60 uint8_t *signature, 71 uint8_t *signature, 82 const uint8_t *signature, 92 const uint8_t *signature, 100 uint8_t *signature, size_t signature_size, size_t *signature_length ); 107 uint8_t *signature, size_t signature_size, size_t *signature_length ); 114 const uint8_t *signature, size_t signature_length ); 121 const uint8_t *signature, size_t signature_length );
|
/mbedtls-development/library/ |
A D | psa_crypto_ecp.c | 419 signature, in ecdsa_sign_hash() 422 signature + curve_bytes, in ecdsa_sign_hash() 440 const uint8_t *signature, size_t signature_length ) in ecdsa_verify_hash() argument 469 signature, in ecdsa_verify_hash() 472 signature + curve_bytes, in ecdsa_verify_hash() 555 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_ecdsa_verify_hash() argument 560 signature, signature_length ) ); in mbedtls_psa_ecdsa_verify_hash() 632 (void)signature; in mbedtls_transparent_test_driver_ecdsa_sign_hash() 643 const uint8_t *signature, size_t signature_length ) in mbedtls_transparent_test_driver_ecdsa_verify_hash() argument 649 signature, signature_length ) ); in mbedtls_transparent_test_driver_ecdsa_verify_hash() [all …]
|
A D | psa_crypto_rsa.c | 417 signature ); in rsa_sign_hash() 435 signature ); in rsa_sign_hash() 481 const uint8_t *signature, size_t signature_length ) in rsa_verify_hash() argument 516 signature ); in rsa_verify_hash() 611 signature, signature_size, signature_length ) ); in mbedtls_psa_rsa_sign_hash() 618 const uint8_t *signature, size_t signature_length ) in mbedtls_psa_rsa_verify_hash() argument 624 signature, signature_length ) ); in mbedtls_psa_rsa_verify_hash() 693 (void)signature; in mbedtls_transparent_test_driver_rsa_sign_hash() 704 const uint8_t *signature, size_t signature_length ) in mbedtls_transparent_test_driver_rsa_verify_hash() argument 712 signature, signature_length ) ); in mbedtls_transparent_test_driver_rsa_verify_hash() [all …]
|
A D | psa_crypto_ecp.h | 185 uint8_t *signature, size_t signature_size, size_t *signature_length ); 220 const uint8_t *signature, size_t signature_length ); 246 uint8_t *signature, size_t signature_size, size_t *signature_length ); 252 const uint8_t *signature, size_t signature_length );
|
A D | psa_crypto_rsa.h | 177 uint8_t *signature, size_t signature_size, size_t *signature_length ); 213 const uint8_t *signature, size_t signature_length ); 240 uint8_t *signature, size_t signature_size, size_t *signature_length ); 246 const uint8_t *signature, size_t signature_length );
|
A D | psa_crypto_core.h | 418 uint8_t *signature, size_t signature_size, size_t *signature_length ); 455 const uint8_t *signature, size_t signature_length ); 494 uint8_t *signature, size_t signature_size, size_t *signature_length ); 529 const uint8_t *signature, size_t signature_length );
|
A D | psa_crypto_driver_wrappers.c | 78 uint8_t *signature, in psa_driver_wrapper_sign_message() argument 100 signature, in psa_driver_wrapper_sign_message() 121 signature, in psa_driver_wrapper_sign_message() 141 signature, in psa_driver_wrapper_sign_message() 153 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument 174 signature, in psa_driver_wrapper_verify_message() 194 signature, in psa_driver_wrapper_verify_message() 213 signature, in psa_driver_wrapper_verify_message() 275 signature, in psa_driver_wrapper_sign_hash() 323 signature, signature_length ) ); in psa_driver_wrapper_verify_hash() [all …]
|
A D | psa_crypto_driver_wrappers.h | 38 uint8_t *signature, 49 const uint8_t *signature, 56 uint8_t *signature, size_t signature_size, size_t *signature_length ); 62 const uint8_t *signature, size_t signature_length );
|
A D | psa_crypto.c | 2733 memset( signature, '!', signature_size ); in psa_sign_internal() 2776 signature, signature_length ); in psa_verify_internal() 2783 signature, signature_length ); in psa_verify_internal() 2799 uint8_t *signature, in psa_sign_message_builtin() argument 2847 const uint8_t *signature, in psa_verify_message_builtin() argument 2868 signature, signature_length ); in psa_verify_message_builtin() 2883 signature, signature_length ); in psa_verify_message() 2937 (void)signature; in psa_sign_hash_builtin() 2948 uint8_t *signature, in psa_sign_hash() argument 3008 (void)signature; in psa_verify_hash_builtin() [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_metadata.data | 197 Asymmetric signature: RSA PKCS#1 v1.5 raw 201 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 205 Asymmetric signature: RSA PSS SHA-256 209 Asymmetric signature: RSA PSS-any-salt SHA-256 213 Asymmetric signature: randomized ECDSA (no hashing) 217 Asymmetric signature: SHA-256 + randomized ECDSA 225 Asymmetric signature: pure EdDSA 229 Asymmetric signature: Ed25519ph 233 Asymmetric signature: Ed448ph 237 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash [all …]
|
