Lines Matching refs:support
38 EXPECT_EQ("", support::encodeHex(vector<uint8_t>({}))); in TEST()
39 EXPECT_EQ("01", support::encodeHex(vector<uint8_t>({1}))); in TEST()
41 support::encodeHex( in TEST()
43 EXPECT_EQ("0102ffe060", support::encodeHex(vector<uint8_t>({1, 2, 255, 224, 96}))); in TEST()
47 EXPECT_EQ(vector<uint8_t>({}), support::decodeHex("")); in TEST()
48 EXPECT_EQ(vector<uint8_t>({1}), support::decodeHex("01")); in TEST()
51 support::decodeHex("000102030405060708090a0b0c0d0e0f10")); in TEST()
53 EXPECT_FALSE(support::decodeHex("0g")); in TEST()
54 EXPECT_FALSE(support::decodeHex("0")); in TEST()
55 EXPECT_FALSE(support::decodeHex("012")); in TEST()
61 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
63 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
65 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
68 optional<vector<uint8_t>> signature = support::signEcDsa(privKey.value(), data); in TEST()
70 support::checkEcDsaSignature(support::sha256(data), signature.value(), pubKey.value())); in TEST()
76 support::checkEcDsaSignature(support::sha256(data), modifiedSignature, pubKey.value())); in TEST()
79 vector<uint8_t> modifiedDigest = support::sha256(data); in TEST()
81 ASSERT_FALSE(support::checkEcDsaSignature(modifiedDigest, signature.value(), pubKey.value())); in TEST()
111 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
113 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
115 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
119 optional<vector<uint8_t>> coseSign1 = support::coseSignEcDsa( in TEST()
121 ASSERT_TRUE(support::coseCheckEcDsaSignature(coseSign1.value(), {} /* detachedContent */, in TEST()
124 optional<vector<uint8_t>> payload = support::coseSignGetPayload(coseSign1.value()); in TEST()
142 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
144 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
146 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
150 optional<vector<uint8_t>> coseSign1 = support::coseSignEcDsa(privKey.value(), {} /* data */, in TEST()
153 support::coseCheckEcDsaSignature(coseSign1.value(), detachedContent, pubKey.value())); in TEST()
155 optional<vector<uint8_t>> payload = support::coseSignGetPayload(coseSign1.value()); in TEST()
176 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in generateCertChain()
177 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in generateCertChain()
178 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in generateCertChain()
180 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in generateCertChain()
184 return support::certificateChainJoin(certs); in generateCertChain()
188 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
190 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
192 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
196 optional<vector<vector<uint8_t>>> splitCerts = support::certificateChainSplit(certChain); in TEST()
201 support::coseSignEcDsa(privKey.value(), {} /* data */, detachedContent, certChain); in TEST()
203 support::coseCheckEcDsaSignature(coseSign1.value(), detachedContent, pubKey.value())); in TEST()
205 optional<vector<uint8_t>> payload = support::coseSignGetPayload(coseSign1.value()); in TEST()
209 optional<vector<uint8_t>> certsRecovered = support::coseSignGetX5Chain(coseSign1.value()); in TEST()
214 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
216 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
218 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
222 optional<vector<vector<uint8_t>>> splitCerts = support::certificateChainSplit(certChain); in TEST()
227 support::coseSignEcDsa(privKey.value(), {} /* data */, detachedContent, certChain); in TEST()
229 support::coseCheckEcDsaSignature(coseSign1.value(), detachedContent, pubKey.value())); in TEST()
231 optional<vector<uint8_t>> payload = support::coseSignGetPayload(coseSign1.value()); in TEST()
235 optional<vector<uint8_t>> certsRecovered = support::coseSignGetX5Chain(coseSign1.value()); in TEST()
240 optional<vector<uint8_t>> keyPair = support::createEcKeyPair(); in TEST()
242 optional<vector<uint8_t>> privKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
244 optional<vector<uint8_t>> pubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
247 optional<vector<uint8_t>> cert = support::ecPublicKeyGenerateCertificate( in TEST()
251 support::certificateChainGetTopMostKey(cert.value()); in TEST()
257 optional<vector<vector<uint8_t>>> splitCerts = support::certificateChainSplit(cert.value()); in TEST()
261 optional<vector<uint8_t>> otherKeyPair = support::createEcKeyPair(); in TEST()
263 optional<vector<uint8_t>> otherPrivKey = support::ecKeyPairGetPrivateKey(keyPair.value()); in TEST()
265 optional<vector<uint8_t>> otherPubKey = support::ecKeyPairGetPublicKey(keyPair.value()); in TEST()
267 optional<vector<uint8_t>> otherCert = support::ecPublicKeyGenerateCertificate( in TEST()
274 vector<uint8_t> certs2combined = support::certificateChainJoin(certs2); in TEST()
276 optional<vector<vector<uint8_t>>> splitCerts2 = support::certificateChainSplit(certs2combined); in TEST()
294 support::decodeHex("f7bc83f430538424b13298e6aa6fb143ef4d59a14946175997479dbc2d1a3cd8") in TEST()
297 optional<vector<uint8_t>> hmac = support::hmacSha256(key, data); in TEST()
309 optional<vector<uint8_t>> mac = support::coseMac0(key, data, detachedContent); in TEST()
330 optional<vector<uint8_t>> mac = support::coseMac0(key, data, detachedContent); in TEST()
354 optional<vector<uint8_t>> privateKey = support::ecPrivateKeyToKeyPair(privateUncompressed); in p256PrivateKeyFromD()
360 optional<vector<uint8_t>> publicUncompressed = support::ecKeyPairGetPublicKey(privateKey); in p256PrivateKeyGetXandY()
429 EXPECT_EQ(support::encodeHex(deviceKeyX), in TEST()
431 EXPECT_EQ(support::encodeHex(deviceKeyY), in TEST()
442 EXPECT_EQ(support::encodeHex(ephemeralReaderKeyX), in TEST()
444 EXPECT_EQ(support::encodeHex(ephemeralReaderKeyY), in TEST()
447 support::ecKeyPairGetPublicKey(ephemeralReaderKey).value(); in TEST()
462 optional<vector<uint8_t>> sessionEstablishmentEncoded = support::decodeHex( in TEST()
499 support::decodeHex( in TEST()
528 support::calcEMacKey(support::ecKeyPairGetPrivateKey(deviceKey).value(), // private key in TEST()
532 ASSERT_EQ(support::encodeHex(eMacKey.value()), in TEST()
537 optional<vector<uint8_t>> eMacKey2 = support::calcEMacKey( in TEST()
538 support::ecKeyPairGetPrivateKey(ephemeralReaderKey).value(), // private key in TEST()
539 support::ecKeyPairGetPublicKey(deviceKey).value(), // public key in TEST()
542 ASSERT_EQ(support::encodeHex(eMacKey2.value()), in TEST()
548 support::decodeHex( in TEST()
629 support::calcMac(sessionTranscriptEncoded, // SessionTranscript in TEST()