/openthread-latest/third_party/mbedtls/repo/tests/src/drivers/ |
D | test_driver_signature.c | 48 uint8_t *signature, in sign_hash() argument 62 signature, signature_size, signature_length); in sign_hash() 69 signature, signature_size, signature_length); in sign_hash() 83 signature, signature_size, signature_length); in sign_hash() 90 signature, signature_size, signature_length); in sign_hash() 103 (void) signature; in sign_hash() 116 const uint8_t *signature, in verify_hash() argument 129 signature, signature_length); in verify_hash() 136 signature, signature_length); in verify_hash() 150 signature, signature_length); in verify_hash() [all …]
|
/openthread-latest/tests/unit/ |
D | test_ecdsa.cpp | 82 Ecdsa::P256::Signature signature; in TestEcdsaVector() local 112 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaVector() 113 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaVector() 119 VerifyOrQuit(sizeof(kExpectedSignature) == sizeof(signature)); in TestEcdsaVector() 120 VerifyOrQuit(memcmp(signature.GetBytes(), kExpectedSignature, sizeof(kExpectedSignature)) == 0); in TestEcdsaVector() 126 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaVector() 140 Ecdsa::P256::Signature signature; in TestEcdsaKeyGenerationSignAndVerify() local 165 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify() 166 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaKeyGenerationSignAndVerify() 169 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify() [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_lms.data | 3 # message, and verifies the signature. 8 # signs the message, and verifies the signature. 14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature 15 # uses leaf key 0, so must be the first signature generated by the key if the 16 # signature is to be reproduced. Message data is random. Note that pyhsslms 18 # word at the start of the key/sig. We strip these 4 bytes from the signature 21 # To produce another signature with this message and key (note that the actual 22 # signature bytes will differ due to randomization): 39 # The signature uses leaf key 1, so must be the second signature generated by 40 # the key if the signature is to be reproduced. [all …]
|
D | test_suite_lmots.data | 3 # message, and verifies the signature. 8 # message, and verifies the signature. 13 # signs the message, and verifies the signature. 19 # providing direct access to the underlying OTS signature scheme. The private 24 # To produce another signature with this message and key (note that the actual 25 # signature bytes will differ due to randomization): 44 # providing direct access to the underlying OTS signature scheme. The private 49 # To produce another signature with this message and key (note that the actual 50 # signature bytes will differ due to randomization): 69 # providing direct access to the underlying OTS signature scheme. The private [all …]
|
D | test_suite_psa_crypto_metadata.data | 217 Asymmetric signature: RSA PKCS#1 v1.5 raw 221 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 225 Asymmetric signature: RSA PSS SHA-256 229 Asymmetric signature: RSA PSS-any-salt SHA-256 233 Asymmetric signature: randomized ECDSA (no hashing) 237 Asymmetric signature: SHA-256 + randomized ECDSA 241 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256 245 Asymmetric signature: pure EdDSA 249 Asymmetric signature: Ed25519ph 253 Asymmetric signature: Ed448ph [all …]
|
D | test_suite_psa_crypto_entropy.function | 102 /* This test case is only expected to pass if the signature mechanism 103 * requires randomness, either because it is a randomized signature 113 uint8_t *signature = NULL; 118 TEST_CALLOC(signature, signature_size); 125 signature, signature_size, 137 signature, signature_size, 145 mbedtls_free(signature);
|
D | test_suite_psa_crypto_util.data | 37 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter) 41 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter) 45 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 49 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
|
D | test_suite_psa_crypto.function | 2542 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; 2563 signature, sizeof(signature), 2571 memset(signature, 0, sizeof(signature)); 2574 signature, sizeof(signature)); 2585 signature, sizeof(signature), 2593 memset(signature, 0, sizeof(signature)); 2596 signature, sizeof(signature)); 6816 unsigned char *signature = NULL; 6838 TEST_CALLOC(signature, signature_size); 6840 /* Perform the signature. */ [all …]
|
D | test_suite_ecdsa.function | 57 /* prepare material for signature */ 124 /* Valid signature */ 128 /* Invalid signature: wrong public key (G instead of Q) */ 250 /* generate and write signature, then read and verify it */ 310 /* prepare material for signature */ 319 /* generate and write signature, then read and verify it */ 513 /* Prepare signature R & S */
|
D | test_suite_psa_crypto_se_driver_hal_mocks.function | 567 uint8_t signature[1] = { 'S' }; 600 signature, sizeof(signature), 628 const uint8_t signature[1] = { 'S' }; 660 signature, sizeof(signature))
|
D | test_suite_psa_crypto_se_driver_hal.function | 449 uint8_t *signature, 471 signature, signature_size, signature_length); 483 const uint8_t *signature, 505 signature, signature_length); 1301 uint8_t signature[PSA_SIGNATURE_MAX_SIZE]; 1399 signature, sizeof(signature), 1406 signature, sizeof(signature), 1414 signature, signature_length)); 1418 signature, signature_length), 1421 /* Change the signature and verify again. */ [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/include/test/drivers/ |
D | signature.h | 48 uint8_t *signature, 59 uint8_t *signature, 70 const uint8_t *signature, 80 const uint8_t *signature, 88 uint8_t *signature, size_t signature_size, size_t *signature_length); 95 uint8_t *signature, size_t signature_size, size_t *signature_length); 102 const uint8_t *signature, size_t signature_length); 109 const uint8_t *signature, size_t signature_length);
|
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/ |
