/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_hash.data | 1 PSA hash finish: SHA-1 Test Vector NIST CAVS #1 5 PSA hash finish: SHA-1 Test Vector NIST CAVS #2 9 PSA hash finish: SHA-1 Test Vector NIST CAVS #3 13 PSA hash finish: SHA-1 Test Vector NIST CAVS #4 17 PSA hash finish: SHA-1 Test Vector NIST CAVS #5 21 PSA hash finish: SHA-1 Test Vector NIST CAVS #6 25 PSA hash finish: SHA-1 Test Vector NIST CAVS #7 29 PSA hash finish: SHA-1 Test Vector NIST CAVS #8 33 PSA hash finish: SHA-1 Test Vector NIST CAVS #9 37 PSA hash finish: SHA-1 Test Vector NIST CAVS #10 [all …]
|
D | test_suite_ecdsa.function | 80 data_t *hash, char *r_str, char *s_str, 116 TEST_ASSERT(mbedtls_ecdsa_sign(&grp, &r, &s, &d, hash->x, hash->len, 125 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, 129 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, 136 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 138 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 140 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 146 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 148 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, 150 TEST_EQUAL(mbedtls_ecdsa_verify(&grp, hash->x, hash->len, &Q, [all …]
|
D | test_suite_shax.function | 9 void mbedtls_sha1(data_t *src_str, data_t *hash) 18 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 20, hash->len) == 0); 43 void sha224(data_t *src_str, data_t *hash) 52 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 28, hash->len), 0); 57 void mbedtls_sha256(data_t *src_str, data_t *hash) 66 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 32, hash->len), 0); 91 void sha384(data_t *src_str, data_t *hash) 100 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 48, hash->len), 0); 105 void mbedtls_sha512(data_t *src_str, data_t *hash) 114 TEST_EQUAL(mbedtls_test_hexcmp(output, hash->x, 64, hash->len), 0); [all …]
|
D | test_suite_md.function | 195 void md_text(int md_type, char *text_src_string, data_t *hash) 209 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 217 void md_hex(int md_type, data_t *src_str, data_t *hash) 230 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 239 data_t *hash) 272 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 279 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 289 void md_hex_multi(int md_type, data_t *src_str, data_t *hash) 319 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); 326 TEST_MEMORY_COMPARE(output, mbedtls_md_get_size(md_info), hash->x, hash->len); [all …]
|
D | test_suite_mdx.function | 7 void md5_text(char *text_src_string, data_t *hash) 21 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 22 sizeof(output), hash->len) == 0); 27 void ripemd160_text(char *text_src_string, data_t *hash) 41 TEST_ASSERT(mbedtls_test_hexcmp(output, hash->x, 42 sizeof(output), hash->len) == 0);
|
D | test_suite_pkcs1_v21.function | 12 int hash, data_t *message_str, data_t *rnd_buf, 30 MBEDTLS_RSA_PKCS_V21, hash) == 0); 34 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 63 data_t *input_N, data_t *input_E, int hash, 81 MBEDTLS_RSA_PKCS_V21, hash) == 0); 84 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 128 int hash, data_t *hash_digest, data_t *rnd_buf, 148 MBEDTLS_RSA_PKCS_V21, hash) == 0); 151 TEST_EQUAL(mbedtls_rsa_get_md_alg(&ctx), hash); 195 int digest, int hash, data_t *hash_digest, [all …]
|
D | test_suite_oid.data | 61 OID hash id - id-md5 65 OID hash id - id-sha1 69 OID hash id - id-sha224 73 OID hash id - id-sha256 77 OID hash id - id-sha384 81 OID hash id - id-sha512 85 OID hash id - id-sha3-224 89 OID hash id - id-sha3-256 93 OID hash id - id-sha3-384 97 OID hash id - id-sha3-512 [all …]
