Function esp_idf_sys::mbedtls_pk_sign
source ยท pub unsafe extern "C" fn mbedtls_pk_sign(
ctx: *mut mbedtls_pk_context,
md_alg: mbedtls_md_type_t,
hash: *const c_uchar,
hash_len: usize,
sig: *mut c_uchar,
sig_size: usize,
sig_len: *mut usize,
f_rng: Option<unsafe extern "C" fn(arg1: *mut c_void, arg2: *mut c_uchar, arg3: usize) -> c_int>,
p_rng: *mut c_void,
) -> c_int
Expand description
\brief Make signature, including padding if relevant.
\param ctx The PK context to use. It must have been set up with a private key. \param md_alg Hash algorithm used (see notes) \param hash Hash of the message to sign \param hash_len Hash length \param sig Place to write the signature. It must have enough room for the signature. #MBEDTLS_PK_SIGNATURE_MAX_SIZE is always enough. You may use a smaller buffer if it is large enough given the key type. \param sig_size The size of the \p sig buffer in bytes. \param sig_len On successful return, the number of bytes written to \p sig. \param f_rng RNG function, must not be \c NULL. \param p_rng RNG parameter
\return 0 on success, or a specific error code.
\note For RSA keys, the default padding type is PKCS#1 v1.5. There is no interface in the PK module to make RSASSA-PSS signatures yet.
\note For RSA, md_alg may be MBEDTLS_MD_NONE if hash_len != 0. For ECDSA, md_alg may never be MBEDTLS_MD_NONE.