D | p256-m_driver_entrypoints.c | 210 uint8_t *signature, in p256_transparent_sign_hash() argument 228 int ret = p256_ecdsa_sign(signature, key_buffer, hash, hash_length); in p256_transparent_sign_hash() 243 const uint8_t *signature, in p256_verify_hash_with_public_key() argument 256 int ret = p256_ecdsa_verify(signature, public_key_p256m, hash, hash_length); in p256_verify_hash_with_public_key() 268 const uint8_t *signature, in p256_transparent_verify_hash() argument 305 signature, in p256_transparent_verify_hash()
|
D | p256-m_driver_entrypoints.h | 174 uint8_t *signature, 216 const uint8_t *signature,
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | psa_crypto_core.h | 429 uint8_t *signature, size_t signature_size, size_t *signature_length); 466 const uint8_t *signature, size_t signature_length); 505 uint8_t *signature, size_t signature_size, size_t *signature_length); 540 const uint8_t *signature, size_t signature_length); 773 uint8_t *signature, size_t signature_size, 835 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_driver_wrappers.h | 118 uint8_t *signature, in psa_driver_wrapper_sign_message() argument 140 signature, in psa_driver_wrapper_sign_message() 161 signature, in psa_driver_wrapper_sign_message() 181 signature, in psa_driver_wrapper_sign_message() 193 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument 214 signature, in psa_driver_wrapper_verify_message() 234 signature, in psa_driver_wrapper_verify_message() 253 signature, in psa_driver_wrapper_verify_message() 261 uint8_t *signature, size_t signature_size, size_t *signature_length ) in psa_driver_wrapper_sign_hash() argument 279 signature, signature_size, signature_length ) ); in psa_driver_wrapper_sign_hash() [all …]
|
D | psa_crypto_ecp.c | 369 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument 418 signature, in mbedtls_psa_ecdsa_sign_hash() 421 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash() 455 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument 483 signature, in mbedtls_psa_ecdsa_verify_hash() 490 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
|
D | psa_crypto_ecp.h | 182 uint8_t *signature, size_t signature_size, size_t *signature_length); 217 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto_rsa.c | 321 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument 357 signature); in mbedtls_psa_rsa_sign_hash() 372 signature); in mbedtls_psa_rsa_sign_hash() 420 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument 454 signature); in mbedtls_psa_rsa_verify_hash() 469 signature); in mbedtls_psa_rsa_verify_hash()
|
D | psa_crypto_rsa.h | 175 uint8_t *signature, size_t signature_size, size_t *signature_length); 211 const uint8_t *signature, size_t signature_length);
|
D | psa_crypto.c | 2942 uint8_t *signature, in psa_sign_internal() argument 2984 signature, signature_size, signature_length); in psa_sign_internal() 2990 signature, signature_size, signature_length); in psa_sign_internal() 2995 psa_wipe_tag_output_buffer(signature, status, signature_size, in psa_sign_internal() 3008 const uint8_t *signature, in psa_verify_internal() argument 3034 signature, signature_length); in psa_verify_internal() 3039 signature, signature_length); in psa_verify_internal() 3055 uint8_t *signature, in psa_sign_message_builtin() argument 3077 signature, signature_size, signature_length); in psa_sign_message_builtin() 3093 LOCAL_OUTPUT_DECLARE(signature_external, signature); in psa_sign_message() [all …]
|
/openthread-latest/third_party/mbedtls/repo/include/psa/ |
D | crypto.h | 2890 uint8_t *signature, 2942 const uint8_t *signature, 2995 uint8_t *signature, 3046 const uint8_t *signature, 4575 uint8_t *signature, size_t signature_size, 4696 const uint8_t *signature, size_t signature_length);
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 27 operations that should use PSA do not (signature generation & verification) as 95 As standardized, the signature scheme takes several parameters, in addition to 112 - signature: `mbedtls_rsa_rsassa_pss_sign()` 116 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()` 129 - signature: not supported 138 - signature generation: 156 encoded as part of the key, and of the signature. If both encoding are 158 value from the signature parameters is used. 168 - verifying the signature on a certificate from its parent; 169 - verifying the signature on a CRL from the issuing CA. [all …]
|
D | psa-legacy-bridges.md | 122 * RSA: PKCS#1v1.5 signature, PSS signature, PKCS#1v1.5 encryption, OAEP encryption. 123 * ECC: ECDSA signature (randomized or deterministic), ECDH key agreement (via `mbedtls_pk_ec`). 141 …rministic is made at compile time. For RSA, the choice of encryption or signature algorithm is mad… 183 The pk module uses signature formats intended for X.509. The PSA module uses the simplest sensible … 190 …TLS 4.x and perhaps beyond. We will at least add EdDSA support, and its signature encoding is the … 192 …signature format, parametrized by the algorithm. However, it is difficult to predict exactly what … 194 …signature field) or X.509 (the signature is inside a BITSTRING, not directly in a SEQUENCE). So th… 251 …signature or for encryption. Between algorithms of the same nature, there is no way to distinguish… 285 …m the RSA key's parameters. (Note that `PSA_ALG_ANY_HASH` is only allowed in signature algorithms.) 326 #### API to convert between signature formats [all …]
|
/openthread-latest/third_party/mbedtls/repo/tests/src/ |
D | psa_exercise_key.c | 361 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 362 size_t signature_length = sizeof(signature); in exercise_signature_key() 374 signature, sizeof(signature), in exercise_signature_key() 390 signature, signature_length); in exercise_signature_key() 401 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local 403 size_t signature_length = sizeof(signature); in exercise_signature_key() 408 signature, sizeof(signature), in exercise_signature_key() 424 signature, signature_length); in exercise_signature_key()
|