/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_hash.data | 1 PSA hash finish: SHA-1 Test Vector NIST CAVS #1 5 PSA hash finish: SHA-1 Test Vector NIST CAVS #2 9 PSA hash finish: SHA-1 Test Vector NIST CAVS #3 13 PSA hash finish: SHA-1 Test Vector NIST CAVS #4 17 PSA hash finish: SHA-1 Test Vector NIST CAVS #5 21 PSA hash finish: SHA-1 Test Vector NIST CAVS #6 25 PSA hash finish: SHA-1 Test Vector NIST CAVS #7 29 PSA hash finish: SHA-1 Test Vector NIST CAVS #8 33 PSA hash finish: SHA-1 Test Vector NIST CAVS #9 37 PSA hash finish: SHA-1 Test Vector NIST CAVS #10 [all …]
|
D | test_suite_ecdsa.function | 80 data_t *hash, char *r_str, char *s_str, 116 TEST_ASSERT(mbedtls_ecdsa_sign(&grp, &r, &s, &d, hash->x, hash->len, 125 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, 129 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, 136 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 138 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 140 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 146 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 148 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 150 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, [all …]
|
D | test_suite_shax.function | 9 void mbedtls_sha1(data_t *src_str, data_t *hash) 18 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 20, hash->len) == 0); 43 void sha224(data_t *src_str, data_t *hash) 52 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 28, hash->len), 0); 57 void mbedtls_sha256(data_t *src_str, data_t *hash) 66 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 32, hash->len), 0); 91 void sha384(data_t *src_str, data_t *hash) 100 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 48, hash->len), 0); 105 void mbedtls_sha512(data_t *src_str, data_t *hash) 114 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 64, hash->len), 0); [all …]
|
D | test_suite_md.function | 195 void md_text(int md_type, char *text_src_string, data_t *hash) 209 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 217 void md_hex(int md_type, data_t *src_str, data_t *hash) 230 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 239 data_t *hash) 272 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 279 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 289 void md_hex_multi(int md_type, data_t *src_str, data_t *hash) 319 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 326 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); [all …]
|
D | test_suite_oid.data | 61 OID hash id - id-md5 65 OID hash id - id-sha1 69 OID hash id - id-sha224 73 OID hash id - id-sha256 77 OID hash id - id-sha384 81 OID hash id - id-sha512 85 OID hash id - id-sha3-224 89 OID hash id - id-sha3-256 93 OID hash id - id-sha3-384 97 OID hash id - id-sha3-512 [all …]
|
D | test_suite_pkcs1_v21.function | 12 int hash, data_t *message_str, data_t *rnd_buf, 30 MBEDTLS_RSA_PKCS_V21, hash) == 0); 34 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 63 data_t *input_N, data_t *input_E, int hash, 81 MBEDTLS_RSA_PKCS_V21, hash) == 0); 84 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 128 int hash, data_t *hash_digest, data_t *rnd_buf, 148 MBEDTLS_RSA_PKCS_V21, hash) == 0); 151 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 195 int digest, int hash, data_t *hash_digest, [all …]
|
D | test_suite_mdx.function | 7 void md5_text(char *text_src_string, data_t *hash) 21 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 22 sizeof(output), hash->len) == 0); 27 void ripemd160_text(char *text_src_string, data_t *hash) 41 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 42 sizeof(output), hash->len) == 0);
|
D | test_suite_pk.function | 482 const unsigned char *hash, unsigned char *sig) 488 md_alg, hashlen, hash, sig); 1198 void pk_ec_test_vec(int type, int id, data_t *key, data_t *hash, 1224 hash->x, hash->len, sig->x, sig->len) == ret); 1235 int md_alg, data_t *hash, data_t *sig_check, 1264 ret = mbedtls_pk_sign_restartable(&prv, md_alg, hash->x, hash->len, 1280 hash->x, hash->len, sig, slen, &rs_ctx); 1290 hash->x, hash->len, sig, slen, &rs_ctx); 1299 hash->x, hash->len, sig, slen, &rs_ctx); 1304 ret = mbedtls_pk_sign_restartable(&prv, md_alg, hash->x, hash->len, [all …]
|
D | test_suite_lms.data | 56 # signature is to be reproduced. Message data is random. Note that hash-sigs 82 LMS hash-sigs interop test #1 83 # This test uses data from https://github.com/cisco/hash-sigs due to the 89 # hash-sigs stores public keys and signatures in HSS form, which appends a 95 # * <download and build hash-sigs> 99 # * <hash-sigs>/demo sign tmp/lms message.bin 107 # * <hash-sigs/demo> verify tmp/lms message.bin 110 LMS hash-sigs interop test #2 111 # This test uses data from https://github.com/cisco/hash-sigs due to the 117 # hash-sigs stores public keys and signatures in HSS form, which appends a [all …]
