Home
last modified time | relevance | path

Searched refs:Key (Results 1 – 25 of 33) sorted by relevance

12

/mbedtls-development/tests/suites/
A Dtest_suite_pkparse.data1 Parse RSA Key #1 (No password when required)
5 Parse RSA Key #2 (Correct password)
9 Parse RSA Key #3 (Wrong password)
13 Parse RSA Key #4 (DES Encrypted)
17 Parse RSA Key #5 (3DES Encrypted)
21 Parse RSA Key #6 (AES-128 Encrypted)
943 Parse EC Key #1 (SEC1 DER)
947 Parse EC Key #2 (SEC1 PEM)
955 Parse EC Key #4 (PKCS8 DER)
971 Parse EC Key #5 (PKCS8 PEM)
[all …]
A Dtest_suite_psa_crypto_se_driver_hal.data66 Key import smoke test: AES-CTR
69 Key import smoke test: AES-CBC
72 Key import smoke test: AES-CMAC
75 Key import smoke test: AES-CCM
78 Key import smoke test: AES-GCM
81 Key import smoke test: ARIA-CTR
84 Key import smoke test: ARIA-CBC
90 Key import smoke test: ARIA-CCM
93 Key import smoke test: ARIA-GCM
147 Key registration: smoke test
[all …]
A Dtest_suite_oid.data10 OID get Ext Key Usage - id-kp-serverAuth
13 OID get Ext Key Usage - id-kp-clientAuth
16 OID get Ext Key Usage - id-kp-codeSigning
19 OID get Ext Key Usage - id-kp-emailProtection
22 OID get Ext Key Usage - id-kp-timeStamping
25 OID get Ext Key Usage - id-kp-OCSPSigning
28 OID get Ext Key Usage - id-kp-wisun-fan-device
31 OID get Ext Key Usage invalid oid
34 OID get Ext Key Usage wrong oid - id-ce-authorityKeyIdentifier
A Dtest_suite_psa_crypto_metadata.data265 Key derivation: HKDF using SHA-256
269 Key derivation: HKDF using SHA-384
289 Key agreement: FFDH, raw output
293 Key agreement: FFDH, HKDF using SHA-256
297 Key agreement: FFDH, HKDF using SHA-384
301 Key agreement: ECDH, raw output
316 Key type: raw data
319 Key type: HMAC
323 Key type: secret for key derivation
346 Key type: RSA public key
[all …]
A Dtest_suite_des.data223 3DES-ECB 2Key Encrypt OpenSSL Test Vector #1
226 3DES-ECB 2Key Encrypt OpenSSL Test Vector #2
229 3DES-ECB 2Key Decrypt OpenSSL Test Vector #1
232 3DES-ECB 2Key Decrypt OpenSSL Test Vector #2
235 3DES-CBC 3Key Encrypt OpenSSL Test Vector #1
238 3DES-CBC 3Key Decrypt OpenSSL Test Vector #1
244 3DES-CBC 3Key Encrypt (Invalid input length)
A Dtest_suite_aes.xts.data16 AES-0-XTS Setkey Fail Invalid Key Length
19 AES-4-XTS Setkey Fail Invalid Key Length
22 AES-64-XTS Setkey Fail Invalid Key Length
25 AES-192-XTS Setkey Fail Invalid Key Length
28 AES-384-XTS Setkey Fail Invalid Key Length
A Dtest_suite_rsa.data388 RSA Generate Key - 128bit key
391 RSA Generate Key (Number of bits too small)
394 RSA Generate Key (Exponent too small)
397 RSA Generate Key - 1024 bit key
400 RSA Generate Key - 2048 bit key
403 RSA Generate Key - 1025 bit key
A Dtest_suite_psa_crypto_entropy.data10 # Key types and non-randomized auxilary algorithms (in practice, hashes) can
A Dtest_suite_psa_crypto_persistent_key.function243 * Key attributes may have been returned by psa_get_key_attributes()
316 * Key attributes may have been returned by psa_get_key_attributes()
A Dtest_suite_psa_crypto_slot_management.function186 * Key attributes may have been returned by psa_get_key_attributes()
341 * Key attributes may have been returned by psa_get_key_attributes()
415 * Key attributes may have been returned by psa_get_key_attributes()
721 * Key attributes may have been returned by psa_get_key_attributes()
811 * Key attributes may have been returned by psa_get_key_attributes()
1052 * Key attributes may have been returned by psa_get_key_attributes()
A Dtest_suite_ssl.data5889 SSL TLS 1.3 Key schedule: Secret evolution #1
5895 SSL TLS 1.3 Key schedule: Secret evolution #2
5900 SSL TLS 1.3 Key schedule: Secret evolution #3
5905 SSL TLS 1.3 Key schedule: HKDF Expand Label #1
5911 SSL TLS 1.3 Key schedule: HKDF Expand Label #2
5917 SSL TLS 1.3 Key schedule: HKDF Expand Label #3
5923 SSL TLS 1.3 Key schedule: HKDF Expand Label #4
5961 SSL TLS 1.3 Key schedule: Traffic key generation #1
6025 # - Server App Key: 0b6d22c8ff68097ea871c672073773bf
