Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 31) sorted by relevance

12

/openthread-2.7.6/tests/unit/
Dtest_ecdsa.cpp80 Ecdsa::P256::Signature signature; in TestEcdsaVector() local
110 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaVector()
111 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaVector()
116 VerifyOrQuit(sizeof(kExpectedSignature) == sizeof(signature)); in TestEcdsaVector()
117 VerifyOrQuit(memcmp(signature.GetBytes(), kExpectedSignature, sizeof(kExpectedSignature)) == 0); in TestEcdsaVector()
122 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaVector()
136 Ecdsa::P256::Signature signature; in TestEdsaKeyGenerationSignAndVerify() local
161 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEdsaKeyGenerationSignAndVerify()
162 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEdsaKeyGenerationSignAndVerify()
165 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEdsaKeyGenerationSignAndVerify()
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/drivers/
Dsignature.c50 uint8_t *signature, size_t signature_size, size_t *signature_length ) in test_transparent_signature_sign_hash() argument
61 memcpy( signature, test_driver_signature_sign_hooks.forced_output, in test_transparent_signature_sign_hash()
122 signature, in test_transparent_signature_sign_hash()
125 signature + curve_bytes, in test_transparent_signature_sign_hash()
153 uint8_t *signature, size_t signature_size, size_t *signature_length ) in test_opaque_signature_sign_hash() argument
161 (void) signature; in test_opaque_signature_sign_hash()
172 const uint8_t *signature, size_t signature_length ) in test_transparent_signature_verify_hash() argument
232 signature, in test_transparent_signature_verify_hash()
235 signature + curve_bytes, in test_transparent_signature_verify_hash()
265 (void) signature; in test_transparent_signature_verify_hash()
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/include/test/drivers/
Dsignature.h58 uint8_t *signature, size_t signature_size, size_t *signature_length );
65 uint8_t *signature, size_t signature_size, size_t *signature_length );
72 const uint8_t *signature, size_t signature_length );
79 const uint8_t *signature, size_t signature_length );
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_metadata.data148 Asymmetric signature: RSA PKCS#1 v1.5 raw
152 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
156 Asymmetric signature: RSA PSS SHA-256
160 Asymmetric signature: randomized ECDSA (no hashing)
164 Asymmetric signature: SHA-256 + randomized ECDSA
168 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
172 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash
176 Asymmetric signature: RSA PSS with wildcard hash
180 Asymmetric signature: randomized ECDSA with wildcard hash
184 Asymmetric signature: deterministic ECDSA with wildcard hash
Dtest_suite_psa_crypto_se_driver_hal_mocks.function581 uint8_t signature[1] = {'S'};
614 signature, sizeof( signature ),
642 const uint8_t signature[1] = {'S'};
674 signature, sizeof( signature ) )
Dtest_suite_psa_crypto_se_driver_hal.function448 uint8_t *signature,
470 signature, signature_size, signature_length );
482 const uint8_t *signature,
504 signature, signature_length );
1314 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1416 signature, sizeof( signature ),
1423 signature, sizeof( signature ),
1431 signature, signature_length ) );
1435 signature, signature_length ),
1438 /* Change the signature and verify again. */
[all …]
Dtest_suite_psa_crypto.data502 PSA key policy: asymmetric signature, sign | verify
506 PSA key policy: asymmetric signature, wrong algorithm family
510 PSA key policy: asymmetric signature, wildcard in policy, wrong algorithm family
514 PSA key policy: asymmetric signature, wildcard in policy, ECDSA SHA-256
518 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256
522 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 raw
526 PSA key policy: asymmetric signature, wrong hash algorithm
530 PSA key policy: asymmetric signature, alg=0 in policy
534 PSA key policy: asymmetric signature, sign but not verify
538 PSA key policy: asymmetric signature, verify but not sign
[all …]
Dtest_suite_pkcs1_v21.data807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
867 RSASSA-PSS Verification of OpenSSL-generated signature RSA-1032, SHA-512
Dtest_suite_psa_crypto.function531 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0};
532 size_t signature_length = sizeof( signature );
556 signature, sizeof( signature ),
568 signature, signature_length ),
2188 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = {0};
2202 signature, sizeof( signature ),
2209 memset( signature, 0, sizeof( signature ) );
2212 signature, sizeof( signature ) );
4180 unsigned char *signature = NULL;
4202 ASSERT_ALLOC( signature, signature_size );
