/openthread-2.7.6/tests/unit/ |
D | test_ecdsa.cpp | 80 Ecdsa::P256::Signature signature; in TestEcdsaVector() local 110 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaVector() 111 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaVector() 116 VerifyOrQuit(sizeof(kExpectedSignature) == sizeof(signature)); in TestEcdsaVector() 117 VerifyOrQuit(memcmp(signature.GetBytes(), kExpectedSignature, sizeof(kExpectedSignature)) == 0); in TestEcdsaVector() 122 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaVector() 136 Ecdsa::P256::Signature signature; in TestEdsaKeyGenerationSignAndVerify() local 161 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEdsaKeyGenerationSignAndVerify() 162 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEdsaKeyGenerationSignAndVerify() 165 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEdsaKeyGenerationSignAndVerify() [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/drivers/ |
D | signature.c | 50 uint8_t *signature, size_t signature_size, size_t *signature_length ) in test_transparent_signature_sign_hash() argument 61 memcpy( signature, test_driver_signature_sign_hooks.forced_output, in test_transparent_signature_sign_hash() 122 signature, in test_transparent_signature_sign_hash() 125 signature + curve_bytes, in test_transparent_signature_sign_hash() 153 uint8_t *signature, size_t signature_size, size_t *signature_length ) in test_opaque_signature_sign_hash() argument 161 (void) signature; in test_opaque_signature_sign_hash() 172 const uint8_t *signature, size_t signature_length ) in test_transparent_signature_verify_hash() argument 232 signature, in test_transparent_signature_verify_hash() 235 signature + curve_bytes, in test_transparent_signature_verify_hash() 265 (void) signature; in test_transparent_signature_verify_hash() [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/include/test/drivers/ |
D | signature.h | 58 uint8_t *signature, size_t signature_size, size_t *signature_length ); 65 uint8_t *signature, size_t signature_size, size_t *signature_length ); 72 const uint8_t *signature, size_t signature_length ); 79 const uint8_t *signature, size_t signature_length );
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_metadata.data | 148 Asymmetric signature: RSA PKCS#1 v1.5 raw 152 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 156 Asymmetric signature: RSA PSS SHA-256 160 Asymmetric signature: randomized ECDSA (no hashing) 164 Asymmetric signature: SHA-256 + randomized ECDSA 168 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256 172 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash 176 Asymmetric signature: RSA PSS with wildcard hash 180 Asymmetric signature: randomized ECDSA with wildcard hash 184 Asymmetric signature: deterministic ECDSA with wildcard hash
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 581 uint8_t signature[1] = {'S'}; 614 signature, sizeof( signature ), 642 const uint8_t signature[1] = {'S'}; 674 signature, sizeof( signature ) )
|
D | test_suite_psa_crypto_se_driver_hal.function | 448 uint8_t *signature, 470 signature, signature_size, signature_length ); 482 const uint8_t *signature, 504 signature, signature_length ); 1314 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1416 signature, sizeof( signature ), 1423 signature, sizeof( signature ), 1431 signature, signature_length ) ); 1435 signature, signature_length ), 1438 /* Change the signature and verify again. */ [all …]
|
D | test_suite_psa_crypto.data | 502 PSA key policy: asymmetric signature, sign | verify 506 PSA key policy: asymmetric signature, wrong algorithm family 510 PSA key policy: asymmetric signature, wildcard in policy, wrong algorithm family 514 PSA key policy: asymmetric signature, wildcard in policy, ECDSA SHA-256 518 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256 522 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 raw 526 PSA key policy: asymmetric signature, wrong hash algorithm 530 PSA key policy: asymmetric signature, alg=0 in policy 534 PSA key policy: asymmetric signature, sign but not verify 538 PSA key policy: asymmetric signature, verify but not sign [all …]
|
D | test_suite_pkcs1_v21.data | 807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0 835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature 867 RSASSA-PSS Verification of OpenSSL-generated signature RSA-1032, SHA-512
|
D | test_suite_psa_crypto.function | 531 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; 532 size_t signature_length = sizeof( signature ); 556 signature, sizeof( signature ), 568 signature, signature_length ), 2188 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0}; 2202 signature, sizeof( signature ), 2209 memset( signature, 0, sizeof( signature ) ); 2212 signature, sizeof( signature ) ); 4180 unsigned char *signature = NULL; 4202 ASSERT_ALLOC( signature, signature_size ); [all …]
|