A D | test_suite_psa_crypto_entropy.function | 72 /* This test case is only expected to pass if the signature mechanism 73 * requires randomness, either because it is a randomized signature 83 uint8_t *signature = NULL; 88 ASSERT_ALLOC( signature, signature_size ); 95 signature, signature_size, 107 signature, signature_size, 115 mbedtls_free( signature );
|
A D | test_suite_psa_crypto_se_driver_hal_mocks.function | 580 uint8_t signature[1] = {'S'}; 613 signature, sizeof( signature ), 641 const uint8_t signature[1] = {'S'}; 673 signature, sizeof( signature ) )
|
A D | test_suite_psa_crypto_se_driver_hal.function | 447 uint8_t *signature, 481 const uint8_t *signature, 503 signature, signature_length ); 1284 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1386 signature, sizeof( signature ), 1393 signature, sizeof( signature ), 1405 signature, signature_length ), 1408 /* Change the signature and verify again. */ 1409 signature[0] ^= 1; 1412 signature, signature_length ), [all …]
|
A D | test_suite_psa_crypto.function | 1409 signature, sizeof( signature ), 1416 memset( signature, 0, sizeof( signature ) ); 1419 signature, sizeof( signature ) ); 1430 signature, sizeof( signature ), 1437 memset( signature, 0, sizeof( signature ) ); 1440 signature, sizeof( signature ) ); 5090 mbedtls_free( signature ); 5135 mbedtls_free( signature ); 5206 mbedtls_free( signature ); 5321 mbedtls_free( signature ); [all …]
|
A D | test_suite_ecdsa.function | 57 /* prepare material for signature */ 205 /* generate and write signature, then read and verify it */ 260 /* prepare material for signature */ 269 /* generate and write signature, then read and verify it */
|
A D | test_suite_psa_crypto.data | 947 PSA key policy: asymmetric signature, alg=0 in policy 951 PSA key policy: asymmetric signature, sign but not verify 955 PSA key policy: asymmetric signature, verify but not sign 963 PSA key policy: msg asymmetric signature, sign | verify 2510 PSA AEAD decrypt: AES-CCM, invalid signature 2514 PSA AEAD decrypt: AES-CCM, invalid signature, T=4 2690 PSA AEAD decrypt, AES-GCM, invalid signature 3270 PSA Multipart AEAD verify, AES - GCM, invalid signature 3458 PSA signature size: RSA keypair, 1024 bits, PSS 3962 PSA verify message: RSA PSS SHA-256, good signature, 128 bytes (signature size) [all …]
|
A D | test_suite_random.data | 53 PSA classic wrapper: ECDSA signature (SECP256R1)
|
A D | test_suite_psa_crypto_driver_wrappers.function | 23 uint8_t signature[64]; 49 signature, sizeof( signature ), 54 ASSERT_COMPARE( signature, signature_length, 137 uint8_t signature[64]; 163 signature, sizeof( signature ), 168 ASSERT_COMPARE( signature, signature_length,
|
A D | test_suite_pkcs1_v21.data | 807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0 835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature 867 RSASSA-PSS Verification of OpenSSL-generated signature RSA-1032, SHA-512
|
/mbedtls-development/tests/src/ |
A D | psa_exercise_key.c | 304 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local 305 size_t signature_length = sizeof( signature ); in exercise_signature_key() 329 signature, sizeof( signature ), in exercise_signature_key() 341 signature, signature_length ), in exercise_signature_key() 349 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; in exercise_signature_key() local 351 size_t signature_length = sizeof( signature ); in exercise_signature_key() 357 signature, sizeof( signature ), in exercise_signature_key() 369 signature, signature_length ), in exercise_signature_key()
|
/mbedtls-development/docs/ |
A D | use-psa-crypto.md | 46 Limitations: only for private keys, only ECC. (That is, only ECDSA signature 60 - `mbedtls_x509write_csr_set_key()` to generate a CSR (certificate signature 120 Scope: `mbedtls_pk_verify()` will call to PSA for ECDSA signature 125 Use in TLS and X.509: in all places where an ECDSA signature is verified. 150 parent's signature; 184 signature generation is only covered if using `mbedtls_pk_setup_opaque()`.) 202 - RSA PKCS#1 v1.5 signature generation (from PSA-held keys) 203 - RSA PKCS#1 v1.5 signature verification 204 - RSA-PSS signature verification
|
A D | getting_started.md | 117 …encrypting, decrypting, signing and verifying messages using public key signature algorithms, such… 119 **Prerequisites to performing asymmetric signature operations:** 123 * Usage flag `PSA_KEY_USAGE_VERIFY_HASH` to allow signature verification. 124 * Algorithm set to the desired signature algorithm. 136 uint8_t signature[PSA_SIGNATURE_MAX_SIZE] = {0}; 166 signature, sizeof(signature),
|
/mbedtls-development/include/psa/ |
A D | crypto.h | 2925 uint8_t * signature, 2977 const uint8_t * signature, 3030 uint8_t *signature, 3081 const uint8_t *signature,
|
/mbedtls-development/tests/data_files/ |
A D | Readme-x509.txt | 57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash 76 -badsign.crt: S5 with corrupted signature 85 -badsign.crt: S7 with corrupted signature + I1 99 -badsign.crt: S10 with corrupted signature
|