|
/mbedtls-latest/tests/src/drivers/ |
D | test_driver_signature.c | 46 const uint8_t *hash, in sign_hash() argument 61 alg, hash, hash_length, in sign_hash() 68 alg, hash, hash_length, in sign_hash() 82 alg, hash, hash_length, in sign_hash() 89 alg, hash, hash_length, in sign_hash() 101 (void) hash; in sign_hash() 114 const uint8_t *hash, in verify_hash() argument 128 alg, hash, hash_length, in verify_hash() 135 alg, hash, hash_length, in verify_hash() 149 alg, hash, hash_length, in verify_hash() [all …]
|
D | hash.c | 25 uint8_t *hash, size_t hash_size, size_t *hash_length) in mbedtls_test_transparent_hash_compute() argument 38 hash, hash_size, hash_length); in mbedtls_test_transparent_hash_compute() 43 hash, hash_size, hash_length); in mbedtls_test_transparent_hash_compute() 48 (void) hash; in mbedtls_test_transparent_hash_compute() 145 uint8_t *hash, in mbedtls_test_transparent_hash_finish() argument 159 operation, hash, hash_size, hash_length); in mbedtls_test_transparent_hash_finish() 162 mbedtls_psa_hash_finish(operation, hash, hash_size, hash_length); in mbedtls_test_transparent_hash_finish() 165 (void) hash; in mbedtls_test_transparent_hash_finish()
|
/mbedtls-latest/library/ |
D | pk_wrap.c | 66 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 113 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap() 131 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 150 hash, sig)) != 0) { in rsa_verify_wrap() 170 const unsigned char *hash, size_t hash_len, in mbedtls_pk_psa_rsa_sign_ext() argument 210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 231 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 250 return mbedtls_pk_psa_rsa_sign_ext(psa_alg, pk->pk_ctx, hash, hash_len, in rsa_sign_wrap() 255 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 274 hash, sig); in rsa_sign_wrap() [all …]
|
D | psa_crypto_hash.c | 342 uint8_t *hash, in mbedtls_psa_hash_finish() argument 357 memset(hash, '!', hash_size); in mbedtls_psa_hash_finish() 368 ret = mbedtls_md5_finish(&operation->ctx.md5, hash); in mbedtls_psa_hash_finish() 373 ret = mbedtls_ripemd160_finish(&operation->ctx.ripemd160, hash); in mbedtls_psa_hash_finish() 378 ret = mbedtls_sha1_finish(&operation->ctx.sha1, hash); in mbedtls_psa_hash_finish() 383 ret = mbedtls_sha256_finish(&operation->ctx.sha256, hash); in mbedtls_psa_hash_finish() 388 ret = mbedtls_sha256_finish(&operation->ctx.sha256, hash); in mbedtls_psa_hash_finish() 393 ret = mbedtls_sha512_finish(&operation->ctx.sha512, hash); in mbedtls_psa_hash_finish() 398 ret = mbedtls_sha512_finish(&operation->ctx.sha512, hash); in mbedtls_psa_hash_finish() 417 ret = mbedtls_sha3_finish(&operation->ctx.sha3, hash, hash_size); in mbedtls_psa_hash_finish() [all …]
|
D | pk.c | 1040 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() argument 1044 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_restartable() 1065 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1081 return ctx->pk_info->verify_func(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify_restartable() 1089 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument 1092 return mbedtls_pk_verify_restartable(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify() 1101 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument 1104 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_ext() 1122 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1186 status = psa_verify_hash(key_id, psa_sig_alg, hash, in mbedtls_pk_verify_ext() [all …]
|
D | sha3.c | 541 uint8_t hash[64]; in mbedtls_sha3_kat_test() local 546 hash, sizeof(hash)); in mbedtls_sha3_kat_test() 558 result = memcmp(hash, test_hash_sha3_224[test_num], 28); in mbedtls_sha3_kat_test() 561 result = memcmp(hash, test_hash_sha3_256[test_num], 32); in mbedtls_sha3_kat_test() 564 result = memcmp(hash, test_hash_sha3_384[test_num], 48); in mbedtls_sha3_kat_test() 567 result = memcmp(hash, test_hash_sha3_512[test_num], 64); in mbedtls_sha3_kat_test() 594 unsigned char hash[64]; in mbedtls_sha3_long_kat_test() local 624 result = mbedtls_sha3_finish(&ctx, hash, sizeof(hash)); in mbedtls_sha3_long_kat_test() 635 result = memcmp(hash, long_kat_hash_sha3_224, 28); in mbedtls_sha3_long_kat_test() 638 result = memcmp(hash, long_kat_hash_sha3_256, 32); in mbedtls_sha3_long_kat_test() [all …]
|
