Home
last modified time | relevance | path

Searched refs:signature (Results 1 – 25 of 60) sorted by relevance

123

/openthread-latest/third_party/mbedtls/repo/tests/src/drivers/
Dtest_driver_signature.c48 uint8_t *signature, in sign_hash() argument
62 signature, signature_size, signature_length); in sign_hash()
69 signature, signature_size, signature_length); in sign_hash()
83 signature, signature_size, signature_length); in sign_hash()
90 signature, signature_size, signature_length); in sign_hash()
103 (void) signature; in sign_hash()
116 const uint8_t *signature, in verify_hash() argument
129 signature, signature_length); in verify_hash()
136 signature, signature_length); in verify_hash()
150 signature, signature_length); in verify_hash()
[all …]
/openthread-latest/tests/unit/
Dtest_ecdsa.cpp82 Ecdsa::P256::Signature signature; in TestEcdsaVector() local
112 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaVector()
113 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaVector()
119 VerifyOrQuit(sizeof(kExpectedSignature) == sizeof(signature)); in TestEcdsaVector()
120 VerifyOrQuit(memcmp(signature.GetBytes(), kExpectedSignature, sizeof(kExpectedSignature)) == 0); in TestEcdsaVector()
126 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaVector()
140 Ecdsa::P256::Signature signature; in TestEcdsaKeyGenerationSignAndVerify() local
165 SuccessOrQuit(keyPair.Sign(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify()
166 DumpBuffer("Signature", signature.GetBytes(), sizeof(signature)); in TestEcdsaKeyGenerationSignAndVerify()
169 SuccessOrQuit(publicKey.Verify(hash, signature)); in TestEcdsaKeyGenerationSignAndVerify()
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_lms.data3 # message, and verifies the signature.
8 # signs the message, and verifies the signature.
14 # data_files/lms_pyhsslms_sha256_m32_h5_lmots_sha256_n32_w8_prv. Note that this signature
15 # uses leaf key 0, so must be the first signature generated by the key if the
16 # signature is to be reproduced. Message data is random. Note that pyhsslms
18 # word at the start of the key/sig. We strip these 4 bytes from the signature
21 # To produce another signature with this message and key (note that the actual
22 # signature bytes will differ due to randomization):
39 # The signature uses leaf key 1, so must be the second signature generated by
40 # the key if the signature is to be reproduced.
[all …]
Dtest_suite_lmots.data3 # message, and verifies the signature.
8 # message, and verifies the signature.
13 # signs the message, and verifies the signature.
19 # providing direct access to the underlying OTS signature scheme. The private
24 # To produce another signature with this message and key (note that the actual
25 # signature bytes will differ due to randomization):
44 # providing direct access to the underlying OTS signature scheme. The private
49 # To produce another signature with this message and key (note that the actual
50 # signature bytes will differ due to randomization):
69 # providing direct access to the underlying OTS signature scheme. The private
[all …]
Dtest_suite_psa_crypto_metadata.data217 Asymmetric signature: RSA PKCS#1 v1.5 raw
221 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
225 Asymmetric signature: RSA PSS SHA-256
229 Asymmetric signature: RSA PSS-any-salt SHA-256
233 Asymmetric signature: randomized ECDSA (no hashing)
237 Asymmetric signature: SHA-256 + randomized ECDSA
241 Asymmetric signature: SHA-256 + deterministic ECDSA using SHA-256
245 Asymmetric signature: pure EdDSA
249 Asymmetric signature: Ed25519ph
253 Asymmetric signature: Ed448ph
[all …]
Dtest_suite_psa_crypto_entropy.function102 /* This test case is only expected to pass if the signature mechanism
103 * requires randomness, either because it is a randomized signature
113 uint8_t *signature = NULL;
118 TEST_CALLOC(signature, signature_size);
125 signature, signature_size,
137 signature, signature_size,
145 mbedtls_free(signature);
Dtest_suite_psa_crypto_util.data37 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter)