D | test_suite_ecdsa.function | 222 /* prepare material for signature */ 363 /* prepare material for signature */ 372 /* generate and write signature, then read and verify it */
|
D | test_suite_psa_crypto_driver_wrappers.function | 25 uint8_t signature[64]; 48 signature, sizeof( signature ), 53 ASSERT_COMPARE( signature, signature_length,
|
D | test_suite_psa_crypto_se_driver_hal.data | 102 Key import smoke test: RSA PKCS#1v1.5 signature
|
D | test_suite_rsa.data | 147 # the verification of PKCS1 v1.5 signatures - this is relevant to prevent Bleichenbacher signature … 151 # Correct signature with DER-compliant reduced length encodings
|
D | test_suite_pk.function | 1179 /* Test signature */ 1237 * - wrap it in a PK context and make a signature this way 1239 * - parse it to a PK context and verify the signature this way
|
/openthread-2.7.6/third_party/mbedtls/repo/include/psa/ |
D | crypto_compat.h | 121 uint8_t *signature, in psa_asymmetric_sign() argument 125 … return psa_sign_hash( key, alg, hash, hash_length, signature, signature_size, signature_length ); in psa_asymmetric_sign() 132 const uint8_t *signature, in psa_asymmetric_verify() argument 135 return psa_verify_hash( key, alg, hash, hash_length, signature, signature_length ); in psa_asymmetric_verify()
|
D | crypto.h | 2863 uint8_t *signature, 2911 const uint8_t *signature,
|
/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | psa_crypto_driver_wrappers.c | 64 uint8_t *signature, in psa_driver_wrapper_sign_hash() argument 86 signature, signature_size, in psa_driver_wrapper_sign_hash() 111 signature, in psa_driver_wrapper_sign_hash() 129 signature, in psa_driver_wrapper_sign_hash() 145 (void)signature; in psa_driver_wrapper_sign_hash() 157 const uint8_t *signature, in psa_driver_wrapper_verify_hash() argument 178 signature, signature_length ) ); in psa_driver_wrapper_verify_hash() 202 signature, in psa_driver_wrapper_verify_hash() 219 signature, in psa_driver_wrapper_verify_hash() 234 (void)signature; in psa_driver_wrapper_verify_hash()
|
D | psa_crypto_driver_wrappers.h | 35 uint8_t *signature, 43 const uint8_t *signature,
|
D | psa_crypto.c | 3663 uint8_t *signature, in psa_rsa_sign() argument 3690 signature ); in psa_rsa_sign() 3705 signature ); in psa_rsa_sign() 3722 const uint8_t *signature, in psa_rsa_verify() argument 3748 signature ); in psa_rsa_verify() 3763 signature ); in psa_rsa_verify() 3790 uint8_t *signature, in psa_ecdsa_sign() argument 3829 signature, in psa_ecdsa_sign() 3832 signature + curve_bytes, in psa_ecdsa_sign() 3846 const uint8_t *signature, in psa_ecdsa_verify() argument [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/ |
D | Readme-x509.txt | 57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash 76 -badsign.crt: S5 with corrupted signature 85 -badsign.crt: S7 with corrupted signature + I1 99 -badsign.crt: S10 with corrupted signature
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 117 …encrypting, decrypting, signing and verifying messages using public key signature algorithms, such… 119 **Prerequisites to performing asymmetric signature operations:** 123 * Usage flag `PSA_KEY_USAGE_VERIFY_HASH` to allow signature verification. 124 * Algorithm set to the desired signature algorithm. 136 uint8_t signature[PSA_SIGNATURE_MAX_SIZE] = {0}; 166 signature, sizeof(signature),
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ |
D | README.md | 33 ### ECDSA and RSA signature examples 35 …/ecdsa.c`](pkey/ecdsa.c): generates an ECDSA key, signs a fixed message and verifies the signature.
|
/openthread-2.7.6/src/core/net/ |
D | srp_client.cpp | 1096 Crypto::Ecdsa::P256::Signature signature; in AppendSignature() local 1135 SuccessOrExit(error = aInfo.mKeyPair.Sign(hash, signature)); in AppendSignature() 1148 SuccessOrExit(error = aMessage.Append(signature)); in AppendSignature()
|
D | srp_server.cpp | 960 Crypto::Ecdsa::P256::Signature signature; in VerifySignature() local 985 SuccessOrExit(error = aMessage.Read(signatureOffset, signature)); in VerifySignature() 987 error = aKey.GetKey().Verify(hash, signature); in VerifySignature()
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 78 algorithm parameters (only the size) when comparing the signature in the 79 description part of the cert to the real signature. This meant that a 463 * Fix potential memory overread when performing an ECDSA signature 803 due to an unacceptable hash signature. The certificate has been 888 e.g. RSA or ECC signature operations. Reported in #1722, fix suggested 1044 * Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS 1045 signature always used a salt with the same length as the hash, and returned 1047 shorter. This allows the library to support all hash and signature sizes 1373 where an optional signature algorithms list is expected when the signature 1683 * Parse signature algorithm extension when renegotiating. Previously, [all …]
|