6027 # - Client App Key: 49134b95328f279f0183860589ac6707
[all …]
A Dtest_suite_psa_crypto_slot_management.data221 Key slot eviction to import a new persistent key
225 Key slot eviction to import a new volatile key
A Dtest_suite_psa_crypto.function243 * Key attributes may have been returned by psa_get_key_attributes()
651 * Key attributes may have been returned by psa_get_key_attributes()
695 * Key attributes may have been returned by psa_get_key_attributes()
750 * Key attributes may have been returned by psa_get_key_attributes()
898 * Key attributes may have been returned by psa_get_key_attributes()
962 * Key attributes may have been returned by psa_get_key_attributes()
1010 * Key attributes may have been returned by psa_get_key_attributes()
1056 * Key attributes may have been returned by psa_get_key_attributes()
1356 * Key attributes may have been returned by psa_get_key_attributes()
1573 * Key attributes may have been returned by psa_get_key_attributes()
[all …]
/mbedtls-development/tests/data_files/dir3/
A Dtest-ca.crt11 Subject Public Key Info:
12 Public Key Algorithm: rsaEncryption
13 RSA Public Key: (2048 bit)
37 X509v3 Subject Key Identifier:
39 X509v3 Authority Key Identifier:
/mbedtls-development/tests/data_files/dir1/
A Dtest-ca.crt11 Subject Public Key Info:
12 Public Key Algorithm: rsaEncryption
13 RSA Public Key: (2048 bit)
37 X509v3 Subject Key Identifier:
39 X509v3 Authority Key Identifier:
/mbedtls-development/tests/data_files/dir2/
A Dtest-ca.crt11 Subject Public Key Info:
12 Public Key Algorithm: rsaEncryption
13 RSA Public Key: (2048 bit)
37 X509v3 Subject Key Identifier:
39 X509v3 Authority Key Identifier:
/mbedtls-development/scripts/mbedtls_dev/
A Dpsa_storage.py97 class Key: class
177 key = Key(version=0,
188 key = Key(version=0,
198 key = Key(type=0x1001, bits=8,
/mbedtls-development/tests/data_files/
A Dserver9-with-ca.crt30 Subject Public Key Info:
31 Public Key Algorithm: rsaEncryption
32 RSA Public Key: (2048 bit)
56 X509v3 Subject Key Identifier:
58 X509v3 Authority Key Identifier:
A Dserver10_int3_int-ca2_ca.crt51 Subject Public Key Info:
52 Public Key Algorithm: rsaEncryption
53 RSA Public Key: (2048 bit)
77 X509v3 Subject Key Identifier:
79 X509v3 Authority Key Identifier:
/mbedtls-development/docs/architecture/
A Dmbed-crypto-storage-specification.md35 ### Key names for 0.1.0
47 ### Key file format for 0.1.0
108 ### Key names for 1.0.0
117 ### Key file format for 1.0.0
172 ### Key file format for 1.1.0
206 * Key files can store references to keys in a secure element. In such key files, the key material c…
238 ### Key file format for TBD
297 ### Key file format for TBD
A Dpsa-crypto-implementation-structure.md58 ### Key creation
60 Key creation implementation in Mbed TLS PSA core is articulated around three internal functions: ps…
A Dtls13-experimental.md46 * The traffic {Key,IV} generation from secret
213 (2) Key exchange configuration options for TLS 1.3 will likely to be
/mbedtls-development/docs/architecture/testing/
A Dpsa-storage-format-testing.md45 * [Key files](#key-storage) (files containing one key's metadata and, except for some secure elemen…
54 ## Key storage testing
79 * Key types: `PSA_KEY_TYPE_xxx`, `PSA_ECC_FAMILY_xxx`, `PSA_DH_FAMILY_xxx`.
A Dinvasive-testing.md103 * Key slots (PSA API only).
104 * Key slots in a secure element (PSA SE HAL).
133 Key to requirement tables:
/mbedtls-development/docs/proposed/
A Dpsa-driver-interface.md158 #### Key type specifications
350 #### Key size determination on import
362 #### Key validation
442 ### Key format for transparent drivers
446 ### Key management with transparent drivers
457 #### Key import with transparent drivers
599 ### Key format for opaque drivers
659 ### Key management with opaque drivers
731 #### Key creation entry points in opaque drivers
753 #### Key export entry points in opaque drivers
[all …]

Completed in 61 milliseconds

12