D | rsa.c | 1694 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument 1718 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime() 2117 const unsigned char *hash, in rsa_rsassa_pss_sign_no_mode_check() argument 2129 if ((md_alg != MBEDTLS_MD_NONE || hashlen != 0) && hash == NULL) { in rsa_rsassa_pss_sign_no_mode_check() 2198 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check() 2228 const unsigned char *hash, in rsa_rsassa_pss_sign() argument 2238 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign() 2247 const unsigned char *hash, in mbedtls_rsa_rsassa_pss_sign_no_mode_check() argument 2251 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign_no_mode_check() 2263 const unsigned char *hash, in mbedtls_rsa_rsassa_pss_sign_ext() argument [all …]
|
D | pkcs7.c | 649 unsigned char *hash; in mbedtls_pkcs7_data_or_hash_verify() local 674 hash = mbedtls_calloc(mbedtls_md_get_size(md_info), 1); in mbedtls_pkcs7_data_or_hash_verify() 675 if (hash == NULL) { in mbedtls_pkcs7_data_or_hash_verify() 684 memcpy(hash, data, datalen); in mbedtls_pkcs7_data_or_hash_verify() 687 ret = mbedtls_md(md_info, data, datalen, hash); in mbedtls_pkcs7_data_or_hash_verify() 690 mbedtls_free(hash); in mbedtls_pkcs7_data_or_hash_verify() 708 ret = mbedtls_pk_verify(&pk_cxt, md_alg, hash, in mbedtls_pkcs7_data_or_hash_verify() 717 mbedtls_free(hash); in mbedtls_pkcs7_data_or_hash_verify() 735 const unsigned char *hash, in mbedtls_pkcs7_signed_hash_verify() argument 738 if (hash == NULL) { in mbedtls_pkcs7_signed_hash_verify() [all …]
|
D | pk_wrap.h | 37 const unsigned char *hash, size_t hash_len, 42 const unsigned char *hash, size_t hash_len, 50 const unsigned char *hash, size_t hash_len, 56 const unsigned char *hash, size_t hash_len, 131 const unsigned char *hash, size_t hash_len,
|
/mbedtls-latest/programs/ssl/ |
D | ssl_test_common_source.c | 273 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), \ argument 274 ((hash << 8) | MBEDTLS_SSL_SIG_RSA), \ 275 (0x800 | hash), 277 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), \ argument 278 ((hash << 8) | MBEDTLS_SSL_SIG_RSA), 281 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), argument 285 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_RSA), \ argument 286 (0x800 | hash), 288 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_RSA), argument 291 #define MBEDTLS_SSL_SIG_ALG(hash) argument
|
/mbedtls-latest/programs/psa/ |
D | psa_hash.c | 62 uint8_t hash[PSA_HASH_LENGTH(HASH_ALG)]; in main() local 97 status = psa_hash_finish(&hash_operation, hash, sizeof(hash), &hash_length); in main() 105 (memcmp(hash, expected_hash, expected_hash_len) != 0)) { in main() 121 memset(hash, 0, sizeof(hash)); in main() 127 hash, sizeof(hash), in main() 135 (memcmp(hash, expected_hash, expected_hash_len) != 0)) { in main() 146 mbedtls_printf("%02x", hash[j]); in main()
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 96 the hash algorithm potentially used to hash the message being signed: 97 - a hash algorithm used for the encoding function 99 - most commonly MGF1, which in turn is parametrized by a hash algorithm 106 discrepancies in handling the salt length and which of the various hash 114 - encoding hash = MGF1 hash (from context, or argument = message hash) 118 - encoding hash = MGF1 hash (from context, or argument = message hash) 122 - encoding hash = MGF1 hash (from context, or argument = message hash) 126 - encoding hash = MGF1 hash from dedicated argument 132 - encoding hash = MGF1 hash, specified explicitly 136 - hash alg used for message hashing, encoding and MGF1 [all …]
|
/mbedtls-latest/programs/pkey/ |
D | ecdsa.c | 87 unsigned char hash[32]; in main() local 146 if ((ret = mbedtls_sha256(message, sizeof(message), hash, 0)) != 0) { in main() 153 dump_buf(" + Hash: ", hash, sizeof(hash)); in main() 162 hash, sizeof(hash), in main() 199 hash, sizeof(hash), in main()
|
/mbedtls-latest/include/mbedtls/ |
D | rsa.h | 856 const unsigned char *hash, 888 const unsigned char *hash, 940 const unsigned char *hash, 990 const unsigned char *hash, 1023 const unsigned char *hash, 1048 const unsigned char *hash, 1083 const unsigned char *hash, 1123 const unsigned char *hash,
|
D | pk.h | 291 const unsigned char *hash, unsigned char *sig); 752 const unsigned char *hash, size_t hash_len, 777 const unsigned char *hash, size_t hash_len, 814 const unsigned char *hash, size_t hash_len, 850 const unsigned char *hash, size_t hash_len, 886 const unsigned char *hash, size_t hash_len, 922 const unsigned char *hash, size_t hash_len,
|
/mbedtls-latest/programs/ |
D | .gitignore | 10 hash/generic_sum 11 hash/hello 12 hash/md_hmac_demo 13 hash/md5sum 14 hash/sha1sum 15 hash/sha2sum
|