[all …]
Dtest_suite_ecdsa.function222 /* prepare material for signature */
363 /* prepare material for signature */
372 /* generate and write signature, then read and verify it */
Dtest_suite_psa_crypto_driver_wrappers.function25 uint8_t signature[64];
48 signature, sizeof( signature ),
53 ASSERT_COMPARE( signature, signature_length,
Dtest_suite_psa_crypto_se_driver_hal.data102 Key import smoke test: RSA PKCS#1v1.5 signature
Dtest_suite_rsa.data147 # the verification of PKCS1 v1.5 signatures - this is relevant to prevent Bleichenbacher signature
151 # Correct signature with DER-compliant reduced length encodings
Dtest_suite_pk.function1179 /* Test signature */
1237 * - wrap it in a PK context and make a signature this way
1239 * - parse it to a PK context and verify the signature this way
/openthread-2.7.6/third_party/mbedtls/repo/include/psa/
Dcrypto_compat.h121 uint8_t *signature, in psa_asymmetric_sign() argument
125 … return psa_sign_hash( key, alg, hash, hash_length, signature, signature_size, signature_length ); in psa_asymmetric_sign()
132 const uint8_t *signature, in psa_asymmetric_verify() argument
135 return psa_verify_hash( key, alg, hash, hash_length, signature, signature_length ); in psa_asymmetric_verify()
Dcrypto.h2863 uint8_t *signature,
2911 const uint8_t *signature,
/openthread-2.7.6/third_party/mbedtls/repo/library/
Dpsa_crypto_driver_wrappers.c64 uint8_t *signature, in psa_driver_wrapper_sign_hash() argument
86 signature, signature_size, in psa_driver_wrapper_sign_hash()
111 signature, in psa_driver_wrapper_sign_hash()
129 signature, in psa_driver_wrapper_sign_hash()
145 (void)signature; in psa_driver_wrapper_sign_hash()
157 const uint8_t *signature, in psa_driver_wrapper_verify_hash() argument
178 signature, signature_length ) ); in psa_driver_wrapper_verify_hash()
202 signature, in psa_driver_wrapper_verify_hash()
219 signature, in psa_driver_wrapper_verify_hash()
234 (void)signature; in psa_driver_wrapper_verify_hash()
Dpsa_crypto_driver_wrappers.h35 uint8_t *signature,
43 const uint8_t *signature,
Dpsa_crypto.c3663 uint8_t *signature, in psa_rsa_sign() argument
3690 signature ); in psa_rsa_sign()
3705 signature ); in psa_rsa_sign()
3722 const uint8_t *signature, in psa_rsa_verify() argument
3748 signature ); in psa_rsa_verify()
3763 signature ); in psa_rsa_verify()
3790 uint8_t *signature, in psa_ecdsa_sign() argument
3829 signature, in psa_ecdsa_sign()
3832 signature + curve_bytes, in psa_ecdsa_sign()
3846 const uint8_t *signature, in psa_ecdsa_verify() argument
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt57 - cert_md*.crt, cert_sha*.crt: 1 R: signature hash
76 -badsign.crt: S5 with corrupted signature
85 -badsign.crt: S7 with corrupted signature + I1
99 -badsign.crt: S10 with corrupted signature
/openthread-2.7.6/third_party/mbedtls/repo/docs/
Dgetting_started.md117 …encrypting, decrypting, signing and verifying messages using public key signature algorithms, such…
119 **Prerequisites to performing asymmetric signature operations:**
123 * Usage flag `PSA_KEY_USAGE_VERIFY_HASH` to allow signature verification.
124 * Algorithm set to the desired signature algorithm.
136 uint8_t signature[PSA_SIGNATURE_MAX_SIZE] = {0};
166 signature, sizeof(signature),
/openthread-2.7.6/third_party/mbedtls/repo/programs/
DREADME.md33 ### ECDSA and RSA signature examples
35 …/ecdsa.c`](pkey/ecdsa.c): generates an ECDSA key, signs a fixed message and verifies the signature.
/openthread-2.7.6/src/core/net/
Dsrp_client.cpp1096 Crypto::Ecdsa::P256::Signature signature; in AppendSignature() local
1135 SuccessOrExit(error = aInfo.mKeyPair.Sign(hash, signature)); in AppendSignature()
1148 SuccessOrExit(error = aMessage.Append(signature)); in AppendSignature()
Dsrp_server.cpp960 Crypto::Ecdsa::P256::Signature signature; in VerifySignature() local
985 SuccessOrExit(error = aMessage.Read(signatureOffset, signature)); in VerifySignature()
987 error = aKey.GetKey().Verify(hash, signature); in VerifySignature()
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog78 algorithm parameters (only the size) when comparing the signature in the
79 description part of the cert to the real signature. This meant that a
463 * Fix potential memory overread when performing an ECDSA signature
803 due to an unacceptable hash signature. The certificate has been
888 e.g. RSA or ECC signature operations. Reported in #1722, fix suggested
1044 * Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS
1045 signature always used a salt with the same length as the hash, and returned
1047 shorter. This allows the library to support all hash and signature sizes
1373 where an optional signature algorithms list is expected when the signature
1683 * Parse signature algorithm extension when renegotiating. Previously,
[all …]

12