diff --git a/include/psa/crypto.h b/include/psa/crypto.h index 4f1fd7d91..62334dd6b 100644 --- a/include/psa/crypto.h +++ b/include/psa/crypto.h @@ -1791,7 +1791,7 @@ psa_status_t psa_asymmetric_sign(psa_key_slot_t key, * \param salt_length Size of the \c salt buffer in bytes. * If \c salt is \c NULL, pass 0. * \param signature Buffer containing the signature to verify. - * \param signature_size Size of the \c signature buffer in bytes. + * \param signature_length Size of the \c signature buffer in bytes. * * \retval PSA_SUCCESS * The signature is valid. @@ -1812,7 +1812,7 @@ psa_status_t psa_asymmetric_verify(psa_key_slot_t key, const uint8_t *salt, size_t salt_length, const uint8_t *signature, - size_t signature_size); + size_t signature_length); #define PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(key_type, key_bits, alg) \ (PSA_KEY_TYPE_IS_RSA(key_type) ? \ diff --git a/library/psa_crypto.c b/library/psa_crypto.c index c7a44f6a7..35adbb4ae 100644 --- a/library/psa_crypto.c +++ b/library/psa_crypto.c @@ -1742,7 +1742,7 @@ psa_status_t psa_asymmetric_verify( psa_key_slot_t key, const uint8_t *salt, size_t salt_length, const uint8_t *signature, - size_t signature_size ) + size_t signature_length ) { key_slot_t *slot; psa_status_t status; @@ -1768,7 +1768,7 @@ psa_status_t psa_asymmetric_verify( psa_key_slot_t key, if( status != PSA_SUCCESS ) return( status ); - if( signature_size < rsa->len ) + if( signature_length < rsa->len ) return( PSA_ERROR_BUFFER_TOO_SMALL ); #if defined(MBEDTLS_PKCS1_V15) if( PSA_ALG_IS_RSA_PKCS1V15_SIGN( alg ) ) @@ -1815,7 +1815,7 @@ psa_status_t psa_asymmetric_verify( psa_key_slot_t key, int ret; (void) alg; ret = mbedtls_ecdsa_read_signature( ecdsa, hash, hash_length, - signature, signature_size ); + signature, signature_length ); return( mbedtls_to_psa_error( ret ) ); } else