/mbedtls-development/tests/suites/ |
A D | test_suite_pkparse.data | 1 Parse RSA Key #1 (No password when required) 5 Parse RSA Key #2 (Correct password) 9 Parse RSA Key #3 (Wrong password) 13 Parse RSA Key #4 (DES Encrypted) 17 Parse RSA Key #5 (3DES Encrypted) 21 Parse RSA Key #6 (AES-128 Encrypted) 943 Parse EC Key #1 (SEC1 DER) 947 Parse EC Key #2 (SEC1 PEM) 955 Parse EC Key #4 (PKCS8 DER) 971 Parse EC Key #5 (PKCS8 PEM) [all …]
|
A D | test_suite_psa_crypto_se_driver_hal.data | 66 Key import smoke test: AES-CTR 69 Key import smoke test: AES-CBC 72 Key import smoke test: AES-CMAC 75 Key import smoke test: AES-CCM 78 Key import smoke test: AES-GCM 81 Key import smoke test: ARIA-CTR 84 Key import smoke test: ARIA-CBC 90 Key import smoke test: ARIA-CCM 93 Key import smoke test: ARIA-GCM 147 Key registration: smoke test [all …]
|
A D | test_suite_oid.data | 10 OID get Ext Key Usage - id-kp-serverAuth 13 OID get Ext Key Usage - id-kp-clientAuth 16 OID get Ext Key Usage - id-kp-codeSigning 19 OID get Ext Key Usage - id-kp-emailProtection 22 OID get Ext Key Usage - id-kp-timeStamping 25 OID get Ext Key Usage - id-kp-OCSPSigning 28 OID get Ext Key Usage - id-kp-wisun-fan-device 31 OID get Ext Key Usage invalid oid 34 OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier
|
A D | test_suite_psa_crypto_metadata.data | 265 Key derivation: HKDF using SHA-256 269 Key derivation: HKDF using SHA-384 289 Key agreement: FFDH, raw output 293 Key agreement: FFDH, HKDF using SHA-256 297 Key agreement: FFDH, HKDF using SHA-384 301 Key agreement: ECDH, raw output 316 Key type: raw data 319 Key type: HMAC 323 Key type: secret for key derivation 346 Key type: RSA public key [all …]
|
A D | test_suite_des.data | 223 3DES-ECB 2Key Encrypt OpenSSL Test Vector #1 226 3DES-ECB 2Key Encrypt OpenSSL Test Vector #2 229 3DES-ECB 2Key Decrypt OpenSSL Test Vector #1 232 3DES-ECB 2Key Decrypt OpenSSL Test Vector #2 235 3DES-CBC 3Key Encrypt OpenSSL Test Vector #1 238 3DES-CBC 3Key Decrypt OpenSSL Test Vector #1 244 3DES-CBC 3Key Encrypt (Invalid input length)
|
A D | test_suite_aes.xts.data | 16 AES-0-XTS Setkey Fail Invalid Key Length 19 AES-4-XTS Setkey Fail Invalid Key Length 22 AES-64-XTS Setkey Fail Invalid Key Length 25 AES-192-XTS Setkey Fail Invalid Key Length 28 AES-384-XTS Setkey Fail Invalid Key Length
|
A D | test_suite_rsa.data | 388 RSA Generate Key - 128bit key 391 RSA Generate Key (Number of bits too small) 394 RSA Generate Key (Exponent too small) 397 RSA Generate Key - 1024 bit key 400 RSA Generate Key - 2048 bit key 403 RSA Generate Key - 1025 bit key
|
A D | test_suite_psa_crypto_entropy.data | 10 # Key types and non-randomized auxilary algorithms (in practice, hashes) can
|
A D | test_suite_psa_crypto_persistent_key.function | 243 * Key attributes may have been returned by psa_get_key_attributes() 316 * Key attributes may have been returned by psa_get_key_attributes()
|
A D | test_suite_psa_crypto_slot_management.function | 186 * Key attributes may have been returned by psa_get_key_attributes() 341 * Key attributes may have been returned by psa_get_key_attributes() 415 * Key attributes may have been returned by psa_get_key_attributes() 721 * Key attributes may have been returned by psa_get_key_attributes() 811 * Key attributes may have been returned by psa_get_key_attributes() 1052 * Key attributes may have been returned by psa_get_key_attributes()
|
A D | test_suite_ssl.data | 5889 SSL TLS 1.3 Key schedule: Secret evolution #1 5895 SSL TLS 1.3 Key schedule: Secret evolution #2 5900 SSL TLS 1.3 Key schedule: Secret evolution #3 5905 SSL TLS 1.3 Key schedule: HKDF Expand Label #1 5911 SSL TLS 1.3 Key schedule: HKDF Expand Label #2 5917 SSL TLS 1.3 Key schedule: HKDF Expand Label #3 5923 SSL TLS 1.3 Key schedule: HKDF Expand Label #4 5961 SSL TLS 1.3 Key schedule: Traffic key generation #1 6025 # - Server App Key: 0b6d22c8ff68097ea871c672073773bf 6027 # - Client App Key: 49134b95328f279f0183860589ac6707 [all …]