41 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter)
45 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer)
49 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
Dtest_suite_psa_crypto.function2542 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 };
2563 signature, sizeof(signature),
2571 memset(signature, 0, sizeof(signature));
2574 signature, sizeof(signature));
2585 signature, sizeof(signature),
2593 memset(signature, 0, sizeof(signature));
2596 signature, sizeof(signature));
6816 unsigned char *signature = NULL;
6838 TEST_CALLOC(signature, signature_size);
6840 /* Perform the signature. */
[all …]
Dtest_suite_ecdsa.function57 /* prepare material for signature */
124 /* Valid signature */
128 /* Invalid signature: wrong public key (G instead of Q) */
250 /* generate and write signature, then read and verify it */
310 /* prepare material for signature */
319 /* generate and write signature, then read and verify it */
513 /* Prepare signature R & S */
Dtest_suite_psa_crypto_se_driver_hal_mocks.function567 uint8_t signature[1] = { 'S' };
600 signature, sizeof(signature),
628 const uint8_t signature[1] = { 'S' };
660 signature, sizeof(signature))
Dtest_suite_psa_crypto_se_driver_hal.function449 uint8_t *signature,
471 signature, signature_size, signature_length);
483 const uint8_t *signature,
505 signature, signature_length);
1301 uint8_t signature[PSA_SIGNATURE_MAX_SIZE];
1399 signature, sizeof(signature),
1406 signature, sizeof(signature),
1414 signature, signature_length));
1418 signature, signature_length),
1421 /* Change the signature and verify again. */
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/include/test/drivers/
Dsignature.h48 uint8_t *signature,
59 uint8_t *signature,
70 const uint8_t *signature,
80 const uint8_t *signature,
88 uint8_t *signature, size_t signature_size, size_t *signature_length);
95 uint8_t *signature, size_t signature_size, size_t *signature_length);
102 const uint8_t *signature, size_t signature_length);
109 const uint8_t *signature, size_t signature_length);
/openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/
Dp256-m_driver_entrypoints.c210 uint8_t *signature, in p256_transparent_sign_hash() argument
228 int ret = p256_ecdsa_sign(signature, key_buffer, hash, hash_length); in p256_transparent_sign_hash()
243 const uint8_t *signature, in p256_verify_hash_with_public_key() argument
256 int ret = p256_ecdsa_verify(signature, public_key_p256m, hash, hash_length); in p256_verify_hash_with_public_key()
268 const uint8_t *signature, in p256_transparent_verify_hash() argument
305 signature, in p256_transparent_verify_hash()
Dp256-m_driver_entrypoints.h174 uint8_t *signature,
216 const uint8_t *signature,
/openthread-latest/third_party/mbedtls/repo/library/
Dpsa_crypto_core.h429 uint8_t *signature, size_t signature_size, size_t *signature_length);
466 const uint8_t *signature, size_t signature_length);
505 uint8_t *signature, size_t signature_size, size_t *signature_length);
540 const uint8_t *signature, size_t signature_length);
773 uint8_t *signature, size_t signature_size,
835 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_driver_wrappers.h118 uint8_t *signature, in psa_driver_wrapper_sign_message() argument
140 signature, in psa_driver_wrapper_sign_message()
161 signature, in psa_driver_wrapper_sign_message()
181 signature, in psa_driver_wrapper_sign_message()
193 const uint8_t *signature, in psa_driver_wrapper_verify_message() argument
214 signature, in psa_driver_wrapper_verify_message()
234 signature, in psa_driver_wrapper_verify_message()
253 signature, in psa_driver_wrapper_verify_message()
261 uint8_t *signature, size_t signature_size, size_t *signature_length ) in psa_driver_wrapper_sign_hash() argument
279 signature, signature_size, signature_length ) ); in psa_driver_wrapper_sign_hash()
[all …]
Dpsa_crypto_ecp.c369 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_ecdsa_sign_hash() argument
418 signature, in mbedtls_psa_ecdsa_sign_hash()
421 signature + curve_bytes, in mbedtls_psa_ecdsa_sign_hash()
455 const uint8_t *signature, size_t signature_length) in mbedtls_psa_ecdsa_verify_hash() argument