|
/openthread-latest/tools/tcat_ble_client/ |
D | poetry.lock | 10 …{file = "async-timeout-4.0.2.tar.gz", hash = "sha256:2163e1640ddb52b7a8c80d0a67a08587e5d245cc9c553… 11 …{file = "async_timeout-4.0.2-py3-none-any.whl", hash = "sha256:8ca1e4fcf50d07413d66d1a5e416e42cfdf… 24 …{file = "bleak-0.20.2-py3-none-any.whl", hash = "sha256:ce3106b7258212d92bb77be06f9301774f51f5bbc9… 25 …{file = "bleak-0.20.2.tar.gz", hash = "sha256:6c92a47abe34e6dea8ffc5cea9457cbff6e1be966854839dbc25… 44 …{file = "bleak-winrt-1.2.0.tar.gz", hash = "sha256:0577d070251b9354fc6c45ffac57e39341ebb08ead014b1… 45 …{file = "bleak_winrt-1.2.0-cp310-cp310-win32.whl", hash = "sha256:a2ae3054d6843ae0cfd3b94c83293a1d… 46 …{file = "bleak_winrt-1.2.0-cp310-cp310-win_amd64.whl", hash = "sha256:677df51dc825c6657b3ae94f00bd… 47 …{file = "bleak_winrt-1.2.0-cp311-cp311-win32.whl", hash = "sha256:9449cdb942f22c9892bc1ada99e2ccce… 48 …{file = "bleak_winrt-1.2.0-cp311-cp311-win_amd64.whl", hash = "sha256:98c1b5a6a6c431ac7f76aa4285b7… 49 …{file = "bleak_winrt-1.2.0-cp37-cp37m-win32.whl", hash = "sha256:623ac511696e1f58d83cb9c431e32f613… [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/src/drivers/ |
D | test_driver_signature.c | 46 const uint8_t *hash, in sign_hash() argument 61 alg, hash, hash_length, in sign_hash() 68 alg, hash, hash_length, in sign_hash() 82 alg, hash, hash_length, in sign_hash() 89 alg, hash, hash_length, in sign_hash() 101 (void) hash; in sign_hash() 114 const uint8_t *hash, in verify_hash() argument 128 alg, hash, hash_length, in verify_hash() 135 alg, hash, hash_length, in verify_hash() 149 alg, hash, hash_length, in verify_hash() [all …]
|
D | hash.c | 25 uint8_t *hash, size_t hash_size, size_t *hash_length) in mbedtls_test_transparent_hash_compute() argument 38 hash, hash_size, hash_length); in mbedtls_test_transparent_hash_compute() 43 hash, hash_size, hash_length); in mbedtls_test_transparent_hash_compute() 48 (void) hash; in mbedtls_test_transparent_hash_compute() 145 uint8_t *hash, in mbedtls_test_transparent_hash_finish() argument 159 operation, hash, hash_size, hash_length); in mbedtls_test_transparent_hash_finish() 162 mbedtls_psa_hash_finish(operation, hash, hash_size, hash_length); in mbedtls_test_transparent_hash_finish() 165 (void) hash; in mbedtls_test_transparent_hash_finish()
|
/openthread-latest/tests/unit/ |
D | test_ecdsa.cpp | 84 Sha256::Hash hash; in TestEcdsaVector() local 107 sha256.Finish(hash); in TestEcdsaVector() 109 DumpBuffer("Hash", hash.GetBytes(), sizeof(hash)); in TestEcdsaVector() 112 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaVector() 126 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaVector() 142 Sha256::Hash hash; in TestEcdsaKeyGenerationSignAndVerify() local 160 sha256.Finish(hash); in TestEcdsaKeyGenerationSignAndVerify() 162 DumpBuffer("Hash", hash.GetBytes(), sizeof(hash)); in TestEcdsaKeyGenerationSignAndVerify() 165 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify() 169 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify() [all …]
|
D | test_hmac_sha256.cpp | 102 Crypto::Sha256::Hash hash; in TestSha256() local 106 sha256.Finish(hash); in TestSha256() 108 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256() 128 Crypto::Sha256::Hash hash; in TestSha256() local 132 sha256.Finish(hash); in TestSha256() 134 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestSha256() 245 Crypto::HmacSha256::Hash hash; in TestHmacSha256() local 249 hmac.Finish(hash); in TestHmacSha256() 251 VerifyOrQuit(hash == static_cast<const Crypto::HmacSha256::Hash &>(testCase.mHash)); in TestHmacSha256() 271 Crypto::HmacSha256::Hash hash; in TestHmacSha256() local [all …]