|
A D | test_suite_psa_crypto_slot_management.data | 221 Key slot eviction to import a new persistent key 225 Key slot eviction to import a new volatile key
|
A D | test_suite_psa_crypto.function | 243 * Key attributes may have been returned by psa_get_key_attributes() 651 * Key attributes may have been returned by psa_get_key_attributes() 695 * Key attributes may have been returned by psa_get_key_attributes() 750 * Key attributes may have been returned by psa_get_key_attributes() 898 * Key attributes may have been returned by psa_get_key_attributes() 962 * Key attributes may have been returned by psa_get_key_attributes() 1010 * Key attributes may have been returned by psa_get_key_attributes() 1056 * Key attributes may have been returned by psa_get_key_attributes() 1356 * Key attributes may have been returned by psa_get_key_attributes() 1573 * Key attributes may have been returned by psa_get_key_attributes() [all …]
|
/mbedtls-development/tests/data_files/dir3/ |
A D | test-ca.crt | 11 Subject Public Key Info: 12 Public Key Algorithm: rsaEncryption 13 RSA Public Key: (2048 bit) 37 X509v3 Subject Key Identifier: 39 X509v3 Authority Key Identifier:
|
/mbedtls-development/tests/data_files/dir1/ |
A D | test-ca.crt | 11 Subject Public Key Info: 12 Public Key Algorithm: rsaEncryption 13 RSA Public Key: (2048 bit) 37 X509v3 Subject Key Identifier: 39 X509v3 Authority Key Identifier:
|
/mbedtls-development/tests/data_files/dir2/ |
A D | test-ca.crt | 11 Subject Public Key Info: 12 Public Key Algorithm: rsaEncryption 13 RSA Public Key: (2048 bit) 37 X509v3 Subject Key Identifier: 39 X509v3 Authority Key Identifier:
|
/mbedtls-development/scripts/mbedtls_dev/ |
A D | psa_storage.py | 97 class Key: class 177 key = Key(version=0, 188 key = Key(version=0, 198 key = Key(type=0x1001, bits=8,
|
/mbedtls-development/tests/data_files/ |
A D | server9-with-ca.crt | 30 Subject Public Key Info: 31 Public Key Algorithm: rsaEncryption 32 RSA Public Key: (2048 bit) 56 X509v3 Subject Key Identifier: 58 X509v3 Authority Key Identifier:
|
A D | server10_int3_int-ca2_ca.crt | 51 Subject Public Key Info: 52 Public Key Algorithm: rsaEncryption 53 RSA Public Key: (2048 bit) 77 X509v3 Subject Key Identifier: 79 X509v3 Authority Key Identifier:
|
/mbedtls-development/docs/architecture/ |
A D | mbed-crypto-storage-specification.md | 35 ### Key names for 0.1.0 47 ### Key file format for 0.1.0 108 ### Key names for 1.0.0 117 ### Key file format for 1.0.0 172 ### Key file format for 1.1.0 206 * Key files can store references to keys in a secure element. In such key files, the key material c… 238 ### Key file format for TBD 297 ### Key file format for TBD
|
A D | psa-crypto-implementation-structure.md | 58 ### Key creation 60 Key creation implementation in Mbed TLS PSA core is articulated around three internal functions: ps…
|
A D | tls13-experimental.md | 46 * The traffic {Key,IV} generation from secret 213 (2) Key exchange configuration options for TLS 1.3 will likely to be
|
/mbedtls-development/docs/architecture/testing/ |
A D | psa-storage-format-testing.md | 45 * [Key files](#key-storage) (files containing one key's metadata and, except for some secure elemen… 54 ## Key storage testing 79 * Key types: `PSA_KEY_TYPE_xxx`, `PSA_ECC_FAMILY_xxx`, `PSA_DH_FAMILY_xxx`.
|
A D | invasive-testing.md | 103 * Key slots (PSA API only). 104 * Key slots in a secure element (PSA SE HAL). 133 Key to requirement tables:
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 158 #### Key type specifications 350 #### Key size determination on import 362 #### Key validation 442 ### Key format for transparent drivers 446 ### Key management with transparent drivers 457 #### Key import with transparent drivers 599 ### Key format for opaque drivers 659 ### Key management with opaque drivers 731 #### Key creation entry points in opaque drivers 753 #### Key export entry points in opaque drivers [all …]
|