483 signature, in mbedtls_psa_ecdsa_verify_hash()
490 signature + curve_bytes, in mbedtls_psa_ecdsa_verify_hash()
Dpsa_crypto_ecp.h182 uint8_t *signature, size_t signature_size, size_t *signature_length);
217 const uint8_t *signature, size_t signature_length);
Dpsa_crypto_rsa.c321 uint8_t *signature, size_t signature_size, size_t *signature_length) in mbedtls_psa_rsa_sign_hash() argument
357 signature); in mbedtls_psa_rsa_sign_hash()
372 signature); in mbedtls_psa_rsa_sign_hash()
420 const uint8_t *signature, size_t signature_length) in mbedtls_psa_rsa_verify_hash() argument
454 signature); in mbedtls_psa_rsa_verify_hash()
469 signature); in mbedtls_psa_rsa_verify_hash()
Dpsa_crypto_rsa.h175 uint8_t *signature, size_t signature_size, size_t *signature_length);
211 const uint8_t *signature, size_t signature_length);
Dpsa_crypto.c2942 uint8_t *signature, in psa_sign_internal() argument
2984 signature, signature_size, signature_length); in psa_sign_internal()
2990 signature, signature_size, signature_length); in psa_sign_internal()
2995 psa_wipe_tag_output_buffer(signature, status, signature_size, in psa_sign_internal()
3008 const uint8_t *signature, in psa_verify_internal() argument
3034 signature, signature_length); in psa_verify_internal()
3039 signature, signature_length); in psa_verify_internal()
3055 uint8_t *signature, in psa_sign_message_builtin() argument
3077 signature, signature_size, signature_length); in psa_sign_message_builtin()
3093 LOCAL_OUTPUT_DECLARE(signature_external, signature); in psa_sign_message()
[all …]
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto.h2890 uint8_t *signature,
2942 const uint8_t *signature,
2995 uint8_t *signature,
3046 const uint8_t *signature,
4575 uint8_t *signature, size_t signature_size,
4696 const uint8_t *signature, size_t signature_length);
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md27 operations that should use PSA do not (signature generation & verification) as
95 As standardized, the signature scheme takes several parameters, in addition to
112 - signature: `mbedtls_rsa_rsassa_pss_sign()`
116 - signature: `mbedtls_rsa_rsassa_pss_sign_ext()`
129 - signature: not supported
138 - signature generation:
156 encoded as part of the key, and of the signature. If both encoding are
158 value from the signature parameters is used.
168 - verifying the signature on a certificate from its parent;
169 - verifying the signature on a CRL from the issuing CA.
[all …]
Dpsa-legacy-bridges.md122 * RSA: PKCS#1v1.5 signature, PSS signature, PKCS#1v1.5 encryption, OAEP encryption.
123 * ECC: ECDSA signature (randomized or deterministic), ECDH key agreement (via `mbedtls_pk_ec`).
141 …rministic is made at compile time. For RSA, the choice of encryption or signature algorithm is mad…
183 The pk module uses signature formats intended for X.509. The PSA module uses the simplest sensible
190 …TLS 4.x and perhaps beyond. We will at least add EdDSA support, and its signature encoding is the …
192signature format, parametrized by the algorithm. However, it is difficult to predict exactly what …
194signature field) or X.509 (the signature is inside a BITSTRING, not directly in a SEQUENCE). So th…
251signature or for encryption. Between algorithms of the same nature, there is no way to distinguish…
285 …m the RSA key's parameters. (Note that `PSA_ALG_ANY_HASH` is only allowed in signature algorithms.)
326 #### API to convert between signature formats
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/src/
Dpsa_exercise_key.c361 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
362 size_t signature_length = sizeof(signature); in exercise_signature_key()
374 signature, sizeof(signature), in exercise_signature_key()
390 signature, signature_length); in exercise_signature_key()
401 unsigned char signature[PSA_SIGNATURE_MAX_SIZE] = { 0 }; in exercise_signature_key() local
403 size_t signature_length = sizeof(signature); in exercise_signature_key()
408 signature, sizeof(signature), in exercise_signature_key()
424 signature, signature_length); in exercise_signature_key()

123