|
/openthread-latest/third_party/mbedtls/repo/programs/psa/ |
D | psa_hash.c | 62 uint8_t hash[PSA_HASH_LENGTH(HASH_ALG)]; in main() local 97 status = psa_hash_finish(&hash_operation, hash, sizeof(hash), &hash_length); in main() 105 (memcmp(hash, expected_hash, expected_hash_len) != 0)) { in main() 121 memset(hash, 0, sizeof(hash)); in main() 127 hash, sizeof(hash), in main() 135 (memcmp(hash, expected_hash, expected_hash_len) != 0)) { in main() 146 mbedtls_printf("%02x", hash[j]); in main()
|
/openthread-latest/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_test_common_source.c | 273 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), \ argument 274 ((hash << 8) | MBEDTLS_SSL_SIG_RSA), \ 275 (0x800 | hash), 277 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), \ argument 278 ((hash << 8) | MBEDTLS_SSL_SIG_RSA), 281 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_ECDSA), argument 285 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_RSA), \ argument 286 (0x800 | hash), 288 #define MBEDTLS_SSL_SIG_ALG(hash) ((hash << 8) | MBEDTLS_SSL_SIG_RSA), argument 291 #define MBEDTLS_SSL_SIG_ALG(hash) argument
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | pk_wrap.c | 66 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 113 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap() 131 const unsigned char *hash, size_t hash_len, in rsa_verify_wrap() argument 150 hash, sig)) != 0) { in rsa_verify_wrap() 170 const unsigned char *hash, size_t hash_len, in mbedtls_pk_psa_rsa_sign_ext() argument 210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 231 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 250 return mbedtls_pk_psa_rsa_sign_ext(psa_alg, pk->pk_ctx, hash, hash_len, in rsa_sign_wrap() 255 const unsigned char *hash, size_t hash_len, in rsa_sign_wrap() argument 274 hash, sig); in rsa_sign_wrap() [all …]
|
D | psa_crypto_hash.c | 342 uint8_t *hash, in mbedtls_psa_hash_finish() argument 357 memset(hash, '!', hash_size); in mbedtls_psa_hash_finish() 368 ret = mbedtls_md5_finish(&operation->ctx.md5, hash); in mbedtls_psa_hash_finish() 373 ret = mbedtls_ripemd160_finish(&operation->ctx.ripemd160, hash); in mbedtls_psa_hash_finish() 378 ret = mbedtls_sha1_finish(&operation->ctx.sha1, hash); in mbedtls_psa_hash_finish() 383 ret = mbedtls_sha256_finish(&operation->ctx.sha256, hash); in mbedtls_psa_hash_finish() 388 ret = mbedtls_sha256_finish(&operation->ctx.sha256, hash); in mbedtls_psa_hash_finish() 393 ret = mbedtls_sha512_finish(&operation->ctx.sha512, hash); in mbedtls_psa_hash_finish() 398 ret = mbedtls_sha512_finish(&operation->ctx.sha512, hash); in mbedtls_psa_hash_finish() 417 ret = mbedtls_sha3_finish(&operation->ctx.sha3, hash, hash_size); in mbedtls_psa_hash_finish() [all …]
|
D | pk_wrap.h | 37 const unsigned char *hash, size_t hash_len, 42 const unsigned char *hash, size_t hash_len, 50 const unsigned char *hash, size_t hash_len, 56 const unsigned char *hash, size_t hash_len, 131 const unsigned char *hash, size_t hash_len,
|
D | sha3.c | 541 uint8_t hash[64]; in mbedtls_sha3_kat_test() local 546 hash, sizeof(hash)); in mbedtls_sha3_kat_test() 558 result = memcmp(hash, test_hash_sha3_224[test_num], 28); in mbedtls_sha3_kat_test() 561 result = memcmp(hash, test_hash_sha3_256[test_num], 32); in mbedtls_sha3_kat_test() 564 result = memcmp(hash, test_hash_sha3_384[test_num], 48); in mbedtls_sha3_kat_test() 567 result = memcmp(hash, test_hash_sha3_512[test_num], 64); in mbedtls_sha3_kat_test() 594 unsigned char hash[64]; in mbedtls_sha3_long_kat_test() local 624 result = mbedtls_sha3_finish(&ctx, hash, sizeof(hash)); in mbedtls_sha3_long_kat_test() 635 result = memcmp(hash, long_kat_hash_sha3_224, 28); in mbedtls_sha3_long_kat_test() 638 result = memcmp(hash, long_kat_hash_sha3_256, 32); in mbedtls_sha3_long_kat_test() [all …]
|
D | pk.c | 1044 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_restartable() argument 1048 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_restartable() 1069 md_alg, hash, hash_len, sig, sig_len, rs_ctx->rs_ctx); in mbedtls_pk_verify_restartable() 1085 return ctx->pk_info->verify_func(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify_restartable() 1093 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify() argument 1096 return mbedtls_pk_verify_restartable(ctx, md_alg, hash, hash_len, in mbedtls_pk_verify() 1105 const unsigned char *hash, size_t hash_len, in mbedtls_pk_verify_ext() argument 1108 if ((md_alg != MBEDTLS_MD_NONE || hash_len != 0) && hash == NULL) { in mbedtls_pk_verify_ext() 1126 return mbedtls_pk_verify(ctx, md_alg, hash, hash_len, sig, sig_len); in mbedtls_pk_verify_ext() 1190 status = psa_verify_hash(key_id, psa_sig_alg, hash, in mbedtls_pk_verify_ext() [all …]
|
/openthread-latest/third_party/mbedtls/repo/programs/pkey/ |
D | ecdsa.c | 87 unsigned char hash[32]; in main() local 146 if ((ret = mbedtls_sha256(message, sizeof(message), hash, 0)) != 0) { in main() 153 dump_buf(" + Hash: ", hash, sizeof(hash)); in main() 162 hash, sizeof(hash), in main() 199 hash, sizeof(hash), in main()
|
/openthread-latest/third_party/mbedtls/repo/programs/ |
D | .gitignore | 10 hash/generic_sum 11 hash/hello 12 hash/md_hmac_demo 13 hash/md5sum 14 hash/sha1sum 15 hash/sha2sum
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | rsa.h | 856 const unsigned char *hash, 888 const unsigned char *hash, 940 const unsigned char *hash, 990 const unsigned char *hash, 1023 const unsigned char *hash, 1048 const unsigned char *hash, 1083 const unsigned char *hash, 1123 const unsigned char *hash,
|
D | pk.h | 291 const unsigned char *hash, unsigned char *sig); 744 const unsigned char *hash, size_t hash_len, 769 const unsigned char *hash, size_t hash_len, 806 const unsigned char *hash, size_t hash_len, 842 const unsigned char *hash, size_t hash_len, 878 const unsigned char *hash, size_t hash_len, 914 const unsigned char *hash, size_t hash_len,
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 96 the hash algorithm potentially used to hash the message being signed: 97 - a hash algorithm used for the encoding function 99 - most commonly MGF1, which in turn is parametrized by a hash algorithm 106 discrepancies in handling the salt length and which of the various hash 114 - encoding hash = MGF1 hash (from context, or argument = message hash) 118 - encoding hash = MGF1 hash (from context, or argument = message hash) 122 - encoding hash = MGF1 hash (from context, or argument = message hash) 126 - encoding hash = MGF1 hash from dedicated argument 132 - encoding hash = MGF1 hash, specified explicitly 136 - hash alg used for message hashing, encoding and MGF1 [all …]
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/ |
D | p256-m_driver_entrypoints.c | 208 const uint8_t *hash, in p256_transparent_sign_hash() argument 228 int ret = p256_ecdsa_sign(signature, key_buffer, hash, hash_length); in p256_transparent_sign_hash() 241 const uint8_t *hash, in p256_verify_hash_with_public_key() argument 256 int ret = p256_ecdsa_verify(signature, public_key_p256m, hash, hash_length); in p256_verify_hash_with_public_key() 266 const uint8_t *hash, in p256_transparent_verify_hash() argument 303 hash, in p256_transparent_verify_hash()
|